Search results for: urban strategies
4177 Flood-prone Urban Area Mapping Using Machine Learning, a Case Sudy of M'sila City (Algeria)
Authors: Medjadj Tarek, Ghribi Hayet
Abstract:
This study aims to develop a flood sensitivity assessment tool using machine learning (ML) techniques and geographic information system (GIS). The importance of this study is integrating the geographic information systems (GIS) and machine learning (ML) techniques for mapping flood risks, which help decision-makers to identify the most vulnerable areas and take the necessary precautions to face this type of natural disaster. To reach this goal, we will study the case of the city of M'sila, which is among the areas most vulnerable to floods. This study drew a map of flood-prone areas based on the methodology where we have made a comparison between 3 machine learning algorithms: the xGboost model, the Random Forest algorithm and the K Nearest Neighbour algorithm. Each of them gave an accuracy respectively of 97.92 - 95 - 93.75. In the process of mapping flood-prone areas, the first model was relied upon, which gave the greatest accuracy (xGboost).Keywords: Geographic information systems (GIS), machine learning (ML), emergency mapping, flood disaster management
Procedia PDF Downloads 954176 A Distributed Smart Battery Management System – sBMS, for Stationary Energy Storage Applications
Authors: António J. Gano, Carmen Rangel
Abstract:
Currently, electric energy storage systems for stationary applications have known an increasing interest, namely with the integration of local renewable energy power sources into energy communities. Li-ion batteries are considered the leading electric storage devices to achieve this integration, and Battery Management Systems (BMS) are decisive for their control and optimum performance. In this work, the advancement of a smart BMS (sBMS) prototype with a modular distributed topology is described. The system, still under development, has a distributed architecture with modular characteristics to operate with different battery pack topologies and charge capacities, integrating adaptive algorithms for functional state real-time monitoring and management of multicellular Li-ion batteries, and is intended for application in the context of a local energy community fed by renewable energy sources. This sBMS system includes different developed hardware units: (1) Cell monitoring units (CMUs) for interfacing with each individual cell or module monitoring within the battery pack; (2) Battery monitoring and switching unit (BMU) for global battery pack monitoring, thermal control and functional operating state switching; (3) Main management and local control unit (MCU) for local sBMS’s management and control, also serving as a communications gateway to external systems and devices. This architecture is fully expandable to battery packs with a large number of cells, or modules, interconnected in series, as the several units have local data acquisition and processing capabilities, communicating over a standard CAN bus and will be able to operate almost autonomously. The CMU units are intended to be used with Li-ion cells but can be used with other cell chemistries, with output voltages within the 2.5 to 5 V range. The different unit’s characteristics and specifications are described, including the different implemented hardware solutions. The developed hardware supports both passive and active methods for charge equalization, considered fundamental functionalities for optimizing the performance and the useful lifetime of a Li-ion battery package. The functional characteristics of the different units of this sBMS system, including different process variables data acquisition using a flexible set of sensors, can support the development of custom algorithms for estimating the parameters defining the functional states of the battery pack (State-of-Charge, State-of-Health, etc.) as well as different charge equalizing strategies and algorithms. This sBMS system is intended to interface with other systems and devices using standard communication protocols, like those used by the Internet of Things. In the future, this sBMS architecture can evolve to a fully decentralized topology, with all the units using Wi-Fi protocols and integrating a mesh network, making unnecessary the MCU unit. The status of the work in progress is reported, leading to conclusions on the system already executed, considering the implemented hardware solution, not only as fully functional advanced and configurable battery management system but also as a platform for developing custom algorithms and optimizing strategies to achieve better performance of electric energy stationary storage devices.Keywords: Li-ion battery, smart BMS, stationary electric storage, distributed BMS
Procedia PDF Downloads 1014175 Analyzing the Effectiveness of Different Testing Techniques in Ensuring Software Quality
Authors: R. M. P. C. Bandara, M. L. L. Weerasinghe, K. T. C. R. Kumari, A. G. D. R. Hansika, D. I. De Silva, D. M. T. H. Dias
Abstract:
Software testing is an essential process in software development that aims to identify defects and ensure that software is functioning as intended. Various testing techniques are employed to achieve this goal, but the effectiveness of these techniques varies. This research paper analyzes the effectiveness of different testing techniques in ensuring software quality. The paper explores different testing techniques, including manual and automated testing, and evaluates their effectiveness in terms of identifying defects, reducing the number of defects in software, and ensuring that software meets its functional and non-functional requirements. Moreover, the paper will also investigate the impact of factors such as testing time, test coverage, and testing environment on the effectiveness of these techniques. This research aims to provide valuable insights into the effectiveness of different testing techniques, enabling software development teams to make informed decisions about the testing approach that is best suited to their needs. By improving testing techniques, the number of defects in software can be reduced, enhancing the quality of software and ultimately providing better software for users.Keywords: software testing life cycle, software testing techniques, software testing strategies, effectiveness, software quality
Procedia PDF Downloads 844174 Biological Aquaculture System (BAS) Design and Water Quality on Marble Goby (Oxyeleotris marmoratus): A Water Recirculating Technology
Authors: AnnWon Chew, Nik Norulaini Nik Ab Rahman, Mohd Omar Ab Kadir, C. C. Chen, Jaafar Chua
Abstract:
This paper presents an innovative process to solve the ammonia, nitrite and nitrate build-up problem in recirculating system using Biological Aquaculture System (BAS). The novel aspects of the process lie in a series of bioreactors that specially arrange and design to meet the required conditions for water purification. The BAS maximizes the utilization of bio-balls as the ideal surface for beneficial microbes to flourish. It also serves as a physical barrier that traps organic particles, which in turn becomes source for the microbes to perform their work. The operation in the proposed system gives a low concentration and average range of good maintain excellent water quality, i.e., with low levels of ammonia, nitrite, nitrate, a suitable pH range for aquaculture and low turbidity. The BAS thus provides a solution for sustainable small-scale, urban aquaculture operation with a high recovery water and minimal waste disposal.Keywords: ammonia, bioreactor, Biological Aquaculture System (BAS), bio-balls, water recirculating technology
Procedia PDF Downloads 5924173 Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products
Authors: Varutorn Tulnawat, Padcharee Phasuk
Abstract:
This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed.Keywords: border trade, dea, textile, garment
Procedia PDF Downloads 2454172 Hierarchical Control Structure to Control the Power Distribution System Components in Building Systems
Authors: Hamed Sarbazy, Zohre Gholipour Haftkhani, Ali Safari, Pejman Hosseiniun
Abstract:
Scientific and industrial progress in the past two decades has resulted in energy distribution systems based on power electronics, as an enabling technology in various industries and building management systems can be considered. Grading and standardization module power electronics systems and its use in a distributed control system, a strategy for overcoming the limitations of using this system. The purpose of this paper is to investigate strategies for scheduling and control structure of standard modules is a power electronic systems. This paper introduces the classical control methods and disadvantages of these methods will be discussed, The hierarchical control as a mechanism for distributed control structure of the classification module explains. The different levels of control and communication between these levels are fully introduced. Also continue to standardize software distribution system control structure is discussed. Finally, as an example, the control structure will be presented in a DC distribution system.Keywords: application management, hardware management, power electronics, building blocks
Procedia PDF Downloads 5214171 Gestational Diabetes Mellitus (GDM) Increasing Postpartum Screening to Prevent T2D
Authors: Boma Nellie S, Nambiar Ritu, K. Kanchanmala, T. Rashida, Israell Imelda, Moul Khusnud, Michael Marina
Abstract:
Gestational diabetes (GDM) imparts an increased life long risk of developing Type 2 Diabetes Mellitus (T2DM) and cardiovascular disease in women. Once diagnosed with GDM women have up to 74% increased cumulative risk developing T2DM in 10-15 years. Identifying women at increased risk of developing T2DM and offering them pharmacological and lifestyle management interventions will delay or eliminate the development of diabetes in this population. While ADA recommends that all gestational diabetics be offered postnatal screening, worldwide the screening rates from 35-75% and Al Rahba Hospital with a robust universal antenatal screening program for GDM was at a dismal 9% in 2011. A multidisciplinary team was put together involving OB/Gyn Physicians, Midwives, Nurses (ward and OPD) Diabetic Educators, Dietitians, Medical Records, Laboratory & IT with the implementation of multiple strategies to increase the uptake of postpartum screening of the gestational diabetic.Keywords: GDM, postnatal screening, preventing type 2 diabetes, lifestyle management
Procedia PDF Downloads 5214170 Net Zero Energy Schools: The Starting Block for the Canadian Energy Neutral K-12 Schools
Authors: Hamed Hakim, Roderic Archambault, Charles J. Kibert, Maryam Mirhadi Fard
Abstract:
Changes in the patterns of life in the late 20th and early 21st century have created new challenges for educational systems. Greening the physical environment of school buildings has emerged as a response to some of those challenges and led to the design of energy efficient K-12 school buildings. With the advancement in knowledge and technology, the successful construction of Net Zero Energy Schools, such as the Lady Bird Johnson Middle School demonstrates a cutting edge generation of sustainable schools, and solves the former challenge of attaining energy self-sufficient educational facilities. There are approximately twenty net zero energy K-12 schools in the U.S. of which about six are located in Climate Zone 5 and 6 based on ASHRAE climate zone classification. This paper aims to describe and analyze the current status of energy efficient and NZE schools in Canada. An attempt is made to study existing U.S. energy neutral strategies closest to the climate zones in Canada (zones 5 and 6) and identify the best practices for Canadian schools.Keywords: Canada K-12 schools, green school, energy efficient, net-zero energy schools
Procedia PDF Downloads 4044169 How to Improve Teaching and Learning Strategies Through Educational Research. An Experience of Peer Observation in Legal Education
Authors: Luigina Mortari, Alessia Bevilacqua, Roberta Silva
Abstract:
The experience presented in this paper aims to understand how educational research can support the introduction and optimization of teaching innovations in legal education. In this increasingly complex context, a strong need to introduce paths aimed at acquiring not only professional knowledge and skills but also transversal such as reflective, critical, and problem-solving skills emerges. Through a peer observation intertwined with an analysis of discursive practices, researchers and the teacher worked together through a process of participatory and transformative accompaniment whose objective was to promote the active participation and engagement of students in learning processes, an element indispensable to work in the more specific direction of strengthening key competences. This reflective faculty development path led the teacher to activate metacognitive processes, becoming thus aware of the strengths and areas of improvement of his teaching innovation.Keywords: legal education, teaching innovation, peer observation, discursive analysis, faculty development
Procedia PDF Downloads 1674168 Machine Learning-Enabled Classification of Climbing Using Small Data
Authors: Nicholas Milburn, Yu Liang, Dalei Wu
Abstract:
Athlete performance scoring within the climbing do-main presents interesting challenges as the sport does not have an objective way to assign skill. Assessing skill levels within any sport is valuable as it can be used to mark progress while training, and it can help an athlete choose appropriate climbs to attempt. Machine learning-based methods are popular for complex problems like this. The dataset available was composed of dynamic force data recorded during climbing; however, this dataset came with challenges such as data scarcity, imbalance, and it was temporally heterogeneous. Investigated solutions to these challenges include data augmentation, temporal normalization, conversion of time series to the spectral domain, and cross validation strategies. The investigated solutions to the classification problem included light weight machine classifiers KNN and SVM as well as the deep learning with CNN. The best performing model had an 80% accuracy. In conclusion, there seems to be enough information within climbing force data to accurately categorize climbers by skill.Keywords: classification, climbing, data imbalance, data scarcity, machine learning, time sequence
Procedia PDF Downloads 1434167 Developing an Audit Quality Model for an Emerging Market
Authors: Bita Mashayekhi, Azadeh Maddahi, Arash Tahriri
Abstract:
The purpose of this paper is developing a model for audit quality, with regard to the contextual and environmental attributes of the audit profession in Iran. For this purpose, using an exploratory approach, and because of the special attributes of the auditing profession in Iran in terms of the legal environment, regulatory and supervisory mechanisms, audit firms size, and etc., we used grounded theory approach as a qualitative research method. Therefore, we got the opinions of the experts in the auditing and capital market areas through unstructured interviews. As a result, the authors revealed the determinants of audit quality, and by using these determinants, developed an Integrated Audit Quality Model, including causal conditions, intervening conditions, context, as well as action strategies related to AQ and their consequences. In this research, audit quality is studied using a systemic approach. According to this approach, the quality of inputs, processes, and outputs of auditing determines the quality of auditing, therefore, the quality of all different parts of this system is considered.Keywords: audit quality, integrated audit quality model, demand for audit service, supply of audit, grounded theory
Procedia PDF Downloads 2854166 Tehran Province Water and Wastewater Company Approach on Energy Efficiency by the Development of Renewable Energy to Achieving the Sustainable Development Legal Principle
Authors: Mohammad Parvaresh, Mahdi Babaee, Bahareh Arghand, Roushanak Fahimi Hanzaee, Davood Nourmohammadi
Abstract:
Today, the intelligent network of water and wastewater as one of the key steps in realizing the smart city in the world. Use of pressure relief valves in urban water networks in order to reduce the pressure is necessary in Tehran city. But use these pressure relief valves lead to waste water, more power consumption, and environmental pollution because Tehran Province Water and Wastewater Co. use a quarter of industry 's electricity. In this regard, Tehran Province Water and Wastewater Co. identified solutions to reduce direct and indirect costs in energy use in the process of production, transmission and distribution of water because this company has extensive facilities and high capacity to realize green economy and industry. The aim of this study is to analyze the new project in water and wastewater industry to reach sustainable development.Keywords: Tehran Province Water and Wastewater Company, water network efficiency, sustainable development, International Environmental Law
Procedia PDF Downloads 2914165 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations
Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson
Abstract:
Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.Keywords: oblivious transfer, quantum protocol, cryptography, XOR
Procedia PDF Downloads 1264164 Leadership Strategies in Social Enterprises through Reverse Accountability: Analysis of Social Control for Pragmatic Organizational Design
Authors: Ananya Rajagopal
Abstract:
The study is based on an analysis of qualitative data used to analyze the business performance of entrepreneurs in emerging markets based on core variables such as collective leadership in reference to social entrepreneurship and reverse accountability attributes of stakeholders. In-depth interviews were conducted with 25 emerging enterprises within Mexico across five industrial segments. The study has been conducted focusing on five major research questions, which helped in developing the grounded theory related to reverser accountability. The results of the study revealed that the traditional entrepreneurship model based on an individualistic leadership style is being replaced by a collective leadership model. The study focuses on the leadership styles within social enterprises aimed at enhancing managerial capabilities and competencies, stakeholder values, and entrepreneurial growth. The theoretical motivation of this study has been derived from stakeholder theory and agency theory.Keywords: reverse accountability, social enterprises, collective leadership, grounded theory, social governance
Procedia PDF Downloads 1214163 Emotional Intelligence: A Panacea in the Management and Marketing of Hospitality and Tourism Good and Services
Authors: M. Azugama, P. Okoro Ugo Chigozie, A. O. Nnamocha
Abstract:
Emotional Intelligence constitutes powerful psychological forces that can strongly influence performance in behaviour, interaction and relationship management. Surprisingly how emotions are interpreted and employed in marketing of hospitality experience have had limited comprehension. Marketing of hospitality experiences have important emotional dimensions which the traditional marketing techniques tend to underplay. Guest and host relationship are challenged by mutual hospitableness obligations; suggesting that the commercial practice of delivering satisfactory guest experience has much to gain from traditional understanding of hospitality. By understanding the emotion-based hospitality transaction between guests and hosts, customers’ experiences can be delivered over and against competitor pressure. In this paper, marketing strategies and tactics in hospitality and tourism are principally concerned with adjusting each of the 6P & T elements (i.e. product, place, price and promotion; and adding people, processes and Time in service contexts), to provide a competitive offer (experience) to customers.Keywords: Emotional intelligence, hospitality and tourism, relationship management, marketing
Procedia PDF Downloads 4724162 Computer Assisted Learning in a Less Resource Region
Authors: Hamidullah Sokout, Samiullah Paracha, Abdul Rashid Ahmadi
Abstract:
Passing the entrance exam to a university is a major step in one's life. University entrance exam commonly known as Kankor is the nationwide entrance exam in Afghanistan. This examination is prerequisite for all public and private higher education institutions at undergraduate level. It is usually taken by students who are graduated from high schools. In this paper, we reflect the major educational school graduates issues and propose ICT-based test preparation environment, known as ‘Online Kankor Exam Prep System’ to give students the tools to help them pass the university entrance exam on the first try. The system is based on Intelligent Tutoring System (ITS), which introduced an essential package of educational technology for learners that features: (i) exam-focused questions and content; (ii) self-assessment environment; and (iii) test preparation strategies in order to help students to acquire the necessary skills in their carrier and keep them up-to-date with instruction.Keywords: web-based test prep systems, learner-centered design, e-learning, intelligent tutoring system
Procedia PDF Downloads 3724161 Enhancing Pedagogical Practices in Online Arabic Language Instruction: Challenges, Opportunities, and Strategies
Authors: Salah Algabli
Abstract:
As online learning takes center stage; Arabic language instructors face the imperative to adapt their practices for the digital realm. This study investigates the experiences of online Arabic instructors to unveil the pedagogical opportunities and challenges this format presents. Utilizing a transcendental phenomenological approach with 15 diverse participants, the research shines a light on the unique realities of online language teaching at the university level, specifically in the United States. The study proposes theoretical and practical solutions to maximize the benefits of online language learning while mitigating its challenges. Recommendations cater to instructors, researchers, and program coordinators, paving the way for enhancing the quality of online Arabic language education. The findings highlight the need for pedagogical approaches tailored to the online environment, ultimately shaping a future where both instructors and learners thrive in this digital landscape.Keywords: online Arabic language learning, pedagogical opportunities and challenges, online Arabic teachers, online language instruction, digital pedagogy
Procedia PDF Downloads 624160 Teachers’ Language Insecurity in English as a Second Language Instruction: Developing Effective In-Service Training
Authors: Mamiko Orii
Abstract:
This study reports on primary school second language teachers’ sources of language insecurity. Furthermore, it aims to develop an in-service training course to reduce anxiety and build sufficient English communication skills. Language/Linguistic insecurity refers to a lack of confidence experienced by language speakers. In particular, second language/non-native learners often experience insecurity, influencing their learning efficacy. While language learner insecurity has been well-documented, research on the insecurity of language teaching professionals is limited. Teachers’ language insecurity or anxiety in target language use may adversely affect language instruction. For example, they may avoid classroom activities requiring intensive language use. Therefore, understanding teachers’ language insecurity and providing continuing education to help teachers to improve their proficiency is vital to improve teaching quality. This study investigated Japanese primary school teachers’ language insecurity. In Japan, teachers are responsible for teaching most subjects, including English, which was recently added as compulsory. Most teachers have never been professionally trained in second language instruction during college teacher certificate preparation, leading to low confidence in English teaching. Primary source of language insecurity is a lack of confidence regarding English communication skills. Their actual use of English in classrooms remains unclear. Teachers’ classroom speech remains a neglected area requiring improvement. A more refined programme for second language teachers could be constructed if we can identify areas of need. Two questionnaires were administered to primary school teachers in Tokyo: (1) Questionnaire A: 396 teachers answered questions (using a 5-point scale) concerning classroom teaching anxiety and general English use and needs for in-service training (Summer 2021); (2) Questionnaire B: 20 teachers answered detailed questions concerning their English use (Autumn 2022). Questionnaire A’s responses showed that over 80% of teachers have significant language insecurity and anxiety, mainly when speaking English in class or teaching independently. Most teachers relied on a team-teaching partner (e.g., ALT) and avoided speaking English. Over 70% of the teachers said they would like to participate in training courses in classroom English. Questionnaire B’s results showed that teachers could use simple classroom English, such as greetings and basic instructions (e.g., stand up, repeat after me), and initiate conversation (e.g., asking questions). In contrast, teachers reported that conversations were mainly carried on in a simple question-answer style. They had difficulty continuing conversations. Responding to learners’ ‘on-the-spot’ utterances was particularly difficult. Instruction in turn-taking patterns suitable in the classroom communication context is needed. Most teachers received grammar-based instruction during their entire English education. They were predominantly exposed to displayed questions and form-focused corrective feedback. Therefore, strategies such as encouraging teachers to ask genuine questions (i.e., referential questions) and responding to students with content feedback are crucial. When learners’ utterances are incorrect or unsatisfactory, teachers should rephrase or extend (recast) them instead of offering explicit corrections. These strategies support a continuous conversational flow. These results offer benefits beyond Japan’s English as a second Language context. They will be valuable in any context where primary school teachers are underprepared but must provide English-language instruction.Keywords: english as a second/non-native language, in-service training, primary school, teachers’ language insecurity
Procedia PDF Downloads 684159 Energy Efficiency in Hot Arid Climates Code Compliance and Enforcement for Residential Buildings
Authors: Mohamed Edesy, Carlo Cecere
Abstract:
This paper is a part of an ongoing research that proposes energy strategies for residential buildings in hot arid climates. In Egypt, the residential sector is dominated by increase in consumption rates annually. A building energy efficiency code was introduced by the government in 2005; it indicates minimum design and application requirements for residential buildings. Submission is mandatory and should lead to about 20% energy savings with an increase in comfort levels. However, compliance is almost nonexistent, electricity is subsidized and incentives to adopt energy efficient patterns are very low. This work presents an overview of the code and analyzes the impact of its introduction on different sectors. It analyses compliance barriers and indicates challenges that stand in the way of a realistic enforcement. It proposes an action plan for immediate code enforcement, updating current code to include retrofit, and development of rating systems for buildings. This work presents a broad national plan for energy efficiency empowerment in the residential sector.Keywords: energy efficiency, housing, energy policies, code enforcement
Procedia PDF Downloads 3474158 Evaluation of Fetal brain using Magnetic Resonance Imaging
Authors: Mahdi Farajzadeh Ajirlou
Abstract:
Ordinary fetal brain development can be considered by in vivo attractive reverberation imaging (MRI) from the 18th gestational week (GW) to term and depends fundamentally on T2-weighted and diffusion-weighted (DW) arrangements. The foremost commonly suspected brain pathologies alluded to fetal MRI for assist assessment are ventriculomegaly, lost corpus callosum, and anomalies of the posterior fossa. Brain division could be a crucial to begin with step in neuroimage examination. Within the case of fetal MRI it is especially challenging and critical due to the subjective introduction of the hatchling, organs that encompass the fetal head, and irregular fetal movement. A few promising strategies have been proposed but are constrained in their execution in challenging cases and in realtime division. Fetal MRI is routinely performed on a 1.5-Tesla scanner without maternal or fetal sedation. The mother lies recumbent amid the course of the examination, the length of which is ordinarily 45 to 60 minutes. The accessibility and continuous approval of standardizing fetal brain development directions will give critical devices for early discovery of impeded fetal brain development upon which to oversee high-risk pregnancies.Keywords: brain, fetal, MRI, imaging
Procedia PDF Downloads 794157 The Journey of a Malicious HTTP Request
Authors: M. Mansouri, P. Jaklitsch, E. Teiniker
Abstract:
SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.Keywords: Linux system calls, web attack detection, interception, SQL
Procedia PDF Downloads 3594156 Energy Use, Emissions, Economic Growth and Trade: Evidence from Mauritius
Authors: B. Seetanah, H. Neeliah
Abstract:
This paper investigates the relationship among energy, emissions and economic growth in Mauritius in the presence of trade activities, with capital and labour as other control variables. Using annual data from 1960 to 2011, it is found that the variables are non-stationary and cointegrated. The relationship among the various variables are thus examined in a dynamic VECM framework. Our empirical results comply with the growth hypothesis. Output elasticities of 0.17, 0.25 and 0.43 show that increases in energy consumption cause increases in economic growth, capital accumulation and trade in the long run. We also found that CO2 negatively affects output, but has no significant effect on trade. Findings for the long-run generally tend to tally with those in the short-run. Interestingly we found that energy consumption has a significant impact on CO2 emissions. Our results tend to suggest that implementing energy conservation strategies to mitigate the negative impact of CO2 emissions can dent economic growth, and that promoting cleaner energy production could be a better alternative for Mauritius.Keywords: energy, emissions, economic growth, export, VECM
Procedia PDF Downloads 4794155 Exploring Digital Media’s Impact on Sports Sponsorship: A Global Perspective
Authors: Sylvia Chan-Olmsted, Lisa-Charlotte Wolter
Abstract:
With the continuous proliferation of media platforms, there have been tremendous changes in media consumption behaviors. From the perspective of sports sponsorship, while there is now a multitude of platforms to create brand associations, the changing media landscape and shift of message control also mean that sports sponsors will have to take into account the nature of and consumer responses toward these emerging digital media to devise effective marketing strategies. Utilizing the personal interview methodology, this study is qualitative and exploratory in nature. A total of 18 experts from European and American academics, sports marketing industry, and sports leagues/teams were interviewed to address three main research questions: 1) What are the major changes in digital technologies that are relevant to sports sponsorship; 2) How have digital media influenced the channels and platforms of sports sponsorship; and 3) How have these technologies affected the goals, strategies, and measurement of sports sponsorship. The study found that sports sponsorship has moved from consumer engagement, engagement measurement, and consequences of engagement on brand behaviors to micro-targeting one on one, engagement by context, time, and space, and activation and leveraging based on tracking and databases. From the perspective of platforms and channels, the use of mobile devices is prominent during sports content consumption. Increasing multiscreen media consumption means that sports sponsors need to optimize their investment decisions in leagues, teams, or game-related content sources, as they need to go where the fans are most engaged in. The study observed an imbalanced strategic leveraging of technology and digital infrastructure. While sports leagues have had less emphasis on brand value management via technology, sports sponsors have been much more active in utilizing technologies like mobile/LBS tools, big data/user info, real-time marketing and programmatic, and social media activation. Regardless of the new media/platforms, the study found that integration and contextualization are the two essential means of improving sports sponsorship effectiveness through technology. That is, how sponsors effectively integrate social media/mobile/second screen into their existing legacy media sponsorship plan so technology works for the experience/message instead of distracting fans. Additionally, technological advancement and attention economy amplify the importance of consumer data gathering, but sports consumer data does not mean loyalty or engagement. This study also affirms the benefit of digital media as they offer viral and pre-event activations through storytelling way before the actual event, which is critical for leveraging brand association before and after. That is, sponsors now have multiple opportunities and platforms to tell stories about their brands for longer time period. In summary, digital media facilitate fan experience, access to the brand message, multiplatform/channel presentations, storytelling, and content sharing. Nevertheless, rather than focusing on technology and media, today’s sponsors need to define what they want to focus on in terms of content themes that connect with their brands and then identify the channels/platforms. The big challenge for sponsors is to play to the venues/media’s specificity and its fit with the target audience and not uniformly deliver the same message in the same format on different platforms/channels.Keywords: digital media, mobile media, social media, technology, sports sponsorship
Procedia PDF Downloads 2944154 Assesment of SNP Variation and Distribution in Pakistani Cattle Breeds using High Density SNP Genotyping
Authors: Hamid Mustafa, Heather J. Huson, Adeela Ajmal, Kim Euisoo, Tad S. Sonstegard
Abstract:
In this study, 67 animals, representing six different cattle breeds of Pakistan, were genotyped with the Bovine high density (777K) SNP Beadchip. These include 13 Sahiwal, 09 Red Sindhi, 13 Tharparkar, 08 Achi, 13 Cholistani and 10 Dhanni cattle breeds. Analysis of 500, 939 SNP markers revealed that the mean minor allele frequency (MAF) was 0.21, 0.22, 0.18, 0.23, 0.22 and 0.22 for Sahiwal, Red Sindhi, Tharparkar, Achi, Cholistani and Dhanni respectively. Significant differences of minor allele frequency (MAF) were observed between the indigenous Pakistani cattle population (P<0.001). Across these Pakistani cattle breeds, a common variant MAF (≥0.10 and ≤0.5) accounted for an overall estimated 75.71 % of the 500,939 SNPs and on the average 19.58 % of the markers were monomorphic. Mean observed (HO) and expected (HE) heterozygosities were 0.656 and 0.638, respectively. This primarily study of Pakistani indigenous cattle breeds indicate that this level of SNPs variation can potentially be used for genomic studies for future breeding plans and for farm animal conservation strategies.Keywords: Pakistan, cattle, minor allele frequency, SNP, variation
Procedia PDF Downloads 6504153 Characterizing the Geometry of Envy Human Behaviour Using Game Theory Model with Two Types of Homogeneous Players
Authors: A. S. Mousa, R. I. Rajab, A. A. Pinto
Abstract:
An envy behavioral game theoretical model with two types of homogeneous players is considered in this paper. The strategy space of each type of players is a discrete set with only two alternatives. The preferences of each type of players is given by a discrete utility function. All envy strategies that form Nash equilibria and the corresponding envy Nash domains for each type of players have been characterized. We use geometry to construct two dimensional envy tilings where the horizontal axis reflects the preference for players of type one, while the vertical axis reflects the preference for the players of type two. The influence of the envy behavior parameters on the Cartesian position of the equilibria has been studied, and in each envy tiling we determine the envy Nash equilibria. We observe that there are 1024 combinatorial classes of envy tilings generated from envy chromosomes: 256 of them are being structurally stable while 768 are with bifurcation. Finally, some conditions for the disparate envy Nash equilibria are stated.Keywords: game theory, Nash equilibrium, envy Nash behavior, geometric tilings, bifurcation thresholds
Procedia PDF Downloads 2294152 Variants of Mathematical Induction as Strong Proof Techniques in Theory of Computing
Authors: Ahmed Tarek, Ahmed Alveed
Abstract:
In the theory of computing, there are a wide variety of direct and indirect proof techniques. However, mathematical induction (MI) stands out to be one of the most powerful proof techniques for proving hypotheses, theorems, and new results. There are variations of mathematical induction-based proof techniques, which are broadly classified into three categories, such as structural induction (SI), weak induction (WI), and strong induction (SI). In this expository paper, several different variants of the mathematical induction techniques are explored, and the specific scenarios are discussed where a specific induction technique stands out to be more advantageous as compared to other induction strategies. Also, the essential difference among the variants of mathematical induction are explored. The points of separation among mathematical induction, recursion, and logical deduction are precisely analyzed, and the relationship among variations of recurrence relations, and mathematical induction are being explored. In this context, the application of recurrence relations, and mathematical inductions are considered together in a single framework for codewords over a given alphabet.Keywords: alphabet, codeword, deduction, mathematical, induction, recurrence relation, strong induction, structural induction, weak induction
Procedia PDF Downloads 1644151 Inventory Policy with Continuous Price Reduction in Solar Photovoltaic Supply Chain
Authors: Xiangrong Liu, Chuanhui Xiong
Abstract:
With the concern of large pollution emissions from coal-fired power plants and new commitment to green energy, global solar power industry was emerging recently. Due to the advanced technology, the price of solar photovoltaic(PV) module was reduced at a fast rate, which arose an interesting but challenge question to solar supply chain. This research is modeling the inventory strategies for a PV supply chain with a PV manufacturer, an assembler and an end customer. Through characterizing the manufacturer's and PV assembler's optimal decision in decentralized and centralized situation, this study shed light on how to improve supply chain performance through parameters setting in the contract design. The results suggest the assembler to lower the optimal stock level gradually each period before price reduction and set up a newsvendor base-stock policy in all periods after price reduction. As to the PV module manufacturer, a non-stationary produce-up-to policy is optimal.Keywords: photovoltaic, supply chain, inventory policy, base-stock policy
Procedia PDF Downloads 3484150 Iran’s Sexual and Reproductive Rights Roll-Back: An Overview of Iran’s New Population Policies
Authors: Raha Bahreini
Abstract:
This paper discusses the roll-back of women’s sexual and reproductive rights in the Islamic Republic of Iran, which has come in the wake of a striking shift in the country’s official population policies. Since the late 1980s, Iran has won worldwide praise for its sexual and reproductive health and services, which have contributed to a steady decline in the country’s fertility rate–from 7.0 births per women in 1980 to 5.5 in 1988, 2.8 in 1996 and 1.85 in 2014. This is owed to a significant increase in the voluntary use of modern contraception in both rural and urban areas. In 1976, only 37 per cent of women were using at least one method of contraception; by 2014 this figure had reportedly risen to a high of nearly 79 per cent for married girls and women living in urban areas and 73.78 per cent for those living in rural areas. Such progress may soon be halted. In July 2012, Iran’s Supreme Leader Ayatollah Sayed Ali Khamenei denounced Iran’s family planning policies as an imitation of Western lifestyle. He exhorted the authorities to increase Iran’s population to 150 to 200 million (from around 78.5 million), including by cutting subsidies for contraceptive methods and dismantling the state’s Family and Population Planning Programme. Shortly thereafter, Iran’s Minister of Health and Medical Education announced the scrapping of the budget for the state-funded Family and Population Planning Programme. Iran’s Parliament subsequently introduced two bills; the Comprehensive Population and Exaltation of Family Bill (Bill 315), and the Bill to Increase Fertility Rates and Prevent Population Decline (Bill 446). Bill 446 outlaws voluntary tubectomies, which are believed to be the second most common method of modern contraception in Iran, and blocks access to information about contraception, denying women the opportunity to make informed decisions about the number and spacing of their children. Coupled with the elimination of state funding for Iran’s Family and Population Programme, the move would undoubtedly result in greater numbers of unwanted pregnancies, forcing more women to seek illegal and unsafe abortions. Bill 315 proposes various discriminatory measures in the areas of employment, divorce, and protection from domestic violence in order to promote a culture wherein wifedom and child-bearing is seen as women’s primary duty. The Bill, for example, instructs private and public entities to prioritize, in sequence, men with children, married men without children and married women with children when hiring for certain jobs. It also bans the recruitment of single individuals as family law lawyers, public and private school teachers and members of the academic boards of universities and higher education institutes. The paper discusses the consequences of these initiatives which would, if continued, set the human rights of women and girls in Iran back by decades, leaving them with a future shaped by increased inequality, discrimination, poor health, limited choices and restricted freedoms, in breach of Iran’s international human rights obligations.Keywords: family planning and reproductive health, gender equality and empowerment of women, human rights, population growth
Procedia PDF Downloads 3074149 Patent Protection for AI Innovations in Pharmaceutical Products
Authors: Nerella Srinivas
Abstract:
This study explores the significance of patent protection for artificial intelligence (AI) innovations in the pharmaceutical sector, emphasizing applications in drug discovery, personalized medicine, and clinical trial optimization. The challenges of patenting AI-driven inventions are outlined, focusing on the classification of algorithms as abstract ideas, meeting the non-obviousness standard, and issues around defining inventorship. The methodology includes examining case studies and existing patents, with an emphasis on how companies like Benevolent AI and Insilico Medicine have successfully secured patent rights. Findings demonstrate that a strategic approach to patent protection is essential, with particular attention to showcasing AI’s technical contributions to pharmaceutical advancements. Conclusively, the study underscores the critical role of understanding patent law and innovation strategies in leveraging intellectual property rights in the rapidly advancing field of AI-driven pharmaceuticals.Keywords: artificial intelligence, pharmaceutical industry, patent protection, drug discovery, personalized medicine, clinical trials, intellectual property, non-obviousness
Procedia PDF Downloads 134148 Investigation the Polluting Effect of Heavy Elements on Underground Water in Behbahan Plain, South West Zagros
Authors: Zohreh Marbooti, Rezvan Khavari
Abstract:
Groundwater as an essential part of natural resources seems to be an important issue in environmental engineering, so preservation and purification of it can have a critical value for any community. This paper investigates the concentration of elements of Pb, Cd, As, Se. For ground water in Behbahan (a city on south west of Iran), to this purpose a group of 30 wells were studied to examine the concentration of the elements of Pb, Cd, As, Se, and also to determine PH, EC, TDS, temperature and the ions of HCO32-, SO42-, Cl-, Na+, Mg2+, Ca2+, K+ for the wells. Results of the analyses show that the concentration of the elements of Pb, As and, Cd in 33,13,56 percent of the wells respectively and Se in all the samples were greater than normal range of WHO. Since there is a low correlation between Pb and major ions of (HCO32-, SO42-, Cl-, Na+, Mg2+, Ca2+, K+) it can be revealed that Pb overconcentration caused by human contamination. Relative great correlation between Se and the ions showed that Se derived from Gypsum and Dolomit. The big correlation between As and major cations and onions, imply that As can originate from dissolution and liquidation of mineral evaporation in the zone. The high rate of Cadmium concentration in urban sewagewater is due to the small industries, workshops and, mills wastewater.Keywords: heavy elements, underground water, pollution, waste water
Procedia PDF Downloads 561