Search results for: analyze
3938 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 823937 Applying GIS Geographic Weighted Regression Analysis to Assess Local Factors Impeding Smallholder Farmers from Participating in Agribusiness Markets: A Case Study of Vihiga County, Western Kenya
Authors: Mwehe Mathenge, Ben G. J. S. Sonneveld, Jacqueline E. W. Broerse
Abstract:
Smallholder farmers are important drivers of agriculture productivity, food security, and poverty reduction in Sub-Saharan Africa. However, they are faced with myriad challenges in their efforts at participating in agribusiness markets. How the geographic explicit factors existing at the local level interact to impede smallholder farmers' decision to participates (or not) in agribusiness markets is not well understood. Deconstructing the spatial complexity of the local environment could provide a deeper insight into how geographically explicit determinants promote or impede resource-poor smallholder farmers from participating in agribusiness. This paper’s objective was to identify, map, and analyze local spatial autocorrelation in factors that impede poor smallholders from participating in agribusiness markets. Data were collected using geocoded researcher-administered survey questionnaires from 392 households in Western Kenya. Three spatial statistics methods in geographic information system (GIS) were used to analyze data -Global Moran’s I, Cluster and Outliers Analysis (Anselin Local Moran’s I), and geographically weighted regression. The results of Global Moran’s I reveal the presence of spatial patterns in the dataset that was not caused by spatial randomness of data. Subsequently, Anselin Local Moran’s I result identified spatially and statistically significant local spatial clustering (hot spots and cold spots) in factors hindering smallholder participation. Finally, the geographically weighted regression results unearthed those specific geographic explicit factors impeding market participation in the study area. The results confirm that geographically explicit factors are indispensable in influencing the smallholder farming decisions, and policymakers should take cognizance of them. Additionally, this research demonstrated how geospatial explicit analysis conducted at the local level, using geographically disaggregated data, could help in identifying households and localities where the most impoverished and resource-poor smallholder households reside. In designing spatially targeted interventions, policymakers could benefit from geospatial analysis methods in understanding complex geographic factors and processes that interact to influence smallholder farmers' decision-making processes and choices.Keywords: agribusiness markets, GIS, smallholder farmers, spatial statistics, disaggregated spatial data
Procedia PDF Downloads 1393936 Leadership and Whether It Stems from Innate Abilities or from Situation
Authors: Salwa Abdelbaki
Abstract:
This research investigated how leaders develop, asking whether they have been leaders due to their innate abilities or they gain leadership characteristics through interactions based on requirements of a situation. If the first is true, then a leader should be successful in any situation. Otherwise, a leader may succeed only in a specific situation. A series of experiments were carried out on three groups including of males and females. First; a group of 148 students with different specializations had to select a leader. Another group of 51 students had to recall their previous experiences and their knowledge of each other to identify who were leaders in different situations. Then a series of analytic tools were applied to the identified leaders and to the whole groups to find out how leaders were developed. A group of 40 young children was also experimented with to find young leaders among them and to analyze their characteristics.Keywords: leadership, innate characteristics, situation, leadership theories
Procedia PDF Downloads 2903935 Sampling Effects on Secondary Voltage Control of Microgrids Based on Network of Multiagent
Authors: M. J. Park, S. H. Lee, C. H. Lee, O. M. Kwon
Abstract:
This paper studies a secondary voltage control framework of the microgrids based on the consensus for a communication network of multiagent. The proposed control is designed by the communication network with one-way links. The communication network is modeled by a directed graph. At this time, the concept of sampling is considered as the communication constraint among each distributed generator in the microgrids. To analyze the sampling effects on the secondary voltage control of the microgrids, by using Lyapunov theory and some mathematical techniques, the sufficient condition for such problem will be established regarding linear matrix inequality (LMI). Finally, some simulation results are given to illustrate the necessity of the consideration of the sampling effects on the secondary voltage control of the microgrids.Keywords: microgrids, secondary control, multiagent, sampling, LMI
Procedia PDF Downloads 3333934 Analysis of Tactile Perception of Textiles by Fingertip Skin Model
Authors: Izabela L. Ciesielska-Wrόbel
Abstract:
This paper presents finite element models of the fingertip skin which have been created to simulate the contact of textile objects with the skin to gain a better understanding of the perception of textiles through the skin, so-called Hand of Textiles (HoT). Many objective and subjective techniques have been developed to analyze HoT, however none of them provide exact overall information concerning the sensation of textiles through the skin. As the human skin is a complex heterogeneous hyperelastic body composed of many particles, some simplifications had to be made at the stage of building the models. The same concerns models of woven structures, however their utilitarian value was maintained. The models reflect only friction between skin and woven textiles, deformation of the skin and fabrics when “touching” textiles and heat transfer from the surface of the skin into direction of textiles.Keywords: fingertip skin models, finite element models, modelling of textiles, sensation of textiles through the skin
Procedia PDF Downloads 4653933 Terrorism: Definition, History and Different Approaches in the Analysis of Terrorism Phenomenon
Authors: Shabnam Dadparvar, Laijin Shen, Farzad Ravanbod
Abstract:
Nowadays, the political phenomenon of terrorism is considered as an effective factor on political, social, and economic changes. It has replaced the recognized political phenomena such as revolutions, wars (total war among two or more political units with distinct identities in the form of national states), coups d’état, insurgencies and etc. and has challenged political life in all its levels (sub national, national, and international political groups). In this paper by using descriptive-analytical method, the authors try to explain the spread of this political phenomenon across the world, its definition and types, also analyze different approaches to understand it. The authors believe that the Logical-Rational approach is the best way to explain and understand this phenomenon.Keywords: logical approach, psychological- social approach, religious approach, terrorism
Procedia PDF Downloads 3373932 MegaProjects and the Governing Processes That Lead to Success and Failure: A Literature Review
Authors: Fangwei Zhu, Wei Tian, Linzhuo Wang, Miao Yu
Abstract:
Megaproject has long been a critical issue in project governance, for its low success rate and large impact on society. Although the extant literature on megaproject governance is vast, to our best knowledge, the lacking of a thorough literature review makes it hard for us to gain a holistic view on current scenario of megaproject governance. The study conducts a systematic literature review process to analyze the existing literatures on megaproject governance. The finding indicates that mega project governance needs to be handled at network level and forming a network level governance provides a holistic framework for governing megaproject towards sustainable development of the projects. Theoretical and practical implications, as well as future studies and limitations, were discussed.Keywords: megaproject, governance, literature review, network
Procedia PDF Downloads 2013931 The Magnitude Scale Evaluation of Cross-Platform Internet Public Opinion
Abstract:
This paper introduces a model of internet public opinion waves, which describes the message propagation and measures the influence of a detected event. We collect data on public opinion propagation from different platforms on the internet, including micro-blogs and news. Then, we compare the spread of public opinion to the seismic waves and correspondently define the P-wave and S-wave and other essential attributes and characteristics in the process. Further, a model is established to evaluate the magnitude scale of the events. In the end, a practical example is used to analyze the influence of network public opinion and test the reasonability and effectiveness of the proposed model.Keywords: internet public opinion waves (IPOW), magnitude scale, cross-platform, information propagation
Procedia PDF Downloads 2883930 Phosphorus Reduction in Plain and Fully Formulated Oils Using Fluorinated Additives
Authors: Gabi N. Nehme
Abstract:
The reduction of phosphorus and sulfur in engine oil are the main topics of this paper. Very reproducible boundary lubrication tests were conducted as part of Design of Experiment software (DOE) to study the behavior of fluorinated catalyst iron fluoride (FeF3), and polutetrafluoroethylene or Teflon (PTFE) in developing environmentally friendly (reduced P and S) anti-wear additives for future engine oil formulations. Multi-component Chevron fully formulated oil (GF3) and Chevron plain oil were used with the addition of PTFE and catalyst to characterize and analyze their performance. Lower phosphorus blends were the goal of the model solution. Experiments indicated that new sub-micron FeF3 catalyst played an important role in preventing breakdown of the tribofilm.Keywords: wear, SEM, EDS, friction, lubricants
Procedia PDF Downloads 2873929 Attention Problems among Adolescents: Examining Educational Environments
Authors: Zhidong Zhang, Zhi-Chao Zhang, Georgianna Duarte
Abstract:
This study investigated the attention problems with the instrument of Achenbach System of Empirically Based Assessment (ASEBA). Two thousand eight hundred and ninety-four adolescents were surveyed by using a stratified sampling method. We examined the relationships between relevant background variables and attention problems. Multiple regression models were applied to analyze the data. Relevant variables such as sports activities, hobbies, age, grade and the number of close friends were included in this study as predictive variables. The analysis results indicated that educational environments and extracurricular activities are important factors which influence students’ attention problems.Keywords: adolescents, ASEBA, attention problems, educational environments, stratified sampling
Procedia PDF Downloads 2863928 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 1843927 Effect of Institutional Structure on Project Managers Performance in Construction Projects: A Case Study in Nigeria
Authors: Ebuka Valentine Iroha, Tsunemi Watanabe, Satoshi Tsuchiya
Abstract:
Project management practices play an important role in construction project performance and are one of project managers' essential key performance indicators. Previous studies have explored the poor performance of the construction industry, with project delays and cost overruns identified to contribute largely to numerous abandoned projects. These challenges are attributed to insufficient project management practices and a lack of utilization of project managers. The actual causes of inadequate project management practices and underutilization of project managers have been rarely discussed. This study tends to bridge the gap by identifying and assessing the actual causes of insufficient project management practices and underutilization of project managers. This study differs from past studies investigating the causes of poor performance by using institutional analysis methods to identify and analyze the factors influencing project management practices and proper utilization of project managers. Based on a comprehensive literature review, this study identified some factors embedded in the construction industry that influence the institutional environment and weaken the laws and regulations. These factors were used as the basis for semi-structured interview questions to investigate their impacts on project management practices and project managers. The data collected were coded into a four-level framework for institutional analysis. This method was used to analyze the interrelationships between the identified embedded factors, institutional laws and regulations, and construction organizations to understand how these influences result in the underutilization of project managers. The study found that the underutilization of project managers consists of two subsystems, including underutilization and lowering commitment. The first subsystem, corruption, political influence, religious and tribal discrimination, and organizational culture, were found to affect the institutional structure. These embedded factors weaken the industry’s governance mechanism, forcing project managers to prioritize corrupt practices over project demands. The ineffectiveness of the existing laws and regulations worsens the situation, supporting unfair working conditions and contributing to the underperformance of project managers. This situation leads to the development of the second subsystem, which is characterized by a lack of opportunities for career development and minimal incentives within construction organizations. The findings provide significant potential for addressing systemic challenges in the construction industry, particularly the underutilization of project managers and enhancing organizational support measures to improve project management practices and mitigate the adverse effects of corruption.Keywords: construction industry, project management, poor performance, embedded factors, project managers underutilization
Procedia PDF Downloads 413926 The Escalation of Incivility in the Light of Social Constructions that Conceal Inequalities
Authors: J. M. B. Mendonça, M. V. S. Siqueira, A. Soares, M. A. F. Santos
Abstract:
The purpose of this article is to understand the dynamics of the increase in incivility through social relations (gender, race, class, sexual orientation, etc.), which hide inequalities in the form of treatment and opportunities within the organizational sphere. For this, we will examine works that address incivility at work, as well as studies that deviate from the mainstream, bringing more obscure organizational facets to light in connection with a critical approach to this issue. Next, some results of a bibliometric study shall be exposed, to analyze contributions connected to the theme and demonstrate gaps for future research. Then, models that facilitate reflection on the dynamics of violence shall be discussed. Finally, a broader concept of incivility in interpersonal relationships in the workplace shall be exposed considering the multiple approaches discussed.Keywords: incivility, inequalities, organization reflections, preventing violence
Procedia PDF Downloads 3223925 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 2853924 Recovery of Acetonitrile from Aqueous Solutions by Extractive Distillation: The Effect of Entrainer
Authors: Aleksandra Y. Sazonova, Valentina M. Raeva
Abstract:
The aim of this work was to apply extractive distillation for acetonitrile removal from water solutions, to validate thermodynamic criterion based on excess Gibbs energy to entrainer selection process for acetonitrile – water mixture separation and show its potential efficiency at isothermal conditions as well as at isobaric (conditions of real distillation process), to simulate and analyze an extractive distillation process with chosen entrainers: optimize amount of trays and feeds, entrainer/original mixture and reflux ratios. Equimolar composition of the feed stream was chosen for the process, comparison of the energy consumptions was carried out. Glycerol was suggested as the most energetically and ecologically suitable entrainer.Keywords: acetonitrile, entrainer, extractive distillation, water
Procedia PDF Downloads 2693923 Analysis of the Keys Indicators of Sustainable Tourism: A Case Study in Lagoa da Confusão/to/Brazil
Authors: Veruska C. Dutra, Lucio F.M. Adorno, Mary L. G. S. Senna
Abstract:
Since it recognized the importance of planning sustainable tourism, which has been discussed effective methods of monitoring tourist. In this sense, the indicators, can transmit a set of information about complex processes, events or trends, showing up as an important monitoring tool and aid in the environmental assessment, helping to identify the progress of it and to chart future actions, contributing, so for decision making. The World Tourism Organization - WTO recognizes the importance of indicators to appraise the tourism activity in the point of view of sustainability, launching in 1995 eleven Keys Indicators of Sustainable Tourism to assist in the monitoring of tourist destinations. So we propose a case study to examine the applicability or otherwise of a monitoring methodology and aid in the understanding of tourism sustainability, analyzing the effectiveness of local indicators on the approach defined by the WTO. The study was applied to the Lagoa da Confusão City, in the state of Tocantins - North Brazil. The case study was carried out in 2006/2007, with the guiding deductive method. The indicators were measured by specific methodologies adapted to the study site, so that could generate quantitative results which could be analyzed at the proposed scale WTO (0 to 10 points). Applied indicators: Attractive Protection – AP (level of a natural and cultural attractive protection), Sociocultural Impact–SI (level of socio-cultural impacts), Waste Management - WM (level of management of solid waste generated), Planning Process-PP (trip planning level) Tourist Satisfaction-TS (satisfaction of the tourist experience), Community Satisfaction-CS (satisfaction of the local community with the development of local tourism) and Tourism Contribution to the Local Economy-TCLE (tourist level of contribution to the local economy). The city of Lagoa da Confusão was presented as an important object of study for the methodology in question, as offered condition to analyze the indicators and the complexities that arose during the research. The data collected can help discussions on the sustainability of tourism in the destination. The indicators TS, CS, WM , PP and AP appeared as satisfactory as allowed the measurement "translating" the reality under study, unlike TCLE and the SI indicators that were not seen as reliable and clear and should be reviewed and discussed for an adaptation and replication of the same. The application and study of various indicators of sustainable tourism, give better able to analyze the local tourism situation than monitor only one of the indicators, it does not demonstrate all collected data, which could result in a superficial analysis of the tourist destination.Keywords: indicators, Lagoa da Confusão, Tocantins, Brazil, monitoring, sustainability
Procedia PDF Downloads 4013922 Data Mining Algorithms Analysis: Case Study of Price Predictions of Lands
Authors: Julio Albuja, David Zaldumbide
Abstract:
Data analysis is an important step before taking a decision about money. The aim of this work is to analyze the factors that influence the final price of the houses through data mining algorithms. To our best knowledge, previous work was researched just to compare results. Furthermore, before using the data of the data set, the Z-Transformation were used to standardize the data in the same range. Hence, the data was classified into two groups to visualize them in a readability format. A decision tree was built, and graphical data is displayed where clearly is easy to see the results and the factors' influence in these graphics. The definitions of these methods are described, as well as the descriptions of the results. Finally, conclusions and recommendations are presented related to the released results that our research showed making it easier to apply these algorithms using a customized data set.Keywords: algorithms, data, decision tree, transformation
Procedia PDF Downloads 3753921 Mining Educational Data to Support Students’ Major Selection
Authors: Kunyanuth Kularbphettong, Cholticha Tongsiri
Abstract:
This paper aims to create the model for student in choosing an emphasized track of student majoring in computer science at Suan Sunandha Rajabhat University. The objective of this research is to develop the suggested system using data mining technique to analyze knowledge and conduct decision rules. Such relationships can be used to demonstrate the reasonableness of student choosing a track as well as to support his/her decision and the system is verified by experts in the field. The sampling is from student of computer science based on the system and the questionnaire to see the satisfaction. The system result is found to be satisfactory by both experts and student as well.Keywords: data mining technique, the decision support system, knowledge and decision rules, education
Procedia PDF Downloads 4233920 AI Applications in Accounting: Transforming Finance with Technology
Authors: Alireza Karimi
Abstract:
Artificial Intelligence (AI) is reshaping various industries, and accounting is no exception. With the ability to process vast amounts of data quickly and accurately, AI is revolutionizing how financial professionals manage, analyze, and report financial information. In this article, we will explore the diverse applications of AI in accounting and its profound impact on the field. Automation of Repetitive Tasks: One of the most significant contributions of AI in accounting is automating repetitive tasks. AI-powered software can handle data entry, invoice processing, and reconciliation with minimal human intervention. This not only saves time but also reduces the risk of errors, leading to more accurate financial records. Pattern Recognition and Anomaly Detection: AI algorithms excel at pattern recognition. In accounting, this capability is leveraged to identify unusual patterns in financial data that might indicate fraud or errors. AI can swiftly detect discrepancies, enabling auditors and accountants to focus on resolving issues rather than hunting for them. Real-Time Financial Insights: AI-driven tools, using natural language processing and computer vision, can process documents faster than ever. This enables organizations to have real-time insights into their financial status, empowering decision-makers with up-to-date information for strategic planning. Fraud Detection and Prevention: AI is a powerful tool in the fight against financial fraud. It can analyze vast transaction datasets, flagging suspicious activities and reducing the likelihood of financial misconduct going unnoticed. This proactive approach safeguards a company's financial integrity. Enhanced Data Analysis and Forecasting: Machine learning, a subset of AI, is used for data analysis and forecasting. By examining historical financial data, AI models can provide forecasts and insights, aiding businesses in making informed financial decisions and optimizing their financial strategies. Artificial Intelligence is fundamentally transforming the accounting profession. From automating mundane tasks to enhancing data analysis and fraud detection, AI is making financial processes more efficient, accurate, and insightful. As AI continues to evolve, its role in accounting will only become more significant, offering accountants and finance professionals powerful tools to navigate the complexities of modern finance. Embracing AI in accounting is not just a trend; it's a necessity for staying competitive in the evolving financial landscape.Keywords: artificial intelligence, accounting automation, financial analysis, fraud detection, machine learning in finance
Procedia PDF Downloads 633919 Stability Analysis for an Extended Model of the Hypothalamus-Pituitary-Thyroid Axis
Authors: Beata Jackowska-Zduniak
Abstract:
We formulate and analyze a mathematical model describing dynamics of the hypothalamus-pituitary-thyroid homoeostatic mechanism in endocrine system. We introduce to this system two types of couplings and delay. In our model, feedback controls the secretion of thyroid hormones and delay reflects time lags required for transportation of the hormones. The influence of delayed feedback on the stability behaviour of the system is discussed. Analytical results are illustrated by numerical examples of the model dynamics. This system of equations describes normal activity of the thyroid and also a couple of types of malfunctions (e.g. hyperthyroidism).Keywords: mathematical modeling, ordinary differential equations, endocrine system, delay differential equation
Procedia PDF Downloads 3363918 Regional Disparities in the Level of Education in West Bengal
Authors: Nafisa Banu
Abstract:
The present study is an attempt to analyze the regional disparities in the level of education in West Bengal. The data based on secondary sources obtained from a census of India. The study is divided into four sections. The first section presents introductions, objectives and brief descriptions of the study area, second part discuss the methodology and data base, while third and fourth comprise the empirical results, interpretation, and conclusion respectively. For showing the level of educational development, 8 indicators have been selected and Z- score and composite score techniques have been applied. The present study finds out there are large variations of educational level due to various historical, economical, socio-cultural factors of the study area.Keywords: education, regional disparity, literacy rate, Z-score, composite score
Procedia PDF Downloads 3573917 To Study the New Invocation of Biometric Authentication Technique
Authors: Aparna Gulhane
Abstract:
Biometrics is the science and technology of measuring and analyzing biological data form the basis of research in biological measuring techniques for the purpose of people identification and recognition. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. Biometric systems are used to authenticate the person's identity. The idea is to use the special characteristics of a person to identify him. These papers present a biometric authentication techniques and actual deployment of potential by overall invocation of biometrics recognition, with an independent testing of various biometric authentication products and technology.Keywords: types of biometrics, importance of biometric, review for biometrics and getting a new implementation, biometric authentication technique
Procedia PDF Downloads 3223916 Modeling Sediment Yield of Jido River in the Rift Vally
Authors: Dawit Hailekrios Hailu
Abstract:
The main objective of this study is to predict the sediment yield of the Jido River Watershed. Jido River is the largest tributary and covers around 50% of the total catchment area of Lake Shala. This research is undertaken to analyze the sediment yield of the catchments, transport capacity of the streams and sediment deposition rates of Jido River, which is located in the Sub-basin of Shala Lake, Rift Valley Basin of Ethiopia. The input data were Meteorological, Hydrological, land use/land cover maps and soil maps collected from concerned government offices. The sediment yield of Jido River and sediment change of the streams discharging into the Shala Lake were modeled.Keywords: sediment yield, watershed, simulation, calibration
Procedia PDF Downloads 763915 Numerical Investigation of the Effect of the Spark Plug Gap on Engine-Like Conditions
Authors: Fernanda Pinheiro Martins, Pedro Teixeira Lacava
Abstract:
The objective of this research is to analyze the effects of different spark plug conditions in engine-like conditions by applying computational fluid dynamics analysis. The 3D models applied consist of 3-Zones Extended Coherent Flame (ECFM-3Z) and Imposed Stretch Spark Ignition Model (ISSIM), respectively, for the combustion and the spark plug modelling. For this study, it was applied direct injection fuel system in a single cylinder engine operating with E0. The application of realistic operating conditions (load and speed) to the different cases studied will provide a deeper understanding of the effects of the spark plug gap, a result of parts outwearing in most of the cases, to the development of the combustion in engine-like conditions.Keywords: engine, CFD, direct injection, combustion, spark plug
Procedia PDF Downloads 1303914 Strategies to Enhance Export Performance of Thai Furniture Industry
Authors: Khomsan Laosillapacharoen
Abstract:
This research paper was aimed to analyze the current situation of the furniture industry and embark a plan to enhance the export volume of Thai furniture. This is a qualitative research which utilized meta-analysis and focus group. A total of 24 experts in both government and private sectors were interviewed. The findings revealed that Thai furniture had some advantages of access to raw material, high quality of labors, and have a unique skill. However, the threat included a tendency to have more foreign competitors in domestic market. In addition, the strategies to enhance the level of export included increase the standard quality of Thai furniture, offer new and modern designs, use marketing on the internet, use modern technology, and gain tax incentive from the government.Keywords: export, furniture, strategies, marketing
Procedia PDF Downloads 3993913 Data Presentation of Lane-Changing Events Trajectories Using HighD Dataset
Authors: Basma Khelfa, Antoine Tordeux, Ibrahima Ba
Abstract:
We present a descriptive analysis data of lane-changing events in multi-lane roads. The data are provided from The Highway Drone Dataset (HighD), which are microscopic trajectories in highway. This paper describes and analyses the role of the different parameters and their significance. Thanks to HighD data, we aim to find the most frequent reasons that motivate drivers to change lanes. We used the programming language R for the processing of these data. We analyze the involvement and relationship of different variables of each parameter of the ego vehicle and the four vehicles surrounding it, i.e., distance, speed difference, time gap, and acceleration. This was studied according to the class of the vehicle (car or truck), and according to the maneuver it undertook (overtaking or falling back).Keywords: autonomous driving, physical traffic model, prediction model, statistical learning process
Procedia PDF Downloads 2623912 ELectromagnetic-Thermal Coupled Analysis of PMSM with Cooling Channel
Authors: Hyun-Woo Jun, Tae-Chul Jeong, Huai-Cong Liu, Ju Lee
Abstract:
The paper presents the electromagnetic-thermal flow coupled analysis of permanent magnet synchronous motor (PMSM) which has cooling channel in stator core for forced air cooling. Unlike the general PMSM design, to achieve ohmic loss reduction for high efficiency, cooling channel actively used in the stator core. Equivalent thermal network model was made to analyze the effect of the formation of the additional flow path in the core. According to the shape and position changing of the channel design, electromagnetic-thermal coupled analysis results were reviewed.Keywords: coupled problems, electric motors, equivalent circuits, fluid flow, thermal analysis
Procedia PDF Downloads 6203911 Diesel Fault Prediction Based on Optimized Gray Neural Network
Authors: Han Bing, Yin Zhenjie
Abstract:
In order to analyze the status of a diesel engine, as well as conduct fault prediction, a new prediction model based on a gray system is proposed in this paper, which takes advantage of the neural network and the genetic algorithm. The proposed GBPGA prediction model builds on the GM (1.5) model and uses a neural network, which is optimized by a genetic algorithm to construct the error compensator. We verify our proposed model on the diesel faulty simulation data and the experimental results show that GBPGA has the potential to employ fault prediction on diesel.Keywords: fault prediction, neural network, GM(1, 5) genetic algorithm, GBPGA
Procedia PDF Downloads 3063910 Gender and Sexual Education in Morocco
Authors: Zouhair Gassim
Abstract:
The reconfiguration of representations of women's bodies as a "chest of pregnancies", the growing commitment of their bodies to the decision of pregnancies previously monopolized by men, the emergence of new practices of the bodies of men and women suggest that the borders between the masculine and the feminine in Morocco are moving. However, the persistence of sexual violence against girls/women indicates that these changes did not contribute to the lifting of the men's control over the bodies of women. This paper aims to analyze the lessons learned about sex education as a discourse related to the fabric of bodies in relation to sexuality in school in order to understand to what extent this institution contributes to the (re) production of gender inequalities. As a result, the educational discourse on sexuality still remains one of the spaces of resistance against gender equality and thus contributes to the (re) production of gender inequalities.Keywords: gender, sexual education, Morocco, educational system
Procedia PDF Downloads 1523909 Accelerating Side Channel Analysis with Distributed and Parallelized Processing
Authors: Kyunghee Oh, Dooho Choi
Abstract:
Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.Keywords: DPA, distributed computing, parallelized processing, side channel analysis
Procedia PDF Downloads 430