Search results for: Development Communication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5305

Search results for: Development Communication

4735 A 10 Giga VPN Accelerator Board for Trust Channel Security System

Authors: Ki Hyun Kim, Jang-Hee Yoo, Kyo Il Chung

Abstract:

This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exchange block, security association block, and IPsec engine block. The internet key exchange block negotiates crypto algorithm and key used in IPsec engine block. Security Association blocks setting-up and manages security association information. IPsec engine block treats IPsec packets and consists of networking functions for communication. The IPsec engine block should be embodied by H/W and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode.

Keywords: TCSS(Trust Channel Security System), VPN(VirtualPrivate Network), IPsec, SSL, Security Processor, Securitycommunication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2086
4734 Systems Engineering Management Using Transdisciplinary Quality System Development Lifecycle Model

Authors: Mohamed Asaad Abdelrazek, Amir Taher El-Sheikh, M. Zayan, A.M. Elhady

Abstract:

The successful realization of complex systems is dependent not only on the technology issues and the process for implementing them, but on the management issues as well. Managing the systems development lifecycle requires technical management. Systems engineering management is the technical management. Systems engineering management is accomplished by incorporating many activities. The three major activities are development phasing, systems engineering process and lifecycle integration. Systems engineering management activities are performed across the system development lifecycle. Due to the ever-increasing complexity of systems as well the difficulty of managing and tracking the development activities, new ways to achieve systems engineering management activities are required. This paper presents a systematic approach used as a design management tool applied across systems engineering management roles. In this approach, Transdisciplinary System Development Lifecycle (TSDL) Model has been modified and integrated with Quality Function Deployment. Hereinafter, the name of the systematic approach is the Transdisciplinary Quality System Development Lifecycle (TQSDL) Model. The QFD translates the voice of customers (VOC) into measurable technical characteristics. The modified TSDL model is based on Axiomatic Design developed by Suh which is applicable to all designs: products, processes, systems and organizations. The TQSDL model aims to provide a robust structure and systematic thinking to support the implementation of systems engineering management roles. This approach ensures that the customer requirements are fulfilled as well as satisfies all the systems engineering manager roles and activities.

Keywords: Axiomatic design, quality function deployment, systems engineering management, system development lifecycle.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1731
4733 The Efficacy of Technology in Enhancing the Development and Learning of Children (0 – 5 Years)

Authors: Adesina, Olusola Joseph

Abstract:

The use of Technological tools in the classroom setting has drawn the interest of researchers all over the world in the recent time. Technology has been identified in the recent time as potentials tools to aid learning especially during early childhood stage. The main objective of this is to assist the upcoming younger generations to acquire necessary skills for cognitive development which later enhances effective teaching learning process. The integration of Technology in early childhood requires a careful selection of devices that will both assist the children and the teachers or care givers. This paper therefore, examines some selected literature evidences and highlighted the efficacy of various technologies tools in enhancing the development and learning of children (0 – 5 years). Conclusion and recommendations were also drawn in this paper. 

Keywords: Development, Efficacy, Learning, Technological Device.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1510
4732 Community Behaviour and Support towards Island Tourism Development

Authors: Mohd Hafiz Hanafiah, Mohamad Abdullah Hemdi

Abstract:

The tourism industry has been widely used to eradicate poverty, due to the ability to generate income, employment as well as improving the quality of life. The industry has faced rapid growth with support from local residents who were involved directly and indirectly in tourism activities. Their support and behaviour does not only facilitate in boosting tourists’ satisfaction levels, but at the same time it contributes to the word-of-mouth promotion among the visitors. In order to ensure the success of the industry, the involvement and participation of the local communities are pertinent. This paper endeavours on local community attitudes, benefit and their support toward future tourism development in Tioman Island. Through a series of descriptive and factor analyses, various useful understandings on the issues of interest revealed. The findings indicated that community with personal benefit will support future development. Meanwhile, the finding also revealed that the community with negative perception still supports future tourism development due to their over reliance on this sector as their main source of income and destination development means.

Keywords: Personal benefit, perceived impact, future attitudes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2759
4731 Development of Non-functional Requirements for Decision Support Systems

Authors: Kassem Saleh

Abstract:

Decision Support System (DSS) are interactive software systems that are built to assist the management of an organization in the decision making process when faced with nonroutine problems in a specific application domain. Non-functional requirements (NFRs) for a DSS deal with the desirable qualities and restrictions that the DSS functionalities must satisfy. Unlike the functional requirements, which are tangible functionalities provided by the DSS, NFRs are often hidden and transparent to DSS users but affect the quality of the provided functionalities. NFRs are often overlooked or added later to the system in an ad hoc manner, leading to a poor overall quality of the system. In this paper, we discuss the development of NFRs as part of the requirements engineering phase of the system development life cycle of DSSs. To help eliciting NFRs, we provide a comprehensive taxonomy of NFRs for DSSs.

Keywords: Decision support system, Development, Elicitation, Non-functional requirements, Taxonomy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2447
4730 Radar Task Schedulers based on Multiple Queue

Authors: María I. Jiménez, Alberto Izquierdo, Juan J. Villacorta, Lara del Val, Mariano Raboso

Abstract:

There are very complex communication systems, as the multifunction radar, MFAR (Multi-Function Array Radar), where functions are integrated all together, and simultaneously are performed the classic functions of tracking and surveillance, as all the functions related to the communication, countermeasures, and calibration. All these functions are divided into the tasks to execute. The task scheduler is a key element of the radar, since it does the planning and distribution of energy and time resources to be shared and used by all tasks. This paper presents schedulers based on the use of multiple queue. Several schedulers have been designed and studied, and it has been made a comparative analysis of different performed schedulers. The tests and experiments have been done by means of system software simulation. Finally a suitable set of radar characteristics has been selected to evaluate the behavior of the task scheduler working.

Keywords: Queue Theory, Radar, Scheduler, Task.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2176
4729 Excitonic Refractive Index Change in High Purity GaAs Modulator at Room Temperature for Optical Fiber Communication Network

Authors: Durga Prasad Sapkota, Madhu Sudan Kayastha, Koichi Wakita

Abstract:

In this paper, we have compared and analyzed the electroabsorption properties between with and without excitonic effect bulk in high purity GaAs spatial light modulator for optical fiber communication network. The eletroabsorption properties such as absorption spectra, change in absorption spectra, change in refractive index and extinction ration has been calculated. We have also compared the result of absorption spectra and change in absorption spectra with the experimental results and found close agreement with experimental results.

Keywords: Exciton, Refractive index change, Extinction ratio.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2001
4728 Airport Investment Risk Assessment under Uncertainty

Authors: Elena M. Capitanul, Carlos A. Nunes Cosenza, Walid El Moudani, Felix Mora Camino

Abstract:

The construction of a new airport or the extension of an existing one requires massive investments and many times public private partnerships were considered in order to make feasible such projects. One characteristic of these projects is uncertainty with respect to financial and environmental impacts on the medium to long term. Another one is the multistage nature of these types of projects. While many airport development projects have been a success, some others have turned into a nightmare for their promoters. This communication puts forward a new approach for airport investment risk assessment. The approach takes explicitly into account the degree of uncertainty in activity levels prediction and proposes milestones for the different stages of the project for minimizing risk. Uncertainty is represented through fuzzy dual theory and risk management is performed using dynamic programming. An illustration of the proposed approach is provided.

Keywords: Airports, fuzzy logic, risk, uncertainty.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2463
4727 A New Secure Communication Model Based on Synchronization of Coupled Multidelay Feedback Systems

Authors: Thang Manh Hoang

Abstract:

Recent research result has shown that two multidelay feedback systems can synchronize each other under different schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating synchronization. There, the driving signal is significantly complex due that it is constituted by multiple nonlinear transformations of delayed state variable. In this paper, a secure communication model is proposed based on synchronization of coupled multidelay feedback systems, in which the plain signal is mixed with a complex signal at the transmitter side and it is precisely retrieved at the receiver side. The effectiveness of the proposed model is demonstrated and verified in the specific example, where the message signal is masked directly by the complex signal and security is examined under the breaking method of power spectrum analysis.

Keywords: chaos synchronization, time-delayed system, chaosbasedsecure communications

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1978
4726 Consumer Market for Georgian Hazelnut and the Strategy to Improve Its Competitiveness

Authors: M. Chavleishvili

Abstract:

The paper presents the trends of Georgian hazelnut market development and analyses the competitive advantages which will help Georgia to enter international hazelnut market using modern technologies. The history of hazelnut crop development and hazelnut varieties in Georgia are discussed. For hazelnut supply analysis trends in hazelnut production are considered, trends in export and import development is evaluated, domestic hazelnut market is studied and analysed based on expert interviews and initial accounting materials. In order to achieve and strengthen its position in international market, potential advantages and disadvantages of Georgian hazelnut are revealed, analysis of export and import possibilities of hazelnut is presented. Recommendations are developed based on the conclusions, which are made through identifying the key factors that hinder development of Georgian hazelnut market. 

Keywords: Hazelnut market, hazelnut export and import, competitiveness of hazelnut

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3225
4725 Evaluation of Multilevel Modulation Formats for 100Gbps Transmission with Direct Detection

Authors: Majed Omar Al-Dwairi

Abstract:

This paper evaluate the multilevel modulation for different techniques such as amplitude shift keying (M-ASK), MASK, differential phase shift keying (M-ASK-Bipolar), Quaternary Amplitude Shift Keying (QASK) and Quaternary Polarization-ASK (QPol-ASK) at a total bit rate of 107 Gbps. The aim is to find a costeffective very high speed transport solution. Numerical investigation was performed using Monte Carlo simulations. The obtained results indicate that some modulation formats can be operated at 100Gbps in optical communication systems with low implementation effort and high spectral efficiency.

Keywords: Optical communication, multilevel amplitude shift keying (M-ASK), Differential phase shift keying (DPSK), Quaternary Amplitude Shift Keying (QASK), Quaternary Polarization-ASK (QPol-ASK).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2240
4724 Pricing Strategy Selection Using Fuzzy Linear Programming

Authors: Elif Alaybeyoğlu, Y. Esra Albayrak

Abstract:

Marketing establishes a communication network between producers and consumers. Nowadays, marketing approach is customer-focused and products are directly oriented to meet customer needs. Marketing, which is a long process, needs organization and management. Therefore strategic marketing planning becomes more and more important in today’s competitive conditions. Main focus of this paper is to evaluate pricing strategies and select the best pricing strategy solution while considering internal and external factors influencing the company’s pricing decisions associated with new product development. To reflect the decision maker’s subjective preference information and to determine the weight vector of factors (attributes), the fuzzy linear programming technique for multidimensional analysis of preference (LINMAP) under intuitionistic fuzzy (IF) environments is used.

Keywords: IF Sets, LINMAP, MAGDM, Marketing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2245
4723 Developing Measurement Model of Interpersonal Skills of Youth

Authors: Mohd Yusri Ibrahim

Abstract:

Although it is known that interpersonal skills are essential for personal development, the debate however continues as to how to measure those skills, especially in youths. This study was conducted to develop a measurement model of interpersonal skills by suggesting three construct namely personal, skills and relationship; six function namely self, perception, listening, conversation, emotion and conflict management; and 30 behaviours as indicators. This cross-sectional survey by questionnaires was applied in east side of peninsula of Malaysia for 150 respondents, and analyzed by structural equation modelling (SEM) by AMOS. The suggested constructs, functions and indicators were consider accepted as measurement elements by observing on regression weight for standard loading, average variance extracted (AVE) for convergent validity, square root of AVE for discriminant validity, composite reliability (CR), and at least three fit indexes for model fitness. Finally, a measurement model of interpersonal skill for youth was successfully developed.

Keywords: Interpersonal communication, interpersonal skill, youth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1251
4722 Overload Control in a SIP Signaling Network

Authors: Masataka Ohta

Abstract:

The Internet telephony employs a new type of Internet communication on which a mutual communication is realized by establishing sessions. Session Initiation Protocol (SIP) is used to establish sessions between end-users. For unreliable transmission (UDP), SIP message should be retransmitted when it is lost. The retransmissions increase a load of the SIP signaling network, and sometimes lead to performance degradation when a network is overloaded. The paper proposes an overload control for a SIP signaling network to protect from a performance degradation. Introducing two thresholds in a queue of a SIP proxy server, the SIP proxy server detects a congestion. Once congestion is detected, a SIP signaling network restricts to make new calls. The proposed overload control is evaluated using the network simulator (ns-2). With simulation results, the paper shows the proposed overload control works well.

Keywords: SIP signalling congestion overload control retransmission throughput simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1742
4721 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 661
4720 God in Jesus, a Daimonion in Socrates and Their Respective Divine Communication

Authors: Yip-Mei Loh

Abstract:

Jesus and Socrates shared a remarkable gift; a channel of inner spiritual communication, to afford them truthful guidance in their respective religious discourse. Jesus is part of the Trinity; he is the Son, the Son of God. In mortal life he is the son of a carpenter. He called on all peoples to repent of their sins but fell foul of the authorities and was crucified. Socrates was an ancient Greek philosopher and the son of an artisan. His mission is to drive the Athenians to investigate truth, but he too incurs the displeasure of fellow citizens, to the extent of execution. The accusations made against them centre around, in Jesus’ case, proclaiming himself the Son of God, with the means to pardon, and in Socrates’, that a daimonion, an inner voice, speaks to him in his heart. Jesus talks with God directly through prayer, as the pneuma of God, i.e. to pneuma to hagion, or Holy Spirit, is with him. Socrates seems to enter what we would now think of as a trance-like condition, wherein he communicates with his inner daimonion, who directs him to take courage on the righteous path.

Keywords: Daimonion, God, Holy Spirit, life, truth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 890
4719 Development of a Harvest Mechanism for the Kahramanmaraş Chili Pepper

Authors: O. E. Akay, E. Güzel, M. T. Özcan

Abstract:

The pepper has quite a rich variety. The development of a single harvesting machine for all kinds of peppers is a difficult research topic. By development of harvesting mechanisms, we could be able to facilitate the pepper harvesting problems. In this study, an experimental harvesting machine was designed for chili pepper. Four-bar mechanism was used for the design of the prototype harvesting machine. At the result of harvest trials, 80% of peppers were harvested and 8% foreign materials were collected. These results have provided some tips on how to apply to large-scale pepper Four-bar mechanism of the harvest machine.

Keywords: Kinematic simulation, four bar linkage, harvest mechanization, pepper harvest.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2181
4718 Software Development Processes Maturity versus Software Processes and Products Measurement

Authors: Beata Czarnacka-Chrobot

Abstract:

Unsatisfactory effectiveness of software systems development and enhancement projects is one of the main reasons why in software engineering there are attempts being made to use experiences coming from other engineering disciplines. In spite of specificity of software product and process a belief had come out that the execution of software could be more effective if these objects were subject to measurement – as it is true in other engineering disciplines for which measurement is an immanent feature. Thus objective and reliable approaches to the measurement of software processes and products have been sought in software engineering for several dozens of years already. This may be proved, among others, by the current version of CMMI for Development model. This paper is aimed at analyzing the approach to the software processes and products measurement proposed in the latest version of this very model, indicating growing acceptance for this issue in software engineering.

Keywords: CMMI for Development (1.3), ISO/IEC standards, measurement and analysis process area, software process measurement, software product measurement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1762
4717 Renewed Urban Waterfront: Spatial Conditions of a Contemporary Urban Space Typology

Authors: Beate Niemann, Fabian Pramel

Abstract:

The formerly industrially or militarily used Urban Waterfront is a potential area for urban development. Extensive interventions in the urban space come along with the development of these previously inaccessible areas in the city. The development of the Urban Waterfront in the European City is not subject to any recognizable urban paradigm. In this study, the development of the Urban Waterfront as a new urban space typology is analyzed by case studies of Urban Waterfront developments in European Cities. For humans, perceptible spatial conditions are categorized and it is identified whether the themed Urban Waterfront Developments are congruent or incongruent urban design interventions and which deviations the Urban Waterfront itself induce. As congruent urban design, a design is understood, which fits in the urban fabric regarding its similar spatial conditions to the surrounding. Incongruent urban design, however, shows significantly different conditions in its shape. Finally, the spatial relationship of the themed Urban Waterfront developments and their associated environment are compared in order to identify contrasts between new and old urban space. In this way, conclusions about urban design paradigms of the new urban space typology are tried to be drawn.

Keywords: Composition, congruence, identity, paradigm, spatial condition, urban design, urban development, urban waterfront.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2109
4716 An Improved ICI Self-Cancellation Scheme for Multi-Carrier Communication Systems

Authors: Arvind Kumar, Rajoo Pandey

Abstract:

For broadband wireless mobile communication systems the orthogonal frequency division multiplexing (OFDM) is a suitable modulation scheme. The frequency offset between transmitter and receiver local oscillator is main drawback of OFDM systems, which causes intercarrier interference (ICI) in the subcarriers of the OFDM system. This ICI degrades the bit error rate (BER) performance of the system. In this paper an improved self-ICI cancellation scheme is proposed to improve the system performance. The proposed scheme is based on discrete Fourier transform-inverse discrete Fourier transform (DFT-IDFT). The simulation results show that there is satisfactory improvement in the bit error rate (BER) performance of the present scheme.

Keywords: OFDM, Intercarrier Interference, InterferenceCoefficients, DFT based Self-ICI Cancellation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1632
4715 The Use of Emoticons in Polite Phrases of Greetings and Thanks

Authors: Zuzana Komrsková

Abstract:

This paper shows the connection between emoticons and politeness in written computer-mediated communication. It studies if there are some differences in the use of emoticon between Czech and English written tweets. The assumptions about the use of emoticons were based on the use of greetings and thanks in real, faceto-face situations. The first assumption, that welcome greeting phrase would be accompanied by positive emoticon, was correct. But for the farewell greeting are both positive and negative emoticons possible. The results show lower frequency of negative emoticons in this context. There were also quite often found both positive and negative emoticon in the same tweet. The expression of gratitude is associated with positive emotions. The results show that emoticons accompany polite phrases of greeting and thanks very often both in Czech and English. The use of emoticons with studied polite phrases shows that emoticons have become an integral part of these phrases. 

Keywords: Computer-mediated communication, emoticons, politeness, Twitter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2491
4714 Creativity and Economic Development

Authors: A. Bobirca, A. Draghici

Abstract:

The objective of this paper is to construct a creativity composite index designed to capture the growing role of creativity in driving economic and social development for the 27 European Union countries. The paper proposes a new approach for the measurement of EU-27 creative potential and for determining its capacity to attract and develop creative human capital. We apply a modified version of the 3T model developed by Richard Florida and Irene Tinagli for constructing a Euro-Creativity Index. The resulting indexes establish a quantitative base for policy makers, supporting their efforts to determine the contribution of creativity to economic development.

Keywords: European Creativity Index, talent, technology, tolerance

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2934
4713 Uneven Development: Structural Changes and Income Outcomes across States in Malaysia

Authors: Siti Aiysyah Tumin

Abstract:

This paper looks at the nature of structural changes—the transition of employment from agriculture, to manufacturing, then to different types of services—in different states in Malaysia and links it to income outcomes for households and workers. Specifically, this paper investigates the conditional association between the concentration of different economic activities and income outcomes (household incomes and employee wages) in almost four decades. Using publicly available state-level employment and income data, we found that significant wage premium was associated with “modern” services (finance, real estate, professional, information and communication), which are urban-based services sectors that employ a larger proportion of skilled and educated workers. However, employment in manufacturing and other services subsectors was significantly associated with a lower income dispersion and inequality, alluding to their importance in welfare improvements.

Keywords: Employment, labour market, structural change, wages.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 501
4712 Improving the Safety Performance of Workers by Assessing the Impact of Safety Culture on Workers’ Safety Behaviour in Nigeria Oil and Gas Industry: A Pilot Study in the Niger Delta Region

Authors: Efua Ehiaguina, Haruna Moda

Abstract:

Interest in the development of appropriate safety culture in the oil and gas industry has taken centre stage among stakeholders in the industry. Human behaviour has been identified as a major contributor to occupational accidents, where abnormal activities associated with safety management are taken as normal behaviour. Poor safety culture is one of the major factors that influence employee’s safety behaviour at work, which may consequently result in injuries and accidents and strengthening such a culture can improve workers safety performance. Nigeria oil and gas industry has contributed to the growth and development of the country in diverse ways. However, in terms of safety and health of workers, this industry is a dangerous place to work as workers are often exposed to occupational safety and health hazard. To ascertain the impact of employees’ safety and how it impacts health and safety compliance within the local industry, online safety culture survey targeting frontline workers within the industry was administered covering major subjects that include; perception of management commitment and style of leadership; safety communication method and its resultant impact on employees’ behaviour; employee safety commitment and training needs. The preliminary result revealed that 54% of the participants feel that there is a lack of motivation from the management to work safely. In addition, 55% of participants revealed that employers place more emphasis on work delivery over employee’s safety on the installation. It is expected that the study outcome will provide measures aimed at strengthening and sustaining safety culture in the Nigerian oil and gas industry.

Keywords: Oil and gas safety, safety behaviour, safety culture, safety compliance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1251
4711 Forensic Implications of Blowfly Chrysomya rufifacies (Calliphoridae: Diptera) Development Rates Affected by Ketum Extract

Authors: A. R. Rashid, A. S. Siti, F. R. Siti, A. R. Reena, H. S. S. Sharifah, F. Z. Nurul, W. A. Nazni

Abstract:

This study was conducted to examine the effects of ketum extract on development of Chrysomya rufifacies and to analyze the presence of mitragynine in the larvae samples. 110 newly emerged first instar larvae of C. rufifacies were introduced on ketum extract-mixed cow liver at doses of 0, 20, 40 and 60g. Blowfly development rate was determined with 12 hour intervals and mitragynine in larvae was extracted and quantitated. C. rufifacies in control group took about 192 hours to complete their development from first instar larvae to adult blowfly; meanwhile blowfly form from the highest dose of ketum was 264 hours. Mitragynine was detected in all groups of treatment, except for control. In conclusion, the presence of mitragynine in C. rufifacies is affected in delaying development rates of the blowfly for up to 62 hours or 3 days. Chemical analysis of mitragynine from larvae samples showed that this alkaloid present in all specimens analyzed. 

Keywords: Chrysomya rufifacies, Ketum, Mitragynine, Postmortem Interval (PMI).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2480
4710 Toward an Efficient Framework for Designing, Developing, and Using Secure Mobile Applications

Authors: Mohamed Adel Serhani, Abdelghani Benharref, Rachida Dssouli, Rabeb Mizouni

Abstract:

Nowadays, people are going more and more mobile, both in terms of devices and associated applications. Moreover, services that these devices are offering are getting wider and much more complex. Even though actual handheld devices have considerable computing power, their contexts of utilization are different. These contexts are affected by the availability of connection, high latency of wireless networks, battery life, size of the screen, on-screen or hard keyboard, etc. Consequently, development of mobile applications and their associated mobile Web services, if any, should follow a concise methodology so they will provide a high Quality of Service. The aim of this paper is to highlight and discuss main issues to consider when developing mobile applications and mobile Web services and then propose a framework that leads developers through different steps and modules toward development of efficient and secure mobile applications. First, different challenges in developing such applications are elicited and deeply discussed. Second, a development framework is presented with different modules addressing each of these challenges. Third, the paper presents an example of a mobile application, Eivom Cinema Guide, which benefits from following our development framework.

Keywords: Mobile applications, development of mobile applications, efficient mobile application, secure mobile application.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1632
4709 A Programmer’s Survey of the Quantum Computing Paradigm

Authors: Philippe Jorrand

Abstract:

Research in quantum computation is looking for the consequences of having information encoding, processing and communication exploit the laws of quantum physics, i.e. the laws which govern the ultimate knowledge that we have, today, of the foreign world of elementary particles, as described by quantum mechanics. This paper starts with a short survey of the principles which underlie quantum computing, and of some of the major breakthroughs brought by the first ten to fifteen years of research in this domain; quantum algorithms and quantum teleportation are very biefly presented. The next sections are devoted to one among the many directions of current research in the quantum computation paradigm, namely quantum programming languages and their semantics. A few other hot topics and open problems in quantum information processing and communication are mentionned in few words in the concluding remarks, the most difficult of them being the physical implementation of a quantum computer. The interested reader will find a list of useful references at the end of the paper.

Keywords: Quantum information processing, quantum algorithms, quantum programming languages.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1985
4708 Error Rate Probability for Coded MQAM with MRC Diversity in the Presence of Cochannel Interferers over Nakagami-Fading Channels

Authors: J.S. Ubhi, M.S. Patterh, T.S. Kamal

Abstract:

Exact expressions for bit-error probability (BEP) for coherent square detection of uncoded and coded M-ary quadrature amplitude modulation (MQAM) using an array of antennas with maximal ratio combining (MRC) in a flat fading channel interference limited system in a Nakagami-m fading environment is derived. The analysis assumes an arbitrary number of independent and identically distributed Nakagami interferers. The results for coded MQAM are computed numerically for the case of (24,12) extended Golay code and compared with uncoded MQAM by plotting error probabilities versus average signal-to-interference ratio (SIR) for various values of order of diversity N, number of distinct symbols M, in order to examine the effect of cochannel interferers on the performance of the digital communication system. The diversity gains and net gains are also presented in tabular form in order to examine the performance of digital communication system in the presence of interferers, as the order of diversity increases. The analytical results presented in this paper are expected to provide useful information needed for design and analysis of digital communication systems with space diversity in wireless fading channels.

Keywords: Cochannel interference, maximal ratio combining, Nakagami-m fading, wireless digital communications.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1840
4707 State Economic Safety in the Conditions of Innovative Economy Formation

Authors: Zh.Mingaleva, K.Balkova

Abstract:

Innovations and innovative activity get the increasing value for successful financial and economic activity of the countries and regions. The level of innovative sphere development determines place of a country or a region in world economy and forms a basis of steady economic growth. This article is devoted to different aspects of organization of the national economic safety in the conditions of innovative development, its problems, risks and threats. Economy can be considered as aspiring for transition to innovative way only with finding of economic safety: financial independence, power stability and technological progress. There are statistical indicators, defining the level of economic security and factors, threatening economic safety of the state. The research is based on the analysis of factors and indicators in conditions of innovative development. The paper is illustrated by the examples of possible estimated system of the economic safety level.

Keywords: Economic safety, innovative activity, innovative development, innovative economy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1525
4706 A New Group Key Management Protocol for Wireless Ad-Hoc Networks

Authors: Rony H. Rahman, Lutfar Rahman

Abstract:

Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group communication. The main contribution of this paper is a low complexity key management scheme that is suitable for fully self-organized ad-hoc networks. The protocol is also password authenticated, making it resilient against active attacks. Unlike other existing key agreement protocols, ours make no assumption about the structure of the underlying wireless network, making it suitable for “truly ad-hoc" networks. Finally, we will analyze our protocol to show the computation and communication burden on individual nodes for key establishment.

Keywords: Ad-hoc Networks, Group Key Management, Key Management Protocols, Password Authentication

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1742