Search results for: enhancing security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4790

Search results for: enhancing security

2390 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis

Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng

Abstract:

Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.

Keywords: attribution trace, probabilistic relevance, network attack, attacker identification

Procedia PDF Downloads 362
2389 Sediment Trapping by Seagrass Blades under Oscillatory Flow

Authors: Aina Barcelona, Carolyn Oldham, Jordi Colomer, Jordi Garcia-Orellana, Teresa Serra

Abstract:

Seagrass meadows increase the sedimentation within the canopy. However, there is still a lack of knowledge about how seagrasses impact the vertical distribution of sediment coming from external sources and reaches the meadow. This study aims to determine the number of particles retained by a seagrass meadow. Based on the hydrodynamics in the vertical direction, a meadow can be separated into different compartments: the blades, the seabed, within the canopy layer, and the above canopy layer. A set of laboratory experiments were conducted under different hydrodynamic conditions and canopy densities with the purpose to mimic the real field conditions. This study demonstrates and quantifies that seagrass meadows decrease the volume of the suspended sediment by two mechanisms: capturing the suspended sediment by the seagrass blades and promoting the particle sedimentation to the seabed. This study also demonstrates that the number of sediment particles trapped by single seagrass blades decreases with canopy density. However, when considering the trapping by the total number of blades, the sediment captured by all the blades of the meadow increases with canopy density. Furthermore, comparing with the bare seabed, this study demonstrated that there is a reduction in the suspended particles within the canopy, which implies an improvement in the water clarity. In addition, the particle sedimentation on the seabed increases with the canopy density compared with the bare seabed, making evident the contribution of the vegetation in enhancing sedimentation.

Keywords: seagrass, sediment capture, turbulent kinetic energy, oscillatory flow

Procedia PDF Downloads 233
2388 Memorabilia of Suan Sunandha through Interactive User Interface

Authors: Nalinee Sophatsathit

Abstract:

The objectives of memorabilia of Suan Sunandha are to develop a general knowledge presentation about the historical royal garden through interactive graphic simulation technique and to employ high-functionality context in enhancing interactive user navigation. The approach infers non-intrusive display of relevant history in response to situational context. User’s navigation runs through the virtual reality campus, consisting of new and restored buildings. A flash back presentation of information pertaining to the history in the form of photos, paintings, and textual descriptions are displayed along each passing-by building. To keep the presentation lively, graphical simulation is created in a serendipity game play so that the user can both learn and enjoy the educational tour. The benefits of this human-computer interaction development are two folds. First, lively presentation technique and situational context modeling are developed that entail a usable paradigm of knowledge and information presentation combinations. Second, cost effective training and promotion for both internal personnel and public visitors to learn and keep informed of this historical royal garden can be furnished without the need for a dedicated public relations service. Future improvement on graphic simulation and ability based display can extend this work to be more realistic, user-friendly, and informative for all.

Keywords: interactive user navigation, high-functionality context, situational context, human-computer interaction

Procedia PDF Downloads 355
2387 Comparative Life Cycle Assessment of an Extensive Green Roof with a Traditional Gravel-Asphalted Roof: An Application for the Lebanese Context

Authors: Makram El Bachawati, Rima Manneh, Thomas Dandres, Carla Nassab, Henri El Zakhem, Rafik Belarbi

Abstract:

A vegetative roof, also called a garden roof, is a "roofing system that endorses the growth of plants on a rooftop". Garden roofs serve several purposes for a building, such as embellishing the roofing system, enhancing the water management, and reducing the energy consumption and heat island effects. Lebanon is a Middle East country that lacks the use of a sustainable energy system. It imports 98% of its non-renewable energy from neighboring countries and suffers flooding during heavy rains. The objective of this paper is to determine if the implementation of vegetative roofs is effectively better than the traditional roofs for the Lebanese context. A Life Cycle Assessment (LCA) is performed in order to compare an existing extensive green roof to a traditional gravel-asphalted roof. The life cycle inventory (LCI) was established and modeled using the SimaPro 8.0 software, while the environmental impacts were classified using the IMPACT 2002+ methodology. Results indicated that, for the existing extensive green roof, the waterproofing membrane and the growing medium were the highest contributors to the potential environmental impacts. When comparing the vegetative to the traditional roof, results showed that, for all impact categories, the extensive green roof had the less environmental impacts.

Keywords: life cycle assessment, green roofs, vegatative roof, environmental impact

Procedia PDF Downloads 459
2386 Influence of Branding and Consultancy Services on the Performance of Coaches, Athletes and Sports Managers in Nigeria

Authors: Yakubu Nkom Bityong, A. I. Kabido, K. Venkateswarlu

Abstract:

The influence of branding and consultancy services on sports development and marketing mix has been a matter of interest among coaches athletes and sports managers in Nigeria. Marketers use sports as a promotional vehicle towards attracting customers to their products and services. The use of images, names, and photographs of sports personalities to advertise beverages, cars, and a whole range of other products and services as it is clearly noticed all over the television, radio and print media has generated a lot of argument among consumers who have vested interest and are more drawn to their favorite teams and sports personalities than they are to many company products This paper examines the influence of branding and consultancy services on sports Performance of coaches, athletes and sports managers in Nigeria. From a population of 7,441 made up of coaches, athletes and sports managers, 372 respondents were sampled for the study. A self developed and standardized questionnaire was the instrument used for data collection. One-tailed t-test was used to test the hypothesis. Results revealed that branding and consultancy services influence the performances of coaches, athletes and sports managers in Nigeria. It was concluded that the establishment of the National Institute of Sports (NIS) in Lagos with affiliated sports training programmes in Nigerian Universities is responsible for boosting the performance of sports personalities in Nigeria. It was recommended that National Policy on Sports should be reviewed in order to inculcate new methods and strategies towards enhancing sports development initiatives in the country while stakeholders should intensify regular training and retraining programmes for coaches, athletes and sports managers to update their knowledge and skills.

Keywords: branding, consultancy, sports performance, sports development

Procedia PDF Downloads 381
2385 Psychosocial Processes and Strategies behind Islamic Deradicalisation: A Scoping Review

Authors: Carvalho M. Catia, Pinto R. Isabel, Azevedo F. Luis, Guerreiro, T. Alexandre, Barbosa R. Mariana, Pinto S. Marta

Abstract:

Due to the loss of territory, foreign terrorist fighters who have joined Islamic State are returning to their home countries. In order to counter this threat to international security, it is important to implement deradicalisation programmes, through strategies and processes that can reverse radicalisation. The objectives of this scoping review - which is underway - are to provide a comprehensive overview of the programmes being implemented, its main characteristics, the main motives and processes leading to deradicalisation, and to identify the key findings and the existing gaps in the literature. The methodology to be implemented in this scoping review follows the guidelines proposed by Arksey and O’Malley and by The Joanna Briggs Institute. The main results will be the development of a synthesis map of the deradicalisation programmes existing in the world, its main features, and recommendations to policy-makers and professionals.

Keywords: deradicalisation strategies, psychosocial processes, radicalisation, terrorism

Procedia PDF Downloads 387
2384 Hybrid Obfuscation Technique for Reverse Engineering Problem

Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro

Abstract:

Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.

Keywords: intellectual property, obfuscation, software security, reverse engineering

Procedia PDF Downloads 143
2383 Advanced Data Visualization Techniques for Effective Decision-making in Oil and Gas Exploration and Production

Authors: Deepak Singh, Rail Kuliev

Abstract:

This research article explores the significance of advanced data visualization techniques in enhancing decision-making processes within the oil and gas exploration and production domain. With the oil and gas industry facing numerous challenges, effective interpretation and analysis of vast and diverse datasets are crucial for optimizing exploration strategies, production operations, and risk assessment. The article highlights the importance of data visualization in managing big data, aiding the decision-making process, and facilitating communication with stakeholders. Various advanced data visualization techniques, including 3D visualization, augmented reality (AR), virtual reality (VR), interactive dashboards, and geospatial visualization, are discussed in detail, showcasing their applications and benefits in the oil and gas sector. The article presents case studies demonstrating the successful use of these techniques in optimizing well placement, real-time operations monitoring, and virtual reality training. Additionally, the article addresses the challenges of data integration and scalability, emphasizing the need for future developments in AI-driven visualization. In conclusion, this research emphasizes the immense potential of advanced data visualization in revolutionizing decision-making processes, fostering data-driven strategies, and promoting sustainable growth and improved operational efficiency within the oil and gas exploration and production industry.

Keywords: augmented reality (AR), virtual reality (VR), interactive dashboards, real-time operations monitoring

Procedia PDF Downloads 81
2382 The Importance of Fire Safety in Egypt

Authors: Omar Shakra

Abstract:

This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.

Keywords: fire, system, protection, fire hydrants, security, alarms

Procedia PDF Downloads 103
2381 Denoising Transient Electromagnetic Data

Authors: Lingerew Nebere Kassie, Ping-Yu Chang, Hsin-Hua Huang, , Chaw-Son Chen

Abstract:

Transient electromagnetic (TEM) data plays a crucial role in hydrogeological and environmental applications, providing valuable insights into geological structures and resistivity variations. However, the presence of noise often hinders the interpretation and reliability of these data. Our study addresses this issue by utilizing a FASTSNAP system for the TEM survey, which operates at different modes (low, medium, and high) with continuous adjustments to discretization, gain, and current. We employ a denoising approach that processes the raw data obtained from each acquisition mode to improve signal quality and enhance data reliability. We use a signal-averaging technique for each mode, increasing the signal-to-noise ratio. Additionally, we utilize wavelet transform to suppress noise further while preserving the integrity of the underlying signals. This approach significantly improves the data quality, notably suppressing severe noise at late times. The resulting denoised data exhibits a substantially improved signal-to-noise ratio, leading to increased accuracy in parameter estimation. By effectively denoising TEM data, our study contributes to a more reliable interpretation and analysis of underground structures. Moreover, the proposed denoising approach can be seamlessly integrated into existing ground-based TEM data processing workflows, facilitating the extraction of meaningful information from noisy measurements and enhancing the overall quality and reliability of the acquired data.

Keywords: data quality, signal averaging, transient electromagnetic, wavelet transform

Procedia PDF Downloads 80
2380 Technology Impact on the Challenge between Human Rights and Cyber Terrorism

Authors: Abanoub Zare Zakaria Herzalla

Abstract:

The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 43
2379 Overview of Wireless Body Area Networks

Authors: Rashi Jain

Abstract:

The Wireless Body Area Networks (WBANs) is an emerging interdisciplinary area where small sensors are placed on/within the human body. These sensors monitor the physiological activities and vital statistics of the body. The data from these sensors is aggregated and communicated to a remote doctor for immediate attention or to a database for records. On 6 Feb 2012, the IEEE 802.15.6 task group approved the standard for Body Area Network (BAN) technologies. The standard proposes the physical and MAC layer for the WBANs. The work provides an introduction to WBANs and overview of the physical and MAC layers of the standard. The physical layer specifications have been covered. A comparison of different protocols used at MAC layer is drawn. An introduction to the network layer and security aspects of the WBANs is made. The WBANs suffer certain limitations such as regulation of frequency bands, minimizing the effect of transmission and reception of electromagnetic signals on the human body, maintaining the energy efficiency among others. This has slowed down their implementation.

Keywords: vehicular networks, sensors, MicroController 8085, LTE

Procedia PDF Downloads 258
2378 Role of Corporate Social Responsibility in Corporate Governance: Effectiveness of CSR in Human Rights

Authors: Md. Awal Hossain Mollah

Abstract:

Corporate governance is playing a crucial role for ensuring social accountability and responsibility of business organization through Corporate Social Responsibility (CSR) for the last two decades. In Bangladesh, CSR is a growing and popular concept and a recent development. Various business and corporate organizations are playing crucial role for helping vulnerable sections of our society now. For instance, Dutch Bangla Bank has been providing scholarship for under graduate and graduate students in our country which is very helpful for promoting poor and meritorious students in Bangladesh. In this study, how far CSR is playing its role for ensuring human right in Bangladesh will be examined with specific case studies. The study focus will reflect on both developed and developing nations based on literature review and possible empirical evidence.

Keywords: CSR, corporate governance, social security, Bangladesh, scholarships, graduate students, Dutch angla Bank

Procedia PDF Downloads 358
2377 Large Eddy Simulation Approach for Unsteady Analysis of the Flow Behavior inside a Dual Counter Rotating Axial Swirler

Authors: Foad Vashahi, Shahnaz Rezaei, Jeekeun Lee

Abstract:

Large Eddy Simulation (LES) was performed on a dual counter rotating axial swirler in a confined rectangular configuration. Grids were constructed based on a primary Reynolds Averaged Navier-Stokes (RANS) simulation and then were refined based on the Kolmogorov length scale. Water as cold flow condition was applied and results were compared via Particle Image Velocimetry (PIV) experimental results. The focus was to investigate the flow behavior within the region before the flare and very close to the exit of the swirler. This region contributes to a highly unsteady flow behavior and requires great attention to enhancing the flame stability in gas turbine combustor and swirl burners. The PVC formation within the central core flow is strongly related to the peaks of pressure or axial velocity spectrum and up to two distinct peaks at the swirler mouth could be observed. Here, spectra analysis in iso-thermal condition inside the swirler where the inner swirler dominates the flow, showed a higher potential of instabilities with three to four distinct peaks where moving forward to the exit of swirler the number of peaks is decreased. In addition to this, the central axis corresponds to no peaks of instabilities while further away in the radial direction, several peaks exist.

Keywords: axial counter rotating swirler, large eddy simulation (LES), precessing vortex core (PVC), power spectral density (PSD)

Procedia PDF Downloads 277
2376 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi

Abstract:

Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 500
2375 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 49
2374 A Pre-Assessment Questionnaire to Identify Healthcare Professionals’ Perception on Information Technology Implementation

Authors: Y. Atilgan Şengül

Abstract:

Health information technologies promise higher quality, safer care and much more for both patients and professionals. Despite their promise, they are costly to develop and difficult to implement. On the other hand, user acceptance and usage determine the success of implemented information technology in healthcare. This study provides a model to understand health professionals’ perception and expectation of health information technology. Extensive literature review has been conducted to determine the main factors to be measured. A questionnaire has been designed as a measurement model and submitted to the personnel of an in vitro fertilization clinic. The respondents’ degree of agreement according to five-point Likert scale was 72% for convenient access to data and 69.4% for the importance of data security. There was a significant difference in acceptance of electronic data storage for female respondents. Also, other significant differences between professions were obtained.

Keywords: healthcare, health informatics, medical record system, questionnaire

Procedia PDF Downloads 171
2373 Human Rights Impact on Citizens Evolution

Authors: Joseph Marzouk Gerais Abdelmalak

Abstract:

The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 70
2372 Determining of Importance Level of Factors Affecting Job Selection with the Method of AHP

Authors: Nurullah Ekmekci, Ömer Akkaya, Kazım Karaboğa, Mahmut Tekin

Abstract:

Job selection is one of the most important decisions that affect their lives in the name of being more useful to themselves and the society. There are many criteria to consider in the job selection. The amount of criteria in the job selection makes it a multi-criteria decision-making (MCDM) problem. In this study; job selection has been discussed as multi-criteria decision-making problem and has been solved by Analytic Hierarchy Process (AHP), one of the multi-criteria decision making methods. A survey, contains 5 different job selection criteria (finding a job friendliness, salary status, job , social security, work in the community deems reputation and business of the degree of difficulty) within many job selection criteria and 4 different job alternative (being academician, working at the civil service, working at the private sector and working at in their own business), has been conducted to the students of Selcuk University Faculty of Economics and Administrative Sciences. As a result of pairwise comparisons, the highest weighted criteria in the job selection and the most coveted job preferences were identified.

Keywords: analytical hierarchy process, job selection, multi-criteria, decision making

Procedia PDF Downloads 396
2371 Attributes of Gratitude in Promoting Purpose in Life of Thai Adolescents

Authors: Karnsunaphat Balthip, Bunrome Suwanphahu

Abstract:

Purpose in life is one attribute of the concept of spirituality which is used in health promotion to promote holistic wellbeing. Purpose is a significant foundation of motivation and achievement that guides adolescents down positive life paths. Adolescents who have life purpose are more likely to achieve greater success and wellbeing in their lives. The current study used qualitative research methodology to describe the experiences that enhanced the purpose in life of 27 Thai adolescents from different backgrounds, living in urban areas in southern Thailand. Data were gathered through in-depth interviews and observation. Thematic analysis methods guided data analysis. The results showed that love and connectedness are important in enhancing purpose in life. They illustrate four attributes of love and connection reflecting the four attributes of gratitude that enhance purpose in life: (1) self-love, or gratitude to oneself, whereby participants endeavor to live life in a positive way by taking care of themselves based on moral and ethical values; (2) connectedness or gratitude to parents or significant others, whereby participants are committed to taking holistic care (physical, psychological, and spiritual) of their significant others; (3) connectedness or gratitude to peers, whereby participants support their peers to help them live their own lives in a positive way; and (4) connectedness or gratitude to the wider world (environment, society, nation and beyond), through a sense of altruism towards others. The findings provide helpful insights for parents, nurses, and other health professionals supporting adolescents to obtain a purpose in life.

Keywords: adolescent, gratitude, purpose in life, spirituality

Procedia PDF Downloads 146
2370 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 133
2369 A Review on the Use of Herbal Alternatives to Antibiotics in Poultry Diets

Authors: Sasan Chalaki, Seyed Ali Mirgholange, Touba Nadri, Saman Chalaki

Abstract:

In the current world, proper poultry nutrition has garnered special attention as one of the fundamental factors for enhancing their health and performance. Concerns related to the excessive use of antibiotics in the poultry industry and their role in antibiotic resistance have transformed this issue into a global challenge in public health and the environment. On the other hand, poultry farming plays a vital role as a primary source of meat and eggs in human nutrition, and improving their health and performance is crucial. One effective approach to enhance poultry nutrition is the utilization of the antibiotic properties of plant-based ingredients. The use of plant-based alternatives as natural antibiotics in poultry nutrition not only aids in improving poultry health and performance but also plays a significant role in reducing the consumption of synthetic antibiotics and preventing antibiotic resistance-related issues. Plants contain various antibacterial compounds, such as flavonoids, tannins, and essential oils. These compounds are recognized as active agents in combating bacteria. Plant-based antibiotics are compounds extracted from plants with antibacterial properties. They are acknowledged as effective substitutes for chemical antibiotics in poultry diets. The advantages of plant-based antibiotics include reducing the risk of resistance to chemical antibiotics, increasing poultry growth performance, and lowering the risk of disease transmission.

Keywords: poultry, antibiotics, essential oils, plant-based

Procedia PDF Downloads 71
2368 Political Determinants of Sovereign Spread: The Great East-West Divide

Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic

Abstract:

We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.

Keywords: sovereign bonds, European Union, developing countries, political determinants

Procedia PDF Downloads 307
2367 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution

Authors: Shenouda Farag Aziz Ibrahim

Abstract:

The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 34
2366 Performance Evaluation of Hemispherical Basin Type Solar Still

Authors: Husham Mahmood Ahmed

Abstract:

For so many reasons, fresh water scarcity is one of major problems facing the world and in particularly in the third world in the Northern Africa, the Middle East, the Southwest of Asia, and many other desert areas. Solar distillation offers one of the most promising solutions of renewable energy to this aggravated situation. The main obstacle hindering the spread of the use of solar technology for fresh water production is its low efficiency. Therefore, enhancing the solar stills performances by studying the parameters affecting their productivity and implementing new ideas and a different design are the main goals of the investigators in recent years. The present research is experimental work that tests a new design of solar still with a hemispherical top cover for water desalination with and without external reflectors under the climate of the Kingdom of Bahrain during the autumn season. The hemispherical cover has a base diameter of 1m and a depth of 0.4m, die cast from a 6 mm thick Lexan plastic sheet. The net effective area was 0.785 m2. It has been found that the average daily production rate obtained from the hemispherical top cover solar still is 3.610 liter/day. This yield is 11.1% higher than the yield of a conventional simple type single slope solar still having 20ᴼ slope glass cover and a larger effective area of 1 m2 obtained in previous research under similar climatic conditions. It has also been found that adding 1.2m long by 0.15 curved reflectors increased the yield of the hemispherical solar still by 5.5 %, while the 1.2 long by 0.3m curved reflector increased the yield by about 8%.

Keywords: hemispherical solar still, solar desalination, solar energy, the Northern Africa

Procedia PDF Downloads 392
2365 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 67
2364 Peak Frequencies in the Collective Membrane Potential of a Hindmarsh-Rose Small-World Neural Network

Authors: Sun Zhe, Ruggero Micheletto

Abstract:

As discussed extensively in many studies, noise in neural networks have an important role in the functioning and time evolution of the system. The mechanism by which noise induce stochastic resonance enhancing and influencing certain operations is not clarified nor is the mechanism of information storage and coding. With the present research we want to study the role of noise, especially focusing on the frequency peaks in a three variable Hindmarsh−Rose Small−World network. We investigated the behaviour of the network to external noises. We demonstrate that a variation of signal to noise ratio of about 10 dB induces an increase in membrane potential signal of about 15%, averaged over the whole network. We also considered the integral of the whole membrane potential as a paradigm of internal noise, the one generated by the brain network. We showed that this internal noise is attenuated with the size of the network or with the number of random connections. By means of Fourier analysis we found that it has distinct peaks of frequencies, moreover, we showed that increasing the size of the network introducing more neurons, reduced the maximum frequencies generated by the network, whereas the increase in the number of random connections (determined by the small-world probability p) led to a trend toward higher frequencies. This study may give clues on how networks utilize noise to alter the collective behaviour of the system in their operations.

Keywords: neural networks, stochastic processes, small-world networks, discrete Fourier analysis

Procedia PDF Downloads 289
2363 Project HDMI: A Hybrid-Differentiated Mathematics Instruction for Grade 11 Senior High School Students at Las Piñas City Technical Vocational High School

Authors: Mary Ann Cristine R. Olgado

Abstract:

Diversity in the classroom might make it difficult to promote individualized learning, but differentiated instruction that caters to students' various learning preferences may prove to be beneficial. Hence, this study examined the effectiveness of Hybrid-Differentiated Mathematics Instruction (HDMI) in improving the students’ academic performance in Mathematics. It employed the quasi-experimental research design by using a comparative analysis of the two variables: the experimental and control groups. The learning styles of the students were identified using the Grasha-Riechmann Student Learning Style Scale (GRSLSS), which served as the basis for designing differentiated action plans in Mathematics. In addition, adapted survey questionnaires, pre-tests, and post-tests were used to gather information and were analyzed using descriptive and correlational statistics to find the relationship between variables. The experimental group received differentiated instruction for a month, while the control group received traditional teaching instruction. The study found that Hybrid-Differentiated Mathematics Instruction (HDMI) improved the academic performance of Grade 11-TVL students, with the experimental group performing better than the control group. This program has effectively tailored the teaching methods to meet the diverse learning needs of the students, fostering and enhancing a deeper understanding of mathematical concepts in Statistics & Probability, both within and beyond the classroom.

Keywords: differentiated instruction, hybrid, learning styles, academic performance

Procedia PDF Downloads 60
2362 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 415
2361 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria

Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria

Abstract:

The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.

Keywords: dental surgeon, medical devices, sterilization, survey

Procedia PDF Downloads 398