Search results for: application attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8663

Search results for: application attack

8303 Elicitation Methods of Requirements Gathering in Shopping Mobile Application Development

Authors: Xiao Yihong, Li Zhixuan, Wong Kah Seng, Shen Xingcang

Abstract:

Requirement Elicitation is one of the important factors in developing any new application. Most systems fail just because of wrong elicitation practice. As a result, developers always choose different methods in different fields to achieve optimal results. This paper analyses four cases to understand the effectiveness of different requirement elicitation methods in the field of mobile shopping applications. The elicitation methods we studied included interviews, questionnaires, prototypes, analysis of existing systems, focus groups, brainstorming, and so on. Through the research and analysis results, we ensured the need for a mixture of elicitation methods. Meanwhile, the method adopted should be determined according to the scale of the project and be operated in a reasonable order to ensure the high efficiency of requirement elicitation.

Keywords: requirements elicitation method, shopping, mobile application, software requirement engineering

Procedia PDF Downloads 114
8302 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 275
8301 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 164
8300 Fabricating Anti-Counterfeiting Films by Grafting Cationic Dye on Cellulose Nanofiber

Authors: Mohammadreza Biabani, Mohammad Azadfallah

Abstract:

A facile and robust strategy is required to fabricate films with high special optical properties for application in the field of anti-counterfeit marking. Nanocellulose, derived from bioresources, is a renewable material with broad application prospects. In this paper, a method for grafting the eco-friendly Berberine cationic dye on cellulose nanofiber is proposed. A functional modification was carried out by in-situ polymerization along with a grafting approach with acrylic acid(AA) in order to develop cationic dyeability of the cellulose nanofiber (CNF). The Berberine grafting on nanocellulose was significantly influenced by the reaction time and temperature during the dyeing process. The dyed CNF-films exhibited appropriate characteristics like appearance, color strength, and fastness for anti-counterfeiting application.

Keywords: Cellulose nanofiber, Berberine, Grafting, anti-counterfeiting, film

Procedia PDF Downloads 123
8299 Analysis of the Impact of Suez Canal on the Robustness of Global Shipping Networks

Authors: Zimu Li, Zheng Wan

Abstract:

The Suez Canal plays an important role in global shipping networks and is one of the most frequently used waterways in the world. The 2021 canal obstruction by ship Ever Given in March 2021, however, completed blocked the Suez Canal for a week and caused significant disruption to world trade. Therefore, it is very important to quantitatively analyze the impact of the accident on the robustness of the global shipping network. However, the current research on maritime transportation networks is usually limited to local or small-scale networks in a certain region. Based on the complex network theory, this study establishes a global shipping complex network covering 2713 nodes and 137830 edges by using the real trajectory data of the global marine transport ship automatic identification system in 2018. At the same time, two attack modes, deliberate (Suez Canal Blocking) and random, are defined to calculate the changes in network node degree, eccentricity, clustering coefficient, network density, network isolated nodes, betweenness centrality, and closeness centrality under the two attack modes, and quantitatively analyze the actual impact of Suez Canal Blocking on the robustness of global shipping network. The results of the network robustness analysis show that Suez Canal blocking was more destructive to the shipping network than random attacks of the same scale. The network connectivity and accessibility decreased significantly, and the decline decreased with the distance between the port and the canal, showing the phenomenon of distance attenuation. This study further analyzes the impact of the blocking of the Suez Canal on Chinese ports and finds that the blocking of the Suez Canal significantly interferes withChina's shipping network and seriously affects China's normal trade activities. Finally, the impact of the global supply chain is analyzed, and it is found that blocking the canal will seriously damage the normal operation of the global supply chain.

Keywords: global shipping networks, ship AIS trajectory data, main channel, complex network, eigenvalue change

Procedia PDF Downloads 174
8298 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 353
8297 Durability Performances of Epoxy Resin/TiO₂ Composited Alkali-Activated Slag/Fly Ash Pastes in Phosphoric Acid Solution

Authors: Jie Ren, Siyao Guo

Abstract:

Laden with phosphates at a low pH value, sewage wastewater aggressive environments constitute a great threat to concrete-based pipes which is made of alkaline cementitious materials such as ordinary Portland cement (OPC). As a promising alternative for OPC-based binders, alkali-activated slag/fly ash (AASF) cementitious binders are generally believed to gain similar or better properties compared to OPC-based counterparts, especially durability. However, there is limited research on the performance of AASF binders in phosphoric acid solution. Moreover, the behavior of AASF binders composited with epoxy resin/TiO₂ when exposed to acidic media has been rarely explored. In this study, the performance of AASF paste with the precursor slag:fly ash (50:50 in mass ratio) enhanced with epoxy resin/TiO₂ composite in phosphoric acid solution (pH = 3.0-4.0) was investigated. The exposure towards acid attack lasted for 90 days. The same AASF mixture without resin/TiO₂ composite was used as a reference. The compressive strength and porous-related properties prior to acidic immersion were tested. The mass variations and degradation depth of the two mixtures of binders were also monitored which is based on phenolphthalein-videomicroscope method. The results show that the binder with epoxy resin/TiO₂ addition gained a higher compressive strength and lower water absorption than the reference. In addition, it also displayed a higher resistance towards acid attack indicated by a less mass loss and less degradation depth compared to the control sample. This improvement can be attributed to a dense microstructure evidenced by the higher compressive strength and related porous structures. It can be concluded that the microstructure can be improved by adding epoxy resin/TiO₂ composite in order to enhance the resistance of AASF binder towards acid attacks.

Keywords: alkali-activated paste, epoxy resin/TiO₂, composites, mechanical properties, phosphoric acid

Procedia PDF Downloads 114
8296 Engineering Management and Practice in Nigeria

Authors: Harold Jideofor

Abstract:

The application of Project Management (PM) tools and techniques in the public sector is gradually becoming an important issue in developing economies, especially in a country like Nigeria where projects of different size and structures are undertaken. The paper examined the application of the project management practice in the public sector in Nigeria. The PM lifecycles, tools, and techniques were presented. The study was carried out in Lagos because of its metropolitan nature and rapidly growing economy. Twenty-three copies of questionnaire were administered to 23 public institutions in Lagos to generate primary data. The descriptive analysis techniques using percentages and table presentations coupled with the coefficient of correlation were used for data analysis. The study revealed that application of PM tools and techniques is an essential management approach that tends to achieve specified objectives within specific time and budget limits through the optimum use of resources. Furthermore, the study noted that there is a lack of in-depth knowledge of PM tools and techniques in public sector institutions sampled, also a high cost of the application was also observed by the respondents. The study recommended among others that PM tools and techniques should be applied gradually especially in old government institutions where resistance to change is perceived to be high.

Keywords: project management, public sector, practice, Nigeria

Procedia PDF Downloads 333
8295 Potential of Intercropping Corn and Cowpea to Ratooned Sugarcane for Food and Forage

Authors: Maricon E. Gepolani, Edna A. Aguilar, Pearl B. Sanchez, Enrico P. Supangco

Abstract:

Intercropping farming system and biofertilizer application are sustainable agricultural practices that increase farm productivity by improving the yield performance of the components involved in the production system. Thus, this on-farm trial determined the yield and forage quality of corn and cowpea with and without biofertilizer application when intercropped with ratooned sugarcane. Intercropping corn and cowpea without biofertilizer application had no negative effect on the vegetative growth of sugarcane. However, application of biofertilizer on intercrops decreased tiller production at 117 days after stubble shaving (DASS), consequently reducing the estimated tonnage yield of sugarcane. The yield of intercrops and forage production of Cp3 cowpea variety increased when intercropped to ratooned sugarcane. In contrast, intercropping PSB 97-92 corn variety to ratooned sugarcane reduced its forage production, but when biofertilizer was applied to intercropped Cp5 cowpea variety, the forage production increased. Profitability (income equivalent ratio) of intercropping for both corn and cowpea are higher than monocropping and are thus suitable intercrops to ratooned sugarcane. Unaffected tiller count (a determinant of sugarcane tonnage yield) when biofertilizer was not applied to intercrops and a reduced tiller count with biofertilizer application to intercrops implies the need to develop a nutrient management practices specific for intercropping systems.

Keywords: biofertilizer, corn, cowpea, intercropping system, ratooned sugarcane

Procedia PDF Downloads 123
8294 Role of Salicylic Acid in Alleviating Chromium Toxicity in Chickpea (Cicer Arietinum L.)

Authors: Ghulam Hassan Abbasi, Moazzam Jamil, Ghazala Akhtar, M.Anwar-ul-Haq

Abstract:

Heavy metals are significant pollutants in environment and their toxicity is a problem for survival of living things while salicylic acid (SA) is signaling and ubiquitous bioactive molecule that regulates cellular mechanism in plants under stress condition. Therefore, exogenous application of salicylic acid (SA) under chromium stress in two chickpea varieties were investigated in hydroponic experiment with five treatments comprising of control, 5 µM Cr + 5 mM SA, 5µM Cr + 10 mM SA, 10µM Cr + 5 mM SA, and 10µM Cr + 10 mM SA. Results revealed that treatments of plants with 10 mM SA application under both 5 µM Cr and 10 µM Cr stress resulted in maximum improvement in plant morphological attributes (root and shoot length, root and shoot fresh and dry weight, membrane stability index and relative water contents) relative to 5 mM SA application in both chickpea varieties. Results regarding Cr concentration showed that Cr was more retained in roots followed by shoots and maximum reduction in Cr uptake was observed at 10 mM SA application. Chickpea variety BRC-61 showed maximum growth and least concentration of Cr in root and shoot relative to BRC-390 variety.

Keywords: chromium, Chickpea, salicylic acid, growth

Procedia PDF Downloads 504
8293 The Visualizer for Real-Time Analysis of Internet Trends

Authors: Radek Malinský, Ivan Jelínek

Abstract:

The current web has become a modern encyclopedia, where people share their thoughts and ideas on various topics around them. Such kind of encyclopedia is very useful for other people who are looking for answers to their questions. However, with the growing popularity of social networking and blogging and ever expanding network services, there has also been a growing diversity of technologies along with different structure of individual websites. It is, therefore, difficult to directly find a relevant answer for a common Internet user. This paper presents a web application for the real-time end-to-end analysis of selected Internet trends; where the trend can be whatever the people post online. The application integrates fully configurable tools for data collection and analysis using selected webometric algorithms, and for its chronological visualization to user. It can be assumed that the application facilitates the users to evaluate the quality of various products that are mentioned online.

Keywords: Trend, visualizer, web analysis, web 2.0.

Procedia PDF Downloads 257
8292 Literature Review: Application of Artificial Intelligence in EOR

Authors: Masoumeh Mofarrah, Amir NahanMoghadam

Abstract:

Higher oil prices and increasing oil demand are main reasons for great attention to Enhanced Oil Recovery (EOR). Comprehensive researches have been accomplished to develop, appraise and improve EOR methods and their application. Recently Artificial Intelligence (AI) gained popularity in petroleum industry that can help petroleum engineers to solve some fundamental petroleum engineering problems such as reservoir simulation, EOR project risk analysis, well log interpretation and well test model selection. This study presents a historical overview of most popular AI tools including neural networks, genetic algorithms, fuzzy logic and expert systems in petroleum industry and discusses two case studies to represent the application of two mentioned AI methods for selecting an appropriate EOR method based on reservoir characterization in feasible and effective way.

Keywords: artificial intelligence, EOR, neural networks, expert systems

Procedia PDF Downloads 402
8291 Development of a Web-Based Application for Intelligent Fertilizer Management in Rice Cultivation

Authors: Hao-Wei Fu, Chung-Feng Kao

Abstract:

In the era of rapid technological advancement, information technology (IT) has become integral to modern life, exerting significant influence across diverse sectors and serving as a catalyst for development in various industries. Within agriculture, the integration of IT offers substantial benefits, notably enhancing operational efficiency. Real-time monitoring systems, for instance, have been widely embraced in agriculture, effectively improving crop management practices. This study specifically addresses the management of rice panicle fertilizer, presenting the development of a web application tailored to handle data associated with rice panicle fertilizer management. Leveraging the normalized difference red edge index, this application optimizes the quantity of rice panicle fertilizer used, providing recommendations to agricultural stakeholders and service providers in the agricultural information sector. The overarching objective is to minimize costs while maximizing yields. Furthermore, a robust database system has been established to store and manage relevant data for future reference in rice cultivation management. Additionally, the study utilizes the Representational State Transfer software architectural style to construct an application programming interface (API), facilitating data creation, retrieval, updating, and deletion for users via the HyperText Transfer Protocol methods. Future plans involve integrating this API with third-party services to incorporate it into larger frameworks, thus catering to the diverse requirements of various third-party services.

Keywords: application programming interface, HyperText Transfer Protocol, nitrogen fertilizer intelligent management, web-based application

Procedia PDF Downloads 53
8290 A Structuring and Classification Method for Assigning Application Areas to Suitable Digital Factory Models

Authors: R. Hellmuth

Abstract:

The method of factory planning has changed a lot, especially when it is about planning the factory building itself. Factory planning has the task of designing products, plants, processes, organization, areas, and the building of a factory. Regular restructuring is becoming more important in order to maintain the competitiveness of a factory. Restrictions in new areas, shorter life cycles of product and production technology as well as a VUCA world (Volatility, Uncertainty, Complexity and Ambiguity) lead to more frequent restructuring measures within a factory. A digital factory model is the planning basis for rebuilding measures and becomes an indispensable tool. Furthermore, digital building models are increasingly being used in factories to support facility management and manufacturing processes. The main research question of this paper is, therefore: What kind of digital factory model is suitable for the different areas of application during the operation of a factory? First, different types of digital factory models are investigated, and their properties and usabilities for use cases are analysed. Within the scope of investigation are point cloud models, building information models, photogrammetry models, and these enriched with sensor data are examined. It is investigated which digital models allow a simple integration of sensor data and where the differences are. Subsequently, possible application areas of digital factory models are determined by means of a survey and the respective digital factory models are assigned to the application areas. Finally, an application case from maintenance is selected and implemented with the help of the appropriate digital factory model. It is shown how a completely digitalized maintenance process can be supported by a digital factory model by providing information. Among other purposes, the digital factory model is used for indoor navigation, information provision, and display of sensor data. In summary, the paper shows a structuring of digital factory models that concentrates on the geometric representation of a factory building and its technical facilities. A practical application case is shown and implemented. Thus, the systematic selection of digital factory models with the corresponding application cases is evaluated.

Keywords: building information modeling, digital factory model, factory planning, maintenance

Procedia PDF Downloads 103
8289 Effect of Silicon in Mitigating Cadmium Toxicity in Maize

Authors: Ghulam Hasan Abbasi, Moazzam Jamil, M. Anwar-Ul-Haq

Abstract:

Heavy metals are significant pollutants in environment and their toxicity is a problem for survival of living things while Silicon (Si) is one of the most ubiquitous macroelements, performing an essential function in healing plants in response to environmental stresses. A hydroponic experiment was conducted to investigate the role of exogenous application of silicon under cadmium stress in six different maize hybrids with five treatments comprising of control, 7.5 µM Cd + 5 mM Si, 7.5 µM Cd + 10 mM Si, 15 µM Cd + 5 mM Si and 15 µM Cd + 10 mM Si. Results revealed that treatments of plants with 10mM Si application under both 7.5µM Cd and 15 µM Cd stress resulted in maximum improvement in plant morphological attributes (root and shoot length, root and shoot fresh and dry weight, leaf area and relative water contents) and antioxidant enzymes (POD and CAT) relative to 5 mM Si application in all maize hybrids. Results regarding Cd concentrations showed that Cd was more retained in roots followed by shoots and then leaves and maximum reduction in Cd uptake was observed at 10mM Si application. Maize hybrid 6525 showed maximum growth and least concentration of Cd whereas maize hybrid 1543 showed the minimum growth and maximum Cd concentration among all maize hybrids.

Keywords: antioxidant, cadmium, maize, silicon

Procedia PDF Downloads 510
8288 Technology Enhanced Learning Using Virtual and Augmented Realities: An Applied Method to Improve the Animation Teaching Delivery

Authors: Rosana Marar, Edward Jaser

Abstract:

This paper presents a software solution to enhance the content and presentation of graphic design and animation related textbooks. Using augmented and virtual reality concepts, a mobile application is developed to improve the static material found in books. This allows users to interact with animated examples and tutorials using their mobile phones and stereoscopic 3D viewers which will enhance information delivery. The application is tested on Google Cardboard with visual content in 3D space. Evaluation of the proposed application demonstrates that it improved the readability of static content and provided new experiences to the reader.

Keywords: animation, augmented reality, google cardboard, interactive media, technology enhanced learning, virtual reality

Procedia PDF Downloads 177
8287 An Intelligent Decision Support System Approach for New Product Development by Using QFD and Its Application in Metal Plating Industry

Authors: Ufuk Cebeci, Onur Doğan

Abstract:

New product becomes critical in competitive environment shortening a product's lifecycle due to the rapidly changing technology and increasing consumer requirements. Quality Function Deployment is one of the first steps of NPD process. The study presents an intelligent QFD application in metal plating industry. For application, an intelligent decision support system was developed. By intelligent system, house of quality was drawn and some calculations were shown. According to the results, some recommendations are given to end user. One of the purposes of this system is to give some advices to firms which do not know technical details of QFD and guide them about first steps of the new product development process.

Keywords: intelligent decision support systems, metal plating, quality function deployment, QFD software, new product development

Procedia PDF Downloads 394
8286 Stabilized Halogen Based Biocides for RO Membrane Application

Authors: Harshada Lohokare

Abstract:

Biofouling is major issue in Reverse Osmosis (RO) membranes operation. To address the biofouling issue in raw water as well as wastewater recycle / reuse application requires effective biofouling control program. Current biocides (2,2-dibromo-3-nitrilopropionamide, isothiazolinone) are costly and hence often under-dosed. The membrane compatibility, as well as the microbio efficiency of the RO membrane biocide was studied. Based on the biofouling potential, the biocide product and it’s dosage was studied. It was found that these products need to be dosed continuous as well as intermittent dosage based on the microbio load. This study shows that depending on the application and microbio fouling potential, products can be chosen to mitigate the biofouling issues and improve the RO membrane performance.

Keywords: reverse osmosis membrane, biofouling, biocide, stabilized halogen

Procedia PDF Downloads 65
8285 Multilayer System of Thermosetting Polymers and Specific Confining, Application to the Walls of the Hospital Unit

Authors: M. Bouzid, A. Djadi, C. Aribi, A. Irekti, B. Bezzazi, F. Halouene

Abstract:

The nature of materials structuring our health institutions promote the development of germs. The sustainability of nosocomial infections remains significant (12% and 15%). One of the major factors is the portland cement which is brittle and porous. As part of a national plan to fight nosocomial infections, led by the University Hospital of Blida, we opted for a composite coating, application by multilayer model, composed of epoxy-polyester resin as a binder and calcium carbonate as mineral fillers. The application of composite materials reinforce the wall coating of hospital units and eliminates the hospital infectious areas. The resistance to impact, chemicals, raising temperature and to a biologically active environment gives satisfactory results.

Keywords: nosocomial infection, microbial load, composite materials, portland cement

Procedia PDF Downloads 383
8284 Hand Controlled Mobile Robot Applied in Virtual Environment

Authors: Jozsef Katona, Attila Kovari, Tibor Ujbanyi, Gergely Sziladi

Abstract:

By the development of IT systems, human-computer interaction is also developing even faster and newer communication methods become available in human-machine interaction. In this article, the application of a hand gesture controlled human-computer interface is being introduced through the example of a mobile robot. The control of the mobile robot is implemented in a realistic virtual environment that is advantageous regarding the aspect of different tests, parallel examinations, so the purchase of expensive equipment is unnecessary. The usability of the implemented hand gesture control has been evaluated by test subjects. According to the opinion of the testing subjects, the system can be well used, and its application would be recommended on other application fields too.

Keywords: human-machine interface (HCI), mobile robot, hand control, virtual environment

Procedia PDF Downloads 292
8283 Time-Domain Expressions for Bridge Self-Excited Aerodynamic Forces by Modified Particle Swarm Optimizer

Authors: Hao-Su Liu, Jun-Qing Lei

Abstract:

This study introduces the theory of modified particle swarm optimizer and its application in time-domain expressions for bridge self-excited aerodynamic forces. Based on the indicial function expression and the rational function expression in time-domain expression for bridge self-excited aerodynamic forces, the characteristics of the two methods, i.e. the modified particle swarm optimizer and conventional search method, are compared in flutter derivatives’ fitting process. Theoretical analysis and numerical results indicate that adopting whether the indicial function expression or the rational function expression, the fitting flutter derivatives obtained by modified particle swarm optimizer have better goodness of fit with ones obtained from experiment. As to the flutter derivatives which have higher nonlinearity, the self-excited aerodynamic forces, using the flutter derivatives obtained through modified particle swarm optimizer fitting process, are much closer to the ones simulated by the experimental. The modified particle swarm optimizer was used to recognize the parameters of time-domain expressions for flutter derivatives of an actual long-span highway-railway truss bridge with double decks at the wind attack angle of 0°, -3° and +3°. It was found that this method could solve the bounded problems of attenuation coefficient effectively in conventional search method, and had the ability of searching in unboundedly area. Accordingly, this study provides a method for engineering industry to frequently and efficiently obtain the time-domain expressions for bridge self-excited aerodynamic forces.

Keywords: time-domain expressions, bridge self-excited aerodynamic forces, modified particle swarm optimizer, long-span highway-railway truss bridge

Procedia PDF Downloads 309
8282 Awareness for Air Pollution Impacts on Lung Cancer in Southern California: A Pilot Study for Designed Smartphone Application

Authors: M. Mohammed Raoof, A. Enkhtaivan, H. Aljuaid

Abstract:

This study follows the design science research methodology to design and implement a smartphone application artifact. The developed artifact was evaluated through three phases. The System Usability Scale (SUS) metric was used for the evaluation. The designed artifact aims to spread awareness about reducing air pollution, decreasing lung cancer development, and checking the air quality status in Southern California Counties. Participants have been drawn for a pilot study to facilitate awareness of air pollution. The study found that smartphone applications have a beneficial effect on the study’s aims.

Keywords: air pollution, design science research, indoor air pollution, lung cancer, outdoor air pollution, smartphone application

Procedia PDF Downloads 108
8281 Cold Tomato Paste as an Alternative Therapy for Elderly Clients with Exacerbation of Arthritis

Authors: Mary Therese G. Caluna, Mark Justin B. Campanero, Erlin Maris T. Cantiller, Claudine Mae A. Cantillo, Nerissa L. Caño

Abstract:

Objective: The study determined the effectiveness of cold tomato paste in relieving pain caused by exacerbation of arthritis in the elderly, specifically on clients 60 years old and above. The study focused on alternative, cost-effective and non-pharmacological techniques in relieving pain experienced by the older people with osteoarthritis and rheumatoid arthritis. Methods: Using purposive non-probability sampling, the researchers gathered a total number of 40 subjects that passed the inclusion criteria provided by the researchers. The subjects were divided into two groups, experimental group (20 subjects) and control groups (20 subjects). The Numeric Rating 11-point Scale (NRS-11) was utilized to assess the pain level of the subject prior the application of the treatment and after the application of the treatment. Key findings: There is a significant difference in the pain levels of the experimental group before and after the application of cold tomato paste. This indicates that that the application of cold tomato paste alleviates the pain experienced by elderly clients with exacerbation of arthritis. Conclusion: The effectiveness of cold tomato paste in relieving pain experienced by elderly clients who are in exacerbation of arthritis was proven to be evidence-based. The cold tomato paste application has significant impact in the field of nursing and therefore, can be used in both clinical trials and practices. The effectiveness of cold tomato application promotes innovation in the field of nursing, thus encouraging further researches regarding other uses of tomato and other herbal interventions to relieve the pain caused by osteoarthritis and rheumatoid arthritis.

Keywords: alternative therapy, arthritis, cold tomato paste, elderly clients, exacerbation

Procedia PDF Downloads 418
8280 Kiddo: Design and Prototype of a Useable Mobile Application for Kids to Learn under Parental Control

Authors: Albandary Alamer, Noura Alaskar, Sana Bukhamseen, Jawaher Alkhamis, Enas Alghamdi, Almaha Almulhim, Hina Gull, Rachid Zagrouba, Madeeha Saqib

Abstract:

A good and healthy seed will always produce a nice fruit, whereas an infected seed will produce an infected fruit. The same concept applies to the children, and the healthier the environment in which the kids grow, the more likely they become valuable members of society. Kiddo project introduces us to a mobile application that focuses on enhancing the sense of responsibility from a young age and makes raising kids fun and easy. The application aims to enhance the communication between parents and their children and to enrich the good habits of the kid. Kiddo Application enables kids to share their accomplishments with their peers in an interactive environment full of enjoyment, followed by parental monitoring to handle what their kids are posting and friends following. Kiddo provides the kids' and parents’ society with a safe platform free of cyberbullying and inappropriate content with parents' fun engagement.

Keywords: kids social media, educational app, child-raising, parental control, cyberbullying, parent-child relationship, good habits

Procedia PDF Downloads 149
8279 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 161
8278 Mobile Application to Generate Automate Plan for Tourist in The South and West of Saudi Arabia, Saferk

Authors: Hanan M. Alghamdi, Kholud E. Alsalami, Manal I. Alshaikhi, Nouf M. Alsalami, Sara A. Awad, Ruqaya A. Alrabei

Abstract:

Tourism in Saudi Arabia is one of the emerging sectors with rapid growth. The Kingdom of Saudi Arabia is characterized by its wonderful and historical areas, which constitute important cultural and tourist landmarks. These landmarks attract the attention of the government of Saudi Arabia; hence the improvement of the tourism sector becomes one of the important axes of Saudi Arabia's vision 2030. There is a need to enhance the tourist experience by facilitating the tourism process for visitors to the Kingdom of Saudi Arabia. This project aims to design an application to serve domestic tourists and visitors from outside the Kingdom of Saudi Arabia. This application will contain an automated tourist generate plan service by sentiment analysis of comments in Google Map using Lexicon for method Rule-based approach. There are thirteen regions in the kingdom of Saudi Arabia. The regions supported in this application will be Makkah and Asir regions. According to the output of the sentiment analysis, the application will recommend restaurants and cafes, activities (parks, museums) and shopping (shopping centers) in the generated plan. After that, the system will show the user a drop-down list of “Mega-events in Saudi Arabia” containing a link to the site of events in the Kingdom of Saudi Arabia. and “important information for you” public decency regulations.

Keywords: tourist automated plan, sentiment analysis, comments in google map, tourism in Saudi Arabia

Procedia PDF Downloads 137
8277 Inferring Influenza Epidemics in the Presence of Stratified Immunity

Authors: Hsiang-Yu Yuan, Marc Baguelin, Kin O. Kwok, Nimalan Arinaminpathy, Edwin Leeuwen, Steven Riley

Abstract:

Traditional syndromic surveillance for influenza has substantial public health value in characterizing epidemics. Because the relationship between syndromic incidence and the true infection events can vary from one population to another and from one year to another, recent studies rely on combining serological test results with syndromic data from traditional surveillance into epidemic models to make inference on epidemiological processes of influenza. However, despite the widespread availability of serological data, epidemic models have thus far not explicitly represented antibody titre levels and their correspondence with immunity. Most studies use dichotomized data with a threshold (Typically, a titre of 1:40 was used) to define individuals as likely recently infected and likely immune and further estimate the cumulative incidence. Underestimation of Influenza attack rate could be resulted from the dichotomized data. In order to improve the use of serosurveillance data, here, a refinement of the concept of the stratified immunity within an epidemic model for influenza transmission was proposed, such that all individual antibody titre levels were enumerated explicitly and mapped onto a variable scale of susceptibility in different age groups. Haemagglutination inhibition titres from 523 individuals and 465 individuals during pre- and post-pandemic phase of the 2009 pandemic in Hong Kong were collected. The model was fitted to serological data in age-structured population using Bayesian framework and was able to reproduce key features of the epidemics. The effects of age-specific antibody boosting and protection were explored in greater detail. RB was defined to be the effective reproductive number in the presence of stratified immunity and its temporal dynamics was compared to the traditional epidemic model using use dichotomized seropositivity data. Deviance Information Criterion (DIC) was used to measure the fitness of the model to serological data with different mechanisms of the serological response. The results demonstrated that the differential antibody response with age was present (ΔDIC = -7.0). The age-specific mixing patterns with children specific transmissibility, rather than pre-existing immunity, was most likely to explain the high serological attack rates in children and low serological attack rates in elderly (ΔDIC = -38.5). Our results suggested that the disease dynamics and herd immunity of a population could be described more accurately for influenza when the distribution of immunity was explicitly represented, rather than relying only on the dichotomous states 'susceptible' and 'immune' defined by the threshold titre (1:40) (ΔDIC = -11.5). During the outbreak, RB declined slowly from 1.22[1.16-1.28] in the first four months after 1st May. RB dropped rapidly below to 1 during September and October, which was consistent to the observed epidemic peak time in the late September. One of the most important challenges for infectious disease control is to monitor disease transmissibility in real time with statistics such as the effective reproduction number. Once early estimates of antibody boosting and protection are obtained, disease dynamics can be reconstructed, which are valuable for infectious disease prevention and control.

Keywords: effective reproductive number, epidemic model, influenza epidemic dynamics, stratified immunity

Procedia PDF Downloads 257
8276 Study of Microbial Diversity Associated with Tarballs and Their Exploitation in Crude Oil Degradation

Authors: Varsha Shinde, Belle Damodara Shenoy

Abstract:

Tarballs are crude oil remnants found in oceans after long term weathering process and are a global concern since several decades as potential marine pollutant. Being complicated in structure microbial remediation of tarballs in natural environment is a slow process. They are rich in high molecular weight alkanes and poly aromatic hydrocarbons which are resistant to microbial attack and other environmental factors, therefore remain in environment for long time. However, it has been found that many bacteria and fungi inhabit on tarballs for nutrients and shelter. Many of them are supposed to be oil degraders, while others are supposed to be getting benefited by byproducts formed during hydrocarbon metabolism. Thus tarballs are forming special interesting ecological niche of microbes. This work aimed to study diversity of bacteria and fungi from tarballs and to see their potential application in crude oil degradation. The samples of tarballs were collected from Betul beach of south Goa (India). Different methods were used to isolate culturable fraction of bacteria and fungi from it. Those were sequenced for 16S rRNA gene and ITS for molecular level identification. The 16S rRNA gene sequence analysis revealed the presence of 13 bacterial genera/clades (Alcanivorax, Brevibacterium, Bacillus, Cellulomonas, Enterobacter, Klebsiella, Marinobacter, Nitratireductor, Pantoea, Pseudomonas, Pseudoxanthomonas, Tistrella and Vibrio), while the ITS sequence analysis placed the fungi in 8 diverse genera/ clades (Aspergillus, Byssochlamys, Monascus, Paecilomyces, Penicillium, Scytalidium/ Xylogone, Talaromyces and Trichoderma). All bacterial isolates were screened for oil degradation capacity. Potential strains were subjected to crude oil degradation experiment for quantification. Results were analyzed by GC-MS-MS.

Keywords: bacteria, biodegradation, crude oil, diversity, fungi, tarballs

Procedia PDF Downloads 216
8275 Study on Accurate Calculation Method of Model Attidude on Wind Tunnel Test

Authors: Jinjun Jiang, Lianzhong Chen, Rui Xu

Abstract:

The accurate of model attitude angel plays an important role on the aerodynamic test results in the wind tunnel test. The original method applies the spherical coordinate system transformation to obtain attitude angel calculation.The model attitude angel is obtained by coordinate transformation and spherical surface mapping applying the nominal attitude angel (the balance attitude angel in the wind tunnel coordinate system) indicated by the mechanism. First, the coordinate transformation of this method is not only complex but also difficult to establish the transformed relationship between the space coordinate systems especially after many steps of coordinate transformation, moreover it cannot realize the iterative calculation of the interference relationship between attitude angels; Second, during the calculate process to solve the problem the arc is approximately used to replace the straight line, the angel for the tangent value, and the inverse trigonometric function is applied. Therefore, in the calculation of attitude angel, the process is complex and inaccurate, which can be solved approximately when calculating small attack angel. However, with the advancing development of modern aerodynamic unsteady research, the aircraft tends to develop high or super large attack angel and unsteadyresearch field.According to engineering practice and vector theory, the concept of vector angel coordinate systemis proposed for the first time, and the vector angel coordinate system of attitude angel is established.With the iterative correction calculation and avoiding the problem of approximate and inverse trigonometric function solution, the model attitude calculation process is carried out in detail, which validates that the calculation accuracy and accuracy of model attitude angels are improved.Based on engineering and theoretical methods, a vector angel coordinate systemis established for the first time, which gives the transformation and angel definition relations between different flight attitude coordinate systems, that can accurately calculate the attitude angel of the corresponding coordinate systemand determine its direction, especially in the channel coupling calculation, the calculation of the attitude angel between the coordinate systems is only related to the angel, and has nothing to do with the change order s of the coordinate system, whichsimplifies the calculation process.

Keywords: attitude angel, angel vector coordinate system, iterative calculation, spherical coordinate system, wind tunnel test

Procedia PDF Downloads 129
8274 Smart Safari: Safari Guidance Mobile Application

Authors: D. P. Lawrence, T. M. M. D. Ariyarathna, W. N. K. De Silva, M. D. S. C. De Silva, Lasantha Abeysiri, Pradeep Abeygunawardhna

Abstract:

Safari traveling is one of the most famous hobbies all over the world. In Sri Lanka, 'Yala' is the second-largest national park, which is a better place to go for a safari. Many number of local and foreign travelers are coming to go for a safari in 'Yala'. But 'Yala' does not have a mobile application that is made to facilitate the traveler with some important features that the traveler wants to achieve in the safari experience. To overcome these difficulties, the proposed mobile application by adding those identified features to make travelers, guiders, and administration's works easier. The proposed safari traveling guidance mobile application is called 'SMART SAFARI' for the 'Yala' National Park in Sri Lanka. There are four facilities in this mobile application that provide for travelers as well as the guiders. As the first facility, the guider and traveler can view the created map of the park, and the guider can add temporary locations of animals and special locations on the map. This is a Geographic Information System (GIS) to capture, analyze, and display geographical data. And as the second facility is to generate optimal paths according to the travelers' requirements through the park by using machine learning techniques. In the third part, the traveler can get information about animals using an animal identification system by capturing the animal. As in the other facility, the traveler will be facilitated to add reviews and a rate and view those comments under categorized sections and pre-defined score range. With those facilities, this user-friendly mobile application provides the user to get a better experience in safari traveling, and it will probably help to develop tourism culture in Sri Lanka.

Keywords: animal identification system, geographic information system, machine learning techniques, pre defined score range

Procedia PDF Downloads 126