Search results for: hardware security evaluation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9503

Search results for: hardware security evaluation

5003 Effect of Tillage Technology on Species Composition of Weeds in Monoculture of Maize

Authors: Svetlana Chovancova, Frantisek Illek, Jan Winkler

Abstract:

The effect of tillage technology of maize on intensity of weed infestation and weed species composition was observed at experimental field. Maize is grown consecutively since 2001. The experimental site is situated at an altitude of 230 m above sea level in the Czech Republic. Variants of tillage technology are CT: plowing – conventional tillage 0.22 m, MT: loosening – disc tillage on the depth of 0.1 – 0.12 m, NT: direct sowing – without tillage. The evaluation of weed infestation was carried out by numerical method in years 2012 and 2013. Within the monitoring were found 20 various species of weeds. Conventional tillage (CT) primarily supports the occurrence of perennial weeds (Cirsium arvense, Convolvulus arvensis). Late spring species (Chenopodium album, Echinochloa crus-galli) were more frequently noticed on variants of loosening (MT) and direct sowing (NT). Different tillage causes a significant change of weed species spectrum in maize.

Keywords: weeds, maize, tillage, loosening, direct sowing

Procedia PDF Downloads 473
5002 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 414
5001 Network Functions Virtualization-Based Virtual Routing Function Deployment under Network Delay Constraints

Authors: Kenichiro Hida, Shin-Ichi Kuribayashi

Abstract:

NFV-based network implements a variety of network functions with software on general-purpose servers, and this allows the network operator to select any capabilities and locations of network functions without any physical constraints. In this paper, we evaluate the influence of the maximum tolerable network delay on the virtual routing function deployment guidelines which the authors proposed previously. Our evaluation results have revealed the following: (1) the more the maximum tolerable network delay condition becomes severe, the more the number of areas where the route selection function is installed increases and the total network cost increases, (2) the higher the routing function cost relative to the circuit bandwidth cost, the increase ratio of total network cost becomes larger according to the maximum tolerable network delay condition.

Keywords: NFV (Network Functions Virtualization), resource allocation, virtual routing function, minimum total network cost

Procedia PDF Downloads 247
5000 Evaluation of the Effect of IMS on the Social Responsibility in the Oil and Gas Production Companies of National Iranian South Oil Fields Company (NISOC)

Authors: Kamran Taghizadeh

Abstract:

This study was aimed at evaluating the effect of IMS including occupational health system, environmental management system, and safety and health system on the social responsibility (case study of NISOC`s oil and gas production companies). This study`s objectives include evaluating the IMS situation and its effect on social responsibility in addition of providing appropriate solutions based on the study`s hypotheses as a basis for future. Data collection was carried out by library and field studies as well as a questionnaire. The stratified random method was the sampling method and a sample of 285 employees in addition to the collected data (from the questionnaire) were analyzed by inferential statistics methods using SPSS software. Finally, results of regression and fitted model at a significance level of 5% confirmed all hypotheses meaning that IMS and its items have a significant effect on social responsibility.

Keywords: social responsibility, integrated management, oil and gas production companies, regression

Procedia PDF Downloads 256
4999 Fast Tumor Extraction Method Based on Nl-Means Filter and Expectation Maximization

Authors: Sandabad Sara, Sayd Tahri Yassine, Hammouch Ahmed

Abstract:

The development of science has allowed computer scientists to touch the medicine and bring aid to radiologists as we are presenting it in our article. Our work focuses on the detection and localization of tumors areas in the human brain; this will be a completely automatic without any human intervention. In front of the huge volume of MRI to be treated per day, the radiologist can spend hours and hours providing a tremendous effort. This burden has become less heavy with the automation of this step. In this article we present an automatic and effective tumor detection, this work consists of two steps: the first is the image filtering using the filter Nl-means, then applying the expectation maximization algorithm (EM) for retrieving the tumor mask from the brain MRI and extracting the tumor area using the mask obtained from the second step. To prove the effectiveness of this method multiple evaluation criteria will be used, so that we can compare our method to frequently extraction methods used in the literature.

Keywords: MRI, Em algorithm, brain, tumor, Nl-means

Procedia PDF Downloads 336
4998 Economic Design of a Quality Control Chart for the Proportion of Defective Items

Authors: Encarnación Álvarez-Verdejo, Raúl Amor-Pulido, Pablo J. Moya-Fernández, Juan F. Muñoz-Rosas, Francisco J. Blanco-Encomienda

Abstract:

Many companies use the statistical tool named as statistical quality control, and which can have a high cost for the companies interested on these statistical tools. The evaluation of the quality of products and services is an important topic, but the reduction of the cost of the implantation of the statistical quality control also has important benefits for the companies. For this reason, it is important to implement a economic design for the various steps included into the statistical quality control. In this paper, we describe some relevant aspects related to the economic design of a quality control chart for the proportion of defective items. They are very important because the suggested issues can reduce the cost of implementing a quality control chart for the proportion of defective items. Note that the main purpose of this chart is to evaluate and control the proportion of defective items of a production process.

Keywords: proportion, type I error, economic plan, distribution function

Procedia PDF Downloads 443
4997 Relay Node Selection Algorithm for Cooperative Communications in Wireless Networks

Authors: Sunmyeng Kim

Abstract:

IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct transmission to the destination at low rate. In the legacy cooperative protocols, a source node chooses a relay node only based on the transmission rate. Therefore, they are not so feasible in multi-flow environments since they do not consider the effect of other flows. To alleviate the effect, we propose a new relay node selection algorithm based on the transmission rate and channel contention level. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and delay.

Keywords: cooperative communications, MAC protocol, relay node, WLAN

Procedia PDF Downloads 333
4996 A High Performance Piano Note Recognition Scheme via Precise Onset Detection and Segmented Short-Time Fourier Transform

Authors: Sonali Banrjee, Swarup Kumar Mitra, Aritra Acharyya

Abstract:

A piano note recognition method has been proposed by the authors in this paper. The authors have used a comprehensive method for onset detection of each note present in a piano piece followed by segmented short-time Fourier transform (STFT) for the identification of piano notes. The performance evaluation of the proposed method has been carried out in different harsh noisy environments by adding different levels of additive white Gaussian noise (AWGN) having different signal-to-noise ratio (SNR) in the original signal and evaluating the note detection error rate (NDER) of different piano pieces consisting of different number of notes at different SNR levels. The NDER is found to be remained within 15% for all piano pieces under consideration when the SNR is kept above 8 dB.

Keywords: AWGN, onset detection, piano note, STFT

Procedia PDF Downloads 160
4995 SPICE Modeling for Evaluation of Distribution System Reliability Indices

Authors: G. N. Srinivas, K. Raju

Abstract:

This paper presents Markov processes for determining the reliability indices of distribution system. The continuous Markov modeling is applied to a complex radial distribution system and electrical equivalent circuits are developed for the modeling. In general PSPICE is being used for electrical and electronic circuits and various applications of power system like fault analysis, transient analysis etc. In this paper, the SPICE modeling equivalent circuits which are developed are applied in a novel way to Distribution System reliability analysis. These circuits are simulated using PSPICE software to obtain the state probabilities, the basic and performance indices. Thus the basic indices and the performance indices obtained by this method are compared with those obtained by FMEA technique. The application of the concepts presented in this paper are illustrated and analyzed for IEEE-Roy Billinton Test System (RBTS).

Keywords: distribution system, Markov Model, reliability indices, spice simulation

Procedia PDF Downloads 539
4994 Construction of a Low Carbon Eco-City Index System Based on CAS Theory: A Case of Hexi Newtown in Nanjing, China

Authors: Xu Tao, Yilun Xu, Dingwei Xiang, Yaofei Sun

Abstract:

The practice of urban planning and construction based on the concept of the “low carbon eco-city” has been universally accepted by the academic community in response to urban issues such as population, resources, environment, and social development. Based on this, the current article first analyzes the concepts of low carbon eco-city, then builds a complex adaptive system (CAS) theory based on Chinese traditional philosophical thinking, and analyzes the adaptive relationship between material and non-material elements. A three-dimensional evaluation model of natural ecology, economic low carbon, and social harmony was constructed. Finally, the construction of a low carbon eco-city index system in Hexi Newtown of Nanjing was used as an example to verify the effectiveness of the research results; this paradigm provides a new way to achieve a low carbon eco-city system.

Keywords: complex adaptive system, low carbon ecology, index system, model

Procedia PDF Downloads 152
4993 Multi-Sender MAC Protocol Based on Temporal Reuse in Underwater Acoustic Networks

Authors: Dongwon Lee, Sunmyeng Kim

Abstract:

Underwater acoustic networks (UANs) have become a very active research area in recent years. Compared with wireless networks, UANs are characterized by the limited bandwidth, long propagation delay and high channel dynamic in acoustic modems, which pose challenges to the design of medium access control (MAC) protocol. The characteristics severely affect network performance. In this paper, we study a MS-MAC (Multi-Sender MAC) protocol in order to improve network performance. The proposed protocol exploits temporal reuse by learning the propagation delays to neighboring nodes. A source node locally calculates the transmission schedules of its neighboring nodes and itself based on the propagation delays to avoid collisions. Performance evaluation is conducted using simulation, and confirms that the proposed protocol significantly outperforms the previous protocol in terms of throughput.

Keywords: acoustic channel, MAC, temporal reuse, UAN

Procedia PDF Downloads 350
4992 The Evaluation of the Effects of Atypical Antipsychotics on Sperm Quality by Computer-Assisted Sperm Analysis in Rats

Authors: O. Atli Eklioglu

Abstract:

Atypical antipsychotics such as quetiapine, olanzapine, and risperidone have been frequently and chronically used to treat psychiatric disorders accompanied by psychosis mainly schizophrenia. Since these drugs are commonly used in male patients of reproductive age, it is required to determine the possible effects of them on the reproductive system. In this study, it was aimed to evaluate the possible toxic effects of quetiapine, olanzapine and risperidone, which are the most frequently prescribed and chronically used psychiatric drugs, on sperm parameters. For this purpose, quetiapine (10, 20 and 40 mg/kg), olanzapine (2.5, 5 and 10 mg/kg), and risperidone (1.25, 2.5 and 3 mg/kg) were administered to male rats for 28 consecutive days. At the end of this period, sperm concentration, motility, and morphology were investigated by a computer-assisted sperm analysis system. According to the results, sperm parameters were negatively affected by antipsychotic use.

Keywords: quetiapine, olanzapine, risperidone, sperm count, motility, sperm morphology, computer-assisted sperm analysis

Procedia PDF Downloads 152
4991 Topic-to-Essay Generation with Event Element Constraints

Authors: Yufen Qin

Abstract:

Topic-to-Essay generation is a challenging task in Natural language processing, which aims to generate novel, diverse, and topic-related text based on user input. Previous research has overlooked the generation of articles under the constraints of event elements, resulting in issues such as incomplete event elements and logical inconsistencies in the generated results. To fill this gap, this paper proposes an event-constrained approach for a topic-to-essay generation that enforces the completeness of event elements during the generation process. Additionally, a language model is employed to verify the logical consistency of the generated results. Experimental results demonstrate that the proposed model achieves a better BLEU-2 score and performs better than the baseline in terms of subjective evaluation on a real dataset, indicating its capability to generate higher-quality topic-related text.

Keywords: event element, language model, natural language processing, topic-to-essay generation.

Procedia PDF Downloads 236
4990 Stator Short-Circuits Fault Diagnosis in Induction Motors

Authors: K. Yahia, M. Sahraoui, A. Guettaf

Abstract:

This paper deals with the problem of stator faults diagnosis in induction motors. Using the discrete wavelet transform (DWT) for the current Park’s vector modulus (CPVM) analysis, the inter-turn short-circuit faults diagnosis can be achieved. This method is based on the decomposition of the CPVM signal, where wavelet approximation and detail coefficients of this signal have been extracted. The energy evaluation of a known bandwidth detail permits to define a fault severity factor (FSF). This method has been tested through the simulation of an induction motor using a mathematical model based on the winding-function approach. Simulation, as well as experimental results, show the effectiveness of the used method.

Keywords: induction motors (IMs), inter-turn short-circuits diagnosis, discrete wavelet transform (DWT), Current Park’s Vector Modulus (CPVM)

Procedia PDF Downloads 457
4989 Evaluation of Quick Covering Machine for Grain Drying Pavement

Authors: Fatima S. Rodriguez, Victorino T. Taylan, Manolito C. Bulaong, Helen F. Gavino, Vitaliana U. Malamug

Abstract:

In sundrying the quality of the grains are greatly reduced when paddy grains were caught by the rain unsacked and unstored resulting to reduced profit. The objectives of this study were to design and fabricate a quick covering machine for grain drying pavement; to test and evaluate the operating characteristics of the machine according to its deployment speed, recovery speed, deployment time, recovery time, power consumption, aesthetics of laminated sack; and to conduct partial budget and cost curve analysis. The machine was able to cover the grains in a 12.8 m x 22.5 m grain drying pavement at an average time of 17.13 s. It consumed 0.53 W-hr for the deployment and recovery of the cover. The machine entailed an investment cost of $1,344.40 and an annual cost charge of $647.32. Moreover, the savings per year using the quick covering machine was $101.83.

Keywords: quick covering machine, grain drying pavement, laminated polypropylene, recovery time

Procedia PDF Downloads 323
4988 The Effect of Artificial Intelligence on Mobile Phones and Communication Systems

Authors: Ibram Khalafalla Roshdy Shokry

Abstract:

This paper gives service feel multiple get entry to (CSMA) verbal exchange model based totally totally on SoC format method. Such model can be used to guide the modelling of the complex c084d04ddacadd4b971ae3d98fecfb2a communique systems, consequently use of such communication version is an crucial method in the creation of excessive general overall performance conversation. SystemC has been selected as it gives a homogeneous format drift for complicated designs (i.e. SoC and IP based format). We use a swarm device to validate CSMA designed version and to expose how advantages of incorporating communication early within the layout process. The wireless conversation created via the modeling of CSMA protocol that may be used to attain conversation among all of the retailers and to coordinate get proper of entry to to the shared medium (channel).The device of automobiles with wi-fiwireless communique abilities is expected to be the important thing to the evolution to next era intelligent transportation systems (ITS). The IEEE network has been continuously operating at the development of an wireless vehicular communication protocol for the enhancement of wi-fi get admission to in Vehicular surroundings (WAVE). Vehicular verbal exchange systems, known as V2X, help car to car (V2V) and automobile to infrastructure (V2I) communications. The wi-ficiencywireless of such communication systems relies upon on several elements, amongst which the encircling surroundings and mobility are prominent. as a result, this observe makes a speciality of the evaluation of the actual performance of vehicular verbal exchange with unique cognizance on the effects of the actual surroundings and mobility on V2X verbal exchange. It begins by wi-fi the actual most range that such conversation can guide and then evaluates V2I and V2V performances. The Arada LocoMate OBU transmission device changed into used to check and evaluate the effect of the transmission range in V2X verbal exchange. The evaluation of V2I and V2V communique takes the real effects of low and excessive mobility on transmission under consideration.Multiagent systems have received sizeable attention in numerous wi-fields, which include robotics, independent automobiles, and allotted computing, where a couple of retailers cooperate and speak to reap complicated duties. wi-figreen communication among retailers is a critical thing of these systems, because it directly influences their usual performance and scalability. This scholarly work gives an exploration of essential communication factors and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of those protocols across diverse situations. The studies additionally sheds light on rising tendencies within verbal exchange protocols for multiagent systems, together with the incorporation of device mastering strategies and the adoption of blockchain-based totally solutions to make sure comfy communique. those developments offer valuable insights into the evolving landscape of multiagent structures and their verbal exchange protocols.

Keywords: communication, multi-agent systems, protocols, consensussystemC, modelling, simulation, CSMA

Procedia PDF Downloads 25
4987 Metamodel for Artefacts in Service Engineering Analysis and Design

Authors: Purnomo Yustianto, Robin Doss

Abstract:

As a process of developing a service system, the term ‘service engineering’ evolves in scope and definition. To achieve an integrated understanding of the process, a general framework and an ontology are required. This paper extends a previously built service engineering framework by exploring metamodels for the framework artefacts based on a foundational ontology and a metamodel landscape. The first part of this paper presents a correlation map between the proposed framework with the ontology as a form of evaluation for the conceptual coverage of the framework. The mapping also serves to characterize the artefacts to be produced for each activity in the framework. The second part describes potential metamodels to be used, from the metamodel landscape, as alternative formats of the framework artefacts. The results suggest that the framework sufficiently covers the ontological concepts, both from general service context and software service context. The metamodel exploration enriches the suggested artefact format from the original eighteen formats to thirty metamodel alternatives.

Keywords: artefact, framework, service, metamodel

Procedia PDF Downloads 207
4986 Evaluation of Corrosion Property of Aluminium-Zirconium Dioxide (AlZrO2) Nanocomposites

Authors: M. Ramachandra, G. Dilip Maruthi, R. Rashmi

Abstract:

This paper aims to study the corrosion property of aluminum matrix nanocomposite of an aluminum alloy (Al-6061) reinforced with zirconium dioxide (ZrO2) particles. The zirconium dioxide particles are synthesized by solution combustion method. The nanocomposite materials are prepared by mechanical stir casting method, varying the percentage of n-ZrO2 (2.5%, 5% and 7.5% by weight). The corrosion behavior of base metal (Al-6061) and Al/ZrO2 nanocomposite in seawater (3.5% NaCl solution) is measured using the potential control method. The corrosion rate is evaluated by Tafel extrapolation technique. The corrosion potential increases with the increase in wt.% of n-ZrO2 in the nanocomposite which means the decrease in corrosion rate. It is found that on addition of n-ZrO2 particles to the aluminum matrix, the corrosion rate has decreased compared to the base metal.

Keywords: Al6061 alloy, corrosion, solution, stir casting, combustion, potentiostat, zirconium dioxide

Procedia PDF Downloads 407
4985 Design and Facile Synthesis of New Amino Acid Derivatives with Anti-Tumor and Antimicrobial Activities

Authors: Hoda Sabry Othman, Randa Helmy Swellem, Galal Abd El-Moein Nawwar

Abstract:

N-cyanoacetyl glycine is a reactive polyfunctional precursor for synthesis of new difficult accessible compounds including pyridones, thiazolopyridine and others. The key step of this protocol is the formation of different ylidines which underwent Michael addition with carbon nucleophiles affording various heterocyclic compounds. Selected compounds underwent pharmacological evaluation, in vitro against two cell lines; breast cell line (MCF-7),and liver cell line(HEPG2). Compounds 14, 15a and 16 showed IC50 values 8.93, 8.18 and 8.03 (µ/ml) respectively for breast cell line (MCF-7), while the standard drug (Tamoxifen) revealed IC50 8.31. With respect to the liver cell line (HEPG2), compounds 14 and 15a revealed IC50 18.4 and 13.6(µ/ml) respectively while the IC50 of the standard drug(5-Flurouracil) is 25(µ/ml). The antimicrobial activity was also screened and revealed that oxime 7 and ylidine 9f showed a broad-spectrum activity.

Keywords: antitumor, cyanoacetyl glycine, heterocycles, pyridones

Procedia PDF Downloads 337
4984 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 118
4983 Evaluation of Broiler Parent Breeds under Libyan Conditions

Authors: Salem A. Abdalla Bozrayda, Abulgasem M. Hubara

Abstract:

The use of commercial poultry breeds in Libya may result in large economic losses because genotypes selected in temperate climates may respond differently to other climate conditions and management. Therefore three commercial breeds (Hypeco, Avian, and Shaver) were evaluated in two regions. The data were obtained from weekly records of three parental flocks for each breed at Ghout El-sultan and Tawargha region. Feed Hen Housed (FHH), Hen Housed Egg Production (HHEP) Mortility % were the studied traits. Statistical model include location, year, month, age and breed. Hypeco produced more HHEP 68.6 with Less FHH 22.9 kg but with higher mortility 8.5 % than Avian and shaver breeds. The breeds exhibited different responses to the different months in Libya. In conclusion, the differences, which exhibited between the breeds in traits studied, indicate that genotype x environment must be considered when select breed to perform under Libyan conditions.

Keywords: hypeco avian shaver, feed hen housed, hen housed egg production, mortility, Libya

Procedia PDF Downloads 289
4982 Evaluation of Neighbourhood Characteristics and Active Transport Mode Choice

Authors: Tayebeh Saghapour, Sara Moridpour, Russell George Thompson

Abstract:

One of the common aims of transport policy makers is to switch people’s travel to active transport. For this purpose, a variety of transport goals and investments should be programmed to increase the propensity towards active transport mode choice. This paper aims to investigate whether built environment features in neighbourhoods could enhance the odds of active transportation. The present study introduces an index measuring public transport accessibility (PTAI), and a walkability index along with socioeconomic variables to investigate mode choice behaviour. Using travel behaviour data, an ordered logit regression model is applied to examine the impacts of explanatory variables on walking trips. The findings indicated that high rates of active travel are consistently associated with higher levels of walking and public transport accessibility.

Keywords: active transport, public transport accessibility, walkability, ordered logit model

Procedia PDF Downloads 351
4981 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 56
4980 Evaluation of the Laser and Partial Vibration Stimulation on Osteoporosis

Authors: Ji Hyung Park, Dong-Hyun Seo, Young-Jin Jung, Han Sung Kim

Abstract:

The aim of this study is to evaluate the effects of the laser and partial vibration stimulation on the mice tibia with morphological characteristics. Twenty female C57BL/6 mice (12 weeks old) were used for the experiment. The study was carried out on four groups of animals each consisting of five mice. Four groups of mice were ovariectomized. Animals were scanned at 0 and 2 weeks after ovariectomy by using micro-computed tomography to estimate morphological characteristics of tibial trabecular bone. Morphological analysis showed that structural parameters of multi-stimuli group appear significantly better phase in BV/TV, BS/BV, Tb.Th, Tb.N, Tb.Sp, and Tb.pf than single stimulation groups. However, single stimulation groups didn’t show significant effect on tibia with Sham group. This study suggests that multi-stimuli may restrain the change as the degenerate phase on osteoporosis in the mice tibia.

Keywords: laser, partial vibration, osteoporosis, in-vivo micro-CT, mice

Procedia PDF Downloads 517
4979 Mindfulness and Employability: A Course on the Control of Stress during the Search for Work

Authors: O. Lasaga

Abstract:

Defining professional objectives and the search for work are some of the greatest stress factors for final year university students and recent graduates. To manage correctly the stress brought about by the uncertainty, confusion and frustration this process often generates, a course to control stress based on mindfulness has been designed and taught. This course provides tools based on relaxation, mindfulness and meditation that enable students to address personal and professional challenges in the transition to the job market, eliminating or easing the anxiety involved. The course is extremely practical and experiential, combining theory classes and practical classes of relaxation, meditation and mindfulness, group dynamics, reflection, application protocols and session integration. The evaluation of the courses highlighted on the one hand the high degree of satisfaction and, on the other, the usefulness for the students in becoming aware of stressful situations and how these affect them and learning new coping techniques that enable them to reach their goals more easily and with greater satisfaction and well-being.

Keywords: employability, meditation, mindfulness, relaxation techniques, stress

Procedia PDF Downloads 386
4978 COVID-19 Genomic Analysis and Complete Evaluation

Authors: Narin Salehiyan, Ramin Ghasemi Shayan

Abstract:

In order to investigate coronavirus RNA replication, transcription, recombination, protein processing and transport, virion assembly, the identification of coronavirus-specific cell receptors, and polymerase processing, the manipulation of coronavirus clones and complementary DNAs (cDNAs) of defective-interfering (DI) RNAs is the subject of this chapter. The idea of the Covid genome is nonsegmented, single-abandoned, and positive-sense RNA. When compared to other RNA viruses, its size is significantly greater, ranging from 27 to 32 kb. The quality encoding the enormous surface glycoprotein depends on 4.4 kb, encoding a forcing trimeric, profoundly glycosylated protein. This takes off exactly 20 nm over the virion envelope, giving the infection the appearance-with a little creative mind of a crown or coronet. Covid research has added to the comprehension of numerous parts of atomic science as a general rule, like the component of RNA union, translational control, and protein transport and handling. It stays a fortune equipped for creating startling experiences.

Keywords: covid-19, corona, virus, genome, genetic

Procedia PDF Downloads 72
4977 Review and Evaluation of Viscose Damper on Structural Responses

Authors: Ehsan Sadie

Abstract:

Developments in the field of damping technology and advances in the area of dampers in equipping many structures have been the result of efforts and testing by researchers in this field. In this paper, a sample of a two-story building is simulated with the help of SAP2000 software, and the effect of a viscous damper on the performance of the structure is explained. The effect of dampers on the response of the structure is investigated. This response involves the horizontal displacement of floors. In this case, the structure is modeled once without a damper and again with a damper. In this regard, the results are presented in the form of tables and graphs. Since the seismic behavior of the structure is studied, the responses show the appropriate effect of viscous dampers in reducing the displacement of floors, and also the energy dissipation in the structure with dampers compared to structures without dampers is significant. Therefore, it is economical to use viscous dampers in areas that have a higher relative earthquake risk.

Keywords: bending frame, displacement criterion, dynamic response spectra, earthquake, non-linear history spectrum, SAP2000 software, structural response, viscous damper

Procedia PDF Downloads 115
4976 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 194
4975 Use of Cassava Flour in Cakes Processing

Authors: S. S. Silva, S. M. A. Souza, C. F. P. Oliveira

Abstract:

Brazil's agriculture is a major economic base in the country; in addition, family farming is directly responsible for the production of most agricultural products in Brazil, such as cassava. The number of studies on the use of cassava and its derivatives in the food industry has been increased, which is the basis of this study. Sought to develop a food that take advantage the products from farmers, adding value to these products and to study its effects as a replacement for wheat flour. For such elaborated a gluten-free cake – aiming to meet the needs of the celiac public – containing cassava flour, cane sugar, honey, egg, soya oil, coconut desiccated, baking powder and water. For evaluation of their characteristics technological, physicochemical and texture characterizations were done. Cake showed similar characteristics of cake made with wheat flour and growth and aeration of the dough. In sum up, marketing the product is viable, in that it has a typical overall appearance of cake made of wheat flour, meet the needs of celiac people and value the family farming.

Keywords: baking, cake, cassava flour, celiac disease

Procedia PDF Downloads 426
4974 Group Boundaries against and Due to Identity Threat

Authors: Anna Siegler, Sara Bigazzi, Sara Serdult, Ildiko Bokretas

Abstract:

Social identity emerging from group membership defines the representational processes of our social reality. Based on our theoretical assumption the subjective perception of identity threat leads to an instable identity structure. The need to re-establish the positive identity will lead us to strengthen group boundaries. Prejudice in our perspective offer psychological security those who thinking in exclusive barriers, and we suggest that those who identify highly with their ingroup/national identity and less with superordinate identities take distance from others and this is related to their perception of threat. In our study we used a newly developed questionnaire, the Multiple Threat and Prejudice Questionnaire (MTPQ) which measure identity threat at different dimensions of identification (national, existential, gender, religious) and the distancing of different outgroups, over and above we worked with Social Dominance Orientation (SDO) and Identification with All Humanity Scale (IWAH). We conduct one data collection (N=1482) in a Hungarian sample to examine the connection between national threat and distance-taking, and this survey includes the investigation (N=218) of identification with different group categories. Our findings confirmed that those who feel themselves threatened in their national identity aspects are less likely to identify themselves with superordinate groups and this correlation is much stronger when they think about the nation as a bio-cultural unit, while if nation defined as a social-economy entity this connection is less powerful and has just the opposite direction.

Keywords: group boundaries, identity threat, prejudice, superordinate groups

Procedia PDF Downloads 410