Search results for: threats identification
3246 Frequency Domain Decomposition, Stochastic Subspace Identification and Continuous Wavelet Transform for Operational Modal Analysis of Three Story Steel Frame
Authors: Ardalan Sabamehr, Ashutosh Bagchi
Abstract:
Recently, Structural Health Monitoring (SHM) based on the vibration of structures has attracted the attention of researchers in different fields such as: civil, aeronautical and mechanical engineering. Operational Modal Analysis (OMA) have been developed to identify modal properties of infrastructure such as bridge, building and so on. Frequency Domain Decomposition (FDD), Stochastic Subspace Identification (SSI) and Continuous Wavelet Transform (CWT) are the three most common methods in output only modal identification. FDD, SSI, and CWT operate based on the frequency domain, time domain, and time-frequency plane respectively. So, FDD and SSI are not able to display time and frequency at the same time. By the way, FDD and SSI have some difficulties in a noisy environment and finding the closed modes. CWT technique which is currently developed works on time-frequency plane and a reasonable performance in such condition. The other advantage of wavelet transform rather than other current techniques is that it can be applied for the non-stationary signal as well. The aim of this paper is to compare three most common modal identification techniques to find modal properties (such as natural frequency, mode shape, and damping ratio) of three story steel frame which was built in Concordia University Lab by use of ambient vibration. The frame has made of Galvanized steel with 60 cm length, 27 cm width and 133 cm height with no brace along the long span and short space. Three uniaxial wired accelerations (MicroStarin with 100mv/g accuracy) have been attached to the middle of each floor and gateway receives the data and send to the PC by use of Node Commander Software. The real-time monitoring has been performed for 20 seconds with 512 Hz sampling rate. The test is repeated for 5 times in each direction by hand shaking and impact hammer. CWT is able to detect instantaneous frequency by used of ridge detection method. In this paper, partial derivative ridge detection technique has been applied to the local maxima of time-frequency plane to detect the instantaneous frequency. The extracted result from all three methods have been compared, and it demonstrated that CWT has the better performance in term of its accuracy in noisy environment. The modal parameters such as natural frequency, damping ratio and mode shapes are identified from all three methods.Keywords: ambient vibration, frequency domain decomposition, stochastic subspace identification, continuous wavelet transform
Procedia PDF Downloads 2963245 Impact of VARK Learning Model at Tertiary Level Education
Authors: Munazza A. Mirza, Khawar Khurshid
Abstract:
Individuals are generally associated with different learning styles, which have been explored extensively in recent past. The learning styles refer to the potential of an individual by which s/he can easily comprehend and retain information. Among various learning style models, VARK is the most accepted model which categorizes the learners with respect to their sensory characteristics. Based on the number of preferred learning modes, the learners can be categorized as uni-modal, bi-modal, tri-modal, or quad/multi-modal. Although there is a prevalent belief in the learning styles, however, the model is not being frequently and effectively utilized in the higher education. This research describes the identification model to validate teacher’s didactic practice and student’s performance linkage with the learning styles. The identification model is recommended to check the effective application and evaluation of the various learning styles. The proposed model is a guideline to effectively implement learning styles inventory in order to ensure that it will validate performance linkage with learning styles. If performance is linked with learning styles, this may help eradicate the distrust on learning style theory. For this purpose, a comprehensive study was conducted to compare and understand how VARK inventory model is being used to identify learning preferences and their correlation with learner’s performance. A comparative analysis of the findings of these studies is presented to understand the learning styles of tertiary students in various disciplines. It is concluded with confidence that the learning styles of students cannot be associated with any specific discipline. Furthermore, there is not enough empirical proof to link performance with learning styles.Keywords: learning style, VARK, sensory preferences, identification model, didactic practices
Procedia PDF Downloads 2773244 Design and Implementation of Active Radio Frequency Identification on Wireless Sensor Network-Based System
Authors: Che Z. Zulkifli, Nursyahida M. Noor, Siti N. Semunab, Shafawati A. Malek
Abstract:
Wireless sensors, also known as wireless sensor nodes, have been making a significant impact on human daily life. The Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two complementary technologies; hence, an integrated implementation of these technologies expands the overall functionality in obtaining long-range and real-time information on the location and properties of objects and people. An approach for integrating ZigBee and RFID networks is proposed in this paper, to create an energy-efficient network improved by the benefits of combining ZigBee and RFID architecture. Furthermore, the compatibility and requirements of the ZigBee device and communication links in the typical RFID system which is presented with the real world experiment on the capabilities of the proposed RFID system.Keywords: mesh network, RFID, wireless sensor network, zigbee
Procedia PDF Downloads 4613243 The Role of Self-Compassion for the Diagnosis of Social Anxiety Disorder in Adolescents
Authors: Diana Vieira Figueiredo, Rita Ramos Miguel, Maria do Céu Salvador, Luiza Nobre-Lima, Daniel RIjo, Paula Vagos
Abstract:
Social Anxiety Disorder (SAD) is characterized by a marked and persistent fear of social and/or performance situations in which one may be exposed to the scrutiny of others. SAD has its usual onset and is highly prevalent during adolescence; if left untreated, it often has a chronic and unremitting course. So, it seems important to understand the psychological processes that might predict the development of SAD. One of these processes may be self-compassion, which has been found to be associated with social anxiety in both adults and adolescents. Self-compassion involves three main components, each with a positive (compassionate behavior) and negative (uncompassionate behavior) pole – self-kindness versus self-judgment, common humanity versus isolation, and mindfulness versus over-identification. The negative indicators of self-compassion (self-judgement, isolation, and over-identification) were found to be more strongly linked to mental health problems than the positive indicators (self-kindness, common humanity, and mindfulness). Additionally, negative associations were found between the positive indicators of self-compassion (self-kindness, common humanity, mindfulness) and psychopathology. The current study aimed to investigate the role of self-kindness, self-judgment, common humanity, isolation, mindfulness, and over-identification in the likelihood of an adolescent presenting SAD by comparing groups of normative and socially anxious adolescents. The sample consisted of 32 adolescents (Mage = 15.88, SD = .833) of which 23 were girls. Adolescents were assessed through a clinical structured interview that led 17 to be assigned to the clinical group (presenting a primary diagnosis of SAD) and 15 to be assigned to the non-clinical group (presenting no clinical diagnosis). Variables under study were measured through the Self-Compassion Scale for adolescents (SCS-A), which assesses the six indicators of self-compassion presented above. Six separate models were tested, each with one of the subscales of the SCS-A as the independent variable and with the group (clinical versus non-clinical) as the dependent variable. The models considering isolation, over-identification, self-judgement, and self-kindness fitted the data and accurately predicted group belonging for between 75% to 84.4% of cases. Results indicated that the log of the odds of an adolescent presenting SAD was positively related to isolation, over-identification, and self-judgement and negatively associated with self-kindness. Findings provide support for the idea that decreased self-compassion may place adolescents at increased risk for experiencing clinical levels of social anxiety: on the one hand, adolescents with higher levels of isolation, over-identification, and self-judgement seem to be more prone to the development of psychopathological levels of social anxiety; on the other hand, self-kindness may play a protective role in the development of SAD in this developmental phase. So, if focusing on social feared consequences and perceiving to be different from others may be distinctive features of SAD, developing self-kindness may be the antidote to promote diminished levels of social anxiety and more.Keywords: adolescents, social anxiety disorder, self-compassion, diagnosis odds-ration
Procedia PDF Downloads 1593242 A Deluge of Disaster, Destruction, Death and Deception: Negative News and Empathy Fatigue in the Digital Age
Authors: B. N. Emenyeonu
Abstract:
Initially identified as sensationalism in the eras of yellow journalism and tabloidization, the inclusion of news which shocks or provokes strong emotional responses among readers, viewers, and browsers has not only remained a persistent feature of journalism but has also seemingly escalated in the current climate of digital and social media. Whether in the relentless revelation of scandals in high places, profiles on people displaced by sporadic wars or natural disasters, gruesome accounts of trucks plowing into pedestrians in a city centre, or the coverage of mourners paying tributes to victims of a mass shooting, mainstream, and digital media are often awash with tragedy, tears, and trauma. While it may aim at inspiring sympathy, outrage, or even remedial reactions, it would appear that the deluge of grief and misery in the news merely generates in the audience a feeling that borders on hearing or seeing too much to care or act. This feeling also appears to be accentuated by the dizzying diffusion of social media news and views, most of whose authenticity is not easily verifiable. Through a survey of 400 regular consumers of news and an in-depth interview of 10 news managers in selected media organizations across the Middle East, this study therefore investigates public attitude to the profusion of bad news in mainstream and digital media. Among other targets, it examines whether the profusion of bad news generates empathy fatigue among the audience and, if so, whether there is any association between biographic variables (profession, age, and gender) and an inclination to empathy fatigue. It also seeks to identify which categories of bad news and media are most likely to drag the audience into indifference. In conclusion, the study discusses the implications of the findings for mass-mediated advocacies such as campaigns against conflicts, corruption, nuclear threats, terrorism, gun violence, sexual crimes, and human trafficking, among other threats to humanity.Keywords: digital media, empathy fatigue, media campaigns, news selection
Procedia PDF Downloads 583241 Distribution of Putative Dopaminergic Neurons and Identification of D2 Receptors in the Brain of Fish
Authors: Shweta Dhindhwal
Abstract:
Dopamine is an essential neurotransmitter in the central nervous system of all vertebrates and plays an important role in many processes such as motor function, learning and behavior, and sensory activity. One of the important functions of dopamine is release of pituitary hormones. It is synthesized from the amino acid tyrosine. Two types of dopamine receptors, D1-like and D2-like, have been reported in fish. The dopamine containing neurons are located in the olfactory bulbs, the ventral regions of the pre-optic area and tuberal hypothalamus. Distribution of the dopaminergic system has not been studied in the murrel, Channa punctatus. The present study deals with identification of D2 receptors in the brain of murrel. A phylogenetic tree has been constructed using partial sequence of D2 receptor. Distribution of putative dopaminergic neurons in the brain has been investigated. Also, formalin induced hypertrophy of neurosecretory cells in murrel has been studied.Keywords: dopamine, fish, pre-optic area, murrel
Procedia PDF Downloads 4213240 Examining the Effects of Ticket Bundling Strategies and Team Identification on Purchase of Hedonic and Utilitarian Options
Authors: Young Ik Suh, Tywan G. Martin
Abstract:
Bundling strategy is a common marketing practice today. In the past decades, both academicians and practitioners have increasingly emphasized the strategic importance of bundling in today’s markets. The reason for increased interest in bundling strategy is that they normally believe that it can significantly increase profits on organization’s sales over time and it is convenient for the customer. However, little efforts has been made on ticket bundling and purchase considerations in hedonic and utilitarian options in sport consumer behavior context. Consumers often face choices between utilitarian and hedonic alternatives in decision making. When consumers purchase certain products, they are only interested in the functional dimensions, which are called utilitarian dimensions. On the other hand, others focus more on hedonic features such as fun, excitement, and pleasure. Thus, the current research examines how utilitarian and hedonic consumption can vary in typical ticket purchasing process. The purpose of this research is to understand the following two research themes: (1) the differential effect of discount framing on ticket bundling: utilitarian and hedonic options and (2) moderating effect of team identification on ticket bundling. In order to test the research hypotheses, an experimental study using a two-way ANOVA, 3 (team identification: low, medium, and high) X 2 (discount frame: ticket bundle sales with utilitarian product, and hedonic product), with mixed factorial design will be conducted to determine whether there is a statistical significance between purchasing intentions of two discount frames of ticket bundle sales within different team identification levels. To compare mean differences among the two different settings, we will create two conditions of ticket bundles: (1) offering a discount on a ticket ($5 off) if they would purchase it along with utilitarian product (e.g., iPhone8 case, t-shirt, cap), and (2) offering a discount on a ticket ($5 off) if they would purchase it along with hedonic product (e.g., pizza, drink, fans featured on big screen). The findings of the current ticket bundling study are expected to have many theoretical and practical contributions and implications by extending the research and literature pertaining to the relationship between team identification and sport consumer behavior. Specifically, this study can provide a reliable and valid framework to understanding the role of team identification as a moderator on behavioral intentions such as purchase intentions. From an academic perspective, the study will be the first known attempt to understand consumer reactions toward different discount frames related to ticket bundling. Even though the game ticket itself is the major commodity of sport event attendance and significantly related to teams’ revenue streams, most recent ticket pricing research has been done in terms of economic or cost-oriented pricing and not from a consumer psychological perspective. For sport practitioners, this study will also provide significant implications. The result will imply that sport marketers may need to develop two different ticketing promotions for loyal fan and non-loyal fans. Since loyal fans concern ticket price than tie-in products when they see ticket bundle sales, advertising campaign should be more focused on discounting ticket price.Keywords: ticket bundling, hedonic, utilitarian, team identification
Procedia PDF Downloads 1663239 Recursive Parametric Identification of a Doubly Fed Induction Generator-Based Wind Turbine
Authors: A. El Kachani, E. Chakir, A. Ait Laachir, A. Niaaniaa, J. Zerouaoui
Abstract:
This document presents an adaptive controller based on recursive parametric identification applied to a wind turbine based on the doubly-fed induction machine (DFIG), to compensate the faults and guarantee efficient of the DFIG. The proposed adaptive controller is based on the recursive least square algorithm which considers that the best estimator for the vector parameter is the vector x minimizing a quadratic criterion. Furthermore, this method can improve the rapidity and precision of the controller based on a model. The proposed controller is validated via simulation on a 5.5 kW DFIG-based wind turbine. The results obtained seem to be good. In addition, they show the advantages of an adaptive controller based on recursive least square algorithm.Keywords: adaptive controller, recursive least squares algorithm, wind turbine, doubly fed induction generator
Procedia PDF Downloads 2883238 Microbial Phylogenetic Divergence between Surface-Water and Sedimentary Ecosystems Drove the Resistome Profiles
Authors: Okugbe Ebiotubo Ohore, Jingli Zhang, Binessi Edouard Ifon, Mathieu Nsenga Kumwimba, Xiaoying Mu, Dai Kuang, Zhen Wang, Ji-Dong Gu, Guojing Yang
Abstract:
Antibiotic pollution and the evolution of antibiotic resistance genes (ARGs) are increasingly viewed as major threats to both ecosystem security and human health, and has drawn attention. This study investigated the fate of antibiotics in aqueous and sedimentary substrates and the impact of ecosystem shifts between water and sedimentary phases on resistome profiles. The findings indicated notable variations in the concentration and distribution patterns of antibiotics across various environmental phases. Based on the partition coefficient (Kd), the total antibiotic concentration was significantly greater in the surface water (1405.45 ng/L; 49.5%) compared to the suspended particulate matter (Kd =0.64; 892.59 ng/g; 31.4%) and sediment (Kd=0.4; 542.64 ng/g; 19.1%). However, the relative abundance of ARGs in surface water and sediment was disproportionate to the abundance of antibiotics concentration, and sediments were the predominant ARGs reservoirs. Phylogenetic divergence of the microbial communities between the surface water and the sedimentary ecosystems potentially played important roles in driving the ARGs profiles between the two distinctive ecosystems. ARGs of Clinical importance; including blaGES, MCR-7.1, ermB, tet(34), tet36, tetG-01, and sul2 were significantly increased in the surface water, while blaCTX-M-01, blaTEM, blaOXA10-01, blaVIM, tet(W/N/W), tetM02, and ermX were amplified in the sediments. cfxA was an endemic ARG in surface-water ecosystems while the endemic ARGs of the sedimentary ecosystems included aacC4, aadA9-02, blaCTX-M-04, blaIMP-01, blaIMP-02, bla-L1, penA, erm(36), ermC, ermT-01, msrA-01, pikR2, vgb-01, mexA, oprD, ttgB, and aac. These findings offer a valuable information for the identification of ARGs-specific high-risk reservoirs.Keywords: antibiotic resistance genes, microbial diversity, suspended particulate matter, sediment, surface water
Procedia PDF Downloads 283237 Structural Identification for Layered Composite Structures through a Wave and Finite Element Methodology
Authors: Rilwan Kayode Apalowo, Dimitrios Chronopoulos
Abstract:
An approach for identifying the geometric and material characteristics of layered composite structures through an inverse wave and finite element methodology is proposed. These characteristics are obtained through multi-frequency single shot measurements. However, it is established that the frequency regime of the measurements does not matter, meaning that both ultrasonic and structural dynamics frequency spectra can be employed. Taking advantage of a full FE (finite elements) description of the periodic composite, the scheme is able to account for arbitrarily complex structures. In order to demonstrate the robustness of the presented scheme, it is applied to a sandwich composite panel and results are compared with that of experimental characterization techniques. Excellent agreement is obtained with the experimental measurements.Keywords: structural identification, non-destructive evaluation, finite elements, wave propagation, layered structures, ultrasound
Procedia PDF Downloads 1433236 Isolation and Molecular Identification of Two Fungal Strains Capable of Degrading hydrocarbon Contaminants on Saudi Arabian Environment
Authors: Amr A. EL Hanafy, Yasir Anwar, Saleh A. Mohamed, Saleh Mohamed Saleh Al-Garni, Jamal S. M. Sabir , Osama A. H. Abu Zinadah, Mohamed Morsi Ahmed
Abstract:
In the vicinity of the red sea about 15 fungi species were isolated from oil contaminated sites. On the basis of aptitude to degrade the crude oil and DCPIP assay, two fungal isolates were selected amongst 15 oil degrading strains. Analysis of ITS-1, ITS-2 and amplicon pyrosequencing studies of fungal diversity revealed that these strains belong to Penicillium and Aspergillus species. Two strains that proved to be the most efficient in degrading crude oil was Aspergillus niger (54 %) and Penicillium commune (48 %) Subsequent to two weeks of cultivation in BHS medium the degradation rate were recorded by using spectrophotometer and GC-MS. Hence, it is cleared that these fungal strains has the capability of degradation and can be utilized for cleaning the Saudi Arabian environment.Keywords: fungal strains, hydrocarbon contaminants, molecular identification, biodegradation, GC-MS
Procedia PDF Downloads 5223235 A Study of the Costs and Benefits of Smart City Projects Including the Scenario of Public-Private Partnerships
Authors: Patrick T. I. Lam, Wenjing Yang
Abstract:
A smart city project embraces benefits and costs which can be classified under direct and indirect categories. Externalities come into the picture, but they are often difficult to quantify. Despite this barrier, policy makers need to carry out cost-benefit analysis to justify the huge investments needed to make a city smart. The recent trend is towards the engagement of the private sector to utilize their resources and expertise, especially in the Information and Communication Technology (ICT) areas, where innovations blossom. This study focuses on the identification of costs (on a life cycle basis) and benefits associated with smart city project developments based on a comprehensive literature review and case studies, where public-private partnerships would warrant consideration, the related costs and benefits are highlighted. The findings will be useful for policy makers of cities.Keywords: smart city projects, costs and benefits, identification, public-private partnerships
Procedia PDF Downloads 3373234 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Abstract:
Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.Keywords: attribution trace, probabilistic relevance, network attack, attacker identification
Procedia PDF Downloads 3663233 Investigating the Factors Affecting Generalization of Deep Learning Models for Plant Disease Detection
Authors: Praveen S. Muthukumarana, Achala C. Aponso
Abstract:
A large percentage of global crop harvest is lost due to crop diseases. Timely identification and treatment of crop diseases is difficult in many developing nations due to insufficient trained professionals in the field of agriculture. Many crop diseases can be accurately diagnosed by visual symptoms. In the past decade, deep learning has been successfully utilized in domains such as healthcare but adoption in agriculture for plant disease detection is rare. The literature shows that models trained with popular datasets such as PlantVillage does not generalize well on real world images. This paper attempts to find out how to make plant disease identification models that generalize well with real world images.Keywords: agriculture, convolutional neural network, deep learning, plant disease classification, plant disease detection, plant disease diagnosis
Procedia PDF Downloads 1453232 A Cross-Dialect Statistical Analysis of Final Declarative Intonation in Tuvinian
Authors: D. Beziakina, E. Bulgakova
Abstract:
This study continues the research on Tuvinian intonation and presents a general cross-dialect analysis of intonation of Tuvinian declarative utterances, specifically the character of the tone movement in order to test the hypothesis about the prevalence of level tone in some Tuvinian dialects. The results of the analysis of basic pitch characteristics of Tuvinian speech (in general and in comparison with two other Turkic languages - Uzbek and Azerbaijani) are also given in this paper. The goal of our work was to obtain the ranges of pitch parameter values typical for Tuvinian speech. Such language-specific values can be used in speaker identification systems in order to get more accurate results of ethnic speech analysis. We also present the results of a cross-dialect analysis of declarative intonation in the poorly studied Tuvinian language.Keywords: speech analysis, statistical analysis, speaker recognition, identification of person
Procedia PDF Downloads 4703231 Artificial Neural Networks Controller for Active Power Filter Connected to a Photovoltaic Array
Authors: Rachid Dehini, Brahim Berbaoui
Abstract:
The main objectives of shunt active power filter (SAPF) is to preserve the power system from unwanted harmonic currents produced by nonlinear loads, as well as to compensate the reactive power. The aim of this paper is to present a (PAPF) supplied by the Photovoltaic cells ,in such a way that the (PAPF) feeds the linear and nonlinear loads by harmonics currents and the excess of the energy is injected into the power system. In order to improve the performances of conventional (PAPF) This paper also proposes artificial neural networks (ANN) for harmonics identification and DC link voltage control. The simulation study results of the new (SAPF) identification technique are found quite satisfactory by assuring good filtering characteristics and high system stability.Keywords: SAPF, harmonics current, photovoltaic cells, MPPT, artificial neural networks (ANN)
Procedia PDF Downloads 3313230 Freshwater Fish Diversity and IUCN Status of Glacial-fed (Bheri) and Spring-fed (Babai) Rivers in the Wake of Inter-basin Water Transfer
Authors: Kumar Khatri, Bibhuti Ranjan Jha, Smriti Gurung, Udhab Raj Khadka
Abstract:
Freshwater fishes are crucial components of aquatic ecosystems but are being affected by a range of anthropogenic activities. A large number of freshwater bodies in Nepal are under different anthropogenic threats, thereby affecting freshwater biodiversity, including fish fauna. Inter-basin water transfer (IBWT) involving damming and diversion has been considered as one of the major threats to the rivers, yet many such projects are in the pipeline. Impact assessment of such projects include generation of baseline information on different biotic and abiotic variables. The aim of this study was to generate baseline information on fish diversity from the glacial-fed Bheri and the spring-fed Babai rivers and their selected tributaries from Western Nepal in the wake of the first inter-basin water transfer from the former to the latter. A total of 10 sites, 5 each from Bheri and Babai systems, were chosen strategically. Seasonal electrofishing was conducted in 2018 following the standard method. A total of 32 species with Catch per Unite Effort (CPUE) of 46.94±24.06 from Bheri and 42 species with CPUE of 63.02±51.80 from Babai were recorded. Cyprinidae, followed by Nemacheilidae, were the most dominant fish Family in both river systems. Barilius vagra and Schistura beavani were the most dominant species in the Bheri and the Babai systems, respectively. Species richness and abundance showed a significant difference between the rivers. The difference in fish assemblages reflects differences in the ecological regimes of these rivers. Of the total species, at least 8 are in the threatened categories of the IUCN Red List, which need active conservation measures. The findings provide a reference to assess the impacts of water transfers on fish in these river systems and could be helpful to other similar river systems in the future.Keywords: babai river, bheri river, fish diversity, damming
Procedia PDF Downloads 873229 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 2943228 Wildlife Trade and Bushmeat Consumption in Benin City, Southern Nigeria: Conservation Implications and Threats to Biodiversity Sustainability
Authors: Sylvia O. Ogoanah, Khalifa Mustapha, Joshua E. Emedo
Abstract:
Despite the call for wildlife conservation and sustainability, wildlife trade and bushmeat consumption seem to have reached an all-time high in Benin City, Southern Nigeria. This necessitated the survey of wildlife trade, otherwise called bushmeat, in selected markets in Benin City, Southern Nigeria, between December 2015 and May 2016 (dry season) and June to September (rainy season). Although the eight markets randomly selected within the urban and peri-urban areas operate daily, visits were made weekly to prevent double counting of the same live specimen. On each visit, counts were made of live specimens seen while those cut in parts and dried were identified by the vendors before photographing and recording. Quantitative data analysis was done using SPSS 14 software programs. A total of two thousand five hundred and eighty-nine (2589) bushmeat specimens comprising six mammals and a reptile were recorded for the rainy season. These included the grasscutter (Thryonomis swinderianus) with an abundance of 37.9%, duikers (Sylvicapra grimma) 31.8%, porcupines (Artherurus africanus) 25.0 %, alligators (Alligator mississipienus) 3.2%, pangolins (Manis tricuspis) 0.85%, bush-pig (Potachoerus porcus) 0.7%, and the white-throated monkey (Cercopithecus erythrogaster) 0.5%, respectively. The dry season sampling recorded nine thousand seven hundred and ninety-three (9793) specimens comprising four mammals and one reptile. Species recorded included Thryonomis swinderianus (grasscutters) 35.8%, Artherurus africanus (porcupine) 30.1%, Sylvicapra grimmia (duikers) 21.8%, Alligator mississipiensis (alligators) 6.18% with juveniles 2.27% and Manis tricuspis (pangolin) 3.58%, The designated Central bush meat market as well as markets in the peri-urban areas recorded the highest number of specimens. The three dominant species in both rainy and dry seasons were the grasscutters, porcupines, and duikers, with the grasscutter having the highest dominance of 37.9% and 35.8%, respectively. There was a significant difference between the rainy and dry season samplings p=0.001. The increase in specimens collected in the dry season could be due to greater exposure due to reduced vegetation cover. The high number of specimens arising from weekly sampling from markets that operate daily could be used as an estimation of wildlife specimens captured over the period. This poses a great threat to wildlife conservation as juveniles, as well as endangered species, are hunted indiscriminately. Educating the people with emphasis on the importance of sustainability and conservation, rearing of the grasscutter, which is in high demand and enforcement of existing laws on wildlife trade offenses would help in reducing threats to wildlife conservation.Keywords: bushmeat consumption, conservation implications, Southern Nigeria, threats, wildlife trade
Procedia PDF Downloads 263227 Dialect as a Means of Identification among Hausa Speakers
Authors: Hassan Sabo
Abstract:
Language is a system of conventionally spoken, manual and written symbols by human beings that members of a certain social group and participants in its culture express themselves. Communication, expression of identity and imaginative expression are among the functions of language. Dialect is a form of language, or a regional variety of language that is spoken in a particular geographical setting by a particular group of people. Hausa is one of the major languages in Africa, in terms of large number of people for whom it is the first language. Hausa is one of the western Chadic groups of languages. It constitutes one of the five or six branches of Afro-Asiatic family. The predominant Hausa speakers are in Nigeria and they live in different geographical locations which resulted to variety of dialects within the Hausa language apart of the standard Hausa language, the Hausa language has a variety of dialect that distinguish from one another by such features as phonology, grammar and vocabulary. This study intends to examine such features that serve as means of identification among Hausa speakers who are set off from others, geographically or socially.Keywords: dialect, features, geographical location, Hausa language
Procedia PDF Downloads 1943226 Age and Sex Identification among Egyptian Population Using Fingerprint Ridge Density
Authors: Nazih Ramadan, Manal Mohy-Eldine, Amani Hanoon, Alaa Shehab
Abstract:
Background and Aims: The study of fingerprints is widely used in providing a clue regarding identity. Age and gender identification from fingerprints is an important step in forensic anthropology in order to minimize the list of suspects search. The aim of this study was to determine finger ridge density and patterns among Egyptians, and to estimate age and gender using ridge densities. Materials and Methods: This study was conducted on 177 randomly-selected healthy Egyptian subjects (90 males and 87 females). They were divided into three age groups; Group (a): from 6-< 12 years, group (b) from 12-< 18 years and group (c) ≥ 18 years. Bilateral digital prints, from every subject, were obtained by the inking procedure. Ridge count per 25 mm² was determined together with assessment of ridge pattern type. Statistical analysis was done with references to different age and sex groups. Results: There was a statistical significant difference in ridge density between the different age groups; where younger ages had significantly higher ridge density than older ages. Females proved to have significantly higher ridge density than males. Also, there was a statistically significant negative correlation between age and ridge density. Ulnar loops were the most frequent pattern among Egyptians then whorls then arches then radial loops. Finally, different regression models were constructed to estimate age and gender from fingerprints ridge density. Conclusion: fingerprint ridge density can be used to identify both age and sex of subjects. Further studies are recommended on different populations, larger samples or using different methods of fingerprint recording and finger ridge counting.Keywords: age, sex identification, Egyptian population, fingerprints, ridge density
Procedia PDF Downloads 3633225 Conflicts Identification Approach among Stakeholders in Goal-Oriented Requirements Analysis
Authors: Muhammad Suhaib
Abstract:
Requirements Analysis are the most important part of software Engineering for both system application development, and project requirements. Conflicts often arise during the requirements gathering and analysis phase. This research aims to identify conflicts during the requirements gathering phase in software development life cycle, Research, Development, and Technology converted the world into a global village. During requirements elicitation/gathering phase it’s very difficult to understand the main objective of stakeholders, after completion of requirements elicitation task final results are used for Software Requirements Specification (SRS), SRS is the highly important outcome of the requirements analysis phase. this is the foundation between the developers and stakeholders or customers, proposed methodology will be helpful to identify those conflicts in a very easy manner during the initial phase of the project.Keywords: goal oriented requirements analysis, conflicts identification model, requirements analysis, requirements engineering
Procedia PDF Downloads 1343224 Identification and Characterization of Inhibitors of Epoxide Hydrolase from Trichoderma reesei
Authors: Gabriel S. De Oliveira, Patricia P. Adriani, Christophe Moriseau, Bruce D. Hammock, Felipe S. Chambergo
Abstract:
Epoxide hydrolases (EHs) are enzymes that are present in all living organisms and catalyze the hydrolysis of epoxides to the corresponding vicinal diols. EHs have high biotechnological interest for the drug design and chemistry transformation for industries. In this study, we describe the identification of substrates and inhibitors of epoxide hydrolase enzyme from the filamentous fungus Trichoderma reesei (TrEH), and these inhibitors showed the fungal growth inhibitory activity. We have used the cloned enzyme and expressed in E. coli to develop the screening in the library of fluorescent substrates with the objective of finding the best substrate to be used in the identification of good inhibitors for the enzyme TrEH. The substrate (3-phenyloxiranyl)-acetic acid cyano-(6-methoxy-naphthalen-2-yl)-methyl ester showed the highest specific activity and was chosen for the next steps of the study. The inhibitors screening was performed in the library with more than three thousand molecules and we could identify the 6 best inhibitors. The IC50 of these molecules were determined in nM and all the best inhibitors have urea or amide in their structure, because It has been recognized that these groups fit well in the hydrolase catalytic pocket of the epoxide hydrolases. Then the growth of T. reesei in PDA medium containing these TrEH inhibitors was tested, and fungal growth inhibition activity was demonstrated with more than 60% of inhibition of fungus growth in the assay with the TrEH inhibitor with the lowest IC50. Understanding how this EH enzyme from T. reesei responds to inhibitors may contribute for the study of fungal metabolism and drug design against pathogenic fungi.Keywords: epoxide hydrolases, fungal growth inhibition, inhibitor, Trichoderma reesei
Procedia PDF Downloads 2013223 A Qualitative Exploration into Australian Muslims Emerging into Adulthood
Authors: Nuray Okcum, Jenny Sharples
Abstract:
While the scrutinization towards marginalized groups throughout the globe has been existent for decades, prejudice towards Muslims in Western countries has been increasing dramatically. The vicious attacks across the globe by perpetrators who identify with Islam as well as popular political discourse by politicians in Western countries claiming and portraying Muslims as being dangerous, oppressed, or lacking the ability to assimilate into the community, adds to the exclusion and lack of belonging Muslims living in Western countries experience. The early stages of adulthood which have recently been conceptualized as emerging adulthood is a critical and socially ambiguous transition. For a young Muslim emerging into adulthood in a Western country, a variety of different challenges and demands that can exceed their coping abilities can arise. While in search for their identity and in a bid to structure themselves with their past childhood experiences together with their newly forming values, the emerging adult may attempt to direct or change the way in which they are viewed by others. This can be done to gain approval from others and to feel a sense of belonging. A change in the emerging adult’s interpersonal interactions and relationships, the way in which they view themselves and others, their sense of belonging, and their identity, also occurs during this developmental stage. To explore the manner in which Muslims emerging into adulthood carve their identity, their experiences, and representation of their Muslim identity, social identification, and their sense of belonging in Australia, an interpretative phenomenological methodology was utilized. This allowed participants to offer their own subjective experiences. A total of eight emerging adults took part in the study whilst four adults who work with emerging adults took part. Adult participants who work with emerging adults took part in the study to bring forth their insight and experiences. Common experiences were organized into themes. Themes included identifying as a Muslim, social identification, and belonging. Identification included visual identification and name, discrimination and resilience. Findings clearly indicated that Muslims emerging into adulthood in Australia do face various hurdles while they try to retain and represent their religious identity. Despite the unique challenges that they face, they still feel a sense of belonging and identity as being Australian.Keywords: Muslim, Islam, emerging adulthood, Australia
Procedia PDF Downloads 1353222 Plant Identification Using Convolution Neural Network and Vision Transformer-Based Models
Authors: Virender Singh, Mathew Rees, Simon Hampton, Sivaram Annadurai
Abstract:
Plant identification is a challenging task that aims to identify the family, genus, and species according to plant morphological features. Automated deep learning-based computer vision algorithms are widely used for identifying plants and can help users narrow down the possibilities. However, numerous morphological similarities between and within species render correct classification difficult. In this paper, we tested custom convolution neural network (CNN) and vision transformer (ViT) based models using the PyTorch framework to classify plants. We used a large dataset of 88,000 provided by the Royal Horticultural Society (RHS) and a smaller dataset of 16,000 images from the PlantClef 2015 dataset for classifying plants at genus and species levels, respectively. Our results show that for classifying plants at the genus level, ViT models perform better compared to CNN-based models ResNet50 and ResNet-RS-420 and other state-of-the-art CNN-based models suggested in previous studies on a similar dataset. ViT model achieved top accuracy of 83.3% for classifying plants at the genus level. For classifying plants at the species level, ViT models perform better compared to CNN-based models ResNet50 and ResNet-RS-420, with a top accuracy of 92.5%. We show that the correct set of augmentation techniques plays an important role in classification success. In conclusion, these results could help end users, professionals and the general public alike in identifying plants quicker and with improved accuracy.Keywords: plant identification, CNN, image processing, vision transformer, classification
Procedia PDF Downloads 1033221 Abating the Barriers to the Deployment of RFID for Construction Project Delivery in South Africa
Authors: Matthew O. Ikuabe, Ayodeji E. Oke, Clinton O. Aigbavboa, Douglas O. Aghimien
Abstract:
The use of technological innovations have been touted to be beneficial in the delivery of construction projects. Particularly, Radio Frequency Identification (RFID) technology is widely regarded to be of immense advantage for the management of construction projects. This study focused on evaluating the barriers to the use of Radio Frequency Identification (RFID) technology for the delivery of construction projects. Using Gauteng Provincein South Africa as the study area, questionnaire was used in eliciting responses from construction professionals, which made up the population of the study. Retrieved data was analysed using Mean Item Score and One-Sample t-test. Findings from the study showed that the most significant barriers to the deployment of RFID for construction project delivery are high cost and lack of awareness. Conclusively, the study made recommendations that would aid in the abatement of the barriers to the use of RFID technology for construction project delivery.Keywords: barriers, construction, project delivery, RFID
Procedia PDF Downloads 2063220 Isolation and Identification Fibrinolytic Protease Endophytic Fungi from Hibiscus Leaves in Shah Alam
Authors: Mohd Sidek Ahmad, Zainon Mohd Noor, Zaidah Zainal Ariffin
Abstract:
Fibrin degradation is an important part in prevention or treatment of intravascular thrombosis and cardiovascular diseases. Plasmin like fibrinolytic enzymes has given new hope to patient with cardiovascular diseases by treating fibrin aggregation related diseases with traditional plasminogen activator which have many side effects. Various researches involving wide range of sources for production of fibrinolytic proteases, from bacteria, fungi, insects and fermented foods. But few have looked into endophytic fungi as a potential source. Sixteen (16) endophytic fungi were isolated from Hibiscus sp. leaves from six different locations in Shah Alam, Selangor. Only two endophytic fungi, FH3 and S13 showed positive fibrinolytic protease activities. FH3 produced 5.78cm and S13 produced 4.48cm on Skim Milk Agar after 4 days of incubation at 27°C. Fibrinolytic activity was observed; 3.87cm and 1.82cm diameter clear zone on fibrin plate of FH3 and S13 respectively. 18srRNA was done for identification of the isolated fungi with positive fibrinolytic protease. S13 had the highest similarity (100%) to that of Penicillium citrinum strain TG2 and FH3 had the highest similarity (99%) to that of Fusarium sp. FW2PhC1, Fusarium sp. 13002, Fusarium sp. 08006, Fusarium equiseti strain Salicorn 8 and Fungal sp. FCASAn-2. Media composition variation showed the effects of carbon nitrogen on protein concentration, where the decrement of 50% of media composition caused drastic decrease in protease of FH3 from 1.081 to 0.056 and also S13 from 2.946 to 0.198.Keywords: isolation, identification, fibrinolytic protease, endophytic fungi, Hibiscus leaves
Procedia PDF Downloads 4333219 Marketing Strategy and Marketing Mix for Rural Tour Package in Bali: Case Study of Munduk
Authors: Made Darmiati, Ni Putu Evi Wijayanti, Ni Ketut Wiwiek Agustina, Putu Gde Arie Yudhistira, Marcel Hardono
Abstract:
The establishment of tourist village has been the main concern for pro-poor tourism in Indonesia especially in Bali in order to create alternative tourist destination. The case study of this research was Munduk, a tourist village located in Buleleng Regency, Bali Province. Munduk has been unstable in terms of tourist visit in 2012 until 2016. The concept of marketing strategy and its marketing mix are concepts that suitable for application in Munduk as the prime owner of trekking and other rural tour packages to increase the number of visitor in particularly during low season. The research study aims to determine the internal factors (strengths and weaknesses) and external factors (opportunities and threats) impacting the number of tourist visit so that they could formulate appropriate marketing strategy for Munduk Tourist Village. Data has been obtained by observation, interviews with stakeholders, questionnaire to 100 participants and documentation. In addition, this research study uses descriptive qualitative methods and techniques known as SWOT (Strengths, Weaknesses, Opportunities, Threats) analysis by internal factors and external factors impacting the level of tourist visit to Munduk Tourist Village in Buleleng Regency, Bali. The sampling was done by ‘accidental sampling technique’ to obtain the participants to analyse the results of the SWOT analysis. Further assessment of internal and external weights has resulted respectively (1.84 , 1.84) which are in the first quadrant of the diagram in which S-O (Strengths-Opportunities) Strategy. As the prime owner of the trekking and other rural tour packages in the village, Munduk should maximise its strengths and take other opportunities as possible to wrap and design trekking and other rural tour packages and then offer the package to travel agents in Bali.Keywords: marketing mix, marketing strategy, rural tourism, SWOT matrix
Procedia PDF Downloads 2773218 IoT-Based Early Identification of Guava (Psidium guajava) Leaves and Fruits Diseases
Authors: Daudi S. Simbeye, Mbazingwa E. Mkiramweni
Abstract:
Plant diseases have the potential to drastically diminish the quantity and quality of agricultural products. Guava (Psidium guajava), sometimes known as the apple of the tropics, is one of the most widely cultivated fruits in tropical regions. Monitoring plant health and diagnosing illnesses is an essential matter for sustainable agriculture, requiring the inspection of visually evident patterns on plant leaves and fruits. Due to minor variations in the symptoms of various guava illnesses, a professional opinion is required for disease diagnosis. Due to improper pesticide application by farmers, erroneous diagnoses may result in economic losses. This study proposes a method that uses artificial intelligence (AI) to detect and classify the most widespread guava plant by comparing images of its leaves and fruits to datasets. ESP32 CAM is responsible for data collection, which includes images of guava leaves and fruits. By comparing the datasets, these image formats are used as datasets to help in the diagnosis of plant diseases through the leaves and fruits, which is vital for the development of an effective automated agricultural system. The system test yielded the most accurate identification findings (99 percent accuracy in differentiating four guava fruit diseases (Canker, Mummification, Dot, and Rust) from healthy fruit). The proposed model has been interfaced with a mobile application to be used by smartphones to make a quick and responsible judgment, which can help the farmers instantly detect and prevent future production losses by enabling them to take precautions beforehand.Keywords: early identification, guava plants, fruit diseases, deep learning
Procedia PDF Downloads 763217 Parameter Identification Analysis in the Design of Rock Fill Dams
Authors: G. Shahzadi, A. Soulaimani
Abstract:
This research work aims to identify the physical parameters of the constitutive soil model in the design of a rockfill dam by inverse analysis. The best parameters of the constitutive soil model, are those that minimize the objective function, defined as the difference between the measured and numerical results. The Finite Element code (Plaxis) has been utilized for numerical simulation. Polynomial and neural network-based response surfaces have been generated to analyze the relationship between soil parameters and displacements. The performance of surrogate models has been analyzed and compared by evaluating the root mean square error. A comparative study has been done based on objective functions and optimization techniques. Objective functions are categorized by considering measured data with and without uncertainty in instruments, defined by the least square method, which estimates the norm between the predicted displacements and the measured values. Hydro Quebec provided data sets for the measured values of the Romaine-2 dam. Stochastic optimization, an approach that can overcome local minima, and solve non-convex and non-differentiable problems with ease, is used to obtain an optimum value. Genetic Algorithm (GA), Particle Swarm Optimization (PSO) and Differential Evolution (DE) are compared for the minimization problem, although all these techniques take time to converge to an optimum value; however, PSO provided the better convergence and best soil parameters. Overall, parameter identification analysis could be effectively used for the rockfill dam application and has the potential to become a valuable tool for geotechnical engineers for assessing dam performance and dam safety.Keywords: Rockfill dam, parameter identification, stochastic analysis, regression, PLAXIS
Procedia PDF Downloads 146