Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5490

Search results for: general attacks

5040 Study of Environmental Impact

Authors: Houmame Benbouali

Abstract:

The risks, in general, exist in any project; one can hardly carry out a project without taking risks. The hydraulic works are rather complex projects in their design, realization and exploitation, and are often subjected at the multiple risks being able to influence with their good performance, and can have an negative impact on their environment. The present study was carried out to quote the impacts caused by purification plant STEP Chlef on the environment, it aims has studies the environmental impacts during construction and when designing this STEP, it is divided into two parts: The first part results from a research task bibliographer which contain three chapters (-cleansing of water worn-general information on water worn-proceed of purification of waste water). The second part is an experimental part which is divided into four chapters (detailed state initial-description of the station of purification-evaluation of the impacts of the project analyzes measurements and recommendations).

Keywords: treatment plant, waste water, waste water treatment, environmental impact

Procedia PDF Downloads 485
5039 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 511
5038 The Current Status of Middle Class Internet Use in China: An Analysis Based on the Chinese General Social Survey 2015 Data and Semi-Structured Investigation

Authors: Abigail Qian Zhou

Abstract:

In today's China, the well-educated middle class, with stable jobs and above-average income, are the driving force behind its Internet society. Through the analysis of data from the 2015 Chinese General Social Survey and 50 interviewees, this study investigates the current situation of this group’s specific internet usage. The findings of this study demonstrate that daily life among the members of this socioeconomic group is closely tied to the Internet. For Chinese middle class, the Internet is used to socialize and entertain self and others. It is also used to search for and share information as well as to build their identities. The empirical results of this study will provide a reference, supported by factual data, for enterprises seeking to target the Chinese middle class through online marketing efforts.

Keywords: middle class, Internet use, network behaviour, online marketing, China

Procedia PDF Downloads 95
5037 Influence of Culturing Conditions on Biomass Yield, Total Lipid and Fatty Acid Composition of Some Filamentous Fungi

Authors: Alla V. Goncharova, Tatyana A. Karpenyuk, Yana S. Tsurkan, Rosa U. Beisembaeva, Togzhan D. Mukasheva, Ludmila V. Ignatova, Ramza Z. Berzhanova

Abstract:

In this work the effect of culturing conditions of filamentous fungi Penicillium raistrickii, Penicillium anatolicum, Fusarium sp. on biomass yield, the content of total lipids and fatty acids was studied. It has been established that in time the process of lipids accumulation correlated with biomass growth of cultures, reaching maximum values in stationary growth phase. Biomass yield and accumulation of general lipids was increased by adding zinc to the culture medium. The more intensive accumulation of biomass and general lipids was observed at temperature 18°C. Lowering the temperature of culturing has changed the ratio of saturated: Unsaturated fatty acids in the direction of increasing the latter.

Keywords: biomass, culturing conditions, fungi, fatty acids (FA), growth dynamics, lipids

Procedia PDF Downloads 429
5036 Gender, Tutoring, and Track in Egyptian Education

Authors: Eman Shady, Ray Langsten

Abstract:

In Egypt, girls have traditionally been educationally disadvantaged. This disadvantage, however, has been focused on the failure to enter school. Increasingly it is recognized that girls who ever-enroll are at least as likely to complete primary and secondary education as boys. Still the belief persists that girls, especially those from poor families, will be disadvantaged in terms of school expenditures and the transitions to secondary and higher education. We use data from the 2005-06 Egypt Household Education Survey to examine expenditures on tutoring during the final year of preparatory school, and the transition to specific tracks of secondary education. Tests during the last year of preparatory largely determine a student’s educational future. Results show that girls, even girls from poor families, are not disadvantaged in terms of expenditures, whether for tutoring, fees or general expenses. Moreover, girls are more likely than boys to advance to general secondary education, the track that leads to higher education.

Keywords: gender, tutoring, track, Egypt

Procedia PDF Downloads 367
5035 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 32
5034 Modelling the Education Supply Chain with Network Data Envelopment Analysis

Authors: Sourour Ramzi, Claudia Sarrico

Abstract:

Little has been done on network DEA in education, and nobody has attempted to model the whole education supply chain using network DEA. As such the contribution of the present paper is to propose a model for measuring the efficiency of education supply chains using network DEA. First, we use a general survey of data envelopment analysis (DEA) to establish the emergent themes for research in DEA, and focus on the theme of Network DEA. Second, we use a survey on two-stage DEA models, and Network DEA to write a state of the art on Network DEA, particularly applied to supply chain management. Third, we use a survey on DEA applications to establish the most influential papers on DEA education applications, in order to establish the state of the art on applications of DEA in education, in general, and applications of DEA to education using network DEA, in particular. Finally, we propose a model for measuring the performance of education supply chains of different education systems (countries or states within a country, for instance). We then use this model on some empirical data.

Keywords: supply chain, education, data envelopment analysis, network DEA

Procedia PDF Downloads 346
5033 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 75
5032 The Quality of Human Capital as a Factor of Social and Economic Development of the Region

Authors: O. Gubnitsyna, O. Zakoretskaya, O. Russova

Abstract:

It is generally recognized that the main task of modern society is human development. The quality of human capital has been identified as a key driver of economic development in the region. In this article, considered the quality of human capital as one of the main types of social and economic potential for the region’s development. The phenomenon of human capital represents both material and intellectual components of human activity. It is show that the necessary population characterized by certain quantitative and qualitative indicators (qualification and professional structure, education or social general condition and others) and is an necessary resource for the development of the regional economy. The connection of the regional goals with the quality of human capital is discussed in the article and a number of recommendations on its improvement were given. Solving the tasks stated in the article, the authors used analytical and statistical methods of research, scientific publications of domestic and foreign scientists on this issue. The results can be used in this implementation of the concept of regional development.

Keywords: human capital, the quality of human capital, economic development, social general condition

Procedia PDF Downloads 265
5031 The Influences of Marketplace Knowledge, General Product Class Knowledge, and Knowledge in Meat Product with Traceability on Trust in Meat Traceability

Authors: Kawpong Polyorat

Abstract:

Since the outbreak of mad cow disease and bird flu, consumers have become more concerned with meat quality and safety. As a result, meat traceability is adopted as one approach to handle consumers’ concern in this issue. Nevertheless, in Thailand, meat traceability is rarely used as a marketing tool to persuade consumers. As a consequence, the present study attempts to understand consumer trust in the meat traceability system by conducting a study in this country to examine the impact of three types of consumer knowledge on this trust. The study results reveal that out of three types of consumer knowledge, marketplace knowledge was the sole predictor of consumer trust in meat traceability and it has a positive influence. General product class knowledge and knowledge in meat products with traceability, however, did not significantly influence consumer trust. The research results provide several implications and directions for future study.

Keywords: consumer knowledge, marketing, product knowledge, traceability

Procedia PDF Downloads 298
5030 Thailand and Sino-Japanese Relations in the Early Twentieth Century

Authors: Mizuno Norihito

Abstract:

This study attempts to examine Japanese views of Thailand primarily in the 1920s and 1930s through the analysis of documents published by the Office of Governor-General of Taiwan (Taiwan Sotokufu) and its affiliated organizations. Japan regarded Taiwan, under its control since 1895, as a foothold to making inroads into the South, and The governor-general office was active in investigations and intelligence gathering in Southeast Asia, as well as the southern part of the Chinese continent. Documents published by the governor-general office and its related organizations, especially those in a couple of decades following the First World War, reveal that the Japanese paid attention to the presence of the-Thai-Chinese during the time period. It would not be surprising that the desiring to penetrating into the Thai market, as well as the markets of the rest of Southeast Asia, the Japanese could not ignore the presence of the Thai-Chinese because of their local economic influences. The increased Japanese concern about the Thai-Chinese toward the end of the 1920s and throughout the 1930s was, moreover, intertwined with the increased tension between China and Japan. In other words, Thailand, as well as the rest of Southeast Asia, became another arena of Sino-Japanese confrontation. The rise of nationalism against Japan in China infected the Thai-Chinese communities and threatened Japanese economic activities in the country. However, the Japanese simultaneously found out that Thai-Chinese concert with anti-Japanese in China did not necessarily match their business interests and that the Thai government’s efforts to assimilate the Thai-Chinese into the Thais society and strategic approach to Japan in the late 1930s hampered their anti-Japanese actions.

Keywords: Japanese-Thai Relations, Sino-Japanese relations, Thai Chinese, Overseas Japanese

Procedia PDF Downloads 316
5029 Irreducible Sign Patterns of Minimum Rank of 3 and Symmetric Sign Patterns That Allow Diagonalizability

Authors: Sriparna Bandopadhyay

Abstract:

It is known that irreducible sign patterns in general may not allow diagonalizability and in particular irreducible sign patterns with minimum rank greater than or equal to 4. It is also known that every irreducible sign pattern matrix with minimum rank of 2 allow diagonalizability with rank of 2 and the maximum rank of the sign pattern. In general sign patterns with minimum rank of 3 may not allow diagonalizability if the condition of irreducibility is dropped, but the problem of whether every irreducible sign pattern with minimum rank of 3 allows diagonalizability remains open. In this paper it is shown that irreducible sign patterns with minimum rank of 3 under certain conditions on the underlying graph allow diagonalizability. An alternate proof of the results that every sign pattern matrix with minimum rank of 2 and no zero lines allow diagonalizability with rank of 2 and also that every full sign pattern allows diagonalizability with all permissible ranks of the sign pattern is given. Some open problems regarding composite cycles in an irreducible symmetric sign pattern that support of a rank principal certificate are also answered.

Keywords: irreducible sign patterns, minimum rank, symmetric sign patterns, rank -principal certificate, allowing diagonalizability

Procedia PDF Downloads 73
5028 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 310
5027 Exploring Academic English Language Needs of Iranian Students of Geology: A Triangulated Approach

Authors: Rose Shayeghi, Pejman Hosseinioun

Abstract:

During the academic year of 2014-2015, a needs analysis was conducted in four major universities of Iran to assess the present and target situation academic language needs of undergraduate students of geology. Participants included undergraduate students (N = 102), graduate students (N = 47), subject-specific teachers (N = 12), and ESAP teachers (N = 20). Instrumentation included four needs analysis questionnaires, self-assessment and semi-structured interviews. The results indicated that, despite some inconsistencies in participants’ perceptions, ‘reading subject specific texts’, ‘knowledge of general vocabulary’, ‘using bilingual technical dictionaries’, and ‘writing e-mails to teachers and field experts’ were perceived as either ‘important’ or ‘very important’ to students’ success by all the participants. Moreover, the findings revealed that undergraduate students’ General English Proficiency (GEP) level was generally lower than what is required in the EAP courses. The findings of the study can have implications for improving and renewing EAP courses under study.

Keywords: ESP, EAP, needs analysis, triangulation, geology

Procedia PDF Downloads 306
5026 Usurping the Potency of African Cultural Heritage via Western Civilization: A Major Bane on the Development of Nigerian Educational System

Authors: U. Obaje Gabriel

Abstract:

The overwhelming and intimidating presence of western civilization over our traditional edifice is rather sad and distressful. A careful observation of our prevailing situation would reveal to anyone what mess westernization has done to our cultural values and norms. Corruption, frivolity and moral decadence which are major hallmarks of this foreign ideology are seriously ravaging our society in general and our educational system in particular. The current trends in our schools are those of cultism, nudity in dressing, exam malpractices, corruption and general moral decadence. Against the background of these unwholesome practices in our schools, this paper intends to show the need for us to go back to our roots and harmonize the veritable aspects of our rich cultural heritage with those equally good aspects of western civilization. We believe that when this is done effectively, a very potent indigenous system of education will surely emerge, thereby solving the teething problem of fallen standard in our educational system.

Keywords: heritage, educational development, western civilization, performing arts studies

Procedia PDF Downloads 300
5025 Metamodel for Artefacts in Service Engineering Analysis and Design

Authors: Purnomo Yustianto, Robin Doss

Abstract:

As a process of developing a service system, the term ‘service engineering’ evolves in scope and definition. To achieve an integrated understanding of the process, a general framework and an ontology are required. This paper extends a previously built service engineering framework by exploring metamodels for the framework artefacts based on a foundational ontology and a metamodel landscape. The first part of this paper presents a correlation map between the proposed framework with the ontology as a form of evaluation for the conceptual coverage of the framework. The mapping also serves to characterize the artefacts to be produced for each activity in the framework. The second part describes potential metamodels to be used, from the metamodel landscape, as alternative formats of the framework artefacts. The results suggest that the framework sufficiently covers the ontological concepts, both from general service context and software service context. The metamodel exploration enriches the suggested artefact format from the original eighteen formats to thirty metamodel alternatives.

Keywords: artefact, framework, service, metamodel

Procedia PDF Downloads 179
5024 Challenges in Curriculum Development in Eastern European Countries: A Case Study of Georgia and Ukraine

Authors: Revaz Tabatadze

Abstract:

This research aims to describe and analyze the intricacies of curriculum development within the broader context of general education reforms undertaken in Eastern European Countries. Importantly, this study is the first of its kind, examining Georgian and Ukrainian National Curriculum documents locally and internationally. The significance of this research lies in its potential to guide the Ministry of Education and Science of the mentioned countries in revising existing curriculum documents to address contemporary challenges in general education. The findings will not only benefit post-Soviet countries but also offer insights for nations facing curriculum development and effectiveness issues. By examining the peculiarities of curriculum development amid globalization, this research aims to contribute to overcoming educational challenges at both local and international levels. This study defines key concepts related to curriculum, distinguishing between intended, implemented, and attained curricula. It also explores the historical context of curriculum development in Georgia and Ukraine from 1991 to 2021, highlighting changes in teacher standards and teacher certification examinations. The literature review section emphasizes the importance of curriculum development as a complex and evolving process, especially in the context of globalization. It underscores the need for a curriculum that fosters critical thinking, problem-solving, and collaboration skills in students. In summary, this research offers a comprehensive examination of curriculum development in Georgia and Ukraine, shedding light on the challenges and opportunities in the age of globalization, with potential implications for educational systems worldwide.

Keywords: curriculum development, general education reforms, eastern European countries, globalization in education

Procedia PDF Downloads 42
5023 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 317
5022 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 242
5021 Difference Expansion Based Reversible Data Hiding Scheme Using Edge Directions

Authors: Toshanlal Meenpal, Ankita Meenpal

Abstract:

A very important technique in reversible data hiding field is Difference expansion. Secret message as well as the cover image may be completely recovered without any distortion after data extraction process due to reversibility feature. In general, in any difference expansion scheme embedding is performed by integer transform in the difference image acquired by grouping two neighboring pixel values. This paper proposes an improved reversible difference expansion embedding scheme. We mainly consider edge direction for embedding by modifying the difference of two neighboring pixels values. In general, the larger difference tends to bring a degraded stego image quality than the smaller difference. Image quality in the range of 0.5 to 3.7 dB in average is achieved by the proposed scheme, which is shown through the experimental results. However payload wise it achieves almost similar capacity in comparisons with previous method.

Keywords: information hiding, wedge direction, difference expansion, integer transform

Procedia PDF Downloads 464
5020 Thai Primary School Teachers’ Attitude and Preparedness to Teach Students with Autism in the General Education Classroom

Authors: Sunanta Klibthong

Abstract:

Inclusive education services for students with Autism remains in its early developmental stages in Thailand. Despite many more children with autism are attending schools since the Thai government introduced the Education Provision for People with Disabilities Act in 2008, the services students with autism and their families receive are generally lacking. This quantitative study used Attitude and Preparedness to Teach Students with Autism Scale (APTSAS) to investigate 110 primary school teachers’ attitude and preparedness to teach students with autism in the general education classroom. Descriptive statistical analysis of the data found that student behaviour was the most significant factor in building teachers’ negative attitudes students with autism. The majority of teachers also indicated that their pre-service education did not prepare them to meet the learning needs of children with autism in particular, those who are non-verbal. The study is significant and provides direction for enhancing teacher education for inclusivity in Thailand.

Keywords: attitude, autism, teachers, Thailand

Procedia PDF Downloads 252
5019 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 131
5018 Perception of People with a Physical Disability towards Those with a Different Kind of Disability

Authors: Monika Skura

Abstract:

People with physical disabilities, as with other people with differences in appearance or style of functioning come under negative social mechanisms. Therefore, it is worth asking what the relationship of the group is, who experience psychosocial effects because of their physical disability, towards people with intellectual disabilities, hearing impairments, visual impairments, mental illnesses, and their own physically disabled group. To analyse the perception of people with a physical disability, the study explores three areas: the acceptance or rejection of society’s stigmatization towards persons with disabilities; the importance of their own experience regarding their disability, in relation to another kind of disability; their level of acceptance to social interactions, in relation to various types of disabilities. The research sample consisted of 90 people with physical disabilities, who suffer from damage to the locomotor system. The data was collected using a questionnaire and the Adjective Check List by H. B. Gough and A. B. Heilbrun. This study utilized focus interviews to develop survey items for the questionnaire. The findings highlight that the response from those who were physically disabled agreed with the opinions of general society, not only with the issue of promoting integrated solutions and offering assistance but also having the same preferences and opinions about specific types of disability. However, their perception regarding their own group was noticeably different from that of general society. In the light of the study, for people with physical disabilities, just as for able-bodied people, it can be challenging to develop a meaningful relationship with people who have disabilities. All forms of disability suffer from negative attitudes and opinions that exist in society. The majority of those who were researched were focused primarily on their own problems, this inevitably hinders the integrity of the entire group, making it more difficult for it to find a cohesive voice, in which to promote their place within society.

Keywords: general society’s opinions about disability, people with different kinds of disability, perception, physical disability

Procedia PDF Downloads 231
5017 UV Resistibility of a Carbon Nanofiber Reinforced Polymer Composite

Authors: A. Evcin, N. Çiçek Bezir, R. Duman, N. Duman

Abstract:

Nowadays, a great concern is placed on the harmfulness of ultraviolet radiation (UVR) which attacks human bodies. Nanocarbon materials, such as carbon nanotubes (CNTs), carbon nanofibers (CNFs) and graphene, have been considered promising alternatives to shielding materials because of their excellent electrical conductivities, very high surface areas and low densities. In the present work, carbon nanofibers have been synthesized from solutions of Polyacrylonitrile (PAN)/ N,N-dimethylformamide (DMF) by electrospinning method. The carbon nanofibers have been stabilized by oxidation at 250 °C for 2 h in air and carbonized at 750 °C for 1 h in H2/N2. We present the fabrication and characterization of transparent and ultraviolet (UV) shielding CNF/polymer composites. The content of CNF filler has been varied from 0.2% to 0.6 % by weight. UV Spectroscopy has been performed to study the effect of composition on the transmittance of polymer composites.

Keywords: electrospinning, carbon nanofiber, characterization, composites, nanofiber, ultraviolet radiation

Procedia PDF Downloads 200
5016 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 332
5015 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 345
5014 Proficiency Testing of English for Specific Academic Purpose: Using a Pilot Test in a Taiwanese University as an Example

Authors: Wenli Tsou, Jessica Wu

Abstract:

Courses of English for specific academic purposes (ESAP) have become popular for higher education in Taiwan; however, no standardized tests have been developed for evaluating learners’ English proficiency in individual designated fields. Assuming a learner’s proficiency in a specific academic area is built up with one’s general proficiency in English with specific knowledge and vocabulary in the content areas, an adequate ESAP proficiency test may be constructed by some selected test items related to the designated academic areas. In this study, through collaboration between a language testing institution and a university in Taiwan, three sets of ESAP tests, covering three disciplinary areas of business and the workplace, science and engineering, and health and medicine majors, were developed and administered to sophomore students (N=1704) who were enrolled in ESAP courses at a university in southern Taiwan. For this study, the courses were grouped into the above-mentioned three disciplines, and students took the specialized proficiency test based on the ESAP course they were taking. Because students were free to select which ESAP course to take, each course had both major and non-major students. Toward the end of the one-semester course, ending in January, 2015, each student took two tests, one of general English (General English Proficiency Test, or GEPT) and the other ESAP. Following each test, students filled out a survey, reporting their test taking experiences. After comparing students’ two test scores, it was found that business majors and health and medical students performed better in ESAP than the non-majors in the class, whereas science and engineering majors did about the same as their non-major counterparts. In addition, test takers with CERF B2 (upper intermediate) level or above performed well in both tests, while students who are below B2 did slightly better in ESAP. The findings suggest that students’ test performance have been enhanced by their specialist content and vocabulary knowledge. Furthermore, results of the survey show that the difficulty levels reported by students are consistent with their test performances. Based on the item analysis, the findings can be used to develop proficiency tests for specific disciplines and to identify ability indicators for college students in their designated fields.

Keywords: english for specific academic purposes (ESAP), general english proficiency test (GEPT), higher education, proficiency test

Procedia PDF Downloads 506
5013 Analytical Description of Disordered Structures in Continuum Models of Pattern Formation

Authors: Gyula I. Tóth, Shaho Abdalla

Abstract:

Even though numerical simulations indeed have a significant precursory/supportive role in exploring the disordered phase displaying no long-range order in pattern formation models, studying the stability properties of this phase and determining the order of the ordered-disordered phase transition in these models necessitate an analytical description of the disordered phase. First, we will present the results of a comprehensive statistical analysis of a large number (1,000-10,000) of numerical simulations in the Swift-Hohenberg model, where the bulk disordered (or amorphous) phase is stable. We will show that the average free energy density (over configurations) converges, while the variance of the energy density vanishes with increasing system size in numerical simulations, which suggest that the disordered phase is a thermodynamic phase (i.e., its properties are independent of the configuration in the macroscopic limit). Furthermore, the structural analysis of this phase in the Fourier space suggests that the phase can be modeled by a colored isotropic Gaussian noise, where any instant of the noise describes a possible configuration. Based on these results, we developed the general mathematical framework of finding a pool of solutions to partial differential equations in the sense of continuous probability measure, which we will present briefly. Applying the general idea to the Swift-Hohenberg model we show, that the amorphous phase can be found, and its properties can be determined analytically. As the general mathematical framework is not restricted to continuum theories, we hope that the proposed methodology will open a new chapter in studying disordered phases.

Keywords: fundamental theory, mathematical physics, continuum models, analytical description

Procedia PDF Downloads 109
5012 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 266
5011 Agegraphic Dark Energy with GUP

Authors: H. R. Fazlollahi

Abstract:

Dark Energy origin is unknown and so describing this mysterious component in large scale structure needs to manipulate our theories in general relativity. Although in most models, dark energy arises from extra terms through modifying Einstein-Hilbert action, maybe its origin traces back to fundamental aspects of ground energy of space-time given in quantum mechanics. Hence, diluting space-time in general relativity with quantum mechanics properties leads to the Karolyhazy relation corresponding energy density of quantum fluctuations of space-time. Through generalized uncertainty principle and an eye to Karolyhazy approach in this study we extend energy density of quantum fluctuations of space-time. Also, the application of this idea is considered in late time evolution and we have shown how extra term in generalized uncertainty principle plays as a plausible interaction term role in suggested model.

Keywords: generalized uncertainty principle, karolyhazy approach, agegraphic dark energy, cosmology

Procedia PDF Downloads 53