Search results for: integrity pact
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 729

Search results for: integrity pact

459 Adsorption and Desorption of Emerging Water Contaminants on Activated Carbon Fabrics

Authors: S. Delpeux-Ouldriane, M. Gineys, S. Masson, N. Cohaut, L. Reinert, L. Duclaux, F. Béguin

Abstract:

Nowadays, a wide variety of organic contaminants are present at trace concentrations in wastewater effluents. In order to face these pollution problems, the implementation of the REACH European regulation has defined lists of targeted pollutants to be eliminated selectively in water. It therefore implies the development of innovative and more efficient remediation techniques. In this sense, adsorption processes can be successfully used to achieve the removal of organic compounds in waste water treatment processes, especially at low pollutant concentration. Especially, activated carbons possessing a highly developed porosity demonstrate high adsorption capacities. More specifically, carbon cloths show high adsorption rates, an easily handling, a good mechanical integrity and regeneration potentialities. When loaded with pollutants, these materials can be indeed regenerated using an electrochemical polarization.

Keywords: nanoporous carbons, activated carbon cloths, adsorption, micropollutants, emerging contaminants, regeneration, electrochemistry

Procedia PDF Downloads 368
458 A Study of Lurking Behavior: The Desire Perspective

Authors: Hsiu-Hua Cheng, Chi-Wei Chen

Abstract:

Lurking behaviour is common in information-seeking oriented communities. Transferring users with lurking behaviour to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behaviour in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behaviour. This study offers an approach to understanding the determinants of lurking behaviour in online contexts.

Keywords: lurking behaviour, the ecological cognition framework, Information-seeking oriented virtual communities, desire

Procedia PDF Downloads 246
457 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 53
456 Surface Integrity Improvement for Selective Laser Melting (SLM) Additive Manufacturing of C300 Parts Using Ball Burnishing

Authors: Adrian Travieso Disotuar, J. Antonio Travieso Rodriguez, Ramon Jerez Mesa, Montserrat Vilaseca

Abstract:

The effect of the non-vibration-assisted and vibration-assisted ball burnishing on both the surface and mechanical properties of C300 obtained by Selective Laser Melting additive manufacturing technology is studied in this paper. Different vibration amplitudes preloads, and burnishing strategies were tested. A topographical analysis was performed to determine the surface roughness of the different conditions. Besides, micro tensile tests were carried out in situ on Scanning Electron Microscopy to elucidate the post-treatment effects on damaging mechanisms. Experiments show that vibration-assisted ball burnishing significantly enhances mechanical properties compared to the non-vibration-assisted method. Moreover, it was found that the surface roughness was significantly improved with respect to the reference surface.

Keywords: additive manufacturing, ball burnishing, mechanical properties, metals, surface roughness

Procedia PDF Downloads 38
455 Research of Acoustic Propagation within Marine Riser in Deepwater Drilling

Authors: Xiaohui Wang, Zhichuan Guan, Roman Shor, Chuanbin Xu

Abstract:

Early monitoring and real-time quantitative description of gas intrusion under the premise of ensuring the integrity of the drilling fluid circulation system will greatly improve the accuracy and effectiveness of deepwater gas-kick monitoring. Therefore, in order to study the propagation characteristics of ultrasonic waves in the gas-liquid two-phase flow within the marine riser, in this paper, a numerical simulation method of ultrasonic propagation in the annulus of the riser was established, and the credibility of the numerical analysis was verified by the experimental results of the established gas intrusion monitoring simulation experimental device. The numerical simulation can solve the sound field in the gas-liquid two-phase flow according to different physical models, and it is easier to realize the single factor control. The influence of each parameter on the received signal can be quantitatively investigated, and the law with practical guiding significance can be obtained.

Keywords: gas-kick detection, ultrasonic, void fraction, coda wave velocity

Procedia PDF Downloads 126
454 Non-Steroidal Microtubule Disrupting Analogues Induce Programmed Cell Death in Breast and Lung Cancer Cell Lines

Authors: Marcel Verwey, Anna M. Joubert, Elsie M. Nolte, Wolfgang Dohle, Barry V. L. Potter, Anne E. Theron

Abstract:

A tetrahydroisoquinolinone (THIQ) core can be used to mimic the A,B-ring of colchicine site-binding microtubule disruptors such as 2-methoxyestradiol in the design of anti-cancer agents. Steroidomimeric microtubule disruptors were synthesized by introducing C'2 and C'3 of the steroidal A-ring to C'6 and C'7 of the THIQ core and by introducing a decorated hydrogen bond acceptor motif projecting from the steroidal D-ring to N'2. For this in vitro study, four non-steroidal THIQ-based analogues were investigated and comparative studies were done between the non-sulphamoylated compound STX 3450 and the sulphamoylated compounds STX 2895, STX 3329 and STX 3451. The objective of this study was to investigate the modes of cell death induced by these four THIQ-based analogues in A549 lung carcinoma epithelial cells and metastatic breast adenocarcinoma MDA-MB-231 cells. Cytotoxicity studies to determine the half maximal growth inhibitory concentrations were done using spectrophotometric quantification via crystal violet staining and lactate dehydrogenase (LDH) assays. Microtubule integrity and morphologic changes of exposed cells were investigated using polarization-optical transmitted light differential interference contrast microscopy, transmission electron microscopy and confocal microscopy. Flow cytometric quantification was used to determine apoptosis induction and the effect that THIQ-based analogues have on cell cycle progression. Signal transduction pathways were elucidated by quantification of the mitochondrial membrane integrity, cytochrome c release and caspase 3, -6 and -8 activation. Induction of autophagic cell death by the THIQ-based analogues was investigated by morphological assessment of fluorescent monodansylcadaverine (MDC) staining of acidic vacuoles and by quantifying aggresome formation via flow cytometry. Results revealed that these non-steroidal microtubule disrupting analogues inhibited 50% of cell growth at nanomolar concentrations. Immunofluorescence microscopy indicated microtubule depolarization and the resultant mitotic arrest was further confirmed through cell cycle analysis. Apoptosis induction via the intrinsic pathway was observed due to depolarization of the mitochondrial membrane, induction of cytochrome c release as well as, caspase 3 activation. Potential involvement of programmed cell death type II was observed due to the presence of acidic vacuoles and aggresome formation. Necrotic cell death did not contribute significantly, indicated by stable LDH levels. This in vitro study revealed the induction of the intrinsic apoptotic pathway as well as possible involvement of autophagy after exposure to these THIQ-based analogues in both MDA-MB-231- and A549 cells. Further investigation of this series of anticancer drugs still needs to be conducted to elucidate the temporal, mechanistic and functional crosstalk mechanisms between the two observed programmed cell deaths pathways.

Keywords: apoptosis, autophagy, cancer, microtubule disruptor

Procedia PDF Downloads 221
453 Consideration of Failed Fuel Detector Location through Computational Flow Dynamics Analysis on Primary Cooling System Flow with Two Outlets

Authors: Sanghoon Bae, Hanju Cha

Abstract:

Failed fuel detector (FFD) in research reactor is a very crucial instrument to detect the anomaly from failed fuels in the early stage around primary cooling system (PCS) outlet prior to the decay tank. FFD is considered as a mandatory sensor to ensure the integrity of fuel assemblies and mitigate the consequence from a failed fuel accident. For the effective function of FFD, the location of them should be determined by contemplating the effect from coolant flow around two outlets. For this, the analysis on computational flow dynamics (CFD) should be first performed how the coolant outlet flow including radioactive materials from failed fuels are mixed and discharged through the outlet plenum within certain seconds. The analysis result shows that the outlet flow is well mixed regardless of the position of failed fuel and ultimately illustrates the effect of detector location.

Keywords: computational flow dynamics (CFD), failed fuel detector (FFD), fresh fuel assembly (FFA), spent fuel assembly (SFA)

Procedia PDF Downloads 221
452 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 352
451 Antimicrobial Properties of Copper in Gram-Negative and Gram-Positive Bacteria

Authors: Travis J. Meyer, Jasodra Ramlall, Phyo Thu, Nidhi Gadura

Abstract:

For centuries humans have used the antimicrobial properties of copper to their advantage. Yet, after all these years the underlying mechanisms of copper mediated cell death in various microbes remain unclear. We had explored the hypothesis that copper mediated increased levels of lipid peroxidation in the membrane fatty acids is responsible for increased killing inEscherichia coli. In this study we show that in both gram positive (Staphylococcus aureus) and gram negative (Pseudomonas aeruginosa) bacteria there is a strong correlation between copper mediated cell death and increased levels of lipid peroxidation. Interestingly, the non-spore forming gram positive bacteria as well as gram negative bacteria show similar patterns of cell death, increased levels of lipid peroxidation, as well as genomic DNA degradation, however there is some difference inloss in membrane integrity upon exposure to copper alloy surface.

Keywords: antimicrobial, copper, gram positive, gram negative

Procedia PDF Downloads 444
450 Destruction of History and the Syrian Conflict: Upholding the Cultural Integrity of Dura Europos

Authors: Justine A. Lloyd

Abstract:

Since the onset of the Syrian Civil War in 2011, the ancient city of Dura-Europos has faced widespread destruction and looting. The site is one of many places in the country the terrorist group ISIS has specifically targeted, allegedly due to its particular representations of Syrian history and culture. However, looted art and artifacts are the extremist group’s second largest source of income, only after oil. The protection of this site is important to both academics and the millions who have called Syria a home, as it aids in the nation’s sense of identity, reveals developments in the arts, and contributes to humanity’s collective history. At a time when Syria’s culture is being flattened, this sense of cultural expression is especially important to maintain. Creating an awareness of the magnitude of the issue at hand begins with an examination of the rich history of the ancient fortress city. Located on the western bank of the Euphrates River, Dura-Europos contains artifacts dating back to the Hellenistic, Parthian, and Roman periods. Though a great deal of the art and artifacts have remained safe in institutions such as the National Museum of Damascus and the Yale University Art Gallery, hundreds of looting pits and use of heavy machinery on the site has severely set back the investigative progress made by archaeologists over the last century, as well as the prospect of future excavation. Further research draws on the current destruction of the site by both ISIS and opportunists involved with the black market. Because Dura-Europos is located in a war stricken region, the acquisition of data and possibility of immediate action is particularly challenging. Resources gained from local reports, in addition to technology such as satellite imagery, however, have provided a firm starting point for the evaluation of the state of the site. The Syrian Ministry of Culture, UNESCO, and numerous Syrian and global organizations provide insight into the historic city’s past, present issues, and future plans to ensure that the cultural integrity of the site is upheld. Though over seventy percent of Dura-Europos has been completely decimated, this research challenges the notion that physically destroyed sites are lost forever. This paper assesses preventative measures that can take place to ensure the preservation of the site’s art and architecture, including examining possible solutions to the damage, such as digital reconstruction, replication, and distribution of information through exhibitions and other forms of publically accessible information. In order to investigate any possible retribution, research also includes the necessary information pertaining the global laws and regulations dealing with cultural heritage, as it directly affects the ways in which this situation can be dealt with. With the countless experts and citizens dedicated to the importance of cultural heritage, the prospect of honoring and valuing elements of Dura-Europos is possible—whether physically preserved or otherwise.

Keywords: antiquities law, archaeological sites, restitution, Syrian Civil War

Procedia PDF Downloads 141
449 Design and Optimization of a Customized External Fixation Device for Lower Limb Injuries

Authors: Mohammed S. Alqahtani, Paulo J. Bartolo

Abstract:

External fixation is a common technique for the treatment and stabilization of bone fractures. Different designs have been proposed by companies and research groups, but all of them present limitations such as high weight, not comfortable to use, and not customized to individual patients. This paper proposes a lightweight customized external fixator, overcoming some of these limitations. External fixators are designed using a set of techniques such as medical imaging, CAD modelling, finite element analysis, and full factorial design of experiments. Key design parameters are discussed, and the optimal set of parameters is used to design the final external fixator. Numerical simulations are used to validate design concepts. Results present an optimal external fixation design with weight reduction of 13% without compromising its stiffness and structural integrity. External fixators are also designed to be additively manufactured, allowing to develop a strategy for personalization.

Keywords: computer-aided design modelling, external fixation, finite element analysis, full factorial, personalization

Procedia PDF Downloads 124
448 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 352
447 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 441
446 The Effect of Topically Aloe vera Gel on Cutaneous Wound Healing

Authors: Nasrin Takzaree, Abbas Hadjiakhoondi, Gholamreza Hassanzadeh, Mohammadreza Rouini

Abstract:

Background: Wound healing and repair is a normal reaction to injury which results in restoration of tissue integrity. Rate of wound healing is affected by various factors, such as nutrition, vitamins, hormones. Method: The aim of this study was to evaluate the effect of Aloe vera mucilage on wound healing. Mucilage was extracted from leaves, then homogenize, filtered and concentrated. Some creams were prepared with different concentrations of mucilage 95%. In this study 63 male albino rats, weighing 250–300 gr were used. Incision wounds (10 mm) were made on the shaved and cleaned back of rat necks. Wounds of case groups (group I & group II) were treated with aloe vera mucilage which were administered one time daily another group two times daily. Results: In order to evaluate wound healing, various parameters such as wound diameter, percentage of healing, duration of healing. Were considered. Conclusion: The results of this study confirmed that aloe vera mucilage is a potent healing and can be used in wound healing process.

Keywords: Aloe vera, wound healing, open skin wound, healing process

Procedia PDF Downloads 316
445 A Study on the Functional Safety Analysis of Stage Control System Based on International Electronical Committee 61508-2

Authors: Youn-Sung Kim, Hye-Mi Kim, Sang-Hoon Seo, Jaden Cha

Abstract:

This International standard IEC 61508 sets out a generic approach for all safety lifecycle activities for systems comprised of electrical/electronic/programmable electronic (E/E/PE) elements that are used to perform safety functions. The control unit in stage control system is safety related facilities to control state and speed for stage system running, and it performs safety-critical function by stage control system. The controller unit is part of safety loops corresponding to the IEC 61508 and classified as logic part in the safety loop. In this paper, we analyze using FMEDA (Failure Mode Effect and Diagnostic Analysis) to verification for fault tolerance methods and functional safety of control unit. Moreover, we determined SIL (Safety Integrity Level) for control unit according to the safety requirements defined in IEC 61508-2 based on an analyzed functional safety.

Keywords: safety function, failure mode effect, IEC 61508-2, diagnostic analysis, stage control system

Procedia PDF Downloads 245
444 Production of a Sustainable Slow-Release Urea Fertilizer Using Starch and Poly-Vinyl Alcohol

Authors: A. M. H. Shokry, N. S. M. El-Tayeb

Abstract:

The environmental impacts caused by fertilizers call for the adaptation of more sustainable technologies in order to increase agricultural production and reduce pollution due to high nutrient emissions. One particular technique has been to coat urea fertilizer granules with less-soluble chemicals that permit the gradual release of nutrients in a slow and controlled manner. The aim of this research is to develop a biodegradable slow-release fertilizer (SRF) with materials that come from sustainable sources; starch and polyvinyl alcohol (PVA). The slow-release behavior and water retention capacity of the coated granules were determined. In addition, the aqueous release and absorbency rates were also tested. Results confirmed that the release rate from coated granules was slower than through plain membranes; and that the water absorption capacity of the coated urea decreased as PVA content increased. The SRF was also tested and gave positive results that confirmed the integrity of the product.

Keywords: biodegradability, nitrogen-use efficiency, poly-vinyl alcohol, slow-release fertilizer, sustainability

Procedia PDF Downloads 176
443 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy

Authors: Andrei Bogdan Stanescu, Robert Stana

Abstract:

Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.

Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy

Procedia PDF Downloads 50
442 Comparative Study on Different Type of Shear Connectors in Composite Slabs

Authors: S. Subrmanian, A. Siva, R. Raghul

Abstract:

In modern construction industry, usage of cold form composite slab has its scope widely due to its light weight, high structural properties and economic factor. To enhance the structural integrity, mechanical interlocking or frictional interlocking was introduced. The role of mechanical interlocking or frictional interlocking is to increase the longitudinal shear between the profiled sheet and concrete. This paper deals with the experimental evaluation of three types of mechanical interlocking devices namely normal stud shear connector, J-Type shear connector, U-Type shear connector. An attempt was made to evolve the shear connector which can be suitable for the composite slab as an interlocking device. Totally six number of composite slabs have been experimented with three types of shear connectors and comparison study is made. The outcome was compared with numerical model was created by ABAQUS software and analyzed for comparative purpose. The result was U-Type shear connector provided better performance and resistance.

Keywords: composite slabs, shear connector, end slip, longitudinal shear

Procedia PDF Downloads 294
441 Substitution of Silver-Thiosulfate (STS) with Some Essential Oils on Vase-Life of Cut Carnation cv. Liberty

Authors: Mohammad Bagher Hassanpouraghdam, Mohammad Ali Aazami Mavaloo

Abstract:

Due to the huge side-effects of chemicals; essential oils have been considered as suitable alternatives for keeping the vase-life of cut flowers mainly owing to the availability and environment-friend nature of these bio-chemicals. In the present experiment, 50% substitution of STS was achieved and tested on cut carnation flowers cv. Liberty by using the essential oils from four plants; Satureja sahendica Bornm., Echinophora platyloba DC., Tanacetum balsamita L. and Cupressus arizonica Greene., as CRD with five treatments and 3 replications. Vase-life and flower diameter were affected with 50% substitution of STS by essential oils from C. arizonica and T. balsamita. Membrane stability index, Malondialdehyde (MDA) content and Hydrogen peroxide (H2O2) amounts were affected by the substitution treatments as well. The main preservative effect belonged to the substitution with C. arizonica. So that, 50% STS substitution with Cupressus oil holds the highest membrane integrity and the least data for MDA and H2O2 content.

Keywords: Carnation, essential oil, Membrane stability index (MSI), vase life

Procedia PDF Downloads 467
440 An AFM Approach of RBC Micro and Nanoscale Topographic Features During Storage

Authors: K. Santacruz-Gomez, E. Silva-Campa, S. Álvarez-García, V. Mata-Haro, D. Soto-Puebla, M. Pedroza-Montero

Abstract:

Blood gamma irradiation is the only available method to prevent transfusion-associated graft versus host disease (TA-GVHD). However, when blood is irradiated, determine blood shelf time is crucial. Non-irradiated blood has a self-time from 21 to 35 days when is preserved with an anticoagulated solution and stored at 4°C. During their storage, red blood cells (RBC) undergo a series of biochemical, biomechanical and molecular changes involving what is known as storage lesion (SL). SL include loss of structural integrity of RBC, a decrease of 2,3-diphosphatidylglyceric acid levels, and an increase of both ion potassium concentration and hemoglobin (Hb). On the other hand, Atomic force Microscopy (AFM) represents a versatile tool for a nano-scale high-resolution topographic analysis in biological systems. In order to evaluate SL in irradiated and non-irradiated blood, RBC topography and morphometric parameters were obtained from an AFM XE-BIO system. Cell viability was followed using flow cytometry. Our results showed that early markers as nanoscale roughness, allow us to evaluate blood quality since another perspective.

Keywords: AFM, blood γ-irradiation, roughness, storage lesion

Procedia PDF Downloads 505
439 BTG-BIBA: A Flexibility-Enhanced Biba Model Using BTG Strategies for Operating System

Authors: Gang Liu, Can Wang, Runnan Zhang, Quan Wang, Huimin Song, Shaomin Ji

Abstract:

Biba model can protect information integrity but might deny various non-malicious access requests of the subjects, thereby decreasing the availability in the system. Therefore, a mechanism that allows exceptional access control is needed. Break the Glass (BTG) strategies refer an efficient means for extending the access rights of users in exceptional cases. These strategies help to prevent a system from stagnation. An approach is presented in this work for integrating Break the Glass strategies into the Biba model. This research proposes a model, BTG-Biba, which provides both an original Biba model used in normal situations and a mechanism used in emergency situations. The proposed model is context aware, can implement a fine-grained type of access control and primarily solves cross-domain access problems. Finally, the flexibility and availability improvement with the use of the proposed model is illustrated.

Keywords: Biba model, break the glass, context, cross-domain, fine-grained

Procedia PDF Downloads 514
438 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 70
437 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 428
436 Post-Earthquake Damage Detection Using System Identification with a Pair of Seismic Recordings

Authors: Lotfi O. Gargab, Ruichong R. Zhang

Abstract:

A wave-based framework is presented for modeling seismic motion in multistory buildings and using measured response for system identification which can be utilized to extract important information regarding structure integrity. With one pair of building response at two locations, a generalized model response is formulated based on wave propagation features and expressed as frequency and time response functions denoted, respectively, as GFRF and GIRF. In particular, GIRF is fundamental in tracking arrival times of impulsive wave motion initiated at response level which is dependent on local model properties. Matching model and measured-structure responses can help in identifying model parameters and infer building properties. To show the effectiveness of this approach, the Millikan Library in Pasadena, California is identified with recordings of the Yorba Linda earthquake of September 3, 2002.

Keywords: system identification, continuous-discrete mass modeling, damage detection, post-earthquake

Procedia PDF Downloads 346
435 Examining the Racialisation of White Workers in Rural Louisiana as a Technology of Capitalist Management and Control

Authors: Kendall Artz

Abstract:

In the 1950s, a wave of violent labor unrest shook a small town in south-western Louisiana leading to the racialisation of workers—previously considered white—as ‘mixed-race’ or, in local terms, ‘Redbone.’ This paper examines why the group known as ‘Redbones’ were marked as non-white in relation to strike violence and their opposition to capitalist expansion. Utilising archival research, historiography and oral testimony, I examine how an instance of labor unrest was reinterpreted by local law enforcement, an interstate capitalist class and the national press as calling into question the racial integrity of a group of workers who had been formerly marked as white. This explosive and largely unstudied strike provides an opportunity to better understand how racialisation operates as a technology of control, even over individuals who appear phenotypically white. The strike at Elizabeth allows a glimpse at the tactics of representatives of white supremacy when white workers do not fully embrace the ‘wages of whiteness.

Keywords: American federation of labor, labor history, Louisiana history, wages of whiteness

Procedia PDF Downloads 157
434 Seismic Response and Sensitivity Analysis of Circular Shallow Tunnels

Authors: Siti Khadijah Che Osmi, Mohammed Ahmad Syed

Abstract:

Underground tunnels are one of the most popular public facilities for various applications such as transportation, water transfer, network utilities and etc. Experience from the past earthquake reveals that the underground tunnels also become vulnerable components and may damage at certain percentage depending on the level of ground shaking and induced phenomena. In this paper a numerical analysis is conducted in evaluating the sensitivity of two types of circular shallow tunnel lining models to wide ranging changes in the geotechnical design parameter. Critical analysis has been presented about the current methods of analysis, structural typology, ground motion characteristics, effect of soil conditions and associated uncertainties on the tunnel integrity. The response of the tunnel is evaluated through 2D non-linear finite element analysis, which critically assesses the impact of increasing levels of seismic loads. The finding from this study offer significant information on improving methods to assess the vulnerability of underground structures.

Keywords: geotechnical design parameter, seismic response, sensitivity analysis, shallow tunnel

Procedia PDF Downloads 412
433 Ethics, Culture, Customer Relationships and Risk Management in Financing Chinese SMEs

Authors: Yongsheng Guo, Mengyu Lu

Abstract:

This study investigates how Chinese SMEs manage financial risks in customer financing. 32 interviews were conducted, and grounded theory models were developed to link the causal conditions, actions, and consequences. This study found that Chinese ethical principles, including integrity, friendship, reciprocity, and cultural traits, including collectivism, acquaintance society, and long-term orientation, provide conditions for customer financing. The SMEs establish trust-based relationships with customers and build a social network. The SMEs reduce financial risk through diversification, frequent operations and enterprise reputations. Both customers and SMEs can get benefits, including customer experience and financial rewards for customers and financial resources and customer base for SMEs. But there are some problems, like default for customers and financial cost for enterprises. This study develops a resource and process capability theory of SMEs and a customer capital and customer value theory to connect finance, accounting, and management concepts.

Keywords: CRM, culture, ethics, financing from customer, SME

Procedia PDF Downloads 14
432 Stakeholder Mapping and Requirements Identification for Improving Traceability in the Halal Food Supply Chain

Authors: Laila A. H. F. Dashti, Tom Jackson, Andrew West, Lisa Jackson

Abstract:

Traceability systems are important in the agri-food and halal food sectors for monitoring ingredient movements, tracking sources, and ensuring food integrity. However, designing a traceability system for the halal food supply chain is challenging due to diverse stakeholder requirements and complex needs. Existing literature on stakeholder mapping and identifying requirements for halal food supply chains is limited. To address this gap, a pilot study was conducted to identify the objectives, requirements, and recommendations of stakeholders in the Kuwaiti halal food industry. The study collected data through semi-structured interviews with an international halal food manufacturer based in Kuwait. The aim was to gain a deep understanding of stakeholders' objectives, requirements, processes, and concerns related to the design of a traceability system in the country's halal food sector. Traceability systems are being developed and tested in the agri-food and halal food sectors due to their ability to monitor ingredient movements, track sources, and detect potential issues related to food integrity. Designing a traceability system for the halal food supply chain poses significant challenges due to diverse stakeholder requirements and the complexity of their needs (including varying food ingredients, different sources, destinations, supplier processes, certifications, etc.). Achieving a halal food traceability solution tailored to stakeholders' requirements within the supply chain necessitates prior knowledge of these needs. Although attempts have been made to address design-related issues in traceability systems, literature on stakeholder mapping and identification of requirements specific to halal food supply chains is scarce. Thus, this pilot study aims to identify the objectives, requirements, and recommendations of stakeholders in the halal food industry. The paper presents insights gained from the pilot study, which utilized semi-structured interviews to collect data from a Kuwait-based international halal food manufacturer. The objective was to gain an in-depth understanding of stakeholders' objectives, requirements, processes, and concerns pertaining to the design of a traceability system in Kuwait's halal food sector. The stakeholder mapping results revealed that government entities, food manufacturers, retailers, and suppliers are key stakeholders in Kuwait's halal food supply chain. Lessons learned from this pilot study regarding requirement capture for traceability systems include the need to streamline communication, focus on communication at each level of the supply chain, leverage innovative technologies to enhance process structuring and operations and reduce halal certification costs. The findings also emphasized the limitations of existing traceability solutions, such as limited cooperation and collaboration among stakeholders, high costs of implementing traceability systems without government support, lack of clarity regarding product routes, and disrupted communication channels between stakeholders. These findings contribute to a broader research program aimed at developing a stakeholder requirements framework that utilizes "business process modelling" to establish a unified model for traceable stakeholder requirements.

Keywords: supply chain, traceability system, halal food, stakeholders’ requirements

Procedia PDF Downloads 75
431 The Role of British Public Opinion in the Process of the Great Britain’s Involvement in the Crimean War

Authors: Aysen Muderrisoglu

Abstract:

As a result of the policies constituted and pursued by Russia which aimed to gain territory and power at Ottoman expense, Crimean War broke out in 1853. Nevertheless, the Eastern policies of Russia were in contradiction with the interests of Great Britain which was the great power of the era. Yet, it did hesitate to be confronted with Russian on its route to India, so the Ottoman territorial integrity was defended. In that period, Tzar Nicholas II, to begin with, tried to eliminate a probable opposition coming from the British side, and then tried its chance to build up cooperation with Britain on the territories of the sick man. As a more positive relation was being observed between these two states before the Crimean War, Great Britain initially had adopted a neutral policy. However, in the end, Britain entered the war against Russia due to the efforts of the opposing side in the British Parliament and the rising pressure of the public opinion. The article aims to examine the role of British public opinion in the process of Great Britain’s Involvement in this war. Also, the article will try to find an answer to the following question: to what extent did the public opinion become effective on the foreign policy-making of Great Britain before the war?

Keywords: British press, Crimean war, Great Britain, public opinion

Procedia PDF Downloads 133
430 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed

Abstract:

Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 262