Search results for: service systems
9046 Efficient Passenger Counting in Public Transport Based on Machine Learning
Authors: Chonlakorn Wiboonsiriruk, Ekachai Phaisangittisagul, Chadchai Srisurangkul, Itsuo Kumazawa
Abstract:
Public transportation is a crucial aspect of passenger transportation, with buses playing a vital role in the transportation service. Passenger counting is an essential tool for organizing and managing transportation services. However, manual counting is a tedious and time-consuming task, which is why computer vision algorithms are being utilized to make the process more efficient. In this study, different object detection algorithms combined with passenger tracking are investigated to compare passenger counting performance. The system employs the EfficientDet algorithm, which has demonstrated superior performance in terms of speed and accuracy. Our results show that the proposed system can accurately count passengers in varying conditions with an accuracy of 94%.Keywords: computer vision, object detection, passenger counting, public transportation
Procedia PDF Downloads 1549045 Accelerating Molecular Dynamics Simulations of Electrolytes with Neural Network: Bridging the Gap between Ab Initio Molecular Dynamics and Classical Molecular Dynamics
Authors: Po-Ting Chen, Santhanamoorthi Nachimuthu, Jyh-Chiang Jiang
Abstract:
Classical molecular dynamics (CMD) simulations are highly efficient for material simulations but have limited accuracy. In contrast, ab initio molecular dynamics (AIMD) provides high precision by solving the Kohn–Sham equations yet requires significant computational resources, restricting the size of systems and time scales that can be simulated. To address these challenges, we employed NequIP, a machine learning model based on an E(3)-equivariant graph neural network, to accelerate molecular dynamics simulations of a 1M LiPF6 in EC/EMC (v/v 3:7) for Li battery applications. AIMD calculations were initially conducted using the Vienna Ab initio Simulation Package (VASP) to generate highly accurate atomic positions, forces, and energies. This data was then used to train the NequIP model, which efficiently learns from the provided data. NequIP achieved AIMD-level accuracy with significantly less training data. After training, NequIP was integrated into the LAMMPS software to enable molecular dynamics simulations of larger systems over longer time scales. This method overcomes the computational limitations of AIMD while improving the accuracy limitations of CMD, providing an efficient and precise computational framework. This study showcases NequIP’s applicability to electrolyte systems, particularly for simulating the dynamics of LiPF6 ionic mixtures. The results demonstrate substantial improvements in both computational efficiency and simulation accuracy, highlighting the potential of machine learning models to enhance molecular dynamics simulations.Keywords: lithium-ion batteries, electrolyte simulation, molecular dynamics, neural network
Procedia PDF Downloads 199044 Comparative Analysis of a Self-Supporting Wall of Granite Slabs in a Multi-Leaves Enclosure System
Authors: Miguel Angel Calvo Salve
Abstract:
Building enclosures and façades not only have an aesthetic component they must also ensure thermal comfort and improve the acoustics and air quality in buildings. The role of facades design, its assemblies, and construction are key in developing a greener future in architecture. This research and study focus on the design of a multi-leaves building envelope, with a self-supporting wall of granite slabs. The study will demonstrate the advantages of its use in compare with the hanging stone veneer in a vented cladding system. Using the Design of the School of Music and Theatre of the Atlantic Area in Spain as a case study where the multi-leaves enclosure system consists in a self-supported outer leaf of large granite slabs of 15cm. of thickness, a vent cavity with thermal isolation, a brick wall, and a series of internal layers. The methodology used were simulations and data collected in building. The advantages of the self-supporting wall of granite slabs in the outer leaf (15cm). compared with a hanging stone veneer in a vented cladding system can summarize the goals as follows: Using the stone in more natural way, by compression. The weight of the stone slabs goes directly to a strip-footing and don't overload the reinforced concrete structure of the building. The weight of the stone slabs provides an external aerial soundproofing, preventing the sound transmission to the structure. The thickness of the stone slabs is enough to provide the external waterproofing of the building envelope. The self-supporting system with minimum anchorages allows having a continuous and external thermal isolation without thermal bridges. The thickness of ashlars masonry provides a thermal inertia that balances the temperatures between day and night in the external thermal insulation layer. The absence of open joints gives the quality of a continuous envelope transmitting the sensations of the stone, the heaviness in the facade, the rhythm of the music and the sequence of the theatre. The main cost of stone due his bigger thickness is more than compensated with the reduction in assembly costs. Don´t need any substructure systems for hanging stone veneers.Keywords: self-supporting wall, stone cladding systems, hanging veneer cladding systems, sustainability of facade systems
Procedia PDF Downloads 649043 Formalizing a Procedure for Generating Uncertain Resource Availability Assumptions Based on Real Time Logistic Data Capturing with Auto-ID Systems for Reactive Scheduling
Authors: Lars Laußat, Manfred Helmus, Kamil Szczesny, Markus König
Abstract:
As one result of the project “Reactive Construction Project Scheduling using Real Time Construction Logistic Data and Simulation”, a procedure for using data about uncertain resource availability assumptions in reactive scheduling processes has been developed. Prediction data about resource availability is generated in a formalized way using real-time monitoring data e.g. from auto-ID systems on the construction site and in the supply chains. The paper focuses on the formalization of the procedure for monitoring construction logistic processes, for the detection of disturbance and for generating of new and uncertain scheduling assumptions for the reactive resource constrained simulation procedure that is and will be further described in other papers.Keywords: auto-ID, construction logistic, fuzzy, monitoring, RFID, scheduling
Procedia PDF Downloads 5139042 Nanocomposite Metal Material: Study of Antimicrobial and Catalytic Properties
Authors: Roman J. Jedrzejczyk, Damian K. Chlebda, Anna Dziedzicka, Rafal Wazny, Agnieszka Domka, Maciej Sitarz, Przemyslaw J. Jodlowski
Abstract:
The aim of this study was to obtain antimicrobial material based on thin zirconium dioxide coatings on structured reactors doped with metal nanoparticles using the sonochemical sol-gel method. As a result, dense, uniform zirconium dioxide films were obtained on the kanthal sheets which can be used as support materials in antimicrobial converters with sophisticated shapes. The material was characterised by physicochemical methods, such as AFM, SEM, EDX, XRF, XRD, XPS and in situ Raman and DRIFT spectroscopy. In terms of antimicrobial activity, the material was tested by ATP/AMP method using model microbes isolated from the real systems. The results show that the material can be potentially used in the market as a good candidate for active package and as active bulkheads of climatic systems. The mechanical tests showed that the developed method is an efficient way to obtain durable converters with high antimicrobial activity against fungi and bacteria.Keywords: antimicrobial properties, kanthal steel, nanocomposite, zirconium oxide
Procedia PDF Downloads 2019041 Integration of Technology through Instructional Systems Design
Authors: C. Salis, D. Zedda, M. F. Wilson
Abstract:
The IDEA project was conceived for teachers who are interested in enhancing their capacity to effectively implement the use of specific technologies in their teaching practice. Participating teachers are coached and supported as they explore technologies applied to the educational context. They access tools such as the technological platform developed by our team. Among the platform functionalities, teachers access an instructional systems design (ISD) tool (learning designer) that was adapted to the needs of our project. The tool is accessible from computers or mobile devices and used in association with other technologies to create new, meaningful learning environments. The objective of an instructional systems design is to guarantee the quality and effectiveness of education and to enhance learning. This goal involves both teachers who want to become more efficient in transferring knowledge or skills and students as the final recipient of their teaching. The use of Blooms’s taxonomy enables teachers to classify the learning objectives into levels of complexity and specificity, thus making it possible to highlight the kind of knowledge teachers would like their students to reach. The fact that the instructional design features can be visualized through the IDEA platform is a guarantee for those who are looking for specific educational materials to be used in their lessons. Despite the benefits offered, a number of teachers are reluctant to use ISD because the preparatory work of having to thoroughly analyze the teaching/learning objectives, the planning of learning material, assessment activities, etc., is long and felt to be time-consuming. This drawback is minimized using a learning designer, as the tool facilitates to reuse of the didactic contents having a clear view of the processes of analysis, planning, and production of educational or testing materials uploaded on our platform. In this paper, we shall present the feedback of the teachers who used our tool in their didactic.Keywords: educational benefits, educational quality, educational technology, ISD tool
Procedia PDF Downloads 1889040 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 2279039 The Effect of Torsional Angle on Reversible Electron Transfer in Donor: Acceptor Frameworks Using Bis(Imino)Pyridines as Proxy
Authors: Ryan Brisbin, Hassan Harb, Justin Debow, Hrant Hratchian, Ryan Baxter
Abstract:
Donor-Acceptor (DA) frameworks are crucial parts of any technology requiring charge transport. This type of behavior is ubiquitous across technologies from semi conductors to solar panels. Currently, most DA systems involve metallic components, but progressive research is being pursued to design fully organic DA systems to be used as both organic semi-conductors and light emitting diodes. These systems are currently comprised of conductive polymers and salts. However, little is known about the effect of various physical aspects (size, torsional angle, electron density) have on the act of reversible charge transfer. Herein, the effect of torsional angle on reductive stability in bis(imino)pyridines is analyzed using a combination of single crystal analysis and electro-chemical peak current ratios from cyclic voltammetry. The computed free energies of reduction and electron attachment points were also investigated through density functional theory and natural ionization orbital theory to gain greater understanding of the global effect torsional angles have on electron transfer in bis(imino)pyridines. Findings indicated that torsional angles are a multi-variable parameter affected by both local steric constraints and resonant electronic contributions. Local steric impacted torsional angles demonstrated a negligible effect on electrochemical reversibility, while resonant affected torsional angles were observed to significantly alter the electrochemical reversibility.Keywords: cyclic voltammetry, bis(imino)pyridines, structure-activity relationship, torsional angles
Procedia PDF Downloads 2379038 Toward Cloud E-learning System Based on Smart Tools
Authors: Mohsen Maraoui
Abstract:
In the face of the growth in the quantity of data produced, several methods and techniques appear to remedy the problems of processing and analyzing large amounts of information mainly in the field of teaching. In this paper, we propose an intelligent cloud-based teaching system for E-learning content services. This system makes easy the manipulation of various educational content forms, including text, images, videos, 3 dimensions objects and scenes of virtual reality and augmented reality. We discuss the integration of institutional and external services to provide personalized assistance to university members in their daily activities. The proposed system provides an intelligent solution for media services that can be accessed from smart devices cloud-based intelligent service environment with a fully integrated system.Keywords: cloud computing, e-learning, indexation, IoT, learning in Arabic language, smart tools
Procedia PDF Downloads 1359037 Low-Cost VoIP University Solution
Authors: Carlos Henrique Rodrigues de Oliveira, Luis Carlos Costa Fonseca, Caio de Castro Torres, Daniel Gusmão Pereira, Luiz Ricardo Souza Ripardo, Magno Castro Moraes, Ana Paula Ferreira Costa, Luiz Carlos Chaves Lima Junior, Aurelianny Almeida da Cunha
Abstract:
VoIP University is a communication solution based on the IP protocol. This solution was proposed to modernize and save on communication, which required the development of Android, iOS, and Windows applications and a web service server. This solution allows integration with management system databases to create and manage a list of user extensions. VoIP UEMA was the first deployed project of VoIP University. MOS subjective voice quality test was done, and the results indicated good quality. A financial analysis revealed that annual spending on telephone bills decreased by more than 97 %.Keywords: VoIP eTec, VoIP UEMA, VoIP University, VoIP Valen
Procedia PDF Downloads 619036 Study of Deflection at Junction in the Precast on Cyclic Loading
Authors: Jongho Park, Ui-Cheol Shin, Jinwoong Choi, Sungnam Hong, Sun-Kyu Park
Abstract:
While the numerous structures built the industrialization are aging, the effort for the maintenance is concentrated in many countries. However, the traffic jam, environmental damage, and enormous maintenance cost, and etc become a problem. So, in order to solve this, the modular bridge has been studied. This bridge is the structure which utilizes and assembles the standard precast member. Through this, the substitution of the existing bridge and advantage of the easy maintenance will be achieved. However, the reliability in the long-term behavior is insufficient due to the junction part between modular precast members. Therefore, in this research, the cyclic load loading experiment was performed on the junction and deflection was analyzed by long-term service in modular slab connection. The deflection of modular slab with junction was mostly generated when initial and final test.Keywords: modular bridge, deflection, cyclic loading, junction
Procedia PDF Downloads 5119035 Intrusion Detection Using Dual Artificial Techniques
Authors: Rana I. Abdulghani, Amera I. Melhum
Abstract:
With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.Keywords: IDS, SI, BP, NSL_KDD, PSO
Procedia PDF Downloads 3829034 Material Supply Mechanisms for Contemporary Assembly Systems
Authors: Rajiv Kumar Srivastava
Abstract:
Manufacturing of complex products such as automobiles and computers requires a very large number of parts and sub-assemblies. The design of mechanisms for delivery of these materials to the point of assembly is an important manufacturing system and supply chain challenge. Different approaches to this problem have been evolved for assembly lines designed to make large volumes of standardized products. However, contemporary assembly systems are required to concurrently produce a variety of products using approaches such as mixed model production, and at times even mass customization. In this paper we examine the material supply approaches for variety production in moderate to large volumes. The conventional approach for material delivery to high volume assembly lines is to supply and stock materials line-side. However for certain materials, especially when the same or similar items are used along the line, it is more convenient to supply materials in kits. Kitting becomes more preferable when lines concurrently produce multiple products in mixed model mode, since space requirements could increase as product/ part variety increases. At times such kits may travel along with the product, while in some situations it may be better to have delivery and station-specific kits rather than product-based kits. Further, in some mass customization situations it may even be better to have a single delivery and assembly station, to which an entire kit is delivered for fitment, rather than a normal assembly line. Finally, in low-moderate volume assembly such as in engineered machinery, it may be logistically more economical to gather materials in an order-specific kit prior to launching final assembly. We have studied material supply mechanisms to support assembly systems as observed in case studies of firms with different combinations of volume and variety/ customization. It is found that the appropriate approach tends to be a hybrid between direct line supply and different kitting modes, with the best mix being a function of the manufacturing and supply chain environment, as well as space and handling considerations. In our continuing work we are studying these scenarios further, through the use of descriptive models and progressing towards prescriptive models to help achieve the optimal approach, capturing the trade-offs between inventory, material handling, space, and efficient line supply.Keywords: assembly systems, kitting, material supply, variety production
Procedia PDF Downloads 2269033 Large Strain Creep Analysis of Composite Thick-Walled Anisotropic Cylinders
Authors: Vinod Kumar Arya
Abstract:
Creep analysis of a thick-walled composite anisotropic cylinder under internal pressure and considering large strains is presented. Using a threshold creep law for composite materials, expressions for stresses, strains, and strain rates are derived for several anisotropic cases. Numerical results, presented through several graphs and tables, depict the effect of anisotropy on the stress, strain, and strain rate distributions. Since for a specific type of material anisotropy described in the paper, these quantities are found to have the lowest values at the inner radius (the potential location of cylinder failure), it is concluded that by employing such an anisotropic material for the design of a thick-walled cylinder a longer service life for the cylinder may be achieved.Keywords: creep, composites, large strains, thick-walled cylinders, anisotropy
Procedia PDF Downloads 1499032 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 679031 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 4509030 Development of a Single Drive for the Accessories Components in IC Engine
Authors: R. Rishi Jain, S. V. Viswanath, R. Naveen Vasanthan
Abstract:
Generally all the IC engines, alternators, air conditioner compressors, oil pumps and coolant pumps are driven by a crankshaft utilizing V-belt drivers. An increase in the number of idle pulleys results in the increase of frictional power. Further, components like idler and belt tensioner are also needed to run the belt drive which adds to the frictional power. The aspiration of this paper is to minimize the friction power by introducing a new system that could combine all the accessories in one shaft within a single casing. This is conceptualized to minimize the friction power, service and maintenance cost, space and also time. The validation of this work can be executed through a simpler drive transmitting power from the crank shaft.Keywords: single drive, idler pulley, belt tensioner, friction power, casing, space and cost
Procedia PDF Downloads 3189029 Prospective Service Evaluation of Physical Healthcare In Adult Community Mental Health Services in a UK-Based Mental Health Trust
Authors: Gracie Tredget, Raymond McGrath, Karen Ang, Julie Williams, Nick Sevdalis, Fiona Gaughran, Jorge Aria de la Torre, Ioannis Bakolis, Andy Healey, Zarnie Khadjesari, Euan Sadler, Natalia Stepan
Abstract:
Background: Preventable physical health problems have been found to increase morbidity rates amongst adults living with serious mental illness (SMI). Community mental health clinicians have a role in identifying, and preventing physical health problems worsening, and supporting primary care services to administer routine physical health checks for their patients. However, little is known about how mental health staff perceive and approach their role when providing physical healthcare amongst patients with SMI, or the impact these attitudes have on routine practice. Methods: The present study involves a prospective service evaluation specific to Adult Community Mental Health Services at South London and Maudsley NHS Foundation Trust (SLaM). A qualitative methodology will use semi-structured interviews, focus groups and observations to explore attitudes, perceptions and experiences of staff, patients, and carers (n=64) towards physical healthcare, and barriers or facilitators that impact upon it. 1South London and Maudsley NHS Foundation Trust, London, SE5 8AZ, UK 2 Centre for Implementation Science, King’s College London, London, SE5 8AF, UK 3 Psychosis Studies, King's College London, London, SE5 8AF, UK 4 Department of Biostatistics and Health Informatics, King’s College London, London, SE5 8AF, UK 5 Kings Health Economics, King's College London, London, SE5 8AF, UK 6 Behavioural and Implementation Science (BIS) research group, University of East Anglia, Norwich, UK 7 Department of Nursing, Midwifery and Health, University of Southampton, Southampton, UK 8 Mind and Body Programme, King’s Health Partners, Guy’s Hospital, London, SE1 9RT *[email protected] Analysis: Data from across qualitative tasks will be synthesised using Framework Analysis methodologies. Staff, patients, and carers will be invited to participate in co-development of recommendations that can improve routine physical healthcare within Adult Community Mental Health Teams at SLaM. Results: Data collection is underway at present. At the time of the conference, early findings will be available to discuss. Conclusions: An integrated approach to mind and body care is needed to reduce preventable deaths amongst people with SMI. This evaluation will seek to provide a framework that better equips staff to approach physical healthcare within a mental health setting.Keywords: severe mental illness, physical healthcare, adult community mental health, nursing
Procedia PDF Downloads 959028 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 1549027 Ballistic Performance of Magnesia Panels and Modular Wall Systems
Authors: Khin Thandar Soe, Mark Stephen Pulham
Abstract:
Ballistic building materials play a crucial role in ensuring the safety of the occupants within protective structures. Traditional options like Ordinary Portland Cement (OPC)-based walls, including reinforced concrete walls, precast concrete walls, masonry walls, and concrete blocks, are frequently employed for ballistic protection, but they have several drawbacks such as being thick, heavy, costly, and challenging to construct. On the other hand, glass and composite materials offer lightweight and easier construction alternatives, but they come with a high price tag. There has been no reported test data on magnesium-based ballistic wall panels or modular wall systems so far. This paper presents groundbreaking small arms test data related to the development of the world’s first magnesia cement ballistic wall panels and modular wall system. Non-hydraulic magnesia cement exhibits several superior properties, such as lighter weight, flexibility, acoustics, and fire performance, compared to the traditional Portland Cement. However, magnesia cement is hydrophilic and may degrade in prolonged contact with water. In this research, modified magnesia cement for water resistant and durability from UBIQ Technology is applied. The specimens are made of a modified magnesia cement formula and prepared in the Laboratory of UBIQ Technology Pty Ltd. The specimens vary in thickness, and the tests cover various small arms threats in compliance with standards AS/NZS2343 and UL752 and are performed up to the maximum threat level of Classification R2 (NATO) and UL-Level 8(NATO) by the Accredited Test Centre, BMT (Ballistic and Mechanical Testing, VIC, Australia). In addition, the results of the test conducted on the specimens subjected to the small 12mm diameter steel ball projectile impact generated by a gas gun are also presented and discussed in this paper. Gas gun tests were performed in UNSW@ADFA, Canberra, Australia. The tested results of the magnesia panels and wall systems are compared with one of concrete and other wall panels documented in the literature. The conclusion drawn is that magnesia panels and wall systems exhibit several advantages over traditional OPC-based wall systems, and they include being lighter, thinner, and easier to construct, all while providing equivalent protection against threats. This makes magnesia cement-based materials a compelling choice of application where efficiency and performance are critical to create a protective environment.Keywords: ballistics, small arms, gas gun, projectile, impact, wall panels, modular, magnesia cement
Procedia PDF Downloads 779026 Formulation and Characterization of Antimicrobial Chewing Gum Delivery of Some Herbal Extracts for Treatment of Periodontal Diseases
Authors: Reenu Yadav, Vidhi Guha, Udit N. Soni, Jay Ram Patel
Abstract:
Chewing gums are mobile novel drug delivery systems, with a potential for administering drugs either for local action or for systemic absorption via the buccal route. An antimicrobial chewing gum delivery system of the methanolic extracts of Beatea monosperma (barks and twigs), Cordia obliqua (leaves and seeds) and Cuminun cyminum (seeds) against periodontal diseases caused by some oral pathogens, was designed and characterized on various parameters.The results of the study support the traditional application of the plants and suggest, plant extracts possess compounds with antimicrobial properties that can be used as potential antimicrobial agents and gums can be a good carrier of herbal extracts. Developed formulation will cure/protect from various periodontal diseases. Further development and evaluations chewing gums including the isolated compounds on the commercial scale and their clinical and toxicological studies are the future challenges.Keywords: periodontal diseases, herbal chewing gum, herbal extracts, novel drug delivery systems
Procedia PDF Downloads 3949025 Hydraulic Analysis of Irrigation Approach Channel Using HEC-RAS Model
Authors: Muluegziabher Semagne Mekonnen
Abstract:
This study was intended to show the irrigation water requirements and evaluation of canal hydraulics steady state conditions to improve on scheme performance of the Meki-Ziway irrigation project. The methodology used was the CROPWAT 8.0 model to estimate the irrigation water requirements of five major crops irrigated in the study area. The results showed that for the whole existing and potential irrigation development area of 2000 ha and 2599 ha, crop water requirements were 3,339,200 and 4,339,090.4 m³, respectively. Hydraulic simulation models are fundamental tools for understanding the hydraulic flow characteristics of irrigation systems. Hydraulic simulation models are fundamental tools for understanding the hydraulic flow characteristics of irrigation systems. In this study Hydraulic Analysis of Irrigation Canals Using HEC-RAS Model was conducted in Meki-Ziway Irrigation Scheme. The HEC-RAS model was tested in terms of error estimation and used to determine canal capacity potential.Keywords: HEC-RAS, irrigation, hydraulic. canal reach, capacity
Procedia PDF Downloads 609024 A New Approach to Interval Matrices and Applications
Authors: Obaid Algahtani
Abstract:
An interval may be defined as a convex combination as follows: I=[a,b]={x_α=(1-α)a+αb: α∈[0,1]}. Consequently, we may adopt interval operations by applying the scalar operation point-wise to the corresponding interval points: I ∙J={x_α∙y_α ∶ αϵ[0,1],x_α ϵI ,y_α ϵJ}, With the usual restriction 0∉J if ∙ = ÷. These operations are associative: I+( J+K)=(I+J)+ K, I*( J*K)=( I*J )* K. These two properties, which are missing in the usual interval operations, will enable the extension of the usual linear system concepts to the interval setting in a seamless manner. The arithmetic introduced here avoids such vague terms as ”interval extension”, ”inclusion function”, determinants which we encounter in the engineering literature that deal with interval linear systems. On the other hand, these definitions were motivated by our attempt to arrive at a definition of interval random variables and investigate the corresponding statistical properties. We feel that they are the natural ones to handle interval systems. We will enable the extension of many results from usual state space models to interval state space models. The interval state space model we will consider here is one of the form X_((t+1) )=AX_t+ W_t, Y_t=HX_t+ V_t, t≥0, where A∈ 〖IR〗^(k×k), H ∈ 〖IR〗^(p×k) are interval matrices and 〖W 〗_t ∈ 〖IR〗^k,V_t ∈〖IR〗^p are zero – mean Gaussian white-noise interval processes. This feeling is reassured by the numerical results we obtained in a simulation examples.Keywords: interval analysis, interval matrices, state space model, Kalman Filter
Procedia PDF Downloads 4259023 Photocaged Carbohydrates: Versatile Tools for Biotechnological Applications
Authors: Claus Bier, Dennis Binder, Alexander Gruenberger, Dagmar Drobietz, Dietrich Kohlheyer, Anita Loeschcke, Karl Erich Jaeger, Thomas Drepper, Joerg Pietruszka
Abstract:
Light absorbing chromophoric systems are important optogenetic tools for biotechnical and biophysical investigations. Processes such as fluorescence or photolysis can be triggered by light-absorption of chromophores. These play a central role in life science. Photocaged compounds belong to such chromophoric systems. The photo-labile protecting groups enable them to release biologically active substances with high temporal and spatial resolution. The properties of photocaged compounds are specified by the characteristics of the caging group as well as the characteristics of the linked effector molecule. In our research, we work with different types of photo-labile protecting groups and various effector molecules giving us possible access to a large library of caged compounds. As a function of the caged effector molecule, a nearly limitless number of biological systems can be directed. Our main interest focusses on photocaging carbohydrates (e.g. arabinose) and their derivatives as effector molecules. Based on these resulting photocaged compounds a precisely controlled photoinduced gene expression will give us access to studies of numerous biotechnological and synthetic biological applications. It could be shown, that the regulation of gene expression via light is possible with photocaged carbohydrates achieving a higher-order control over this processes. With the one-step cleavable photocaged carbohydrate, a homogeneous expression was achieved in comparison to free carbohydrates.Keywords: bacterial gene expression, biotechnology, caged compounds, carbohydrates, optogenetics, photo-removable protecting group
Procedia PDF Downloads 2279022 Application the Queuing Theory in the Warehouse Optimization
Authors: Jaroslav Masek, Juraj Camaj, Eva Nedeliakova
Abstract:
The aim of optimization of store management is not only designing the situation of store management itself including its equipment, technology and operation. In optimization of store management we need to consider also synchronizing of technological, transport, store and service operations throughout the whole process of logistic chain in such a way that a natural flow of material from provider to consumer will be achieved the shortest possible way, in the shortest possible time in requested quality and quantity and with minimum costs. The paper deals with the application of the queuing theory for optimization of warehouse processes. The first part refers to common information about the problematic of warehousing and using mathematical methods for logistics chains optimization. The second part refers to preparing a model of a warehouse within queuing theory. The conclusion of the paper includes two examples of using queuing theory in praxis.Keywords: queuing theory, logistics system, mathematical methods, warehouse optimization
Procedia PDF Downloads 5939021 A Web-Based Systems Immunology Toolkit Allowing the Visualization and Comparative Analysis of Publically Available Collective Data to Decipher Immune Regulation in Early Life
Authors: Mahbuba Rahman, Sabri Boughorbel, Scott Presnell, Charlie Quinn, Darawan Rinchai, Damien Chaussabel, Nico Marr
Abstract:
Collections of large-scale datasets made available in public repositories can be used to identify and fill gaps in biomedical knowledge. But first, these data need to be made readily accessible to researchers for analysis and interpretation. Here a collection of transcriptome datasets was made available to investigate the functional programming of human hematopoietic cells in early life. Thirty two datasets were retrieved from the NCBI Gene Expression Omnibus (GEO) and loaded in a custom, interactive web application called the Gene Expression browser (GXB), designed for visualization and query of integrated large-scale data. Multiple sample groupings and gene rank lists were created based on the study design and variables in each dataset. Web links to customized graphical views can be generated by users and subsequently be used to graphically present data in manuscripts for publication. The GXB tool also enables browsing of a single gene across datasets, which can provide information on the role of a given molecule across biological systems. The dataset collection is available online. As a proof-of-principle, one of the datasets (GSE25087) was re-analyzed to identify genes that are differentially expressed by regulatory T cells in early life. Re-analysis of this dataset and a cross-study comparison using multiple other datasets in the above mentioned collection revealed that PMCH, a gene encoding a precursor of melanin-concentrating hormone (MCH), a cyclic neuropeptide, is highly expressed in a variety of other hematopoietic cell types, including neonatal erythroid cells as well as plasmacytoid dendritic cells upon viral infection. Our findings suggest an as yet unrecognized role of MCH in immune regulation, thereby highlighting the unique potential of the curated dataset collection and systems biology approach to generate new hypotheses which can be tested in future mechanistic studies.Keywords: early-life, GEO datasets, PMCH, interactive query, systems biology
Procedia PDF Downloads 2969020 Examining the Importance of the Structure Based on Grid Computing Service and Virtual Organizations
Authors: Sajjad Baghernezhad, Saeideh Baghernezhad
Abstract:
Vast changes and developments achieved in information technology field in recent decades have made the review of different issues such as organizational structures unavoidable. Applying informative technologies such as internet and also vast use of computer and related networks have led to new organizational formations with a nature completely different from the traditional, great and bureaucratic ones; some common specifications of such organizations are transfer of the affairs out of the organization, benefiting from informative and communicative networks and centered-science workers. Such communicative necessities have led to network sciences development including grid computing. First, the grid computing was only to relate some sites for short – time and use their sources simultaneously, but now it has gone beyond such idea. In this article, the grid computing technology was examined, and at the same time, virtual organization concept was discussed.Keywords: grid computing, virtual organizations, software engineering, organization
Procedia PDF Downloads 3329019 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation
Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud
Abstract:
Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing
Procedia PDF Downloads 979018 An Analysis of the Relationship between Manufacturing Growth and Economic Growth in South Africa: A Cointegration Approach
Authors: Johannes T. Tsoku, Teboho J. Mosikari, Diteboho Xaba, Thatoyaone Modise
Abstract:
This paper examines the relationship between manufacturing growth and economic growth in South Africa using quarterly data ranging from 2001 to 2014. The paper employed the Johansen cointegration to test the Kaldor’s hypothesis. The Johansen cointegration results revealed that there is a long run relationship between GDP, manufacturing, service and employment. The Granger causality results revealed that there is a unidirectional causality running from manufacturing growth to GDP growth. The overall findings of the study confirm that Kaldor’s first law of growth is applicable in South African economy. Therefore, investment strategies and policies should be alignment towards promoting growth in the manufacturing sector in order to boost the economic growth of South Africa.Keywords: cointegration, economic growth, Kaldor’s law, manufacturing growth
Procedia PDF Downloads 3889017 The Systems Theoretic Accident Model and Process (Stamp) as the New Trend to Promote Safety Culture in Construction
Authors: Natalia Ortega
Abstract:
Safety Culture (SCU) involves various perceptual, psychological, behavioral, and managerial factors. It has been shown that creating and maintaining an SCU is one way to reduce and prevent accidents and fatalities. In the construction sector, safety attitude, knowledge, and a supportive environment are predictors of safety behavior. The highest possible proportion of safety behavior among employees can be achieved by improving their safety attitude and knowledge. Accordingly, top management's commitment to safety is vital in shaping employees' safety attitude; therefore, the first step to improving employees' safety attitude is the genuine commitment of top management to safety. One of the factors affecting the successful implementation of health and safety promotion programs is the construction industry's subcontracting model. The contractual model's complexity, combined with the need for coordination among diverse stakeholders, makes it challenging to implement, manage, and follow up on health and well-being initiatives. The Systems theoretic accident model and process (STAMP) concept has expanded global consideration in recent years, increasing research attention. STAMP focuses attention on the role of constraints in safety management. The findings discover a growth of the research field from the definition in 2004 by Leveson and is being used across multiple domains. A systematic literature review of this novel model aims to meet the safety goals for human space exploration with a powerful and different approach to safety management, safety-driven design, and decision-making. Around two hundred studies have been published about applying the model. However, every single model for safety requires time to transform into research and practice, be tested and debated, and grow further and mature.Keywords: stamp, risk management, accident prevention, safety culture, systems thinking, construction industry, safety
Procedia PDF Downloads 80