Search results for: safety and security
3168 Remote Sensing Study of Wind Energy Potential in Agsu District
Authors: U. F. Mammadova
Abstract:
Natural resources is the main self-supplying way which is being studied in the paper. Ecologically clean and independent clean energy stock is wind one. This potential is first studied by applying remote sensing way. In any coordinate of the district, wind energy potential has been determined by measuring the potential by applying radar technique which gives a possibility to reveal 2 D view. At several heights, including 10,50,100,150,200 ms, the measurements have been realized. The achievable power generation for m2 in the district was calculated. Daily, hourly, and monthly wind energy potential data were graphed and schemed in the paper. The energy, environmental, and economic advantages of wind energy for the Agsu district were investigated by analyzing radar spectral measurements after the remote sensing process.Keywords: wind potential, spectral radar analysis, ecological clean energy, ecological safety
Procedia PDF Downloads 933167 Using TRACE and SNAP Codes to Establish the Model of Maanshan PWR for SBO Accident
Authors: B. R. Shen, J. R. Wang, J. H. Yang, S. W. Chen, C. Shih, Y. Chiang, Y. F. Chang, Y. H. Huang
Abstract:
In this research, TRACE code with the interface code-SNAP was used to simulate and analyze the SBO (station blackout) accident which occurred in Maanshan PWR (pressurized water reactor) nuclear power plant (NPP). There are four main steps in this research. First, the SBO accident data of Maanshan NPP were collected. Second, the TRACE/SNAP model of Maanshan NPP was established by using these data. Third, this TRACE/SNAP model was used to perform the simulation and analysis of SBO accident. Finally, the simulation and analysis of SBO with mitigation equipments was performed. The analysis results of TRACE are consistent with the data of Maanshan NPP. The mitigation equipments of Maanshan can maintain the safety of Maanshan in the SBO according to the TRACE predictions.Keywords: pressurized water reactor (PWR), TRACE, station blackout (SBO), Maanshan
Procedia PDF Downloads 1973166 Automatic Aggregation and Embedding of Microservices for Optimized Deployments
Authors: Pablo Chico De Guzman, Cesar Sanchez
Abstract:
Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.Keywords: aggregation, deployment, embedding, resource allocation
Procedia PDF Downloads 2063165 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher
Authors: Okike Benjamin, Garba E. J. D.
Abstract:
The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.Keywords: merged irregular transposition, error level, model estimation, message splitting
Procedia PDF Downloads 3163164 Strategies of Spatial Optimization for Open Space in the Old-Age Friendly City: An Investigation of the Behavior of the Elderly in Xicheng Square in Hangzhou
Authors: Yunxiang Fang
Abstract:
With the aging trend continuing to accelerate, open space is important for the daily life of the elderly, and its old-age friendliness is worthy of attention. Based on behavioral observation and literature research, this paper studies the behavior of the elderly in urban open space. Through the investigation, classification and quantitative analysis of the activity types, time characteristics and spatial behavior order of the elderly in Xicheng Square in Hangzhou, it summarizes the square space suitable for the psychological needs, physiology and activity needs of the elderly, combined with the basis of literature research. Finally, the suggestions for the improvement of the old-age friendship of Xicheng Square are put forward, from the aspects of microclimate, safety and accessibility, space richness and service facility quality.Keywords: behavior characteristics, old-age friendliness, open space, square
Procedia PDF Downloads 1753163 Factors Mitigating against the Use of Alternative to Antibiotics (Phytobiotics) In Poultry Production among Farming Households in Nigeria
Authors: Akinola Helen Olufunke, Soetan Olatunbosun Jonathan, Adeleye Oludamola
Abstract:
Introduction: Antibiotic resistance has grown significantly, which is a major cause for concern. There have not been many significant developments in antibiotics over the past few decades, and practically all of the ones that are currently in use are losing effectiveness against pathogenic germs. Researchers are starting to focus more on the physiologically active compounds found in plants, particularly phytobiotics in poultry production. Consumption of chicken products is among the greatest in the country, but numerous nations, including Nigeria, use excessive amounts of necessary antibiotics in poultry farming, endangering the safety of such goods (through antimicrobial residues). Drug resistance has become a widespread issue as a result of the risky use of antibiotics in the chicken production industry. In order to replace antibiotics, biotic or natural products like phytobiotics (also known as botanicals or phytogenics) have drawn a lot of interest. Phytobiotics or their components are thought to be a relatively recent category of natural herbs that have acquired acceptance and favor among chicken farmers. The addition of several phytobiotic additions to poultry feed has demonstrated its capacity to improve both the broiler and layer populations' productivity. Design: Experimental research design and cross-sectional study was carried out at every 300 purposively selected farming household in the six-geopolitical zone in Nigeria. Data Analysis: A semi-structured questionnaire was administered to each farmer, and quantitative data were analyzed using Statistical Package for Social Science (SPSS) while the Chi-square test was used to analyze factors mitigating the use of Phytobiotics. Result: The result shows that the benefits associated with the use of phytobiotics are contributed to growth promotion in chickens and enhancement of productive performance of broiler and layer, which could be attributed to their antioxidant activity. The result further revealed that factors mitigating the use of phytobiotics were lack of knowledge in the use of phytobiotics, overdose or underdose usage, and seasonal availability of the phytobiotics. Others are the educational level of the farmers, intrinsic motivation, income poultry farming experience, price of phytobiotics based additives feeds, and intensity of extension agents in visiting them. Conclusion: The difficulties associated with using phytobiotics in chicken farms limit their willingness to boost productivity. The study found that most farmers were ignorant, which prevented them from handling this notion and turning their poultry into a viable enterprise while also allowing them to be creative. They believed that packing phytobiotics-based additive feed was expensive, and lastly, the seasonal availability of some phytobiotics. Recommendation: Further research in phytobiotics use in Nigeria should be carried out in order to establish its efficiency, safety, and awareness.Keywords: mitigating, antibiotics, phytobiotics, poultry farming
Procedia PDF Downloads 1783162 Development of the Food Market of the Republic of Kazakhstan in the Field of Milk Processing
Authors: Gulmira Zhakupova, Tamara Tultabayeva, Aknur Muldasheva, Assem Sagandyk
Abstract:
The development of technology and production of products with increased biological value based on the use of natural food raw materials are important tasks in the policy of the food market of the Republic of Kazakhstan. For Kazakhstan, livestock farming, in particular sheep farming, is the most ancient and developed industry and way of life. The history of the Kazakh people is largely connected with this type of agricultural production, with established traditions using dairy products from sheep's milk. Therefore, the development of new technologies from sheep’s milk remains relevant. In addition, one of the most promising areas for the development of food technology for therapeutic and prophylactic purposes is sheep milk products as a source of protein, immunoglobulins, minerals, vitamins, and other biologically active compounds. This article presents the results of research on the study of milk processing technology. The objective of the study is to study the possibilities of processing sheep milk and its role in human nutrition, as well as the results of research to improve the technology of sheep milk products. The studies were carried out on the basis of sanitary and hygienic requirements for dairy products in accordance with the following test methods. To perform microbiological analysis, we used the method for identifying Salmonella bacteria (Horizontal method for identifying, counting, and serotyping Salmonella) in a certain mass or volume of product. Nutritional value is a complex of properties of food products that meet human physiological needs for energy and basic nutrients. The protein mass fraction was determined by the Kjeldahl method. This method is based on the mineralization of a milk sample with concentrated sulfuric acid in the presence of an oxidizing agent, an inert salt - potassium sulfate, and a catalyst - copper sulfate. In this case, the amino groups of the protein are converted into ammonium sulfate dissolved in sulfuric acid. The vitamin composition was determined by HPLC. To determine the content of mineral substances in the studied samples, the method of atomic absorption spectrophotometry was used. The study identified the technological parameters of sheep milk products and determined the prospects for researching sheep milk products. Microbiological studies were used to determine the safety of the study product. According to the results of the microbiological analysis, no deviations from the norm were identified. This means high safety of the products under study. In terms of nutritional value, the resulting products are high in protein. Data on the positive content of amino acids were also obtained. The results obtained will be used in the food industry and will serve as recommendations for manufacturers.Keywords: dairy, milk processing, nutrition, colostrum
Procedia PDF Downloads 603161 Insider Theft Detection in Organizations Using Keylogger and Machine Learning
Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.
Abstract:
About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.Keywords: cyber security, machine learning, cyclic process, email notification
Procedia PDF Downloads 643160 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration
Authors: Carmen Rocio Fernandez Diaz
Abstract:
This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration
Procedia PDF Downloads 1703159 Development of Enhanced Data Encryption Standard
Authors: Benjamin Okike
Abstract:
There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.Keywords: encryption, enhanced data encryption, encryption techniques, information security
Procedia PDF Downloads 1543158 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.Keywords: fault tolerance, improved RSA, key agreement, proxy signature
Procedia PDF Downloads 4283157 Experimental Measurements of Fire Retardants on Plywood at Fire Test
Authors: Gisele C. A. Martins, Leonardo A. Marcolin, Laurenn B. de Macedo, Francisco A. Rocco Lahr, Carlito Calil Jr
Abstract:
The use and development of wood composite materials increased in the past few years. However, in Brazil there are some restrictions on these products regarding their use since it could be considered a potential risk in a fire situation. Thus, becomes evident the need for research aiming to fit these in safety standards. This study aims to evaluate the efficiency of two new fire retardant products produced by a Brazilian industry. Tests were performed on plywood panels of Pinus spp previously immersed, varying the products concentrations and compared with untreated samples. The test used to evaluate the flame spread in a panel was the modified Schlyter test. The product in question was proved efficient, before and after shutting off the burner. Comparing panels with the panels without treatment, there was a decrease of 400% of the height of the flame spread on the treated ones.Keywords: fire retardant, flame spread, plywood, wood-based material
Procedia PDF Downloads 4373156 The Potential for Maritime Tourism: An African Perspective
Authors: Lynn C. Jonas
Abstract:
The African continent is rich in coastal history, heritage, and culture, presenting immense potential for the development of maritime tourism. Shipping and its related components are generally associated with the maritime industry, and tourism’s link is to the various forms of nautical tourism. Activities may include cruising, yachting, visits to lighthouses, ports, harbors, and excursions to related sites of cultural, historical, or ecological significance. There have been hundreds of years of explorers leaving a string of shipwrecks along the various coastal areas on the continent in their pursuit of establishing trade routes between Europe, Africa, and the Far East. These shipwrecks present diving opportunities in artificial reefs and marine heritage to be explored in various ways in the maritime cultural zones. Along the South African coast, for example, six Portuguese shipwrecks highlight the Bartolomeu Dias legacy of exploration, and there are a number of warships in Tanzanian waters. Furthermore, decades of African countries being under colonized rule have left the continent with an intricate cultural heritage that is enmeshed in European language architecture interlinked with, in many instances, hard-fought independent littoral states. There is potential for coastal trails to be developed to follow these historical events as, at one point in history, France had colonized 35 African states, and subsequently, 32 African states were colonized by Britain. Countries such as Cameroon still have the legacy of Francophone versus Anglophone as a result of this shift in colonizers. Further to the colonized history of the African continent, there is an uncomfortable heritage of the slave trade history. To a certain extent, these coastal slave trade posts are being considered attractive to a niche tourism audience; however, there is potential for education and interpretive measures to grow this as a tourism product. Notwithstanding these potential opportunities, there are numerous challenges to consider, such as poor maritime infrastructure, maritime security concerns with issues such as piracy, transnational crimes including weapons and migrant smuggling, drug, and human trafficking. These and related maritime issues contribute to the concerns over the porous nature of African ocean gateways, adding to the security concerns for tourists. This theoretical paper will consider these trends and how they may contribute to the growth and development of maritime tourism on the African continent. African considerations of the growth potential of tourism in coastal and marine spaces are needed, particularly with a focus on embracing the continent's tumultuous past as part of its heritage. This has the potential to contribute to the creation of a sense of ownership of opportunities.Keywords: coastal trade routes, maritime tourism, shipwrecks, slave trade routes
Procedia PDF Downloads 273155 Re-Invent Corporate Governance - Ethical Way
Authors: Talha Sareshwala
Abstract:
The purpose of this research paper is to help entrepreneurs build an environment of trust, transparency and accountability necessary for fostering long term investment, financial stability and business integrity and to guide future Entrepreneurs into a promising future. The study presents a broader review on Corporate Governance, starting from its definition and antecedents. This is the most important aspect of ethical business. In fact, the 3 main pillars of corporate governance are: Transparency; Accountability; Security. The combination of these 3 pillars in running a company successfully and forming solid professional relationships among its stakeholders, which includes key managerial employees and, most important, the shareholders This paper is sharing an experience how an entrepreneur can act as a catalyst while ensuring them that ethics and transparency do pay in business when followed in true spirit and action.Keywords: business, entrepreneur, ethics, governance, transparency.
Procedia PDF Downloads 793154 Comparison of Prognostic Models in Different Scenarios of Shoreline Position on Ponta Negra Beach in Northeastern Brazil
Authors: Débora V. Busman, Venerando E. Amaro, Mattheus da C. Prudêncio
Abstract:
Prognostic studies of the shoreline are of utmost importance for Ponta Negra Beach, located in Natal, Northeastern Brazil, where the infrastructure recently built along the shoreline is severely affected by flooding and erosion. This study compares shoreline predictions using three linear regression methods (LMS, LRR and WLR) and tries to discern the best method for different shoreline position scenarios. The methods have shown erosion on the beach in each of the scenarios tested, even in less intense dynamic conditions. The WLA_A with confidence interval of 95% was the well-adjusted model and calculated a retreat of -1.25 m/yr to -2.0 m/yr in hot spot areas. The change of the shoreline on Ponta Negra Beach can be measured as a negative exponential curve. Analysis of these methods has shown a correlation with the morphodynamic stage of the beach.Keywords: coastal erosion, prognostic model, DSAS, environmental safety
Procedia PDF Downloads 3393153 Data-Mining Approach to Analyzing Industrial Process Information for Real-Time Monitoring
Authors: Seung-Lock Seo
Abstract:
This work presents a data-mining empirical monitoring scheme for industrial processes with partially unbalanced data. Measurement data of good operations are relatively easy to gather, but in unusual special events or faults it is generally difficult to collect process information or almost impossible to analyze some noisy data of industrial processes. At this time some noise filtering techniques can be used to enhance process monitoring performance in a real-time basis. In addition, pre-processing of raw process data is helpful to eliminate unwanted variation of industrial process data. In this work, the performance of various monitoring schemes was tested and demonstrated for discrete batch process data. It showed that the monitoring performance was improved significantly in terms of monitoring success rate of given process faults.Keywords: data mining, process data, monitoring, safety, industrial processes
Procedia PDF Downloads 4073152 Risk Management in Healthcare Sector in Turkey: A Dental Hospital Case Study
Authors: Pırıl Tekin, Rızvan Erol
Abstract:
Risk management has become very important and popular in developing countries in recent years. Especially making patient and employee health and safety issues compulsory in the hospitals, raised the number of studies in Turkey. Also risk management become more important for hospital senior management from clinics to the laboratories. Because quality is really important to be chosen for both patients to consult and employees to prefer to work. And also risk management studies can lead to hospital management team about future works and methods. By this point of view, this study is the risk assessment carried out in the biggest dental hospital in the south part of Turkey. This study was conducted as a research case study, covering two different health care place; A Clinic and A Laboratory. It shows that the problems in this dental hospital and how it can solve all.Keywords: risk management, healthcare, dental hospital, quality management
Procedia PDF Downloads 3833151 Impact of Rebar-Reinforcement on Flexural Response of Shear-Critical Ultrahigh-Performance Concrete Beams
Authors: Yassir M. Abbas, Mohammad Iqbal Khan, Galal Fare
Abstract:
In the present work, the structural responses of 12 ultrahigh-performance concrete (UHPC) beams to four-point loading conditions were experimentally and analytically studied. The inclusion of a fibrous system in the UHPC material increased its compressive and flexural strengths by 31.5% and 237.8%, respectively. Based on the analysis of the load-deflection curves of UHPC beams, it was found that UHPC beams with a low reinforcement ratio are prone to sudden brittle failure. This failure behavior was changed, however, to a ductile one in beams with medium to high ratios. The implication is that improving UHPC beam tensile reinforcement could result in a higher level of safety. More reinforcement bars also enabled the load-deflection behavior to be improved, particularly after yielding.Keywords: ultrahigh-performance concrete, moment capacity, RC beams, hybrid fiber, ductility
Procedia PDF Downloads 763150 Structural Integrity Analysis of Baffle Former Assembly in Pressurized Water Reactors Considering Irradiation Aging
Authors: Jong-Sung Kim, Myung-Jo Jhung
Abstract:
BFA is one of the reactor internals components in PWR. The BFA has the intended functions to support fuel assembly, to keep structural integrity of upper/lower core support structures, and to secure reactor coolant flow path. Failure of the BFA may give rise to significant effect on reactor safety operation and stop. The BFA is subject to relatively high neutron irradiation dose due to location close to the core. Therefore, IASCC can occur on the BFA due to damage accumulation as operating year increases. In this study, IASCC susceptibility on the BFA was assessed via the FEA considering variations of mechanical material behaviors with neutron irradiation. As a result of the assessment, some points have susceptibility more than 0.2 to IASCC during design lifetime.Keywords: baffle former assembly, finite element analysis, irradiation aging, nuclear power plant, pressurized water reactor
Procedia PDF Downloads 3633149 The Influence of the Laws of Ergonomics on the Design of High-Rise Buildings
Authors: Valery A. Aurov, Maria D. Bausheva, Elena V. Uliyanova
Abstract:
The problems of sustainability of contemporary high-rise buildings now demand an altogether new approach, which corresponds with the laws of dialectics. We should imply the principle “going from mega-object to the so called mezzo-object.” So the scientists have arrived at the conclusion that a contemporary “skyscraper” must not increase in height but develop horizontal space axes which unite a complex of high-rise buildings into a single composition. This is necessary both for safety issues and increasing skyscrapers’ functioning qualities. As a result, architects single out a quality unit in a dominating group of high-rise constructions and make a conclusion about the influence of visual fields on the designing parameters of this group.Keywords: design, high-rise buildings, skyscrapers, sustainability, visual fields, dominating group, regulations, design recommendations
Procedia PDF Downloads 3773148 Performance Evaluation of a Piano Key Weir
Authors: M. Shaheer Ali, Talib Mansoor
Abstract:
The Piano Key Weir (PKW) is a particular shape of labyrinth weir, using up- and/or downstream overhangs. The horizontal rectangular labyrinth shape allows to multiply the crest length for a given weir width. With the increasing demand of power, it is becoming greatly essential to increase the storage capacity of existing dams without neglecting their safety. The present aims at comparing the performance of piano key weirs in respect to the normal sharp-crested weirs. The discharge v/s head data for the piano key weir and normal sharp-crested weir obtained from the experimental study were compared and analysed using regression analysis. Piano key weir was found to perform doubly w.r.t a normal weir. The flow profiles show the parabolic nature of flow and the nappe interference in the inlet keys.Keywords: crest length, flow profile, labyrinth weir, normal weir, nappe interference, overhangs, piano key weir
Procedia PDF Downloads 2983147 Systematic Exploration and Modulation of Nano-Bio Interactions
Authors: Bing Yan
Abstract:
Nanomaterials are widely used in various industrial sectors, biomedicine, and more than 1300 consumer products. Although there is still no standard safety regulation, their potential toxicity is a major concern worldwide. We discovered that nanoparticles target and enter human cells1, perturb cellular signaling pathways2, affect various cell functions3, and cause malfunctions in animals4,5. Because the majority of atoms in nanoparticles are on the surface, chemistry modification on their surface may change their biological properties significantly. We modified nanoparticle surface using nano-combinatorial chemistry library approach6. Novel nanoparticles were discovered to exhibit significantly reduced toxicity6,7, enhance cancer targeting ability8, or re-program cellular signaling machineries7. Using computational chemistry, quantitative nanostructure-activity relationship (QNAR) is established and predictive models have been built to predict biocompatible nanoparticles.Keywords: nanoparticle, nanotoxicity, nano-bio, nano-combinatorial chemistry, nanoparticle library
Procedia PDF Downloads 4153146 Activating Psychological Resources of DUI (Drivers under the Influence of Alcohol) Using the Traffic Psychology Intervention (IFT Course), Germany
Authors: Parichehr Sharifi, Konrad Reschke, Hans-Liudger Dienel
Abstract:
Psychological intervention generally targets changes in attitudes and behavior. Working with DUIs is part of traffic psychologists’ work. The primary goal of this field is to reduce the probability of re-conspicuous of the delinquent driver. One of these measurements in Germany is IFT courses for DUI s. The IFT course was designed by the Institute for Therapy Research. Participants are drivers who have fallen several times or once with a blood alcohol concentration of 1.6 per mill and who have completed a medical-psychological assessment (MPU) with the result of the course recommendation. The course covers four sessions of 3.5 hours each (1 hour / 60 m) and in a period of 3 to 4 weeks in the group discussion. This work analyzes interventions for the rehabilitation of DUI (Drunk Drivers offenders) offenders in groups under the aspect of activating psychological resources. From the aspect of sustainability, they should also have long-term consequences for the maintenance of unproblematic driving behavior in terms of the activation of resources. It is also addressing a selected consistency-theory-based intervention effect, activating psychological resources. So far, this has only been considered in the psychotherapeutic field but never in the field of traffic psychology. The methodology of this survey is one qualitative and three quantitative. In four sub-studies, it will be examined which measurements can determine the resources and how traffic psychological interventions can strengthen resources. The results of the studies have the following implications for traffic psychology research and practice: (1) In the field of traffic psychology intervention for the restoration of driving fitness, it can be stated that aspects of resource activation in this work have been investigated for the first time by qualitative and quantitative methods. (2) The resource activation could be confirmed based on the determined results as an effective factor of traffic psychological intervention. (3) Two sub-studies show a range of resources and resource activation options that must be given greater emphasis in traffic psychology interventions: - Social resource activation - improvement of the life skills of participants - Reactivation of existing social support options - Re-experiencing self-esteem, self-assurance, and acceptance of traffic-related behaviors. (4) In revising the IFT-§70 course, as well as other courses on recreating aptitude for DUI, new traffic-specific resource-enabling interventions against alcohol abuse should be developed to further enhance the courses through motivational, cognitive, and behavioral effects of resource activation, Resource-activating interventions can not only be integrated into behavioral group interventions but can also be applied in psychodynamic, psychodynamic (individual psychological) and other contexts of individual traffic psychology. The results are indicative but clearly show that personal resources can be strengthened through traffic psychology interventions. In the research, practice, training, and further education of traffic psychology, the aspect of primary resource activation (Grawe, 1999), therefore, always deserves the greatest attention for the rehabilitation of DUIs and Traffic safety.Keywords: traffic safety, psychological resources, activating of resources, intervention programs for alcohol offenders, empowerment
Procedia PDF Downloads 813145 Inspection of Railway Track Fastening Elements Using Artificial Vision
Authors: Abdelkrim Belhaoua, Jean-Pierre Radoux
Abstract:
In France, the railway network is one of the main transport infrastructures and is the second largest European network. Therefore, railway inspection is an important task in railway maintenance to ensure safety for passengers using significant means in personal and technical facilities. Artificial vision has recently been applied to several railway applications due to its potential to improve the efficiency and accuracy when analyzing large databases of acquired images. In this paper, we present a vision system able to detect fastening elements based on artificial vision approach. This system acquires railway images using a CCD camera installed under a control carriage. These images are stitched together before having processed. Experimental results are presented to show that the proposed method is robust for detection fasteners in a complex environment.Keywords: computer vision, image processing, railway inspection, image stitching, fastener recognition, neural network
Procedia PDF Downloads 4613144 The Lighthouse Project: Recent Initiatives to Navigate Australian Families Safely Through Parental Separation
Authors: Kathryn McMillan
Abstract:
A recent study of 8500 adult Australians aged 16 and over revealed 62% had experienced childhood maltreatment. In response to multiple recommendations by bodies such as the Australian Law Reform Commission, parliamentary reports and stakeholder input, a number of key initiatives have been developed to grapple with the difficulties of a federal-state system and to screen and triage high-risk families navigating their way through the court system. The Lighthouse Project (LHP) is a world-first initiative of the Federal Circuit and Family Courts in Australia (FCFOCA) to screen family law litigants for major risk factors, including family violence, child abuse, alcohol or substance abuse and mental ill-health at the point of filing in all applications that seek parenting orders. It commenced on 7 December 2020 on a pilot basis but has now been expanded to 15 registries across the country. A specialist risk screen, Family DOORS, Triage has been developed – focused on improving the safety and wellbeing of families involved in the family law system safety planning and service referral, and ¬ differentiated case management based on risk level, with the Evatt List specifically designed to manage the highest risk cases. Early signs are that this approach is meeting the needs of families with multiple risks moving through the Court system. Before the LHP, there was no data available about the prevalence of risk factors experienced by litigants entering the family courts and it was often assumed that it was the litigation process that was fueling family violence and other risks such as suicidality. Data from the 2022 FCFCOA annual report indicated that in parenting proceedings, 70% alleged a child had been or was at risk of abuse, 80% alleged a party had experienced Family Violence, 74 % of children had been exposed to Family Violence, 53% alleged through substance misuse by party children had caused or was at risk of causing harm to children and 58% of matters allege mental health issues of a party had caused or placed a child at risk of harm. Those figures reveal the significant overlap between child protection and family violence, both of which are under the responsibility of state and territory governments. Since 2020, a further key initiative has been the co-location of child protection and police officials amongst a number of registries of the FCFOCA. The ability to access in a time-effective way details of family violence or child protection orders, weapons licenses, criminal convictions or proceedings is key to managing issues across the state and federal divide. It ensures a more cohesive and effective response to family law, family violence and child protection systems.Keywords: child protection, family violence, parenting, risk screening, triage.
Procedia PDF Downloads 843143 Alcohol Detection with Engine Locking System Using Arduino and ESP8266
Authors: Sukhpreet Singh, Kishan Bhojrath, Vijay, Avinash Kumar, Mandlesh Mishra
Abstract:
The project uses an Arduino and ESP8266 to construct an alcohol detection system with an engine locking mechanism, offering a distinct way to fight drunk driving. An alcohol sensor module is used by the system to determine the amount of alcohol present in the ambient air. When the system detects alcohol levels beyond a certain threshold that is deemed hazardous for driving, it activates a relay module that is linked to the engine of the car, so rendering it inoperable. By preventing people from operating a vehicle while intoxicated, this preventive measure seeks to improve road safety. Adding an ESP8266 module also allows for remote monitoring and notifications, giving users access to real-time status updates on their system. By using an integrated strategy, the initiative provides a workable and efficient way to lessen the dangers related to driving while intoxicated.Keywords: MQ3 sensor, ESP 8266, arduino, IoT
Procedia PDF Downloads 713142 Analyzing the Evolution of Adverse Events in Pharmacovigilance: A Data-Driven Approach
Authors: Kwaku Damoah
Abstract:
This study presents a comprehensive data-driven analysis to understand the evolution of adverse events (AEs) in pharmacovigilance. Utilizing data from the FDA Adverse Event Reporting System (FAERS), we employed three analytical methods: rank-based, frequency-based, and percentage change analyses. These methods assessed temporal trends and patterns in AE reporting, focusing on various drug-active ingredients and patient demographics. Our findings reveal significant trends in AE occurrences, with both increasing and decreasing patterns from 2000 to 2023. This research highlights the importance of continuous monitoring and advanced analysis in pharmacovigilance, offering valuable insights for healthcare professionals and policymakers to enhance drug safety.Keywords: event analysis, FDA adverse event reporting system, pharmacovigilance, temporal trend analysis
Procedia PDF Downloads 543141 An Architecture for New Generation of Distributed Intrusion Detection System Based on Preventive Detection
Authors: H. Benmoussa, A. A. El Kalam, A. Ait Ouahman
Abstract:
The design and implementation of intrusion detection systems (IDS) remain an important area of research in the security of information systems. Despite the importance and reputation of the current intrusion detection systems, their efficiency and effectiveness remain limited as they should include active defense approach to allow anticipating and predicting intrusions before their occurrence. Consequently, they must be readapted. For this purpose we suggest a new generation of distributed intrusion detection system based on preventive detection approach and using intelligent and mobile agents. Our architecture benefits from mobile agent features and addresses some of the issues with centralized and hierarchical models. Also, it presents advantages in terms of increasing scalability and flexibility.Keywords: Intrusion Detection System (IDS), preventive detection, mobile agents, distributed architecture
Procedia PDF Downloads 5853140 Bioactivity of Local Isolated Probiotic to Inhibiting Important Bacterial Pathogens in Aquaculture
Authors: Abhichet Nobhiwong, Jiraporn Rojtinnakorn, Udomluk Sompong
Abstract:
Six probiotic strains isolated from Chiang Mai and Chiang Rai province, Thailand; CR1-2, CM3-4, CM5-2, CR7-8, CM10-5 and CM10-8 were used to study their morphology and inhibition activity on three pathogenic bacteria; Aeromonas sp., Streptococcus sp. and Flavobacterium sp. that isolated from infected Nile tilapia. The agar well diffusion technique was applied for 24 and 48 hours incubation. Interestingly, some probiotics showed good inhibition activity both 24 and 48 hours on each 3 bacterial pathogens. The capable inhibiting Aeromonas sp. were CR1-2 and CR5-2 with inhibition diameters of 13.0 mm and 11.2 mm, respectively. For Streptococcus sp., effective probiotics were CR10-2 with inhibition diameters of 10.7 mm. Whereas for Flavobacterium sp., effective probiotics were CR5-2 with inhibition diameter of 9.7 mm. It can be concluded that these probiotics have potentiality to develop as the pathogens biocontrol products. These will be support for safety and organic aquaculture that which the most worthy for people health.Keywords: probiotics, Aeromanas sp., Streptococcus sp., Flavobacterium sp.
Procedia PDF Downloads 2803139 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 294