Search results for: information security management system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31659

Search results for: information security management system

28839 Fuzzy Analytic Hierarchy Process for Determination of Supply Chain Performance Evaluation Criteria

Authors: Ibrahim Cil, Onur Kurtcu, H. Ibrahim Demir, Furkan Yener, Yusuf. S. Turkan, Muharrem Unver, Ramazan Evren

Abstract:

Fuzzy AHP (Analytic Hierarchy Process) method is decision-making way at the end of integrating the current AHP method with fuzzy structure. In this study, the processes of production planning, inventory management and purchasing department of a system were analysed and were requested to decide the performance criteria of each area. At this point, the current work processes were analysed by various decision-makers and comparing each criteria by giving points according to 1-9 scale were completed. The criteria were listed in order to their weights by using Fuzzy AHP approach and top three performance criteria of each department were determined. After that, the performance criteria of supply chain consisting of three departments were asked to determine. The processes of each department were compared by decision-makers at the point of building the supply chain performance system and getting the performance criteria. According to the results, the criteria of performance system of supply chain by using Fuzzy AHP were determined for which will be used in the supply chain performance system in the future.

Keywords: AHP, fuzzy, performance evaluation, supply chain

Procedia PDF Downloads 326
28838 Analysis of Total Quality Management (TQM) and Six Sigma in the Aerospace Industry

Authors: Masimuddin Mohd Khaled

Abstract:

From the past couple of years, focus has been done on the quality management theories and has been pertained to various firms. The core quality management theories are Total Quality Management (TQM) and Six Sigma where a number of documents have already been presented regarding these theories. The purpose of this paper is to study in detail about these theories and how the theories are applied in the aerospace industry. A methodical literature review, comparison of TQM and Six Sigma as well as a case study of each has been carried out in this paper thus providing a clear understanding of the theories.

Keywords: total quality management, six sigma, aerospace, research, innovation

Procedia PDF Downloads 352
28837 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective

Authors: S. Fantin

Abstract:

This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.

Keywords: cybersecurity, data protection, European Union, Japan

Procedia PDF Downloads 112
28836 Design and Implementation of Wireless Syncronized AI System for Security

Authors: Saradha Priya

Abstract:

Developing virtual human is very important to meet the challenges occurred in many applications where human find difficult or risky to perform the task. A robot is a machine that can perform a task automatically or with guidance. Robotics is generally a combination of artificial intelligence and physical machines (motors). Computational intelligence involves the programmed instructions. This project proposes a robotic vehicle that has a camera, PIR sensor and text command based movement. It is specially designed to perform surveillance and other few tasks in the most efficient way. Serial communication has been occurred between a remote Base Station, GUI Application, and PC.

Keywords: Zigbee, camera, pirsensor, wireless transmission, DC motor

Procedia PDF Downloads 333
28835 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 283
28834 Human Machine Interface for Controlling a Robot Using Image Processing

Authors: Ambuj Kumar Gautam, V. Vasu

Abstract:

This paper introduces a head movement based Human Machine Interface (HMI) that uses the right and left movements of head to control a robot motion. Here we present an approach for making an effective technique for real-time face orientation information system, to control a robot which can be efficiently used for Electrical Powered Wheelchair (EPW). Basically this project aims at application related to HMI. The system (machine) identifies the orientation of the face movement with respect to the pixel values of image in a certain areas. Initially we take an image and divide that whole image into three parts on the basis of its number of columns. On the basis of orientation of face, maximum pixel value of approximate same range of (R, G, and B value of a pixel) lie in one of divided parts of image. This information we transfer to the microcontroller through serial communication port and control the motion of robot like forward motion, left and right turn and stop in real time by using head movements.

Keywords: electrical powered wheelchair (EPW), human machine interface (HMI), robotics, microcontroller

Procedia PDF Downloads 275
28833 Design and Implementation of Active Radio Frequency Identification on Wireless Sensor Network-Based System

Authors: Che Z. Zulkifli, Nursyahida M. Noor, Siti N. Semunab, Shafawati A. Malek

Abstract:

Wireless sensors, also known as wireless sensor nodes, have been making a significant impact on human daily life. The Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two complementary technologies; hence, an integrated implementation of these technologies expands the overall functionality in obtaining long-range and real-time information on the location and properties of objects and people. An approach for integrating ZigBee and RFID networks is proposed in this paper, to create an energy-efficient network improved by the benefits of combining ZigBee and RFID architecture. Furthermore, the compatibility and requirements of the ZigBee device and communication links in the typical RFID system which is presented with the real world experiment on the capabilities of the proposed RFID system.

Keywords: mesh network, RFID, wireless sensor network, zigbee

Procedia PDF Downloads 443
28832 Climate Change and Human Migration

Authors: Sungwoo Park

Abstract:

The paper attempts to investigate the correlation between climate change and migration that has caused violent disputes in some regions of the world. Recently, NGOs and educational institutions have proposed claims that migratory patterns and violent uprisings are intertwined with climate change. Thus, the paper is primarily concerned with collecting evidences provided from scholars, validating this significant connection between climate change and migration, and evaluating and suggesting current and future research approaches respectively to enhance the acknowledgment and protection of environmental refugees. In order to examine the linkage of environmental migration, primary sources, such as political speeches, and secondary sources like theses from environmental policy analysts, books, and reports are used. More specifically, the investigation focuses on an civil war in Syria to draw a connection between environmental migration and violent dispute that threatens the global security. The examination undertaken specifically analyzes examples where forced migration occurred due to climate change. In Bangladesh, Pakistan, and Kiribati, residents have been at risk of fleeing their countries because of abnormal climate patterns, such as the rise of sea level or an excessive heat stress. As the brutal uprising in Syria has proven that climate change can pose a significant threat to global security, correlation between climate change and migration is surely worth delving into.

Keywords: climate change, climate migration, global security, refugee crisis

Procedia PDF Downloads 331
28831 Illegal, Unreported and Unregulated (IUU) Fishing in ASEAN Countries

Authors: Wen Chiat Lee, K. Kuperan Viswanathan

Abstract:

Illegal, Unreported and unregulated (IUU) fishing brings great losses to the economies of the fishing nations. Understanding the reasons contributing to IUU fishing is crucial in reducing it. Economic, institutional and social factors are key drivers of IIU fishing. The economic factor is the main contributor to IUU fishing. The two possible ways to curb the IUU fishing is highlighted. One way is to reduce the revenue from IUU fishing and another way is to increase the cost of IUU fishing. There are three costs of IUU fishing that can be increased namely the operating, capital and risk costs. Approaches for reducing the economic rent or profit from IUU fishing are developed and directions for reducing IUU fishing are also suggested. Improved registration of fishing vessels, preventing entry of illegal fish products and most importantly, developing co-management of fisheries are the ways forward for reducing IUU fishing. All governments in ASEAN must work in tandem with the stakeholders involved such as fishers, fishermen agencies or associations to exchange information for reducing the transaction cost of IUU fishing.

Keywords: Illegal, unreported and unregulated (IUU) fishing, co-management, fisheries management, economic rent framework

Procedia PDF Downloads 218
28830 Student Perceptions of Defense Acquisition University Courses: An Explanatory Data Collection Approach

Authors: Melissa C. LaDuke

Abstract:

The overarching purpose of this study was to determine the relationship between the current format of online delivery for Defense Acquisition University (DAU) courses and Air Force Acquisition (AFA) personnel participation. AFA personnel (hereafter named “student”) were particularly of interest, as they have been mandated to take anywhere from 3 to 30 online courses to earn various DAU specialization certifications. Participants in this qualitative case study were AFA personnel who pursued DAU certifications in science and technology management, program/contract management, and other related fields. Air Force personnel were interviewed about their experiences with online courses. The data gathered were analyzed and grouped into 12 major themes. The themes tied into the theoretical framework and spoke to either teacher-centered or student-centered educational practices within Defense Acquisitions University. Based on the results of the data analysis, various factors contributed to student perceptions of DAU courses, including the online course construct and relevance to their job. The analysis also found students want to learn the information presented but would like to be able to apply the information learned in meaningful ways.

Keywords: educational theory, computer-based training, interview, student perceptions, online course design, teacher positionality

Procedia PDF Downloads 90
28829 An Explorative Study of the Application of Project Management in German Research Projects

Authors: Marcel Randermann, Roland Jochem

Abstract:

Research activities are mostly conducted in form of projects. In fact, research projects take the highest share of all project forms combined. However, project management is very rarely applied purposefully by researchers and scientists. More specifically no project management frameworks, methods or tools are not being used to plan, execute or control research project to ensure research success or improve project quality. In this qualitative study, several interviews were conducted with scientists and research managers from German institutions to gain insights into project management activities, to determine challenges and barriers, and to evaluate premises for successful project management. The analyses show that conventional project management is not easily applicable in scientific environments and researchers’ mindsets prevent a reasonable application.

Keywords: academics, project management methods, research and science projects, scientist's mindset

Procedia PDF Downloads 182
28828 Towards a Smart Irrigation System Based on Wireless Sensor Networks

Authors: Loubna Hamami, Bouchaib Nassereddine

Abstract:

Due to the evolution of technologies, the need to observe and manage hostile environments, and reduction in size, wireless sensor networks (WSNs) are becoming essential and implicated in the most fields of life. WSNs enable us to change the style of living, working and interacting with the physical environment. The agricultural sector is one of such sectors where WSNs are successfully used to get various benefits. For successful agricultural production, the irrigation system is one of the most important factors, and it plays a tactical role in the process of agriculture domain. However, it is considered as the largest consumer of freshwater. Besides, the scarcity of water, the drought, the waste of the limited available water resources are among the critical issues that touch the almost sectors, notably agricultural services. These facts are leading all governments around the world to rethink about saving water and reducing the volume of water used; this requires the development of irrigation practices in order to have a complete and independent system that is more efficient in the management of irrigation. Consequently, the selection of WSNs in irrigation system has been a benefit for developing the agriculture sector. In this work, we propose a prototype for a complete and intelligent irrigation system based on wireless sensor networks and we present and discuss the design of this prototype. This latter aims at saving water, energy and time. The proposed prototype controls water system for irrigation by monitoring the soil temperature, soil moisture and weather conditions for estimation of water requirements of each plant.

Keywords: precision irrigation, sensor, wireless sensor networks, water resources

Procedia PDF Downloads 138
28827 Cryptocurrency-Based Mobile Payments with Near-Field Communication-Enabled Devices

Authors: Marko Niinimaki

Abstract:

Cryptocurrencies are getting increasingly popular, but very few of them can be conveniently used in daily mobile phone purchases. To solve this problem, we demonstrate how to build a functional prototype of a mobile cryptocurrency-based e-commerce application the communicates with Near-Field Communication (NFC) tags. Using the system, users are able to purchase physical items with an NFC tag that contains an e-commerce URL. The payment is done simply by touching the tag with a mobile device and accepting the payment. Our method is constructive: we describe the design and technologies used in the implementation and evaluate the security and performance of the solution. Our main finding is that the analysis and measurements show that our solution is feasible for e-commerce.

Keywords: cryptocurrency, e-commerce, NFC, mobile devices

Procedia PDF Downloads 166
28826 Basics for Corruption Reduction and Fraud Prevention in Industrial/Humanitarian Organizations through Supplier Management in Supply Chain Systems

Authors: Ibrahim Burki

Abstract:

Unfortunately, all organizations (Industrial and Humanitarian/ Non-governmental organizations) are prone to fraud and corruption in their supply chain management routines. The reputational and financial fallout can be disastrous. With the growing number of companies using suppliers based in the local market has certainly increased the threat of fraud as well as corruption. There are various potential threats like, poor or non-existent record keeping, purchasing of lower quality goods at higher price, excessive entertainment of staff by suppliers, deviations in communications between procurement staff and suppliers, such as calls or text messaging to mobile phones, staff demanding extended periods of notice before they allow an audit to take place, inexperienced buyers and more. But despite all the above-mentioned threats, this research paper emphasize upon the effectiveness of well-maintained vendor/s records and sorting/filtration of vendor/s to cut down the possible threats of corruption and fraud. This exercise is applied in a humanitarian organization of Pakistan but it is applicable to whole South Asia region due to the similarity of culture and contexts. In that firm, there were more than 550 (five hundred and fifty) registered vendors. As during the disasters or emergency phases requirements are met on urgent basis thus, providing golden opportunities for the fake companies or for the brother/sister companies of the already registered companies to be involved in the tendering process without declaration or even under some different (new) company’s name. Therefore, a list of required documents (along with checklist) was developed and sent to all of the vendor(s) in the current database and based upon the receipt of the requested documents vendors were sorted out. Furthermore, these vendors were divided into active (meeting the entire set criterion) and non-active groups. This initial filtration stage allowed the firm to continue its work without a complete shutdown that is only vendors falling in the active group shall be allowed to participate in the tenders by the time whole process is completed. Likewise only those companies or firms meeting the set criterion (active category) shall be allowed to get registered in the future along with a dedicated filing system (soft and hard shall be maintained), and all of the companies/firms in the active group shall be physically verified (visited) by the Committee comprising of senior members of at least Finance department, Supply Chain (other than procurement) and Security department.

Keywords: corruption reduction, fraud prevention, supplier management, industrial/humanitarian organizations

Procedia PDF Downloads 524
28825 Using Automated Agents to Facilitate Instructions in a Large Online Course

Authors: David M Gilstrap

Abstract:

In an online course with a large enrollment, the potential exists for the instructor to become overburdened with having to respond to students’ emails, which consequently decreases the instructor’s efficiency in teaching the course. Repetition of instructions is an effective way of reducing confusion among students, which in turn increases their efficiencies, as well. World of Turf is the largest online course at Michigan State University, which employs Brightspace as its management system (LMS) software. Recently, the LMS upgraded its capabilities to utilize agents, which are auto generated email notifications to students based on certain criteria. Agents are additional tools that can enhance course design. They can be run on-demand or according to a schedule. Agents can be timed to effectively remind students of approaching deadlines. The content of these generated emails can also include reinforced instructions. With a large online course, even a small percentage of students that either do not read or do not comprehend the course syllabus or do not notice instructions on course pages can result in numerous emails to the instructor, often near the deadlines for assignments. Utilizing agents to decrease the number of emails from students has enabled the instructor to efficiently instruct more than one thousand students per semester without any graduate student teaching assistants.

Keywords: agents, Brightspace, large enrollment, learning management system, repetition of instructions

Procedia PDF Downloads 188
28824 Intelligent Earthquake Prediction System Based On Neural Network

Authors: Emad Amar, Tawfik Khattab, Fatma Zada

Abstract:

Predicting earthquakes is an important issue in the study of geography. Accurate prediction of earthquakes can help people to take effective measures to minimize the loss of personal and economic damage, such as large casualties, destruction of buildings and broken of traffic, occurred within a few seconds. United States Geological Survey (USGS) science organization provides reliable scientific information of Earthquake Existed throughout history & Preliminary database from the National Center Earthquake Information (NEIC) show some useful factors to predict an earthquake in a seismic area like Aleutian Arc in the U.S. state of Alaska. The main advantage of this prediction method that it does not require any assumption, it makes prediction according to the future evolution of object's time series. The article compares between simulation data result from trained BP and RBF neural network versus actual output result from the system calculations. Therefore, this article focuses on analysis of data relating to real earthquakes. Evaluation results show better accuracy and higher speed by using radial basis functions (RBF) neural network.

Keywords: BP neural network, prediction, RBF neural network, earthquake

Procedia PDF Downloads 481
28823 Optimal Maintenance Policy for a Partially Observable Two-Unit System

Authors: Leila Jafari, Viliam Makis, G. B. Akram Khaleghei

Abstract:

In this paper, we present a maintenance model of a two-unit series system with economic dependence. Unit#1, which is considered to be more expensive and more important, is subject to condition monitoring (CM) at equidistant, discrete time epochs and unit#2, which is not subject to CM, has a general lifetime distribution. The multivariate observation vectors obtained through condition monitoring carry partial information about the hidden state of unit#1, which can be in a healthy or a warning state while operating. Only the failure state is assumed to be observable for both units. The objective is to find an optimal opportunistic maintenance policy minimizing the long-run expected average cost per unit time. The problem is formulated and solved in the partially observable semi-Markov decision process framework. An effective computational algorithm for finding the optimal policy and the minimum average cost is developed and illustrated by a numerical example.

Keywords: condition-based maintenance, semi-Markov decision process, multivariate Bayesian control chart, partially observable system, two-unit system

Procedia PDF Downloads 446
28822 Contribution of Home Gardens to Rural Household Income in Raymond Mhlaba Local Municipality, Eastern Cape Province, South Africa

Authors: K. Alaka, A. Obi

Abstract:

Home garden has proved to be significant to rural inhabitants by providing a wide range of useful products such as fruits, vegetables and medicine. There is need for quantitative information on its benefits and contributions to rural household. The main objective of this study is to investigate contributions of home garden to income of rural households in Raymond Mhlaba Local Municipality, formerly Nkonkobe Local Municipality of Eastern Cape Province South Africa. The stratified random sampling method was applied in order to choose a sample of 160 households.The study was conducted among 80 households engaging in home gardens and 80 non- participating households in the study area. Data analysis employed descriptive statistics with the use of frequency table and one way sample T test to show actual contributions. The overall model shows that social grant has the highest contribution to total household income for both categories while income generated from home garden has the second largest share to total household income, this shows that the majority of rural households in the study area rely on social grant as their source of income. However, since most households are net food buyers, it is essential to have policies that are formulated with an understanding that household food security is not only a function of the food that farming households produce for their own consumption but more so a function of total household income. The results produced sufficient evidence that home gardens contribute significantly to income of rural household.

Keywords: food security, home gardening, household, income

Procedia PDF Downloads 209
28821 China Global Policy through the Shanghai Cooperation Organization

Authors: Enayatollah Yazdani

Abstract:

In the post-Cold War era, the world is facing a new emerging global order with the rise of multiple actors in the international arena. China, as a rising global power, has great leverage in internal relations. In particular, during the last two decades, China has rapidly transformed its economy into a global leader in advanced technologies. As a rising power and as one of the two major founding members of the Shanghai Cooperation Organization (SCO), China has tried to use this regional organization, which has the potential to become an important political and security organization of the major states located in the vast Eurasian landmass, for its “go global” strategy. In fact, for Beijing, the SCO represents a new and unique cooperation model, reflecting its vision of a multipolar world order. China has used the SCO umbrella as a multilateral platform to address external threats posed by non-state actors on its vulnerable western border; to gain a strong economic and political foothold in Central Asia without putting the Sino-Russian strategic partnership at risk; and to enhance its energy security through large-scale infrastructure investment in, and trade with, the Central Asian member states. In other words, the SCO is one of the successful outcomes of Chines foreign policy in the post-Cold War era. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO identifies China as a more constructive power. SCO became a new model of cooperation that was formed on the remains of collapsed Soviet system and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO now has more of an external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise.' This paper aims to answer this major question: How the Chinese government has manipulated the SCO for its foreign policy and global and regional influence? To answer this question, the main discussion is that with regard to the SCO capabilities and politico-economic potential, this organization has been used by China as a platform to expand influence beyond its borders.

Keywords: China, the Shanghai Cooperation Organization (SCO), Central Asia, global policy, foreign policy

Procedia PDF Downloads 54
28820 Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province

Authors: Sakapas Saengchai, Pichamon Chansuchai

Abstract:

Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive .

Keywords: Border, Trade, Policy, Promote

Procedia PDF Downloads 148
28819 Characteristic Study on Conventional and Soliton Based Transmission System

Authors: Bhupeshwaran Mani, S. Radha, A. Jawahar, A. Sivasubramanian

Abstract:

Here, we study the characteristic feature of conventional (ON-OFF keying) and soliton based transmission system. We consider 20 Gbps transmission system implemented with Conventional Single Mode Fiber (C-SMF) to examine the role of Gaussian pulse which is the characteristic of conventional propagation and hyperbolic-secant pulse which is the characteristic of soliton propagation in it. We note the influence of these pulses with respect to different dispersion lengths and soliton period in conventional and soliton system, respectively, and evaluate the system performance in terms of quality factor. From the analysis, we could prove that the soliton pulse has more consistent performance even for long distance without dispersion compensation than the conventional system as it is robust to dispersion. For the length of transmission of 200 Km, soliton system yielded Q of 33.958 while the conventional system totally exhausted with Q=0.

Keywords: dispersion length, retrun-to-zero (rz), soliton, soliton period, q-factor

Procedia PDF Downloads 330
28818 Study of Components and Effective Factors on Organizational Commitment of Khoramabad Branchs Islamic Azad University’s Faculty Members

Authors: Mehry Daraei

Abstract:

The goal of this study was to survey the components and affective factors on organizational commitment of Islamic Azad university Khoramabad Baranch’s faculty members. The research method was correlation by causal modeling and data were gathered by questionnaire. Statistical society consisted of 147 faculty members in Islamic Azad University Khoramabad Branch and sample size was determined as 106 persons by Morgan’s sample table that were selected by class sampling. Correlation test, T-single group test and path analysis test were used for analysis of data. Data were analyzed by Lisrel software. The results showed that organizational corporate was the most effective element on organizational commitment and organizational corporate, experience work and organizational justice were only in direct relation with organizational commitment. Also, job security had direct and indirect effect on OC. Job security had effect on OC by gender. Gender variable had direct and indirect effect on OC. Gender had effect on OC by organizational corporate. Job opportunities out of university also had direct and indirect effect on OC, which means job opportunities had indirect effect on OC by organizational corporate.

Keywords: organization, commitment, job security, Islamic Azad University

Procedia PDF Downloads 305
28817 Data Management and Analytics for Intelligent Grid

Authors: G. Julius P. Roy, Prateek Saxena, Sanjeev Singh

Abstract:

Power distribution utilities two decades ago would collect data from its customers not later than a period of at least one month. The origin of SmartGrid and AMI has subsequently increased the sampling frequency leading to 1000 to 10000 fold increase in data quantity. This increase is notable and this steered to coin the tern Big Data in utilities. Power distribution industry is one of the largest to handle huge and complex data for keeping history and also to turn the data in to significance. Majority of the utilities around the globe are adopting SmartGrid technologies as a mass implementation and are primarily focusing on strategic interdependence and synergies of the big data coming from new information sources like AMI and intelligent SCADA, there is a rising need for new models of data management and resurrected focus on analytics to dissect data into descriptive, predictive and dictatorial subsets. The goal of this paper is to is to bring load disaggregation into smart energy toolkit for commercial usage.

Keywords: data management, analytics, energy data analytics, smart grid, smart utilities

Procedia PDF Downloads 764
28816 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition

Authors: Michael Okeke, Andrew Blyth

Abstract:

Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.

Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)

Procedia PDF Downloads 325
28815 Unsafe Abortions in India: Questioning the Propitiousness of MTP Act

Authors: Suresh Sharma, Neeti Goutam

Abstract:

In India abortions are legal and with the exceedingly liberal and broadened law that was passed in 1971, “Medical Termination of Pregnancy Act” had opened a new window to Women’s’ freedom and choice over their fertility. This paper would like to focus on the factors responsible for or leading to unsafe abortion as well as such high incidence of abortion in India which can help in understanding the ways in which we can prevent this apathy. To study the intricacies involved in delivering safety to womanhood in terms of safe abortion practice which includes more trained personnel, detailed explanation and consequences of conducting an abortion, fine reporting, awareness regarding family planning measures and not only pressurizing them to sterilize immediately after an abortion but also prior to that informing them and lastly easy accessibility of Contraceptives with a educated and brief information on that. Data has been drawn from various sources such as National Family Household Survey (1, 2, 3), Health Management Information System and Annual Health Survey. To safeguard the interest of women when it comes to complications resulting from unsafe abortions, Reproductive Health laid its strict adherence to it in its guidelines. The Government could induce more measures in terms of family planning measures and increase in the number of skilled medical health force, chiefly in rural areas to prevent the illegality of abortions. But before that fine reporting on the number of abortions performed will give an insight to this very issue only then policies and programs will work much better in favor of women.

Keywords: abortion, MTP act, India, women

Procedia PDF Downloads 337
28814 Building an Interactive Web-Based GIS System for Planning of Geological Survey Works

Authors: Wu Defu, Kiefer Chiam, Yang Kin Seng

Abstract:

The planning of geological survey works is an iterative process which involves planner, geologist, civil engineer and other stakeholders, who perform different roles and have different points of view. Traditionally, the team used paper maps or CAD drawings to present the proposal which is not an efficient way to present and share idea on the site investigation proposal such as sitting of borehole location or seismic survey lines. This paper focuses on how a GIS approach can be utilised to develop a web-based system to support decision making process in the planning of geological survey works and also to plan site activities carried out by Singapore Geological Office (SGO). The authors design a framework of building an interactive web-based GIS system, and develop a prototype, which enables the users to obtain rapidly existing geological information and also to plan interactively borehole locations and seismic survey lines via a web browser. This prototype system is used daily by SGO and has shown to be effective in increasing efficiency and productivity as the time taken in the planning of geological survey works is shortened. The prototype system has been developed using the ESRI ArcGIS API 3.7 for Flex which is based on the ArcGIS 10.2.1 platform.

Keywords: engineering geology, flex, geological survey planning, geoscience, GIS, site investigation, WebGIS

Procedia PDF Downloads 298
28813 Waste Generation in Iranian Building Industry: Addressing a Theory

Authors: Golnaz Moghimi, Alireza Afsharghotli, Alireza Rezaei

Abstract:

Construction waste has been gradually increased as a result of upsizing construction projects which are occurred within the lifecycle of buildings. Since waste management is a major priority and has profound impacts on the volume of waste generated in construction stage, the majority of efforts have been attempted to reuse, recycle and reduce waste. However, there is still room to study on lack of sufficient knowledge about waste management in construction industry. This paper intends to provide an insight into the effect of project management knowledge areas on waste management solely on construction stage. To this end, a survey among Iranian building construction industry contractors was conducted to identify the effectiveness of project management knowledge areas on three jobsite key factors including ‘Site activity’, ‘Training’, and ‘Awareness’. As a result, four management disciplines were identified as most influential ones on amount of construction waste. These disciplines were Project Cost Management, Quality Management, Human Resource Management, and Integration Management. Based on the research findings, a new model was presented to develop effective construction waste strategies.

Keywords: awareness, PMBOK, site activity, training, waste management

Procedia PDF Downloads 326
28812 Sustainable Ecological Agricultural Systems in Bangladesh: Environmental, Economic and Social Perspective of Compost

Authors: Protima Chakraborty

Abstract:

The sustainability of conventional agriculture in Bangladesh is under threat from the continuous degradation of land and water resources, and from declining yields due to indiscriminate use of agrochemicals. NASL (Northern Agro Services Limited) is pursuing efforts to promote ecological agriculture with emphasis on better use of organic fertilizer resources and the reduction of external inputs. This paper examines the sustainability of two production systems in terms of their environmental soundness, economic viability and social acceptability based on empirical data collected through making demonstration land cultivation, a household survey, soil sample analysis, observations and discussions with key informants. Twelve indicators were selected to evaluate sustainability. Significant differences were found between the two systems in crop diversification, soil fertility management, pests and diseases management, and use of agrochemicals & Organic Compost. However, significant variations were found in other indicators such as land-use pattern, crop yield and stability, risk and uncertainties, and food security. Although crop yield and financial return were found to be slightly higher in the ecological system, the economic return and value addition per unit of land show the positive difference of using compost rather than chemical fertilizer. The findings suggest that ecological agriculture has a tendency towards becoming ecologically, economically and socially more sound than conventional agriculture, as it requires considerably fewer agro-chemicals, adds more organic matter to the soil, provides balanced food, and requires higher local inputs without markedly compromising output and financial benefits. Broad-policy measures, including the creation of mass awareness of adverse health effects of agrochemical-based products, are outlined for the promotion of ecological agriculture.

Keywords: Bangladesh, compost, conventional agriculture, organic fertilizer, environmental sustainability, economic viability, social acceptability

Procedia PDF Downloads 228
28811 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 243
28810 Assessment of a Rapid Detection Sensor of Faecal Pollution in Freshwater

Authors: Ciprian Briciu-Burghina, Brendan Heery, Dermot Brabazon, Fiona Regan

Abstract:

Good quality bathing water is a highly desirable natural resource which can provide major economic, social, and environmental benefits. Both in Ireland and Europe, such water bodies are managed under the European Directive for the management of bathing water quality (BWD). The BWD aims mainly: (i) to improve health protection for bathers by introducing stricter standards for faecal pollution assessment (E. coli, enterococci), (ii) to establish a more pro-active approach to the assessment of possible pollution risks and the management of bathing waters, and (iii) to increase public involvement and dissemination of information to the general public. Standard methods for E. coli and enterococci quantification rely on cultivation of the target organism which requires long incubation periods (from 18h to a few days). This is not ideal when immediate action is required for risk mitigation. Municipalities that oversee the bathing water quality and deploy appropriate signage have to wait for laboratory results. During this time, bathers can be exposed to pollution events and health risks. Although forecasting tools exist, they are site specific and as consequence extensive historical data is required to be effective. Another approach for early detection of faecal pollution is the use of marker enzymes. β-glucuronidase (GUS) is a widely accepted biomarker for E. coli detection in microbiological water quality control. GUS assay is particularly attractive as they are rapid, less than 4 h, easy to perform and they do not require specialised training. A method for on-site detection of GUS from environmental samples in less than 75 min was previously demonstrated. In this study, the capability of ColiSense as an early warning system for faecal pollution in freshwater is assessed. The system successfully detected GUS activity in all of the 45 freshwater samples tested. GUS activity was found to correlate linearly with E. coli (r2=0.53, N=45, p < 0.001) and enterococci (r2=0.66, N=45, p < 0.001) Although GUS is a marker for E. coli, a better correlation was obtained for enterococci. For this study water samples were collected from 5 rivers in the Dublin area over 1 month. This suggests a high diversity of pollution sources (agricultural, industrial, etc) as well as point and diffuse pollution sources were captured in the sample size. Such variety in the source of E. coli can account for different GUS activities/culturable cell and different ratios of viable but not culturable to viable culturable bacteria. A previously developed protocol for the recovery and detection of E. coli was coupled with a miniaturised fluorometer (ColiSense) and the system was assessed for the rapid detection FIB in freshwater samples. Further work will be carried out to evaluate the system’s performance on seawater samples.

Keywords: faecal pollution, β-glucuronidase (GUS), bathing water, E. coli

Procedia PDF Downloads 269