Search results for: network security management
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15653

Search results for: network security management

13553 Water Crisis or Crisis of Water Management: Assessing Water Governance in Iran

Authors: Sedigheh Kalantari

Abstract:

Like many countries in the arid and semi-arid belt, Iran experiences a natural limitation in the availability of water resources. However, rapid socioeconomic development has created a serious water crisis in a nation that was once one of the world’s pioneers in sustainable water management, due to the Persians’ contribution to hydraulic engineering inventions – the Qanat – throughout history. The exogenous issues like the changing climate, frequent droughts, and international sanctions are only crisis catalyzers, not the main cause of the water crisis; and a resilient water management system is expected to be capable of coping with these periodic external pressures. The current dramatic water security issues in Iran are rooted in managerial, political, and institutional challenges rather than engineering and technical issues, and the country is suffering from challenges in water governance. The country, instead of rigorous water conservation efforts, is still focused on supply-driven approach, technology and centralized methods, and structural solutions that aim to increase water supply; while the effectiveness of water governance and management has often left unused. To solve these issues, it is necessary to assess the present situation and its evolution over time. In this respect, establishing water governance assessment mechanisms will be a significant aspect of this paper. The research framework, however, is a conceptual framework to assess governance performance of Iran to critically diagnose problematic issues and areas, as well as proffer empirically based solutions and determine the best possible steps towards transformational processes. This concept aims to measure the adequacy of current solutions and strategies designed to ameliorate these problems and then develop and prescribe adequate futuristic solutions. Thus, the analytical framework developed in this paper seeks to provide insights on key factors influencing water governance in Iranian cities, institutional frameworks to manage water across scales and authorities, multi-level management gaps and policy responses, through an evidence-based approach and good practices to drive reform toward sustainability and water resource conservation. The findings of this paper show that the current structure of the water governance system in Iran, coupled with the lack of a comprehensive understanding of the root causes of the problem, leaves minimal hope for developing sustainable solutions to Iran’s increasing water crisis. In order to follow sustainable development approaches, Iran needs to replace symptom management with problem prevention.

Keywords: governance, Iran, sustainable development, water management, water resources

Procedia PDF Downloads 27
13552 Towards Effective Public Consultation and Participation in Nigeria: Lessons from Shoreline Management Plans (SMPs) Activities in England

Authors: Taye O. Famuditi, Jonathan Potts, Malcolm Bray

Abstract:

This paper examines the shoreline management planning policy in England and its suitability for ameliorating the diverse environmental problems associated with Nigeria’s coastal zones. It examines the success of SMPs in England since the mid-1990s and progress achieved, with the aim of understudying the current management approach that can be transferred to Nigeria to strengthen its adoption, and as a necessary corollary, implementation of the SMPs. This paper also examines key elements of the shoreline management frameworks in England and provides answers to the question: Would shoreline management planning approach in England be appropriate and feasible in Nigeria? It further concludes that many of the action plans and principles of participation should be adoptable provided that a participatory approach that involves all stakeholders including community members and relevant sectorial ministries as well as appropriate legal framework is encouraged.

Keywords: shoreline management plans, coastal zone management, stakeholder engagement, participatory approach, Nigeria

Procedia PDF Downloads 349
13551 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 476
13550 Application of Artificial Neural Network for Prediction of Load-Haul-Dump Machine Performance Characteristics

Authors: J. Balaraju, M. Govinda Raj, C. S. N. Murthy

Abstract:

Every industry is constantly looking for enhancement of its day to day production and productivity. This can be possible only by maintaining the men and machinery at its adequate level. Prediction of performance characteristics plays an important role in performance evaluation of the equipment. Analytical and statistical approaches will take a bit more time to solve complex problems such as performance estimations as compared with software-based approaches. Keeping this in view the present study deals with an Artificial Neural Network (ANN) modelling of a Load-Haul-Dump (LHD) machine to predict the performance characteristics such as reliability, availability and preventive maintenance (PM). A feed-forward-back-propagation ANN technique has been used to model the Levenberg-Marquardt (LM) training algorithm. The performance characteristics were computed using Isograph Reliability Workbench 13.0 software. These computed values were validated using predicted output responses of ANN models. Further, recommendations are given to the industry based on the performed analysis for improvement of equipment performance.

Keywords: load-haul-dump, LHD, artificial neural network, ANN, performance, reliability, availability, preventive maintenance

Procedia PDF Downloads 151
13549 Role of Numerical Simulation as a Tool to Enhance Climate Change Adaptation and Resilient Societies: A Case Study from the Philippines

Authors: Pankaj Kumar

Abstract:

Rapid global changes resulted in unfavorable hydrological, ecological, and environmental changes and cumulatively affected natural resources. As a result, the local communities become vulnerable to water stress, poor hygiene, the spread of diseases, food security, etc.. However, the central point for this vulnerability revolves around water resources and the way people interrelate with the hydrological system. Also, most of the efforts to minimize the adverse effect of global changes are centered on the mitigation side. Hence, countries with poor adaptive capacities and poor governance suffer most in case of disasters. However, several transdisciplinary numerical tools are well designed and are capable of answering “what-if questions” through scenario analysis using a system approach. This study has predicted the future water environment in Marikina River in the National Capital Region, Metro Manila of Philippines, using Water Evaluation and Planning (WEAP), an integrated water resource management tool. Obtained results can answer possible adaptation measures along with their associated uncertainties. It also highlighted various challenges for the policy planners to design adaptation countermeasures as well as to track the progress of achieving SDG 6.0.

Keywords: water quality, Philippines, climate change adaptation, hydrological simulation, wastewater management, weap

Procedia PDF Downloads 106
13548 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 157
13547 Facilitating Factors for the Success of Mobile Service Providers in Bangkok Metropolitan

Authors: Yananda Siraphatthada

Abstract:

The objectives of this research were to study the level of influencing factors, leadership, supply chain management, innovation, competitive advantages, business success, and affecting factors to the business success of the mobile phone system service providers in Bangkok Metropolitan. This research was done by the quantitative approach and the qualitative approach. The quantitative approach was used for questionnaires to collect data from the 331 mobile service shop managers franchised by AIS, Dtac and TrueMove. The mobile phone system service providers/shop managers were randomly stratified and proportionally allocated into subgroups exclusive to the number of the providers in each network. In terms of qualitative method, there were in-depth interviews of 6 mobile service providers/managers of Telewiz and Dtac and TrueMove shop to find the agreement or disagreement with the content analysis method. Descriptive Statistics, including Frequency, Percentage, Means and Standard Deviation were employed; also, the Structural Equation Model (SEM) was used as a tool for data analysis. The content analysis method was applied to identify key patterns emerging from the interview responses. The two data sets were brought together for comparing and contrasting to make the findings, providing triangulation to enrich result interpretation. It revealed that the level of the influencing factors – leadership, innovation management, supply chain management, and business competitiveness had an impact at a great level, but that the level of factors, innovation and the business, financial success and nonbusiness financial success of the mobile phone system service providers in Bangkok Metropolitan, is at the highest level. Moreover, the business influencing factors, competitive advantages in the business of mobile system service providers which were leadership, supply chain management, innovation management, business advantages, and business success, had statistical significance at .01 which corresponded to the data from the interviews.

Keywords: mobile service providers, facilitating factors, Bangkok Metropolitan, business success

Procedia PDF Downloads 348
13546 Personal Knowledge Management: Systematic Review and Future Direction

Authors: Kuribachew Gizaw Tohiye, Monica Garfield

Abstract:

Personal knowledge management is the aspect of knowledge management that relates to the way in which individuals organize and manage their own set of knowledge. While in that respect, there has been research in this area for the past 25 years, it is at present necessary to speculate upon what research has been done and what we have discovered about this arena of knowledge management. In contrast to organizational knowledge management, which focuses on a firm’s profitability and competitiveness, personal knowledge management (PKM) is concerned with the person’s self-effectiveness, competence and success. People are concerned in managing their knowledge in order to become more efficient in a variety of personal and organizational interests. This study presents a systematic review of PKM studies. Articles with PKM concepts are reviewed with the objective of clearly defining PKM, identifying the benefits of PKM, classifying the tools that enable PKM and finding the research gaps to indicate future research directions in the area. Consequently, we have developed a definition of PKM and identified the benefits of PKM, including an understanding of who seeks PKM and for what. Tools enabling PKM are identified and classified under three categories Web 1.0, 2.0 and 3.0 and finally the research gap and future directions are suggested. Research which facilitates collaboration by using semantic technologies is suggested to be studied further to improve PKM effectiveness.

Keywords: personal knowledge management, knowledge management, organizational knowledge management, systematic review

Procedia PDF Downloads 331
13545 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 420
13544 The Application of Artificial Neural Networks for the Performance Prediction of Evacuated Tube Solar Air Collector with Phase Change Material

Authors: Sukhbir Singh

Abstract:

This paper describes the modeling of novel solar air collector (NSAC) system by using artificial neural network (ANN) model. The objective of the study is to demonstrate the application of the ANN model to predict the performance of the NSAC with acetamide as a phase change material (PCM) storage. Input data set consist of time, solar intensity and ambient temperature wherever as outlet air temperature of NSAC was considered as output. Experiments were conducted between 9.00 and 24.00 h in June and July 2014 underneath the prevailing atmospheric condition of Kurukshetra (city of the India). After that, experimental results were utilized to train the back propagation neural network (BPNN) to predict the outlet air temperature of NSAC. The results of proposed algorithm show that the BPNN is effective tool for the prediction of responses. The BPNN predicted results are 99% in agreement with the experimental results.

Keywords: Evacuated tube solar air collector, Artificial neural network, Phase change material, solar air collector

Procedia PDF Downloads 120
13543 The Relationship between Organizational Culture and the Establishment of Knowledge Management in the Central Insurance of Iran

Authors: Alireza Assareh, Fatemeh Havas Beigi, Mohammad Vafaee Yeganeh

Abstract:

The present study is conducted to investigate the relationship between organizational culture and the establishment of knowledge management in the Central Insurance of Iran. The research results revealed that there is a significant positive relationship between organizational culture and its elements that include management support, organizational belonging, individual innovation, and leadership style and the establishment of knowledge management in the central insurance of Iran and that there isn’t any significant relationship between conflict resolution and the establishment of knowledge management in the central insurance of Iran.

Keywords: organizational culture, knowledge management, central insurance of Iran, individual innovation

Procedia PDF Downloads 491
13542 Machine Learning Based Gender Identification of Authors of Entry Programs

Authors: Go Woon Kwak, Siyoung Jun, Soyun Maeng, Haeyoung Lee

Abstract:

Entry is an education platform used in South Korea, created to help students learn to program, in which they can learn to code while playing. Using the online version of the entry, teachers can easily assign programming homework to the student and the students can make programs simply by linking programming blocks. However, the programs may be made by others, so that the authors of the programs should be identified. In this paper, as the first step toward author identification of entry programs, we present an artificial neural network based classification approach to identify genders of authors of a program written in an entry. A neural network has been trained from labeled training data that we have collected. Our result in progress, although preliminary, shows that the proposed approach could be feasible to be applied to the online version of entry for gender identification of authors. As future work, we will first use a machine learning technique for age identification of entry programs, which would be the second step toward the author identification.

Keywords: artificial intelligence, author identification, deep neural network, gender identification, machine learning

Procedia PDF Downloads 324
13541 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 86
13540 Bias Prevention in Automated Diagnosis of Melanoma: Augmentation of a Convolutional Neural Network Classifier

Authors: Kemka Ihemelandu, Chukwuemeka Ihemelandu

Abstract:

Melanoma remains a public health crisis, with incidence rates increasing rapidly in the past decades. Improving diagnostic accuracy to decrease misdiagnosis using Artificial intelligence (AI) continues to be documented. Unfortunately, unintended racially biased outcomes, a product of lack of diversity in the dataset used, with a noted class imbalance favoring lighter vs. darker skin tone, have increasingly been recognized as a problem.Resulting in noted limitations of the accuracy of the Convolutional neural network (CNN)models. CNN models are prone to biased output due to biases in the dataset used to train them. Our aim in this study was the optimization of convolutional neural network algorithms to mitigate bias in the automated diagnosis of melanoma. We hypothesized that our proposed training algorithms based on a data augmentation method to optimize the diagnostic accuracy of a CNN classifier by generating new training samples from the original ones will reduce bias in the automated diagnosis of melanoma. We applied geometric transformation, including; rotations, translations, scale change, flipping, and shearing. Resulting in a CNN model that provided a modifiedinput data making for a model that could learn subtle racial features. Optimal selection of the momentum and batch hyperparameter increased our model accuracy. We show that our augmented model reduces bias while maintaining accuracy in the automated diagnosis of melanoma.

Keywords: bias, augmentation, melanoma, convolutional neural network

Procedia PDF Downloads 211
13539 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 620
13538 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 474
13537 Artificial Neural Network Modeling and Genetic Algorithm Based Optimization of Hydraulic Design Related to Seepage under Concrete Gravity Dams on Permeable Soils

Authors: Muqdad Al-Juboori, Bithin Datta

Abstract:

Hydraulic structures such as gravity dams are classified as essential structures, and have the vital role in providing strong and safe water resource management. Three major aspects must be considered to achieve an effective design of such a structure: 1) The building cost, 2) safety, and 3) accurate analysis of seepage characteristics. Due to the complexity and non-linearity relationships of the seepage process, many approximation theories have been developed; however, the application of these theories results in noticeable errors. The analytical solution, which includes the difficult conformal mapping procedure, could be applied for a simple and symmetrical problem only. Therefore, the objectives of this paper are to: 1) develop a surrogate model based on numerical simulated data using SEEPW software to approximately simulate seepage process related to a hydraulic structure, 2) develop and solve a linked simulation-optimization model based on the developed surrogate model to describe the seepage occurring under a concrete gravity dam, in order to obtain optimum and safe design at minimum cost. The result shows that the linked simulation-optimization model provides an efficient and optimum design of concrete gravity dams.

Keywords: artificial neural network, concrete gravity dam, genetic algorithm, seepage analysis

Procedia PDF Downloads 224
13536 Learning Traffic Anomalies from Generative Models on Real-Time Observations

Authors: Fotis I. Giasemis, Alexandros Sopasakis

Abstract:

This study focuses on detecting traffic anomalies using generative models applied to real-time observations. By integrating a Graph Neural Network with an attention-based mechanism within the Spatiotemporal Generative Adversarial Network framework, we enhance the capture of both spatial and temporal dependencies in traffic data. Leveraging minute-by-minute observations from cameras distributed across Gothenburg, our approach provides a more detailed and precise anomaly detection system, effectively capturing the complex topology and dynamics of urban traffic networks.

Keywords: traffic, anomaly detection, GNN, GAN

Procedia PDF Downloads 9
13535 Flood Susceptibility Assessment of Mandaluyong City Using Analytic Hierarchy Process

Authors: Keigh D. Guinto, Ma. Romina M. Santos

Abstract:

One of the most catastrophic natural disasters in the Philippines is floods. Twelve (12) million people reside in Metro Manila, National Capital Region (NCR), prone to flooding. A flood can cause widespread devastation resulting in damaged properties and infrastructures and loss of life. By using the analytical hierarchy process, six (6) parameters were selected, namely elevation, slope, lithology, distance from the river, river network density, and flow accumulation. Ranking of these parameters demonstrates that distance from the river with 25.31% and river density with 17.30% ranked the highest causative factor to flooding. This is followed by flow accumulation with 16.72%, elevation with 15.33%, slope with 13.53%, and the least flood causative factor is lithology with 11.8%. The generated flood susceptibility map of Mandaluyong has three (3) classes: high susceptibility, moderate susceptibility, and low susceptibility. The flood susceptibility map generated in this study can be used as an aid for planning flood mitigation, land use planning, and general public awareness. This study can also be used for emergency management and can be applied in the disaster risk management of Mandaluyong.

Keywords: analytical hierarchy process, assessment, flood, geographic information system

Procedia PDF Downloads 201
13534 Handshake Algorithm for Minimum Spanning Tree Construction

Authors: Nassiri Khalid, El Hibaoui Abdelaaziz et Hajar Moha

Abstract:

In this paper, we introduce and analyse a probabilistic distributed algorithm for a construction of a minimum spanning tree on network. This algorithm is based on the handshake concept. Firstly, each network node is considered as a sub-spanning tree. And at each round of the execution of our algorithm, a sub-spanning trees are merged. The execution continues until all sub-spanning trees are merged into one. We analyze this algorithm by a stochastic process.

Keywords: Spanning tree, Distributed Algorithm, Handshake Algorithm, Matching, Probabilistic Analysis

Procedia PDF Downloads 659
13533 Quality Management in Spice Paprika Production as a Synergy of Internal and External Quality Measures

Authors: É. Kónya, E. Szabó, I. Bata-Vidács, T. Deák, M. Ottucsák, N. Adányi, A. Székács

Abstract:

Spice paprika is a major spice commodity in the European Union (EU), produced locally and imported from non-EU countries, reported not only for chemical and microbiological contamination, but also for fraud. The effective interaction between producers’ quality management practices and government and EU activities is described on the example of spice paprika production and control in Hungary, a country of leading spice paprika producer and per capita consumer in Europe. To demonstrate the importance of various contamination factors in the Hungarian production and EU trade of spice paprika, several aspects concerning food safety of this commodity are presented. Alerts in the Rapid Alert System for Food and Feed (RASFF) of the EU between 2005 and 2013, as well as Hungarian state inspection results on spice paprika in 2004 are discussed, and quality non-compliance claims regarding spice paprika among EU member states are summarized in by means of network analysis. Quality assurance measures established along the spice paprika production technology chain at the leading Hungarian spice paprika manufacturer, Kalocsai Fűszerpaprika Zrt. are surveyed with main critical control points identified. The structure and operation of the Hungarian state food safety inspection system is described. Concerted performance of the latter two quality management systems illustrates the effective interaction between internal (manufacturer) and external (state) quality control measures.

Keywords: spice paprika, quality control, reporting mechanisms, RASFF, vulnerable points, HACCP

Procedia PDF Downloads 287
13532 Prevalence of Enterocytozoon hepatopenaei in Shrimp Cultured in Inland Saline Water

Authors: Naveen Kumar B. T., Anuj Tyagi, Prabjeet Singh, Shanthanagouda A. H., Sumeet Rai

Abstract:

Inland saline water resources are gaining the importance in expanding the aquaculture activities to mitigate the nutritional and food security issues of the world. For profitable and sustainable aquaculture practices, scientific farming, biosecurity measure, and best fish health management should be the integral part of developmental activities. Keeping in line with global awareness and trends, the Indian government has taken an innovative step to conduct disease surveillance and awareness programme for aquatic disease through network project. This ‘National Surveillance Programme for Aquatic Animal Diseases (NSPAAD)’ is being implemented in collaboration of national institutes and state agriculture universities with funding support from National Fisheries Development Board (NFDB), Govt. of India. Guru Angad Dev Veterinary and Animal Sciences University (GADVASU), Ludhiana, an NSPAAD collaborator, has been actively engaged in disease surveillance in the Indian state of Punjab. Shrimp farming in inland saline areas of Punjab is expanding at a tremendous pace under the guidance of GADVASU along with the support of State Fisheries Department. Under this national disease surveillance programme, we reported Enterocytozoon hepatopenaei (EHP) infection in the Litopenaeus vannamei cultured in the inland saline waters. Polymerase chain reaction (PCR) based diagnosis was carried out using the OIE (World Organisation for Animal Health) protocol. It was observed that out of 20 shrimp farms, two farms were 1st step PCR positive and two more farms were nested PCR positive. All the EHP positive ponds had shown the white faeces along with mortalities at very low rate. Therefore, implementation of biosecurity and continuous surveillance and monitoring program for finfish and shellfish aquaculture are in need of the hour to prevent and control the large-scale disease outbreaks and subsequent economic losses.

Keywords: disease, EHP, inland saline water, shrimp culture

Procedia PDF Downloads 262
13531 Reimagining the Management of Telco Supply Chain with Blockchain

Authors: Jeaha Yang, Ahmed Khan, Donna L. Rodela, Mohammed A. Qaudeer

Abstract:

Traditional supply chain silos still exist today due to the difficulty of establishing trust between various partners and technological barriers across industries. Companies lose opportunities and revenue and inadvertently make poor business decisions resulting in further challenges. Blockchain technology can bring a new level of transparency through sharing information with a distributed ledger in a decentralized manner that creates a basis of trust for business. Blockchain is a loosely coupled, hub-style communication network in which trading partners can work indirectly with each other for simpler integration, but they work together through the orchestration of their supply chain operations under a coherent process that is developed jointly. A Blockchain increases efficiencies, lowers costs, and improves interoperability to strengthen and automate the supply chain management process while all partners share the risk. Blockchain ledger is built to track inventory lifecycle for supply chain transparency and keeps a journal of inventory movement for real-time reconciliation. State design patterns are used to capture the life cycle (behavior) of inventory management as a state machine for a common, transparent and coherent process which creates an opportunity for trading partners to become more responsive in terms of changes or improvements in process, reconcile discrepancies, and comply with internal governance and external regulations. It enables end-to-end, inter-company visibility at the unit level for more accurate demand planning with better insight into order fulfillment and replenishment.

Keywords: supply chain management, inventory trace-ability, perpetual inventory system, inventory lifecycle, blockchain, inventory consignment, supply chain transparency, digital thread, demand planning, hyper ledger fabric

Procedia PDF Downloads 90
13530 Fault-Detection and Self-Stabilization Protocol for Wireless Sensor Networks

Authors: Ather Saeed, Arif Khan, Jeffrey Gosper

Abstract:

Sensor devices are prone to errors and sudden node failures, which are difficult to detect in a timely manner when deployed in real-time, hazardous, large-scale harsh environments and in medical emergencies. Therefore, the loss of data can be life-threatening when the sensed phenomenon is not disseminated due to sudden node failure, battery depletion or temporary malfunctioning. We introduce a set of partial differential equations for localizing faults, similar to Green’s and Maxwell’s equations used in Electrostatics and Electromagnetism. We introduce a node organization and clustering scheme for self-stabilizing sensor networks. Green’s theorem is applied to regions where the curve is closed and continuously differentiable to ensure network connectivity. Experimental results show that the proposed GTFD (Green’s Theorem fault-detection and Self-stabilization) protocol not only detects faulty nodes but also accurately generates network stability graphs where urgent intervention is required for dynamically self-stabilizing the network.

Keywords: Green’s Theorem, self-stabilization, fault-localization, RSSI, WSN, clustering

Procedia PDF Downloads 75
13529 Peril´s Environment of Energetic Infrastructure Complex System, Modelling by the Crisis Situation Algorithms

Authors: Jiří F. Urbánek, Alena Oulehlová, Hana Malachová, Jiří J. Urbánek Jr.

Abstract:

Crisis situations investigation and modelling are introduced and made within the complex system of energetic critical infrastructure, operating on peril´s environments. Every crisis situations and perils has an origin in the emergency/ crisis event occurrence and they need critical/ crisis interfaces assessment. Here, the emergency events can be expected - then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping; or it may be unexpected - without pre-prepared scenario of event. But the both need operational coping by means of crisis management as well. The operation, forms, characteristics, behaviour and utilization of crisis management have various qualities, depending on real critical infrastructure organization perils, and prevention training processes. An aim is always - better security and continuity of the organization, which successful obtainment needs to find and investigate critical/ crisis zones and functions in critical infrastructure organization models, operating in pertinent perils environment. Our DYVELOP (Dynamic Vector Logistics of Processes) method is disposables for it. Here, it is necessary to derive and create identification algorithm of critical/ crisis interfaces. The locations of critical/ crisis interfaces are the flags of crisis situation in organization of critical infrastructure models. Then, the model of crisis situation will be displayed at real organization of Czech energetic crisis infrastructure subject in real peril environment. These efficient measures are necessary for the infrastructure protection. They will be derived for peril mitigation, crisis situation coping and for environmentally friendly organization survival, continuity and its sustainable development advanced possibilities.

Keywords: algorithms, energetic infrastructure complex system, modelling, peril´s environment

Procedia PDF Downloads 402
13528 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 238
13527 Planning of Construction Material Flow Using Hybrid Simulation Modeling

Authors: A. M. Naraghi, V. Gonzalez, M. O'Sullivan, C. G. Walker, M. Poshdar, F. Ying, M. Abdelmegid

Abstract:

Discrete Event Simulation (DES) and Agent Based Simulation (ABS) are two simulation approaches that have been proposed to support decision-making in the construction industry. Despite the wide use of these simulation approaches in the construction field, their applications for production and material planning is still limited. This is largely due to the dynamic and complex nature of construction material supply chain systems. Moreover, managing the flow of construction material is not well integrated with site logistics in traditional construction planning methods. This paper presents a hybrid of DES and ABS to simulate on-site and off-site material supply processes. DES is applied to determine the best production scenarios with information of on-site production systems, while ABS is used to optimize the supply chain network. A case study of a construction piling project in New Zealand is presented illustrating the potential benefits of using the proposed hybrid simulation model in construction material flow planning. The hybrid model presented can be used to evaluate the impact of different decisions on construction supply chain management.

Keywords: construction supply-chain management, simulation modeling, decision-support tools, hybrid simulation

Procedia PDF Downloads 207
13526 A Coordinate-Based Heuristic Route Search Algorithm for Delivery Truck Routing Problem

Authors: Ahmed Tarek, Ahmed Alveed

Abstract:

Vehicle routing problem is a well-known re-search avenue in computing. Modern vehicle routing is more focused with the GPS-based coordinate system, as the state-of-the-art vehicle, and trucking systems are equipped with digital navigation. In this paper, a new two dimensional coordinate-based algorithm for addressing the vehicle routing problem for a supply chain network is proposed and explored, and the algorithm is compared with other available, and recently devised heuristics. For the algorithms discussed, which includes the pro-posed coordinate-based search heuristic as well, the advantages and the disadvantages associated with the heuristics are explored. The proposed algorithm is studied from the stand point of a small supermarket chain delivery network that supplies to its stores in four different states around the East Coast area, and is trying to optimize its trucking delivery cost. Minimizing the delivery cost for the supply network of a supermarket chain is important to ensure its business success.

Keywords: coordinate-based optimal routing, Hamiltonian Circuit, heuristic algorithm, traveling salesman problem, vehicle routing problem

Procedia PDF Downloads 148
13525 Usage of Military Continuity Management System for Flooding Solution

Authors: Jiri Palecek, Radmila Hajkova, Alena Oulehlova, Hana Malachova

Abstract:

The increase of emergency incidents and crisis situations requires proactive crisis management of authorities and for its solution. Application business continuity management systems help the crisis management authorities quickly and responsibly react to events and to plan more effectively and efficiently powers and resources. The main goal of this article is describing Military Continuity Management System (MCMS) based on the principles of Business Continuity Management System (BCMS) for dealing with floods in the territory of the selected municipalities. There are explained steps of loading, running and evaluating activities in the software application MCMS. Software MCMS provides complete control over the tasks, contribute a comprehensive and responsible approach solutions to solution floods in the municipality.

Keywords: business continuity management, floods plan, flood activity, level of flood activity

Procedia PDF Downloads 283
13524 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 290