Search results for: information system transformation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26158

Search results for: information system transformation

22078 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 248
22077 Peak Frequencies in the Collective Membrane Potential of a Hindmarsh-Rose Small-World Neural Network

Authors: Sun Zhe, Ruggero Micheletto

Abstract:

As discussed extensively in many studies, noise in neural networks have an important role in the functioning and time evolution of the system. The mechanism by which noise induce stochastic resonance enhancing and influencing certain operations is not clarified nor is the mechanism of information storage and coding. With the present research we want to study the role of noise, especially focusing on the frequency peaks in a three variable Hindmarsh−Rose Small−World network. We investigated the behaviour of the network to external noises. We demonstrate that a variation of signal to noise ratio of about 10 dB induces an increase in membrane potential signal of about 15%, averaged over the whole network. We also considered the integral of the whole membrane potential as a paradigm of internal noise, the one generated by the brain network. We showed that this internal noise is attenuated with the size of the network or with the number of random connections. By means of Fourier analysis we found that it has distinct peaks of frequencies, moreover, we showed that increasing the size of the network introducing more neurons, reduced the maximum frequencies generated by the network, whereas the increase in the number of random connections (determined by the small-world probability p) led to a trend toward higher frequencies. This study may give clues on how networks utilize noise to alter the collective behaviour of the system in their operations.

Keywords: neural networks, stochastic processes, small-world networks, discrete Fourier analysis

Procedia PDF Downloads 286
22076 Internal Audit and the Effectiveness and Efficiency of Operations in Hospitals

Authors: Naziru Suleiman

Abstract:

The ever increasing cases of financial frauds and corporate accounting scandals in recent years have raised more concern on the operation of internal control mechanisms and performance of the internal audit departments in organizations. In most cases the seeming presence of both the internal control system and internal audit in organizations do not prove useful as frauds errors and irregularities are being perpetuated. The aim of this study, therefore, is to assess the role of internal audit in achieving the objectives of internal control system of federal hospitals in Kano State from the perception of the respondents. The study used survey research design and generated data from primary source by means of questionnaire. A total number of 100 copies of questionnaire were administered out of which 68 were duly completed and returned. Cronbach’s alpha was used to test the internal validity of the various items in the constructs. Descriptive statistics, chi-square test, Mann Whitney U test and Kruskal Wallis ANOVA were employed for the analysis of data. The study finds that from the perception of the respondents, internal audit departments in Federal Hospitals in Kano State are effective and that they contribute positively to the overall attainment of the objectives of internal control system of these hospitals. There is no significant difference found on the views of the respondents from the three hospitals. Hence, the study concludes that strong and functional internal audit department is a basic requirement for effectiveness of operations of the internal control system. In the light of the findings, it is recommended that internal audit should continue to ensure that the objectives of internal control system of these hospitals are achieved through proper and adequate evaluation and review of the system.

Keywords: internal audit, internal control, federal hospitals, financial frauds

Procedia PDF Downloads 346
22075 Urban Development from the Perspective of Lou Gang Polder System: Taihu Lake, Huzhou as an Example

Authors: Wei Bin Shen

Abstract:

Lou Gang world irrigation project heritage in Taihu Lake is a systematic irrigation project integrating water conservancy, ecology and culture. Through the methods of historical documents and field investigation, this paper deeply analyzes the formation history, connotation and value of Lou Gang polder system: Lou Gang heritage, describes in detail the relationship between Lou Gang polder system in Taihu Lake and the development and evolution of Huzhou City, and initially explores the protection and Utilization Strategies of Lou Gang water conservancy cultural heritage resources in Taihu Lake from the current situation.

Keywords: Lou Gang, protection strategy, urban evolution, waterconservancyculturalheritage

Procedia PDF Downloads 163
22074 Spatial Analysis of Survival Pattern and Treatment Outcomes of Multi-Drug Resistant Tuberculosis (MDR-TB) Patients in Lagos, Nigeria

Authors: Akinsola Oluwatosin, Udofia Samuel, Odofin Mayowa

Abstract:

The study is aimed at assessing the Geographic Information System (GIS)-based spatial analysis of Survival Pattern and Treatment Outcomes of Multi-Drug Resistant Tuberculosis (MDR-TB) cases for Lagos, Nigeria, with an objective to inform priority areas for public health planning and resource allocation. Multi-drug resistant tuberculosis (MDR-TB) develops due to problems such as irregular drug supply, poor drug quality, inappropriate prescription, and poor adherence to treatment. The shapefile(s) for this study were already georeferenced to Minna datum. The patient’s information was acquired on MS Excel and later converted to . CSV file for easy processing to ArcMap from various hospitals. To superimpose the patient’s information the spatial data, the addresses was geocoded to generate the longitude and latitude of the patients. The database was used for the SQL query to the various pattern of the treatment. To show the pattern of disease spread, spatial autocorrelation analysis was used. The result was displayed in a graphical format showing the areas of dispersing, random and clustered of patients in the study area. Hot and cold spot analysis was analyzed to show high-density areas. The distance between these patients and the closest health facility was examined using the buffer analysis. The result shows that 22% of the points were successfully matched, while 15% were tied. However, the result table shows that a greater percentage of it was unmatched; this is evident in the fact that most of the streets within the State are unnamed, and then again, most of the patients are likely to supply the wrong addresses. MDR-TB patients of all age groups are concentrated within Lagos-Mainland, Shomolu, Mushin, Surulere, Oshodi-Isolo, and Ifelodun LGAs. MDR-TB patients between the age group of 30-47 years had the highest number and were identified to be about 184 in number. The outcome of patients on ART treatment revealed that a high number of patients (300) were not ART treatment while a paltry 45 patients were on ART treatment. The result shows the Z-score of the distribution is greater than 1 (>2.58), which means that the distribution is highly clustered at a significance level of 0.01.

Keywords: tuberculosis, patients, treatment, GIS, MDR-TB

Procedia PDF Downloads 146
22073 Study on Liquid Nitrogen Gravity Circulation Loop for Cryopumps in Large Space Simulator

Authors: Weiwei Shan, Wenjing Ding, Juan Ning, Chao He, Zijuan Wang

Abstract:

Gravity circulation loop for the cryopumps of the space simulator is introduced, and two phase mathematic model of flow heat transfer is analyzed as well. Based on this model, the liquid nitrogen (LN2) gravity circulation loop including its equipment and layout is designed and has served as LN2 feeding system for cryopumps in one large space simulator. With the help of control software and human machine interface, this system can be operated flexibly, simply, and automatically under four conditions. When running this system, the results show that the cryopumps can be cooled down and maintained under the required temperature, 120 K.

Keywords: cryopumps, gravity circulation loop, liquid nitrogen, two-phase

Procedia PDF Downloads 394
22072 Extractive Bioconversion of Polyhydroxyalkanoates (PHAs) from Ralstonia Eutropha Via Aqueous Two-Phase System-An Integrated Approach

Authors: Y. K. Leong, J. C. W. Lan, H. S. Loh, P. L. Show

Abstract:

Being biodegradable, non-toxic, renewable and have similar or better properties as commercial plastics, polyhydroxy alkanoates (PHAs) can be a potential game changer in the polymer industry. PHAs are the biodegradable polymer produced by bacteria, which are in interest as a sustainable alternative to petrochemical-derived plastics; however, its commercial value has significantly limited by high production and recovery cost of PHA. Aqueous two-phase system (ATPS) offers different chemical and physical environments, which contains about 80-90% water delivers an excellent environment for partitioning of cells, cell organelles and biologically active substances. Extractive bioconversion via ATPS allows the integration of PHA upstream fermentation and downstream purification process, which reduces production steps and time, thus lead to cost reduction. The ability of Ralstonia eutropha to grow under different ATPS conditions was investigated for its potential to be used in a bioconversion system. Changes in tie-line length (TLL) and a volume ratio (Vr) were shown to have an effect on PHA partition coefficient. High PHA recovery yield of 65% with a relatively high purity of 73% was obtained in PEG 6000/Sodium sulphate system with 42.6 wt/wt % TLL and 1.25 Vr. Extractive bioconversion via ATPS is an attractive approach for the combination of PHA production and recovery process.

Keywords: aqueous two-phase system, extractive bioconversion, polyhydroxy alkanoates, purification

Procedia PDF Downloads 305
22071 Managing IT Departments in Higher Education Institutes: Coping with the Exponentially Growing Needs and Expectations

Authors: Balqees A. Al-Thuhli, Ali H. Al-Badi, Khamis Al-Gharbi

Abstract:

Information technology is changing rapidly and the users’ expectations are also growing. Dealing with these changes in information technology, while satisfying the users’ needs and expectations is a big challenge. IT managers need to explore new mechanisms/strategies to enable them to cope with such challenges. The objectives of this research are to identify the significant challenges that might face IT managers in higher education institutes in the face of the high and ever growing customer expectations and to propose possible solutions to cope with such high-speed changes in information technology. To achieve these objectives, interviews with the IT professionals from different higher education institutes in Oman were conducted. In addition, documentation (printed and online) related to these institutions were studied and an intensive literature review of published work was examined. The findings of this research are expected to give a better understanding of the challenges that might face the IT managers at higher education institutes. This acquired understanding is expected to highlight the importance of being adaptable and fast in keeping up with the ever-growing technological changes. Moreover, adopting different tools and technologies could assist IT managers in developing their organisations’ IT policies and strategies.

Keywords: information technology, rapid change, CIO roles, challenges, IT managers, coping mechanisms, users' expectations

Procedia PDF Downloads 258
22070 Optimization and Vibration Suppression of Double Tuned Inertial Mass Damper of Damped System

Authors: Chaozhi Yang, Xinzhong Chen, Guoqing Huang

Abstract:

Inerter is a two-terminal inertial element that can produce apparent mass far larger than its physical mass. A double tuned inertial mass damper (DTIMD) is developed by combining a spring with an inerter and a dashpot in series to replace the viscous damper of a tuned mass damper (TMD), and its performance is investigated. Firstly, the DTIMD is optimized numerically with H∞ and H2 methods considering the system’s damping based on the single-degree-of-freedom (SDOF)-DTIMD system, and the optimal structural parameters are obtained. Then, compared with a TMD, the control effect of the DTIMD with the optimal structural parameters on wind-induced vibration of a wind turbine in downwind direction under the shutdown condition is studied. The results demonstrate that the vibration suppression of the DTIMD is superior than that of a TMD at the same mass ratio. And at the identical vibration suppression, the tuned mass of the DTIMD can be reduced by up to 40% compared with a TMD.

Keywords: wind-induced vibration, vibration control, inerter, tuned mass damper, damped system

Procedia PDF Downloads 155
22069 Family Cohesion, Interpersonal Difficulties and Mental Health Problems in University Students

Authors: Narmeen Ali, Muhammad Arshad

Abstract:

Cohesion has an exact association with family functioning and enmeshment (togetherness) on one side and disengagement (separateness) on the other. Family cohesion can apprehend as a concerned association that family members have with each other and an affirmation of association inside the family. Family cohesion, assigned as the level of congruity or sympathetic or emotional attachment that relatives have toward each other, and it was seen to be associated with relational well-being and feeling of comfort in the young generation. The cross-sectional research design was used by the researcher to answer the research questions. A stratified sampling technique was used to collect the data from the participants. The data was collected equally from the males and females of different universities and different departments of Lahore, Pakistan. A self-report questionnaire was developed of given literature and which were found to be associated with family cohesion, interpersonal difficulties and mental health problems of university students. The demographic information included age, gender, university’s name, class, family system, parent’s education, parent’s profession, number of siblings and birth order. Correlation shows the negative relation between balanced cohesion and interpersonal difficulties, while interpersonal difficulties have a highly positive relationship with mental health problems. Mental health problems also have a negative correlation with the balanced family cohesion. Gender, family system, depression and anxiety are the significant predictors of interpersonal difficulties scale in university students. And gender showed a significant difference regarding family cohesion and interpersonal difficulty scale, as women reported more interpersonal difficulties than men.

Keywords: family cohesion, interpersonal difficulties, mental health problems, university students

Procedia PDF Downloads 118
22068 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 368
22067 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer

Procedia PDF Downloads 542
22066 Barriers of the Development and Implementation of Health Information Systems in Iran

Authors: Abbas Sheikhtaheri, Nasim Hashemi

Abstract:

Health information systems have great benefits for clinical and managerial processes of health care organizations. However, identifying and removing constraints and barriers of implementing and using health information systems before any implementation is essential. Physicians are one of the main users of health information systems, therefore, identifying the causes of their resistance and concerns about the barriers of the implementation of these systems is very important. So the purpose of this study was to determine the barriers of the development and implementation of health information systems in terms of the Iranian physicians’ perspectives. In this study conducted in 8 selected hospitals affiliated to Tehran and Iran Universities of Medical Sciences, Tehran, Iran in 2014, physicians (GPs, residents, interns, specialists) in these hospitals were surveyed. In order to collect data, a research made questionnaire was used (Cronbach’s α = 0.95). The instrument included 25 about organizational (9), personal (4), moral and legal (3) and technical barriers (9). Participants were asked to answer the questions using 5 point scale Likert (completely disagree=1 to completely agree=5). By using a simple random sampling method, 200 physicians (from 600) were invited to study that eventually 163 questionnaires were returned. We used mean score and t-test and ANOVA to analyze the data using SPSS software version 17. 52.1% of respondents were female. The mean age was 30.18 ± 7.29. The work experience years for most of them were between 1 to 5 years (80.4 percent). The most important barriers were organizational ones (3.4 ± 0.89), followed by ethical (3.18 ± 0.98), technical (3.06 ± 0.8) and personal (3.04 ± 1.2). Lack of easy access to a fast Internet (3.67±1.91) and the lack of exchanging information (3.61±1.2) were the most important technical barriers. Among organizational barriers, the lack of efficient planning for the development and implementation systems (3.56±1.32) and was the most important ones. Lack of awareness and knowledge of health care providers about the health information systems features (3.33±1.28) and the lack of physician participation in planning phase (3.27±1.2) as well as concerns regarding the security and confidentiality of health information (3.15 ± 1.31) were the most important personal and ethical barriers, respectively. Women (P = 0.02) and those with less experience (P = 0.002) were more concerned about personal barriers. GPs also were more concerned about technical barriers (P = 0.02). According to the study, technical and ethics barriers were considered as the most important barriers however, lack of awareness in target population is also considered as one of the main barriers. Ignoring issues such as personal and ethical barriers, even if the necessary infrastructure and technical requirements were provided, may result in failure. Therefore, along with the creating infrastructure and resolving organizational barriers, special attention to education and awareness of physicians and providing solution for ethics concerns are necessary.

Keywords: barriers, development health information systems, implementation, physicians

Procedia PDF Downloads 340
22065 Multi Antenna Systems for 5G Mobile Phones

Authors: Muhammad N. Khan, Syed O. Gillani, Mohsin Jamil, Tarbia Iftikhar

Abstract:

With the increasing demand of bandwidth and data rate, there is a dire need to implement antenna systems in mobile phones which are able to fulfill user requirements. A monopole antenna system with multi-antennas configurations is proposed considering the feasibility and user demand. The multi-antenna structure is referred to as multi-input multi-output (MIMO) antenna system. The multi-antenna system comprises of 4 antennas operating below 6 GHz frequency bands for 4G/LTE and 4 antenna for 5G applications at 28 GHz and the dimension of board is 120 × 70 × 0.8mm3. The suggested designs is feasible with a structure of low-profile planar-antenna and is adaptable to smart cell phones and handheld devices. To the best of our knowledge, this is the first design compared to the literature by having integrated antenna system for two standards, i.e., 4G and 5G. All MIMO antenna systems are simulated on commercially available software, which is high frequency structures simulator (HFSS).

Keywords: high frequency structures simulator (HFSS), mutli-input multi-output (MIMO), monopole antenna, slot antenna

Procedia PDF Downloads 247
22064 Historical Landscape Affects Present Tree Density in Paddy Field

Authors: Ha T. Pham, Shuichi Miyagawa

Abstract:

Ongoing landscape transformation is one of the major causes behind disappearance of traditional landscapes, and lead to species and resource loss. Tree in paddy fields in the northeast of Thailand is one of those traditional landscapes. Using three different historical time layers, we acknowledged the severe deforestation and rapid urbanization happened in the region. Despite the general thinking of decline in tree density as consequences, the heterogeneous trend of changes in total tree density in three studied landscapes denied the hypothesis that number of trees in paddy field depend on the length of land use practice. On the other hand, due to selection of planting new trees on levees, existence of trees in paddy field are now rely on their values for human use. Besides, changes in land use and landscape structure had a significant impact on decision of which tree density level is considered as suitable for the landscape.

Keywords: aerial photographs, land use change, traditional landscape, tree in paddy fields

Procedia PDF Downloads 414
22063 Comparison Between Genetic Algorithms and Particle Swarm Optimization Optimized Proportional Integral Derirative and PSS for Single Machine Infinite System

Authors: Benalia Nadia, Zerzouri Nora, Ben Si Ali Nadia

Abstract:

Abstract: Among the many different modern heuristic optimization methods, genetic algorithms (GA) and the particle swarm optimization (PSO) technique have been attracting a lot of interest. The GA has gained popularity in academia and business mostly because to its simplicity, ability to solve highly nonlinear mixed integer optimization problems that are typical of complex engineering systems, and intuitiveness. The mechanics of the PSO methodology, a relatively recent heuristic search tool, are modeled after the swarming or cooperative behavior of biological groups. It is suitable to compare the performance of the two techniques since they both aim to solve a particular objective function but make use of distinct computing methods. In this article, PSO and GA optimization approaches are used for the parameter tuning of the power system stabilizer and Proportional integral derivative regulator. Load angle and rotor speed variations in the single machine infinite bus bar system is used to measure the performance of the suggested solution.

Keywords: SMIB, genetic algorithm, PSO, transient stability, power system stabilizer, PID

Procedia PDF Downloads 73
22062 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 410
22061 Collaborative Planning and Forecasting

Authors: Neha Asthana, Vishal Krishna Prasad

Abstract:

Collaborative planning and forecasting are the innovative and systematic approaches towards productive integration and assimilation of data synergized into information. The changing and variable market dynamics have persuaded global business chains to incorporate collaborative planning and forecasting as an imperative tool. Thus, it is essential for the supply chains to constantly improvise, update its nature, and mould as per changing global environment.

Keywords: information transfer, forecasting, optimization, supply chain management

Procedia PDF Downloads 427
22060 Simulation of Obstacle Avoidance for Multiple Autonomous Vehicles in a Dynamic Environment Using Q-Learning

Authors: Andreas D. Jansson

Abstract:

The availability of inexpensive, yet competent hardware allows for increased level of automation and self-optimization in the context of Industry 4.0. However, such agents require high quality information about their surroundings along with a robust strategy for collision avoidance, as they may cause expensive damage to equipment or other agents otherwise. Manually defining a strategy to cover all possibilities is both time-consuming and counter-productive given the capabilities of modern hardware. This paper explores the idea of a model-free self-optimizing obstacle avoidance strategy for multiple autonomous agents in a simulated dynamic environment using the Q-learning algorithm.

Keywords: autonomous vehicles, industry 4.0, multi-agent system, obstacle avoidance, Q-learning, simulation

Procedia PDF Downloads 133
22059 Analytical Soliton Solutions of the Fractional Jaulent-Miodek System

Authors: Sajeda Elbashabsheh, Kamel Al-Khaled

Abstract:

This paper applies a modified Laplace Adomian decomposition method to solve the time-fractional JaulentMiodek system. The method produce convergent series solutions with easily compatible components. This paper considers the Caputo fractional derivative. The effectiveness and applicability of the method are demonstrated by comparing its results with those of prior studies. Results are presented in tables and figures. These solutions might be imperative and significant for the explanation of some practical physical phenomena. All computations and figures in the work are done using MATHEMATICA. The numerical results demonstrate that the current methods are effective, reliable, and simple to i implement for nonlinear fractional partial differential equations.

Keywords: approximate solutions, Jaulent-Miodek system, Adomian decomposition method, solitons

Procedia PDF Downloads 32
22058 Evaluation of Vehicle Classification Categories: Florida Case Study

Authors: Ren Moses, Jaqueline Masaki

Abstract:

This paper addresses the need for accurate and updated vehicle classification system through a thorough evaluation of vehicle class categories to identify errors arising from the existing system and proposing modifications. The data collected from two permanent traffic monitoring sites in Florida were used to evaluate the performance of the existing vehicle classification table. The vehicle data were collected and classified by the automatic vehicle classifier (AVC), and a video camera was used to obtain ground truth data. The Federal Highway Administration (FHWA) vehicle classification definitions were used to define vehicle classes from the video and compare them to the data generated by AVC in order to identify the sources of misclassification. Six types of errors were identified. Modifications were made in the classification table to improve the classification accuracy. The results of this study include the development of updated vehicle classification table with a reduction in total error by 5.1%, a step by step procedure to use for evaluation of vehicle classification studies and recommendations to improve FHWA 13-category rule set. The recommendations for the FHWA 13-category rule set indicate the need for the vehicle classification definitions in this scheme to be updated to reflect the distribution of current traffic. The presented results will be of interest to States’ transportation departments and consultants, researchers, engineers, designers, and planners who require accurate vehicle classification information for planning, designing and maintenance of transportation infrastructures.

Keywords: vehicle classification, traffic monitoring, pavement design, highway traffic

Procedia PDF Downloads 175
22057 Partnership Oriented Innovation Alliance Strategy Based on Market Feedback

Authors: Victor Romanov, Daria Efimenko

Abstract:

The focus on innovation in modern economy is the main factor in surviving business in a competitive environment. The innovations are based on the search and use of knowledge in a global context. Nowadays consumers and market demand are the main innovation drivers. This leads to build a business as a system with feedback, promptly restructuring production and innovation implementation in response to market demands. In modern knowledge economy, because of speed of technical progress, the product's lifecycle became much shorter, what makes more stringent requirements for innovation implementation on the enterprises of and therefore the possibility for enterprise for receiving extra income is decreasing. This circumstance imposes additional requirements for the replacement of obsolete products and the prompt release of innovative products to the market. The development of information technologies has led to the fact that only in the conditions of partnership and knowledge sharing with partners it is possible to update products quickly for innovative products. Many companies pay attention to updating innovations through the search for new partners, but the task of finding new partners presents some difficulties. The search for a suitable one includes several stages such as: determining the moment of innovation-critical, introducing a search, identifying search criteria, justifying and deciding on the choice of a partner. No less important is the question of how to manage an innovative product in response to a changing market. The article considers the problems of information support for the search for the source of innovation and partnership to decrease the time for implementation of novelty products.

Keywords: partnership, novelty, market feedback, alliance

Procedia PDF Downloads 191
22056 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls

Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu

Abstract:

Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.

Keywords: android, API Calls, machine learning, permissions combination

Procedia PDF Downloads 323
22055 Effect of Carbon Amount of Dual-Phase Steels on Deformation Behavior Using Acoustic Emission

Authors: Ramin Khamedi, Isa Ahmadi

Abstract:

In this study acoustic emission (AE) signals obtained during deformation and fracture of two types of ferrite-martensite dual phase steels (DPS) specimens have been analyzed in frequency domain. For this reason two low carbon steels with various amounts of carbon were chosen, and intercritically heat treated. In the introduced method, identifying the mechanisms of failure in the various phases of DPS is done. For this aim, AE monitoring has been used during tensile test of several DPS with various volume fraction of the martensite (VM) and attempted to relate the AE signals and failure mechanisms in these steels. Different signals, which referred to 2-3 micro-mechanisms of failure due to amount of carbon and also VM have been seen. By Fast Fourier Transformation (FFT) of signals in distinct locations, an excellent relationship between peak frequencies in these areas and micro-mechanisms of failure were seen. The results were verified by microscopic observations (SEM).

Keywords: acoustic emission, dual phase steels, deformation, failure, fracture

Procedia PDF Downloads 399
22054 Application of Genetic Programming for Evolution of Glass-Forming Ability Parameter

Authors: Manwendra Kumar Tripathi, Subhas Ganguly

Abstract:

A few glass forming ability expressions in terms of characteristic temperatures have been proposed in the literature. Attempts have been made to correlate the expression with the critical diameter of the bulk metallic glass composition. However, with the advent of new alloys, many exceptions have been noted and reported. In the present approach, a genetic programming based code which generates an expression in terms of input variables, i.e., three characteristic temperatures viz. glass transition temperature (Tg), onset crystallization temperature (Tx) and offset temperature of melting (Tl) with maximum correlation with a critical diameter (Dmax). The expression evolved shows improved correlation with the critical diameter. In addition, the expression can be explained on the basis of time-temperature transformation curve.

Keywords: glass forming ability, genetic programming, bulk metallic glass, critical diameter

Procedia PDF Downloads 330
22053 Battery Grading Algorithm in 2nd-Life Repurposing LI-Ion Battery System

Authors: Ya L. V., Benjamin Ong Wei Lin, Wanli Niu, Benjamin Seah Chin Tat

Abstract:

This article introduces a methodology that improves reliability and cyclability of 2nd-life Li-ion battery system repurposed as an energy storage system (ESS). Most of the 2nd-life retired battery systems in the market have module/pack-level state-of-health (SOH) indicator, which is utilized for guiding appropriate depth-of-discharge (DOD) in the application of ESS. Due to the lack of cell-level SOH indication, the different degrading behaviors among various cells cannot be identified upon reaching retired status; in the end, considering end-of-life (EOL) loss and pack-level DOD, the repurposed ESS has to be oversized by > 1.5 times to complement the application requirement of reliability and cyclability. This proposed battery grading algorithm, using non-invasive methodology, is able to detect outlier cells based on historical voltage data and calculate cell-level historical maximum temperature data using semi-analytic methodology. In this way, the individual battery cell in the 2nd-life battery system can be graded in terms of SOH on basis of the historical voltage fluctuation and estimated historical maximum temperature variation. These grades will have corresponding DOD grades in the application of the repurposed ESS to enhance system reliability and cyclability. In all, this introduced battery grading algorithm is non-invasive, compatible with all kinds of retired Li-ion battery systems which lack of cell-level SOH indication, as well as potentially being embedded into battery management software for preventive maintenance and real-time cyclability optimization.

Keywords: battery grading algorithm, 2nd-life repurposing battery system, semi-analytic methodology, reliability and cyclability

Procedia PDF Downloads 196
22052 Theory of Negative Trigger: The Contract between Oral Probiotics and Immune System

Authors: Cliff Shunsheng Han

Abstract:

Identifying the direct allergy cause that can be easily mitigated is the foundation to stop the allergy epidemic that has been started in the seventies. It has confirmed that the personal and social hygiene practices are associated with the allergy prevalence. But direct causes have been found, and proposed translational measures have not been effective. This study, assisted by a particular case of allergies, has seen the direct cause of allergies, developed a valid test resulted in lasting relief for allergies, and constructed theory describing general relationship between microbiota and host immune system. Saliva samples were collected from a subject for three years during which time the person experienced yearlong allergy, seasonal allergy, and remission of allergy symptoms. Bacterial DNA was extracted and 16S rRNA genes were profiled with Illumina sequencing technology. The analyzing results indicate that the possible direct cause of allergy is the lacking probiotic bacteria in the oral cavity, such as genera Streptococcus and Veilonella, that can produce metabolites to pacify immune system. Targeted promotion of those bacteria with a compound designed for them, has led to lasting remissions of allergic rhinitis. During the development of the translational measure, the subject's oral biofilm was completely destructed by a moderate fever due to an unrelated respiratory infection. The incident not only facilitated the development of the heat based microbiota reseeding procedure but also indicated a possible natural switch that subsequently increases the efficacy of the immune system previously restrained by metabolites from microbiota. These results lead to the proposal of a Theory of Negative Trigger (TNT) to describe the relationship between oral probiotics and immune system, in which probiotics are the negative trigger that will release the power of immune system when removed by fever or modern lifestyles. This study could open doors leading to further understanding of how the immune system functions under the influence of microbiota as well as validate simple traditional practices for healthy living.

Keywords: oral microbiome, allergy, immune system, infection

Procedia PDF Downloads 123
22051 Valorization of Surveillance Data and Assessment of the Sensitivity of a Surveillance System for an Infectious Disease Using a Capture-Recapture Model

Authors: Jean-Philippe Amat, Timothée Vergne, Aymeric Hans, Bénédicte Ferry, Pascal Hendrikx, Jackie Tapprest, Barbara Dufour, Agnès Leblond

Abstract:

The surveillance of infectious diseases is necessary to describe their occurrence and help the planning, implementation and evaluation of risk mitigation activities. However, the exact number of detected cases may remain unknown whether surveillance is based on serological tests because identifying seroconversion may be difficult. Moreover, incomplete detection of cases or outbreaks is a recurrent issue in the field of disease surveillance. This study addresses these two issues. Using a viral animal disease as an example (equine viral arteritis), the goals were to establish suitable rules for identifying seroconversion in order to estimate the number of cases and outbreaks detected by a surveillance system in France between 2006 and 2013, and to assess the sensitivity of this system by estimating the total number of outbreaks that occurred during this period (including unreported outbreaks) using a capture-recapture model. Data from horses which exhibited at least one positive result in serology using viral neutralization test between 2006 and 2013 were used for analysis (n=1,645). Data consisted of the annual antibody titers and the location of the subjects (towns). A consensus among multidisciplinary experts (specialists in the disease and its laboratory diagnosis, epidemiologists) was reached to consider seroconversion as a change in antibody titer from negative to at least 32 or as a three-fold or greater increase. The number of seroconversions was counted for each town and modeled using a unilist zero-truncated binomial (ZTB) capture-recapture model with R software. The binomial denominator was the number of horses tested in each infected town. Using the defined rules, 239 cases located in 177 towns (outbreaks) were identified from 2006 to 2013. Subsequently, the sensitivity of the surveillance system was estimated as the ratio of the number of detected outbreaks to the total number of outbreaks that occurred (including unreported outbreaks) estimated using the ZTB model. The total number of outbreaks was estimated at 215 (95% credible interval CrI95%: 195-249) and the surveillance sensitivity at 82% (CrI95%: 71-91). The rules proposed for identifying seroconversion may serve future research. Such rules, adjusted to the local environment, could conceivably be applied in other countries with surveillance programs dedicated to this disease. More generally, defining ad hoc algorithms for interpreting the antibody titer could be useful regarding other human and animal diseases and zoonosis when there is a lack of accurate information in the literature about the serological response in naturally infected subjects. This study shows how capture-recapture methods may help to estimate the sensitivity of an imperfect surveillance system and to valorize surveillance data. The sensitivity of the surveillance system of equine viral arteritis is relatively high and supports its relevance to prevent the disease spreading.

Keywords: Bayesian inference, capture-recapture, epidemiology, equine viral arteritis, infectious disease, seroconversion, surveillance

Procedia PDF Downloads 292
22050 Testing of Electronic Control Unit Communication Interface

Authors: Petr Šimek, Kamil Kostruk

Abstract:

This paper deals with the problem of testing the Electronic Control Unit (ECU) for the specified function validation. Modern ECUs have many functions which need to be tested. This process requires tracking between the test and the specification. The technique discussed in this paper explores the system for automating this process. The paper focuses in its chapter IV on the introduction to the problem in general, then it describes the proposed test system concept and its principle. It looks at how the process of the ECU interface specification file for automated interface testing and test tracking works. In the end, the future possible development of the project is discussed.

Keywords: electronic control unit testing, embedded system, test generate, test automation, process automation, CAN bus, ethernet

Procedia PDF Downloads 106
22049 Downscaling Seasonal Sea Surface Temperature Forecasts over the Mediterranean Sea Using Deep Learning

Authors: Redouane Larbi Boufeniza, Jing-Jia Luo

Abstract:

This study assesses the suitability of deep learning (DL) for downscaling sea surface temperature (SST) over the Mediterranean Sea in the context of seasonal forecasting. We design a set of experiments that compare different DL configurations and deploy the best-performing architecture to downscale one-month lead forecasts of June–September (JJAS) SST from the Nanjing University of Information Science and Technology Climate Forecast System version 1.0 (NUIST-CFS1.0) for the period of 1982–2020. We have also introduced predictors over a larger area to include information about the main large-scale circulations that drive SST over the Mediterranean Sea region, which improves the downscaling results. Finally, we validate the raw model and downscaled forecasts in terms of both deterministic and probabilistic verification metrics, as well as their ability to reproduce the observed precipitation extreme and spell indicator indices. The results showed that the convolutional neural network (CNN)-based downscaling consistently improves the raw model forecasts, with lower bias and more accurate representations of the observed mean and extreme SST spatial patterns. Besides, the CNN-based downscaling yields a much more accurate forecast of extreme SST and spell indicators and reduces the significant relevant biases exhibited by the raw model predictions. Moreover, our results show that the CNN-based downscaling yields better skill scores than the raw model forecasts over most portions of the Mediterranean Sea. The results demonstrate the potential usefulness of CNN in downscaling seasonal SST predictions over the Mediterranean Sea, particularly in providing improved forecast products.

Keywords: Mediterranean Sea, sea surface temperature, seasonal forecasting, downscaling, deep learning

Procedia PDF Downloads 70