Search results for: information security management system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31657

Search results for: information security management system

29137 Research Methodology and Mixed Methods (Qualitative and Quantitative) for Ph.D. Construction Management – Post-Disaster Reconstruction

Authors: Samuel Quashie

Abstract:

Ph.D. Construction Management methodology and mixed methods are organized to guide the researcher to assemble and assess data in the research activities. Construction management research is close to business management and social science research. It also contributes to researching the phenomenon and answering the research question, generating an integrated management system for post-disaster reconstruction in construction and related industries. Research methodology and methods drive the research to achieve the goal or goals, contribute to knowledge, or increase knowledge. This statement means the research methodology, mixed methods, aim, objectives, and processes address the research question, facilitate its achievement and foundation to conduct the study. Mixed methods use project-based case studies, interviews, observations, literature and archival document reviews, research questionnaires, and surveys, and evaluation of integrated systems used in the construction industry and related industries to address the research work. The research mixed methods (qualitative, quantitative) define the research topic and establish a more in-depth study. The research methodology is action research, which involves the collaboration of participants and service users to collect and evaluate data, studying the phenomenon, research question(s) to improve the situation in post-disaster reconstruction phase management.

Keywords: methodology, Ph.D. research, post-disaster reconstruction, mixed-methods qualitative and quantitative

Procedia PDF Downloads 211
29136 Review of the Model-Based Supply Chain Management Research in the Construction Industry

Authors: Aspasia Koutsokosta, Stefanos Katsavounis

Abstract:

This paper reviews the model-based qualitative and quantitative Operations Management research in the context of Construction Supply Chain Management (CSCM). Construction industry has been traditionally blamed for low productivity, cost and time overruns, waste, high fragmentation and adversarial relationships. The construction industry has been slower than other industries to employ the Supply Chain Management (SCM) concept and develop models that support the decision-making and planning. However the last decade there is a distinct shift from a project-based to a supply-based approach of construction management. CSCM comes up as a new promising management tool of construction operations and improves the performance of construction projects in terms of cost, time and quality. Modeling the Construction Supply Chain (CSC) offers the means to reap the benefits of SCM, make informed decisions and gain competitive advantage. Different modeling approaches and methodologies have been applied in the multi-disciplinary and heterogeneous research field of CSCM. The literature review reveals that a considerable percentage of CSC modeling accommodates conceptual or process models which discuss general management frameworks and do not relate to acknowledged soft OR methods. We particularly focus on the model-based quantitative research and categorize the CSCM models depending on their scope, mathematical formulation, structure, objectives, solution approach, software used and decision level. Although over the last few years there has been clearly an increase of research papers on quantitative CSC models, we identify that the relevant literature is very fragmented with limited applications of simulation, mathematical programming and simulation-based optimization. Most applications are project-specific or study only parts of the supply system. Thus, some complex interdependencies within construction are neglected and the implementation of the integrated supply chain management is hindered. We conclude this paper by giving future research directions and emphasizing the need to develop robust mathematical optimization models for the CSC. We stress that CSC modeling needs a multi-dimensional, system-wide and long-term perspective. Finally, prior applications of SCM to other industries have to be taken into account in order to model CSCs, but not without the consequential reform of generic concepts to match the unique characteristics of the construction industry.

Keywords: construction supply chain management, modeling, operations research, optimization, simulation

Procedia PDF Downloads 496
29135 The Role of Tax Management Components in Creating Value or Increasing Risk of Tehran Stock Exchange Firms

Authors: Fereshteh Darash

Abstract:

Reflective tax management corresponds to the Agency Theory since it determines the motivation of managers for tax management actions and short-term and long-term consequences. Therefore, selection of tax strategy contributes to the tax and financial position of the firm in the future. The aim of the present research is to evaluate the effect of tax management components on risk-taking of firms listed in Tehran stock exchange by using regression analysis method. Results show that tax effective rate, tax risk and tax planning have no significant effect on the firm's future risk. Results suggest that stakeholders assess the effective tax rate and delay in tax payment in line with their benefits. They tend to accept the higher risk cost for reduction of tax payments and benefits of higher liquidity in current period. Hence, effective tax rate and tax risk have no significant effect on future risk of the firm. Moreover, tax planning yields no information regarding the predictability of the future profits and as a result, it has no significant effect on the future risk of the firm since specific goals of financial reporting are in priority for the stakeholders and regardless of the firm’s data analysis, they take investment decisions and they less intend to purchase the stocks in a rational manner.

Keywords: tax management, tax effective rate, tax risk, tax planning, firm risk

Procedia PDF Downloads 114
29134 Building Safety Through Real-time Design Fire Protection Systems

Authors: Mohsin Ali Shaikh, Song Weiguo, Muhammad Kashan Surahio, Usman Shahid, Rehmat Karim

Abstract:

When the area of a structure that is threatened by a disaster affects personal safety, the effectiveness of disaster prevention, evacuation, and rescue operations can be summarized by three assessment indicators: personal safety, property preservation, and attribution of responsibility. These indicators are applicable regardless of the disaster that affects the building. People need to get out of the hazardous area and to a safe place as soon as possible because there's no other way to respond. The results of the tragedy are thus closely related to how quickly people are advised to evacuate and how quickly they are rescued. This study considers present fire prevention systems to address catastrophes and improve building safety. It proposes the methods of Prevention Level for Deployment in Advance and Spatial Transformation by Human-Machine Collaboration. We present and prototype a real-time fire protection system architecture for building disaster prevention, evacuation, and rescue operations. The design encourages the use of simulations to check the efficacy of evacuation, rescue, and disaster prevention procedures throughout the planning and design phase of the structure.

Keywords: prevention level, building information modeling, quality management system, simulated reality

Procedia PDF Downloads 45
29133 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 355
29132 Dynamical Analysis of the Fractional-Order Mathematical Model of Hashimoto’s Thyroiditis

Authors: Neelam Singha

Abstract:

The present work intends to analyze the system dynamics of Hashimoto’s thyroiditis with the assistance of fractional calculus. Hashimoto’s thyroiditis or chronic lymphocytic thyroiditis is an autoimmune disorder in which the immune system attacks the thyroid gland, which gradually results in interrupting the normal thyroid operation. Consequently, the feedback control of the system gets disrupted due to thyroid follicle cell lysis. And, the patient perceives life-threatening clinical conditions like goiter, hyperactivity, euthyroidism, hyperthyroidism, etc. In this work, we aim to obtain the approximate solution to the posed fractional-order problem describing Hashimoto’s thyroiditis. We employ the Adomian decomposition method to solve the system of fractional-order differential equations, and the solutions obtained shall be useful to provide information about the effect of medical care. The numerical technique is executed in an organized manner to furnish the associated details of the progression of the disease and to visualize it graphically with suitable plots.

Keywords: adomian decomposition method, fractional derivatives, Hashimoto's thyroiditis, mathematical modeling

Procedia PDF Downloads 195
29131 Exploration of RFID in Healthcare: A Data Mining Approach

Authors: Shilpa Balan

Abstract:

Radio Frequency Identification, also popularly known as RFID is used to automatically identify and track tags attached to items. This study focuses on the application of RFID in healthcare. The adoption of RFID in healthcare is a crucial technology to patient safety and inventory management. Data from RFID tags are used to identify the locations of patients and inventory in real time. Medical errors are thought to be a prominent cause of loss of life and injury. The major advantage of RFID application in healthcare industry is the reduction of medical errors. The healthcare industry has generated huge amounts of data. By discovering patterns and trends within the data, big data analytics can help improve patient care and lower healthcare costs. The number of increasing research publications leading to innovations in RFID applications shows the importance of this technology. This study explores the current state of research of RFID in healthcare using a text mining approach. No study has been performed yet on examining the current state of RFID research in healthcare using a data mining approach. In this study, related articles were collected on RFID from healthcare journal and news articles. Articles collected were from the year 2000 to 2015. Significant keywords on the topic of focus are identified and analyzed using open source data analytics software such as Rapid Miner. These analytical tools help extract pertinent information from massive volumes of data. It is seen that the main benefits of adopting RFID technology in healthcare include tracking medicines and equipment, upholding patient safety, and security improvement. The real-time tracking features of RFID allows for enhanced supply chain management. By productively using big data, healthcare organizations can gain significant benefits. Big data analytics in healthcare enables improved decisions by extracting insights from large volumes of data.

Keywords: RFID, data mining, data analysis, healthcare

Procedia PDF Downloads 216
29130 New Approach for Constructing a Secure Biometric Database

Authors: A. Kebbeb, M. Mostefai, F. Benmerzoug, Y. Chahir

Abstract:

The multimodal biometric identification is the combination of several biometric systems. The challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification.

Keywords: biometric databases, multimodal biometrics, security authentication, digital watermarking

Procedia PDF Downloads 374
29129 Generalized Up-downlink Transmission using Black-White Hole Entanglement Generated by Two-level System Circuit

Authors: Muhammad Arif Jalil, Xaythavay Luangvilay, Montree Bunruangses, Somchat Sonasang, Preecha Yupapin

Abstract:

Black and white holes form the entangled pair⟨BH│WH⟩, where a white hole occurs when the particle moves at the same speed as light. The entangled black-white hole pair is at the center with the radian between the gap. When the speed of particle motion is slower than light, the black hole is gravitational (positive gravity), where the white hole is smaller than the black hole. On the downstream side, the entangled pair appears to have a black hole outside the gap increases until the white holes disappear, which is the emptiness paradox. On the upstream side, when moving faster than light, white holes form times tunnels, with black holes becoming smaller. It will continue to move faster and further when the black hole disappears and becomes a wormhole (Singularity) that is only a white hole in emptiness (Emptiness). This research studies use of black and white holes generated by a two-level circuit for communication transmission carriers, in which high ability and capacity of data transmission can be obtained. The black and white hole pair can be generated by the two-level system circuit when the speech of a particle on the circuit is equal to the speed of light. The black hole forms when the particle speed has increased from slower to equal to the light speed, while the white hole is established when the particle comes down faster than light. They are bound by the entangled pair, signal and idler, ⟨Signal│Idler⟩, and the virtual ones for the white hole, which has an angular displacement of half of π radian. A two-level system is made from an electronic circuit to create black and white holes bound by the entangled bits that are immune or cloning-free from thieves. Start by creating a wave-particle behavior when its speed is equal to light black hole is in the middle of the entangled pair, which is the two bit gate. The required information can be input into the system and wrapped by the black hole carrier. A timeline (Tunnel) occurs when the wave-particle speed is faster than light, from which the entangle pair is collapsed. The transmitted information is safely in the time tunnel. The required time and space can be modulated via the input for the downlink operation. The downlink is established when the particle speed is given by a frequency(energy) form is down and entered into the entangled gap, where this time the white hole is established. The information with the required destination is wrapped by the white hole and retrieved by the clients at the destination. The black and white holes are disappeared, and the information can be recovered and used.

Keywords: cloning free, time machine, teleportation, two-level system

Procedia PDF Downloads 58
29128 Climate Change and Food Security in Nigeria: The World Bank Assisted Third National Fadama Development Programme (Nfdp Iii) Approach in Rivers State, Niger Delta, Nigeria

Authors: Temple Probyne Abali

Abstract:

Port Harcourt, Rivers State in the Niger Delta region of Nigeria is bedeviled by the phenomenon of climatechange, posing threat to food security and livelihood. This study examined a 4 decadel (1980-2020) trend of climate change as well as its socio-economic impact on food security in the region. Furthermore, to achieve sustainable food security and livelihood amidst the phenomenon, the study adopted the World Bank Assisted Third National Fadama Development Programme approach. The data source for climate change involved secondary data from Nigeria Meteorological Agency (NIMET). Consequently, the results for climate change over the 4decade period were displayed in tables, charts and maps for the expected changes. Data sources on socio-economic impact of food security and livelihood were acquired through questionnairedesign. A purposive random sampling technique was used in selecting 5 coastal communities inthe region known for viable economic potentials for agricultural development and the resultswere analyzed using Analysis of Variance (ANOVA). The Participatory Rural Appraisal (PRA) technique of the World Bank for needs assessment wasadopted in selecting 5 agricultural sub-project proposals/activities based on groups’ commoneconomic interest from a total of 1,000 farmers each drawn from the 5 communities of differentage groups including men, women, youths and the vulnerable. Based on the farmers’ sub-projectinterests, the various groups’ Strength, Weakness, Opportunities and Threats (SWOT), Problem Listing Matrix, Skill Gap Analysis as well as EIAson their sub-project proposals/activities were analyzed with substantialMonitoring and Evaluation (M & E), using the Specific, Measurable, Attribute, Reliable and Time bound (SMART)approach. Based on the findings from the PRA technique, the farmers recorded considerableincreaseinincomeofover200%withinthe5yearprojectplan(2008-2013).Thestudyrecommends capacity building and advisory services on this PRA innovation. By so doing, there would be a sustainable increase in agricultural production and assured food security in an environmental friendly manner, in line with the United Nation’s Sustainable Development Goals(SDGs).

Keywords: climate change, food security, fadama, world bank, agriculture, sdgs

Procedia PDF Downloads 79
29127 Software Defined Storage: Object Storage over Hadoop Platform

Authors: Amritesh Srivastava, Gaurav Sharma

Abstract:

The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.

Keywords: Hadoop, HBase, object storage, REST

Procedia PDF Downloads 321
29126 Application of the Discrete-Event Simulation When Optimizing of Business Processes in Trading Companies

Authors: Maxat Bokambayev, Bella Tussupova, Aisha Mamyrova, Erlan Izbasarov

Abstract:

Optimization of business processes in trading companies is reviewed in the report. There is the presentation of the “Wholesale Customer Order Handling Process” business process model applicable for small and medium businesses. It is proposed to apply the algorithm for automation of the customer order processing which will significantly reduce labor costs and time expenditures and increase the profitability of companies. An optimized business process is an element of the information system of accounting of spare parts trading network activity. The considered algorithm may find application in the trading industry as well.

Keywords: business processes, discrete-event simulation, management, trading industry

Procedia PDF Downloads 331
29125 Biorisk Management Education for Undergraduates Studying Clinical Microbiology at University in Japan

Authors: Shuji Fujimoto, Fumiko Kojima, Mika Shigematsu

Abstract:

Biorisk management (Biosafety/Biosecurity) is required for anyone working in a clinical laboratory (including medical/clinical research laboratories) where infectious agents and potentially hazardous biological materials are examined/stored. Proper education and training based on international standards of biorisk management should be provided not only as a part of laboratory safety program in work place but also as a part of introductory training at educational institutions for continuity and to elevate overall baseline of the biorisk management. We reported results of the pilot study of biorisk management education for graduate students majored in laboratory diagnostics previously. However, postgraduate education is still late in their profession and the participants’ interview also revealed importance and demands of earlier biorisk management education for undergraduates. The aim of this study is to identify the need for biosafety/biosecurity education and training program which is designed for undergraduate students who are entering the profession in clinical microbiology. We modified the previous program to include more basic topics and explanations (risk management, principles of safe clinical lab practices, personal protective equipment, disinfection, disposal of biological substances) and provided incorporating in the routine educational system for faculty of medical sciences in Kyushu University. The results of the pre and post examinations showed that the knowledge of the students on biorisk control had developed effectively as a proof of effectiveness of the program even in the undergraduate students. Our study indicates that administrating the basic biorisk management program in the earlier stage of learning will add positive impact to the understanding of biosafety to the health professional education.

Keywords: biorisk management, biosafety, biosecurity, clinical microbiology, education for undergraduates

Procedia PDF Downloads 203
29124 Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio

Authors: Mohammad Jamiu Abdullahi, Shykh Ahmed Abdussalam

Abstract:

The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence.

Keywords: Arabic Fodio Nigeria security, advocacy governance scholar Usman, British colonial perspective shaykh, leadership Islam jihad politics

Procedia PDF Downloads 319
29123 Financial Instruments Disclosure: A Review of the Literature

Authors: Y. Tahat, T. Dunne, S. Fifield, D. Power

Abstract:

Information about a firm’s usage of Financial Instruments (FIs) plays a very important role in determining its financial position and performance. Yet accounting standard-setters have encountered problems when deciding on the FI-related disclosures which firms must make. The primary objective of this paper is to review the extant literature on FI disclosure. This objective is achieved by surveying the literature on: the corporate usage of FIs; the different accounting standards adopted concerning FIs; and empirical studies on FI disclosure. This review concludes that the current research on FI disclosure has generated a number of useful insights. In particular, the paper reports that: FIs are a very important risk management mechanism in ensuring that companies have the cash available to make value-enhancing investments, however, without a clear set of risk management objectives, using such instruments can be dangerous; accounting standards concerning FIs have resulted in enhanced transparency about the usage of these instruments; and FI-related information is a key input into investors’ decision-making processes. Finally, the paper provides a number of suggestions for future research in the area.

Keywords: financial instruments, financial reporting, accounting standards, value relevance, corporate disclosure

Procedia PDF Downloads 396
29122 Viability of Irrigation Water Conservation Practices in the Low Desert of California

Authors: Ali Montazar

Abstract:

California and the Colorado River Basin are facing increasing uncertainty concerning water supplies. The Colorado River is the main source of irrigation water in the low desert of California. Currently, due to an increasing water-use competition and long-term drought at the Colorado River Basin, efficient use of irrigation water is one of the highest conservation priorities in the region. This study aims to present some of current irrigation technologies and management approaches in the low desert and assess the viability and potential of these water management practices. The results of several field experiments are used to assess five water conservation practices of sub-surface drip irrigation, automated surface irrigation, sprinkler irrigation, tail-water recovery system, and deficit irrigation strategy. The preliminary results of several ongoing studies at commercial fields are presented, particularly researches in alfalfa, sugar beets, kliengrass, sunflower, and spinach fields. The findings indicate that all these practices have significant potential to conserve water (an average of 1 ac-ft/ac) and enhance the efficiency of water use (15-25%). Further work is needed to better understand the feasibility of each of these applications and to help maintain profitable and sustainable agricultural production system in the low desert as water and labor costs, and environmental issues increase.

Keywords: automated surface irrigation, deficit irrigation, low desert of California, sprinkler irrigation, sub-surface drip irrigation, tail-water recovery system

Procedia PDF Downloads 140
29121 Study of Linear Generator for Vibration Energy Harvesting of Frequency more than 50Hz

Authors: Seong-Jin Cho, Jin Ho Kim

Abstract:

Energy harvesting is the technology which gathers and converts external energies such as light, vibration and heat which are disposed into reusable electrical energy and uses such electrical energy. The vibration energy harvesting is very interesting technology because it produces very high density of energy and unaffected by the climate. Vibration energy can be harvested by the electrostatic, electromagnetic and piezoelectric systems. The electrostatic system has low energy conversion efficiency, and the piezoelectric system is expensive and needs the frequent maintenance because it is made of piezoelectric ceramic. On the other hand, the electromagnetic system has a long life time and high harvesting efficiency, and it is relatively cheap. The electromagnetic harvesting system includes the linear generator and the rotary-type generator. The rotary-type generators require the additional mechanical conversion device if it uses linear motion of vibration. But, the linear generator uses directly linear motion of vibration without a mechanical conversion device, and it has uncomplicated structure and light weight compared with the rotary-type generator. Therefore, the linear electromagnetic generator can be useful in using vibration energy harvesting. The pole transformer systems need electricity sensor system for sending voltage and power information to administrator. Therefore, the battery is essential, and its regular maintenance of replacement is required. In case of the transformer of high location in mountainous areas, the person can’t easily access it resulting in high maintenance cost. To overcome these problems, we designed and developed the linear electromagnetic generator which can replace battery in electricity sensor system for sending voltage and power information of the pole transformer. And, it uses vibration energy of frequency more than 50 Hz by the pole transformer. In order to analyze the electromagnetic characteristics of small linear electric generator, a commercial electromagnetic finite element analysis program "MAXWELL" was used. Then, through the actual production and experiment of linear generator, we confirmed output power of linear generator.

Keywords: energy harvesting, frequency, linear generator, experiment

Procedia PDF Downloads 248
29120 Role of Academic Library in/for Information Literacy

Authors: Veena Rani

Abstract:

This paper presents the role of academic library in information literacy in the present time. Information is the very important aspect for the growth of any country. In this context information literacy is an essential tool in the development of various fields. Academic library is an essential part of university as well as of an institution. In Academic library we can include university library, college library as well as school library. Academic libraries are playing an important role for information literacy. Academic libraries provide excellent services for the benefit of students, teachers, researchers, and all those who are interested in education. All over the world many of the schemes, policies and services provide for information literacy.

Keywords: information literacy, academic library, tool literacy, higher education

Procedia PDF Downloads 347
29119 China and the Middle East in the 21st Century: From Political Mediation to Economic Expansionism

Authors: Ali Asghar Sotoudeh

Abstract:

Mediation Diplomacy has emerged as one of the main pillars of China's foreign policy goals and practices, and Beijing has established itself as a peacekeeping force in regional conflicts and crises such as Afghanistan, Syria, Sudan, Yemen, and the Arab-Israeli peace process. China is deepening and intensifying its diplomatic interventions in the Middle East and trying to shape the security and political developments in the Middle East. On the other hand, economically, China has become one of the most important trading partners with Middle Eastern governments. China is also seeking to expand its foreign policy and economic interests in the Middle East through the New Silk Road initiative and has signed cooperation agreements with 17 Arab countries. In this regard, due to the importance of the subject, this research focuses on answering this question; what is the basis of China's political mediation and economic expansionism in the Middle East? In parallel with this question, this study follows the hypothesis that the mediating role of peace is a legitimate way for China to intervene in Middle East political crises, Without causing China to deviate from its traditional guiding principles based on non-interference in the internal affairs of other actors in the international system. This policy also promotes the security of economic interests and increases the country's political influence in the Middle East. The research method is descriptive-analytical based on the qualitative method, and the data collection method is library and internet resources.

Keywords: China, middle east, political mediation, economic expansionism

Procedia PDF Downloads 131
29118 A Fast, Reliable Technique for Face Recognition Based on Hidden Markov Model

Authors: Sameh Abaza, Mohamed Ibrahim, Tarek Mahmoud

Abstract:

Due to the development in the digital image processing, its wide use in many applications such as medical, security, and others, the need for more accurate techniques that are reliable, fast and robust is vehemently demanded. In the field of security, in particular, speed is of the essence. In this paper, a pattern recognition technique that is based on the use of Hidden Markov Model (HMM), K-means and the Sobel operator method is developed. The proposed technique is proved to be fast with respect to some other techniques that are investigated for comparison. Moreover, it shows its capability of recognizing the normal face (center part) as well as face boundary.

Keywords: HMM, K-Means, Sobel, accuracy, face recognition

Procedia PDF Downloads 313
29117 Border Control and Human Rights Violations: Lessons Learned from the United States and Potential Solutions for the European Union

Authors: María Elena Menéndez Ibáñez

Abstract:

After the terrorist attacks of 9/11, new measures were adopted by powerful countries and regions like the United States and the European Union in order to safeguard their security. In 2002, the US created the Department of Homeland Security with one sole objective; to protect American soil and people. The US adopted new policies that made every immigrant a potential terrorist and a threat to their national security. Stronger border control became one of the key elements of the fight against organized crime and terrorism. The main objective of this paper is to compare some of the most important and radical measures adopted by the US, even those that resulted in systematic violations of human rights, with some of the European measures adopted after the 2015 Paris attacks of 2015, such as unlawful detainment of prisoners and other measures against foreigners. Through the Schengen agreement, the European Union has tried to eliminate tariffs and border controls, in order to guarantee successful economic growth. Terrorists have taken advantage of this and have made the region vulnerable to attacks. Authorities need to strengthen their surveillance methods in order to safeguard the region and its stability. Through qualitative methods applied to social sciences, this research will also try to explain why some of the mechanisms proven to be useful in the US would not be so in Europe, especially because they would result in human rights violations. Finally, solutions will be offered that would not put the whole Schengen Agreement at risk. Europe cannot reinstate border control, without making individuals vulnerable to human rights violations.

Keywords: border control, immigration, international cooperation, national security

Procedia PDF Downloads 121
29116 The Use of Information and Communication Technology within and between Emergency Medical Teams during a Disaster: A Qualitative study

Authors: Badryah Alshehri, Kevin Gormley, Gillian Prue, Karen McCutcheon

Abstract:

In a disaster event, sharing patient information between the pre-hospital Emergency Medical Services (EMS) and Emergency Department (ED) hospitals is a complex process during which important information may be altered or lost due to poor communication. The aim of this study was to critically discuss the current evidence base in relation to communication between pre- EMS hospital and ED hospital professionals by the use of Information and Communication Systems (ICT). This study followed the systematic approach; six electronic databases were searched: CINAHL, Medline, Embase, PubMed, Web of Science, and IEEE Xplore Digital Library were comprehensively searched in January 2018 and a second search was completed in April 2020 to capture more recent publications. The study selection process was undertaken independently by the study authors. Both qualitative and quantitative studies were chosen that focused on factors that are positively or negatively associated with coordinated communication between pre-hospital EMS and ED teams in a disaster event. These studies were assessed for quality, and the data were analyzed according to the key screening themes which emerged from the literature search. Twenty-two studies were included. Eleven studies employed quantitative methods, seven studies used qualitative methods, and four studies used mixed methods. Four themes emerged on communication between EMTs (pre-hospital EMS and ED staff) in a disaster event using the ICT. (1) Disaster preparedness plans and coordination. This theme reported that disaster plans are in place in hospitals, and in some cases, there are interagency agreements with pre-hospital and relevant stakeholders. However, the findings showed that the disaster plans highlighted in these studies lacked information regarding coordinated communications within and between the pre-hospital and hospital. (2) Communication systems used in the disaster. This theme highlighted that although various communication systems are used between and within hospitals and pre-hospitals, technical issues have influenced communication between teams during disasters. (3) Integrated information management systems. This theme suggested the need for an integrated health information system that can help pre-hospital and hospital staff to record patient data and ensure the data is shared. (4) Disaster training and drills. While some studies analyzed disaster drills and training, the majority of these studies were focused on hospital departments other than EMTs. These studies suggest the need for simulation disaster training and drills, including EMTs. This review demonstrates that considerable gaps remain in the understanding of the communication between the EMS and ED hospital staff in relation to response in disasters. The review shows that although different types of ICTs are used, various issues remain which affect coordinated communication among the relevant professionals.

Keywords: emergency medical teams, communication, information and communication technologies, disaster

Procedia PDF Downloads 115
29115 Analysis of Improved Household Solid Waste Management System in Minna Metropolis, Niger State, Nigeria

Authors: M. A. Ojo, E. O. Ogbole, A. O. Ojo

Abstract:

This study analysed improved household solid waste management system in Minna metropolis, Niger state. Multi-staged sampling technique was used to administer 155 questionnaires to respondents, where Minna was divided into two income groups A and B based on the quality of the respondent’s houses. Primary data was collected with the aid of structured questionnaires and analysed using descriptive statistics to obtain results for the socioeconomic characteristics of respondents, types of waste generated and methods of disposing solid waste, the level of awareness and reliability of waste disposal methods as well as the willingness of households to pay for solid waste management in the area. The results revealed that majority of the household heads in the study area were male, 94.20% of the household heads fell between the ages of 21 and 50 and also that 96.80% of them had one form of formal education or the other. The results also revealed that 47.10% and 43.20% of the households generated food wastes and polymers respectively as a major constituent of waste disposed. The results of this study went further to reveal that 81.90% of the household heads were aware of the use of collection cans as a method of waste disposal while only 32.90% of them considered the method highly reliable. Multiple regression was used to determine the factors affecting the willingness of households to pay for waste disposal in the study area. The results showed that 76.10% of the respondents were willing to pay for solid waste management which indicates that households in Minna are concerned and willing to cater for their immediate environment. The multiple regression results revealed that age, income, environmental awareness and household expenditure have a positive and statistically significant relationship with the willingness of households to pay for waste disposal in the area while household size has a negative and statistically significant relationship with households’ willingness to pay. Based on these findings, it was recommended that more waste management services be made readily available to residents of Minna, waste collection service should be privatised to increase their effectiveness through increased competition and also that community participatory approach be used to create more environmental awareness amongst residents.

Keywords: household, solid waste, management, WTP

Procedia PDF Downloads 283
29114 An Internet of Things-Based Weight Monitoring System for Honey

Authors: Zheng-Yan Ruan, Chien-Hao Wang, Hong-Jen Lin, Chien-Peng Huang, Ying-Hao Chen, En-Cheng Yang, Chwan-Lu Tseng, Joe-Air Jiang

Abstract:

Bees play a vital role in pollination. This paper focuses on the weighing process of honey. Honey is usually stored at the comb in a hive. Bee farmers brush bees away from the comb and then collect honey, and the collected honey is weighed afterward. However, such a process brings strong negative influences on bees and even leads to the death of bees. This paper therefore presents an Internet of Things-based weight monitoring system which uses weight sensors to measure the weight of honey and simplifies the whole weighing procedure. To verify the system, the weight measured by the system is compared to the weight of standard weights used for calibration by employing a linear regression model. The R2 of the regression model is 0.9788, which suggests that the weighing system is highly reliable and is able to be applied to obtain actual weight of honey. In the future, the weight data of honey can be used to find the relationship between honey production and different ecological parameters, such as bees’ foraging behavior and weather conditions. It is expected that the findings can serve as critical information for honey production improvement.

Keywords: internet of things, weight, honey, bee

Procedia PDF Downloads 442
29113 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 71
29112 Novel Fluorescent High Density Polyethylene Composites for Fused Deposition Modeling 3D Printing in Packaging Security Features

Authors: Youssef R. Hassan, Mohamed S. Hasanin, Reda M. Abdelhameed

Abstract:

Recently, innovations in packaging security features become more important to see the originality of packaging in industrial application. Luminescent 3d printing materials have been a promising property which can provides a unique opportunity for the design and application of 3D printing. Lack emission of terbium ions, as a source of green emission, in salt form prevent its uses in industrial applications, so searching about stable and highly emitter material become essential. Nowadays, metal organic frameworks (MOFs) play an important role in designing light emitter material. In this work, fluorescent high density polyethylene (FHDPE) composite filament with Tb-benzene 1,3,5-tricarboxylate (Tb-BTC) MOFs for 3D printing have been successfully developed.HDPE pellets were mixed with Tb-BTC and melting extrustion with single screw extruders. It was found that Tb-BTCuniformly dispersed in the HDPE matrix and significantly increased the crystallinity of PE, which not only maintained the good thermal property but also improved the mechanical properties of Tb-BTC@HDPE composites. Notably, the composite filaments emitted ultra-bright green light under UV lamp, and the fluorescence intensity increased as the content of Tb-BTC increased. Finally, several brightly luminescent exquisite articles could be manufactured by fused deposition modeling (FDM) 3D printer with these new fluorescent filaments. In this context, the development of novel fluorescent Tb-BTC@HDPE composites was combined with 3D printing technology to amplified the packaging Security Features.

Keywords: 3D printing, fluorescent, packaging, security

Procedia PDF Downloads 82
29111 Application of the Building Information Modeling Planning Approach to the Factory Planning

Authors: Peggy Näser

Abstract:

Factory planning is a systematic, objective-oriented process for planning a factory, structured into a sequence of phases, each of which is dependent on the preceding phase and makes use of particular methods and tools, and extending from the setting of objectives to the start of production. The digital factory, on the other hand, is the generic term for a comprehensive network of digital models, methods, and tools – including simulation and 3D visualisation – integrated by a continuous data management system. Its aim is the holistic planning, evaluation and ongoing improvement of all the main structures, processes and resources of the real factory in conjunction with the product. Digital factory planning has already become established in factory planning. The application of Building Information Modeling has not yet been established in factory planning but has been used predominantly in the planning of public buildings. Furthermore, this concept is limited to the planning of the buildings and does not include the planning of equipment of the factory (machines, technical equipment) and their interfaces to the building. BIM is a cooperative method of working, in which the information and data relevant to its lifecycle are consistently recorded, managed and exchanged in a transparent communication between the involved parties on the basis of digital models of a building. Both approaches, the planning approach of Building Information Modeling and the methodical approach of the Digital Factory, are based on the use of a comprehensive data model. Therefore it is necessary to examine how the approach of Building Information Modeling can be extended in the context of factory planning in such a way that an integration of the equipment planning, as well as the building planning, can take place in a common digital model. For this, a number of different perspectives have to be investigated: the equipment perspective including the tools used to implement a comprehensive digital planning process, the communication perspective between the planners of different fields, the legal perspective, that the legal certainty in each country and the quality perspective, on which the quality criteria are defined and the planning will be evaluated. The individual perspectives are examined and illustrated in the article. An approach model for the integration of factory planning into the BIM approach, in particular for the integrated planning of equipment and buildings and the continuous digital planning is developed. For this purpose, the individual factory planning phases are detailed in the sense of the integration of the BIM approach. A comprehensive software concept is shown on the tool. In addition, the prerequisites required for this integrated planning are presented. With the help of the newly developed approach, a better coordination between equipment and buildings is to be achieved, the continuity of the digital factory planning is improved, the data quality is improved and expensive implementation errors are avoided in the implementation.

Keywords: building information modeling, digital factory, digital planning, factory planning

Procedia PDF Downloads 248
29110 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 401
29109 Online Augmented Reality Mathematics Application

Authors: Farhaz Amyn Rajabali, Collins Odour

Abstract:

Mathematics has been there for over 4000 years and has been one of the very first educational topics explored by human civilization. Throughout the years, it has become a complex study and has derived so many other subjects. With advancements in ICT, most of the computation in mathematics is done using powerful computers. In many different countries, the children in primary and secondary schools face difficulties in learning mathematics, and this has many reasons behind it, one being the students don’t engage much with the mathematical concepts hence failing to understand them deeply. The objective of this system is to help the students understand this mathematical concept interactively, which in return will encourage the love for learning and increase thorough understanding of many concepts. Research was conducted among a group of samples and about 50% of respondents replied that they had never used an augmented reality application before. This means that the chances for this system to be accepted in the market are high due to its innovative idea. Around 60% of people did recommend the use of this system to learn mathematics. The study also showed several challenges in an educational system, including but not limited to lack of resources which was chosen by 30% of respondents, the challenge to read from textbooks (34.6%) and how hard it is to visualize concepts (46.2%). The survey question asked what benefits the users see using augmented reality to learn mathematics. The responses that were picked the most were increased student engagement and using real-world examples to understand concepts, both being 65.4% and followed by easy access to learning material at 61.5%, and increased knowledge retention at 50%. This shows that there are plenty of issues with an education system that can be addressed by software applications; now that the newer generation is so enthusiastic about electronic devices, it can actually be used to deliver good knowledge and skills to the upcoming students and mitigate most of the challenges faced currently. The study concludes that the implementation of the system is a best practice for the educational system especially leveraging a new technology that has the ability to attract the attention of many young students and use it to deliver information. It will also give rise to awareness of new technology and on multiple ways it can be implemented. Addressing the educational sector in developing countries using information technology is an imperative task since these kids studying now is the future of the country and will use what they learn and understand during their childhood will help them to make decisions about their lives in the future which will not only affect them personally but also affect the whole society in general.

Keywords: AR, mathematics, system development, augmented reality

Procedia PDF Downloads 78
29108 The Mediterranean Migration Crisis: The North East Hotspot Policy

Authors: Loizos A. Hadjivasiliou, May Chehab

Abstract:

Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.

Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area

Procedia PDF Downloads 165