Search results for: privacy preserving
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 762

Search results for: privacy preserving

432 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia

Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro

Abstract:

Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.

Keywords: border security, defense, energy, national interest, threat

Procedia PDF Downloads 448
431 Mapping the Future: Participatory Master Planning for Pioneer Village Tourism in Cibubuan, Sumedang

Authors: Sarojini Imran, Riza Firmansyah, Aula Ramadhan, Chudamul Furqon, Achfriyatama Oktariflandi

Abstract:

This article delves into the participatory approach in formulating a master plan for the development of pioneer village tourism in Cibubuan, Sumedang. We explore the process of participatory mapping that involves the active participation of the local community in planning and envisioning the future of village tourism. This research considers the positive impact that arises when the community takes an active role in designing a master plan that benefits the local economy while preserving culture and the environment. The results of this research reveal that the participatory approach can create a more accurate and community-responsive mapping that aligns with the aspirations of the people in Cibubuan Village. It also provides a deep insight into how community-developed mapping can guide the development of sustainable tourism. By offering a deeper understanding of the participatory role in village tourism development planning, this article provides essential insights for stakeholders and researchers in this field. We hope this article will inspire more communities to adopt a participatory approach in planning the future of their village tourism.

Keywords: participatory masterplan, pioneer village tourism, sustainable tourism, community engagement, Cibubuan Village

Procedia PDF Downloads 36
430 Ubuntu: A Holistic Social Framework for Preserving Ecosystem Amidst the Climate Change Challenges

Authors: Gabriel Sunday Ayayia

Abstract:

The paper argues that Ubuntu, as a philosophy that emphasizes the interconnectedness of all living things and importance of community and mutual support, can be used as a social framework to address the problems of climate change and promote environmental sustainability. The research demonstrate that Ubuntu is an ideological concept that encourages collective action on climate change, with the emphasis on individual and collective commitment to taking concrete action to address the problems of climate change. The paper shows that Ubuntu can be employed as a social tool that would enhance the cultivation of shared identity and promote the sense of shared response responsibility to develop the resilience to cope with climate change. Using qualitative and quantitative methodologies, the study establishes the imperativeness of mutual support and cooperation through the lens of Ubuntu as a human-centered scalable response to the debacle of climate change. It recommends that we can build a society that values the environment and promotes sustainable practices by encouraging community involvement in sustainable initiatives by integrating Ubuntu-based principles to our decision-making processes, collaboration, leadership, human agency and governance.

Keywords: ubuntu, climate change, humanity, collective actions, community-based

Procedia PDF Downloads 144
429 Understanding of Heritage Values within University Education Systems in the Kingdom of Saudi Arabia

Authors: Mahmoud Tarek Mohamed Hammad

Abstract:

Despite the importance of the role and efforts made by the universities of the Kingdom of Saudi Arabia in reviving and preserving heritage architecture as an important cultural heritage in the Kingdom, The idea revolves around restoration and conservation processes and neglects the architectural heritage values, whose content can be used in sustainable contemporary architectural works. Educational values based on heritage architecture and how to integrate with the contemporary requirements were investigated in this research. For this purpose, by understanding the heritage architectural values as well as educational, academic process, the researcher presented an educational model of questionnaire forms for architecture students and the staff at the Architecture Department at Al-Baha University as a case study that serves the aims of the research. The results of the research show that heritage values especially those interview results are considered as a positive indicator of the importance of these values. The students and the staff need both to gain an understanding of heritage values as well as an understanding of theories of incorporating those values into the design process of contemporary local architecture. The research concludes that a correct understanding of the heritage values, its performance, and its reintegration with modern architecture technology should be focused on architectural education.

Keywords: heritage architecture, academic work, heritage values, sustainable contemporary local architectural

Procedia PDF Downloads 134
428 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 277
427 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 26
426 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 114
425 Rejuvenating Cultural Energy: Forging Pathways to Alternative Ecological and Development Paradigms

Authors: Aldrin R. Logdat

Abstract:

The insights and wisdom of the Alangan Mangyans offer valuable guidance for developing alternative ecological and development frameworks. Their reverence for the sacredness of the land, rooted in their traditional cosmology, guides their harmonious relationship with nature. Through their practice of swidden farming, ecosystem preservation takes precedence as they carefully manage agricultural activities and allow for forest regeneration. This approach aligns with natural processes, reflecting their profound understanding of the natural world. Similar to early advocates like Aldo Leopold, the emphasis is on shifting our perception of land from a commodity to a community. The indigenous wisdom of the Alangan Mangyans provides practical and sustainable approaches to preserving the interdependence of the biotic community and ecosystems. By integrating their cultural heritage, we can transcend the prevailing anthropocentric mindset and foster a meaningful and sustainable connection with nature. The revitalization of cultural energy and the embrace of alternative frameworks require learning from indigenous peoples like the Alangan Mangyans, where reverence for the land and the recognition of the interconnectedness between humanity and nature are prioritized. This paves the way for a future where harmony with nature and the well-being of the Earth community prevail.

Keywords: Alangan Mangyans, ecological frameworks, sacredness of the land, cultural energy

Procedia PDF Downloads 62
424 An Enhanced Distributed Weighted Clustering Algorithm for Intra and Inter Cluster Routing in MANET

Authors: K. Gomathi

Abstract:

Mobile Ad hoc Networks (MANET) is defined as collection of routable wireless mobile nodes with no centralized administration and communicate each other using radio signals. Especially MANETs deployed in hostile environments where hackers will try to disturb the secure data transfer and drain the valuable network resources. Since MANET is battery operated network, preserving the network resource is essential one. For resource constrained computation, efficient routing and to increase the network stability, the network is divided into smaller groups called clusters. The clustering architecture consists of Cluster Head(CH), ordinary node and gateway. The CH is responsible for inter and intra cluster routing. CH election is a prominent research area and many more algorithms are developed using many different metrics. The CH with longer life sustains network lifetime, for this purpose Secondary Cluster Head(SCH) also elected and it is more economical. To nominate efficient CH, a Enhanced Distributed Weighted Clustering Algorithm (EDWCA) has been proposed. This approach considers metrics like battery power, degree difference and speed of the node for CH election. The proficiency of proposed one is evaluated and compared with existing algorithm using Network Simulator(NS-2).

Keywords: MANET, EDWCA, clustering, cluster head

Procedia PDF Downloads 364
423 A Post-Occupancy Evaluation of the Impact of Indoor Environmental Quality on Health and Well-Being in Office Buildings

Authors: Suyeon Bae, Abimbola Asojo, Denise Guerin, Caren Martin

Abstract:

Post-occupancy evaluations (POEs) have been recognized for documenting occupant well-being and responses to indoor environmental quality (IEQ) factors such as thermal, lighting, and acoustic conditions. Sustainable Post-Occupancy evaluation survey (SPOES) developed by an interdisciplinary team at a Midwest University provides an evidence-based quantitative analysis of occupants’ satisfaction in office, classroom, and residential spaces to help direct attention to successful areas and areas that need improvement in buildings. SPOES is a self-administered and Internet-based questionnaire completed by building occupants. In this study, employees in three different office buildings rated their satisfaction on a Likert-type scale about 12 IEQ criteria including thermal condition, indoor air quality, acoustic quality, daylighting, electric lighting, privacy, view conditions, furnishings, appearance, cleaning and maintenance, vibration and movement, and technology. Employees rated their level of satisfaction on a Likert-type scale from 1 (very dissatisfied) to 7 (very satisfied). They also rate the influence of their physical environment on their perception of their work performance and the impact of their primary workspaces on their health on a scale from 1 (hinders) to 7 (enhances). Building A is a three-story building that includes private and group offices, classrooms, and conference rooms and amounted to 55,000 square-feet for primary workplace (N=75). Building B, a six-story building, consisted of private offices, shared enclosed office, workstations, and open desk areas for employees and amounted to 14,193 square-feet (N=75). Building C is a three-story 56,000 square-feet building that included classrooms, therapy rooms, an outdoor playground, gym, restrooms, and training rooms for clinicians (N=76). The results indicated that 10 IEQs for Building A except acoustic quality and privacy showed statistically significant correlations on the impact of the primary workspace on health. In Building B, 11 IEQs except technology showed statistically significant correlations on the impact of the primary workspace on health. Building C had statistically significant correlations between all 12 IEQ and the employees’ perception of the impact of their primary workspace on their health in two-tailed correlations (P ≤ 0.05). Out of 33 statistically significant correlations, 25 correlations (76%) showed at least moderate relationship (r ≥ 0.35). For the three buildings, daylighting, furnishings, and indoor air quality IEQs ranked highest on the impact on health. IEQs about vibration and movement, view condition, and electric lighting ranked second, followed by IEQs about cleaning and maintenance and appearance. These results imply that 12 IEQs developed in SPOES are highly related to employees’ perception of how their primary workplaces impact their health. The IEQs in this study offer an opportunity for improving occupants’ well-being and the built environment.

Keywords: post-occupancy evaluation, built environment, sustainability, well-being, indoor air quality

Procedia PDF Downloads 257
422 Japan’s Challenges in Managing Resources and Implementing Strategies toward Sustainability

Authors: Dana Aljadaa, Hasim Altan

Abstract:

Japan’s strategy is based on improving the current resources and productivity by identifying the environmental challenges to progress further in many areas. For example, it will help in understanding the competitive challenges in the industry, emerging innovation, and other progresses. The present study seeks to examine the characteristics of sustainable practices using materials that will last longer and following environmental policies. There has been a major emphasis since 1990s and onwards about recycling and preserving the environment. Furthermore, the present paper analyses and argues how national interest in policy increases resource productivity. It is a universal law, but these actions may be different based on the unique situation of the country. In addition, the present study explains some of the strategies developed by the Environmental Agency of Japan in the last few years. There are a few resources reviewed involving ‘Strategy for an Environmental Nation in the 21st Century’ from 2001, ‘Clean Asia Initiative’ from 2008, and ‘New Growth Strategy’ from 2010. The present paper also highlights the emphasis on increasing efficiency, as it is an important part of sustainability. We finally conclude by providing reasoning on the impact and positivity of reducing production and consumption on the environment, resulting in a productive and progressive Japan for the near and long term future.

Keywords: eco-system, resource productivity, sound material-cycle, sustainable development

Procedia PDF Downloads 175
421 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 351
420 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 62
419 Reinvestment of the Urban Context in Historic Cities: The Case Study of El Sheikh Kandil Street, Rosetta, Egypt

Authors: Riham A. Ragheb, Ingy M. Naguib

Abstract:

Conservation and urban investment are a prerequisite to improve the quality of life. Since the historic street is a part of the economic system, it should be able to play an important role in the city development by upgrading all services, public open spaces and reuse of historical buildings and sites. Furthermore, historical conservation enriches the political, economic, social, cultural and functional aspects of the site. Rosetta has been selected as an area of study because it has a unique character due to its possession of a variety of monuments and historical buildings. The aim of this research is to analyze the existing situation of an historic street named El Sheikh Kandil, to be able to identify the potentials and problems. The paper gives a proposal for the redesign and reinvestment of the street and the reuse for the historical buildings to serve the community, users and visitors. Then, it concludes with recommendations to improve quality of life through the rehabilitation of the historical buildings and strengthening of the cultural and historical identity of the street. Rosetta city can benefit from these development proposals by preserving and revitalizing its unique character which leads to tourism development and benefits from the new investments.

Keywords: adaptive reuse, heritage street, historic investment, restoration, urban design

Procedia PDF Downloads 145
418 The Hawza Al-’Ilmiyya and Its Role in Preserving the Shia Identity through Jurisprudence

Authors: Raied Khayou

Abstract:

The Hawza Al-'Ilmiyya is a network of religious seminaries in the Shia branch of Islam. This research mainly focuses on the oldest school located in Najaf, Iraq, because its core curriculum and main characteristics have been unchanged since the fourth century of Islam. Relying on a thorough literature review of Arabic and English publications, and interviews with current and previous students of the seminary, the current research outlines the factors proving how this seminary was crucial in keeping the Shia religious identity intact despite sometimes gruesome attempts of interference and persecution. There are several factors that helped the seminary to preserve its central importance. First, rooted in their theology, Shia Muslims believe that the Hawza Al-’Ilmiyya and its graduates carry a sacred authority. Secondly, the financial independence of the Seminary helped to keep it intact from any governmental or political meddling. Third, its unique teaching method, its matchless openness for new students, and its flexible curriculum made it attractive for many students who were interested in learning more about Shia theology and jurisprudence. The Hawza Al-‘Ilmiyya has the exclusive right to train clerics who hold the religious authority of Shia Islamic jurisprudence, and the seminary’s success in staying independent throughout history kept Shia Islamic theology independent, as well.

Keywords: Hawza Al'Ilmiyya, religious seminary, Shia Muslim education, Islamic jurisprudence

Procedia PDF Downloads 76
417 Guidelines for the Management and Sustainability Development of Forest Tourism Kamchanoad Baan Dung, Udon Thani

Authors: Pennapa Palapin

Abstract:

This study aimed to examine the management and development of forest tourism Kamchanoad. Ban Dung, Udon Thani sustainability. Data were collected by means of qualitative research including in-depth interviews, semi-structured, and then the data were summarized and discussed in accordance with the objectives. And make a presentation in the form of lectures. The target population for the study consisted of 16 people, including representatives from government agencies, community leaders and the community. The results showed that Guidelines for the Management and Development of Forest Tourism Kamchanoad include management of buildings and infrastructure such as roads, water, electricity, toilets. Other developments are the establishment of a service center that provides information and resources to facilitate tourists.; nature trails and informative signage to educate visitors on the path to the jungle Kamchanoad; forest activities for tourists who are interested only in occasional educational activities such as vegetation, etc.; disseminating information on various aspects of tourism through various channels in both Thailand and English, as well as a website to encourage community involvement in the planning and management of tourism together with the care and preservation of natural resources and preserving the local cultural tourist area of Kamchanoad.

Keywords: guidelines for the management and development, forest tourism, Kamchanoad, sustainability

Procedia PDF Downloads 504
416 Preserving a Nation Oversea: Galician Folklore Music and Identity in the Americas. Analysis of Galician Migrant Music in the Latin American Context

Authors: Santiago Guerra Fernández

Abstract:

Abstract—This study is focused on exploring the conditions for the development of Galician music in the communities of Latin America after the massive arrival of Galician immigrants in the late nineteenth and early twentieth centuries, fleeing from hunger and misery in Spain. Migration would be accentuated after 1936 with the arrival of refugees from the Spanish Civil War due to their Republican political militancy fleeing fascism. The aim of this paper is to investigate the part that miscegenation with other local musical traditions has played within Galician expat music, helping to understand the complexity of contemporary Galician identity. Through archival work, the focus is set on examining the different traditional dances (such as the ‘muiñeira’), folk instruments (bagpipes, ‘pandeireta’), and poetic forms (‘cantiga’, ‘copla’) that were exported to Argentina and Cuba. Although research about migrant Galician music has been conducted in Spanish scholarship, there is a gap in the English literature on the topic that this paper intends to fill in. The results show how these musical traditions have played an essential role in shaping the social life and customs of Galician emigrants. By virtue of its malleability and blending properties, music serves here as an indicator of social cohesion.

Keywords: folk, Galicia, migration, identity

Procedia PDF Downloads 42
415 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 58
414 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank

Authors: Aarohi Surya

Abstract:

The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.

Keywords: customer satisfaction, service quality, responsiveness, online banking

Procedia PDF Downloads 239
413 Hybrid Fixation in Management of Proximal Diaphyseal Forearm Bone Fractures in Children

Authors: Tarek Aly

Abstract:

Introduction: Maintenance of the length, providing rotational stability, and preserving functional range of forearm motion is the mainstay of both bone forearm fractures treatment. Conservative treatment in older children may lead to malunion with poor remodeling capacity. Recent studies emphasized that the rate of complications with IM nailing was obviously increased in old children. Open reduction and internal fixation have been criticized for the amount of soft tissue dissection and periosteal stripping needed for fixation and excessive scar formation. The aim of this study was to evaluate the anatomical and functional outcomes of hybrid fixation in the treatment of closed proximal radius and ulna fractures in adolescents between 12 and 17 years of age. Patients and Methods: 30 cases of diaphyseal both bone forearm fractures treated with hybrid fixation (Nail radius – Plate ulna) and were available for a follow-up period of fewer than 24 months. Results: Clinically, 72% of cases had an excellent function, 22% had a good function, 4% had a fair function, and 2% had a poor function. Radiologically, signs of the union had appeared in the radius 2weeks earlier than in the ulna in 55% of cases. Conclusion: A hybrid fixation technique in adolescent proximal both-bones forearm fractures could be a viable option in managing these injuries.

Keywords: hyprid fixation, both bones, forearm, fractures

Procedia PDF Downloads 69
412 Uterine Leiomyomas and Urological Complications

Authors: Dharshini Selvarajah, Nicula Lui, Karen Kong

Abstract:

Background: Uterine fibroids are a common benign gynaecologic neoplasm in reproductive-aged women. Fibroids may become symptomatic in a vast majority of nulliparous women. Their diagnosis and management is often coordinated between gyneacologists, radiologists and urologists depending on the anatomical location, growth, size and the fibroids sarcomatous evolvement. Some patients may develop obstructive uropathy symptoms, either uni or bilateral secondary urethral obstruction causing hydronephrosis. Uterine artery emoblisation (UAE) has previously shown to effectively resolve symptoms as well as relieve urethral obstruction and resolve the hydronephrosis. UAE has now established itself as an organ preserving and minimally invasive procedure in the management of symptomatic uterine fibroids. It is a safe and effective alternative to hysterectomy for resolving fibroid related pressure symptoms. The case presented examines the clinical manifestations and impact of uterine fibroids on the urinary tract system. The therapeutic options to relieve the urological symptoms as well as preserve fertility are explored and presented. Case: The case is a 29-year-old Nepalese female admitted to hospital with recurrent urosepsis with multiresistant organisms. This was on a background of an enlarged uterus (measuring 17cm x11cm) with multiple subserosal, intramural and exophytic fibroids- causing external ureteric compression. She had bilateral ureteric stents insitu and required bilateral right and left nephrostomies during repeated episodes of urosepsis and bilateral ureteric obstruction. The left nephrostomy was removed a month prior to admission and her most recent CT KUB demonstrated hypofunctioning ureteric stents with bilateral hydronephrosis. Options of hysterectomy versus uterine artery emoblisation (UAE) were extensively explored. The patient was keen to preserve fertility. Risks associated with UAE such as expulsion of the submucosal component of the fibroids and the possibilities of sepsis in the setting of ongoing ureteric colonisation were particularly high. The patient opted to trial UAE even though the risks of recurrent hospital admissions with urosepsis were going to be particularly high. In the event, the uterus fails to shrink adequately enough to relieve the obstructed ureters a hysterectomy would inevitably be required in future. Day 3 post UAE the patient developed fevers, was hypotensive and tachycardic post-receiving prophylactic meropenem and fluconazole pre emoblisation. She was noted to have a CRP of 293 with the most recent urine culture during this time growing Candida albicans. The patient was recommenced on oral fluconazole and IV meropenem, with good effect. Her repeat renal tract ultrasound post-UAE showed ongoing marked left hydronephrosis relatively unchanged from the scan one month prior to the procedure, however the right-sided hydronephrosis had resolved. The patient was discharged on a 2-week course of antibiotics. The patient will have a repeat renal tract ultrasound and MRI of the ureters to re-evaluate the degree of hydronephrosis and progress- this was unavailable at the time of abstract submission and will be presented at the conference. Conclusion: Fibroids are a common benign tumour of the uterus and can frequently impact the lower urinary system resulting in significant uropathy. They often enlarge and compress the urinary bladder, urethra and lower end of the ureters. The effectiveness of UAE as a fertility preserving option is described.

Keywords: Uterine leiomyomas and urological complications, uterine artery embolisation for fibroids, Uterine fibroids and complications, Management of uterine fibroids

Procedia PDF Downloads 193
411 Management of Urological Complications Secondary to Uterine Fibroids

Authors: Dharshini Selvarajah, Karen Kong

Abstract:

Background: Uterine fibroids are a common benign gynaecologic neoplasm in reproductive-aged women. Fibroids may become symptomatic in a vast majority of nulliparous women. Their diagnosis and management are often coordinated between gyneacologists, radiologists and urologists depending on the anatomical location, growth, size and the fibroids' sarcomatous evolvement. Some patients may develop obstructive uropathy symptoms, either uni or bilateral secondary urethral obstruction causing hydronephrosis. Uterine artery embolization (UAE) has previously been shown to effectively resolve symptoms as well as relieve urethral obstruction and resolve hydronephrosis. UAE has now established itself as an organ-preserving and minimally invasive procedure in the management of symptomatic uterine fibroids. It is a safe and effective alternative to hysterectomy for resolving fibroid-related pressure symptoms. The case presented examines the clinical manifestations and impact of uterine fibroids on the urinary tract system. The therapeutic options to relieve the urological symptoms as well as preserve fertility are explored and presented. Case: The case is a 29-year-old Nepalese female admitted to the hospital with recurrent urosepsis with multiresistant organisms. This was on a background of an enlarged uterus (measuring 17cm x11cm) with multiple subserosal, intramural and exophytic fibroids- causing external ureteric compression. She had bilateral ureteric stents in situ and required bilateral right and left nephrostomies during repeated episodes of urosepsis and bilateral ureteric obstruction. The left nephrostomy was removed a month prior to admission, and her most recent CT KUB demonstrated hypofunctioning ureteric stents with bilateral hydronephrosis. Options of hysterectomy versus uterine artery embolization (UAE) were extensively explored. The patient was keen to preserve fertility. Risks associated with UAE, such as the expulsion of the submucosal component of the fibroids and the possibilities of sepsis in the setting of ongoing ureteric colonisation were particularly high. The patient opted to trial UAE even though the risks of recurrent hospital admissions with urosepsis were going to be particularly high. In the event, the uterus fails to shrink adequately enough to relieve the obstructed ureters, a hysterectomy would inevitably be required in the future. Day 3 post-UAE the patient developed fevers, was hypotensive and tachycardic post-receiving prophylactic meropenem and fluconazole pre emoblisation. She was noted to have a CRP of 293 with the most recent urine culture during this time growing Candida albicans. The patient was recommenced on oral fluconazole and IV meropenum, with good effect. Her repeat renal tract ultrasound post-UAE showed ongoing marked left hydronephrosis relatively unchanged from the scan one month prior to the procedure; however, the right-sided hydronephrosis had resolved. The patient was discharged on a 2-week course of antibiotics. The patient will have a repeat renal tract ultrasound and MRI of the ureters to re-evaluate the degree of hydronephrosis and progress- this was unavailable at the time of abstract submission and will be presented at the conference. Conclusion: Fibroids are a common benign tumor of the uterus and can frequently impact the lower urinary system resulting in significant uropathy. They often enlarge and compress the urinary bladder, urethra and lower end of the ureters. The effectiveness of the UAE as a fertility-preserving option is described.

Keywords: uterine artery embolisation for fibroids, urological complications from fibroids, uropathy of fibroids, obstructive fibroid management

Procedia PDF Downloads 182
410 Application of Medium High Hydrostatic Pressure in Preserving Textural Quality and Safety of Pineapple Compote

Authors: Nazim Uddin, Yohiko Nakaura, Kazutaka Yamamoto

Abstract:

Compote (fruit in syrup) of pineapple (Ananas comosus L. Merrill) is expected to have a high market potential as one of convenient ready-to-eat (RTE) foods worldwide. High hydrostatic pressure (HHP) in combination with low temperature (LT) was applied to the processing of pineapple compote as well as medium HHP (MHHP) in combination with medium-high temperature (MHT) since both processes can enhance liquid impregnation and inactivate microbes. MHHP+MHT (55 or 65 °C) process, as well as the HHP+LT process, has successfully inactivated the microbes in the compote to a non-detectable level. Although the compotes processed by MHHP+MHT or HHP+LT have lost the fresh texture as in a similar manner as those processed solely by heat, it was indicated that the texture degradations by heat were suppressed under MHHP. Degassing process reduced the hardness, while calcium (Ca) contributed to be retained hardness in MHT and MHHP+MHT processes. Electrical impedance measurement supported the damage due to degassing and heat. The color, Brix, and appearance were not affected by the processing methods significantly. MHHP+MHT and HHP+LT processes may be applicable to produce high-quality, safe RTE pineapple compotes. Further studies on the optimization of packaging and storage condition will be indispensable for commercialization.

Keywords: compote of pineapple, RTE, medium high hydrostatic pressure, postharvest loss, texture

Procedia PDF Downloads 98
409 Consumer Experience of 3D Body Scanning Technology and Acceptance of Related E-Commerce Market Applications in Saudi Arabia

Authors: Moudi Almousa

Abstract:

This research paper explores Saudi Arabian female consumers’ experiences using 3D body scanning technology and their level of acceptance of possible market applications of this technology to adopt for apparel online shopping. Data was collected for 82 women after being scanned then viewed a short video explaining three possible scenarios of 3D body scanning applications, which include size prediction, customization, and virtual try-on, before completing the survey questionnaire. Although respondents have strong positive responses towards the scanning experience, the majority were concerned about their privacy during the scanning process. The results indicated that size prediction and virtual try on had greater market application potential and a higher chance of crossing the gap based on consumer interest. The results of the study also indicated a strong positive correlation between respondents’ concern with inability to try on apparel products in online environments and their willingness to use the 3D possible market applications.

Keywords: 3D body scanning, market applications, online, apparel fit

Procedia PDF Downloads 110
408 An Entropy Stable Three Dimensional Ideal MHD Solver with Guaranteed Positive Pressure

Authors: Andrew R. Winters, Gregor J. Gassner

Abstract:

A high-order numerical magentohydrodynamics (MHD) solver built upon a non-linear entropy stable numerical flux function that supports eight traveling wave solutions will be described. The method is designed to treat the divergence-free constraint on the magnetic field in a similar fashion to a hyperbolic divergence cleaning technique. The solver is especially well-suited for flows involving strong discontinuities due to its strong stability without the need to enforce artificial low density or energy limits. Furthermore, a new formulation of the numerical algorithm to guarantee positivity of the pressure during the simulation is described and presented. By construction, the solver conserves mass, momentum, and energy and is entropy stable. High spatial order is obtained through the use of a third order limiting technique. High temporal order is achieved by utilizing the family of strong stability preserving (SSP) Runge-Kutta methods. Main attributes of the solver are presented as well as details on an implementation of the new solver into the multi-physics, multi-scale simulation code FLASH. The accuracy, robustness, and computational efficiency is demonstrated with a variety of numerical tests. Comparisons are also made between the new solver and existing methods already present in FLASH framework.

Keywords: entropy stability, finite volume scheme, magnetohydrodynamics, pressure positivity

Procedia PDF Downloads 318
407 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 206
406 BIM Data and Digital Twin Framework: Preserving the Past and Predicting the Future

Authors: Mazharuddin Syed Ahmed

Abstract:

This research presents a framework used to develop The Ara Polytechnic College of Architecture Studies building “Kahukura” which is Green Building certified. This framework integrates the development of a smart building digital twin by utilizing Building Information Modelling (BIM) and its BIM maturity levels, including Levels of Development (LOD), eight dimensions of BIM, Heritage-BIM (H-BIM) and Facility Management BIM (FM BIM). The research also outlines a structured approach to building performance analysis and integration with the circular economy, encapsulated within a five-level digital twin framework. Starting with Level 1, the Descriptive Twin provides a live, editable visual replica of the built asset, allowing for specific data inclusion and extraction. Advancing to Level 2, the Informative Twin integrates operational and sensory data, enhancing data verification and system integration. At Level 3, the Predictive Twin utilizes operational data to generate insights and proactive management suggestions. Progressing to Level 4, the Comprehensive Twin simulates future scenarios, enabling robust “what-if” analyses. Finally, Level 5, the Autonomous Twin, represents the pinnacle of digital twin evolution, capable of learning and autonomously acting on behalf of users.

Keywords: building information modelling, circular economy integration, digital twin, predictive analytics

Procedia PDF Downloads 16
405 Disaggregation the Daily Rainfall Dataset into Sub-Daily Resolution in the Temperate Oceanic Climate Region

Authors: Mohammad Bakhshi, Firas Al Janabi

Abstract:

High resolution rain data are very important to fulfill the input of hydrological models. Among models of high-resolution rainfall data generation, the temporal disaggregation was chosen for this study. The paper attempts to generate three different rainfall resolutions (4-hourly, hourly and 10-minutes) from daily for around 20-year record period. The process was done by DiMoN tool which is based on random cascade model and method of fragment. Differences between observed and simulated rain dataset are evaluated with variety of statistical and empirical methods: Kolmogorov-Smirnov test (K-S), usual statistics, and Exceedance probability. The tool worked well at preserving the daily rainfall values in wet days, however, the generated data are cumulated in a shorter time period and made stronger storms. It is demonstrated that the difference between generated and observed cumulative distribution function curve of 4-hourly datasets is passed the K-S test criteria while in hourly and 10-minutes datasets the P-value should be employed to prove that their differences were reasonable. The results are encouraging considering the overestimation of generated high-resolution rainfall data.

Keywords: DiMoN Tool, disaggregation, exceedance probability, Kolmogorov-Smirnov test, rainfall

Procedia PDF Downloads 178
404 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 78
403 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 7