Search results for: cyber villages
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 650

Search results for: cyber villages

470 Integrating Cyber-Physical System toward Advance Intelligent Industry: Features, Requirements and Challenges

Authors: V. Reyes, P. Ferreira

Abstract:

In response to high levels of competitiveness, industrial systems have evolved to improve productivity. As a consequence, a rapid increase in volume production and simultaneously, a customization process require lower costs, more variety, and accurate quality of products. Reducing time-cycle production, enabling customizability, and ensure continuous quality improvement are key features in advance intelligent industry. In this scenario, customers and producers will be able to participate in the ongoing production life cycle through real-time interaction. To achieve this vision, transparency, predictability, and adaptability are key features that provide the industrial systems the capability to adapt to customer demands modifying the manufacturing process through an autonomous response and acting preventively to avoid errors. The industrial system incorporates a diversified number of components that in advanced industry are expected to be decentralized, end to end communicating, and with the capability to make own decisions through feedback. The evolving process towards advanced intelligent industry defines a set of stages to empower components of intelligence and enhancing efficiency to achieve the decision-making stage. The integrated system follows an industrial cyber-physical system (CPS) architecture whose real-time integration, based on a set of enabler technologies, links the physical and virtual world generating the digital twin (DT). This instance allows incorporating sensor data from real to virtual world and the required transparency for real-time monitoring and control, contributing to address important features of the advanced intelligent industry and simultaneously improve sustainability. Assuming the industrial CPS as the core technology toward the latest advanced intelligent industry stage, this paper reviews and highlights the correlation and contributions of the enabler technologies for the operationalization of each stage in the path toward advanced intelligent industry. From this research, a real-time integration architecture for a cyber-physical system with applications to collaborative robotics is proposed. The required functionalities and issues to endow the industrial system of adaptability are identified.

Keywords: cyber-physical systems, digital twin, sensor data, system integration, virtual model

Procedia PDF Downloads 87
469 O.MG- It’s a Cyber-Enabled Fraud

Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt

Abstract:

This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.

Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud

Procedia PDF Downloads 128
468 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment

Authors: Atma Sahu

Abstract:

After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.

Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems

Procedia PDF Downloads 57
467 Contextualizing Household Food Security: A Comparison of Two Villages, Ambros and Maramanzhi, South Africa

Authors: Felicity Aphiwe Mkhongi, Walter Musakwa

Abstract:

Smallholder crop production is a defining factor in achieving food security, particularly at the household level. However, the number of abandoned arable fields is increasing in communal areas of South Africa. While substantial efforts have been devoted to addressing food insecurity in the country, ownership of arable land has not been supplemented with sustainable food production for households. This paper analyses household food security in the context of deagrarianization in two villages, Ambros (Eastern Cape) and Maramanzhi (Limpopo). Semi-structured questionnaires were administered to acquire both qualitative and quantitative data from 106 heads of households. The IBM SPSS Statistics 28.0 computer program was applied to complete data analysis. From the findings of the study, it was evident that compared to arable fields, a greater proportion of households own home-gardens with an average size of 2100m in Ambros and 3400m in Maramanzhi village. The majority of arable fields were abandoned, particularly in Ambros village. Household food access challenges were measured using the Household Food Insecurity Access Scale (HFIAS). This food security indicator revealed that the majority of households were mildly food insecure owing to food shortages emanating from insufficient monthly income and waning household crop production. Food was rated as a very important reason for engaging in cultivation in both villages of the study, but deagrarianization has eroded opportunities for increasing household crop production. Among other possible solutions, this study recommends that the government invest more in agriculture to allow for sustainable strategies that revive abandoned arable land, such as arable fields in communal areas of South Africa, as this could increase food production for households.

Keywords: cultivation, deagrarianization, food security, rural households, smallholder farmers

Procedia PDF Downloads 21
466 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 131
465 Involvement in Community Planning: The Case Study of Bang Nang Li Community, Samut Songkram Province, Thailand

Authors: Sakapas Saengchai, Vilasinee Jintalikhitdee, Mathinee Khongsatid, Nattapol Pourprasert

Abstract:

This paper studied the participation of people of the five villages of Bang Nang Li Community in Ampawa District, Samut Songkram Province, in designing community planning. The population was 2,755 villagers from the 5 villages with 349 people sampled. The level of involvement was measured by using Likert Five Scale for: preparing readiness of local people in the community, providing information for community and self analysis and learning, designing goals and directions for community development, designing strategic plans for community projects, and operating according to the plans. All process items reported a medium level of involvement except the item of preparing readiness for local people that presented the highest mean score. A test of a correlation between personal factors and level of involvement in designing the community planning unveiled no correlation between gender, age and career. Contrarily, the findings revealed that the villagers’ educational level and community membership status had a correlation with their level of involvement in designing the community planning.

Keywords: community development, community planning, people participation, educational level

Procedia PDF Downloads 504
464 Influence of Household Conservation Benefits on the Sustainability of Burunge Wildlife Management Areas in Tanzania

Authors: Gasto Lyakurwa, Glory Bakari, Edwin Sabuhoro

Abstract:

Wildlife Management Areas (WMAs) are established to promote and act as a remedy to the protection of wildlife resources outside the core protected area. WMAs aim to address issues of poverty, ensure sustainable use of wildlife resources, and share benefits from wildlife with the member villages. Successfully managed WMA in Tanzania improves local livelihood and conserves local biodiversity through tourism revenues and the protection of wildlife, respectively. Benefits accrued at household levels as a result of conservation activities in WMA can positively influence attitudes towards wildlife conservation. This research intends to assess the positive socio-economic impacts of WMA benefits on households in Burunge WMA in Tanzania. A questionnaire survey was conducted among four randomly selected villages in the ten villages forming the Burunge WMA to explore the household-level benefits of conservation activities. An example of a question item was whether household heads feel that they are benefiting from WMA and if they could remember some of the benefits. Interviews with leaders from WMA and member villages combined the survey to capture aspects of benefit distribution to households. A total of 80 households were used as samples of the recruited study sites. Moreover, the four WMA leaders and the eight village leaders of the respective study villages were interviewed. The study findings revealed that the shared benefit has mostly reached the community level and is less likely to reach the household level. Economic activities such as agriculture and livestock keeping were found to be more important for households than conservation-related economic activities. Conservation-related economic activities generate marginal direct benefits from WMA benefits to households, with ecotourism accounting for only 19.5%. The study also indicates that a direct share of financial benefits from WMA to households is lacking. Wildlife conservation benefits are less likely to reach household levels in WMAs, with the implication of reducing people's conservation attitudes and impeding community conservation success. WMA can utilize the finances from tourism fees and concessions to establish a Community Considerations Bank, which can lend money to some individuals at no or low interest rates. Considering the importance of education and health to households, WMA stands in a good position to provide health insurance premiums and student scholarships to motivate household participation in conservation activities. Community-based organizations and governments responsible for wildlife conservation should create mechanisms to channel conservation benefits to households in order to ensure the achievement of wildlife conservation objectives through WMA. These findings are expected to contribute to forming more WMAs with enhanced mechanisms for sharing conservation benefits to benefit the conservation of natural resources outside of the core protected areas. Motivated households are expected to respect wildlife and are less likely to engage in illegal activities such as poaching and harvesting conserved natural resources while coexisting with wildlife.

Keywords: social economic benefits, individuals, wildlife management areas, biodiversity, community

Procedia PDF Downloads 21
463 Praetical and Theoretical Study on Characteristic Landscape Construction of Tujia Village in Xiaguping, Shennongjia Forestry Distric

Authors: Tingting Chen, Shouliang Zhao

Abstract:

Compared with other regions, the construction for villages and towns in regions inhabited by minority nationality shall be deeply rooted in natural and cultural endowment in locality, and more importance shall be attached to building of characteristics. In this kind of area, landscape design is very important for its character and tradition. By empirical study in Shennongjia Area, some findings could be summarized as below. There are unique natural and cultural resources in Shennongjia Forestry District; during transformation on style and features of Tujia Village, Xiaguping, special style and features have been successfully shaped through 4 strategies: (1) highlighting Tujia Culture and architectural style in west region of Hubei Province; (2) merging with local natural environment; (3) introducing system of rural coordination architect; and (4) making great efforts to design and construct environmental embellishments with village and town symbols.

Keywords: rural coordination architect, special style and features, characteristic landscape, villages and towns in regions inhabited by minority nationality

Procedia PDF Downloads 248
462 Investigating Willingness to Pay for Water Services in a Newly Established Municipality in Malamulele, Vhembe District Municipality, South Africa

Authors: D. T. Chabalala

Abstract:

Currently South Africa is facing a triple challenge of poverty, unemployment and inequality. As such, communities have limited access to basic municipal services such as water, sanitation and electricity. Citizens such as those residing at Malamulele Township will be responsible to pay for the cost of water services that they consume instead of having the costs subsidised by the newly formed Municipality. The question on whether Malamulele residents would be willing to pay for water services provided for them need to be investigated. This study was conducted in Malamulele Township and surrounding villages. The article is based on a survey of 500 randomly selected households from township and villages surrounding Malamulele. The study uses the contingent valuation method to determine households’ willingness to pay for water services as well as the consequences they possibly will encounter in case their response is negative. The obtained results can be used by the Municipality and other Government Departments in order to better identify the affordable rates and the quantity of water service to be provided. Thus, it will make Municipality water supply services stable and sustainable. It will also be used as a tool to provide inform decisions about a range of infrastructure to enhance water supply systems.

Keywords: willingness to pay, contingent valuation method, water supply systems, Malamulele

Procedia PDF Downloads 206
461 Empowerment at the Grassroots: Impact of Participatory (in) Equalities in Policy Formulation and Recognition and Redistribution of Women at the Grassroots in India

Authors: Samanwita Paul

Abstract:

Borrowing from Kabeer’s framework of empowerment, participation of women at Panchayat level politics (grassroots level of politics in India) has been conceptualized as a resource in the study and the impact of the same in influencing the policies at the grassroots as an agency. The study attempts to examine such intricacies in the dynamics of participation and policy formulation at the Panchayat level and to assess its overall impact in altering the recognition and redistribution of women. A conscious attempt has been made to go beyond formal politics and consider participants of the informal political processes as subjects of the study. Primary surveys were conducted for data collection in 4 Panchayat villages (from Jalpaiguri district in West Bengal) of which 2 wards from each were selected based on the nature of reservation of the panchayat seats. In-depth interviews with the Panchayat members and an approximate of 80 voters from each of the villages were conducted. This has been further analyzed with the aid of appropriate statistical tools and narratives. Preliminary findings show that women from vulnerable sections tend to participate more in the political process since it offers them a means of negotiating with their vulnerabilities however in case of its impact on policy formulation, the effect of women’s participation does to appear to be as profound.

Keywords: recognition, redistribution, political participation, women

Procedia PDF Downloads 108
460 Factors Leading to Teenage Pregnancy in the Selected Villages of Mopani District, in Limpopo Province

Authors: Z. N. Salim, R. T. Lebese, M. S. Maputle

Abstract:

Background: The international community has been concerned about population growth for more than a century. Teenagers in sub-Saharan Africa continue to be at high risk of HIV infection, and this is exacerbated by poverty, whereby many teenagers in Africa come from disadvantaged families/background, which leads them to engage in sexual activities at an early age for survival hence leading to increased rate of teenage pregnancy. Purpose: The study sought to explore, describe and to identify the factors that lead to teenage pregnancy in the selected villages in Mopani District. Design: The study was conducted using a qualitative, explorative, descriptive and contextual approach. A non-probability purposive sampling approach was used. Researcher collected the data with the assistance of research assistant. Participants were interviewed and information was captured on a tape recorder and analysed using open coding and thereafter collected into main themes, themes and sub-themes. The researcher conducted four focus groups, Participants aged between 10-19 years of age. Results: The finding of the study revealed that there are several factors that is contributing to teenagers falling pregnant. Personal, intuitional, and cultural were identified to be the factors leading to teenage pregnancy.

Keywords: factors, leading, pregnancy, teenage

Procedia PDF Downloads 171
459 Compromising of Vacuum Sewerage System in Developing Regions and the Impact on Environmet

Authors: Abdelsalam Elawwad, Mostafa Ragab, Hisham Abdel-Halim

Abstract:

Leakage in sewerage system can cause groundwater and soil contamination in urban areas, especially in area with a high groundwater table. This is a serious problem in small villages in developing countries that rely on ground water as a source for irrigation and drinking purposes. In the developed countries, the recent trend in areas with low population densities is vacuum sewerage system, which is environmentally safer than conventional gravity system, protecting public health, preventing exfiltration to the ground water, very easily applied in a relatively short time and can cope with a faster expansion of the urbanized areas. The aim of this work is to assess the feasibility of using vacuum sewerage in developing country, such as Egypt. Knowledge of local conditions can determine the most suitable sewer system for a specific region. Technical, environmental and financial comparisons between conventional sewerage system and vacuum sewerage system were held using statistical analysis. Different conditions, such as population densities, geometry of area, and ground water depths were evaluated. Sample comprising of 30 Egyptian villages was selected, where a complete design for conventional sewerage system and vacuum sewerage system was done. Based on this study, it is recommended from the environmental point of view to construct the vacuum sewerage system in such villages with low population densities; however, it is not economic for all cases. From financial point of view, vacuum sewerage system was a good competitor to conventional systems in flat areas and areas with high groundwater table. The local market supplying of the construction equipment especially collection chambers will greatly affect the investment cost. Capacity building and social mobilization will also play a great role in sustainability of this system. At the end, it is noteworthy that environmental sustainability and public health are more important than the financial aspects.

Keywords: ground water, conventional system, vacuum system, statistics, cost, density, terrain

Procedia PDF Downloads 247
458 Research on the Spatial Evolution of Tourism-Oriented Rural Settlements: Take the Xiaochanfangyu Village, Dongshuichang Village, Maojiayu Village in Jixian County, Tianjin City as Examples

Authors: Yu Zhang, Jie Wu, Li Dong

Abstract:

Rural tourism is the service industry which regards the agricultural production, rural life, rural nature and cultural landscape as the tourist attraction. It aims to meet the needs of the city tourists such as country sightseeing, vacation, and leisure. According to the difference of the tourist resources, the rural settlements can be divided into different types: The type of tourism resources, scenic spot, and peri-urban. In the past ten years, the rural tourism has promoted the industrial transformation and economic growth in rural areas of China. And it is conducive to the coordinated development of urban and rural areas and has greatly improved the ecological environment and the standard of living for farmers in rural areas. At the same time, a large number of buildings and sites are built in the countryside in order to enhance the tourist attraction and the ability of tourist reception and also to increase the travel comfort and convenience, which has significant influence on the spatial evolution of the village settlement. This article takes the XiangYing Subdistrict, which is in JinPu District of Dalian in China as the exemplification and uses the technology of Remote Sensing (RS), Geographic Information System (GIS) and the technology of Landscape Spatial Analysis to study the influence of the rural tourism development in the rural settlement spaces in four steps. First, acquiring the remote sensing image data at different times of 8 administrative villages in the XiangYing Subdistrict, by using the remote sensing application EDRAS8.6; second, vectoring basic maps of XiangYing Subdistrict including its land-use map with the application of ArcGIS 9.3, associating with social and economic attribute data of rural settlements and analyzing on the rural evolution visually; third, quantifying the comparison of these patches in rural settlements by using the landscape spatial calculation application Fragstats 3.3 and analyzing on the evolution of the spatial structure of settlement in macro and medium scale; finally, summarizing the evolution characteristics and internal reasons of tourism-oriented rural settlements. The main findings of this article include: first of all, there is difference in the evolution of the spatial structure between the developing rural settlements and undeveloped rural settlements among the eight administrative villages; secondly, the villages relying on the surrounding tourist attractions, the villages developing agricultural ecological garden and the villages with natural or historical and cultural resources have different laws of development; then, the rural settlements whose tourism development in germination period, development period and mature period have different characteristics of spatial evolution; finally, the different evolution modes of the tourism-oriented rural settlement space have different influences on the protection and inheritance of the village scene. The development of tourism has a significant impact on the spatial evolution of rural settlement. The intensive use of rural land and natural resources is the fundamental principle to protect the rural cultural landscape and ecological environment as well as the critical way to improve the attraction of rural tourism and promote the sustainable development of countryside.

Keywords: landscape pattern, rural settlement, spatial evolution, tourism-oriented, Xiangying Subdistrict

Procedia PDF Downloads 253
457 Comparison Analysis of Fuzzy Logic Controler Based PV-Pumped Hydro and PV-Battery Storage Systems

Authors: Seada Hussen, Frie Ayalew

Abstract:

Integrating different energy resources, like solar PV and hydro, is used to ensure reliable power to rural communities like Hara village in Ethiopia. Hybrid power system offers power supply for rural villages by providing an alternative supply for the intermittent nature of renewable energy resources. The intermittent nature of renewable energy resources is a challenge to electrifying rural communities in a sustainable manner with solar resources. Major rural villages in Ethiopia are suffering from a lack of electrification, that cause our people to suffer deforestation, travel for long distance to fetch water, and lack good services like clinic and school sufficiently. The main objective of this project is to provide a balanced, stable, reliable supply for Hara village, Ethiopia using solar power with a pumped hydro energy storage system. The design of this project starts by collecting data from villages and taking solar irradiance data from NASA. In addition to this, geographical arrangement and location are also taken into consideration. After collecting this, all data analysis and cost estimation or optimal sizing of the system and comparison of solar with pumped hydro and solar with battery storage system is done using Homer Software. And since solar power only works in the daytime and pumped hydro works at night time and also at night and morning, both load will share to cover the load demand; this need controller designed to control multiple switch and scheduling in this project fuzzy logic controller is used to control this scenario. The result of the simulation shows that solar with pumped hydro energy storage system achieves good results than with a battery storage system since the comparison is done considering storage reliability, cost, storage capacity, life span, and efficiency.

Keywords: pumped hydro storage, solar energy, solar PV, battery energy storage, fuzzy logic controller

Procedia PDF Downloads 40
456 The Influence of Atmospheric Air on the Health of the Population Living in Oil and Gas Production Area in Aktobe Region, Kazakhstan

Authors: Perizat Aitmaganbet, Kerbez Kimatova, Gulmira Umarova

Abstract:

As a result of medical check-up conducted in the framework of this research study an evaluation of the health status of the population living in the oil-producing regions, namely Sarkul and Kenkiyak villages in Aktobe was examined. With the help of the Spearman correlation, the connection between the level of hazard chemical elements in the atmosphere and the health of population living in the regions of oil and gas industry was estimated. Background & Objective. The oil and gas resource-extraction industries play an important role in improving the economic conditions of the Republic of Kazakhstan, especially for the oil-producing administrative regions. However, environmental problems may adversely affect the health of people living in that area. Thus, the aim of the study is to evaluate the exposure to negative environmental factors of the adult population living in Sarkul and Kenkiyak villages, the oil and gas producing areas in the Aktobe region. Methods. After conducting medical check-up among the population of Sarkul and Kenkiyak villages. A single cross-sectional study was conducted. The population consisted of randomly sampled 372 adults (181 males and 191 females). Also, atmospheric air probes were taken to measure the level of hazardous chemical elements in the air. The nonparametric method of the Spearman correlation analysis was performed between the mean concentration of substances exceeding the Maximum Permissible Concentration and the classes of newly diagnosed diseases. Selection and analysis of air samples were carried out according to the developed research protocol; the qualitative-quantitative analysis was carried out on the Gas analyzer HANK-4 apparatus. Findings. The medical examination of the population identified the following diseases: the first two dominant were diseases of the circulatory and digestive systems, in the 3rd place - diseases of the genitourinary system, and the nervous system and diseases of the ear and mastoid process were on the fourth and fifth places. Moreover, significant pollution of atmospheric air by carbon monoxide (MPC-5,0 mg/m3), benzapyrene (MPC-1mg/m3), dust (MPC-0,5 mg/m3) and phenol (МРС-0,035mg/m3) were identified in places. Correlation dependencies between these pollutants of air and the diseases of the population were established, as a result of diseases of the circulatory system (r = 0,7), ear and mastoid process (r = 0,7), nervous system (r = 0,6) and digestive organs(r = 0,6 ); between the concentration of carbon monoxide and diseases of the circulatory system (r = 0.6), the digestive system(r = 0.6), the genitourinary system (r = 0.6) and the musculoskeletal system; between nitric oxide and diseases of the digestive system (r = 0,7) and the circulatory system (r = 0,6); between benzopyrene and diseases of the digestive system (r = 0,6), the genitourinary system (r = 0,6) and the nervous system (r = 0,4). Conclusion. The positive correlation was found between air pollution and the health of the population living in Sarkul and Kenkiyak villages. To enhance the reliability of the results we are going to continue this study further.

Keywords: atmospheric air, chemical substances, oil and gas, public health

Procedia PDF Downloads 84
455 The Impression of Adaptive Capacity of the Rural Community in the Indian Himalayan Region: A Way Forward for Sustainable Livelihood Development

Authors: Rommila Chandra, Harshika Choudhary

Abstract:

The value of integrated, participatory, and community based sustainable development strategies is eminent, but in practice, it still remains fragmentary and often leads to short-lived results. Despite the global presence of climate change, its impacts are felt differently by different communities based on their vulnerability. The developing countries have the low adaptive capacity and high dependence on environmental variables, making them highly susceptible to outmigration and poverty. We need to understand how to enable these approaches, taking into account the various governmental and non-governmental stakeholders functioning at different levels, to deliver long-term socio-economic and environmental well-being of local communities. The research assessed the financial and natural vulnerability of Himalayan networks, focusing on their potential to adapt to various changes, through accessing their perceived reactions and local knowledge. The evaluation was conducted by testing indices for vulnerability, with a major focus on indicators for adaptive capacity. Data for the analysis were collected from the villages around Govind National Park and Wildlife Sanctuary, located in the Indian Himalayan Region. The villages were stratified on the basis of connectivity via road, thus giving two kinds of human settlements connected and isolated. The study focused on understanding the complex relationship between outmigration and the socio-cultural sentiments of local people to not abandon their land, assessing their adaptive capacity for livelihood opportunities, and exploring their contribution that integrated participatory methodologies can play in delivering sustainable development. The result showed that the villages having better road connectivity, access to market, and basic amenities like health and education have a better understanding about the climatic shift, natural hazards, and a higher adaptive capacity for income generation in comparison to the isolated settlements in the hills. The participatory approach towards environmental conservation and sustainable use of natural resources were seen more towards the far-flung villages. The study helped to reduce the gap between local understanding and government policies by highlighting the ongoing adaptive practices and suggesting precautionary strategies for the community studied based on their local conditions, which differ on the basis of connectivity and state of development. Adaptive capacity in this study has been taken as the externally driven potential of different parameters, leading to a decrease in outmigration and upliftment of the human environment that could lead to sustainable livelihood development in the rural areas of Himalayas.

Keywords: adaptive capacity, Indian Himalayan region, participatory, sustainable livelihood development

Procedia PDF Downloads 86
454 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 10
453 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 374
452 Stackelberg Security Game for Optimizing Security of Federated Internet of Things Platform Instances

Authors: Violeta Damjanovic-Behrendt

Abstract:

This paper presents an approach for optimal cyber security decisions to protect instances of a federated Internet of Things (IoT) platform in the cloud. The presented solution implements the repeated Stackelberg Security Game (SSG) and a model called Stochastic Human behaviour model with AttRactiveness and Probability weighting (SHARP). SHARP employs the Subjective Utility Quantal Response (SUQR) for formulating a subjective utility function, which is based on the evaluations of alternative solutions during decision-making. We augment the repeated SSG (including SHARP and SUQR) with a reinforced learning algorithm called Naïve Q-Learning. Naïve Q-Learning belongs to the category of active and model-free Machine Learning (ML) techniques in which the agent (either the defender or the attacker) attempts to find an optimal security solution. In this way, we combine GT and ML algorithms for discovering optimal cyber security policies. The proposed security optimization components will be validated in a collaborative cloud platform that is based on the Industrial Internet Reference Architecture (IIRA) and its recently published security model.

Keywords: security, internet of things, cloud computing, stackelberg game, machine learning, naive q-learning

Procedia PDF Downloads 326
451 Ultra-Poor Revisited: A Case of Southern Thailand

Authors: Sirirat Taneerananon

Abstract:

This paper presents the results of a study of the ultra-poor in the south of Thailand, revisited after 10 years since the original study in 2000. The original study was conducted in four provinces. The first two namely Phatthalung and Nakorn were chosen to represent the Thai Buddhists and the others, Satun and Pattani were chosen to represent the Thai Muslims. For this study, only the results from the three provinces except Pattani are reported as it was difficult and dangerous to conduct fieldwork in Pattani due to the continued unrest in the area since 2005. The objectives of the study are to find out the changes of the poverty situation after 10 years and to see the impacts of the poverty reduction projects implemented by the government on the poor. The research methodology used both quantitative and qualitative methods. The same villages in the four provinces studied in 1999 were again chosen. In each village, five ultra-poor people and heads of the villages were interviewed. The results show that the poverty situation of the ultra-poor groups has not changed much since they lacked the basic key factor to get themselves out of poverty: The ownership of land. Their chronic poverty situation has been passed on from the last generation. In the province of Phatthalung, the ultra-poor have improved in terms of economic situation because of the big increase in the price of rubber. However, the same could not be said for other provinces. Even though the government’s projects have not reduced the poverty directly, the projects have significantly contributed to the improvement of the quality of life of the poor and the people in the areas.

Keywords: poverty, Southern Thailand, ultra-poor, social sustainability

Procedia PDF Downloads 185
450 Children Protection in the Digital Space

Authors: Beverly Komen

Abstract:

Online crimes have been on the rise in the recent days, especially with the hit of the covid-19 pandemic. The coronavirus pandemic has led to an unprecedented rise in screen time, this means more families are relying on technology and digital solutions to keep children learning, spending more time on the virtual platforms can leave children vulnerable to online abuse and exploitation. With ease access of affordable phones, internet, and increased online activities, all children are at risk of being abused online hence making the digital space unsafe for children. With these increased use of technology and its accessibility, children are at risk of facing challenges such as access to inappropriate content, online grooming, identity theft, cyber bullying, among other risks. The big question is; as we enjoy the benefits brought in by technology, how do we ensure that our children are save in this digital space? With the analysis of the current trends, there is a gap in knowledge on people’s understanding on child online protection and safety measures when using the digital space. A survey conducted among 50 parents in Nairobi in Kenya indicated that there is a gap in knowledge on online protection of children and over 50 % of the participants shared that for sure they have no idea on how to protect children online. This paper seeks to address the concept of child protection in the digital space and come up with viable solutions in protecting children from online vices.

Keywords: child protection, digital space, online risks, online grooming, cyber bulying, online child sexual exploitation, and abuse

Procedia PDF Downloads 156
449 Information Technology and the Challenges Facing the Legal Profession in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.

Keywords: information technology, challenges, legal profession, Nigeria

Procedia PDF Downloads 493
448 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 332
447 Challenges for Interface Designers in Designing Sensor Dashboards in the Context of Industry 4.0

Authors: Naveen Kumar, Shyambihari Prajapati

Abstract:

Industry 4.0 is the fourth industrial revolution that focuses on interconnectivity of machine to machine, human to machine and human to human via Internet of Things (IoT). Technologies of industry 4.0 facilitate communication between human and machine through IoT and forms Cyber-Physical Production System (CPPS). In CPPS, multiple shop floors sensor data are connected through IoT and displayed through sensor dashboard to the operator. These sensor dashboards have enormous amount of information to be presented which becomes complex for operators to perform monitoring, controlling and interpretation tasks. Designing handheld sensor dashboards for supervision task will become a challenge for the interface designers. This paper reports emerging technologies of industry 4.0, changing context of increasing information complexity in consecutive industrial revolutions and upcoming design challenges for interface designers in context of Industry 4.0. Authors conclude that information complexity of sensor dashboards design has increased with consecutive industrial revolutions and designs of sensor dashboard causes cognitive load on users. Designing such complex dashboards interfaces in Industry 4.0 context will become main challenges for the interface designers.

Keywords: Industry4.0, sensor dashboard design, cyber-physical production system, Interface designer

Procedia PDF Downloads 101
446 The Dual Role of the Internet in the Development of Local Communities Through Ecotourism and Cultural Assimilation in Iran

Authors: Haniyeh Sameie

Abstract:

In the process of globalization, geographical boundaries gradually lose their importance, and ethnic, local, and regional cultures are integrated with each other and even marginalized. Globalization has many manifestations and aspects, including economic, political, social, etc., but this paper has focused on the cultural aspect of globalization. From this point of view, one of the important issues that have always been raised is the assimilation of diverse and plural cultures, which are gradually disappearing and destroyed in the onslaught of global culture and are dissolved in global culture. In the postmodern paradigm, the tools of the globalized world can be used to preserve and strengthen cultural diversity. For example, the Internet, as a globalization tool, can play an important role in preserving and recognizing local cultures. In today's world, the world nations and ethnic groups are trying to revive their specific and native cultures in different ways in opposition to the rising cultural assimilation and challenge the globalization of culture. One of the manifestations of these actions is addressing the issue of tourism and, specifically, eco-tourism, which is being developed in Iran as well as in other parts of the world, relying on the powerful tool of globalization, the Internet. Considering the significant growth of the ecotourism industry in Iran in recent years, this paper focuses on the role of the Internet in the development of ecotourism in Iran as one of the manifestations of tourism in recent decades and how to preserve and survive diverse local cultures and strengthen local communities against global culture through it. One of the major challenges in the development of communication technology in Iran in the last decade has been the debate over the necessity or non-necessity of access to high-speed Internet in the villages of Iran. Some believe that accessing the broadband internet in the villages may lead to the disappearance of local cultures and can facilitate the spread of western culture among villagers. On the other hand, the speed of expansion of ecotourism in Iran in the last ten years is owed to the development of the Internet in villages. In this regard, we pay attention to the dual role of the Internet in cultural assimilation and, at the same time, the platform that the online space has created for the growth and development of ecotourism accommodations as a source of stable income for local communities, focusing on the Iranian experience in the recent decade.

Keywords: tourism, globalization, internet, ecotourism in Iran, cultural assimilation

Procedia PDF Downloads 50
445 Ant and Spider Diversity in a Rural Landscape of the Vhembe Biosphere, South Africa

Authors: Evans V. Mauda, Stefan H. Foord, Thinandavha C. Munyai

Abstract:

The greatest threat to biodiversity is a loss of habitat through landscape fragmentation and attrition. Land use changes are therefore among the most immediate drivers of species diversity. Urbanization and agriculture are the main drivers of habitat loss and transformation in the Savanna biomes of South Africa. Agricultural expansion and the intensification in particular, take place at the expense of biodiversity and will probably be the primary driver of biodiversity loss in this century. Arthropods show measurable behavioural responses to changing land mosaics at the smallest scale and heterogeneous environments are therefore predicted to support more complex and diverse biological assemblages. Ants are premier soil turners, channelers of energy and dominate insect fauna, while spiders are a mega-diverse group that can regulate other invertebrate populations. This study aims to quantify the response of these two taxa in a rural-urban mosaic of a rapidly developing communal area. The study took place in and around two villages in the north-eastern corner of South Africa. Two replicates for each of the dominant land use categories, viz. urban settlements, dryland cultivation and cattle rangelands, were set out in each of the villages and sampled during the dry and wet seasons for a total of 2 villages × 3 land use categories × 2 seasons = 24 assemblages. Local scale variables measured included vertical and horizontal habitat structure as well as structural and chemical composition of the soil. Ant richness was not affected by land use but local scale variables such as vertical vegetation structure (+) and leaf litter cover (+), although vegetation complexity at lower levels was negatively associated with ant richness. However, ant richness was largely shaped by regional and temporal processes invoking the importance of dispersal and historical processes. Spider species richness was mostly affected by land use and local conditions highlighting their landscape elements. Spider richness did not vary much between villages and across seasons and seems to be less dependent on context or history. There was a considerable amount of variation in spider richness that was not explained and this could be related to factors which were not measured in this study such as temperature and competition. For both ant and spider assemblages the constrained ordination explained 18 % of variation in these taxa. Three environmental variables (leaf litter cover, active carbon and rock cover) were important in explaining ant assemblage structure, while two (sand and leaf litter cover) were important for spider assemblage structure. This study highlights the importance of disturbance (land use activities) and leaf litter with the associated effects on ant and spider assemblages across the study area.

Keywords: ants, assemblages, biosphere, diversity, land use, spiders, urbanization

Procedia PDF Downloads 245
444 The Role of Temporary Migration as Coping Mechanism of Weather Shock: Evidence from Selected Semi-Arid Tropic Villages in India

Authors: Kalandi Charan Pradhan

Abstract:

In this study, we investigate does weather variation determine temporary labour migration using 210 sample households from six Semi-Arid Tropic (SAT) villages for the period of 2005-2014 in India. The study has made an attempt to examine how households use temporary labour migration as a coping mechanism to minimise the risk rather than maximize the utility of the households. The study employs panel Logit regression model to predict the probability of household having at least one temporary labour migrant. As per as econometrics result, it is found that along with demographic and socioeconomic factors; weather variation plays an important role to determine the decision of migration at household level. In order to capture the weather variation, the study uses mean crop yield deviation over the study periods. Based on the random effect logit regression result, the study found that there is a concave relationship between weather variation and decision of temporary labour migration. This argument supports the theory of New Economics of Labour Migration (NELM), which highlights the decision of labour migration not only maximise the households’ utility but it helps to minimise the risks.

Keywords: temporary migration, socioeconomic factors, weather variation, crop yield, logit estimation

Procedia PDF Downloads 191
443 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 358
442 An Effective Preventive Program of HIV/AIDS among Hill Tribe Youth, Thailand

Authors: Tawatchai Apidechkul

Abstract:

This operational research was conducted and divided into two phases: the first phase aimed to determine the risk behaviors used a cross-sectional study design, following by the community participatory research design to develop the HIV/AIDS preventive model among the Akha youths. The instruments were composed of completed questionnaires and assessment forms that were tested for validity and reliability before use. Study setting was Jor Pa Ka and Saen Suk Akha villages, Mae Chan District, Chiang Rai, Thailand. Study sample were the Akha youths lived in the villages. Means and chi-square test were used for the statistical testing. Results: Akha youths in the population mobilization villages live in agricultural families with low income and circumstance of narcotic drugs. The average age was 16 (50.00%), 51.52% Christian, 48.80% completed secondary school, 43.94% had annual family income of 30,000-40,000 baht. Among males, 54.54% drank, 39.39% smoked, 7.57% used amphetamine, first sexual intercourse reported at 14 years old, 50.00% had 2-5 partners, 62.50% had unprotected sex (no-condom). Reasons of unprotected sex included not being able to find condom, unawareness of need to use condoms, and dislike. 28.79% never been received STI related information, 6.06% had STI. Among females, 15.15% drank, 28.79% had sexual intercourse and had first sexual intercourse less than 15 year old. 40.00% unprotected sex (no-condom), 10.61% never been received STI related information, and 4.54% had STI. The HIV/AIDS preventive model contained two components. Peer groups among the youths were built around interests in sports. Improving knowledge would empower their capability and lead to choices that would result in HIV/AIDS prevention. The empowering model consisted of 4 courses: a. human reproductive system and its hygiene, b. risk-avoid skills, family planning, and counseling techniques, c. HIV/AIDS and other STIs, d. drugs and related laws and regulations. The results of the activities found that youths had a greater of knowledge and attitude levels for HIV/AIDS prevention with statistical significance (χ2-τεστ= 12.87, p-value= 0.032 and χ2-τεστ= 9.31, p-value<0.001 respectively). A continuous and initiative youths capability development program is the appropriate process to reduce the spread of HIV/AIDS in youths, particularly in the population who have the specific of language and culture.

Keywords: AIV/AIDS, preventive program, effective, hill tribe

Procedia PDF Downloads 339
441 Smart Sensor Data to Predict Machine Performance with IoT-Based Machine Learning and Artificial Intelligence

Authors: C. J. Rossouw, T. I. van Niekerk

Abstract:

The global manufacturing industry is utilizing the internet and cloud-based services to further explore the anatomy and optimize manufacturing processes in support of the movement into the Fourth Industrial Revolution (4IR). The 4IR from a third world and African perspective is hindered by the fact that many manufacturing systems that were developed in the third industrial revolution are not inherently equipped to utilize the internet and services of the 4IR, hindering the progression of third world manufacturing industries into the 4IR. This research focuses on the development of a non-invasive and cost-effective cyber-physical IoT system that will exploit a machine’s vibration to expose semantic characteristics in the manufacturing process and utilize these results through a real-time cloud-based machine condition monitoring system with the intention to optimize the system. A microcontroller-based IoT sensor was designed to acquire a machine’s mechanical vibration data, process it in real-time, and transmit it to a cloud-based platform via Wi-Fi and the internet. Time-frequency Fourier analysis was applied to the vibration data to form an image representation of the machine’s behaviour. This data was used to train a Convolutional Neural Network (CNN) to learn semantic characteristics in the machine’s behaviour and relate them to a state of operation. The same data was also used to train a Convolutional Autoencoder (CAE) to detect anomalies in the data. Real-time edge-based artificial intelligence was achieved by deploying the CNN and CAE on the sensor to analyse the vibration. A cloud platform was deployed to visualize the vibration data and the results of the CNN and CAE in real-time. The cyber-physical IoT system was deployed on a semi-automated metal granulation machine with a set of trained machine learning models. Using a single sensor, the system was able to accurately visualize three states of the machine’s operation in real-time. The system was also able to detect a variance in the material being granulated. The research demonstrates how non-IoT manufacturing systems can be equipped with edge-based artificial intelligence to establish a remote machine condition monitoring system.

Keywords: IoT, cyber-physical systems, artificial intelligence, manufacturing, vibration analytics, continuous machine condition monitoring

Procedia PDF Downloads 63