Search results for: Advanced Encryption Standard (AES)
6809 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data
Authors: Devika Tanna
Abstract:
'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.Keywords: adaptive algorithm, database, host images, privacy, visual cryptography
Procedia PDF Downloads 1316808 Implant Operation Guiding Device for Dental Surgeons
Authors: Daniel Hyun
Abstract:
Dental implants are one of the top 3 reasons to sue a dentist for malpractice. It involves dental implant complications, usually because of the angle of the implant from the surgery. At present, surgeons usually use a 3D-printed navigator that is customized for the patient’s teeth. However, those can’t be reused for other patients as they require time. Therefore, I made a guiding device to assist the surgeon in implant operations. The surgeon can input the objective of the operation, and the device constantly checks if the surgery is heading towards the objective within the set range, telling the surgeon by manipulating the LED. We tested the prototypes’ consistency and accuracy by checking the graph, average standard deviation, and the average change of the calculated angles. The accuracy of performance was also acquired by running the device and checking the outputs. My first prototype used accelerometer and gyroscope sensors from the Arduino MPU6050 sensor, getting a changeable graph, achieving 0.0295 of standard deviations, 0.25 of average change, and 66.6% accuracy of performance. The second prototype used only the gyroscope, and it got a constant graph, achieved 0.0062 of standard deviation, 0.075 of average change, and 100% accuracy of performance, indicating that the accelerometer sensor aggravated the functionality of the device. Using the gyroscope sensor allowed it to measure the orientations of separate axes without affecting each other and also increased the stability and accuracy of the measurements.Keywords: implant, guide, accelerometer, gyroscope, handpiece
Procedia PDF Downloads 446807 Suicide Wrongful Death: Standard of Care Problems Involving the Inaccurate Discernment of Lethal Risk When Focusing on the Elicitation of Suicide Ideation
Authors: Bill D. Geis
Abstract:
Suicide wrongful death forensic cases are the fastest rising tort in mental health law. It is estimated that suicide-related cases have accounted for 15% of U.S. malpractice claims since 2006. Most suicide-related personal injury claims fall into the legal category of “wrongful death.” Though mental health experts may be called on to address a range of forensic questions in wrongful death cases, the central consultation that most experts provide is about the negligence element—specifically, the issue of whether the clinician met the clinical standard of care in assessing, treating, and managing the deceased person’s mental health care. Standards of care, varying from U.S. state to state, are broad and address what a reasonable clinician might do in a similar circumstance. This fact leaves the issue of the suicide standard of care, in each case, up to forensic experts to put forth a reasoned estimate of what the standard of care should have been in the specific case under litigation. Because the general state guidelines for standard of care are broad, forensic experts are readily retained to provide scientific and clinical opinions about whether or not a clinician met the standard of care in their suicide assessment, treatment, and management of the case. In the past and in much of current practice, the assessment of suicide has centered on the elicitation of verbalized suicide ideation. Research in recent years, however, has indicated that the majority of persons who end their lives do not say they are suicidal at their last medical or psychiatric contact. Near-term risk assessment—that goes beyond verbalized suicide ideation—is needed. Our previous research employed structural equation modeling to predict lethal suicide risk--eight negative thought patterns (feeling like a burden on others, hopelessness, self-hatred, etc.) mediated by nine transdiagnostic clinical factors (mental torment, insomnia, substance abuse, PTSD intrusions, etc.) were combined to predict acute lethal suicide risk. This structural equation model, the Lethal Suicide Risk Pattern (LSRP), Acute model, had excellent goodness-of-fit [χ2(df) = 94.25(47)***, CFI = .98, RMSEA = .05, .90CI = .03-.06, p(RMSEA = .05) = .63. AIC = 340.25, ***p < .001.]. A further SEQ analysis was completed for this paper, adding a measure of Acute Suicide Ideation to the previous SEQ. Acceptable prediction model fit was no longer achieved [χ2(df) = 3.571, CFI > .953, RMSEA = .075, .90% CI = .065-.085, AIC = 529.550].This finding suggests that, in this additional study, immediate verbalized suicide ideation information was unhelpful in the assessment of lethal risk. The LSRP and other dynamic, near-term risk models (such as the Acute Suicide Affective Disorder Model and the Suicide Crisis Syndrome Model)—going beyond elicited suicide ideation—need to be incorporated into current clinical suicide assessment training. Without this training, the standard of care for suicide assessment is out of sync with current research—an emerging dilemma for the forensic evaluation of suicide wrongful death cases.Keywords: forensic evaluation, standard of care, suicide, suicide assessment, wrongful death
Procedia PDF Downloads 696806 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 2226805 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability
Authors: Mouad Zouina, Benaceur Outtaj
Abstract:
The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability
Procedia PDF Downloads 3946804 The Status of BIM Adoption in Six Continents
Authors: Wooyoung Jung, Ghang Lee
Abstract:
This paper paper reports the worldwide status of building information modeling (BIM) adoption from the perspectives of the engagement level, the Hype Cycle model, the technology diffusion model, and BIM-uses. An online survey was distributed, and 156 experts from six continents responded. Overall, North America was the most advanced continent, followed by Oceania and Europe. Countries in Asia perceived their phase mainly as slope of enlightenment (mature) in the Hype Cycle model. In the technology diffusion model, the main BIM-users worldwide were “early majority” (third phase), but those in the Middle East/Africa and South America were “early adopters” (second phase). In addition, the more advanced the country, the more number of BIM services employed in general. In summary, North America, Europe, Oceania, and Asia were advancing rapidly toward the mature stage of BIM, whereas the Middle East/Africa and South America were still in the early phase. The simple indexes used in this study may be used to track the worldwide status of BIM adoption in long-term surveys.Keywords: BIM adoption, BIM services, hype cycle model, technology diffusion model
Procedia PDF Downloads 5596803 Improvements in Transient Testing in The Transient REActor Test (TREAT) with a Choice of Filter
Authors: Harish Aryal
Abstract:
The safe and reliable operation of nuclear reactors has always been one of the topmost priorities in the nuclear industry. Transient testing allows us to understand the time-dependent behavior of the neutron population in response to either a planned change in the reactor conditions or unplanned circumstances. These unforeseen conditions might occur due to sudden reactivity insertions, feedback, power excursions, instabilities, and accidents. To study such behavior, we need transient testing, which is like car crash testing, to estimate the durability and strength of a car design. In nuclear designs, such transient testing can simulate a wide range of accidents due to sudden reactivity insertions and helps to study the feasibility and integrity of the fuel to be used in certain reactor types. This testing involves a high neutron flux environment and real-time imaging technology with advanced instrumentation with appropriate accuracy and resolution to study the fuel slumping behavior. With the aid of transient testing and adequate imaging tools, it is possible to test the safety basis for reactor and fuel designs that serves as a gateway in licensing advanced reactors in the future. To that end, it is crucial to fully understand advanced imaging techniques both analytically and via simulations. This paper presents an innovative method of supporting real-time imaging of fuel pins and other structures during transient testing. The major fuel-motion detection device that is studied in this dissertation is the Hodoscope which requires collimators. This paper provides 1) an MCNP model and simulation of a Transient Reactor Test (TREAT) core with a central fuel element replaced by a slotted fuel element that provides an open path between test samples and a hodoscope detector and 2) a choice of good filter to improve image resolution.Keywords: hodoscope, transient testing, collimators, MCNP, TREAT, hodogram, filters
Procedia PDF Downloads 776802 Evaluation of Antioxidant and Anticancer Activity of Tinospora cordifolia against Ehrlich Ascites Carcinoma: In Vitro, in vivo and in silico Approach
Authors: Anik Barua, Rabiul Hossain, Labonno Barua, Rashadul Hossain, Nurul Absar
Abstract:
Background: Globally, the burden of cancer is increasing consistently. Modern cancer therapies include lots of toxicity in the non-targeted organs reducing the life expectancy of the patients. Hence, scientists are trying to seek noble compounds from natural sources to treat cancer. Objectives: The objectives of the present study are to evaluate the phytochemicals, in vitro antioxidants, and in vivo and in silico anticancer study of various solvent fractions of Tinospora cordifolia (Willd.). Methodology: In this experiment, standard quantitative and qualitative assay methods were used to analyze the phytochemicals. The antioxidant activity was measured using the DPPH and ABTS scavenging methods. The in vivo antitumor activity is evaluated against Ehrlich ascites carcinoma (EAC) cell bearing in Swiss albino mice. In-silico ADME/T and molecular docking study were performed to assess the potential of stated phytochemicals against Transcription Factor STAT3b/DNA Complex of adenocarcinoma. Findings: Phytochemical screening confirmed the presence of flavonoids, alkaloids, glycosides, tannins, and carbohydrates. A significant amount of phenolic (20.19±0.3 mg/g GAE) and flavonoids (9.46±0.18 mg/g GAE) were found in methanolic extract in quantitative screening. Tinospora cordifolia methanolic extract showed promising DPPH and ABTS scavenging activity with the IC50 value of 1222.99 µg/mL and 1534.34 µg/mL, respectively, which was concentration dependent. In vivo anticancer activity in EAC cell-bearing mice showed significant (P < 0.05) percent inhibition of cell growth (60.12±1.22) was found at the highest dose compared with standard drug 5-Fluorouracil (81.18±1.28). Forty-two phytochemicals exhibit notable pharmacokinetics properties and passed drug-likeness screening tests in silico. In molecular docking study, (25S)-3Beta-acetoxy-5-alpha-22-beta-spirost-9(11)-en-12-beta-ol showed docking score (-8.5 kJ/mol) with significant non-bonding interactions with target enzyme. Conclusions: The results were found to be significant and confirmed that the methanolic extract of Tinospora cordifolia has remarkable antitumor activity with antioxidant potential. The Tinospora cordifolia methanolic extract may be considered a potent anticancer agent for advanced research.Keywords: anticancer, antioxidant, Tinospora cordifolia, EAC cell
Procedia PDF Downloads 1336801 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor
Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long
Abstract:
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.Keywords: decryption, encryption, elliptic curve, greater common divisor
Procedia PDF Downloads 2566800 Human Factors Integration of Chemical, Biological, Radiological and Nuclear Response: Systems and Technologies
Authors: Graham Hancox, Saydia Razak, Sue Hignett, Jo Barnes, Jyri Silmari, Florian Kading
Abstract:
In the event of a Chemical, Biological, Radiological and Nuclear (CBRN) incident rapidly gaining, situational awareness is of paramount importance and advanced technologies have an important role to play in improving detection, identification, monitoring (DIM) and patient tracking. Understanding how these advanced technologies can fit into current response systems is essential to ensure they are optimally designed, usable and meet end-users’ needs. For this reason, Human Factors (Ergonomics) methods have been used within an EU Horizon 2020 project (TOXI-Triage) to firstly describe (map) the hierarchical structure in a CBRN response with adapted Accident Map (AcciMap) methodology. Secondly, Hierarchical Task Analysis (HTA) has been used to describe and review the sequence of steps (sub-tasks) in a CBRN scenario response as a task system. HTA methodology was then used to map one advanced technology, ‘Tag and Trace’, which tags an element (people, sample and equipment) with a Near Field Communication (NFC) chip in the Hot Zone to allow tracing of (monitoring), for example casualty progress through the response. This HTA mapping of the Tag and Trace system showed how the provider envisaged the technology being used, allowing for review and fit with the current CBRN response systems. These methodologies have been found to be very effective in promoting and supporting a dialogue between end-users and technology providers. The Human Factors methods have given clear diagrammatic (visual) representations of how providers see their technology being used and how end users would actually use it in the field; allowing for a more user centered approach to the design process. For CBRN events usability is critical as sub-optimum design of technology could add to a responders’ workload in what is already a chaotic, ambiguous and safety critical environment.Keywords: AcciMap, CBRN, ergonomics, hierarchical task analysis, human factors
Procedia PDF Downloads 2226799 A Risk-Based Modeling Approach for Successful Adoption of CAATTs in Audits: An Exploratory Study Applied to Israeli Accountancy Firms
Authors: Alon Cohen, Jeffrey Kantor, Shalom Levy
Abstract:
Technology adoption models are extensively used in the literature to explore drivers and inhibitors affecting the adoption of Computer Assisted Audit Techniques and Tools (CAATTs). Further studies from recent years suggested additional factors that may affect technology adoption by CPA firms. However, the adoption of CAATTs by financial auditors differs from the adoption of technologies in other industries. This is a result of the unique characteristics of the auditing process, which are expressed in the audit risk elements and the risk-based auditing approach, as encoded in the auditing standards. Since these audit risk factors are not part of the existing models that are used to explain technology adoption, these models do not fully correspond to the specific needs and requirements of the auditing domain. The overarching objective of this qualitative research is to fill the gap in the literature, which exists as a result of using generic technology adoption models. Followed by a pretest and based on semi-structured in-depth interviews with 16 Israeli CPA firms of different sizes, this study aims to reveal determinants related to audit risk factors that influence the adoption of CAATTs in audits and proposes a new modeling approach for the successful adoption of CAATTs. The findings emphasize several important aspects: (1) while large CPA firms developed their own inner guidelines to assess the audit risk components, other CPA firms do not follow a formal and validated methodology to evaluate these risks; (2) large firms incorporate a variety of CAATTs, including self-developed advanced tools. On the other hand, small and mid-sized CPA firms incorporate standard CAATTs and still need to catch up to better understand what CAATTs can offer and how they can contribute to the quality of the audit; (3) the top management of mid-sized and small CPA firms should be more proactive and updated about CAATTs capabilities and contributions to audits; and (4) All CPA firms consider professionalism as a major challenge that must be constantly managed to ensure an optimal CAATTs operation. The study extends the existing knowledge of CAATTs adoption by looking at it from a risk-based auditing approach. It suggests a new model for CAATTs adoption by incorporating influencing audit risk factors that auditors should examine when considering CAATTs adoption. Since the model can be used in various audited scenarios and supports strategic, risk-based decisions, it maximizes the great potential of CAATTs on the quality of the audits. The results and insights can be useful to CPA firms, internal auditors, CAATTs developers and regulators. Moreover, it may motivate audit standard-setters to issue updated guidelines regarding CAATTs adoption in audits.Keywords: audit risk, CAATTs, financial auditing, information technology, technology adoption models
Procedia PDF Downloads 696798 Hot Cracking Susceptibility Evaluation of the Advanced UNS S31035 Austenitic Stainless Steel by Varestraint Weldability Testing
Authors: Mikael M. Johansson, Peter Stenvall, Leif Karlsson, Joel Andersson
Abstract:
Sandvik Sanicro 25, UNS S31035, is an advanced high temperature austenitic stainless steel that potentially can be used in super-heaters and reheaters in the next generation of advanced ultra-super critical power plants. The material possesses both high creep strength and good corrosion resistance at temperatures up to 700°C. Its high temperature properties are positioned between other commercially available high temperature austenitic stainless steels and nickel-based alloys. It is, however, well known that an austenitic solidification mode combined with a fully austenitic microstructure exacerbate susceptibility towards hot cracking. The problem increases even more for thick walled material in multipass welding and could compromise the integrity of the welded component. Varestraint weldability testing is commonly used to evaluate susceptibility towards hot cracking of materials. In this paper, Varestraint test results are evaluated for base material of both UNS S31035 steel and are compared to those of the well-known and well-characterized UNS S31008 grade. The more creep resistant alloy, UNS S31035, is metallurgically more complicated than the UNS S31008 grade and has additions of several alloying elements to improve its high temperature properties. It benefits from both solid solution hardening as well as precipitation hardening. This investigation therefore attempts, based on the Varestraint weldability test, to understand if there are any differences in cracking mechanisms between these two grades due to the additional alloying elements used in UNS S31035. Results from Varestraint testing and crack type investigations will be presented and discussed in some detail. It is shown that hot cracking susceptibility of the UNS S31035 steel is only slightly higher than that of UNS S31008 despite the more complicated metallurgy. Weldability of the two alloys is therefore judged to be comparable making the newer alloy well suited also for critical applications.Keywords: austenitic stainless steel, hot cracking susceptibility, UNS S31035, UNS S31008, varestraint weldability testing
Procedia PDF Downloads 1316797 Product Development Process to Obtain Community Standard Product Certificate: A Case of Bangkhonthi, Samut Songkhram, Thailand
Authors: Supattra Pranee
Abstract:
The objectives of this research were to study the product development process to obtain a community standard product certificate and to set a guideline for the product development process to obtain the community product certificate. Focus group discussion was conducted with many experts in the field, local government officials, and representatives from local producers in Bangkontee district. The findings revealed that there were eight important processes to obtain the community product certificate: 1) prepare document, 2) submit the document, 3) set up an appointment for onsite inspection, 4) onsite inspection and sample collections, 5) evaluate samples, 6) obtain test result, and 7) obtain certificate.Keywords: perceived values, tourist destination, visiting, product development
Procedia PDF Downloads 4456796 Physicochemical and Bacteriological Assessment of Water Resources in Ughelli and Its Environs, Delta State Nigeria
Authors: M. O. Eyankware, D. O. Ufomata
Abstract:
Groundwater samples were collected from Otovwodo-Ughelli and Environ with the aim of assessing groundwater quality of the area. Twenty (20) water samples from Boreholes (BH) (six) and Hand Dug Wells (HDW) (fourteen) were randomly sampled and were analysed for different physiochemical and bacteriological parameters. The following 16 parameters have been considered viz: pH, electrical conductivity, temperature, total hardness, total dissolved solids, dissolved oxygen, biological oxygen demand, phosphate, sulphate, chloride, nitrate, calcium, sodium, chloride, magnesium, and total suspended solids. On comparing the results against drinking quality standards laid by World Health Organization and Nigeria industrial standard, it was found that the water quality parameters were not above the (WHO, 2011 and NIS, 2007) permissible limit. Microbial analysis reveals the presence of coliform and E.coli in two hand-dug well (HDW7 and 13) and one borehole well (BH20). These contaminations are perhaps traceable to have originated from human activities (septic tanks, latrines, dumpsites) and have affected the quality of groundwater in Otovwodo-Ughelli. From the piper trilinear diagram, the dominant ionic species is alkali bicarbonate water type, with bicarbonate as the predominant ion (Na+ + K+)-HCO3.Keywords: groundwater, surface water, Ughelli, Nigeria industrial standard, who standard
Procedia PDF Downloads 4476795 A Situational Awareness Map for Allocating Relief Resources after Earthquake Occurrence
Authors: Hamid Reza Ranjbar, Ali Reza Azmoude Ardalan, Hamid Dehghani, Mohammad Reza Sarajian
Abstract:
Natural disasters are unexpected events which predicting them is difficult. Earthquake is one of the most devastating disasters among natural hazards with high rate of mortality and wide extent of damages. After the earthquake occurrence, managing the critical condition and allocating limited relief sources requiring a complete awareness of damaged area. The information for allocating relief teams should be precise and reliable as much as possible, and be presented in the appropriate time after the earthquake occurrence. This type of information was previously presented in the form of a damage map; conducting relief teams by using damage map mostly lead to waste of time for finding alive occupants under the rubble. In this research, a proposed standard for prioritizing damaged buildings in terms of requiring rescue and relief was presented. This standard prioritizes damaged buildings into four levels of priority including very high, high, moderate and low by considering key parameters such as type of land use, activity time, and inactivity time of each land use, time of earthquake occurrence and distinct index. The priority map by using the proposed standard could be a basis for guiding relief teams towards the areas with high relief priority.Keywords: Damage map, GIS, priority map, USAR
Procedia PDF Downloads 4066794 Effect of Oral Administration of "Gadagi" Tea on Activities of Some Antioxidant Enzymes in Rats
Authors: A. M. Gadanya, M. S. Sule
Abstract:
Effect of oral administration of Gadagi tea on some antioxidant enzymes was assessed in healthy male albino rats. The rats were grouped and administered with standard doses of the 3 types of Gadagi tea i.e. Sak, Sada and Magani for a period of four weeks. Animals that were not administered with the tea constituted the control group. At the end of fourth week, the animals were sacrificed and their serum superoxide dismutase (SOD), glutathione reductase (GR) and catalase (CAT) activities were determined. The activities of the enzymes were also determined in the brain, liver, kidney and intestine homogenates of the rats. Mean SOD activity in brain of rats orally administered with “sada” was found to be significantly higher (P < 0.05) than that of the control group. Mean CAT activity in the intestine of rats orally administered with “magani” was found to be significantly higher (P < 0.05) than that of the control group and the experimental groups of Sak and Sada at standard dose level. Thus, all the “Gadagi” tea preparations studied at standard dose level could stimulate antioxidant enzymes, especially SOD in brain and CAT in intestine (by Sada) and CAT in intestine (by Magani).Keywords: “Gadagi” tea, superoxide dismutase, catalase, glutathione reductase
Procedia PDF Downloads 4646793 Evaluation of the Golden Proportion and Golden Standard of Maxillary Anterior Teeth in Relation to Smile Attractiveness
Authors: Marwan Ahmed Swileh, Amal Hussein Abuaffan
Abstract:
Objective: This study aimed to explore the existence of golden proportion (GP) between the widths of maxillary anterior teeth and golden standard (GS) for width to height ratio of maxillary central incisor in individuals with attractive and non-attractive smiles. Materials and methods: A total of 82 females were recruited and divided into 2 groups: attractive smile (n= 41) and non-attractive smile (n= 41). Frontal photographs were taken, scanned, and saved on a personal computer. The apparent mesiodistal width of each anterior tooth was measured. The data were analyzed using the appropriate statistical tests at p-value < 0.05. Results: Frequency of GP was very low among the total sample, and most proportions were higher than GP. No significant differences were found between both groups in relation to central-to-lateral ratio while significant differences were found in relation to canine-to-lateral ratio. Similarly, most proportions of width to height ratio were higher than GS. Difference between groups was significant for left side and for both sides (p < 0.05) but was not for right side (p > 0.05). Conclusion: Frequency of golden proportion was very low among the study population. Smile attractiveness is not related that much to the proportions between the teeth.Keywords: golden proportion, golden standard, attractive smile, esthetic, anterior teeth
Procedia PDF Downloads 1456792 Methods for Business Process Simulation Based on Petri Nets
Authors: K. Shoylekova, K. Grigorova
Abstract:
The Petri nets are the first standard for business process modeling. Most probably, it is one of the core reasons why all new standards created afterwards have to be so reformed as to reach the stage of mapping the new standard onto Petri nets. The paper presents a Business process repository based on a universal database. The repository provides the possibility the data about a given process to be stored in three different ways. Business process repository is developed with regard to the reformation of a given model to a Petri net in order to be easily simulated two different techniques for business process simulation based on Petri nets - Yasper and Woflan are discussed. Their advantages and drawbacks are outlined. The way of simulating business process models, stored in the Business process repository is shown.Keywords: business process repository, petri nets, simulation, Woflan, Yasper
Procedia PDF Downloads 3716791 Investigation of Existing Guidelines for Four-Legged Angular Telecommunication Tower
Authors: Sankara Ganesh Dhoopam, Phaneendra Aduri
Abstract:
Lattice towers are light weight structures which are primarily governed by the effects of wind loading. Ensuring a precise assessment of wind loads on the tower structure, antennas, and associated equipment is vital for the safety and efficiency of tower design. Earlier, the Indian standards are not available for design of telecom towers. Instead, the industry conventionally relied on the general building wind loading standard for calculating loads on tower components and the transmission line tower design standard for designing the angular members of the towers. Subsequently, the Bureau of Indian Standards (BIS) revised these standards and angular member design standard. While the transmission line towers are designed using the above standard, a full-scale model test will be done to prove the design. Telecom angular towers are also designed using the same with overload factor/factor of safety without full scale tower model testing. General construction in steel design code is available with limit state design approach and is applicable to the design of general structures involving angles and tubes but not used for angle member design of towers. Recently, in response to the evolving industry needs, the Bureau of Indian Standards (BIS) introduced a new standard titled “Isolated Towers, Masts, and Poles using structural steel -Code of practice” for the design of telecom towers. This study focuses on a 40m four legged angular tower to compare loading calculations and member designs between old and new standards. Additionally, a comparative analysis aligning with the new code provisions with international loading and design standards with a specific focus on American standards has been carried out. This paper elaborates code-based provisions used for load and member design calculations, including the influence of "ka" area averaging factor introduced in new wind load case.Keywords: telecom, angular tower, PLS tower, GSM antenna, microwave antenna, IS 875(Part-3):2015, IS 802(Part-1/sec-2):2016, IS 800:2007, IS 17740:2022, ANSI/TIA-222G, ANSI/TIA-222H.
Procedia PDF Downloads 856790 Fine-Tuned Transformers for Translating Multi-Dialect Texts to Modern Standard Arabic
Authors: Tahar Alimi, Rahma Boujebane, Wiem Derouich, Lamia Hadrich Belguith
Abstract:
Machine translation task of low-resourced languages such as Arabic is a challenging task. Despite the appearance of sophisticated models based on the latest deep learning techniques, namely the transfer learning and transformers, all models prove incapable of carrying out an acceptable translation, which includes Arabic Dialects (AD), because they do not have official status. In this paper, we present a machine translation model designed to translate Arabic multidialectal content into Modern Standard Arabic (MSA), leveraging both new and existing parallel resources. The latter achieved the best results for both Levantine and Maghrebi dialects with a BLEU score of 64.99.Keywords: Arabic translation, dialect translation, fine-tune, MSA translation, transformer, translation
Procedia PDF Downloads 646789 Student Records Management System Using Smart Cards and Biometric Technology for Educational Institutions
Authors: Patrick O. Bobbie, Prince S. Attrams
Abstract:
In recent times, the rapid change in new technologies has spurred up the way and manner records are handled in educational institutions. Also, there is a need for reliable access and ease-of use to these records, resulting in increased productivity in organizations. In academic institutions, such benefits help in quality assessments, institutional performance, and assessments of teaching and evaluation methods. Students in educational institutions benefit the most when advanced technologies are deployed in accessing records. This research paper discusses the use of biometric technologies coupled with smartcard technologies to provide a unique way of identifying students and matching their data to financial records to grant them access to restricted areas such as examination halls. The system developed in this paper, has an identity verification component as part of its main functionalities. A systematic software development cycle of analysis, design, coding, testing and support was used. The system provides a secured way of verifying student’s identity and real time verification of financial records. An advanced prototype version of the system has been developed for testing purposes.Keywords: biometrics, smartcards, identity-verification, fingerprints
Procedia PDF Downloads 4196788 Numerical Studies for Standard Bi-Conjugate Gradient Stabilized Method and the Parallel Variants for Solving Linear Equations
Authors: Kuniyoshi Abe
Abstract:
Bi-conjugate gradient (Bi-CG) is a well-known method for solving linear equations Ax = b, for x, where A is a given n-by-n matrix, and b is a given n-vector. Typically, the dimension of the linear equation is high and the matrix is sparse. A number of hybrid Bi-CG methods such as conjugate gradient squared (CGS), Bi-CG stabilized (Bi-CGSTAB), BiCGStab2, and BiCGstab(l) have been developed to improve the convergence of Bi-CG. Bi-CGSTAB has been most often used for efficiently solving the linear equation, but we have seen the convergence behavior with a long stagnation phase. In such cases, it is important to have Bi-CG coefficients that are as accurate as possible, and the stabilization strategy, which stabilizes the computation of the Bi-CG coefficients, has been proposed. It may avoid stagnation and lead to faster computation. Motivated by a large number of processors in present petascale high-performance computing hardware, the scalability of Krylov subspace methods on parallel computers has recently become increasingly prominent. The main bottleneck for efficient parallelization is the inner products which require a global reduction. The resulting global synchronization phases cause communication overhead on parallel computers. The parallel variants of Krylov subspace methods reducing the number of global communication phases and hiding the communication latency have been proposed. However, the numerical stability, specifically, the convergence speed of the parallel variants of Bi-CGSTAB may become worse than that of the standard Bi-CGSTAB. In this paper, therefore, we compare the convergence speed between the standard Bi-CGSTAB and the parallel variants by numerical experiments and show that the convergence speed of the standard Bi-CGSTAB is faster than the parallel variants. Moreover, we propose the stabilization strategy for the parallel variants.Keywords: bi-conjugate gradient stabilized method, convergence speed, Krylov subspace methods, linear equations, parallel variant
Procedia PDF Downloads 1656787 Development of a Data Security Model Using Steganography
Authors: Terungwa Simon Yange, Agana Moses A.
Abstract:
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.Keywords: steganography, cryptography, encryption, decryption, secrecy
Procedia PDF Downloads 2676786 Influences of High Rise Buildings on Local Air Flow Characteristics on External Surfaces of Neighboring Buildings
Authors: Meral Yucel, Vildan Ok
Abstract:
This study indicates the wind effects of 49-storey height four towers on a high-density urban area-consisting of 10-12 storey height buildings called Goztepe in Istanbul, Turkey. For this purpose, four towers and close environments are modeled in 1/500 scale for wind tunnel test. Three neighboring buildings are chosen to find out the pressure coefficient changes on the surfaces of the buildings according to the construction order of these four towers and wind directions. Results were compared with the 'TS 498 Wind Standard of Tall Buildings in Istanbul' which is prepared by Istanbul Metropolitan Municipality in 2009.Keywords: high rise buildings, pressure coefficients, wind tunnel experiments, wind standard of tall buildings
Procedia PDF Downloads 2816785 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education
Authors: Mohammed A. M. Ibrahim
Abstract:
This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption
Procedia PDF Downloads 3396784 Innovations for Freight Transport Systems
Authors: M. Lu
Abstract:
The paper presents part of the results of EU-funded projects: SoCool@EU (Sustainable Organisation between Clusters Of Optimized Logistics @ Europe), DG-RTD (Research and Innovation), Regions of Knowledge Programme (FP7-REGIONS-2011-1). It will provide an in-depth review of emerging technologies for further improving urban mobility and freight transport systems, such as (information and physical) infrastructure, ICT-based Intelligent Transport Systems (ITS), vehicles, advanced logistics, and services. Furthermore, the paper will provide an analysis of the barriers and will review business models for the market uptake of innovations. From a perspective of science and technology, the challenges of urbanization could be mainly handled through adequate (human-oriented) solutions for urban planning, sustainable energy, the water system, building design and construction, the urban transport system (both physical and information aspects), and advanced logistics and services. Implementation of solutions for these domains should be follow a highly integrated and balanced approach, a silo approach should be avoided. To develop a sustainable urban transport system (for people and goods), including inter-hubs and intra-hubs, a holistic view is needed. To achieve a sustainable transport system for people and goods (in terms of cost-effectiveness, efficiency, environment-friendliness and fulfillment of the mobility, transport and logistics needs of the society), a proper network and information infrastructure, advanced transport systems and operations, as well as ad hoc and seamless services are required. In addition, a road map for an enhanced urban transport system until 2050 will be presented. This road map aims to address the challenges of urban transport, and to provide best practices in inter-city and intra-city environments from various perspectives, including policy, traveler behaviour, economy, liability, business models, and technology.Keywords: synchromodality, multimodal transport, logistics, Intelligent Transport Systems (ITS)
Procedia PDF Downloads 3186783 Evaluation of Published Materials in Meeting the Information Needs of Students in Three Selected College Libraries in Oyo State, Nigeria
Authors: Rafiat Olasumbo Akande
Abstract:
Most college libraries in Oyo State show signs of unhealthy collection practices like the preponderance of non-recent collections and indiscriminate acquisition of sub-standard books from hawkers. The objective of this study, therefore, is to determine the extent at which available published materials in those college libraries are able to meet both knowledge and information needs of students in those institutions. A descriptive survey was conducted among 18 librarians and 21 library officers in three colleges purposively selected for the exercise using simple sampling technique. In all, 279 questionnaires were administered and out of those 279 administered, 265 were returned and analyzed using Statistical Package for Social Science (SPSS). Three College Librarian were also interviewed. Findings from the study showed that due to the paucity of funds, obsolete materials, and sub-standard materials being procured from roadside book hawkers hinders the college libraries in meeting the information needs of the students in these college libraries. It then concluded that only when there is standard procedure for collection management and acquisition of library materials that the knowledge and information needs of the students could be met. The study recommends that students and curriculum review committee members from various departments should always be involved in determining materials needed by the library to meet students information needs and that institution authority must fund, monitor and ensure compliance with the acquisition policy in place in the college libraries.Keywords: libraries, published materials, information needs, college, evaluation, students
Procedia PDF Downloads 1676782 The Spiritual Distress of Women Coping with the End of Life and Death of Their Spouses
Authors: Szu-Mei Hsiao
Abstract:
Many nurses have concerns about the difficulties of providing spiritual care for ethnic-Chinese patients and family members within their cultural context. This is due to a lack of knowledge and training. Most family caregivers are female. There has been little research exploring the potential impact of Chinese cultural values on the spiritual distress of couple dyadic participants in Taiwan. This study explores the spiritual issues of Taiwanese women coping with their husband’s advanced cancer during palliative care to death. Qualitative multiple case studies were used. Data was collected through participant observation and in-depth face-to-face interviews. Transcribed interview data was analyzed by using qualitative content analysis. Three couples were recruited from a community-based rural hospital in Taiwan where the husbands were hospitalized in a medical ward. Four spiritual distress themes emerged from the analysis: (1) A personal conflict in trying to come to terms with love and forgiveness; the inability to forgive their husband’s mistakes; and, lack of their family’s love and support. (2) A feeling of hopelessness due to advanced cancer, such as a feeling of disappointment in their destiny and karma, including expressing doubt on survival. (3) A feeling of uncertainty in facing death peacefully, such as fear of facing the unknown world; and, (4) A feeling of doubt causing them to question the meaning and values in their lives. This research has shown that caregivers needed family support, friends, social welfare, and the help of their religion to meet their spiritual needs in coping within the final stages of life and death. The findings of this study could assist health professionals to detect the spiritual distress of ethnic-Chinese patients and caregivers in the context of their cultural or religious background as early as possible.Keywords: advanced cancer, Buddhism, Confucianism, Taoism, qualitative research, spiritual distress
Procedia PDF Downloads 1766781 Process Modeling and Problem Solving: Connecting Two Worlds by BPMN
Authors: Gionata Carmignani, Mario G. C. A. Cimino, Franco Failli
Abstract:
Business Processes (BPs) are the key instrument to understand how companies operate at an organizational level, taking an as-is view of the workflow, and how to address their issues by identifying a to-be model. In last year’s, the BP Model and Notation (BPMN) has become a de-facto standard for modeling processes. However, this standard does not incorporate explicitly the Problem-Solving (PS) knowledge in the Process Modeling (PM) results. Thus, such knowledge cannot be shared or reused. To narrow this gap is today a challenging research area. In this paper we present a framework able to capture the PS knowledge and to improve a workflow. This framework extends the BPMN specification by incorporating new general-purpose elements. A pilot scenario is also presented and discussed.Keywords: business process management, BPMN, problem solving, process mapping
Procedia PDF Downloads 4146780 Standard Essential Patents for Artificial Intelligence Hardware and the Implications For Intellectual Property Rights
Authors: Wendy de Gomez
Abstract:
Standardization is a critical element in the ability of a society to reduce uncertainty, subjectivity, misrepresentation, and interpretation while simultaneously contributing to innovation. Technological standardization is critical to codify specific operationalization through legal instruments that provide rules of development, expectation, and use. In the current emerging technology landscape Artificial Intelligence (AI) hardware as a general use technology has seen incredible growth as evidenced from AI technology patents between 2012 and 2018 in the United States Patent Trademark Office (USPTO) AI dataset. However, as outlined in the 2023 United States Government National Standards Strategy for Critical and Emerging Technology the codification through standardization of emerging technologies such as AI has not kept pace with its actual technological proliferation. This gap has the potential to cause significant divergent possibilities for the downstream outcomes of AI in both the short and long term. This original empirical research provides an overview of the standardization efforts around AI in different geographies and provides a background to standardization law. It quantifies the longitudinal trend of Artificial Intelligence hardware patents through the USPTO AI dataset. It seeks evidence of existing Standard Essential Patents from these AI hardware patents through a text analysis of the Statement of patent history and the Field of the invention of these patents in Patent Vector and examines their determination as a Standard Essential Patent and their inclusion in existing AI technology standards across the four main AI standards bodies- European Telecommunications Standards Institute (ETSI); International Telecommunication Union (ITU)/ Telecommunication Standardization Sector (-T); Institute of Electrical and Electronics Engineers (IEEE); and the International Organization for Standardization (ISO). Once the analysis is complete the paper will discuss both the theoretical and operational implications of F/Rand Licensing Agreements for the owners of these Standard Essential Patents in the United States Court and Administrative system. It will conclude with an evaluation of how Standard Setting Organizations (SSOs) can work with SEP owners more effectively through various forms of Intellectual Property mechanisms such as patent pools.Keywords: patents, artifical intelligence, standards, F/Rand agreements
Procedia PDF Downloads 89