Search results for: vulnerable narcissism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1063

Search results for: vulnerable narcissism

823 Protection of Floating Roof Petroleum Storage Tanks against Lightning Strokes

Authors: F. M. Mohamed, A. Y. Abdelaziz

Abstract:

The subject of petroleum storage tank fires has gained a great deal of attention due to the high cost of petroleum, and the consequent disruption of petroleum production; therefore, much of the current research has focused on petroleum storage tank fires. Also, the number of petroleum tank fires is oscillating between 15 and 20 fires per year. About 33% of all tank fires are attributed to lightning. Floating roof tanks (FRT’s) are especially vulnerable to lightning. To minimize the likelihood of a fire, the API RP 545 recommends three major modifications to floating roof tanks. This paper was inspired by a stroke of lightning that ignited a fire in a crude oil storage tank belonging to an Egyptian oil company, and is aimed at providing an efficient lightning protection system to the tank under study, in order to avoid the occurrence of such phenomena in the future and also, to give valuable recommendations to be applied to floating roof tank projects.

Keywords: crude oil, fire, floating roof tank, lightning protection system

Procedia PDF Downloads 256
822 A Study of Emotional Intelligence and Perceived Stress among First and Second Year Medical Students in South India

Authors: Nitin Joseph

Abstract:

Objectives: This study was done to assess emotional intelligence levels and to find out its association with socio demographic variables and perceived stress among medical students. Material and Methods: This study was done among first and second year medical students. Data was collected using a self-administered questionnaire. Results: Emotional intelligence scores was found to significantly increase with age of the participants (F=2.377, P < 0.05). Perceived stress was found to be significantly more among first year (t=1.997, P=0.05). Perceived stress was found to significantly decrease with increasing emotional intelligence scores (r = – 0.226, P < 0.001). Conclusion: First year students were found to be more vulnerable to stress than their seniors probably due to lesser emotional intelligence. As both these parameters are related, ample measures to improve emotional intelligence needs to be supported in the training curriculum of beginners so as to make them more stress free during early student life.

Keywords: emotional intelligence, medical students, perceived stress, socio demographic variables

Procedia PDF Downloads 425
821 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 474
820 The Relationship Between Policy Design and Poverty Reduction: The Case of Ghana

Authors: Joseph Kwame Sarfo-Adu

Abstract:

Social protection programs have been rolled out by successive governments in the quest of bridging the inequality gap in Ghana. Despite notable positive impacts of these programs across the country, there still remains worrying experience of the exclusion of the poor and vulnerable especially in rural Ghana Notwithstanding the rhetoric of participation within the discussion of social protection programs, less attention has been given to the design of these programs. In view of this, the study seeks to address how social protection programs are designed to address the needs of the poor. This study focused on five selected social protection programs in Ghana because they are programs with nationwide coverage. Qualitative thematic analysis was applied to analyze our data with the use of the Nvivo 12 version. We found out that there is a strong link between policy design and poverty alleviation. Our findings revealed that a well-designed program can significantly alleviate poverty, a poorly designed program can create more damage.

Keywords: social protection, poverty alleviation, policy design, effective outcome

Procedia PDF Downloads 129
819 Prioritization of Mutation Test Generation with Centrality Measure

Authors: Supachai Supmak, Yachai Limpiyakorn

Abstract:

Mutation testing can be applied for the quality assessment of test cases. Prioritization of mutation test generation has been a critical element of the industry practice that would contribute to the evaluation of test cases. The industry generally delivers the product under the condition of time to the market and thus, inevitably sacrifices software testing tasks, even though many test cases are required for software verification. This paper presents an approach of applying a social network centrality measure, PageRank, to prioritize mutation test generation. The source code with the highest values of PageRank will be focused first when developing their test cases as these modules are vulnerable to defects or anomalies which may cause the consequent defects in many other associated modules. Moreover, the approach would help identify the reducible test cases in the test suite, still maintaining the same criteria as the original number of test cases.

Keywords: software testing, mutation test, network centrality measure, test case prioritization

Procedia PDF Downloads 72
818 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 228
817 Modeling of Water Erosion in the M'Goun Watershed Using OpenGIS Software

Authors: M. Khal, Ab. Algouti, A. Algouti

Abstract:

Water erosion is the major cause of the erosion that shapes the earth's surface. Modeling water erosion requires the use of software and GIS programs, commercial or closed source. The very high prices for commercial GIS licenses, motivates users and researchers to find open source software as relevant and applicable as the proprietary GIS. The objective of this study is the modeling of water erosion and the hydrogeological and morphophysical characterization of the Oued M'Goun watershed (southern flank of the Central High Atlas) developed by free programs of GIS. The very pertinent results are obtained by executing tasks and algorithms in a simple and easy way. Thus, the various geoscientific and geostatistical analyzes of a digital elevation model (SRTM 30 m resolution) and their combination with the treatments and interpretation of satellite imagery information allowed us to characterize the region studied and to map the area most vulnerable to water erosion.

Keywords: central High-Atlas, hydrogeology, M’Goun watershed, OpenGis, water erosion

Procedia PDF Downloads 123
816 A Performance Analysis Study of an Active Solar Still Integrating Fin at the Basin Plate

Authors: O. Ansari, H. Hafs, A. Bah, M. Asbik, M. Malha, M. Bakhouya

Abstract:

Water is one of the most important and vulnerable natural resources due to human activities and climate change. Water-level continues declining year after year and it is primarily caused by sustained, extensive, and traditional usage methods. Improving water utilization becomes an urgent issue in order satisfy the increasing population needs. Desalination of seawater or brackish water could help in increasing water potential. However, a cost-effective desalination process is required. The most appropriate method for performing this desalination is solar-driven distillation, given its simplicity, low cost and especially the availability of the solar energy source. The main objective of this paper is to demonstrate the influence of coupling integrated basin plate by fins with preheating by solar collector on the performance of solar still. The energy balance equations for the various elements of the solar still are introduced. A numerical example is used to show the efficiency of the proposed solution.

Keywords: active solar still, desalination, fins, solar collector

Procedia PDF Downloads 184
815 Armenian in the Jordanian Linguistic Landscape: Marginalisation and Revitalisation

Authors: Omar Alomoush

Abstract:

This paper examines the Armenian language in the linguistic landscape of Jordanian cities. The results indicate that Armenian is chiefly marginalised in the LL. By quantitative and qualitative methods, the current study attempts to identify the main reasons behind this marginalisation. In the light of the fact that Armenian is completely absent from the commercial streets of major Jordanian cities, all monolingual and multilingual signs in Armenian Neighbourhood in Amman city are photographed to identify them according to function and language. To provide plausible explanations for the marginalisation of the Armenian language in the LL, the current study builds upon issues of language maintenance and underlying language policy. According to the UNESCO Endangerment Framework, it can be assumed that Armenian is a vulnerable language, even though the Armenian Church exerted great efforts to revitalise Armenian in all social settings, including the LL. It was found that language policies enacted by the state of Jordan, language shift, language hostility, voluntary migration and economic pressures are among the reasons behind this marginalisation.

Keywords: linguistic landscape, multilingualism, Armenian, marginalisation and revitalisation

Procedia PDF Downloads 235
814 Meeting the Health Needs of Adolescents and Young Adults: Developing and Evaluating an Electronic Questionnaire and Health Report Form, for the Health Assessment at Youth Health Clinics – A Mixed Methods Project

Authors: P.V. Lostelius, M.Mattebo, E. Thors Adolfsson, A. Söderlund, Å. Revenäs

Abstract:

Adolescents are vulnerable in healthcare settings. Early detection of poor health in young people is important to support a good quality of life and adult social functioning. Youth Health Clinics (YHCs) in Sweden provide healthcare for young people ages 13-25 years old. Using an overall mixed methods approach, the project’s main objective was to develop and evaluate an electronic health system, including a health questionnaire, a case report form, and an evaluation questionnaire to assess young people’s health risks in early stages, increase health, and quality of life. In total, 72 young people, 16-23 years old, eleven healthcare professionals and eight researchers participated in the three project studies. Results from interviews with fifteen young people gave that an electronic health questionnaire should include questions about physical-, mental-, sexual health and social support. It should specifically include questions about self-harm and suicide risk. The young people said that the questionnaire should be appealing, based on young people’s needs and be user-friendly. It was important that young people felt safe when responding to the questions, both physically and electronically. Also, they found that it had the potential to support the face-to face-meeting between young people and healthcare professionals. The electronic health report system was developed by the researchers, performing a structured development of the electronic health questionnaire, construction of a case report form to present the results from the health questions, along with an electronic evaluation questionnaire. An Information Technology company finalized the development by digitalizing the electronic health system. Four young people, three healthcare professionals and seven researchers evaluated the usability using interviews and a usability questionnaire. The electronic health questionnaire was found usable for YHCs but needed some clarifications. Essentially, the system succeeded in capturing the overall health of young people; it should be able to keep the interest of young people and have the potential to contribute to health assessment planning and young people’s self-reflection, sharing vulnerable feelings with healthcare professionals. In advance of effect studies, a feasibility study was performed by collecting electronic questionnaire data from 54 young people and interview data from eight healthcare professionals to assess the feasibility of the use of the electronic evaluation questionnaire, the case report form, and the planned recruitment method. When merging the results, the research group found that the evaluation questionnaire and the health report were feasible for future research. However, the COVID-19 pandemic, commitment challenges and drop-outs affected the recruitment of young people. Also, some healthcare professionals felt insecure about using computers and electronic devices and worried that their workload would increase. This project contributes knowledge about the development and use of electronic health tools for young people. Before implementation, clinical routines need for using the health report system need to be considered.

Keywords: adolescent health, developmental studies, electronic health questionnaire, mixed methods research

Procedia PDF Downloads 64
813 Perpetrators of Ableist Sexual Violence: Understanding Who They Are and Why They Target People with Intellectual Disabilities in Australia

Authors: Michael Rahme

Abstract:

Over the past decade, there is an overwhelming consensus spanning across academia, government commissions, and civil societies that concede that individuals with disabilities (IWDs), particularly those with intellectual differences, are a demographic most ‘vulnerable’ to experiences of sexual violence. From this global accord, numerous policies have sprouted in the protection of this ‘pregnable’ sector of society, primarily framed around liberal obligations of stewardship over the ‘defenceless.’ As such, these initiatives mainly target post-incident or victim-based factors of sexual violence, which is apparent in proposals for more inclusive sexual education and accessible contact lines for IWDs. Yet despite the necessity of these initiatives, sexual incidents among this demographic persist and, in nations such as Australia, continue to rise. Culture of Violence theory reveals that such discrepancies in theory and practice stem from societal structures that frame individuals as ‘vulnerable’, ‘impregnable’, or ‘defenceless’ because of their disability, thus propagating their own likelihood of abuse. These structures, as embodied by the Australian experience, allow these sexual violences to endure through cultural ideologies that place the IWDs ‘failures’ at fault while sidelining the institutions that permit this abuse. Such is representative of the initiatives of preventative organizations like People with Disabilities Australia, which have singularly strengthened victim protection networks, despite abuse continuing to rise dramatically among individuals with intellectual disabilities alone. Yet regardless of this rise, screenings of families and workers remain inadequate and practically untouched, a reflection of a tremendous societal warp in understanding surrounding the lived experiences of IWDs. This theory is also representative of broader literature, where the study of the perpetrators of disability rights, particularly sexual rights, is almost unapparent in a field that is already seldom studied. Therefore, placing power on the abuser via stripping that of the victims. As such, the Culture of Violence theory (CVT) sheds light on the institutions that allow these perpetrators to prosper. This paper, taking a CVT approach, aims to dissipate this discrepancy in the Australian experience by way of a qualitative analysis of all available court proceedings and tribunals between 2020-2022. Through an analysis of the perpetrator, their relation to the IWD, and the motives for their actions granted by court and tribunal transcripts and the psychological, and behavioural reports, among other material, that have been presented and consulted during these proceedings. All of which would be made available under the 1982 Freedom of Information Act. The findings from this study, through the incorporation of CVT, determine the institutions in which these abusers function and the ideologies which motivate such behaviour; while being conscious of the issue of re-traumatization and language barriers of the abusees. Henceforth, this study aims to be a potential policy guide on strengthening support institutions that provide IWDs with their basic rights. In turn, undermining sexual violence among individuals with intellectual disabilities at its roots.

Keywords: criminal profiling, intellectual disabilities, prevention, sexual violence

Procedia PDF Downloads 63
812 Lesbians, Gays and Bisexuals of Botswana: Progressive Steps by the Botswana Court of Appeal towards Recognition and Advancement of Fundamental Human Rights of the Most Vulnerable within Society

Authors: Tashwill Esterhuizen

Abstract:

Throughout Africa, several countries continue to have laws which criminalise same-sex sexual activities, which increases the vulnerability of the LGBT community to stigma, discrimination, and persecution. These criminal provisions often form the basis upon which states deny LGBT activists the right to freely associate with other like-minded individuals and form organizations that protect their interests and advocate for the rights and aspirations of the LGBT community. Over the past year, however, there has been significant progress in the advancement of universal, fundamental rights of LGBT persons throughout Africa. In many instances, these advancements came about through the bravery of activists who have publically insisted (in environments where same-sex sexual practices are criminalised) that their rights should be respected. Where meaningful engagement with the State was fruitless, activists took their plight to the judiciary and have successfully sought to uphold the fundamental rights of LGBT persons, paving the way for a more inclusive and tolerant society. Litigation Progress: Botswana is a prime example. For several years, the State denied a group of LGBT activists their right to freely associate and form their organisation Lesbians, Gays, and Bisexuals of Botswana (LEGABIBO), which aimed to promote the interests of the LGBT community in Botswana. In March 2016, the Botswana Court of Appeal found that the government’s refusal to register LEGABIBO violated the activists’ right to associate freely. The Court held that the right freedom of association applies to all persons regardless of their sexual orientation or gender identity. It does not matter that the views of the organisation are unpopular or unacceptable amongst the majority. In particular, the Court rejected the government of Botswana’s contention that registering LEGABIBO would disturb public peace and is contrary to public morality. Quite remarkably, the Court of Appeal recognised that while LGBT individuals are a minority group within the country, they are nonetheless persons entitled to constitutional protections of their dignity, regardless of whether they are unacceptable to others on religious or any other grounds. Furthermore, the Court held that human rights and fundamental freedoms are granted to all, including criminals or social outcasts because the denial of an individual’s humanity is the denial of their human dignity. This is crucial observation by the Court of Appeal, as once it is accepted that human rights apply to all human beings, then it becomes much easier for vulnerable groups to assert their own rights. Conclusion: The Botswana Court of Appeal decision, therefore, represents significant progress in the promotion of the rights of lesbian, gay, bisexual and transgender persons. The judgment has broader implications for many other countries which do not provide recognition of sexual minorities. It highlights the State’s duty to uphold basic rights and to ensure dignity, tolerance, and acceptance for marginalised persons.

Keywords: acceptance, freedom of association, freedom of expression, fundamental rights and freedoms, gender identity, human rights are universal, inclusive, inherent human dignity, progress, sexual orientation, tolerance

Procedia PDF Downloads 204
811 Experimental Study on Floating Breakwater Anchored by Piles

Authors: Yessi Nirwana Kurniadi, Nira Yunita Permata

Abstract:

Coastline is vulnerable to coastal erosion which damage infrastructure and buildings. Floating breakwaters are applied in order to minimize material cost but still can reduce wave height. In this paper, we investigated floating breakwater anchored by piles based on experimental study in the laboratory with model scale 1:8. Two type of floating model were tested with several combination wave height, wave period and surface water elevation to determined transmission coefficient. This experimental study proved that floating breakwater with piles can prevent wave height up to 27 cm. The physical model shows that ratio of depth to wave length is less than 0.6 and ratio of model width to wave length is less than 0.3. It is confirmed that if those ratio are less than those value, the transmission coefficient is 0.5. The result also showed that the first type model of floating breakwater can reduce wave height by 60.4 % while the second one can reduce up to 55.56 %.

Keywords: floating breakwater, experimental study, pile, transimission coefficient

Procedia PDF Downloads 504
810 Information and Communication Technology (ICT) Education Improvement for Enhancing Learning Performance and Social Equality

Authors: Heichia Wang, Yalan Chao

Abstract:

Social inequality is a persistent problem. One of the ways to solve this problem is through education. At present, vulnerable groups are often less geographically accessible to educational resources. However, compared with educational resources, communication equipment is easier for vulnerable groups. Now that information and communication technology (ICT) has entered the field of education, today we can accept the convenience that ICT provides in education, and the mobility that it brings makes learning independent of time and place. With mobile learning, teachers and students can start discussions in an online chat room without the limitations of time or place. However, because liquidity learning is quite convenient, people tend to solve problems in short online texts with lack of detailed information in a lack of convenient online environment to express ideas. Therefore, the ICT education environment may cause misunderstanding between teachers and students. Therefore, in order to better understand each other's views between teachers and students, this study aims to clarify the essays of the analysts and classify the students into several types of learning questions to clarify the views of teachers and students. In addition, this study attempts to extend the description of possible omissions in short texts by using external resources prior to classification. In short, by applying a short text classification, this study can point out each student's learning problems and inform the instructor where the main focus of the future course is, thus improving the ICT education environment. In order to achieve the goals, this research uses convolutional neural network (CNN) method to analyze short discussion content between teachers and students in an ICT education environment. Divide students into several main types of learning problem groups to facilitate answering student problems. In addition, this study will further cluster sub-categories of each major learning type to indicate specific problems for each student. Unlike most neural network programs, this study attempts to extend short texts with external resources before classifying them to improve classification performance. In short, by applying the classification of short texts, we can point out the learning problems of each student and inform the instructors where the main focus of future courses will improve the ICT education environment. The data of the empirical process will be used to pre-process the chat records between teachers and students and the course materials. An action system will be set up to compare the most similar parts of the teaching material with each student's chat history to improve future classification performance. Later, the function of short text classification uses CNN to classify rich chat records into several major learning problems based on theory-driven titles. By applying these modules, this research hopes to clarify the main learning problems of students and inform teachers that they should focus on future teaching.

Keywords: ICT education improvement, social equality, short text analysis, convolutional neural network

Procedia PDF Downloads 91
809 Data-Driven Crop Advisory – A Use Case on Grapes

Authors: Shailaja Grover, Purvi Tiwari, Vigneshwaran S. R., U. Dinesh Kumar

Abstract:

In India, grapes are one of the most important horticulture crops. Grapes are most vulnerable to downy mildew, which is one of the most devasting diseases. In the absence of a precise weather-based advisory system, farmers spray pesticides on their crops extensively. There are two main challenges associated with using these pesticides. Firstly, most of these sprays were panic sprays, which could have been avoided. Second, farmers use more expensive "Preventive and Eradicate" chemicals than "Systemic, Curative and Anti-sporulate" chemicals. When these chemicals are used indiscriminately, they can enter the fruit and cause health problems such as cancer. This paper utilizes decision trees and predictive modeling techniques to provide grape farmers with customized advice on grape disease management. This model is expected to reduce the overall use of chemicals by approximately 50% and the cost by around 70%. Most of the grapes produced will have relatively low residue levels of pesticides, i.e., below the permissible level.

Keywords: analytics in agriculture, downy mildew, weather based advisory, decision tree, predictive modelling

Procedia PDF Downloads 44
808 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 323
807 Links between Landscape Management and Environmental Risk Assessment: Considerations from the Italian Context

Authors: Mara Balestrieri, Clara Pusceddu

Abstract:

Issues relating to the destructive phenomena that can damage people and goods have returned to the centre of debate in Italy with the increase in catastrophic episodes in recent years in a country which is highly vulnerable to hydrological risk. Environmental factors and geological and geomorphological territorial characteristics play an important role in determining the level of vulnerability and the natural tendency to risk. However, a territory has also been subjected to the requirements of and transformations of society, and this brings other relevant factors. The reasons for the increase in destructive phenomena are often to be found in the territorial development models adopted. Stewardship of the landscape and management of risk are related issues. This study aims to summarize the most relevant elements about this connection and at the same time to clarify the role of environmental risk assessment as a tool to aid in the sustainable management of landscape. How planners relate to this problem and which aspects should be monitored in order to prepare responsible and useful interventions?

Keywords: assessment, landscape, risk, planning

Procedia PDF Downloads 437
806 Analysing Environmental Licensing of Infrastructure Projects in Brazil

Authors: Ronaldo Seroa Da Motta, Gabriela Santiago

Abstract:

The main contribution of this study is the identification of the factors influencing the environmental licensing process of infrastructure projects in Brazil. These factors will be those that reflect the technical characteristics of the project, the corporate governance of the entrepreneur, and the institutional and regulatory governance of the environmental agency, including the number of interventions by non-licensing agencies. The model conditions these variables to the licensing processing time of 34 infrastructure projects. Our results indicated that the conditions would be more sensitive to the type of enterprise, complexity as in gas pipelines and hydroelectric plants in the most vulnerable biome with a greater value of the enterprise or the entrepreneur's assets, together with the number of employees of the licensing agency. The number of external interventions by other non-licensing institutions does not affect the licensing time. Such results challenge the current criticism that environmental licensing has been often pointed out as a barrier to speed up investments in infrastructure projects in Brazil due to the participation of civil society and other non-licensing institutions.

Keywords: environmental licensing, condionants, Brazil, timing process

Procedia PDF Downloads 106
805 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 114
804 Exploring Probabilistic Models for Transient Stability Analysis of Renewable-Dominant Power Grid

Authors: Phuong Nguyen

Abstract:

Along with the ongoing energy transition, the electrical power system is getting more vulnerable with the increasing penetration of renewable energy sources (RES). By replacing a large amount of fossil fuel-based power plants with RES, the rotating mass of the power grid is decreasing drastically, which has been reported by a number of system operators. This leads to a huge challenge for operators to secure the operation of their grids in all-time horizon ranges, from sub-seconds to minutes and even hours. There is a need to revise the grid capabilities in dealing with transient (angle) stability and voltage dynamics. While the traditional approaches relied on deterministic scenarios (worst-case scenarios), there is also a need to cover a whole range of probabilities regarding a wide range of uncertainties coming from massive RES units. To contribute to handle these issues, this paper aims to focus on developing a new analytical approach for transient stability.

Keywords: transient stability, uncertainties, renewable energy sources, analytical approach

Procedia PDF Downloads 42
803 Digital Elevation Model Analysis of Potential Prone Flood Disaster Watershed Citarum Headwaters Bandung

Authors: Faizin Mulia Rizkika, Iqbal Jabbari Mufti, Muhammad R. Y. Nugraha, Fadil Maulidir Sube

Abstract:

Flooding is an event of ponding on the flat area around the river as a result of the overflow of river water was not able to be accommodated by the river and may cause damage to the infrastructure of a region. This study aimed to analyze the data of Digital Elevation Model (DEM) for information that plays a role in the mapping of zones prone to flooding, mapping the distribution of zones prone to flooding that occurred in the Citarum upstream using secondary data and software (ArcGIS, MapInfo), this assessment was made distribution map of flooding, there were 13 counties / districts dam flood-prone areas in Bandung, and the most vulnerable districts are areas Baleendah-Dayeuhkolot-Bojongsoang-Banjaran. The area has a low slope and the same limits with boundary rivers and areas that have excessive land use, so the water catchment area is reduced.

Keywords: mitigation, flood, citarum, DEM

Procedia PDF Downloads 354
802 Studying the Intercalation of Low Density Polyethylene/Clay Nanocomposites after Different UV Exposures

Authors: Samir Al-Zobaidi

Abstract:

This study attempts to understand the effect of different UV irradiation methods on the intercalation of LDPE/MMT nanocomposites, and its molecular behavior at certain isothermal crystallization temperature. Three different methods of UV exposure were employed using single composition of LDPE/MMT nanocomposites. All samples were annealed for 5 hours at a crystallization temperature of 100°C. The crystallization temperature was chosen to be at large supercooling temperature to ensure quick and complete crystallization. The raw material of LDPE consisted of two stable monoclinic and orthorhombic phases according to XRD results. The thermal behavior of both phases acted differently when UV exposure method was changed. The monoclinic phase was more dependent on the method used compared to the orthorhombic phase. The intercalation of clay, as well as, the non-isothermal crystallization temperature, has also shown a clear dependency on the type of UV exposure. A third phase that is thermally less stable was also observed. Its respond to UV irradiation was greater since it contains low molecular weight entities which make it more vulnerable to any UV exposure.

Keywords: LDPE/MMt nanocomposites, crystallization, UV irradiation, intercalation

Procedia PDF Downloads 350
801 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 62
800 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 307
799 Life-Saving Design Strategies for Nursing Homes and Long-Term Care Facilities

Authors: Jason M. Hegenauer, Nicholas Fucci

Abstract:

In the late 1990s, a major deinstitutionalization movement of elderly patients took place, since which, the design of long-term care facilities has not been adequately analyzed in the United States. Over the course of the last 25 years, major innovations in construction methods, technology, and medicine have been developed, drastically changing the landscape of healthcare architecture. In light of recent events, and the expected increase in elderly populations with the aging of the baby-boomer generation, it is evident that reconsideration of these facilities is essential for the proper care of aging populations. The global response has been effective in stifling this pandemic; however, widespread disease still poses an imminent threat to the human race. Having witnessed the devastation Covid-19 has reaped throughout nursing homes and long-term care facilities, it is evident that the current strategies for protecting our most vulnerable populations are not enough. Light renovation of existing facilities and previously overlooked considerations for new construction projects can drastically lower the risk at nursing homes and long-term care facilities. A reconfigured entry sequence supplements several of the features which have been long-standing essentials of the design of these facilities. This research focuses on several aspects identified as needing improvement, including indoor environment quality, security measures incorporated into healthcare architecture and design, and architectural mitigation strategies for sick building syndrome. The results of this study have been compiled as 'best practices' for the design of future healthcare construction projects focused on the health, safety, and quality of life of the residents of these facilities. These design strategies, which can easily be implemented through renovation of existing facilities and new construction projects, minimize risk of infection and spread of disease while allowing routine functions to continue with minimal impact, should the need for future lockdowns arise. Through the current lockdown procedures, which were implemented during the Covid-19 pandemic, isolation of residents has caused great unrest and worry for family members and friends as they are cut off from their loved ones. At this time, data is still being reported, leaving infection and death rates inconclusive; however, recent projections in some states list long-term care facility deaths as high as 60% of all deaths in the state. The population of these facilities consists of residents who are elderly, immunocompromised, and have underlying chronic medical conditions. According to the Centers for Disease Control, these populations are particularly susceptible to infection and serious illness. The obligation to protect our most vulnerable population cannot be overlooked, and the harsh measures recently taken as a response to the Covid-19 pandemic prove that the design strategies currently utilized for doing so are inadequate.

Keywords: building security, healthcare architecture and design, indoor environment quality, new construction, sick building syndrome, renovation

Procedia PDF Downloads 68
798 Engineering Economic Analysis of Implementing a Materials Recovery Facility in Jamaica: A Green Industry Approach towards a Sustainable Developing Economy

Authors: Damian Graham, Ashleigh H. Hall, Damani R. Sulph, Michael A. James, Shawn B. Vassell

Abstract:

This paper assesses the design and feasibility of a Materials Recovery Facility (MRF) in Jamaica as a possible green industry approach to the nation’s economic and solid waste management problems. Jamaica is a developing nation that is vulnerable to climate change that can affect its blue economy and tourism on which it is heavily reliant. Jamaica’s National Solid Waste Management Authority (NSWMA) collects only a fraction of all the solid waste produced annually which is then transported to dumpsites. The remainder is either burnt by the population or disposed of illegally. These practices negatively impact the environment, threaten the sustainability of economic growth from blue economy and tourism and its waste management system is predominantly a cost centre. The implementation of an MRF could boost the manufacturing sector, contribute to economic growth, and be a catalyst in creating a green industry with multiple downstream value chains with supply chain linkages. Globally, there is a trend to reuse and recycle that created an international market for recycled solid waste. MRFs enable the efficient sorting of solid waste into desired recoverable materials thus providing a gateway for entrance to the international trading of recycled waste. Research into the current state and effort to improve waste management in Jamaica in contrast with the similar and more advanced territories are outlined. The study explores the concept of green industrialization and its applicability to vulnerable small state economies like Jamaica. The study highlights the possible contributions and benefits derived from MRFs as a seeding factory that can anchor the reverse and forward logistics of other green industries as part of a logistic-cantered economy. Further, the study showcases an engineering economic analysis that assesses the viability of the implementation of an MRF in Jamaica. This research outlines the potential cost of constructing and operating an MRF and provides a realistic cash flow estimate to establish a baseline for profitability. The approach considers quantitative and qualitative data, assumptions, and modelling using industrial engineering tools and techniques that are outlined. Techniques of facility planning, system analysis and operations research with a focus on linear programming techniques are expressed. Approaches to overcome some implementation challenges including policy, technology and public education are detailed. The results of this study present a reasonable judgment of the prospects of incorporating an MRF to improve Jamaica’s solid waste management and contribute to socioeconomic and environmental benefits and an alternate pathway for economic sustainability.

Keywords: engineering-economic analysis, facility design, green industry, MRF, manufacturing, plant layout, solid-waste management, sustainability, waste disposal

Procedia PDF Downloads 189
797 A Scoping Review of Trends in Climate Change Research in Ghana

Authors: Emmanuel Bintaayi Jeil, Kabila Abass, David Forkuor, Divine Odame Appiah

Abstract:

In Ghana, the nature and trends of climate change-related research are not clear. This study synthesises various research evidence on climate change published in Ghana between 1999 and 2018. Data for the review was gathered using a set of search words performed in Google Scholar, Web of Science, ProQuest, and ScienceDirect following scoping review guidelines stipulated by the Joanna Briggs Institute. Data were analysed using a scoping review. A total of 114 eligible articles were identified and included in the synthesis. Findings revealed that research on climate change in Ghana is growing steadily, and most of the studies were conducted in 2018. Trends in climate change research in Ghana relate to agriculture and development. There is a lack of attention on climate change issues related to women, water availability and management, and health. Future research should therefore focus on addressing these issues in addition to alternative livelihoods for vulnerable people.

Keywords: scoping review, trends, climate change, research, Ghana

Procedia PDF Downloads 83
796 Development of a Three-Dimensional-Flywheel Robotic System

Authors: Chung-Chun Hsiao, Yu-Kai, Ting, Kai-Yuan Liu, Pang-Wei Yen, Jia-Ying Tu

Abstract:

In this paper, a new design of spherical robotic system based on the concepts of gimbal structure and gyro dynamics is presented. Robots equipped with multiple wheels and complex steering mechanics may increase the weight and degrade the energy transmission efficiency. In addition, the wheeled and legged robots are relatively vulnerable to lateral impact and lack of lateral mobility. Therefore, the proposed robotic design uses a spherical shell as the main body for ground locomotion, instead of using wheel devices. Three spherical shells are structured in a similar way to a gimbal device and rotate like a gyro system. The design and mechanism of the proposed robotic system is introduced. In addition, preliminary results of the dynamic model based on the principles of planar rigid body kinematics and Lagrangian equation are included. Simulation results and rig construction are presented to verify the concepts.

Keywords: gyro, gimbal, lagrange equation, spherical robots

Procedia PDF Downloads 281
795 Natural Hazards and Their Costs in Albanian Part of Ohrid Graben

Authors: Mentor Sulollari

Abstract:

Albania, according to (UNU-EHS) United Nations University, Institute for Environment and Human Security studies for 2015, is listed as the number one country in Europe for the possibility to be caught by natural catastrophes. This is conditioned by unstudied human activity, which has seriously damaged the environment. Albanian part of Ohrid graben that lies in Southeast of Albania, is endangered by landslides and floods, as a result of uncontrolled urban development and low level of investment in infrastructure, rugged terrain in its western part and capricious climate caused by global warming. To be dealt with natural disasters, which cause casualties and material damage, it is important to study them in order to anticipate and reduce damages in future. As part of this study is the construction of natural hazards map, which show us where they are distributed, and which are the vulnerable areas. This article will also be dealing with socio-economic and environmental costs of those events and what are the measures to be taken to reduce them.

Keywords: flooding, landslides, natural catastrophes mapping, Pogradec, lake Ohrid, Albanian part of Ohrid graben

Procedia PDF Downloads 267
794 Survey on Malware Detection

Authors: Doaa Wael, Naswa Abdelbaky

Abstract:

Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.

Keywords: malware analysis, blockchain, malware attacks, malware detection approaches

Procedia PDF Downloads 42