Search results for: details
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 855

Search results for: details

855 Structuralism of Architectural Details in the Design of Modern High-Rise Buildings

Authors: Joanna Pietrzak, Anna Stefanska, Wieslaw Rokicki

Abstract:

Contemporary high-rise buildings constructed in recent years are often tremendous examples of original and unique architectural forms, being at the same time the affirmation of technical and technological progress accomplishments. The search for more efficient, sophisticated generations of structures also concerns the shaping of high-quality details. The concept of structural detail designing is connected with the rationalization of engineering solutions as well as through the optimisation and reduction of used material. Contemporary structural detail perceived through the development of building technologies is often a very aesthetic technical and material solution, which significantly influences the visual perception of architecture. Structural details are more often seen in shaping the forms of high-rise buildings, which are erected in many culturally different countries.

Keywords: aesthetic expression, high-rise buildings, structural detail, tall buildings

Procedia PDF Downloads 164
854 Research for Hollow Reinforced Concrete Bridge Piers in Korea

Authors: Ho Young Kim, Jae Hoon Lee, Do Kyu Hwang, Im Jong Kwahk, Tae Hoon Kim, Seung Hoon Lee

Abstract:

Hollow section for bridge columns has some advantages. However, current seismic design codes do not provide design regulations for hollow bridge piers. There have been many experimental studied for hollow reinforced concrete piers in the world. But, Study for hollow section for bridge piers in Korea has been begun with approximately 2000s. There has been conducted experimental study for hollow piers of flexural controlled sections by Yeungnam University, Sung kyunkwan University, Korea Expressway Corporation in 2009. This study concluded that flexural controlled sections for hollow piers showed the similar behavior to solid sections. And there have been conducted experimental study for hollow piers of compression controlled sections by Yeungnam University, Korea Institute of Construction Technology in 2012. This study concluded that compression controlled sections for hollow piers showed compression fracture of concrete in inside wall face. Samsung C&T Engineering & Construction Group has been conducted study with Yeungnam University for reduce the quantity of reinforcement details about hollow piers. Reduce the quantity of reinforcement details are triangular cross tie. This study concluded that triangular reinforcement details showed the similar behavior as compared with existing reinforcement details.

Keywords: hollow pier, flexural controlled section, compression controlled section, reduce the quantity of reinforcement, details

Procedia PDF Downloads 417
853 Critical Accounting Estimates and Transparency in Financial Reporting: An Observation Financial Reporting under US GAAP

Authors: Ahmed Shaik

Abstract:

Estimates are very critical in accounting and Financial Reporting cannot be complete without these estimates. There is a long list of accounting estimates that are required to be made to compute Net Income and to determine the value of assets and liabilities. To name a few, valuation of inventory, depreciation, valuation of goodwill, provision for bad debts and estimated warranties, etc. require the use of different valuation models and forecasts. Different business entities under the same industry may use different approaches to measure the value of financial items being reported in Income Statement and Balance Sheet. The disclosure notes do not provide enough details of the approach used by a business entity to arrive at the value of a financial item. Lack of details in the disclosure notes makes it difficult to compare the financial performance of one business entity with the other in the same industry. This paper is an attempt to identify the lack of enough information about accounting estimates in disclosure notes, the impact of the absence of details of accounting estimates on the comparability of financial data and financial analysis. An attempt is made to suggest the detailed disclosure while taking care of the cost and benefit of making such disclosure.

Keywords: accounting estimates, disclosure notes, financial reporting, transparency

Procedia PDF Downloads 200
852 An Alternative Concept of Green Screen Keying

Authors: Jin Zhi

Abstract:

This study focuses on a green screen keying method developed especially for film visual effects. There are a series of ways of using existing tools for creating mattes from green or blue screen plates. However, it is still a time-consuming process, and the results vary especially when it comes to retaining tiny details, such as hair and fur. This paper introduces an alternative concept and method for retaining edge details of characters on a green screen plate, also, a number of connected mathematical equations are explored. At the end of this study, a simplified process of applying this method in real productions is also introduced.

Keywords: green screen, visual effects, compositing, matte

Procedia PDF Downloads 402
851 Investigations on the Fatigue Behavior of Welded Details with Imperfections

Authors: Helen Bartsch, Markus Feldmann

Abstract:

The dimensioning of steel structures subject to fatigue loads, such as wind turbines, bridges, masts and towers, crane runways and weirs or components in crane construction, is often dominated by fatigue verification. The fatigue details defined by the welded connections, such as butt or cruciform joints, longitudinal welds, welded-on or welded-in stiffeners, etc., are decisive. In Europe, the verification is usually carried out according to EN 1993-1-9 on a nominal stress basis. The basis is the detailed catalog, which specifies the fatigue strength of the various weld and construction details according to fatigue classes. Until now, a relation between fatigue classes and weld imperfection sizes is not included. Quality levels for imperfections in fusion-welded joints in steel, nickel, titanium and their alloys are regulated in EN ISO 5817, which, however, doesn’t contain direct correlations to fatigue resistances. The question arises whether some imperfections might be tolerable to a certain extent since they may be present in the test data used for detail classifications dating back decades ago. Although current standardization requires proof of satisfying limits of imperfection sizes, it would also be possible to tolerate welds with certain irregularities if these can be reliably quantified by non-destructive testing. Fabricators would be prepared to undertake carefully and sustained weld inspection in view of the significant economic consequences of such unfavorable fatigue classes. This paper presents investigations on the fatigue behavior of common welded details containing imperfections. In contrast to the common nominal stress concept, local fatigue concepts were used to consider the true stress increase, i.e., local stresses at the weld toe and root. The actual shape of a weld comprising imperfections, e.g., gaps or undercuts, can be incorporated into the fatigue evaluation, usually on a numerical basis. With the help of the effective notch stress concept, the fatigue resistance of detailed local weld shapes is assessed. Validated numerical models serve to investigate notch factors of fatigue details with different geometries. By utilizing parametrized ABAQUS routines, detailed numerical studies have been performed. Depending on the shape and size of different weld irregularities, fatigue classes can be defined. As well load-carrying welded details, such as the cruciform joint, as non-load carrying welded details, e.g., welded-on or welded-in stiffeners, are regarded. The investigated imperfections include, among others, undercuts, excessive convexity, incorrect weld toe, excessive asymmetry and insufficient or excessive throat thickness. Comparisons of the impact of different imperfections on the different types of fatigue details are made. Moreover, the influence of a combination of crucial weld imperfections on the fatigue resistance is analyzed. With regard to the trend of increasing efficiency in steel construction, the overall aim of the investigations is to include a more economical differentiation of fatigue details with regard to tolerance sizes. In the long term, the harmonization of design standards, execution standards and regulations of weld imperfections is intended.

Keywords: effective notch stress, fatigue, fatigue design, weld imperfections

Procedia PDF Downloads 259
850 The Development and Testing of Greenhouse Comprehensive Environment Control System

Authors: Mohammed Alrefaie, Yaser Miaji

Abstract:

Greenhouses provide a convenient means to grow plants in the best environment. They achieve this by trapping heat from the sunlight and using artificial means to enhance the environment of the greenhouse. This includes controlling factors such as air flow, light intensity and amount of water among others that can have a big impact on plant growth. The aim of the greenhouse is to give maximum yield from plants possible. This report details the development and testing of greenhouse environment control system that can regulate light intensity, airflow and power supply inside the greenhouse. The details of the module development to control these three factors along with results of testing are presented.

Keywords: greenhouse, control system, light intensity, comprehensive environment

Procedia PDF Downloads 482
849 Comparison of Blockchain Ecosystem for Identity Management

Authors: K. S. Suganya, R. Nedunchezhian

Abstract:

In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.

Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity

Procedia PDF Downloads 130
848 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques

Authors: Pranjali Avinash Yadav-Deshmukh

Abstract:

Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.

Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction

Procedia PDF Downloads 386
847 Review of the Road Crash Data Availability in Iraq

Authors: Abeer K. Jameel, Harry Evdorides

Abstract:

Iraq is a middle income country where the road safety issue is considered one of the leading causes of deaths. To control the road risk issue, the Iraqi Ministry of Planning, General Statistical Organization started to organise a collection system of traffic accidents data with details related to their causes and severity. These data are published as an annual report. In this paper, a review of the available crash data in Iraq will be presented. The available data represent the rate of accidents in aggregated level and classified according to their types, road users’ details, and crash severity, type of vehicles, causes and number of causalities. The review is according to the types of models used in road safety studies and research, and according to the required road safety data in the road constructions tasks. The available data are also compared with the road safety dataset published in the United Kingdom as an example of developed country. It is concluded that the data in Iraq are suitable for descriptive and exploratory models, aggregated level comparison analysis, and evaluation and monitoring the progress of the overall traffic safety performance. However, important traffic safety studies require disaggregated level of data and details related to the factors of the likelihood of traffic crashes. Some studies require spatial geographic details such as the location of the accidents which is essential in ranking the roads according to their level of safety, and name the most dangerous roads in Iraq which requires tactic plan to control this issue. Global Road safety agencies interested in solve this problem in low and middle-income countries have designed road safety assessment methodologies which are basing on the road attributes data only. Therefore, in this research it is recommended to use one of these methodologies.

Keywords: road safety, Iraq, crash data, road risk assessment, The International Road Assessment Program (iRAP)

Procedia PDF Downloads 256
846 The Analysis of the Blockchain Technology and Challenges Hampering Its Adoption

Authors: Sthembile Mthethwa

Abstract:

With the rise in the usage of internet in the past decades, this presented an opportunity for users to transact with each other over the use of internet. Cryptocurrencies have been introduced, which allows users to transact with each other without the involvement of a third party i.e. the bank. These systems are widely known as cryptocurrencies or digital currencies and the first system to be introduced was Bitcoin which has been receiving a lot of attention. Bitcoin introduced a new technology known as the blockchain technology. In the past years, blockchain has been getting attention; whereby new applications are introduced that utilize blockchain. Yet, most people are still hesitant about the adoption of blockchain and the adoption of cryptocurrencies at large. Some people still do not understand the technology. Thus, it leads to the slow adoption of this technology. In this paper, a review of the blockchain is provided, whereby the different types of blockchain are discussed in details. Details of the things that contribute to the hindrance of the process of adoption are discussed.

Keywords: bitcoin, blockchain, cryptocurrency, payment system

Procedia PDF Downloads 290
845 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 414
844 Failure Analysis of Windshield Glass of Automobiles

Authors: Bhupinder Kaur, O. P. Pandey

Abstract:

An automobile industry is using variety of materials for better comfort and utility. The present work describes the details of failure analysis done for windshield glass of a four-wheeler class. The failure occurred in two different models of the heavy duty class of four wheelers, which analysed separately. The company reported that the failure has occurred only in their rear windshield when vehicles parked under shade for several days. These glasses were characterised by dilatometer, differential thermal analyzer, and X-ray diffraction. The glasses were further investigated under scanning electron microscope with energy dispersive X-ray spectroscopy and X-ray dot mapping. The microstructural analysis of the glasses done at the surface as well as at the fractured area indicates that carbon as an impurity got segregated as banded structure throughout the glass. Since carbon absorbs higher heat, it causes thermal mismatch to the entire glass system, and glass shattered down. In this work, the details of sequential analysis done to predict the cause of failure are present.

Keywords: failure, windshield, thermal mismatch, carbon

Procedia PDF Downloads 247
843 Design of a Tool for Generating Test Cases from BPMN

Authors: Prat Yotyawilai, Taratip Suwannasart

Abstract:

Business Process Model and Notation (BPMN) is more important in the business process and creating functional models, and is a standard for OMG, which becomes popular in various organizations and in education. Researches related to software testing based on models are prominent. Although most researches use the UML model in software testing, not many researches use the BPMN Model in creating test cases. Therefore, this research proposes a design of a tool for generating test cases from the BPMN. The model is analyzed and the details of the various components are extracted before creating a flow graph. Both details of components and the flow graph are used in generating test cases.

Keywords: software testing, test case, BPMN, flow graph

Procedia PDF Downloads 555
842 A Review on Web-Based Attendance Management System

Authors: Arvind Lal, Chumphila Bhutia, Bidhan Pradhan, Retika Sharma, Monisha Limboo

Abstract:

There have been many proposals to optimize the students’ management system in higher education. Managing student attendance during lecture periods have become a difficult challenge. Manual calculation of attendance produces errors and wastes a lot of time. This proposed system manages the student’s attendance in a web portal and the records of the attendance will be stored in a database. The attendance of the students will be further forwarded to their HOD (Head OF Department), class teacher and their parents/guardians. This system will use MySQL for the database. The template of the website will be built using HTML and CSS (Cascading StyleSheet) code. JavaScript will be added to improve the use of the system. Student’s details will be stored in the database. Also, it will contain the details of the teachers according to their subjects and the classes they teach. The system will be responsive which can be used in mobile phones. Also, the development of this project will be user-friendly by facilitating with clear and understandable tabs. Hence, this website will be beneficial to institutes.

Keywords: website, student's attendance, MySQL database, HTML, CSS, PHP, JavaScript

Procedia PDF Downloads 182
841 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain

Authors: Tarun Chand, Michael Jurczyk

Abstract:

With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.

Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development

Procedia PDF Downloads 67
840 Interactive Learning Practices for Class Room Teaching

Authors: Shamshuddin K., Nagaraj Vannal, Diwakar Kulkarni

Abstract:

This paper presents details of teaching and learning pedagogical techniques attempted for the undergraduate engineering program to improve the concentration span of students in a classroom. The details of activities such as valid statement, quiz competition, classroom paper, group work and product marketing to make the students remain active for the entire class duration and to improve presentation skills are presented. These activities shown tremendous improvement in student’s performance in academics, also in asking questions, concept understanding and interaction with the course instructor. With these pedagogical activities we are able to achieve Program outcome elements and ABET Program outcomes such as d, i, g and h which are difficult to achieve through the conventional teaching methods.

Keywords: activities, pedagogy, interactive learning, valid statement, quiz competition, classroom papers, group work, product marketing

Procedia PDF Downloads 646
839 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 439
838 Automatic API Regression Analyzer and Executor

Authors: Praveena Sridhar, Nihar Devathi, Parikshit Chakraborty

Abstract:

As the software product changes versions across releases, there are changes to the API’s and features and the upgrades become necessary. Hence, it becomes imperative to get the impact of upgrading the dependent components. This tool finds out API changes across two versions and their impact on other API’s followed by execution of the automated regression suites relevant to updates and their impacted areas. This tool has 4 layer architecture, each layer with its own unique pre-assigned capability which it does and sends the required information to next layer. This are the 4 layers. 1) Comparator: Compares the two versions of API. 2) Analyzer: Analyses the API doc and gives the modified class and its dependencies along with implemented interface details. 3) Impact Filter: Find the impact of the modified class on the other API methods. 4) Auto Executer: Based on the output given by Impact Filter, Executor will run the API regression Suite. Tool reads the java doc and extracts the required information of classes, interfaces and enumerations. The extracted information is saved into a data structure which shows the class details and its dependencies along with interfaces and enumerations that are listed in the java doc.

Keywords: automation impact regression, java doc, executor, analyzer, layers

Procedia PDF Downloads 488
837 New Ethanol Method for Soft Tissue Imaging in Micro-CT

Authors: Matej Patzelt, Jan Dudak, Frantisek Krejci, Jan Zemlicka, Vladimir Musil, Jitka Riedlova, Viktor Sykora, Jana Mrzilkova, Petr Zach

Abstract:

Introduction: Micro-CT is well used for examination of bone structures and teeth. On the other hand visualization of the soft tissues is still limited. The goal of our study was to create a new fixation method for soft tissue imaging in micro-CT. Methodology: We used organs of 18 mice - heart, lungs, kidneys, liver and brain, which we fixated in ethanol after meticulous preparation. We fixated organs in different concentrations of ethanol and for different period of time. We used three types of ethanol concentration - 97%, 50% and ascending ethanol concentration (25%, 50%, 75%, 97% each for 12 hours). Fixated organs were scanned after 72 hours, 168 hours and 336 hours period of fixation. We scanned all specimens in micro-CT MARS (Medipix All Resolution System). Results: Ethanol method provided contrast enhancement in all studied organs in all used types of fixation. Fixation in 97% ethanol provided very fast fixation and the contrast among the tissues was visible already after 72 hours of fixation. Fixation for the period of 168 and 336 hours gave better details, especially in lung tissue, where alveoli were visualized. On the other hand, this type of fixation caused organs to petrify. Fixation in 50% ethanol provided best results in 336 hours fixation, details were visualized better than in 97% ethanol and samples were not as hard as in fixation in 97% ethanol. Best results were obtained in fixation in ascending ethanol concentration. All organs were visualized in great details, best-visualized organ was heart, where trabeculae and valves were visible. In this type of fixation, organs stayed soft for whole time. Conclusion: New ethanol method is a great option for soft tissue fixation as well as the method for enhancing contrast among tissues in organs. The best results were obtained with fixation of the organs in ascending ethanol concentration, the best visualized organ was the heart.

Keywords: x-ray imaging, small animals, ethanol, ex-vivo

Procedia PDF Downloads 321
836 Create and Design Visual Presentation to Promote Thai Cuisine

Authors: Supaporn Wimonchailerk

Abstract:

This research aims to study how to design and create the media to promote Thai cuisine. The study used qualitative research methods by using in-depth interview 3 key informants who have experienced in the production of food or cooking shows in television programs with an aspect of acknowledging Thai foods. The results showed that visual presentation is divided into four categories. First, the light meals should be presented in details via the close-up camera with lighting to make the food look more delicious. Then the curry presentation should be arranged a clear and crisp light focus on a colorful curry paste. Besides the vision of hot steam floating from the plate and a view of curry spread on steamed rice can call great attentions. Third, delivering good appearances of the fried or spicy foods, the images must allow the audiences to see the shine of the coat covering the texture of the food and the colorful of the ingredients. Fourth, the presentation of sweets is recommended to focus on details of food design, composition, and layout.

Keywords: media production, television, promote, Thai cuisine

Procedia PDF Downloads 237
835 Is There Relationship between Cyberchondria and Emotional Intelligence among Omani University Students? A Descriptive Correlational Study

Authors: Mohammed Qutishat, Khaldoun Aldiabat, Khaled Bader, Mohammad Al Qadire

Abstract:

Cyberchondria refers to the irrational increase of distress about the condition of one's health as a consequence of the World Wide Web quest for medical details. The aim of this study was to examine the relationship between emotional intelligence and cyberchondria among Omani university students. A descriptive correlational design was used to collect data from eligible 370 participants using the Emotional Intelligence Questionnaire, and the short-form version of the Cyberchondria Severity Scale (CSS-12) between January and May 2020 at XX University-Oman. The participants’ age ranged between 18 and 37 years (M = 20.28). The majority of the participants were female, 59.7% (n = 221), single 99.5% (368), in their second academic year, 29.2% (n =108). The mean score of cyberchondria experiences was 32.51, and the mean score of emotional intelligence was 34.91. Linear regression indicated a strong association between cyberchondria and emotional intelligence [F (34.639) = 5.885, P=.000], with a .086 R². In conclusion, the exchange of expertise and peer networking for health-related details utilizing the Internet can benefit students with and without having health problems. Further research and methods should be developed to help students track the online medical tools effectively for the right purposes.

Keywords: emotional intelligence, cyberchondria, smartphone addiction, social media

Procedia PDF Downloads 250
834 RFID Laptop Monitoring and Management System

Authors: Francis E. Idachaba, Sarah Uyimeh Tommy

Abstract:

This paper describes the design of an RFID laptop monitoring and management system. Laptops embedded with RFID chips are monitored and tracked to provide a monitoring system for the purpose of tracking as well as monitoring movement of the laptops in and out of a building. The proposed system is implemented with both hardware and software components. The hardware architecture consists of RFID passive tag, RFID module (reader), and a server hosting the application and database. The RFID readers are distributed at major exits of a building or premises. The tags are programmed with owner laptop details are concealed in the laptops. The software architecture consists of application software that has the APIs (Applications Programming Interface) necessary to interface the RFID system with the PC, to achieve automated laptop monitoring system. A friendly graphic user interface (GUI) and a database that saves all readings and owners details. The system is capable of reducing laptop theft especially in students’ hostels as laptops can be monitored as they are taken either in or out of the building.

Keywords: asset tracking, GUI, laptop monitoring, radio frequency identification, passive tags

Procedia PDF Downloads 390
833 Bank ATM Monitoring System Using IR Sensor

Authors: P. Saravanakumar, N. Raja, M. Rameshkumar, D. Mohankumar, R. Sateeshkumar, B. Maheshwari

Abstract:

This research work is designed using Microsoft VB. Net as front end and MySQL as back end. The project deals with secure the user transaction in the ATM system. This application contains the option for sending the failed transaction details to the particular customer by using the SMS. When the customer withdraws the amount from the Bank ATM system, sometimes the amount will not be dispatched but the amount will be debited to the particular account. This application is used to avoid this type of problems in the ATM system. In this proposed system using IR technique to detect the dispatched amount. IR Transmitter and IR Receiver are placed in the path of cash dispatch. It is connected each other through the IR signal. When the customers withdraw the amount in the ATM system then the amount will be dispatched or not is monitored by IR Receiver. If the amount will be dispatched then the signal will be interrupted between the IR Receiver and the IR Transmitter. At that time, the monitoring system will be reduced their particular withdraw amount on their account. If the cash will not be dispatched, the signal will not be interrupted, at that time the particular withdraw amount will not be reduced their account. If the transaction completed successfully, the transaction details such as withdraw amount and current balance can be sent to the customer via the SMS. If the transaction fails, the transaction failed message can be send to the customer.

Keywords: ATM system, monitoring system, IR Transmitter, IR Receiver

Procedia PDF Downloads 310
832 Guided Information Campaigns for Counter-Terrorism: Behavioral Approach to Interventions Regarding Polarized Societal Network

Authors: Joshua Midha

Abstract:

The basis for information campaigns and behavioral interventions has long reigned as a tactic. From the Soviet-era propaganda machines to the opinion hijacks in Iran, these measures are now commonplace and are used for dissemination and disassembly. However, the use of these tools for strategic diffusion, specifically in a counter-terrorism setting, has only been explored on the surface. This paper aims to introduce a larger conceptual portion of guided information campaigns into preexisting terror cells and situations. It provides an alternative, low-risk intervention platform for future military strategy. This paper highlights a theoretical framework to lay out the foundationary details and explanations for behavioral interventions and moves into using a case study to highlight the possibility of implementation. It details strategies, resources, circumstances, and risk factors for intervention. It also sets an expanding foundation for offensive PsyOps and argues for tactical diffusion of information to battle extremist sentiment. The two larger frameworks touch on the internal spread of information within terror cells and external political sway, thus charting a larger holistic purpose of strategic operations.

Keywords: terrorism, behavioral intervention, propaganda, SNA, extremism

Procedia PDF Downloads 95
831 Numerical Study of Fatigue Crack Growth at a Web Stiffener of Ship Structural Details

Authors: Wentao He, Jingxi Liu, De Xie

Abstract:

It is necessary to manage the fatigue crack growth (FCG) once those cracks are detected during in-service inspections. In this paper, a simulation program (FCG-System) is developed utilizing the commercial software ABAQUS with its object-oriented programming interface to simulate the fatigue crack path and to compute the corresponding fatigue life. In order to apply FCG-System in large-scale marine structures, the substructure modeling technique is integrated in the system under the consideration of structural details and load shedding during crack growth. Based on the nodal forces and nodal displacements obtained from finite element analysis, a formula for shell elements to compute stress intensity factors is proposed in the view of virtual crack closure technique. The cracks initiating from the intersection of flange and the end of the web-stiffener are investigated for fatigue crack paths and growth lives under water pressure loading and axial force loading, separately. It is found that the FCG-System developed by authors could be an efficient tool to perform fatigue crack growth analysis on marine structures.

Keywords: crack path, fatigue crack, fatigue live, FCG-system, virtual crack closure technique

Procedia PDF Downloads 568
830 System of Quality Automation for Documents (SQAD)

Authors: R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D. B. Hari Prakash, S. Jayanth, T. Kumar, N. Vijayarangan

Abstract:

Document automation is the design of systems and workflows, assembling repetitive documents to meet the specific business needs. In any organization or institution, documenting employee’s information is very important for both employees as well as management. It shows an individual’s progress to the management. Many documents of the employee are in the form of papers, so it is very difficult to arrange and for future reference we need to spend more time in getting the exact document. Also, it is very tedious to generate reports according to our needs. The process gets even more difficult on getting approvals and hence lacks its security aspects. This project overcomes the above-stated issues. By storing the details in the database and maintaining the e-documents, the automation system reduces the manual work to a large extent. Then the approval process of some important documents can be done in a much-secured manner by using Digital Signature and encryption techniques. Details are maintained in the database and e-documents are stored in specific folders and generation of various kinds of reports is possible. Moreover, an efficient search method is implemented is used in the database. Automation supporting document maintenance in many aspects is useful for minimize data entry, reduce the time spent on proof-reading, avoids duplication, and reduce the risks associated with the manual error, etc.

Keywords: e-documents, automation, digital signature, encryption

Procedia PDF Downloads 391
829 Rates of Hematophagous Ectoparasite Consumption during Grooming by an Endemic Madagascar Fruit Bat

Authors: Riana V. Ramanantsalama, Aristide Andrianarimisa, Achille P. Raselimanana, Steven M. Goodman

Abstract:

Few details are available on the consumption of ectoparasites, specifically bat flies (Diptera: Nycteribiidae and Streblidae), by their chiropteran hosts while grooming. Such details could provide information on the dynamics of host-parasite interactions. This study presents data on ectoparasite ingestion rates for an endemic Malagasy fruit bat (Pteropodidae: Rousettus madagascariensis) occupying a cave day roost colony in northern Madagascar. Using quantified behavioral analyses, grooming and associated ingestion rates were measured from infrared videos taken in close proximity to day-roosting bats. The recorded individual bats could be visually identified to age (adult, juvenile) and sex (male, female), allowing analyses of the proportion of time these different classes allocated to consuming ectoparasites via auto-grooming (self) or allo-grooming (intraspecific) per 10 min video recording session. These figures could then be extrapolated to estimates of individual daily consumption rates. Based on video recordings, adults spent significantly more time auto-grooming and allo-grooming than juveniles. The latter group was not observed consuming ectoparasites. Grooming rates and the average number of ectoparasites consumed per day did not differ between adult males and females. The mean extrapolated number consumed on a daily basis for individual adults was 37 ectoparasites. When these figures are overlaid on the estimated number of adult Rousettus occurring at the roost site during the dry season, the projected daily consumption rate was 57,905 ectoparasites. To the best knowledge of the authors of this study, the details presented here represent the first quantified data on bat consumption rates of their ectoparasites, specifically dipterans. These results provide new insights into host-parasite predation dynamics. More research is needed to explore the mechanism zoonotic diseases isolated from bat flies might be transmitted to their bat hosts, specifically those pathogens that can be communicated via an oral route.

Keywords: diptera, host-parasite interactions, Madagascar, nycteribiidae, pteropodidae, Rousettus madagascariensis

Procedia PDF Downloads 145
828 TerraEnhance: High-Resolution Digital Elevation Model Generation using GANs

Authors: Siddharth Sarma, Ayush Majumdar, Nidhi Sabu, Mufaddal Jiruwaala, Shilpa Paygude

Abstract:

Digital Elevation Models (DEMs) are digital representations of the Earth’s topography, which include information about the elevation, slope, aspect, and other terrain attributes. DEMs play a crucial role in various applications, including terrain analysis, urban planning, and environmental modeling. In this paper, TerraEnhance is proposed, a distinct approach for high-resolution DEM generation using Generative Adversarial Networks (GANs) combined with Real-ESRGANs. By learning from a dataset of low-resolution DEMs, the GANs are trained to upscale the data by 10 times, resulting in significantly enhanced DEMs with improved resolution and finer details. The integration of Real-ESRGANs further enhances visual quality, leading to more accurate representations of the terrain. A post-processing layer is introduced, employing high-pass filtering to refine the generated DEMs, preserving important details while reducing noise and artifacts. The results demonstrate that TerraEnhance outperforms existing methods, producing high-fidelity DEMs with intricate terrain features and exceptional accuracy. These advancements make TerraEnhance suitable for various applications, such as terrain analysis and precise environmental modeling.

Keywords: DEM, ESRGAN, image upscaling, super resolution, computer vision

Procedia PDF Downloads 7
827 Examining the Influence of Question Phrasing in Police Interviews on Suspects’ Inferences Regarding Interviewer’s Prior Knowledge

Authors: Meghana Srivatsav, Timothy J. Luke, Par Anders Granhag, Aldert Vrij

Abstract:

The aim of this study was to understand how the phrasing of questions influences guilty suspects’ inferences regarding prior information held by the interviewer about the suspect’s crime-related activities. Three phrasing factors were explored namely specificity (crime-related details within questions), stressor (emphasis on the importance of the information in the question) and phase presentation (whether a specific activity was questioned about). 370 participants were recruited and randomly assigned into 6 different question-phrasing groups. Participants assumed the role of a suspect, read a crime narrative and an interview transcript based on the suspect’s activities. Participants responded to scales that measured their perception of interviewer’s knowledge (PIK) based on the questions posed by the interviewer in the interview transcripts. The researchers found that there is an effect of specific details revealed in the questions on the suspect’s perception of interviewer knowledge. Questioning about a specific activity also increased their perception of interviewer’s prior knowledge. However, the individual hypotheses were only partially supported. The study allowed the researchers to explore a psycholinguistic approach to investigate the underlying mechanisms of inferences drawn by suspects from the phrasing of investigative questions.

Keywords: police interviewing, question framing effects on suspects, suspect inferences from questions, suspect interviews

Procedia PDF Downloads 151
826 Performance Evaluations of Lap Spliced Joint of Decked Bulb-Tee Type Modular Bridge

Authors: Sang-Yoon Lee, Jae-Joon Song

Abstract:

Precast decked bulb-tee girder or precast deck generally adopts in-situ connections of loop joints. Loop joint could be an effective method to connect precast concrete members where the width of joint is not wide sufficiently to allow the lap splice length of reinforcing bars. However, the regulation for the minimum bend diameter of looped rebar gives limitation not to reduce the thickness of precast concrete member; thus, in-situ connection adopting loop joint place a constraint on improving the structural efficiency of precast concrete member. Ultra high strength concrete (UHSC) is effective on reduce the development and lap splice length of reinforcing bar. In-situ connection with UHSC gives a merit to reduce connection width. This study intends to investigate the details of the longitudinal joint to be applied in the precast modular bridge using decked bulb-tee girder that has been recently developed in Korea. This paper presents the details applying UHSC and lap splices of straight reinforcement and results of tests. Several tests were performed on flexural specimens with longitudinal joints to verify the length of the lap splices and amount of transverse reinforcement, and to examine the flexural strength of the longitudinal joint.

Keywords: precast structure, decked bulb-tee girder, in-situ connection, UHSC, modular bridge

Procedia PDF Downloads 461