Search results for: provable security
701 Towards Carbon-Free Communities: A Compilation of Urban Design Criteria for Sustainable Neighborhoods
Authors: Atefeh Kalantari
Abstract:
The increase in population and energy consumption has caused environmental crises such as the energy crisis, increased pollution, and climate change, all of which have resulted in a decline in the quality of life, especially in urban environments. Iran is one of the developing countries which faces several challenges concerning energy use and environmental sustainability such as air pollution, climate change, and energy security. On the other hand, due to its favorable geographic characteristics, Iran has diverse and accessible renewable sources, which provide appropriate substitutes to reduce dependence on fossil fuels. Sustainable development programs and post-carbon cities rely on implementing energy policies in different sectors of society, particularly, the built environment sector is one of the main ones responsible for energy consumption and carbon emissions for cities. Because of this, several advancements and programs are being implemented to promote energy efficiency for urban planning, and city experts, like others, are looking for solutions to deal with these problems. Among the solutions provided for this purpose, low-carbon design can be mentioned. Among the different scales, the neighborhood can be mentioned as a suitable scale for applying the principles and solutions of low-carbon urban design; Because the neighborhood as a "building unit of the city" includes elements and flows that all affect the number of CO2 emissions. The article aims to provide criteria for designing a low-carbon and carbon-free neighborhood through descriptive methods and secondary data analysis. The ultimate goal is to promote energy efficiency and create a more resilient and livable environment for local residents.Keywords: climate change, low-carbon urban design, carbon-free neighborhood, resilience
Procedia PDF Downloads 81700 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study
Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke
Abstract:
This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management
Procedia PDF Downloads 40699 Social Crises and Its Impact on the Environment: Case Study of Jos, Plateau State
Authors: A. B. Benshak, M. G. Yilkangnha, V. Y. Nanle
Abstract:
Social crises and violent conflict can inflict direct (short-term) impact on the environment like poisoning water bodies, climate change, deforestation, destroying the chemical component of the soil due to the chemical and biological weapons used. It can also impact the environment indirectly (long-term), e.g., the destruction of political and economic infrastructure to manage the environmental resources and breaking down traditional conservation practices, population displacement and refugee flows which puts pressure on the already inadequate resources, infrastructure, facilities, amenities, services etc. This study therefore examines the impact of social crises on the environment in Jos Plateau State with emphasis on the long-term impact, analyze the relationship between crises and the environment and assess the perception of people on social crises because much work have concentrated on other repercussions such as the economy, health etc that are more politically expedient. The data for this research were collected mostly through interviews, questionnaire, dailies and reports on the subject matter. The data and findings were presented in tables and results showed that the environment is directly and indirectly impacted by crises and that these impacts can in turn result to a continuous cycle of violent activities if not addressed because of the inadequacies in the supply of infrastructural facilities, resources and so on caused by the inflow of displaced population. Recommendations were made on providing security to minimize conflict occurrences in Jos and its environs, minimizing the impact of social crises on the environment, provision of adequate infrastructural facilities to carter for population rise, renewal and regeneration schemes, etc. which will go a long way in mitigating the impact of crises on the environment.Keywords: environment, impact, long-term, social crises
Procedia PDF Downloads 342698 Understanding the Endogenous Impact of Tropical Cyclones Floods and Sustainable Landscape Management Innovations on Farm Productivity in Malawi
Authors: Innocent Pangapanga, Eric Mungatana
Abstract:
Tropical cyclones–related floods (TCRFs) in Malawi have devastating effects on smallholder agriculture, thereby threatening the food security agenda, which is already constrained by poor agricultural innovations, low use of improved varieties, and unaffordable inorganic fertilizers, and fragmenting landholding sizes. Accordingly, households have engineered and indigenously implemented sustainable landscape management (SLM) innovations to contain the adverse effects of TCRFs on farm productivity. This study, therefore, interrogated the efficacy of SLM adoption on farm productivity under varying TCRFs, while controlling for the potential selection bias and unobservable heterogeneity through the application of the Endogenous Switching Regression Model. In this study, we further investigated factors driving SLM adoption. Substantively, we found TCRFs reducing farm productivity by 31 percent, on the one hand, and influencing the adoption of SLM innovations by 27 percent, on the other hand. The study also observed that households that interacted SLM with TCRFs were more likely to enhance farm productivity by 24 percent than their counterparts. Interestingly, the study results further demonstrated that multiple adoptions of SLM-related innovations, including intercropping, agroforestry, and organic manure, enhanced farm productivity by 126 percent, suggesting promoting SLM adoption as a package to appropriately inform existing sustainable development goals’ agricultural productivity initiatives under intensifying TCRFs in the country.Keywords: tropical cyclones–related floods, sustainable landscape management innovations, farm productivity, endogeneity, endogenous switching regression model, panel data, smallholder agriculture
Procedia PDF Downloads 116697 Error Detection and Correction for Onboard Satellite Computers Using Hamming Code
Authors: Rafsan Al Mamun, Md. Motaharul Islam, Rabana Tajrin, Nabiha Noor, Shafinaz Qader
Abstract:
In an attempt to enrich the lives of billions of people by providing proper information, security and a way of communicating with others, the need for efficient and improved satellites is constantly growing. Thus, there is an increasing demand for better error detection and correction (EDAC) schemes, which are capable of protecting the data onboard the satellites. The paper is aimed towards detecting and correcting such errors using a special algorithm called the Hamming Code, which uses the concept of parity and parity bits to prevent single-bit errors onboard a satellite in Low Earth Orbit. This paper focuses on the study of Low Earth Orbit satellites and the process of generating the Hamming Code matrix to be used for EDAC using computer programs. The most effective version of Hamming Code generated was the Hamming (16, 11, 4) version using MATLAB, and the paper compares this particular scheme with other EDAC mechanisms, including other versions of Hamming Codes and Cyclic Redundancy Check (CRC), and the limitations of this scheme. This particular version of the Hamming Code guarantees single-bit error corrections as well as double-bit error detections. Furthermore, this version of Hamming Code has proved to be fast with a checking time of 5.669 nanoseconds, that has a relatively higher code rate and lower bit overhead compared to the other versions and can detect a greater percentage of errors per length of code than other EDAC schemes with similar capabilities. In conclusion, with the proper implementation of the system, it is quite possible to ensure a relatively uncorrupted satellite storage system.Keywords: bit-flips, Hamming code, low earth orbit, parity bits, satellite, single error upset
Procedia PDF Downloads 130696 Legal Contestation of Non-Legal Norms: The Case of Humanitarian Intervention Norm between 1999 and 2018
Authors: Nazli Ustunes Demirhan
Abstract:
Norms of any nature are subject to pressures of change throughout their lifespans, as they are interpreted and re-interpreted every time they are used rhetorically or practically by international actors. The inevitable contestation of different interpretations may lead to an erosion of the norm, as well as to its strengthening. This paper aims to question the role of formal legality on the change of norm strength, using a norm contestation framework and a multidimensional norm strength conceptualization. It argues that the role of legality is not necessarily linked to the formal legal characteristics of a norm, but is about the legality of the contestation processes. In order to demonstrate this argument, the paper examines the evolutionary path of the humanitarian intervention norm as a case study. Humanitarian intervention, as a norm of very low formal legal characteristics, has been subject to numerous cycles of contestation, demonstrating a fluctuating pattern of norm strength. With the purpose of examining the existence and role of legality in the selected contestation periods from 1999 to 2017, this paper uses process tracing method with a detailed document analysis on the Security Council documents; including decisions, resolutions, meeting minutes, press releases as well as individual country statements. Through the empirical analysis, it is demonstrated that the legality of the contestation processes has a positive effect at least on the authoritativeness dimension of norm strength. This study tries to contribute to the developing dialogue between international relations (IR) and internal law (IL) disciplines with its better-tuned understanding of legality. It connects to further questions in IR/IL nexus, relating to the value added of norm legality, and politics of legalization as well as better international policies for norm reinforcement.Keywords: humanitarian intervention, legality, norm contestation, norm dynamics, responsibility to protect
Procedia PDF Downloads 152695 Identification Algorithm of Critical Interface, Modelling Perils on Critical Infrastructure Subjects
Authors: Jiří. J. Urbánek, Hana Malachová, Josef Krahulec, Jitka Johanidisová
Abstract:
The paper deals with crisis situations investigation and modelling within the organizations of critical infrastructure. Every crisis situation has an origin in the emergency event occurrence in the organizations of energetic critical infrastructure especially. Here, the emergency events can be both the expected events, then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping or the unexpected event (Black Swan effect) – without pre-prepared scenario, but it needs operational coping of crisis situations as well. The forms, characteristics, behaviour and utilization of crisis scenarios have various qualities, depending on real critical infrastructure organization prevention and training processes. An aim is always better organizational security and continuity obtainment. This paper objective is to find and investigate critical/ crisis zones and functions in critical situations models of critical infrastructure organization. The DYVELOP (Dynamic Vector Logistics of Processes) method is able to identify problematic critical zones and functions, displaying critical interfaces among actors of crisis situations on the DYVELOP maps named Blazons. Firstly, for realization of this ability is necessary to derive and create identification algorithm of critical interfaces. The locations of critical interfaces are the flags of crisis situation in real organization of critical infrastructure. Conclusive, the model of critical interface will be displayed at real organization of Czech energetic crisis infrastructure subject in Black Out peril environment. The Blazons need live power Point presentation for better comprehension of this paper mission.Keywords: algorithm, crisis, DYVELOP, infrastructure
Procedia PDF Downloads 409694 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 41693 Quantification of Effect of Linear Anionic Polyacrylamide on Seepage in Irrigation Channels
Authors: Hamil Uribe, Cristian Arancibia
Abstract:
In Chile, the water for irrigation and hydropower generation is delivery essentially through unlined channels on earth, which have high seepage losses. Traditional seepage-abatement technologies are very expensive. The goals of this work were to quantify water loss in unlined channels and select reaches to evaluate the use of linear anionic polyacrylamide (LA-PAM) to reduce seepage losses. The study was carried out in Maule Region, central area of Chile. Water users indicated reaches with potential seepage losses, 45 km of channels in total, whose flow varied between 1.07 and 23.6 m³ s⁻¹. According to seepage measurements, 4 reaches of channels, 4.5 km in total, were selected for LA-PAM application. One to 4 LA-PAM applications were performed at rates of 11 kg ha⁻¹, considering wet perimeter area as basis of calculation. Large channels were used to allow motorboat moving against the current to carry-out LA-PAM application. For applications, a seeder machine was used to evenly distribute granulated polymer on water surface. Water flow was measured (StreamPro ADCP) upstream and downstream in selected reaches, to estimate seepage losses before and after LA-PAM application. Weekly measurements were made to quantify treatment effect and duration. In each case, water turbidity and temperature were measured. Channels showed variable losses up to 13.5%. Channels showing water gains were not treated with PAM. In all cases, LA-PAM effect was positive, achieving average loss reductions of 8% to 3.1%. Water loss was confirmed and it was possible to reduce seepage through LA-PAM applications provided that losses were known and correctly determined when applying the polymer. This could allow increasing irrigation security in critical periods, especially under drought conditions.Keywords: canal seepage, irrigation, polyacrylamide, water management
Procedia PDF Downloads 174692 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps
Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li
Abstract:
With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.Keywords: mobile computing, deep learning apps, sensitive information, static analysis
Procedia PDF Downloads 179691 Predictive Analytics in Oil and Gas Industry
Authors: Suchitra Chnadrashekhar
Abstract:
Earlier looked as a support function in an organization information technology has now become a critical utility to manage their daily operations. Organizations are processing huge amount of data which was unimaginable few decades before. This has opened the opportunity for IT sector to help industries across domains to handle the data in the most intelligent manner. Presence of IT has been a leverage for the Oil & Gas industry to store, manage and process the data in most efficient way possible thus deriving the economic value in their day-to-day operations. Proper synchronization between Operational data system and Information Technology system is the need of the hour. Predictive analytics supports oil and gas companies by addressing the challenge of critical equipment performance, life cycle, integrity, security, and increase their utilization. Predictive analytics go beyond early warning by providing insights into the roots of problems. To reach their full potential, oil and gas companies need to take a holistic or systems approach towards asset optimization and thus have the functional information at all levels of the organization in order to make the right decisions. This paper discusses how the use of predictive analysis in oil and gas industry is redefining the dynamics of this sector. Also, the paper will be supported by real time data and evaluation of the data for a given oil production asset on an application tool, SAS. The reason for using SAS as an application for our analysis is that SAS provides an analytics-based framework to improve uptimes, performance and availability of crucial assets while reducing the amount of unscheduled maintenance, thus minimizing maintenance-related costs and operation disruptions. With state-of-the-art analytics and reporting, we can predict maintenance problems before they happen and determine root causes in order to update processes for future prevention.Keywords: hydrocarbon, information technology, SAS, predictive analytics
Procedia PDF Downloads 360690 Climate Change and Sustainable Development among Agricultural Communities in Tanzania; An Analysis of Southern Highland Rural Communities
Authors: Paschal Arsein Mugabe
Abstract:
This paper examines sustainable development planning in the context of environmental concerns in rural areas of the Tanzania. It challenges mainstream approaches to development, focusing instead upon transformative action for environmental justice. The goal is to help shape future sustainable development agendas in local government, international agencies and civil society organisations. Research methods: The approach of the study is geographical, but also involves various Trans-disciplinary elements, particularly from development studies, sociology and anthropology, management, geography, agriculture and environmental science. The research methods included thematic and questionnaire interviews, participatory tools such as focus group discussion, participatory research appraisal and expert interviews for primary data. Secondary data were gathered through the analysis of land use/cover data and official documents on climate, agriculture, marketing and health. Also several earlier studies that were made in the area provided an important reference base. Findings: The findings show that, agricultural sustainability in Tanzania appears likely to deteriorate as a consequence of climate change. Noteworthy differences in impacts across households are also present both by district and by income category. Also food security cannot be explained by climate as the only influencing factor. A combination of economic, political and socio-cultural context of the community are crucial. Conclusively, it is worthy knowing that people understand their relationship between climate change and their livelihood.Keywords: agriculture, climate change, environment, sustainable development
Procedia PDF Downloads 325689 Triticum Aestivum Yield Enhanced with Irrigation Scheduling Strategy under Salinity
Authors: Taramani Yadav, Gajender Kumar, R. K. Yadav, H. S. Jat
Abstract:
Soil Salinity and irrigation water salinity is critical threat to enhance agricultural food production to full fill the demand of billion plus people worldwide. Salt affected soils covers 6.73 Mha in India and ~1000 Mha area around the world. Irrigation scheduling of saline water is the way to ensure food security in salt affected areas. Research experiment was conducted at ICAR-Central Soil Salinity Research Institute, Experimental Farm, Nain, Haryana, India with 36 treatment combinations in double split plot design. Three sets of treatments consisted of (i) three regimes of irrigation viz., 60, 80 and 100% (I1, I2 and I3, respectively) of crop ETc (crop evapotranspiration at identified respective stages) in main plot; (ii) four levels of irrigation water salinity (sub plot treatments) viz., 2, 4, 8 and 12 dS m-1 (iii) applications of two PBRs along with control (without PBRs) i.e. salicylic acid (G1; 1 mM) and thiourea (G2; 500 ppm) as sub-sub plot treatments. Grain yield of wheat (Triticum aestivum) was increased with less amount of high salt loaded irrigation water at the same level of salinity (2 dS m-1), the trend was I3>I2>I1 at 2 dS m-1 with 8.10 and 17.07% increase at 80 and 100% ETc, respectively compared to 60% ETc. But contrary results were obtained by increasing amount of irrigation water at same level of highest salinity (12 dS m-1) showing following trend; I1>I2>I3 at 12 dS m-1 with 9.35 and 12.26% increase at 80 and 60% ETc compared to 100% ETc. Enhancement in grain yield of wheat (Triticum aestivum) is not need to increase amount of irrigation water under saline condition, with salty irrigation water less amount of irrigation water gave the maximum wheat (Triticum aestivum) grain yield.Keywords: Irrigation Scheduling, Saline Environment, Triticum aestivum, Yield
Procedia PDF Downloads 144688 Smart Campus Digital Twin: Basic Framework - Current State, Trends and Challenges
Authors: Enido Fabiano de Ramos, Ieda Kanashiro Makiya, Francisco I. Giocondo Cesar
Abstract:
This study presents an analysis of the Digital Twin concept applied to the academic environment, focusing on the development of a Digital Twin Smart Campus Framework. Using bibliometric analysis methodologies and literature review, the research investigates the evolution and applications of the Digital Twin in educational contexts, comparing these findings with the advances of Industry 4.0. It was identified gaps in the existing literature and highlighted the need to adapt Digital Twin principles to meet the specific demands of a smart campus. By integrating Industry 4.0 concepts such as automation, Internet of Things, and real-time data analytics, we propose an innovative framework for the successful implementation of the Digital Twin in academic settings. The results of this study provide valuable insights for university campus managers, allowing for a better understanding of the potential applications of the Digital Twin for operations, security, and user experience optimization. In addition, our framework offers practical guidance for transitioning from a digital campus to a digital twin smart campus, promoting innovation and efficiency in the educational environment. This work contributes to the growing literature on Digital Twins and Industry 4.0, while offering a specific and tailored approach to transforming university campuses into smart and connected spaces, high demanded by Society 5.0 trends. It is hoped that this framework will serve as a basis for future research and practical implementations in the field of higher education and educational technology.Keywords: smart campus, digital twin, industry 4.0, education trends, society 5.0
Procedia PDF Downloads 59687 The Exploration of Persuasive Skills and Participants Characteristics in Pyramid-Sale: A Qualitative Study
Authors: Xing Yan Fan, Xing Lin Xu, Man Yuan Chen, Pei Tzu Lee, Yu Ting Wang, Yi Xiao Cao, Rui Yao
Abstract:
Pyramid sales have been a widespread issue in China. Victims who are defrauded not only lose money but damage interpersonal relationship. A deeper understanding of pyramid-sale models can be beneficial to prevent potential victims from fraud and improve the property security. The goals of this study were to detect psychological characteristics of pyramid-sale sellers, and analyse persuasive skills in pyramid organizations. A qualitative study was conducted in this study. Participants (n=6) recruited by 'snowball' sampling from present pyramid-sale sellers (n=3) and imprisoned pyramid-sale sellers (n=3). All participants accepted semi-structured interview for collecting data. Content analysis was adopted for data coding and analysis. The results indicate that pyramid organizations are used to utilize their appearance packaging and celebrity effect to strengthen the positions in participants’ mind. The status gap between pyramid-sale sellers in same organization, as well as rewards to increase reputation, are used to motivate participants in pyramid. The most significant common characteristics among all participants are that they tend to possess a high sense of belongingness within the firm. Moreover, the expression of pyramid-sale sellers on gambling mentality is expected to growth as constantly losing money. Findings suggest that the psychological characteristics of pyramid-sale sellers in accordance with Maslow’s hierarchy of needs, persuasive skills of pyramid organization confront to 'attitude-behaviour change model'. These findings have implication on 'immune education' that providing guidance for victims out of stuck and protecting ordinary people from the jeopardizing of pyramid sales.Keywords: pyramid sales, characteristics, persuasive skills, qualitative study
Procedia PDF Downloads 255686 Object Recognition System Operating from Different Type Vehicles Using Raspberry and OpenCV
Authors: Maria Pavlova
Abstract:
In our days, it is possible to put the camera on different vehicles like quadcopter, train, airplane and etc. The camera also can be the input sensor in many different systems. That means the object recognition like non separate part of monitoring control can be key part of the most intelligent systems. The aim of this paper is to focus of the object recognition process during vehicles movement. During the vehicle’s movement the camera takes pictures from the environment without storage in Data Base. In case the camera detects a special object (for example human or animal), the system saves the picture and sends it to the work station in real time. This functionality will be very useful in emergency or security situations where is necessary to find a specific object. In another application, the camera can be mounted on crossroad where do not have many people and if one or more persons come on the road, the traffic lights became the green and they can cross the road. In this papers is presented the system has solved the aforementioned problems. It is presented architecture of the object recognition system includes the camera, Raspberry platform, GPS system, neural network, software and Data Base. The camera in the system takes the pictures. The object recognition is done in real time using the OpenCV library and Raspberry microcontroller. An additional feature of this library is the ability to display the GPS coordinates of the captured objects position. The results from this processes will be sent to remote station. So, in this case, we can know the location of the specific object. By neural network, we can learn the module to solve the problems using incoming data and to be part in bigger intelligent system. The present paper focuses on the design and integration of the image recognition like a part of smart systems.Keywords: camera, object recognition, OpenCV, Raspberry
Procedia PDF Downloads 218685 Code Embedding for Software Vulnerability Discovery Based on Semantic Information
Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson
Abstract:
Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.Keywords: code representation, deep learning, source code semantics, vulnerability discovery
Procedia PDF Downloads 158684 The Professional Rehabilitation of Workers Affected by Chronic Low Back Pain in 'Baixada Santista' Region, Brazil
Authors: Maria Do Carmo Baracho De Alencar
Abstract:
Back pain is considered a worldwide public health problem and has led to numerous work-related absence from work and public spending on rehabilitation, as well as difficulties in the process of professional rehabilitation and return to work. Also, the rehabilitation of workers is one of the great challenges today and for the field of Workers' Health in Brazil. Aim: To investigate the procedures related to the professional rehabilitation of insured workers affected by chronic low back pain, based on the perceptions of professional counselors. Methods: A list of related professional counselors was obtained from the Professional Rehabilitation Coordination of the Baixada Santista (SP) region, and from the Social Security National Institute of Brazil, and in which cities they worked. Semistructured and individual interview was scheduled, based on a pre-elaborated script, containing questions about procedures, experiences at work and feelings. The interviews were recorded and transcribed in full for content analysis. Results: Ten (10) professional counselors of both genders and from nine (9) cities from the Baixada Santista region participated in the study. Aged between 31 and 64 years, and time in service between 4 and 38 years. Only one of the professionals was graduaded in Psychology. Among the testimonies emerged the high demand of work, the lack of interest of companies, medical authority, the social helplessness after rehabilitation process, difficulty in assessing invisible pain, and suffering, anguish, and frustration at work, between others. Conclusion: The study contributes to reflections about the importance of interdisciplinary actions and the Psychology in the processes of professional rehabilitation and readaptation in the process of return to work.Keywords: low back pain, rehabilitation, work, occupational health
Procedia PDF Downloads 133683 AgriInnoConnect Pro System Using Iot and Firebase Console
Authors: Amit Barde, Dipali Khatave, Vaishali Savale, Atharva Chavan, Sapna Wagaj, Aditya Jilla
Abstract:
AgriInnoConnect Pro is an advanced agricultural automation system designed to enhance irrigation efficiency and overall farm management through IoT technology. Using MIT App Inventor, Telegram, Arduino IDE, and Firebase Console, it provides a user-friendly interface for farmers. Key hardware includes soil moisture sensors, DHT11 sensors, a 12V motor, a solenoid valve, a stepdown transformer, Smart Fencing, and AC switches. The system operates in automatic and manual modes. In automatic mode, the ESP32 microcontroller monitors soil moisture and autonomously controls irrigation to optimize water usage. In manual mode, users can control the irrigation motor via a mobile app. Telegram bots enable remote operation of the solenoid valve and electric fencing, enhancing farm security. Additionally, the system upgrades conventional devices to smart ones using AC switches, broadening automation capabilities. AgriInnoConnect Pro aims to improve farm productivity and resource management, addressing the critical need for sustainable water conservation and providing a comprehensive solution for modern farm management. The integration of smart technologies in AgriInnoConnect Pro ensures precision farming practices, promoting efficient resource allocation and sustainable agricultural development.Keywords: agricultural automation, IoT, soil moisture sensor, ESP32, MIT app inventor, telegram bot, smart farming, remote control, firebase console
Procedia PDF Downloads 43682 Major Constraints to Adoption of Improved Post-harvest Technologies among Smallholder Farmers in Developing Countries: A Systematic Review
Authors: Muganyizi Jonas Bisheko, G. Rejikumar
Abstract:
Reducing post-harvest losses could be a sustainable solution to enhance the food and income security of smallholder farmers in developing countries. While various research institutions have come up with a number of innovative post-harvest technologies for reducing post-harvest losses, most of them have not been extensively adopted by smallholder farmers. Despite this gap, the synthesized information about the major constraints of post-harvest technology is scarce. This study has been conducted to fill this gap and show the implications of the findings for future post-harvest research. The developed search strategy retrieved 2201 studies. However, after excluding duplicates, title, abstract and full article screening, a total of 41 documents were identified. The major findings are: (i) there is an outstanding deficiency of systematic evidence of the effect of climate change, off-farm income and sources of post-harvest information on the adoption of improved post-harvest technologies; (ii) there is very limited information on adoption constraints pertaining to matters of policy, rules and regulations; (iii) there is very thin literature on behavioral constraints associated with limited adoption of improved post-harvest technologies; (iv) most of the studies focused on post-harvest storage technologies (47%) followed by overall post-harvest management practices (25%), processing technologies (19%) and packaging technologies (3%). Much of the information was found on Cereals (58%), especially maize (44%); (v) geographically, Sub-Saharan Africa accounted for 79% of the reviewed interventions, while South Asia occupied only 21%. The findings of this review are intended to guide various post-harvest technologists and decision-makers in addressing the challenge of huge post-harvest losses.Keywords: constraints, post-harvest loss, post-harvest technology , smallholder farmer
Procedia PDF Downloads 235681 Rethink Urban Resilience: An Introductory Study Towards Resilient Spatial Structure of Refugees Neighborhoods
Authors: Salwa Mohammad Alawneh
Abstract:
The ongoing humanitarian crises spur rapid and unpredicted refugee influxes resulting in demographic changes in cities. Regarding different urban systems are vulnerable in refugee neighborhoods. With the consequent social, economic, and spatial challenges, cities must respond with a more durable and sustainable approach based on urban resilience. The paper systematically approaches urban resilience to contribute to refugee spaces by reflecting on the overall urban systems of their neighborhoods. The research will review the urban resilience literature to develop an evaluation framework. The developed framework applies urban resilience more holistically in refugee neighborhoods and expands to the urban systems of social, economic, and spatial. However, the main highlight of this paper is the resilient spatial structure in refugee neighborhoods to face the internal and complex stress of refugee waves and their demographic changes. Finding a set of resilient spatial measurements and focusing on urban forms at a neighborhood scale provide vulnerability reduction and enhance adaptation capacity. As a model example, the paper applies these measurements and facilitates geospatial technologies to one of the refugee neighborhoods in Amman, Jordan, namely Al-Jubilee. The application in Al-Jubilee helps to demonstrate a road map towards a developmental pattern in design and planning by different decision-makers of inter-governmental and humanitarian organizations. In this regard, urban resilience improves the humanitarian assistantship of refugee settings beyond providing the essential needs. In conclusion, urban resilience responds to the different challenges of refugee neighborhoods by supporting urban stability, improving livability, and maintaining both urban functions and security.Keywords: urban resilience of refugee, resilient urban form, refugee neighborhoods, humanitarian assistantship, refugee in Jordan
Procedia PDF Downloads 160680 Distinctive Features of Legal Relations in the Area of Subsoil Use, Renewal and Protection in Ukraine
Authors: N. Maksimentseva
Abstract:
The issue of public administration in subsoil use, renewal and protection is of high importance for Ukraine since it is strongly linked to energy security of the state as well as it shall facilitate the people of Ukraine to efficiently implement its propitiatory rights towards natural resources and redistribution of national wealth. As it is stipulated in the Article 11 of the Subsoil Code of Ukraine (the Code) the authorities that administer the industry are limited to central executive bodies and local governments. In particular, it is stipulated in the Code that the Ukraine’s Cabinet of Ministers carries out public administration in geological exploration, production and protection of subsoil. Other state bodies of public administration include central public authority responsible for state environmental protection policies; central public authority in charge of implementation of state geological exploration and efficient subsoil use policies; central authority in charge of state health and safety control policies. There are also public authorities in the Autonomous Republic of Crimea; local executive bodies and other state authorities and local self-government authorities in compliance with laws of Ukraine. This article is devoted to the analysis of the legal relations in the area of public administration of subsoil use, renewal and protection in Ukraine. The main approaches to study the essence of legal relations in the named area as well as its tasks, functions and methods are analyzed. It is concluded in this article that legal relationship in the field of public administration of subsoil use, renewal and protection is characterized by specifics of its task (development of natural resources).Keywords: legal relations, public administration, subsoil code of Ukraine, subsoil use, renewal and protection
Procedia PDF Downloads 355679 Implementation of a Monostatic Microwave Imaging System using a UWB Vivaldi Antenna
Authors: Babatunde Olatujoye, Binbin Yang
Abstract:
Microwave imaging is a portable, noninvasive, and non-ionizing imaging technique that employs low-power microwave signals to reveal objects in the microwave frequency range. This technique has immense potential for adoption in commercial and scientific applications such as security scanning, material characterization, and nondestructive testing. This work presents a monostatic microwave imaging setup using an Ultra-Wideband (UWB), low-cost, miniaturized Vivaldi antenna with a bandwidth of 1 – 6 GHz. The backscattered signals (S-parameters) of the Vivaldi antenna used for scanning targets were measured in the lab using a VNA. An automated two-dimensional (2-D) scanner was employed for the 2-D movement of the transceiver to collect the measured scattering data from different positions. The targets consist of four metallic objects, each with a distinct shape. Similar setup was also simulated in Ansys HFSS. A high-resolution Back Propagation Algorithm (BPA) was applied to both the simulated and experimental backscattered signals. The BPA utilizes the phase and amplitude information recorded over a two-dimensional aperture of 50 cm × 50 cm with a discreet step size of 2 cm to reconstruct a focused image of the targets. The adoption of BPA was demonstrated by coherently resolving and reconstructing reflection signals from conventional time-of-flight profiles. For both the simulation and experimental data, BPA accurately reconstructed a high resolution 2D image of the targets in terms of shape and location. An improvement of the BPA, in terms of target resolution, was achieved by applying the filtering method in frequency domain.Keywords: back propagation, microwave imaging, monostatic, vivialdi antenna, ultra wideband
Procedia PDF Downloads 19678 Child Feeding Practices of Mothers (Childbearing) and Exploration of Their Household Food Insecurity in a Coastal Region of Bangladesh
Authors: Md Abdullah Al Mamun
Abstract:
Background: The current situation of Ensuring WHO recommended feeding practices for infant and young children which is becoming a challenge nowadays in many developing countries, especially in areas where household food security is at risk. Because many households of the developing countries often encounter severe food insecurity hence provision of adequate child nutrition is threatened. Aim: The study aimed to assess the child feeding practices of 0-24 months childbearing mothers and explore their household food insecurity in a coastal region of Bangladesh. Methods: This study was conducted in Suborno Char (one of the coastal suburbs in Noakhali District in Bangladesh) from October 2019 to April 2020. A total of 400 mothers were selected with their children of 0-24 months following a cross sectional study sampling procedure of the population. Data were collected through a standard questionnaire and analyzed using statistical tests in SPSS version 20.0.0. Results: The frequency of exclusive breastfeeding, timely initiation of complementary feeding, and giving foods from four food groups to the children were 53.5%, 75.5%, and 22.2%, respectively. Mother's level of education showed a strong association with the child feeding practices of the mothers. Mothers of severely food insecure households showed lower odds in exclusive breastfeeding practice (COR 0.233 at 95% CI 0.083, 0.655; and AOR 0.478 at 95% CI 0.133, 1.713) than mothers of food secured households. Similar results have also been found in case of timely initiation of complementary feeding and minimum dietary diversity of the children.Keywords: household food insecurity, exclusive breastfeeding, complementary feeding, maternal education, mothers age, household income
Procedia PDF Downloads 159677 The Effect of Female Access to Healthcare and Educational Attainment on Nigerian Agricultural Productivity Level
Authors: Esther M. Folarin, Evans Osabuohien, Ademola Onabote
Abstract:
Agriculture constitutes an important part of development and poverty mitigation in lower-middle-income countries, like Nigeria. The level of agricultural productivity in the Nigerian economy in line with the level of demand necessary to meet the desired expectation of the Nigerian populace is threatening to meeting the standard of the United Nations (UN) Sustainable Development Goals (SDGs); This includes the SDG-2 (achieve food security through agricultural productivity). The overall objective of the study is to reveal the performance of the interaction variable in the model among other factors that help in the achievement of greater Nigerian agricultural productivity. The study makes use of Wave 4 (2018/2019) of the Living Standard Measurement Studies, Integrated Survey on Agriculture (LSMS-ISA). Qualitative analysis of the information was also used to provide complimentary answers to the quantitative analysis done in the study. The study employed human capital theory and Grossman’s theory of health Demand in explaining the relationships that exist between the variables within the model of the study. The study engages the Instrumental Variable Regression technique in achieving the broad objectives among other techniques for the other specific objectives. The estimation results show that there exists a positive relationship between female healthcare and the level of female agricultural productivity in Nigeria. In conclusion, the study emphasises the need for more provision and empowerment for greater female access to healthcare and educational attainment levels that aids higher female agricultural productivity and consequently an improvement in the total agricultural productivity of the Nigerian economy.Keywords: agricultural productivity, education, female, healthcare, investment
Procedia PDF Downloads 81676 Assessment of Bio-Control Quality of Ethanolic Extracts of Some Tropical Plants on Fruit Rot Pathogens of Pineapple Fruits in Ado Ekiti
Authors: J. Y. Ijato, A. Adewumi, H. O Yakubu, O. O. Olajide, B. O. Ojo, B. A. Adanikin
Abstract:
Post-harvest fruit rot pathogens are one of the major factors that are responsible for food security challenges in developing countries like Nigeria. These pathogens also cause fruit food poisoning. Biocidal effects of ethanolic extracts of Khaya grandifoliola, Hyptis suaveolens, Zingiber officinale, Calophyllum inophyllum, Datura stramonium on the mycelia growth of fungal rot pathogens of pineapple fruit was investigated, the ethanolic extracts of these test plants exhibited high significant inhibitory effects on the rot pathogens, the highest ethanolic extract inhibition of Zingiber officinale was on Aspergillus flavus (38.40%) at 1.0g/ml while the least inhibitory effect was on Aspergillus fumigatus (23.10%) at 1.0g/ml, the highest ethanol extract inhibition of Datura stramonium was on Aspergillus tubingensis (24.00%) at 1.0g/ml while the least inhibitory effect was 10.00% on Colletotrichum fruticola at 1.0g/ml, the highest ethanol extract inhibition of Calophyllum inophyllum was on Trichoderma harzianum (18.50%) at 1.0g/ml while the least inhibitory effect was on Aspergillus flavus (15.00%) at 1.0g/ml, the highest ethanol extract inhibition of Hyptis suaveolens was on Aspergillus fumigatus (35.00%) at 1.0g/ml while the least inhibitory effect was on Aspergillus niger (20.00%) at 1.0g/ml, the highest ethanol extract inhibition of Khaya grandifoliola was on Aspergillus flavus (35.00%) at 1.00g/ml while the least inhibitory effect was on Aspergillus fumigates (22.00%) at 1.0g/ml, the antifungal capacity of these test plant extracts on rot causing fungi on pineapple fruit reveals the possibility of their use by farmers and fruit traders as alternative to chemical fungicide that portends great threat to human and environmental health.Keywords: fruit rot, pathogens, plant extracts, pineapple, food poisoning
Procedia PDF Downloads 110675 A Preliminary Exploration of the German Federal Government's Energy Crisis from the Processes of Decision Entrapment Behavior: The Case of the Nord Stream 1 and 2 Shutdowns
Authors: Chia Han Lee
Abstract:
Without energy, the economy would grind to a halt. Germany's prosperity and security depend on a reliable and affordable energy supply. In recent years, Germany's energy policy has undergone major changes. Due to the sharp turn in energy, Germany cannot extend the service of nuclear power plants and can only find a rapid transition energy source: natural gas for a limited time. This study attempts to use processes of decision entrapment behavior and document analysis to explain research questions. Through primary and secondary information such as official reports, parliamentary minutes, media interview records, and speech records, the author sorted out the important events experienced by the three coalition governments (Gerhard Schröder, Angela Merkel, and Olaf Scholz) and the relationship between Nord Stream 1 and Nord Stream 2 with primary and secondary sources. Also, compare it with the processes of decision entrapment behavior, which designed in this study, and divide it into four stages to explore its key elements one by one. In this regard, the following conclusions are drawn: First, from the perspective of processes of decision entrapment behavior, Merkel’s government firmly believes that she can overcome difficulties because of her past experience in crisis management capabilities. However, the outbreak of war between Ukraine and Russia was beyond Merkel's planning. Second, in the face of the crisis, the Scholz’s government increased the import of natural gas from other countries and began to import liquefied natural gas to make up for the energy gap of Russian natural gas.Keywords: german research, nord stream gas pipeline, energy policy, processes of decision entrapment behavior
Procedia PDF Downloads 38674 Failure of Agriculture Soil following the Passage of Tractors
Authors: Anis Eloud, Sayed Chehaibi
Abstract:
Compaction of agricultural soils as a result of the passage of heavy machinery on the fields is a problem that affects many agronomists and farmers since it results in a loss of yield of most crops. To remedy this, and raise the overall future of the food security challenge, we must study and understand the process of soil degradation. The present review is devoted to understanding the effect of repeated passages on agricultural land. The experiments were performed on a plot of the area of the ESIER, characterized by a clay texture in order to quantify the soil compaction caused by the wheels of the tractor during repeated passages on agricultural land. The test tractor CASE type puissance 110 hp and 5470 kg total mass of 3500 kg including the two rear axles and 1970 kg on the front axle. The state of soil compaction has been characterized by measuring its resistance to penetration by means of a penetrometer and direct manual reading, the density and permeability of the soil. Soil moisture was taken jointly. The measurements are made in the initial state before passing the tractor and after each pass varies from 1 to 7 on the track wheel inflated to 1.5 bar for the rear wheel and broke water to the level of valve and 4 bar for the front wheels. The passages are spaced to the average of one week. The results show that the passage of wheels on a farm tilled soil leads to compaction and the latter increases with the number of passages, especially for the upper 15 cm depth horizons. The first passage is characterized by the greatest effect. However, the effect of other passages do not follow a definite law for the complex behavior of granular media and the history of labor and the constraints it suffers from its formation.Keywords: wheel traffic, tractor, soil compaction, wheel
Procedia PDF Downloads 482673 Impure CO₂ Solubility Trapping in Deep Saline Aquifers: Role of Operating Conditions
Authors: Seyed Mostafa Jafari Raad, Hassan Hassanzadeh
Abstract:
Injection of impurities along with CO₂ into saline aquifers provides an exceptional prospect for low-cost carbon capture and storage technologies and can potentially accelerate large-scale implementation of geological storage of CO₂. We have conducted linear stability analyses and numerical simulations to investigate the effects of permitted impurities in CO₂ streams on the onset of natural convection and dynamics of subsequent convective mixing. We have shown that the rate of dissolution of an impure CO₂ stream with H₂S highly depends on the operating conditions such as temperature, pressure, and composition of impurity. Contrary to findings of previous studies, our results show that an impurity such as H₂S can potentially reduce the onset time of natural convection and can accelerate the subsequent convective mixing. However, at the later times, the rate of convective dissolution is adversely affected by the impurities. Therefore, the injection of an impure CO₂ stream can be engineered to improve the rate of dissolution of CO₂, which leads to higher storage security and efficiency. Accordingly, we have identified the most favorable CO₂ stream compositions based on the geophysical properties of target aquifers. Information related to the onset of natural convection such as the scaling relations and the most favorable operating conditions for CO₂ storage developed in this study are important in proper design, site screening, characterization and safety of geological storage. This information can be used to either identify future geological candidates for acid gas disposal or reviewing the current operating conditions of licensed injection sites.Keywords: CO₂ storage, solubility trapping, convective dissolution, storage efficiency
Procedia PDF Downloads 206672 Means of Securing Graves in the Egyptian Kingdom Era
Authors: Haitham Nabil Zaghlol Hasan
Abstract:
This research aims to study the means of securing graves in the Egyptian kingdom era, and revolves around many basic ideas used by the ancient Egyptian to protect his graves from thieves, which included architectural characteristics, which gave it importance only others. The most important of which was the choice of the place of the grave, which chose a kohl place in the desert to protect the graves, which is the valley of kings, and whether the choice of that place had an impact in protecting the grave or not, in addition to other elements followed in the architectural planning, which was in the valley of kings. The multiplicity of the tomb, the construction of the well chamber to deceive the thieves by the end of the graves suddenly, the construction of the wells of the tombs, which contained the burial chamber at the bottom of the main well and the effect of all these factors on the graves, and this shows the importance of the graves to the ancient Egyptian and his belief in resurrection and immortality. The Egyptian resorted to the elements of protection and was a religious worker by The protector gods and special texts to protect the deceased from any danger to protect the tomb. As for the human factor of securing the tomb through human guards (police) and security teams based on the guard and the words indicating the protection and the guard teams and the teams of the majai. The most important developments that arose on the cemetery from Tamit entrance, corridors, chambers, burial chamber and coffin, and the use of sand to close the well after from one cemetery to another and from time to time where it was built in the late period inside the temple campus to be under the attention of the priests and their protection, as the study dealt with an analytical study For the means of securing graves in the Egyptian kingdom period.Keywords: Egypt, archaeology, civilization, Egyptian
Procedia PDF Downloads 75