Search results for: cloud storage security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5135

Search results for: cloud storage security

1235 Farmers Perception on the Level of Participation in Agricultural Project: The Case of a Community Garden Project in Imphendhle Municipality of Kwazulu-Natal Province, South Africa

Authors: Jorine T. Ndoro, Marietjie Van Der Merwe

Abstract:

Rural poverty remains a critical challenge in most developing countries and the participation of farmers in agricultural projects has taken a key role in development initiatives. Farmers’ participation in agricultural initiatives is crucial towards poverty alleviation and food security. Farmers’ involvement directly contributes towards sustainable agricultural development and livelihoods. This study focuses on investigating the perceptions of farmers’ participation in a community garden project. The study involved farmers belonging to community garden project in Imphendhle municipality in Mgungundlvu district of KwaZulu-Natal in South Africa. The study followed a qualitative research design using an interpretive research paradigm. The data was collected through conducting in-depth semi-structured interviews and a focus group was conducted with the eight farmers belonging to the community garden project. The findings show that the farmers are not involved in decision makings in the project. The farmers are passive participants. Participation of the farmers was mainly to carry out the activities from the extension officers. The study recommends that farmers be actively involved in projects and programmes introduced in their communities. Farmers’ active participation contributes to the sustainability of the projects through a sense of ownership.

Keywords: farmers, participation, agricultural extension, community garden

Procedia PDF Downloads 249
1234 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians

Authors: Sultan Aldaihani, Eiman Al-Fadhli

Abstract:

Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.

Keywords: academic libraries, internet of things, information resources, information services

Procedia PDF Downloads 142
1233 The Community Structure of Fish and its Correlation with Mangrove Forest Litter Production in Panjang Island, Banten Bay, Indonesia

Authors: Meilisha Putri Pertiwi, Mufti Petala Patria

Abstract:

Mangrove forest often categorized as a productive ecosystem in trophic water and the highest carbon storage among all the forest types. Mangrove-derived organic matter determines the food web of fish and invertebrates. In Indonesia trophic water ecosystem, 80% commersial fish caught in coastal area are high related to food web in mangrove forest ecosystem. Based on the previous research in Panjang Island, Bojonegara, Banten, Indonesia, removed mangrove litterfall to the sea water were 9,023 g/m³/s for two stations (west station–5,169 g/m³/s and north station-3,854 g/m³/s). The vegetation were dominated from Rhizophora apiculata and Rhizopora stylosa. C element is the highest content (27,303% and 30,373%) than N element (0,427% and 0,35%) and P element (0,19% and 0,143%). The aim of research also to know the diversity of fish inhabit in mangrove forest. Fish sampling is by push net. Fish caught are collected into plastics, total length measured, weigh measured, and individual and total counted. Meanwhile, the 3 modified pipes (1 m long, 5 inches diameter, and a closed one hole part facing the river by using a nylon cloth) set in the water channel connecting mangrove forest and sea water for each stasiun. They placed for 1 hour at low tide. Then calculate the speed of water flow and volume of modified pipes. The fish and mangrove litter will be weigh for wet weight, dry weight, and analyze the C, N, and P element content. The sampling data will be conduct 3 times of month in full moon. The salinity, temperature, turbidity, pH, DO, and the sediment of mangrove forest will be measure too. This research will give information about the fish diversity in mangrove forest, the removed mangrove litterfall to the sea water, the composition of sediment, the total element content (C, N, P) of fish and mangrove litter, and the correlation of element content absorption between fish and mangrove litter. The data will be use for the fish and mangrove ecosystem conservation.

Keywords: fish diversity, mangrove forest, mangrove litter, carbon element, nitrogen element, P element, conservation

Procedia PDF Downloads 483
1232 Exploring Tree Growth Variables Influencing Carbon Sequestration in the Face of Climate Change

Authors: Funmilayo Sarah Eguakun, Peter Oluremi Adesoye

Abstract:

One of the major problems being faced by human society is that the global temperature is believed to be rising due to human activity that releases carbon IV oxide (CO2) to the atmosphere. Carbon IV oxide is the most important greenhouse gas influencing global warming and possible climate change. With climate change becoming alarming, reducing CO2 in our atmosphere has become a primary goal of international efforts. Forest landsare major sink and could absorb large quantities of carbon if the trees are judiciously managed. The study aims at estimating the carbon sequestration capacity of Pinus caribaea (pine)and Tectona grandis (Teak) under the prevailing environmental conditions and exploring tree growth variables that influencesthe carbon sequestration capacity in Omo Forest Reserve, Ogun State, Nigeria. Improving forest management by manipulating growth characteristics that influences carbon sequestration could be an adaptive strategy of forestry to climate change. Random sampling was used to select Temporary Sample Plots (TSPs) in the study area from where complete enumeration of growth variables was carried out within the plots. The data collected were subjected to descriptive and correlational analyses. The results showed that average carbon stored by Pine and Teak are 994.4±188.3 Kg and 1350.7±180.6 Kg respectively. The difference in carbon stored in the species is significant enough to consider choice of species relevant in climate change adaptation strategy. Tree growth variables influence the capacity of the tree to sequester carbon. Height, diameter, volume, wood density and age are positively correlated to carbon sequestration. These tree growth variables could be manipulated by the forest manager as an adaptive strategy for climate change while plantations of high wood density speciescould be relevant for management strategy to increase carbon storage.

Keywords: adaptation, carbon sequestration, climate change, growth variables, wood density

Procedia PDF Downloads 373
1231 Biochemical Efficacy, Molecular Docking and Inhibitory Effect of 2,3-Dimethylmaleic Anhydride on Acetylcholinesterases

Authors: Kabrambam D. Singh, Dinabandhu Sahoo, Yallappa Rajashekar

Abstract:

Evolution has caused many insects to develop resistance to several synthetic insecticides. This problem along with the persisting concern regarding the health and environmental safety issues of the existing synthetic insecticides has urged the scientific fraternity to look for a new plant-based natural insecticide with inherent eco-friendly nature. Colocasia esculenta var. esculenta (L.) Schott (Araceae family) is widely grown throughout the South- East Asian Countries for its edible corms and leaves. Various physico-chemical and spectroscopic techniques (IR, 1H NMR, 13C NMR and Mass) were used for the isolation and characterization of isolated bioactive molecule named 2, 3-dimethylmaleic anhydride (3, 4-dimethyl-2, 5-furandione). This compound was found to be highly toxic, even at low concentration, against several storage grain pests when used as biofumigant. Experimental studies on the mode of action of 2, 3-dimethylmaleic anhydride revealed that the biofumigant act as inhibitor of acetylcholinesterase enzyme in cockroach and stored grain insects. The knockdown activity of bioactive compound is concurrent with in vivo inhibition of AChE; at KD99 dosage of bioactive molecule showed more than 90% inhibition of AChE activity in test insects. The molecule proved to affect the antioxidant enzyme system; superoxide dismutase (SOD), and catalase (CAT) and also found to decrease reduced glutathione (GSH) level in the treated insects. The above results indicate involvement of inhibition of AChE activity and oxidative imbalance as the potential mode of action of 2, 3-dimethylmaleic anhydride. In addition, the study reveals computational docking programs elaborate the possible interaction of 2, 3-dimethylmaleic anhydride with enzyme acetylcholinesterase (AChE) of Periplaneta americana. Finally, the results represent that toxicity of 2, 3-dimethylmaleic anhydride might be associated with inhibition of AChE activity and oxidative imbalance.

Keywords: 2, 3-dimethylmaleic anhydride, Colocasia esculenta var. esculenta (L.) Schott, Biofumigant, acetylcholinesterase, antioxidant enzyme, molecular docking

Procedia PDF Downloads 156
1230 Comparative Efficacy of Gas Phase Sanitizers for Inactivating Salmonella, Escherichia coli O157:H7 and Listeria monocytogenes on Intact Lettuce Heads

Authors: Kayla Murray, Andrew Green, Gopi Paliyath, Keith Warriner

Abstract:

Introduction: It is now acknowledged that control of human pathogens associated with fresh produce requires an integrated approach of several interventions as opposed to relying on post-harvest washes to remove field acquired contamination. To this end, current research is directed towards identifying such interventions that can be applied at different points in leafy green processing. Purpose: In the following the efficacy of different gas phase treatments to decontaminate whole lettuce heads during pre-processing storage were evaluated. Methods: Whole Cos lettuce heads were spot inoculated with L. monocytogenes, E. coli O157:H7 or Salmonella spp. The inoculated lettuce heads were then placed in a treatment chamber and exposed to ozone, chlorine dioxide or hydroxyl radicals at different time periods under a range of relative humidity. Survivors of the treatments were enumerated along with sensory analysis performed on the treated lettuce. Results: Ozone gas reduced L. monocytogenes by 2-log10 after ten-minutes of exposure with Salmonella and E. coli O157:H7 being decreased by 0.66 and 0.56-log cfu respectively. Chlorine dioxide gas treatment reduced L. monocytogenes and Salmonella on lettuce heads by 4 log cfu but only supported a 0.8 log cfu reduction in E. coli O157:H7 numbers. In comparison, hydroxyl radicals supported a 2.9 – 4.8 log cfu reduction of model human pathogens inoculated onto lettuce heads but required extended exposure times and relative humidity < 0.8. Significance: From the gas phase sanitizers tested, chlorine dioxide and hydroxyl radicals are the most effective. The latter process holds most promise based on the ease of delivery, worker safety and preservation of lettuce sensory characteristics. Although expose times for hydroxyl radicles was relatively long (24h) this should not be considered a limitation given the intervention is applied in store rooms or in transport containers during transit.

Keywords: gas phase sanitizers, iceberg lettuce heads, leafy green processing

Procedia PDF Downloads 405
1229 Development of a Computer Aided Diagnosis Tool for Brain Tumor Extraction and Classification

Authors: Fathi Kallel, Abdulelah Alabd Uljabbar, Abdulrahman Aldukhail, Abdulaziz Alomran

Abstract:

The brain is an important organ in our body since it is responsible about the majority actions such as vision, memory, etc. However, different diseases such as Alzheimer and tumors could affect the brain and conduct to a partial or full disorder. Regular diagnosis are necessary as a preventive measure and could help doctors to early detect a possible trouble and therefore taking the appropriate treatment, especially in the case of brain tumors. Different imaging modalities are proposed for diagnosis of brain tumor. The powerful and most used modality is the Magnetic Resonance Imaging (MRI). MRI images are analyzed by doctor in order to locate eventual tumor in the brain and describe the appropriate and needed treatment. Diverse image processing methods are also proposed for helping doctors in identifying and analyzing the tumor. In fact, a large Computer Aided Diagnostic (CAD) tools including developed image processing algorithms are proposed and exploited by doctors as a second opinion to analyze and identify the brain tumors. In this paper, we proposed a new advanced CAD for brain tumor identification, classification and feature extraction. Our proposed CAD includes three main parts. Firstly, we load the brain MRI. Secondly, a robust technique for brain tumor extraction is proposed. This technique is based on both Discrete Wavelet Transform (DWT) and Principal Component Analysis (PCA). DWT is characterized by its multiresolution analytic property, that’s why it was applied on MRI images with different decomposition levels for feature extraction. Nevertheless, this technique suffers from a main drawback since it necessitates a huge storage and is computationally expensive. To decrease the dimensions of the feature vector and the computing time, PCA technique is considered. In the last stage, according to different extracted features, the brain tumor is classified into either benign or malignant tumor using Support Vector Machine (SVM) algorithm. A CAD tool for brain tumor detection and classification, including all above-mentioned stages, is designed and developed using MATLAB guide user interface.

Keywords: MRI, brain tumor, CAD, feature extraction, DWT, PCA, classification, SVM

Procedia PDF Downloads 242
1228 Infection Risk of Fecal Coliform Contamination in Drinking Water Sources of Urban Slum Dwellers: Application of Quantitative Microbiological Risk Assessment

Authors: Sri Yusnita Irda Sari, Deni Kurniadi Sunjaya, Ardini Saptaningsih Raksanagara

Abstract:

Water is one of the fundamental basic needs for human life, particularly drinking water sources. Although water quality is getting better, fecal-contamination of water is still found around the world, especially in the slum area of mid-low income countries. Drinking water source contamination in urban slum dwellers increases the risk of water borne diseases. Low level of sanitation and poor drinking water supply known as risk factors for diarrhea, moreover bacteria-contaminated drinking water source is the main cause of diarrhea in developing countries. This study aimed to assess risk infection due to Fecal Coliform contamination in various drinking water sources in urban area by applying Quantitative Microbiological Risk Assessment (QMRA). A Cross-sectional survey was conducted in a period of August to October 2015. Water samples were taken by simple random sampling from households in Cikapundung river basin which was one of urban slum area in the center of Bandung city, Indonesia. About 379 water samples from 199 households and 15 common wells were tested. Half of the households used treated drinking water from water gallon mostly refill water gallon which was produced in drinking water refill station. Others used raw water sources which need treatment before consume as drinking water such as tap water, borehole, dug well and spring water source. Annual risk to get infection due to Fecal Coliform contamination from highest to lowest risk was dug well (1127.9 x 10-5), spring water (49.7 x 10-5), borehole (1.383 x 10-5) and tap water (1.121 x 10-5). Annual risk infection of refill drinking water was 1.577 x 10-5 which is comparable to borehole and tap water. Household water treatment and storage to make raw water sources drinkable is essential to prevent risk of water borne diseases. Strong regulation and intense monitoring of refill water gallon quality should be prioritized by the government; moreover, distribution of tap water should be more accessible and affordable especially in urban slum area.

Keywords: drinking water, quantitative microbiological risk assessment, slum, urban

Procedia PDF Downloads 274
1227 Magnetic Treatment of Irrigation Water and Its Effect on Water Salinity

Authors: Muhammad Waqar Ashraf

Abstract:

The influence of magnetic field on the structure of water and aqueous solutions are similar and can alter the physical and chemical properties of water-dispersed systems. With the application of magnetic field, hydration of salt ions and other impurities slides down and improve the possible technological characteristics of the water. Magnetic field can enhance the characteristic of water i.e. better salt solubility, kinetic changes in salt crystallization, accelerated coagulation, etc. Gulf countries are facing critical problem due to depletion of water resources and increasing food demands to cover the human needs; therefore water shortage is being increasingly accepted as a major limitation for increased agricultural production and food security. In arid and semi-arid regions sustainable agricultural development is influenced to a great extent by water quality that might be used economically and effectively in developing agriculture programs. In the present study, the possibility of using magnetized water to desalinate the soil is accounted for the enhanced dissolving capacity of the magnetized water. Magnetic field has been applied to treat brackish water. The study showed that the impact of magnetic field on saline water is sustained up to three hours (with and without shaking). These results suggest that even low magnetic field can decrease the electrical conductivity and total dissolved solids which are good for the removal of salinity from the irrigated land by using magnetized water.

Keywords: magnetic treatment, saline water, hardness of water, removal of salinity

Procedia PDF Downloads 487
1226 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 84
1225 Sulfanilamide/Epoxy Resin and Its Application as Tackifier in Epoxy Adhesives

Authors: Oiane Ruiz de Azua, Salvador Borros, Nuria Agullo, Jordi Arbusa

Abstract:

Tackiness is described as the ability to spontaneously form a bond to another material under light pressures within a short application time. During the first few minutes of the adhesive's curing, it is necessary to have enough tack to keep the substrates together while cohesion is increasing within the adhesive. This property plays a key role in the manufacturing process of pieces. Epoxy adhesives, unlike other adhesives, usually present low tackiness before curing; however, there is very little literature about the use of tackifiers in epoxy adhesives, except for the high molecular weight epoxy additives. In the present work, a tetrafunctional epoxy resin based on Bisphenol-A and Sulfanilamide has been synthesized in order to be used as a tackifier. This additive offers improved specific adhesion to two-component (2K) epoxy adhesives. The dosage of the tackifier has to be done carefully not to alter the mechanical and rheological properties of the adhesive. The synthetized product has been analyzed by FTIR and ¹H-NMR analysis, and the effect of the addition of 1 wt % of the tackifier on rheological properties, viscoelastic behavior, and mechanical properties has been studied. On one hand, the addition of the product in the epoxy resin part showed a significant increase in tackiness regarding the neat epoxy resin. On the other hand, tackiness of the whole formulation was also increased. Curing time of the adhesive has not undergone any relevant changes with the tackifier addition. Regarding viscoelastic properties, Storage Modulus (G') and Loss Modulus (G'') remain also unchanged at ambient temperature. Probably, in case higher tackifier concentration would be added, differences in viscoelastic properties would be observed. The study of mechanical properties shows that hardness and tensile strength also keep their values unchanged regarding neat two component adhesive. In conclusion, the addition of 1 wt % of sulfanilamide/epoxy enhanced the tackiness of the epoxy resin part, improves tack without modifying significantly either the rheological, the mechanical, or the viscoelastic properties of the product. Thus, the sulfanilamide presented could be a good candidate to be used as an additive to the 2k epoxy formulation for the manufacturing process of pieces.

Keywords: epoxy adhesive, manufacturing process of pieces, sulfanilamide, tackifiers

Procedia PDF Downloads 175
1224 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 410
1223 Suitable Models and Methods for the Steady-State Analysis of Multi-Energy Networks

Authors: Juan José Mesas, Luis Sainz

Abstract:

The motivation for the development of this paper lies in the need for energy networks to reduce losses, improve performance, optimize their operation and try to benefit from the interconnection capacity with other networks enabled for other energy carriers. These interconnections generate interdependencies between some energy networks and others, which requires suitable models and methods for their analysis. Traditionally, the modeling and study of energy networks have been carried out independently for each energy carrier. Thus, there are well-established models and methods for the steady-state analysis of electrical networks, gas networks, and thermal networks separately. What is intended is to extend and combine them adequately to be able to face in an integrated way the steady-state analysis of networks with multiple energy carriers. Firstly, the added value of multi-energy networks, their operation, and the basic principles that characterize them are explained. In addition, two current aspects of great relevance are exposed: the storage technologies and the coupling elements used to interconnect one energy network with another. Secondly, the characteristic equations of the different energy networks necessary to carry out the steady-state analysis are detailed. The electrical network, the natural gas network, and the thermal network of heat and cold are considered in this paper. After the presentation of the equations, a particular case of the steady-state analysis of a specific multi-energy network is studied. This network is represented graphically, the interconnections between the different energy carriers are described, their technical data are exposed and the equations that have previously been presented theoretically are formulated and developed. Finally, the two iterative numerical resolution methods considered in this paper are presented, as well as the resolution procedure and the results obtained. The pros and cons of the application of both methods are explained. It is verified that the results obtained for the electrical network (voltages in modulus and angle), the natural gas network (pressures), and the thermal network (mass flows and temperatures) are correct since they comply with the distribution, operation, consumption and technical characteristics of the multi-energy network under study.

Keywords: coupling elements, energy carriers, multi-energy networks, steady-state analysis

Procedia PDF Downloads 72
1222 Applications of Engineering Geology in Hydro Power Tunnel Projects in Himalayan Geological Regime

Authors: Rameh Chauhan

Abstract:

Tunnel construction in Himalayan rock is a challenging task due to fragile nature of the strata. Tunnel excavation carried out from lower Himalayas to high Himalayas in different metamorphic rock. Therefore application of engineering geology plays a vital role during various stage of the tunneling projects. Engineering geology is defined as application of geology to construction of civil structures through engineering practice. It is applied to the design, construction and performance aspects of engineering structure on the surface or sub-surface like dam, underground and surface power house, cut slopes, tunnels and underground storage cavern for nuclear material. But this paper emphasized mostly on underground structures like big caverns of Power house, desilting chambers, and tunnels of various sizes. Construction of these structures in the fragile rock conditions of Himalayan geology from Western Himalayas to Eastern Himalayas necessitated the application of the engineering geology on the micro-scale base for the stability, performance, and longevity of the civil structures. Number of hydropower projects have been constructed, some of them are under construction and under investigation stage. These projects are located in various parts of Himalayas under various seismic-tectonic zones. Tunneling works are involved in these projects. This paper represents the various engineering geological practices adopted in investigation and construction stage of various projects based on experiences gained during past construction histories in Himalayan geology of young mountains in very fragile geological conditions. Highlighting and sharing of use of these techniques on various platforms will definitely enhance the knowledge for carrying out the construction of various projects for the development of society. Construction of the tunnels, surface, and sub-surface caverns, dams, highway, metro, highway tunnels are all based on engineering geological parameters in combinations with other engineering considerations.

Keywords: cavern-power house, desilting chambers and tunnels, seismic-tectonic-zones, earthquake-prone zones based on intensities

Procedia PDF Downloads 219
1221 Design of Traffic Counting Android Application with Database Management System and Its Comparative Analysis with Traditional Counting Methods

Authors: Muhammad Nouman, Fahad Tiwana, Muhammad Irfan, Mohsin Tiwana

Abstract:

Traffic congestion has been increasing significantly in major metropolitan areas as a result of increased motorization, urbanization, population growth and changes in the urban density. Traffic congestion compromises efficiency of transport infrastructure and causes multiple traffic concerns; including but not limited to increase of travel time, safety hazards, air pollution, and fuel consumption. Traffic management has become a serious challenge for federal and provincial governments, as well as exasperated commuters. Effective, flexible, efficient and user-friendly traffic information/database management systems characterize traffic conditions by making use of traffic counts for storage, processing, and visualization. While, the emerging data collection technologies continue to proliferate, its accuracy can be guaranteed through the comparison of observed data with the manual handheld counters. This paper presents the design of tablet based manual traffic counting application and framework for development of traffic database management system for Pakistan. The database management system comprises of three components including traffic counting android application; establishing online database and its visualization using Google maps. Oracle relational database was chosen to develop the data structure whereas structured query language (SQL) was adopted to program the system architecture. The GIS application links the data from the database and projects it onto a dynamic map for traffic conditions visualization. The traffic counting device and example of a database application in the real-world problem provided a creative outlet to visualize the uses and advantages of a database management system in real time. Also, traffic data counts by means of handheld tablet/ mobile application can be used for transportation planning and forecasting.

Keywords: manual count, emerging data sources, traffic information quality, traffic surveillance, traffic counting device, android; data visualization, traffic management

Procedia PDF Downloads 188
1220 Assessment of Pull Mechanism at Enhancing Maize Farmers’ Utilisation of Aflasafe Bio-Control Measures in Oyo State, Nigeria

Authors: Jonathan A. Akinwale, Ibukun J. Agotola

Abstract:

There is a need to rethink how technology is being disseminated to end users in order to ensure wide adoption and utilisation. Aflasafe bio-control was developed to combat aflatoxin in maize to ensure food safety for the end users. This study was designed to assess how the pull mechanism is enhancing the utilisation of this proven technology among maize farmers in Oyo State, Nigeria. The study determines the awareness of farmers on Aflasafe, sources of purchase of Aflasafe, incentives towards the usage of Aflasafe, constraints to farmers’ utilisation and factors influencing farmers’ utilisation of Aflasafe bio-control measures. Respondents were selected using a multi-stage sampling procedure. Data were collected from respondents through interview schedule and analyzed using descriptive statistics (means, frequencies, and percentages) and inferential statistics (Pearson Product Moment Correlation and regression analysis). The result showed that 89% of the farmers indicated implementers as the outlet for the purchase of Aflasafe. Also, premium payment and provision of technical assistance were the highly ranked incentives to the utilisation of Aflasafe among the farmers. The study also revealed that the major constraints face by respondents were low access to credit facility, inadequate sources of purchase, and lack of storage facilities. A little above half (54%) of the farmers were found to have fully utilized Aflasafe in maize production. Pearson Product Moment Correlation (PPMC) analysis revealed that there was a significant correlation between incentives and utilisation of Aflasafe (r-value=0.274; p ≤ 0.01). The result of the regression analysis indicated maize production experience (β=0.572), output (β=0.531), years of formal education (β=0.404) and household size (β=0.391) as the leading factors influencing farmers utilisation of Aflasafe bio-control in maize production. The study, therefore, recommends that governments and non-governmental organisations should be interested in making Aflasafe available to the maize farmers either through loan provision or price subsidy.

Keywords: Aflasafe bio-control, maize production, production incentives, pull mechanism, utilisation

Procedia PDF Downloads 120
1219 Chemical Composition and Characteristics of Organic Solvent Extracts from the Omani Seaweeds Melanothamnus Somalensis and Gelidium Omanense

Authors: Abdullah Al-Nassri, Ahmed Al-Alawi

Abstract:

Seaweeds are classified into three groups: red, green, and brown. Each group of seaweeds consists of several types that have differences in composition. Even at the species level, there are differences in some ingredients, although in general composition, they are the same. Environmental conditions, availability of nutrients, and maturity stage are the main reasons for composition differences. In this study, two red seaweed species, Melanothamnus somalensis & Gelidium omanense, were collected in September 2021 from Sadh (Dhofar governorate, Oman). Five organic solvents were used sequentially to achieve extraction. The solvents were applied in the following order: hexane, dichloromethane, ethyl acetate, acetone, and methanol. Preparative HPLC (PrepLC) was performed to fraction the extracts. The chemical composition was measured; also, total phenols, flavonoids, and tannins were investigated. The structure of the extracts was analyzed by Fourier-transform infrared spectroscopy (FTIR). Seaweeds demonstrated high differences in terms of chemical composition, total phenolic content (TPC), total flavonoid content (TFC), and total tannin content (TTC). Gelidium omanense showed high moisture content, lipid content and carbohydrates (9.8 ± 0.15 %, 2.29 ± 0.09 % and 70.15 ± 0.42 %, respectively) compared to Melanothamnus somalensis (6.85 ± 0.01 %, 2.05 ± 0.12 % and 52.7 ± 0.36 % respectively). However, Melanothamnus somalensis showed high ash content and protein (27.68 ± 0.40 % and 52.7 ± 0.36 % respectively) compared to Gelidium omanense (8.07 ± 0.39 % and 9.70 ± 0.22 % respectively). Melanothamnus somalensis showed higher elements and minerals content, especially sodium and potassium. This is attributed to the jelly-like structure of Melanothamnus somalensis, which allows storage of more solutes compared to the leafy-like structure of Gelidium omanense. Furthermore, Melanothamnus somalensis had higher TPC in all fractions except the hexane fraction than Gelidium omanense. Except with hexane, TFC in the other solvents’ extracts was significantly different between Gelidium omanense and Melanothamnus somalensis. In all fractions, except dichloromethane and ethyl acetate fractions, there were no significant differences in TTC between Gelidium omanense and Melanothamnus somalensis. FTIR spectra showed variation between fractions, which is an indication of different functional groups.

Keywords: chemical composition, organic extract, Omani seaweeds, biological activity, FTIR

Procedia PDF Downloads 63
1218 Sustainability Analysis and Quality Assessment of Rainwater Harvested from Green Roofs: A Review

Authors: Mst. Nilufa Sultana, Shatirah Akib, Muhammad Aqeel Ashraf, Mohamed Roseli Zainal Abidin

Abstract:

Most people today are aware that global Climate change, is not just a scientific theory but also a fact with worldwide consequences. Global climate change is due to rapid urbanization, industrialization, high population growth and current vulnerability of the climatic condition. Water is becoming scarce as a result of global climate change. To mitigate the problem arising due to global climate change and its drought effect, harvesting rainwater from green roofs, an environmentally-friendly and versatile technology, is becoming one of the best assessment criteria and gaining attention in Malaysia. This paper addresses the sustainability of green roofs and examines the quality of water harvested from green roofs in comparison to rainwater. The factors that affect the quality of such water, taking into account, for example, roofing materials, climatic conditions, the frequency of rainfall frequency and the first flush. A green roof was installed on the Humid Tropic Centre (HTC) is a place of the study on monitoring program for urban Stormwater Management Manual for Malaysia (MSMA), Eco-Hydrological Project in Kualalumpur, and the rainwater was harvested and evaluated on the basis of four parameters i.e., conductivity, dissolved oxygen (DO), pH and temperature. These parameters were found to fall between Class I and Class III of the Interim National Water Quality Standards (INWQS) and the Water Quality Index (WQI). Some preliminary treatment such as disinfection and filtration could likely to improve the value of these parameters to class I. This review paper clearly indicates that there is a need for more research to address other microbiological and chemical quality parameters to ensure that the harvested water is suitable for use potable water for domestic purposes. The change in all physical, chemical and microbiological parameters with respect to storage time will be a major focus of future studies in this field.

Keywords: Green roofs, INWQS, MSMA-SME, rainwater harvesting, water treatment, water quality parameter, WQI

Procedia PDF Downloads 528
1217 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 112
1216 Lateral Torsional Buckling: Tests on Glued Laminated Timber Beams

Authors: Vera Wilden, Benno Hoffmeister, Markus Feldmann

Abstract:

Glued laminated timber (glulam) is a preferred choice for long span girders, e.g., for gyms or storage halls. While the material provides sufficient strength to resist the bending moments, large spans lead to increased slenderness of such members and to a higher susceptibility to stability issues, in particular to lateral torsional buckling (LTB). Rules for the determination of the ultimate LTB resistance are provided by Eurocode 5. The verifications of the resistance may be performed using the so called equivalent member method or by means of theory 2nd order calculations (direct method), considering equivalent imperfections. Both methods have significant limitations concerning their applicability; the equivalent member method is limited to rather simple cases; the direct method is missing detailed provisions regarding imperfections and requirements for numerical modeling. In this paper, the results of a test series on slender glulam beams in three- and four-point bending are presented. The tests were performed in an innovative, newly developed testing rig, allowing for a very precise definition of loading and boundary conditions. The load was introduced by a hydraulic jack, which follows the lateral deformation of the beam by means of a servo-controller, coupled with the tested member and keeping the load direction vertically. The deformation-controlled tests allowed for the identification of the ultimate limit state (governed by elastic stability) and the corresponding deformations. Prior to the tests, the structural and geometrical imperfections were determined and used later in the numerical models. After the stability tests, the nearly undamaged members were tested again in pure bending until reaching the ultimate moment resistance of the cross-section. These results, accompanied by numerical studies, were compared to resistance values obtained using both methods according to Eurocode 5.

Keywords: experimental tests, glued laminated timber, lateral torsional buckling, numerical simulation

Procedia PDF Downloads 226
1215 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 49
1214 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 183
1213 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 402
1212 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance

Authors: Kyle Phillips, Ndiko Ludidi

Abstract:

Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.

Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22

Procedia PDF Downloads 454
1211 Meeting India's Energy Demand: U.S.-India Energy Cooperation under Trump

Authors: Merieleen Engtipi

Abstract:

India's total share of global population is nearly 18%; however, its per capita energy consumption is only one-third of global average. The demand and supply of electricity are uneven in the country; around 240 million of the population have no access to electricity. However, with India's trajectory for modernisation and economic growth, the demand for energy is only expected to increase. India is at a crossroad, on the one hand facing the increasing demand for energy and on the other hand meeting the Paris climate policy commitments, and further the struggle to provide efficient energy. This paper analyses the policies to meet India’s need for energy, as the per capita energy consumption is likely to be double in 6-7 years period. Simultaneously, India's Paris commitment requires curbing of carbon emission from fossil fuels. There is an increasing need for renewables to be cheaply and efficiently available in the market and for clean technology to extract fossil fuels to meet climate policy goals. Fossil fuels are the most significant generator of energy in India; with the Paris agreement, the demand for clean energy technology is increasing. Finally, the U.S. decided to withdraw from the Paris Agreement; however, the two countries plan to continue engaging bilaterally on energy issues. The U.S. energy cooperation under Trump administration is significantly vital for greater energy security, transfer of technology and efficiency in energy supply and demand.

Keywords: energy demand, energy cooperation, fossil fuels, technology transfer

Procedia PDF Downloads 249
1210 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 35
1209 Complementary Child-Care by Grandparents: Comparisons of Zambia and the Netherlands

Authors: Francis Sichimba

Abstract:

Literature has increasingly acknowledged the important role that grandparents play in child care with evidence highlighting differences in grand-parental investment between countries and cultures. However, there are very few systematic cross cultural studies on grandparents’ participation in child care. Thus, we decided to conduct this study in Zambia and the Netherlands because the two countries differ rather drastically socially and culturally. The objective of this study was to investigate grand-parental involvement in child care in Zambia and the Netherlands. In line with the general objective, four hypotheses were formulated using nationality, family size, social economic status (SES), attachment security as independent variables. The study sample consisted of 411 undergraduate students from the University of Zambia and the University of Leiden. A questionnaire was used to measure grand-parental involvement in child care. Results indicated that grandparent involvement in child care was prevalent in both Zambia and Netherlands. However, as predicted it was found that Zambian grandparents (M = 9.69, SD=2.40) provided more care for their grandchildren compared to their Dutch counterparts (M = 7.80, SD=3.31) even after controlling for parents being alive. Using hierarchical logistic regression analysis the study revealed that nationality and attachment-related avoidance were significant predictors of grand-parental involvement in child care. It was concluded that grand-parental care is a great resource in offering complementary care in both countries.

Keywords: attachment, care, grand-parenting involvement, social economic status

Procedia PDF Downloads 716
1208 Geopolymerization Methods for Clay Soils Treatment

Authors: Baba Hassane Ahmed Hisseini, Abdelkrim Bennabi, Rabah Hamzaoui, Lamis Makki, Gaetan Blanck

Abstract:

Most of the clay soils are known as problematic soils due to their water content, which varies greatly over time. It is observed that they are used to be subject to shrinkage and swelling, thus causing a problem of stability on the structures of civil engineering construction work. They are often excavated and placed in a storage area giving rise to the opening of new quarries. This method has become obsolete today because to protect the environment, we are leading to think differently and opening the way to new research for the improvement of the performance of this type of clay soils to reuse them in the construction field. The solidification and stabilization technique is used to improve the properties of poor quality soils to transform them into materials with a suitable performance for a new use in the civil engineering field rather than to excavate them and store them in the discharge area. In our case, the polymerization method is used for bad clay soils classified as high plasticity soil class A4 according to the French standard NF P11-300, where classical treatment methods with cement or lime are not efficient. Our work concerns clay soil treatment study using raw materials as additives for solidification and stabilization. The geopolymers are synthesized by aluminosilicates materials like fly ash, metakaolin, or blast furnace slag and activated by alkaline solution based on sodium hydroxide (NaOH), sodium silicate (Na2SiO3) or a mixture of both of them. In this study, we present the mechanical properties of the soil clay (A4 type) evolution with geopolymerisation methods treatment. Various mix design of aluminosilicates materials and alkaline solutions were carried at different percentages and different curing times of 1, 7, and 28 days. The compressive strength of the untreated clayey soil could be increased from simple to triple. It is observed that the improvement of compressive strength is associated with a geopolymerization mechanism. The highest compressive strength was found with metakaolin at 28 days.

Keywords: treatment and valorization of clay-soil, solidification and stabilization, alkali-activation of co-product, geopolymerization

Procedia PDF Downloads 157
1207 Modification of Hexagonal Boron Nitride Induced by Focused Laser Beam

Authors: I. Wlasny, Z. Klusek, A. Wysmolek

Abstract:

Hexagonal boron nitride is a representative of a widely popular class of two-dimensional Van Der Waals materials. It finds its uses, among others, in construction of complexly layered heterostructures. Hexagonal boron nitride attracts great interest because of its properties characteristic for wide-gap semiconductors as well as an ultra-flat surface.Van Der Waals heterostructures composed of two-dimensional layered materials, such as transition metal dichalcogenides or graphene give hope for miniaturization of various electronic and optoelectronic elements. In our presentation, we will show the results of our investigations of the not previously reported modification of the hexagonal boron nitride layers with focused laser beam. The electrostatic force microscopy (EFM) images reveal that the irradiation leads to changes of the local electric fields for a wide range of laser wavelengths (from 442 to 785 nm). These changes are also accompanied by alterations of crystallographic structure of the material, as reflected by Raman spectra. They exhibit high stability and remain visible after at least five months. This behavior can be explained in terms of photoionization of the defect centers in h-BN which influence non-uniform electrostatic field screening by the photo-excited charge carriers. Analyzed changes influence local defect structure, and thus the interatomic distances within the lattice. These effects can be amplified by the piezoelectric character of hexagonal boron nitride, similar to that found in nitrides (e.g., GaN, AlN). Our results shed new light on the optical properties of the hexagonal boron nitride, in particular, those associated with electron-phonon coupling. Our study also opens new possibilities for h-BN applications in layered heterostructures where electrostatic fields can be used in tailoring of the local properties of the structures for use in micro- and nanoelectronics or field-controlled memory storage. This work is supported by National Science Centre project granted on the basis of the decision number DEC-2015/16/S/ST3/00451.

Keywords: atomic force microscopy, hexagonal boron nitride, optical properties, raman spectroscopy

Procedia PDF Downloads 166
1206 Innovations and Challenges: Multimodal Learning in Cybersecurity

Authors: Tarek Saadawi, Rosario Gennaro, Jonathan Akeley

Abstract:

There is rapidly growing demand for professionals to fill positions in Cybersecurity. This is recognized as a national priority both by government agencies and the private sector. Cybersecurity is a very wide technical area which encompasses all measures that can be taken in an electronic system to prevent criminal or unauthorized use of data and resources. This requires defending computers, servers, networks, and their users from any kind of malicious attacks. The need to address this challenge has been recognized globally but is particularly acute in the New York metropolitan area, home to some of the largest financial institutions in the world, which are prime targets of cyberattacks. In New York State alone, there are currently around 57,000 jobs in the Cybersecurity industry, with more than 23,000 unfilled positions. The Cybersecurity Program at City College is a collaboration between the Departments of Computer Science and Electrical Engineering. In Fall 2020, The City College of New York matriculated its first students in theCybersecurity Master of Science program. The program was designed to fill gaps in the previous offerings and evolved out ofan established partnership with Facebook on Cybersecurity Education. City College has designed a program where courses, curricula, syllabi, materials, labs, etc., are developed in cooperation and coordination with industry whenever possible, ensuring that students graduating from the program will have the necessary background to seamlessly segue into industry jobs. The Cybersecurity Program has created multiple pathways for prospective students to obtain the necessary prerequisites to apply in order to build a more diverse student population. The program can also be pursued on a part-time basis which makes it available to working professionals. Since City College’s Cybersecurity M.S. program was established to equip students with the advanced technical skills needed to thrive in a high-demand, rapidly-evolving field, it incorporates a range of pedagogical formats. From its outset, the Cybersecurity program has sought to provide both the theoretical foundations necessary for meaningful work in the field along with labs and applied learning projects aligned with skillsets required by industry. The efforts have involved collaboration with outside organizations and with visiting professors designing new courses on topics such as Adversarial AI, Data Privacy, Secure Cloud Computing, and blockchain. Although the program was initially designed with a single asynchronous course in the curriculum with the rest of the classes designed to be offered in-person, the advent of the COVID-19 pandemic necessitated a move to fullyonline learning. The shift to online learning has provided lessons for future development by providing examples of some inherent advantages to the medium in addition to its drawbacks. This talk will address the structure of the newly-implemented Cybersecurity Master’s Program and discuss the innovations, challenges, and possible future directions.

Keywords: cybersecurity, new york, city college, graduate degree, master of science

Procedia PDF Downloads 140