Search results for: Food security.
279 Using HMM-based Classifier Adapted to Background Noises with Improved Sounds Features for Audio Surveillance Application
Authors: Asma Rabaoui, Zied Lachiri, Noureddine Ellouze
Abstract:
Discrimination between different classes of environmental sounds is the goal of our work. The use of a sound recognition system can offer concrete potentialities for surveillance and security applications. The first paper contribution to this research field is represented by a thorough investigation of the applicability of state-of-the-art audio features in the domain of environmental sound recognition. Additionally, a set of novel features obtained by combining the basic parameters is introduced. The quality of the features investigated is evaluated by a HMM-based classifier to which a great interest was done. In fact, we propose to use a Multi-Style training system based on HMMs: one recognizer is trained on a database including different levels of background noises and is used as a universal recognizer for every environment. In order to enhance the system robustness by reducing the environmental variability, we explore different adaptation algorithms including Maximum Likelihood Linear Regression (MLLR), Maximum A Posteriori (MAP) and the MAP/MLLR algorithm that combines MAP and MLLR. Experimental evaluation shows that a rather good recognition rate can be reached, even under important noise degradation conditions when the system is fed by the convenient set of features.Keywords: Sounds recognition, HMM classifier, Multi-style training, Environmental Adaptation, Feature combinations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1643278 A Comparative Study of International Tourists- Safety Needs and Thai Tourist Polices- Perception towards International Tourists- Safety Needs
Authors: Pimmada Wichasin, Nuntiya Doungphummes
Abstract:
While service quality is acceptably most valued in the tourism industry, the issue of safety and security plays a key role in sustaining the industry success. Such an issue has been part of Thailand-s tourism development and promotion for several years. Evidently, the Tourist Police Department was set up for this purpose. Its main responsibility is to deal with international tourists- safety and confidence in travelling within Thai territory. However, to strengthen the tourism safety of the country, it is important to better understand international tourists- safety concerns about Thailand. This article seeks to compare international tourists- safety needs and Thai tourist polices- perception towards the tourists- safety concern to determine what measure should be taken to assure the tourist of Thailand-s secure environment. Through the employment of quantitative and qualitative methodological approaches, the tourism safety need of international tourists from Europe, North America and Asia was excavated, how Thai tourist polices and local polices perceived the international tourist-s safety concern was investigated, and opinion and experiences about how the police deal with international tourists- problems in eight touristic areas were also explored. A comparative result reveals a certain degrees of differences in international tourists- safety needs and Thai polices- perception towards their needs. The tourism safety prevention and protection measure and practice are also suggested.
Keywords: Tourism risk, Tourism safety, Travel safety need, Travelling in Thailand
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3823277 Growth Behaviors, Thermostable Direct Hemolysin Secretion and Fatty Acid Profiles of Acid-adapted and Non-adapted Vibrio parahaemolyticus
Authors: Ming-Lun Chiang, Chieh Wu, Ming-Ju Chen
Abstract:
Three strains of Vibrio parahaemolyticus (690, BCRC 13023 and BCRC 13025) implicated in food poisoning outbreaks in Taiwan were subjected to acid adaptation at pH 5.5 for 90 min. The growth behaviors of acid-adapted and non-adapted V. parahaemolyticus in the media supplemented with various nitrogen and carbon sources were investigated. The effects of acid adaptation on the thermostable direct hemolysin (TDH) secretion and fatty acid profiles of V. parahaemolyticus were also examined. Results showed that acid-adapted and non-adapted V. parahaemolyticus 690, BCRC 13023 and BCRC 13025 grew similarly in TSB-3% NaCl and basal media supplemented with various carbon and nitrogen sources during incubation period. Higher TDH secretion was noted with V. parahaemolyticus 690 among the three strains. However, acid-adapted strains produced less amounts of TDH than non-adapted strains when they were grown in TSB-3% NaCl. Additionally, acid adaptation increased the ratio of SFA/USFA in cells of V. parahaemolyticus strains.
Keywords: Vibrio parahaemolyticus, acid adaptation, thermostable direct hemolysin, fatty acid profile.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2113276 Investigation of the Emulsifying Properties of Bambara Groundnut Flour and Starch
Authors: Ebunoluwa G. Gabriel, Victoria A. Jideani, Daniel I. O. Ikhu-Omoregbe
Abstract:
The current desire in food and industrial emulsification is the use of natural emulsifiers. Bambara groundnut flour (BGNF) and its starch (BGNS) will serve both emulsifying and nutritional purposes if found suitable. This current study was aimed at investigating the emulsifying properties of BGNF/BGNS. BGNS was extracted from the BGNF. Emulsions were prepared using a wide range of flour-oil-water and starch-oil-water composition as generated through the application of Response Surface (D-optimal) design. Prepared emulsions were investigated for stability to creaming/sedimentation (using the kinetic information from turbiscan) and flocculation/coalescence (by monitoring the droplet diameter growth using optical microscope) over 5 days. The most stable emulsions (one BGNF-stabilized and the other BGNS-stabilized) were determined. The optimal emulsifier/oil composition was 9g/39g for BGNF and 5g/30g for BGNS. The two emulsions had only 30% and 50% growth in oil droplet diameter respectively by day 5, compared to over 3000% in the unstable ones. The BGNF-stabilized emulsions were more stable than the BGNS-stabilized ones. Emulsions were successfully stabilized with BGNF and BGNS.
Keywords: Bambara groundnut, coalescence, creaming, emulsification, emulsion, emulsion stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3446275 Cereals' Products with Red Grape and Walnut Extracts as Functional Foods for Prevention of Kidney Dysfunction
Authors: Sahar Y. Al-Okbi, Doha A. Mohamed, Thanaa E. Hamed, Ahmed Ms Hussein
Abstract:
In the present research, two nutraceuticals made from red grape and walnut that showed previously to improve kidney dysfunction were incorporated separately into functional foods' bread made from barley and rice bran. The functional foods were evaluated in rats in which chronic renal failure was induced through feeding diet rich in adenine and phosphate (APD). The evaluation based on assessing kidney function, oxidative stress, inflammatory biomarkers and body weight gain. Results showed induction of chronic kidney failure reflected in significant increase in plasma urea, creatinine, malondialdehyde, tumor necrosis factor- α and low density lipoprotein cholesterol along with significant reduction of plasma albumin, and total antioxidant and creatinine clearance and body weight gain on feeding APD compared to control healthy group. Feeding the functional foods produced amelioration in the different biochemical parameters and body weight gain indicating improvement in kidney function.
Keywords: Functional food, kidney dysfunction, rats.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2308274 An Efficient Architecture for Interleaved Modular Multiplication
Authors: Ahmad M. Abdel Fattah, Ayman M. Bahaa El-Din, Hossam M.A. Fahmy
Abstract:
Modular multiplication is the basic operation in most public key cryptosystems, such as RSA, DSA, ECC, and DH key exchange. Unfortunately, very large operands (in order of 1024 or 2048 bits) must be used to provide sufficient security strength. The use of such big numbers dramatically slows down the whole cipher system, especially when running on embedded processors. So far, customized hardware accelerators - developed on FPGAs or ASICs - were the best choice for accelerating modular multiplication in embedded environments. On the other hand, many algorithms have been developed to speed up such operations. Examples are the Montgomery modular multiplication and the interleaved modular multiplication algorithms. Combining both customized hardware with an efficient algorithm is expected to provide a much faster cipher system. This paper introduces an enhanced architecture for computing the modular multiplication of two large numbers X and Y modulo a given modulus M. The proposed design is compared with three previous architectures depending on carry save adders and look up tables. Look up tables should be loaded with a set of pre-computed values. Our proposed architecture uses the same carry save addition, but replaces both look up tables and pre-computations with an enhanced version of sign detection techniques. The proposed architecture supports higher frequencies than other architectures. It also has a better overall absolute time for a single operation.Keywords: Montgomery multiplication, modular multiplication, efficient architecture, FPGA, RSA
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2451273 Providing a Secure, Reliable and Decentralized Document Management Solution Using Blockchain by a Virtual Identity Card
Authors: Meet Shah, Ankita Aditya, Dhruv Bindra, V. S. Omkar, Aashruti Seervi
Abstract:
In today's world, we need documents everywhere for a smooth workflow in the identification process or any other security aspects. The current system and techniques which are used for identification need one thing, that is ‘proof of existence’, which involves valid documents, for example, educational, financial, etc. The main issue with the current identity access management system and digital identification process is that the system is centralized in their network, which makes it inefficient. The paper presents the system which resolves all these cited issues. It is based on ‘blockchain’ technology, which is a 'decentralized system'. It allows transactions in a decentralized and immutable manner. The primary notion of the model is to ‘have everything with nothing’. It involves inter-linking required documents of a person with a single identity card so that a person can go anywhere without having the required documents with him/her. The person just needs to be physically present at a place wherein documents are necessary, and using a fingerprint impression and an iris scan print, the rest of the verification will progress. Furthermore, some technical overheads and advancements are listed. This paper also aims to layout its far-vision scenario of blockchain and its impact on future trends.
Keywords: Blockchain, decentralized system, fingerprint impression, identity management, iris scan.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1301272 Land Suitability Analysis for Maize Production in Egbeda Local Government Area of Oyo State Using GIS Techniques
Authors: Abegunde Linda, Adedeji Oluwatola, Tope-Ajayi Opeyemi
Abstract:
Maize constitutes a major agrarian production for use by the vast population but despite its economic importance; it has not been produced to meet the economic needs of the country. Achieving optimum yield in maize can meaningfully be supported by land suitability analysis in order to guarantee self-sufficiency for future production optimization. This study examines land suitability for maize production through the analysis of the physicochemical variations in soil properties and other land attributes over space using a Geographic Information System (GIS) framework. Physicochemical parameters of importance selected include slope, landuse, physical and chemical properties of the soil, and climatic variables. Landsat imagery was used to categorize the landuse, Shuttle Radar Topographic Mapping (SRTM) generated the slope and soil samples were analyzed for its physical and chemical components. Suitability was categorized into highly, moderately and marginally suitable based on Food and Agricultural Organisation (FAO) classification, using the Analytical Hierarchy Process (AHP) technique of GIS. This result can be used by small scale farmers for efficient decision making in the allocation of land for maize production.
Keywords: AHP, GIS, MCE, Suitability, Zea mays.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3886271 Studying the Effect of Ethanol and Operating Temperature on Purification of Lactulose Syrup Containing Lactose
Authors: N. Zanganeh, M. Zabet
Abstract:
Lactulose is a synthetic disaccharide which has remarkable applications in food and pharmaceutical fields. Lactulose is not found in nature and it is produced by isomerization reaction of lactose in an alkaline environment. It should be noted that this reaction has a very low yield since significant amount of lactose stays un-reacted in the system. Basically, purification of lactulose is difficult and costly. Previous studies have revealed that solubility of lactose and lactulose are significantly different in ethanol. Considering the fact that solubility is also affected by temperature itself, we investigated the effect of ethanol and temperature on separation process of lactose from the syrup containing lactose and lactulose. For this purpose, a saturated solution containing lactulose and lactose was made at three different temperatures; 25⁰C (room temperature), 31⁰C, and 37⁰C first. Five samples containing 2g saturated solution was taken and then 2g, 3g, 4g, 5g, and 6g ethanol separately was added to the sampling tubes. Sampling tubes were kept at respective temperatures afterward. The concentration of lactose and lactulose after separation process measured and analyzed by High Performance Liquid Chromatography (HPLC). Results showed that ethanol has such a greater impact than operating temperature on purification process. Also, it was observed that the maximum rate of separation occurred at initial amount of added ethanol.
Keywords: Ethanol, lactose, lactulose syrup, purification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1120270 Contributory Factors to Diabetes Dietary Regimen Non Adherence in Adults with Diabetes
Authors: Okolie Uchenna, Ehiemere Ijeoma, Ezenduka Pauline, Ogbu Sylvester
Abstract:
A cross sectional survey design was used to collect data from 370 diabetic patients. Two instruments were used in obtaining data; in-depth interview guide and researchers- developed questionnaire. Fisher's exact test was used to investigate association between the identified factors and nonadherence. Factors identified were: socio-demographic factors such as: gender, age, marital status, educational level and occupation; psychosocial obstacles such as: non-affordability of prescribed diet, frustration due to the restriction, limited spousal support, feelings of deprivation, feeling that temptation is inevitable, difficulty in adhering in social gatherings and difficulty in revealing to host that one is diabetic; health care providers obstacles were: poor attitude of health workers, irregular diabetes education in clinics , limited number of nutrition education sessions/ inability of the patients to estimate the desired quantity of food, no reminder post cards or phone calls about upcoming patient appointments and delayed start of appointment / time wasting in clinics.Keywords: Behavior change, diabetes mellitus, dietarymanagement, diet adherence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3431269 Outbound Tourism in Developed Countries: Analysis of the Trends, Behavior and the Transformation of the Moroccan Demand for International Travels
Authors: M. Boukhrouk, R. Ed-Dali
Abstract:
Outbound tourism in Morocco, as in the majority of developing countries, reveals some of the aspects of inequality between the north and the south. Considered by some researchers as one of the facets of the development crisis, access to tourism and especially international tourism is a chance for a small minority with financial means, while the vast portions of the population dream rather of immigrating to a developed country for the sake of improving their standard of living. The right to travel is also limited by visa requirements, procedures in host countries, security and technical measures and creates discrimination in the practice of tourism. These conditions do not seem to be favorable to the democratization of the practice of international tourism for the populations of the southern countries. This paper is a contribution to the reading of the trends of outbound tourism in developing countries through the example of Morocco. It highlights the different aspects of Moroccan outbound tourism, destinations and the behavior of tourists through an analysis of the offer of a sample of 50 travel agencies. In the same vein, it offers a reading grid of the possibilities offered for the development of outbound tourism and the various existing obstacles to the democratization of international outbound tourism in the southern countries. This reading reveals the transformation in the behavior of Moroccan international tourists as well as the profound changes in Moroccan society, through a model of statistical analysis.
Keywords: Demand, Hajj, Morocco, outbound tourism, tendency, Umrah.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1200268 Simulation for Input-Output Energy Structure in Agriculture: Bangladesh
Authors: M. S. Alam, M. R. Alam, Nusrat Jahan Imu
Abstract:
This paper presents a computer simulation model based on system dynamics methodology for analyzing the dynamic characteristics of input energy structure in agriculture and Bangladesh is used here as a case study for model validation. The model provides an input energy structure linking the major energy flows with human energy and draft energy from cattle as well as tractors and/or power tillers, irrigation, chemical fertilizer and pesticide. The evaluation is made in terms of different energy dependent indicators. During the simulation period, the energy input to agriculture increased from 6.1 to 19.15 GJ/ha i.e. 2.14 fold corresponding to energy output in terms of food, fodder and fuel increase from 71.55 to 163.58 GJ/ha i.e. 1.28 fold from the base year. This result indicates that the energy input in Bangladeshi agricultural production is increasing faster than the energy output. Problems such as global warming, nutrient loading and pesticide pollution can associate with this increasing input. For an assessment, a comparative statement of input energy use in agriculture of developed countries (DCs) and least developed countries (LDCs) including Bangladesh has been made. The performance of the model is found satisfactory to analyze the agricultural energy system for LDCs
Keywords: Agriculture, energy indicator, system dynamics, energy flows.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2570267 Development of Lodging Business Management Standards of Bang Khonthi Community in Samut Songkram Province
Authors: Poramet Saeng-On
Abstract:
This research aims to develop ways of lodging business management of Bang Khonthi community in Samut Songkram province that are appropriate with the cultural context of the Bang Khonthi community. Eight lodging business owners were interviewed. It was found that lodging business that are family business must be done with passion, correct understanding of self, culture, nature, Thai way of life, thorough, professional development, environmentally concerned, building partnerships with various networks both community level, and public sector and business cohorts. Public relations should be done through media both traditional and modern outlets, such as websites and social networks to provide customers convenience, security, happiness, knowledge, love and value when travel to Bang Khonthi. This will also help them achieve sustainability in business, in line with the 10 Home Stay Standard Thailand. Suggestions for operators are as follows: Operators need to improve their public relations work. They need to use technology in public relations such as the internet. Management standards must be improved. Souvenir and local products shops should be arranged in the compound. Product pricing must be set accordingly. They need to join hands to help each other. Quality of the business operation should be raised to meet the standards. Educational measures to reduce the impact caused by tourism on the community such as efforts to reduce energy consumption.Keywords: Homestay, lodging business, management, standard.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1114266 A Formal Approach for Proof Constructions in Cryptography
Authors: Markus Kaiser, Johannes Buchmann
Abstract:
In this article we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (σ-algebras, probability spaces and conditional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes- Formula. Besides, we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this article shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in cryptographic research, if the corresponding basic mathematical knowledge is available in a database.Keywords: prime numbers, primality tests, (conditional) probabilitydistributions, formal proof system, higher-order logic, formalverification, Bayes' Formula, Miller-Rabin primality test.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1469265 Assessment of the Benefits of Renewable Energy to the Azerbaijan Ecosystem
Authors: N. S. Imamverdiyev
Abstract:
The transition to renewable energy sources has become a critical component of global efforts to mitigate climate change and promote sustainable development. However, the deployment of renewable energy technologies can also have significant impacts on ecosystems and the services they provide, such as carbon sequestration, soil fertility, water quality, and biodiversity. These technologies also highlight the potential co-benefits of renewable energy deployment for ecosystem services, such as reducing greenhouse gas emissions and improving air and water quality. Renewable energy sources, such as wind, solar, hydro, and biomass, are increasingly being used to meet the world's energy needs due to their environmentally friendly nature and the desire to reduce greenhouse gas emissions. However, the expansion of renewable energy infrastructure can also impact ecosystem services, which are the benefits that humans derive from nature, such as clean water, air, and food. This geographic assessment aims to evaluate the relationship between renewable energy infrastructure and ecosystem services. Potential solutions such as the use of ecological benefit measures, biodiversity-friendly design of renewable energy infrastructure, and stakeholder participation in decision-making processes are being investigated to determine the positive effects of renewable energy infrastructure on ecosystem services.
Keywords: Renewable energy, solar energy, climate change, energy production.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 192264 The Principle of the Protection of Legitimate Expectation: Analysis the Adjudications of Thailand Court
Authors: Paiboon Chuwatthanakij
Abstract:
In reference to the legal state in the Thai legal system, most people understand the minor principles of the legal state form, which are the principles that can be explained and understood easily and the results can be seen clearly, especially in the legitimacy of administrative acts. Therefore, there is no awareness of justice, which is the fundamental value of Thai law. The legitimacy of administrative acts requires the administration to adhere to the constitution and legislative laws in enforcement of the laws. If it appears that the administrative acts are illegitimate, the administrative court, as the court of justice, will revoke those acts as if they had never been set in the legal system, this will affect people’s trust as they are unaware as to whether the administrative acts that appoint their lives are legitimate or not. Regarding the revocation of administrative orders by the administrative court as if those orders had never existed, the common individual surely cannot be expected to comprehend the security of their juristic position. Therefore, the legal state does not require a revocation of the government’s acts to terminate its legal results merely because those acts are illegitimate, but there should be considerations and realizations regarding the “The Principle of the Protection of Legitimate Expectation,” which is a minor principle in the legal state’s content that focuses on supporting and protecting legitimate expectations of the juristic position of an individual and maintaining justice, which is the fundamental value of Thai law.
Keywords: Legal state, Rule of law, Protection of legitimate.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2376263 Computer Verification in Cryptography
Authors: Markus Kaiser, Johannes Buchmann
Abstract:
In this paper we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (o--algebras, probability spaces and condi¬tional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes' Formula. Besides we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this paper shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in crypto-graphic research, if the corresponding basic mathematical knowledge is available in a database.
Keywords: prime numbers, primality tests, (conditional) proba¬bility distributions, formal proof system, higher-order logic, formal verification, Bayes' Formula, Miller-Rabin primality test.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2180262 Exploring the Need to Study the Efficacy of VR Training Compared to Traditional Cybersecurity Training
Authors: Shaila Rana, Wasim Alhamdani
Abstract:
Effective cybersecurity training is of the utmost importance, given the plethora of attacks that continue to increase in complexity and ubiquity. VR cybersecurity training remains a starkly understudied discipline. Studies that evaluated the effectiveness of VR cybersecurity training over traditional methods are required. An engaging and interactive platform can support knowledge retention of the training material. Consequently, an effective form of cybersecurity training is required to support a culture of cybersecurity awareness. Measurements of effectiveness varied throughout the studies, with surveys and observations being the two most utilized forms of evaluating effectiveness. Further research is needed to evaluate the effectiveness of VR cybersecurity training and traditional training. Additionally, research for evaluating if VR cybersecurity training is more effective than traditional methods is vital. This paper proposes a methodology to compare the two cybersecurity training methods and their effectiveness. The proposed framework includes developing both VR and traditional cybersecurity training methods and delivering them to at least 100 users. A quiz along with a survey will be administered and statistically analyzed to determine if there is a difference in knowledge retention and user satisfaction. The aim of this paper is to bring attention to the need to study VR cybersecurity training and its effectiveness compared to traditional training methods. This paper hopes to contribute to the cybersecurity training field by providing an effective way to train users for security awareness. If VR training is deemed more effective, this could create a new direction for cybersecurity training practices.
Keywords: Virtual reality cybersecurity training, VR cybersecurity training, traditional cybersecurity training, evaluating efficacy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1080261 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.
Keywords: NDP, IPsec, SEND, CGA, Modifier, Malicious node, Self-Computing, Distributed-Computing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1375260 Development of an Adhesive from Prosopis africana Seed Endosperm (Okpeyi)
Authors: Nwangwu Florence Chinyere, Ene Rosemary Ndidiamaka
Abstract:
This research work is an experimental study, through development of an adhesive from Prosopis africana endosperm. The prosopis seed for this work were obtained from Enugu State in the South East part of Nigeria. The seeds were prepared by separating the endosperm from the seed coat and cotyledon. Three methods were used to separate them, which are acidic method, roasting method and boiling method. 20g of seed were treated with different concentrations (25, 40, 55, 70, and 85% w/w) at 100°C and constant time (30 minutes), under continuous stirring with magnetic stirrer. Also 20g of seed were treated with sulphuric acid of concentrations 40% w/w at 100°C with different time (10, 15, 20, 25, 30 minutes), under continuous stirring with magnetic stirrer. Finally, 20g of seed were treated with sulphuric acid of concentrations 40% w/w at different temperature (20°C, 40°C, 60°C, 80°C, and 100°C) with constant time (30 minutes), under continuous stirring with magnetic stirrer. The whole endosperm extracted was adhesive. The physical properties of the adhesive were determined (appearance, odour, taste, solubility, pH, size, and binding strength). The percentage of the adhesive yield makes the commercialization of the seed in Nigeria possible and profitable. The very high viscosity attained at low concentrations makes prosopis adhesive an excellent thickener in the food industry.Keywords: Endosperm, adhesive, ethanol, Prosopis africana seed.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1426259 Development of Software Complex for Digitalization of Enterprise Activities
Authors: G. T. Balakayeva, K. K. Nurlybayeva, M. B. Zhanuzakov
Abstract:
In the proposed work, we have developed software and designed a software architecture for the implementation of enterprise business processes. The proposed software has a multi-level architecture using a domain-specific tool. The developed architecture is a guarantor of the availability, reliability and security of the system and the implementation of business processes, which are the basis for effective enterprise management. Automating business processes, automating the algorithmic stages of an enterprise, developing optimal algorithms for managing activities, controlling and monitoring, reducing risks and improving results help organizations achieve strategic goals quickly and efficiently. The software described in this article can connect to the corporate information system via two methods: a desktop client and a web client. With an appeal to the application server, the desktop client program connects to the information system on the company's work PCs over a local network. Outside the organization, the user can interact with the information system via a web browser, which acts as a web client and connects to a web server. The developed software consists of several integrated modules that share resources and interact with each other through an API. The following technology stack was used during development: Node js, React js, MongoDB, Ngnix, Cloud Technologies, Python.
Keywords: Algorithms, document processing, automation, integrated modules, software architecture, software design, information system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 205258 Creative Art Practice in Response to Climate Change: How Art Transforms and Frames New Approaches to Speculative Ecological and Sustainable Futures
Authors: Wenwen Liu, Robert Burton, Simon McKeown
Abstract:
Climate change is seriously threatening human security and development, leading to global warming and economic, political, and social chaos. Many artists have created visual responses that challenge perceptions on climate change, actively guiding people to think about the climate issues and potential crises after urban industrialization and explore positive solutions. This project is an interdisciplinary and intertextual study where art practice is informed by culture, philosophy, psychology, ecology, and science. By correlating theory and artistic practice, it studies how art practice creates a visual way of understanding climate issues and uses art as a way of exploring speculative futures. In the context of practical-based research, arts-based practice as research and creative practice as interdisciplinary research are applied alternately to seek the original solution and new knowledge. Through creative art practice, this project has established visual ways of looking at climate change and has developed it into a model to generate more possibilities, an alternative social imagination. It not only encourages people to think and find a sustainable speculative future conducive to all species but also proves that people have the ability to realize positive futures.
Keywords: Climate change, creative practice as interdisciplinary research, arts-based practice as research, creative art practice, speculative future.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 629257 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan
Authors: Pema Choejey, David Murray, Chun Che Fung
Abstract:
Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.
Keywords: Awareness and training, cybersecurity, cybersecurity policy, risk management, security risks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1559256 Event Information Extraction System (EIEE): FSM vs HMM
Authors: Shaukat Wasi, Zubair A. Shaikh, Sajid Qasmi, Hussain Sachwani, Rehman Lalani, Aamir Chagani
Abstract:
Automatic Extraction of Event information from social text stream (emails, social network sites, blogs etc) is a vital requirement for many applications like Event Planning and Management systems and security applications. The key information components needed from Event related text are Event title, location, participants, date and time. Emails have very unique distinctions over other social text streams from the perspective of layout and format and conversation style and are the most commonly used communication channel for broadcasting and planning events. Therefore we have chosen emails as our dataset. In our work, we have employed two statistical NLP methods, named as Finite State Machines (FSM) and Hidden Markov Model (HMM) for the extraction of event related contextual information. An application has been developed providing a comparison among the two methods over the event extraction task. It comprises of two modules, one for each method, and works for both bulk as well as direct user input. The results are evaluated using Precision, Recall and F-Score. Experiments show that both methods produce high performance and accuracy, however HMM was good enough over Title extraction and FSM proved to be better for Venue, Date, and time.Keywords: Emails, Event Extraction, Event Detection, Finite state machines, Hidden Markov Model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2314255 Cross-Border Shopping Motivation, Behaviours and Ethnocentrism of Malaysian in Hatyai, Thailand
Authors: Wanwisa Kuncharin, Badaruddin Mohamed
Abstract:
There have been few studies of cross-border shopping. However, many have focused on macroeconomic effects rather than on discovering the motivation and behaviour of cross-border shoppers who purchase abroad. Hatyai, Thailand is located about 30 km from the Malaysian border. The statistics reports that each year more than 400,000 Malaysian visitors visited Hatyai. The aims of this study are fourfold: (1) to investigate factors motivating cross-border shoppers to shop in Hatyai, Thailand; (2) to examine the relationship between ethnicity and shopper ethnocentrism; (3) to discover the impact of shopper ethnocentrism on foreign product judgment; and (4) to explore the impact of shopper ethnocentrism on the willingness to buy foreign products. The results reveal that the three most popular consumption items were food and beverages, clothing, and grocery products. Factor analysis shows that the three key reasons for choosing Hatyai as the cross-border shopping destination included product and store, close distance, and low exchange rate. Moreover, there were significant differences in ethnocentrism by three ethnic groups. Shopper ethnocentrism had a significant negative correlation with foreign product judgment, while shopper ethnocentrism was not significantly correlated with willingness to buy foreign products.
Keywords: Cross-border shopping behaviours, Malaysian shoppers, Ethnocentrism, Hatyai, Thailand.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3867254 Effect of Combined Carbimazole and Curcuma longa Powder in Human Thyroid-Stimulating Hormone and Thyroperoxidase Antibody in Hyperthyroidism
Authors: Ahmed Abdi Hassan, Mustapha Muhammad Aliyu
Abstract:
Turmeric (Curcuma longa) belongs to the ginger family and is used for food coloring mostly in Asian countries. It has long traditional medicinal value for the treatment of inflammations with excellent antioxidant properties. The purpose of this study is to investigate the efficiency of turmeric powder in the treatment of hyperthyroidism when combined with carbimazole antithyroid drug. The trial was conducted on 20 hyperthyroid patients but only 16 of them were successfully enrolled for the study. The 16 patients were divided into two equal groups where one group was treated with the only carbimazole while the other group was treated with a combined approach of carbimazole plus turmeric for 6 months consecutively. The result obtained is promising showing an average improvement of 99% in Thyroid-stimulating hormone (TSH) and 88%Thyroid Autoantibodies (TPOAb) in patients treated with the combined approach compared to those treated with the only carbimazole with an average of 3% and 18% of TSH and TPOAb improvement respectively. However, no major difference has been observed in both T4 and T3. Therefore, turmeric powder is a promising treatment if carefully and consistently combined with carbimazole antithyroid drug at very low amounts of 1.5 to 2 grams for at least 2 to 3 times a week.Keywords: Thyroid, curcuminoids, turmeric, thyroxine, triiodothyronine, thyroid stimulating hormone, TPOAb.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 420253 Smartphone Photography in Urban China
Authors: Wen Zhang
Abstract:
The smartphone plays a significant role in media convergence, and smartphone photography is reconstructing the way we communicate and think. This article aims to explore the smartphone photography practices of urban Chinese smartphone users and images produced by smartphones from a techno-cultural perspective. The analysis consists of two types of data: One is a semi-structured interview of 21 participants, and the other consists of the images created by the participants. The findings are organised in two parts. The first part summarises the current tendencies of capturing, editing, sharing and archiving digital images via smartphones. The second part shows that food and selfie/anti-selfie are the preferred subjects of smartphone photographic images from a technical and multi-purpose perspective and demonstrates that screenshots and image texts are new genres of non-photographic images that are frequently made by smartphones, which contributes to improving operational efficiency, disseminating information and sharing knowledge. The analyses illustrate the positive impacts between smartphones and photography enthusiasm and practices based on the diffusion of innovation theory, which also makes us rethink the value of photographs and the practice of ‘photographic seeing’ from the screen itself.
Keywords: Digital photography, photographic-seeing, media convergence, technological innovation, smartphone, selfie/anti-selfie, image-text.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1670252 Optimal Placement of Capacitors for Achieve the Best Total Generation Cost by Genetic Algorithm
Authors: Mohammad Reza Tabatabaei, Mohammad Bagher Haddadi, Mojtaba Saeedimoghadam, Ali Vaseghi Ardekani
Abstract:
Economic Dispatch (ED) is one of the most challenging problems of power system since it is difficult to determine the optimum generation scheduling to meet the particular load demand with the minimum fuel costs while all constraints are satisfied. The objective of the Economic Dispatch Problems (EDPs) of electric power generation is to schedule the committed generating units outputs so as to meet the required load demand at minimum operating cost while satisfying all units and system equality and inequality constraints. In this paper, an efficient and practical steady-state genetic algorithm (SSGAs) has been proposed for solving the economic dispatch problem. The objective is to minimize the total generation fuel cost and keep the power flows within the security limits. To achieve that, the present work is developed to determine the optimal location and size of capacitors in transmission power system where, the Participation Factor Algorithm and the Steady State Genetic Algorithm are proposed to select the best locations for the capacitors and determine the optimal size for them.
Keywords: Economic Dispatch, Lagrange, Capacitors Placement, Losses Reduction, Genetic Algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1671251 Implementation of a Motion Detection System
Authors: Asif Ansari, T.C.Manjunath, C. Ardil
Abstract:
In today-s competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10-ths of the law. Hence, it is imperative for one to be able to safeguard one-s property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing have been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property. The latest technologies used in the fight against thefts and destruction are the video surveillance and monitoring. By using the technologies, it is possible to monitor and capture every inch and second of the area in interest. However, so far the technologies used are passive in nature, i.e., the monitoring systems only help in detecting the crime but do not actively participate in stopping or curbing the crime while it takes place. Therefore, we have developed a methodology to detect the motion in a video stream environment and this is an idea to ensure that the monitoring systems not only actively participate in stopping the crime, but do so while the crime is taking place. Hence, a system is used to detect any motion in a live streaming video and once motion has been detected in the live stream, the software will activate a warning system and capture the live streaming video.
Keywords: Motion, Detection, System, Video, Crime, Matlab, Surveillance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4290250 A Review on Climate Change and Sustainable Agriculture in Southeast Nigeria
Authors: Jane O. Munonye
Abstract:
Climate change has both negative and positive effects in agricultural production. For agriculture to be sustainable in adverse climate change condition, some natural measures are needed. The issue is to produce more food with available natural resources and reduce the contribution of agriculture to climate change. The study reviewed climate change and sustainable agriculture in southeast Nigeria. Data from the study were from secondary sources. Ten scientific papers were consulted and data for the review were collected from three. The objectives of the paper were as follows: to review the effect of climate change on one major arable crop in southeast Nigeria (yam; Dioscorea rotundata); evident of climate change impact and methods for sustainable agricultural production in adverse weather condition. Some climatic parameter as sunshine, relative humidity and rainfall have negative relationship with yam production and significant at 10% probability. Crop production was predicted to decline by 25% per hectare by 2060 while livestock production has increased the incidence of diseases and pathogens as the major effect to agriculture. Methods for sustainable agriculture and damage of natural resources by climate change were highlighted. Agriculture needs to be transformed as climate changes to enable the sector to be sustainable. There should be a policy in place to facilitate the integration of sustainability in Nigeria agriculture.
Keywords: Agriculture, climate change, sustainability, yam.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1677