Search results for: hardware security evaluation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9510

Search results for: hardware security evaluation

5610 The Relevance of Sustainability Skills for International Students

Authors: Mary Panko, Rashika Sharma

Abstract:

Sustainability often appears to be an unfamiliar concept to many international students that enrol in a New Zealand technological degree. Lecturers’ experiences with classroom interactions and evaluation of assessments indicate that studying the concept enlightens and enhances international students understanding of sustainability. However, in most cases, even after studying sustainability in their degree programme, students are not given an opportunity to practice and apply this concept into their professions in their home countries. Therefore, using a qualitative approach, the academics conducted research to determine the change in international students understanding of sustainability before and after their enrolment in an Applied Technology degree. The research also aimed to evaluate if international students viewed sustainability of relevance to their professions and whether the students felt that they will be provided with an opportunity to apply their knowledge about sustainability in the industry. The findings of the research are presented in this paper.

Keywords: education for sustainability, international students, vocational education

Procedia PDF Downloads 308
5609 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management

Authors: Jiří Barta

Abstract:

The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.

Keywords: Computer Simulation, Symos97, Spread, Simulation Software, Harmful Substances

Procedia PDF Downloads 299
5608 On-Screen Disability Delineation and Social Representation: An Evaluation

Authors: Chetna Jaswal, Nishi Srivastava, Ahammedul Kabeer AP, Puja Prasad

Abstract:

We are a culture of mass media consumers and cinema as its integral part has high visibility and potential influence on public attitude towards disability which maintains no sociocultural boundaries but experiences substantial social marginalization. Given the lack of awareness and direct experience with disability, on-screen or film representations can give powerful and memorable definitions for the public that can contribute to framing the perception and attitude change. Social representation refers to common ways of thinking, conceiving about and evaluating social reality. It is a product of collective cognition, common sense and thought system. This study aims at analyzing the representations and narratives of disability in Indian cinema and Hollywood with the help of a conceptual understanding of social representation and its theoretical framework.

Keywords: disability, social representation, mainstream cinema, diversity

Procedia PDF Downloads 171
5607 Preliminary Study of Human Reliability of Control in Case of Fire Based on the Decision Processes and Stress Model of Human in a Fire

Authors: Seung-Un Chae, Heung-Yul Kim, Sa-Kil Kim

Abstract:

This paper presents the findings of preliminary study on human control performance in case of fire. The relationship between human control and human decision is studied in decision processes and stress model of human in a fire. Human behavior aspects involved in the decision process during a fire incident. The decision processes appear that six of individual perceptual processes: recognition, validation, definition, evaluation, commitment, and reassessment. Then, human may be stressed in order to get an optimal decision for their activity. This paper explores problems in human control processes and stresses in a catastrophic situation. Thus, the future approach will be concerned to reduce stresses and ambiguous irrelevant information.

Keywords: human reliability, decision processes, stress model, fire

Procedia PDF Downloads 986
5606 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 153
5605 Italian Central Guarantee Fund: An Analysis of the Guaranteed SMEs’ Default Risk

Authors: M. C. Arcuri, L. Gai, F. Ielasi

Abstract:

Italian Central Guarantee Fund (CGF) has the purpose to facilitate Small and Medium-sized Enterprises (SMEs)’ access to credit. The aim of the paper is to study the evaluation method adopted by the CGF with regard to SMEs requiring its intervention. This is even more important in the light of the recent CGF reform. We analyse an initial sample of more than 500.000 guarantees from 2012 to 2018. We distinguish between a counter-guarantee delivered to a mutual guarantee institution and a guarantee directly delivered to a bank. We investigate the impact of variables related to the operations and the SMEs on Altman Z’’-score and the score consistent with CGF methodology. We verify that the type of intervention affects the scores and the initial condition changes with the new assessment criterions. 

Keywords: banks, default risk, Italian guarantee fund, mutual guarantee institutions

Procedia PDF Downloads 175
5604 Structural Engineering Forensic Evaluation of Misdiagnosed Concrete Masonry Wall Cracking

Authors: W. C. Bracken

Abstract:

Given that concrete masonry walls are expected to experience shrinkage combined with thermal expansion and contraction, and in some cases even carbonation, throughout their service life, cracking is to be expected. However, after concrete masonry walls have been placed into service, originally anticipated and accounted for cracking is often misdiagnosed as a structural defect. Such misdiagnoses often result in or are used to support litigation. This paper begins by discussing the causes and types of anticipated cracking within concrete masonry walls followed by a discussion on the processes and analyses that exists for properly evaluating them and their significance. From here, the paper then presents a case of misdiagnosed concrete masonry cracking and the flawed logic employed to support litigation.

Keywords: concrete masonry, masonry wall cracking, structural defect, structural damage, construction defect, forensic investigation

Procedia PDF Downloads 248
5603 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 291
5602 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 262
5601 A Compact Quasi-Zero Stiffness Vibration Isolator Using Flexure-Based Spring Mechanisms Capable of Tunable Stiffness

Authors: Thanh-Phong Dao, Shyh-Chour Huang

Abstract:

This study presents a quasi-zero stiffness (QZS) vibration isolator using flexure-based spring mechanisms which afford both negative and positive stiffness elements, which enable self-adjustment. The QZS property of the isolator is achieved at the equilibrium position. A nonlinear mathematical model is then developed, based on the pre-compression of the flexure-based spring mechanisms. The dynamics are further analyzed using the Harmonic Balance method. The vibration attention efficiency is illustrated using displacement transmissibility, which is then compared with the corresponding linear isolator. The effects of parameters on performance are also investigated by numerical solutions. The flexure-based spring mechanisms are subsequently designed using the concept of compliant mechanisms, with evaluation by ANSYS software, and simulations of the QZS isolator.

Keywords: vibration isolator, quasi-zero stiffness, flexure-based spring mechanisms, compliant mechanism

Procedia PDF Downloads 463
5600 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 242
5599 A Philosophical Study of Men's Rights Discourses in Light of Feminism

Authors: Michael Barker

Abstract:

Men’s rights activists are largely antifeminism. Evaluation of men’s rights discourses, however, shows that men’s rights’ goals would be better achieved by working with feminism. Discussion of men’s rights discourses, though, is prone to confusion because there is no commonly used men’s rights language. In the presentation ‘male sexism’, ‘matriarchy’ and ‘masculism’ will be unpacked as part of a suggested men’s rights language. Once equipped with a men’s rights vocabulary, sustained philosophical assessment of the extent to which several categories of male disadvantages are wrongful will be offered. Following this, conditions that cause each category of male sexism will be discussed. It shall be argued that male sexism is caused more so by matriarchy than by patriarchy or by feminism. In closing, the success at which various methods address the categories of male sexism will be contrasted. Ultimately, it will be shown that male disadvantages are addressed more successfully by methods that work with, than against, feminism.

Keywords: gender studies, feminism, patriarchy, men’s rights, male sexism, matriarchy, masculism

Procedia PDF Downloads 371
5598 Probabilistic-Based Design of Bridges under Multiple Hazards: Floods and Earthquakes

Authors: Kuo-Wei Liao, Jessica Gitomarsono

Abstract:

Bridge reliability against natural hazards such as floods or earthquakes is an interdisciplinary problem that involves a wide range of knowledge. Moreover, due to the global climate change, engineers have to design a structure against the multi-hazard threats. Currently, few of the practical design guideline has included such concept. The bridge foundation in Taiwan often does not have a uniform width. However, few of the researches have focused on safety evaluation of a bridge with a complex pier. Investigation of the scouring depth under such situation is very important. Thus, this study first focuses on investigating and improving the scour prediction formula for a bridge with complicated foundation via experiments and artificial intelligence. Secondly, a probabilistic design procedure is proposed using the established prediction formula for practical engineers under the multi-hazard attacks.

Keywords: bridge, reliability, multi-hazards, scour

Procedia PDF Downloads 374
5597 Investigation on Performance of Optical Shutter Panels for Transparent Displays

Authors: Jaehong Kim, Sunhee Park, HongSeop Shin, Kyongho Lim, Suhyun Kwon, Don-Gyou Lee, Pureum Kim, Moojong Lim, JongSang Baek

Abstract:

Transparent displays with OLEDs are the most commonly produced forms of see-through displays on the market or in development. In order to block the visual interruption caused by the light coming from the background, the special panel is combined with transparent displays with OLEDs. There is, however, few studies performance of optical shutter panel for transparent displays until now. This paper, therefore, describes the performance of optical shutter panels. The novel evaluation method was developed by measuring the amount of light which can form a transmitted background image. The new proposed method could tell how recognizable transmitted background images cannot be seen, and is consistent with viewer’s perception.

Keywords: optical shutter panel, optical performance, transparent display, visual interruption

Procedia PDF Downloads 529
5596 Complex Analysis of Annual Plats Utilization for Particleboard Production

Authors: Petra Gajdačová

Abstract:

The presented research deals with a complex evaluation of after-harvest remnants utilization for particleboard production. Agricultural crops that are in the Czech Republic widely grown are in the scope of interest. Researches dealing with composites from agricultural rests solved mostly physical and mechanical properties of produced materials. For the commercialization of these results, however, one another step is essential. It is needed to evaluate the composites production from agricultural rests more comprehensive, take into account all aspects that affect their production, not only material characteristics of produced composites. In this study, descriptive, comparative and synthesis methods were used. Results of this research include a supply stability forecast, technical and technological differences of production of particleboards from agricultural rests and quantification of an economical potential of the agricultural rests.

Keywords: agricultural crops, annual plant, composite material, particleboard

Procedia PDF Downloads 196
5595 Characterization of Antioxidant-Antimicrobial Microcapsules Containing Carum Copticum Essential Oil and Their Effect on the Sensory Quality of Yoghurt

Authors: Maryam Rahimi, Maryam Moslehishad, Seyede Marzieh Hosseini

Abstract:

In this study, preparation of spray dried Carum copticum essential oil (CCEO)-loaded microcapsules by maltodextrin and its blending with two other natural biodegradable polymers, gum Arabic (GA) or modified starch (MS) were investigated. Addition of these polymers to maltodextrin resulted in the encasement of encapsulation efficiency (EE). The highest EE (78.22±0.34%) and total phenolic (TP) content (83.86±1.72 mg GAE/100g) was related to MD-MS microcapsules. CCEO-loaded microcapsules showed spherical surface, good antioxidant and antimicrobial properties. In addition, sensory tests confirmed the possible application of CCEO-loaded microcapsules as natural food additives.

Keywords: carum copticum, essential oil, encapsulation, spray drying, sensory evaluation, antioxidants

Procedia PDF Downloads 244
5594 Common Sports Medicine Injuries in Primary Health Care

Authors: Thuraya Ahmed Hamood Al Shidhani

Abstract:

Sports Medicine injuries are very common in primary health care. It is not necessary related to direct trauma, but it could be because of repetitive stress and overuse injuries. Knowledge of Primary Health care providers about the common sports medicine injuries and when to refer to a specialist is essential. Common sports injuries are muscle strain, joint sprain, bone bruise, Patellofemoral pain syndrome, Anterior cruciate ligament injuries, meniscal injuries, ankle ligaments injuries, concussion, Rotator cuff tendinosis/impingement syndrome, lateral and medial epicondylitis and fractures. Systematic approach is very useful in evaluation of sports injuries. RICE is important in initial management. Physiotherapy is essential for rehabilitation. Definitive Management is dependent on patient’s condition and function.

Keywords: common, sports medicine injuries, primary health care, injuries

Procedia PDF Downloads 84
5593 Contribution to the Evaluation of Uncertainties of Measurement to the Data Processing Sequences of a Cmm

Authors: Hassina Gheribi, Salim Boukebbab

Abstract:

The measurement of the parts manufactured on CMM (coordinate measuring machine) is based on the association of a surface of perfect geometry to the group of dots palpated via a mathematical calculation of the distances between the palpated points and itself surfaces. Surfaces not being never perfect, they are measured by a number of points higher than the minimal number necessary to define them mathematically. However, the central problems of three-dimensional metrology are the estimate of, the orientation parameters, location and intrinsic of this surface. Including the numerical uncertainties attached to these parameters help the metrologist to make decisions to be able to declare the conformity of the part to specifications fixed on the design drawing. During this paper, we will present a data-processing model in Visual Basic-6 which makes it possible automatically to determine the whole of these parameters, and their uncertainties.

Keywords: coordinate measuring machines (CMM), associated surface, uncertainties of measurement, acquisition and modeling

Procedia PDF Downloads 328
5592 Contribution for Rural Development Trough Training in Organic Farming

Authors: Raquel P. F. Guiné, Daniela V. T. A. Costa, Paula M. R. Correia, Moisés Castro, Luis T. Guerra, Cristina A. Costa

Abstract:

The aim of this work was to characterize a potential target group of people interested in participating into a training program in organic farming in the context of mobile-learning. The information sought addressed in particular, but not exclusively, possible contents, formats and forms of evaluation that will contribute to define the course objectives and curriculum, as well as to ensure that the course meets the needs of the learners and their preferences. The sample was selected among different European countries. The questionnaires were delivered electronically for answering online and in the end 135 consented valid questionnaires were obtained. The results allowed characterizing the target group and identifying their training needs and preferences towards m-learning formats, giving valuable tools to design the training offer.

Keywords: mobile-learning, organic farming, rural development, survey

Procedia PDF Downloads 502
5591 Modelling of the Fire Pragmatism in the Area of Military Management and Its Experimental Verification

Authors: Ivana Mokrá

Abstract:

The article deals with modelling of the fire pragmatism in the area of military management and its experimental verification. Potential approaches are based on the synergy of mathematical and theoretical ideas, operational and tactical requirements and the military decision-making process. This issue has taken on importance in recent times, particularly with the increasing trend of digitized battlefield, the development of C4ISR systems and intention to streamline the command and control process at the lowest levels of command. From fundamental and philosophical point of view, these new approaches seek to significantly upgrade and enhance the decision-making process of the tactical commanders.

Keywords: military management, decision-making process, strike modeling, experimental evaluation, pragmatism, tactical strike modeling

Procedia PDF Downloads 388
5590 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: social network sites, online social network, privacy, trust, security and authentication

Procedia PDF Downloads 381
5589 Transformation of Industrial Policy towards Industry 4.0 and Its Impact on Firms' Competition

Authors: Arūnas Burinskas

Abstract:

Although Europe is on the threshold of a new industrial revolution called Industry 4.0, many believe that this will increase the flexibility of production, the mass adaptation of products to consumers and the speed of their service; it will also improve product quality and dramatically increase productivity. However, as expected, all the benefits of Industry 4.0 face many of the inevitable changes and challenges they pose. One of them is the inevitable transformation of current competition and business models. This article examines the possible results of competitive conversion from the classic Bertrand and Cournot models to qualitatively new competition based on innovation. Ability to deliver a new product quickly and the possibility to produce the individual design (through flexible and quickly configurable factories) by reducing equipment failures and increasing process automation and control is highly important. This study shows that the ongoing transformation of the competition model is changing the game. This, together with the creation of complex value networks, means huge investments that make it particularly difficult for small and medium-sized enterprises. In addition, the ongoing digitalization of data raises new concerns regarding legal obligations, intellectual property, and security.

Keywords: Bertrand and Cournot Competition, competition model, industry 4.0, industrial organisation, monopolistic competition

Procedia PDF Downloads 139
5588 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing

Authors: G. Rajeshwari, V. D. M. Jabez Daniel

Abstract:

Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.

Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag

Procedia PDF Downloads 306
5587 CuFeOx-Based Nano-Rose Electrocatalysts for Oxygen Evolution Reaction

Authors: Hamad Almohamadi, Nabeel H. Alharthi, Abdulrahman Aljabri

Abstract:

In this study, two-dimensional CuFeOx is deposited on nickel foam for the fabrication of electrocatalyst for oxygen evolution reaction (OER). The in-situ hydrothermal synthesis of CuFeOx in presence of aloe vera extract was found to yield unique nano-rose-like morphology which aided to improve the electrochemical surface area of the electrode. The phytochemical assisted synthesis of CuFeOx using 75% aloe vera extract resulted in improved OER electrocatalytic performance by attaining the overpotential of 310 mV for 50 mA cm−2 and 410 mV for 100 mA cm−2. The electrode also sustained robust stability throughout the 50 h of chronopotentiometry studies under alkaline electrolyte conditions, thus proving to be prospective electrode material for efficient OER in electrochemical water splitting.

Keywords: water splitting, phytochemicals, oxygen evaluation reaction, Tafel's slope, stability

Procedia PDF Downloads 116
5586 The Pioneering Model in Teaching Arabic as a Mother Tongue through Modern Innovative Strategies

Authors: Rima Abu Jaber Bransi, Rawya Jarjoura Burbara

Abstract:

This study deals with two pioneering approaches in teaching Arabic as a mother tongue: first, computerization of literary and functional texts in the mother tongue; second, the pioneering model in teaching writing skills by computerization. The significance of the study lies in its treatment of a serious problem that is faced in the era of technology, which is the widening gap between the pupils and their mother tongue. The innovation in the study is that it introduces modern methods and tools and a pioneering instructional model that turns the process of mother tongue teaching into an effective, meaningful, interesting and motivating experience. In view of the Arabic language diglossia, standard Arabic and spoken Arabic, which constitutes a serious problem to the pupil in understanding unused words, and in order to bridge the gap between the pupils and their mother tongue, we resorted to computerized techniques; we took texts from the pre-Islamic period (Jahiliyya), starting with the Mu'allaqa of Imru' al-Qais and other selected functional texts and computerized them for teaching in an interesting way that saves time and effort, develops high thinking strategies, expands the literary good taste among the pupils, and gives the text added values that neither the book, the blackboard, the teacher nor the worksheets provide. On the other hand, we have developed a pioneering computerized model that aims to develop the pupil's ability to think, to provide his imagination with the elements of growth, invention and connection, and motivate him to be creative, and raise level of his scores and scholastic achievements. The model consists of four basic stages in teaching according to the following order: 1. The Preparatory stage, 2. The reading comprehension stage, 3. The writing stage, 4. The evaluation stage. Our lecture will introduce a detailed description of the model with illustrations and samples from the units that we built through highlighting some aspects of the uniqueness and innovation that are specific to this model and the different integrated tools and techniques that we developed. One of the most significant conclusions of this research is that teaching languages through the employment of new computerized strategies is very likely to get the Arabic speaking pupils out of the circle of passive reception into active and serious action and interaction. The study also emphasizes the argument that the computerized model of teaching can change the role of the pupil's mind from being a store of knowledge for a short time into a partner in producing knowledge and storing it in a coherent way that prevents its forgetfulness and keeping it in memory for a long period of time. Consequently, the learners also turn into partners in evaluation by expressing their views, giving their notes and observations, and application of the method of peer-teaching and learning.

Keywords: classical poetry, computerization, diglossia, writing skill

Procedia PDF Downloads 225
5585 Importance of New Policies of Process Management for Internet of Things Based on Forensic Investigation

Authors: Venkata Venugopal Rao Gudlur

Abstract:

The Proposed Policies referred to as “SOP”, on the Internet of Things (IoT) based Forensic Investigation into Process Management is the latest revolution to save time and quick solution for investigators. The forensic investigation process has been developed over many years from time to time it has been given the required information with no policies in investigation processes. This research reveals that the current IoT based forensic investigation into Process Management based is more connected to devices which is the latest revolution and policies. All future development in real-time information on gathering monitoring is evolved with smart sensor-based technologies connected directly to IoT. This paper present conceptual framework on process management. The smart devices are leading the way in terms of automated forensic models and frameworks established by different scholars. These models and frameworks were mostly focused on offering a roadmap for performing forensic operations with no policies in place. These initiatives would bring a tremendous benefit to process management and IoT forensic investigators proposing policies. The forensic investigation process may enhance more security and reduced data losses and vulnerabilities.

Keywords: Internet of Things, Process Management, Forensic Investigation, M2M Framework

Procedia PDF Downloads 102
5584 Comparison of the Yumul Faces Anxiety Scale to the Categorization Scale, the Numerical Verbal Rating Scale, and the State-Trait Anxiety Inventory for Preoperative Anxiety Evaluation

Authors: Ofelia Loani Elvir Lazo, Roya Yumul, David Chernobylsky, Omar Durra

Abstract:

Background: It is crucial to detect the patient’s existing anxiety to assist patients in a perioperative setting which is to be caused by the fear associated with surgical and anesthetic complications. However, the current gold standard for assessing patient anxiety, the STAI, is problematic to use in the preoperative setting, given the duration and concentration required to complete the 40-item questionnaire. Our primary aim in the study is to investigate the correlation of the Yumul Visual Facial Anxiety Scale (VFAS) and Numerical Verbal Rating Scale (NVRS) to State-Trait Anxiety Inventory (STAI) to determine the optimal anxiety scale to use in the perioperative setting. Methods: A clinical study of patients undergoing various surgeries was conducted utilizing each of the preoperative anxiety scales. Inclusion criteria included patients undergoing elective surgeries, while exclusion criteria included patients with anesthesia contraindications, inability to comprehend instructions, impaired judgement, substance abuse history, and those pregnant or lactating. 293 patients were analyzed in terms of demographics, anxiety scale survey results, and anesthesia data via Spearman Coefficients, Chi-Squared Analysis, and Fischer’s exact test utilized for comparative analysis. Results: Statistical analysis showed that VFAS had a higher correlation to STAI than NVRS (rs=0.66, p<0.0001 vs. rs=0.64, p<0.0001). The combined VFAS-Categorization Scores showed the highest correlation with the gold standard (rs=0.72, p<0.0001). Subgroup analysis showed similar results. STAI evaluation time (247.7 ± 54.81 sec) far exceeds VFAS (7.29 ± 1.61 sec), NVRS (7.23 ± 1.60 sec), and Categorization scales (7.29 ± 1.99 sec). Patients preferred VFAS (54.4%), Categorization (11.6%), and NVRS (8.8%). Anesthesiologists preferred VFAS (63.9%), NVRS (22.1%), and Categorization Scales (14.0%). Of note, the top five causes of preoperative anxiety were determined to be waiting (56.5%), pain (42.5%), family concerns (40.5%), no information about surgery (40.1%), or anesthesia (31.6%). Conclusıons: Both VFAS and Categorization tests also take significantly less time than STAI, which is critical in the preoperative setting. Combined VFAS-Categorization Score (VCS) demonstrates the highest correlation to the gold standard, STAI. Among both patients and anesthesiologists, VFAS was the most preferred scale. This forms the basis of the Yumul Faces Anxiety Scale, designed for quick quantization and assessment in the preoperative setting while maintaining a high correlation to the golden standard. Additional studies using the formulated Yumul Faces Anxiety Scale are merited.

Keywords: numerical verbal anxiety scale, preoperative anxiety, state-trait anxiety inventory, visual facial anxiety scale

Procedia PDF Downloads 117
5583 Technology Enhanced Learning Using Virtual and Augmented Realities: An Applied Method to Improve the Animation Teaching Delivery

Authors: Rosana Marar, Edward Jaser

Abstract:

This paper presents a software solution to enhance the content and presentation of graphic design and animation related textbooks. Using augmented and virtual reality concepts, a mobile application is developed to improve the static material found in books. This allows users to interact with animated examples and tutorials using their mobile phones and stereoscopic 3D viewers which will enhance information delivery. The application is tested on Google Cardboard with visual content in 3D space. Evaluation of the proposed application demonstrates that it improved the readability of static content and provided new experiences to the reader.

Keywords: animation, augmented reality, google cardboard, interactive media, technology enhanced learning, virtual reality

Procedia PDF Downloads 183
5582 Object Trajectory Extraction by Using Mean of Motion Vectors Form Compressed Video Bitstream

Authors: Ching-Ting Hsu, Wei-Hua Ho, Yi-Chun Chang

Abstract:

Video object tracking is one of the popular research topics in computer graphics area. The trajectory can be applied in security, traffic control, even the sports training. The trajectory for sports training can be utilized to analyze the athlete’s performance without traditional sensors. There are many relevant works which utilize mean shift algorithm with background subtraction. This kind of the schemes should select a kernel function which may affect the accuracy and performance. In this paper, we consider the motion information in the pre-coded bitstream. The proposed algorithm extracts the trajectory by composing the motion vectors from the pre-coded bitstream. We gather the motion vectors from the overlap area of the object and calculate mean of the overlapped motion vectors. We implement and simulate our proposed algorithm in H.264 video codec. The performance is better than relevant works and keeps the accuracy of the object trajectory. The experimental results show that the proposed trajectory extraction can extract trajectory form the pre-coded bitstream in high accuracy and achieve higher performance other relevant works.

Keywords: H.264, video bitstream, video object tracking, sports training

Procedia PDF Downloads 428
5581 Voice over IP Quality of Service Evaluation for Mobile Ad Hoc Network in an Indoor Environment for Different Voice Codecs

Authors: Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia

Abstract:

In this paper, the performance and quality of Voice over IP (VoIP) calls carried over a Mobile Ad Hoc Network (MANET) which has a number of SIP nodes registered on a SIP Proxy are analyzed. The testing campaigns are carried out in an indoor corridor structure having a well-defined channel’s characteristics and model for the different voice codecs, G.711, G.727 and G.723.1. These voice codecs are commonly used in VoIP technology. The calls’ quality are evaluated using four Quality of Service (QoS) metrics, namely, mean opinion score (MOS), jitter, delay, and packet loss. The relationship between the wireless channel’s parameters and the optimum codec is well-established. According to the experimental results, the voice codec G.711 has the best performance for the proposed MANET topology

Keywords: wireless channel modelling, Voip, MANET, session initiation protocol (SIP), QoS

Procedia PDF Downloads 228