Search results for: travelling salesman problem
3987 Improvement of Sandy Clay Soils with the Addition of Rice Husk Ash and Expanded Polystyrene Beads
Authors: Alvaro Quino, Roger Trejo, Gary Duran, Jordy Viso
Abstract:
This article presents a study on the lightening and improvement of properties of soil extracted in the province of Talara in the department of Piura -Peru, to be used in filling in the construction of embankments for roads. This soft soil has a high percentage of elastic settlement and consolidation settlement. Currently, there are different methods that seek to mitigate the impact of this problem, which have achieved favorable results. As a contribution to these investigations, we propose the use of two lightening materials to be used in the filling of embankments; these materials are expanded polystyrene beads (EPS) and rice husk ash (RHA). Favorable results were obtained, such as a reduction of 14.34% of the volumetric weight, so the settlement will be reduced. In addition, it is observed that as the RHA dosage increases, the shear resistance increases. In this article, soil mechanics tests were performed to determine the effectiveness of this method in lightening and improving properties for the soil under study.Keywords: sandy clay soils, rice husk ash, expanded polystyrene, soft soils
Procedia PDF Downloads 1723986 Content Based Face Sketch Images Retrieval in WHT, DCT, and DWT Transform Domain
Authors: W. S. Besbas, M. A. Artemi, R. M. Salman
Abstract:
Content based face sketch retrieval can be used to find images of criminals from their sketches for 'Crime Prevention'. This paper investigates the problem of CBIR of face sketch images in transform domain. Face sketch images that are similar to the query image are retrieved from the face sketch database. Features of the face sketch image are extracted in the spectrum domain of a selected transforms. These transforms are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Walsh Hadamard Transform (WHT). For the performance analyses of features selection methods three face images databases are used. These are 'Sheffield face database', 'Olivetti Research Laboratory (ORL) face database', and 'Indian face database'. The City block distance measure is used to evaluate the performance of the retrieval process. The investigation concludes that, the retrieval rate is database dependent. But in general, the DCT is the best. On the other hand, the WHT is the best with respect to the speed of retrieving images.Keywords: Content Based Image Retrieval (CBIR), face sketch image retrieval, features selection for CBIR, image retrieval in transform domain
Procedia PDF Downloads 4933985 Lateral Cephalometric Radiograph to Determine Sex in Forensic Investigations
Authors: Paulus Maulana
Abstract:
Forensic identification is to help investigators determine a person's identity. Personal identification is often a problem in civil and criminal cases. Orthodontists like all other dental professionals can play a major role by maintaining lateral cephalogram and thus providing important or vital information or can clues to the legal authorities in order to help them in their search. Radiographic lateral cephalometry is a measurement method which focused on the anatomical points of human lateral skull. Sex determination is one of the most important aspects of the personal identification in forensic. Lateral cephalogram is a valuable tool in identification of sex as reveal morphological details of the skull on single radiograph. This present study evaluates the role of lateral cephalogram in identification of sex that parameters of lateral cephalogram are linear measurement and angle measurement. The linear measurements are N-S ( Anterior cranial length), Sna-Snp (Palatal plane length), Me-Go (menton-gonion), N-Sna ( Midfacial anterior height ), Sna-Me (Lower anterior face height), Co-Gn (total mandibular length). The angle measurements are SNA, SNB, ANB, Gonial, Interincical, and facial.Keywords: lateral cephalometry, cephalogram, sex, forensic, parameter
Procedia PDF Downloads 1903984 Preparation of Polyethylene/Cashewnut Flour/ Gum Arabic Polymer Blends Through Melt-blending and Determination of Their Biodegradation by Composting Method for Possible Reduction of Polyethylene-based Wastes from the Environment
Authors: Abubakar Umar Birnin-yauri
Abstract:
Plastic wastes arising from Polyethylene (PE)-based materials are increasingly becoming environmental problem, this is owed to the fact that these PE waste materials will only decompose over hundreds, or even thousands of years, during which they cause serious environmental problems. In this research, Polymer blends prepared from PE, Cashewnut flour (CNF) and Gum Arabic (GA) were studied in order to assay their biodegradation potentials via composting method. Different sample formulations were made i.e., X1= (70% PE, 25% CNF and 5% GA, X2= (70% PE, 20% CNF and 10% GA), X3= (70% PE, 15% CNF and 15% GA), X4 = (70% PE, 10% CNF and 20% GA) and X5 = (70% PE, 5% CNF and 25% GA) respectively. The results obtained showed that X1 recorded weight loss of 9.89% of its original weight after the first 20 days and 37.45% after 100 day, and X2 lost 12.67 % after the first 20 days and 42.56% after 100day, sample X5 experienced the greatest weight lost in the two methods adopted which are 52.9% and 57.89%. Instrumental analysis such as Fourier Transform Infrared Spectroscopy, Thermogravimetric analysis and Scanning electron microscopy were performed on the polymer blends before and after biodegradation. The study revealed that the biodegradation of the polymer blends is influenced by the contents of both the CNF and GA added into the blends.Keywords: polyethylene, cashewnut, gum Arabic, biodegradation, blend, environment
Procedia PDF Downloads 723983 Optimal Capacitor Placement in Distribution Using Cuckoo Optimization Algorithm
Authors: Ali Ravangard, S. Mohammadi
Abstract:
Shunt Capacitors have several uses in the electric power systems. They are utilized as sources of reactive power by connecting them in line-to-neutral. Electric utilities have also connected capacitors in series with long lines in order to reduce its impedance. This is particularly common in the transmission level, where the lines have length in several hundreds of kilometers. However, this post will generally discuss shunt capacitors. In distribution systems, shunt capacitors are used to reduce power losses, to improve voltage profile, and to increase the maximum flow through cables and transformers. This paper presents a new method to determine the optimal locations and economical sizing of fixed and/or switched shunt capacitors with a view to power losses reduction and voltage stability enhancement. For solving the problem, a new enhanced cuckoo optimization algorithm is presented.The proposed method is tested on distribution test system and the results show that the algorithm suitable for practical implementation on real systems with any size.Keywords: capacitor placement, power losses, voltage stability, radial distribution systems
Procedia PDF Downloads 3773982 Produced Gas Conversion of Microwave Carbon Receptor Reforming
Authors: Young Nam Chun, Mun Sup Lim
Abstract:
Carbon dioxide and methane, the major components of biomass pyrolysis/gasification gas and biogas, top the list of substances that cause climate change, but they are also among the most important renewable energy sources in modern society. The purpose of this study is to convert carbon dioxide and methane into high-quality energy using char and commercial activated carbon obtained from biomass pyrolysis as a microwave receptor. The methane reforming process produces hydrogen and carbon. This carbon is deposited in the pores of the microwave receptor and lowers catalytic activity, thereby reducing the methane conversion rate. The deposited carbon was removed by carbon gasification due to the supply of carbon dioxide, which solved the problem of microwave receptor inactivity. In particular, the conversion rate remained stable at over 90% when the ratio of carbon dioxide to methane was 1:1. When the reforming results of carbon dioxide and methane were compared after fabricating nickel and iron catalysts using commercial activated carbon as a carrier, the conversion rate was higher in the iron catalyst than in the nickel catalyst and when no catalyst was used.Keywords: microwave, gas reforming, greenhouse gas, microwave receptor, catalyst
Procedia PDF Downloads 3793981 Optimal Bayesian Chart for Controlling Expected Number of Defects in Production Processes
Abstract:
In this paper, we develop an optimal Bayesian chart to control the expected number of defects per inspection unit in production processes with long production runs. We formulate this control problem in the optimal stopping framework. The objective is to determine the optimal stopping rule minimizing the long-run expected average cost per unit time considering partial information obtained from the process sampling at regular epochs. We prove the optimality of the control limit policy, i.e., the process is stopped and the search for assignable causes is initiated when the posterior probability that the process is out of control exceeds a control limit. An algorithm in the semi-Markov decision process framework is developed to calculate the optimal control limit and the corresponding average cost. Numerical examples are presented to illustrate the developed optimal control chart and to compare it with the traditional u-chart.Keywords: Bayesian u-chart, economic design, optimal stopping, semi-Markov decision process, statistical process control
Procedia PDF Downloads 5733980 Change Point Detection Using Random Matrix Theory with Application to Frailty in Elderly Individuals
Authors: Malika Kharouf, Aly Chkeir, Khac Tuan Huynh
Abstract:
Detecting change points in time series data is a challenging problem, especially in scenarios where there is limited prior knowledge regarding the data’s distribution and the nature of the transitions. We present a method designed for detecting changes in the covariance structure of high-dimensional time series data, where the number of variables closely matches the data length. Our objective is to achieve unbiased test statistic estimation under the null hypothesis. We delve into the utilization of Random Matrix Theory to analyze the behavior of our test statistic within a high-dimensional context. Specifically, we illustrate that our test statistic converges pointwise to a normal distribution under the null hypothesis. To assess the effectiveness of our proposed approach, we conduct evaluations on a simulated dataset. Furthermore, we employ our method to examine changes aimed at detecting frailty in the elderly.Keywords: change point detection, hypothesis tests, random matrix theory, frailty in elderly
Procedia PDF Downloads 523979 End-to-End Control and Management of Multi-AS Virtual Service Networks Using SDN and Autonomic Computing Architecture
Authors: Yong Xue, Daniel A. Menascé
Abstract:
Automated and end-to-end network resource management and provisioning for virtual service networks in a multiple autonomous systems (a.k.a multi-AS) environment is a challenging and open problem. This paper proposes a novel, scalable and interoperable high-level architecture that incorporates a number of emerging enabling technologies including Software Defined Network (SDN), Network Function Virtualization (NFV), Service Oriented Architecture (SOA), and Autonomic Computing. The proposed architecture can be used to not only automate network resource management and provisioning for virtual service networks across multiple autonomous substrate networks, but also provide an adaptive capability for achieving optimal network resource management and maintaining network-level end-to-end network performance as well. The paper argues that this SDN and autonomic computing based architecture lays a solid foundation that can facilitate the development of the future Internet based on the pluralistic paradigm.Keywords: virtual network, software defined network, virtual service network, adaptive resource management, SOA, multi-AS, inter-domain
Procedia PDF Downloads 5313978 Bit Error Rate Analysis of Multiband OFCDM UWB System in UWB Fading Channel
Authors: Sanjay M. Gulhane, Athar Ravish Khan, Umesh W. Kaware
Abstract:
Orthogonal frequency and code division multiplexing (OFCDM) has received large attention as a modulation scheme to realize high data rate transmission. Multiband (MB) Orthogonal frequency division multiplexing (OFDM) Ultra Wide Band (UWB) system become promising technique for high data rate due to its large number of advantage over Singleband (UWB) system, but it suffer from coherent frequency diversity problem. In this paper we have proposed MB-OFCDM UWB system, in which two-dimensional (2D) spreading (time and frequency domain spreading), has been introduced, combining OFDM with 2D spreading, proposed system can provide frequency diversity. This paper presents the basic structure and main functions of the MB-OFCDM system, and evaluates the bit error rate BER performance of MB-OFDM and MB-OFCDM system under UWB indoor multi-path channel model. It is observe that BER curve of MB-OFCDM UWB improve its performance by 2dB as compare to MB-OFDM UWB system.Keywords: MB-OFDM UWB system, MB-OFCDM UWB system, UWB IEEE channel model, BER
Procedia PDF Downloads 5493977 A Vision-Based Early Warning System to Prevent Elephant-Train Collisions
Authors: Shanaka Gunasekara, Maleen Jayasuriya, Nalin Harischandra, Lilantha Samaranayake, Gamini Dissanayake
Abstract:
One serious facet of the worsening Human-Elephant conflict (HEC) in nations such as Sri Lanka involves elephant-train collisions. Endangered Asian elephants are maimed or killed during such accidents, which also often result in orphaned or disabled elephants, contributing to the phenomenon of lone elephants. These lone elephants are found to be more likely to attack villages and showcase aggressive behaviour, which further exacerbates the overall HEC. Furthermore, Railway Services incur significant financial losses and disruptions to services annually due to such accidents. Most elephant-train collisions occur due to a lack of adequate reaction time. This is due to the significant stopping distance requirements of trains, as the full braking force needs to be avoided to minimise the risk of derailment. Thus, poor driver visibility at sharp turns, nighttime operation, and poor weather conditions are often contributing factors to this problem. Initial investigations also indicate that most collisions occur in localised “hotspots” where elephant pathways/corridors intersect with railway tracks that border grazing land and watering holes. Taking these factors into consideration, this work proposes the leveraging of recent developments in Convolutional Neural Network (CNN) technology to detect elephants using an RGB/infrared capable camera around known hotspots along the railway track. The CNN was trained using a curated dataset of elephants collected on field visits to elephant sanctuaries and wildlife parks in Sri Lanka. With this vision-based detection system at its core, a prototype unit of an early warning system was designed and tested. This weatherised and waterproofed unit consists of a Reolink security camera which provides a wide field of view and range, an Nvidia Jetson Xavier computing unit, a rechargeable battery, and a solar panel for self-sufficient functioning. The prototype unit was designed to be a low-cost, low-power and small footprint device that can be mounted on infrastructures such as poles or trees. If an elephant is detected, an early warning message is communicated to the train driver using the GSM network. A mobile app for this purpose was also designed to ensure that the warning is clearly communicated. A centralized control station manages and communicates all information through the train station network to ensure coordination among important stakeholders. Initial results indicate that detection accuracy is sufficient under varying lighting situations, provided comprehensive training datasets that represent a wide range of challenging conditions are available. The overall hardware prototype was shown to be robust and reliable. We envision a network of such units may help contribute to reducing the problem of elephant-train collisions and has the potential to act as an important surveillance mechanism in dealing with the broader issue of human-elephant conflicts.Keywords: computer vision, deep learning, human-elephant conflict, wildlife early warning technology
Procedia PDF Downloads 2263976 Numerical Study on the Urea Melting and Induced Natural Convection in a Urea Sender Module
Authors: Doo Ki Lee, Man Young Kim
Abstract:
The Urea-Selective Catalytic Reduction (SCR) system is considered to be the most promising technology to fulfill the stringent emission regulation. In the Urea-SCR system, the urea solutions are used as the reducing agent, which is a eutectic composition (32.5wt% of urea). The advantage of this eutectic compositions is that it has a low freezing point approximately at -11 ℃, however, the problem of freezing occurs at low-temperature levels below that freezing point. To prevent freezing of urea solutions, we need heating systems that can melt by heating the frozen urea solutions in urea storage tank at low-temperature environment. In this study, therefore, a numerical investigation of three-dimensional unsteady heating problems analyzed to find the melting characteristics of the urea solutions on melting process. In this work, it can be found that the urea melting initiated by heat conduction from the heater is enhanced by the natural convection inside the melted liquid urea solutions due to the temperature difference. Also, liquid urea solutions are initially concentrated on the upper parts of the urea sender module.Keywords: urea solution, melting, heat conduction, natural convection, liquid fraction, phase change
Procedia PDF Downloads 2703975 Algorithm Research on Traffic Sign Detection Based on Improved EfficientDet
Authors: Ma Lei-Lei, Zhou You
Abstract:
Aiming at the problems of low detection accuracy of deep learning algorithm in traffic sign detection, this paper proposes improved EfficientDet based traffic sign detection algorithm. Multi-head self-attention is introduced in the minimum resolution layer of the backbone of EfficientDet to achieve effective aggregation of local and global depth information, and this study proposes an improved feature fusion pyramid with increased vertical cross-layer connections, which improves the performance of the model while introducing a small amount of complexity, the Balanced L1 Loss is introduced to replace the original regression loss function Smooth L1 Loss, which solves the problem of balance in the loss function. Experimental results show, the algorithm proposed in this study is suitable for the task of traffic sign detection. Compared with other models, the improved EfficientDet has the best detection accuracy. Although the test speed is not completely dominant, it still meets the real-time requirement.Keywords: convolutional neural network, transformer, feature pyramid networks, loss function
Procedia PDF Downloads 973974 Factors That Promote Bystander Intervention in Cases of Sexual Violence
Authors: Avigail Moor
Abstract:
Sexual violence against women occurs at alarmingly high rates, which have remained steady irrespective of the increased societal awareness of this problem, affecting an upward of 20% of women. It appears that all the public discourse on this topic, including research, prevention programs, and public campaigns have not made a noticeable dent in this prevalence. This calls for new course of action. Raising awareness regarding the preventive role of bystanders might be it. To that end, the present study sought to establish what promotes bystander intervention and what hinders it. Three hundred and twenty-four men and women, ranging in age from 20-40, participated in this study, completing self-report questionnaires on the topics under investigation. Results indicated that the proclivity to intervene as a bystander is impacted by various factors. The most consequential among them is gender, with twice as many women as men, 70% vs 38% respectively, being positively inclined to take action in such cases. Other significant factors included belief in rape myths and having empathy towards perpetrators, which reduced the likelihood of bystander intervention. Holding the attitude that it is possible to freely consent to sex while intoxicated had a similar impact. The discussion addresses various preventive implications.Keywords: bystander intervention, sexual assault, rape prevention, rape myths
Procedia PDF Downloads 1283973 Impact of Masonry Joints on Detection of Humidity Distribution in Aerated Concrete Masonry Constructions by Electric Impedance Spectrometry Measurements
Authors: Sanita Rubene, Martins Vilnitis, Juris Noviks
Abstract:
Aerated concrete is a load bearing construction material, which has high heat insulation parameters. Walls can be erected from aerated concrete masonry constructions and in perfect circumstances additional heat insulation is not required. The most common problem in aerated concrete heat insulation properties is the humidity distribution throughout the cross section of the masonry elements as well as proper and conducted drying process of the aerated concrete construction because only dry aerated concrete masonry constructions can reach high heat insulation parameters. In order to monitor drying process of the masonry and detect humidity distribution throughout the cross section of aerated concrete masonry construction application of electrical impedance spectrometry is applied. Further test results and methodology of this non-destructive testing method is described in this paper.Keywords: aerated concrete, electrical impedance spectrometry, humidity distribution, non-destructive testing
Procedia PDF Downloads 3293972 A Pilot Study on the Sensory Processing Difficulty Pattern Association between the Hot and Cold Executive Function Deficits in Attention Deficit Hyperactivity Deficit Child
Authors: Sheng-Fen Fan, Sung-Hui Tseng
Abstract:
Attention deficit hyperactivity deficit (ADHD) child display diverse sensory processing difficulty behaviors. There is less evidence to figure out how the association between executive function and sensory deficit. To determine whether sensory deficit influence the executive functions, we examined sensory processing by SPM and try to indicate hot/cold executive function (EF) by BRIEF2, respectively. We found that the hot executive function deficit might associate with auditory processing in a variety of settings, and vestibular input to maintain balance and upright posture; the cold EF deficit might opposite to the hot EF deficit, the vestibular sensory modulation difficulty association with emotion shifting and emotional regulation. These results suggest that sensory processing might be another consideration factor to influence the higher cognitive control or emotional regulation of EF. Overall, this study indicates the distinction between hot and cold EF impairments with different sensory modulation problem. Moreover, for clinician, it needs more cautious consideration to conduct intervention with ADHD.Keywords: hot executive function, cold executive function, sensory processing, ADHD
Procedia PDF Downloads 2863971 CFD Study of Free Surface Flows Resulting from a Dam-Breaking
Authors: Sonia Ben Hamza, Sabra Habli, Nejla Mahjoub Saïd, Hervé Bournot, Georges Le Palec
Abstract:
Free surface flows caused by dam breaks in channels or rivers is an attention-getting subject to the engineering practice, however, the studies are few to be reported. In this paper, a numerical investigation of unsteady free surface flows resulting from a dam-breaking in a rectangular channel is studied. Numerical computations were carried out using ANSYS Fluent which is based on the finite volume approach. The air/water interface was modeled with the volume of fluid method (VOF). Verification for a typical dam-break problem is analyzed by comparing the present results with others and very good agreement is obtained. The present approach is then used to predict the characteristics of free surface flow due to the dam breaking in channel. The characteristics of complex unsteady free surface flow in these examples are clearly explained. The numerical results show that the flow became more disturbed after impacting the vertical wall, then a recirculation zone, as well as turbulence phenomena, were created. At this instant, a cavity of air was included on the flow. The results agree well with the experimental data found in the literature.Keywords: CFD, dam-break, free surface, turbulent flows, VOF
Procedia PDF Downloads 3083970 Tsada-MobiMinder: A Location Based Alarm Mobile Reminder
Authors: Marylene S. Eder
Abstract:
Existing location based alarm applications has inability to give information to user’s particular direction to a specified place of destination and does not display a particular scenic spot from its current location going to the destination. With this problem, a location based alarm mobile reminder was developed. The application is implemented on Android based smart phones to provide services like providing routing information, helping to find nearby hotels, restaurants and scenic spots and offer many advantages to the mobile users to retrieve the information about their current location and process that data to get more useful information near to their location. It reminds the user about the location when the user enters some predefined location. All the user needs to have is the mobile phone with android platform with version 4.0 and above, and then the user can select the destination and find the destination on the application. The main objective of the project is to develop a location based application that provides tourists with real time information for scenic spots and provides alarm to a specified place of destination. This mobile application service will act as assistance for the frequent travelers to visit new places around the City.Keywords: location based alarm, mobile application, mobile reminder, tourist’s spots
Procedia PDF Downloads 3823969 Precious and Rare Metals in Overburden Carbonaceous Rocks: Methods of Extraction
Authors: Tatyana Alexandrova, Alexandr Alexandrov, Nadezhda Nikolaeva
Abstract:
A problem of complex mineral resources development is urgent and priority, it is aimed at realization of the processes of their ecologically safe development, one of its components is revealing the influence of the forms of element compounds in raw materials and in the processing products. In view of depletion of the precious metal reserves at the traditional deposits in the XXI century the large-size open cast deposits, localized in black shale strata begin to play the leading role. Carbonaceous (black) shales carry a heightened metallogenic potential. Black shales with high content of carbon are widely distributed within the scope of Bureinsky massif. According to academician Hanchuk`s data black shales of Sutirskaya series contain generally PGEs native form. The presence of high absorptive towards carbonaceous matter gold and PGEs compounds in crude ore results in decrease of valuable components extraction because of their sorption into dissipated carbonaceous matter.Keywords: сarbonaceous rocks, bitumens, precious metals, concentration, extraction
Procedia PDF Downloads 2463968 Designing Inventory System with Constrained by Reducing Ordering Cost, Lead Time and Lost Sale Rate and Considering Random Disturbance in Ordering Quantity
Authors: Arezoo Heidary, Abolfazl Mirzazadeh, Aref Gholami-Qadikolaei
Abstract:
In the business environment it is very common that a lot received may not be equal to quantity ordered. in this work, a random disturbance in a received quantity is considered. It is assumed a maximum allowable limit for storage space and inventory investment.The impact of lead time and ordering cost reductions once they act dependently is also investigated. Further, considering a mixture of back order and lost sales for allowable shortage system, the effect of investment on reducing lost sale rate is analyzed. For the proposed control system, a Lagrangian method is applied in order to solve the problem and an algorithmic procedure is utilized to achieve optimal solution with the global minimum expected cost. Finally, proves on concavity and convexity of the model in the decision variables are shown.Keywords: stochastic inventory system, lead time, ordering cost, lost sale rate, inventory constraints, random disturbance
Procedia PDF Downloads 4193967 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 853966 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 3373965 Buoyancy Effects in Pressure Retarded Osmosis with Extremely High Draw Solution Concentration
Authors: Ivonne Tshuma, Ralf Cord-Ruwisch, Wendell Ela
Abstract:
Water crisis is a world-wide problem because of population growth and climate change. Hence, desalination is a solution to water scarcity, which threatens the world. Reverse osmosis (RO) is the most used technique for desalination; unfortunately, this process, usually requires high-pressure requirement hence requires a lot of energy about 3 – 5.5 KWhr/m³ of electrical energy. The pressure requirements of RO can be alleviated by the use of PRO (pressure retarded osmosis) to drive the RO process. This paper proposes a process of utilizing the energy directly from PRO to drive an RO process. The paper mostly analyses the PRO process parameters such as cross-flow velocity, density, and buoyancy and how these have an effect on PRO hence ultimately the RO process. The experimental study of the PRO with various feed solution concentrations and cross-flow velocities at fixed applied pressure with different orientations of the PRO cell was performed. The study revealed that without cross-flow velocity, buoyancy effects were observed but not with cross-flow velocity.Keywords: cross-flow velocity, pressure retarded osmosis, density, buoyancy
Procedia PDF Downloads 1373964 Developing Innovative Participatory Visual Toolkits for Community Story Collection
Authors: Jiawei Dai, Xinrong Li, Yulong Sun, Yunxiao Hao
Abstract:
Recently, participatory approaches have become popular in a variety of fields, including social work, community, and population health, as important research tools for researchers to understand and immerse communities and conceptualize social phenomena. The participatory visual research methods promote the diversification and depth of the exploration process and communication forms to support the feasibility and practicality of the scheme, which helps to further inspire designers and avoid blind spots caused by the solidification of single thinking. This paper focuses on how to develop visual toolkits for participatory methods to assist and shape crowd participation and trigger idea generation in community issues. This project helps to verify the value of participatory visual tools in shaping participation and arousing expression, which provides support for gaining community diversity insights and community problem-solving. In addition, a visual toolbox was developed based on an actual case in a community for field testing, and further discussion was carried out after the data results were analyzed.Keywords: participatory design, community service, visual toolbox, visual metaphor
Procedia PDF Downloads 933963 Squaring the Triangle: A Stumpian Solution to the Major Frictions that Exist between Pragmatism, Religion, and Moral Progress; Richard Bernstein, Cornel West, and Hans-Georg Gadamer Re-Examined
Authors: Martin Bloomfield
Abstract:
This paper examines frictions that lie at the heart of any pragmatist conception of religion and moral progress. I take moral progress to require the ability to correctly analyse social problems, provide workable solutions to these problems, and then rationally justify the analyses and solutions used. I take religion here to involve, as a minimal requirement, belief in the existence of God, a god, or gods, such that they are recognisable to most informed observers within the Western tradition. I take pragmatism to belong to, and borrow from, the philosophical traditions of non-absolutism, anti-realism, historicism, and voluntarism. For clarity, the relevant brands of each of these traditions will be examined during the paper. The friction identified in the title may be summed up as follows: those who, like Cornel West (and, when he was alive, Hilary Putnam), are theistic pragmatists with an interest in realising moral progress, have all been aware of a problem inherent in their positions. Assuming it can be argued that religion and moral progress are compatible, a non-absolutist, anti-realist, historicist position nevertheless raises problems that, as Leon Wieseltier pointed out, the pragmatist still believes in a God who isn’t real, and that the truth of any religious statement (including “God exists”) is relative not to any objective reality but to communities of engaged interlocutors; and that, where there are no absolute standards of right and wrong, any analysis of (and solution to) social problems can only be rationally justified relative to one or another community or moral and epistemic framework. Attempts made to universalise these frameworks, notably by Dewey, Gadamer, and Bernstein, through democracy and hermeneutics, fall into either a vicious and infinite regress, or (taking inspiration from Habermas) the problem of moral truths being decided through structures of power. The paper removes this friction by highlighting the work of Christian pragmatist Cornel West through the lens of the philosopher of religion Eleanore Stump. While West recognises that for the pragmatist, the correctness of any propositions about God or moral progress is impossible to rationally justify to any outside the religious, moral or epistemic framework of the speakers themselves without, as he calls it, a ‘locus of truth’ (which is itself free from the difficulties Dewey, Gadamer and Bernstein fall victim to), Stump identifies routes to knowledge which provide such a locus while avoiding the problems of relativism, power dynamics, and regress. She describes “Dominican” and “Franciscan” knowledge (roughly characterised as “propositional” and “non-propositional”), and uses this distinction to identify something Bernstein saw as missing from Gadamer: culture-independent norms, upon which universal agreement can be built. The “Franciscan knowledge” Stump identifies as key is second-personal knowledge of Christ. For West, this allows the knower to access vital culture-independent norms. If correct, instead of the classical view (religion is incompatible with pragmatism), Christianity becomes key to pragmatist knowledge and moral-knowledge claims. Rather than being undermined by pragmatism, Christianity enables pragmatists to make moral and epistemic claims, free from troubling power dynamics and cultural relativism.Keywords: Cornel West, Cultural Relativism, Gadamer, Philosophy of Religion, Pragmatism
Procedia PDF Downloads 1973962 Design and Development of Data Mining Application for Medical Centers in Remote Areas
Authors: Grace Omowunmi Soyebi
Abstract:
Data Mining is the extraction of information from a large database which helps in predicting a trend or behavior, thereby helping management make knowledge-driven decisions. One principal problem of most hospitals in rural areas is making use of the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This Data Mining application is to be designed using a Structured System Analysis and design method, which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the Design and Implementation of a Computerized medical record system. This Computerized system will replace the file management system and help to easily retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.Keywords: data mining, medical record system, systems programming, computing
Procedia PDF Downloads 2093961 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches
Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar
Abstract:
Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework
Procedia PDF Downloads 1213960 Adopting Home Nursing as a Remedy for Child Labour in Nigeria
Authors: T. O. Adeoye
Abstract:
In Nigeria prior to the arrival of the colonial masters, there used to be good family relationship, things were done through cooperation and community effort, even training and upbringing of a child was the responsibility of every member of the community. The advent of western education and civilization brought about movement of youths from rural to urban areas. Hence the tie that binds the village life is broken, community as a whole is no more responsible for the upbringing or home training of her children any more. The study investigates adoption of home nursing as a remedy for child labour in Nigeria, considered challenges like poverty, broken homes and illiteracy among others. For the purpose of verification, a survey in form of an opinion poll was conducted by means of interview using questionnaires for about 3000 respondents. However, out of the respondents that were interviewed as regard parental poverty and its resultant effect on a child only 14.2% of the respondent strongly disagreed that children work on the street because their parents are poor. The study shows that possible solutions of effective ways of controlling child labour is home nursing and also promoting and advocating for the policies against child labour in Nigeria.Keywords: child abuse, child labour, psychological problem, Street children
Procedia PDF Downloads 3353959 Main Factor That Causes the Instabilities of the Earth’s Rotation
Authors: Jin-Sim, Kwan-U Kim, Ryong-Jin Jang, Sung-Duk Kim
Abstract:
Earth rotation is one of astronomical phenomena without which it is impossible to think of human life. That is why the investigation of the Earth's rotation is very important, and it has a long history of study. The invention of quartz clocks in the 1930s, atomic time in the 1950s, and the introduction of modern technology into astronomic observation in recent years resulted in rapid development of the study of Earth’s rotation. The theory of the Earth's rotation, however, has not been up to the high level of astronomic observation due to the limitation of time. As a typical example, we can take the problems that cover the instabilities of the Earth’s rotation, proved completely by the astronomic observations as well as polar motion, the precession and nutation of the Earth's rotation axis, which have not been described in a single equation in a quantificational way from the unique law of Earth rotation. In particular, at present the problem of what is the main factor causing the instabilities of the Earth rotation has not been solved clearly in quantificational ways yet. Therefore, this paper gives quantificational proof that the main factor that causes the instabilities of the Earth's rotation is the moment of external force other than variations in the relative atmospheric angular momentum due to the time limitation and under some assumptions or the moment of inertia of the Earth’s body.Keywords: atmospheric angular momentum, instabilities of the earth’s rotation, law of the earth’s rotation change, moment of inertia of the earth
Procedia PDF Downloads 793958 A Study of Students’ Perceptions of Technology in Petaling District
Authors: Ahmad Masduki Bin Selamat
Abstract:
Malaysia is becoming a developed country by the year 2020, the problem is that little is known about the perceptions and curricular values of Malaysian high school students who have taken Living Skills as a subject in the regular public school. How these students perceive technology in their daily lives, in the country’s development and in global context, is not known. The study involved form 4 students from four public schools in Petaling District. The study found that the Petaling District students’ knowledge of technology were good, where 76.6 % of them scored 50% marks and above during the achievement test. In addition, it was also found that only excellent and squatter students perceived technology education as important as a school subject, compared to those students from the urban area. It was found that students preferred business and entrepreneurship topics rather than the other Living Skills curriculum. The study suggests that students should be exposed to technology education from the early years of schooling (preschool to secondary). In addition, the acquisition of skills, the evaluation, revision and modification of the instruction as well as the curriculum should be enforced.Keywords: technology education, living skills, curricular values, public schools
Procedia PDF Downloads 451