Search results for: security and protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4797

Search results for: security and protection

2607 Real-Time Detection of Space Manipulator Self-Collision

Authors: Zhang Xiaodong, Tang Zixin, Liu Xin

Abstract:

In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.

Keywords: space manipulator, collision detection, self-collision, the real-time collision detection

Procedia PDF Downloads 465
2606 Times Series Analysis of Depositing in Industrial Design in Brazil between 1996 and 2013

Authors: Jonas Pedro Fabris, Alberth Almeida Amorim Souza, Maria Emilia Camargo, Suzana Leitão Russo

Abstract:

With the law Nº. 9279, of May 14, 1996, the Brazilian government regulates rights and obligations relating to industrial property considering the economic development of the country as granting patents, trademark registration, registration of industrial designs and other forms of protection copyright. In this study, we show the application of the methodology of Box and Jenkins in the series of deposits of industrial design at the National Institute of Industrial Property for the period from May 1996 to April 2013. First, a graphical analysis of the data was done by observing the behavior of the data and the autocorrelation function. The best model found, based on the analysis of charts and statistical tests suggested by Box and Jenkins methodology, it was possible to determine the model number for the deposit of industrial design, SARIMA (2,1,0)(2,0,0), with an equal to 9.88% MAPE.

Keywords: ARIMA models, autocorrelation, Box and Jenkins Models, industrial design, MAPE, time series

Procedia PDF Downloads 541
2605 Penguins Search Optimization Algorithm for Chaotic Synchronization System

Authors: Sofiane Bououden, Ilyes Boulkaibet

Abstract:

In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.

Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization

Procedia PDF Downloads 188
2604 Green Prossesing of PS/Nanoparticle Fibers and Studying Morphology and Properties

Authors: M. Kheirandish, S. Borhani

Abstract:

In this experiment Polystyrene/Zinc-oxide (PS/ZnO) nanocomposite fibers were produced by electrospinning technique using limonene as a green solvent. First, the morphology of electrospun pure polystyrene (PS) and PS/ZnO nanocomposite fibers investigated by SEM. Results showed the PS fiber diameter decreased by increasing concentration of Zinc Oxide nanoparticles (ZnO NPs). Thermo Gravimetric Analysis (TGA) results showed thermal stability of nanocomposites increased by increasing ZnO NPs in PS electrospun fibers. Considering Differential Scanning Calorimeter (DSC) thermograms for electrospun PS fibers indicated that introduction of ZnO NPs into fibers affects the glass transition temperature (Tg) by reducing it. Also, UV protection properties of nanocomposite fibers were increased by increasing ZnO concentration. Evaluating the effect of metal oxide NPs amount on mechanical properties of electrospun layer showed that tensile strength and elasticity modulus of the electrospun layer of PS increased by addition of ZnO NPs. X-ray diffraction (XRD) pattern of nanopcomposite fibers confirmed the presence of NPs in the samples.

Keywords: electrospininng, nanoparticle, polystyrene, ZnO

Procedia PDF Downloads 235
2603 Analyzing Essential Patents of Mobile Communication Based on Patent Portfolio: Case Study of Long Term Evolution-Advanced

Authors: Kujhin Jeong, Sungjoo Lee

Abstract:

In the past, cross-licensing was made up of various application or commercial patents. Today, cross-licensing is restricted to essential patents, which has emphasized their importance significantly. Literature has shown that patent portfolio provides information for patent protection or strategy decision-making, but little empirical research has found strategic tool of essential patents. This paper will highlight four types of essential patent portfolio and analysis about each strategy in the field of LTE-A. Specifically we collected essential patents of mobile communication company through ETSI (European Telecommunication Standards Institute) and build-up portfolio activity, concentration, diversity, and quality. Using these portfolios, we can understand each company’s strategic character about the technology of LTE-A and comparison analysis of financial results. Essential patents portfolio displays a mobile communication company’s strategy and its strategy’s impact on the performance of a company.

Keywords: essential patent, portfolio, patent portfolio, essential patent portfolio

Procedia PDF Downloads 383
2602 A Practical Protection Method for Parallel Transmission-Lines Based on the Fault Travelling-Waves

Authors: Mohammad Reza Ebrahimi

Abstract:

In new restructured power systems, swift fault detection is very important. The parallel transmission-lines are vastly used in this kind of power systems because of high amount of energy transferring. In this paper, a method based on the comparison of two schemes, i.e., i) maximum magnitude of travelling-wave (TW) energy ii) the instants of maximum energy occurrence at the circuits of parallel transmission-line is proposed. Using the travelling-wave of fault in order to faulted line identification this method has noticeable operation time. Moreover, the algorithm can cover for identification of faults as external or internal faults. For an internal fault, the exact location of the fault can be estimated confidently. A lot of simulations have been done with PSCAD/EMTDC to verify the performance of the proposed algorithm.

Keywords: travelling-wave, maximum energy, parallel transmission-line, fault location

Procedia PDF Downloads 179
2601 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 265
2600 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application

Authors: Khaled Shehata, Hanady Hussien, Sara Yehia

Abstract:

Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.

Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential

Procedia PDF Downloads 383
2599 Digital Mapping of First-Order Drainages and Springs of the Guajiru River, Northeast of Brazil, Based on Satellite and Drone Images

Authors: Sebastião Milton Pinheiro da Silva, Michele Barbosa da Rocha, Ana Lúcia Fernandes Campos, Miquéias Rildo de Souza Silva

Abstract:

Water is an essential natural resource for life on Earth. Rivers, lakes, lagoons and dams are the main sources of water storage for human consumption. The costs of extracting and using these water sources are lower than those of exploiting groundwater on transition zones to semi-arid terrains. However, the volume of surface water has decreased over time, with the depletion of first-order drainage and the disappearance of springs, phenomena which are easily observed in the field. Climate change worsens water scarcity, compromising supply and hydric security for rural populations. To minimize the expected impacts, producing and storing water through watershed management planning requires detailed cartographic information on the relief and topography, and updated data on the stage and intensity of catchment basin environmental degradation problems. The cartography available of the Brazilian northeastern territory dates to the 70s, with topographic maps, printed, at a scale of 1:100,000 which does not meet the requirements to execute this project. Exceptionally, there are topographic maps at scales of 1:50,000 and 1:25,000 of some coastal regions in northeastern Brazil. Still, due to scale limitations and outdatedness, they are products of little utility for mapping low-order watersheds drainage and springs. Remote sensing data and geographic information systems can contribute to guiding the process of mapping and environmental recovery by integrating detailed relief and topographic data besides social and other environmental information in the Guajiru River Basin, located on the east coast of Rio Grande do Norte, on the Northeast region of Brazil. This study aimed to recognize and map catchment basin, springs and low-order drainage features along estimating morphometric parameters. Alos PALSAR and Copernicus DEM digital elevation models were evaluated and provided regional drainage features and the watersheds limits extracted with Terraview/Terrahidro 5.0 software. CBERS 4A satellite images with 2 m spatial resolution, processed with ESA SNAP Toolbox, allowed generating land use land cover map of Guajiru River. A Mappir Survey 3 multiespectral camera onboard of a DJI Phantom 4, a Mavic 2 Pro PPK Drone and an X91 GNSS receiver to collect the precised position of selected points were employed to detail mapping. Satellite images enabled a first knowledge approach of watershed areas on a more regional scale, yet very current, and drone images were essential in mapping details of catchment basins. The drone multispectral image mosaics, the digital elevation model, the contour lines and geomorphometric parameters were generated using OpenDroneMap/ODM and QGis softwares. The drone images generated facilitated the location, understanding and mapping of watersheds, recharge areas and first-order ephemeral watercourses on an adequate scale and will be used in the following project’s phases: watershed management planning, recovery and environmental protection of Rio's springs Guajiru. Environmental degradation is being analyzed from the perspective of the availability and quality of surface water supply.

Keywords: imaging, relief, UAV, water

Procedia PDF Downloads 21
2598 Management of Intellectual Property Rights: Strategic Patenting

Authors: Waheed Oseni

Abstract:

This article reviews emergent global trends in intellectual property protection and identifies patenting as a strategic initiative. Recent developments in software and method of doing business patenting are fast transforming the e‐business landscape. The article discusses the emergent global regulatory framework concerning intellectual property rights and the strategic value of patenting. Important features of a corporate patenting portfolio are described. Superficially, the e‐commerce landscape appears to be dominated by dotcom start-ups or the “dotcomization” of existing brick and mortar companies. But, in reality, at its very bedrock is intellectual property (IP). In this connection, the recent avalanche of patenting of software and method‐of‐doing‐business (MDB) in the USA is a very significant development with regard to rules governing IP rights and, therefore, e‐commerce. Together with the World Trade Organization’s (WTO) IP rules, there is an emerging global regulatory framework for IP rights, an understanding of which is necessary for designing effective e‐commerce strategies.

Keywords: intellectual property, patents, methods, computer software

Procedia PDF Downloads 521
2597 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law

Authors: Barakat Adebisi Raji

Abstract:

In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.

Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah

Procedia PDF Downloads 28
2596 Assessment of Compost Usage Quality and Quality for Agricultural Use: A Case Study of Hebron District, Palestine

Authors: Mohammed A. A. Sarhan, Issam A. Al-Khatib

Abstract:

Complying with the technical specifications of compost production is of high importance not only for environmental protection but also for increasing the productivity and promotion of compost use by farmers in agriculture. This study focuses on the compost quality of the Palestinian market and farmers’ attitudes toward agricultural use of compost. The quality is assessed through selection of 20 compost samples of different suppliers and producers and lab testing for quality parameters, while the farmers’ attitudes to compost use for agriculture are evaluated through survey questionnaire of 321 farmers in the Hebron area. The results showed that the compost in the Palestinian markets is of medium quality due to partial or non-compliance with the quality standards and guidelines. The Palestinian farmers showed a positive attitude since 91.2% of them have the desire to use compost in agriculture. The results also showed that knowledge of difference between compost and chemical fertilizers, perception of compost benefits and previously experiencing problems in compost use, are significant factors affecting the farmers’ attitude toward the use of compost as an organic fertilizer.

Keywords: attitude, compost, compost quality, organic fertilizer, manure

Procedia PDF Downloads 163
2595 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques

Authors: Stefan K. Behfar

Abstract:

The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.

Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing

Procedia PDF Downloads 68
2594 The Effect of Work Site Dangers on the Management of Construction Projects in Syria

Authors: Mohammed Aljoma, Eblal Zakzok

Abstract:

Safety is a science that seeks to protect and avoid humans from risks in any field and prevent losses in properties and lives as much as possible. On the other hand, occupational safety goals aim to protect workers from risks which can occur during work execution. The main purpose of occupational safety is to ultimately protect people, properties and the environment by reducing accidents and injuries that may cause losses and damages. To achieve this goal, we must remove the direct and indirect reasons which cause accidents and injuries; some of the reasons of accidents are the unsafe cases and inept behavior or both of them. This research focuses on the manner of providing instant protection from the very first beginning to people, properties and the environment by: -Inserting safety demands in the planning and designing works by identifying risk levels in every task of the project, -Using a new risk managing system or modifying or changing a previously-used one.

Keywords: planning, scheduling, risk management, project duration, site safety

Procedia PDF Downloads 293
2593 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 259
2592 Solutions for Comfort and Safety on Vibrations Resulting from the Action of the Wind on the Building in the Form of Portico with Four Floors

Authors: G. B. M. Carvalho, V. A. C. Vale, E. T. L. Cöuras Ford

Abstract:

With the aim of increasing the levels of comfort and security structures, the study of dynamic loads on buildings has been one of the focuses in the area of control engineering, civil engineering and architecture. Thus, this work presents a study based on simulation of the dynamics of buildings in the form of portico subjected to wind action, besides presenting an action of passive control, using for this the dynamics of the structure, consequently representing a system appropriated on environmental issues. These control systems are named the dynamic vibration absorbers.

Keywords: dynamic vibration absorber, structure, comfort, safety, wind behavior, structure

Procedia PDF Downloads 400
2591 Arisarum Vulgare: Bridging Tradition and Science through Phytochemical Characterization and Exploring Therapeutic Potential via in vitro and in vivo Biological Activities

Authors: Boudjelal Amel

Abstract:

Arisarum vulgare, a member of the Araceae family, is an herbaceous perennial widely distributed in the Mediterranean region. A. vulgare is recognized for its medicinal properties and holds significant traditional importance in Algeria for the treatment of various human ailments, including pain, infections, inflammation, digestive disorders, skin problems, eczema, cancer, wounds, burns and gynecological diseases. Despite its extensive traditional use, scientific exploration of A. vulgare remains limited. The study aims to investigate for the first time the therapeutic potential of A. vulgare ethanolic extract obtained by ultrasound-assisted extraction. The chemical composition of the extract was determined by LC-MS/MS analysis. For in vitro phytopharmacological evaluation, several assays, including DPPH, ABTS, FRAP and reducing power, were employed to evaluate the antioxidant activity. The antibacterial activity was assessed againt Escherichia coli, Salmonella typhimurium, Staphylococus aureus, Enterococcus feacium by disk diffusion and microdilution methods. The possible inhibitory activity of ethanolic extract was analyzed against the cholinesterases enzymes (AChE and BChE). The DNA protection activity of A. vulgare ethanolic extract was estimated using the agarose gel electrophoresis method. The capacities of the extract to protect plasmid DNA (pBR322) from the oxidizing effects of H2O2 and UV treatment were evaluated by their DNA-breaking forms. The in vivo wound healing potential of a traditional ointment containing 5% of A. vulgare ethanolic extract was also investigated. The LC-MS/MS profiling of the extract revealed the presence of various bioactive compounds, including naringenin, chlorogenic, vanillic, cafeic, coumaric acids, trans-cinnamic and trans ferrulic acids. The plant extract presented considerable antioxidant potential, being the most active for Reducing power (0,07326±0.001 mg/ml) and DPPH (0.14±0.004 mg/ml). The extract showed the highest inhibition zone diameter against Enterococcus feacium (36±0.1 mm). The ethanolic extract of A. vulgare suppressed the growth of Staphylococus aureus, Escherichia coli and Salmonella typhimurium according to the MIC values. The extract of the plant significantly inhibited both AChE and BChE enzymes. DNA protection activity of the A. vulgare extract was determined as 90.41% for form I and 51.92% for form II. The in vivo experiments showed that 5% ethanolic extract ointment accelerated the wound healing process. The topical application of the traditional formulation enhanced wound closure (95,36±0,6 %) and improved histological parameters in the treated group compared to the control groups. The promising biological properties of Arisarum vulgare revealed that the plant could be appraised as a potential origin of bioactive molecules having multifunctional medicinal uses.

Keywords: arisarum vulgare, LC-MS/MS, antioxidant activity, antimicrobial activity, cholinesterases enzymes inhibition, dna-damage activity, in vivo wound healing

Procedia PDF Downloads 58
2590 The Antecedents That Effect to the Adventure Tourism in Krabi, Thailand

Authors: Autjira Songjan, Vimolsri Sansuk

Abstract:

The research aim to study the possible negative environmental impact by adventure tourism in Krabi, Thailand, which is a popular destination for adventure tourism. The research is carried out through quantitative and qualitative methods. Questionnaires are distributed to 400 adventure tourists: 160 Thai and 240 international tourists. Questions involved experiences and opinions towards the environment and certain practices which influence a protection or degradation of environment from tour guides, tour operators and tourists. Furthermore, in-depth interviews were carried out with 21 adventure tour operators operating 5 main adventure tours. The finding shows the various types of adventure activities in Krabi involve different kinds of nature, therefore the characteristics of the different adventure activities are likely to affect the physical environment in different level. Kayaking tours are managed inside the mangrove forests, and may lead to negative impact on the ecosystem of mangroves, through loud noise, pulling out the mangrove population.

Keywords: adventure activities, Krabi province in Thailand, physical environment, adventure tourism

Procedia PDF Downloads 263
2589 Cloud-Based Mobile-to-Mobile Computation Offloading

Authors: Ebrahim Alrashed, Yousef Rafique

Abstract:

Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.

Keywords: computational offloading, power conservation, cloud, sandboxing

Procedia PDF Downloads 383
2588 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 157
2587 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 74
2586 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS

Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili

Abstract:

Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.

Keywords: construction, debris flow, geoinformatics systems, program RAMMS

Procedia PDF Downloads 140
2585 Mosquito Repellent Finishing of Cotton Using Pepper Tree (Schinus molle) Seed Oil Extract

Authors: Granch Berhe Tseghai, Tekalgn Gebremedhin Belay, Abrehaley Hagos Gebremariam

Abstract:

Mosquito repellent textiles are one of the most growing ways to advance the textile field by providing the needed characteristics of protecting against mosquitoes, especially in the tropical areas. These types of textiles ensure the protection of human beings from the mosquitoes and the mosquito-borne disease includes malaria, filariasis and dengue fever. In this work Schinus Molle oil (pepper tree oil) was used for mosquito repellent finish as a preformatted thing. This study focused on the penetration of mosquito repellent finish in textile applications as well as nature based alternatives to commercial chemical mosquito repellents in the market. Suitable techniques and materials to achieve mosquito repellency are discussed and pointed out according to our project. In this study textile, sample was treated with binder and schinus oil. The different property has been studied for effective mosquito repellency.

Keywords: cotton, Schinus molle seed oil, mosquito repellent, mosquito-borne diseases

Procedia PDF Downloads 277
2584 Gender Dimension of Migrations Influenced by Genocide and Feminicides around the Globe

Authors: Lejla Mušić

Abstract:

Gender dimension of migration analyzes the intersection in between the world statistics on male and female migrations, around the world, involving the questions of youth migrations. Comparative analyses of world migration statistics as methodology offer the insight into the position of women in labor market around world. There are different forms of youth debris in contemporary world. The main problems are illegal migration, feminization of poverty, kidnapping the girls in Nigeria, femicides in Juarez and Mexico. Illegal migrations involve forced labor, rape and prostitution. Transgender youth share ideas through the online media (anti-bullying videos) and develop their own styles such as anarcho-punk, rave, or rock. Therefore, the stronger gender equality laws and laws for protection of women on work should be enforced.

Keywords: hyperfeminisation, rape, gangs of girls, rent boys masculinities, Varoç in Istanbul, forced labor, rape and prostitution, illegal emigrations

Procedia PDF Downloads 252
2583 An Innovation Decision Process View in an Adoption of Total Laboratory Automation

Authors: Chia-Jung Chen, Yu-Chi Hsu, June-Dong Lin, Kun-Chen Chan, Chieh-Tien Wang, Li-Ching Wu, Chung-Feng Liu

Abstract:

With fast advances in healthcare technology, various total laboratory automation (TLA) processes have been proposed. However, adopting TLA needs quite high funding. This study explores an early adoption experience by Taiwan’s large-scale hospital group, the Chimei Hospital Group (CMG), which owns three branch hospitals (Yongkang, Liouying and Chiali, in order by service scale), based on the five stages of Everett Rogers’ Diffusion Decision Process. 1.Knowledge stage: Over the years, two weaknesses exists in laboratory department of CMG: 1) only a few examination categories (e.g., sugar testing and HbA1c) can now be completed and reported within a day during an outpatient clinical visit; 2) the Yongkang Hospital laboratory space is dispersed across three buildings, resulting in duplicated investment in analysis instruments and inconvenient artificial specimen transportation. Thus, the senior management of the department raised a crucial question, was it time to process the redesign of the laboratory department? 2.Persuasion stage: At the end of 2013, Yongkang Hospital’s new building and restructuring project created a great opportunity for the redesign of the laboratory department. However, not all laboratory colleagues had the consensus for change. Thus, the top managers arranged a series of benchmark visits to stimulate colleagues into being aware of and accepting TLA. Later, the director of the department proposed a formal report to the top management of CMG with the results of the benchmark visits, preliminary feasibility analysis, potential benefits and so on. 3.Decision stage: This TLA suggestion was well-supported by the top management of CMG and, finally, they made a decision to carry out the project with an instrument-leasing strategy. After the announcement of a request for proposal and several vendor briefings, CMG confirmed their laboratory automation architecture and finally completed the contracts. At the same time, a cross-department project team was formed and the laboratory department assigned a section leader to the National Taiwan University Hospital for one month of relevant training. 4.Implementation stage: During the implementation, the project team called for regular meetings to review the results of the operations and to offer an immediate response to the adjustment. The main project tasks included: 1) completion of the preparatory work for beginning the automation procedures; 2) ensuring information security and privacy protection; 3) formulating automated examination process protocols; 4) evaluating the performance of new instruments and the instrument connectivity; 5)ensuring good integration with hospital information systems (HIS)/laboratory information systems (LIS); and 6) ensuring continued compliance with ISO 15189 certification. 5.Confirmation stage: In short, the core process changes include: 1) cancellation of signature seals on the specimen tubes; 2) transfer of daily examination reports to a data warehouse; 3) routine pre-admission blood drawing and formal inpatient morning blood drawing can be incorporated into an automatically-prepared tube mechanism. The study summarizes below the continuous improvement orientations: (1) Flexible reference range set-up for new instruments in LIS. (2) Restructure of the specimen category. (3) Continuous review and improvements to the examination process. (4) Whether installing the tube (specimen) delivery tracks need further evaluation.

Keywords: innovation decision process, total laboratory automation, health care

Procedia PDF Downloads 415
2582 Establishing Community-Based Pro-Biodiversity Enterprise in the Philippines: A Climate Change Adaptation Strategy towards Agro-Biodiversity Conservation and Local Green Economic Development

Authors: Dina Magnaye

Abstract:

In the Philippines, the performance of the agricultural sector is gauged through crop productivity and returns from farm production rather than the biodiversity in the agricultural ecosystem. Agricultural development hinges on the overall goal of increasing productivity through intensive agriculture, monoculture system, utilization of high yielding varieties in plants, and genetic upgrading in animals. This merits an analysis of the role of agro-biodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. These enterprises conserve biodiversity while equitably sharing production income in the utilization of biological resources. The study aims to determine how community-based pro-biodiversity enterprises become instrumental in local climate change adaptation and agro-biodiversity conservation as input to local green economic development planning. It also involves an assessment of the role of agrobiodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. The perceptions of the local community members both in urban and upland rural areas on community-based pro-biodiversity enterprises were evaluated. These served as a basis in developing a planning modality that can be mainstreamed in the management of local green economic enterprises to benefit the environment, provide local income opportunities, conserve species diversity, and sustain environment-friendly farming systems and practices. The interviews conducted with organic farmer-owners, entrepreneur-organic farmers, and organic farm workers revealed that pro-biodiversity enterprise such as organic farming involved the cyclic use of natural resources within the carrying capacity of a farm; recognition of the value of tradition and culture especially in the upland rural area; enhancement of socio-economic capacity; conservation of ecosystems in harmony with nature; and climate change mitigation. The suggested planning modality for community-based pro-biodiversity enterprises for a green economy encompasses four (4) phases to include community resource or capital asset profiling; stakeholder vision development; strategy formulation for sustained enterprises; and monitoring and evaluation.

Keywords: agro-biodiversity, agro-biodiversity conservation, local green economy, organic farming, pro-biodiversity enterprise

Procedia PDF Downloads 357
2581 Acetylation of Peruvian Wood Species

Authors: A. Loayza

Abstract:

Wood acetilationhapens when woody cell wall is saturated with acetic anhydride, the free hydroxyl groups present on cellulosic structures are replaced. Thus, the capillary spaces are filled with acetyl groups, and this replacement avoids further reactions with water. But, there is no information about wood acetilation in peruvianamzonic Wood species (SchizolobiumExcelsumVoge and CalycophyllumSpruceanum). So, in this research, we test acetylation of this two peruvian species in order to assess its ability as a protection estrategy, like the artificially cultivated species common for this type of treatment. A know experimental methodology was applied, using a laboratory reactor, evaluating the time as a principal variable. In this research, we were able to evaluate weight gains. The acetylation was carriet out considering one immersion time of 3 and 6 hours on acetic anhydride, were could it be observed weight gains ranged between 14 and 20% and the improvement of mention properties such as: a) Dimensional stability and water absorption capacity improved as well as its compressive strength.

Keywords: acetylation, calycophyllum spruceanum benth. Hook. F., cedrelinga cateniformis, copaifera langsdorffii, dimensional stability, schizolobium parahybum

Procedia PDF Downloads 92
2580 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 469
2579 Protective Approach of Mentha Piperita against Cadmium Induced Renotoxicity in Albino Rats

Authors: Baby Tabassum, Priya Bajaj

Abstract:

Cadmium is the second most hazardous heavy metal occurring in both elemental as well as compound forms. It is a highly toxic metal with a very high bio-concentration factor (BCF>100). WHO permitted groundwater cadmium concentration is 0.005 mg/L only, but reality is far away from this limit. A number of natural and anthropogenic industrial activities contribute to the spread of cadmium into the environment. The present study had been designated to find out the renal changes at functional level after cadmium intoxication and protection against these changes offered by Mentha piperata. For the purpose, albino rats were selected as the model organism. Cadmium significantly increases the serum level of serum proteins and nitrogenous wastes showing reduced filtration rate of kidneys. Pretreatment with Mentha piperata leaf extract causes significant retention of these levels to normalcy. These findings conclude that Cadmium exposure affects renal functioning but Mentha could prevent it, proving its nephro-protective potential against heavy metal toxicity.

Keywords: albino rat, cadmium, Mentha piperata, nephrotoxicity

Procedia PDF Downloads 392
2578 Assessment of the Simulation Programs Usable to Support Decision Making Processes of the Critical Infrastructure Emergency Management

Authors: Jiří Barta, Oldřich Svoboda

Abstract:

This article deals with the issue of practical training of the management staff during emergency events in the frame of critical infrastructure. Critical infrastructure represents one of the possible targets of destructive activities as well as operational accidents and incidents which can seriously influence the functioning of the system of ensuring the basic needs of the inhabitants. Therefore, protection of critical infrastructure and training of the staff in dealing with emergencies becomes a broadly discussed topic. Nowadays, the market offers a wide range of simulation tools which proclaim that they are suitable for practical training of management staff and completing their tasks. Another group of programs declares that they are not primarily designed for this type of simulations. However, after some minor adaptations, for example by adding or changing users‘ roles, they are able to fulfil the needs of practical training as well as the process of emergency simulation. This paper characterises and selects simulators and programs for simulating emergency events.

Keywords: computer simulation, Symos´97, simulation software, harmful substances, Konstruktivní simulace, SIMEX

Procedia PDF Downloads 249