Search results for: binary number system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25669

Search results for: binary number system

25369 Co-Precipitation Method for the Fabrication of Charge-Transfer Molecular Crystal Nanocapsules

Authors: Rabih Al-Kaysi

Abstract:

When quasi-stable solutions of 9-methylanthracene (pi-electron donor, 0.0005 M) and 1,2,4,5-Tetracyanobenzene (pi-electron acceptor, 0.0005 M) in aqueous sodium dodecyl sulfate (SDS, 0.025 M) were gently mixed, uniform-shaped rectangular charge-transfer nanocrystals precipitated out. These red colored charge-transfer (CT) crystals were composed of a 1:1-mole ratio of acceptor/ donor and are highly insoluble in water/SDS solution. The rectangular crystals morphology is semi hollow with symmetrical twin pockets reminiscent of nanocapsules. For a typical crop of nanocapsules, the dimensions are 21 x 6 x 0.5 microns with an approximate hollow volume of 1.5 x 105 nm3. By varying the concentration of aqueous SDS, mixing duration and incubation temperature, we can control the size and volume of the nanocapsules. The initial number of CT seed nanoparticles, formed by mixing the D and A solutions, determined the number and dimensions of the obtained nanocapsules formed after several hours of incubation under still conditions. Prolonged mixing of the donor and acceptor solutions resulted in plenty of initial seeds hence smaller nanocapsules. Short mixing times yields less seed formation and larger micron-sized capsules. The addition of Doxorubicin in situ with the quasi-stable solutions while mixing leads to the formation of CT nanocapsules with Doxorubicin sealed inside. The Doxorubicin can be liberated from the nanocapsules by cracking them using ultrasonication. This method can be extended to other binary CT complex crystals as well.

Keywords: charge-transfer, nanocapsules, nanocrystals, doxorubicin

Procedia PDF Downloads 210
25368 Image Analysis for Obturator Foramen Based on Marker-controlled Watershed Segmentation and Zernike Moments

Authors: Seda Sahin, Emin Akata

Abstract:

Obturator foramen is a specific structure in pelvic bone images and recognition of it is a new concept in medical image processing. Moreover, segmentation of bone structures such as obturator foramen plays an essential role for clinical research in orthopedics. In this paper, we present a novel method to analyze the similarity between the substructures of the imaged region and a hand drawn template, on hip radiographs to detect obturator foramen accurately with integrated usage of Marker-controlled Watershed segmentation and Zernike moment feature descriptor. Marker-controlled Watershed segmentation is applied to seperate obturator foramen from the background effectively. Zernike moment feature descriptor is used to provide matching between binary template image and the segmented binary image for obturator foramens for final extraction. The proposed method is tested on randomly selected 100 hip radiographs. The experimental results represent that our method is able to segment obturator foramens with % 96 accuracy.

Keywords: medical image analysis, segmentation of bone structures on hip radiographs, marker-controlled watershed segmentation, zernike moment feature descriptor

Procedia PDF Downloads 430
25367 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems

Authors: Chuan-Ching Sue, Kai-Chun Chuang

Abstract:

Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.

Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control

Procedia PDF Downloads 313
25366 Temperature Dependent Magneto-Transport Properties of MnAl Binary Alloy Thin Films

Authors: Vineet Barwal, Sajid Husain, Nanhe Kumar Gupta, Soumyarup Hait, Sujeet Chaudhary

Abstract:

High perpendicular magnetic anisotropy (PMA) and low damping constant (α) in ferromagnets are one of the few necessary requirements for their potential applications in the field of spintronics. In this regards, ferromagnetic τ-phase of MnAl possesses the highest PMA (Ku > 107 erg/cc) at room temperature, high saturation magnetization (Ms~800 emu/cc) and a Curie temperature of ~395K. In this work, we have investigated the magnetotransport behaviour of this potentially useful binary system MnₓAl₁₋ₓ films were synthesized by co-sputtering (pulsed DC magnetron sputtering) on Si/SiO₂ (where SiO₂ is native oxide layer) substrate using 99.99% pure Mn and Al sputtering targets. Films of constant thickness (~25 nm) were deposited at the different growth temperature (Tₛ) viz. 30, 300, 400, 500, and 600 ºC with a deposition rate of ~5 nm/min. Prior to deposition, the chamber was pumped down to a base pressure of 2×10⁻⁷ Torr. During sputtering, the chamber was maintained at a pressure of 3.5×10⁻³ Torr with the 55 sccm Ar flow rate. Films were not capped for the purpose of electronic transport measurement, which leaves a possibility of metal oxide formation on the surface of MnAl (both Mn and Al have an affinity towards oxide formation). In-plane and out-of-plane transverse magnetoresistance (MR) measurements on films sputtered under optimized growth conditions revealed non-saturating behavior with MR values ~6% and 40% at 9T, respectively at 275 K. Resistivity shows a parabolic dependence on the field H, when the H is weak. At higher H, non-saturating positive MR that increases exponentially with the strength of magnetic field is observed, a typical character of hopping type conduction mechanism. An anomalous decrease in MR is observed on lowering the temperature. From the temperature dependence of reistivity, it is inferred that the two competing states are metallic and semiconducting, respectively and the energy scale of the phenomenon produces the most interesting effects, i.e., the metal-insulator transition and hence the maximum sensitivity to external fields, at room temperature. Theory of disordered 3D systems effectively explains the crossover temperature coefficient of resistivity from positive to negative with lowering of temperature. These preliminary findings on the MR behavior of MnAl thin films will be presented in detail. The anomalous large MR in mixed phase MnAl system is evidently useful for future spintronic applications.

Keywords: magnetoresistance, perpendicular magnetic anisotropy, spintronics, thin films

Procedia PDF Downloads 122
25365 Use of Multistage Transition Regression Models for Credit Card Income Prediction

Authors: Denys Osipenko, Jonathan Crook

Abstract:

Because of the variety of the card holders’ behaviour types and income sources each consumer account can be transferred to a variety of states. Each consumer account can be inactive, transactor, revolver, delinquent, defaulted and requires an individual model for the income prediction. The estimation of transition probabilities between statuses at the account level helps to avoid the memorylessness of the Markov Chains approach. This paper investigates the transition probabilities estimation approaches to credit cards income prediction at the account level. The key question of empirical research is which approach gives more accurate results: multinomial logistic regression or multistage conditional logistic regression with binary target. Both models have shown moderate predictive power. Prediction accuracy for conditional logistic regression depends on the order of stages for the conditional binary logistic regression. On the other hand, multinomial logistic regression is easier for usage and gives integrate estimations for all states without priorities. Thus further investigations can be concentrated on alternative modeling approaches such as discrete choice models.

Keywords: multinomial regression, conditional logistic regression, credit account state, transition probability

Procedia PDF Downloads 481
25364 Valorization of Surveillance Data and Assessment of the Sensitivity of a Surveillance System for an Infectious Disease Using a Capture-Recapture Model

Authors: Jean-Philippe Amat, Timothée Vergne, Aymeric Hans, Bénédicte Ferry, Pascal Hendrikx, Jackie Tapprest, Barbara Dufour, Agnès Leblond

Abstract:

The surveillance of infectious diseases is necessary to describe their occurrence and help the planning, implementation and evaluation of risk mitigation activities. However, the exact number of detected cases may remain unknown whether surveillance is based on serological tests because identifying seroconversion may be difficult. Moreover, incomplete detection of cases or outbreaks is a recurrent issue in the field of disease surveillance. This study addresses these two issues. Using a viral animal disease as an example (equine viral arteritis), the goals were to establish suitable rules for identifying seroconversion in order to estimate the number of cases and outbreaks detected by a surveillance system in France between 2006 and 2013, and to assess the sensitivity of this system by estimating the total number of outbreaks that occurred during this period (including unreported outbreaks) using a capture-recapture model. Data from horses which exhibited at least one positive result in serology using viral neutralization test between 2006 and 2013 were used for analysis (n=1,645). Data consisted of the annual antibody titers and the location of the subjects (towns). A consensus among multidisciplinary experts (specialists in the disease and its laboratory diagnosis, epidemiologists) was reached to consider seroconversion as a change in antibody titer from negative to at least 32 or as a three-fold or greater increase. The number of seroconversions was counted for each town and modeled using a unilist zero-truncated binomial (ZTB) capture-recapture model with R software. The binomial denominator was the number of horses tested in each infected town. Using the defined rules, 239 cases located in 177 towns (outbreaks) were identified from 2006 to 2013. Subsequently, the sensitivity of the surveillance system was estimated as the ratio of the number of detected outbreaks to the total number of outbreaks that occurred (including unreported outbreaks) estimated using the ZTB model. The total number of outbreaks was estimated at 215 (95% credible interval CrI95%: 195-249) and the surveillance sensitivity at 82% (CrI95%: 71-91). The rules proposed for identifying seroconversion may serve future research. Such rules, adjusted to the local environment, could conceivably be applied in other countries with surveillance programs dedicated to this disease. More generally, defining ad hoc algorithms for interpreting the antibody titer could be useful regarding other human and animal diseases and zoonosis when there is a lack of accurate information in the literature about the serological response in naturally infected subjects. This study shows how capture-recapture methods may help to estimate the sensitivity of an imperfect surveillance system and to valorize surveillance data. The sensitivity of the surveillance system of equine viral arteritis is relatively high and supports its relevance to prevent the disease spreading.

Keywords: Bayesian inference, capture-recapture, epidemiology, equine viral arteritis, infectious disease, seroconversion, surveillance

Procedia PDF Downloads 294
25363 Determining Optimal Number of Trees in Random Forests

Authors: Songul Cinaroglu

Abstract:

Background: Random Forest is an efficient, multi-class machine learning method using for classification, regression and other tasks. This method is operating by constructing each tree using different bootstrap sample of the data. Determining the number of trees in random forests is an open question in the literature for studies about improving classification performance of random forests. Aim: The aim of this study is to analyze whether there is an optimal number of trees in Random Forests and how performance of Random Forests differ according to increase in number of trees using sample health data sets in R programme. Method: In this study we analyzed the performance of Random Forests as the number of trees grows and doubling the number of trees at every iteration using “random forest” package in R programme. For determining minimum and optimal number of trees we performed Mc Nemar test and Area Under ROC Curve respectively. Results: At the end of the analysis it was found that as the number of trees grows, it does not always means that the performance of the forest is better than forests which have fever trees. In other words larger number of trees only increases computational costs but not increases performance results. Conclusion: Despite general practice in using random forests is to generate large number of trees for having high performance results, this study shows that increasing number of trees doesn’t always improves performance. Future studies can compare different kinds of data sets and different performance measures to test whether Random Forest performance results change as number of trees increase or not.

Keywords: classification methods, decision trees, number of trees, random forest

Procedia PDF Downloads 391
25362 Spectral Analysis Approaches for Simultaneous Determination of Binary Mixtures with Overlapping Spectra: An Application on Pseudoephedrine Sulphate and Loratadine

Authors: Sara El-Hanboushy, Hayam Lotfy, Yasmin Fayez, Engy Shokry, Mohammed Abdelkawy

Abstract:

Simple, specific, accurate and precise spectrophotometric methods are developed and validated for simultaneous determination of pseudoephedrine sulphate (PSE) and loratadine (LOR) in combined dosage form based on spectral analysis technique. Pseudoephedrine (PSE) in binary mixture could be analyzed either by using its resolved zero order absorption spectrum at its λ max 256.8 nm after subtraction of LOR spectrum or in presence of LOR spectrum by absorption correction method at 256.8 nm, dual wavelength (DWL) method at 254nm and 273nm, induced dual wavelength (IDWL) method at 256nm and 272nm and ratio difference (RD) method at 256nm and 262 nm. Loratadine (LOR) in the mixture could be analyzed directly at 280nm without any interference of PSE spectrum or at 250 nm using its recovered zero order absorption spectrum using constant multiplication(CM).In addition, simultaneous determination for PSE and LOR in their mixture could be applied by induced amplitude modulation method (IAM) coupled with amplitude multiplication (PM).

Keywords: dual wavelength (DW), induced amplitude modulation method (IAM) coupled with amplitude multiplication (PM), loratadine, pseudoephedrine sulphate, ratio difference (RD)

Procedia PDF Downloads 319
25361 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI

Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.

Keywords: contex-sensitive, CFI, binary analysis, code reuse attack

Procedia PDF Downloads 319
25360 Optimal Risk and Financial Stability

Authors: Rahmoune Abdelhaq

Abstract:

Systemic risk is a key concern for central banks charged with safeguarding overall financial stability. In this work, we investigate how systemic risk is affected by the structure of the financial system. We construct banking systems that are composed of a number of banks that are connected by interbank linkages. We then vary the key parameters that define the structure of the financial system — including its level of capitalization, the degree to which banks are connected, the size of interbank exposures and the degree of concentration of the system — and analyses the influence of these parameters on the likelihood of contagious (knock-on) defaults. First, we find that the better-capitalized banks are, the more resilient is the banking system against contagious defaults and this effect is non-linear. Second, the effect of the degree of connectivity is non-monotonic, that is, initially a small increase in connectivity increases the contagion effect; but after a certain threshold value, connectivity improves the ability of a banking system to absorb shocks. Third, the size of interbank liabilities tends to increase the risk of knock-on default, even if banks hold capital against such exposures. Fourth, more concentrated banking systems are shown to be prone to larger systemic risk, all else equal. In an extension to the main analysis, we study how liquidity effects interact with banking structure to produce a greater chance of systemic breakdown. We finally consider how the risk of contagion might depend on the degree of asymmetry (tier) inherent in the structure of the banking system. A number of our results have important implications for public policy, which this paper also draws out. This paper also discusses why bank risk management is needed to get the optimal one.

Keywords: financial stability, contagion, liquidity risk, optimal risk

Procedia PDF Downloads 399
25359 Drivers of Land Degradation in Trays Ecosystem as Modulated under a Changing Climate: Case Study of Côte d'Ivoire

Authors: Kadio Valere R. Angaman, Birahim Bouna Niang

Abstract:

Land degradation is a serious problem in developing countries, including Cote d’Ivoire, which has its economy focused on agriculture. It occurs in all kinds of ecosystems over the world. However, the drivers of land degradation vary from one region to another and from one ecosystem to another. Thus, identifying these drivers is an essential prerequisite to developing and implementing appropriate policies to reverse the trend of land degradation in the country, especially in the trays ecosystem. Using the binary logistic model with primary data obtained through 780 farmers surveyed, we analyze and identify the drivers of land degradation in the trays ecosystem. The descriptive statistics show that 52% of farmers interviewed have stated facing land degradation in their farmland. This high rate shows the extent of land degradation in this ecosystem. Also, the results obtained from the binary logit regression reveal that land degradation is significantly influenced by a set of variables such as sex, education, slope, erosion, pesticide, agricultural activity, deforestation, and temperature. The drivers identified are mostly local; as a result, the government must implement some policies and strategies that facilitate and incentive the adoption of sustainable land management practices by farmers to reverse the negative trend of land degradation.

Keywords: drivers, land degradation, trays ecosystem, sustainable land management

Procedia PDF Downloads 136
25358 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 338
25357 Multi-Layer Silica Alumina Membrane Performance for Flue Gas Separation

Authors: Ngozi Nwogu, Mohammed Kajama, Emmanuel Anyanwu, Edward Gobina

Abstract:

With the objective to create technologically advanced materials to be scientifically applicable, multi-layer silica alumina membranes were molecularly fabricated by continuous surface coating silica layers containing hybrid material onto a ceramic porous substrate for flue gas separation applications. The multi-layer silica alumina membrane was prepared by dip coating technique before further drying in an oven at elevated temperature. The effects of substrate physical appearance, coating quantity, the cross-linking agent, a number of coatings and testing conditions on the gas separation performance of the membrane have been investigated. Scanning electron microscope was used to investigate the development of coating thickness. The membrane shows impressive perm selectivity especially for CO2 and N2 binary mixture representing a stimulated flue gas stream

Keywords: gas separation, silica membrane, separation factor, membrane layer thickness

Procedia PDF Downloads 409
25356 Development of Impervious Concrete Using Micro Silica and GGBS as Cement Replacement Materials

Authors: Muhammad Rizwan Akram, Saim Raza, Hamza Hanif Chauhan

Abstract:

This paper describes the aim of research to evaluate the performance of ordinary Portland concretes containing cement replacement materials in both binary and ternary system. Blocks of concrete were prepared to have a constant water-binder ratio of 0.30. The test variables included the type and the amount of the supplementary cementious materials (SCMs) such as class of Silica Fume (SF) and ground granulated blast furnace slag (GGBS). Portland cement was replaced with Silica Fume (SF) upto 7.5% and GGBS up to a level of 50%. Then physical properties are assessed from the compressive strength and permeability tests.

Keywords: silica fume, GGBS, compressive strength, permeability

Procedia PDF Downloads 373
25355 Scalable Systolic Multiplier over Binary Extension Fields Based on Two-Level Karatsuba Decomposition

Authors: Chiou-Yng Lee, Wen-Yo Lee, Chieh-Tsai Wu, Cheng-Chen Yang

Abstract:

Shifted polynomial basis (SPB) is a variation of polynomial basis representation. SPB has potential for efficient bit-level and digit-level implementations of multiplication over binary extension fields with subquadratic space complexity. For efficient implementation of pairing computation with large finite fields, this paper presents a new SPB multiplication algorithm based on Karatsuba schemes, and used that to derive a novel scalable multiplier architecture. Analytical results show that the proposed multiplier provides a trade-off between space and time complexities. Our proposed multiplier is modular, regular, and suitable for very-large-scale integration (VLSI) implementations. It involves less area complexity compared to the multipliers based on traditional decomposition methods. It is therefore, more suitable for efficient hardware implementation of pairing based cryptography and elliptic curve cryptography (ECC) in constraint driven applications.

Keywords: digit-serial systolic multiplier, elliptic curve cryptography (ECC), Karatsuba algorithm (KA), shifted polynomial basis (SPB), pairing computation

Procedia PDF Downloads 359
25354 Clustering Categorical Data Using the K-Means Algorithm and the Attribute’s Relative Frequency

Authors: Semeh Ben Salem, Sami Naouali, Moetez Sallami

Abstract:

Clustering is a well known data mining technique used in pattern recognition and information retrieval. The initial dataset to be clustered can either contain categorical or numeric data. Each type of data has its own specific clustering algorithm. In this context, two algorithms are proposed: the k-means for clustering numeric datasets and the k-modes for categorical datasets. The main encountered problem in data mining applications is clustering categorical dataset so relevant in the datasets. One main issue to achieve the clustering process on categorical values is to transform the categorical attributes into numeric measures and directly apply the k-means algorithm instead the k-modes. In this paper, it is proposed to experiment an approach based on the previous issue by transforming the categorical values into numeric ones using the relative frequency of each modality in the attributes. The proposed approach is compared with a previously method based on transforming the categorical datasets into binary values. The scalability and accuracy of the two methods are experimented. The obtained results show that our proposed method outperforms the binary method in all cases.

Keywords: clustering, unsupervised learning, pattern recognition, categorical datasets, knowledge discovery, k-means

Procedia PDF Downloads 255
25353 Debris' Effect on Bearing Capacity of Defective Piles in Sand

Authors: A. M. Nasr, W. R. Azzam, K. E. Ebeed

Abstract:

For bored piles, careful cleaning must be used to reduce the amount of material trapped in the drilled hole; otherwise, the debris' presence might cause the soft toe effect, which would affect the axial resistance. There isn't much comprehensive research on bored piles with debris. In order to investigate the behavior of a single pile, a pile composite foundation, a two pile group, a three pile group and a four pile group investigation conducts, forty-eight numerical tests in which the debris is simulated using foam rubber.1m pile diameter and 10m length with spacing 3D and depth of foundation 1m used in this study. It is found that the existence of debris causes a reduction of bearing capacity by 64.58% and 33.23% for single pile and pile composite foundation, respectively, 23.27% and 24.24% for the number of defective piles / total number of pile =1/2 and 1 respectively for two group pile, 10.23%, 19.42% and 28.47% for the number of defective piles / total number of pile =1/3,2/3 and 1 respectively for three group pile and, this reduction increase with the increase in a number of defective piles / a total number of piles and 7.1%, 13.32%,19.02% and 26.36 for the number of defective piles / total number of pile =1/4,2/4,3/4 and 1 respectively for four group pile and decreases with an increase of number of pile duo to interaction effect.

Keywords: debris, Foundation, defective, interaction, board pile

Procedia PDF Downloads 91
25352 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 104
25351 Climate Physical Processes Mathematical Modeling for Dome-Like Traditional Residential Building

Authors: Artem Sedov, Aigerim Uyzbayeva, Valeriya Tyo

Abstract:

The presented article is showing results of dynamic modeling with Mathlab software of optimal automatic room climate control system for two experimental houses in Astana, one of which has circle plan and the other one has square plan. These results are showing that building geometry doesn't influence on climate system PID-controls configuring. This confirms theoretical implication that optimal automatic climate control system parameters configuring should depend on building's internal space volume, envelope heat transfer, number of people inside, supply ventilation air flow and outdoor temperature.

Keywords: climate control system, climate physics, dome-like building, mathematical modeling

Procedia PDF Downloads 358
25350 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 492
25349 Realizing the Full Potential of Islamic Banking System: Proposed Suitable Legal Framework for Islamic Banking System in Tanzania

Authors: Maulana Ayoub Ali, Pradeep Kulshrestha

Abstract:

Laws of any given secular state have a huge contribution in the growth of the Islamic banking system because the system uses conventional laws to govern its activities. Therefore, the former should be ready to accommodate the latter in order to make the Islamic banking system work properly without affecting the current conventional banking system and therefore without affecting its system. Islamic financial rules have been practiced since the birth of Islam. Following the recent world economic challenges in the financial sector, a quick rebirth of the contemporary Islamic ethical banking system took place. The coming of the Islamic banking system is due to various reasons including but not limited to the failure of the interest based economy in solving financial problems around the globe. Therefore, the Islamic banking system has been adopted as an alternative banking system in order to recover the highly damaged global financial sector. But the Islamic banking system has been facing a number of challenges which hinder its smooth operation in different parts of the world. It has not been the aim of this paper to discuss other challenges rather than the legal ones, but the same was partly discussed when it was justified that it was proper to do so. Generally, there are so many things which have been discovered in the course of writing this paper. The most important part is the issue of the regulatory and supervisory framework for the Islamic banking system in Tanzania and in other nations is considered to be a crucial part for the development of the Islamic banking industry. This paper analyses what has been observed in the study on that area and recommends for necessary actions to be taken on board in a bid to make Islamic banking system reach its climax of serving the larger community by providing ethical, equitable, affordable, interest-free and society cantered banking system around the globe.

Keywords: Islamic banking, interest free banking, ethical banking, legal framework

Procedia PDF Downloads 145
25348 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 250
25347 Fuzzy Rules Based Improved BEENISH Protocol for Wireless Sensor Networks

Authors: Rishabh Sharma

Abstract:

The main design parameter of WSN (wireless sensor network) is the energy consumption. To compensate this parameter, hierarchical clustering is a technique that assists in extending duration of the networks life by efficiently consuming the energy. This paper focuses on dealing with the WSNs and the FIS (fuzzy interface system) which are deployed to enhance the BEENISH protocol. The node energy, mobility, pause time and density are considered for the selection of CH (cluster head). The simulation outcomes exhibited that the projected system outperforms the traditional system with regard to the energy utilization and number of packets transmitted to sink.

Keywords: wireless sensor network, sink, sensor node, routing protocol, fuzzy rule, fuzzy inference system

Procedia PDF Downloads 100
25346 Number Sense Proficiency and Problem Solving Performance of Grade Seven Students

Authors: Laissa Mae Francisco, John Rolex Ingreso, Anna Krizel Menguito, Criselda Robrigado, Rej Maegan Tuazon

Abstract:

This study aims to determine and describe the existing relationship between number sense proficiency and problem-solving performance of grade seven students from Victorino Mapa High School, Manila. A paper pencil exam containing of 50-item number sense test and 5-item problem-solving test which measures their number sense proficiency and problem-solving performance adapted from McIntosh, Reys, and Bana were used as the research instruments. The data obtained from this study were interpreted and analyzed using the Pearson – Product Moment Coefficient of Correlation to determine the relationship between the two variables. It was found out that students who were low in number sense proficiency tend to be the students with poor problem-solving performance and students with medium number sense proficiency are most likely to have an average problem-solving performance. Likewise, students with high number sense proficiency are those who do excellently in problem-solving performance.

Keywords: number sense, performance, problem solving, proficiency

Procedia PDF Downloads 430
25345 Effect of a new Released Bio Organic-Fertilizer in Improving Tomato Growth in Hydroponic System and Under Greenhouse

Authors: Zayneb Kthiri, Walid Hamada

Abstract:

The application of organic fertilizers is generally known to be useful to sustain soil fertility and plant growth, especially in poor soils, with less than 1% of organic matter, as it is very common in our Tunisian fields. Therefore, we focused on evaluating the effect of a new released liquid organic fertilizer named Solorga (with 5% of organic matter) compared to a reference product (Espartan: Kimitec, Spain) on tomato plant growth and physiology. Both fertilizers, derived from plant decomposition, were applied at an early stage in hydroponic system and under greenhouse. In hydroponic system, after 14 days of their application by root feeding, a significant difference was observed between treatments. Indeed, Solorga improved shoots and roots length, as well as the biomass respectively, by 45%, 27%, and 27.8% increase rate, while compared to control plants. However, Espartan induced less the measured parameters while compared to untreated control. Moreover, Solorga significantly increased the chlorophyll content by 42% compared to control and by 32% compared to Espartan. In the greenhouse, after 20 days of treatments, the results showed a significant effect of both fertilizers on SPAD index and the number of flowers blossom. Solorga increased the amount of chlorophyll present in the leaf by 7% compared to Espartan as well as the plant height under greenhouse. Moreover, the number of flowers blossom increased by 15% in plants treated with Solorga while compared to Espartan. Whereas, there is no notable difference between both organic fertilizers on the fruits blossom and the number of fruits per blossom. In conclusion, even though there is a difference in the organic matter between both fertilizers, Solorga improved better the plant growth in controlled conditions in hydroponic system while compared to Espartan. Altogether the obtained results are encouraging for the use of Solorga as a soil enriching source of organic matter to help plants to boost their growth and help them to overcome abiotic stresses linked to soil fertility.

Keywords: tomato, plant growth, organic fertilizer, hydroponic system, greenhouse

Procedia PDF Downloads 130
25344 Soueif’s 'The Returning' and 'The Nativity': A Portrait of the Other as Others

Authors: Samira Brahimi

Abstract:

Throughout Aisha, her first collection of short stories, Ahdaf Soueif draws a multilayered picture of the Other as others, picturing a series of encounters of her protagonist with this very Other as a set of binary elements. The current essay includes a comparative study between two narratives, namely The Returning and The Nativity. The Other is portrayed as a male/female binary in The Returning and as 'The Foreigner' in an exotic land vs. the local in The Nativity. The analysis is to focus on Aisha, the main female character, who figures as conforming to the portrait of the stereotyped Arab Muslim woman as a sex-subject, submissive, and maudlin character, confining her vision of the Other to the boundaries of her cocooned self, epitomizing a self-centered vision of the world. This reduced vision results in the possibility of viewing the Other as a hindrance to her attaining a clarified and centrifugal representation of the latter, herself, and the outside world. The encounters could also be considered as the character's opportunity for a less stigmatized perception of the elements set forth. The main queries to be probed are: what are the different perceptions of the Other by the author in the narratives set forth? How does the protagonist's encounter with the Other(s) impede her ability to understand the Other, herself, and the world around her? Or how does this encounter allow her an enlightened vision of the aforementioned elements to forge a new start? The possibility of imagining a dialogic relation between different perceptions of the Other opens up new perspectives for adopting magnified representations of the later, oneself, and the world, dilating one's imagination.

Keywords: dialogic, female, foreigner, local, male, other, others

Procedia PDF Downloads 126
25343 Performance Analysis of Multichannel OCDMA-FSO Network under Different Pervasive Conditions

Authors: Saru Arora, Anurag Sharma, Harsukhpreet Singh

Abstract:

To meet the growing need of high data rate and bandwidth, various efforts has been made nowadays for the efficient communication systems. Optical Code Division Multiple Access over Free space optics communication system seems an effective role for providing transmission at high data rate with low bit error rate and low amount of multiple access interference. This paper demonstrates the OCDMA over FSO communication system up to the range of 7000 m at a data rate of 5 Gbps. Initially, the 8 user OCDMA-FSO system is simulated and pseudo orthogonal codes are used for encoding. Also, the simulative analysis of various performance parameters like power and core effective area that are having an effect on the Bit error rate (BER) of the system is carried out. The simulative analysis reveals that the length of the transmission is limited by the multi-access interference (MAI) effect which arises when the number of users increases in the system.

Keywords: FSO, PSO, bit error rate (BER), opti system simulation, multiple access interference (MAI), q-factor

Procedia PDF Downloads 363
25342 The International Labor Organization and the Formulation of International Labor Standards

Authors: Tahraoui Boualem

Abstract:

The International Labor Organization is one of the specialized agencies of the United Nations, and it is the only organization within the United Nations system that is distinguished by its tripartite legitimacy and which simultaneously includes governments, workers' and employers' organizations of its member states in a joint effort to set standards and policies Work to promote decent work in various parts of the world, and the expression of international labor standards basically means two types of documents, namely international labor agreements and international labor recommendations, and so far its general conference, which is held annually, has set a number of standards, the number of which has reached 184 agreements and 192 recommendations so far. For this reason, it is decided to clarify the International Labor Organization and the formulation of international labor standards within two sections. In the first topic, the researcher discusses the concept of the International Labor Organization, and in the second topic, it highlights the legal basis for the authority of the International Labor Organization in protecting the rights of workers.

Keywords: international labor, international labor standards, rights of workers, nation’s system

Procedia PDF Downloads 68
25341 Reforming of CO₂-Containing Natural Gas by Using an AC Gliding Arc Discharge Plasma System

Authors: Krittiya Pornmai, Sumaeth Chavadej

Abstract:

The increasing in global energy demand has affected the climate change caused by the generation of greenhouse gases. Therefore, the objective of this work was to investigate a direct production of synthesis gas from a CO₂-containing natural gas by using gliding arc discharge plasma technology. In this research, the effects of steam reforming, combined steam reforming and partial oxidation, and using multistage gliding arc discharge system on the process performance have been discussed. The simulated natural gas used in this study contains 70% methane, 5% ethane, 5% propane, and 20% carbon dioxide. In comparison with different plasma reforming processes (under their optimum conditions), the steam reforming provides the highest H₂ selectivity resulting from the cracking reaction of steam. In addition, the combined steam reforming and partial oxidation process gives a very high CO production implying that the addition of both oxygen and steam can offer the acceptably highest synthesis gas production. The stage number of plasma reactor plays an important role in the improvement of CO₂ conversion. Moreover, 3 stage number of plasma reactor is considered as an optimum stage number for the reforming of CO₂-containing natural gas with steam and partial oxidation in term of providing low energy consumption as compared with other plasma reforming processes.

Keywords: natural gas, reforming process, gliding arc discharge, plasma technology

Procedia PDF Downloads 169
25340 Entropy Production in Mixed Convection in a Horizontal Porous Channel Using Darcy-Brinkman Formulation

Authors: Amel Tayari, Atef Eljerry, Mourad Magherbi

Abstract:

The paper reports a numerical investigation of the entropy generation analysis due to mixed convection in laminar flow through a channel filled with porous media. The second law of thermodynamics is applied to investigate the entropy generation rate. The Darcy-Brinkman Model is employed. The entropy generation due to heat transfer and friction dissipations has been determined in mixed convection by solving numerically the continuity, momentum and energy equations, using a control volume finite element method. The effects of Darcy number, modified Brinkman number and the Rayleigh number on averaged entropy generation and averaged Nusselt number are investigated. The Rayleigh number varied between 103 ≤ Ra ≤ 105 and the modified Brinkman number ranges between 10-5 ≤ Br≤ 10-1 with fixed values of porosity and Reynolds number at 0.5 and 10 respectively. The Darcy number varied between 10-6 ≤ Da ≤10.

Keywords: entropy generation, porous media, heat transfer, mixed convection, numerical methods, darcy, brinkman

Procedia PDF Downloads 401