Search results for: Software as a Service (SaaS)
4284 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 1324283 Particle Dust Layer Density and the Optical Wavelength Absorption Relationship in Photovoltaic Module
Authors: M. Mesrouk, A. Hadj Arab
Abstract:
This work allows highlight the effect of dust on the absorption of the optical spectrum on the photovoltaic module, the effect of the particles dust presence on the photovoltaic modules have been a microscopic scale studied with COMSOL Multi-physic software simulation. In this paper, we have supposed the dust layer as a diffraction network repetitive optical structure characterized by the spacing between particle which represented by 'd' and the simulated structure (air-dust particle-glass). In this study we can observe the relationship between the wavelength and the particle spacing, the simulation shows us that the maximum wavelength transmission value corresponding, λ0 = 400nm, which represent the spacing value between the particles dust, d = 400 nm. In fact, we can observe that while increase dust layer density the wavelength transmission value decrease, there is a relationship between the density and wavelength value which can be absorbed in a dusty photovoltaic panel.Keywords: dust effect, photovoltaic module, spectral absorption, wavelength transmission
Procedia PDF Downloads 4654282 Factors Determining the Purchasing Intentions towards Online Shopping: An Evidence from Twin Cities of Pakistan
Authors: Muhammad Waiz, Rana Maruf Tahir, Fatima Javaid
Abstract:
Technology in the recent times is available for everyone in the world that no one is left behind. After getting technology into our daily routine, there is a need to study the different factors regarding online shopping. This study examines the impact of online reviews, mobile shopping and computer literacy on online purchasing intention. The sample size was 200 from which 167 complete questionnaires were collected from students and employees of twin cities. SPSS programming software was used to analyze the impact of different factors on purchasing intention. The results of this study showed that those websites which have good ratings and have online shopping application will attract more customers towards them whereas the results showed that the computer literacy has no impact on online purchasing intention. Findings may help for those who want to increase their sales or to start a new online business. Future research, limitations, and implications are discussed.Keywords: computer literacy, mobile shopping, online purchase intention, online reviews, theory of planned behavior
Procedia PDF Downloads 2284281 Experimental and Theoretical Study of the Electric and Magnetic Fields Behavior in the Vicinity of High-Voltage Power Lines
Authors: Tourab Wafa, Nemamcha Mohamed, Babouri Abdessalem
Abstract:
This paper consists on an experimental and analytical characterization of the electromagnetic environment in the in the medium surrounding a circuit of two 220 Kv power lines running in parallel. The analysis presented in this paper is divided into two main parts. The first part concerns the experimental study of the behavior of the electric field and magnetic field generated by the selected double-circuit at ground level (0 m). While the second part simulate and calculate the fields profiles generated by the both lines at different levels above the ground, from (0 m) to the level close to the lines conductors (20 m above the ground) using the electrostatic and magneto-static modules of the COMSOL multi-physics software. The implications of the results are discussed and compared with the ICNIRP reference levels for occupational and non occupational exposures.Keywords: HV power lines, low frequency electromagnetic fields, electromagnetic compatibility, inductive and capacitive coupling, standards
Procedia PDF Downloads 4754280 Analysis of the Fair Distribution of Urban Facilities in Kabul City by Population Modeling
Authors: Ansari Mohammad Reza, Hiroko Ono
Abstract:
In this study, we investigated how much of the urban facilities are fairly distributing in the city of Kabul based on the factor of population. To find the answer to this question we simulated a fair model for the distribution of investigated facilities in the city which is proposed based on the consideration of two factors; the number of users for each facility and the average distance of reach of each facility. Then the model was evaluated to make sure about its efficiency. And finally, the two—the existing pattern and the simulation model—were compared to find the degree of bias in the existing pattern of distribution of facilities in the city. The result of the study clearly clarified that the facilities are not fairly distributed in Kabul city based on the factor of population. Our analysis also revealed that the education services and the parks are the most and the worst fair distributed facilities in this regard.Keywords: Afghanistan, ArcGIS Software, Kabul City, fair distribution, urban facilities
Procedia PDF Downloads 1824279 Economical Dependency Evolution and Complexity
Authors: Allé Dieng, Mamadou Bousso, Latif Dramani
Abstract:
The purpose of this work is to show the complexity behind economical interrelations in a country and provide a linear dynamic model of economical dependency evolution in a country. The model is based on National Transfer Account which is one of the most robust methodology developed in order to measure a level of demographic dividend captured in a country. It is built upon three major factors: demography, economical dependency and migration. The established mathematical model has been simulated using Netlogo software. The innovation of this study is in describing economical dependency as a complex system and simulating using mathematical equation the evolution of the two populations: the economical dependent and the non-economical dependent as defined in the National Transfer Account methodology. It also allows us to see the interactions and behaviors of both populations. The model can track individual characteristics and look at the effect of birth and death rates on the evolution of these two populations. The developed model is useful to understand how demographic and economic phenomenon are relatedKeywords: ABM, demographic dividend, National Transfer Accounts (NTA), ODE
Procedia PDF Downloads 2074278 Analysis of the Contribution of Drude and Brendel Model Terms to the Dielectric Function
Authors: Christopher Mkirema Maghanga, Maurice Mghendi Mwamburi
Abstract:
Parametric modeling provides a means to deeper understand the properties of materials. Drude, Brendel, Lorentz and OJL incorporated in SCOUT® software are some of the models used to study dielectric films. In our work, we utilized Brendel and Drude models to extract the optical constants from spectroscopic data of fabricated undoped and niobium doped titanium oxide thin films. The individual contributions by the two models were studied to establish how they influence the dielectric function. The effect of dopants on their influences was also analyzed. For the undoped films, results indicate minimal contribution from the Drude term due to the dielectric nature of the films. However as doping levels increase, the rise in the concentration of free electrons favors the use of Drude model. Brendel model was confirmed to work well with dielectric films - the undoped titanium Oxide films in our case.Keywords: modeling, Brendel model, optical constants, titanium oxide, Drude Model
Procedia PDF Downloads 1844277 Regulating the Emerging Platform Economy in Ethiopia: Issues in the Ride-Hailing Platforms
Authors: Nebiat Lemenih Lenger
Abstract:
Today, the digital economy is evolving faster than ever in Ethiopia. Platforms that provide a ride-hailing service are growing fast in the country. The market welcomed them as they disrupt it with quality services and lower prices. This revolution is, however, not without challenges. These include cybersecurity breaches, facilitating illegal economic activities, and challenging concepts of privacy. To mitigate the risks and utilize the benefits, appropriate regulation should be introduced in the economy. By identifying legal and institutional gaps in Ethiopia`s digital economy, this research work assists the government`s effort to create a better digital economy. Moreover, this study, being a pioneer study in the area, will be an input for further studies in academia. The research employs a qualitative legal research method and analyzes various legal and policy instruments in Ethiopia in comparison with best international experiences. As this research applies a qualitative research method, a grounded theory method of data analysis is used. The research concluded that Ethiopia is far from designing appropriate legal and regulatory infrastructures. Due to the government monopoly of the sector, there is poor digital infrastructure in the country. The existing labor laws have no specific provisions on the rights and obligations of gig workers.Keywords: Ethiopia, gig economy, digital, ride-hailing, regulation
Procedia PDF Downloads 964276 Simulation of Wave Propagation in Multiphase Medium
Authors: Edip Kemal, Sheshov Vlatko, Bojadjieva Julijana, Bogdanovic ALeksandra, Gjorgjeska Irena
Abstract:
The wave propagation phenomenon in porous domains is of great importance in the field of geotechnical earthquake engineering. In these kinds of problems, the elastic waves propagate from the interior to the exterior domain and require special treatment at the computational level since apart from displacement in the solid-state there is a p-wave that takes place in the pore water phase. In this paper, a study on the implementation of multiphase finite elements is presented. The proposed algorithm is implemented in the ANSYS finite element software and tested on one-dimensional wave propagation considering both pore pressure wave propagation and displacement fields. In the simulation of porous media such as soils, the behavior is governed largely by the interaction of the solid skeleton with water and/or air in the pores. Therefore, coupled problems of fluid flow and deformation of the solid skeleton are considered in a detailed way.Keywords: wave propagation, multiphase model, numerical methods, finite element method
Procedia PDF Downloads 1684275 Performance Based Road Asset Evaluation
Authors: Kidus Dawit Gedamu
Abstract:
Addis Ababa City Road Authority is responsible for managing and setting performance evaluation of the city’s road network using the International Roughness Index (IRI). This helps the authority to conduct pavement condition assessments of asphalt roads each year to determine the health status or Level of service (LOS) of the roadway network and plan program improvements such as maintenance, resurfacing and rehabilitation. For a lower IRI limit economical and acceptable maintenance strategy may be selected among a number of maintenance alternatives. The Highway Development and Management (HDM-4) tool can do such measures to help decide which option is the best by evaluating the economic and structural conditions. This paper specifically addresses flexible pavement, including two principal arterial streets under the administration of the Addis Ababa City Roads Authority. The roads include the road from Megenagna Interchange to Ayat Square and from Ayat Square to Tafo RA. First, it was assessed the procedures followed by the city's road authority to develop the appropriate road maintenance strategies. Questionnaire surveys and interviews are used to collect information from the city's road maintenance departments. Second, the project analysis was performed for functional and economic comparison of different maintenance alternatives using HDM-4.Keywords: appropriate maintenance strategy, cost stream, road deterioration, maintenance alternative
Procedia PDF Downloads 624274 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery
Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman
Abstract:
Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.Keywords: CGA, IPv6, NDP, SEND
Procedia PDF Downloads 3864273 Digital Elevation Model Analysis of Potential Prone Flood Disaster Watershed Citarum Headwaters Bandung
Authors: Faizin Mulia Rizkika, Iqbal Jabbari Mufti, Muhammad R. Y. Nugraha, Fadil Maulidir Sube
Abstract:
Flooding is an event of ponding on the flat area around the river as a result of the overflow of river water was not able to be accommodated by the river and may cause damage to the infrastructure of a region. This study aimed to analyze the data of Digital Elevation Model (DEM) for information that plays a role in the mapping of zones prone to flooding, mapping the distribution of zones prone to flooding that occurred in the Citarum upstream using secondary data and software (ArcGIS, MapInfo), this assessment was made distribution map of flooding, there were 13 counties / districts dam flood-prone areas in Bandung, and the most vulnerable districts are areas Baleendah-Dayeuhkolot-Bojongsoang-Banjaran. The area has a low slope and the same limits with boundary rivers and areas that have excessive land use, so the water catchment area is reduced.Keywords: mitigation, flood, citarum, DEM
Procedia PDF Downloads 3924272 Regulating Information Asymmetries at Online Platforms for Short-Term Vacation Rental in European Union– Legal Conondrum Continues
Authors: Vesna Lukovic
Abstract:
Online platforms as new business models play an important role in today’s economy and the functioning of the EU’s internal market. In the travel industry, algorithms used by online platforms for short-stay accommodation provide suggestions and price information to travelers. Those suggestions and recommendations are displayed in search results via recommendation (ranking) systems. There has been a growing consensus that the current legal framework was not sufficient to resolve problems arising from platform practices. In order to enhance the potential of the EU’s Single Market, smaller businesses should be protected, and their rights strengthened vis-à-vis large online platforms. The Regulation (EU) 2019/1150 of the European Parliament and of the Council on promoting fairness and transparency for business users of online intermediation services aims to level the playing field in that respect. This research looks at Airbnb through the lenses of this regulation. The research explores key determinants and finds that although regulation is an important step in the right direction, it is not enough. It does not entail sufficient clarity obligations that would make online platforms an intermediary service which both accommodation providers and travelers could use with ease.Keywords: algorithm, online platforms, ranking, consumers, EU regulation
Procedia PDF Downloads 1314271 Adaptive Envelope Protection Control for the below and above Rated Regions of Wind Turbines
Authors: Mustafa Sahin, İlkay Yavrucuk
Abstract:
This paper presents a wind turbine envelope protection control algorithm that protects Variable Speed Variable Pitch (VSVP) wind turbines from damage during operation throughout their below and above rated regions, i.e. from cut-in to cut-out wind speed. The proposed approach uses a neural network that can adapt to turbines and their operating points. An algorithm monitors instantaneous wind and turbine states, predicts a wind speed that would push the turbine to a pre-defined envelope limit and, when necessary, realizes an avoidance action. Simulations are realized using the MS Bladed Wind Turbine Simulation Model for the NREL 5 MW wind turbine equipped with baseline controllers. In all simulations, through the proposed algorithm, it is observed that the turbine operates safely within the allowable limit throughout the below and above rated regions. Two example cases, adaptations to turbine operating points for the below and above rated regions and protections are investigated in simulations to show the capability of the proposed envelope protection system (EPS) algorithm, which reduces excessive wind turbine loads and expectedly increases the turbine service life.Keywords: adaptive envelope protection control, limit detection and avoidance, neural networks, ultimate load reduction, wind turbine power control
Procedia PDF Downloads 1374270 Decomposition of the Customer-Server Interaction in Grocery Shops
Authors: Andreas Ahrens, Ojaras Purvinis, Jelena Zascerinska
Abstract:
A successful shopping experience without overcrowded shops and long waiting times undoubtedly leads to the release of happiness hormones and is generally considered the goal of any optimization. Factors influencing the shopping experience can be divided into internal and external ones. External factors are related, e. g. to the arrival of the customers to the shop, whereas internal are linked with the service process itself when checking out (waiting in the queue to the cash register and the scanning of the goods as well as the payment process itself) or any other non-expected delay when changing the status from a visitor to a buyer by choosing goods or items. This paper divides the customer-server interaction into five phases starting with the customer's arrival at the shop, the selection of goods, the buyer waiting in the queue to the cash register, the payment process, and ending with the customer or buyer's departure. Our simulation results show how five phases are intertwined and influence the overall shopping experience. Parameters for measuring the shopping experience are estimated based on the burstiness level in each of the five phases of the customer-server interaction.Keywords: customers’ burstiness, cash register, customers’ wait-ing time, gap distribution function
Procedia PDF Downloads 1494269 Nurses' Assessments of Their Work Environments
Authors: Manar Aslan, Selver Gokdemir, Chatitze Chousein
Abstract:
This research was conducted to evaluate the factors affecting the working environment of nurses working in three state hospitals. A favorable working environment contributes to increased job satisfaction of nurses and improved working conditions that affects the quality of the work done in a positive way. The population of the study was composed the three largest state hospitals in the region of Thrace in Turkey and 931 nurses working in there. In this research was not used any sampling method. The sampling was composed of nurses who accepted to take part in this research from three hospitals. It was used nursing work index-the practice work environment scale (Turkish version) for data collection (Cronbach alpha: 0.94).When the total scale scores of the nurses in the research were examined, it was determined that they evaluated the working environment below the average. It was also determined that the adequacy of human and other resources, dimensions of the physician-nurse communication scores were low. As in every profession group, the working environment in nursing has an importance to provide quality health and nursing care. A favorable working environment will increase nurses' performance and satisfaction with their work. Identifying the factors affecting the working environment and carrying out the remedial work for them will increase the quality of the health service.Keywords: work environment, work index, nursing, hospitals
Procedia PDF Downloads 2464268 Exploratory Research on Outsourcing Practices and Benefits on Telecommunication Industry in Oman
Authors: Alyamama Alsaidi
Abstract:
This research has been conducted in order to analyse the impact of outsourcing on telecommunication industry in Oman. The research is conducted by collecting qualitative and quantitative data in order to widen the area of comprehension. The data has been collected from genuine sources which showcased that results were reliable and possess validity. The outsourcing is very important because it helps the organisation in saving the cost and efforts of the workers. In Oman, the telecommunication industry largely uses the outsourcing service which is provided by the third party. The third party is responsible for providing outsourcing to the telecommunication companies. This research gives an overall view of the outsourcing in the telecommunication companies of Oman. The IT companies of Oman give their work to the outsourcing services as this will help in reducing the cost the project. Rather employing the experts to do the projects, the organization can easily give their products to the outsourcing services in which they complete the work for a cheaper rate for the telecommunication company of Oman. It will help in reducing the work load on the staffs and management of the telecommunication companies in Oman. The IT outsourcing in Oman is very common because some of the staff are not well experienced to do the IT work. The outsourcing has positive as well as negative impact on the telecommunication industry in Oman. The research has been done while considering ethical aspect in an effective and efficient manner. Furthermore, the literature is adequately reviewed so that views of various specialists can be considered for future guidance.Keywords: IT outsourcing, client company, services company, telecommunication
Procedia PDF Downloads 1884267 Computer Aided Engineering Optimization of Synchronous Reluctance Motor and Vibro-Acoustic Analysis for Lift Systems
Authors: Ezio Bassi, Francesco Vercesi, Francesco Benzi
Abstract:
The aim of this study is to evaluate the potentiality of synchronous reluctance motors for lift systems by also evaluating the vibroacoustic behaviour of the motor. Two types of synchronous machines are designed, analysed, and compared with an equivalent induction motor, which is the more common solution in such gearbox applications. The machines' performance are further improved with optimization procedures based on multiobjective optimization genetic algorithm (MOGA). The difference between the two synchronous motors consists in the rotor geometry; a symmetric and an asymmetric rotor design were investigated. The evaluation of the vibroacoustic performance has been conducted with a multi-variable model and finite element software taking into account electromagnetic, mechanical, and thermal features of the motor, therefore carrying out a multi-physics analysis of the electrical machine.Keywords: synchronous reluctance motor, vibro-acoustic, lift systems, genetic algorithm
Procedia PDF Downloads 1794266 Using Hidden Markov Chain for Improving the Dependability of Safety-Critical Wireless Sensor Networks
Authors: Issam Alnader, Aboubaker Lasebae, Rand Raheem
Abstract:
Wireless sensor networks (WSNs) are distributed network systems used in a wide range of applications, including safety-critical systems. The latter provide critical services, often concerned with human life or assets. Therefore, ensuring the dependability requirements of Safety critical systems is of paramount importance. The purpose of this paper is to utilize the Hidden Markov Model (HMM) to elongate the service availability of WSNs by increasing the time it takes a node to become obsolete via optimal load balancing. We propose an HMM algorithm that, given a WSN, analyses and predicts undesirable situations, notably, nodes dying unexpectedly or prematurely. We apply this technique to improve on C. Lius’ algorithm, a scheduling-based algorithm which has served to improve the lifetime of WSNs. Our experiments show that our HMM technique improves the lifetime of the network, achieved by detecting nodes that die early and rebalancing their load. Our technique can also be used for diagnosis and provide maintenance warnings to WSN system administrators. Finally, our technique can be used to improve algorithms other than C. Liu’s.Keywords: wireless sensor networks, IoT, dependability of safety WSNs, energy conservation, sleep awake schedule
Procedia PDF Downloads 1024265 Determination of the Best Fit Probability Distribution for Annual Rainfall in Karkheh River at Iran
Authors: Karim Hamidi Machekposhti, Hossein Sedghi
Abstract:
This study was designed to find the best-fit probability distribution of annual rainfall based on 50 years sample (1966-2015) in the Karkheh river basin at Iran using six probability distributions: Normal, 2-Parameter Log Normal, 3-Parameter Log Normal, Pearson Type 3, Log Pearson Type 3 and Gumbel distribution. The best fit probability distribution was selected using Stormwater Management and Design Aid (SMADA) software and based on the Residual Sum of Squares (R.S.S) between observed and estimated values Based on the R.S.S values of fit tests, the Log Pearson Type 3 and then Pearson Type 3 distributions were found to be the best-fit probability distribution at the Jelogir Majin and Pole Zal rainfall gauging station. The annual values of expected rainfall were calculated using the best fit probability distributions and can be used by hydrologists and design engineers in future research at studied region and other region in the world.Keywords: Log Pearson Type 3, SMADA, rainfall, Karkheh River
Procedia PDF Downloads 1944264 Present State of Local Public Transportation Service in Local Municipalities of Japan and Its Effects on Population
Authors: Akiko Kondo, Akio Kondo
Abstract:
We are facing regional problems to low birth rate and longevity in Japan. Under this situation, there are some local municipalities which lose their vitality. The aims of this study are to clarify the present state of local public transportation services in local municipalities and relation between local public transportation services and population quantitatively. We conducted a questionnaire survey concerning regional agenda in all local municipalities in Japan. We obtained responses concerning the present state of convenience in use of public transportation and local public transportation services. Based on the data gathered from the survey, it is apparent that we should some sort of measures concerning public transportation services. Convenience in use of public transportation becomes an object of public concern in many rural regions. It is also clarified that some local municipalities introduce a demand bus for the purpose of promotion of administrative and financial efficiency. They also introduce a demand taxi in order to secure transportation to weak people in transportation and eliminate of blank area related to public transportation services. In addition, we construct a population model which includes explanatory variables of present states of local public transportation services. From this result, we can clarify the relation between public transportation services and population quantitatively.Keywords: public transportation, local municipality, regional analysis, regional issue
Procedia PDF Downloads 4014263 Study of Natural Convection Heat Transfer of Plate-Fin Heat Sink
Authors: Han-Taw Chen, Tzu-Hsiang Lin, Chung-Hou Lai
Abstract:
This study applies the inverse method and three-dimensional CFD commercial software in conjunction with the experimental temperature data to investigate the heat transfer and fluid flow characteristics of the plate-fin heat sink in a rectangular closed enclosure. The inverse method with the finite difference method and the experimental temperature data is applied to determine the approximate heat transfer coefficient. Later, based on the obtained results, the zero-equation turbulence model is used to obtain the heat transfer and fluid flow characteristics between two fins. To validate the accuracy of the results obtained, the comparison of the heat transfer coefficient is made. The obtained temperature at selected measurement locations of the fin is also compared with experimental data. The effect of the height of the rectangular enclosure on the obtained results is discussed.Keywords: inverse method, fluent, heat transfer characteristics, plate-fin heat sink
Procedia PDF Downloads 3914262 Cognitive Radio in Aeronautic: Comparison of Some Spectrum Sensing Technics
Authors: Abdelkhalek Bouchikhi, Elyes Benmokhtar, Sebastien Saletzki
Abstract:
The aeronautical field is experiencing issues with RF spectrum congestion due to the constant increase in the number of flights, aircrafts and telecom systems on board. In addition, these systems are bulky in size, weight and energy consumption. The cognitive radio helps particularly solving the spectrum congestion issue by its capacity to detect idle frequency channels then, allowing an opportunistic exploitation of the RF spectrum. The present work aims to propose a new use case for aeronautical spectrum sharing and to study the performances of three different detection techniques: energy detector, matched filter and cyclostationary detector within the aeronautical use case. The spectrum in the proposed cognitive radio is allocated dynamically where each cognitive radio follows a cognitive cycle. The spectrum sensing is a crucial step. The goal of the sensing is gathering data about the surrounding environment. Cognitive radio can use different sensors: antennas, cameras, accelerometer, thermometer, etc. In IEEE 802.22 standard, for example, a primary user (PU) has always the priority to communicate. When a frequency channel witch used by the primary user is idle, the secondary user (SU) is allowed to transmit in this channel. The Distance Measuring Equipment (DME) is composed of a UHF transmitter/receiver (interrogator) in the aircraft and a UHF receiver/transmitter on the ground. While the future cognitive radio will be used jointly to alleviate the spectrum congestion issue in the aeronautical field. LDACS, for example, is a good candidate; it provides two isolated data-links: ground-to-air and air-to-ground data-links. The first contribution of the present work is a strategy allowing sharing the L-band. The adopted spectrum sharing strategy is as follow: the DME will play the role of PU which is the licensed user and the LDACS1 systems will be the SUs. The SUs could use the L-band channels opportunely as long as they do not causing harmful interference signals which affect the QoS of the DME system. Although the spectrum sensing is a key step, it helps detecting holes by determining whether the primary signal is present or not in a given frequency channel. A missing detection on primary user presence creates interference between PU and SU and will affect seriously the QoS of the legacy radio. In this study, first brief definitions, concepts and the state of the art of cognitive radio will be presented. Then, a study of three communication channel detection algorithms in a cognitive radio context is carried out. The study is made from the point of view of functions, material requirements and signal detection capability in the aeronautical field. Then, we presented a modeling of the detection problem by three different methods (energy, adapted filter, and cyclostationary) as well as an algorithmic description of these detectors is done. Then, we study and compare the performance of the algorithms. Simulations were carried out using MATLAB software. We analyzed the results based on ROCs curves for SNR between -10dB and 20dB. The three detectors have been tested with a synthetics and real world signals.Keywords: aeronautic, communication, navigation, surveillance systems, cognitive radio, spectrum sensing, software defined radio
Procedia PDF Downloads 1764261 A Survey on Countermeasures of Cache-Timing Attack on AES Systems
Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush
Abstract:
Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure
Procedia PDF Downloads 3014260 Numerical Study of Modulus of Subgrade Reaction in Eccentrically Loaded Circular Footing Resting
Authors: Seyed Abolhasan Naeini, Mohammad Hossein Zade
Abstract:
This article is an attempt to present a numerically study of the behaviour of an eccentrically loaded circular footing resting on sand to determine its ultimate bearing capacity. A surface circular footing of diameter 12 cm (D) was used as shallow foundation. For this purpose, three dimensional models consist of foundation, and medium sandy soil was modelled by ABAQUS software. Bearing capacity of footing was evaluated and the effects of the load eccentricity on bearing capacity, its settlement, and modulus of subgrade reaction were studied. Three different values of load eccentricity with equal space from inside the core on the core boundary and outside the core boundary, which were respectively e=0.75, 1.5, and 2.25 cm, were considered. The results show that by increasing the load eccentricity, the ultimate load and the modulus of subgrade reaction decreased.Keywords: circular foundation, sand, eccentric loading, modulus of subgrade reaction
Procedia PDF Downloads 3504259 A Comprehensive Evaluation of the Bus Rapid Transit Project from Gazipur to Airport at Dhaka Focusing on Environmental Impacts
Authors: Swapna Begum, Higano Yoshiro
Abstract:
Dhaka is the capital city of Bangladesh. It is considered as one of the traffic congested cities in the world. The growth of the population of this city is increasing day by day. The land use pattern and the increased socio-economic characteristics increase the motor vehicle ownership of this city. The rapid unplanned urbanization and poor transportation planning have deteriorated the transport environment of this city. Also, the huge travel demand with non-motorized traffics on streets is accounted for enormous traffic congestion in this city. The land transport sector in Dhaka is mainly dependent on road transport comprised of both motorized and non-motorized modes of travel. This improper modal mix and the un-integrated system have resulted in huge traffic congestion in this city. Moreover, this city has no well-organized public transport system and any Mass Transit System to cope with this ever increasing demand. Traffic congestion causes serious air pollution and adverse impact on the economy by deteriorating the accessibility, level of service, safety, comfort and operational efficiency. Therefore, there is an imperative need to introduce a well-organized, properly scheduled mass transit system like (Bus Rapid Transit) BRT minimizing the existing problems.Keywords: air pollution, BRT, mass transit, traffic congestion
Procedia PDF Downloads 4074258 Artificial Intelligence Applications in Kahoot!
Authors: Jana, Walah, Salma, Dareen
Abstract:
This study looks at how the game-based learning platform Kahoot! has changed education, with a particular emphasis on how it incorporates artificial intelligence (AI). From humanly made questions to AI-driven features that improve the learning process, Kahoot! has changed since its 2013 introduction. The software successfully engages educators and students by delivering adaptive learning paths, regulating content, and offering individualized tests. This study also highlights the AI features of Kahoot! by contrasting it with comparable platforms like Quizizz, Socrative, Gimkit, and Nearpod. User satisfaction with Kahoot!'s "PDF to Story" and "Story Text Enhancer" functions ranges from moderate to high, according to a review of user input; yet, there are still issues with consistent accuracy and usability. The results demonstrate how AI can improve learning's effectiveness, adaptability, and interactivity while offering useful insights for educators and developers seeking to optimize educational tools.Keywords: PDF to story feature, story text enhancer, AI-driven learning, interactive content creation
Procedia PDF Downloads 94257 Perception of Hygiene Knowledge among Staff Working in Top Five Famous Restaurants of Male’
Authors: Zulaikha Reesha Rashaad
Abstract:
One of the major factors which can contribute greatly to success of catering businesses is to employ food and beverage staff having sound hygiene knowledge. Individuals having sound knowledge of hygiene has a higher chance of following safe food practices in food production. One of the leading causes of food poisoning and food borne illnesses has been identified as lack of hygiene knowledge among food and beverage staff working in catering establishments and restaurants. This research aims to analyze the hygiene knowledge among food and beverage staff working in top five restaurants of Male’, in relation to their age, educational background, occupation and training. The research uses quantitative and descriptive methods in data collection and in data analysis. Data was obtained through random sampling technique with self-administered survey questionnaires which was completed by 60 respondents working in 5 different restaurants operating at top level in Male’. The respondents of the research were service staff and chefs working in these restaurants. The responses to the questionnaires have been analyzed by using SPSS. The results of the research indicated that age, education level, occupation and training correlated with hygiene knowledge perception scores.Keywords: food and beverage staff, food poisoning, food production, hygiene knowledge
Procedia PDF Downloads 2904256 Experimental Study of Semitransparent and Opaque Photovoltaic Modules with and without Air Duct
Authors: Sanjay Agrawal, Trapti Varshney, G. N. Tiwari
Abstract:
In this paper, thermal modeling has been developed for photovoltaic PV modules, namely; Case A: semitransparent PV module without duct, Case B: semitransparent PV module with duct, Case C: opaque PV module without duct, Case D: opaque PV module with duct for Delhi, India climatic condition. MATLAB 7.0 software has been used to solve mathematical models of the proposed system. For validation of proposed system, the experimental study has also been carried out for all above four cases, and then comparative analysis of all different type of PV module has been presented. The hybrid PVT module air collectors presented in this study are self sustaining the system and can be used for the electricity generation in remote areas where access of electricity is not economical due to high transmission and distribution losses. It has been found that overall annual thermal energy and exergy gain of semitransparent PV module is higher by 11.6% and7.32% in summer condition and 16.39% and 18% in winter condition respectively as compared to opaque PV module considering same area (0.61 m2) of PV module.Keywords: semitransparent PV module, overall exergy, overall thermal energy, opaque
Procedia PDF Downloads 4404255 Image Features Comparison-Based Position Estimation Method Using a Camera Sensor
Authors: Jinseon Song, Yongwan Park
Abstract:
In this paper, propose method that can user’s position that based on database is built from single camera. Previous positioning calculate distance by arrival-time of signal like GPS (Global Positioning System), RF(Radio Frequency). However, these previous method have weakness because these have large error range according to signal interference. Method for solution estimate position by camera sensor. But, signal camera is difficult to obtain relative position data and stereo camera is difficult to provide real-time position data because of a lot of image data, too. First of all, in this research we build image database at space that able to provide positioning service with single camera. Next, we judge similarity through image matching of database image and transmission image from user. Finally, we decide position of user through position of most similar database image. For verification of propose method, we experiment at real-environment like indoor and outdoor. Propose method is wide positioning range and this method can verify not only position of user but also direction.Keywords: positioning, distance, camera, features, SURF(Speed-Up Robust Features), database, estimation
Procedia PDF Downloads 351