Search results for: Teh Chee Send
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 239

Search results for: Teh Chee Send

149 Relieving Flood Damages In Malaysia through Tax Policies And Measures: A Comparative Analysis

Authors: Chee Fei Chang, May Yee Ng

Abstract:

As a result of its geographical location, flood is a natural disaster that happens regularly in Malaysia. Every year, heavy rainfall is brought by the cyclical monsoon to the East coast of Peninsular Malaysia. In recent years, the occurrence of unexpected heavy downpour somehow connected to climate-change phenomena is also on the increasing trend. Ironically, despite that Malaysians have suffered significant monetary losses as a result of the recurring floods in past many decades, little has been done by the government from the perspective of taxation. Perhaps due to political reason or as a populist measure, the federal and local government are more inclined to offer small cash handout then rolling out long-term tax policy or measure in relieving the financial and tax burden of the victims and affected business entities. Except for the one-off tax break granted to affected businesses in 2007, the authors have not found any income tax exemption or deduction order gazetted with regard to flood disaster. Hence, it is imperative for this study to explore the need and challenges of implementing flood inflicted disaster tax relief or credit in Malaysia. This research consists of two major parts. First, the assessment of relevant tax policies/ measures with regard to non-government organisations and other affected parties. Content and thematic analyses will be applied on current tax legislations and orders issued for this part. Second, a comparative analysis will be conducted benchmarking various disaster tax reliefs and credits implemented in developed countries. Resulting from the increasing climate change-related disasters in Malaysia, the findings of this study will shed light on the importance of introducing disaster tax relief measures to assist individual victims as well as the affected businesses.

Keywords: climate-changed related disaster, disaster tax credits, tax relief for victims, tax measures for disaster recovery

Procedia PDF Downloads 94
148 Bank ATM Monitoring System Using IR Sensor

Authors: P. Saravanakumar, N. Raja, M. Rameshkumar, D. Mohankumar, R. Sateeshkumar, B. Maheshwari

Abstract:

This research work is designed using Microsoft VB. Net as front end and MySQL as back end. The project deals with secure the user transaction in the ATM system. This application contains the option for sending the failed transaction details to the particular customer by using the SMS. When the customer withdraws the amount from the Bank ATM system, sometimes the amount will not be dispatched but the amount will be debited to the particular account. This application is used to avoid this type of problems in the ATM system. In this proposed system using IR technique to detect the dispatched amount. IR Transmitter and IR Receiver are placed in the path of cash dispatch. It is connected each other through the IR signal. When the customers withdraw the amount in the ATM system then the amount will be dispatched or not is monitored by IR Receiver. If the amount will be dispatched then the signal will be interrupted between the IR Receiver and the IR Transmitter. At that time, the monitoring system will be reduced their particular withdraw amount on their account. If the cash will not be dispatched, the signal will not be interrupted, at that time the particular withdraw amount will not be reduced their account. If the transaction completed successfully, the transaction details such as withdraw amount and current balance can be sent to the customer via the SMS. If the transaction fails, the transaction failed message can be send to the customer.

Keywords: ATM system, monitoring system, IR Transmitter, IR Receiver

Procedia PDF Downloads 269
147 A Novel Technological Approach to Maintaining the Cold Chain during Transportation

Authors: Philip J. Purnell

Abstract:

Innovators propose to use the Internet of Things to solve the problem of maintaining the cold chain during the transport of biopharmaceutical products. Sending a data logger with refrigerated goods is only useful to inform the recipient of the goods that they have either breached the cold chain and are therefore potentially spoiled or that they have not breached it and are therefore assumed to be in good condition. Connecting the data logger to the Internet of Things means that the supply chain manager will be informed in real-time of the exact location and the precise temperature of the material at any point on earth. Readable using a simple online interface, the supply chain manager will watch the progress of their material on a Google map together with accurate and crucially real-time temperature readings. The data logger will also send alarms to the supply chain manager if a cold chain breach becomes imminent allowing them time to contact the transporter and restore the cold chain before the material is affected. This development is expected to save billions of dollars in wasted biologics that currently arrive either spoiled or in an unreliable condition.

Keywords: internet of things, cold chain, data logger, transportation

Procedia PDF Downloads 414
146 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 277
145 Multimodal Discourse Analysis of Egyptian Political Movies: A Case Study of 'People at the Top Ahl Al Kemma' Movie

Authors: Mariam Waheed Mekheimar

Abstract:

Nascent research is conducted to the advancement of discourse analysis to include different modes as images, sound, and text. The focus of this study will be to elucidate how images are embedded with texts in an audio-visual medium as cinema to send political messages; it also seeks to broaden our understanding of politics beyond a relatively narrow conceptualization of the 'political' through studying non-traditional discourses as the cinematic discourse. The aim herein is to develop a systematic approach to film analysis to capture political meanings in films. The method adopted in this research is Multimodal Discourse Analysis (MDA) focusing on embedding visuals with texts. As today's era is the era of images and that necessitates analyzing images. Drawing on the writings of O'Halloran, Kress and Van Leuween, John Bateman and Janina Wildfeuer, different modalities will be studied to understand how those modes interact in the cinematic discourse. 'People at the top movie' is selected as an example to unravel the political meanings throughout film tackling the cinematic representation of the notion of social justice.

Keywords: Egyptian cinema, multimodal discourse analysis, people at the top, social justice

Procedia PDF Downloads 386
144 Management of Coronary Heart Disease through Yoga

Authors: Subramaniam Iyer

Abstract:

The most common disease that is pertaining to all human beings is heart-related. The reasons for coronary artery disease are due to lifestyle and eating habits. Due to this, many people mentally become sick, feeling that soon they will die due to their heart problems. This results in stress and anxiety, which has become common amongst all the Indians. Medicines are the commonest curative remedy in India, but it is proposed through this article some remedies through yoga. This article does not guarantee a 100% result, but it is a preventive remedy for coronary artery disease. Yoga is giving a new lease of life to many, so to tackle chronic diseases, it provides remedies that will be lifelong. It is brought to many people by Patanjali. Yoga will provide support to patients having coronary artery disease through its various relevant postures (asanas), which can be done very easily. Yoga does not send a message that if you do it regularly, you will be relieved from a particular disease. If it is performed every day, it will add vital energy for a smooth life, even if you are suffering from any chronic disease. In this article, we will be providing 6 postures (asanas), which can be performed at any time in the day, but the early morning will always be preferred (empty stomach) to get a good result. Secondly, these postures must be implemented after due consultation with your physician. If your physician disapproves, don’t do these postures as it will be harmful to your body.

Keywords: coronary artery, yoga, disease, remedy, medicine

Procedia PDF Downloads 119
143 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 370
142 Transformation of Bangladesh Society: The Role of Religion

Authors: Abdul Wohab

Abstract:

Context: The role of religion in the transformation of Bangladesh society has been significant since 1975. There has been a rise in religious presence, particularly Islam, in both private and public spheres supported by the state apparatuses. In 2009, a 'secular' political party came into power for the second time since independence and initiated the modernization of religious education systems. This research focuses on the transformation observed among the educated middle class who now prefer their children to attend modern, English medium madrasas that offer both religion-based and secular education. Research Aim: This research aims to investigate two main questions: a) what motivates the educated middle class to send their children to madrasa education? b) To what extent can it be argued that Bangladeshi society is transforming from its secular nature to being more religious?Methodology: The research applies a combination of primary and secondary methods. Case studies serve as the primary method, allowing for an in-depth exploration of the motivations of the educated middle class. The secondary method involves analyzing published news articles, op-eds, and websites related to madrasa education, as well as studying the reading syllabus of Aliya and Qwami madrasas in Bangladesh. Findings: Preliminary findings indicate that the educated middle class chooses madrasa education for reasons such as remembering and praying for their departed relatives, keeping their children away from substance abuse, fostering moral and ethical values, and instilling respect for seniors and relatives. The research also reveals that religious education is believed to help children remain morally correct according to the Quran and Hadith. Additionally, the establishment of madrasas in Bangladesh is attributed to economic factors, with demand and supply mechanisms playing a significant role. Furthermore, the findings suggest that government-run primary education institutions in rural areas face more challenges in enrollment compared to religious educational institutions like madrasas. Theoretical Importance: This research contributes to the understanding of societal transformation and the role of religion in this process. By examining the case of Bangladesh, it provides insights into how religion influences education choices and societal values. Data Collection and Analysis Procedures: Data for this research is collected through case studies, including interviews and observations of educated middle-class families who send their children to madrasas. In addition, analysis is conducted on relevant published materials such as news articles, op-eds, and websites. The reading syllabus of Aliya and Qwami madrasas is also analyzed to gain a comprehensive understanding of the education system. Questions Addressed: The research addresses two questions: a) what motivates the educated middle class to choose madrasa education for their children? b) To what extent can it be argued that Bangladeshi society is transforming from its secular nature to being more religious?Conclusion: The preliminary findings of this research highlight the motivations of the educated middle class in opting for madrasa education, including the desire to maintain religious traditions, promote moral values, and provide a strong foundation for their children. It also suggests that Bangladeshi society is experiencing a transformation towards a more religious orientation. This research contributes to the understanding of societal changes and the role of religion within Bangladesh, shedding light on the complex dynamics between religion and education.

Keywords: madrasa education, transformation, Bangladesh, religion and society, education

Procedia PDF Downloads 34
141 Mentoring in Translation: A Tool for Future Translators

Authors: Ana Sofia Saldanha

Abstract:

The globalization is changing the translation world day after day, year after year. The need to know more about new technologies, clients, companies and social networks is becoming more and more demanding and competitive. The recently graduated translators usually do not know where to go, what to do or even who to contact to start their careers in translation. It is well known that there are innumerous webinars, books, blogs, webpages and even Facebook pages indicating what to do, what not to do, rates, how your CV should look like, etc. but are these pieces of advice of real translators? Translators, who work daily with clients, who understand their demands, requests, questions? As far as today`s trends, the answer is NO. Most of these pieces of advice are just theoretical and far away from the real translation world. Therefore, mentoring is becoming a very important tool to help and guide new translators starting their career. An effective and well-oriented mentoring is a powerful way to orient these translators on how to create their CVs, where to send CVs, how to approach clients, how to answer emails and how to negotiate rates in an efficient way. Mentoring is crucial when properly delivered by professional and experienced translators, to help developing careers. The advice and orientation sessions are almost a 'weapon' to destroy the barriers created by opinions, by influences or even by universities. This new trend is the future path of new translators and is the future of the translation industry and professionals, however minds and spirits need to be opened and engaged in this new way of developing skills.

Keywords: mentoring, translation, translators, orientation, professional path

Procedia PDF Downloads 144
140 Predictive Modelling Approach to Identify Spare Parts Inventory Obsolescence

Authors: Madhu Babu Cherukuri, Tamoghna Ghosh

Abstract:

Factory supply chain management spends billions of dollars every year to procure and manage equipment spare parts. Due to technology -and processes changes some of these spares become obsolete/dead inventory. Factories have huge dead inventory worth millions of dollars accumulating over time. This is due to lack of a scientific methodology to identify them and send the inventory back to the suppliers on a timely basis. The standard approach followed across industries to deal with this is: if a part is not used for a set pre-defined period of time it is declared dead. This leads to accumulation of dead parts over time and these parts cannot be sold back to the suppliers as it is too late as per contract agreement. Our main idea is the time period for identifying a part as dead cannot be a fixed pre-defined duration across all parts. Rather, it should depend on various properties of the part like historical consumption pattern, type of part, how many machines it is being used in, whether it- is a preventive maintenance part etc. We have designed a predictive algorithm which predicts part obsolescence well in advance with reasonable accuracy and which can help save millions.

Keywords: obsolete inventory, machine learning, big data, supply chain analytics, dead inventory

Procedia PDF Downloads 289
139 Assessing an Instrument Usability: Response Interpolation and Scale Sensitivity

Authors: Betsy Ng, Seng Chee Tan, Choon Lang Quek, Peter Looker, Jaime Koh

Abstract:

The purpose of the present study was to determine the particular scale rating that stands out for an instrument. The instrument was designed to assess student perceptions of various learning environments, namely face-to-face, online and blended. The original instrument had a 5-point Likert items (1 = strongly disagree and 5 = strongly agree). Alternate versions were modified with a 6-point Likert scale and a bar scale rating. Participants consisted of undergraduates in a local university were involved in the usability testing of the instrument in an electronic setting. They were presented with the 5-point, 6-point and percentage-bar (100-point) scale ratings, in response to their perceptions of learning environments. The 5-point and 6-point Likert scales were presented in the form of radio button controls for each number, while the percentage-bar scale was presented with a sliding selection. Among these responses, 6-point Likert scale emerged to be the best overall. When participants were confronted with the 5-point items, they either chose 3 or 4, suggesting that data loss could occur due to the insensitivity of instrument. The insensitivity of instrument could be due to the discreet options, as evidenced by response interpolation. To avoid the constraint of discreet options, the percentage-bar scale rating was tested, but the participant responses were not well-interpolated. The bar scale might have provided a variety of responses without a constraint of a set of categorical options, but it seemed to reflect a lack of perceived and objective accuracy. The 6-point Likert scale was more likely to reflect a respondent’s perceived and objective accuracy as well as higher sensitivity. This finding supported the conclusion that 6-point Likert items provided a more accurate measure of the participant’s evaluation. The 5-point and bar scale ratings might not be accurately measuring the participants’ responses. This study highlighted the importance of the respondent’s perception of accuracy, respondent’s true evaluation, and the scale’s ease of use. Implications and limitations of this study were also discussed.

Keywords: usability, interpolation, sensitivity, Likert scales, accuracy

Procedia PDF Downloads 384
138 Transmission of ASCII Code Messages Using a High Power (50mW) Underwater Laser Communication Prototype in Two Controlled Scenarios

Authors: Lessly Borja, Anthony Gualli, Kelly Baño, Fabricio Santacruz

Abstract:

In this article, a prototype of underwater communication using a long-range laser (50mW) has been carried out in two aquatic scenarios (fish tank and swimming pool) with the aim of recreating Aqua-Fi technology (the future of underwater communications) using a Bluetooth connection to the transmitter to send data in ASCII code by means of light. Initially, the transmitter and receiver circuits were programmed in Arduino so that the data would travel by light pulses in the aforementioned code. To obtain the results of the underwater communication, two scenarios were chosen (fish tank and swimming pool), where the power value of the received signal was calculated from its peak-to-peak voltage using the Oscilloscope equipment (ESPOCH). Finally, it was concluded that the maximum communication range of this prototype is 12m underwater, and it was observed that the power decreases as the distance increases. However, this prototype still needs to improve communication so that the information is not distorted or lost when there is movement and dispersion of the water. It is hoped that it will form the basis for future research.

Keywords: prototype, underwater, communication, power, voltage, distance

Procedia PDF Downloads 52
137 Wireless Capsule Endoscope - Antenna and Channel Characterization

Authors: Mona Elhelbawy, Mac Gray

Abstract:

Traditional wired endoscopy is an intrusive process that requires a long flexible tube to be inserted through the patient’s mouth while intravenously sedated. Only images of the upper 4 feet of stomach, colon, and rectum can be captured, leaving the remaining 20 feet of small intestines. Wireless capsule endoscopy offers a painless, non-intrusive, efficient and effective alternative to traditional endoscopy. In wireless capsule endoscopy (WCE), ingestible vitamin-pill-shaped capsules with imaging capabilities, sensors, batteries, and antennas are designed to send images of the gastrointestinal (GI) tract in real time. In this paper, we investigate the radiation performance and specific absorption rate (SAR) of a miniature conformal capsule antenna operating at the Medical Implant Communication Service (MICS) frequency band in the human body. We perform numerical simulations using the finite element method based commercial software, high-frequency structure simulator (HFSS) and the ANSYS human body model (HBM). We also investigate the in-body channel characteristics between the implantable capsule and an external antenna placed on the surface of the human body.

Keywords: IEEE 802.15.6, MICS, SAR, WCE

Procedia PDF Downloads 102
136 Intelligent Wireless Patient Monitoring and Tracking System

Authors: Ch. Sandeep Kumar Subudhi, S. Sivanandam

Abstract:

Our system is to monitor the human body temperature, blood pressure (BP), Pulse Rate and ECG and tracking the patient location. In our system the body temperature is detected by using LM35 temperature sensor, blood pressure is detected by the BP sensor, pulse rate is detected by the ear plug pulse sensor and the ECG is detected by the three lead ECG sensor in the working environment of the patient. The sensed information is sent to the PIC16F877 microcontroller through signal conditioning circuit. A desired amount of sensor value is set and if it is exceeded preliminary steps should be taken by indication by buzzer. The sensor information will be transmitted from the patient unit to the main controller unit with the help of Zigbee communication medium which is connected with the microcontrollers in the both units. The main controller unit will send those sensor data as well as the location of that patient by the help of GPS module to the observer/doctor. The observer/doctor can receive the SMS sent by GSM module and further decision can be taken. The message is sent to a cell phone using global system mobile (GSM) Modem. MAX232 acts as a driver between microcontroller and modem.

Keywords: LM35, heart beat sensor, ECG Sensor, BP Sensor, Zigbee module, GSM module, GPS module, PIC16F877A microcontroller

Procedia PDF Downloads 356
135 A Study on Using Network Coding for Packet Transmissions in Wireless Sensor Networks

Authors: Rei-Heng Cheng, Wen-Pinn Fang

Abstract:

A wireless sensor network (WSN) is composed by a large number of sensors and one or a few base stations, where the sensor is responsible for detecting specific event information, which is sent back to the base station(s). However, how to save electricity consumption to extend the network lifetime is a problem that cannot be ignored in the wireless sensor networks. Since the sensor network is used to monitor a region or specific events, how the information can be reliably sent back to the base station is surly important. Network coding technique is often used to enhance the reliability of the network transmission. When a node needs to send out M data packets, it encodes these data with redundant data and sends out totally M + R packets. If the receiver can get any M packets out from these M + R packets, it can decode and get the original M data packets. To transmit redundant packets will certainly result in the excess energy consumption. This paper will explore relationship between the quality of wireless transmission and the number of redundant packets. Hopefully, each sensor can overhear the nearby transmissions, learn the wireless transmission quality around it, and dynamically determine the number of redundant packets used in network coding.

Keywords: energy consumption, network coding, transmission reliability, wireless sensor networks

Procedia PDF Downloads 362
134 The Current Use of Cell Phone in Education

Authors: Elham A. Alsadoon, Hamadah B. Alsadoon

Abstract:

Educators try to design learning environments that are preferred by their students. With the wide-spread adoption of cell phones surpassing any other technology, educators should not fail to invest in the power of such technology. This study aimed to explore the current use of cell phones in education among Saudi students in Saudi universities and how students perceive such use. Data was collected from 237 students at King Saud University. Descriptive analysis was used to analyze the data. A T-test for independent groups was used to examine whether there was a significant difference between males and females in their perception of using cell phones in education. Findings suggested that students have a positive attitude toward the use of cell phones in education. The most accepted use was for sending notification to students, which has already been experienced through the Twasel system provided by King Saud University. This electronic system allows instructors to easily send any SMS or email to their students. The use of cell phone applications came in the second rank of using cell phones in education. Students have already experienced the benefits of having these applications handy wherever they go. On the other hand, they did not perceive using cell phones for assessment as practical educational usage. No gender difference was detected in terms of students’ perceptions toward using cell phones in education.

Keywords: cell phone, mobile learning, educational sciences, education

Procedia PDF Downloads 386
133 Radio Frequency Identification System and Its Effect on Retailing Sector

Authors: Ayşe Çoban, Orhan Çoban, Murat Birekul

Abstract:

In this study, the effects of radio frequency identification system on the retailing sector were theoretically analysed. The technology of Radio Frequency Identification (RFID) is a method enabling to identify the objects individually and automatically, using radio frequency. RFID generally consists of a tag and reader. RFID tags can be programmed to receive, store, and send the information of object such as Electronic Product Code (EPC). Having read the tags placed on product by the reader, the information associated with the management of supply chain can be automatically recorded and replaced. Recently, RFID technology used in many areas has particularly important effects on the businesses that are active in the retailing sector. The most important disadvantage of this technology is that the cost of installation and operation is higher compared to its alternatives. However, it provides important advantages to the business enterprises in the application process. At present, it is especially adopted by the large sized enterprises and with chain stores in the international areas. The application results point out that RFID technology provides business enterprises with the important competitive advantage.

Keywords: RFID, retailing sector, RFID technologies, electronic product code

Procedia PDF Downloads 360
132 Creation and Implementation of A New Palliative Care Drug Chart, via A Closed-Loop Audit

Authors: Asfa Hussain, Chee Tang, Mien Nguyen

Abstract:

Introduction: The safe usage of medications is dependent on clear, well-documented prescribing. Medical drug charts should be regularly checked to ensure that they are fit for purpose. Aims: The purpose of this study was to evaluate whether the Isabel Hospice drug charts were effective or prone to medical errors. The aim was to create a comprehensive palliative care drug chart in line with medico-legal guidelines and to minimise drug administration and prescription errors. Methodology: 50 medical drug charts were audited from March to April 2020, to assess whether they complied with medico-legal guidelines, in a hospice within East of England. Meetings were held with the larger multi-disciplinary team (MDT), including the pharmacists, nursing staff and doctors, to raise awareness of the issue. A preliminary drug chart was created, using the input from the wider MDT. The chart was revised and trialled over 15 times, and each time feedback from the MDT was incorporated into the subsequent template. In the midst of the COVID-19 pandemic in September 2020, the finalised drug chart was trialled. 50 new palliative drug charts were re-audited, to evaluate the changes made. Results: Prescribing and administration errors were high prior to the implementation of the new chart. This improved significantly after introducing the new drug charts, therefore improving patient safety and care. The percentage of inadequately documented allergies went down from 66% to 20% and incorrect oxygen prescription from 40% to 16%. The prescription drug-drug interactions decreased by 30%. Conclusion: It is vital to have clear standardised drug charts, in line with medico-legal standards, to allow ease of prescription and administration of medications and ensure optimum patient-centred care. This closed loop audit demonstrated significant improvement in documentation and prevention of possible fatal drug errors and interactions.

Keywords: palliative care, drug chart, medication errors, drug-drug interactions, COVID-19, patient safety

Procedia PDF Downloads 142
131 Measurement of Susceptibility Users Using Email Phishing Attack

Authors: Cindy Sahera, Sarwono Sutikno

Abstract:

Rapid technological developments also have negative impacts, namely the increasing criminal cases based on technology or cybercrime. One technique that can be used to conduct cybercrime attacks are phishing email. The issue is whether the user is aware that email can be misused by others so that it can harm the user's own? This research was conducted to measure the susceptibility of selected targets against email abuse. The objectives of this research are measurement of targets’ susceptibility and find vulnerability in email recipient. There are three steps being taken in this research, (1) the information gathering phase, (2) the design phase, and (3) the execution phase. The first step includes the collection of the information necessary to carry out an attack on a target. The next step is to make the design of an attack against a target. The last step is to send phishing emails to the target. The levels of susceptibility are three: level 1, level 2 and level 3. Level 1 indicates a low level of targets’ susceptibility, level 2 indicates the intermediate level of targets’ susceptibility, and level 3 indicates a high level of targets’ susceptibility. The results showed that users who are on level 1 and level 2 more that level 3, which means the user is not too careless. However, it does not mean the user to be safe. There are still vulnerabilities that may occur, such as automatic location detection when opening emails and automatic downloaded malware as user clicks a link in the email.

Keywords: cybercrime, email phishing, susceptibility, vulnerability

Procedia PDF Downloads 253
130 The Effect of Primary Treatment on Histopathological Patterns and Choice of Neck Dissection in Regional Failure of Nasopharyngeal Carcinoma Patients

Authors: Ralene Sim, Stefan Mueller, N. Gopalakrishna Iyer, Ngian Chye Tan, Khee Chee Soo, R. Shetty Mahalakshmi, Hiang Khoon Tan

Abstract:

Background: Regional failure in nasopharyngeal carcinoma (NPC) is managed by salvage treatment in the form of neck dissection. Radical neck dissection (RND) is preferred over modified radical neck dissection (MRND) since it is traditionally believed to offer better long-term disease control. However, with the advent of more advanced imaging modalities like high-resolution Magnetic Resonance Imaging, Computed Tomography, and Positron Emission Tomography-CT scans, earlier detection is achieved. Additionally, concurrent chemotherapy also contributes to reduced tumour burden. Hence, there may be a lesser need for an RND and a greater role for MRND. With this retrospective study, the primary aim is to ascertain whether MRND, as opposed to RND, has similar outcomes and hence, whether there would be more grounds to offer a less aggressive procedure to achieve lower patient morbidity. Methods: This is a retrospective study of 66 NPC patients treated at Singapore General Hospital between 1994 to 2016 for histologically proven regional recurrence, of which 41 patients underwent RND and 25 who underwent MRND, based on surgeon preference. The type of ND performed, primary treatment mode, adjuvant treatment, and pattern of recurrence were reviewed. Overall survival (OS) was calculated using Kaplan-Meier estimate and compared. Results: Overall, the disease parameters such as nodal involvement and extranodal extension were comparable between the two groups. Comparing MRND and RND, the median (IQR) OS is 1.76 (0.58 to 3.49) and 2.41 (0.78 to 4.11) respectively. However, the p-value found is 0.5301 and hence not statistically significant. Conclusion: RND is more aggressive and has been associated with greater morbidity. Hence, with similar outcomes, MRND could be an alternative salvage procedure for regional failure in selected NPC patients, allowing similar salvage rates with lesser mortality and morbidity.

Keywords: nasopharyngeal carcinoma, neck dissection, modified neck dissection, radical neck dissection

Procedia PDF Downloads 142
129 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria

Authors: Anyaogu Paul

Abstract:

The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.

Keywords: child labour, family income, national security, survey research

Procedia PDF Downloads 393
128 IoT Based Approach to Healthcare System for a Quadriplegic Patient Using EEG

Authors: R. Gautam, P. Sastha Kanagasabai, G. N. Rathna

Abstract:

The proposed healthcare system enables quadriplegic patients, people with severe motor disabilities to send commands to electronic devices and monitor their vitals. The growth of Brain-Computer-Interface (BCI) has led to rapid development in 'assistive systems' for the disabled called 'assistive domotics'. Brain-Computer-Interface is capable of reading the brainwaves of an individual and analyse it to obtain some meaningful data. This processed data can be used to assist people having speech disorders and sometimes people with limited locomotion to communicate. In this Project, Emotiv EPOC Headset is used to obtain the electroencephalogram (EEG). The obtained data is processed to communicate pre-defined commands over the internet to the desired mobile phone user. Other Vital Information like the heartbeat, blood pressure, ECG and body temperature are monitored and uploaded to the server. Data analytics enables physicians to scan databases for a specific illness. The Data is processed in Intel Edison, system on chip (SoC). Patient metrics are displayed via Intel IoT Analytics cloud service.

Keywords: brain computer interface, Intel Edison, Emotiv EPOC, IoT analytics, electroencephalogram

Procedia PDF Downloads 162
127 Intelligent Technology for Real-Time Monitor and Data Analysis of the Aquaculture Toxic Water Concentration

Authors: Chin-Yuan Hsieh, Wei-Chun Lu, Yu-Hong Zeng

Abstract:

The situation of a group of fish die is frequently found due to the fish disease caused by the deterioration of aquaculture water quality. The toxic ammonia is produced by animals as a byproduct of protein. The system is designed by the smart sensor technology and developed by the mathematical model to monitor the water parameters 24 hours a day and predict the relationship among twelve water quality parameters for monitoring the water quality in aquaculture. All data measured are stored in cloud server. In productive ponds, the daytime pH may be high enough to be lethal to the fish. The sudden change of the aquaculture conditions often results in the increase of PH value of water, lack of oxygen dissolving content, water quality deterioration and yield reduction. From the real measurement, the system can send the message to user’s smartphone successfully on the bad conditions of water quality. From the data comparisons between measurement and model simulation in fish aquaculture site, the difference of parameters is less than 2% and the correlation coefficient is at least 98.34%. The solubility rate of oxygen decreases exponentially with the elevation of water temperature. The correlation coefficient is 98.98%.

Keywords: aquaculture, sensor, ammonia, dissolved oxygen

Procedia PDF Downloads 248
126 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves

Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura

Abstract:

People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.

Keywords: elderly person, IoT device, Raspberry Pi, watch-over system

Procedia PDF Downloads 189
125 Simulating Economic Order Quantity and Reorder Point Policy for a Repairable Items Inventory System

Authors: Mojahid F. Saeed Osman

Abstract:

Repairable items inventory system is a management tool used to incorporate all information concerning inventory levels and movements for repaired and new items. This paper presents development of an effective simulation model for managing the inventory of repairable items for a production system where production lines send their faulty items to a repair shop considering the stochastic failure behavior and repair times. The developed model imitates the process of handling the on-hand inventory of repaired items and the replenishment of the inventory of new items using Economic Order Quantity and Reorder Point ordering policy in a flexible and risk-free environment. We demonstrate the appropriateness and effectiveness of the proposed simulation model using an illustrative case problem. The developed simulation model can be used as a reliable tool for estimating a healthy on-hand inventory of new and repaired items, backordered items, and downtime due to unavailability of repaired items, and validating and examining Economic Order Quantity and Reorder Point ordering policy, which would further be compared with other ordering strategies as future work.

Keywords: inventory system, repairable items, simulation, maintenance, economic order quantity, reorder point

Procedia PDF Downloads 110
124 “Chasing Hope”: Parents’ Perspectives on Complementary and Alternative Interventions for Autism Spectrum Disorder Children in Kazakhstan

Authors: Sofiya An, Akbota Kanderzhanova, Assel Akhmetova, Faye Foster, Chee K. Chan

Abstract:

Healthcare, education and social support for children with autism in Kazakhstan has been evolving and transforming over the last three decades. There is still limited knowledge of the use of complementary and alternative medicine by families caring for autistic children in this post-Soviet region. An exploratory qualitative focus group study of Kazakhstani families was carried out to capture and understand their experiences of using complementary and alternative (CAM) medicine. A total of six focus groups were conducted in five cities across the country including Nur-Sultan, Almaty, Kyzylorda, Karaganda and Taraz. The perceived factors driving the availability, choice, and use of complementary and alternative medicine by families of autistic children in the country were distilled and evaluated. The data collected was analyzed using a framework analysis and themes and subthemes were developed. Two major themes stood out. The first was the “unmet needs”, which relates to the predisposing factors that motivate parents to CAM uptake, and the second was the “chasing hope”, which relates to the enabling factors that facilitate parents’ uptake of CAM. Fear of missing out (FOMO) is a latent underlying motivation underscoring these two themes as well. Parents of autism spectrum disorder (ASD) children in Kazakhstan have to deal with many challenges when seeking treatment for their children with ASD. They are prepared and resort to try out whatever CAM interventions available. The motivation and rationale of choice of use is driven by the lack of options and the hope of any potential positive outcome rather than from rational decisions based on efficacy or the evidence-based data of CAM. Parents get desperate and are willing to try CAM regardless of and independent of their cultural and belief systems and they do not want to miss out just in case it might work. This study also gives an international and cross-cultural perspective on the motives, choice and practice of parents with ASD children using CAM in Kazakhstan, a Central Asian country.

Keywords: autism spectrum disorder, Central Asia, complementary and alternative medicine, cross-cultural perspective, qualitative research

Procedia PDF Downloads 118
123 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 385
122 Everolimus Loaded Polyvinyl Alcohol Microspheres for Sustained Drug Delivery in the Treatment of Subependymal Giant Cell Astrocytoma

Authors: Lynn Louis, Bor Shin Chee, Marion McAfee, Michael Nugent

Abstract:

This article aims to develop a sustained release formulation of microspheres containing the mTOR inhibitor Everolimus (EVR) using Polyvinyl alcohol (PVA) to enhance the bioavailability of the drug and to overcome poor solubility characteristics of Everolimus. This paper builds on recent work in the manufacture of microspheres using the sessile droplet technique by freezing the polymer-drug solution by suspending the droplets into pre-cooled ethanol vials immersed in liquid nitrogen. The spheres were subjected to 6 freezing cycles and 3 freezing cycles with thawing to obtain proper geometry, prevent aggregation, and achieve physical cross-linking. The prepared microspheres were characterised for surface morphology by SEM, where a 3-D porous structure was observed. The in vitro release studies showed a 62.17% release over 12.5 days, indicating a sustained release due to good encapsulation. This result is comparatively much more than the 49.06% release achieved within 4 hours from the solvent cast Everolimus film as a control with no freeze-thaw cycles performed. The solvent cast films were made in this work for comparison. A prolonged release of Everolimus using a polymer-based drug delivery system is essential to reach optimal therapeutic concentrations in treating SEGA tumours without systemic exposure. These results suggest that the combination of PVA and Everolimus via a rheological synergism enhanced the bioavailability of the hydrophobic drug Everolimus. Physical-chemical characterisation using DSC and FTIR analysis showed compatibility of the drug with the polymer, and the stability of the drug was maintained owing to the high molecular weight of the PVA. The obtained results indicate that the developed PVA/EVR microsphere is highly suitable as a potential drug delivery system with improved bioavailability in treating Subependymal Giant cell astrocytoma (SEGA).

Keywords: drug delivery system, everolimus, freeze-thaw cycles, polyvinyl alcohol

Procedia PDF Downloads 88
121 Design of Low Latency Multiport Network Router on Chip

Authors: P. G. Kaviya, B. Muthupandian, R. Ganesan

Abstract:

On-chip routers typically have buffers are used input or output ports for temporarily storing packets. The buffers are consuming some router area and power. The multiple queues in parallel as in VC router. While running a traffic trace, not all input ports have incoming packets needed to be transferred. Therefore large numbers of queues are empty and others are busy in the network. So the time consumption should be high for the high traffic. Therefore using a RoShaQ, minimize the buffer area and time The RoShaQ architecture was send the input packets are travel through the shared queues at low traffic. At high load traffic the input packets are bypasses the shared queues. So the power and area consumption was reduced. A parallel cross bar architecture is proposed in this project in order to reduce the power consumption. Also a new adaptive weighted routing algorithm for 8-port router architecture is proposed in order to decrease the delay of the network on chip router. The proposed system is simulated using Modelsim and synthesized using Xilinx Project Navigator.

Keywords: buffer, RoShaQ architecture, shared queue, VC router, weighted routing algorithm

Procedia PDF Downloads 521
120 Application of the Piloting Law Based on Adaptive Differentiators via Second Order Sliding Mode for a Fixed Wing Aircraft

Authors: Zaouche Mohammed, Amini Mohammed, Foughali Khaled, Hamissi Aicha, Aktouf Mohand Arezki, Boureghda Ilyes

Abstract:

In this paper, we present a piloting law based on the adaptive differentiators via high order sliding mode controller, by using an aircraft in virtual simulated environment. To deal with the design of an autopilot controller, we propose a framework based on Software in the Loop (SIL) methodology and we use MicrosoftTM Flight Simulator (FS-2004) as the environment for plane simulation. The aircraft dynamic model is nonlinear, Multi-Input Multi-Output (MIMO) and tightly coupled. The nonlinearity resides in the dynamic equations and also in the aerodynamic coefficients' variability. In our case, two (02) aircrafts are used in the flight tests, the Zlin-142 and MQ-1 Predator. For both aircrafts and in a very low altitude flight, we send the piloting control inputs to the aircraft which has stalled due to a command disconnection. Then, we present the aircraft’s dynamic behavior analysis while reestablishing the command transmission. Finally, a comparative study between the two aircraft’s dynamic behaviors is presented.

Keywords: adaptive differentiators, second order sliding modes, dynamic adaptation of the gains, microsoft flight simulator, Zlin-142, MQ-1 predator

Procedia PDF Downloads 396