Search results for: mobile security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4174

Search results for: mobile security

1324 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 66
1323 A Study of the Effects of Zimbabwean Youth Migration on Musina Area, South Africa

Authors: R. Chinyakata, N. R. Raselekoane

Abstract:

Migration has always been part of human history. Migration is spurred by globalisation which connects nations by encouraging the flow of goods, services, ideas and people across borders. Migration does not only involve movement of adults from one country to another. It also affects and involves the youth as they are the most mobile group. Musina area, like many other border areas, experiences a variety of challenges as a result of the influx of people from the neighbouring Zimbabwe and other African countries. Of great concern about this migration is the fact that the host country or area may become unsafe and unstable as a result of huge influx of migrants. There may also be tensions between local people and migrants over the resources. The study sought to investigate the effects of the Zimbabwean youth migration on Musina area. The study was undertaken in Musina area which is situated 18km from the Beit-Bridge border post. A qualitative research approach was used. Semi-structured interviews were used to collect data. Non-probability quota sampling technique was used to select the respondents. The study sample consisted of sixteen female and male respondents. Thematic coding was used to analyse the data. Ethical considerations such as informed consent, confidentiality, anonymity and voluntary participation were taken into account to protect the participants. The study found that the effects of the Zimbabwean youth migration on the Musina area include, among others, tensions between locals and the Zimbabwean youth migrants over resources, job and business opportunities, overcrowding and crime. Multi-pronged strategies which involve different stakeholders should be applied to address tensions over job and business opportunities, overcrowding and crime in the Musina area.

Keywords: host country, effects, migrant, migration, Musina, youth, Zimbabwe

Procedia PDF Downloads 232
1322 Information Technology Governance Implementation and Its Determinants in the Egyptian Market

Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb

Abstract:

Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.

Keywords: effective IT governance, Egyptian market, information security, risk controls

Procedia PDF Downloads 144
1321 Infringement of Patent Rights with Doctrine of Equivalent for Turkey

Authors: Duru Helin Ozaner

Abstract:

Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder.

Keywords: patent, infringement, intellectual property, the doctrine of equivalent

Procedia PDF Downloads 199
1320 Appraisal of the Nutritional Potential and Safety of Wild Vegetables of South Africa

Authors: Thozama Kwinana-Mandindi

Abstract:

The contribution made by wild edible plants to the livelihoods, food baskets and diets of the indigenous people, particularly among the rural dwellers is invaluable. These wild vegetables are among the non-conventional crops which are widely distributed throughout the wild regions in South Africa, indigenous communities have always exploited for micro-nutrient supply. They also supply significant complex, recently discovered compounds, naturally occurring phytonutrients. In order to protect and promote sustainable use of these plants for household food security, there is a need to better understand them through studies and innovations. Assessment of the wild edible plants’ safety is very key to the promotion as an agricultural product which can be utilised during dry seasons and periods of food scarcity to alleviate nutrient insecurity. Through the use of Scanning Electron Microscope (SEM) and energy dispersive X-ray spectroscopy (EDXS), the study is seen as the vital step in taking a holistic view of the value of the four most consumed wild vegetables in the Eastern Cape Province of South Africa as they were analysed for safety and appraised for components that can influence utilisation. Results indicate that they can be relied upon and cultivation be promoted.

Keywords: nature’s resource, wild vegetables, appraisal for safety, SEM

Procedia PDF Downloads 427
1319 The Nature of Origin of New Criminal Occurrences in Gjakova Region: Cultural and Criminological “Intersection” in 1999-2009

Authors: Bekim Avdiaj

Abstract:

The transition period of Kosovo society brought fundamental changes in all the spheres of organizing life. This was the period when also in the cultural tradition the biggest movement and an emerging from ‘isolation’ or from the ‘shell’ occurred. Transformation of the traditional and embracing of the modern began here. The same was experienced and is currently being experienced also by Gjakova and its surrounding which is historically renowned for its great tradition and culture. The population of this region is actually facing a transition from the traditional system into the modern one and quite often with huge leaps. These ‘movements’ or ‘evolutions’ of the society of this region, besides the numerous positive things it ‘harvested’, also brought things that do not at all correspond with their tradition as well as new criminal occurrences which in the past were not present in this area. Furthermore, some of the ‘new’ behaviours that are embraced from other ‘cultures’ and ‘civilizations’, and which are often exceeded, are quite perturbing. The security situation is also worrying, particularly following the appearance of some new criminal occurrences. Therefore, with this research paper we will strive to analyse the new cultural “intersections” as well as the nature of the origin of some new very worrying criminal occurrences. We will present there also some factors inciting into these occurrences, which were confessed by the persons involved in these criminal occurrences and who come from this very region.

Keywords: crime, occurrence, culture, Gjakova Region

Procedia PDF Downloads 334
1318 A Small-Scale Flexible Test Bench for the Investigation of Fertigation Strategies in Soilless Culture

Authors: Giacomo Barbieri

Abstract:

In soilless culture, the management of the nutrient solution is the most important aspect for crop growing. Fertigation dose, frequency and nutrient concentration must be planned with the objective of reaching an optimal crop growth by limiting the utilized resources and the associated costs. The definition of efficient fertigation strategies is a complex problem since fertigation requirements vary on the basis of different factors, and crops are sensitive to small variations on fertigation parameters. To the best of author knowledge, a small-scale test bench that is flexible for both nutrient solution preparation and precise irrigation is currently missing, limiting the investigations in standard practices for soilless culture. Starting from the analysis of the state of the art, this paper proposes a small-scale system that is potentially able to concurrently test different fertigation strategies. The system will be designed and implemented throughout a three year project started on August 2018. However, due to the importance of the topic within current challenges as food security and climate change, this work is spread considering that may inspire other universities and organizations.

Keywords: soilless culture, fertigation, test bench, small-scale, automation

Procedia PDF Downloads 158
1317 Going Global by Going Local-How Website Localization and Translation Can Break the Internet Language Barrier and Contribute to Globalization

Authors: Hela Fathallah

Abstract:

With 6,500 spoken languages all over the world but 80 percent of online content available only in 10 languages – English, Chinese, Spanish, Japanese, Arabic, Portuguese, German, French, Russian, and Korean – language represents a barrier to the universal access to knowledge, information and services that the internet wants to provide. Translation and its related fields of localization, interpreting, globalization, and internationalization, remove that barrier for billions of people worldwide, unlocking new markets for technology companies, mobile device makers, service providers and language vendors as well. This paper gathers different surveys conducted in different regions of the world that demonstrate a growing demand for consumption of web content with distinctive values and in languages others than the aforementioned ones. It also adds new insights to the contribution of translation in languages preservation. The idea that English is the language of internet and that, in a globalized world, everyone should learn English to cope with new technologies is no longer true. This idea has reached its limits. It collides with cultural diversity and differences around the world and generates an accelerated rate of languages extinction. Studies prove that internet exacerbates this rate and web giants such as Facebook or Google are, today, facing the impact of such a misconception of globalization. For internet and dot-com companies, localization is the solution; they are spending a significant amount of time to understand what people want and to figure out how to provide it. They are committed to making their content accessible, if not in all the languages spoken today, at least in most of them, and to adapting it to most cultures. Technology has broken down the barriers of time and space, and it will break down the language barrier as well by undertaking a process of translation and localization and through a new definition of globalization that takes into consideration these two processes.

Keywords: globalization, internet, localization, translation

Procedia PDF Downloads 349
1316 Gendered Water Insecurity: a Structural Equation Approach for Female-Headed Households in South Africa

Authors: Saul Ngarava, Leocadia Zhou, Nomakhaya Monde

Abstract:

Water crises have the fourth most significant societal impact after weapons of mass destruction, climate change, and extreme weather conditions, ahead of natural disasters. Intricacies between women and water are central to achieving the 2030 Sustainable Development Goals (SDGs). The majority of the 1.2 billion poor people worldwide, with two-thirds being women, and mostly located in Sub Sahara Africa (SSA) and South Asia, do not have access to safe and reliable sources of water. There exist gendered differences in water security based on the division of labour associating women with water. Globally, women and girls are responsible for water collection in 80% of the households which have no water on their premises. Women spend 16 million hours a day collecting water, while men and children spend 6 million and 4 million per day, respectively, which is time foregone in the pursuit of other livelihood activities. Due to their proximity and activities concerning water, women are vulnerable to water insecurity through exposures to water-borne diseases, fatigue from physically carrying water, and exposure to sexual and physical harassment, amongst others. Proximity to treated water and their wellbeing also has an effect on their sensitivity and adaptive capacity to water insecurity. The great distances, difficult terrain and heavy lifting expose women to vulnerabilities of water insecurity. However, few studies have quantified the vulnerabilities and burdens on women, with a few taking a phenomenological qualitative approach. Vulnerability studies have also been scanty in the water security realm, with most studies taking linear forms of either quantifying exposures, sensitivities or adaptive capacities in climate change studies. The current study argues for the need for a water insecurity vulnerability assessment, especially for women into research agendas as well as policy interventions, monitoring, and evaluation. The study sought to identify and provide pathways through which female-headed households were water insecure in South Africa, the 30th driest country in the world. This was through linking the drinking water decision as well as the vulnerability frameworks. Secondary data collected during the 2016 General Household Survey (GHS) was utilised, with a sample of 5928 female-headed households. Principal Component Analysis and Structural Equation Modelling were used to analyse the data. The results show dynamic relationships between water characteristics and water treatment. There were also associations between water access and wealth status of the female-headed households. Association was also found between water access and water treatment as well as between wealth status and water treatment. The study concludes that there are dynamic relationships in water insecurity (exposure, sensitivity, and adaptive capacity) for female-headed households in South Africa. The study recommends that a multi-prong approach is required in tackling exposures, sensitivities, and adaptive capacities to water insecurity. This should include capacitating and empowering women for wealth generation, improve access to water treatment equipment as well as prioritising the improvement of infrastructure that brings piped and safe water to female-headed households.

Keywords: gender, principal component analysis, structural equation modelling, vulnerability, water insecurity

Procedia PDF Downloads 106
1315 Monitor Vehicle Speed Using Internet of Things Based Wireless Sensor Network System

Authors: Akber Oumer Abdurezak

Abstract:

Road traffic accident is a major problem in Ethiopia, resulting in the deaths of many people and potential injuries and crash every year and loss of properties. According to the Federal Transport Authority, one of the main causes of traffic accident and crash in Ethiopia is over speeding. Implementation of different technologies is used to monitor the speed of vehicles in order to minimize accidents and crashes. This research aimed at designing a speed monitoring system to monitor the speed of travelling vehicles and movements, reporting illegal speeds or overspeeding vehicles to the concerned bodies. The implementation of the system is through a wireless sensor network. The proposed system can sense and detect the movement of vehicles, process, and analysis the data obtained from the sensor and the cloud system. The data is sent to the central controlling server. The system contains accelerometer and gyroscope sensors to sense and collect the data of the vehicle. Arduino to process the data and Global System for Mobile Communication (GSM) module for communication purposes to send the data to the concerned body. When the speed of the vehicle exceeds the allowable speed limit, the system sends a message to database as “over speeding”. Both accelerometer and gyroscope sensors are used to collect acceleration data. The acceleration data then convert to speed, and the corresponding speed is checked with the speed limit, and those above the speed limit are reported to the concerned authorities to avoid frequent accidents. The proposed system decreases the occurrence of accidents and crashes due to overspeeding and can be used as an eye opener for the implementation of other intelligent transport system technologies. This system can also integrate with other technologies like GPS and Google Maps to obtain better output.

Keywords: accelerometer, IOT, GSM, gyroscope

Procedia PDF Downloads 55
1314 Design of Strain Sensor Based on Cascaded Fiber Bragg Grating for Remote Sensing Monitoring Application

Authors: Arafat A. A. Shabaneh

Abstract:

Harsh environments demand a developed detection of an optical communication system to ensure a high level of security and safety. Fiber Bragg gratings (FBG) are emerging sensing instruments that respond to variations in strain and temperature via varying wavelengths. In this paper, cascaded uniform FBG as a strain sensor for 6 km length at 1550 nm wavelength with 30 oC is designed with analyzing of dynamic strain and wavelength shifts. FBG is placed in a small segment of optical fiber, which reflects light of a specific wavelength and passes the remaining wavelengths. This makes a periodic alteration in the refractive index within the fiber core. The alteration in the modal index of fiber produced due to strain consequences in a Bragg wavelength. When the developed sensor exposure to a strain of cascaded uniform FBG by 0.01, the wavelength is shifted to 0.0000144383 μm. The sensing accuracy of the developed sensor is 0.0012. Simulation results show reliable and effective strain monitoring sensors for remote sensing applications.

Keywords: Cascaded fiber Bragg gratings, Strain sensor, Remote sensing, Wavelength shift

Procedia PDF Downloads 187
1313 Humanitarian Aid and National Sovereignty: The Case of Kosovo

Authors: Nick Papanikolaou

Abstract:

In modern world politics, International relations are very complex not only in their construction but also in their interpretation the ex-Yugoslavian(western Balkans) countries, due to the establishment of independent states, have also risen pending geopolitical and territorial issues such as the Kosovo dispute widely known as an active frozen conflict. Science of anthropology and its subfield of anthropology of conflict can suggest a sustainable plan of communities coexistence and abolishment of fondamentalism. The 1244 Security Council Resolution provides a framework of implementation of a transitional international joint international armed presence for ensuring control and stability in the territory. The changing international relations landscape and the rise of the integration of the Western Balkans in the European Union have brought the question of Kosovo and all the till now internationally controlled system of governance to a dead end. A new solution that will ensure a sustainable future needs to be applied in order to solve this case in a way that rights of both albanians and Serbians will be equally respected and both populations will coexist peacefully. What this presentation aims for is to present a plan for the peaceful coexistence and sovreignty of habitants of Kosovo in a whole new way of governance.

Keywords: sovereignty, Kosovo, Western Balkans, anthropology of conflict

Procedia PDF Downloads 56
1312 Computer Simulation of Hydrogen Superfluidity through Binary Mixing

Authors: Sea Hoon Lim

Abstract:

A superfluid is a fluid of bosons that flows without resistance. In order to be a superfluid, a substance’s particles must behave like bosons, yet remain mobile enough to be considered a superfluid. Bosons are low-temperature particles that can be in all energy states at the same time. If bosons were to be cooled down, then the particles will all try to be on the lowest energy state, which is called the Bose Einstein condensation. The temperature when bosons start to matter is when the temperature has reached its critical temperature. For example, when Helium reaches its critical temperature of 2.17K, the liquid density drops and becomes a superfluid with zero viscosity. However, most materials will solidify -and thus not remain fluids- at temperatures well above the temperature at which they would otherwise become a superfluid. Only a few substances currently known to man are capable of at once remaining a fluid and manifesting boson statistics. The most well-known of these is helium and its isotopes. Because hydrogen is lighter than helium, and thus expected to manifest Bose statistics at higher temperatures than helium, one might expect hydrogen to also be a superfluid. As of today, however, no one has yet been able to produce a bulk, hydrogen superfluid. The reason why hydrogen did not form a superfluid in the past is its intermolecular interactions. As a result, hydrogen molecules are much more likely to crystallize than their helium counterparts. The key to creating a hydrogen superfluid is therefore finding a way to reduce the effect of the interactions among hydrogen molecules, postponing the solidification to lower temperature. In this work, we attempt via computer simulation to produce bulk superfluid hydrogen through binary mixing. Binary mixture is a technique of mixing two pure substances in order to avoid crystallization and enhance super fluidity. Our mixture here is KALJ H2. We then sample the partition function using this Path Integral Monte Carlo (PIMC), which is well-suited for the equilibrium properties of low-temperature bosons and captures not only the statistics but also the dynamics of Hydrogen. Via this sampling, we will then produce a time evolution of the substance and see if it exhibits superfluid properties.

Keywords: superfluidity, hydrogen, binary mixture, physics

Procedia PDF Downloads 307
1311 Design and Implementation of a Software Platform Based on Artificial Intelligence for Product Recommendation

Authors: Giuseppina Settanni, Antonio Panarese, Raffaele Vaira, Maurizio Galiano

Abstract:

Nowdays, artificial intelligence is used successfully in academia and industry for its ability to learn from a large amount of data. In particular, in recent years the use of machine learning algorithms in the field of e-commerce has spread worldwide. In this research study, a prototype software platform was designed and implemented in order to suggest to users the most suitable products for their needs. The platform includes a chatbot and a recommender system based on artificial intelligence algorithms that provide suggestions and decision support to the customer. The recommendation systems perform the important function of automatically filtering and personalizing information, thus allowing to manage with the IT overload to which the user is exposed on a daily basis. Recently, international research has experimented with the use of machine learning technologies with the aim to increase the potential of traditional recommendation systems. Specifically, support vector machine algorithms have been implemented combined with natural language processing techniques that allow the user to interact with the system, express their requests and receive suggestions. The interested user can access the web platform on the internet using a computer, tablet or mobile phone, register, provide the necessary information and view the products that the system deems them most appropriate. The platform also integrates a dashboard that allows the use of the various functions, which the platform is equipped with, in an intuitive and simple way. Artificial intelligence algorithms have been implemented and trained on historical data collected from user browsing. Finally, the testing phase allowed to validate the implemented model, which will be further tested by letting customers use it.

Keywords: machine learning, recommender system, software platform, support vector machine

Procedia PDF Downloads 118
1310 Biodiversity of Pathogenic and Toxigenic Fungi Associated with Maize Grains Sampled across Egypt

Authors: Yasser Shabana, Khaled Ghoneem, Nehal Arafat, Younes Rashad, Dalia Aseel, Bruce Fitt, Aiming Qi, Benjamine Richard

Abstract:

Providing food for more than 100 million people is one of Egypt's main challenges facing development. The overall goal is to formulate strategies to enhance food security in light of population growth. Two hundred samples of maize grains from 25 governates were collected. For the detection of seed-borne fungi, the deep-freezing blotter method (DFB) and washing method (ISTA 1999) were used. A total of 41 fungal species was recovered from maize seed samples. Weather data from 30 stations scattered all over Egypt and covering the major maize growing areas were obtained. Canonical correspondence analysis of data for the obtained fungal genera with temperature, relative humidity, precipitation, wind speed, or solar radiation revealed that relative humidity, temperature and wind speed were the most influential weather variables.

Keywords: biodiversity, climate change, maize, seed-borne fungi

Procedia PDF Downloads 146
1309 Failure Cases Analysis in Petrochemical Industry

Authors: S. W. Liu, J. H. Lv, W. Z. Wang

Abstract:

In recent years, the failure accidents in petrochemical industry have been frequent, and have posed great security problems in personnel and property. The improvement of petrochemical safety is highly requested in order to prevent re-occurrence of severe accident. This study focuses on surveying the failure cases occurred in petrochemical field, which were extracted from journals of engineering failure, including engineering failure analysis and case studies in engineering failure analysis. The relation of failure mode, failure mechanism, type of components, and type of materials was analyzed in this study. And the analytical results showed that failures occurred more frequently in vessels and piping among the petrochemical equipment. Moreover, equipment made of carbon steel and stainless steel accounts for the majority of failures compared to other materials. This may be related to the application of the equipment and the performance of the material. In addition, corrosion failures were the largest in number of occurrence in the failure of petrochemical equipment, in which stress corrosion cracking accounts for a large proportion. This may have a lot to do with the service environment of the petrochemical equipment. Therefore, it can be concluded that the corrosion prevention of petrochemical equipment is particularly important.

Keywords: cases analysis, corrosion, failure, petrochemical industry

Procedia PDF Downloads 285
1308 International Solar Alliance: A Case for Indian Solar Diplomacy

Authors: Swadha Singh

Abstract:

International Solar Alliance is the foremost treaty-based global organization concerned with tapping the potential of sun-abundant nations between the Tropics of Cancer and Capricorn and enables co-operation among them. As a founding member of the International Solar Alliance, India exhibits its positioning as an upcoming leader in clean energy. India has set ambitious goals and targets to expand the share of solar in its energy mix and is playing a proactive role both at the regional and global levels. ISA aims to serve multiple goals- bring about scale commercialization of solar power, boost domestic manufacturing, and leverage solar diplomacy in African countries, amongst others. Against this backdrop, this paper attempts to examine the ways in which ISA as an intergovernmental organization under Indian leadership can leverage the cause of clean energy (solar) diplomacy and effectively shape partnerships and collaborations with other developing countries in terms of sharing solar technology, capacity building, risk mitigation, mobilizing financial investment and providing an aggregate market. A more specific focus of ISA is on the developing countries, which in the absence of a collective, are constrained by technology and capital scarcity, despite being naturally endowed with solar resources. Solar rich but finance-constrained economies face political risk, foreign exchange risk, and off-taker risk. Scholars argue that aligning India’s climate change discourse and growth prospects in its engagements, collaborations, and partnerships at the bilateral, multilateral and regional level can help promote trade, attract investments, and promote resilient energy transition both in India and in partner countries. For developing countries, coming together in an action-oriented way on issues of climate and clean energy is particularly important since it is developing and underdeveloped countries that face multiple and coalescing challenges such as the adverse impact of climate change, uneven and low access to reliable energy, and pressing employment needs. Investing in green recovery is agreed to be an assured way to create resilient value chains, create sustainable livelihoods, and help mitigate climate threats. If India is able to ‘green its growth’ process, it holds the potential to emerge as a climate leader internationally. It can use its experience in the renewable sector to guide other developing countries in balancing multiple similar objectives of development, energy security, and sustainability. The challenges underlying solar expansion in India have lessons to offer other developing countries, giving India an opportunity to assume a leadership role in solar diplomacy and expand its geopolitical influence through inter-governmental organizations such as ISA. It is noted that India has limited capacity to directly provide financial funds and support and is not a leading manufacturer of cheap solar equipment, as does China; however, India can nonetheless leverage its large domestic market to scale up the commercialization of solar power and offer insights and learnings to similarly placed abundant solar countries. The paper examines the potential of and limits placed on India’s solar diplomacy.

Keywords: climate diplomacy, energy security, solar diplomacy, renewable energy

Procedia PDF Downloads 105
1307 Artificial Intelligence for Cloud Computing

Authors: Sandesh Achar

Abstract:

Artificial intelligence is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remain a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights excellent investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.

Keywords: artificial intelligence, cloud computing, deep learning, machine learning, internet of things

Procedia PDF Downloads 89
1306 Factors Influencing Consumer Adoption of Digital Banking Apps in the UK

Authors: Sevelina Ndlovu

Abstract:

Financial Technology (fintech) advancement is recognised as one of the most transformational innovations in the financial industry. Fintech has given rise to internet-only digital banking, a novel financial technology advancement, and innovation that allows banking services through internet applications with no need for physical branches. This technology is becoming a new banking normal among consumers for its ubiquitous and real-time access advantages. There is evident switching and migration from traditional banking towards these fintech facilities, which could possibly pose a systemic risk if not properly understood and monitored. Fintech advancement has also brought about the emergence and escalation of financial technology consumption themes such as trust, security, perceived risk, and sustainability within the banking industry, themes scarcely covered in existing theoretic literature. To that end, the objective of this research is to investigate factors that determine fintech adoption and propose an integrated adoption model. This study aims to establish what the significant drivers of adoption are and develop a conceptual model that integrates technological, behavioral, and environmental constructs by extending the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2). It proposes integrating constructs that influence financial consumption themes such as trust, perceived risk, security, financial incentives, micro-investing opportunities, and environmental consciousness to determine the impact of these factors on the adoption and intention to use digital banking apps. The main advantage of this conceptual model is the consolidation of a greater number of predictor variables that can provide a fuller explanation of the consumer's adoption of digital banking Apps. Moderating variables of age, gender, and income are incorporated. To the best of author’s knowledge, this study is the first that extends the UTAUT2 model with this combination of constructs to investigate user’s intention to adopt internet-only digital banking apps in the UK context. By investigating factors that are not included in the existing theories but are highly pertinent to the adoption of internet-only banking services, this research adds to existing knowledge and extends the generalisability of the UTAUT2 in a financial services adoption context. This is something that fills a gap in knowledge, as highlighted to needing further research on UTAUT2 after reviewing the theory in 2016 from its original version of 2003. To achieve the objectives of this study, this research assumes a quantitative research approach to empirically test the hypotheses derived from existing literature and pilot studies to give statistical support to generalise the research findings for further possible applications in theory and practice. This research is explanatory or casual in nature and uses cross-section primary data collected through a survey method. Convenient and purposive sampling using structured self-administered online questionnaires is used for data collection. The proposed model is tested using Structural Equation Modelling (SEM), and the analysis of primary data collected through an online survey is processed using Smart PLS software with a sample size of 386 digital bank users. The results are expected to establish if there are significant relationships between the dependent and independent variables and establish what the most influencing factors are.

Keywords: banking applications, digital banking, financial technology, technology adoption, UTAUT2

Procedia PDF Downloads 48
1305 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 267
1304 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 205
1303 Classifying and Analysis 8-Bit to 8-Bit S-Boxes Characteristic Using S-Box Evaluation Characteristic

Authors: Muhammad Luqman, Yusuf Kurniawan

Abstract:

S-Boxes is one of the linear parts of the cryptographic algorithm. The existence of S-Box in the cryptographic algorithm is needed to maintain non-linearity of the algorithm. Nowadays, modern cryptographic algorithms use an S-Box as a part of algorithm process. Despite the fact that several cryptographic algorithms today reuse theoretically secure and carefully constructed S-Boxes, there is an evaluation characteristic that can measure security properties of S-Boxes and hence the corresponding primitives. Analysis of an S-Box usually is done using manual mathematics calculation. Several S-Boxes are presented as a Truth Table without any mathematical background algorithm. Then, it’s rather difficult to determine the strength of Truth Table S-Box without a mathematical algorithm. A comprehensive analysis should be applied to the Truth Table S-Box to determine the characteristic. Several important characteristics should be owned by the S-Boxes, they are Nonlinearity, Balancedness, Algebraic degree, LAT, DAT, differential delta uniformity, correlation immunity and global avalanche criterion. Then, a comprehensive tool will be present to automatically calculate the characteristics of S-Boxes and determine the strength of S-Box. Comprehensive analysis is done on a deterministic process to produce a sequence of S-Boxes characteristic and give advice for a better S-Box construction.

Keywords: cryptographic properties, Truth Table S-Boxes, S-Boxes characteristic, deterministic process

Procedia PDF Downloads 347
1302 Livelihood Security and Mitigating Climate Changes in the Barind Tract of Bangladesh through Agroforestry Systems

Authors: Md Shafiqul Bari, Md Shafiqul Islam Sikdar

Abstract:

This paper summarizes the current knowledge on Agroforestry practices in the Barind tract of Bangladesh. The part of greater Rajshahi, Dinajpur, Rangpur and Bogra district of Bangladesh is geographically identified as the Barind tract. The hard red soil of these areas is very significant in comparison to that of the other parts of the country. A typical dry climate with comparatively high temperature prevails in the Barind area. Scanty rainfall and excessive extraction of groundwater have created an alarming situation among the Barind people and others about irrigation to the rice field. In addition, the situation may cause an adverse impact on the people whose livelihood largely depends on agriculture. The groundwater table has been declined by at least 10 to 15 meters in some areas of the Barind tract during the last 20 years. Due to absent of forestland in the Barind tract, the soil organic carbon content can decrease more rapidly because of the higher rate of decomposition. The Barind soils are largely carbon depleted but can be brought back to carbon-carrying capacity by bringing under suitable Agroforestry systems. Agroforestry has tremendous potential for carbon sequestration not only in above C biomass but also root C biomass in deeper soil depths. Agroforestry systems habitually conserve soil organic carbon and maintain a great natural nutrient pool. Cultivation of trees with arable crops under Agroforestry systems help in improving soil organic carbon content and sequestration carbon, particularly in the highly degraded Barind lands. Agroforestry systems are a way of securing the growth of cash crops that may constitute an alternative source of income in moments of crisis. Besides being a source of fuel wood, a greater presence of trees in cropping system contributes to decreasing temperatures and to increasing rainfall, thus contrasting the negative environmental impact of climate changes. In order to fulfill the objectives of this study, two experiments were conducted. The first experiment was survey on the impact of existing agroforestry system on the livelihood security in the Barind tract of Bangladesh and the second one was the role of agroforestry system on the improvement of soil properties in a multilayered coconut orchard. Agroforestry systems have been generated a lot of employment opportunities in the Barind area. More crops mean involvement of more people in various activities like involvements in dairying, sericulture, apiculture and additional associated agro-based interventions. Successful adoption of Agroforestry practices in the Barind area has shown that the Agroforestry practitioners of this area were very sound positioned economically, and had added social status too. However, from the findings of the present study, it may be concluded that the majority rural farmers of the Barind tract of Bangladesh had a very good knowledge and medium extension contact related to agroforestry production system. It was also observed that 85 per cent farmers followed agroforestry production system and received benefits to a higher extent. Again, from the research study on orchard based mutistoried agroforestry cropping system, it was evident that there was an important effect of agroforestry cropping systems on the improvement of soil chemical properties. As a result, the agroforestry systems may be helpful to attain the development objectives and preserve the biosphere core.

Keywords: agroforestry systems, Barind tract, carbon sequestration, climate changes

Procedia PDF Downloads 187
1301 Optimal Protection Coordination in Distribution Systems with Distributed Generations

Authors: Abdorreza Rabiee, Shahla Mohammad Hoseini Mirzaei

Abstract:

The advantages of distributed generations (DGs) based on renewable energy sources (RESs) leads to high penetration level of DGs in distribution network. With incorporation of DGs in distribution systems, the system reliability and security, as well as voltage profile, is improved. However, the protection of such systems is still challenging. In this paper, at first, the related papers are reviewed and then a practical scheme is proposed for coordination of OCRs in distribution system with DGs. The coordination problem is formulated as a nonlinear programming (NLP) optimization problem with the object function of minimizing total operating time of OCRs. The proposed method is studied based on a simple test system. The optimization problem is solved by General Algebraic Modeling System (GAMS) to calculate the optimal time dial setting (TDS) and also pickup current setting of OCRs. The results show the effectiveness of the proposed method and its applicability.

Keywords: distributed generation, DG, distribution network, over current relay, OCR, protection coordination, pickup current, time dial setting, TDS

Procedia PDF Downloads 120
1300 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 135
1299 Development and Validation Method for Quantitative Determination of Rifampicin in Human Plasma and Its Application in Bioequivalence Test

Authors: Endang Lukitaningsih, Fathul Jannah, Arief R. Hakim, Ratna D. Puspita, Zullies Ikawati

Abstract:

Rifampicin is a semisynthetic antibiotic derivative of rifamycin B produced by Streptomyces mediterranei. RIF has been used worldwide as first line drug-prescribed throughout tuberculosis therapy. This study aims to develop and to validate an HPLC method couple with a UV detection for determination of rifampicin in spiked human plasma and its application for bioequivalence study. The chromatographic separation was achieved on an RP-C18 column (LachromHitachi, 250 x 4.6 mm., 5μm), utilizing a mobile phase of phosphate buffer/acetonitrile (55:45, v/v, pH 6.8 ± 0.1) at a flow of 1.5 mL/min. Detection was carried out at 337 nm by using spectrophotometer. The developed method was statistically validated for the linearity, accuracy, limit of detection, limit of quantitation, precise and specifity. The specifity of the method was ascertained by comparing chromatograms of blank plasma and plasma containing rifampicin; the matrix and rifampicin were well separated. The limit of detection and limit of quantification were 0.7 µg/mL and 2.3 µg/mL, respectively. The regression curve of standard was linear (r > 0.999) over a range concentration of 20.0 – 100.0 µg/mL. The mean recovery of the method was 96.68 ± 8.06 %. Both intraday and interday precision data showed reproducibility (R.S.D. 2.98% and 1.13 %, respectively). Therefore, the method can be used for routine analysis of rifampicin in human plasma and in bioequivalence study. The validated method was successfully applied in pharmacokinetic and bioequivalence study of rifampicin tablet in a limited number of subjects (under an Ethical Clearance No. KE/FK/6201/EC/2015). The mean values of Cmax, Tmax, AUC(0-24) and AUC(o-∞) for the test formulation of rifampicin were 5.81 ± 0.88 µg/mL, 1.25 hour, 29.16 ± 4.05 µg/mL. h. and 29.41 ± 4.07 µg/mL. h., respectively. Meanwhile for the reference formulation, the values were 5.04 ± 0.54 µg/mL, 1.31 hour, 27.20 ± 3.98 µg/mL.h. and 27.49 ± 4.01 µg/mL.h. From bioequivalence study, the 90% CIs for the test formulation/reference formulation ratio for the logarithmic transformations of Cmax and AUC(0-24) were 97.96-129.48% and 99.13-120.02%, respectively. According to the bioequivamence test guidelines of the European Commission-European Medicines Agency, it can be concluded that the test formulation of rifampicin is bioequivalence with the reference formulation.

Keywords: validation, HPLC, plasma, bioequivalence

Procedia PDF Downloads 277
1298 Solid Waste Management Challenges and Possible Solution in Kabul City

Authors: Ghulam Haider Haidaree, Nsenda Lukumwena

Abstract:

Most developing nations face energy production and supply problems. This is also the case of Afghanistan whose generating capacity does not meet its energy demand. This is due in part to high security and risk caused by war which deters foreign investments and insufficient internal revenue. To address the issue above, this paper would like to suggest an alternative and affordable way to deal with the energy problem. That is by converting Solid Waste to energy. As a result, this approach tackles the municipal solid waste issue (potential cause of several diseases), contributes to the improvement of the quality of life, local economy, and so on. While addressing the solid waste problem in general, this paper samples specifically one municipality which is District-12, one of the 22 districts of Kabul city. Using geographic information system (GIS) technology, District-12 is divided into nine different zones whose municipal solid waste is respectively collected, processed, and converted into electricity and distributed to the closest area. It is important to mention that GIS has been used to estimate the amount of electricity to be distributed and to optimally position the production plant.

Keywords: energy problem, estimation of electricity, GIS zones, solid waste management system

Procedia PDF Downloads 318
1297 Information System Development for Online Journal System Using Online Journal System for Journal Management of Suan Sunandha Rajabhat University

Authors: Anuphan Suttimarn, Natcha Wattanaprapa, Suwaree Yordchim

Abstract:

The aim of this study is to develop the online journal system using a web application to manage the journal service of Suan Sunandha Rajabhat University in order to improve the journal management of the university. The main structures of the system process consist of 1. journal content management system 2. membership system of the journal and 3. online submission or review process. The investigators developed the system based on a web application using open source OJS software and phpMyAdmin to manage a research database. The system test showed that this online system 'Online Journal System (OJS)' could shorten the time in the period of submission article to journal and helped in managing a journal procedure efficiently and accurately. The quality evaluation of Suan Sunandha Rajabhat online journal system (SSRUOJS) undertaken by experts and researchers in 5 aspects; design, usability, security, reducing time, and accuracy showed the highest average value (X=4.30) on the aspect of reducing time. Meanwhile, the system efficiency evaluation was on an excellent level (X=4.13).

Keywords: online journal system, Journal management, Information system development, OJS

Procedia PDF Downloads 160
1296 Developing an Edutainment Game for Children with ADHD Based on SAwD and VCIA Model

Authors: Bruno Gontijo Batista

Abstract:

This paper analyzes how the Socially Aware Design (SAwD) and the Value-oriented and Culturally Informed Approach (VCIA) design model can be used to develop an edutainment game for children with Attention Deficit Hyperactivity Disorder (ADHD). The SAwD approach seeks a design that considers new dimensions in human-computer interaction, such as culture, aesthetics, emotional and social aspects of the user's everyday experience. From this perspective, the game development was VCIA model-based, including the users in the design process through participatory methodologies, considering their behavioral patterns, culture, and values. This is because values, beliefs, and behavioral patterns influence how technology is understood and used and the way it impacts people's lives. This model can be applied at different stages of design, which goes from explaining the problem and organizing the requirements to the evaluation of the prototype and the final solution. Thus, this paper aims to understand how this model can be used in the development of an edutainment game for children with ADHD. In the area of education and learning, children with ADHD have difficulties both in behavior and in school performance, as they are easily distracted, which is reflected both in classes and on tests. Therefore, they must perform tasks that are exciting or interesting for them, once the pleasure center in the brain is activated, it reinforces the center of attention, leaving the child more relaxed and focused. In this context, serious games have been used as part of the treatment of ADHD in children aiming to improve focus and attention, stimulate concentration, as well as be a tool for improving learning in areas such as math and reading, combining education and entertainment (edutainment). Thereby, as a result of the research, it was developed, in a participatory way, applying the VCIA model, an edutainment game prototype, for a mobile platform, for children between 8 and 12 years old.

Keywords: ADHD, edutainment, SAwD, VCIA

Procedia PDF Downloads 166
1295 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields

Authors: Okoro Ikechukwu Ralph, Fuat Kara

Abstract:

The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.

Keywords: offshore reliability, production performance, subsea control module, well integrity

Procedia PDF Downloads 491