Search results for: cache timing attack
463 Violence and Unintentional Injuries among Secondary School Students in Jordan
Authors: Malakeh Zuhdi Malak, Mahmoud Taher Kalaldeh
Abstract:
In Jordan, no available data exists regarding violence and unintentional injuries among secondary school students aged 15-19 years. The purpose of this study was to assess the violence and unintentional injuries among those students, and to compare these two behaviors between male and female students. A descriptive cross-sectional design was carried out on randomly selected eight comprehensive secondary schools (four schools for females and four schools for males) from the public school educational directorate located in Amman. A modified Arabic version of the General School Health Survey questionnaire was used to measure violence and unintentional injuries. A sample of 750 secondary school students was studied. The findings showed that 26.8 % of students had been physically attacked. Overall, 43.3 % of students had been involved in a physical fight and 20.1% of them had been bullied. Overall, 45.3% of students were seriously injured. There was a difference between male and female students regarding to physical attack, physical fight, and serious injuries. In conclusion, it is necessary to develop effective training program in life skills for students that functions to reduce risk-taking behaviors that often leading to violence and unintentional injuries.Keywords: secondary school students, violence, unintentional injuries, bullying
Procedia PDF Downloads 372462 Exploring Service Performance of Area-Based Bus Service for Dhaka: A Case Study of Dhaka Chaka
Authors: Md. Musfiqur Rahman Bhuiya Nidalia Islam, Hossain Mohiuddin, Md. Kawser Bin Zaman
Abstract:
Dhaka North City Corporation introduced first area-based bus service on 10 August 2016 to run through Gulshan and Banani area to dilute sufferings of the people which started with the ban on movement of the bus in these areas after Holy Artisan terrorist attack. This study explores service quality performance of Dhaka Chaka on the basis of information provided by its riders on a questionnaire survey. Total thirteen service quality indicators have been ranked on a scale of 1-5, and they have been classified under three latent variables based on their correlation using eigenvalue and rotated factor matrix derived through factor analysis process. Mean, and skewness has been calculated for each indicator. It has been found that ticket price and ticketing system have relatively poor average service quality rank than other factors. All other factors have moderately good performance. The study also suggests some recommendation to improve service quality of Dhaka Chaka based on the interrelation between considered parameters.Keywords: area based bus service, eigen value, factor analysis, correlation
Procedia PDF Downloads 189461 Investigation of Flow Effects of Soundwaves Incident on an Airfoil
Authors: Thirsa Sherry, Utkarsh Shrivastav, Kannan B. T., Iynthezhuton K.
Abstract:
The field of aerodynamics and aeroacoustics remains one of the most poignant and well-researched fields of today. The current paper aims to investigate the predominant problem concerning the effects of noise of varying frequencies and waveforms on airflow surrounding an airfoil. Using a single speaker beneath the airfoil at different positions, we wish to simulate the effects of sound directly impinging on an airfoil and study its direct effects on airflow. We wish to study the same using smoke visualization methods with incense as our smoke-generating material in a variable-speed subsonic wind tunnel. Using frequencies and wavelengths similar to those of common engine noise, we wish to simulate real-world conditions of engine noise interfering with airflow and document the arising trends. These results will allow us to look into the real-world effects of noise on airflow and how to minimize them and expand on the possible relation between waveforms and noise. The parameters used in the study include frequency, Reynolds number, waveforms, angle of attack, and the effects on airflow when varying these parameters.Keywords: engine noise, aeroacoustics, acoustic excitation, low speed
Procedia PDF Downloads 92460 Combat Capability Improvement Using Sleep Analysis
Authors: Gabriela Kloudova, Miloslav Stehlik, Peter Sos
Abstract:
The quality of sleep can affect combat performance where the vigilance, accuracy and reaction time are a decisive factor. In the present study, airborne and special units are measured on duty using actigraphy fingerprint scoring algorithm and QEEG (quantitative EEG). Actigraphic variables of interest will be: mean nightly sleep duration, mean napping duration, mean 24-h sleep duration, mean sleep latency, mean sleep maintenance efficiency, mean sleep fragmentation index, mean sleep onset time, mean sleep offset time and mean midpoint time. In an attempt to determine the individual somnotype of each subject, the data like sleep pattern, chronotype (morning and evening lateness), biological need for sleep (daytime and anytime sleepability) and trototype (daytime and anytime wakeability) will be extracted. Subsequently, a series of recommendations will be included in the training plan based on daily routine, timing of the day and night activities, duration of sleep and the number of sleeping blocks in a defined time. The aim of these modifications in the training plan is to reduce day-time sleepiness, improve vigilance, attention, accuracy, speed of the conducted tasks and to optimize energy supplies. Regular improvement of the training supposed to have long-term neurobiological consequences including neuronal activity changes measured by QEEG. Subsequently, that should enhance cognitive functioning in subjects assessed by the digital cognitive test batteries and improve their overall performance.Keywords: sleep quality, combat performance, actigraph, somnotype
Procedia PDF Downloads 166459 Eco-Friendly Preservative Treated Bamboo Culm: Compressive Strength Analysis
Authors: Perminder JitKaur, Santosh Satya, K. K. Pant, S. N. Naik
Abstract:
Bamboo is extensively used in construction industry. Low durability of bamboo due to fungus infestation and termites attack under storage puts certain constrains for it usage as modern structural material. Looking at many chemical formulations for bamboo treatment leading to severe harmful environment effects, research on eco-friendly preservatives for bamboo treatment has been initiated world-over. In the present studies, eco-friendly preservative for bamboo treatment has been developed. To validate its application for structural purposes, investigation of effect of treatment on compressive strength has been investigated. Neem oil(25%) integrated with copper naphthenate (0.3%) on dilution with kerosene oil impregnated into bamboo culm at 2 bar pressure, has shown weight loss of only 3.15% in soil block analysis method. The results of compressive strength analysis using The results from compressive strength analysis using HEICO Automatic Compression Testing Machine, reveal that preservative treatment has not altered the structural properties of bamboo culms. Compressive strength of control (11.72 N/mm2) and above treated samples (11.71 N/mm2) was found to be comparable.Keywords: D. strictus, bamboo, neem oil, presure treatment, compressive strength
Procedia PDF Downloads 408458 Studying Relationship between Local Geometry of Decision Boundary with Network Complexity for Robustness Analysis with Adversarial Perturbations
Authors: Tushar K. Routh
Abstract:
If inputs are engineered in certain manners, they can influence deep neural networks’ (DNN) performances by facilitating misclassifications, a phenomenon well-known as adversarial attacks that question networks’ vulnerability. Recent studies have unfolded the relationship between vulnerability of such networks with their complexity. In this paper, the distinctive influence of additional convolutional layers at the decision boundaries of several DNN architectures was investigated. Here, to engineer inputs from widely known image datasets like MNIST, Fashion MNIST, and Cifar 10, we have exercised One Step Spectral Attack (OSSA) and Fast Gradient Method (FGM) techniques. The aftermaths of adding layers to the robustness of the architectures have been analyzed. For reasoning, separation width from linear class partitions and local geometry (curvature) near the decision boundary have been examined. The result reveals that model complexity has significant roles in adjusting relative distances from margins, as well as the local features of decision boundaries, which impact robustness.Keywords: DNN robustness, decision boundary, local curvature, network complexity
Procedia PDF Downloads 75457 Impact of Climate on Productivity of Major Cereal Crops in Sokoto State, Nigeria
Authors: M. B. Sokoto, L. Tanko, Y. M. Abdullahi
Abstract:
The study aimed at examining the impact of climatic factors (rainfall, minimum and maximum temperature) on the productivity of major cereals in Sokoto state, Nigeria. Secondary data from 1997-2008 were used in respect of annual yield of Major cereals crops (maize, millet, rice, and sorghum (t ha-1). Data in respect of climate was collected from Sokoto Energy Research Centre (SERC) for the period under review. Data collected was analyzed using descriptive statistics, correlation and regression analysis. The result of the research reveals that there is variation in the trend of the climatic factors and also variation in cereals output. The effect of average temperature on yields has a negative effect on crop yields. Similarly, rainfall is not significant in explaining the effect of climate on cereal crops production. The study has revealed to some extend the effect of climatic variables, such as rainfall, relative humidity, maximum and minimum temperature on major cereals production in Sokoto State. This will assist in planning ahead in cereals production in the area. Other factors such as soil fertility, correct timing of planting and good cultural practices (such as spacing of strands), protection of crops from weeds, pests and diseases and planting of high yielding varieties should also be taken into consideration for increase yield of cereals.Keywords: cereals, climate, impact, major, productivity
Procedia PDF Downloads 390456 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time
Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl
Abstract:
In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.Keywords: SQL injection, attacks, web application, accuracy, database
Procedia PDF Downloads 151455 Heart Attack Prediction Using Several Machine Learning Methods
Authors: Suzan Anwar, Utkarsh Goyal
Abstract:
Heart rate (HR) is a predictor of cardiovascular, cerebrovascular, and all-cause mortality in the general population, as well as in patients with cardio and cerebrovascular diseases. Machine learning (ML) significantly improves the accuracy of cardiovascular risk prediction, increasing the number of patients identified who could benefit from preventive treatment while avoiding unnecessary treatment of others. This research examines relationship between the individual's various heart health inputs like age, sex, cp, trestbps, thalach, oldpeaketc, and the likelihood of developing heart disease. Machine learning techniques like logistic regression and decision tree, and Python are used. The results of testing and evaluating the model using the Heart Failure Prediction Dataset show the chance of a person having a heart disease with variable accuracy. Logistic regression has yielded an accuracy of 80.48% without data handling. With data handling (normalization, standardscaler), the logistic regression resulted in improved accuracy of 87.80%, decision tree 100%, random forest 100%, and SVM 100%.Keywords: heart rate, machine learning, SVM, decision tree, logistic regression, random forest
Procedia PDF Downloads 138454 Modeling of Combustion Process in the Piston Aircraft Engine Using a MCFM-3Z Model
Authors: Marcin Szlachetka, Konrad Pietrykowski
Abstract:
Modeling of a combustion process in a 9-cylinder aircraft engine is presented. The simulations of the combustion process in the IC engine have provided the information on the spatial and time distributions of selected quantities within the combustion chamber of the engine. The numerical analysis results have been compared with the results of indication process of the engine on the test stand. Modeling of combustion process an auto-ignited IC engine in the AVL Fire was carried out within the study. For the calculations, a ECFM-3Z model was used. Verification of simulation results was carried out by comparison of the pressure in the cylinder. The courses of indicated pressure, obtained from the simulations and during the engine tests mounted on a test stand were compared. The engine was braked by the propeller, which results in an adequate external power characteristics. The test object is a modified ASz-62IR engine with the injection system. The engine was running at take-off power. To check the optimum ignition timing regarding power, calculations, tests were performed for 7 different moments of ignition. The analyses of temperature distribution in the cylinder depending on the moments of ignition were carried out. Additional the course of pressure in the cylinder at different angles of ignition delays of the second spark plug were examined. The swirling of the mixture in the combustion chamber was also analysed. It has been shown that the largest vortexes occur in the middle of the chamber, and gets smaller, closer to the combustion chamber walls. This work has been financed by the Polish National Centre for Research and Development, INNOLOT, under Grant Agreement No. INNOLOT/I/1/NCBR/2013.Keywords: CFD, combustion, internal combustion engine, aircraft engine
Procedia PDF Downloads 372453 Evaluation of Bollworm Tolerance in F1 and F2 BT Cotton under Unprotected Condition
Authors: N. K. Bhute, B. B. Bhosle
Abstract:
Field experiment was conducted during kharif 2005, at the experimental farm of the Department of Genetics and Plant Breeding, College of Agriculture, Marathwada Agricultural University, Parbhani, Maharashtra. F1 and F2 hybrids of 23 Bt and 5 non-Bt hybrids were grown in a randomized block design with two replications. The results showed that among F1 hybrids, open boll damage due to bollworm complex was not noticed in 4233 Bt and 4247 Bt cotton hybrids which were found significantly superior over MECH 6301 Bt (3.2 %), 4255 Bt (3.28 %) and it was at par with rest of the hybrids. Among F2 hybrids minimum open boll damage (3.10 %) was noticed in Proagro 144 Bt, which was found significantly superior over rest of the hybrids except 4234 Bt (4.17 %) and 4254 Bt (4.98 %) which were at par with each other. In respect of seed cotton yield, among F1 hybrids maximum yield (15.51 q/ha) was recorded in 4233 Bt which was found significantly superior over rest of the hybrids except 4237 Bt (15.24 q/ha). Among F2 maximum yield (15.44 q/ha) was recorded in 4233 Bt which was found significantly superior over rest of the hybrids except 4258 Bt (15.41 q/ha), 4239 Bt (15.098 q/ha) which were at par with each other. Thus F2 Bt cotton express Bt protein in segregated pattern in which bollworm attack was more as compared to F1 which affects yield as well as quality of lint.Keywords: Bt cotton, bollworms, F1 and F2 generations, unprotected condition
Procedia PDF Downloads 299452 Mixed Natural Adsorbents and Oxides for Oil Remediation
Authors: Cesar Maximo Oliva González, Javier Acevedo Cortez, Boris Kharisov, Thelma Serrano Quezada
Abstract:
The importance of the crude oil refining process is due to the demand for petroleum products such as gasoline, kerosene, asphalt, etc., which are used in daily activities and have a high impact on the global economy. In the processes of oil obtaining and refining, it is common to find problems such as spills on seabed and high energy consumption in processing. In order to quickly and efficiently attack these problems, the use of adsorbents has taken on great importance due to its ease of implementation, as well as the possibility of their regeneration to be reused. In this work, the use of two types of adsorbents is proposed: the first is a natural adsorbent such as aloe vera or nopal, which were lyophilized and hydrophobized to achieve a selectivity in oil adsorption in oil / water mixtures. The second is a mixed iron/nickel oxide, which is specially designed to adsorb the asphaltenes in the heavy fractions of the oil; in addition, this type of adsorbents presents catalytic properties that manage to decompose the heavier fractions of the petroleum in light hydrocarbons, descending thus the energy required for the oil refining process.Keywords: nanomaterials, oil spills, remediation, natural adsorbents, mixed oxides
Procedia PDF Downloads 241451 NUX: A Lightweight Block Cipher for Security at Wireless Sensor Node Level
Authors: Gaurav Bansod, Swapnil Sutar, Abhijit Patil, Jagdish Patil
Abstract:
This paper proposes an ultra-lightweight cipher NUX. NUX is a generalized Feistel network. It supports 128/80 bit key length and block length of 64 bit. For 128 bit key length, NUX needs only 1022 GEs which is less as compared to all existing cipher design. NUX design results into less footprint area and minimal memory size. This paper presents security analysis of NUX cipher design which shows cipher’s resistance against basic attacks like Linear and Differential Cryptanalysis. Advanced attacks like Biclique attack is also mounted on NUX cipher design. Two different F function in NUX cipher design results in high diffusion mechanism which generates large number of active S-boxes in minimum number of rounds. NUX cipher has total 31 rounds. NUX design will be best-suited design for critical application like smart grid, IoT, wireless sensor network, where memory size, footprint area and the power dissipation are the major constraints.Keywords: lightweight cryptography, Feistel cipher, block cipher, IoT, encryption, embedded security, ubiquitous computing
Procedia PDF Downloads 372450 Performance Investigation of UAV Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion
Authors: Ebrahim Hassan Kapeel, Ahmed Mohsen Kamel, Hossan Hendy, Yehia Z. Elhalwagy
Abstract:
Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control lawisdesigned for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.Keywords: UAV dynamic model, attitude control, nonlinear PID, dynamic inversion
Procedia PDF Downloads 110449 The Role of Regional Economic Communities in Fighting Terrorism in Africa: The Case of Inter-Governmental Authority on Development (IGAD)
Authors: Memar Ayalew Demeke, Solomon Gebreyohans Gebru
Abstract:
In Africa, Regional Economic Communities (RECs) were initially established to tackle the economic challenges of the continent. However, overtime, they expanded their mandate to deal with the security threats of the continent such as terrorism. In fact, the fight against terrorism has been internationalized following the September 9/11 terrorist attack in the U.S.A. Since then, RECs have been giving considerable attention to preventing and combating terrorism in their respective regions. Similarly, IGAD has been involved in preventing and combating terrorism. So far, however, little has been done with regard to what IGAD has performed in fighting terrorism. Therefore, this study was intended to describe and analyze the legal and practical activities carried out by IGAD in its fight against terrorism in the region general and in Somalia in particular. Both descriptive and analytical methods were employed and data were analyzed through qualitative approach. Finally, based on the findings, the study argues that, instead of over-reliance on hard power as a means of fighting terrorism, IGAD should invest more on the political and socio-economic problems of its member states so as to address the root causes.Keywords: regional economic communities, IGAD, terrorism, treaties, conventions
Procedia PDF Downloads 429448 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program
Authors: Chrysanthi Nega, Fotini-Sonia Apergi
Abstract:
Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling
Procedia PDF Downloads 318447 Added Value of 3D Ultrasound Image Guided Hepatic Interventions by X Matrix Technology
Authors: Ahmed Abdel Sattar Khalil, Hazem Omar
Abstract:
Background: Image-guided hepatic interventions are integral to the management of infective and neoplastic liver lesions. Over the past decades, 2D ultrasound was used for guidance of hepatic interventions; with the recent advances in ultrasound technology, 3D ultrasound was used to guide hepatic interventions. The aim of this study was to illustrate the added value of 3D image guided hepatic interventions by x matrix technology. Patients and Methods: This prospective study was performed on 100 patients who were divided into two groups; group A included 50 patients who were managed by 2D ultrasonography probe guidance, and group B included 50 patients who were managed by 3D X matrix ultrasonography probe guidance. Thermal ablation was done for 70 patients, 40 RFA (20 by the 2D probe and 20 by the 3D x matrix probe), and 30 MWA (15 by the 2D probe and 15 by the 3D x matrix probe). Chemical ablation (PEI) was done on 20 patients (10 by the 2D probe and 10 by the 3D x matrix probe). Drainage of hepatic collections and biopsy from undiagnosed hepatic focal lesions was done on 10 patients (5 by the 2D probe and 5 by the 3D x matrix probe). Results: The efficacy of ultrasonography-guided hepatic interventions by 3D x matrix probe was higher than the 2D probe but not significantly higher, with a p-value of 0.705, 0.5428 for RFA, MWA respectively, 0.5312 for PEI, 0.2918 for drainage of hepatic collections and biopsy. The complications related to the use of the 3D X matrix probe were significantly lower than the 2D probe, with a p-value of 0.003. The timing of the procedure was shorter by the usage of 3D x matrix probe in comparison to the 2D probe with a p-value of 0.08,0.34 for RFA and PEI and significantly shorter for MWA, and drainage of hepatic collection, biopsy with a P-value of 0.02,0.001 respectively. Conclusions: 3D ultrasonography-guided hepatic interventions by  x matrix probe have better efficacy, less complication, and shorter time of procedure than the 2D ultrasonography-guided hepatic interventions.Keywords: 3D, X matrix, 2D, ultrasonography, MWA, RFA, PEI, drainage of hepatic collections, biopsy
Procedia PDF Downloads 95446 Risk Factors for Postoperative Fever in Patients Undergoing Lumbar Fusion
Authors: Bang Haeyong
Abstract:
Purpose: The objectives of this study were to determine the prevalence, incidence, and risk factors for postoperative fever after lumbar fusion. Methods: This study was a retrospective chart review of 291 patients who underwent lumbar fusion between March 2015 and February 2016 at the Asan Medical Center. Information was extracted from electronic medical records. Postoperative fever was measured at Tmax > 37.7 ℃ and Tmax > 38.3 ℃. The presence of postoperative fever, blood culture, urinary excretion, and/or chest x-ray were evaluated. Patients were evaluated for infection after lumbar fusion. Results: We found 222 patients (76.3%) had a postoperative temperature of 37.7 ℃, and 162 patients (55.7%) had a postoperative temperature of 38.3 ℃ or higher. The percentage of febrile patients trended down following the mean 1.8days (from the first postoperative day to seventh postoperative day). Infection rate was 9 patients (3.1%), respiratory virus (1.7%), urinary tract infection (0.3%), phlebitis (0.3%), and surgical site infection (1.4%). There was no correlation between Tmax > 37.7℃ or Tmax > 38.3℃, and timing of fever, positive blood or urine cultures, pneumonia, or surgical site infection. Risk factors for increased postoperative fever following surgery were confirmed to be delay of defecation (OR=1.37, p=.046), and shorten of remove drainage (OR=0.66, p=.037). Conclusions: The incidence of fever was 76.3% after lumbar fusion and the drainage time was faster in the case of fever. It was thought that the bleeding was absorbed at the operation site and fever occurred. The prevalence of febrile septicemia was higher in patients with long bowel movements before surgery than after surgery. Clinical symptoms should be considered because postoperative fever cannot be determined by fever alone because fever and infection are not significant.Keywords: lumbar surgery, fever, postoperative, risk factor
Procedia PDF Downloads 249445 Pros and Cons of Different Types of Irrigation Systems for Date Palm Production in Sebha, Libya
Authors: Ahmad Aridah, Maria Fay Rola-Rubzen, Zora Singh
Abstract:
This study investigated the effectiveness of various types of irrigation systems in regards to the impact that these have on the productivity of date palms in the semi-arid and arid region of Sebha, Southwest Libya. The date palm is an economically important crop in Libya and contributes to the agriculture industry, foreign exchange earnings, farmers’ income, and employment in the country. The date palm industry relies on large amounts of water for growing the crop. Farmers in Southwest Libya use a variety of irrigation systems, but the quality and quantity of water varies between systems and this affects the productivity and income of farmers. Using survey data from 210 farmers, this study estimated and assessed the pros and cons of different types of irrigation systems for date palm production under various irrigation systems currently used in Sebha, Libya. The number of years farmers have used irrigation, the area, irrigation water consumption, time of irrigation, number of farm workers (including family labour) and inputs used were measured for surface, sprinkler and drip irrigation methods. Findings from this research provide new insights into the advantages and disadvantages of the various irrigation systems, problems encountered by farmers and the factors that affect the quality and quantity of the irrigation system. The paper discussed proposed solutions to deal with the problems including timing of irrigation, canal maintenance, repair of wells and water control.Keywords: Libya, factors, irrigation method, date palm
Procedia PDF Downloads 350444 Effects of Dust Storm Events on Tuberculosis Incidence Rate in Northwest of China
Authors: Yun Wang, Ruoyu Wang, Tuo Chen, Guangxiu Liu, Guodong Chen, Wei Zhang
Abstract:
Tuberculosis (TB) is a major public health problem in China. China has the world's second largest tuberculosis epidemic (after India). Xinjiang almost has the highest annual attendance rate of TB in China, and the province is also famous because of its severe dust storms. The epidemic timing starts in February and ends in July, and the dust storm mainly distribute throughout the spring and early summer, which strongly indicate a close linkage between causative agent of TB and dust storm events. However, mechanisms responsible for the observed patterns are still not clearly indentified. By comparing the information on cases of TB from Centers for Disease Control of China annual reports with dust storm atmosphere datasets, we constructed the relationship between the large scale annual occurrence of TB in Xinjiang, a Northwest province of China, and dust storm occurrence. Regional atmospheric indexes of dust storm based on surface wind speed show a clear link between population dynamics of the disease and the climate disaster: the onset of epidemics and the dust storm defined by the atmospheric index share the same mean year. This study is the first that provides a clear demonstration of connections that exist between TB epidemics and dust storm events in China. The development of this study will undoubtedly help early warning for tuberculosis epidemic onset in China and help nationwide and international public health institutions and policy makers to better control TB disease in Norwest China.Keywords: dust storm, tuberculosis, Xinjiang province, epidemic
Procedia PDF Downloads 446443 Exploring the Association between Risks Emerging from Climate Change Scenarios and the Built Environment
Authors: Abdullah M. Alzahrani, Abdel Halim Boussabaine
Abstract:
There is an international consensus on the climate change in the entire world and this is as a result of the combination of the natural factors, such as volcanoes and hurricanes with increased of human activity on the earth, such as industrial renaissance. Where this solidarity increases emissions of greenhouse gases GHGs that considered as the main driver of climate change scenarios and related emerging risks and impacts on buildings. These climatic risks including damages, disruption and disquiet are set to increase and it is considered as the main challenges and difficulties facing built environment due to major implications on assets sector. Consequently, the threat from climate change patterns has a significant impact on a variety of complex human decisions, which affect all aspects of living. Understanding the relationship between buildings and such risks arising from climate change scenarios on buildings are the key in insuring the optimal timing and design of policies and systems, which affect all aspects of the built environment. This paper will uncovering this correlation between emerging climate change risks and the building assets. In addition, how these emerging risks can be classified in practical way in terms of their impact type on buildings. Hence, this mapping will assist professionals and interested parties in the building sector to cope with such risks in several systematic ways including development and designing of mitigation and adaptation strategies and processes of design, specification, construction, and operation; all these leads to successful management of assets.Keywords: climate change, climate change risks, built environment, building sector, impacts
Procedia PDF Downloads 354442 Fundamental Research Dissension between Hot and Cold Chamber High Pressure Die Casting
Authors: Sahil Kumar, Surinder Pal, Rahul Kapoor
Abstract:
This paper is focused on to define the basic difference between hot and cold chamber high pressure die casting process which is not fully defined in a research before paper which we have studied. The pressure die casting is basically defined into two types (1) Hot chamber Die Casting (2) Cold chamber Die Casting. Cold chamber die casting is used for casting alloys that require high pressure and have a high melting temperature, such as brass, aluminum, magnesium, copper based alloys and other high melting point nonferrous alloys. Hot chamber die casting is suitable for casting zinc, tin, lead, and low melting point alloys. In hot chamber die casting machine, the molten metal is an integral pan of the machine. It mainly consists of hot chamber and gooseneck type metal container made of cast iron. This machine is mainly used for low melting alloys and alloys of metals like zinc, lead etc. Metals and alloys having a high melting point and those which are having an affinity for iron cannot be cast by this machine, which could otherwise attack the shot sleeve and damage the machine.Keywords: hot chamber die casting, cold chamber die casting, metals and alloys, casting technology
Procedia PDF Downloads 618441 Performance Investigation of Unmanned Aerial Vehicles Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion
Authors: Ebrahim H. Kapeel, Ahmed M. Kamel, Hossam Hendy, Yehia Z. Elhalwagy
Abstract:
Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control law is designed for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.Keywords: attitude control, nonlinear PID, dynamic inversion
Procedia PDF Downloads 110440 Colonization of Embrionic Gonads of Nile Tilapia by Giant Gourami Testicular Germ Cells
Authors: Irma Andriani, Ita Djuwita, Komar Sumantadinata, Alimuddin
Abstract:
The recent study has been conducted to develop testicular germ cell transplantation as a tool for preservation and propagation of male germ-plasm from endangered fish species, as well as to produce surrogate broodstock of commercially valuable fish. Giant gourami testis had been used as a model for donor and Nile tilapia larvae as recipient. We developed testicular cell xenotransplantation by optimizing the timing of intraperitoneal cell transplantation to recipient larvae aged 1, 3, 5 and 7 days post hatching (dph). Freshly isolated testis of giant gourami weighing 600–800 g were minced in dissociation medium and then incubated for 3 hours in room temperature to collect monodisperce cell suspension. Donor cells labeled with PKH 26 were transplanted into the peritoneal cavity of Nile tilapia larvae using glass micropipettes. Parameters observed were survival rate of Nile tilapia larvae at 24 hours post transplantation (pt) and colonization efficiency of donor cells at 2 and 3 months pt. The incorporated donor cells were observed under fluorescent microscope. The result showed that the lowest survival rate at 24 hours pt was 1 dph larvae (82.74±6.76%) and the highest survival rate were 3 and 5 dph larvae (95.00±5.00% and 95.00±2.50%, respectively). The highest colonization efficiency was on 3 dph larvae (61.1±34.71%) and the lowest colonization efficiency was on 7 dph larvae (19.43±17.33%). In conclusion, 3 dph Nile tilapia larvae was the best recipient for giant gourami testicular germ cells xenotransplantation.Keywords: xenotransplantation, testicular germ cell, giant gourami, Nile tilapia, colonization efficiency
Procedia PDF Downloads 582439 The Interactions of Attentional Bias for Food, Trait Self-Control, and Motivation: A Model Testing Study
Authors: Hamish Love, Navjot Bhullar, Nicola Schutte
Abstract:
Self-control and related psychological constructs have been shown to have a large role in the improvement and maintenance of healthful dietary behaviour. However, self-control for diet, and related constructs such as motivation, level of conflict between tempting desires and dietary goals, and attentional bias for tempting food, have not been studied together to establish their relationships, to the author’s best knowledge. Therefore the aim of this paper was to conduct model testing on these constructs and evaluate how they relate to affect dietary outcomes. 400 Australian adult participants will be recruited via the Qualtrics platform and will be representative across age and gender. They will complete survey and reaction timing surveys to gather data on the five target constructs: Trait Self-control, Attentional Bias for Food, Dietary Goal-Desire Incongruence, Motivation for Dietary Self-control, and Satisfaction with Dietary Behaviour. A model of moderated mediation is predicted, whereby the initial predictor (Dietary Goal-Desire Incongruence) predicts the level of the outcome variable, Satisfaction with Dietary Behaviour. We hypothesise that the relationship between these two variables will be mediated by Trait Self-Control and that the extent that Trait Self-control is allowed to mediate dietary outcome is moderated by both Attentional Bias for Food and Motivation for Dietary Self-control. The analysis will be conducted using the PROCESS module in SPSS 23. The results of model testing in this current study will be valuable to direct future research and inform which constructs could be important targets for intervention to improve dietary outcomes.Keywords: self-control, diet, model testing, attentional bias, motivation
Procedia PDF Downloads 170438 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 47437 Hydrodynamic Modeling of the Hydraulic Threshold El Haouareb
Authors: Sebai Amal, Massuel Sylvain
Abstract:
Groundwater is the key element of the development of most of the semi-arid areas where water resources are increasingly scarce due to an irregularity of precipitation, on the one hand, and an increasing demand on the other hand. This is the case of the watershed of the Central Tunisia Merguellil, object of the present study, which focuses on an implementation of an underground flows hydrodynamic model to understand the recharge processes of the Kairouan’s plain groundwater by aquifers boundary through the hydraulic threshold of El Haouareb. The construction of a conceptual geological 3D model by the Hydro GeoBuilder software has led to a definition of the aquifers geometry in the studied area thanks to the data acquired by the analysis of geologic sections of drilling and piezometers crossed shells partially or in full. Overall analyses of the piezometric Chronicles of different piezometers located at the level of the dam indicate that the influence of the dam is felt especially in the aquifer carbonate which confirms that the dynamics of this aquifer are highly correlated to the dam’s dynamic. Groundwater maps, high and low-water dam, show a flow that moves towards the threshold of El Haouareb to the discharge of the waters of Ain El Beidha discharge towards the plain of Kairouan. Software FEFLOW 5.2 steady hydrodynamic modeling to simulate the hydraulic threshold at the level of the dam El Haouareb in a satisfactory manner. However, the sensitivity study to the different parameters shows equivalence problems and a fix to calibrate the limestones’ permeability. This work could be improved by refining the timing steady and amending the representation of limestones in the model.Keywords: Hydrodynamic modeling, lithological modeling, hydraulic, semi-arid, merguellil, central Tunisia
Procedia PDF Downloads 764436 Failure Analysis of a Hydrocarbon Carrying/Piping System
Authors: Esteban Morales Murillo, Ephraim Mokgothu
Abstract:
This paper presents the findings of a study conducted to investigate the wall thinning in a piping system carrying a mix of hydrocarbons in a petrochemical plant. A detailed investigation including optical inspection and several characterisation techniques such as optical microscopy, SEM/EDX, and XRF/C-S analyses was conducted. The examinations revealed that the wall thinning in the piping system was a result of high-temperature H2/H2S corrosion caused by a susceptible material for this mechanism and operating parameters and effluent concentrations beyond the prescribed limits. The sulfide layers found to testify to the large amounts of H2S that led to material degradation. Deposit analysis revealed that it consisted primarily of carbon, oxygen, iron, chromium and sulfur. Metallographic examinations revealed that the attack initiated from the internal surface and that spheroidization of carbides did occur. The article discusses in detail the contribution failure factors on the Couper-Gorman H2/H2S curves to draw conclusions. Recommendations based on the above findings are also discussed.Keywords: corrosion, Couper-Gorman, high-temperature corrosion, sulfidation, wall thinning, piping system
Procedia PDF Downloads 385435 A Blockchain-Based Protection Strategy against Social Network Phishing
Authors: Francesco Buccafurri, Celeste Romolo
Abstract:
Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.Keywords: phishing, social networks, information sharing, blockchain
Procedia PDF Downloads 328434 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
Abstract:
Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.Keywords: decision tree, feature selection, intrusion detection system, support vector machine
Procedia PDF Downloads 265