Search results for: local protocols
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5799

Search results for: local protocols

5709 Contribution to Energy Management in Hybrid Energy Systems Based on Agents Coordination

Authors: Djamel Saba, Fatima Zohra Laallam, Brahim Berbaoui

Abstract:

This paper presents a contribution to the design of a multi-agent for the energy management system in a hybrid energy system (SEH). The multi-agent-based energy-coordination management system (MA-ECMS) is based mainly on coordination between agents. The agents share the tasks and exchange information through communications protocols to achieve the main goal. This intelligent system can fully manage the consumption and production or simply to make proposals for action he thinks is best. The initial step is to give a presentation for the system that we want to model in order to understand all the details as much as possible. In our case, it is to implement a system for simulating a process control of energy management.

Keywords: communications protocols, control process, energy management, hybrid energy system, modelization, multi-agents system, simulation

Procedia PDF Downloads 296
5708 Analysis of the Temperature Dependence of Local Avalanche Compact Model for Bipolar Transistors

Authors: Robert Setekera, Ramses van der Toorn

Abstract:

We present an extensive analysis of the temperature dependence of the local avalanche model used in most of the modern compact models for bipolar transistors. This local avalanche model uses the Chynoweth's empirical law for ionization coefficient to define the generation of the avalanche current in terms of the local electric field. We carry out the model analysis using DC-measurements taken on both Si and advanced SiGe bipolar transistors. For the advanced industrial SiGe-HBTs, we consider both high-speed and high-power devices (both NPN and PNP transistors). The limitations of the local avalanche model in modeling the temperature dependence of the avalanche current mostly in the weak avalanche region are demonstrated. In addition, the model avalanche parameters are analyzed to see if they are in agreement with semiconductor device physics.

Keywords: avalanche multiplication, avalanche current, bipolar transistors, compact modeling, electric field, impact ionization, local avalanche

Procedia PDF Downloads 598
5707 Effective Citizen Participation in Local Government Decision-Making and Democracy

Authors: Ali Zaimi

Abstract:

Citizen participation in local government is an opportunity given to citizens and government to increase communication between them, create public support for local government plans and most important grow public trust in government. Also, the citizens’ involvement in the political process is an important part of democracy. This study aims to define the strategies for increasing citizen participation in local governance and concentrated in two important mechanisms such as participatory budget and public policy councils. Three strategies that promote more effective citizen involvement in local governance are understanding and using formal institutions of power, collaboration of citizens’ groups and governments officials to jointly formulate programs plans, electing and appointing local officials. A unique aspect of citizen participation to operate effectively is the transparency of government and the inclusion of actors into decision-making. The citizen engagement in local governance enhances accountability and problem solving, promote more inclusive and cohesive communities and enlarge the quality and quantity of initiatives made by communities.

Keywords: accountability, citizen participation, democracy, government

Procedia PDF Downloads 222
5706 Gender and Citizen Participation at the Local Governments: A Case of Vietnam

Authors: Trinh Hoang Hong Hue

Abstract:

Citizen Participation has been largely considered as an important objective of improving democracy and government decision-making in Vietnam recently. The Public Administration Performance Index Survey data (PAPI) indicated that citizens in provinces that have a higher proportion of male often less participate in local governance than those in provinces that have lower proportion of male. That means Vietnamese women more actively participate at the local governance rather than men. Thus this study will explore factors involving gender differences that impact on citizen participation at the local level. Applying qualitative approach, mainly in-depth interview, this study explores four diverse perspectives on enhancing citizen participation for both women and men at the local governance including civic knowledge; the trust of citizens; suitable policies of local government; and the role of NGOs. Furthermore, this study also points out two crucial reasons that are leading to the gender differences of citizen participation at the local level. Firstly, because Vietnamese women play the main role in family financial management; then they are willing to highly contribute to ‘voluntary contributions’; one of the four sub-dimensions of the concept ‘citizen participation’ of PAPI. Secondly, in Vietnam, women are deeply prone to be interested in the small issues at the local governance; whereas men are much keen on the bigger issues at national and international governance.

Keywords: citizen participation, gender, women, local governance, PAPI, Vietnam

Procedia PDF Downloads 116
5705 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 274
5704 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 279
5703 Mining News Deserts: Impact of Local Newspaper's Closure on Political Participation and Engagement in Rural Australian Town of Lightning Ridge

Authors: Marco Magasic

Abstract:

This article examines how a local newspaper’s closure impacts the way everyday people in a rural Australian town are informed about and engage with political affairs. It draws on a two-month focused ethnographic study in the outback town of Lighting Ridge, New South Wales and explores people’s media-related practices following the closure of the towns’ only newspaper, The Ridge News, in 2015. While social media is considered to have partly filled the news void, there is an increasingly fragmented and less vibrant local public sphere that has led to growing complacency among individuals about political affairs. Local residents highlight a dearth of reliable, credible information and lament the loss of the newspaper and its role in community advocacy and fostering people’s engagement with political institutions, especially local government.

Keywords: public sphere, political participation, local news, democratic deficit

Procedia PDF Downloads 133
5702 Clustering Based and Centralized Routing Table Topology of Control Protocol in Mobile Wireless Sensor Networks

Authors: Mbida Mohamed, Ezzati Abdellah

Abstract:

A strong challenge in the wireless sensor networks (WSN) is to save the energy and have a long life time in the network without having a high rate of loss information. However, topology control (TC) protocols are designed in a way that the network is divided and having a standard system of exchange packets between nodes. In this article, we will propose a clustering based and centralized routing table protocol of TC (CBCRT) which delegates a leader node that will encapsulate a single routing table in every cluster nodes. Hence, if a node wants to send packets to the sink, it requests the information's routing table of the current cluster from the node leader in order to root the packet.

Keywords: mobile wireless sensor networks, routing, topology of control, protocols

Procedia PDF Downloads 242
5701 A Multi-agent System Framework for Stakeholder Analysis of Local Energy Systems

Authors: Mengqiu Deng, Xiao Peng, Yang Zhao

Abstract:

The development of local energy systems requires the collective involvement of different actors from various levels of society. However, the stakeholder analysis of local energy systems still has been under-developed. This paper proposes an multi-agent system (MAS) framework to facilitate the development of stakeholder analysis of local energy systems. The framework takes into account the most influencing stakeholders, including prosumers/consumers, system operators, energy companies and government bodies. Different stakeholders are modeled based on agent architectures for example the belief-desire-intention (BDI) to better reflect their motivations and interests in participating in local energy systems. The agent models of different stakeholders are then integrated in one model of the whole energy system. An illustrative case study is provided to elaborate how to develop a quantitative agent model for different stakeholders, as well as to demonstrate the practicability of the proposed framework. The findings from the case study indicate that the suggested framework and agent model can serve as analytical instruments for enhancing the government’s policy-making process by offering a systematic view of stakeholder interconnections in local energy systems.

Keywords: multi-agent system, BDI agent, local energy systems, stakeholders

Procedia PDF Downloads 51
5700 Promoting Authenticity in Employer Brands to Address the Global-Local Problem in Complex Organisations: The Case of a Developing Country

Authors: Saud Al Taj

Abstract:

Employer branding is considered as a useful tool for addressing the global-local problem facing complex organisations that have operations scattered across the globe and face challenges of dealing with the local environment alongside. Despite being an established field of study within the Western developed world, there is little empirical evidence concerning the relevance of employer branding to global companies that operate in the under-developed economies. This paper fills this gap by gaining rich insight into the implementation of employer branding programs in a foreign multinational operating in Pakistan dealing with the global-local problem. The study is qualitative in nature and employs semi-structured and focus group interviews with senior/middle managers and local frontline employees to deeply examine the phenomenon in case organisation. Findings suggest that authenticity is required in employer brands to enable them to respond to the local needs thereby leading to the resolution of the global-local problem. However, the role of signaling theory is key to the development of authentic employer brands as it stresses on the need to establish an efficient and effective signaling environment wherein signals travel in both directions (from signal designers to receivers and backwards) and facilitate firms with the global-local problem. The paper also identifies future avenues of research for the employer branding field.

Keywords: authenticity, counter-signals, employer branding, global-local problem, signaling theory

Procedia PDF Downloads 340
5699 Technical and Economic Environment in the Polish Power System as the Basis for Distributed Generation and Renewable Energy Sources Development

Authors: Pawel Sowa, Joachim Bargiel, Bogdan Mol, Katarzyna Luszcz

Abstract:

The article raises the issue of the development of local renewable energy sources and the production of distributed energy in context of improving the reliability of the Polish Power System and the beneficial impact on local and national energy security. The paper refers to the current problems of local governments in the process of investment in the area of distributed energy projects, and discusses the issues of the future role and cooperation within the local power plants and distributed energy. Attention is paid to the local communities the chance to raise their own resources and management of energy fuels (biomass, wind, gas mining) and improving the local energy balance. The material presented takes the issue of the development of the energy potential of municipalities and future cooperation with professional energy. As an example, practical solutions used in one of the communes in Silesia.

Keywords: distributed generation, mini centers energy, renewable energy sources, reliability of supply of rural commune

Procedia PDF Downloads 575
5698 Metabolic Cost and Perceived Exertion during Progressive and Randomized Walking Protocols

Authors: Simeon E. H. Davies

Abstract:

This study investigated whether selected metabolic responses and the perception of effort varied during four different walk protocols where speed increased progressively 3, 4, 5, 6, and 7 km/hr (progressive treadmill walk (PTW); and progressive land walk (PLW); or where the participant adjusted to random changes of speed e.g. 6, 3, 7, 4, and 5 km/hr during a randomized treadmill walk (RTW); and a randomized land walk (RLW). Mean stature and mass of the seven participants was 1.75m and 70kg respectively, with a mean body fat of 15%. Metabolic measures including heart rate, relative oxygen uptake, ventilation, increased in a linear fashion up to 6 km/hr, however at 7 km/hr there was a significant increase in metabolic response notably during the PLW, and to a similar, although lesser extent in RLW, probably as a consequence of the loss of kinetic energy when turning at each cone in order to maintain the speed during each shuttle. Respiration frequency appeared to be a more sensitive indicator of physical exertion, exhibiting a rapid elevation at 5 km/hr. The perception of effort during each mode and at each speed was largely congruent during each walk protocol.

Keywords: exertion, metabolic, progressive, random, walking

Procedia PDF Downloads 440
5697 Comparative Analysis of Geographical Routing Protocol in Wireless Sensor Networks

Authors: Rahul Malhotra

Abstract:

The field of wireless sensor networks (WSN) engages a lot of associates in the research community as an interdisciplinary field of interest. This type of network is inexpensive, multifunctionally attributable to advances in micro-electromechanical systems and conjointly the explosion and expansion of wireless communications. A mobile ad hoc network is a wireless network without fastened infrastructure or federal management. Due to the infrastructure-less mode of operation, mobile ad-hoc networks are gaining quality. During this work, we have performed an efficient performance study of the two major routing protocols: Ad hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocols. We have used an accurate simulation model supported NS2 for this purpose. Our simulation results showed that AODV mitigates the drawbacks of the DSDV and provides better performance as compared to DSDV.

Keywords: routing protocol, MANET, AODV, On Demand Distance Vector Routing, DSR, Dynamic Source Routing

Procedia PDF Downloads 248
5696 Local Food Movements and Community Building in Turkey

Authors: Derya Nizam

Abstract:

An alternative understanding of "localization" has gained significance as the ecological and social issues associated with the growing pressure of agricultural homogeneity and standardization become more apparent. Through an analysis of a case study on an alternative food networks in Turkey, this research seeks to critically examine the localization movement. The results indicate that the idea of localization helps to create new niche markets by creating place-based labels, but it also strengthens local identities through social networks that connect rural and urban areas. In that context, localization manifests as a commodification movement that appropriates local and cultural values to generate capitalist profit, as well as a grassroots movement that strengthens the resilience of local communities. This research addresses the potential of community development approaches in the democratization of global agro-food networks.

Keywords: community building, local food, alternative food movements, localization

Procedia PDF Downloads 48
5695 Understanding the Gap Between Heritage Conservation and Local Development in the Global South: Success and Failure of Strategies Applied

Authors: Mohamed Aniss El-Gamal

Abstract:

For decades, the Global South has been facing many challenges in the fields of heritage conservation and local development. These challenges continue to increase due to rapid urbanization in historical cities, thus resulting in complicated juxtaposed contexts of heritage resources and deteriorated dwellings, where slum areas are dotted with heritage structures. While the majority of cases show the incapacity of national and local governments to deal with such contexts, few others managed to demonstrate how different levels of government can play complementary roles in the cooperation with local and international institutions as well as involving local community to achieve an integrated strategy and overcome the challenge. This paper discusses heritage conservation and local development strategies in reference to a number of case studies in cities of the Global south, i.e. Porto Alegre, Agra, Cairo and Mumbai. It further investigates main key aspects of success and failure through cross case studies analysis (Matrix). This study could help create a delineation of an integrated strategy for undertaking future interventions in similar contexts. Integrated strategies are needed to overcome the gap between heritage conservation and local development, maintaining the value of heritage structures and ensuring the quality of life for communities residing in its surroundings.

Keywords: heritage conservation, local development, the global south, regional development

Procedia PDF Downloads 285
5694 Establishment of Aquaculture Cooperative for Sustainable Local People Economic Welfare in Jatiluhur, West Java, Indonesia

Authors: Aisyah Nurfitria, Alifa Rahmadia Putri, Andini Lestari, Kartika Sukmatullahi Hasanah, Mutiara Mayang Oktavia

Abstract:

The research aims to describe and analyze the background and condition of Jatiluhur Dam, West Java, Indonesia. The Jatiluhur Dam as known as the biggest dam in West Java has huge fisheries resource, which is supposed to assure the local people appropriateness of living. Unfortunately based on this field research, the local people are living a life in under poverty line. This study focuses on increasing local people economic welfare through “Aquaculture Cooperative” implementation. Empower and diversify income of local people is the purpose of this study. In the same way, this study also focuses on the sustainable local people’s livelihoods. In order to obtain the sustainability of them, recovering the fisheries of Jatiluhur Dam is the part of “Aquaculture Cooperative” program. Method that is used in this research is a qualitative approach by literature review and in-depth interview through direct observation as data collecting techniques. Factors such as social and economic condition are also considered in order to know how “Aquaculture Cooperative” able to accepted by local people.

Keywords: aquaculture cooperative, economic welfare, Jatiluhur fisheries, West Java

Procedia PDF Downloads 423
5693 Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network

Authors: Abdullah Al Mamun, Tarek R. Sheltami

Abstract:

Video conferencing is a highly demanding facility now a days in order to its real time characteristics, but faster communication is the prior requirement of this technology. Multi Protocol Label Switching (MPLS) IP Virtual Private Network (VPN) address this problem and it is able to make a communication faster than others techniques. However, this paper studies the performance comparison of video traffic between two routing protocols namely the Enhanced Interior Gateway Protocol(EIGRP) and Open Shortest Path First (OSPF). The combination of traditional routing and MPLS improve the forwarding mechanism, scalability and overall network performance. We will use GNS3 and OPNET Modeler 14.5 to simulate many different scenarios and metrics such as delay, jitter and mean opinion score (MOS) value are measured. The simulation result will show that OSPF and BGP-MPLS VPN offers best performance for video conferencing application.

Keywords: OSPF, BGP, EIGRP, MPLS, Video conference, Provider router, edge router, layer3 VPN

Procedia PDF Downloads 313
5692 Generation of Symmetric Key Using Randomness of Hash Function

Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar

Abstract:

In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.

Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation

Procedia PDF Downloads 132
5691 Exploring Error-Minimization Protocols for Upper-Limb Function During Activities of Daily Life in Chronic Stroke Patients

Authors: M. A. Riurean, S. Heijnen, C. A. Knott, J. Makinde, D. Gotti, J. VD. Kamp

Abstract:

Objectives: The current study is done in preparation for a randomized controlled study investigating the effects of an implicit motor learning protocol implemented using an extension-supporting glove. It will explore different protocols to find out which is preferred when studying motor learn-ing in the chronic stroke population that struggles with hand spasticity. Design: This exploratory study will follow 24 individuals who have a chronic stroke (> 6 months) during their usual care journey. We will record the results of two 9-Hole Peg Tests (9HPT) done during their therapy ses-sions with a physiotherapist or in their home before and after 4 weeks of them wearing an exten-sion-supporting glove used to employ the to-be-studied protocols. The participants will wear the glove 3 times/week for one hour while performing their activities of daily living and record the times they wore it in a diary. Their experience will be monitored through telecommunication once every week. Subjects: Individuals that have had a stroke at least 6 months prior to participation, hand spasticity measured on the modified Ashworth Scale of maximum 3, and finger flexion motor control measured on the Motricity Index of at least 19/33. Exclusion criteria: extreme hemi-neglect. Methods: The participants will be randomly divided into 3 groups: one group using the glove in a pre-set way of decreasing support (implicit motor learning), one group using the glove in a self-controlled way of decreasing support (autonomous motor learning), and the third using the glove with constant support (as control). Before and after the 4-week period, there will be an intake session and a post-assessment session. Analysis: We will compare the results of the two 9HPTs to check whether the protocols were effective. Furthermore, we will compare the results between the three groups to find the preferred one. A qualitative analysis will be run of the experience of participants throughout the 4-week period. Expected results: We expect that the group using the implicit learning protocol will show superior results.

Keywords: implicit learning, hand spasticity, stroke, error minimization, motor task

Procedia PDF Downloads 32
5690 Preservation and Promotion of Lao Traditional Food as Luangprabang Province Unique Culture and Tradition in Accordance With One District One Product Policy

Authors: Lamphong Volady

Abstract:

The primary purpose of this study was to explore the traditional cuisine (local food) of Luangprabang Province in line with the Lao PDR’s One District One Product Policy. Another purpose of the study was to examine channels used to present local food, reasons to preserve and promote local food, as well as local food preservation and promotion strategies. It also aimed at testing correlation hypotheses whether there is a statistically significant relationship between enjoyment of having local food and willingness to promote local cuisines becoming international cuisines, attractiveness to consume local food, preservation and promotion of local food problems, and local people’s occupations. The Convergent Parallel Mixed Methods were employed in this study. The results of the study showed that several local cuisines were found to be local food of Luangprabang Province, namely Jeow Bon (Chilli dipping suace), Or Lam or aw lahm (stew buffalo skin, herbs, Mai sakaan), Kai Pan (River Weed Dry), Tam Mak Houng Luangprabang (Papaya Salad), Nang (Yam Buffalo Skin Dry), Sai Oor (Sausage), Laap Sin Koay Sai Mar-Keua Pao (Beef Salad with Roasted Eggplants), Orm Born (Taro leaves Stew), Oor Nor Mai (Bamboo Shoot Sausage), Jeow Nam Poo (Pickled Crab Chillies), Mok Dok Kae (steaming or roasting a Dok Kae Wrapp), Nor Sa Wan, Kao Noom Kee Noo, Kao Noom Ba Bin. It also depicted that YouTube, Facebook, and TikTok were multiple social channels or platforms which were found to be used to introduce traditional food as well as television, smartphone, word of mouth, Lao food fairs and other provincial events. The study also found that local food should be preserved and promoted since traditional food is not only ancestral, ancient, traditional, and local cuisines, but it is also wisdom, unique, and national cuisine. The study also found that people feel attracted to consuming local food because local food is delicious, unique, clean, nutritious, non-contaminated and natural. The study showed that lack of funds to produce local food, inadequate draw materials, lack material to store products, insufficient place to produce and lack of related organizations engagement were found to be problems for preserving and promoting traditional food. Finally, the result of the study revealed that there is a statistically significant weak relationship between enjoyment of having local food and willingness to promote local cuisines becoming international cuisines (R²= 4.5%), (p-value <0.001). There is a statistically significant moderate relationship between enjoyment of having local food and attractiveness to consume local food (R²= 7.8%), (p-value <0.001). However, there is a statistically insignificant relationship between enjoyment of having local food and preservation and promotion of local food problems (R²= 1.8%), (p-value = 0.086). It was found that there is a statistically insignificant relationship between enjoyment of having local food and local people’s occupations (R²= 0.0%), (p-value = 0.929).

Keywords: local food, preservation, promotion, traditional food, cuisines

Procedia PDF Downloads 43
5689 Pre-Malignant Breast Lesions, Methods of Treatment and Outcome

Authors: Ahmed Mostafa, Mohamed Mahmoud, Nesreen H. Hafez, Mohamed Fahim

Abstract:

This retrospective study includes 60 patients with pre-invasive breast cancer. Aim of the study: Evaluation of premalignant lesions of the breast (DCIS), different treatment methods and outcome. Patients and methods: 60 patients with DCIS were studied from the period between 2005 to 2012, for 38 patients the primary surgical method was wide local resection (WLE) (63.3%) and the other cases (22 patients, 36.7%) had mastectomy, fourteen cases from those who underwent local excision received radiotherapy, while no adjuvant radiotherapy was given for those who underwent mastectomy. In case of hormonal receptor positive DCIS lesions hormonal treatment (Tamoxifen) was given after local control. Results: No difference in overall survival between mastectomy & breast conserving therapy (wide local excision and adjuvant radiotherapy), however local recurrence rate is higher in case of breast conserving therapy, also no role of Axillary evacuation in case of DCIS. The use of hormonal therapy decreases the incidence of local recurrence by about 98%. Conclusion: The main management of DCIS is local treatment (wide local excision and radiotherapy) with hormonal treatment in case of hormone receptor positive lesions.

Keywords: ductal carcinoma in situ, surgical treatment, radiotherapy, breast conserving therapy, hormonal treatment

Procedia PDF Downloads 295
5688 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 64
5687 The Construction of Knowledge and Social Wisdom on Local Community in the Process of Disaster Management

Authors: Oman Sukmana

Abstract:

Geographically, Indonesia appears to be disaster-prone areas, whether for natural, nonnatural (man-made), or social disasters. This study aimed to construct the knowledge and social wisdom on the local community in the process of disaster management after the eruption of Mt. Kelud. This study, moreover, encompassed two major concerns: (1) the construction of knowledge and social wisdom on the local community in the process of disaster management after the eruption of Mt. Kelud; (2) the conceptual framework of disaster management on the basis of knowledge and social wisdom on the local community. The study was conducted by means of qualitative approach. The data were analyzed by using the qualitative-descriptive technique. The data collection techniques used in this study were in-depth interview, focus group discussion, observation, and documentation. It was conducted at Pandansari Village, Sub-district Ngantang, District Malang as the most at risk area of Mt. Kelud’s eruption. The purposive sampling was applied ad hoc to select the respondents including: the apparatus of Pandansari Village, the local figures of Pandansari Village, the Chief and Boards of the Forum of Disaster Risk Reduction (FPRB), the Head of Malang Regional Disaster Management Agency, and other agencies. The findings of this study showed that the local community has already possessed the adequate knowledge and social wisdom to overcome the disaster. Through the social wisdom, the local community could predict the potential eruption.

Keywords: knowledge, social and local wisdom, disaster management

Procedia PDF Downloads 346
5686 Power Aware Modified I-LEACH Protocol Using Fuzzy IF Then Rules

Authors: Gagandeep Singh, Navdeep Singh

Abstract:

Due to limited battery of sensor nodes, so energy efficiency found to be main constraint in WSN. Therefore the main focus of the present work is to find the ways to minimize the energy consumption problem and will results; enhancement in the network stability period and life time. Many researchers have proposed different kind of the protocols to enhance the network lifetime further. This paper has evaluated the issues which have been neglected in the field of the WSNs. WSNs are composed of multiple unattended ultra-small, limited-power sensor nodes. Sensor nodes are deployed randomly in the area of interest. Sensor nodes have limited processing, wireless communication and power resource capabilities Sensor nodes send sensed data to sink or Base Station (BS). I-LEACH gives adaptive clustering mechanism which very efficiently deals with energy conservations. This paper ends up with the shortcomings of various adaptive clustering based WSNs protocols.

Keywords: WSN, I-Leach, MATLAB, sensor

Procedia PDF Downloads 251
5685 Local Texture and Global Color Descriptors for Content Based Image Retrieval

Authors: Tajinder Kaur, Anu Bala

Abstract:

An image retrieval system is a computer system for browsing, searching, and retrieving images from a large database of digital images a new algorithm meant for content-based image retrieval (CBIR) is presented in this paper. The proposed method combines the color and texture features which are extracted the global and local information of the image. The local texture feature is extracted by using local binary patterns (LBP), which are evaluated by taking into consideration of local difference between the center pixel and its neighbors. For the global color feature, the color histogram (CH) is used which is calculated by RGB (red, green, and blue) spaces separately. In this paper, the combination of color and texture features are proposed for content-based image retrieval. The performance of the proposed method is tested on Corel 1000 database which is the natural database. The results after being investigated show a significant improvement in terms of their evaluation measures as compared to LBP and CH.

Keywords: color, texture, feature extraction, local binary patterns, image retrieval

Procedia PDF Downloads 334
5684 Living outside the fence: Opportunities for Neighbouring Communities to Supply Products and Services to the Sabi Sand Game Reserve, South Africa

Authors: Andrew Rylance, Anna Spenceley

Abstract:

An evaluation was undertaken to understand opportunities for stimulating local enterprise development within the tourism supply chain, linked to a private game reserve in South Africa, the Sabi Sand Game Reserve, which neighbors the Kruger National Park. The study focused on understanding the market demand for local products and services from commercial lodges, and the current local supply from enterprises and entrepreneurs in local communities. This article quantifies the value of current procurement spend by lodges on local products and services and estimates their potential future expenditure. The study matches these responses with the availability of products and services in the neighboring communities. It also provides insights into relationships between private lodges, game reserves and local communities in South Africa. It concurs with previous research on tourism supply chains in rural South Africa, and also makes recommendations for the development of local businesses with higher technical capacity development.

Keywords: tourism, communities, business development, South Africa, Sabi Sand Game Reserve, market study, supply study

Procedia PDF Downloads 501
5683 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 200
5682 Promoting Local Products through One Village One Product and Customer Satisfaction

Authors: Wardoyo, Humairoh

Abstract:

In global competition nowadays, the world economy heavily depends upon high technology and capital intensive industries that are mainly owned by well-established economic and developed countries, such as United States of America, United Kingdom, Japan, and South Korea. Indonesia as a developing country is building its economic activities towards industrial country as well, although a slightly different approach was implemented. For example, similar to the concept of one village one product (OVOP) implemented in Japan, Indonesia also adopted this concept by promoting local traditional products to improve incomes of village people and to enhance local economic activities. Analysis on how OVOP program increase local people’s income and influence customer satisfaction were the objective of this paper. Behavioral intention to purchase and re-purchase, customer satisfaction and promotion are key factors for local products to play significant roles in improving local income and economy of the region. The concepts of OVOP and key factors that influence economic activities of local people and the region will be described and explained in the paper. Results of research, in a case study based on 300 respondents, customers of a local restaurant at Tangerang City, Banten Province of Indonesia, indicated that local product, service quality and behavioral intention individually have significant influence to customer satisfaction; whereas simultaneous tests to the variables indicated positive and significant influence to the behavioral intention through customer satisfaction as the intervening variable.

Keywords: behavioral intention, customer satisfaction, local products, one village one product (OVOP)

Procedia PDF Downloads 271
5681 Communication of Sensors in Clustering for Wireless Sensor Networks

Authors: Kashish Sareen, Jatinder Singh Bal

Abstract:

The use of wireless sensor networks (WSNs) has grown vastly in the last era, pointing out the crucial need for scalable and energy-efficient routing and data gathering and aggregation protocols in corresponding large-scale environments. Wireless Sensor Networks have now recently emerged as a most important computing platform and continue to grow in diverse areas to provide new opportunities for networking and services. However, the energy constrained and limited computing resources of the sensor nodes present major challenges in gathering data. The sensors collect data about their surrounding and forward it to a command centre through a base station. The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) as they are very useful in target detecting and other applications. However, hierarchical clustering protocols have maximum been used in to overall system lifetime, scalability and energy efficiency. In this paper, the state of the art in corresponding hierarchical clustering approaches for large-scale WSN environments is shown.

Keywords: clustering, DLCC, MLCC, wireless sensor networks

Procedia PDF Downloads 452
5680 The Effectiveness of Electronic Local Financial Management Information System (ELFMIS) in Mempawah Regency, West Borneo Province, Indonesia

Authors: Muhadam Labolo, Afdal R. Anwar, Sucia Miranti Sipisang

Abstract:

Electronic Local Finance Management Information System (ELFMIS) is integrated application that was used as a tool for local governments to improve the effectiveness of the implementation of the various areas of financial management regulations. Appropriate With Exceptions Opinion (WDP) of Indonesia Audit Agency (BPK) for local governments Mempawah is a financial management problem that must be improved to avoid mistakes in decision-making. The use of Electronic Local Finance Management Information System (ELFMIS) by Mempawah authority has not yet performed maximally. These problems became the basis for research in measuring the effectiveness LFMIS in Mempawah regency. This research uses an indicator variable for measuring information systems effectiveness proposed by Bodnar. This research made use descriptive with inductive approach. Data collection techniques were mixed from qualitative and quantitative techniques, used questionnaires, interviews and documentation. The obstacles in Local Finance Board (LFB) for the application of ELFMIS such as connection, the quality and quantity of human resources, realization of financial resources, absence of maintenance and another facilities of ELFMIS and verification for financial information.

Keywords: effectiveness, E-LFMIS, finance, local government, system

Procedia PDF Downloads 197