Search results for: security and protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4796

Search results for: security and protection

1976 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques

Authors: Misha Alexander, S. B. Waykar

Abstract:

Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.

Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping

Procedia PDF Downloads 399
1975 Innovation and Performance of Very Small Agri-Food Enterprises in Cameroon

Authors: Ahmed Moustapha Mfokeu

Abstract:

Agri-food VSEs in Cameroon are facing a succession of crises, lack of security, particularly in the Far North, South West, and North West regions, the consequences of the Covid 19 crisis, and the war in Ukraine . These multiple crises have benefited the reception of the prices of the raw materials. Moreover, the exacerbation of competitive pressures is driven by the technological acceleration of productive systems in emerging countries which increase the demands imposed on the markets. The Cameroonian VSE must therefore be able to meet the new challenges of international competition, especially through innovation. The objective of this research is to contribute to the knowledge of the effects of innovation on the performance of very small agribusinesses in Cameroon. On the methodological level, the data were provided from a sample of 153 companies in the cities of Douala and Yaoundé. This research uses structural equation models with latent variables. The main results show that there is a positive and significant link between innovation and the performance of very small agri-food companies, so if it is important for entrepreneurs to encourage and practice innovation, it is also necessary to make them understand and make them like this aspect in their strategic function.

Keywords: innovation, performance, very small enterprise, agrifood

Procedia PDF Downloads 102
1974 Adaptation to Repeated Eccentric Exercise Assessed by Double to Single Twitch Ratio

Authors: Damian Janecki, Anna Jaskólska, Jarosław Marusiak, Artur Jaskólski

Abstract:

The aim of this study was to assess double to single twitch ratio after two bouts of eccentric exercise of the elbow flexors. Maximal isometric torque, single and double twitch responses and low-frequency fatigue were assessed on the elbow flexors in 19 untrained male volunteers before, immediately after, 24 and 48 hours following two bouts of eccentric exercise consisted of 30 repetitions of lowering a dumbbell adjusted to ~75% of each individual's maximal isometric torque. Maximal isometric torque and electrically evoked responses decreased significantly in all measurements after the first bout of eccentric exercise (P<0.05). In measurements performed at 24 and 48 hours after the second bout both maximal voluntary isometric torque and electrically evoked contractions were significantly higher than in measurements performed after the fist bout (P<0.05). Although low-frequency fatigue significantly increased up to 48 hours after each bout of eccentric exercise, its values at 24 and 48 hours after the second bout were significantly lower than at respective time points after the first bout (P<0.05). Smaller changes in double to single twitch ratio at 24 and 48 hours after the second bout of eccentric exercise reflects repeated bout effect that confers protection against subsequent exercise-induced muscle damage.

Keywords: biceps brachii, electrical stimulation, lenghtening contractions, repeated bout effect

Procedia PDF Downloads 318
1973 Debate between Breast Milk and Formula Milk in Nutritional Value

Authors: Nora Alkharji, Wafa Fallatah

Abstract:

Introduction: One of the major issues to consider when is deciding on what to feed a baby is the quality of the food itself. Whilst commercially prepared infant formulas are a nutritious alternative to breast milk, and even contain some vitamins and nutrients, most major medical organizations consider breastfeeding the best nutritional option for babies. Choosing whether to breastfeed or formula feed your baby is one of the first decisions expectant parents will make. The American Academy of Pediatrics (AAP) is in agreement with other organizations such as the American Medical Association (AMA), the American Dietetic Association (ADA), and the World Health Organization (WHO) in recommending breastfeeding as the best nutrition for babies and best suited for a baby's digestive system. In addition, breastfeeding helps in the combatting of infections, prevention of allergies, and protection against various chronic conditions. The decision to breastfeed or formula feed one’s baby is a very personal one. However, certain points need to be clarified regarding the nutritional value of breastfeeding versus formula feeding to allow for informed decision-making. Methodology: -A formal debate about whether to breastfeed or formula feed babies as the better choice. -There will be two debaters, both lactation consultants -Arguments will be based on evidence-based medicine -Duration period of debated: 45 min Result: Clarification and heightened awareness of the benefits of breastfeeding. Conclusion: This debate will make the choice between breastfeeding or formula feeding a relatively easy one to make by both health worker and parents.

Keywords: breastmilk, formula milk, nutritional, comparison

Procedia PDF Downloads 461
1972 Numerical Modelling of Dust Propagation in the Atmosphere of Tbilisi City in Case of Western Background Light Air

Authors: N. Gigauri, V. Kukhalashvili, A. Surmava, L. Intskirveli, L. Gverdtsiteli

Abstract:

Tbilisi, a large city of the South Caucasus, is a junction point connecting Asia and Europe, Russia and republics of the Asia Minor. Over the last years, its atmosphere has been experienced an increasing anthropogenic load. Numerical modeling method is used for study of Tbilisi atmospheric air pollution. By means of 3D non-linear non-steady numerical model a peculiarity of city atmosphere pollution is investigated during background western light air. Dust concentration spatial and time changes are determined. There are identified the zones of high, average and less pollution, dust accumulation areas, transfer directions etc. By numerical modeling, there is shown that the process of air pollution by the dust proceeds in four stages, and they depend on the intensity of motor traffic, the micro-relief of the city, and the location of city mains. In the interval of time 06:00-09:00 the intensive growth, 09:00-15:00 a constancy or weak decrease, 18:00-21:00 an increase, and from 21:00 to 06:00 a reduction of the dust concentrations take place. The highly polluted areas are located in the vicinity of the city center and at some peripherical territories of the city, where the maximum dust concentration at 9PM is equal to 2 maximum allowable concentrations. The similar investigations conducted in case of various meteorological situations will enable us to compile the map of background urban pollution and to elaborate practical measures for ambient air protection.

Keywords: air pollution, dust, numerical modeling, urban

Procedia PDF Downloads 178
1971 UPPAAL-based Design and Analysis of Intelligent Parking System

Authors: Abobaker Mohammed Qasem Farhan, Olof M. A. Saif

Abstract:

The demand for parking spaces in urban areas, particularly in developing countries, has led to a significant issue in the absence of sufficient parking spaces in crowded areas, which results in daily traffic congestion as drivers search for parking. This not only affects the appearance of the city but also has indirect impacts on the economy, society, and environment. In response to these challenges, researchers from various countries have sought technical and intelligent solutions to mitigate the problem through the development of smart parking systems. This paper aims to analyze and design three models of parking lots, with a focus on parking time and security. The study used computer software and Uppaal tools to simulate the models and determine the best among them. The results and suggestions provided in the paper aim to reduce the parking problems and improve the overall efficiency and safety of the parking process. The conclusion of the study highlights the importance of utilizing advanced technology to address the pressing issue of insufficient parking spaces in urban areas.

Keywords: preliminaries, system requirements, timed Au- tomata, Uppaal

Procedia PDF Downloads 138
1970 Organization’s Ethics, Job Performance Satisfaction and Effects on Employees’ Engagement and Commitment

Authors: Anunya Thanasrisuebwong

Abstract:

This research paper aimed to find out how was the ethical climate in an organization and job performance satisfaction of employees affected employees’ engagement and commitment by using the case study of PTT Exploration and Production Public Company Limited, Thailand. The population of this research was 4,383 Thai employees of PTTEP, Thailand. From a total of 420 questionnaires sent out, 345 respondents replied. The statistics utilized was mean score and Multiple Regression Analysis. The findings revealed that the respondents had opinion towards ethical climate of their organization, job performance satisfaction and organization engagement and commitment at a high level. The test of hypothesis disclosed the determinant attributes of job performance satisfaction that affected the respondents’ overall level of organization engagement and commitment. The set of these determinant attributes consisted of employees’ responsibilities for duties, organization’s policies and practice, relationship with organization’s commanders, work security and stability, job description, career path and relationship with colleagues. These variables were able to predict the employees’ organization engagement and commitment at 50.6 percent.

Keywords: ethical climate in organization, job performance satisfaction, organization engagement, commitment

Procedia PDF Downloads 279
1969 Measuring Government’s Performance (Services) Oman Service Maturity Model (OSMM)

Authors: Angie Al Habib, Khalid Al Siyabi

Abstract:

To measure or asses any government’s efficiency we need to measure the performance of this government in regards to the quality of the service it provides. Using a technological platform in service provision became a trend and a public demand. It is also a public need to make sure these services are aligned to values and to the whole government’s strategy, vision and goals as well. Providing services using technology tools and channels can enhance the internal business process and also help establish many essential values to government services like transparency and excellence, since in order to establish e-services many standards and policies must be put in place to enable the handing over of decision making to a mature system oriented mechanism. There was no doubt that the Sultanate of Oman wanted to enhance its services and move it towards automation and establishes a smart government as well as links its services to life events. Measuring government efficiency is very essential in achieving social security and economic growth, since it can provide a clear dashboard of all projects and improvements. Based on this data we can improve the strategies and align the country goals to them.

Keywords: government, maturity, Oman, performance, service

Procedia PDF Downloads 362
1968 Strategic Thinking to Enhance Critical Transport Infrastructure and Build Resilience

Authors: Jayantha Withanaarachchi, Sujeeva Setunge, Sara Moridpour

Abstract:

Gaps in strategic thinking and planning lead to critical transport infrastructure resilience. These gaps in strategic transport and land use development planning have an impact on communities and cities. Natural and man-induced disasters can be catastrophic to communities. After a disaster, many types of critical infrastructure, including transport infrastructure gets un-usable or gets damaged. This paper examines strategic thinking behind the resilience and protection of Critical Transport Infrastructure (CI) within transport networks by investigating the impact of disasters such as bushfires, hurricanes and earthquakes. A detailed analysis of three case studies have been conducted to identify the gaps in strategic transport planning and strategic decision making processes required to mitigate the impacts of disasters. Case studies will be analysed to identify existing gaps in road design, transport planning and decision making. This paper examines the effect of road designing, transport corridors and decision making during transport planning stages and how it impacts transport infrastructure as well as community resilience. A set of recommendations to overcome the shortcomings of existing strategic planning and designing process are presented. This research paper reviews transport infrastructure planning issues and presents the common approach suitable for future strategic thinking and planning which could be adopted in practices.

Keywords: community resilience, decision making , infrastructure resilience, strategic transport planning, transport infrastructure

Procedia PDF Downloads 285
1967 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 153
1966 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance

Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug

Abstract:

Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.

Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk

Procedia PDF Downloads 219
1965 A Feasibility Study of Producing Biofuels from Textile Sludge by Torrefaction Technology

Authors: Hua-Shan Tai, Yu-Ting Zeng

Abstract:

In modern and industrial society, enormous amounts of sludge from various of industries are constantly produced; currently, most of the sludge are treated by landfill and incineration. However, both treatments are not ideal because of the limited land for landfill and the secondary pollution caused by incineration. Consequently, treating industrial sludge appropriately has become an urgent issue of environmental protection. In order to solve the problem of the massive sludge, this study uses textile sludge which is the major source of waste sludge in Taiwan as raw material for torrefaction treatments. To investigate the feasibility of producing biofuels from textile sludge by torrefaction, the experiments were conducted with temperatures at 150, 200, 250, 300, and 350°C, with heating rates of 15, 20, 25 and 30°C/min, and with residence time of 30 and 60 minutes. The results revealed that the mass yields after torrefaction were approximately in the range of 54.9 to 93.4%. The energy densification ratios were approximately in the range of 0.84 to 1.10, and the energy yields were approximately in the range of 45.9 to 98.3%. The volumetric densities were approximately in the range of 0.78 to 1.14, and the volumetric energy densities were approximately in the range of 0.65 to 1.18. To sum up, the optimum energy yield (98.3%) can be reached with terminal temperature at 150 °C, heating rate of 20°C/min, and residence time of 30 minutes, and the mass yield, energy densification ratio as well as volumetric energy density were 92.2%, 1.07, and 1.15, respectively. These results indicated that the solid products after torrefaction are easy to preserve, which not only enhance the quality of the product, but also achieve the purpose of developing the material into fuel.

Keywords: biofuel, biomass energy, textile sludge, torrefaction

Procedia PDF Downloads 316
1964 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code

Authors: Deborah Garcia-Magna

Abstract:

The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.

Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting

Procedia PDF Downloads 191
1963 An Industrial Scada System Remote Control Using Mobile Phones

Authors: Ahmidah Elgali

Abstract:

SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.

Keywords: control, industrial, mobile, network, remote, SCADA

Procedia PDF Downloads 70
1962 Counterfeit Drugs Prevention in Pharmaceutical Industry with RFID: A Framework Based On Literature Review

Authors: Zeeshan Hamid, Asher Ramish

Abstract:

The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.

Keywords: supply chain, RFID, pharmaceutical industry, counterfeit drugs, patients care

Procedia PDF Downloads 309
1961 Knowledge Engineering Based Smart Healthcare Solution

Authors: Rhaed Khiati, Muhammad Hanif

Abstract:

In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.

Keywords: big data, smart healthcare, distributed systems, bioinformatics

Procedia PDF Downloads 193
1960 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.

Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability

Procedia PDF Downloads 136
1959 Impact of Climate Change on Crop Production: Climate Resilient Agriculture Is the Need of the Hour

Authors: Deepak Loura

Abstract:

Climate change is considered one of the major environmental problems of the 21st century and a lasting change in the statistical distribution of weather patterns over periods ranging from decades to millions of years. Agriculture and climate change are internally correlated with each other in various aspects, as the threat of varying global climate has greatly driven the attention of scientists, as these variations are imparting a negative impact on global crop production and compromising food security worldwide. The fast pace of development and industrialization and indiscriminate destruction of the natural environment, more so in the last century, have altered the concentration of atmospheric gases that lead to global warming. Carbon dioxide (CO₂), methane (CH₄), and nitrous oxide (NO) are important biogenic greenhouse gases (GHGs) from the agricultural sector contributing to global warming and their concentration is increasing alarmingly. Agricultural productivity can be affected by climate change in 2 ways: first, directly, by affecting plant growth development and yield due to changes in rainfall/precipitation and temperature and/or CO₂ levels, and second, indirectly, there may be considerable impact on agricultural land use due to snow melt, availability of irrigation, frequency and intensity of inter- and intra-seasonal droughts and floods, soil organic matter transformations, soil erosion, distribution and frequency of infestation by insect pests, diseases or weeds, the decline in arable areas (due to submergence of coastal lands), and availability of energy. An increase in atmospheric CO₂ promotes the growth and productivity of C3 plants. On the other hand, an increase in temperature, can reduce crop duration, increase crop respiration rates, affect the equilibrium between crops and pests, hasten nutrient mineralization in soils, decrease fertilizer- use efficiencies, and increase evapotranspiration among others. All these could considerably affect crop yield in long run. Climate resilient agriculture consisting of adaptation, mitigation, and other agriculture practices can potentially enhance the capacity of the system to withstand climate-related disturbances by resisting damage and recovering quickly. Climate resilient agriculture turns the climate change threats that have to be tackled into new business opportunities for the sector in different regions and therefore provides a triple win: mitigation, adaptation, and economic growth. Improving the soil organic carbon stock of soil is integral to any strategy towards adapting to and mitigating the abrupt climate change, advancing food security, and improving the environment. Soil carbon sequestration is one of the major mitigation strategies to achieve climate-resilient agriculture. Climate-smart agriculture is the only way to lower the negative impact of climate variations on crop adaptation before it might affect global crop production drastically. To cope with these extreme changes, future development needs to make adjustments in technology, management practices, and legislation. Adaptation and mitigation are twin approaches to bringing resilience to climate change in agriculture.

Keywords: climate change, global warming, crop production, climate resilient agriculture

Procedia PDF Downloads 71
1958 Optimizing a Hybrid Inventory System with Random Demand and Lead Time

Authors: Benga Ebouele, Thomas Tengen

Abstract:

Implementing either periodic or continuous inventory review model within most manufacturing-companies-supply chains as a management tool may incur higher costs. These high costs affect the system flexibility which in turn affects the level of service required to satisfy customers. However, these effects are not clearly understood because the parameters of both inventory review policies (protection demand interval, order quantity, etc.) are not designed to be fully utilized under different and uncertain conditions such as poor manufacturing, supplies and delivery performance. Coming up with a hybrid model which may combine in some sense the feature of both continuous and a periodic inventory review models should be useful. Therefore, there is a need to build and evaluate such hybrid model on the annual total cost, stock out probability and system’s flexibility in order to search for the most cost effective inventory review model. This work also seeks to find the optimal sets of parameters of inventory management under stochastic condition so as to optimise each policy independently. The results reveal that a continuous inventory system always incurs lesser cost than a periodic (R, S) inventory system, but this difference tends to decrease as time goes by. Although the hybrid inventory is the only one that can yield lesser cost over time, it is not always desirable but also natural to use it in order to help the system to meet high performance specification.

Keywords: demand and lead time randomness, hybrid Inventory model, optimization, supply chain

Procedia PDF Downloads 308
1957 Variables for Measuring the Impact of the Social Enterprises in the Field of Community Development

Authors: A. Irudaya Veni Mary, M. Victor Louis Anthuvan, P. Christie, A. Indira

Abstract:

In India, social enterprises are working to create social value in various fields including education; health; women and child development; environment protection and community development. Although social enterprises have brought about tremendous changes in the lives of beneficiaries, the importance of their works is not understood thoroughly. One of the ways to prove themselves is to measure the impact, which in recent times has received much attention. This paper focuses on the study of social value created by the social enterprises in the field of community development. It also aims to put forth a research tool for measuring the social value created by the social enterprises in the field of community development. A close-ended interview schedule was prepared to measure the social value creation and it was administered among 60 beneficiaries of two social enterprises who work in the field of community development. The study results show that the social enterprises have brought four types of impact in the life of their beneficiaries; economic impact, social impact, political impact and cultural impact. This study is limited to the social enterprises those who work towards community development. This empirical finding will enable the reader to understand various types of social value created by the social enterprises working in the field of community development. This study will also serve as guide for social enterprises in community development activities to measure their impact and thereby improve their operation towards the betterment of the society. This paper is derived from an empirical research carried out to describe the different types of social value created by the social enterprises in India.

Keywords: social enterprise, social entrepreneurs, social impact, social value, tool for social impact measurement

Procedia PDF Downloads 266
1956 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 117
1955 Evaluation and Analysis of Light Emitting Diode Distribution in an Indoor Visible Light Communication

Authors: Olawale J. Olaluyi, Ayodele S. Oluwole, O. Akinsanmi, Johnson O. Adeogo

Abstract:

Communication using visible light VLC is considered a cutting-edge technology used for data transmission and illumination since it uses less energy than radio frequency (RF) technology and has a large bandwidth, extended lifespan, and high security. The room's irregular distribution of small base stations, or LED array distribution, is the cause of the obscured area, minimum signal-to-noise ratio (SNR), and received power. In order to maximize the received power distribution and SNR at the center of the room for an indoor VLC system, the researchers offer an innovative model for the placement of eight LED array distributions in this work. We have investigated the arrangement of the LED array distribution with regard to receiving power to fill the open space in the center of the room. The suggested LED array distribution saved 36.2% of the transmitted power, according to the simulation findings. Aside from that, the entire room was equally covered. This leads to an increase in both received power and SNR.

Keywords: visible light communication (VLC), light emitted diodes (LED), optical power distribution, signal-to-noise ratio (SNR).

Procedia PDF Downloads 77
1954 Factors Affecting Customer Loyalty in the Independent Surveyor Service Industry in Indonesia

Authors: Sufrin Hannan, Budi Suharjo, Rita Nurmalina, Kirbrandoko

Abstract:

The challenge for independent surveyor service companies now is growing with increasing uncertainty in business. Protection from the government for domestic independent surveyor industry from competitor attack, such as entering the global surveyors to Indonesia also no longer exists. Therefore, building customer loyalty becomes very important to create a long-term relationship between an independent surveyor with its customers. This study aims to develop a model that can be used to build customer loyalty by looking at various factors that determine customer loyalty, especially on independent surveyors for coal inspection in Indonesia. The development of this model uses the relationship marketing approach. Testing of the hypothesis is done by testing the variables that determine customer loyalty, either directly or indirectly, which amounted to 10 variables. The data were collected from 200 questionnaires filled by independent surveyor company decision makers from 51 exporting companies and coal trading companies in Indonesia and analyzed using Structural Equation Model (SEM). The results show that customer loyalty of independent surveyors is influenced by customer satisfaction, trust, switching-barrier, and relationship-bond. Research on customer satisfaction shows that customer satisfaction is influenced by the perceived quality and perceived value, while perceived quality is influenced by reliability, assurance, responsiveness, and empathy.

Keywords: relationship marketing, customer loyalty, customer satisfaction, switching barriers, relationship bonds

Procedia PDF Downloads 167
1953 Development of Real Time System for Human Detection and Localization from Unmanned Aerial Vehicle Using Optical and Thermal Sensor and Visualization on Geographic Information Systems Platform

Authors: Nemi Bhattarai

Abstract:

In recent years, there has been a rapid increase in the use of Unmanned Aerial Vehicle (UAVs) in search and rescue (SAR) operations, disaster management, and many more areas where information about the location of human beings are important. This research will primarily focus on the use of optical and thermal camera via UAV platform in real-time detection, localization, and visualization of human beings on GIS. This research will be beneficial in disaster management search of lost humans in wilderness or difficult terrain, detecting abnormal human behaviors in border or security tight areas, studying distribution of people at night, counting people density in crowd, manage people flow during evacuation, planning provisions in areas with high human density and many more.

Keywords: UAV, human detection, real-time, localization, visualization, haar-like, GIS, thermal sensor

Procedia PDF Downloads 457
1952 Nano-Coating for Corrosion Prevention

Authors: M. J. Suriani, F. Mansor, W. Siti Maizurah, I. Nurizwani

Abstract:

Silicon Carbide (SiC) is one of the Silicon-based materials, which get interested by the researcher. SiC is an emerging semiconductor material, which has received a great deal of attention due to their application in high frequency and high power systems. Although its superior characteristic for a semiconductor material, its outstanding mechanical properties, chemical inertness and thermal stability has gained important aspect for a surface coating for deployment in extreme environments. Very high frequency (VHF)-PECVD technique utilized to deposit nano ns-SiC film in which variation in chamber pressure, substrate temperature, RF power and precursor gases flow rate will be investigated in order to get a good quality of thin film coating. Characterization of the coating performed in order to study the surface morphology, structural information. This performance of coating evaluated through corrosion test to determine the effectiveness of the coating for corrosion prevention. Ns-SiC film expected to possess better corrosion resistance and optical properties, as well as preserving the metal from the marine environment. Through this research project, corrosion protection performance by applying coating will be explored to obtain a great corrosion prevention method to the shipping and oil and gas industry in Malaysia. Besides, the cost of repair and maintenance spending by the government of Malaysia can be reduced through practicing this method.

Keywords: composite materials, marine corrosion, nano-composite, nano structure–coating

Procedia PDF Downloads 462
1951 Biocompatible Chitosan Nanoparticles as an Efficient Delivery Vehicle for Mycobacterium Tuberculosis Lipids to Induce Potent Cytokines and Antibody Response through Activation of γδ T-Cells in Mice

Authors: Ishani Das, Avinash Padhi, Sitabja Mukherjee, Santosh Kar, Avinash Sonawane

Abstract:

Activation of cell mediated and humoral immune responses to Mycobacterium tuberculosis (Mtb) are critical for protection. Herein, we show that mice immunized with Mtb lipid bound chitosan nanoparticles(NPs) induce secretion of prominent Th1 and Th2 cytokines in lymph node and spleen cells, and also induced significantly higher levels of IgG, IgG1, IgG2 and IgM in comparison to control mice measured by ELISA. Furthermore, significantly enhanced γδ-T cell activation was observed in lymph node cells isolated from mice immunized with Mtb lipid coated chitosan-NPs as compared to mice immunized with chitosan-NPs alone or Mtb lipid liposomes through flow cytometric analysis. Also, it was observed that in comparison to CD8+ cells, significantly higher CD4+ cells were present in both the lymph node and spleen cells isolated from mice immunized with Mtb lipid coated chitosan NP. In conclusion, this study represents a promising new strategy for efficient delivery of Mtb lipids using chitosan NPs to trigger enhanced cell mediated and antibody response against Mtb lipids.

Keywords: antibody response, chitosan nanoparticles, cytokines, mycobacterium tuberculosis lipids

Procedia PDF Downloads 276
1950 Efficacy and User Satisfaction on the Rama-Chest Cryo Arm Innovation for Bronchoscopic Cryotherapy

Authors: Chariya Laohavich

Abstract:

At the current, the trends in the lung disease at a university hospital are the treat and diagnosis by bronchoscopy. Bronchoscopic cryotherapy is a long time procedure 1-4 hours. The cryo probe is sensitive and easy to be damaged and expensive. We have this study management for protection the cryo probe, user satisfaction and qualities work. This study conducted in 4 stages: stage 1 for a survey of problems and assessment of user’s needs; stage 2 for designing and developing the Rama-chest cryo arm for a bronchoscopy process; stage 3 for test-implementing the Rama-chest cryo arm in real situations, studying its problems and obstacles, and evaluating the user satisfaction; and stage 4 for an overall assessment and improvement. The sample used in this study consisted of a total of 15 Ramathipbodi Hospital’s Bronchoscopist and bronchoscopist’s nurse who had used the Rama-chest cryo arm for bronchoscopic cryotherapy from January to June 2016. Objective: To study efficacy and user satisfaction on the Rama-chest cryo arm innovation for bronchoscopic cryotherapy. Data were collected using a Rama-chest cryo arm satisfaction assessment form and analysed based on mean and standard deviation. Result is the Rama-chest cryo arm was an innovation that accommodated during bronchoscopic cryotherapy. The subjects rated this the cryo arm as being most satisfactory (M = 4.86 ± , SD 0.48. Therefore we have developed a cryo arm that uses local material, practical and economic. Our innovation is not only flexible and sustainable development but also lean and seamless. This produced device can be used as effectively as the imported one, and thus can be eventually substituted.

Keywords: efficacy, satisfaction, Rama-chest cryo arm, innovation, bronchoscopic cryotherapy

Procedia PDF Downloads 239
1949 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 250
1948 Electrical Properties of Cement-Based Piezoelectric Nanoparticles

Authors: Moustafa Shawkey, Ahmed G. El-Deen, H. M. Mahmoud, M. M. Rashad

Abstract:

Piezoelectric based cement nanocomposite is a promising technology for generating an electric charge upon mechanical stress of concrete structure. Moreover, piezoelectric nanomaterials play a vital role for providing accurate system of structural health monitoring (SHM) of the concrete structure. In light of increasing awareness of environmental protection and energy crises, generating renewable and green energy form cement based on piezoelectric nanomaterials attracts the attention of the researchers. Herein, we introduce a facial synthesis for bismuth ferrite nanoparticles (BiFeO3 NPs) as piezoelectric nanomaterial via sol gel strategy. The fabricated piezoelectric nanoparticles are uniformly distributed to cement-based nanomaterials with different ratios. The morphological shape was characterized by field emission scanning electron microscopy (FESEM) and high-resolution transmission electron microscopy (HR-TEM) as well as the crystal structure has been confirmed using X-ray diffraction (XRD). The ferroelectric and magnetic behaviours of BiFeO3 NPs have been investigated. Then, dielectric constant for the prepared cement samples nanocomposites (εr) is calculated. Intercalating BiFeO3 NPs into cement materials achieved remarkable results as piezoelectric cement materials, distinct enhancement in ferroelectric and magnetic properties. Overall, this present study introduces an effective approach to improve the electrical properties based cement applications.

Keywords: piezoelectric nanomaterials, cement technology, bismuth ferrite nanoparticles, dielectric

Procedia PDF Downloads 243
1947 Design Optimization of Doubly Fed Induction Generator Performance by Differential Evolution

Authors: Mamidi Ramakrishna Rao

Abstract:

Doubly-fed induction generators (DFIG) due to their advantages like speed variation and four-quadrant operation, find its application in wind turbines. DFIG besides supplying power to the grid has to support reactive power (kvar) under grid voltage variations, should contribute minimum fault current during faults, have high efficiency, minimum weight, adequate rotor protection during crow-bar-operation from +20% to -20% of rated speed.  To achieve the optimum performance, a good electromagnetic design of DFIG is required. In this paper, a simple and heuristic global optimization – Differential Evolution has been used. Variables considered are lamination details such as slot dimensions, stack diameters, air gap length, and generator stator and rotor stack length. Two operating conditions have been considered - voltage and speed variations. Constraints included were reactive power supplied to the grid and limiting fault current and torque. The optimization has been executed separately for three objective functions - maximum efficiency, weight reduction, and grid fault stator currents. Subsequent calculations led to the conclusion that designs determined through differential evolution help in determining an optimum electrical design for each objective function.

Keywords: design optimization, performance, DFIG, differential evolution

Procedia PDF Downloads 143