Search results for: security measurement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5355

Search results for: security measurement

1575 Magnetic Treatment of Irrigation Water and Its Effect on Water Salinity

Authors: Muhammad Waqar Ashraf

Abstract:

The influence of magnetic field on the structure of water and aqueous solutions are similar and can alter the physical and chemical properties of water-dispersed systems. With the application of magnetic field, hydration of salt ions and other impurities slides down and improve the possible technological characteristics of the water. Magnetic field can enhance the characteristic of water i.e. better salt solubility, kinetic changes in salt crystallization, accelerated coagulation, etc. Gulf countries are facing critical problem due to depletion of water resources and increasing food demands to cover the human needs; therefore water shortage is being increasingly accepted as a major limitation for increased agricultural production and food security. In arid and semi-arid regions sustainable agricultural development is influenced to a great extent by water quality that might be used economically and effectively in developing agriculture programs. In the present study, the possibility of using magnetized water to desalinate the soil is accounted for the enhanced dissolving capacity of the magnetized water. Magnetic field has been applied to treat brackish water. The study showed that the impact of magnetic field on saline water is sustained up to three hours (with and without shaking). These results suggest that even low magnetic field can decrease the electrical conductivity and total dissolved solids which are good for the removal of salinity from the irrigated land by using magnetized water.

Keywords: magnetic treatment, saline water, hardness of water, removal of salinity

Procedia PDF Downloads 491
1574 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 86
1573 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 412
1572 Structural Damage Detection Using Modal Data Employing Teaching Learning Based Optimization

Authors: Subhajit Das, Nirjhar Dhang

Abstract:

Structural damage detection is a challenging work in the field of structural health monitoring (SHM). The damage detection methods mainly focused on the determination of the location and severity of the damage. Model updating is a well known method to locate and quantify the damage. In this method, an error function is defined in terms of difference between the signal measured from ‘experiment’ and signal obtained from undamaged finite element model. This error function is minimised with a proper algorithm, and the finite element model is updated accordingly to match the measured response. Thus, the damage location and severity can be identified from the updated model. In this paper, an error function is defined in terms of modal data viz. frequencies and modal assurance criteria (MAC). MAC is derived from Eigen vectors. This error function is minimized by teaching-learning-based optimization (TLBO) algorithm, and the finite element model is updated accordingly to locate and quantify the damage. Damage is introduced in the model by reduction of stiffness of the structural member. The ‘experimental’ data is simulated by the finite element modelling. The error due to experimental measurement is introduced in the synthetic ‘experimental’ data by adding random noise, which follows Gaussian distribution. The efficiency and robustness of this method are explained through three examples e.g., one truss, one beam and one frame problem. The result shows that TLBO algorithm is efficient to detect the damage location as well as the severity of damage using modal data.

Keywords: damage detection, finite element model updating, modal assurance criteria, structural health monitoring, teaching learning based optimization

Procedia PDF Downloads 212
1571 Producing of Amorphous-Nanocrystalline Composite Powders

Authors: K. Tomolya, D. Janovszky, A. Sycheva, M. Sveda, A. Roosz

Abstract:

CuZrAl amorphous alloys have attracted high interest due to unique physical and mechanical properties, which can be enhanced by adding of Ni and Ti elements. It is known that this properties can be enhanced by crystallization of amorphous alloys creating nanocrystallines in the matrix. The present work intends to produce nanosized crystalline parti-cle reinforced amorphous matrix composite powders by crystallization of amorphous powders. As the first step the amorphous powders were synthe-tized by ball-milling of crystalline powders. (Cu49Zr45Al6) 80Ni10Ti10 and (Cu49Zr44Al7) 80Ni10Ti10 (at%) alloys were ball-milled for 12 hours in order to reach the fully amorphous structure. The impact en-ergy of the balls during milling causes the change of the structure in the powders. Scanning electron microscopical (SEM) images shows that the phases mixed first and then changed into a fully amorphous matrix. Furthermore, nanosized particles in the amorphous matrix were crystallized by heat treatment of the amorphous powders that was confirmed by TEM measurement. It was of importance to define the tem-perature when the amorphous phase starts to crystal-lize. Amorphous alloys have a special heating curve and characteristic temperatures, which can be meas-ured by differential scanning calorimetry (DSC). A typical DSC curve of an amorphous alloy exhibits an endothermic event characteristic of the equilibrium glass transition (Tg) and a distinct undercooled liquid region, followed by one or two exothermic events corresponding to crystallization processes (Tp). After measuring the DSC traces of the amorphous powders, the annealing temperatures should be determined between Tx and Tp. In our experiments several temperatures from the annealing temperature range were selected and de-pendency of crystallized nanoparticles fraction on their hardness was investigated.

Keywords: amorphous structure, composite, mechanical milling, powder, scanning electron microscopy (SEM), differential scanning calorimetry (DSC), transmission electronmocroscopy (TEM)

Procedia PDF Downloads 446
1570 An Investigation of Item Bias in Free Boarding and Scholarship Examination in Turkey

Authors: Yeşim Özer Özkan, Fatma Büşra Fincan

Abstract:

Biased sample is a regression of an observation, design process and all of the specifications lead to tendency of a side or the situation of leaving from the objectivity. It is expected that, test items are answered by the students who come from different social groups and the same ability not to be different from each other. The importance of the expectation increases especially during student selection and placement examinations. For example, all of the test items should not be beneficial for just a male or female group. The aim of the research is an investigation of item bias whether or not the exam included in 2014 free boarding and scholarship examination in terms of gender variable. Data which belong to 5th, 6th, and 7th grade the secondary education students were obtained by the General Directorate of Measurement, Evaluation and Examination Services in Turkey. 20% students were selected randomly within 192090 students. Based on 38418 students’ exam paper were examined for determination item bias. Winsteps 3.8.1 package program was used to determine bias in analysis of data, according to Rasch Model in respect to gender variable. Mathematics items tests were examined in terms of gender bias. Firstly, confirmatory factor analysis was applied twenty-five math questions. After that, NFI, TLI, CFI, IFI, RFI, GFI, RMSEA, and SRMR were examined in order to be validity and values of goodness of fit. Modification index values of confirmatory factor analysis were examined and then some of the items were omitted because these items gave an error in terms of model conformity and conceptual. The analysis shows that in 2014 free boarding and scholarship examination exam does not include bias. This is an indication of the gender of the examination to be made in favor of or against different groups of students.

Keywords: gender, item bias, placement test, Rasch model

Procedia PDF Downloads 229
1569 Nonlinear Aerodynamic Parameter Estimation of a Supersonic Air to Air Missile by Using Artificial Neural Networks

Authors: Tugba Bayoglu

Abstract:

Aerodynamic parameter estimation is very crucial in missile design phase, since accurate high fidelity aerodynamic model is required for designing high performance and robust control system, developing high fidelity flight simulations and verification of computational and wind tunnel test results. However, in literature, there is not enough missile aerodynamic parameter identification study for three main reasons: (1) most air to air missiles cannot fly with constant speed, (2) missile flight test number and flight duration are much less than that of fixed wing aircraft, (3) variation of the missile aerodynamic parameters with respect to Mach number is higher than that of fixed wing aircraft. In addition to these challenges, identification of aerodynamic parameters for high wind angles by using classical estimation techniques brings another difficulty in the estimation process. The reason for this, most of the estimation techniques require employing polynomials or splines to model the behavior of the aerodynamics. However, for the missiles with a large variation of aerodynamic parameters with respect to flight variables, the order of the proposed model increases, which brings computational burden and complexity. Therefore, in this study, it is aimed to solve nonlinear aerodynamic parameter identification problem for a supersonic air to air missile by using Artificial Neural Networks. The method proposed will be tested by using simulated data which will be generated with a six degree of freedom missile model, involving a nonlinear aerodynamic database. The data will be corrupted by adding noise to the measurement model. Then, by using the flight variables and measurements, the parameters will be estimated. Finally, the prediction accuracy will be investigated.

Keywords: air to air missile, artificial neural networks, open loop simulation, parameter identification

Procedia PDF Downloads 273
1568 Effect of Oxytocin on Cytosolic Calcium Concentration of Alpha and Beta Cells in Pancreas

Authors: Rauza Sukma Rita, Katsuya Dezaki, Yuko Maejima, Toshihiko Yada

Abstract:

Oxytocin is a nine-amino acid peptide synthesized in the paraventricular nucleus (PVN) and supraoptic nucleus (SON) of the hypothalamus. Oxytocin promotes contraction of the uterus during birth and milk ejection during breast feeding. Although oxytocin receptors are found predominantly in the breasts and uterus of females, many tissues and organs express oxytocin receptors, including the pituitary, heart, kidney, thymus, vascular endothelium, adipocytes, osteoblasts, adrenal gland, pancreatic islets, and many cell lines. On the other hand, in pancreatic islets, oxytocin receptors are expressed in both α-cells and β-cells with stronger expression in α- cells. However, to our knowledge there are no reports yet about the effect of oxytocin on cytosolic calcium reaction on α and β-cell. This study aims to investigate the effect of oxytocin on α-cells and β-cells and its oscillation pattern. Islet of Langerhans from wild type mice were isolated by collagenase digestion. Isolated and dissociated single cells either α-cells or β-cells on coverslips were mounted in an open chamber and superfused in HKRB. Cytosolic concentration ([Ca2+]i) in single cells were measured by fura-2 microfluorimetry. After measurement of [Ca2+]i, α-cells were identified by subsequent immunocytochemical staining using an anti-glucagon antiserum. In β-cells, the [Ca2+]i increase in response to oxytocin was observed only under 8.3 mM glucose condition, whereas in α-cells, [Ca2+]i an increase induced by oxytocin was observed in both 2.8 mM and 8.3 mM glucose. The oscillation incidence was induced more frequently in β-cells compared to α-cells. In conclusion, the present study demonstrated that oxytocin directly interacts with both α-cells and β-cells and induces increase of [Ca2+]i and its specific patterns.

Keywords: α-cells, β-cells, cytosolic calcium concentration, oscillation, oxytocin

Procedia PDF Downloads 188
1567 A Psychosocial Impact of the Covid-19 Pandemic Among Frontline Workers and General Populations in Kathmandu

Authors: Nabin Prasad Joshi

Abstract:

A new variant of the coronavirus family found in the Wuhan city market of China is causing serious harm to human beings. After the WHO decided COVID-19 was a pandemic situation, everyone started to measure the prevention of infectious diseases according to WHO guidelines. It includes social distancing, isolation, quarantine, lockdown, sanitation, and masking, respectively. During this time, the researcher has observed the difficulties of cultivating the new normal in people in Nepal. People have perceived the single coronavirus differently; common populations and frontline workers have different perceptions of coronavirus. The researcher started to measure the psychosocial impact of the COVID-19 pandemic on frontline workers and general populations in Kathmandu valley. The total number of sample units for this research is 82; it includes 52 general populations and 30 frontline workers. These sample units are selected through convenient sampling and purposive sampling, respectively. This research is based on descriptive and exploratory design. DASS-21 of the Nepali version is a comprehensive data collection tool for depression, anxiety, and stress measurement in this research, and simultaneously the psychosocial checklist, key-informant interview, and case study have been done. Quantitative data are analyzed with the help of excel, and qualitative data are through thematic analysis. The study has shown that the occurrence of psychosocial issues among frontline workers is greater than in general populations. It is found that the informants with higher education status have greater psychosocial issues in comparison to low education status. In the context of a pandemic, family/friends’ support can function as a protective factor when at adequate levels.

Keywords: anxiety, depression, isolation, lockdown

Procedia PDF Downloads 76
1566 Low Volume High Intensity Interval Training Effect on Liver Enzymes in Chronic Hepatitis C Patients

Authors: Aya Gamal Khattab

Abstract:

Chronic infection with the hepatitis C virus (HCV) is now the leading cause of liver-related morbidity and mortality; Currently, alanine aminotransferase ALT measurement is not only widely used in detecting the incidence, development, and prognosis of liver disease with obvious clinical symptoms, but also provides reference on screening the overall health status during health check-ups. Exercise is a low-cost, reliable and sustainable therapy for many chronic diseases. Low-volume high intensity interval training HIT is time efficient while also having wider application to different populations including people at risk for chronic inflammatory diseases. Purpose of this study was to investigate the effect of low volume high intensity interval training on ALT, AST in HCV patients. All practical work was done in outpatient physiotherapy clinic of Suez Canal Authority Hospitals. Forty patients both gender (27 male, 13 female), age ranged (40-60) years old submitted to low volume high intensity interval training on treadmill for two months three sessions per week. Each session consisting of five min warming up, two bouts for 10 min each bout consisting of 30 sec - 1 min of high intensity (75%-85%) HRmax then two to four min active recovery at intensity (40%-60%) HRmax, so the sum of high intensity intervals was one to two min for each session and four to eight min active recovery, and ends with five min cooling down. ALT and AST were measured before starting exercise session and 2 months later after finishing the total exercise sessions through blood samples. Results showed significant decrease in ALT, AST with improvement percentage (18.85%), (23.87%) in the study, so the study concluded that low volume high intensity interval training had a significant effect in lowering the level of circulating liver enzymes (ALT, AST) which means protection of hepatic cells and restoration of its function.

Keywords: alanine aminotransferase (ALT), aspartate aminotransferase (AST), hepatitis C (HCV), low volume high intensity interval training

Procedia PDF Downloads 296
1565 Review of Strategies for Hybrid Energy Storage Management System in Electric Vehicle Application

Authors: Kayode A. Olaniyi, Adeola A. Ogunleye, Tola M. Osifeko

Abstract:

Electric Vehicles (EV) appear to be gaining increasing patronage as a feasible alternative to Internal Combustion Engine Vehicles (ICEVs) for having low emission and high operation efficiency. The EV energy storage systems are required to handle high energy and power density capacity constrained by limited space, operating temperature, weight and cost. The choice of strategies for energy storage evaluation, monitoring and control remains a challenging task. This paper presents review of various energy storage technologies and recent researches in battery evaluation techniques used in EV applications. It also underscores strategies for the hybrid energy storage management and control schemes for the improvement of EV stability and reliability. The study reveals that despite the advances recorded in battery technologies there is still no cell which possess both the optimum power and energy densities among other requirements, for EV application. However combination of two or more energy storages as hybrid and allowing the advantageous attributes from each device to be utilized is a promising solution. The review also reveals that State-of-Charge (SoC) is the most crucial method for battery estimation. The conventional method of SoC measurement is however questioned in the literature and adaptive algorithms that include all model of disturbances are being proposed. The review further suggests that heuristic-based approach is commonly adopted in the development of strategies for hybrid energy storage system management. The alternative approach which is optimization-based is found to be more accurate but is memory and computational intensive and as such not recommended in most real-time applications.

Keywords: battery state estimation, hybrid electric vehicle, hybrid energy storage, state of charge, state of health

Procedia PDF Downloads 234
1564 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 112
1563 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 52
1562 Characterizing Nanoparticles Generated from the Different Working Type and the Stack Flue during 3D Printing Process

Authors: Kai-Jui Kou, Tzu-Ling Shen, Ying-Fang Wang

Abstract:

The objectives of the present study are to characterize nanoparticles generated from the different working type in 3D printing room and the stack flue during 3D printing process. The studied laboratory (10.5 m× 7.2 m × 3.2 m) with a ventilation rate of 500 m³/H is installed a 3D metal printing machine. Direct-reading instrument of a scanning mobility particle sizer (SMPS, Model 3082, TSI Inc., St. Paul, MN, USA) was used to conduct static sampling for nanoparticle number concentration and particle size distribution measurements. The SMPS obtained particle number concentration at every 3 minutes, the diameter of the SMPS ranged from 11~372 nm when the aerosol and sheath flow rates were set at 0.6 and 6 L/min, respectively. The concentrations of background, printing process, clearing operation, and screening operation were performed in the laboratory. On the other hand, we also conducted nanoparticle measurement on the 3D printing machine's stack flue to understand its emission characteristics. Results show that the nanoparticles emitted from the different operation process were the same distribution in the form of the uni-modal with number median diameter (NMD) as approximately 28.3 nm to 29.6 nm. The number concentrations of nanoparticles were 2.55×10³ count/cm³ in laboratory background, 2.19×10³ count/cm³ during printing process, 2.29×10³ count/cm³ during clearing process, 3.05×10³ count/cm³ during screening process, 2.69×10³ count/cm³ in laboratory background after printing process, and 6.75×10³ outside laboratory, respectively. We found that there are no emission nanoparticles during the printing process. However, the number concentration of stack flue nanoparticles in the ongoing print is 1.13×10⁶ count/cm³, and that of the non-printing is 1.63×10⁴ count/cm³, with a NMD of 458 nm and 29.4 nm, respectively. It can be confirmed that the measured particle size belongs to easily penetrate the filter in theory during the printing process, even though the 3D printer has a high-efficiency filtration device. Therefore, it is recommended that the stack flue of the 3D printer would be equipped with an appropriate dust collection device to prevent the operators from exposing these hazardous particles.

Keywords: nanoparticle, particle emission, 3D printing, number concentration

Procedia PDF Downloads 179
1561 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 187
1560 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 405
1559 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance

Authors: Kyle Phillips, Ndiko Ludidi

Abstract:

Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.

Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22

Procedia PDF Downloads 461
1558 Meeting India's Energy Demand: U.S.-India Energy Cooperation under Trump

Authors: Merieleen Engtipi

Abstract:

India's total share of global population is nearly 18%; however, its per capita energy consumption is only one-third of global average. The demand and supply of electricity are uneven in the country; around 240 million of the population have no access to electricity. However, with India's trajectory for modernisation and economic growth, the demand for energy is only expected to increase. India is at a crossroad, on the one hand facing the increasing demand for energy and on the other hand meeting the Paris climate policy commitments, and further the struggle to provide efficient energy. This paper analyses the policies to meet India’s need for energy, as the per capita energy consumption is likely to be double in 6-7 years period. Simultaneously, India's Paris commitment requires curbing of carbon emission from fossil fuels. There is an increasing need for renewables to be cheaply and efficiently available in the market and for clean technology to extract fossil fuels to meet climate policy goals. Fossil fuels are the most significant generator of energy in India; with the Paris agreement, the demand for clean energy technology is increasing. Finally, the U.S. decided to withdraw from the Paris Agreement; however, the two countries plan to continue engaging bilaterally on energy issues. The U.S. energy cooperation under Trump administration is significantly vital for greater energy security, transfer of technology and efficiency in energy supply and demand.

Keywords: energy demand, energy cooperation, fossil fuels, technology transfer

Procedia PDF Downloads 249
1557 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 36
1556 Complementary Child-Care by Grandparents: Comparisons of Zambia and the Netherlands

Authors: Francis Sichimba

Abstract:

Literature has increasingly acknowledged the important role that grandparents play in child care with evidence highlighting differences in grand-parental investment between countries and cultures. However, there are very few systematic cross cultural studies on grandparents’ participation in child care. Thus, we decided to conduct this study in Zambia and the Netherlands because the two countries differ rather drastically socially and culturally. The objective of this study was to investigate grand-parental involvement in child care in Zambia and the Netherlands. In line with the general objective, four hypotheses were formulated using nationality, family size, social economic status (SES), attachment security as independent variables. The study sample consisted of 411 undergraduate students from the University of Zambia and the University of Leiden. A questionnaire was used to measure grand-parental involvement in child care. Results indicated that grandparent involvement in child care was prevalent in both Zambia and Netherlands. However, as predicted it was found that Zambian grandparents (M = 9.69, SD=2.40) provided more care for their grandchildren compared to their Dutch counterparts (M = 7.80, SD=3.31) even after controlling for parents being alive. Using hierarchical logistic regression analysis the study revealed that nationality and attachment-related avoidance were significant predictors of grand-parental involvement in child care. It was concluded that grand-parental care is a great resource in offering complementary care in both countries.

Keywords: attachment, care, grand-parenting involvement, social economic status

Procedia PDF Downloads 717
1555 Shape Management Method for Safety Evaluation of Bridge Based on Terrestrial Laser Scanning Using Least Squares

Authors: Gichun Cha, Dongwan Lee, Junkyeong Kim, Aoqi Zhang, Seunghee Park

Abstract:

All the world are studying the construction technology of double deck tunnel in order to respond to the increasing urban traffic demands and environmental changes. Advanced countries have the construction technology of the double deck tunnel structure. but the domestic country began research on it. Construction technologies are important. But Safety evaluation of structure is necessary to prevent possible accidents during construction. Thus, the double deck tunnel was required the shape management of middle slabs. The domestic country is preparing the construction of double deck tunnel for an alternate route and a pleasant urban environment. Shape management of double deck tunnel has been no research because it is a new attempted technology. The present, a similar study is bridge structure for the shape management. Bridge is implemented shape model using terrestrial laser scanning(TLS). Therefore, we proceed research on the bridge slabs because there is a similar structure of double deck tunnel. In the study, we develop shape management method of bridge slabs using TLS. We select the Test-bed for measurement site. This site is bridge located on Sungkyunkwan University Natural Sciences Campus. This bridge has a total length of 34m, the vertical height of 8.7m from the ground. It connects Engineering Building #1 and Engineering Building #2. Point cloud data for shape management is acquired the TLS and We utilized the Leica ScanStation C10/C5 model. We will confirm the Maximum displacement area of middle slabs using Least-Squares Fitting. We expect to raise stability for double deck tunnel through shape management for middle slabs.

Keywords: bridge slabs, least squares, safety evaluation, shape management method, terrestrial laser scanning

Procedia PDF Downloads 238
1554 Bridge Members Segmentation Algorithm of Terrestrial Laser Scanner Point Clouds Using Fuzzy Clustering Method

Authors: Donghwan Lee, Gichun Cha, Jooyoung Park, Junkyeong Kim, Seunghee Park

Abstract:

3D shape models of the existing structure are required for many purposes such as safety and operation management. The traditional 3D modeling methods are based on manual or semi-automatic reconstruction from close-range images. It occasions great expense and time consuming. The Terrestrial Laser Scanner (TLS) is a common survey technique to measure quickly and accurately a 3D shape model. This TLS is used to a construction site and cultural heritage management. However there are many limits to process a TLS point cloud, because the raw point cloud is massive volume data. So the capability of carrying out useful analyses is also limited with unstructured 3-D point. Thus, segmentation becomes an essential step whenever grouping of points with common attributes is required. In this paper, members segmentation algorithm was presented to separate a raw point cloud which includes only 3D coordinates. This paper presents a clustering approach based on a fuzzy method for this objective. The Fuzzy C-Means (FCM) is reviewed and used in combination with a similarity-driven cluster merging method. It is applied to the point cloud acquired with Lecia Scan Station C10/C5 at the test bed. The test-bed was a bridge which connects between 1st and 2nd engineering building in Sungkyunkwan University in Korea. It is about 32m long and 2m wide. This bridge was used as pedestrian between two buildings. The 3D point cloud of the test-bed was constructed by a measurement of the TLS. This data was divided by segmentation algorithm for each member. Experimental analyses of the results from the proposed unsupervised segmentation process are shown to be promising. It can be processed to manage configuration each member, because of the segmentation process of point cloud.

Keywords: fuzzy c-means (FCM), point cloud, segmentation, terrestrial laser scanner (TLS)

Procedia PDF Downloads 229
1553 The Use of Manipulative Strategies: Machiavellianism among the University Students

Authors: Karla Hrbackova, Anna Petr Safrankova, Jakub Hladik

Abstract:

Machiavellianism as social phenomenon reveals certain methods of communication that man puts in contact with other people in both personal and working life (and work with clients). Especially at the helping-profession students is honesty, openness or low motivation for personal benefit important part of the profession. The aim of a study is to expose intercultural differences influence of Machiavellianism between Czech and Slovak university students and to determine whether these differences manifest themselves differently among students focusing on management and social profession (by helping degrees). The research involved 1120 university students from the Czech Republic and the Slovak Republic. The measurement of Machiavellianism used a test Mach IV. The test contained 20 statements divided into four central dimensions of Machiavellianism: flattery, deception and falsehood, immorality and cynicism. We found out, that Czech and Slovak's student expressed a similar attitude toward Machiavellianism as a means of manipulation in the interpersonal relationship, but this is not true in all dimensions. Czech and Slovak's students perceive differently flattery, deception and falsehood and cynicism too. In addition to specific features of cultural conditionality, we found out differences depending on the helping profession. Students focusing on managerial occupation (lower level of helping) tend towards greater acceptance of the use flattery as a means of communication than students specializing in the social profession (high-grade assisting). If they are an intercultural and interdisciplinary influences combined and effect on the perception of Machiavellianism together, then their significant importance for the perception of flattery and cynicism. The result will help us to reveal certain specific traits that students apply communication and with whom we can continue to work during their training.

Keywords: use of manipulative strategies, Machiavellianism, helping-profession students, professional training of students

Procedia PDF Downloads 379
1552 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks

Authors: Yao-Hong Tsai

Abstract:

Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.

Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance

Procedia PDF Downloads 158
1551 Nitrogen-Fixing Rhizobacteria (Rhizobium mililoti 2011) Enhances the Tolerance and the Accumulation of Cadmium in Medicago sativa

Authors: Tahar Ghnaya, Majda Mnasri, Hanen Zaier, Rim Ghabriche, Chedly Abdelly

Abstract:

It is known that the symbiotic association between plant and microorganisms are beneficial for plant growth and resistance to metal stress. Hence, it was demonstrated that Arbuscular mycorrhizal fungi have a positive effect on host plants growing in metal polluted soils. Legume plants are those which normally associate to rhizobacteria in order to fix atmospheric nitrogen. The aim of this work was to evaluate the effect this type of symbiosis on the tolerance and the accumulation of Cd. We chose Medicago sativa, as a modal for host legume plants and Rhizobium mililoti 2011 as rhizobial strain. Inoculated and non-inoculated plants of M. sativa were submitted during three month to 0, 50, and 100 mgCd/kg dry soil. Results showed that the presence of Cd in the medium induced, in both inoculated and non-inoculated plants, a chlorosis and necrosis. However, these symptoms were more pronounced in non-inoculated plants. The beneficial effect of inoculation of M. sativa with R. meliloti, on plant growth was confirmed by the measurement of biomass production which showed that the symbiotic association between host plant and rhizobacteria alleviates significantly Cd effect on biomass production, so inoculated plants produced more dry weight as compared to non-inoculated ones in the presence of all Cd tretments. On the other hand, under symbiosis conditions, Cd was more accumulated in different plant organs. Hence, in these plants, shoot Cd concentration reached 425 and it was 280 µg/gDW in non-inoculated ones in the presence of 100 ppm Cd. This result suggests that symbiosis enhances the absorption and translocation of Cd in this plant. In nodules and roots, we detected the highest Cd concentrations, demonstrating that these organs are able to concentrate Cd in their tissues. These data confirm that M. sataiva, cultivated in symbiosis with Rhizobium mililoti could be used in phytoextraction of Cd from contaminated soils.

Keywords: Cd, phytoremediation, Medicago sativa, Arbuscular mycorrhizal

Procedia PDF Downloads 272
1550 Effect of Fire Retardant Painting Product on Smoke Optical Density of Burning Natural Wood Samples

Authors: Abdullah N. Olimat, Ahmad S. Awad, Faisal M. AL-Ghathian

Abstract:

Natural wood is used in many applications in Jordan such as furniture, partitions constructions, and cupboards. Experimental work for smoke produced by the combustion of certain wood samples was studied. Smoke generated from burning of natural wood, is considered as a major cause of death in furniture fires. The critical parameter for life safety in fires is the available time for escape, so the visual obscuration due to smoke release during fire is taken into consideration. The effect of smoke, produced by burning of wood, depends on the amount of smoke released in case of fire. The amount of smoke production, apparently, affects the time available for the occupants to escape. To achieve the protection of life of building occupants during fire growth, fire retardant painting products are tested. The tested samples of natural wood include Beech, Ash, Beech Pine, and white Beech Pine. A smoke density chamber manufactured by fire testing technology has been used to perform measurement of smoke properties. The procedure of test was carried out according to the ISO-5659. A nonflammable vertical radiant heat flux of 25 kW/m2 is exposed to the wood samples in a horizontal orientation. The main objective of the current study is to carry out the experimental tests for samples of natural woods to evaluate the capability to escape in case of fire and the fire safety requirements. Specific optical density, transmittance, thermal conductivity, and mass loss are main measured parameters. Also, comparisons between samples with paint and with no paint are carried out between the selected samples of woods.

Keywords: extinction coefficient, optical density, transmittance, visibility

Procedia PDF Downloads 233
1549 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 144
1548 Industrial Rock Characterization using Nuclear Magnetic Resonance (NMR): A Case Study of Ewekoro Quarry

Authors: Olawale Babatunde Olatinsu, Deborah Oluwaseun Olorode

Abstract:

Industrial rocks were collected from a quarry site at Ewekoro in south-western Nigeria and analysed using Nuclear Magnetic Resonance (NMR) technique. NMR measurement was conducted on the samples in partial water-saturated and full brine-saturated conditions. Raw NMR data were analysed with the aid of T2 curves and T2 spectra generated by inversion of raw NMR data using conventional regularized least-squares inversion routine. Results show that NMR transverse relaxation (T2) signatures fairly adequately distinguish between the rock types. Similar T2 curve trend and rates at partial saturation suggests that the relaxation is mainly due to adsorption of water on micropores of similar sizes while T2 curves at full saturation depict relaxation decay rate as: 1/T2(shale)>1/ T2(glauconite)>1/ T2(limestone) and 1/T2(sandstone). NMR T2 distributions at full brine-saturation show: unimodal distribution in shale; bimodal distribution in sandstone and glauconite; and trimodal distribution in limestone. Full saturation T2 distributions revealed the presence of well-developed and more abundant micropores in all the samples with T2 in the range, 402-504 μs. Mesopores with amplitudes much lower than those of micropores are present in limestone, sandstone and glauconite with T2 range: 8.45-26.10 ms, 6.02-10.55 ms, and 9.45-13.26 ms respectively. Very low amplitude macropores of T2 values, 90.26-312.16 ms, are only recognizable in limestone samples. Samples with multiple peaks showed well-connected pore systems with sandstone having the highest degree of connectivity. The difference in T2 curves and distributions for the rocks at full saturation can be utilised as a potent diagnostic tool for discrimination of these rock types found at Ewekoro.

Keywords: Ewekoro, NMR techniques, industrial rocks, characterization, relaxation

Procedia PDF Downloads 292
1547 Canadian Business Leaders’ Phenomenological Online Education Expansion

Authors: Amna Khaliq

Abstract:

This research project centers on Canadian business leaders’ phenomenological online education expansion by navigating the challenges faced by strategic leaders concerning the expansion of online education in the Canadian higher education sector from a business perspective. The study identifies the problems and opportunities of faculty members’ transition from traditional face-to-face to online instruction, particularly in the context of technology-enhanced learning (TEL), and their influence on the growth strategies of Canadian educational institutions. It explores strategic leaders’ approaches and the impact of emerging technologies to assist with developing and executing business strategies to expand online education in Canada. As online education has gained prominence in the country, this research addresses a relevant business problem for educational institutions. The research employs a phenomenological approach in the qualitative research design to conduct this investigation. The study interviews eighteen faculty members engaged in online education in Canada. The interview data is analyzed to answer the three research questions for strategic leaders to expand online education with higher education institutions in Canada. The recommendations include 1) data privacy, infrastructure, security, and technology, 2) support and training for student engagement, 3) accessibility and inclusion, and 4) collaboration among institutions associated with expanding online education.

Keywords: strategic leadership, Canada, education, technology

Procedia PDF Downloads 59
1546 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study

Authors: Eman Mohamed Ali Elalwani

Abstract:

The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.

Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation

Procedia PDF Downloads 122