Search results for: security test institutionalization
8446 The Impact of Political Satire on the Balance of Political Powers in Egypt: The Case of El-Bernameg in Egypt
Authors: Sally Barsoum
Abstract:
This paper is providing a significant insight into the role of satire in Egyptian politics and how it has been received from the government and viewer’s point of view. It mainly sets out to test whether Bassem Youssef’s satirical program has played a significant role in Egypt recent politics and to investigate what is the nature and extent of this role. In order to test this hypothesis, the researcher chose to critically analyze one episode of Bassem Youssef’s satirical show, El Bernameg. This paper goes further to highlight that the aims of satire is to invite citizens to analyze, criticize and question people in power and the realm of politics rather than remain as untouched subjects by combining humor with critique in order to enhance citizens’ political awareness and perhaps even political engagement. Moreover it identifies that Bassem Youssef’s satire is to use laughter as a medium to communicate his political message. By first informing the public and secondly engaging them through laughter, satire plays a very constructive political role, which have been argued finally that Bassem Youssef has indeed played an important part in the Egyptian political scene of today and this can be measured by the degree of censorship that he has been subject to and the level of international and domestic reaction towards his satirical show. At the end, this paper is suggesting that the measure of a strong government is its ability not only to accommodate satire but also to learn from it.Keywords: political satirist, Bassem Youssef, capital broadcasting center, TV channel, muslims brotherhood regime, ONTV Egyptian TV channel
Procedia PDF Downloads 3248445 Study on Brick Aggregate Made Pervious Concrete at Zero Fine Level
Authors: Monjurul Hasan, Golam Kibria, Abdus Salam
Abstract:
Pervious concrete is a form of lightweight porous concrete, obtained by eliminating the fine aggregate from the normal concrete mix. The advantages of this type of concrete are lower density, lower cost due to lower cement content, lower thermal conductivity, relatively low drying shrinkage, no segregation and capillary movement of water. In this paper an investigation is made on the mechanical response of the pervious concrete at zero fine level (zero fine concrete) made with local brick aggregate. Effect of aggregate size variation on the strength, void ratio and permeability of the zero fine concrete is studied. Finally, a comparison is also presented between the stone aggregate made pervious concrete and brick aggregate made pervious concrete. In total 75 concrete cylinder were tested for compressive strength, 15 cylinder were tested for void ratio and 15 cylinder were tested for permeability test. Mix proportion (cement: Coarse aggregate) was kept fixed at 1:6 (by weights), where water cement ratio was valued 0.35 for preparing the sample specimens. The brick aggregate size varied among 25mm, 19mm, 12mm. It has been found that the compressive strength decreased with the increment of aggregate size but permeability increases and concrete made with 19mm maximum aggregate size yields the optimum value. No significant differences on the strength and permeability test are observed between the brick aggregate made zero fine concrete and stone aggregate made zero fine concrete.Keywords: pervious concrete, brick aggregate concrete, zero fine concrete, permeability, porosity
Procedia PDF Downloads 5588444 Improving Vietnamese High School Students’ Writing Ability Through the Use of Electronic Portfolios
Authors: Du T. Tran, Anh M. N. Nguyen
Abstract:
Writing skill is one of the productive abilities and plays a vital role in encouraging communication. Although certain hurdles limit students from enhancing their writing skills, the introduction and widespread use of internet technology impact their education significantly. In this context, the research aims to investigate the effects of electronic portfolios (e-portfolios) on English as a foreign language (EFL) high school students’ writing ability, learners’ and instructors’ attitudes towards the use of e-portfolios in writing classes at high schools in Binh Duong province. The sample includes 15 teachers and 300 twelfth graders at 03 high schools in Binh Duong province. Facebook was chosen as an e-portfolio platform where the students created and developed their personal e-portfolios. The data were collected both quantitatively and qualitatively through mixed methods using the tools of a pre-test, a post-test (for students), questionnaires (for both teachers and students), and a semi-structured interview (for teachers in charge of the course). The survey results show that e-portfolios considerably impact EFL high school students writing abilities. The research findings also reveal challenges and technological drawbacks. For the optimal use of e-portfolios in writing courses in particular and for other language courses in general, recommendations are made for school managers, instructors, and learners to optimize the effects and for further research to shed more light on the topicKeywords: attitudes, electronic portfolios, English writing ability, Vietnamese high school students
Procedia PDF Downloads 798443 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country
Authors: Meszár Tárik
Abstract:
The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.Keywords: Middle East, Iraq, Islamic State, minorities
Procedia PDF Downloads 908442 Comparison of Early Post-operative Outcomes of Cardiac Surgery Patients Who Have Had Blood Transfusion Based on Fixed Cut-off Point versus of Change in Percentage of Basic Hematocrit Levels
Authors: Khosro Barkhordari, Fateme Sadr, Mina Pashang
Abstract:
Back ground: Blood transfusion is one of the major issues in cardiac surgery patients. Transfusing patients based on fixed cut-off points of hemoglobin is the current protocol in most institutions. The hemoglobin level of 7- 10 has been suggested for blood transfusion in cardiac surgery patients. We aimed to evaluate if blood transfusion based on change in percentage of hematocrit has different outcomes. Methods: In this retrospective cohort study, we investigated the early postoperative outcome of cardiac surgery patients who received blood transfusions at Tehran Heart Center Hospital, IRAN. We reviewed and analyzed the basic characteristics and clinical data of 700 patients who met our exclusion and inclusion criteria. The two groups of blood transfused patients were compared, those who have 30-50 percent decrease in basal hematocrit versus those with 10 -29 percent decrease. Results: This is ongoing study, and the results would be completed in two weeks after analysis of the date. Conclusion: Early analysis has shown no difference in early post-operative outcomes between the two groups, but final analysis will be completed in two weeks. 1-Department of Anesthesiology and Critical Care, Tehran Heart Center, Tehran University of Medical Sciences, Tehran, IRAN 2- Department of Research, Tehran Heart Center, Tehran, IRAN Quantitative variables were compared using the Student t-test or the Mann‐Whitney U test, as appropriate, while categorical variables were compared using the χ2 or the Fisher exact test, as required. Our intention was to compare the early postoperative outcomes between the two groups, which include 30 days mortality, Length of ICU stay, Length of hospital stay, Intubation time, Infection rate, acute kidney injury, and respiratory complications. The main goal was to find if transfusing blood based on changes in hematocrit from a basal level was better than to fixed cut-off point regarding early post-operative outcomes. This has not been studied enough and may need randomized control trials.Keywords: post-operative, cardiac surgery, outcomes, blood transfusion
Procedia PDF Downloads 868441 Challenges in Multi-Cloud Storage Systems for Mobile Devices
Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta
Abstract:
The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices
Procedia PDF Downloads 7008440 Experimental Assessment of a Grid-Forming Inverter in Microgrid Islanding Operation Mode
Authors: Dalia Salem, Detlef Schulz
Abstract:
As Germany pursues its ambitious plan towards a power system based on renewable energy sources, the necessity to establish steady, robust microgrids becomes more evident. Inside the microgrid, there is at least one grid-forming inverter responsible for generating the coupling voltage and stabilizing the system frequency within the standardized accepted limits when the microgrid is forced to operate as a stand-alone power system. Grid-forming control for distributed inverters is required to enable steady control of a low-inertia power system. In this paper, a designed droop control technique is tested at the controller of an inverter as a component of a hardware test bed to understand the microgrid behavior in two modes of operation: i) grid-connected and ii) operating in islanding mode. This droop technique includes many current and voltage inner control loops, where the Q-V and P-f droop provide the required terminal output voltage and frequency. The technique is tested first in a simulation model of the inverter in MATLAB/SIMULINK, and the results are compared to the results of the hardware laboratory test. The results of this experiment illuminate the pivotal role of the grid-forming inverter in facilitating microgrid resilience during grid disconnection events and how microgrids could provide the functionality formerly provided by synchronous machinery, such as the black start process.Keywords: microgrid, grid-forming inverters, droop-control, islanding-operation
Procedia PDF Downloads 718439 Cuckoo Search Optimization for Black Scholes Option Pricing
Authors: Manas Shah
Abstract:
Black Scholes option pricing model is one of the most important concepts in modern world of computational finance. However, its practical use can be challenging as one of the input parameters must be estimated; implied volatility of the underlying security. The more precisely these values are estimated, the more accurate their corresponding estimates of theoretical option prices would be. Here, we present a novel model based on Cuckoo Search Optimization (CS) which finds more precise estimates of implied volatility than Particle Swarm Optimization (PSO) and Genetic Algorithm (GA).Keywords: black scholes model, cuckoo search optimization, particle swarm optimization, genetic algorithm
Procedia PDF Downloads 4538438 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems
Authors: Nadjah Chergui, Narhimene Boustia
Abstract:
Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.Keywords: context, default, exception, vulnerability
Procedia PDF Downloads 2598437 Leveraging xAPI in a Corporate e-Learning Environment to Facilitate the Tracking, Modelling, and Predictive Analysis of Learner Behaviour
Authors: Libor Zachoval, Daire O Broin, Oisin Cawley
Abstract:
E-learning platforms, such as Blackboard have two major shortcomings: limited data capture as a result of the limitations of SCORM (Shareable Content Object Reference Model), and lack of incorporation of Artificial Intelligence (AI) and machine learning algorithms which could lead to better course adaptations. With the recent development of Experience Application Programming Interface (xAPI), a large amount of additional types of data can be captured and that opens a window of possibilities from which online education can benefit. In a corporate setting, where companies invest billions on the learning and development of their employees, some learner behaviours can be troublesome for they can hinder the knowledge development of a learner. Behaviours that hinder the knowledge development also raise ambiguity about learner’s knowledge mastery, specifically those related to gaming the system. Furthermore, a company receives little benefit from their investment if employees are passing courses without possessing the required knowledge and potential compliance risks may arise. Using xAPI and rules derived from a state-of-the-art review, we identified three learner behaviours, primarily related to guessing, in a corporate compliance course. The identified behaviours are: trying each option for a question, specifically for multiple-choice questions; selecting a single option for all the questions on the test; and continuously repeating tests upon failing as opposed to going over the learning material. These behaviours were detected on learners who repeated the test at least 4 times before passing the course. These findings suggest that gauging the mastery of a learner from multiple-choice questions test scores alone is a naive approach. Thus, next steps will consider the incorporation of additional data points, knowledge estimation models to model knowledge mastery of a learner more accurately, and analysis of the data for correlations between knowledge development and identified learner behaviours. Additional work could explore how learner behaviours could be utilised to make changes to a course. For example, course content may require modifications (certain sections of learning material may be shown to not be helpful to many learners to master the learning outcomes aimed at) or course design (such as the type and duration of feedback).Keywords: artificial intelligence, corporate e-learning environment, knowledge maintenance, xAPI
Procedia PDF Downloads 1228436 Antioxidant and Antimicrobial Activities of Phenolic Extracts of Endemic Plants Marrubium deserti and Ammodaucus leucotrichus from Algeria
Authors: Sifi Ibrahim, Benaddou Fatima Zohra, Yousfi Mohamed
Abstract:
The Marrubium deserti and Ammodaucus leucotrichus L. an Algerian endemic species, has several applications in traditional medicine for example as a remedy for asthma and diabetes, and was found to have antibacterial properties. In this work, an antioxidant and antimicrobial activities was performed on phenolic extracts of Marrubium deserti, Ammodaucus leucotrichus plants. The yield of methanol maceration of these plants is 12.4% and 20.4% respectively. The content of total polyphenols, flavonoids and anthocyanin in methanolic extracts, are varied between 19.52±1.88 and 59.24±3.45 mg/g gallic acid equivalent, and 2.08±0.29 to 1.46±0.39 mg/g quercetin equivalent, and 0.395 to 1.934µmol/g respectively. The total chlorophylls and carotenoids were be ranged from 0.149±0.20 to 1.537±0.20 g/ml and 1.537±0.20 to 0.149 ± 0.20 g/ml, respectively. According to DPPH and FRAP test, the values of EC50 was shows a higher activity of Marrubium deserti than Ammodaucus leucotrichus with EC50 values (DPPH) were 34.53±0.71 μg/mL and 258.60±15.67 mg/ml respectively. The TEAC values of FRAP test was a highly superior for Marrubium deserti 209.66±0.26 mg Equivalent Trolox/g dry residue than Ammodaucus leucotrichus 45.88±2.93 mg Trolox Equivalent/g dry residue. The antimicrobial activity against nine strains of bacteria (Staphylococcus aureus(+), Staphylococcus aureus (-), Bacillus cereus, Enterococcus faecalis, Escherichia coli, Pseudomonas aeruginosa, Klebsiella pneumoniae and Salmonella typhi), was showed that the tested extracts are a significant antibacterial activity with inhibition zones ranging from 10 to 50 mm. the value of CMI were ranging from 0.89 to 14.29 mg/ml.Keywords: phenolic extract, antioxidant activity, antimicrobial activity, Marrubium deserti, Ammodaucus leucotrichus
Procedia PDF Downloads 3968435 An E-Retailing System Architecture Based on Cloud Computing
Authors: Chanchai Supaartagorn
Abstract:
E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.Keywords: architecture, cloud computing, e-retailing, internet-based
Procedia PDF Downloads 3978434 Effect of Group Prenatal Care on Adolescent Pregnancy Outcomes: A Randomized Controlled Trial
Authors: Parvin Abedi, Fatemeh Malchi, Mina Iravani, Elham Maraghi, Eesa Mohammadi, Najmieh Saadati
Abstract:
Background: Adolescent pregnancy has major health and social consequences and can lead to adverse maternal and neonatal outcomes. Objectives: The objective of this study was to evaluate the impact of group prenatal care (GPNC) of adolescents on their maternal and neonatal outcomes. Methods: In this study, 294 adolescent pregnant women (aged 15-19) were randomly assigned into two groups of prenatal care (n=147) and individual prenatal care (IPNC) (n=147). Participants in the intervention group received GPNC at 16-20 weeks of gestational age, while the control group received (IPNC). The data were analyzed using the Chi-square test, independent t-test, and linear and logistic tests. Results: As far as weight gain was concerned, 91.7% and 62.1% of the participants in the GPNC and IPNC groups had an appropriate weight gain during pregnancy, respectively OR 6.72 (95% CI 3.40, 13.26). In the GPNC group, 79.2% of participants had exclusive breastfeeding in the first 6 weeks after childbirth and while this rate was 49.7% in the IPNC group, OR 3.92 (95% CI 2.36, 6.64). Preterm birth was observed in 3.4% of the participants in the GPNC group as opposed to 9.5% in the IPNC group OR 6.17 (95% CI 0.73, 51.93). Conclusion: Adolescent women in GPNC have more appropriate weight gain and a higher rate of exclusive breastfeeding compared to adolescent women in IPNC. Group prenatal care could be considered a viable method of care for adolescent pregnant women.Keywords: group prenatal car, adolescents pregnant women, pregnancy outcomes, neonatal outcomes
Procedia PDF Downloads 228433 Corporate Governance, Performance, and Financial Reporting Quality of Listed Manufacturing Firms in Nigeria
Authors: Jamila Garba Audu, Shehu Usman Hassan
Abstract:
The widespread failure in the financial information quality has created the need to improve the financial information quality and to strengthen the control of managers by setting up good firms structures. Published accounting information in financial statements is required to provide various users - shareholders, employees, suppliers, creditors, financial analysts, stockbrokers and government agencies – with timely and reliable information useful for making prudent, effective and efficient decisions. The relationship between corporate governance and performance to financial reporting quality is imperative; this is because despite rapid researches in this area the findings obtained from these studies are constantly inconclusive. Data for the study were extracted from the firms’ annual reports and accounts. After running the OLS regression, a robustness test was conducted for the validity of statistical inferences; the data was empirically tested. A multiple regression was employed to test the model as a technique for data analysis. The results from the analysis revealed a negative association between all the regressors and financial reporting quality except the performance of listed manufacturing firms in Nigeria. This indicates that corporate governance plays a significant role in mitigating earnings management and improving financial reporting quality while performance does not. The study recommended among others that the composition of audit committee should be made in accordance with the provision for code of corporate governance which is not more than six (6) members with at least one (1) financial expert.Keywords: corporate governance, financial reporting quality, manufacturing firms, Nigeria, performance
Procedia PDF Downloads 2488432 Web-Based Alcohol Prevention among Iranian Medical University Students: A Randomized Control Trail
Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh
Abstract:
Background: E-interventions as a universal approach to prevent a high-risk behavior, such as alcohol drinking. This study was conducted to evaluate web-based alcohol drinking preventative intervention efficiency among medical university students in Iran. Methods: Overall, 150 freshman and sophomore male student’s college students participated in this study as intervention and control group. This was a longitudinal randomized pre- and post-test series control group design panel study to implement a behavior modification based intervention to alcohol drinking prevention among college students. Cross-tabulation, t-test, repeated measures, and GEE by using SPSS statistical package, version 21 was used for the statistical analysis. The participants were followed up for 6 months with data collection scheduled at baseline, 3 and 6 months. The primary outcomes are attitude, self-control, and sensation seeking. Furthermore, the secondary outcome is comparing alcohol drinking among the study groups. Results: It was found significant reduce in average response for an attitude towards alcohol drinking and sensation seeking among intervention group (P < 0.05). But after intervention not significant difference between intervention and control group of improve self-control and reduce alcohol drinking (P > 0.05). Conclusion: Our intervention has been accompanied with reducing alcohol use rate. These findings indicate that e-intervention may be effectiveness approach to address the alcohol prevention among college students.Keywords: e-interventions, alcohol drinking, students, Iran
Procedia PDF Downloads 4148431 Fighting for Human Rights: DNA, Hansen's Disease and Separated Children in Brazil
Authors: Glaucia Maricato
Abstract:
Our research deals with specific use of DNA tests in Brazil – aimed at financial reparation for the institutionalized and otherwise scattered offspring of leprosy patients who, from the 1920s up through the 1980s, were subjected to compulsory internment in the 'hospital-colonies', specialized in the containment of Hansen’s disease. Through a social movement, the ex-patients themselves gained the right, in 2007, to financial compensations. At the moment, the movement is seeking reparation for the (now adult) children of these people as well. Many of these children grew up in orphanages, in adopted families, or do not have official documents to prove their family belonging. In 2011, a team of Brazilian geneticists had volunteered their services, applying DNA tests in order to ascertain the connection of certain individuals to an ex-internee of the leprosarium. We have accompanied the activities in four different ex-colonies in order to understand how the DNA test was being signified by those being tested, and how the test fit into already existent notions of family. Inspired in the writings of scholars such as Sheila Jasanoff and Helena Machado, we examine the possibility of a 'geneticization of family ties' when people are obliged to back their claim for human rights by producing legal proof based on blood tests. However, in like fashion to other ethnographic studies on this theme, we encountered among tested adults a number of creative strategies that allow for the co-existence of the idea of 'scientifically-based' blood ties alongside other more traditional ways of signifying kinship.Keywords: human rights, social movements, DNA tests, Hansen's disease
Procedia PDF Downloads 1388430 Assessment of Pre-Processing Influence on Near-Infrared Spectra for Predicting the Mechanical Properties of Wood
Authors: Aasheesh Raturi, Vimal Kothiyal, P. D. Semalty
Abstract:
We studied mechanical properties of Eucalyptus tereticornis using FT-NIR spectroscopy. Firstly, spectra were pre-processed to eliminate useless information. Then, prediction model was constructed by partial least squares regression. To study the influence of pre-processing on prediction of mechanical properties for NIR analysis of wood samples, we applied various pretreatment methods like straight line subtraction, constant offset elimination, vector-normalization, min-max normalization, multiple scattering. Correction, first derivative, second derivatives and their combination with other treatment such as First derivative + straight line subtraction, First derivative+ vector normalization and First derivative+ multiplicative scattering correction. The data processing methods in combination of preprocessing with different NIR regions, RMSECV, RMSEP and optimum factors/rank were obtained by optimization process of model development. More than 350 combinations were obtained during optimization process. More than one pre-processing method gave good calibration/cross-validation and prediction/test models, but only the best calibration/cross-validation and prediction/test models are reported here. The results show that one can safely use NIR region between 4000 to 7500 cm-1 with straight line subtraction, constant offset elimination, first derivative and second derivative preprocessing method which were found to be most appropriate for models development.Keywords: FT-NIR, mechanical properties, pre-processing, PLS
Procedia PDF Downloads 3628429 Energy Storage Modelling for Power System Reliability and Environmental Compliance
Authors: Rajesh Karki, Safal Bhattarai, Saket Adhikari
Abstract:
Reliable and economic operation of power systems are becoming extremely challenging with large scale integration of renewable energy sources due to the intermittency and uncertainty associated with renewable power generation. It is, therefore, important to make a quantitative risk assessment and explore the potential resources to mitigate such risks. Probabilistic models for different energy storage systems (ESS), such as the flywheel energy storage system (FESS) and the compressed air energy storage (CAES) incorporating specific charge/discharge performance and failure characteristics suitable for probabilistic risk assessment in power system operation and planning are presented in this paper. The proposed methodology used in FESS modelling offers flexibility to accommodate different configurations of plant topology. It is perceived that CAES has a high potential for grid-scale application, and a hybrid approach is proposed, which embeds a Monte-Carlo simulation (MCS) method in an analytical technique to develop a suitable reliability model of the CAES. The proposed ESS models are applied to a test system to investigate the economic and reliability benefits of the energy storage technologies in system operation and planning, as well as to assess their contributions in facilitating wind integration during different operating scenarios. A comparative study considering various storage system topologies are also presented. The impacts of failure rates of the critical components of ESS on the expected state of charge (SOC) and the performance of the different types of ESS during operation are illustrated with selected studies on the test system. The paper also applies the proposed models on the test system to investigate the economic and reliability benefits of the different ESS technologies and to evaluate their contributions in facilitating wind integration during different operating scenarios and system configurations. The conclusions drawn from the study results provide valuable information to help policymakers, system planners, and operators in arriving at effective and efficient policies, investment decisions, and operating strategies for planning and operation of power systems with large penetrations of renewable energy sources.Keywords: flywheel energy storage, compressed air energy storage, power system reliability, renewable energy, system planning, system operation
Procedia PDF Downloads 1338428 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Authors: Anthony Overmars, Sitalakshmi Venkatraman
Abstract:
This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography
Procedia PDF Downloads 2418427 Phone Number Spoofing Attack in VoLTE
Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 5248426 Efficacy of Self-Assessment Metacognitive Strategy on Academic Performance Among Upper Basic Students in Ankpa, Kogi State, Nigeria
Authors: Daodu Joshua Rotimi
Abstract:
This study investigated the Efficacy of Self-Assessment Metacognitive Strategy on Academic performance in Energy Concepts among Upper Basic Science Students in Ankpa, Kogi State, Nigeria. The research design adopted for the study was a Quasi-experimental control group design which employed a pretest, posttest of the experimental and control groups. The population of the study consisted of one hundred and twenty-four (124) JSSII Students; sixty-five (65) for the experimental group and (59) for the control group. The instrument used for the study was the Energy Concept Performance Test (ECPT), with a reliability coefficient of 0.80. Two research questions were answered using descriptive statistics of mean and standard deviation, while two hypotheses were tested using a t-test at P≤0.05 level of significance. The findings of the study revealed that the use of the Self-Assessment Metacognitive Strategy has a positive effect on students’ performance in energy concepts among upper Basic Science Students leading to high academic performance; also, there is no significant difference in the mean Academic Performance scores between Male and Female students taught Energy Concept using Self-Assessment Metacognitive Strategy. Based on the research findings, recommendations were made, which include that Secondary school teachers should be encouraged the use Self-Assessment Metacognitive strategy so as to make the learning process attractive, interactive and enriching to the learners.Keywords: metacognition, self-assessment, performance, efficacy
Procedia PDF Downloads 1268425 Assessment of Politeness Behavior on Communicating: Validation of Scale through Exploratory Factor Analysis and Confirmatory Factor Analysis
Authors: Abdullah Pandang, Mantasiah Rivai, Nur Fadhilah Umar, Azam Arifyadi
Abstract:
This study aims to measure the validity of the politeness behaviour scale and obtain a model that fits the scale. The researcher developed the Politeness Behavior on Communicating (PBC) scale. The research method uses descriptive quantitative by developing the PBC scale. The population in this study were students in three provinces, namely South Sulawesi, West Sulawesi, and Central Sulawesi, recorded in the 2022/2023 academic year. The sampling technique used stratified random sampling by determining the number of samples using the Slovin formula. The sample of this research is 1200 students. This research instrument uses the PBC scale, which consists of 5 (five) indicators: self-regulation of compensation behaviour, self-efficacy of compensation behaviour, fulfilment of social expectations, positive feedback, and no strings attached. The PBC scale consists of 34 statement items. The data analysis technique is divided into two types: the validity test on the correlated item values and the item reliability test referring to Cronbach's and McDonald's alpha standards using the JASP application. Furthermore, the data were analyzed using confirmatory factor analysis (CFA) and exploratory factor analysis (EFA). The results showed that the adaptation of the Politeness Behavior on Communicating (PBC) scale was on the Fit Index with a chi-square value (711,800/375), RMSEA (0.53), GFI (0.990), CFI (0.987), GFI (0.985).Keywords: polite behavior in communicating, positive communication, exploration factor analysis, confirmatory factor analysis
Procedia PDF Downloads 1258424 Economic Characteristics of Bitcoin: "An Analytical Study"
Authors: Abdelhalem Shahen
Abstract:
The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin
Procedia PDF Downloads 1388423 Evaluation of Random Forest and Support Vector Machine Classification Performance for the Prediction of Early Multiple Sclerosis from Resting State FMRI Connectivity Data
Authors: V. Saccà, A. Sarica, F. Novellino, S. Barone, T. Tallarico, E. Filippelli, A. Granata, P. Valentino, A. Quattrone
Abstract:
The work aim was to evaluate how well Random Forest (RF) and Support Vector Machine (SVM) algorithms could support the early diagnosis of Multiple Sclerosis (MS) from resting-state functional connectivity data. In particular, we wanted to explore the ability in distinguishing between controls and patients of mean signals extracted from ICA components corresponding to 15 well-known networks. Eighteen patients with early-MS (mean-age 37.42±8.11, 9 females) were recruited according to McDonald and Polman, and matched for demographic variables with 19 healthy controls (mean-age 37.55±14.76, 10 females). MRI was acquired by a 3T scanner with 8-channel head coil: (a)whole-brain T1-weighted; (b)conventional T2-weighted; (c)resting-state functional MRI (rsFMRI), 200 volumes. Estimated total lesion load (ml) and number of lesions were calculated using LST-toolbox from the corrected T1 and FLAIR. All rsFMRIs were pre-processed using tools from the FMRIB's Software Library as follows: (1) discarding of the first 5 volumes to remove T1 equilibrium effects, (2) skull-stripping of images, (3) motion and slice-time correction, (4) denoising with high-pass temporal filter (128s), (5) spatial smoothing with a Gaussian kernel of FWHM 8mm. No statistical significant differences (t-test, p < 0.05) were found between the two groups in the mean Euclidian distance and the mean Euler angle. WM and CSF signal together with 6 motion parameters were regressed out from the time series. We applied an independent component analysis (ICA) with the GIFT-toolbox using the Infomax approach with number of components=21. Fifteen mean components were visually identified by two experts. The resulting z-score maps were thresholded and binarized to extract the mean signal of the 15 networks for each subject. Statistical and machine learning analysis were then conducted on this dataset composed of 37 rows (subjects) and 15 features (mean signal in the network) with R language. The dataset was randomly splitted into training (75%) and test sets and two different classifiers were trained: RF and RBF-SVM. We used the intrinsic feature selection of RF, based on the Gini index, and recursive feature elimination (rfe) for the SVM, to obtain a rank of the most predictive variables. Thus, we built two new classifiers only on the most important features and we evaluated the accuracies (with and without feature selection) on test-set. The classifiers, trained on all the features, showed very poor accuracies on training (RF:58.62%, SVM:65.52%) and test sets (RF:62.5%, SVM:50%). Interestingly, when feature selection by RF and rfe-SVM were performed, the most important variable was the sensori-motor network I in both cases. Indeed, with only this network, RF and SVM classifiers reached an accuracy of 87.5% on test-set. More interestingly, the only misclassified patient resulted to have the lowest value of lesion volume. We showed that, with two different classification algorithms and feature selection approaches, the best discriminant network between controls and early MS, was the sensori-motor I. Similar importance values were obtained for the sensori-motor II, cerebellum and working memory networks. These findings, in according to the early manifestation of motor/sensorial deficits in MS, could represent an encouraging step toward the translation to the clinical diagnosis and prognosis.Keywords: feature selection, machine learning, multiple sclerosis, random forest, support vector machine
Procedia PDF Downloads 2418422 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 828421 Co-Articulation between Consonant and Vowel in Cantonese Syllables
Authors: Wai-Sum Lee
Abstract:
This study investigates C-V and V-C co-articulation in Cantonese monosyllables of the CV, VC or CVC structure, with C = one of the three stop consonants [p, t, k] and V = one of the three corner vowels [i, a, u]. Five repetitions of each test syllable on a randomized list were elicited from Cantonese young adult speakers in their early-20s. A research tool, EMA AG500, was used to record the synchronized audio signals and articulatory data at three different locations of the tongue – tongue tip, tongue middle, and tongue back – and the positions of the upper and lower lips during the test syllables. The main findings based on the articulatory data collected from two male Cantonese speakers are as follows: (i) For the syllable-initial [p-], strong co-articulation is observed when [p-] preceding the high vowel [i] or [u], but not the low vowel [a]. As for the syllable-final [-p], it is strongly co-articulated with the preceding vowel, even when the vowel is [a]. (ii) The co-articulation between the initial [t-] and the following vowel of any type is weak. In the syllable-final position, the degree of co-articulatory resistance of [-t] is also large when following the vowel [u], but [-t] is largely co-articulated with the preceding vowel when the vowel is [i] or [a]. (iii) The strength of co-articulation differs when the initial [k-] precedes the different types of vowel. A stronger co-articulation between [k-] and [i] than between [k-] and [u], and the strength of co-articulation is much reduced between [k-] and [a]. However, in the syllable-final position, there is strong co-articulation between [-k] and the preceding vowel [a]. (iv) Among the three types of stop consonants in the syllable-initial position, the decreasing degree of co-articulatory resistance (CR) is [t-] > [k-] > [p-], and the degree of CR is reduced during all three types of stop in the syllable-final position. In general, the data on co-articulation between consonant and vowel in the Cantonese monosyllables are similar to those in other languages reported in previous studies.Keywords: Cantonese, co-articulation, consonant, vowel
Procedia PDF Downloads 2478420 The Clash of the Clans in the British Divorce
Authors: Samuel Gary Beckton
Abstract:
Ever since the Scottish Independence Referendum in 2014, there has been a threat of a second referendum. However, if there was another referendum and the majority favoured independence, it is highly likely to be by a small majority. In this paper, it will look into the hypothetical situation of what could have happened if Scotland had voted in favour of independence in 2014. If this occurred, there would be many Unionists within Scotland, including devoted supporters of the Better Together campaign. There was a possibility of some Scottish Unionists not willing to accept the result of the Referendum unchallenged and use their right of self-determination through the UN Charter for their region to remain within the United Kingdom. The Shetland and Orkney Islands contemplated of opting out of an independent Scotland in 2013. This caught the attention of some politicians and the media, via confirming the possibility of some form of partition in Scotland and could have gained extra attention if partition quickly became a matter of ‘need’ instead of ‘want’. Whilst some Unionists may have used petitions and formed pressure groups to voice their claims, others may have used more hard-line tactics to achieve their political objectives, including possible protest marches and acts of civil unrest. This could have possibly spread sectarian violence between Scottish Unionists and Nationalists. Glasgow has a serious issue of this kind of sectarianism, which has escalated in recent years. This is due to the number communities that have been established from Irish Immigrants, which maintain links with Northern Irish loyalists and republicans. Some Scottish Unionists not only have sympathy towards Northern Irish loyalists but actively participate with the paramilitary groups and gave support. Scottish loyalists could use these contacts to create their own paramilitary group(s), with aid from remaining UK (RUK) benefactors. Therefore, this could have resulted in the RUK facing a serious security dilemma, with political and ethical consequences to consider. The RUK would have the moral obligation to protect Scottish Unionists from persecution and recognise their right of self-determination, whilst ensuring the security and well-being of British citizens within and outside of Scotland. This work takes into consideration the lessons learned from the ‘Troubles’ in Northern Ireland. As an era of ‘Troubles’ could occur in Scotland, extending into England and Northern Ireland. This is due to proximity, the high number of political, communal and family links in Scotland to the RUK, and the delicate peace process within Northern Ireland which shares a similar issue. This paper will use British and Scottish Government documents prior to the Scottish referendum to argue why partition might happen and use cartography of maps of a potential partition plan for Scotland. Reports from the UK National Statistics, National Rail, and Ministry of Defence shall also be utilised, and use of journal articles that were covering the referendum.Keywords: identity, nationalism, Scotland, unionism
Procedia PDF Downloads 1678419 Physical Properties of Crushed Aggregates in Some Selected Quarries in Kwara State, Nigeria
Authors: S. A. Agbalajobi, W. A. Bello
Abstract:
This study examines rock properties of crushed aggregate in some selected quarries in Kwara state, Nigeria. Some physical properties (chemical composition, mineral composition, particle size distribution) of gneiss sample were determined using ISRM standards. The physicomechanical properties (specific gravity, dry density, porosity, water absorption, point load index, tensile, and compressive strength) of the gneiss rock were evaluated. The analysis on the gneiss samples revealed the mean dry density and the unit weight are 2.52 g/m3, 2.63 g/m3, 2.38 g/m3; and 24.1 kN/m3, 25.78 kN/m3, 23.33 kN/m3, respectively (for locations A,B,C). The water absorption level of the gneiss rock sample ranged from 0.38 % – 0.57 % for the three locations. The mean Schmidt hammer rebound value ranged from 51.0 – 52.4 for the three locations and mean point load index values ranged from 9.89 – 10.56 MPa classified as very high strength while the uniaxial compressive strength of the rock samples revealed that its strength ranged from 120 - 139 MPa (for location A, B, and C) classified as strong rock. The aggregate impact value test and aggregate crushing value test conducted on the gneiss aggregates from the three locations in accordance with British Standard. The gneiss sample from the three locations (A, B, and C) is a good material for the production of construction works such as concrete, bricks, pavement, embankment among others, the compressive strength of the material is within the accepted limit.Keywords: gneiss, aggregate impact, aggregate crushing, physic-mechanical properties, rock hardness
Procedia PDF Downloads 3108418 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability
Authors: Mouad Zouina, Benaceur Outtaj
Abstract:
The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability
Procedia PDF Downloads 3948417 Mathematical Modeling of the Working Principle of Gravity Gradient Instrument
Authors: Danni Cong, Meiping Wu, Hua Mu, Xiaofeng He, Junxiang Lian, Juliang Cao, Shaokun Cai, Hao Qin
Abstract:
Gravity field is of great significance in geoscience, national economy and national security, and gravitational gradient measurement has been extensively studied due to its higher accuracy than gravity measurement. Gravity gradient sensor, being one of core devices of the gravity gradient instrument, plays a key role in measuring accuracy. Therefore, this paper starts from analyzing the working principle of the gravity gradient sensor by Newton’s law, and then considers the relative motion between inertial and non-inertial systems to build a relatively adequate mathematical model, laying a foundation for the measurement error calibration, measurement accuracy improvement.Keywords: gravity gradient, gravity gradient sensor, accelerometer, single-axis rotation modulation
Procedia PDF Downloads 328