Search results for: detecting architectural tactics
1279 On the Optimality Assessment of Nano-Particle Size Spectrometry and Its Association to the Entropy Concept
Authors: A. Shaygani, R. Saifi, M. S. Saidi, M. Sani
Abstract:
Particle size distribution, the most important characteristics of aerosols, is obtained through electrical characterization techniques. The dynamics of charged nano-particles under the influence of electric field in electrical mobility spectrometer (EMS) reveals the size distribution of these particles. The accuracy of this measurement is influenced by flow conditions, geometry, electric field and particle charging process, therefore by the transfer function (transfer matrix) of the instrument. In this work, a wire-cylinder corona charger was designed and the combined field-diffusion charging process of injected poly-disperse aerosol particles was numerically simulated as a prerequisite for the study of a multi-channel EMS. The result, a cloud of particles with non-uniform charge distribution, was introduced to the EMS. The flow pattern and electric field in the EMS were simulated using computational fluid dynamics (CFD) to obtain particle trajectories in the device and therefore to calculate the reported signal by each electrometer. According to the output signals (resulted from bombardment of particles and transferring their charges as currents), we proposed a modification to the size of detecting rings (which are connected to electrometers) in order to evaluate particle size distributions more accurately. Based on the capability of the system to transfer information contents about size distribution of the injected particles, we proposed a benchmark for the assessment of optimality of the design. This method applies the concept of Von Neumann entropy and borrows the definition of entropy from information theory (Shannon entropy) to measure optimality. Entropy, according to the Shannon entropy, is the ''average amount of information contained in an event, sample or character extracted from a data stream''. Evaluating the responses (signals) which were obtained via various configurations of detecting rings, the best configuration which gave the best predictions about the size distributions of injected particles, was the modified configuration. It was also the one that had the maximum amount of entropy. A reasonable consistency was also observed between the accuracy of the predictions and the entropy content of each configuration. In this method, entropy is extracted from the transfer matrix of the instrument for each configuration. Ultimately, various clouds of particles were introduced to the simulations and predicted size distributions were compared to the exact size distributions.Keywords: aerosol nano-particle, CFD, electrical mobility spectrometer, von neumann entropy
Procedia PDF Downloads 3431278 Creative Accounting as a Financial Numbers Game
Authors: Feddaoui Amina
Abstract:
Through this study we will try to shed light on the theoretical framework proposed for understanding creative accounting as a financial numbers game and one of the most important techniques of accounts manipulation, its main actors and its practices. We will discover the role of the modified Jones model (1995) in detecting creative accounting practices using discretionary accruals. Finally we will try to confirm the importance and the need to address this type of practices using corporate governance as a main control system and an important defense line to reduce these dangerous accounts manipulation.Keywords: financial numbers game, creative accounting, modified Jones model, accounts manipulation
Procedia PDF Downloads 4771277 A New Assessment of the Chronology of the Vouni Palace
Authors: Seren Sevim Öğmen, Ömer Özyiğit
Abstract:
Vouni Palace is a Persian palace built on a rocky hill in the Lefke district of Cyprus. The palace is one of the limited number of architectures identified, which prove the existence of a Persian period on the island. Since the excavations on the palace were held a very long time ago, there is a need to re-date the cultural layers within the palace using new archaeological evidence and recent studies. The existing chronology has been reviewed and a new chronology has been created according to its architectural structure, floor findings such as ceramics and sculptures and the stratigraphic layer of Room 59 where the Vouni Treasure was found. This work dates the palace in Vouni between the periods of c. 520 BC, deduced from the early period sculptures, and c. 330 BC by the late period floor ceramics. Some earlier dated archaic sculptures are identified in Room 122 – which takes part in the temenos area of the palace, and correspondingly the construction of the palace is dated c. 520 BC. The comparison between Vouni Palace and Persian palaces built in Iran, shows similarities with palaces built during the rule of Darius. It is evident that two main building periods of the palace which are previously identified, represent Persian influence according to its architectural structure and findings. Several floor potteries show that there must be other layer or layers after Vouni Treasure dated 390/380 BC, which was considered as the destruction date of the palace. At this point the forenamed date can indicate the end of a stage, not the end of the period because the palace was still in use until c. 330 BC. The results of the study, in addition to dating the layers of Vouni Palace, enlightens the administrative function of the Palace within the Persian rule in Cyprus.Keywords: administrative, chronology, cyprus, persian rule, vouni palace
Procedia PDF Downloads 1171276 Application of the Standard Deviation in Regulating Design Variation of Urban Solutions Generated through Evolutionary Computation
Authors: Mohammed Makki, Milad Showkatbakhsh, Aiman Tabony
Abstract:
Computational applications of natural evolutionary processes as problem-solving tools have been well established since the mid-20th century. However, their application within architecture and design has only gained ground in recent years, with an increasing number of academics and professionals in the field electing to utilize evolutionary computation to address problems comprised from multiple conflicting objectives with no clear optimal solution. Recent advances in computer science and its consequent constructive influence on the architectural discourse has led to the emergence of multiple algorithmic processes capable of simulating the evolutionary process in nature within an efficient timescale. Many of the developed processes of generating a population of candidate solutions to a design problem through an evolutionary based stochastic search process are often driven through the application of both environmental and architectural parameters. These methods allow for conflicting objectives to be simultaneously, independently, and objectively optimized. This is an essential approach in design problems with a final product that must address the demand of a multitude of individuals with various requirements. However, one of the main challenges encountered through the application of an evolutionary process as a design tool is the ability for the simulation to maintain variation amongst design solutions in the population while simultaneously increasing in fitness. This is most commonly known as the ‘golden rule’ of balancing exploration and exploitation over time; the difficulty of achieving this balance in the simulation is due to the tendency of either variation or optimization being favored as the simulation progresses. In such cases, the generated population of candidate solutions has either optimized very early in the simulation, or has continued to maintain high levels of variation to which an optimal set could not be discerned; thus, providing the user with a solution set that has not evolved efficiently to the objectives outlined in the problem at hand. As such, the experiments presented in this paper seek to achieve the ‘golden rule’ by incorporating a mathematical fitness criterion for the development of an urban tissue comprised from the superblock as its primary architectural element. The mathematical value investigated in the experiments is the standard deviation factor. Traditionally, the standard deviation factor has been used as an analytical value rather than a generative one, conventionally used to measure the distribution of variation within a population by calculating the degree by which the majority of the population deviates from the mean. A higher standard deviation value delineates a higher number of the population is clustered around the mean and thus limited variation within the population, while a lower standard deviation value is due to greater variation within the population and a lack of convergence towards an optimal solution. The results presented will aim to clarify the extent to which the utilization of the standard deviation factor as a fitness criterion can be advantageous to generating fitter individuals in a more efficient timeframe when compared to conventional simulations that only incorporate architectural and environmental parameters.Keywords: architecture, computation, evolution, standard deviation, urban
Procedia PDF Downloads 1331275 Magnetic Resonance Imaging in Children with Brain Tumors
Authors: J. R. Ashrapov, G. A. Alihodzhaeva, D. E. Abdullaev, N. R. Kadirbekov
Abstract:
Diagnosis of brain tumors is one of the challenges, as several central nervous system diseases run the same symptoms. Modern diagnostic techniques such as CT, MRI helps to significantly improve the surgery in the operating period, after surgery, after allowing time to identify postoperative complications in neurosurgery. Purpose: To study the MRI characteristics and localization of brain tumors in children and to detect the postoperative complications in the postoperative period. Materials and methods: A retrospective study of treatment of 62 children with brain tumors in age from 2 to 5 years was performed. Results of the review: MRI scan of the brain of the 62 patients 52 (83.8%) case revealed a brain tumor. Distribution on MRI of brain tumors found in 15 (24.1%) - glioblastomas, 21 (33.8%) - astrocytomas, 7 (11.2%) - medulloblastomas, 9 (14.5%) - a tumor origin (craniopharyngiomas, chordoma of the skull base). MRI revealed the following characteristic features: an additional sign of the heterogeneous MRI signal of hyper and hypointensive T1 and T2 modes with a different perifocal swelling degree with involvement in the process of brain vessels. The main objectives of postoperative MRI study are the identification of early or late postoperative complications, evaluation of radical surgery, the identification of the extended-growing tumor that (in terms of 3-4 weeks). MRI performed in the following cases: 1. Suspicion of a hematoma (3 days or more) 2. Suspicion continued tumor growth (in terms of 3-4 weeks). Conclusions: Magnetic resonance tomography is a highly informative method of diagnostics of brain tumors in children. MRI also helps to determine the effectiveness and tactics of treatment and the follow up in the postoperative period.Keywords: brain tumors, children, MRI, treatment
Procedia PDF Downloads 1451274 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda
Abstract:
Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.Keywords: BGP, BGP hijacking, cybersecurity, detection
Procedia PDF Downloads 771273 An Analysis of Employee Attitudes to Organisational Change Management Practices When Adopting New Technologies Within the Architectural, Engineering, and Construction Industry: A Case Study
Authors: Hannah O'Sullivan, Esther Quinn
Abstract:
Purpose: The Architectural, Engineering, and Construction (AEC) industry has historically struggled to adapt to change. Although the ability to innovate and successfully implement organizational change has been demonstrated to be critical in achieving a sustainable competitive advantage in the industry, many AEC organizations continue to struggle when affecting organizational change. One prominent area of organizational change that presents many challenges in the industry is the adoption of new forms of technology, for example, Building Information Modelling (BIM). Certain Organisational Change Management (OCM) practices have been proven to be effective in supporting organizations to adopt change, but little research has been carried out on diverging employee attitudes to change relative to their roles within the organization. The purpose of this research study is to examine how OCM practices influence employee attitudes to change when adopting new forms of technology and to analyze the diverging employee perspectives within an organization on the importance of different OCM strategies. Methodology: Adopting an interview-based approach, a case study was carried out on a large-sized, prominent Irish construction organization who are currently adopting a new technology platform for its projects. Qualitative methods were used to gain insight into differing perspectives on the utilization of various OCM practices and their efficacy when adopting a new form of technology on projects. Change agents implementing the organizational change gave insight into their intentions with the technology rollout strategy, while other employees were interviewed to understand how this rollout strategy was received and the challenges that were encountered. Findings: The results of this research study are currently being finalized. However, it is expected that employees in different roles will value different OCM practices above others. Findings and conclusions will be determined within the coming weeks. Value: This study will contribute to the body of knowledge relating to the introduction of new technologies, including BIM, to AEC organizations. It will also contribute to the field of organizational change management, providing insight into methods of introducing change that will be most effective for different employees based on their roles and levels of experience within the industry. The focus of this study steers away from traditional studies of the barriers to adopting BIM in its first instance at an organizational level and centers on the direct effect on employees when a company changes the technology platform being used.Keywords: architectural, engineering, and construction (AEC) industry, Building Information Modelling, case study, challenges, employee perspectives, organisational change management.
Procedia PDF Downloads 691272 Lies of Police Interrogators in the Ultimatum Game
Authors: Eitan Elaad
Abstract:
The present study's purpose was to examine lyingand pretend fairness by police interrogators in sharing situations. Forty police officers and 40 laypeople from the community, all males, self-assessed their lie-telling ability, rated the frequency of their lies, evaluated the acceptability of lying, and indicated using rational and intuitive thinking while lying. Next, according to the ultimatum game procedure, participants were asked to share 100 points with a virtual target, either a male police interrogator or a male layman. Participantsallocated points to the target person bearing in mind that the other person must accept their offer. Participants' goal was to retain as many points as possible, and to this end, they could tell the target person that fewer than 100 points were available for distribution. The difference between the available 100 points and the sum of points designated for sharing defines lying. The ratio of offered and designated points defines pretend fairness. Results indicate that those police officers lied more than laypeople. Similar results emergedeven when the target person was a police interrogator. However, police interrogators presented higher pretend fairness than laypeople. The higher pretend fairness may be in line with interrogation tactics of persuasion used in the criminal interrogation. Higher-lying frequency reported by police interrogators compared with laypeople support the present results. Finally, lie acceptability predicted lying in the ultimatum game. Specifically, participants who rated lying as more acceptable tended to lie more than low acceptability raters.Keywords: lying, police interrogators, lie acceptability, ultimatum game, pretend fairness
Procedia PDF Downloads 1531271 A Three Phase Shunt Active Power Filter for Currents Harmonics Elimination and Reactive Power Compensation
Authors: Amar Omeiri
Abstract:
This paper presents a three-phase shunt active power filter for current harmonics suppression and reactive power compensation using the supply current as reference. The proposed APF has a simple control circuit; it consists of detecting the supply current instead of the load current. The advantages of this APF are simplicity of control circuits and low implementation cost. The simulation results show that the proposed APF can compensate the reactive power and suppress current harmonics with two types of non-linear loads.Keywords: active power filter, current harmonics and reactive power compensation, PWM inverter, Total Harmonic Distortion, power quality
Procedia PDF Downloads 5881270 Investigate the Mechanical Effect of Different Root Analogue Models to Soil Strength
Authors: Asmaa Al Shafiee, Erdin Ibraim
Abstract:
Stabilizing slopes by using vegetation is considered as a cost-effective and eco-friendly alternative to the conventional methods. The main aim of this study is to investigate the mechanical effect of analogue root systems on the shear strength of different soil types. Three objectives were defined to achieve the main aim of this paper. Firstly, explore the effect of root architectural design to shear strength parameters. Secondly, study the effect of root area ratio (RAR) on the shear strength of two different soil types. Finally, to investigate how different kinds of soil can affect the behavior of the roots during shear failure. 3D printing tool was used to develop different analogue tap root models with different architectural designs. Direct shear tests were performed on Leighton Buzzard (LB) fraction B sand, which represents a coarse sand and Huston sand, which represent medium-coarse sand. All tests were done with the same relative density for both kinds of sand. The results of the direct shear test indicated that using plant roots will increase both friction angle and cohesion of soil. Additionally, different root designs affected differently the shear strength of the soil. Furthermore, the directly proportional relationship was found between root area ratio for the same root design and shear strength parameters of soil. Finally, the root area ratio effect should be combined with branches penetrating the shear plane to get the highest results.Keywords: leighton buzzard sand, root area ratio, rooted soil, shear strength, slope stabilization
Procedia PDF Downloads 1521269 Outlier Detection in Stock Market Data using Tukey Method and Wavelet Transform
Authors: Sadam Alwadi
Abstract:
Outlier values become a problem that frequently occurs in the data observation or recording process. Thus, the need for data imputation has become an essential matter. In this work, it will make use of the methods described in the prior work to detect the outlier values based on a collection of stock market data. In order to implement the detection and find some solutions that maybe helpful for investors, real closed price data were obtained from the Amman Stock Exchange (ASE). Tukey and Maximum Overlapping Discrete Wavelet Transform (MODWT) methods will be used to impute the detect the outlier values.Keywords: outlier values, imputation, stock market data, detecting, estimation
Procedia PDF Downloads 811268 Perceiving Interpersonal Conflict and the Big Five Personality Traits
Authors: Emily Rivera, Toni DiDona
Abstract:
The Big Five personality traits is a hierarchical classification of personality traits that applies factor analysis to a personality survey data in order to describe human personality using five broad dimensions: Extraversion, Agreeableness, Conscientiousness, Neuroticism, and Openness (Fetvadjiev & Van de Vijer, 2015). Research shows that personality constructs underline individual differences in processing conflict and interpersonal relations. (Graziano et al., 1996). This research explores the understudied correlation between the Big Five personality traits and perceived interpersonal conflict in the workplace. It revises social psychological literature on Big Five personality traits within a social context and discusses organizational development journal articles on the perceived efficacy of conflict tactics and approach to interpersonal relationships. The study also presents research undertaken on a survey group of 867 subjects over the age of 18 that were recruited by means of convenience sampling through social media, email, and text messaging. The central finding of this study is that only two of the Big Five personality traits had a significant correlation with perceiving interpersonal conflict in the workplace. Individuals who score higher on agreeableness and neuroticism, perceive more interpersonal conflict in the workplace compared to those that score lower on each dimension. The relationship between both constructs is worthy of research due to its everyday frequency and unique individual psycho-social consequences. This multimethod research associated the Big Five personality dimensions to interpersonal conflict. Its findings that can be utilized to further understand social cognition, person perception, complex social behavior and social relationships in the work environment.Keywords: five-factor model, interpersonal conflict, personality, The Big Five personality traits
Procedia PDF Downloads 1571267 Determination of Aquifer Geometry Using Geophysical Methods: A Case Study from Sidi Bouzid Basin, Central Tunisia
Authors: Dhekra Khazri, Hakim Gabtni
Abstract:
Because of Sidi Bouzid water table overexploitation, this study aims at integrating geophysical methods to determinate aquifers geometry assessing their geological situation and geophysical characteristics. However in highly tectonic zones controlled by Atlassic structural features with NE-SW major directions (central Tunisia), Bouguer gravimetric responses of some areas can be as much dominated by the regional structural tendency, as being non-identified or either defectively interpreted such as the case of Sidi Bouzid basin. This issue required a residual gravity anomaly elaboration isolating the Sidi Bouzid basin gravity response ranging between -8 and -14 mGal and crucial for its aquifers geometry characterization. Several gravity techniques helped constructing the Sidi Bouzid basin's residual gravity anomaly, such as Upwards continuation compared to polynomial regression trends and power spectrum analysis detecting deep basement sources at (3km), intermediate (2km) and shallow sources (1km). A 3D Euler Deconvolution was also performed detecting deepest accidents trending NE-SW, N-S and E-W with depth values reaching 5500 m and delineating the main outcropping structures of the study area. Further gravity treatments highlighted the subsurface geometry and structural features of Sidi Bouzid basin over Horizontal and vertical gradient, and also filters based on them such as Tilt angle and Source Edge detector locating rooted edges or peaks from potential field data detecting a new E-W lineament compartmentalizing the Sidi Bouzid gutter into two unequally residual anomaly and subsiding domains. This subsurface morphology is also detected by the used 2D seismic reflection sections defining the Sidi Bouzid basin as a deep gutter within a tectonic set of negative flower structures, and collapsed and tilted blocks. Furthermore, these structural features were confirmed by forward gravity modeling process over several modeled residual gravity profiles crossing the main area. Sidi Bouzid basin (central Tunisia) is also of a big interest cause of the unknown total thickness and the undefined substratum of its siliciclastic Tertiary package, and its aquifers unbounded structural subsurface features and deep accidents. The Combination of geological, hydrogeological and geophysical methods is then of an ultimate need. Therefore, a geophysical methods integration based on gravity survey supporting available seismic data through forward gravity modeling, enhanced lateral and vertical extent definition of the basin's complex sedimentary fill via 3D gravity models, improved depth estimation by a depth to basement modeling approach, and provided 3D isochronous seismic mapping visualization of the basin's Tertiary complex refining its geostructural schema. A subsurface basin geomorphology mapping, over an ultimate matching between the basin's residual gravity map and the calculated theoretical signature map, was also displayed over the modeled residual gravity profiles. An ultimate multidisciplinary geophysical study of the Sidi Bouzid basin aquifers can be accomplished via an aeromagnetic survey and a 4D Microgravity reservoir monitoring offering temporal tracking of the target aquifer's subsurface fluid dynamics enhancing and rationalizing future groundwater exploitation in this arid area of central Tunisia.Keywords: aquifer geometry, geophysics, 3D gravity modeling, improved depths, source edge detector
Procedia PDF Downloads 2831266 Crater Detection Using PCA from Captured CMOS Camera Data
Authors: Tatsuya Takino, Izuru Nomura, Yuji Kageyama, Shin Nagata, Hiroyuki Kamata
Abstract:
We propose a method of detecting the craters from the image of the lunar surface. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) working group aiming at the pinpoint landing on the lunar surface and investigating scientific research. It is difficult to equip and use high-performance computers for the small space probe. So, it is necessary to use a small computer with an exclusive hardware such as FPGA. We have studied the crater detection using principal component analysis (PCA), In this paper, We implement detection algorithm into the FPGA, and the detection is performed on the data that was captured from the CMOS camera.Keywords: crater detection, PCA, FPGA, image processing
Procedia PDF Downloads 5501265 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 971264 Investigation and Research on Construction Technology of Tenon and Mortise in Traditional Chinese Architecture
Authors: Liang Zhang
Abstract:
Chinese traditional architecture has developed a school of its own in the world. It has a different structure and construction technology from western architecture. Tenon and mortise structure and construction technology, as the key to the construction of traditional Chinese architecture, have been inherited for thousands of years by traditional craftsmen in various regions of China. However, the traditional architecture varies greatly in different times and regional cultures in China. It is still a lack of research whether this difference extends to mortise and tenon technology. In this study, we measured the mortise and tenon of traditional buildings in Fujian province, Yunnan province, and Northern China; Interviewed some old craftsmen about their traditional construction methods, And compared the today's traditional mortise and tenon technology with that of Song and Qing Dynasties. The results showed that although Chinese traditional architecture has the same origin, the mortise and tenon construction technology systems have been developed at different times, regions, and cultures. For example, tenon and mortise technology in Yunnan Province needs to ensure the ability of buildings to resist earthquakes, while that in Fujian Province needs to ensure the ability of buildings to withstand typhoons. People in different regions, cultures, and times have a different understanding of architectural aesthetics, and the evolution of tools also has different effects on mortise and tenon technology. This study explains the manifestations and causes of these differences. At the same time, due to the impact of modern architectural technology, mortise, and tenon, traditional technology is also rapidly disappearing. As a sorting and collection of mortise and tenon techniques of traditional Chinese architecture, this paper puts forward the corresponding traditional technology protection strategy, to guide the protection and maintenance of local traditional buildings.Keywords: tenon and mortise, traditional Chinese architecture, traditional craftsmen, construction technology
Procedia PDF Downloads 1471263 Wavelet Based Residual Method of Detecting GSM Signal Strength Fading
Authors: Danladi Ali, Onah Festus Iloabuchi
Abstract:
In this paper, GSM signal strength was measured in order to detect the type of the signal fading phenomenon using one-dimensional multilevel wavelet residual method and neural network clustering to determine the average GSM signal strength received in the study area. The wavelet residual method predicted that the GSM signal experienced slow fading and attenuated with MSE of 3.875dB. The neural network clustering revealed that mostly -75dB, -85dB and -95dB were received. This means that the signal strength received in the study is a weak signal.Keywords: one-dimensional multilevel wavelets, path loss, GSM signal strength, propagation, urban environment
Procedia PDF Downloads 3381262 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments
Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo
Abstract:
This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.Keywords: cloud, enhancing security, fog, IoT, telehealth
Procedia PDF Downloads 781261 A Case Study of Physical and Psychological Forces in the Nigerian Criminal and Military Interrogations
Authors: Onimisi Ekuh Abdullahi, Lasbat Omoshalewa Akinsemoyin
Abstract:
In Nigeria, over two decades now, there has been a steady increase in the insecurity of human lives and physical properties. In the South-South Nigeria, there is an acute insecurity of militants destroying oil pipe-lines and kidnapping cases; in the Middle-Belt zone, insecurity centers on kidnapping and in a few states crises between Herdsmen and Farmers range like wildfire; in the South-Western zone, kidnapping is vile, in the North-East zone the issue of Boko Haram has become World-wide concern, and in North-west zone, cattle rustlers and religious crisis are of great concern. At the initial stage, the Nigerian Police Force was called upon to quell the crisis. It soon became obvious that the dimension of the crisis was beyond police force. The Nigerian Armed Forces were called to maintain peace and order because the magnitude of the crisis was threatening the national unity and cohesion. The main objective of this paper, was to examine the investigative techniques of criminal by the military in Nigeria. Specifically to examine the physical and psychological force; the abusive techniques and tactics; and suggest modern psychological techniques of interrogating criminals accepted to Human Right Activists and the rule of law. The process is to create room behaviour and practices that carefully monitored the trust and reliability of admissions produced by Psychological manipulative process in Nigeria.Keywords: military, Nigerian criminal, physical, psychological force
Procedia PDF Downloads 1601260 Sustainable Concepts Applied in the Pre-Columbian Andean Architecture in Southern Ecuador
Authors: Diego Espinoza-Piedra, David Duran
Abstract:
All architectural and land use processes are framed in a cultural, social and geographical context. The present study analyzes the Andean culture before the Spanish conquest in southern Ecuador, in the province of Azuay. This area has been habited for more than 10.000 years. The Canari and the Inca cultures occupied Azuay close to the arrival of the Spanish conquers. The Inca culture was settled in the Andes Mountains. The Canari culture was established in the south of Ecuador, on the actual provinces of Azuay and Canar. In contrast with history and archeology, to the best of our knowledge, their architecture has not yet been studied in this area because of the lack of architectural structures. Consequently, the present research reviewed the land use and culture for architectonic interpretations. The two main architectural objects in these cultures were dwellings and public buildings. In the first case, housing was conceived as temporary. It had to stand as long as its inhabitants lived. Therefore, houses were built when a couple got married. The whole community started the construction through the so-called ‘minga’ or collective work. The construction materials were tree branches, reeds, agave, ground, and straw. So that when their owners aged and then died, this house was easily disarmed and overthrown. Their materials become part of the land for agriculture. Finally, this cycle was repeated indefinitely. In the second case, the buildings, which we can call public, have presented erroneous interpretations. They have been defined as temples. But according to our conclusions, they were places for temporary accommodation, storage of objects and products, and in some special cases, even astronomical observatories. These public buildings were settled along the important road system called ‘Capac-Nam’, currently declared by UNESCO as World Cultural Heritage. The buildings had different scales at regular distances. Also, they were established in special or strategic places, which constituted a system of observatories. These observatories allowed to determine the cycles or calendars (solar or lunar) necessary for the agricultural production, as well as other natural phenomena. Most of the current minimal existence of physical structures in quantity and state of conservation is at the level of foundations or pieces of walls. Therefore, this study was realized after the identification of the history and culture of the inhabitants of this Andean region.Keywords: Andean, pre-Colombian architecture, Southern Ecuador, sustainable
Procedia PDF Downloads 1271259 Grandparent's Psychologically Control, Parent's Well-Being and the Coparenting Practice among Vietnamese Families
Authors: Nam-Phuong T. Hoang, Divna Haslam, Matthew Sanders
Abstract:
Parenting psychological control (PPC) is a parenting manner of which intrusive tactics such as guilt induction, shaming or love withdrawal is adopted to manipulate the child's behavior, emotion and beliefs. PPC has been widely reported to be associated with both psychological dysfunction and low self-esteem in adolescents. Highly demanding and restrictive parenting was also found to related to high rate of risk behaviors, depression, anxiety and anti-social behaviors in adults who co-live with their parents. In many cultures like that of Asia, adults keep on co-live with their parents even after having their own families, and this is not an uncommon practice. Due to the culture obligation of family relationship and the filial piety, children are expected to stay with their parents to taking care of them when they get older, and the parents are also expected to co-live with their children in order to support them with grandchild care. As one become a grandparent, however, it does not means one stop being the parent to their own child. The effect of PPC if exist thus might continue to interfere one’s relationship with their adult children and also their adult child’s parenting. This study was designed to examine that effect of PPC on adults’ life as parents. Data was collected from 501 Vietnamese parents whose children between the age of 2 to 12 and having their parent living with them or taking care of the grandchild on daily basic. Findings show that grandparent psychological control (GPPC) is significantly associated with parent’s harsh parenting, parent’s well-being, and parent-grandparent coparenting relationship. Significantly, GPPC is the strongest predictor for the coparenting conflict between parent and grandparent.Keywords: parenting psychological control, grandparent, coparenting, well-being
Procedia PDF Downloads 2491258 PCR Based DNA Analysis in Detecting P53 Mutation in Human Breast Cancer (MDA-468)
Authors: Debbarma Asis, Guha Chandan
Abstract:
Tumor Protein-53 (P53) is one of the tumor suppressor proteins. P53 regulates the cell cycle that conserves stability by preventing genome mutation. It is named so as it runs as 53-kilodalton (kDa) protein on Polyacrylamide gel electrophoresis although the actual mass is 43.7 kDa. Experimental evidence has indicated that P53 cancer mutants loses tumor suppression activity and subsequently gain oncogenic activities to promote tumourigenesis. Tumor-specific DNA has recently been detected in the plasma of breast cancer patients. Detection of tumor-specific genetic materials in cancer patients may provide a unique and valuable tumor marker for diagnosis and prognosis. Commercially available MDA-468 breast cancer cell line was used for the proposed study.Keywords: tumor protein (P53), cancer mutants, MDA-468, tumor suppressor gene
Procedia PDF Downloads 4801257 Methodology to Affirm Driver Engagement in Dynamic Driving Task (DDT) for a Level 2 Adas Feature
Authors: Praneeth Puvvula
Abstract:
Autonomy in has become increasingly common in modern automotive cars. There are 5 levels of autonomy as defined by SAE. This paper focuses on a SAE level 2 feature which, by definition, is able to control the vehicle longitudinally and laterally at the same time. The system keeps the vehicle centred with in the lane by detecting the lane boundaries while maintaining the vehicle speed. As with the features from SAE level 1 to level 3, the primary responsibility of dynamic driving task lies with the driver. This will need monitoring techniques to ensure the driver is always engaged even while the feature is active. This paper focuses on the these techniques, which would help the safe usage of the feature and provide appropriate warnings to the driver.Keywords: autonomous driving, safety, adas, automotive technology
Procedia PDF Downloads 891256 Experiencing Daylight in Architectural Spaces: A Case Study of Public Buildings in the Context of Karachi, Pakistan
Authors: Safia Asif, Saadia Bano
Abstract:
In a world with rapidly depleting resources, using artificial lighting during daytime is an act of human ignorance. Imitated light is the major source of energy consumption in public buildings. Despite, the fact that substantial working hours of these buildings usually persist in natural daylight time; there is a trend of isolated, un-fenestrated and a-contextual interiors majorly dependent on active energy sources. On the contrary, if direct and un-controlled sunlight is allowed inside the building, it will create visual and thermal discomfort. Controlled daylighting with appropriate design mechanisms is one of the important aspects of achieving thermal and visual comfort. The natural sunlight can be utilized intelligently with the help of architectural thermal controlling mechanisms to achieve a healthy and productive environment. This paper is an attempt to investigate and analyze the importance of daylighting with reference to energy efficiency and thermal comfort. For this purpose, three public buildings including two educational institutions and one general post office are selected, as case-studies in the context of Karachi, Pakistan. Various parameters of visual and thermal comfort are analyzed which includes orientation, ceiling heights, overall building profile along with daylight controlling mechanisms in terms of penetration, distribution, protection, and control. In the later part of the research, a questionnaire survey is also conducted to evaluate the user experience in terms of adequate daylighting and thermal comfort.Keywords: daylight, public buildings, sustainable architecture, visual and thermal comfort
Procedia PDF Downloads 2101255 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based
Procedia PDF Downloads 4841254 Sustainable Cities: Harnessing the Power of Urban Renewable Energy
Authors: Mehrzad Soltani, Pegah Rezaei
Abstract:
In the endeavor to construct cities that are not only thriving but also environmentally responsible, effective urban planning and architectural design assume paramount significance. The focal point of this pursuit is the harnessing of urban renewable energy. By embracing sustainable practices such as the integration of solar panels into the urban landscape and the establishment of smart grids, cities are poised to confront head-on the dual challenge of surging energy demands and pressing environmental concerns. Urban renewable energy solutions offer a multifaceted approach to these issues. Firstly, they usher in a clean and sustainable source of energy, reducing the cities' ecological footprint while ensuring a continuous power supply. This transition to eco-friendly energy is also intrinsically linked to enhanced spatial utilization, thereby streamlining the efficiency of urban areas. Moreover, it spurs the adoption of sustainable transportation alternatives, diminishing the reliance on fossil fuels and mitigating air pollution. However, the significance of integrating renewable energy solutions transcends the realm of urban sustainability. It embodies a holistic approach towards creating cities that harmoniously coexist with the natural environment while catering to the needs and aspirations of their inhabitants. In essence, prioritizing sustainability in urban planning and architectural design has evolved from a choice to a necessity, one that not only safeguards the cities' well-being but also fosters a better quality of life for their residents. Thus, it is imperative that we acknowledge the transformative potential of these innovations as we pave the way towards the cities of the future.Keywords: sustainability, smart grids, solar panel, urban planning, environmental concerns
Procedia PDF Downloads 951253 Optimize Data Evaluation Metrics for Fraud Detection Using Machine Learning
Authors: Jennifer Leach, Umashanger Thayasivam
Abstract:
The use of technology has benefited society in more ways than one ever thought possible. Unfortunately, though, as society’s knowledge of technology has advanced, so has its knowledge of ways to use technology to manipulate people. This has led to a simultaneous advancement in the world of fraud. Machine learning techniques can offer a possible solution to help decrease this advancement. This research explores how the use of various machine learning techniques can aid in detecting fraudulent activity across two different types of fraudulent data, and the accuracy, precision, recall, and F1 were recorded for each method. Each machine learning model was also tested across five different training and testing splits in order to discover which testing split and technique would lead to the most optimal results.Keywords: data science, fraud detection, machine learning, supervised learning
Procedia PDF Downloads 1961252 The Comparative Study of the Characteristics of Chinese and Foreign Excellent Woman’s Single Players’ Serve, Receive Tactic Author
Authors: Zhai Yuan, Wu Xueqing
Abstract:
This article statistics the technology which used by Chinese and foreign excellent players in the game, including types and serves areas,receive technology and effect and utilization ratio receiving and losing points. The sample is che videos which is world's top matches of excellent badminton athletes of che single, including Chinese players’ 43 games and foreign players’ 38 games. Conclusion: For the serving, Chinese and foreign single players are to give priority to forehand short-low serve and the long-high serve. And Chinese and foreign players in using forehand short-low serve and drive server exist significant differences; For the serves areas, Chinese and foreign players serve area is concentrated in area 1,5,6. Area 6 has the highest rate of all the district areas, following by the area 1and area 5. Among the 2ed serve area Sino-foreign player, there exist significant differences; In the receiver, when returning the frontcourt shutter, players is given priority to net lift and push. When returning the backcourt shutter, receiver's the best ball is smash, followed by clear and drop shot. Foreign players have higher utilization rate in smash than Chinese players in the backcourt; In the receiver result, Chinese players give priority to actively and equally situation than foreign players, but in negatively receiving is just opposite.Keywords: badminton, woman’s singles, technique and tactics, comparative analysis
Procedia PDF Downloads 5391251 Navigating Cyber Attacks with Quantum Computing: Leveraging Vulnerabilities and Forensics for Advanced Penetration Testing in Cybersecurity
Authors: Sayor Ajfar Aaron, Ashif Newaz, Sajjat Hossain Abir, Mushfiqur Rahman
Abstract:
This paper examines the transformative potential of quantum computing in the field of cybersecurity, with a focus on advanced penetration testing and forensics. It explores how quantum technologies can be leveraged to identify and exploit vulnerabilities more efficiently than traditional methods and how they can enhance the forensic analysis of cyber-attacks. Through theoretical analysis and practical simulations, this study highlights the enhanced capabilities of quantum algorithms in detecting and responding to sophisticated cyber threats, providing a pathway for developing more resilient cybersecurity infrastructures.Keywords: cybersecurity, cyber forensics, penetration testing, quantum computing
Procedia PDF Downloads 671250 Site Analysis’ Importance as a Valid Factor in Building Design
Authors: Mekwa Eme, Anya chukwuma
Abstract:
The act of evaluating a particular site physically and socially in order to create a good design solution that will address the physical and interior environment of the location is known as architectural site analysis. This essay will describe site analysis as a useful design component. According to the introduction and supporting research, site evaluation and analysis are crucial to good design in terms of topography, orientation, site size, accessibility, rainfall, wind direction, and times of sunrise and sunset. Methodology: Both quantitative and qualitative analyses are used in this paper. The primary and secondary types of data collection are as follows. This information was gathered via the case study approach, already published literature, journals, the internet, a local poll, oral interviews, inquiries, and in-person interviews. The purpose of this is to clarify the benefits of site analysis for the design process and its implications for the working or building stage. Results: Each site's criteria are unique in terms of things like soil, plants, trees, accessibility, topography, and security. This will make it easier for the architect and environmentalist to decide on the idea, shape, and supporting structures of the design. It is crucial because before any design work is done, the nature of the target location will be determined through site visits and research. The location, contours, site features, and accessibility are just a few of the topics included in this site study. In order for students and working architects to understand the nature of the site they will be working on, site analysis is a key component of architectural education. The building's orientation, the site's circulation, and the sustainability of the site may all be determined with thorough research of the site's features.Keywords: analysis, climate, statistics, design
Procedia PDF Downloads 249