Search results for: data exchange
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26376

Search results for: data exchange

24186 Prediction of All-Beta Protein Secondary Structure Using Garnier-Osguthorpe-Robson Method

Authors: K. Tejasri, K. Suvarna Vani, S. Prathyusha, S. Ramya

Abstract:

Proteins are chained sequences of amino acids which are brought together by the peptide bonds. Many varying formations of the chains are possible due to multiple combinations of amino acids and rotation in numerous positions along the chain. Protein structure prediction is one of the crucial goals worked towards by the members of bioinformatics and theoretical chemistry backgrounds. Among the four different structure levels in proteins, we emphasize mainly the secondary level structure. Generally, the secondary protein basically comprises alpha-helix and beta-sheets. Multi-class classification problem of data with disparity is truly a challenge to overcome and has to be addressed for the beta strands. Imbalanced data distribution constitutes a couple of the classes of data having very limited training samples collated with other classes. The secondary structure data is extracted from the protein primary sequence, and the beta-strands are predicted using suitable machine learning algorithms.

Keywords: proteins, secondary structure elements, beta-sheets, beta-strands, alpha-helices, machine learning algorithms

Procedia PDF Downloads 96
24185 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer

Authors: Bharat P. Modi, Jayesh M. Patel

Abstract:

Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.

Keywords: mobile web access logs, web usage mining, web server, log analyzer

Procedia PDF Downloads 366
24184 Modeling Food Popularity Dependencies Using Social Media Data

Authors: DEVASHISH KHULBE, MANU PATHAK

Abstract:

The rise in popularity of major social media platforms have enabled people to share photos and textual information about their daily life. One of the popular topics about which information is shared is food. Since a lot of media about food are attributed to particular locations and restaurants, information like spatio-temporal popularity of various cuisines can be analyzed. Tracking the popularity of food types and retail locations across space and time can also be useful for business owners and restaurant investors. In this work, we present an approach using off-the shelf machine learning techniques to identify trends and popularity of cuisine types in an area using geo-tagged data from social media, Google images and Yelp. After adjusting for time, we use the Kernel Density Estimation to get hot spots across the location and model the dependencies among food cuisines popularity using Bayesian Networks. We consider the Manhattan borough of New York City as the location for our analyses but the approach can be used for any area with social media data and information about retail businesses.

Keywords: Web Mining, Geographic Information Systems, Business popularity, Spatial Data Analyses

Procedia PDF Downloads 121
24183 Hierarchical Piecewise Linear Representation of Time Series Data

Authors: Vineetha Bettaiah, Heggere S. Ranganath

Abstract:

This paper presents a Hierarchical Piecewise Linear Approximation (HPLA) for the representation of time series data in which the time series is treated as a curve in the time-amplitude image space. The curve is partitioned into segments by choosing perceptually important points as break points. Each segment between adjacent break points is recursively partitioned into two segments at the best point or midpoint until the error between the approximating line and the original curve becomes less than a pre-specified threshold. The HPLA representation achieves dimensionality reduction while preserving prominent local features and general shape of time series. The representation permits course-fine processing at different levels of details, allows flexible definition of similarity based on mathematical measures or general time series shape, and supports time series data mining operations including query by content, clustering and classification based on whole or subsequence similarity.

Keywords: data mining, dimensionality reduction, piecewise linear representation, time series representation

Procedia PDF Downloads 279
24182 Satellite Statistical Data Approach for Upwelling Identification and Prediction in South of East Java and Bali Sea

Authors: Hary Aprianto Wijaya Siahaan, Bayu Edo Pratama

Abstract:

Sea fishery's potential to become one of the nation's assets which very contributed to Indonesia's economy. This fishery potential not in spite of the availability of the chlorophyll in the territorial waters of Indonesia. The research was conducted using three methods, namely: statistics, comparative and analytical. The data used include MODIS sea temperature data imaging results in Aqua satellite with a resolution of 4 km in 2002-2015, MODIS data of chlorophyll-a imaging results in Aqua satellite with a resolution of 4 km in 2002-2015, and Imaging results data ASCAT on MetOp and NOAA satellites with 27 km resolution in 2002-2015. The results of the processing of the data show that the incidence of upwelling in the south of East Java Sea began to happen in June identified with sea surface temperature anomaly below normal, the mass of the air that moves from the East to the West, and chlorophyll-a concentrations are high. In July the region upwelling events are increasingly expanding towards the West and reached its peak in August. Chlorophyll-a concentration prediction using multiple linear regression equations demonstrate excellent results to chlorophyll-a concentrations prediction in 2002 until 2015 with the correlation of predicted chlorophyll-a concentration indicate a value of 0.8 and 0.3 with RMSE value. On the chlorophyll-a concentration prediction in 2016 indicate good results despite a decline in the value of the correlation, where the correlation of predicted chlorophyll-a concentration in the year 2016 indicate a value 0.6, but showed improvement in RMSE values with 0.2.

Keywords: satellite, sea surface temperature, upwelling, wind stress

Procedia PDF Downloads 160
24181 Design an Intelligent Fire Detection System Based on Neural Network and Particle Swarm Optimization

Authors: Majid Arvan, Peyman Beygi, Sina Rokhsati

Abstract:

In-time detection of fire in buildings is of great importance. Employing intelligent methods in data processing in fire detection systems leads to a significant reduction of fire damage at lowest cost. In this paper, the raw data obtained from the fire detection sensor networks in buildings is processed by using intelligent methods based on neural networks and the likelihood of fire happening is predicted. In order to enhance the quality of system, the noise in the sensor data is reduced by analyzing wavelets and applying SVD technique. Meanwhile, the proposed neural network is trained using particle swarm optimization (PSO). In the simulation work, the data is collected from sensor network inside the room and applied to the proposed network. Then the outputs are compared with conventional MLP network. The simulation results represent the superiority of the proposed method over the conventional one.

Keywords: intelligent fire detection, neural network, particle swarm optimization, fire sensor network

Procedia PDF Downloads 390
24180 Esterification Reaction of Stearic Acid with Methanol Over Surface Functionalised PAN Fibrous Solid Acid Catalyst

Authors: Rawaz A. Ahmed, Katherine Huddersman

Abstract:

High-lipid Fats, Oils and Grease (FOGs) from wastewater are underutilized despite their potential for conversion into valuable fuels; this work describes a surface-functionalized fibrous Polyacrylonitrile (PAN) mesh as a novel heterogeneous acid catalyst for the conversion of free fatty acids (FFAs), via a catalytic esterification process into biodiesel. The esterification of stearic acid (SA) with methanol was studied over an acidified PAN solid acid catalyst. Disappearance of the carboxylic acid (C=O) peak of the stearic acid at 1696 cm-1 in the FT-IR spectrum with the associated appearance of the ester (C=O) peak at 1739 cm-1 confirmed the production of the methyl stearate. This was further supported by 1H NMR spectra with the appearance of the ester (-CH₂OCOR) at 3.60-3.70 ppm. Quantitate analysis by GC-FID showed the catalyst has excellent activity with >95 % yield of methyl stearate (MS) at 90 ◦C after 3 h and a molar ratio of methanol to SA of 35:1. To date, to our best knowledge, there is no research in the literature on the esterification reaction for biodiesel production using a modified PAN mesh as a catalyst. It is noteworthy that this acidified PAN mesh catalyst showed comparable activity to conventional Brönsted acids, namely H₂SO₄ and p-TSA, as well as exhibiting higher activity than various other heterogeneous catalysts such as zeolites, ion-exchange resins and acid clay.

Keywords: fats oil and greases (FOGs), free fatty acid, esterification reaction, methyl ester, PAN

Procedia PDF Downloads 248
24179 Investigation of Maritime Accidents with Exploratory Data Analysis in the Strait of Çanakkale (Dardanelles)

Authors: Gizem Kodak

Abstract:

The Strait of Çanakkale, together with the Strait of Istanbul and the Sea of Marmara, form the Turkish Straits System. In other words, the Strait of Çanakkale is the southern gate of the system that connects the Black Sea countries with the other countries of the world. Due to the heavy maritime traffic, it is important to scientifically examine the accident characteristics in the region. In particular, the results indicated by the descriptive statistics are of critical importance in order to strengthen the safety of navigation. At this point, exploratory data analysis offers strategic outputs in terms of defining the problem and knowing the strengths and weaknesses against possible accident risk. The study aims to determine the accident characteristics in the Strait of Çanakkale with temporal and spatial analysis of historical data, using Exploratory Data Analysis (EDA) as the research method. The study's results will reveal the general characteristics of maritime accidents in the region and form the infrastructure for future studies. Therefore, the text provides a clear description of the research goals and methodology, and the study's contributions are well-defined.

Keywords: maritime accidents, EDA, Strait of Çanakkale, navigational safety

Procedia PDF Downloads 104
24178 Data Analysis to Uncover Terrorist Attacks Using Data Mining Techniques

Authors: Saima Nazir, Mustansar Ali Ghazanfar, Sanay Muhammad Umar Saeed, Muhammad Awais Azam, Saad Ali Alahmari

Abstract:

Terrorism is an important and challenging concern. The entire world is threatened by only few sophisticated terrorist groups and especially in Gulf Region and Pakistan, it has become extremely destructive phenomena in recent years. Predicting the pattern of attack type, attack group and target type is an intricate task. This study offers new insight on terrorist group’s attack type and its chosen target. This research paper proposes a framework for prediction of terrorist attacks using the historical data and making an association between terrorist group, their attack type and target. Analysis shows that the number of attacks per year will keep on increasing, and Al-Harmayan in Saudi Arabia, Al-Qai’da in Gulf Region and Tehreek-e-Taliban in Pakistan will remain responsible for many future terrorist attacks. Top main targets of each group will be private citizen & property, police, government and military sector under constant circumstances.

Keywords: data mining, counter terrorism, machine learning, SVM

Procedia PDF Downloads 410
24177 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 304
24176 Solar Seawater Desalination Still with Seawater Preheater Using Efficient Heat Transfer Oil: Numerical Investigation and Data Verification

Authors: Ahmed N. Shmroukh, Gamal Tag Abdel-Jaber, Rashed D. Aldughpassi

Abstract:

The feasibility of improving the performance of the proposed solar still unit which operated in very hot climate is investigated numerically and verified with experimental data. This solar desalination unit with proposed auxiliary device as seawater preheating system using petrol based textherm oil was used to produce pure fresh water from seawater. The effective evaporation area of basin is about 1 m2. The unit was tested in two main operation modes which are normal and with seawater preheating system. The results showed that, there is good agreement between the theoretical data and the experimental data; this means that the numerical model can be accurately dependable for predicting the proposed solar still performance and design parameters. The results also showed that the fresh water productivity of the solar still in the modified preheating case which is higher than normal case, leads to an increase in productivity of 42%.

Keywords: improving productivity, seawater desalination, solar stills, theoretical model

Procedia PDF Downloads 140
24175 Critical Factors in the Formation, Development and Survival of an Eco-Industrial Park: A Systemic Understanding of Industrial Symbiosis

Authors: Iván González, Pablo Andrés Maya, Sebastián Jaén

Abstract:

Eco-industrial parks (EIPs) work as networks for the exchange of by-products, such as materials, water, or energy. This research identifies the relevant factors in the formation of EIPs in different industrial environments around the world. Then an aggregation of these factors is carried out to reduce them from 50 to 17 and classify them according to 5 fundamental axes. Subsequently, the Vester Sensitivity Model (VSM) systemic methodology is used to determine the influence of the 17 factors on an EIP system and the interrelationship between them. The results show that the sequence of effects between factors: Trust and Cooperation → Business Association → Flows → Additional Income represents the “backbone” of the system, being the most significant chain of influences. In addition, the Organizational Culture represents the turning point of the Industrial Symbiosis on which it must act correctly to avoid falling into unsustainable economic development. Finally, the flow of Information should not be lost since it is what feeds trust between the parties, and the latter strengthens the system in the face of individual or global imbalances. This systemic understanding will enable the formulation of pertinent policies by the actors that interact in the formation and permanence of the EIP. In this way, it seeks to promote large-scale sustainable industrial development, integrating various community actors, which in turn will give greater awareness and appropriation of the current importance of sustainability in industrial production.

Keywords: critical factors, eco-industrial park, industrial symbiosis, system methodology

Procedia PDF Downloads 130
24174 The Parallelization of Algorithm Based on Partition Principle for Association Rules Discovery

Authors: Khadidja Belbachir, Hafida Belbachir

Abstract:

subsequently the expansion of the physical supports storage and the needs ceaseless to accumulate several data, the sequential algorithms of associations’ rules research proved to be ineffective. Thus the introduction of the new parallel versions is imperative. We propose in this paper, a parallel version of a sequential algorithm “Partition”. This last is fundamentally different from the other sequential algorithms, because it scans the data base only twice to generate the significant association rules. By consequence, the parallel approach does not require much communication between the sites. The proposed approach was implemented for an experimental study. The obtained results, shows a great reduction in execution time compared to the sequential version and Count Distributed algorithm.

Keywords: association rules, distributed data mining, partition, parallel algorithms

Procedia PDF Downloads 425
24173 A Less Complexity Deep Learning Method for Drones Detection

Authors: Mohamad Kassab, Amal El Fallah Seghrouchni, Frederic Barbaresco, Raed Abu Zitar

Abstract:

Detecting objects such as drones is a challenging task as their relative size and maneuvering capabilities deceive machine learning models and cause them to misclassify drones as birds or other objects. In this work, we investigate applying several deep learning techniques to benchmark real data sets of flying drones. A deep learning paradigm is proposed for the purpose of mitigating the complexity of those systems. The proposed paradigm consists of a hybrid between the AdderNet deep learning paradigm and the Single Shot Detector (SSD) paradigm. The goal was to minimize multiplication operations numbers in the filtering layers within the proposed system and, hence, reduce complexity. Some standard machine learning technique, such as SVM, is also tested and compared to other deep learning systems. The data sets used for training and testing were either complete or filtered in order to remove the images with mall objects. The types of data were RGB or IR data. Comparisons were made between all these types, and conclusions were presented.

Keywords: drones detection, deep learning, birds versus drones, precision of detection, AdderNet

Procedia PDF Downloads 184
24172 Wave-Assisted Flapping Foil Propulsion: Flow Physics and Scaling Laws From Fluid-Structure Interaction Simulations

Authors: Rajat Mittal, Harshal Raut, Jung Hee Seo

Abstract:

Wave-assisted propulsion (WAP) systems convert wave energy into thrust using elastically mounted hydrofoils. We employ sharp-interface immersed boundary simulations to examine the effect of two key parameters on the flow physics, the fluid-structure interaction, as well as thrust performance of these systems - the stiffness of the torsional spring and the location of the rotational center. The variation in spring stiffness leads to different amplitude of pitch motion, phase difference with respect to heaving motion and thrust coefficient and we show the utility of ‘maps’ of energy exchange between the flow and the hydrofoil system, as a way to understand and predict this behavior. The Force Partitioning Method (FPM) is used to decompose the pressure forces into individual components and understand the mechanism behind increase in thrust. Next, a scaling law is presented for the thrust coefficient generated by heaving and pitching foil. The parameters within the scaling law are calculated based on direct-numerical simulations based parametric study utilized to generate the energy maps. The predictions of the proposed scaling law are then compared with those of a similar model from the literature, showing a noticeable improvement in the prediction of the thrust coefficient.

Keywords: propulsion, flapping foils, hydrodynamics, wave power

Procedia PDF Downloads 65
24171 The Quality Assessment of Seismic Reflection Survey Data Using Statistical Analysis: A Case Study of Fort Abbas Area, Cholistan Desert, Pakistan

Authors: U. Waqas, M. F. Ahmed, A. Mehmood, M. A. Rashid

Abstract:

In geophysical exploration surveys, the quality of acquired data holds significant importance before executing the data processing and interpretation phases. In this study, 2D seismic reflection survey data of Fort Abbas area, Cholistan Desert, Pakistan was taken as test case in order to assess its quality on statistical bases by using normalized root mean square error (NRMSE), Cronbach’s alpha test (α) and null hypothesis tests (t-test and F-test). The analysis challenged the quality of the acquired data and highlighted the significant errors in the acquired database. It is proven that the study area is plain, tectonically least affected and rich in oil and gas reserves. However, subsurface 3D modeling and contouring by using acquired database revealed high degrees of structural complexities and intense folding. The NRMSE had highest percentage of residuals between the estimated and predicted cases. The outcomes of hypothesis testing also proved the biasness and erraticness of the acquired database. Low estimated value of alpha (α) in Cronbach’s alpha test confirmed poor reliability of acquired database. A very low quality of acquired database needs excessive static correction or in some cases, reacquisition of data is also suggested which is most of the time not feasible on economic grounds. The outcomes of this study could be used to assess the quality of large databases and to further utilize as a guideline to establish database quality assessment models to make much more informed decisions in hydrocarbon exploration field.

Keywords: Data quality, Null hypothesis, Seismic lines, Seismic reflection survey

Procedia PDF Downloads 167
24170 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 142
24169 Sparsity-Based Unsupervised Unmixing of Hyperspectral Imaging Data Using Basis Pursuit

Authors: Ahmed Elrewainy

Abstract:

Mixing in the hyperspectral imaging occurs due to the low spatial resolutions of the used cameras. The existing pure materials “endmembers” in the scene share the spectra pixels with different amounts called “abundances”. Unmixing of the data cube is an important task to know the present endmembers in the cube for the analysis of these images. Unsupervised unmixing is done with no information about the given data cube. Sparsity is one of the recent approaches used in the source recovery or unmixing techniques. The l1-norm optimization problem “basis pursuit” could be used as a sparsity-based approach to solve this unmixing problem where the endmembers is assumed to be sparse in an appropriate domain known as dictionary. This optimization problem is solved using proximal method “iterative thresholding”. The l1-norm basis pursuit optimization problem as a sparsity-based unmixing technique was used to unmix real and synthetic hyperspectral data cubes.

Keywords: basis pursuit, blind source separation, hyperspectral imaging, spectral unmixing, wavelets

Procedia PDF Downloads 198
24168 Optimum Switch Temperature for Phase Change Materials in Buildings

Authors: El Hadi Bouguerra, Nouredine Retiel

Abstract:

To avoid or at least to attenuate the global warming, it is essential to reduce the energy consumption of the buildings where the biggest potential of savings exists. The impending danger can come from the increase in the needs of air conditioning not only because of the climate warming but also the fast equipping of emerging or developing countries. Passive solutions exist and others are in promising development and therefore, must be applied wherever it is possible. Even if they do not always avoid the resort to an active cooling (mechanical), they allow lowering the load at an acceptable level which can be possibly taken in relay by the renewable energies. These solutions have the advantage to be relatively less expensive and especially adaptable to the existing housing. However, it is the internal convection resistance that controls the heat exchange between the phase change materials (PCM) and the indoor temperature because of the very low heat coefficients of natural convection. Therefore, it is reasonable to link the switch temperature Tm to the temperature of the substrate (walls and ceiling) because conduction heat transfer is dominant. In this case, external conditions (heat sources such as solar irradiation and ambient temperatures) and conductivities of envelope constituents are the most important factors. The walls are not at the same temperature year round; therefore, it is difficult to set a unique switch temperature for the whole season, making the average values a key parameter. With this work, the authors’ aim is to see which parameters influence the optimum switch temperature of a PCM and additionally, if a better selection of PCMs relating to their optimum temperature can enhance their energetic performances.

Keywords: low energy building, energy conservation, phase change materials, PCM

Procedia PDF Downloads 259
24167 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 450
24166 Teaching Basic Life Support in More Than 1000 Young School Children in 5th Grade

Authors: H. Booke, R. Nordmeier

Abstract:

Sudden cardiac arrest is sometimes eye-witnessed by kids. Mostly, their (grand-)parents are affected by sudden cardiac arrest, putting these kids under enormous psychological pressure: Although they are more than desperate to help, they feel insecure and helpless and are afraid of causing harm rather than realizing their chance to help. Even years later, they may blame themselves for not having helped their beloved ones. However, the absolute majority of school children - at least in Germany - is not educated to provide first aid. Teaching young kids (5th grade) in basic life support thus may help to save lives while washing away the kids' fear from causing harm during cardio-pulmonary resuscitation. A teaching of circulatory and respiratory (patho-)physiology, followed by hands-on training of basic life support for every single child, was offered to each school in our district. The teaching was performed by anesthesiologists, and the program was called 'kids can save lives'. However, before enrollment in this program, the entire class must have had lessons in biology with a special focus on heart and circulation as well as lung and gas exchange. More than 1.000 kids were taught and trained in basic life support, giving them the knowledge and skills to provide basic life support. This may help to reduce the rate of failure to provide first aid. Therefore, educating young kids in basic life support may not only help to save lives, but it also may help to prevent any feelings of guilt because of not having helped in cases of eye-witnessed sudden cardiac arrest.

Keywords: teaching, children, basic life support, cardiac arrest, CPR

Procedia PDF Downloads 139
24165 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 154
24164 Examining Individual and Organisational Legal Accountability for Sexual Exploitation Perpetrated by International Humanitarian Workers in Haiti

Authors: Elizabeth Carthy

Abstract:

There is growing recognition that sexual exploitation and abuse (SEA) perpetrated by humanitarian workers is widespread, most recently affirmed by allegations of high-ranking Oxfam officials paying women for sex in post-earthquake Haiti. SEA covers a range of gendered abuses, including rape, sexual assault, and ‘transactional’ or ‘survival’ sex. Holding individuals legally accountable for such behaviors is difficult in all contexts even more so in fragile and conflict-affected settings. Transactional sex, for the purposes of this paper, refers to situations where humanitarian workers exchange aid or assistance for sexual services. This paper explores existing organizational accountability measures relating to transactional sex engaged in by international humanitarian workers through a descriptive and interpretive case study approach-examining the situation in Haiti. It comparatively analyses steps the United Nations has taken to combat this problem. Then it examines the possibility of domestic legal accountability for such conduct in Haiti. Finally, the paper argues that international human rights law can fill in potential gaps in domestic legal frameworks to ensure states hold humanitarian workers and potentially organizations accountable for engaging in and/or perpetuating this gendered abuse of power.

Keywords: gender-based violence, humanitarian action, international human rights law, sexual exploitation

Procedia PDF Downloads 167
24163 Big Data Applications for Transportation Planning

Authors: Antonella Falanga, Armando Cartenì

Abstract:

"Big data" refers to extremely vast and complex sets of data, encompassing extraordinarily large and intricate datasets that require specific tools for meaningful analysis and processing. These datasets can stem from diverse origins like sensors, mobile devices, online transactions, social media platforms, and more. The utilization of big data is pivotal, offering the chance to leverage vast information for substantial advantages across diverse fields, thereby enhancing comprehension, decision-making, efficiency, and fostering innovation in various domains. Big data, distinguished by its remarkable attributes of enormous volume, high velocity, diverse variety, and significant value, represent a transformative force reshaping the industry worldwide. Their pervasive impact continues to unlock new possibilities, driving innovation and advancements in technology, decision-making processes, and societal progress in an increasingly data-centric world. The use of these technologies is becoming more widespread, facilitating and accelerating operations that were once much more complicated. In particular, big data impacts across multiple sectors such as business and commerce, healthcare and science, finance, education, geography, agriculture, media and entertainment and also mobility and logistics. Within the transportation sector, which is the focus of this study, big data applications encompass a wide variety, spanning across optimization in vehicle routing, real-time traffic management and monitoring, logistics efficiency, reduction of travel times and congestion, enhancement of the overall transportation systems, but also mitigation of pollutant emissions contributing to environmental sustainability. Meanwhile, in public administration and the development of smart cities, big data aids in improving public services, urban planning, and decision-making processes, leading to more efficient and sustainable urban environments. Access to vast data reservoirs enables deeper insights, revealing hidden patterns and facilitating more precise and timely decision-making. Additionally, advancements in cloud computing and artificial intelligence (AI) have further amplified the potential of big data, enabling more sophisticated and comprehensive analyses. Certainly, utilizing big data presents various advantages but also entails several challenges regarding data privacy and security, ensuring data quality, managing and storing large volumes of data effectively, integrating data from diverse sources, the need for specialized skills to interpret analysis results, ethical considerations in data use, and evaluating costs against benefits. Addressing these difficulties requires well-structured strategies and policies to balance the benefits of big data with privacy, security, and efficient data management concerns. Building upon these premises, the current research investigates the efficacy and influence of big data by conducting an overview of the primary and recent implementations of big data in transportation systems. Overall, this research allows us to conclude that big data better provide to enhance rational decision-making for mobility choices and is imperative for adeptly planning and allocating investments in transportation infrastructures and services.

Keywords: big data, public transport, sustainable mobility, transport demand, transportation planning

Procedia PDF Downloads 63
24162 Harmonization of Conflict Ahadith between Dissociation and Peaceful Co-Existence with Non-Muslims

Authors: Saheed Biodun Qaasim-Badmusi

Abstract:

A lot has been written on peaceful co-existence with non-Muslims in Islam, but little attention is paid to the conflict between Ahadith relating to dissociation from non-Muslims as a kernel of Islamic faith, and the one indicating peaceful co-existence with them. Undoubtedly, proper understanding of seemingly contradictory prophetic traditions is an antidote to the bane of pervasive extremism in our society. This is what calls for need to shed light on ‘Harmonization of Conflict Ahadith between Dissociation and Peaceful Co-existence with Non-Muslims. It is in view of the above that efforts are made in this paper to collate Ahadith pertaining to dissociation from non-Muslims as well as co-existence with them. Consequently, a critical study of their authenticity is briefly explained before proceeding to analysis of their linguistic and contextual meanings. To arrive at the accurate interpretation, harmonization is graphically applied. The result shows that dissociation from non –Muslims as a bedrock of Islamic faith could be explained in Sunnah by prohibition of participating or getting satisfaction from their religious matters, and anti-Islamic activities. Also, freedom of apostasy, ignoring da`wah with wisdom and seeking non-Muslims support against Muslims are frowned upon in Sunnah as phenomenon of dissociation from non –Muslims. All the aforementioned are strictly prohibited in Sunnah whether under the pretext of enhancing peaceful co-existence with non-Muslims or not. While peaceful co-existence with non-Muslims is evidenced in Sunnah by permissibility of visiting the sick among them, exchange of gift with them, forgiving the wrong among them, having good relationship with non-Muslim neighbours, ties of non-Muslim kinship, legal business transaction with them and the like. Finally, the degree of peaceful co-existence with non-Muslims is determined by their attitude towards Islam and Muslims.

Keywords: Ahadith, conflict, co-existence, non-Muslims

Procedia PDF Downloads 150
24161 SPPO-Based Cation Exchange Membranes with a Positively Charged Layer for Cation Fractionation

Authors: Noor Ul Afsar, Wengen Ji, Bin Wu, Muhammad A. Shehzad, Liang Ge, Tongwen Xu

Abstract:

The synthesis of monovalent cation perm-selective membranes (MCPMs) to efficiently discriminate amongst cations from seawater is of great importance for several industrial applications. However, a technical approach is highly desired to construct MCPMs to obtain a high ionic flux and sustain perm-selectivity simultaneously. In the present work, the thickness of the quaternized poly (2, 6-dimethyl-1, 4-phenylene oxide) (QPPO) layer on the surface of the SPPO-PVA (SPVA) composite membrane was adjusted using a facile procedure to achieve high permselectivity without scarifying the ionic flux. The thickness of the selective layer was precisely controlled using various concentrations of the QPPO solution. By the introduction of the cationic layer on the SPVA membrane, the monovalent cation can be separated from the divalent cation by their difference in charge density. The influence of the selective barrier (thickness) endows MCPMs with high perm-selectivity up to 12.7 for 0.1 mol L⁻¹ Li⁺/Mg²⁺ system, which is very satisfactory for polymeric membranes. The fabricated membranes have low electrical resistance and high limiting current density (iₗᵢₘ). Keeping in view the ED results, the prepared membranes with selective surface layers could be a viable candidate for Li⁺ selective separation from divalent cation Mg²⁺.

Keywords: monovalent cation perm-selective membranes, cation fractionation, perm-selectivity, ionic flux, electrodialysis

Procedia PDF Downloads 75
24160 Nanoindentation and Physical Properties of Polyvinyl Chloride/Styrene Co-Maleic Anhydride Blend Reinforced by Organo-Bentonite

Authors: D. E. Abulyazied, S. M. Mokhtar, A. M. Motawie

Abstract:

Polymer blends represent an important class of materials in engineering applications. The incorporation of clay nanofiller may provide new opportunities for this type of materials to enhance their applications. This article reports on the effects of clay on the structure and properties of polymer blends nanocomposites, based on Polyvinyl chloride PVC and styrene co-maleic anhydride SMA blend. Modification of the Egyptian Bentonite EB was carried out using organo-modifier namely; octadecylamine ODA. Before the modification, the cation exchange capacity CEC of the EB was measured. The octadecylamine bentonite ODA-B was characterized using Fourier transform infrared Spectroscopy FTIR, X-Ray Diffraction XRD, and Transition Electron Microscope TEM. A blend of Polyvinyl chloride PVC and styrene co-maleic anhydride SMA (50:50) was prepared in Tetra Hydro Furan (THF). Then nanocomposites of PVC/SMA/ODA-B were prepared by solution intercalation polymerization from 0.50% up to 5% by weight of ODA-B. The nanocomposites are characterized by XRD, TEM. Thermal, nanoindentation, swelling and electrical properties of the nanocomposites were measured. The morphology of the nanocomposites showed that ODA-B achieved good dispersion in the PVC/SMA matrix. Incorporation of 0.5 %, 1%, 3% and 5% by weight nanoclay into the PVC/SMA blends results in an improvement in nanohardness of 16%, 76%, 92%, and 68% respectively. The elastic modulus increased from 4.59 GPa for unreinforced PVC/SMA blend to 6.30 GPa (37% increase) with the introduction of 3% by weight nanoclay. The cross-link density of the nanocomposites increases with increasing the content of ODA-B.

Keywords: PVC, SMA, nanocomposites, nanoindentation, organo-bentonite

Procedia PDF Downloads 374
24159 Sustainable Manufacturing and Performance of Ceramic Membranes

Authors: Obsi Terfasa, Bhanupriya Das, Mithilish Passawan

Abstract:

The large-scale application of microbial fuel cell (MFC) technology is significantly hindered by the high cost of the commonly used proton exchange membrane, Nafion. This has led to the recent development of ceramic membranes using various clay minerals. This study evaluates the characteristics and potential use of a new ceramic membrane made from potter’s clay © mixed with different proportions (0, 5, 10 wt%) of fly ash (FA), labeled as CFA0, CFA5, CFA10, for cost-effective and sustainable MFC use. Among these, the CFA10 membrane demonstrated superior quality with a fine pore size distribution (average 0.41 μm), which supports higher water uptake and reduced oxygen diffusion. Its oxygen mass transfer coefficient was 4.13 ± 0.13 × 10⁻⁴ cm/s, about 40% lower than the control. X-ray diffraction analysis revealed that the CFA membrane is rich in quartz, which enhances proton conductance and water retention. Electrochemical kinetics studies, including cyclic voltammetry and electrochemical impedance spectroscopy (EIS), also confirmed the effectiveness of the CFA10 membrane in MFC, showing a peak current output of 15.35 mA and low ohmic resistance (78.2 Ω). The novel CFA10 ceramic membrane, incorporating coal fly ash, a waste material, shows promise for high MFC performance at a significantly reduced cost (96%), making it suitable for sustainable scaling up of the technology.

Keywords: ceramic membrane, Coulombic efficiency, electro-chemical kinetics, fly ash, proton conductivity, microbial fuel cell

Procedia PDF Downloads 42
24158 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 428
24157 The Necessity to Standardize Procedures of Providing Engineering Geological Data for Designing Road and Railway Tunneling Projects

Authors: Atefeh Saljooghi Khoshkar, Jafar Hassanpour

Abstract:

One of the main problems of the design stage relating to many tunneling projects is the lack of an appropriate standard for the provision of engineering geological data in a predefined format. In particular, this is more reflected in highway and railroad tunnel projects in which there is a number of tunnels and different professional teams involved. In this regard, comprehensive software needs to be designed using the accepted methods in order to help engineering geologists to prepare standard reports, which contain sufficient input data for the design stage. Regarding this necessity, applied software has been designed using macro capabilities and Visual Basic programming language (VBA) through Microsoft Excel. In this software, all of the engineering geological input data, which are required for designing different parts of tunnels, such as discontinuities properties, rock mass strength parameters, rock mass classification systems, boreability classification, the penetration rate, and so forth, can be calculated and reported in a standard format.

Keywords: engineering geology, rock mass classification, rock mechanic, tunnel

Procedia PDF Downloads 85