Search results for: code reuse attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2363

Search results for: code reuse attack

2003 Fluid–Structure Interaction Modeling of Wind Turbines

Authors: Andre F. A. Cyrino

Abstract:

Knowing that the technological advance is the focus on the efficient extraction of energy from wind, and therefore in the design of wind turbine structures, this work aims the study of the fluid-structure interaction of an idealized wind turbine. The blade was studied as a beam attached to a cylindrical Hub with rotation axis pointing the air flow that passes through the rotor. Using the calculus of variations and the finite difference method the blade will be simulated by a discrete number of nodes and the aerodynamic forces were evaluated. The study presented here was written on Matlab and performs a numeric simulation of a simplified model of windmill containing a Hub and three blades modeled as Euler-Bernoulli beams for small strains and under the constant and uniform wind. The mathematical approach is done by Hamilton’s Extended Principle with the aerodynamic loads applied on the nodes considering the local relative wind speed, angle of attack and aerodynamic lift and drag coefficients. Due to the wide range of angles of attack, a wind turbine blade operates, the airfoil used on the model was NREL SERI S809 which allowed obtaining equations for Cl and Cd as functions of the angle of attack, based on a NASA study. Tridimensional flow effects were no taken in part, as well as torsion of the beam, which only bends. The results showed the dynamic response of the system in terms of displacement and rotational speed as the turbine reached the final speed. Although the results were not compared to real windmills or more complete models, the resulting values were consistent with the size of the system and wind speed.

Keywords: blade aerodynamics, fluid–structure interaction, wind turbine aerodynamics, wind turbine blade

Procedia PDF Downloads 256
2002 The Optimum Operating Conditions for the Synthesis of Zeolite from Waste Incineration Fly Ash by Alkali Fusion and Hydrothermal Methods

Authors: Yi-Jie Lin, Jyh-Cherng Chen

Abstract:

The fly ash of waste incineration processes is usually hazardous and the disposal or reuse of waste incineration fly ash is difficult. In this study, the waste incineration fly ash was converted to useful zeolites by the alkali fusion and hydrothermal synthesis method. The influence of different operating conditions (the ratio of Si/Al, the ratio of hydrolysis liquid to solid, and hydrothermal time) was investigated to seek the optimum operating conditions for the synthesis of zeolite from waste incineration fly ash. The results showed that concentrations of heavy metals in the leachate of Toxicity Characteristic Leaching Procedure (TCLP) were all lower than the regulatory limits except lead. The optimum operating conditions for the synthesis of zeolite from waste incineration fly ash by the alkali fusion and hydrothermal synthesis method were Si/Al=40, NaOH/ash=1.5, alkali fusion at 400 oC for 40 min, hydrolysis with Liquid to Solid ratio (L/S)= 200 at 105 oC for 24 h, and hydrothermal synthesis at 105 oC for 24 h. The specific surface area of fly ash could be significantly increased from 8.59 m2/g to 651.51 m2/g (synthesized zeolite). The influence of different operating conditions on the synthesis of zeolite from waste incineration fly ash followed the sequence of Si/Al ratio > hydrothermal time > hydrolysis L/S ratio. The synthesized zeolites can be reused as good adsorbents to control the air or wastewater pollutants. The purpose of fly ash detoxification, reduction and waste recycling/reuse is achieved successfully.

Keywords: alkali fusion, hydrothermal, fly ash, zeolite

Procedia PDF Downloads 225
2001 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 262
2000 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 284
1999 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 335
1998 Study on Reusable, Non Adhesive Silicone Male External Catheter: Clinical Proof of Study and Quality Improvement Project

Authors: Venkata Buddharaju, Irene Mccarron, Hazel Alba

Abstract:

Introduction: Male external catheters (MECs) are commonly used to collect and drain urine. MECs are increasingly used in acute care, long-term acute care hospitals, and nursing facilities, and in other patients as an alternative to invasive urinary catheters to reduce catheter-associated urinary tract infections (CAUTI).MECs are also used to avoid the need for incontinence pads and diapers. Most of the Male External Catheters are held in place by skin adhesive, with the exception of a few, which uses a foam strap clamp around the penile shaft. The adhesive condom catheters typically stay for 24 hours or less. It is also a common practice that extra skin adhesive tape is wrapped around the condom catheter for additional security of the device. The fixed nature of the adhesive will not allow the normal skin expansion of penile size over time. The adhesive can cause skin irritation, redness, erosion, and skin damage. Acanthus condom catheter (ACC) is a patented, specially designed, stretchable silicone catheter without adhesive, adapts to the size and contour of the penis. It is held in place with a single elastic strap that wraps around the lower back and tied to the opposite catheter ring holescriss cross. It can be reused for up to 5 days on the same patient after daily cleaning and washingpotentially reducing cost. Methods: The study was conducted from September 17th to October 8th, 2020. The nursing staff was educated and trained on how to use and reuse the catheter. After identifying five (5) appropriate patients, the catheter was placed and maintained by nursing staff. The data on the ease of use, leak, and skin damage were collected and reported by nurses to the nursing education department of the hospital for analysis. Setting: RML Chicago, long-term acute care hospital, an affiliate of Loyola University Medical Center, Chicago, IL USA. Results: The data showed that the catheter was easy to apply, remove, wash and reuse, without skin problems or urine infections. One patient had used for 16 days after wash, reuse, and replacement without any urine leak or skin issues. A minimal leak was observed on two patients. Conclusion: Acanthus condom catheter was easy to use, functioned well with minimal or no leak during use and reuse. The skin was intact in all patients studied. There were no urinary tract infections in any of the studied patients.

Keywords: CAUTI, male external catheter, reusable, skin adhesive

Procedia PDF Downloads 97
1997 Reuse of Wastewater from the Treated Water Pre-treatment Plant for Agricultural Purposes

Authors: Aicha Assal, El Mostapha Lotfi

Abstract:

According to data from the Directorate General of Meteorology (DGM), the average amount of precipitation recorded nationwide between September 1, 2021, and January 31, 2022, is 38.8 millimeters. This is well below the climatological normal of 106.8 millimeters for the same period between 1981 and 2010. This situation is becoming increasingly worrying, particularly for farmers who are finding it difficult to irrigate their land and feed their livestock. Drought is greatly influenced by the effects of climate change, mainly caused by pollution and greenhouse gases (GHGs). The aim of this work is to contribute to the purification of wastewater (considered as polluting) in order to reuse it for irrigation in agricultural areas or for livestock watering. This will be achieved once physico-chemical treatment tests on these waters have been carried out and validated. The main parameters analyzed in this study, after carrying out discoloration tests on domestic wastewater, include COD (chemical oxygen demand), BOD5 (biochemical oxygen demand), pH, conductivity, dissolved oxygen, suspended solids (SS), phosphate, nitrate, nitrite and ammonium ions, faecal and total coliforms, as well as monitoring heavy metal concentrations. This work is also aimed at reclaiming the sludge produced by the decantation process, which will enable the waste to be transformed and reused as compost in agriculture and gardening.

Keywords: wastewater, irrigation, COD, COB, SS

Procedia PDF Downloads 59
1996 Integrated Wastewater Reuse Project of the Faculty of Sciences AinChock, Morocco

Authors: Nihad Chakri, Btissam El Amrani, Faouzi Berrada, Fouad Amraoui

Abstract:

In Morocco, water scarcity requires the exploitation of non-conventional resources. Rural areas are under-equipped with sanitation infrastructure, unlike urban areas. Decentralized and low-cost solutions could improve the quality of life of the population and the environment. In this context, the Faculty of Sciences Ain Chock "FSAC" has undertaken an integrated project to treat part of its wastewater using a decentralized compact system. The project will propose alternative solutions that are inexpensive and adapted to the context of peri-urban and rural areas in order to treat the wastewater generated and use it for irrigation, watering, and cleaning. For this purpose, several tests were carried out in the laboratory in order to develop a liquid waste treatment system optimized for local conditions. Based on the results obtained at the laboratory scale of the different proposed scenarios, we designed and implemented a prototype of a mini wastewater treatment plant for the Faculty. In this article, we will outline the steps of dimensioning, construction, and monitoring of the mini-station in our Faculty.

Keywords: wastewater, purification, optimization, vertical filter, MBBR process, sizing, decentralized pilot, reuse, irrigation, sustainable development

Procedia PDF Downloads 102
1995 Used MATLAB Code to Study the Vehicle Bridge Coupling Vibration Based On the Method of Newmark-β

Authors: Saidi Abdelkrim, Hamouine Abdelmadjid, Abdellatif Megnounif

Abstract:

The study of interaction between vehicles and bridge structures has become extremely important. Large deflections and vibration induced by heavy and high-speed vehicles affect significantly the safety and efficiency of bridge. The vibration of a bridge caused by passage of vehicles is one of the most imperative considerations in the design of a bridge as a common sort of transportation structure. A major goal of this study is to create a simplified model of a vehicle bridge system in MATLAB. The model will then be used to study the influence of parameters to vehicle-bridge vibrations.

Keywords: vehicle-bridge interaction, Newmark-β, MATLAB code

Procedia PDF Downloads 593
1994 Modification of the Athena Vortex Lattice Code for the Multivariate Design Synthesis Optimisation of the Blended Wing Body Aircraft

Authors: Paul Okonkwo, Howard Smith

Abstract:

This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology by Mark Drela allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.

Keywords: aerodynamics, automation, optimisation, AVL

Procedia PDF Downloads 645
1993 Transmission of ASCII Code Messages Using a High Power (50mW) Underwater Laser Communication Prototype in Two Controlled Scenarios

Authors: Lessly Borja, Anthony Gualli, Kelly Baño, Fabricio Santacruz

Abstract:

In this article, a prototype of underwater communication using a long-range laser (50mW) has been carried out in two aquatic scenarios (fish tank and swimming pool) with the aim of recreating Aqua-Fi technology (the future of underwater communications) using a Bluetooth connection to the transmitter to send data in ASCII code by means of light. Initially, the transmitter and receiver circuits were programmed in Arduino so that the data would travel by light pulses in the aforementioned code. To obtain the results of the underwater communication, two scenarios were chosen (fish tank and swimming pool), where the power value of the received signal was calculated from its peak-to-peak voltage using the Oscilloscope equipment (ESPOCH). Finally, it was concluded that the maximum communication range of this prototype is 12m underwater, and it was observed that the power decreases as the distance increases. However, this prototype still needs to improve communication so that the information is not distorted or lost when there is movement and dispersion of the water. It is hoped that it will form the basis for future research.

Keywords: prototype, underwater, communication, power, voltage, distance

Procedia PDF Downloads 68
1992 Seismic Retrofits – A Catalyst for Minimizing the Building Sector’s Carbon Footprint

Authors: Juliane Spaak

Abstract:

A life-cycle assessment was performed, looking at seven retrofit projects in New Zealand using LCAQuickV3.5. The study found that retrofits save up to 80% of embodied carbon emissions for the structural elements compared to a new building. In other words, it is only a 20% carbon investment to transform and extend a building’s life. In addition, the systems were evaluated by looking at environmental impacts over the design life of these buildings and resilience using FEMA P58 and PACT software. With the increasing interest in Zero Carbon targets, significant changes in the building and construction sector are required. Emissions for buildings arise from both embodied carbon and operations. Based on the significant advancements in building energy technology, the focus is moving more toward embodied carbon, a large portion of which is associated with the structure. Since older buildings make up most of the real estate stock of our cities around the world, their reuse through structural retrofit and wider refurbishment plays an important role in extending the life of a building’s embodied carbon. New Zealand’s building owners and engineers have learned a lot about seismic issues following a decade of significant earthquakes. Recent earthquakes have brought to light the necessity to move away from constructing code-minimum structures that are designed for life safety but are frequently ‘disposable’ after a moderate earthquake event, especially in relation to a structure’s ability to minimize damage. This means weaker buildings sit as ‘carbon liabilities’, with considerably more carbon likely to be expended remediating damage after a shake. Renovating and retrofitting older assets plays a big part in reducing the carbon profile of the buildings sector, as breathing new life into a building’s structure is vastly more sustainable than the highest quality ‘green’ new builds, which are inherently more carbon-intensive. The demolition of viable older buildings (often including heritage buildings) is increasingly at odds with society’s desire for a lower carbon economy. Bringing seismic resilience and carbon best practice together in decision-making can open the door to commercially attractive outcomes, with retrofits that include structural and sustainability upgrades transforming the asset’s revenue generation. Across the global real estate market, tenants are increasingly demanding the buildings they occupy be resilient and aligned with their own climate targets. The relationship between seismic performance and ‘sustainable design’ has yet to fully mature, yet in a wider context is of profound consequence. A whole-of-life carbon perspective on a building means designing for the likely natural hazards within the asset’s expected lifespan, be that earthquake, storms, damage, bushfires, fires, and so on, ¬with financial mitigation (e.g., insurance) part, but not all, of the picture.

Keywords: retrofit, sustainability, earthquake, reuse, carbon, resilient

Procedia PDF Downloads 63
1991 The Effect of Static Balance Enhance by Table Tennis Training Intervening on Deaf Children

Authors: Yi-Chun Chang, Ching-Ting Hsu, Wei-Hua Ho, Yueh-Tung Kuo

Abstract:

Children with hearing impairment have deficits of balance and motors. Although most of parents teach deaf children communication skills in early life, but rarely teach the deficits of balance. The purpose of this study was to investigate whether static balance improved after table tennis training. Table tennis training was provided four times a week for eight weeks to two 12-year-old deaf children. The table tennis training included crossover footwork, sideway attack, backhand block-sideways-flutter forehand attack, and one-on-one tight training. Data were gathered weekly and statistical comparisons were made with a paired t-test. We observed that the dominant leg is better than the non-dominant leg in static balance and girl balance ability is better than boy. The final result shows that table tennis training significantly improves the deaf children’s static balance performance. It indicates that table tennis training on deaf children helps the static balance ability.

Keywords: deaf children, static balance, table tennis, vestibular structure

Procedia PDF Downloads 412
1990 Cooperative CDD scheme Based on Adaptive Modulation in Wireless Communiation System

Authors: Seung-Jun Yu, Hwan-Jun Choi, Hyoung-Kyu Song

Abstract:

Among spatial diversity scheme, orthogonal space-time block code (OSTBC) and cyclic delay diversity (CDD) have been widely studied for the cooperative wireless relaying system. However, conventional OSTBC and CDD cannot cope with change in the number of relays owing to low throughput or error performance. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation at the source and adaptive modulation based on cyclic redundancy check (CRC) code at the relays.

Keywords: adaptive modulation, cooperative communication, CDD, OSTBC

Procedia PDF Downloads 417
1989 Linear Codes Afforded by the Permutation Representations of Finite Simple Groups and Their Support Designs

Authors: Amin Saeidi

Abstract:

Using a representation-theoretic approach and considering G to be a finite primitive permutation group of degree n, our aim is to determine linear codes of length n that admit G as a permutation automorphism group. We can show that in some cases, every binary linear code admitting G as a permutation automorphism group is a submodule of a permutation module defined by a primitive action of G. As an illustration of the method, we consider the sporadic simple group M₁₁ and the unitary group U(3,3). We also construct some point- and block-primitive 1-designs from the supports of some codewords of the codes in the discussion.

Keywords: linear code, permutation representation, support design, simple group

Procedia PDF Downloads 69
1988 Code-Switching as a Bilingual Phenomenon among Students in Prishtina International Schools

Authors: Festa Shabani

Abstract:

This paper aims at investigating bilingual speech in the International Schools of Prishtina. More particularly, it seeks to analyze bilingual phenomena among adolescent students highly exposed to English with the latter as the language of instruction at school in naturally-occurring conversations within school environment. Adolescence was deliberately chosen since it is regarded as an age when peer influence on language choice is the greatest. Driven by daily unsystematic observation and prior research already undertaken, the hypothesis stated is that Albanian continues to be the dominant language among Prishtina international schools’ students with a lot of code-switched items from the English. Furthermore, they will also use lexical borrowings - words already adapted in the receiving language, from the language they have been in contact with, in their speech often in the lack of existing equivalents in Albanian or for other reasons. This is done owing to the fact that the language of instruction at school is English, and any topic related to the language they have been exposed to will trigger them to use English. Therefore, this needs special attention in an attempt to identify patterns of their speech; in this way, linguistic and socio-pragmatic factors will be considered when analyzing the motivations behind their language choice. Methodology for collecting data include participant systematic observation and tape-recording. While observing them in their natural conversations, the fieldworker also took notes, which helped transcribe details better. The paper starts by raising the question of whether code-switching is occurring among Prishtina International Schools’ students highly exposed to English. The data gathered from students in informal settings suggests that there are well-founded grounds for an affirmative answer. The participants in this study are observed to be code-switching, although showing differences in degree. However, a generalization cannot be made on the basis of the findings except in so far it appears that English has, in turn, became a language to which they turn when identifying with the group when discussing about particular school topics. Particularly, participants seemed to use intra-sentential CS in cases when they seem to find an English expression rather easier than an Albanian one when repeating or emphasizing a point when urged to talk about educational issues with English being their language of instruction, and inter-sentential code-switching, particularly when quoting others. Concerning the grammatical aspect of code-switching, the intrasentential CS is used more than the intersentetial one. Speaking of gender, the results show that there were really no significant differences in regards quantity between male and female participants. However, the slight tendency for men to code switch intrasententially more than women was manifested. Similarly, a slight tendency again for a difference to emerge is on intersentential switching, which contributes 21% to the total number of switches for women, but 11% to the total number of switches for men.

Keywords: Albanian, code-switching contact linguistics, bilingual phenomena, lexical borrowing, English

Procedia PDF Downloads 111
1987 Unsteady 3D Post-Stall Aerodynamics Accounting for Effective Loss in Camber Due to Flow Separation

Authors: Aritras Roy, Rinku Mukherjee

Abstract:

The current study couples a quasi-steady Vortex Lattice Method and a camber correcting technique, ‘Decambering’ for unsteady post-stall flow prediction. The wake is force-free and discrete such that the wake lattices move with the free-stream once shed from the wing. It is observed that the time-averaged unsteady coefficient of lift sees a relative drop at post-stall angles of attack in comparison to its steady counterpart for some angles of attack. Multiple solutions occur at post-stall and three different algorithms to choose solutions in these regimes show both unsteadiness and non-convergence of the iterations. The distribution of coefficient of lift on the wing span also shows sawtooth. Distribution of vorticity changes both along span and in the direction of the free-stream as the wake develops over time with distinct roll-up, which increases with time.

Keywords: post-stall, unsteady, wing, aerodynamics

Procedia PDF Downloads 358
1986 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme

Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh

Abstract:

This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.

Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature

Procedia PDF Downloads 490
1985 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 304
1984 Method of False Alarm Rate Control for Cyclic Redundancy Check-Aided List Decoding of Polar Codes

Authors: Dmitry Dikarev, Ajit Nimbalker, Alexei Davydov

Abstract:

Polar coding is a novel example of error correcting codes, which can achieve Shannon limit at block length N→∞ with log-linear complexity. Active research is being carried to adopt this theoretical concept for using in practical applications such as 5th generation wireless communication systems. Cyclic redundancy check (CRC) error detection code is broadly used in conjunction with successive cancellation list (SCL) decoding algorithm to improve finite-length polar code performance. However, there are two issues: increase of code block payload overhead by CRC bits and decrease of CRC error-detection capability. This paper proposes a method to control CRC overhead and false alarm rate of polar decoding. As shown in the computer simulations results, the proposed method provides the ability to use any set of CRC polynomials with any list size while maintaining the desired level of false alarm rate. This level of flexibility allows using polar codes in 5G New Radio standard.

Keywords: 5G New Radio, channel coding, cyclic redundancy check, list decoding, polar codes

Procedia PDF Downloads 227
1983 Distinctive Features of Legal Relations in the Area of Subsoil Use, Renewal and Protection in Ukraine

Authors: N. Maksimentseva

Abstract:

The issue of public administration in subsoil use, renewal and protection is of high importance for Ukraine since it is strongly linked to energy security of the state as well as it shall facilitate the people of Ukraine to efficiently implement its propitiatory rights towards natural resources and redistribution of national wealth. As it is stipulated in the Article 11 of the Subsoil Code of Ukraine (the Code) the authorities that administer the industry are limited to central executive bodies and local governments. In particular, it is stipulated in the Code that the Ukraine’s Cabinet of Ministers carries out public administration in geological exploration, production and protection of subsoil. Other state bodies of public administration include central public authority responsible for state environmental protection policies; central public authority in charge of implementation of state geological exploration and efficient subsoil use policies; central authority in charge of state health and safety control policies. There are also public authorities in the Autonomous Republic of Crimea; local executive bodies and other state authorities and local self-government authorities in compliance with laws of Ukraine. This article is devoted to the analysis of the legal relations in the area of public administration of subsoil use, renewal and protection in Ukraine. The main approaches to study the essence of legal relations in the named area as well as its tasks, functions and methods are analyzed. It is concluded in this article that legal relationship in the field of public administration of subsoil use, renewal and protection is characterized by specifics of its task (development of natural resources).

Keywords: legal relations, public administration, subsoil code of Ukraine, subsoil use, renewal and protection

Procedia PDF Downloads 342
1982 Embarrassment as a Trigger Factor of Code Switching From Arabic to English in Egypt: A Case Study in Sociolinguistic

Authors: Samar Mohamed Magdy Abdelrahim

Abstract:

This study is an attempt to investigate the phenomenon of code-switching that takes place between Arabic and English in social discourse among high, well-educated, and young people in Egypt. The study aims at digging deeper to extract the trigger factors of such occurrences, namely when people encounter embarrassing situations in their daily conversations. Nowadays, most young Egyptians tend to use English words in certain situations that might make them feel embarrassed. To disguise their feelings and soften the impact of these words in the context, they code-switch (CS) from Arabic into English. To obtain accurate results, the study utilized a quantitative analysis approach that combines personal observations and a questionnaire to examine the phenomenon appropriately. The questionnaire was designed to categorize different types of embarrassing topics to be evaluated by participants. These topics include certain parts of the human body, types of clothes, taboo words, and specific medical conditions. Many studies have examined the use of CS as a prestigious way of communicating and expressing solidarity between Arabic and English. Other studies have dealt with switches that take place in classrooms. However, not many studies have paid attention to this angle of CS, especially in Egypt. The results conclude that gender and the circumstances that surround the conversation are essential factors of CS since females tend to switch codes more than males in embarrassing situations. According to the study, CS serves the socio-pragmatic function in terms of helping young, well-educated bilinguals express themselves in a second language that would be distressing in the first.

Keywords: code-switching, embarrassment, Arabic, English

Procedia PDF Downloads 81
1981 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete

Authors: Gashaw Abebaw

Abstract:

Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.

Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan

Procedia PDF Downloads 110
1980 Utilising Reuse and Recycling Strategies for Costume Design in Kuwait Theatre

Authors: Ali Dashti

Abstract:

Recycling materials within the realms of theatrical costume design and production is important. When a Kuwaiti play finishes its run, costumes are thrown away and new ones are designed when necessary. This practice indicates a lack of awareness of recycling strategies. This is a serious matter; tons of textile materials are being wasted rather than recycled. The current process of producing costumes for Kuwait theatre productions involves the conception and sketching of costumes, the purchase of new fabrics, and the employment of tailors for production. Since tailoring is outsourced, there is a shortage of designers who can make costumes autonomously. The current process does not incorporate any methods for recycling costumes. This combined with high levels of textile waste, results in significant ecological issues that demand immediate attention. However, data collected for this research paper, from a series of semi-structured interviews, have indicated that a lack of recycling facilities and increased textile waste do not present an area of concern within the Kuwaiti theatrical costume industry. This paper will review the findings of this research project and investigate the production processes used by costume designers in Kuwait. It will indicate how their behaviors, coupled with their lack of knowledge with using recycling strategies to create costumes, had increased textile waste and negatively affected Kuwait theatre costume design industry.

Keywords: costume, recycle, reuse, theatre

Procedia PDF Downloads 150
1979 Comparative Study of the Distribution of Seismic Loads of Buildings with Asymmetries Plan

Authors: Ahmed Hamza Yache

Abstract:

The main purpose of this study is to estimate the distribution of shear forces in building structures with asymmetries in the plan submitted to seismic forces can cause, in this case, simultaneous deformations of translation and torsion. To this end, the distribution of shear forces is obtained by seismic forces calculated from the equivalent static method of the Algerian earthquake code RPA 99 (2003 version) and spectral modal analysis for an irregular building plan without kinks. Comparison of the results obtained by these two methods used to highlight the difference in terms of distributions of shear forces in such structures.

Keywords: structure, irregular, code, seismic, method, force, period

Procedia PDF Downloads 569
1978 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 51
1977 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel

Authors: Afif J. Arabi

Abstract:

On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.

Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory

Procedia PDF Downloads 23
1976 Auditor with the Javanese Characters: Revealing the Relationship towards Its Client

Authors: Krisna Damayanti

Abstract:

Negative issue about the relationship between auditors and clients often heard. It arises in view of the rise of a variety of phenomena resulting from the audit practice of greed and do not appreciate the independence of the audit profession and professional code of ethics. It is a logical consequence of the practice of capitalism in accounting. The purpose of this paper would like to uncover the existing auditing practices in Indonesia, especially Java, which is associated with a strong influence of Javanese culture with reluctant/"shy", politely, "legowo", "ngemong" friendly, "not mentholo", "tepo seliro", "ngajeni", "acquiescent". The method used by interpretive approach that emphasizes the role of language, interpret and understand and see social reality as something other than a label, name or concept. Auditing practices in each country has a culture that will affect the standard set by those regulatory standards although there has been an adaptation of IAS. In Indonesia the majority of parties dominated by Javanesse racial regulators, so Java culture is embedded in every audit practices thus conditions in Java requires auditors to behave like that, sometimes interfere with standard Java code of conduct that must be executed by an auditor. Auditors who live in Java have the characters of Javanese culture that is hard to avoid in the audit practice. However, in practice, the auditor still are relevant in their profession.

Keywords: auditors, java, character, profession, code of ethics, client

Procedia PDF Downloads 425
1975 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 245
1974 The Current Importance of the Rules of Civil Procedure in the Portuguese Legal Order: Between Legalism and Adequation

Authors: Guilherme Gomes, Jose Lebre de Freitas

Abstract:

The rules of Civil Procedure that are defined in the Portuguese Civil Procedure Code of 2013 particularly their articles 552 to 626- represent the model that the legislator thought that would be more suitable for national civil litigation, from the moment the action is brought by the plaintiff to the moment when the sentence is issued. However, procedural legalism is no longer a reality in the Portuguese Civil Procedural Law. According to the article 547 of the code of 2013, the civil judge has a duty to adopt the procedure that better suits the circumstances of the case, whether or not it is the one defined by law. The main goal of our paper is to answer the question whether the formal adequation imposed by this article diminishes the importance of the Portuguese rules of Civil Procedure and their daily application by national civil judges. We will start by explaining the appearance of the abovementioned rules in the Civil Procedure Code of 2013. Then we will analyse, using specific examples that were obtained by the books we read, how the legal procedure defined in the abovementioned code does not suit the circumstances of some specific cases and is totally inefficient in some situations. After that, we will, by using the data obtained in the practical research that we are conducting in the Portuguese civil courts within the scope of our Ph.D. thesis (until now, we have been able to consult 150 civil lawsuits), verify whether and how judges and parties make the procedure more efficient and effective in the case sub judice. In the scope of our research, we have already reached some preliminary findings: 1) despite the fact that the legal procedure does not suit the circumstances of some civil lawsuits, there are only two situations of frequent use of formal adequation (the judge allowing the plaintiff to respond to the procedural exceptions deduced in the written defense and the exemption from prior hearing for the judges who never summon it), 2) the other aspects of procedural adequation (anticipation of the production of expert evidence, waiving of oral argument at the final hearing, written allegations, dismissal of the dispatch on the controversial facts and the examination of witnesses at the domicile of one of the lawyers) are still little used and 3) formal adequation tends to happen by initiative of the judge, as plaintiffs and defendants are afraid of celebrating procedural agreements in most situations. In short, we can say that, in the Portuguese legal order of the 21st century, the flexibility of the legal procedure, as it is defined in the law and applied by procedural subjects, does not affect the importance of the rules of Civil Procedure of the code of 2013.

Keywords: casuistic adequation, civil procedure code of 2013, procedural subjects, rules of civil procedure

Procedia PDF Downloads 122