Search results for: cyber physical systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14158

Search results for: cyber physical systems

14008 Formulation and Evaluation of TDDS for Sustained Release Ondansetron HCL Patches

Authors: Baljinder Singh, Navneet Sharma

Abstract:

The skin can be used as the site for drug administration for continuous transdermal drug infusion into the systemic circulation. For the continuous diffusion/penetration of the drugs through the intact skin surface membrane-moderated systems, matrix dispersion type systems, adhesive diffusion controlled systems and micro reservoir systems have been developed. Various penetration enhancers are used for the drug diffusion through skin. In matrix dispersion type systems, the drug is dispersed in the solvent along with the polymers and solvent allowed to evaporate forming a homogeneous drug-polymer matrix. Matrix type systems were developed in the present study. In the present work, an attempt has been made to develop a matrix-type transdermal therapeutic system comprising of ondansetron-HCl with different ratios of hydrophilic and hydrophobic polymeric combinations using solvent evaporation technique. The physicochemical compatibility of the drug and the polymers was studied by infrared spectroscopy. The results obtained showed no physical-chemical incompatibility between the drug and the polymers. The patches were further subjected to various physical evaluations along with the in-vitro permeation studies using rat skin. On the basis of results obtained form the in vitro study and physical evaluation, the patches containing hydrophilic polymers i.e. polyvinyl alcohol and poly vinyl pyrrolidone with oleic acid as the penetration enhancer(5%) were considered as suitable for large scale manufacturing with a backing layer and a suitable adhesive membrane.

Keywords: transdermal drug delivery, penetration enhancers, hydrophilic and hydrophobic polymers, ondansetron HCl

Procedia PDF Downloads 295
14007 Reducing Energy Consumption in Architectural Spaces by Optimizing Natural Light Transmission

Authors: Parisa Javid

Abstract:

In architecture, daylight contributes to humans' mental and physical well-being and reduces the consumption of fossil fuels. Accordingly, Iran's rich architecture has valuable achievements and experiences that should be recognized and introduced to the Iranian and international architecture communities. There are many ways to reduce energy consumption in buildings, but electricity accounts for a large part of that consumption. Lighting up spaces with natural light is a significant factor in reducing energy consumption and preventing electricity dissipation. Aside from being expensive, electric lighting systems cause excessive heat and physical injury (eyes). This study is based on library records and documents. Modern lighting systems are used to reduce energy consumption in the interior of a building to allow for optimal transmission of natural light. It discusses how to use natural light in architecture and the benefits of natural light in buildings. Solar energy can be used more efficiently, and electrical power can be saved in residential, administrative, commercial, and educational buildings by using new methods such as light tubes and mirror directors. Modern lighting systems, natural light, and reduced energy consumption are keywords for these systems, which quickly return their investment.

Keywords: modern lighting systems, natural light, reduced energy consumption

Procedia PDF Downloads 64
14006 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy

Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides

Abstract:

The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.

Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams

Procedia PDF Downloads 55
14005 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 276
14004 Design and Implementation of Collaborative Editing System Based on Physical Simulation Engine Running State

Authors: Zhang Songning, Guan Zheng, Ci Yan, Ding Gangyi

Abstract:

The application of physical simulation engines in collaborative editing systems has an important background and role. Firstly, physical simulation engines can provide real-world physical simulations, enabling users to interact and collaborate in real time in virtual environments. This provides a more intuitive and immersive experience for collaborative editing systems, allowing users to more accurately perceive and understand various elements and operations in collaborative editing. Secondly, through physical simulation engines, different users can share virtual space and perform real-time collaborative editing within it. This real-time sharing and collaborative editing method helps to synchronize information among team members and improve the efficiency of collaborative work. Through experiments, the average model transmission speed of a single person in the collaborative editing system has increased by 141.91%; the average model processing speed of a single person has increased by 134.2%; the average processing flow rate of a single person has increased by 175.19%; the overall efficiency improvement rate of a single person has increased by 150.43%. With the increase in the number of users, the overall efficiency remains stable, and the physical simulation engine running status collaborative editing system also has horizontal scalability. It is not difficult to see that the design and implementation of a collaborative editing system based on physical simulation engines not only enriches the user experience but also optimizes the effectiveness of team collaboration, providing new possibilities for collaborative work.

Keywords: physics engine, simulation technology, collaborative editing, system design, data transmission

Procedia PDF Downloads 35
14003 Corrosion Behavior of Different Electroplated Systems Coated With Physical Vapor Deposition

Authors: Jorge Santos, Ana V. Girão, F. J. Oliveira, Alexandre C. Bastos

Abstract:

Protective or decorative coatings containing hexavalent chromium compounds are still used on metal and plastic parts. These hexavalent chromium compounds represent a risk to living beings and the environment, and, for this reason, there is a great need to investigate alternatives. Physical Vapor Deposition (PVD) is an environmentally friendly process that allows the deposition of wear and corrosion resistant thin films with excellent optical properties. However, PVD thin films are porous and if deposited onto low corrosion resistant substrates, lead to a degradation risk. The corrosion behavior of chromium-free electroplated coating systems finished with magnetron sputtered PVD thin films was investigated in this work. The electroplated systems consisted of distinct nickel layers deposited on top of a copper interlayer on acrylonitrile butadiene styrene (ABS) plates. Electrochemical and corrosion evaluation was conducted by electrochemical impedance spectroscopy and polarization curves on the different electroplated coating systems, with and without PVD thin film on top. The results show that the corrosion resistance is lower for the electroplated coating systems finished with PVD thin film for extended exposure periods when compared to those without the PVD overlay.

Keywords: PVD, electroplating, corrosion, thin film

Procedia PDF Downloads 111
14002 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation

Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.

Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques

Procedia PDF Downloads 253
14001 Electronic Physical Activity Record (EPAR): Key for Data Driven Physical Activity Healthcare Services

Authors: Rishi Kanth Saripalle

Abstract:

Medical experts highly recommend to include physical activity in everyone’s daily routine irrespective of gender or age as it helps to improve various medical issues or curb potential issues. Simultaneously, experts are also diligently trying to provide various healthcare services (interventions, plans, exercise routines, etc.) for promoting healthy living and increasing physical activity in one’s ever increasing hectic schedules. With the introduction of wearables, individuals are able to keep track, analyze, and visualize their daily physical activities. However, there seems to be no common agreed standard for representing, gathering, aggregating and analyzing an individual’s physical activity data from disparate multiple sources (exercise pans, multiple wearables, etc.). This issue makes it highly impractical to develop any data-driven physical activity applications and healthcare programs. Further, the inability to integrate the physical activity data into an individual’s Electronic Health Record to provide a wholistic image of that individual’s health is still eluding the experts. This article has identified three primary reasons for this potential issue. First, there is no agreed standard, both structure and semantic, for representing and sharing physical activity data across disparate systems. Second, various organizations (e.g., LA fitness, Gold’s Gym, etc.) and research backed interventions and programs still primarily rely on paper or unstructured format (such as text or notes) to keep track of the data generated from physical activities. Finally, most of the wearable devices operate in silos. This article identifies the underlying problem, explores the idea of reusing existing standards, and identifies the essential modules required to move forward.

Keywords: electronic physical activity record, physical activity in EHR EIM, tracking physical activity data, physical activity data standards

Procedia PDF Downloads 258
14000 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction

Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui

Abstract:

Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.

Keywords: BIM, cybersecurity, digital twins, IoT, urban cities

Procedia PDF Downloads 135
13999 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 272
13998 Physical and Thermo-Physical Properties of High Strength Concrete Containing Raw Rice Husk after High Temperature Effect

Authors: B. Akturk, N. Yuzer, N. Kabay

Abstract:

High temperature is one of the most detrimental effects that cause important changes in concrete’s mechanical, physical, and thermo-physical properties. As a result of these changes, especially high strength concrete (HSC), may exhibit damages such as cracks and spallings. To overcome this problem, incorporating polymer fibers such as polypropylene (PP) in concrete is a very well-known method. In this study, using RRH as a sustainable material instead of PP fiber in HSC to prevent spallings and improve physical and thermo-physical properties were investigated. Therefore, seven HSC mixtures with 0.25 water to binder ratio were prepared, incorporating silica fume and blast furnace slag. PP and RRH were used at 0.2-0.5% and 0.5-3% by weight of cement, respectively. All specimens were subjected to high temperatures (20 (control), 300, 600 and 900˚C) with a heating rate of 2.5˚C/min and after cooling, residual physical and thermo-physical properties were determined.

Keywords: high temperature, high strength concrete, polypropylene fiber, raw rice husk, thermo-physical properties

Procedia PDF Downloads 230
13997 Data Modeling and Calibration of In-Line Pultrusion and Laser Ablation Machine Processes

Authors: David F. Nettleton, Christian Wasiak, Jonas Dorissen, David Gillen, Alexandr Tretyak, Elodie Bugnicourt, Alejandro Rosales

Abstract:

In this work, preliminary results are given for the modeling and calibration of two inline processes, pultrusion, and laser ablation, using machine learning techniques. The end product of the processes is the core of a medical guidewire, manufactured to comply with a user specification of diameter and flexibility. An ensemble approach is followed which requires training several models. Two state of the art machine learning algorithms are benchmarked: Kernel Recursive Least Squares (KRLS) and Support Vector Regression (SVR). The final objective is to build a precise digital model of the pultrusion and laser ablation process in order to calibrate the resulting diameter and flexibility of a medical guidewire, which is the end product while taking into account the friction on the forming die. The result is an ensemble of models, whose output is within a strict required tolerance and which covers the required range of diameter and flexibility of the guidewire end product. The modeling and automatic calibration of complex in-line industrial processes is a key aspect of the Industry 4.0 movement for cyber-physical systems.

Keywords: calibration, data modeling, industrial processes, machine learning

Procedia PDF Downloads 251
13996 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU

Authors: Nicole Christiansen, Hanne Marie Motzfeldt

Abstract:

In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.

Keywords: AI, cyber vetting, data protection, job recruitment, online privacy

Procedia PDF Downloads 47
13995 Registered Nurse's Attitudes and Practices towards Physical Examination in the Clinical Settings

Authors: Besher Gharaibeh

Abstract:

This article addressed the issue of using physical exam in nursing. Nurses hold different attitudes toward using physical exam in the clinical settings. These attitudes determine to embrace physical examination in practice. So, the aim of the study was to examine registered nurses’ attitudes and practices, identify perceived barriers, and to identify the factors which influence the performance and the attitudes towards physical examinations. Results showed that even though nurses reported performing physical exam often, they had negative attitudes toward it. Stress and performing physical examinations on someone of the opposite gender (n=236; 87.4%) were the main barriers. Nurse's level of education influenced the attitude (t=-4.3; p < .01). These results indicated that RNs recognize the necessity of physical examinations, but they face many barriers and challenges which hinder the performance of the examination. Cultural factors and experience were the most influential barriers which deter performance of the physical examination.

Keywords: physical exam, nursing, barriers, practices, attitudes

Procedia PDF Downloads 141
13994 A Qualitative Study on Cyberbullying and Traditional Bullying among Taiwanese High School Students

Authors: Chia-Wen Wang, Patou Masika Musumari, Teeranee Techasrivichien, S. Pilar Suguimoto, Chang-Chuan Chan, Masako Ono-Kihara, Masahiro Kihara

Abstract:

Background: In recent years, a particular form of bullying, referred to as 'cyberbullying' has emerged along with the rapid expansion of the Internet, social network services (SNSs) and smart phones. Many Asian countries, including Taiwan, are faced with both the cyberbullying and the traditional form of bullying. This study aims to explore Taiwanese adolescents’ experiences, perceptions and opinions regarding cyberbullying and traditional bullying through the perspective of victim, perpetrator, or witness. Method: This is a qualitative study using face-to-face in-depth interviews guided by a semi-structured questionnaire among high school students -aged 16 to 18 years- in Taipei, Taiwan. The participants were recruited through convenience sampling from five high schools between June and November 2016. Interviews were digitally recorded, transcribed, and analyzed using the thematic analysis approach. Results: Forty-eight participants were recruited, of which, 14 (29.2%) reported had ever experienced bullying. Specifically, 7 participants (14.6%) reported had ever been victims of cyberbullying, 1 (2%) had been victims of traditional bullying, and 6 (12.5%) had been victims of both cyber and traditional bullying. The majority (70.8%) reported had ever witnessed acts of bullying; however, none of the participants recognized had ever been a perpetrator of bullying. Cyberbullying mostly happens on social media (Facebook and Instagram) or LINE instant messaging application, and included upload and sharing of degrading pictures and videos of victims, as well as gossip and mean messages by the perpetrators. The anonymous and public nature of social media groups in schools made it easier to perpetrate bullying. The victim of traditional bullying reported being the target of verbal attack because of his physical appearance. Regardless of the type of bullying, victims reported feeling bad, angry, or depressed as a result of being bullied. Witnesses of both cyber- and traditional bullying cited physical appearance (e.g. having the big/flat bust or big butt, or overweight or obese) and disability as the most reasons of being a bullying victim. Conclusion: Both cyberbullying and traditional bullying had negative emotional and psychological impacts on victims. This study warrants further research to assess the extent of this phenomenon and understand the characteristics of perpetrators, victims, and witnesses to inform the design of tailored interventions using appropriate channels of dissemination.

Keywords: cyberbullying, traditional bullying, social media, adolescents

Procedia PDF Downloads 311
13993 The Impact of Physical Activity for Recovering Cancer Patients

Authors: Martyn Queen, Diane Crone, Andrew Parker, Saul Bloxham

Abstract:

Rationale: There is a growing body of evidence that supports the use of physical activity during and after cancer treatment. However, activity levels for patients remain low. As more cancer patients are treated successfully, and treatment costs continue to escalate, physical activity may be a promising adjunct to a person-centred healthcare approach to recovery. Aim: The aim was to further understand how physical activity may enhance the recovery process for a group of mixed-site cancer patients. Objectives: The research investigated longitudinal changes in physical activity and perceived the quality of life between two and six month’s post-exercise interventions. It also investigated support systems that enabled patients to sustain these perceived changes. Method: The respondent cohort comprised 14 mixed-site cancer patients aged 43-70 (11 women, 3 men), who participated in a two-phase physical activity intervention that took place at a university in the South West of England. Phase 1 consisted of an eight-week structured physical activity programme; Phase 2 consisted of four months of non-supervised physical activity. Semi-structured interviews took place three times over six months with each participant. Grounded theory informed the data collection and analysis which, in turn, facilitated theoretical development. Findings: Our findings propose three theories on the impact of physical activity for recovering cancer patients: 1) Knowledge gained through a structured exercise programme can enable recovering cancer patients to independently sustain physical activity to four-month follow-up. 2) Sustaining physical activity for six months promotes positive changes in the quality of life indicators of chronic fatigue, self-efficacy, the ability to self-manage and energy levels. 3) Peer support from patients facilitates adherence to a structured exercise programme and support from a spouse, or life partner facilitates independently sustained physical activity to four-month follow-up. Conclusions: This study demonstrates that qualitative research can provide an evidence base that could be used to support future care plans for cancer patients. Findings also demonstrate that a physical activity intervention can be effective at helping cancer patients recover from the side effects of their treatment, and recommends that physical activity should become an adjunct therapy alongside traditional cancer treatments.

Keywords: physical activity, health, cancer recovery, quality of life, support systems, qualitative, grounded theory, person-centred healthcare

Procedia PDF Downloads 255
13992 An Axiomatic Model for Development of the Allocated Architecture in Systems Engineering Process

Authors: Amir Sharahi, Reza Tehrani, Ali Mollajan

Abstract:

The final step to complete the “Analytical Systems Engineering Process” is the “Allocated Architecture” in which all Functional Requirements (FRs) of an engineering system must be allocated into their corresponding Physical Components (PCs). At this step, any design for developing the system’s allocated architecture in which no clear pattern of assigning the exclusive “responsibility” of each PC for fulfilling the allocated FR(s) can be found is considered a poor design that may cause difficulties in determining the specific PC(s) which has (have) failed to satisfy a given FR successfully. The present study utilizes the Axiomatic Design method principles to mathematically address this problem and establishes an “Axiomatic Model” as a solution for reaching good alternatives for developing the allocated architecture. This study proposes a “loss Function”, as a quantitative criterion to monetarily compare non-ideal designs for developing the allocated architecture and choose the one which imposes relatively lower cost to the system’s stakeholders. For the case-study, we use the existing design of U. S. electricity marketing subsystem, based on data provided by the U.S. Energy Information Administration (EIA). The result for 2012 shows the symptoms of a poor design and ineffectiveness due to coupling among the FRs of this subsystem.

Keywords: allocated architecture, analytical systems engineering process, functional requirements (FRs), physical components (PCs), responsibility of a physical component, system’s stakeholders

Procedia PDF Downloads 363
13991 Prevalence of Physical Activity Levels and Perceived Benefits of and Barriers to Physical Activity among Jordanian Patients with Coronary Heart Disease: A Cross-Sectional Study

Authors: Eman Ahmed Alsaleh

Abstract:

Background: Many studies published in other countries identified certain perceived benefits and barriers to physical activity among patients with coronary heart disease. Nevertheless, there is no data about the issue relating to Jordanian patients with coronary heart disease. Objective: This study aimed to describe the prevalence of level of physical activity, benefits of and barriers to physical activity as perceived by Jordanian patients with coronary heart disease, and the relationship between physical activity and perceived benefits of and barriers to physical activity. In addition, it focused on examining the influence of selected sociodemographic and health characteristics on physical activity and the perceived benefits of and barriers to physical activity. Methods: A cross-sectional design was performed on a sample of 400 patients with coronary heart disease. They were given a list of perceived benefits and barriers to physical activity and asked to what extent they disagreed or agreed with each. Results: Jordanian patients with coronary heart disease perceived various benefits and barriers to physical activity. Most of these benefits were physiologically related (average mean = 5.7, SD = .7). The most substantial barriers to physical activity as perceived by the patients were: feeling anxiety, not having enough time, lack of interest, bad weather, and feeling of being uncomfortable. Sociodemographic and health characteristics that significantly influenced perceived barriers to physical activity were age, gender, health perception, chest pain frequency, education, job, caring responsibilities, ability to travel alone, smoking, and previous and current physical activity behaviour. Conclusion: This research demonstrates that patients with coronary heart disease have perceived physiological benefits of physical activity, and they have perceived motivational, physical health, and environmental barriers to physical activity, which is significant in developing intervention strategies that aim to maximize patients' participation in physical activity and overcome barriers to physical activity.

Keywords: prevalence, coronary heart disease, physical activity, perceived barriers

Procedia PDF Downloads 80
13990 Classification of IoT Traffic Security Attacks Using Deep Learning

Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem

Abstract:

The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.

Keywords: IoT, traffic security, deep learning, classification

Procedia PDF Downloads 121
13989 A Holistic Study of the Beta Lyrae Systems V0487 Lac, V0566 Hya and V0666 Lac

Authors: Moqbil S. Alenazi, Magdy. M. Elkhateeb

Abstract:

A comprehensive photometric study and evolutionary state for the newly discovered Beta Lyr systems V0487 Lac, V0566 Hya, and V0666 Lac were carried out by means of their first photometric observations. New times of minima were estimated from the observed light curves, and first (O-C) curves were established for all systems. A windows interface version of the Wilson and Devinney code (W-D) based on model atmospheres and a pass band prescription have been used for the radiative treatment. The accepted models reveal some absolute parameters for the studied systems, which are used in adopting the spectral type of the system's components and their evolutionary status. Distances to each system were calculated, and physical properties were estimated. Locations of the systems on the theoreticalmass–luminosity and mass–radius relations revealed a good fit for all systems components except for the secondary component of the system V0487 Lac.

Keywords: eclipsing binaries, light curve modelling, evolutionary state

Procedia PDF Downloads 44
13988 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 166
13987 Level of Physical Activity and Physical Fitness, and Attitudes towards Physical Activity among Senior Medical Students of Sultan Qaboos University, Sultanate of Oman

Authors: Hajar Al Rajaibi, Kawla Al Toubi, Saeed Al Jaadi, Deepali Jaju, Sanjay Jaju

Abstract:

Background: The available evidence in Oman on lack of physical activity call for immediate intervention. Physical activity counseling by doctors to their patients is influenced by their attitudes and personal physical fitness. To our best knowledge, the physical activity status of Omani medical students has not been addressed before. These future doctors will have a critical role in improving physical activity in patients and thus their overall health. Objective: The aim of the study is to assess the physical activity level, physical fitness level, and attitudes towards physical activity among Sultan Qaboos University senior medical students. Methods: In this cross-sectional study (N=110; males 55), physical activity level was assessed using International Physical Activity Questionnaire (IPAQ ) short form and attitudes towards physical activity using a fifty-four-items Kenyon questionnaire. The physical fitness level was assessed by estimating maximal oxygen uptake (VO₂max) using Chester step test. Results: Female students reported more sitting time more than 7hr/day (85.5%) compared to male students (40%; p < 0.05). The IPAQ revealed moderate level of physical activity in 58% of students. Students showed a high positive attitude towards physical activity for health and fitness and low attitude for physical activity as tension and risk. Both female and male students had a similar level and attitude towards physical activity. Physical fitness level was excellent (VO₂max > 55ml O₂/kg/min) in 11% of students, good (VO₂max>44-54ml O₂/kg/min) in 49% and average to below-average in 40%. Objectively measured physical fitness level, subjectively reported physical activity level or attitudes towards physical activity were not correlated. Conclusion: Omani medical students have a positive attitude towards physical activity but moderate physical activity level. Longer sitting time in females need further evaluation. Efforts are required to understand reasons for present physical activity level and to promote good physical activity among medical students by creating more awareness and facilities.

Keywords: Chester step test, Kenyon scale, medical students, physical activity, physical fitness

Procedia PDF Downloads 125
13986 Artificial Intelligence and Governance in Relevance to Satellites in Space

Authors: Anwesha Pathak

Abstract:

With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.

Keywords: satellite, space debris, traffic, threats, cyber security.

Procedia PDF Downloads 37
13985 Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being

Authors: Jeyaseelan Maria Michael

Abstract:

This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being.

Keywords: college students, cyberbullying, cyber victimization, psychological well-being

Procedia PDF Downloads 94
13984 Joint Physical Custody: Lessons from the European Union

Authors: Katarzyna Kamińska

Abstract:

When thinking about custodial arrangements after divorce or separation, there has been a shift from sole custody, particularly maternal preference, to joint physical custody. In many Western countries, an increasing of children with separated parents have joint physical custody, which is believed to be in the best interests of the child, as children can maintain personal relations and direct contact with both parents on a regular basis. The aim of the article is to examine joint physical custody, both from the perspective of the binding legal instruments that are relevant to joint physical custody, the Principles of European Family Law drafted by the CEFL, as well as the international research on this matter. The thesis underlying this paper is that joint physical custody is in itself neither good nor bad, and it depends on how the arrangements are managed by the parents. The paper includes a reflection on joint physical custody in the face of the COVID-19 crisis. The results indicate that in normal circumstances, joint physical custody demands broad communication, and now it times of crisis, we need over-communication about children and plans. Only a very tight and coordinated co-parenting plan make the whole family safer.

Keywords: joint physical custody, co-parenting, child welfare, COVID-19

Procedia PDF Downloads 201
13983 The Effect of Physical Biorhythm Cycle on Health-Related Fitness Factors

Authors: Leyli Khavari, Javad Yousefian

Abstract:

The aim of this study was to investigate the effect of physical biorhythm cycle on health-related fitness factors. For this purpose, 120 athlete and non-athlete male and female students were selected randomly and based on the level of physical activity divided into athletic and non-athletic groups. The exact date of birth and also when the subjects were in the positive, negative and critical physical biorhythm cycle was determined by calculation software biorhythm. The physical fitness factors tests, including Queens College Step Test, AAHPERD sit-ups; Wells stretch test and hand dynamometer. Students in three stages in positive, negative and critical physical cycle were tested. Data processing using SPSS software and statistical tests ANOVA with repeated measures and student t test was used for dependent. The results of this study showed that changes in physical fitness and physical biorhythm were not affected by changes in the 23-day physical cycle.

Keywords: AAHPERD test, biorhythm, physical cycle, Queens College Step Test

Procedia PDF Downloads 146
13982 Associations Between Executive Function and Physical Fitness in Preschool Children

Authors: Aleksander Veraksa, Alla Tvardovskaya, Margarita Gavrilova, Vera Yakupova, Martin Musálek

Abstract:

Considering the current agreement on the significance of executive functions, there is growing interest in determining factors that contribute to the development of these skills, especially during the preschool period. Although multiple studies have been focusing on links between physical activity, physical fitness and executive functions, this topic was more investigated in schoolchildren and adults than in preschoolers. The aim of the current study was to identify different levels of physical fitness among pre-schoolers, followed by an analysis of differences in their executive functions. Participants were 261 5-6-years old children. Inhibitory control and working memory were positively linked with physical fitness. Cognitive flexibility was not associated with physical fitness. The research findings are considered from neuropsychological grounds, Jean Piaget's theory of cognitive development, and the cultural-historical approach.

Keywords: cognitive flexibility, inhibitory control, physical activity, physical fitness, working memory.

Procedia PDF Downloads 66
13981 Decomposition of Third-Order Discrete-Time Linear Time-Varying Systems into Its Second- and First-Order Pairs

Authors: Mohamed Hassan Abdullahi

Abstract:

Decomposition is used as a synthesis tool in several physical systems. It can also be used for tearing and restructuring, which is large-scale system analysis. On the other hand, the commutativity of series-connected systems has fascinated the interest of researchers, and its advantages have been emphasized in the literature. The presentation looks into the necessary conditions for decomposing any third-order discrete-time linear time-varying system into a commutative pair of first- and second-order systems. Additional requirements are derived in the case of nonzero initial conditions. MATLAB simulations are used to verify the findings. The work is unique and is being published for the first time. It is critical from the standpoints of synthesis and/or design. Because many design techniques in engineering systems rely on tearing and reconstruction, this is the process of putting together simple components to create a finished product. Furthermore, it is demonstrated that regarding sensitivity to initial conditions, some combinations may be better than others. The results of this work can be extended for the decomposition of fourth-order discrete-time linear time-varying systems into lower-order commutative pairs, as two second-order commutative subsystems or one first-order and one third-order commutative subsystems.

Keywords: commutativity, decomposition, discrete time-varying systems, systems

Procedia PDF Downloads 71
13980 Individual Physiological and Psycho-Physical Response on Predicting Thermal Comfort in Transient Environments: A Literature Review

Authors: Fatemeh Deldarabdolmaleki, Nur Dalilah Dahlan, Farzad Hejazi

Abstract:

Human individual physiological and psycho-physical responses widely affect thermal comfort and preferences. They should be carefully researched to help improve the design and comfort of indoor environments. This paper aims to explore and test the degree and importance of individual physiological and psycho-physical differences, reviewing the most preferred, neutral, and comfortable temperature in previous studies conducted across the world. Basic individual physiological differences like gender, age, BMI and etc., have been the focus of this research. There is no unique consensus in the literature to date in regard to providing a universal thermal comfort formula that meets all individual physiological and psycho-physical needs. In order to achieve a balanced, thermally comfortable indoor environment, studying and evaluating individual needs in different parts of the world could be helpful. Even though personalized comfort systems in indoor environments sound promising, they might not be easily achieved in bigger office interiors, considering the cost and current open-plan office trends.

Keywords: thermal comfort, indoor environments, occupants' physiological response, occupants psycho-physical response

Procedia PDF Downloads 42
13979 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 453