Search results for: vulnerability discovery
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1260

Search results for: vulnerability discovery

840 Testing Depression in Awareness Space: A Proposal to Evaluate Whether a Psychotherapeutic Method Based on Spatial Cognition and Imagination Therapy Cures Moderate Depression

Authors: Lucas Derks, Christine Beenhakker, Michiel Brandt, Gert Arts, Ruud van Langeveld

Abstract:

Background: The method Depression in Awareness Space (DAS) is a psychotherapeutic intervention technique based on the principles of spatial cognition and imagination therapy with spatial components. The basic assumptions are: mental space is the primary organizing principle in the mind, and all psychological issues can be treated by first locating and by next relocating the conceptualizations involved. The most clinical experience was gathered over the last 20 years in the area of social issues (with the social panorama model). The latter work led to the conclusion that a mental object (image) gains emotional impact when it is placed more central, closer and higher in the visual field – and vice versa. Changing the locations of mental objects in space thus alters the (socio-) emotional meaning of the relationships. The experience of depression seems always associated with darkness. Psychologists tend to see the link between depression and darkness as a metaphor. However, clinical practice hints to the existence of more literal forms of darkness. Aims: The aim of the method Depression in Awareness Space is to reduce the distress of clients with depression in the clinical counseling practice, as a reliable alternative method of psychological therapy for the treatment of depression. The method Depression in Awareness Space aims at making dark areas smaller, lighter and more transparent in order to identify the problem or the cause of the depression which lies behind the darkness. It was hypothesized that the darkness is a subjective side-effect of the neurological process of repression. After reducing the dark clouds the real problem behind the depression becomes more visible, allowing the client to work on it and in that way reduce their feelings of depression. This makes repression of the issue obsolete. Results: Clients could easily get into their 'sadness' when asked to do so and finding the location of the dark zones proved pretty easy as well. In a recent pilot study with five participants with mild depressive symptoms (measured on two different scales and tested against an untreated control group with similar symptoms), the first results were also very promising. If the mental spatial approach to depression can be proven to be really effective, this would be very good news. The Society of Mental Space Psychology is now looking for sponsoring of an up scaled experiment. Conclusions: For spatial cognition and the research into spatial psychological phenomena, the discovery of dark areas can be a step forward. Beside out of pure scientific interest, it is great to know that this discovery has a clinical implication: when darkness can be connected to depression. Also, darkness seems to be more than metaphorical expression. Progress can be monitored over measurement tools that quantify the level of depressive symptoms and by reviewing the areas of darkness.

Keywords: depression, spatial cognition, spatial imagery, social panorama

Procedia PDF Downloads 151
839 A Reactive Fast Inter-MAP Handover for Hierarchical Mobile IPv6

Authors: Pyung Soo Kim

Abstract:

This paper proposes an optimized reactive fast intermobility anchor point (MAP) handover scheme for Hierarchical Mobile IPv6, called the ORFH-HMIPv6, to minimize packet loss of the existing scheme. The key idea of the proposed ORFHHMIPv6 scheme is that the serving MAP buffers packets toward the mobile node (MN) as soon as the link layer between MN and serving base station is disconnected. To implement the proposed scheme, the MAP discovery message exchanged between MN and serving MAP is extended. In addition, the IEEE 802.21 Media Independent Handover Function (MIHF) event service message is defined newly. Through analytic performance evaluation, the proposed ORFH-HMIPv6 scheme can be shown to minimize packet loss much than the existing scheme.

Keywords: hierarchical mobile IPv6 (HMIPv6), fast handover, reactive behavior, packet loss

Procedia PDF Downloads 193
838 A Case Study: Beginning Teacher's Experiences of Mentoring in Secondary Education

Authors: Abdul Rofiq Badril Rizal M. Z.

Abstract:

This case study examines the experiences of four beginning teachers currently working in New South Wales secondary schools. Data were collected from semi-structured interviews conducted one on one over the period of one month. The data were coded with findings reported through key areas of discovery, which linked to the research presented in the literature review. The participants involved in the case study all reported positive experiences with mentoring, though none were given the opportunity to take part in a formal mentoring program, and all the mentors offered their time voluntarily. The mentoring took different forms, but the support most valued by the participants was the emotional and curriculum related supported received. All participants wished they had greater access to mentoring and felt it would have benefits for most beginning teachers. The study highlights ongoing issues around the lack of access to mentoring, which could be due to factors such as funding, time and training.

Keywords: mentor, mentee, pre-service teacher, beginning teacher

Procedia PDF Downloads 94
837 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management

Procedia PDF Downloads 81
836 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 285
835 Hybrid Reliability-Similarity-Based Approach for Supervised Machine Learning

Authors: Walid Cherif

Abstract:

Data mining has, over recent years, seen big advances because of the spread of internet, which generates everyday a tremendous volume of data, and also the immense advances in technologies which facilitate the analysis of these data. In particular, classification techniques are a subdomain of Data Mining which determines in which group each data instance is related within a given dataset. It is used to classify data into different classes according to desired criteria. Generally, a classification technique is either statistical or machine learning. Each type of these techniques has its own limits. Nowadays, current data are becoming increasingly heterogeneous; consequently, current classification techniques are encountering many difficulties. This paper defines new measure functions to quantify the resemblance between instances and then combines them in a new approach which is different from actual algorithms by its reliability computations. Results of the proposed approach exceeded most common classification techniques with an f-measure exceeding 97% on the IRIS Dataset.

Keywords: data mining, knowledge discovery, machine learning, similarity measurement, supervised classification

Procedia PDF Downloads 449
834 Verification of the Effect of the Hazard-Perception Training Tool for Drivers Ported from a Tablet Device to a Smartphone

Authors: K. Shimazaki, M. Mishina, A. Fujii

Abstract:

In a previous study, we developed a hazard-perception training tool for drivers using a tablet device and verified its effectiveness. Accident movies recorded by drive recorders were separated into scenes before and after the collision. The scene before the collision is presented to the driver. The driver then touches the screen to point out where he/she feels danger. After the screen is touched, the tool presents the collision scene and tells the driver if what he/she pointed out is correct. Various effects were observed such as this tool increased the discovery rate of collision targets and reduced the reaction time. In this study, we optimized this tool for the smartphone and verified its effectiveness. Verifying in the same way as in the previous study on tablet devices clarified that the same effect can be obtained on the smartphone screen.

Keywords: hazard perception, smartphone, tablet devices, driver education

Procedia PDF Downloads 206
833 Heat Transfer Studies on CNT Nanofluids in a Turbulent Flow Heat Exchanger

Authors: W. Rashmi, M. Khalid, O. Seiksan, R. Saidur, A. F. Ismail

Abstract:

Nanofluids have received much more attention since its discovery. They are believed to be promising coolants in heat transfer applications due to their enhanced thermal conductivity and heat transfer characteristics. In this study, the enhancement in heat transfer of CNT-nanofluids under turbulent flow conditions is investigated experimentally. Carbon nanotube (CNTs) concentration was varied between 0.051-0.085 wt%. The nanofluid suspension was stabilized by gum arabic (GA) through a process of homogenisation and sonication. The flow rates of cold fluid (water) is varied from 1.7-3 L/min and flow rates of the hot fluid is varied between 2-3.5 L/min. Thermal conductivity, density and viscosity of the nanofluids were also measured as a function of temperature and CNT concentration. The experimental results are validated with theoretical correlations for turbulent flow available in the literature. Results showed an enhancement in heat transfer range between 9-67% as a function of temperature and CNT concentration.

Keywords: nanofluids, carbon nanotubes (CNT), heat transfer enhancement, heat transfer

Procedia PDF Downloads 486
832 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model

Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee

Abstract:

In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.

Keywords: automotive security, HEAVENS, car hacking, security model, information security

Procedia PDF Downloads 334
831 Links between Landscape Management and Environmental Risk Assessment: Considerations from the Italian Context

Authors: Mara Balestrieri, Clara Pusceddu

Abstract:

Issues relating to the destructive phenomena that can damage people and goods have returned to the centre of debate in Italy with the increase in catastrophic episodes in recent years in a country which is highly vulnerable to hydrological risk. Environmental factors and geological and geomorphological territorial characteristics play an important role in determining the level of vulnerability and the natural tendency to risk. However, a territory has also been subjected to the requirements of and transformations of society, and this brings other relevant factors. The reasons for the increase in destructive phenomena are often to be found in the territorial development models adopted. Stewardship of the landscape and management of risk are related issues. This study aims to summarize the most relevant elements about this connection and at the same time to clarify the role of environmental risk assessment as a tool to aid in the sustainable management of landscape. How planners relate to this problem and which aspects should be monitored in order to prepare responsible and useful interventions?

Keywords: assessment, landscape, risk, planning

Procedia PDF Downloads 443
830 Weaknesses and Performance Defects of Steel Structures According to the Executive Criteria

Authors: Ehsan Sadie

Abstract:

Despite the experience of heavy losses and damages of recent earthquakes such as 8 km E of Pāhala, Hawaii, 11 km W of Salvaleón de Higüey, Dominican Republic and 49 km SSE of Punta Cana, Dominican Republic earthquakes, the possibility of large earthquakes in most populated areas of any country and the serious need for quality control in the design and implementation of buildings, not enough attention has been paid to the proper construction. Steel structures constitute a significant part of construction in any metropolitan area. This article gives a brief overview of the implementation status of these buildings in urban areas and considers the weaknesses of performance that typically occur due to negligence or insufficient mastery of the building supervisor in the principles of operation of earthquake-resistant buildings, and provide appropriate and possible solutions to improve the construction.

Keywords: bracing member, concentrated load, diaphragm system, earthquake engineering, load-bearing system, shear force, seismic retrofitting, steel building, strip foundation, supervising engineer, vulnerability of building

Procedia PDF Downloads 133
829 Climate Change and Economic Performance in Selected Oil-Producing African Countries: A Trend Analysis Approach

Authors: Waheed O. Majekodunmi

Abstract:

Climate change is a real global phenomenon and an unquestionable threat to our quest for a healthy and livable planet. It is now regarded as potentially the most monumental environmental challenge people and the planet will be confronted with over the next centuries. Expectedly, climate change mitigation was one of the central themes of COP 28. Despite contributing the least to climate change, Africa is and remains the hardest hit by the negative consequences of climate change including poor growth performance. Currently, it is being hypothesized that the high level of vulnerability and exposure to climate-related disasters, low adaptive capacity against global warming and high mitigation costs of climate change across the continent could be linked to the recent abysmal economic performance of African countries, especially in oil-producing countries where greenhouse gas emissions, is potentially more prevalent. This paper examines the impact of climate change on the economic performance of selected oil-producing countries in Africa using evidence from Nigeria, Algeria and Angola. The objective of the study is to determine whether or not climate change influences the economic performance of oil-producing countries in Africa by examining the nexus between economic growth and climate-related variables. The study seeks to investigate the effect of climate change on the pace of economic growth in African oil-producing countries. To achieve the research objectives, this study utilizes a quantitative approach by using historical and current secondary data sets to determine the relationship between climate-related variables and economic growth variables in the selected countries. The study employed numbers, percentages, tables and trend graphs to explain the trends or common patterns between climate change, economic growth and determinants of economic growth: governance effectiveness, infrastructure, macroeconomic stability and regulatory efficiency. Results from the empirical analysis of data show that the trends of economic growth and climate-related variables in the selected oil-producing countries are in the opposite directions as the increasing share of renewable energy sources in total energy consumption and the reduction in greenhouse gas emissions per capita in the oil-producing countries did not translate to higher economic growth. Further findings show that annual surface temperatures in the selected countries do not share similar trends with the food imports ratio and GDP per capita annual growth rate suggesting that climate change does not impact significantly agricultural productivity and economic growth in oil-producing countries in Africa. Annual surface temperature was also found to not share a similar pattern with governance effectiveness, macroeconomic stability and regulatory efficiency reinforcing the claim that some economic growth variables are independent of climate change. The policy implication of this research is that oil-producing African countries need to focus more on improving the macroeconomic environment and streamlining governance and institutional processes to boost their economic performance before considering the adoption of climate change adaptation and mitigation strategies.

Keywords: climate change, climate vulnerability, economic growth, greenhouse gas emissions per capita, oil-producing countries, share of renewable energy in total energy consumption

Procedia PDF Downloads 30
828 A Taxonomy of Routing Protocols in Wireless Sensor Networks

Authors: A. Kardi, R. Zagrouba, M. Alqahtani

Abstract:

The Internet of Everything (IoE) presents today a very attractive and motivating field of research. It is basically based on Wireless Sensor Networks (WSNs) in which the routing task is the major analysis topic. In fact, it directly affects the effectiveness and the lifetime of the network. This paper, developed from recent works and based on extensive researches, proposes a taxonomy of routing protocols in WSNs. Our main contribution is that we propose a classification model based on nine classes namely application type, delivery mode, initiator of communication, network architecture, path establishment (route discovery), network topology (structure), protocol operation, next hop selection and latency-awareness and energy-efficient routing protocols. In order to provide a total classification pattern to serve as reference for network designers, each class is subdivided into possible subclasses, presented, and discussed using different parameters such as purposes and characteristics.

Keywords: routing, sensor, survey, wireless sensor networks, WSNs

Procedia PDF Downloads 162
827 Adversary Emulation: Implementation of Automated Countermeasure in CALDERA Framework

Authors: Yinan Cao, Francine Herrmann

Abstract:

Adversary emulation is a very effective concrete way to evaluate the defense of an information system or network. It is about building an emulator, which depending on the vulnerability of a target system, will allow to detect and execute a set of identified attacks. However, emulating an adversary is very costly in terms of time and resources. Verifying the information of each technique and building up the countermeasures in the middle of the test is also needed to be accomplished manually. In this article, a synthesis of previous MITRE research on the creation of the ATT&CK matrix will be as the knowledge base of the known techniques and a well-designed adversary emulation software CALDERA based on ATT&CK Matrix will be used as our platform. Inspired and guided by the previous study, a plugin in CALDERA called Tinker will be implemented, which is aiming to help the tester to get more information and also the mitigation of each technique used in the previous operation. Furthermore, the optional countermeasures for some techniques are also implemented and preset in Tinker in order to facilitate and fasten the process of the defense improvement of the tested system.

Keywords: automation, adversary emulation, CALDERA, countermeasures, MITRE ATT&CK

Procedia PDF Downloads 184
826 The Molecular Biology Behind the Spread of Breast Cancer Inflammatory Breast Cancer: Symptoms and Genetic Factors

Authors: Fakhrosadat Sajjadian

Abstract:

In the USA, about 5% of women diagnosed with breast cancer annually are affected by Inflammatory Breast Cancer (IBC), which is a highly aggressive type of Locally Advanced Breast Cancer (LABC). It is a type of LABC that is clinically and pathologically different, known for its rapid growth, invasiveness, and ability to promote the growth of blood vessels. Almost all women are found to have lymph nodes affected upon diagnosis, while around 36% show obvious distant metastases. Even with the latest improvements in multimodality therapies, the outlook for patients with IBC remains bleak, as the average disease-free survival time is less than 2.5 years. Recent research on the genetic factors responsible for the IBC phenotype has resulted in the discovery of genes that play a role in the advancement of this illness. The development of primary human cell lines and animal models has assisted in this research. These advancements offer new possibilities for future actions in identifying and treating IBC.

Keywords: breast cancer, inflammation, diagnosis, IBC, LABC

Procedia PDF Downloads 26
825 A Review of Intelligent Fire Management Systems to Reduce Wildfires

Authors: Nomfundo Ngombane, Topside E. Mathonsi

Abstract:

Remote sensing and satellite imaging have been widely used to detect wildfires; nevertheless, the technologies present some limitations in terms of early wildfire detection as the technologies are greatly influenced by weather conditions and can miss small fires. The fires need to have spread a few kilometers for the technologies to provide accurate detection. The South African Advanced Fire Information System uses MODIS (Moderate Resolution Imaging Spectroradiometer) as satellite imaging. MODIS has limitations as it can exclude small fires and can fall short in validating fire vulnerability. Thus in the future, a Machine Learning algorithm will be designed and implemented for the early detection of wildfires. A simulator will be used to evaluate the effectiveness of the proposed solution, and the results of the simulation will be presented.

Keywords: moderate resolution imaging spectroradiometer, advanced fire information system, machine learning algorithm, detection of wildfires

Procedia PDF Downloads 68
824 A Survey on Countermeasures of Cache-Timing Attack on AES Systems

Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush

Abstract:

Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.

Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure

Procedia PDF Downloads 278
823 The Conservation of the Botanical Collar of Tutankhamun

Authors: Safwat Mohamed Sayed Ali, Hussein Kamal

Abstract:

This paper discusses the conservation procedures of the botanical collar of King Tutankhamun. It dates back to the new Kingdom. This collar was kept in a box but found in bad condition. Many parts of the collar were separated. The collar suffered from dryness and dust, so it needed to be cleaned mechanically and recollected together. Japanese paper was used to collect the separated parts of the collar on a linen thread. The linen thread was dyed with organic dye to match the color of the plant material. The guidance in collecting the different parts of the plant collar is the original photograph captured at the discovery of the tomb. Also, the optical microscope was used in collecting fractured parts. The weak parts of the collar were treated with a suitable consolidation material. Klucel G dissolved in Ethyl Alcohol 0.5% was used in the treatment and gave convenient results. Some investigations were executed in order to identify the plant types used in making the botanical collar. Scanning Electron microscope and optical microscope were used in plant identification.

Keywords: sustainable, consolidation, plant, investigation

Procedia PDF Downloads 60
822 Activation of Caspase 3 by Terpenoids and Flavonoids in Cancer Cell Lines

Authors: Nusrat Masood, Vijaya Dubey, Suaib Luqman

Abstract:

Caspase 3, a member of cysteine-aspartic acid protease family, is an imperative indicator for cell death particularly when substantiating apoptosis. Thus, caspase 3 is an interesting target for the discovery and development of anticancer agent. We adopted a four level assessment of both terpenoids and flavonoids and thus experimentally performed the enzymatic assay in cell free system as well as in cancer cell line which was validated through real time expression and molecular interaction studies. A significant difference was observed with both the class of natural products indicating terpenoids as better activators of caspase 3 compared to flavonoids both in the cell free system as well as in cell lines. The expression analysis, activation constant and binding energy also correlate well with the enzyme activity. Overall, terpenoids had an unswerving effect on caspase 3 in all the tested system while flavonoids indirectly affect enzyme activity.

Keywords: Caspase 3, terpenoids, flavonoids, activation constant, binding energy

Procedia PDF Downloads 216
821 Finite Element Analysis of the Ordinary Reinforced Concrete Bridge Piers

Authors: Nabin Raj Chaulagain

Abstract:

Most of the concrete bridges in Nepal constructed during 90's and before are made up of low strength ordinary concrete which might be one of the reasons for damage in higher magnitude earthquake. Those bridges were designed by the outdated bridge codes which might not account the large seismic loads. This research investigates the seismic vulnerability of the existing single column ordinary concrete bridge pier by finite element modeling, using the software Seismostruct. The existing bridge pier capacity has been assessed using nonlinear pushover analysis and performance is compared after retrofitting those pier models with CFRP. Furthermore, the seismic evaluation was made by conducting cyclic loading test at different drift percentage. The performance analysis of bridge pier by nonlinear pushover analysis is further validated by energy dissipation phenomenon measured from the hysteric loop for each model of ordinary concrete piers.

Keywords: finite element modeling, ordinary concrete bridge pier, performance analysis, retrofitting

Procedia PDF Downloads 299
820 Machine Learning Application in Shovel Maintenance

Authors: Amir Taghizadeh Vahed, Adithya Thaduri

Abstract:

Shovels are the main components in the mining transportation system. The productivity of the mines depends on the availability of shovels due to its high capital and operating costs. The unplanned failure/shutdowns of a shovel results in higher repair costs, increase in downtime, as well as increasing indirect cost (i.e. loss of production and company’s reputation). In order to mitigate these failures, predictive maintenance can be useful approach using failure prediction. The modern mining machinery or shovels collect huge datasets automatically; it consists of reliability and maintenance data. However, the gathered datasets are useless until the information and knowledge of data are extracted. Machine learning as well as data mining, which has a major role in recent studies, has been used for the knowledge discovery process. In this study, data mining and machine learning approaches are implemented to detect not only anomalies but also patterns from a dataset and further detection of failures.

Keywords: maintenance, machine learning, shovel, conditional based monitoring

Procedia PDF Downloads 191
819 Design of Organic Inhibitors from Quantum Chemistry

Authors: Rahma Tibigui, Ikram Hadj Said, Rachid Belkada, Dalila Hammoutene

Abstract:

The vulnerability of industrial facilities is highly concerned with multiple risks from corrosion. The commonly adopted solution is based on the use of organic inhibitors, which are gradually being replaced by environmentally friendly organic inhibitors. In our work, we carried out a quantum chemical study based on the Density Functional Theory (DFT) method at the B3LYP/6-311G (d,p) level of theory. The inhibitory performance of a derivative of the tetrazole molecule has been investigated and reported as a carbon steel-friendly corrosion inhibitor in hydrochloric acid (HCl) medium. The relationship is likely to exist between the molecular structure of this compound as well as its various global reactivity descriptors, and its corrosion inhibition efficiency, which was examined and then discussed. The results show low values of ΔE, which represent strong adsorption of the inhibitor on the steel surface. Moreover, the flat adsorption orientation confirmed the great ability to donate (accept) electrons to (from) steel, fabricating an anchored barrier to prevent steel from corrosion.

Keywords: eco-friendly, corrosion inhibitors, tetrazole, DFT

Procedia PDF Downloads 216
818 Importance of Remote Sensing and Information Communication Technology to Improve Climate Resilience in Low Land of Ethiopia

Authors: Hasen Keder Edris, Ryuji Matsunaga, Toshi Yamanaka

Abstract:

The issue of climate change and its impact is a major contemporary global concern. Ethiopia is one of the countries experiencing adverse climate change impact including frequent extreme weather events that are exacerbating drought and water scarcity. Due to this reason, the government of Ethiopia develops a strategic document which focuses on the climate resilience green economy. One of the major components of the strategic framework is designed to improve community adaptation capacity and mitigation of drought. For effective implementation of the strategy, identification of regions relative vulnerability to drought is vital. There is a growing tendency of applying Geographic Information System (GIS) and Remote Sensing technologies for collecting information on duration and severity of drought by direct measure of the topography as well as an indirect measure of land cover. This study aims to show an application of remote sensing technology and GIS for developing drought vulnerability index by taking lowland of Ethiopia as a case study. In addition, it assesses integrated Information Communication Technology (ICT) potential of Ethiopia lowland and proposes integrated solution. Satellite data is used to detect the beginning of the drought. The severity of drought risk prone areas of livestock keeping pastoral is analyzed through normalized difference vegetation index (NDVI) and ten years rainfall data. The change from the existing and average SPOT NDVI and vegetation condition index is used to identify the onset of drought and potential risks. Secondary data is used to analyze geographical coverage of mobile and internet usage in the region. For decades, the government of Ethiopia introduced some technologies and approach to overcoming climate change related problems. However, lack of access to information and inadequate technical support for the pastoral area remains a major challenge. In conventional business as usual approach, the lowland pastorals continue facing a number of challenges. The result indicated that 80% of the region face frequent drought occurrence and out of this 60% of pastoral area faces high drought risk. On the other hand, the target area mobile phone and internet coverage is rapidly growing. One of identified ICT solution enabler technology is telecom center which covers 98% of the region. It was possible to identify the frequently affected area and potential drought risk using the NDVI remote-sensing data analyses. We also found that ICT can play an important role in mitigating climate change challenge. Hence, there is a need to strengthen implementation efforts of climate change adaptation through integrated Remote Sensing and web based information dissemination and mobile alert of extreme events.

Keywords: climate changes, ICT, pastoral, remote sensing

Procedia PDF Downloads 292
817 Knowledge Discovery and Data Mining Techniques in Textile Industry

Authors: Filiz Ersoz, Taner Ersoz, Erkin Guler

Abstract:

This paper addresses the issues and technique for textile industry using data mining techniques. Data mining has been applied to the stitching of garments products that were obtained from a textile company. Data mining techniques were applied to the data obtained from the CHAID algorithm, CART algorithm, Regression Analysis and, Artificial Neural Networks. Classification technique based analyses were used while data mining and decision model about the production per person and variables affecting about production were found by this method. In the study, the results show that as the daily working time increases, the production per person also decreases. In addition, the relationship between total daily working and production per person shows a negative result and the production per person show the highest and negative relationship.

Keywords: data mining, textile production, decision trees, classification

Procedia PDF Downloads 331
816 Graph Planning Based Composition for Adaptable Semantic Web Services

Authors: Rihab Ben Lamine, Raoudha Ben Jemaa, Ikram Amous Ben Amor

Abstract:

This paper proposes a graph planning technique for semantic adaptable Web Services composition. First, we use an ontology based context model for extending Web Services descriptions with information about the most suitable context for its use. Then, we transform the composition problem into a semantic context aware graph planning problem to build the optimal service composition based on user's context. The construction of the planning graph is based on semantic context aware Web Service discovery that allows for each step to add most suitable Web Services in terms of semantic compatibility between the services parameters and their context similarity with the user's context. In the backward search step, semantic and contextual similarity scores are used to find best composed Web Services list. Finally, in the ranking step, a score is calculated for each best solution and a set of ranked solutions is returned to the user.

Keywords: semantic web service, web service composition, adaptation, context, graph planning

Procedia PDF Downloads 498
815 Maintaining the Tension between the Classic Seduction Theory and the Role of Unconscious Fantasies

Authors: Galit Harel

Abstract:

This article describes the long-term psychoanalytic psychotherapy of a young woman who had experienced trauma during her childhood. The details of the trauma were unknown, as all memory of the trauma had been repressed. Past trauma is analyzable through a prism of transference, dreaming and dreams, mental states, and thinking processes that offer an opportunity to explore and analyze the influence of both reality and fantasy on the patient. The presented case describes a therapeutic process that strives to discover hidden meanings through the unconscious system and illustrates the movement from unconscious to conscious during exploration of the patient’s personal trauma in treatment. The author discusses the importance of classical and contemporary psychoanalytic models of childhood sexual trauma through the discovery of manifest and latent content, unconscious fantasies, and actual events of trauma. It is suggested that the complexity of trauma is clarified by the tension between these models and by the inclusion of aspects of both of them for a complete understanding.

Keywords: dreams, psychoanalytic psychotherapy, thinking processes, transference, trauma

Procedia PDF Downloads 66
814 Genomic Analysis of Whole Genome Sequencing of Leishmania Major

Authors: Fatimazahrae Elbakri, Azeddine Ibrahimi, Meryem Lemrani, Dris Belghyti

Abstract:

Leishmaniasis represents a major public health problem because of the number of cases recorded each year and the wide distribution of the disease. It is a parasitic disease of flagellated protozoa transmitted by the bite of certain species of sandfly, causing a spectrum of clinical pathology in humans ranging from disfiguring skin lesions to fatal visceral leishmaniasis. Cutaneous leishmaniasis due to Leishmania major is a polymorphic disease; in fact, the infection can be asymptomatic, localized, or disseminated. The objective of this work is to determine the genomic diversity that contributes to clinical variability by trying to identify the variation in chromosome number and to extract SNPs and SNPs and InDels; it is based on four sequences (WGS) of Leishmania major available on NCBI in Fastq form, from three countries: Tunisia, Algeria, and Israel, the analysis is set up from a pipeline to facilitate the discovery of genetic diversity, in particular SNP and chromosomal somy.

Keywords: Leshmania major, cutaneous Leishmania, NGS, genomic, somy, variant calling

Procedia PDF Downloads 61
813 Predicting the Relationship Between Childhood Trauma on the Formation of Defense Mechanisms with the Mediating Role of Object Relations in Traders

Authors: Ahmadreza Jabalameli, Mohammad Ebrahimpour Borujeni

Abstract:

According to psychodynamic theories, the major personality structure of individuals is formed in the first years of life. Trauma is an inseparable and undeniable part of everyone's life and they inevitably struggle with many traumas that can have a very significant impact on their lives. The present study deals with the relationship between childhood trauma on the formation of defense mechanisms and the role of object relations. The present descriptive study is a correlation with structural equation modeling (SEM). Sample selection is available and consists of 200 knowledgeable traders in Jabalameli Information Technology Company. The results indicate that the experience of childhood trauma with a demographic moderating effect, through the mediating role of object relations can lead to vulnerability to ego reality functionality and immature and psychically disturbed defense mechanisms. In this regard, there is a significant negative relationship between childhood trauma and object relations with mature defense mechanisms.

Keywords: childhood trauma, defense mechanisms, object relations, trade

Procedia PDF Downloads 113
812 Flood Risk Assessment, Mapping Finding the Vulnerability to Flood Level of the Study Area and Prioritizing the Study Area of Khinch District Using and Multi-Criteria Decision-Making Model

Authors: Muhammad Karim Ahmadzai

Abstract:

Floods are natural phenomena and are an integral part of the water cycle. The majority of them are the result of climatic conditions, but are also affected by the geology and geomorphology of the area, topography and hydrology, the water permeability of the soil and the vegetation cover, as well as by all kinds of human activities and structures. However, from the moment that human lives are at risk and significant economic impact is recorded, this natural phenomenon becomes a natural disaster. Flood management is now a key issue at regional and local levels around the world, affecting human lives and activities. The majority of floods are unlikely to be fully predicted, but it is feasible to reduce their risks through appropriate management plans and constructions. The aim of this Case Study is to identify, and map areas of flood risk in the Khinch District of Panjshir Province, Afghanistan specifically in the area of Peshghore, causing numerous damages. The main purpose of this study is to evaluate the contribution of remote sensing technology and Geographic Information Systems (GIS) in assessing the susceptibility of this region to flood events. Panjsher is facing Seasonal floods and human interventions on streams caused floods. The beds of which have been trampled to build houses and hotels or have been converted into roads, are causing flooding after every heavy rainfall. The streams crossing settlements and areas with high touristic development have been intensively modified by humans, as the pressure for real estate development land is growing. In particular, several areas in Khinch are facing a high risk of extensive flood occurrence. This study concentrates on the construction of a flood susceptibility map, of the study area, by combining vulnerability elements, using the Analytical Hierarchy Process/ AHP. The Analytic Hierarchy Process, normally called AHP, is a powerful yet simple method for making decisions. It is commonly used for project prioritization and selection. AHP lets you capture your strategic goals as a set of weighted criteria that you then use to score projects. This method is used to provide weights for each criterion which Contributes to the Flood Event. After processing of a digital elevation model (DEM), important secondary data were extracted, such as the slope map, the flow direction and the flow accumulation. Together with additional thematic information (Landuse and Landcover, topographic wetness index, precipitation, Normalized Difference Vegetation Index, Elevation, River Density, Distance from River, Distance to Road, Slope), these led to the final Flood Risk Map. Finally, according to this map, the Priority Protection Areas and Villages and the structural and nonstructural measures were demonstrated to Minimize the Impacts of Floods on residential and Agricultural areas.

Keywords: flood hazard, flood risk map, flood mitigation measures, AHP analysis

Procedia PDF Downloads 97
811 Damages Inflicted on Steel Structures and Metal Buildings due to Insufficient Supervision and Monitoring and Non-Observance of the Rules of the Regulations

Authors: Ehsan Sadie

Abstract:

Despite the experience of heavy losses and damages of recent earthquakes such as 8 km E of Pāhala, Hawaii, 11 km W of Salvaleón de Higüey, Dominican Republic and 49 km SSE of Punta Cana, Dominican Republic earthquakes, the possibility of large earthquakes in most populated areas of any country and the serious need for quality control in the design and implementation of buildings, not enough attention has been paid to the proper construction. Steel structures constitute a significant part of construction in any metropolitan area. This article gives a brief overview of the implementation status of these buildings in urban areas and considers the weaknesses of performance that typically occur due to negligence or insufficient mastery of the building supervisor in the principles of operation of earthquake-resistant buildings, and provides appropriate and possible solutions to improve the construction.

Keywords: bracing member, concentrated load, diaphragm system, earthquake engineering, load-bearing system, shear force, seismic retrofitting, steel building, strip foundation, supervising engineer, vulnerability of building

Procedia PDF Downloads 114