Search results for: Arvo Pärt
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6860

Search results for: Arvo Pärt

3350 Study of Mechanical Properties of Leno Woven Bags in Lower Weight Capacities

Authors: Golda Honey Madhu, Priyanka Gupta, Anil Kumar Yadav

Abstract:

The study is aimed at analyzing and understanding the design and performance properties of leno woven sacks specifically meant for holding lower weight goods under the category of lower weight capacities. The sacks are a huge part of the agro-based packaging industries which helps in keeping the perishable produce, especially fruits, fresh during transit and storage. Nowadays, Leno bags are primarily made from polypropylene, mainly due its cost-effectiveness, reusability and high strength with low weight property making it an ideal packaging solution for transportation. The design parameters are noted, and major properties like tensile strength, abrasion resistance, bursting strength, impact resistance, stiffness and bagging behaviour has been analyzed for lower weight capacities. An examination of these particular weight categories will provide valuable information on how to scale performance. Currently there are standards available for only 25 kg and 50 kg Leno sacks, and this study will further enhance the already existing testing standards and also provide tested structure-property analysis for lower weight Leno sacks. Hence the results of this research can provide significant insights for researchers, manufacturers and industry-experts with the goal of improving the quality and longevity of Leno woven sacks, thereby developing the packaging technology.

Keywords: leno bags, structure-property analysis, agro-based packaging, lower weight sacks

Procedia PDF Downloads 28
3349 Human Trafficking In North East India

Authors: Neimenuo Kengurusie

Abstract:

Human trafficking is considered a form of slavery in modern day era and a gross violation of human rights and one of the most organized crimes of the day transcending cultures, geography and time. Human trafficking is a highly complex phenomenon involving many actors like victims, survivors, their families, communities and third parties that recruit, transport and exploit the trafficked victims. It takes different forms such as child trafficking, trafficking for labour, trafficking for sexual exploitation, trafficking for organ transplantation etc. and affects virtually every corner of the world. This research draws on a variety of sources, including books, articles, journals, newspaper reports, human rights reports, online materials and interviews. In India, particularly the North East region, the issue of human trafficking has become a concern regionally, nationally and internationally. The focus of this paper is on the North Eastern part of India as it is a socially and economically backward region of the country which makes women and children susceptible to trafficking. Women and children from these regions are trafficked within and outside the state. Therefore, the paper seeks to explore the issue of human trafficking, especially trafficking of women and children in North East India, which receives insufficient attention in literature. The paper seeks to analyze and understand the trend and patterns of trafficking and the mechanisms that reinforces the process and perpetuates the phenomenon of trafficking considering the nature and scope of the problem. The paper also analyzes the anti-trafficking laws initiated by India and the North East states in particular for combating human trafficking in North East India.

Keywords: children, human trafficking, North East India, women

Procedia PDF Downloads 491
3348 Stability Analysis of Rock Tunnel Subjected to Internal Blast Loading

Authors: Mohammad Zaid, Md. Rehan Sadique

Abstract:

Underground structures are an integral part of urban infrastructures. Tunnels are being used for the transportation of humans and goods from distance to distance. Terrorist attacks on underground structures such as tunnels have resulted in the improvement of design methodologies of tunnels. The design of underground tunnels must include anti-terror design parameters. The study has been carried out to analyse the rock tunnel when subjected to internal blast loading. The finite element analysis has been carried out for 30m by 30m of the cross-section of the tunnel and 35m length of extrusion of the rock tunnel model. The effect of tunnel diameter and overburden depth of tunnel has been studied under internal blast loading. Four different diameters of tunnel considered are 5m, 6m, 7m, and 8m, and four different overburden depth of tunnel considered are 5m, 7.5m, 10m, and 12.5m. The mohr-coulomb constitutive material model has been considered for the Quartzite rock. A concrete damage plasticity model has been adopted for concrete tunnel lining. For the trinitrotoluene (TNT) Jones-Wilkens-Lee (JWL) material model has been considered. Coupled-Eulerian-Lagrangian (CEL) approach for blast analysis has been considered in the present study. The present study concludes that a shallow tunnel having smaller diameter needs more attention in comparison to blast resistant design of deep tunnel having a larger diameter. Further, in the case of shallow tunnels, more bulging has been observed, and a more substantial zone of rock has been affected by internal blast loading.

Keywords: finite element method, blast, rock, tunnel, CEL, JWL

Procedia PDF Downloads 152
3347 Problems in English into Thai Translation Normally Found in Thai University Students

Authors: Anochao Phetcharat

Abstract:

This research aims to study problems of translation basic knowledge, particularly from English into Thai. The researcher used 38 2nd-year non-English speaking students of Suratthani Rajabhat University as samples. The samples were required to translate an A4-sized article from English into Thai assigned as a part of BEN0202 Translation for Business, a requirement subject for Business English Department, which was also taught by the researcher. After completion of the translation, numerous problems were found and the research grouped them into 4 major types. The normally occurred problems in English-Thai translation works are the lack of knowledge in terms of parts of speech, word-by-word translation employment, misspellings as well as the poor knowledge in English language structure. However, this research is currently under the process of data analysis and shall be completed by the beginning of August. The researcher, nevertheless, predicts that all the above-mentioned problems, will support the researcher’s hypothesizes, that are; 1) the lack of knowledge in terms of parts of speech causes the mistranslation problem; 2) employing word-by-word translation technique hugely results in the mistranslation problem; 3) misspellings yields the mistranslation problem; and 4) the poor knowledge in English language structure also brings about translation errors. The research also predicts that, of all the aforementioned problems, the following ones are found the most, respectively: the poor knowledge in English language structure, word-by-word translation employment, the lack of knowledge in terms of parts of speech, and misspellings.

Keywords: problem, student, Thai, translation

Procedia PDF Downloads 440
3346 Comparative Study on Inhibiting Factors of Cost and Time Control in Nigerian Construction Practice

Authors: S. Abdulkadir, I. Y. Moh’d, S. U. Kunya, U. Nuruddeen

Abstract:

The basis of any contract formation between the client and contractor is the budgeted cost and the estimated duration of projects. These variables are paramount important to project's sponsor in a construction projects and in assessing the success or viability of construction projects. Despite the availability of various techniques of cost and time control, many projects failed to achieve their initial estimated cost and time. The paper evaluate the inhibiting factors of cost and time control in Nigerian construction practice and comparing the result with the United Kingdom practice as identified by one researcher. The populations of the study are construction professionals within Bauchi and Gombe state, Nigeria, a judgmental sampling employed in determining the size of respondents. Descriptive statistics used in analyzing the data in SPSS. Design change, project fraud and corruption, financing and payment of completed work found to be common among the top five inhibiting factors of cost and time control in the study area. Furthermore, the result had shown some comprising with slight contrast as in the case of United Kingdom practice. Study recommend the adaptation of mitigation measures developed in the UK prior to assessing its effectiveness and so also developing a mitigating measure for other top factors that are not within the one developed in United Kingdom practice. Also, it recommends a wider assessing comparison on the modify inhibiting factors of cost and time control as revealed by the study to cover almost all part of Nigeria.

Keywords: comparison, cost, inhibiting factor, United Kingdom, time

Procedia PDF Downloads 447
3345 The Use of Self-Determination Theory to Assess the Opportunities and Challenges for Blended E-Learning in Egypt: An Analysis of the Motivations of Logistics Lecturers

Authors: Aisha Tarek Noour, Nick Hubbard

Abstract:

Blended e-Learning (BL) is proving to be an effective pedagogical tool in many areas of business and management education, but there remains a number of barriers to overcome before its implementation. This paper seeks to analyse the views of lecturers towards BL according to Self-Determination Theory (SDT), and identifies the opportunities and challenges for using BL in Logistics Education in an Egyptian higher education establishment. SDT is approached from a different perspective and the relationship between intrinsic motivation (IM), extrinsic motivation (EM), and amotivation (AM) is analysed and related to the opportunities and challenges of the BL method. The case study methodology comprises of a series of interviews with lecturers employed at three Colleges of International Transport and Logistics (CITLs) at the Arab Academy for Science, Technology, Maritime and Transport (AAST&MT) in Egypt. A structured face-to-face interview was undertaken with 61 interviewees across all faculty positions: Deans, Associate Professors, Assistant Professor, Department Heads, Part-time instructors, Teaching Assistants, and Graduate Teaching Assistants. The findings were based on "content analysis" of the interview transcripts and use of the NVivo10 software program. The research contributes to the application of SDT within the field of BL through an analysis of the views of lecturers towards the opportunities and challenges that BL offers to logistics educators in Egypt.

Keywords: intrinsic motivation, extrinsic motivation, amotivation, autonomy, competence, relatedness, self-determination theory and blended e-learning

Procedia PDF Downloads 446
3344 Artificial Intelligence for Generative Modelling

Authors: Shryas Bhurat, Aryan Vashistha, Sampreet Dinakar Nayak, Ayush Gupta

Abstract:

As the technology is advancing more towards high computational resources, there is a paradigm shift in the usage of these resources to optimize the design process. This paper discusses the usage of ‘Generative Design using Artificial Intelligence’ to build better models that adapt the operations like selection, mutation, and crossover to generate results. The human mind thinks of the simplest approach while designing an object, but the intelligence learns from the past & designs the complex optimized CAD Models. Generative Design takes the boundary conditions and comes up with multiple solutions with iterations to come up with a sturdy design with the most optimal parameter that is given, saving huge amounts of time & resources. The new production techniques that are at our disposal allow us to use additive manufacturing, 3D printing, and other innovative manufacturing techniques to save resources and design artistically engineered CAD Models. Also, this paper discusses the Genetic Algorithm, the Non-Domination technique to choose the right results using biomimicry that has evolved for current habitation for millions of years. The computer uses parametric models to generate newer models using an iterative approach & uses cloud computing to store these iterative designs. The later part of the paper compares the topology optimization technology with Generative Design that is previously being used to generate CAD Models. Finally, this paper shows the performance of algorithms and how these algorithms help in designing resource-efficient models.

Keywords: genetic algorithm, bio mimicry, generative modeling, non-dominant techniques

Procedia PDF Downloads 154
3343 Building Information Modeling and Its Application in the State of Kuwait

Authors: Michael Gerges, Ograbe Ahiakwo, Martin Jaeger, Ahmad Asaad

Abstract:

Recent advances of Building Information Modeling (BIM) especially in the Middle East have increased remarkably. Dubai has been taking a lead on this by making it mandatory for BIM to be adopted for all projects that involve complex architecture designs. This is because BIM is a dynamic process that assists all stakeholders in monitoring the project status throughout different project phases with great transparency. It focuses on utilizing information technology to improve collaboration among project participants during the entire life cycle of the project from the initial design, to the supply chain, resource allocation, construction and all productivity requirements. In view of this trend, the paper examines the extent of applying BIM in the State of Kuwait, by exploring practitioners’ perspectives on BIM, especially their perspectives on main barriers and main advantages. To this end structured interviews were carried out based on questionnaires and with a range of different construction professionals. The results revealed that practitioners perceive improved communication and mitigated project risks by encouraged collaboration between project participants. However, it was also observed that the full implementation of BIM in the State of Kuwait requires concerted efforts to make clients demanding BIM, counteract resistance to change among construction professionals and offer more training for design team members. This paper forms part of an on-going research effort on BIM and its application in the State of Kuwait and it is on this basis that further research on the topic is proposed.

Keywords: building information modeling, BIM, construction industry, Kuwait

Procedia PDF Downloads 383
3342 The Rise of Boko Haram in Nigeria: Lesson for Ghana

Authors: Emmanuel Anim

Abstract:

Ghana has been touted as an oasis of peace in Africa following her relatively peaceful democratic elections, proliferated number of the media, and freedom of speech. Besides, the former Gold Coast country is yet to experience any major incidence of terrorism. Nevertheless, the somewhat occasional simmering violence and conflicts arising from political, religious and chieftaincy skirmishes, largely at its northern part portrays that it is not immune to the political violence of terrorism. The predominantly-based qualitative research reveals that current conditions of socio-politico-economic, and religious issues in Ghana places the West African country on the possible sidelines of the phenomenon of terrorism, when its status quo is juxtaposed with the factors enumerated to have culminated in the rise of Boko Haram, and its accompanying insurgency in Nigeria. Arguing from the perspective of the theory of Social Movement, the analyses and discussions note that the current state of affairs in Ghana could foster domestic terrorism in the country. What is more, the research shows that Ghana faces threats from transnational terrorism given the tendency for elements in Ghana to sympathize and subscribe to the ideological dictates and appeals from Boko Haram and other terrorist organizations. As a consequence, the study recommends that adverse conditions of poverty, poor governance, unemployment, and rising levels of (Islamic) religious radicalization should be remedied by economic improvements, good governance, job creation, and de-radicalization programs by government officials to aid mitigate the incidence of terrorism in the country.

Keywords: Boko Haram, Ghana, Nigeria, terrorism

Procedia PDF Downloads 434
3341 Computer-Aided Detection of Simultaneous Abdominal Organ CT Images by Iterative Watershed Transform

Authors: Belgherbi Aicha, Hadjidj Ismahen, Bessaid Abdelhafid

Abstract:

Interpretation of medical images benefits from anatomical and physiological priors to optimize computer-aided diagnosis applications. Segmentation of liver, spleen and kidneys is regarded as a major primary step in the computer-aided diagnosis of abdominal organ diseases. In this paper, a semi-automated method for medical image data is presented for the abdominal organ segmentation data using mathematical morphology. Our proposed method is based on hierarchical segmentation and watershed algorithm. In our approach, a powerful technique has been designed to suppress over-segmentation based on mosaic image and on the computation of the watershed transform. Our algorithm is currency in two parts. In the first, we seek to improve the quality of the gradient-mosaic image. In this step, we propose a method for improving the gradient-mosaic image by applying the anisotropic diffusion filter followed by the morphological filters. Thereafter, we proceed to the hierarchical segmentation of the liver, spleen and kidney. To validate the segmentation technique proposed, we have tested it on several images. Our segmentation approach is evaluated by comparing our results with the manual segmentation performed by an expert. The experimental results are described in the last part of this work.

Keywords: anisotropic diffusion filter, CT images, morphological filter, mosaic image, simultaneous organ segmentation, the watershed algorithm

Procedia PDF Downloads 445
3340 The Transcriptome of Carnation (Dianthus Caryophyllus) of Elicited Cells with Fusarium Oxysporum f.sp. Dianthi

Authors: Juan Jose Filgueira, Daniela Londono-Serna, Liliana Maria Hoyos

Abstract:

Carnation (Dianthus caryophyllus) is one of the most important products of exportation in the floriculture industry worldwide. Fusariosis is the disease that causes the highest losses on farms, in particular the one produced by Fusarium oxysporum f.sp. dianthi, called vascular wilt. Gene identification and metabolic routes of the genes that participate in the building of the plant response to Fusarium are some of the current targets in the carnation breeding industry. The techniques for the identifying of resistant genes in the plants, is the analysis of the transcriptome obtained during the host-pathogen interaction. In this work, we report the cell transcriptome of different varieties of carnation that present differential response from Fusarium oxysporum f.sp. dianthi attack. The cells of the different hybrids produced in the outbreeding program were cultured in vitro and elicited with the parasite in a dual culture. The isolation and purification of mRNA was achieved by using affinity chromatography Oligo dT columns and the transcriptomes were obtained by using Illumina NGS techniques. A total of 85,669 unigenes were detected in all the transcriptomes analyzed and 31,000 annotations were found in databases, which correspond to 36.2%. The library construction of genic expression techniques used, allowed to recognize the variation in the expression of genes such as Germin-like protein, Glycosyl hydrolase family and Cinnamate 4-hydroxylase. These have been reported in this study for the first time as part of the response mechanism to the presence of Fusarium oxysporum.

Keywords: Carnation, Fusarium, vascular wilt, transcriptome

Procedia PDF Downloads 154
3339 Effect of Different Spacings on Growth Yield and Fruit Quality of Peach in the Sub-Tropics of India

Authors: Harminder Singh, Rupinder Kaur

Abstract:

Peach is primarily a temperate fruit, but its low chilling cultivars are grown quite successfully in the sub-tropical climate as well. The area under peach cultivation is picking up rapidly in the sub tropics of northern India due to higher return on a unit area basis, availability of suitable peach cultivar and their production technology. Information on the use of different training systems on peach in the sub tropics is inadequate. In this investigation, conducted at Punjab Agricultural University, Ludhiana (Punjab), India, the trees of the Shan-i-Punjab peach were planted at four different spacings i.e. 6.0x3.0m, 6.0x2.5m, 4.5x3.0m and 4.5x2.5m and were trained to central leader system. The total radiation interception and penetration in the upper and lower canopy parts were higher in 6x3.0m and 6x2.5m planted trees as compared to other spacings. Average radiation interception was maximum in the upper part of the tree canopy, and it decreased significantly with the depth of the canopy in all the spacings. Tree planted at wider spacings produced more vegetative (tree height, tree girth, tree spread and canopy volume) and reproductive growth (flower bud density, number of fruits and fruit yield) per tree but productivity was maximum in the closely planted trees. Fruits harvested from the wider spaced trees were superior in fruit quality (size, weight, colour, TSS and acidity) and matured earlier than those harvested from closed spaced trees.

Keywords: quality, radiation, spacings, yield

Procedia PDF Downloads 189
3338 Youth NEET in Albania: Current Situation and Outreach Mechanisms

Authors: Emiljan Karma

Abstract:

One of the major problems of the present is young people who are not concerned with employment, education, or training (NEETs). Unfortunately, this group of people in Albania is a considerable part of working-age people, and despite the measures taken, they remain a major problem. NEETs in Albania are very heterogeneous. This is since youth unemployment and inactivity rate are at a very high level (Albania has the highest NEET rate among EU candidates/potential candidates’ countries and EU countries); the high level of NEET rate in Albania means that government agencies responsible for labour market regulation and other social actors interested in the phenomenon (representatives of employees, representatives of employers, non-governmental organizations, etc.) did not effectively materialize the policies in the field of youth employment promotion. The National Agency for Employment and Skills (NAES) delivers measures specifically designed to target unemployed youth, being the key stakeholder in the implementation of employment policies and skills development in Albania. In the context of identifying and assisting NEETs, this role becomes even stronger. The experience of different EU countries (e.g., Youth Guarantee) indicates that there are different policy-making structures and various outreach mechanisms for constraining the youth NEET phenomenon. The purpose of this research is to highlight: (1) The identification of NEETs feature in Albania; (2) The identification of tailored and efficient outreach mechanisms to assist vulnerable NEETs; (3) The fundamental importance of stakeholders’ partnership at central and regional level.

Keywords: labor market, NEETs, non-registered NEETs, unemployment

Procedia PDF Downloads 282
3337 Sea Level Rise and Implications for Low-lying areas: Coastal Evolution and Impact of Future Sea Level Rise Scenarios in Mirabello Gulf - NE Crete

Authors: Maria Kazantzaki, Evangelos Tsakalos, Eleni Filippaki, Yannis Bassiakos

Abstract:

Mediterranean areas are characterized by intense seismic and volcanic activity as well as eustatic changes, the result of which is the creation of particularly vulnerable coastal zones. The most vulnerable are low-lying coastal areas, the geomorphological evolution of which are highly affected by natural processes and anthropogenic interventions. Therefore, assessing changes that take place along coastal zones is of great importance in order to enable the development of integrated coastal management plans. A characteristic case is the gulf of Mirabello in N.E Crete, where intense coastal erosion, in combination with the tectonic subsidence of the area, threatens a large part of the coastal zone, resulting in direct socio-economic impacts. The present study assesses the temporal geomorphological changes that have taken place in the coastal zone of Mirabello gulf to provide a clear frame of the coastal zone evolution over time and performs a vulnerability assessment based on the coastal vulnerability index (CVI) methodology by Thieler and Hammar-Klose, considering geological features, coastal slope, relative sea-level change, shoreline erosion/accretion rates and mean significant wave height as well as mean tide range in the area. In light of this, an impact assessment, based on three different sea level rise scenarios, is also performed and presented.

Keywords: coastal vulnerability index, coastal erosion, GIS, sea level rise

Procedia PDF Downloads 176
3336 An Examination of the Role of Perceived Leadership Styles on Job Satisfaction among Selected Bank Employees

Authors: Solomon Ojo

Abstract:

The study set out to investigate the role of perceived leadership style on achievement motivation of selected bank employees. The study was a cross-sectional survey. A total of 585 bank workers took part in the study; 283 (48.4%) were males while 302% (51.6%) were females. Mean age of 31.8 yrs (SD = 7.8 yrs) was reported for the participants for the study. Questionnaires were used for data collection. Data was analyzed using both descriptive and inferential statistic. The t- test for independent measures was used to test all the hypotheses, using the statistical package for social sciences version 21.0. The results in the study revealed that bank employees who perceived their leaders as high on consideration style of leadership reported more job satisfaction than bank employees who perceived their leaders as low on consideration style of leadership [t(583) = 16.43, p<.001]; bank employees who perceived their leaders as high in initiating structure style reported more job satisfaction than bank employees who perceived their leaders as low in initiating structure style [t(583)=12.06, p<.01]. The results showed further the influence of perceived leadership styles on all measures of job satisfaction. First, the result showed that bank employees who perceived their leaders as high on consideration style reported more satisfaction with hours worked each day than bank employees who perceived their leaders as low on consideration style [t(583) = 9.23, p<.01]. Second, the results revealed that bank employees who perceived their leaders as high on consideration style reported more satisfaction with flexibility in scheduling than bank employees who perceived their leaders as low on consideration style [t(583) = 8.80, p<.01]. Third, it was shown that bank employees who perceived their leaders as high on consideration style reported more satisfaction with location of work than bank employees who perceived their leaders as low on consideration style [t(583) = 14.17, p<.01] e.t.c. The results were extensively discussed in relation to relevant body of literature.

Keywords: leadership styles, job satisfaction, bank employees, perceived

Procedia PDF Downloads 225
3335 Ethnicity, Issue Voting, and Regime Change in the Gambia: the Reason Yahya Jammeh Lost the 2016 Presidential Election

Authors: Alieu B. Sanneh

Abstract:

In a country where there are minimal economic opportunities, with a declining living condition of the people, do electorates in Africa’s newest democracy reevaluate their support for a candidate based on issues or ethnicity. In the 2016 presidential election in The Gambia, the opposition coalition party had successfully managed to overthrow an authoritarian government, which has ruled the country for 22 years. The results of the election are not only surprising but also presented an interesting theoretical puzzle that raises important this paper is going to address. An important fact is that dictator had organized an election which he lost, and this paper will assess the voting decisions of Gambian electorates to determine whether they were more concerned with issues such as status of the economy, human rights abuses by the Jammeh administration or the ethnicities of the contestants who took part in the election. This study uses field survey data, conducted six months after this historic vote, to evaluate the opinion of the electorates. Contrary to the notion of the prevalence of ethnic voting in African elections, an argument made by many scholars, this study concluded that Gambian voters were more concerned with issues such as the economy and human rights under the Jammeh administration than they were for the ethnicities of the candidates. The election was issue-based, and that Jammeh lost the polls due to the concern the electorate had on human rights abuses by his government.

Keywords: election, issue, ethnicity, regime change

Procedia PDF Downloads 121
3334 Hair Symbolism and Changing Perspective of Women’s Role in Children’s and Young Adult Literature

Authors: Suchismita Dattagupta

Abstract:

Social rules and guidelines specify how a body should be clothed and how it should look. The social rules have made the body a space for expression, oppression and sexual 'commodification'. Being a malleable aspect of the human body, hair has always been worn in a number of ways and this characteristic of hair has made it an essential vehicle for conveying symbolic meaning. Hair, particularly women’s hair has always been considered to be associated with richness and beauty, apart from being associated with sexual power. Society has always had a preoccupation with hair bordering on obsession and has projected its moral and political supremacy by controlling and influencing how an individual wears their hair. Irrespective of the gender of the individual, society has tried to control an individual’s hair to express its control. However, with time, there has been a marked change in the way hair has been used by the individual. Hair has always been the focus of scholarly studies; not just aesthetically, but also in the cultural and social context. The fascination with hair rises from the fact that it is the only part of the human body that is always on display. Fetishization of hair is common in literature and goes ahead to reveal the character’s social and moral status. Modern authors for children and young adults have turned this concept on its head to point out how characters are breaking away from the mould and establishing their personal, moral and social boundaries. This paper will trace the change in hair symbolism in literature for children and young adults to understand how it has changed over the course of the time and what light it throws on the changing pattern of women’s position in society.

Keywords: gender, hair, social symbols, society, women's role

Procedia PDF Downloads 236
3333 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case

Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan

Abstract:

The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.

Keywords: cloud computing, protocols, UDP multicast, virtualization

Procedia PDF Downloads 596
3332 Improved Classification Procedure for Imbalanced and Overlapped Situations

Authors: Hankyu Lee, Seoung Bum Kim

Abstract:

The issue with imbalance and overlapping in the class distribution becomes important in various applications of data mining. The imbalanced dataset is a special case in classification problems in which the number of observations of one class (i.e., major class) heavily exceeds the number of observations of the other class (i.e., minor class). Overlapped dataset is the case where many observations are shared together between the two classes. Imbalanced and overlapped data can be frequently found in many real examples including fraud and abuse patients in healthcare, quality prediction in manufacturing, text classification, oil spill detection, remote sensing, and so on. The class imbalance and overlap problem is the challenging issue because this situation degrades the performance of most of the standard classification algorithms. In this study, we propose a classification procedure that can effectively handle imbalanced and overlapped datasets by splitting data space into three parts: nonoverlapping, light overlapping, and severe overlapping and applying the classification algorithm in each part. These three parts were determined based on the Hausdorff distance and the margin of the modified support vector machine. An experiments study was conducted to examine the properties of the proposed method and compared it with other classification algorithms. The results showed that the proposed method outperformed the competitors under various imbalanced and overlapped situations. Moreover, the applicability of the proposed method was demonstrated through the experiment with real data.

Keywords: classification, imbalanced data with class overlap, split data space, support vector machine

Procedia PDF Downloads 309
3331 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 75
3330 Optimization of Hot Metal Charging Circuit in a Steel Melting Shop Using Industrial Engineering Techniques for Achieving Manufacturing Excellence

Authors: N. Singh, A. Khullar, R. Shrivastava, I. Singh, A. S. Kumar

Abstract:

Steel forms the basis of any modern society and is essential to economic growth. India’s annual crude steel production has seen a consistent increase over the past years and is poised to grow to 300 million tons per annum by 2030-31 from current level of 110-120 million tons per annum. Steel industry is highly capital-intensive industry and to remain competitive, it is imperative that it invests in operational excellence. Due to inherent nature of the industry, there is large amount of variability in its supply chain both internally and externally. Production and productivity of a steel plant is greatly affected by the bottlenecks present in material flow logistics. The internal logistics constituting of transport of liquid metal within a steel melting shop (SMS) presents an opportunity in increasing the throughput with marginal capital investment. The study was carried out at one of the SMS of an integrated steel plant located in the eastern part of India. The plant has three SMS’s and the study was carried out at one of them. The objective of this study was to identify means to optimize SMS hot metal logistics through application of industrial engineering techniques. The study also covered the identification of non-value-added activities and proposed methods to eliminate the delays and improve the throughput of the SMS.

Keywords: optimization, steel making, supply chain, throughput enhancement, workforce productivity

Procedia PDF Downloads 121
3329 The Virtual Container Yard: Identifying the Persuasive Factors in Container Interchange

Authors: L. Edirisinghe, Zhihong Jin, A. W. Wijeratne, R. Mudunkotuwa

Abstract:

The virtual container yard is an effective solution to the container inventory imbalance problem which is a global issue. It causes substantial cost to carriers, which inadvertently adds to the prices of consumer goods. The virtual container yard is rooted in the fundamentals of container interchange between carriers. If carriers opt to interchange their excess containers with those who are deficit, a substantial part of the empty reposition cost could be eliminated. Unlike in other types of ships, cargo cannot be directly loaded to a container ship. Slots and containers are supplementary components; thus, without containers, a carrier cannot ship cargo if the containers are not available and vice versa. Few decades ago, carriers recognized slot (the unit of space in a container ship) interchange as a viable solution for the imbalance of shipping space. Carriers interchange slots among them and it also increases the advantage of scale of economies in container shipping. Some of these service agreements between mega carriers have provisions to interchange containers too. However, the interchange mechanism is still not popular among carriers for containers. This is the paradox that prevails in the liner shipping industry. At present, carriers reposition their excess empty containers to areas where they are in demand. This research applied factor analysis statistical method. The paper reveals that five major components may influence the virtual container yard namely organisation, practice and culture, legal and environment, international nature, and marketing. There are 12 variables that may impact the virtual container yard, and these are explained in the paper.

Keywords: virtual container yard, shipping, imbalance, management, inventory

Procedia PDF Downloads 201
3328 Mapping the Poor in Ghana: A Geospatial Multidimensional Poverty Index Approach

Authors: Bernard Kumi-Boateng, Joseph Edem Vigbedor, Irene Asante Sakyi

Abstract:

Globally, especially in developing nations, governments persistently prioritize poverty alleviation and eradication as key objectives. Numerous international organizations also acknowledge the urgent need to reduce poverty levels over the next decade, making poverty reduction a critical global issue. During the past three decades, the government of Ghana has developed and subsequently implemented several development policy frameworks as part of its poverty reduction programmes. In order to reduce and alleviate poverty, one of the parameters that play a key role is statistics on poverty. However, in many developing countries such as Ghana such statistics do not exist thus it makes poverty alleviation intervention a bit scattered and untargeted. Due to this, there exist a major problem presently; that is reaching the poor to address their specific needs. In response to this challenge, there is therefore the need to produce poverty map to assist policy makers. This research therefore sought to use GIS to map out poverty endemic areas by displaying the spatial dimensions of poverty and identify the poverty pockets across the country adopting a Multidimensional (Non-Monetary) Poverty Index approach. Ten indicators which were categories under three dimensions were used. Results of the study showed that across Ghana, a considerable percentage of household are deprived in several non-monetary poverty indicators. Analysis of these indicators revealed wide disparities by region. Generally, wide disparities exist between the proportion of households deprived in the three northern regions and their counterparts in southern Ghana.

Keywords: GIS, multidimensional poverty index, indicator, dimension, poverty

Procedia PDF Downloads 24
3327 Refinement of Thermal and Mechanical Properties of Poly (Lactic Acid)/Poly (Ethylene-Co-Glycidyle Methacrylate)/ Hexagonal Boron Nitride Blend-Composites through Electron-Beam Irradiation

Authors: Ashish Kumar, T. Venkatappa Rao, Subhendu Ray Chowdhury, S. V. S. Ramana Reddy

Abstract:

The main objective of this work is to determine the influence of electron beam irradiation on thermal and mechanical properties of Poly (lactic acid) (PLA)/Poly (ethylene-co-glycidyle methacrylate) (PEGM)/Hexagonal boron nitride (HBN) blend-composites. To reduce the brittleness and improve the toughness of PLA, the PLA/PEGM blend is prepared by using twin-screw Micro compounder. However, the heat deflection temperature (HDT) and other tensile properties were reduced. The HBN has been incorporated into the PLA/PEGM blend as part per hundred i.e. 5 phr and 10phr to improve the HDT. The prepared specimens of blend and blend-composites were irradiated to high energy (4.5 MeV) electron beam (E-beam) at different radiation doses to introduce the cross linking among the polymer chains and uniform dispersion of HBN particles in the PLA/PEGM/HBN blend-composites. The further improvement in the notched impact strength and HDT have been achieved in the case of PLA/PEGM/HBN blend-composites. The irradiated PLA/PEGM/HBN 5phr blend composite shows high notched impact strength and HDT as compared to other unirradiated and E-beam irradiated blend and blend-composites. The improvements in the yield strength and tensile modulus have also been noticed in the case of E-beam irradiated PLA/PEGM/HBN blend-composites as compared to unirradiated blend-composites.

Keywords: blend-composite, e-beam, HDT, PEGM, PLA

Procedia PDF Downloads 191
3326 Thermal Conductivity and Optical Absorption of GaAsPN/GaP for Tandem Solar Cells: Effect of Rapid Thermal Annealing

Authors: S. Ilahi, S. Almosni, F. Chouchene, M. Perrin, K. Zelazna, N. Yacoubi, R. Kudraweic, P. Rale, L. Lombez, J. F. Guillemoles, O. Durand, C. Cornet

Abstract:

Great efforts have been dedicated to obtain high quality of GaAsPN. The properties of GaAsPN have played a great part on the development of solar cells devices based in Si substrate. The incorporation of N in GaAsPN that having a band gap around of 1.7 eV is of special interest in view of growing in Si substrate. In fact, post-growth and rapid thermal annealing (RTA) could be an effective way to improve the quality of the layer. Then, the influence of growth conditions and post-growth annealing on optical and thermal parameters is considered. We have used Photothermal deflection spectroscopy PDS to investigate the impact of rapid thermal annealing on thermal and optical properties of GaAsPN. In fact, the principle of the PDS consists to illuminate the sample by a modulated monochromatic light beam. Then, the absorbed energy is converted into heat through the nonradiative recombination process. The generated thermal wave propagates into the sample and surrounding media creating a refractive-index gradient giving rise to the deflection of a laser probe beam skimming the sample surface. The incident light is assumed to be uniform, and only the sample absorbs the light. In conclusion, the results are promising revealing an improvement in absorption coefficient and thermal conductivity.

Keywords: GaAsPN absorber, photothermal defelction technique PDS, photonics on silicon, thermal conductivity

Procedia PDF Downloads 358
3325 Psychological Aspects of Depression among the Romanian Adults

Authors: Zoltan Abram

Abstract:

Background: In the last time it was hardly increased the prevalence of psychical diseases and disorders which reduce work capacity, life quality and life expectancy. Objectives: The aim of our research is to study the psychical health state of the Romanian adults living in the middle part of the country and the role of some economical, psychological and social factors, especially in relationship with depression. Methods: The study is based on a complex anonymous questionnaire, including Beck depressive scale, which was completed by a representative sample among adult population. The applied method was a combination between stratification and more-steps sampling. Results: After our results depression is the most common psychical illness with 9,1% diagnosis, but the tendency to depression, the existence of depressive symptoms is much higher than the treated illness. The percentage of suicide attempt among the studied population was 2,9%. It is analysed how gender, age, professional and social status, living and working conditions and different social factors are influencing the health state. According to Beck score, it was established a significant difference in the favour of female, elderly people, lower educational level, urban population. Conclusions: In our study it is underlined the importance of health promotion and education. It is concluded that improving living standards, modifying in a proper way the lifestyle of the population, we can positively influence the physical and mental health state of the Romanian adult population.

Keywords: Beck scale, depression, psychological aspects, suicide attempt

Procedia PDF Downloads 425
3324 Does Women Involvement in Politics Decrease Corruption? A Context Based Approach to the Corruption Rate Index of ASEAN Countries

Authors: Lu Anne A. Godinez, May Claudine I. Gador, Preacious G. Gumolon, Louiechi Von R. Mendoza, Neil Bryan N. Moninio

Abstract:

Gender equality and women empowerment is the third of eight Millennium Development Goals. Understanding corruption’s linkages to gender equality issues and how it impacts women’s empowerment is part of the broader process of advancing women’s rights and understanding the gender dimensions of democratic governance. Taking a long view of political (corruption index) and the social (women empowerment) dimension — a view from 2015 to 2030, a context based forecast was conducted to forecast the ASEAN corruption index in the next 15 years, answering the question: “Does women political involvement decrease corruption rate index of ASEAN countries in the next 15 years?” The study have established that there will be an increase women political involvement in the ASEAN countries in the next 15 years that will cause a drop on corruption rate index. There will be a significant decline on corruption rate index in 2030. This change entails reform not only in the political aspect of progress, but to the social aspect as well. Finally, the political aspect is increasing at a constant rate however a double or triple increase of the social aspect is seen to be the key solution for corruption.

Keywords: women, women political involvement, corruption, gender equity index, economic participation, educational attainment, political empowerment, control of corruption, regulatory quality, rule of law, voice and accountability government effectiveness, political stability and corruption perception index

Procedia PDF Downloads 428
3323 Node Optimization in Wireless Sensor Network: An Energy Approach

Authors: Y. B. Kirankumar, J. D. Mallapur

Abstract:

Wireless Sensor Network (WSN) is an emerging technology, which has great invention for various low cost applications both for mass public as well as for defence. The wireless sensor communication technology allows random participation of sensor nodes with particular applications to take part in the network, which results in most of the uncovered simulation area, where fewer nodes are located at far distances. The drawback of such network would be that the additional energy is spent by the nodes located in a pattern of dense location, using more number of nodes for a smaller distance of communication adversely in a region with less number of nodes and additional energy is again spent by the source node in order to transmit a packet to neighbours, thereby transmitting the packet to reach the destination. The proposed work is intended to develop Energy Efficient Node Placement Algorithm (EENPA) in order to place the sensor node efficiently in simulated area, where all the nodes are equally located on a radial path to cover maximum area at equidistance. The total energy consumed by each node compared to random placement of nodes is less by having equal burden on fewer nodes of far location, having distributed the nodes in whole of the simulation area. Calculating the network lifetime also proves to be efficient as compared to random placement of nodes, hence increasing the network lifetime, too. Simulation is been carried out in a qualnet simulator, results are obtained on par with random placement of nodes with EENP algorithm.

Keywords: energy, WSN, wireless sensor network, energy approach

Procedia PDF Downloads 316
3322 A Review of Paleo-Depositional Environment and Thermal Alteration Index of Carboniferous, Permian, and Triassic of A1-9 Well, NW Libya

Authors: M. A. Alrabib, Y. Sherif, A. K. Mohamed, E. A. Elfandi, E. I. Fandi

Abstract:

This paper introduces a paleo-environmental and hydrocarbon show in this well was identified in the interval of Dembaba formation to the Hassaona Formation was poor to very poor oil show. And from palaeo-environmental analysis there is neither particularly good reservoir nor source rock have been developed in the area. Recent palaeo-environment work undertakes that the sedimentary succession in this area comprises the Upper Paleozoic rock of the Carboniferous and Permian and the Mesozoic (Triassic) sedimentary sequences. No early Paleozoic rocks have been found in this area, these rocks were eroding during the Late Carboniferous and Early Permian time. During Latest Permian and earliest Triassic time evidence for major marine transgression has occurred. From depths 5930-5940 feet, to 10800-10810 feet, the TAI of the Al Guidr, the Bir Al Jaja Al Uotia, Hebilia and the top varies between 3+ to 4-(mature-dry gas). This interval corporate the rest part of the Dembaba Formation. From depth 10800- 10810 feet, until total sediment depth (11944 feet Log) which corporate the rest of the Dembaba and underlying equivalents of the Assedjefar and M Rar Formations and the underlying Indeterminate unit (Hassouna Formation) the TAI varies between 4 and 5 (dry gas-black and deformed).

Keywords: paleoenvironmental, thermal alteration index, north western Libya, hydrocarbon

Procedia PDF Downloads 473
3321 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 224