Search results for: security check
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3564

Search results for: security check

1314 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 248
1313 Safe Disposal of Processed Industrial Biomass as Alternative Organic Manure in Agriculture

Authors: V. P. Ramani, K. P. Patel, S. B. Patel

Abstract:

It is necessary to dispose of generated industrial wastes in the proper way to overcome the further pollution for a safe environment. Waste can be used in agriculture for good quality higher food production. In order to evaluate the effect and rate of processed industrial biomass on yield, contents, uptake and soil status in maize, a field experiment was conducted during 2009 - 2011 at Anand on loamy sand soil for two years. The treatments of different levels of NPK i.e. 100% RD, 75% RD and 50% RD were kept to study the possibility of reduction in fertilizer application with the use of processed biomass (BM) in different proportion with FYM. (Where, RD= Recommended dose, FYM= Farm Yard Manure, BM= Processed Biomass.) The significantly highest grain yield of maize was recorded under the treatment of 75% NPK + BM application @ 10t ha-1. The higher (10t ha-1) and lower (5t ha-1) application rate of BM with full dose of NPK was found beneficial being at par with the treatment 75% NPK along with BM application @ 10t ha-1. There is saving of 25% recommended dose of NPK when combined with BM application @ 10.0t ha-1 or 50% saving of organics when applied with full dose (100%) of NPK. The highest straw yield (7734 kg ha-1) of maize on pooled basis was observed under the treatment of recommended dose of NPK along with FYM application at 7.5t ha-1 coupled with BM application at 2.5t ha-1. It was also observed that highest straw yield was at par under all the treatments except control and application of 100% recommended dose of NPK coupled with BM application at 7.5t ha-1. The Fe content of maize straw were found altered significantly due to different treatments on pooled basis and it was noticed that biomass application at 7.5t ha-1 along with recommended dose of NPK showed significant enhancement in Fe content of straw over other treatments. Among heavy metals, Co, Pb and Cr contents of grain were found significantly altered due to application of different treatments variably during the pooled. While, Ni content of maize grain was not altered significantly due to application of different organics. However, at higher rate of BM application i.e. of 10t ha-1, there was slight increase in heavy metal content of grain/ straw as well as DTPA heavy metals in soil; although the increase was not alarming Thus, the overall results indicated that the application of BM at 5t ha-1 along with full dose of NPK is beneficial to get higher yield of maize without affecting soil / plant health adversely. It also indicated that the 5t BM ha-1 could be utilized in place of 10t FYM ha-1 where FYM availability is scarce. The 10t BM ha-1 helps to reduce a load of chemical fertilizer up to 25 percent in agriculture. The lower use of agro-chemicals always favors safe environment. However, the continuous use of biomass needs periodical monitoring to check any buildup of heavy metals in soil/ plant over the years.

Keywords: alternate use of industrial waste, heavy metals, maize, processed industrial biomass

Procedia PDF Downloads 321
1312 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 74
1311 Analysis of Genetic Variations in Camel Breeds (Camelus dromedarius)

Authors: Yasser M. Saad, Amr A. El Hanafy, Saleh A. Alkarim, Hussein A. Almehdar, Elrashdy M. Redwan

Abstract:

Camels are substantial providers of transport, milk, sport, meat, shelter, security and capital in many countries, particularly in Saudi Arabia. Inter simple sequence repeat technique was used to detect the genetic variations among some camel breeds (Majaheim, Safra, Wadah, and Hamara). Actual number of alleles, effective number of alleles, gene diversity, Shannon’s information index and polymorphic bands were calculated for each evaluated camel breed. Neighbor-joining tree that re-constructed for evaluated these camel breeds showed that, Hamara breed is distantly related from the other evaluated camels. In addition, the polymorphic sites, haplotypes and nucleotide diversity were identified for some camelidae cox1 gene sequences (obtained from NCBI). The distance value between C. bactrianus and C. dromedarius (0.072) was relatively low. Analysis of genetic diversity is an important way for conserving Camelus dromedarius genetic resources.

Keywords: camel, genetics, ISSR, neighbor-joining

Procedia PDF Downloads 470
1310 Assessment of Smart Mechatronics Application in Agriculture

Authors: Sairoel Amertet, Girma Gebresenbet

Abstract:

Smart mechatronics systems in agriculture can be traced back to the mid-1980s, when research into automated fruit harvesting systems began in Japan, Europe, and the United States. Since then, impressive advances have been made in smart mechatronics systems. Furthermore, smart mechatronics systems are promising areas, and as a result, we were intrigued to learn more about them. Consequently, the purpose of this study was to examine the smart mechatronic systems that have been applied to agricultural areas so far, with inspiration from the smart mechatronic system in other sectors. To get an overview of the current state of the art, benefits and drawbacks of smart mechatronics systems, various approaches were investigated. Moreover, smart mechatronic modules and various networks applied in agriculture processing were examined. Finally, we explored how the data retrieved using the one-way analysis of variance related to each other. The result showed that there were strongly related keywords for different journals. With the virtually limited use of sophisticated mechatronics in the agricultural industry and, at the same time, the low production rate, the demand for food security has fallen dramatically. Therefore, the application of smart mechatronics systems in agricultural sectors would be taken into consideration in order to overcome these issues.

Keywords: mechatronics, robotic, robotic system, automation, agriculture mechanism

Procedia PDF Downloads 79
1309 An Empirical Study of Determinants Influencing Telemedicine Services Acceptance by Healthcare Professionals: Case of Selected Hospitals in Ghana

Authors: Jonathan Kissi, Baozhen Dai, Wisdom W. K. Pomegbe, Abdul-Basit Kassim

Abstract:

Protecting patient’s digital information is a growing concern for healthcare institutions as people nowadays perpetually live their lives through telemedicine services. These telemedicine services have been confronted with several determinants that hinder their successful implementations, especially in developing countries. Identifying such determinants that influence the acceptance of telemedicine services is also a problem for healthcare professionals. Despite the tremendous increase in telemedicine services, its adoption, and use has been quite slow in some healthcare settings. Generally, it is accepted in today’s globalizing world that the success of telemedicine services relies on users’ satisfaction. Satisfying health professionals and patients are one of the crucial objectives of telemedicine success. This study seeks to investigate the determinants that influence health professionals’ intention to utilize telemedicine services in clinical activities in a sub-Saharan African country in West Africa (Ghana). A hybridized model comprising of health adoption models, including technology acceptance theory, diffusion of innovation theory, and protection of motivation theory, were used to investigate these quandaries. The study was carried out in four government health institutions that apply and regulate telemedicine services in their clinical activities. A structured questionnaire was developed and used for data collection. Purposive and convenience sampling methods were used in the selection of healthcare professionals from different medical fields for the study. The collected data were analyzed based on structural equation modeling (SEM) approach. All selected constructs showed a significant relationship with health professional’s behavioral intention in the direction expected from prior literature including perceived usefulness, perceived ease of use, management strategies, financial sustainability, communication channels, patients security threat, patients privacy risk, self efficacy, actual service use, user satisfaction, and telemedicine services systems securities threat. Surprisingly, user characteristics and response efficacy of health professionals were not significant in the hybridized model. The findings and insights from this research show that health professionals are pragmatic when making choices for technology applications and also their willingness to use telemedicine services. They are, however, anxious about its threats and coping appraisals. The identified significant constructs in the study may help to increase efficiency, quality of services, quality patient care delivery, and satisfactory user satisfaction among healthcare professionals. The implantation and effective utilization of telemedicine services in the selected hospitals will aid as a strategy to eradicate hardships in healthcare services delivery. The service will help attain universal health access coverage to all populace. This study contributes to empirical knowledge by identifying the vital factors influencing health professionals’ behavioral intentions to adopt telemedicine services. The study will also help stakeholders of healthcare to formulate better policies towards telemedicine service usage.

Keywords: telemedicine service, perceived usefulness, perceived ease of use, management strategies, security threats

Procedia PDF Downloads 140
1308 The Mediterranean Migration Crisis: The North East Hotspot Policy

Authors: Loizos A. Hadjivasiliou, May Chehab

Abstract:

Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.

Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area

Procedia PDF Downloads 176
1307 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 122
1306 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 286
1305 Internal Financing Constraints and Corporate Investment: Evidence from Indian Manufacturing Firms

Authors: Gaurav Gupta, Jitendra Mahakud

Abstract:

This study focuses on the significance of internal financing constraints on the determination of corporate fixed investments in the case of Indian manufacturing companies. Financing constraints companies which have less internal fund or retained earnings face more transaction and borrowing costs due to imperfections in the capital market. The period of study is 1999-2000 to 2013-2014 and we consider 618 manufacturing companies for which the continuous data is available throughout the study period. The data is collected from PROWESS data base maintained by Centre for Monitoring Indian Economy Pvt. Ltd. Panel data methods like fixed effect and random effect methods are used for the analysis. The Likelihood Ratio test, Lagrange Multiplier test, and Hausman test results conclude the suitability of the fixed effect model for the estimation. The cash flow and liquidity of the company have been used as the proxies for the internal financial constraints. In accordance with various theories of corporate investments, we consider other firm specific variable like firm age, firm size, profitability, sales and leverage as the control variables in the model. From the econometric analysis, we find internal cash flow and liquidity have the significant and positive impact on the corporate investments. The variables like cost of capital, sales growth and growth opportunities are found to be significantly determining the corporate investments in India, which is consistent with the neoclassical, accelerator and Tobin’s q theory of corporate investment. To check the robustness of results, we divided the sample on the basis of cash flow and liquidity. Firms having cash flow greater than zero are put under one group, and firms with cash flow less than zero are put under another group. Also, the firms are divided on the basis of liquidity following the same approach. We find that the results are robust to both types of companies having positive and negative cash flow and liquidity. The results for other variables are also in the same line as we find for the whole sample. These findings confirm that internal financing constraints play a significant role for determination of corporate investment in India. The findings of this study have the implications for the corporate managers to focus on the projects having higher expected cash inflows to avoid the financing constraints. Apart from that, they should also maintain adequate liquidity to minimize the external financing costs.

Keywords: cash flow, corporate investment, financing constraints, panel data method

Procedia PDF Downloads 241
1304 The Use of Artificial Intelligence in Digital Forensics and Incident Response in a Constrained Environment

Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane

Abstract:

Digital investigators often have a hard time spotting evidence in digital information. It has become hard to determine which source of proof relates to a specific investigation. A growing concern is that the various processes, technology, and specific procedures used in the digital investigation are not keeping up with criminal developments. Therefore, criminals are taking advantage of these weaknesses to commit further crimes. In digital forensics investigations, artificial intelligence is invaluable in identifying crime. It has been observed that an algorithm based on artificial intelligence (AI) is highly effective in detecting risks, preventing criminal activity, and forecasting illegal activity. Providing objective data and conducting an assessment is the goal of digital forensics and digital investigation, which will assist in developing a plausible theory that can be presented as evidence in court. Researchers and other authorities have used the available data as evidence in court to convict a person. This research paper aims at developing a multiagent framework for digital investigations using specific intelligent software agents (ISA). The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. A criminal investigation is classified quickly and efficiently using the case-based reasoning (CBR) technique. The MADIK is implemented using the Java Agent Development Framework and implemented using Eclipse, Postgres repository, and a rule engine for agent reasoning. The proposed framework was tested using the Lone Wolf image files and datasets. Experiments were conducted using various sets of ISA and VMs. There was a significant reduction in the time taken for the Hash Set Agent to execute. As a result of loading the agents, 5 percent of the time was lost, as the File Path Agent prescribed deleting 1,510, while the Timeline Agent found multiple executable files. In comparison, the integrity check carried out on the Lone Wolf image file using a digital forensic tool kit took approximately 48 minutes (2,880 ms), whereas the MADIK framework accomplished this in 16 minutes (960 ms). The framework is integrated with Python, allowing for further integration of other digital forensic tools, such as AccessData Forensic Toolkit (FTK), Wireshark, Volatility, and Scapy.

Keywords: artificial intelligence, computer science, criminal investigation, digital forensics

Procedia PDF Downloads 212
1303 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 130
1302 Design and Validation of the 'Teachers' Resilience Scale' for Assessing Protective Factors

Authors: Athena Daniilidou, Maria Platsidou

Abstract:

Resilience is considered to greatly affect the personal and occupational wellbeing and efficacy of individuals; therefore, it has been widely studied in the social and behavioral sciences. Given its significance, several scales have been created to assess resilience of children and adults. However, most of these scales focus on examining only the internal protective or risk factors that affect the levels of resilience. The aim of the present study is to create a reliable scale that assesses both the internal and the external protective factors that affect Greek teachers’ levels of resilience. Participants were 136 secondary school teachers (89 females, 47 males) from urban areas of Greece. Connor-Davidson Resilience Scale (CD-Risc) and Resilience Scale for Adults (RSA) were used to collect the data. First, exploratory factor analysis was employed to investigate the inner structure of each scale. For both scales, the analyses revealed a differentiated factor solution compared to the ones proposed by the creators. That prompt us to create a scale that would combine the best fitting subscales of the CD-Risc and the RSA. To this end, the items of the four factors with the best fit and highest reliability were used to create the ‘Teachers' resilience scale’. Exploratory factor analysis revealed that the scale assesses the following protective/risk factors: Personal Competence and Strength (9 items, α=.83), Family Cohesion Spiritual Influences (7 items, α=.80), Social Competence and Peers Support (7 items, α=.78) and Spiritual Influence (3 items, α=.58). This four-factor model explained 49,50% of the total variance. In the next step, a confirmatory factor analysis was performed on the 26 items of the derived scale to test the above factor solution. The fit of the model to the data was good (χ2/292 = 1.245, CFI = .921, GFI = .829, SRMR = .074, CI90% = .026-,056, RMSEA = 0.43), indicating that the proposed scale can validly measure the aforementioned four aspects of teachers' resilience and thus confirmed its factorial validity. Finally, analyses of variance were performed to check for individual differences in the levels of teachers' resilience in relation to their gender, age, marital status, level of studies, and teaching specialty. Results were consistent to previous findings, thus providing an indication of discriminant validity for the instrument. This scale has the advantage of assessing both the internal and the external protective factors of resilience in a brief yet comprehensive way, since it consists 26 items instead of the total of 58 of the CD-Risc and RSA scales. Its factorial inner structure is supported by the relevant literature on resilience, as it captures the major protective factors of resilience identified in previous studies.

Keywords: protective factors, resilience, scale development, teachers

Procedia PDF Downloads 295
1301 Economic and Social Well-Being for Migrant Workers: Asian Experiences

Authors: Mohsin Reza, Thirunaukarasu Subramaniam, M. Rezaul Islam

Abstract:

In Asia, economic and social well-being issues are rarely addressed. The major characteristics of the migrant workers in Asian countries are seriously exploited, marginalized, and infrequently looked from human rights perspective. This paper explored the opportunities and shortages of economic and social well-being for the migrant workers in Asia. A Qualitative Interpretative Meta-Synthesis (QIMS) was conducted to analyze the contextual socio-economic factors that characterized migrant workers’ economic and social well-being. It is perceived that in most of the recruiting countries, there are lacks of government commitments to the international protocols, conventions and laws that they ratified towards safeguarding migrant workers’ economic and social well-being. Results showed that the migrant workers had lack of job security, poor salary, long working hours, low access to the public services, poor health, poor living and working conditions, lack of legal rights, physical and mental threats. The finding would be important guideline to the governments, policy makers, legal rights practitioners, and human rights organizations.

Keywords: Asia, economic well-being, social well-being, migrant workers, human rights

Procedia PDF Downloads 322
1300 Security Over OFDM Fading Channels with Friendly Jammer

Authors: Munnujahan Ara

Abstract:

In this paper, we investigate the effect of friendly jamming power allocation strategies on the achievable average secrecy rate over a bank of parallel fading wiretap channels. We investigate the achievable average secrecy rate in parallel fading wiretap channels subject to Rayleigh and Rician fading. The achievable average secrecy rate, due to the presence of a line-of-sight component in the jammer channel is also evaluated. Moreover, we study the detrimental effect of correlation across the parallel sub-channels, and evaluate the corresponding decrease in the achievable average secrecy rate for the various fading configurations. We also investigate the tradeoff between the transmission power and the jamming power for a fixed total power budget. Our results, which are applicable to current orthogonal frequency division multiplexing (OFDM) communications systems, shed further light on the achievable average secrecy rates over a bank of parallel fading channels in the presence of friendly jammers.

Keywords: fading parallel channels, wire-tap channel, OFDM, secrecy capacity, power allocation

Procedia PDF Downloads 501
1299 Implementation of Enhanced Recovery after Cesarean Section at Koidu Government Hospital, Sierra Leone 2024. A Quality Improvement Project.

Authors: Hailemariam Getachew, John Sandi, Isata Dumbuya, Patricia Efe.Azikiwe, Evaline Nginge, Moses Mugisha, Eseoghene Dase, Foday Mandaray, Grace Moore

Abstract:

Enhanced recovery after cesarean section (ERAC) is a standardized peri- operative care program that comprises the multidisciplinary team's collective efforts working in collaboration throughout the peri-operative period with the principal goal to improve quality of surgical care, decrease surgical related complications, and increasing patient satisfaction. Objective: The main objective of this project is to improve the implementation of enhanced recovery after cesarean section at Koidu Government hospital. Identified gap: Even though the hospital is providing comprehensive maternal and child care service, there are gaps in the implementation of ERAC. According to our survey, we found that there is low (13.3%) utilization of WHO surgical safety checklist, only limited (15.9%) patients get opioid free analgesia, pain was not recorded as a vital sign, there is no standardized checklist for hand over to and from Post Anesthesia care Unit(PACU). Furthermore, there is inconsistent evidence based post-operative care and there is no local consensus protocol and guideline as well. Implementation plan: we aimed at designing standardized protocol, checklist and guideline, provide training, build staff capacity, document pain as vital sign, perform regional analgesia, and provide evidence based post-operative care, monitoring and evaluation. Result: Data from 389 cesarean mothers showed that, Utilization of the WHO surgical safety check list found to be 95%, and pain assessment and documentation was done for all surgical patients. Oral feeding, ambulation and catheter removal was performed as per the ERAC standard for all patients. Postoperative complications drastically decreased from 13.6% to 8.1%. While, the rate of readmission was kept below 1%. Furthermore, the duration of hospital stay decreased from 4.64 days to 3.12 days. Conclusion The successful implementation of ERAC protocols demonstrates through this Quality Improvement Project that, the effectiveness of the protocols in improving recovery and patient outcome following cesarean section.

Keywords: cesarean delivery, enhanced recovery, quality improvement, patient outcome

Procedia PDF Downloads 10
1298 The Role of Regional Economic Communities in Fighting Terrorism in Africa: The Case of Inter-Governmental Authority on Development (IGAD)

Authors: Memar Ayalew Demeke, Solomon Gebreyohans Gebru

Abstract:

In Africa, Regional Economic Communities (RECs) were initially established to tackle the economic challenges of the continent. However, overtime, they expanded their mandate to deal with the security threats of the continent such as terrorism. In fact, the fight against terrorism has been internationalized following the September 9/11 terrorist attack in the U.S.A. Since then, RECs have been giving considerable attention to preventing and combating terrorism in their respective regions. Similarly, IGAD has been involved in preventing and combating terrorism. So far, however, little has been done with regard to what IGAD has performed in fighting terrorism. Therefore, this study was intended to describe and analyze the legal and practical activities carried out by IGAD in its fight against terrorism in the region general and in Somalia in particular. Both descriptive and analytical methods were employed and data were analyzed through qualitative approach. Finally, based on the findings, the study argues that, instead of over-reliance on hard power as a means of fighting terrorism, IGAD should invest more on the political and socio-economic problems of its member states so as to address the root causes.

Keywords: regional economic communities, IGAD, terrorism, treaties, conventions

Procedia PDF Downloads 427
1297 Local Binary Patterns-Based Statistical Data Analysis for Accurate Soccer Match Prediction

Authors: Mohammad Ghahramani, Fahimeh Saei Manesh

Abstract:

Winning a soccer game is based on thorough and deep analysis of the ongoing match. On the other hand, giant gambling companies are in vital need of such analysis to reduce their loss against their customers. In this research work, we perform deep, real-time analysis on every soccer match around the world that distinguishes our work from others by focusing on particular seasons, teams and partial analytics. Our contributions are presented in the platform called “Analyst Masters.” First, we introduce various sources of information available for soccer analysis for teams around the world that helped us record live statistical data and information from more than 50,000 soccer matches a year. Our second and main contribution is to introduce our proposed in-play performance evaluation. The third contribution is developing new features from stable soccer matches. The statistics of soccer matches and their odds before and in-play are considered in the image format versus time including the halftime. Local Binary patterns, (LBP) is then employed to extract features from the image. Our analyses reveal incredibly interesting features and rules if a soccer match has reached enough stability. For example, our “8-minute rule” implies if 'Team A' scores a goal and can maintain the result for at least 8 minutes then the match would end in their favor in a stable match. We could also make accurate predictions before the match of scoring less/more than 2.5 goals. We benefit from the Gradient Boosting Trees, GBT, to extract highly related features. Once the features are selected from this pool of data, the Decision trees decide if the match is stable. A stable match is then passed to a post-processing stage to check its properties such as betters’ and punters’ behavior and its statistical data to issue the prediction. The proposed method was trained using 140,000 soccer matches and tested on more than 100,000 samples achieving 98% accuracy to select stable matches. Our database from 240,000 matches shows that one can get over 20% betting profit per month using Analyst Masters. Such consistent profit outperforms human experts and shows the inefficiency of the betting market. Top soccer tipsters achieve 50% accuracy and 8% monthly profit in average only on regional matches. Both our collected database of more than 240,000 soccer matches from 2012 and our algorithm would greatly benefit coaches and punters to get accurate analysis.

Keywords: soccer, analytics, machine learning, database

Procedia PDF Downloads 238
1296 Emotion Expression of the Leader and Collective Efficacy: Pride and Guilt

Authors: Hsiu-Tsu Cho

Abstract:

Collective efficacy refers to a group’s sense of its capacity to complete a task successfully or to reach objectives. Little effort has been expended on investigating the relationship between the emotion expression of a leader and collective efficacy. In this study, we examined the impact of the different emotions and emotion expression of a group leader on collective efficacy and explored whether the emotion–expressive effects differed under conditions of negative and positive emotions. A total of 240 undergraduate and graduate students recruited using Facebook and posters at a university participated in this research. The participants were separated randomly into 80 groups of four persons consisting of three participants and a confederate. They were randomly assigned to one of five conditions in a 2 (pride vs. guilt) × 2 (emotion expression of group leader vs. no emotion expression of group leader) factorial design and a control condition. Each four-person group was instructed to get the reward in a group competition of solving the five-disk Tower of Hanoi puzzle and making decisions on an investment case. We surveyed the participants by employing the emotional measure revised from previous researchers and collective efficacy questionnaire on a 5-point scale. To induce an emotion of pride (or guilt), the experimenter announced whether the group performance was good enough to have a chance of getting the reward (ranking the top or bottom 20% among all groups) after group task. The leader (confederate) could either express or not express a feeling of pride (or guilt) following the instruction according to the assigned condition. To check manipulation of emotion, we added a control condition under which the experimenter revealed no results regarding group performance in maintaining a neutral emotion. One-way ANOVAs and post hoc pairwise comparisons among the three emotion conditions (pride, guilt, and control condition) involved assigning pride and guilt scores (pride: F(1,75) = 32.41, p < .001; guilt: F(1,75) = 6.75, p < .05). The results indicated that manipulations of emotion were successful. A two-way between-measures ANOVA was conducted to examine the predictions of the main effects of emotion types and emotion expression as well as the interaction effect of these two variables on collective efficacy. The experimental findings suggest that pride did not affect collective efficacy (F(1,60) = 1.90, ns.) more than guilt did and that the group leader did not motivate collective efficacy regardless of whether he or she expressed emotion (F(1,60) = .89, ns.). However, the interaction effect of emotion types and emotion expression was statistically significant (F(1,60) = 4.27, p < .05, ω2 = .066); the effects accounted for 6.6% of the variance. Additional results revealed that, under the pride condition, the leader enhanced group efficacy when expressing emotion, whereas, under the guilt condition, an expression of emotion could reduce collective efficacy. Overall, these findings challenge the assumption that the effect of expression emotion are the same on all emotions and suggest that a leader should be cautious when expressing negative emotions toward a group to avoid reducing group effectiveness.

Keywords: collective efficacy, group leader, emotion expression, pride, guilty

Procedia PDF Downloads 328
1295 Spatial-Temporal Awareness Approach for Extensive Re-Identification

Authors: Tyng-Rong Roan, Fuji Foo, Wenwey Hseush

Abstract:

Recent development of AI and edge computing plays a critical role to capture meaningful events such as detection of an unattended bag. One of the core problems is re-identification across multiple CCTVs. Immediately following the detection of a meaningful event is to track and trace the objects related to the event. In an extensive environment, the challenge becomes severe when the number of CCTVs increases substantially, imposing difficulties in achieving high accuracy while maintaining real-time performance. The algorithm that re-identifies cross-boundary objects for extensive tracking is referred to Extensive Re-Identification, which emphasizes the issues related to the complexity behind a great number of CCTVs. The Spatial-Temporal Awareness approach challenges the conventional thinking and concept of operations which is labor intensive and time consuming. The ability to perform Extensive Re-Identification through a multi-sensory network provides the next-level insights – creating value beyond traditional risk management.

Keywords: long-short-term memory, re-identification, security critical application, spatial-temporal awareness

Procedia PDF Downloads 111
1294 The Effect of Artificial Intelligence on Human Rights Resources and Development

Authors: Tharwat Girgis Farag Girgis

Abstract:

The link between development and human rights has long been the subject of scholarly debate. As a result, a number of principles have been adopted, from the right to development to the human rights-based development approach, to understand the dynamics between the two concepts. Despite the initiatives taken, the exact relationship between development and human rights remains unclear. However, the rapprochement between the two concepts and the need for development efforts regarding human rights have increased in recent years. On the other hand, the emergence of sustainable development as an acceptable method in development goals and policies makes this consensus even more unstable. The place of sustainable development in the legal debate on human rights and its role in promoting sustainable development programs require further research. Therefore, this article attempts to map the relationship between development and human rights, with particular emphasis on the place given to sustainable development principles in international human rights law. It will continue to investigate whether it recognizes sustainable development rights. The article will therefore give a positive answer to question mentioned here. The jurisprudence and interpretive guidelines of human rights institutions travel to confirm this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 53
1293 Assessing Bus Service Quality in Dhaka City from the Perspective of Female Passengers

Authors: S. K. Subah, R. Tasnim, M. I. Jahan, M. R. Islam

Abstract:

While talking about how comfortable and convenient Dhaka's bus service is, the minimum emphasis is placed on the female commuters of the Dhaka city. Recognizing the contemporary situation, the supreme focus is to develop experimental model based on statistical methods. SEM has been adopted to quantify passenger satisfaction, which is affected by the perceived service quality. The study deals with 16 observed variables and three latent variables, which were correlated to identify their significance on the regulation of perceived SQ (Service Quality). To calibrate the model, a dataset of 250 responses from female users of local buses has been utilized through survey. A questionnaire structured with SQ variables was prepared in consultation with prevailing literature, practitioners, academicians, and users. The result concludes that the attributes of safe and secured environment have the most significant impact on the overall bus service quality according to the insight of female respondents. The study outcome might be a great help for the policymakers, women's organizations, and NGOs to formulate transport policy that will ensure a women-friendly public bus service.

Keywords: bus service quality, female perception, structural equation modelling, safety-security, women friendly bus

Procedia PDF Downloads 154
1292 Analyzing Current Transformer’s Transient and Steady State Behavior for Different Burden’s Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, D. Sharma

Abstract:

Current transformers (CTs) are used to transform large primary currents to a small secondary current. Since most standard equipment’s are not designed to handle large primary currents the CTs have an important part in any electrical system for the purpose of Metering and Protection both of which are integral in Power system. Now a days due to advancement in solid state technology, the operation times of the protective relays have come to a few cycles from few seconds. Thus, in such a scenario it becomes important to study the transient response of the current transformers as it will play a vital role in the operating of the protective devices. This paper shows the steady state and transient behavior of current transformers and how it changes with change in connected burden. The transient and steady state response will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer characteristics with changes in burden will be discussed.

Keywords: accuracy, accuracy limiting factor, burden, current transformer, instrument security factor

Procedia PDF Downloads 341
1291 Development of Educational Institutions in Afghanistan and Especially in the Region of “Herat” Opportunities and Challenges

Authors: Sayed Jamal Ud Din Heravi

Abstract:

The development of educational institutions has an important role in the progress and advancement of the state, in the stability and security of the state and its exposure, in the flourishing of minds, in devoting the role of science, developing society, and meeting people’s desires and needs. Afghanistan is a Muslim country located in Central Asia on the borders of Pakistan, Iran, Tajikistan, and Uzbekistan, and it also borders China's Xing yang. Unfortunately, these oppressed people have been living in wars that have been going on for four decades, in which educational institutions, schools and institutes have not developed. Rather, the war destroyed the infrastructure of this country, and no city or village remained in it but tasted the bloody wars. Now with the new government, we see that many government educational institutions are closed in this country, even if the state promises that it will open them quickly. As for universities and private institutions, they work in Afghanistan diligently and diligently, and among them, there is sharp competition in the use of professors and taking advantage of the available means for the sake of knowledge. It laid the building blocks for a bright dawn in which it seeks to keep pace with the procession of development and prosperity in the world.

Keywords: Afghanistan, higher education, Herat province, opportunities, challenges

Procedia PDF Downloads 119
1290 Biocontrol Potential of Trichoderma longibrachiatum as an Entomopathogenic Fungi against Bemisia tabaci

Authors: Waheed Anwar, Kiran Nawaz, Muhammad Saleem Haider, Ahmad Ali Shahid, Sehrish Iftikhar

Abstract:

The whitefly, Bemisia tabaci (Gennadius), is a complex insect species, including many cryptic species or biotypes. Whitefly causes damage to many ornamental and horticultural crops through directly feeding on phloem sap, resulting in sooty mould and critically decreases the rate of photosynthesis of many host plants. Biological control has emerged as one of the most important methods for the management of soil-borne plant pathogens. Among the natural enemies of insects different entomopathogenic fungi are mostly used as biological control of the pest. The purpose of this research was to find indigenous insect-associated fungi and their virulence against Bemisia tabaci. A detailed survey of cotton fields in sample collection was conducted during July and August 2013 from the central mixed zone of Punjab, Pakistan. For the isolation of T. longibrachiatum, sabouraud dextrose peptone yeast extract agar (SDAY) media was used and morphological characterization of isolated T. longibrachiatum was studied using different dichotomous keys. Molecular Identification of the pathogen was confirmed by amplifying the internal transcribed spacer region. Blastn analysis showed 100% homology with already reported sequences on the database. For these bioassays, two conidial concentrations 4 × 108/mL & 4 × 104/mL of T. longibrachiatum was sprayed in clip cages for nymph and adult B. tabaci respectively under controlled environmental conditions. The pathogenicity of T. longibrachiatum was tested on nymph and adult whitefly to check mortality. Mortality of B. tabaci at nymphal and adult stages were observed after 24-hour intervals. Percentage mortality of nymphs treated with 4 x 104/mL conidia of T. longibrachiatum was 20, 24, 36 and 40% after 48, 72, 96, 72, 96, 120 and 144 hours respectively. However, no considerable difference was recorded in percentage mortality of whitefly after 120 and 144 hours. There were great variations after 24, 48, 72 and 96 hours in the rate of mortality. The efficacy of T. longibrachiatum as entomopathogenic fungi was evaluated in adult and nymphal stages of whitefly. Trichoderma longibrachiatum showed maximum activity on nymphal stages of whitefly as compared to adult stages. The percentage of conidial germination was also recorded on the outer surface of adult and nymphal stages of B. tabaci. The present findings indicated that T. longibrachiatum is an entomopathogenic fungus against B. tabaci and many species of Trichoderma were already reported as an antagonistc organism against a wide range of bacterial and fungal pathogens.

Keywords: efficacy, Trichoderma, virulence, bioassay

Procedia PDF Downloads 286
1289 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 67
1288 Building Information Modelling: A Review to Indian Scenario

Authors: P. Agnivesh, P. V. Ponambala Moorthi

Abstract:

Evolution of information modelling leads to the visualisation of well-organized built environment. Building Information Modelling (BIM) is considered as evolution in the off-site construction which essentially enhances and controls the present scenario of on-site construction paradigms. Promptness, sustainability and security are considered as the important characteristics of the building information modelling. Projects that uses BIM are tied firmly by technology but distributed organizationally. This allows different team members in the project to associate and integrate the works and work flows. This will in turn improve the efficiency of work breakdown structure. Internationally BIM had been accepted as modern computer aided way of information sharing by construction industry for efficient way of manipulation in order to avoid the on-site misperceptions. Even though, in developing countries like India BIM is in the phase of start and requires lot of mandates and policies to be brought about by the government for its widespread implementations. This paper reviews the current scenario of BIM worldwide and in India and suggests for the improved implementation of building modelling for Indian policy condition.

Keywords: building information modelling, Indian polity, information modelling, information sharing, mandates and policies, sustainability.

Procedia PDF Downloads 373
1287 Fahr Dsease vs Fahr Syndrome in the Field of a Case Report

Authors: Angelis P. Barlampas

Abstract:

Objective: The confusion of terms is a common practice in many situations of the everyday life. But, in some circumstances, such as in medicine, the precise meaning of a word curries a critical role for the health of the patient. Fahr disease and Fahr syndrome are often falsely used interchangeably, but they are two different conditions with different physical histories of different etiology and different medical management. A case of the seldom Fahr disease is presented, and a comparison with the more common Fahr syndrome follows. Materials and method: A 72 years old patient came to the emergency department, complaining of some kind of non specific medal disturbances, like anxiety, difficulty of concentrating, and tremor. The problems had a long course, but he had the impression of getting worse lately, so he decided to check them. Past history and laboratory tests were unremarkable. Then, a computed tomography examination was ordered. Results: The CT exam showed bilateral, hyperattenuating areas of heavy, dense calcium type deposits in basal ganglia, striatum, pallidum, thalami, the dentate nucleus, and the cerebral white matter of frontal, parietal and iniac lobes, as well as small areas of the pons. Taking into account the absence of any known preexisting illness and the fact that the emergency laboratory tests were without findings, a hypothesis of the rare Fahr disease was supposed. The suspicion was confirmed with further, more specific tests, which showed the lack of any other conditions which could probably share the same radiological image. Differentiating between Fahr disease and Fahr syndrome. Fahr disease: Primarily autosomal dominant Symmetrical and bilateral intracranial calcifications The patient is healthy until the middle age Absence of biochemical abnormalities. Family history consistent with autosomal dominant Fahr syndrome :Earlier between 30 to 40 years old. Symmetrical and bilateral intracranial calcifications Endocrinopathies: Idiopathic hypoparathyroidism, secondary hypoparathyroidism, hyperparathyroidism, pseudohypoparathyroidism ,pseudopseudohypoparathyroidism, e.t.c The disease appears at any age There are abnormal laboratory or imaging findings. Conclusion: Fahr disease and Fahr syndrome are not the same illness, although this is not well known to the inexperienced doctors. As clinical radiologists, we have to inform our colleagues that a radiological image, along with the patient's history, probably implies a rare condition and not something more usual and prompt the investigation to the right route. In our case, a genetic test could be done earlier and reveal the problem, and thus avoiding unnecessary and specific tests which cost in time and are uncomfortable to the patient.

Keywords: fahr disease, fahr syndrome, CT, brain calcifications

Procedia PDF Downloads 61
1286 IoT Based Information Processing and Computing

Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed

Abstract:

The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.

Keywords: IoT, computing, information processing, Iot computing

Procedia PDF Downloads 183
1285 Can Urbanisation Be the Cause for Increasing Urban Poverty: An Exploratory Analysis for India

Authors: Sarmistha Singh

Abstract:

An analysis of trend of urbanization and urban poverty in recent decades is showing that a distinctly reducing rural poverty and increasing in urban areas. It can be argued that the higher the urbanization fuelled by the urban migration to city, which is picking up people from less skilled, education so they faced obstacle to enter into the mainstream economy of city. The share of workforce in economy is higher; in contrast it remains as negligence. At the same time, less wages, absence of social security, social dialogue make them insecure. The vulnerability in their livelihood found. So the paper explores the relation of urbanization and urban poverty in the city, in other words how the urbanization process affecting the urban space in creating the number of poor people in the city. The central focus is the mobility of people with less education and skilled with motive of job search and better livelihood. In many studies found the higher the urbanization and higher the urban poverty in city. In other words, poverty is the impact of urbanization. The strategy of urban inequality through ‘dispersal of concentration’ by the World Bank and others, need to be examined.

Keywords: urbanization, mobility, urban poverty, informal settlements, informal worker

Procedia PDF Downloads 412