Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5497

Search results for: general attacks

4957 Challenges of Sustainable Marine Fishing in Ghana

Authors: Eric K. W. Aikins

Abstract:

Traditionally, Ghana is a marine fishing country. The fishing industry dominated by artisanal marine fishing helps Ghana to meet its fish and protein requirements. Also, it provides employment for most coastal dwellers that depend on fishing as their main economic enterprise. Nonetheless, the marine fishing industry is confronted with challenges that have contributed to a declining fish production in recent past decade. Bad fishing practices and the general limited knowledge on sustainable management of fisheries resources are the limiting factors that affect sustainable fish production and sustainable marine biodiversity management in Ghana. This paper discusses the challenges and strategies for attaining and maintaining sustainable marine fishing in Ghana as well as the state of marine fishing in Ghana. It concludes that an increase in the level of involvement of local fishers in the management of fisheries resources of the country could help local fishers to employ sustainable fisheries resources exploitation methods that could result in an improvement in the spatio-economic development and wellbeing of affected fishing communities in particular and Ghana in general.

Keywords: pair trawling, sargassum, spatio-economic development, sustainable marine fishing

Procedia PDF Downloads 265
4956 Understanding the Interactive Nature in Auditory Recognition of Phonological/Grammatical/Semantic Errors at the Sentence Level: An Investigation Based upon Japanese EFL Learners’ Self-Evaluation and Actual Language Performance

Authors: Hirokatsu Kawashima

Abstract:

One important element of teaching/learning listening is intensive listening such as listening for precise sounds, words, grammatical, and semantic units. Several classroom-based investigations have been conducted to explore the usefulness of auditory recognition of phonological, grammatical and semantic errors in such a context. The current study reports the results of one such investigation, which targeted auditory recognition of phonological, grammatical, and semantic errors at the sentence level. 56 Japanese EFL learners participated in this investigation, in which their recognition performance of phonological, grammatical and semantic errors was measured on a 9-point scale by learners’ self-evaluation from the perspective of 1) two types of similar English sound (vowel and consonant minimal pair words), 2) two types of sentence word order (verb phrase-based and noun phrase-based word orders), and 3) two types of semantic consistency (verb-purpose and verb-place agreements), respectively, and their general listening proficiency was examined using standardized tests. A number of findings have been made about the interactive relationships between the three types of auditory error recognition and general listening proficiency. Analyses based on the OPLS (Orthogonal Projections to Latent Structure) regression model have disclosed, for example, that the three types of auditory error recognition are linked in a non-linear way: the highest explanatory power for general listening proficiency may be attained when quadratic interactions between auditory recognition of errors related to vowel minimal pair words and that of errors related to noun phrase-based word order are embraced (R2=.33, p=.01).

Keywords: auditory error recognition, intensive listening, interaction, investigation

Procedia PDF Downloads 493
4955 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis

Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng

Abstract:

Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.

Keywords: attribution trace, probabilistic relevance, network attack, attacker identification

Procedia PDF Downloads 336
4954 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks

Authors: Afnan Al-Romi, Iman Al-Momani

Abstract:

The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.

Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN

Procedia PDF Downloads 303
4953 Young Adults’ Media Addiction Coping Strategies: A Longitudinal Study

Authors: Johanna Lindstrom, Jacob Mickelsson

Abstract:

Changes in the current media environment are transforming peoples’ everyday media consumption patterns all over the world. Digital media have become a natural, almost unavoidable, part of everyday lives of humans. While this has led to many positive consequences, there is also a growing concern for harmful effects. This paper contributes to knowledge about “the dark side” of media use by considering the topic of media addiction and subsequent coping strategies among young adults. The paper draws on a longitudinal media diary study conducted among young university students between the years 2013 and 2021. A total of 1029 diaries have been collected (approximately 100 each year), aiming at capturing the students’ everyday media behavior. In this paper, reflective narratives in the diaries have been analyzed, aiming at answering the following questions: Which of their own media behaviors do the students perceive as particularly destructive, addictive or problematic? How do they cope with such behaviors? Results from the study indicate a noticeable increase in reflections on addictive media behavior over the years. For example, compared to earlier years, the amount of such reflections significantly started to increase in the diaries in 2016 and 2017, and this trend has continued ever since. Furthermore, the nature of these reflections has changed, displaying a growing concern for one’s own excessive media use and general wellbeing. Media addiction seems particularly difficult to cope with as digital media is literally everywhere and media use in general is described as consistent and habitual, in terms of regularly repeated routines that are fragmented but performed continuously and often unintentionally throughout the day. Reflections on “the dark side” of everyday media consumption become particularly prominent in times of the Covid -19 pandemic. However, this trend was noticeable well before the pandemic started. The study also identifies a countertrend regarding reflections on how to deal and cope with problematic media behavioral patterns. This countertrend portrays a general development of increased awareness of factors that may trigger compulsive behavior and how to avoid or handle such trigger points. The countertrend is particularly evident in recent years, despite the ongoing pandemic and subsequent increases in time spent using media. Addictive media behavior may lead to severe consequences for students’ learning processes and general well-being. Increased awareness of this growing trend and coping strategies are needed on an individual as well as a broader educational level.

Keywords: coping strategies, media addiction, media behavior, well-being

Procedia PDF Downloads 181
4952 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 27
4951 Measuring the Effect of Intercollegiate Athletic Success on Private Giving and Enrollment

Authors: Jamie L. Stangel

Abstract:

Increased popularity and visibility of college athletics have contributed to an environment in which institutions -most of which lack self-sufficient athletics department budgets- reallocate monies from the university general fund and seek additional funding sources to keep up with increasing levels of spending on athletics. Given the prevalence of debates on student debt levels, coach salaries, and athlete pay, empirical evidence on whether this spending yields an expected return on investment is necessary. This study considered the relationship between the independent variable of the winning percentage of the men’s basketball team at a mid-major university, moderated by NCAA tournament appearance, number of applicants, number of enrollments, average SAT score of students, and donor giving to the university general and athletic funds. The results indicate that, other than a small correlation between athletic success and number of applicants, only when NCAA tournament appearance is used as a moderating variable, these purported benefits are not supported, suggesting the need for a reevaluation of athletic department spending and perceptions on tangible and intangible benefits for universities.

Keywords: athletic success, enrollment, NCAA, private giving

Procedia PDF Downloads 106
4950 A Family of Second Derivative Methods for Numerical Integration of Stiff Initial Value Problems in Ordinary Differential Equations

Authors: Luke Ukpebor, C. E. Abhulimen

Abstract:

Stiff initial value problems in ordinary differential equations are problems for which a typical solution is rapidly decaying exponentially, and their numerical investigations are very tedious. Conventional numerical integration solvers cannot cope effectively with stiff problems as they lack adequate stability characteristics. In this article, we developed a new family of four-step second derivative exponentially fitted method of order six for the numerical integration of stiff initial value problem of general first order differential equations. In deriving our method, we employed the idea of breaking down the general multi-derivative multistep method into predator and corrector schemes which possess free parameters that allow for automatic fitting into exponential functions. The stability analysis of the method was discussed and the method was implemented with numerical examples. The result shows that the method is A-stable and competes favorably with existing methods in terms of efficiency and accuracy.

Keywords: A-stable, exponentially fitted, four step, predator-corrector, second derivative, stiff initial value problems

Procedia PDF Downloads 233
4949 Supply Side Readiness for Universal Health Coverage: Assessing the Availability and Depth of Essential Health Package in Rural, Remote and Conflict Prone District

Authors: Veenapani Rajeev Verma

Abstract:

Context: Assessing facility readiness is paramount as it can indicate capacity of facilities to provide essential care for resilience to health challenges. In the context of decentralization, estimation of supply side readiness indices at sub national level is imperative for effective evidence based policy but remains a colossal challenge due to lack of dependable and representative data sources. Setting: District Poonch of Jammu and Kashmir was selected for this study. It is remote, rural district with unprecedented topographical barriers and is identified as high priority by government. It is also a fragile area as is bounded by Line of Control with Pakistan bearing the brunt of cease fire violations, military skirmishes and sporadic militant attacks. Hilly geographical terrain, rudimentary/absence of road network and impoverishment are quintessential to this area. Objectives: Objective of the study is to a) Evaluate the service readiness of health facilities and create a concise index subsuming plethora of discrete indicators and b) Ascertain supply side barriers in service provisioning via stakeholder’s analysis. Study also strives to expand analytical domain unravelling context and area specific intricacies associated with service delivery. Methodology: Mixed method approach was employed to triangulate quantitative analysis with qualitative nuances. Facility survey encompassing 90 Subcentres, 44 Primary health centres, 3 Community health centres and 1 District hospital was conducted to gauge general service availability and service specific availability (depth of coverage). Compendium of checklist was designed using Indian Public Health Standards (IPHS) in form of standard core questionnaire and scorecard generated for each facility. Information was collected across dimensions of amenities, equipment, medicines, laboratory and infection control protocols as proposed in WHO’s Service Availability and Readiness Assesment (SARA). Two stage polychoric principal component analysis employed to generate a parsimonious index by coalescing an array of tracer indicators. OLS regression method used to determine factors explaining composite index generated from PCA. Stakeholder analysis was conducted to discern qualitative information. Myriad of techniques like observations, key informant interviews and focus group discussions using semi structured questionnaires on both leaders and laggards were administered for critical stakeholder’s analysis. Results: General readiness score of health facilities was found to be 0.48. Results indicated poorest readiness for subcentres and PHC’s (first point of contact) with composite score of 0.47 and 0.41 respectively. For primary care facilities; principal component was characterized by basic newborn care as well as preparedness for delivery. Results revealed availability of equipment and surgical preparedness having lowest score (0.46 and 0.47) for facilities providing secondary care. Presence of contractual staff, more than 1 hr walk to facility, facilities in zone A (most vulnerable) to cross border shelling and facilities inaccessible due to snowfall and thick jungles was negatively associated with readiness index. Nonchalant staff attitude, unavailability of staff quarters, leakages and constraint in supply chain of drugs and consumables were other impediments identified. Conclusions/Policy Implications: It is pertinent to first strengthen primary care facilities in this setting. Complex dimensions such as geographic barriers, user and provider behavior is not under precinct of this methodology.

Keywords: effective coverage, principal component analysis, readiness index, universal health coverage

Procedia PDF Downloads 96
4948 An Audit on the Quality of Pre-Operative Intra-Oral Digital Radiographs Taken for Dental Extractions in a General Practice Setting

Authors: Gabrielle O'Donoghue

Abstract:

Background: Pre-operative radiographs facilitate assessment and treatment planning in minor oral surgery. Quality assurance for dental radiography advocates the As Low As Reasonably Achievable (ALARA) principle in collecting accurate diagnostic information. Aims: To audit the quality of digital intraoral periapicals (IOPAs) taken prior to dental extractions in a metropolitan general dental practice setting. Standards: The National Radiological Protection Board (NRPB) guidance outlines three grades of radiograph quality: excellent (Grade 1 > 70% of total exposures), diagnostically acceptable (Grade 2 <20%), and unacceptable (Grade 3 <10%). Methodology: A study of pre-operative radiographs taken prior to dental extractions across 12 private general dental practices in a large metropolitan area by 44 practitioners. A total of 725 extractions were assessed, allowing 258 IOPAs to be reviewed in one audit cycle. Results: First cycle: Of 258 IOPAs: 223(86.4%) scored Grade 1, 27(10.5%) Grade 2, and 8(3.1%) Grade 3. The standard was met. 35 dental extractions were performed without an available pre-operative radiograph. Action Plan & Recommendations: Results were distributed to all staff and a continuous professional development evening organized to outline recommendations to improve image quality. A second audit cycle is proposed at a six-month interval to review the recommendations and appraise results. Conclusion: The overall standard of radiographs met the published guidelines. A significant improvement in the number of procedures undertaken without pre-operative imaging is expected at a six-month interval period. An investigation into undiagnostic imaging and associated adverse patient outcomes is being considered. Maintenance of the standards achieved is predicted in the second audit cycle to ensure consistent high quality imaging.

Keywords: audit, oral radiology, oral surgery, periapical radiographs, quality assurance

Procedia PDF Downloads 141
4947 The Old Man And The Sea: From A Gerotranscendence Perpective

Authors: Eng Lye, Ooi

Abstract:

The Old Man and The Sea is a novella written by Ernest Hemingway that depicts an old fisherman’ journey out into the deep sea in his pursuit to catch a big fish. Through this novella, Hemingway creates a world for his protagonist, Santiago who is portrayed as an old man who has gone eighty-four days without catching a fish, at last hooks an eighteen-foot marlin, the largest he ever known. The old man endures pain and struggles to bring back to shore. Looking through the lens of gerotranscendence, we can see that the old man has his dreams, and goals in life. In his pursuit for happiness, he has fought tirelessly to ward off the shark attacks and finally he won even though only half of his fish is left. Hemingway has portrayed Santiago as an old man as a transcendent self leaping from the dimension of “The Self” to the cosmic dimension with the personal and social relationship dimension in tow. The Old Man and The Sea offers a glimpse of the struggles of an old man, who is old and gaunt but spiritually undefeated in his battle out in the sea. He is surprisingly strong and powerful despite his old age, he respects the sea, the birds. the turtles, the sharks and the fish. He can endure suffering and is focussed on achieving his goals. This is what Hemingway has portrayed Santiago to be a gerotranscendent in the eyes of the gerotranscendental approach in respect of the changes and development as seen in Santiago, the protagonist in this novella.

Keywords: gerotranscendence, gerotranscendenatal, old man, the sea, hemingway

Procedia PDF Downloads 13
4946 Relationship Between Behavioral Inhibition/Approach System, and Perceived Stress, Whit Control White Blood Cell In Multiple Sclerosis Patients

Authors: Amin Alvani

Abstract:

Multiple sclerosis (MS) is a chronic, often disabling disease in which the immune system attacks the myelin sheath of neurons in the central nervous system. The present study aimed to investigate the Relationship between behavioral inhibition/approach system (BIS-BAS) and perceived stress (PS) whit control white blood cell (WBC). 60 MS patients (male=36.7, female=63.3%; age range=15-65 participated in the study and completed the demographic questionnaire, the count blood cell (CBC) test, the behavioral Activation and behavioral inhibition scale (BIS-BAS), and the perceived stress Questionnaire (PSS-14). The results revealed that Between of BAS-reward responsiveness (BAS-DR) subscale and PS, in more than MS patient (BIS), there are increase WBC.

Keywords: behavioral inhibition/approach system, perceived stress, white blood cell, multiple sclerosis

Procedia PDF Downloads 63
4945 Extension and Closure of a Field for Engineering Purpose

Authors: Shouji Yujiro, Memei Dukovic, Mist Yakubu

Abstract:

Fields are important objects of study in algebra since they provide a useful generalization of many number systems, such as the rational numbers, real numbers, and complex numbers. In particular, the usual rules of associativity, commutativity and distributivity hold. Fields also appear in many other areas of mathematics; see the examples below. When abstract algebra was first being developed, the definition of a field usually did not include commutativity of multiplication, and what we today call a field would have been called either a commutative field or a rational domain. In contemporary usage, a field is always commutative. A structure which satisfies all the properties of a field except possibly for commutativity, is today called a division ring ordivision algebra or sometimes a skew field. Also non-commutative field is still widely used. In French, fields are called corps (literally, body), generally regardless of their commutativity. When necessary, a (commutative) field is called corps commutative and a skew field-corps gauche. The German word for body is Körper and this word is used to denote fields; hence the use of the blackboard bold to denote a field. The concept of fields was first (implicitly) used to prove that there is no general formula expressing in terms of radicals the roots of a polynomial with rational coefficients of degree 5 or higher. An extension of a field k is just a field K containing k as a subfield. One distinguishes between extensions having various qualities. For example, an extension K of a field k is called algebraic, if every element of K is a root of some polynomial with coefficients in k. Otherwise, the extension is called transcendental. The aim of Galois Theory is the study of algebraic extensions of a field. Given a field k, various kinds of closures of k may be introduced. For example, the algebraic closure, the separable closure, the cyclic closure et cetera. The idea is always the same: If P is a property of fields, then a P-closure of k is a field K containing k, having property, and which is minimal in the sense that no proper subfield of K that contains k has property P. For example if we take P (K) to be the property ‘every non-constant polynomial f in K[t] has a root in K’, then a P-closure of k is just an algebraic closure of k. In general, if P-closures exist for some property P and field k, they are all isomorphic. However, there is in general no preferable isomorphism between two closures.

Keywords: field theory, mechanic maths, supertech, rolltech

Procedia PDF Downloads 346
4944 Reduced General Dispersion Model in Cylindrical Coordinates and Isotope Transient Kinetic Analysis in Laminar Flow

Authors: Masood Otarod, Ronald M. Supkowski

Abstract:

This abstract discusses a method that reduces the general dispersion model in cylindrical coordinates to a second order linear ordinary differential equation with constant coefficients so that it can be utilized to conduct kinetic studies in packed bed tubular catalytic reactors at a broad range of Reynolds numbers. The model was tested by 13CO isotope transient tracing of the CO adsorption of Boudouard reaction in a differential reactor at an average Reynolds number of 0.2 over Pd-Al2O3 catalyst. Detailed experimental results have provided evidence for the validity of the theoretical framing of the model and the estimated parameters are consistent with the literature. The solution of the general dispersion model requires the knowledge of the radial distribution of axial velocity. This is not always known. Hence, up until now, the implementation of the dispersion model has been largely restricted to the plug-flow regime. But, ideal plug-flow is impossible to achieve and flow regimes approximating plug-flow leave much room for debate as to the validity of the results. The reduction of the general dispersion model transpires as a result of the application of a factorization theorem. Factorization theorem is derived from the observation that a cross section of a catalytic bed consists of a solid phase across which the reaction takes place and a void or porous phase across which no significant measure of reaction occurs. The disparity in flow and the heterogeneity of the catalytic bed cause the concentration of reacting compounds to fluctuate radially. These variabilities signify the existence of radial positions at which the radial gradient of concentration is zero. Succinctly, factorization theorem states that a concentration function of axial and radial coordinates in a catalytic bed is factorable as the product of the mean radial cup-mixing function and a contingent dimensionless function. The concentration of adsorbed compounds are also factorable since they are piecewise continuous functions and suffer the same variability but in the reverse order of the concentration of mobile phase compounds. Factorability is a property of packed beds which transforms the general dispersion model to an equation in terms of the measurable mean radial cup-mixing concentration of the mobile phase compounds and mean cross-sectional concentration of adsorbed species. The reduced model does not require the knowledge of the radial distribution of the axial velocity. Instead, it is characterized by new transport parameters so denoted by Ωc, Ωa, Ωc, and which are respectively denominated convection coefficient cofactor, axial dispersion coefficient cofactor, and radial dispersion coefficient cofactor. These cofactors adjust the dispersion equation as compensation for the unavailability of the radial distribution of the axial velocity. Together with the rest of the kinetic parameters they can be determined from experimental data via an optimization procedure. Our data showed that the estimated parameters Ωc, Ωa Ωr, are monotonically correlated with the Reynolds number. This is expected to be the case based on the theoretical construct of the model. Computer generated simulations of methanation reaction on nickel provide additional support for the utility of the newly conceptualized dispersion model.

Keywords: factorization, general dispersion model, isotope transient kinetic, partial differential equations

Procedia PDF Downloads 246
4943 General Purpose Graphic Processing Units Based Real Time Video Tracking System

Authors: Mallikarjuna Rao Gundavarapu, Ch. Mallikarjuna Rao, K. Anuradha Bai

Abstract:

Real Time Video Tracking is a challenging task for computing professionals. The performance of video tracking techniques is greatly affected by background detection and elimination process. Local regions of the image frame contain vital information of background and foreground. However, pixel-level processing of local regions consumes a good amount of computational time and memory space by traditional approaches. In our approach we have explored the concurrent computational ability of General Purpose Graphic Processing Units (GPGPU) to address this problem. The Gaussian Mixture Model (GMM) with adaptive weighted kernels is used for detecting the background. The weights of the kernel are influenced by local regions and are updated by inter-frame variations of these corresponding regions. The proposed system has been tested with GPU devices such as GeForce GTX 280, GeForce GTX 280 and Quadro K2000. The results are encouraging with maximum speed up 10X compared to sequential approach.

Keywords: connected components, embrace threads, local weighted kernel, structuring elements

Procedia PDF Downloads 415
4942 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh

Abstract:

Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 338
4941 Clinical Pathway for Postoperative Organ Transplants

Authors: Tahsien Okasha

Abstract:

Transplantation medicine is one of the most challenging and complex areas of modern medicine. Some of the key areas for medical management are the problems of transplant rejection, during which the body has an immune response to the transplanted organ, possibly leading to transplant failure and the need to immediately remove the organ from the recipient. When possible, transplant rejection can be reduced through serotyping to determine the most appropriate donor-recipient match and through the use of immunosuppressant drugs. Postoperative care actually begins before the surgery in terms of education, discharge planning, nutrition, pulmonary rehabilitation, and patient/family education. This also allows for expectations to be managed. A multidisciplinary approach is the key, and collaborative team meetings are essential to ensuring that all team members are "on the same page.". The following clinical pathway map and guidelines with the aim to decrease alteration in clinical practice and are intended for those healthcare professionals who look after organ transplant patients. They are also intended to be useful to both medical and surgical trainees as well as nurse specialists and other associated healthcare professionals involved in the care of organ transplant patients. This pathway is general pathway include the general guidelines that can be applicable for all types of organ transplant with special considerations to each organ.

Keywords: organ transplant, clinical pathway, postoperative care, same page

Procedia PDF Downloads 412
4940 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 177
4939 Functional Neural Network for Decision Processing: A Racing Network of Programmable Neurons Where the Operating Model Is the Network Itself

Authors: Frederic Jumelle, Kelvin So, Didan Deng

Abstract:

In this paper, we are introducing a model of artificial general intelligence (AGI), the functional neural network (FNN), for modeling human decision-making processes. The FNN is composed of multiple artificial mirror neurons (AMN) racing in the network. Each AMN has a similar structure programmed independently by the users and composed of an intention wheel, a motor core, and a sensory core racing at a specific velocity. The mathematics of the node’s formulation and the racing mechanism of multiple nodes in the network will be discussed, and the group decision process with fuzzy logic and the transformation of these conceptual methods into practical methods of simulation and in operations will be developed. Eventually, we will describe some possible future research directions in the fields of finance, education, and medicine, including the opportunity to design an intelligent learning agent with application in AGI. We believe that FNN has a promising potential to transform the way we can compute decision-making and lead to a new generation of AI chips for seamless human-machine interactions (HMI).

Keywords: neural computing, human machine interation, artificial general intelligence, decision processing

Procedia PDF Downloads 104
4938 Functional Instruction Set Simulator (ISS) of a Neural Network (NN) IP with Native BF-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A Functional Model to mimic the functional correctness of a Neural Network Compute Accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of gcc compilers to BF-16 datatype, which we addressed with a native BF-16 generator integrated to our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex Neural Network Accelerator design by proposing a Functional Model-based scoreboard or Software model using SystemC. The proposed Functional Model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT bringing up micro-steps of execution.

Keywords: ISA (instruction set architecture), NN (neural network), TLM (transaction-level modeling), GEMM (general matrix multiplication)

Procedia PDF Downloads 61
4937 Plasterwork Ornamentation Finds of Hoşap Castle Archeological Excavation (2007-2015)

Authors: M. Top, H. Telli

Abstract:

Plaster material has been a preferred material especially in the Middle East geography in terms of economy, easy process and thermal insulation since very old times. However, due to the unstable nature of the material, very little has been reached today. For this reason, both finds and studies about stucco ornamentation are very few. In this study, the excavated plasterwork finds used in the architectural ornamentation in the Hosap Castle (Van/Turkey) were considered worth examining since they are rare examples. The stucco relief finds that were found in the castle is discussed. The finds of engraved artifacts on the plasterworks were not addressed. Only the pieces found in Area II and Area III (harem) and surrounding during the cleaning and excavation work carried out at Hosap Kalesi between 2007-2015, will be discussed. This is a general assessment about the finds. It is unknown where many of the pieces found. For this reason, only general appraisal was able to done. Most of the parts are made of mold technique. The motifs on the fragments are similar to the motifs of Ottoman period tiles. Parallel to the settlement history of the castle, thought that these plaster pieces belong to the 16th-17th centuries.

Keywords: stucco decoration, Eastern Anatolia, Ottoman motifs, ornamentation, plasterwork

Procedia PDF Downloads 92
4936 Ideology and Brainwashing: Psychological Manipulation in Religious Sects

Authors: Andreas Aceranti, Simonetta Vernocchi, Marco Colorato, Pozzaglio Carolina

Abstract:

This work analyses the term sect or religious cult and the general traits of those groups and the people involved so as to better understand this unexpectedly popular reality. Some translations taken from research papers as well as academic articles are likewise taken into consideration. We have carried out an in-depth analysis of the topics presented. Firstly we defined magic related to religion and all the similarities and differences between magical thinking and religious thinking, religion, and superstition. Secondly, the term “sect” was defined, and the phenomenon was dealt with, along with the listing of all kinds of existing groups. Then we studied the recruitment process in general and recruitment according to the brainwashing theory. We then analysed the criminological aspects that entail their harmfulness with a particular focus on the structure of those religious communities and the theories regarding the people involved: leader, members, and the group, as it has its own pattern of behaviour and its conformism. Finally, we studied the ideology and the techniques of manipulation used, such as brainwashing, which got already introduced in previous chapters trying to explain this reality not only in theory but studying and trying to understand some of the most famous religious cults.

Keywords: psychological manipulation, brainwashing, love bombing, magic and religion

Procedia PDF Downloads 70
4935 Clinical Pathway for Postoperative Organ Transplantation

Authors: Tahsien Okasha

Abstract:

Transplantation medicine is one of the most challenging and complex areas of modern medicine. Some of the key areas for medical management are the problems of transplant rejection, during which the body has an immune response to the transplanted organ, possibly leading to transplant failure and the need to immediately remove the organ from the recipient. When possible, transplant rejection can be reduced through serotyping to determine the most appropriate donor-recipient match and through the use of immunosuppressant drugs. Postoperative care actually begins before the surgery in terms of education, discharge planning, nutrition, pulmonary rehabilitation, and patient/family education. This also allows for expectations to be managed. A multidisciplinary approach is the key, and collaborative team meetings are essential to ensuring that all team members are "on the same page." .The following clinical pathway map and guidelines with the aim to decrease alteration in clinical practice and are intended for those healthcare professionals who look after organ transplant patients. They are also intended to be useful to both medical and surgical trainees as well as nurse specialists and other associated healthcare professionals involved in the care of organ transplant patients. This pathway is general pathway include the general guidelines that can be applicable for all types of organ transplant with special considerations to each organ.

Keywords: postoperative care, organ transplant, clinical pathway, patient

Procedia PDF Downloads 430
4934 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 313
4933 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 123
4932 Analyzing Boson Star as a Candidate for Dark Galaxy Using ADM Formulation of General Relativity

Authors: Aria Ratmandanu

Abstract:

Boson stars can be viewed as zero temperature ground state, Bose-Einstein condensates, characterized by enormous occupation numbers. Time-dependent spherically symmetric spacetime can be a model of Boson Star. We use (3+1) split of Einstein equation (ADM formulation of general relativity) to solve Einstein field equation coupled to a complex scalar field (Einstein-Klein-Gordon Equation) on time-dependent spherically symmetric spacetime, We get the result that Boson stars are pulsating stars with the frequency of oscillation equal to its density. We search for interior solution of Boson stars and get the T.O.V. (Tollman-Oppenheimer-Volkoff) equation for Boson stars. Using T.O.V. equation, we get the equation of state and the relation between pressure and density, its total mass and along with its gravitational Mass. We found that the hypothetical particle Axion could form a Boson star with the size of a milky way galaxy and make it a candidate for a dark galaxy, (a galaxy that consists almost entirely of dark matter).

Keywords: axion, boson star, dark galaxy, time-dependent spherically symmetric spacetime

Procedia PDF Downloads 223
4931 Top Management Support as an Enabling Factor for Academic Innovation through Knowledge Sharing

Authors: Sawsan J. Al-husseini, Talib A. Dosa

Abstract:

Educational institutions are today facing increasing pressures due to economic, political and social upheaval. This is only exacerbated by the nature of education as an intangible good which relies upon the intellectual assets of the organisation, its staff. Top management support has been acknowledged as having a positive general influence on knowledge management and creativity. However, there is a lack of models linking top management support, knowledge sharing, and innovation within higher education institutions, in general within developing countries, and particularly in Iraq. This research sought to investigate the impact of top management support on innovation through the mediating role of knowledge sharing in Iraqi private HEIs. A quantitative approach was taken and 262 valid responses were collected to test the causal relationships between top management support, knowledge sharing, and innovation. Employing structural equation modelling with AMOS v.25, the research demonstrated that knowledge sharing plays a pivotal role in the relationship between top management support and innovation. The research has produced some guidelines for researchers as well as leaders, and provided evidence to support the use of knowledge sharing to increase innovation within the higher education environment in developing countries, particularly Iraq.

Keywords: top management support, knowledge sharing, innovation, structural equation modelling

Procedia PDF Downloads 313
4930 Nine Year Trend Analysis of Malaria in Kahsay Abera General Hospital Humera Town: Western Tigrai, Northern Ethiopia: A Retrospective Study

Authors: Getachew Belay, Getachew Kahsu, Brhane Berhe, Kebede Tesfay, Fitsum Mardu, Nigus Shishay, Hadush Negash, Aster Tsegaye

Abstract:

Background: Malaria kills million people around the world, and it is still a serious public health problem in Ethiopia. Over the past years, the disease has been consistently reported as leading cause of outpatient visits, hospitalization and death in health facilities across the country. This study assessed malaria trend in Humera Town Kahsay Abera Hospital Tigrai region, Northern Ethiopia. Method: A Health facility retrospective cross sectional study was conducted in Kahsay Abera General Hospital from January 2011 to December 2019. Data of Malaria cases were reviewed from Health Management Information System with the help of experts in the office. The nine year data were extracted and analyzed using Excel by excluding those which lack demographic data. Result: A total of 36,604 smear positive malaria cases were confirmed in last nine years in the study area. Plasmodim falcifarum was the most prevalent reported species. Higher number of malaria cases were reported during October season.Males were more infected by the disese (63.1%) than females and males aged 15 years and above were the most iffected ones. The percentage proportion of P.falcifarum and P.vivax were 61.6% to 38.4%, respectively. There was a decreasing trend over the nine years following the peak in 2013. Conclusion: Malaria smear positivity, with highest cases being recorded in October, was declined over the nine years after peaking in 2013. Males aged 15 years and above were more affected, and P falciparum was the predominat species. Strengtheing the prevention and control activities is warranted in the study area.

Keywords: trend, malaria, kahsay abera general hospital, tigray, ethiopia

Procedia PDF Downloads 56
4929 Output-Feedback Control Design for a General Class of Systems Subject to Sampling and Uncertainties

Authors: Tomas Menard

Abstract:

The synthesis of output-feedback control law has been investigated by many researchers since the last century. While many results exist for the case of Linear Time Invariant systems whose measurements are continuously available, nowadays, control laws are usually implemented on micro-controller, then the measurements are discrete-time by nature. This fact has to be taken into account explicitly in order to obtain a satisfactory behavior of the closed-loop system. One considers here a general class of systems corresponding to an observability normal form and which is subject to uncertainties in the dynamics and sampling of the output. Indeed, in practice, the modeling of the system is never perfect, this results in unknown uncertainties in the dynamics of the model. We propose here an output feedback algorithm which is based on a linear state feedback and a continuous-discrete time observer. The main feature of the proposed control law is that only discrete-time measurements of the output are needed. Furthermore, it is formally proven that the state of the closed loop system exponentially converges toward the origin despite the unknown uncertainties. Finally, the performances of this control scheme are illustrated with simulations.

Keywords: dynamical systems, output feedback control law, sampling, uncertain systems

Procedia PDF Downloads 265
4928 Smoker Recognition from Lung X-Ray Images Using Convolutional Neural Network

Authors: Moumita Chanda, Md. Fazlul Karim Patwary

Abstract:

Smoking is one of the most popular recreational drug use behaviors, and it contributes to birth defects, COPD, heart attacks, and erectile dysfunction. To completely eradicate this disease, it is imperative that it be identified and treated. Numerous smoking cessation programs have been created, and they demonstrate how beneficial it may be to help someone stop smoking at the ideal time. A tomography meter is an effective smoking detector. Other wearables, such as RF-based proximity sensors worn on the collar and wrist to detect when the hand is close to the mouth, have been proposed in the past, but they are not impervious to deceptive variables. In this study, we create a machine that can discriminate between smokers and non-smokers in real-time with high sensitivity and specificity by watching and collecting the human lung and analyzing the X-ray data using machine learning. If it has the highest accuracy, this machine could be utilized in a hospital, in the selection of candidates for the army or police, or in university entrance.

Keywords: CNN, smoker detection, non-smoker detection, OpenCV, artificial Intelligence, X-ray Image detection

Procedia PDF Downloads 60