Search results for: security check
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3563

Search results for: security check

1133 A Strategic Approach for Promoting Renewable Energy Technologies in Developing Countries

Authors: Hanee Ryu

Abstract:

The supporting policies for renewable energy have been designed to deploy renewable energy technology targeting domestic market. The government encourages market creation through obligations such as FIT or RPS on an energy supplier. With these policy measures, the securing vast market needs to induce technology development. Furthermore, it is crucial that ensuring developing market can make the environment nurture the renewable energy industry. Overseas expansion to countries being in demand is essential under immature domestic market. Extending its business abroad can make the domestic company get the knowledge through learning-by-doing. Besides, operation in the countries to be rich in renewable resources such as weather conditions helps to develop proven track record required for verifying technologies. This paper figures out the factor to hamper the global market entry and build up the strategies to overcome difficulties. Survey conducted renewable energy company having overseas experiences at least once. Based on the survey we check the obstacle against exporting home goods and services. As a result, securing funds is salient fact to proceed to business. It is difficult that only private bank or investment agencies participate in the project under uncertainty which renewable energy development project bears inherently. These uncertainties need public fund such as ODA to encourage private sectors to start a business. Furthermore, international organizations such as IRENA or multilateral development banks as WBG play a role to guarantee the investment including risk insurance against uncertainty. It can also manage excavation business cooperating with developing countries and supplement inadequate government funding involved. With survey results strategies to obtain the order, the international organization places are categorized according to the type of getting a contract. This paper suggests 3 types approaching to the international organization project (going through international competitive bidding, using ODA and project financing) and specifies the role of government to support the domestic firms with running out of funds. Under renewable energy industry environment where hard to being created as a spontaneous market, government policy approach needs to motivate the actors to get into the business. It is one of the good strategies that countries with the low demand of renewable energies participate in the project international agencies order in the developing countries having abundant resources. This provides crucial guidance for the formulation of renewable energy development policy and planning with consideration of business opportunities and funding.

Keywords: exporting strategies, multilateral development banks, promoting in developing countries, renewable energy technologies

Procedia PDF Downloads 518
1132 Strategic Redesign of Public Spaces with a Sustainable Approach: Case Study of Parque Huancavilca, Guayaquil

Authors: Juan Carlos Briones Macias

Abstract:

Currently, the Huancavilca City Park in Guayaquil is an abandoned public space that is discovering a growing problem of insecurity, where various problems have been perceived, such as the lack of green areas, deteriorating furniture, insufficient lighting, the use of inadequate cladding materials and very sunny areas due to the lack of planning in the design of green areas. The objective of this scientific article is to redesign Huancavilca Park through public space design strategies for more attractive and comfortable areas, becoming a point of interaction in a safe and accessible way. A mixed methodology (qualitative and quantitative) was applied, obtaining information based on surveys, interviews, field observations, and systematizing the data in the traditional weighting of the structuring aspects of the park. The results were obtained from the methodological design scheme of iterative analysis of public spaces by Jan Güell. It is concluded that the use of urban strategies in the structuring elements of the park, such as vegetation, furniture, generating new activities, and security interventions, will specifically solve all the problems of the Huancavilca Park tested in a Pareto 80/20 Diagram.

Keywords: public space, green areas, vegetation, street furniture, urban analysis

Procedia PDF Downloads 146
1131 Searchable Encryption in Cloud Storage

Authors: Ren Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption

Procedia PDF Downloads 381
1130 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 208
1129 Corporate Performance and Balance Sheet Indicators: Evidence from Indian Manufacturing Companies

Authors: Hussain Bohra, Pradyuman Sharma

Abstract:

This study highlights the significance of Balance Sheet Indicators on the corporate performance in the case of Indian manufacturing companies. Balance sheet indicators show the actual financial health of the company and it helps to the external investors to choose the right company for their investment and it also help to external financing agency to give easy finance to the manufacturing companies. The period of study is 2000 to 2014 for 813 manufacturing companies for which the continuous data is available throughout the study period. The data is collected from PROWESS data base maintained by Centre for Monitoring Indian Economy Pvt. Ltd. Panel data methods like fixed effect and random effect methods are used for the analysis. The Likelihood Ratio test, Lagrange Multiplier test and Hausman test results proof the suitability of the fixed effect model for the estimation. Return on assets (ROA) is used as the proxy to measure corporate performance. ROA is the best proxy to measure corporate performance as it already used by the most of the authors who worked on the corporate performance. ROA shows return on long term investment projects of firms. Different ratios like Current Ratio, Debt-equity ratio, Receivable turnover ratio, solvency ratio have been used as the proxies for the Balance Sheet Indicators. Other firm specific variable like firm size, and sales as the control variables in the model. From the empirical analysis, it was found that all selected financial ratios have significant and positive impact on the corporate performance. Firm sales and firm size also found significant and positive impact on the corporate performance. To check the robustness of results, the sample was divided on the basis of different ratio like firm having high debt equity ratio and low debt equity ratio, firms having high current ratio and low current ratio, firms having high receivable turnover and low receivable ratio and solvency ratio in the form of firms having high solving ratio and low solvency ratio. We find that the results are robust to all types of companies having different form of selected balance sheet indicators ratio. The results for other variables are also in the same line as for the whole sample. These findings confirm that Balance sheet indicators play as significant role on the corporate performance in India. The findings of this study have the implications for the corporate managers to focus different ratio to maintain the minimum expected level of performance. Apart from that, they should also maintain adequate sales and total assets to improve corporate performance.

Keywords: balance sheet, corporate performance, current ratio, panel data method

Procedia PDF Downloads 263
1128 A Real Time Monitoring System of the Supply Chain Conditions, Products and Means of Transport

Authors: Dimitris E. Kontaxis, George Litainas, Dimitris P. Ptochos

Abstract:

Real-time monitoring of the supply chain conditions and procedures is a critical element for the optimal coordination and safety of the deliveries, as well as for the minimization of the delivery time and cost. Real-time monitoring requires IoT data streams, which are related to the conditions of the products and the means of transport (e.g., location, temperature/humidity conditions, kinematic state, ambient light conditions, etc.). These streams are generated by battery-based IoT tracking devices, equipped with appropriate sensors, and are transmitted to a cloud-based back-end system. Proper handling and processing of the IoT data streams, using predictive and artificial intelligence algorithms, can provide significant and useful results, which can be exploited by the supply chain stakeholders in order to enhance their financial benefits, as well as the efficiency, security, transparency, coordination, and sustainability of the supply chain procedures. The technology, the features, and the characteristics of a complete, proprietary system, including hardware, firmware, and software tools -developed in the context of a co-funded R&D programme- are addressed and presented in this paper.

Keywords: IoT embedded electronics, real-time monitoring, tracking device, sensor platform

Procedia PDF Downloads 175
1127 Empirical Testing of Hofstede’s Measures of National Culture: A Study in Four Countries

Authors: Nebojša Janićijević

Abstract:

At the end of 1970s, Dutch researcher Geert Hofstede, had conducted an enormous empirical research on the differences between national cultures. In his huge research, he had identified four dimensions of national culture according to which national cultures differ and determined the index for every dimension of national culture for each country that took part in his research. The index showed a country’s position on the continuum between the two extreme poles of the cultural dimensions. Since more than 40 years have passed since Hofstede's research, there is a doubt that, due to the changes in national cultures during that period, they are no longer a good basis for research. The aim of this research is to check the validity of Hofstee's indices of national culture The empirical study conducted in the branches of a multinational company in Serbia, France, the Netherlands and Denmark aimed to determine whether Hofstede’s measures of national culture dimensions are still valid. The sample consisted of 155 employees of one multinational company, where 40 employees came from three countries and 35 employees were from Serbia. The questionnaire that analyzed the positions of national cultures according to the Hofstede’s four dimensions was formulated on the basis of the initial Hofstede’s questionnaire, but it was much shorter and significantly simplified comparing to the original questionnaire. Such instrument had already been used in earlier researches. A statistical analysis of the obtained questionnaire results was done by a simple calculation of the frequency of the provided answers. Due to the limitations in methodology, sample size, instrument, and applied statistical methods, the aim of the study was not to explicitly test the accuracy Hofstede’s indexes but to enlighten the general position of the four observed countries in national culture dimensions and their mutual relations. The study results have indicated that the position of the four observed national cultures (Serbia, France, the Netherlands and Denmark) is precisely the same in three out of four dimensions as Hofstede had described in his research. Furthermore, the differences between national cultures and the relative relations between their positions in three dimensions of national culture correspond to Hofstede’s results. The only deviation from Hofstede’s results is concentrated around the masculinity–femininity dimension. In addition, the study revealed that the degree of power distance is a determinant when choosing leadership style. It has been found that national cultures with high power distance, like Serbia and France, favor one of the two authoritative leadership styles. On the other hand, countries with low power distance, such as the Netherlands and Denmark, prefer one of the forms of democratic leadership styles. This confirms Hofstede’s premises about the impact of power distance on leadership style. The key contribution of the study is that Hofstede’s national culture indexes are still a reliable tool for measuring the positions of countries in national culture dimensions, and they can be applied in the cross-cultural research in management. That was at least the case with four observed countries: Serbia, France, the Netherlands, and Denmark.

Keywords: national culture, leadership styles, power distance, collectivism, masculinity, uncertainty avoidance

Procedia PDF Downloads 73
1126 Migration and Displacement: A Study on the Impact of Bangladeshi and Nepali Migration to North-Eastern India

Authors: Sri Mahan Borah

Abstract:

The issue of migration and displacement is considered so sensitive that states have often linked it with their sovereignty, independence and even existence. Therefor, even in the era of globalisation no nation-state is ready to compromise with its territorial boundaries. The problem of migration and displacement has generated a range of socio-political, economic, ethnic, and communal tensions in India in general and northeastern States in particular. In such situation it becomes unpreventable to look over the issue so that a viable elucidation may emerge. The present paper is an attempt to understand the impact of Bangladeshi and Nepali migration to North-Eastern states of India through historical and analytical methods. In this course it will look into the emergence of the migration and displacement problem, its causes, impacts on security and other issues of national interest especially when the migration is illegal and poses multi-layered challenges to the Indian state. The nature of migration from these countries to India has been dissimilar. This is because of their different historical backgrounds, geographical variants, ethno-religious affinities, political systems and bilateral arrangements with India. It concludes inter alia that, India’s borders with Bangladesh and Nepal must be regulated and that resident migrants need to be strategically dealt with, keeping in mind age-old relationships with these countries and, more importantly, the nature and construct of our geography.

Keywords: migration, displacement, North-East, India

Procedia PDF Downloads 402
1125 A Smart Contract Project: Peer-to-Peer Energy Trading with Price Forecasting in Microgrid

Authors: Şakir Bingöl, Abdullah Emre Aydemir, Abdullah Saado, Ahmet Akıl, Elif Canbaz, Feyza Nur Bulgurcu, Gizem Uzun, Günsu Bilge Dal, Muhammedcan Pirinççi

Abstract:

Smart contracts, which can be applied in many different areas, from financial applications to the internet of things, come to the fore with their security, low cost, and self-executing features. In this paper, it is focused on peer-to-peer (P2P) energy trading and the implementation of the smart contract on the Ethereum blockchain. It is assumed a microgrid consists of consumers and prosumers that can produce solar and wind energy. The proposed architecture is a system where the prosumer makes the purchase or sale request in the smart contract and the maximum price obtained through the distribution system operator (DSO) by forecasting. It is aimed to forecast the hourly maximum unit price of energy by using deep learning instead of a fixed pricing. In this way, it will make the system more reliable as there will be more dynamic and accurate pricing. For this purpose, Istanbul's energy generation, energy consumption and market clearing price data were used. The consistency of the available data and forecasting results is observed and discussed with graphs.

Keywords: energy trading smart contract, deep learning, microgrid, forecasting, Ethereum, peer to peer

Procedia PDF Downloads 136
1124 Textile Based Physical Wearable Sensors for Healthcare Monitoring in Medical and Protective Garments

Authors: Sejuti Malakar

Abstract:

Textile sensors have gained a lot of interest in recent years as it is instrumental in monitoring physiological and environmental changes, for a better diagnosis that can be useful in various fields like medical textiles, sports textiles, protective textiles, agro textiles, and geo-textiles. Moreover, with the development of flexible textile-based wearable sensors, the functionality of smart clothing is augmented for a more improved user experience when it comes to technical textiles. In this context, conductive textiles using new composites and nanomaterials are being developed while considering its compatibility with the textile manufacturing processes. This review aims to provide a comprehensive and detailed overview of the contemporary advancements in textile-based wearable physical sensors, used in the field of medical, security, surveillance, and protection, from a global perspective. The methodology used is through analysing various examples of integration of wearable textile-based sensors with clothing for daily use, keeping in mind the technological advances in the same. By comparing various case studies, we come across various challenges textile sensors, in terms of stability, the comfort of movement, and reliable sensing components to enable accurate measurements, in spite of progress in the engineering of the wearable. Addressing such concerns is critical for the future success of wearable sensors.

Keywords: flexible textile-based wearable sensors, contemporary advancements, conductive textiles, body conformal design

Procedia PDF Downloads 182
1123 Developing an Interpretive Plan for Qubbet El-Hawa North Archaeological Site in Aswan, Egypt

Authors: Osama Amer Mohyeldin Mohamed

Abstract:

Qubbet el-Hawa North (QHN) is an example of an archaeological site in West-Aswan and It has not opened to the public yet and has been under excavation since its discovery in 2013 as a result of the illegal digging that happened in many sites in Egypt because of the unstable situation and the absence of security. The site has the potential to be one of the most attractive sites in Aswan. Moreover, it deserves to be introduced to the visitors in a good manner appropriate to its great significance. Both interpretation and presentation are crucial inseparable tools that communicate the archaeological site's significance to the public and raise their awareness. Moreover, it helps them to understand the past and appreciate archaeological assets. People will never learn or see anything from ancient remains unless it is explained. They would only look at it as ancient and charming. They expect a story, and more than knowledge, authenticity, or even supporting preservation actions, they want to enjoy and be entertained. On the other hand, a lot of archaeologists believe that planning an archaeological site for entertaining visitors deteriorates it and affects its authenticity. Thus, it represents a challenge to design a model for visitors’ experience that meets their expectations and needs while safeguarding the site’s integrity. The article presents a proposal for an interpretation plan for the site of Qubbet el-Hawa North.

Keywords: heritage interpretation and presentation, archaeological site management, qubbet el-hawa North, local community engagement, accessibility

Procedia PDF Downloads 27
1122 Assessment of Exploitation Vulnerability of Quantum Communication Systems with Phase Encryption

Authors: Vladimir V. Nikulin, Bekmurza H. Aitchanov, Olimzhon A. Baimuratov

Abstract:

Quantum communication technology takes advantage of the intrinsic properties of laser carriers, such as very high data rates and low power requirements, to offer unprecedented data security. Quantum processes at the physical layer of encryption are used for signal encryption with very competitive performance characteristics. The ultimate range of applications for QC systems spans from fiber-based to free-space links and from secure banking operations to mobile airborne and space-borne networking where they are subjected to channel distortions. Under practical conditions, the channel can alter the optical wave front characteristics, including its phase. In addition, phase noise of the communication source and photo-detection noises alter the signal to bring additional ambiguity into the measurement process. If quantized values of photons are used to encrypt the signal, exploitation of quantum communication links becomes extremely difficult. In this paper, we present the results of analysis and simulation studies of the effects of noise on phase estimation for quantum systems with different number of encryption bases and operating at different power levels.

Keywords: encryption, phase distortion, quantum communication, quantum noise

Procedia PDF Downloads 551
1121 Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis

Authors: F. Felipe

Abstract:

Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter.

Keywords: air defense, effectiveness, system, simulation, decision-support

Procedia PDF Downloads 155
1120 Transcriptomic and Translational Regulation of Peroxisome Proliferator-Activated Receptors after Different Feedings in Salmon

Authors: Mahsa Jalili, Essa Ehsan Khan, Signe Dille Lovmo, Augustine Akruwe, Egil Lien, Rolf Erik Olsen, Trygve Sigholt, Atle Magnus Bones

Abstract:

Data from the Norwegian Directorate of Fisheries reported that >1.2 million tons of Atlantic salmon were produced in Norway aquaculture industry in 2016. Peroxisome proliferator-activated receptors (PPARs) are one of the key transcription factor families that respond to nutritional ligands. Recent studies have shown the connection between PPARs with lipid and carbohydrate metabolism in aquaculture. To our knowledge, there is no published data about the effects of krill meal, soybean meal, Bactocell ® and butyrate feedings compared to control group on PPARs gene and protein expressions in Atlantic salmon. Fish, 1year +postsmolt, average weight 250 gram were cultured for 12 weeks after acclimatization by control commercial feeding in 2 weeks after hatchery. Water oxygen rate, salinity, and temperature were monitored every second day. At the end of the trial, fish were taken from tanks randomly, and four replicates per group were collected and stored in -80 freezers until analysis. Total RNA extracted from posterior part of dorsal fin muscle tissues and Nanodrop and Bioanalyzer was used to check the quality of RNA. Gene expression of PPAR α, β and γ were determined by RT-PCR. The expression of genes of interest was measured relative to control group after normalization to three reference genes. Total protein concentration was calculated by Bradford method, and protein expression was determined with primary PPARγ antibody by western blot. All data were analyzed by ANOVA followed by Benjamini-Hochberg and Bonferroni tests. Probability values <0.05 considered significant. Bactocell® and butyrate groups showed significantly lower PPARα expression. PPARβ and γ were not significantly different among groups. PPARγ mRNA expression was approximately consistent with protein expression pattern, except than butyrate group showed lower mRNA level. The order of PPARγ expression was Bactocell® > soy meal > butyrate > krill meal > control respectively. PPARβ gene expression decreased more in soy meal > butyrate > krill meal > Bactocell® > control groups respectively. In conclusion, the increased expression of PPARγ and α is proposed to represent a reduction tendency of lipid storage in fish fed by Bactocell®, butyrate, soy and krill meal.

Keywords: aquaculture, blotting western, gene expression, krill protein extract, prebiotics, probiotics, Salmo salar

Procedia PDF Downloads 223
1119 Reliability of Clinical Coding in Accurately Estimating the Actual Prevalence of Adverse Drug Event Admissions

Authors: Nisa Mohan

Abstract:

Adverse drug event (ADE) related hospital admissions are common among older people. The first step in prevention is accurately estimating the prevalence of ADE admissions. Clinical coding is an efficient method to estimate the prevalence of ADE admissions. The objective of the study is to estimate the rate of under-coding of ADE admissions in older people in New Zealand and to explore how clinical coders decide whether or not to code an admission as an ADE. There has not been any research in New Zealand to explore these areas. This study is done using a mixed-methods approach. Two common and serious ADEs in older people, namely bleeding and hypoglycaemia were selected for the study. In study 1, eight hundred medical records of people aged 65 years and above who are admitted to hospital due to bleeding and hypoglycemia during the years 2015 – 2016 were selected for quantitative retrospective medical records review. This selection was made to estimate the proportion of ADE-related bleeding and hypoglycemia admissions that are not coded as ADEs. These files were reviewed and recorded as to whether the admission was caused by an ADE. The hospital discharge data were reviewed to check whether all the ADE admissions identified in the records review were coded as ADEs, and the proportion of under-coding of ADE admissions was estimated. In study 2, thirteen clinical coders were selected to conduct qualitative semi-structured interviews using a general inductive approach. Participants were selected purposively based on their experience in clinical coding. Interview questions were designed in a way to investigate the reasons for the under-coding of ADE admissions. The records review study showed that 35% (Cl 28% - 44%) of the ADE-related bleeding admissions and 22% of the ADE-related hypoglycemia admissions were not coded as ADEs. Although the quality of clinical coding is high across New Zealand, a substantial proportion of ADE admissions were under-coded. This shows that clinical coding might under-estimate the actual prevalence of ADE related hospital admissions in New Zealand. The interviews with the clinical coders added that lack of time for searching for information to confirm an ADE admission, inadequate communication with clinicians, along with coders’ belief that an ADE is a small thing might be the potential reasons for the under-coding of the ADE admissions. This study urges the coding policymakers, auditors, and trainers to engage with the unconscious cognitive biases and short-cuts of the clinical coders. These results highlight that further work is needed on interventions to improve the clinical coding of ADE admissions, such as providing education to coders about the importance of ADEs, education to clinicians about the importance of clear and confirmed medical records entries, availing pharmacist service to improve the detection and clear documentation of ADE admissions and including a mandatory field in the discharge summary about external causes of diseases.

Keywords: adverse drug events, bleeding, clinical coders, clinical coding, hypoglycemia

Procedia PDF Downloads 130
1118 Ethnobotanical Survey on the Use of Herbal Medicine at Children in Algeria

Authors: Metahri Leyla

Abstract:

Herbal medicine is one of the oldest medicines in the world. It constitutes an interesting alternative to treat and cure without creating new diseases. Despite the progress of medicine, the increase in the number of doctors, the creation of social security, many parents have resorted to herbal medicine for their children; they are increasingly asking for "natural remedies", "without risk" for their children. Herbal tea is a very accessible way to enjoy the benefits of herbal medicine. Accordingly; the objective of our study is to obtain detailed information on the composition and mode of administration of these herbal teas and to identify the different plants used; their beneficial effects, as well as their possible toxicity. The current research work represents an ethnobotanical survey spread over one month (from January 6, 2021, to February 19, 2021) carried out by means of an electronic questionnaire concerning 753 respondents involving single or multiparous mothers. The obtained results reveal that a total of 684 mothers used herbal teas for their infants, which revealed the use of 55 herbal remedies for several indications, the most sought after are the carminative effect and relief of colic, and which 9% of users noticed undesirable effects linked to the administration of herbal teas to their infants. As a conclusion, it has been asserted that the use of herbal teas as a natural remedy by Algerian mothers is a widely accepted practice, however, the "natural" nature of the plants does not mean that they are harmless.

Keywords: herbal medicine, herbal teas, children, mothers, medicinal plants

Procedia PDF Downloads 139
1117 The Iconic Pink Donut Box: An Analysis of Memory and Identity Amongst Cambodian Refugees in California

Authors: Basmah Arshad

Abstract:

In the aftermath of the Cambodian genocide, many refugees resettled in America. They carved out a distinctively Cambodian-American space in California with donut shops, establishing a tight-knit community that worked to achieve ‘the American dream’. Urged by traumatic memories of the genocide and American society directly encouraging (if not demanding) cultural assimilation, these refugees and successive generations continuously worked to re-identify themselves as Americans. Artist Phung Huynh grew up in this context of family-owned donut shops and the frantic scramble for stability and security. It is this community that she depicts in her artwork series from the late 2010s, ‘Khmerican: Drawing on Pink Donut Boxes’. Huynh's artwork challenges dominant Western narratives about the Cambodian genocide by pushing forward images of resilience, resistance, and joy, while also allowing for a discussion about issues of assimilation, identity, and nostalgia in the Cambodian-American community. It also provokes deeply relevant questions about how refugees and immigrants deliberately appropriate elements of the Americana (eg, donuts) to assimilate and re-fashion their identity as a tactic for financial stability and social survival.

Keywords: Cambodian diaspora, cultural identity, assimilation, food, artwork

Procedia PDF Downloads 64
1116 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka

Authors: Prasansha Kumari

Abstract:

This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.

Keywords: compatibility, complexity, mobile banking, observability, risk

Procedia PDF Downloads 201
1115 Using Blockchain Technology to Extend the Vendor Managed Inventory for Sustainability

Authors: Elham Ahmadi, Roshaali Khaturia, Pardis Sahraei, Mohammad Niyayesh, Omid Fatahi Valilai

Abstract:

Nowadays, Information Technology (IT) is changing the way traditional enterprise management concepts work. One of the most dominant IT achievements is the Blockchain Technology. This technology enables the distributed collaboration of stakeholders for their interactions while fulfilling the security and consensus rules among them. This paper has focused on the application of Blockchain technology to enhance one of traditional inventory management models. The Vendor Managed Inventory (VMI) has been considered one of the most efficient mechanisms for vendor inventory planning by the suppliers. While VMI has brought competitive advantages for many industries, however its centralized mechanism limits the collaboration of a pool of suppliers and vendors simultaneously. This paper has studied the recent research for VMI application in industries and also has investigated the applications of Blockchain technology for decentralized collaboration of stakeholders. Focusing on sustainability issue for total supply chain consisting suppliers and vendors, it has proposed a Blockchain based VMI conceptual model. The different capabilities of this model for enabling the collaboration of stakeholders while maintaining the competitive advantages and sustainability issues have been discussed.

Keywords: vendor managed inventory, VMI, blockchain technology, supply chain planning, sustainability

Procedia PDF Downloads 222
1114 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 102
1113 A Doctrinal Research and Review of Hashtag Trademarks

Authors: Hetvi Trivedi

Abstract:

Technological escalation cannot be negated. The same is true for the benefits of technology. However, such escalation has interfered with the traditional theories of protection under Intellectual Property Rights. Out of the many trends that have disrupted the old-school understanding of Intellectual Property Rights, one is hashtags. What began modestly in the year 2007 has now earned a remarkable status, and coupled with the unprecedented rise in social media the hashtag culture has witnessed a monstrous growth. A tiny symbol on the keypad of phones or computers is now a major trend which also serves companies as a critical investment measure in establishing their brand in the market. Due to this a section of the Intellectual Property Rights- Trademarks is undergoing a humungous transformation with hashtags like #icebucket, #tbt or #smilewithacoke, getting trademark protection. So, as the traditional theories of IP take on the modern trends, it is necessary to understand the change and challenge at a theoretical and proportional level and where need be, question the change. Traditionally, Intellectual Property Rights serves the societal need for intellectual productions that ensure its holistic development as well as cultural, economic, social and technological progress. In a two-pronged effort at ensuring continuity of creativity, IPRs recognize the investment of individual efforts that go into creation by way of offering protection. Commonly placed under two major theories- Utilitarian and Natural, IPRs aim to accord protection and recognition to an individual’s creation or invention which serve as an incentive for further creations or inventions, thus fully protecting the creative, inventive or commercial labour invested in the same. In return, the creator by lending the public the access to the creation reaps various benefits. This way Intellectual Property Rights form a ‘social contract’ between the author and society. IPRs are similarly attached to a social function, whereby individual rights must be weighed against competing rights and to the farthest limit possible, both sets of rights must be treated in a balanced manner. To put it differently, both the society and the creator must be put on an equal footing with neither party’s rights subservient to the other. A close look through doctrinal research, at the recent trend of trademark protection, makes the social function of IPRs seem to be moving far from the basic philosophy. Thus, where technology interferes with the philosophies of law, it is important to check and allow such growth only in moderation, for none is superior than the other. The human expansionist nature may need everything under the sky that can be tweaked slightly to be counted and protected as Intellectual Property- like a common parlance word transformed into a hashtag, however IP in order to survive on its philosophies needs to strike a balance. A unanimous global decision on the judicious use of IPR recognition and protection is the need of the hour.

Keywords: hashtag trademarks, intellectual property, social function, technology

Procedia PDF Downloads 131
1112 Optimizing Resource Allocation and Indoor Location Using Bluetooth Low Energy

Authors: Néstor Álvarez-Díaz, Pino Caballero-Gil, Héctor Reboso-Morales, Francisco Martín-Fernández

Abstract:

The recent tendency of "Internet of Things" (IoT) has developed in the last years, causing the emergence of innovative communication methods among multiple devices. The appearance of Bluetooth Low Energy (BLE) has allowed a push to IoT in relation to smartphones. In this moment, a set of new applications related to several topics like entertainment and advertisement has begun to be developed but not much has been done till now to take advantage of the potential that these technologies can offer on many business areas and in everyday tasks. In the present work, the application of BLE technology and smartphones is proposed on some business areas related to the optimization of resource allocation in huge facilities like airports. An indoor location system has been developed through triangulation methods with the use of BLE beacons. The described system can be used to locate all employees inside the building in such a way that any task can be automatically assigned to a group of employees. It should be noted that this system cannot only be used to link needs with employees according to distances, but it also takes into account other factors like occupation level or category. In addition, it has been endowed with a security system to manage business and personnel sensitive data. The efficiency of communications is another essential characteristic that has been taken into account in this work.

Keywords: bluetooth low energy, indoor location, resource assignment, smartphones

Procedia PDF Downloads 392
1111 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics

Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood

Abstract:

We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.

Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka

Procedia PDF Downloads 391
1110 Study of the Phenomenon of Collapse and Buckling the Car Body Frame

Authors: Didik Sugiyanto

Abstract:

Conditions that often occur in the framework of a particular vehicle at a car is a collision or collision with another object, an example of such damage is to the frame or chassis for the required design framework that is able to absorb impact energy. Characteristics of the material are influenced by the value of the stiffness of the material that need to be considered in choosing the material properties of the material. To obtain material properties that can be adapted to the experimental conditions tested the tensile and compression testing. In this study focused on the chassis at an angle of 150, 300, and 450. It is based on field studies that vehicle primarily for freight cars have a point of order light between 150 to 450. Research methods include design tools, design framework, procurement of materials and experimental tools, tool-making, the manufacture of the test framework, and the testing process, experiment is testing the power of the press to know the order. From this test obtained the maximum force on the corner of 150 was 569.76 kg at a distance of 16 mm, angle 300 is 370.3 kg at a distance of 15 mm, angle 450 is 391.71 kg at a distance of 28 mm. After reaching the maximum force the order will occur collapse, followed by a decrease in the next distance. It can be concluded that the greatest strain energy occurs at an angle of 150. So it is known that the frame at an angle of 150 produces the best level of security.

Keywords: buckling, collapse, body frame, vehicle

Procedia PDF Downloads 577
1109 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves

Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura

Abstract:

People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.

Keywords: elderly person, IoT device, Raspberry Pi, watch-over system

Procedia PDF Downloads 221
1108 The Influence of Operational Changes on Efficiency and Sustainability of Manufacturing Firms

Authors: Dimitrios Kafetzopoulos

Abstract:

Nowadays, companies are more concerned with adopting their own strategies for increased efficiency and sustainability. Dynamic environments are fertile fields for developing operational changes. For this purpose, organizations need to implement an advanced management philosophy that boosts changes to companies’ operation. Changes refer to new applications of knowledge, ideas, methods, and skills that can generate unique capabilities and leverage an organization’s competitiveness. So, in order to survive and compete in the global and niche markets, companies should incorporate the adoption of operational changes into their strategy with regard to their products and their processes. Creating the appropriate culture for changes in terms of products and processes helps companies to gain a sustainable competitive advantage in the market. Thus, the purpose of this study is to investigate the role of both incremental and radical changes into operations of a company, taking into consideration not only product changes but also process changes, and continues by measuring the impact of these two types of changes on business efficiency and sustainability of Greek manufacturing companies. The above discussion leads to the following hypotheses: H1: Radical operational changes have a positive impact on firm efficiency. H2: Incremental operational changes have a positive impact on firm efficiency. H3: Radical operational changes have a positive impact on firm sustainability. H4: Incremental operational changes have a positive impact on firm sustainability. In order to achieve the objectives of the present study, a research study was carried out in Greek manufacturing firms. A total of 380 valid questionnaires were received while a seven-point Likert scale was used to measure all the questionnaire items of the constructs (radical changes, incremental changes, efficiency and sustainability). The constructs of radical and incremental operational changes, each one as one variable, has been subdivided into product and process changes. Non-response bias, common method variance, multicollinearity, multivariate normal distribution and outliers have been checked. Moreover, the unidimensionality, reliability and validity of the latent factors were assessed. Exploratory Factor Analysis and Confirmatory Factor Analysis were applied to check the factorial structure of the constructs and the factor loadings of the items. In order to test the research hypotheses, the SEM technique was applied (maximum likelihood method). The goodness of fit of the basic structural model indicates an acceptable fit of the proposed model. According to the present study findings, radical operational changes and incremental operational changes significantly influence both efficiency and sustainability of Greek manufacturing firms. However, it is in the dimension of radical operational changes, meaning those in process and product, that the most significant contributors to firm efficiency are to be found, while its influence on sustainability is low albeit statistically significant. On the contrary, incremental operational changes influence sustainability more than firms’ efficiency. From the above, it is apparent that the embodiment of the concept of the changes into the products and processes operational practices of a firm has direct and positive consequences for what it achieves from efficiency and sustainability perspective.

Keywords: incremental operational changes, radical operational changes, efficiency, sustainability

Procedia PDF Downloads 134
1107 Optical and Near-UV Spectroscopic Properties of Low-Redshift Jetted Quasars in the Main Sequence in the Main Sequence Context

Authors: Shimeles Terefe Mengistue, Ascensión Del Olmo, Paola Marziani, Mirjana Pović, María Angeles Martínez-Carballo, Jaime Perea, Isabel M. Árquez

Abstract:

Quasars have historically been classified into two distinct classes, radio-loud (RL) and radio-quiet (RQ), taking into account the presence and absence of relativistic radio jets, respectively. The absence of spectra with a high S/N ratio led to the impression that all quasars (QSOs) are spectroscopically similar. Although different attempts were made to unify these two classes, there is a long-standing open debate involving the possibility of a real physical dichotomy between RL and RQ quasars. In this work, we present new high S/N spectra of 11 extremely powerful jetted quasars with radio-to-optical flux density ratio > 1000 that concomitantly cover the low-ionization emission of Mgii𝜆2800 and Hbeta𝛽 as well as the Feii blends in the redshift range 0.35 < z < 1, observed at Calar Alto Observatory (Spain). This work aims to quantify broad emission line differences between RL and RQ quasars by using the four-dimensional eigenvector 1 (4DE1) parameter space and its main sequence (MS) and to check the effect of powerful radio ejection on the low ionization broad emission lines. Emission lines are analysed by making two complementary approaches, a multicomponent non-linear fitting to account for the individual components of the broad emission lines and by analysing the full profile of the lines through parameters such as total widths, centroid velocities at different fractional intensities, asymmetry, and kurtosis indices. It is found that broad emission lines show large reward asymmetry both in Hbeta𝛽 and Mgii2800A. The location of our RL sources in a UV plane looks similar to the optical one, with weak Feii UV emission and broad Mgii2800A. We supplement the 11 sources with large samples from previous work to gain some general inferences. The result shows, compared to RQ, our extreme RL quasars show larger median Hbeta full width at half maximum (FWHM), weaker Feii emission, larger 𝑀BH, lower 𝐿bol/𝐿Edd, and a restricted space occupation in the optical and UV MS planes. The differences are more elusive when the comparison is carried out by restricting the RQ population to the region of the MS occupied by RL quasars, albeit an unbiased comparison matching 𝑀BH and 𝐿bol/𝐿Edd suggests that the most powerful RL quasars show the highest redward asymmetries in Hbeta.

Keywords: galaxies, active, line, profiles, quasars, emission lines, supermassive black holes

Procedia PDF Downloads 58
1106 A Disappearing Radiolucency of the Mandible Caused by Inadvertent Trauma Following IMF Screw Placement

Authors: Anna Ghosh, Dominic Shields, Ceri McIntosh, Stephen Crank

Abstract:

A 29-year-old male was a referral to the maxillofacial unit following a referral from his general dental practitioner via a routine pathway regarding a large periapical lesion on the LR4 with root resorption. The patient was asymptomatic, the LR4 vital and unrestored, and this was an incidental finding at a routine check-up. The patient's past medical history was unremarkable. Examination revealed no extra or intra-oral pathology and non-mobile teeth. No focal neurology was detected. An orthopantogram demonstrated a well-defined unilocular corticated radiolucency associated with the LR4. The root appeared shortened with the radiolucency between the root and a radio-opacity, possibly representing the displacement of the apical tip of the tooth. It was recommended that the referring general practitioner should proceed with orthograde root canal therapy, after which time exploration, enucleation, and retrograde root filling of the LR4 would be carried out by a maxillofacial unit. The patient was reviewed six months later where, due to the COVID-19 pandemic, the patient had been unable to access general dental services for the root canal treatment. He was still entirely asymptomatic. A one-year review was planned in the hope this would allow time for the orthograde root canal therapy to be completed. At this review, the orthograde root canal therapy had still not been completed. Interestingly, a repeat orthopantogram revealed a significant reduction in size with good bony infill and a significant reduction in the size of the lesion. Due to the ongoing delays with primary care dental therapy, the patient was subsequently internally referred to the restorative dentistry department for care. The patient was seen again by oral and maxillo-facial surgery in mid-2022 where he still reports this tooth as asymptomatic with no focal neurology. The patient's history was fully reviewed, and noted that 15 years previously, the patient underwent open reduction and internal fixation of a left angle of mandible fracture. Temporary IMF involving IMF screws and fixation wires were employed to maintain occlusion during plating and subsequently removed post-operatively. It is proposed that the radiolucency was, as a result of the IMF screw placement, penetrating the LR4 root resulting in resorption of the tooth root and development of a radiolucency. This case highlights the importance of careful screw size and physical site location, and placement of IMF screws, as there can be permeant damage to a patient’s dentition.

Keywords: facial trauma, inter-maxillary fixation, mandibular radiolucency, oral and maxillo-facial surgery

Procedia PDF Downloads 134
1105 Detailed Quantum Circuit Design and Evaluation of Grover's Algorithm for the Bounded Degree Traveling Salesman Problem Using the Q# Language

Authors: Wenjun Hou, Marek Perkowski

Abstract:

The Traveling Salesman problem is famous in computing and graph theory. In short, it asks for the Hamiltonian cycle of the least total weight in a given graph with N nodes. All variations on this problem, such as those with K-bounded-degree nodes, are classified as NP-complete in classical computing. Although several papers propose theoretical high-level designs of quantum algorithms for the Traveling Salesman Problem, no quantum circuit implementation of these algorithms has been created up to our best knowledge. In contrast to previous papers, the goal of this paper is not to optimize some abstract complexity measures based on the number of oracle iterations, but to be able to evaluate the real circuit and time costs of the quantum computer. Using the emerging quantum programming language Q# developed by Microsoft, which runs quantum circuits in a quantum computer simulation, an implementation of the bounded-degree problem and its respective quantum circuit were created. To apply Grover’s algorithm to this problem, a quantum oracle was designed, evaluating the cost of a particular set of edges in the graph as well as its validity as a Hamiltonian cycle. Repeating the Grover algorithm with an oracle that finds successively lower cost each time allows to transform the decision problem to an optimization problem, finding the minimum cost of Hamiltonian cycles. N log₂ K qubits are put into an equiprobablistic superposition by applying the Hadamard gate on each qubit. Within these N log₂ K qubits, the method uses an encoding in which every node is mapped to a set of its encoded edges. The oracle consists of several blocks of circuits: a custom-written edge weight adder, node index calculator, uniqueness checker, and comparator, which were all created using only quantum Toffoli gates, including its special forms, which are Feynman and Pauli X. The oracle begins by using the edge encodings specified by the qubits to calculate each node that this path visits and adding up the edge weights along the way. Next, the oracle uses the calculated nodes from the previous step and check that all the nodes are unique. Finally, the oracle checks that the calculated cost is less than the previously-calculated cost. By performing the oracle an optimal number of times, a correct answer can be generated with very high probability. The oracle of the Grover Algorithm is modified using the recalculated minimum cost value, and this procedure is repeated until the cost cannot be further reduced. This algorithm and circuit design have been verified, using several datasets, to generate correct outputs.

Keywords: quantum computing, quantum circuit optimization, quantum algorithms, hybrid quantum algorithms, quantum programming, Grover’s algorithm, traveling salesman problem, bounded-degree TSP, minimal cost, Q# language

Procedia PDF Downloads 189
1104 ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad

Authors: Spyridon Plakoudas

Abstract:

After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best.

Keywords: ISIS, cyber-jihad, Syrian Civil War, cyber-terrorism, insurgency and counter-insurgency

Procedia PDF Downloads 132