Search results for: interest flooding attack
4227 A CM-Based Model for 802.11 Networks Security Policies Enforcement
Authors: Karl Mabiala Dondia, Jing Ma
Abstract:
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy
Procedia PDF Downloads 3804226 Starting Torque Study of Darrieus Wind Turbine
Authors: M. Douak, Z. Aouachria
Abstract:
The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.Keywords: Darrieus turbine, pitch angle, self stating, wind energy
Procedia PDF Downloads 3484225 Exploring Gen Z Consumers’ Behavior Towards Sustainable Fashion
Authors: Lilia Righi
Abstract:
Recently, the fashion industry has demonstrated a keen interest in sustainability and the environment. Sustainable fashion has huge potential and appeals to environmentally conscious Generation Z shoppers. Meanwhile, Generation Z customers have attracted researchers' interest due to their overconsumption of clothing. However, most studies in this area focus on designing or producing sustainable clothing, with little exploration of consumers. To fill this gap, the present study aims to determine the important factors influencing Generation Z consumers' decisions to purchase sustainable fashion by mobilizing the theory of planned behavior (TPB). It uses deductive qualitative research based on 18 semi-structured interviews with Generation Z consumers in France. Qualitative data will be analyzed using reflective thematic analysis. On a theoretical level, this research contributes to enriching the literature by mobilizing, for the first time, the theory of planned behavior in the context of sustainable fashion. On a practical level, the results can help practitioners determine effective marketing strategies to persuade Generation Z to consume sustainable clothing.Keywords: generation Z, qualitative methodology, sustainable fashion, theory of planned behavior (TPB).
Procedia PDF Downloads 384224 The Existence of Beauveria bassiana in the Third Generation of Corn Seedling
Authors: Itji Diana Daud, Nuniek Widiayani
Abstract:
The fungus Beauveria bassiana can be endophytic in maize. The fungus was recovered in culture from stems, leaves and roots after a month planting. This phenomenon was shown until the third generation of the corn. The result from laboratory shows that B. bassiana appear in F1, F2 and F3 in order 70, 80 and 90% in the roots, 80% in the stems in all generation, 90, 80 and 70% in leaves. In CFU’s ml-1 of B. bassiana in corn seed, show F1 was 8.9 x 106, F2 was 8.1 x 106 and F3 was 7.8 x 106. The research showed that B. Bassiana as endophyte still remain to the third generation. Innovation to the corn seed which is endophyte seed is essential to protect from the attack of corn borer and to avoid the usage of insecticide.Keywords: endophytic, recovered, third generation, Beauveria bassiana
Procedia PDF Downloads 2834223 The Antecedents of Customer-to-Customer Interaction to Brand and Communication Strategy: A Marketer’s Perspective
Authors: Kartina Sury Kariman
Abstract:
Brand-to-customer (B2C) engagement has been well established through the traditional platform such as direct sales, advertising, customer service center, customer hotline as well as brand usage experiences. Increasingly, interest to B2C has evolved to include customer-to-customer (C2C) interaction analysis aligned with the vast growth of web 2.0. Hence, discussion on C2C interaction and brand strategy have captured social media as it enables brands and C2C interaction to be connected in various ways, providing opportunities for marketers to shape their brand engagement strategy while reaching C2C as the targeted outcomes. The objective here is to provide a preliminary review of C2C interaction consisting the antecedents and consequences while highlighting areas of research interest within the context from marketers perspective and the business outcomes. This paper discusses how C2C interaction defines marketers’ brand and communication strategy and how social media trend shapes the strategy when promoting the awareness of life insurance industry and educating the target market.Keywords: social media, brand engagement, customer interaction, customer engagement, brand strategy, life insurance
Procedia PDF Downloads 4594222 A Proposal of Farm-Based Tourism within the Context of Rural Tourism: Zeytinseli
Authors: Vedat Acar, Osman Eralp Çolakoğlu
Abstract:
In this research, with reference to specialization of travel agencies being an important part of tourism industry, a project has been presented about a small-scale enterprise, called as Zeytinseli, contributing actively from the beginning to the end of the production process of olive and olive oil within the context of rural tourism. For this purpose in the research done, firstly, conceptual framework has been formed about travel agency, tour operatorship, specialized travel agency and rural tourism and the necessity of specialization on tourism has been emphasized in today's world. Afterwards, "olive", having an important role in both mythology and divine religions, has been handled within the scope of rural tourism. The cost of accommodation units about Zeytinseli operating in Didim, being a district of Aydın, has been calculated within the context of the project and a fifteen-day's tour to this enterprise has been presented at the end of this project. The research may be said to be an original research on account of embodying not only ecotourism, agro tourism but also cultural tourism and special interest tourism.Keywords: agro tourism, rural tourism, specialization of travel agency, special interest tourism
Procedia PDF Downloads 4614221 Consequences of Transformation of Modern Monetary Policy during the Global Financial Crisis
Authors: Aleksandra Szunke
Abstract:
Monetary policy is an important pillar of the economy, directly affecting on the condition of banking sector. Depending on the strategy may both support functioning of banking institutions, as well as limit their excessively risky activities. The literature studies indicate a large number of publications, which include characteristics of initiatives, implemented by central banks during the global financial crisis and the potential effects of the use of non-standard monetary policy instruments. However, the empirical evidence about their effects and real consequences for the financial markets are still not final. Even before the escalation of instability, Bernanke, Reinhart, and Sack (2004) analyzed the effectiveness of various unconventional monetary tools in lowering long-term interest rates in the United States and Japan. The obtained results largely confirmed the effectiveness of the zero-interest-rate policy and Quantitative Easing (QE) in achieving the goal of reducing long-term interest rates. Japan, considered as the precursor of QE policy, also conducted research about the consequences of non-standard instruments, implemented to restore financial stability of the country. Although the literature about the effectiveness of Quantitative Easing in Japan is extensive, it does not uniquely specify whether it brought permanent effects. The main aim of the study is to identify the implications of non-standard monetary policy, implemented by selected central banks (the Federal Reserve System, Bank of England and European Central Bank), paying particular attention to the consequences into three areas: the size of money supply, financial markets, and the real economy.Keywords: consequences of modern monetary policy, quantitative easing policy, banking sector instability, global financial crisis
Procedia PDF Downloads 4784220 Design and Modeling of Amphibious Houses for Flood Prone Areas: The Case of Nigeria
Authors: Onyebuchi Mogbo, Abdulsalam Mohammed, Salsabila Wali
Abstract:
This research discusses the design and modeling of an amphibious building. The amphibious building is a house with the function of floating during a flood event. Over the years, houses have been built to resist flood events some of which have failed. The floating house is designed to work with nature and not against it. In the event of a flood, the house will rise with the increasing water level and protect the house from sinking. For the design and modeling of this house an estimated cost of N250, 000, approximately $700, will be needed. It is expected that the house will rise when lightweight materials are incorporated in the design, and the concrete dock (in form of a hollow box) carrying the entire house in its hollow space is well designed. When there is flooding the water will fill up the concrete dock, and the house will rise upwards with vertical guides preventing it from moving side to side or out of its boundary. Architectural and Structural designs will be used in this project.Keywords: amphibious building, flood, housing, design and modelling
Procedia PDF Downloads 1804219 Secure Watermarking not at the Cost of Low Robustness
Authors: Jian Cao
Abstract:
This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)
Procedia PDF Downloads 3854218 Experimental Research of High Pressure Jet Interaction with Supersonic Crossflow
Authors: Bartosz Olszanski, Zbigniew Nosal, Jacek Rokicki
Abstract:
An experimental study of cold-jet (nitrogen) reaction control jet system has been carried out to investigate the flow control efficiency for low to moderate jet pressure ratios (total jet pressure p0jet over free stream static pressure in the wind tunnel p∞) and different angles of attack for infinite Mach number equal to 2. An investigation of jet influence was conducted on a flat plate geometry placed in the test section of intermittent supersonic wind tunnel of Department of Aerodynamics, WUT. Various convergent jet nozzle geometries to obtain different jet momentum ratios were tested on the same test model geometry. Surface static pressure measurements, Schlieren flow visualizations (using continuous and photoflash light source), load cell measurements gave insight into the supersonic crossflow interaction for different jet pressure and jet momentum ratios and their influence on the efficiency of side jet control as described by the amplification factor (actual to theoretical net force generated by the control nozzle). Moreover, the quasi-steady numerical simulations of flow through the same wind tunnel geometry (convergent-divergent nozzle plus test section) were performed using ANSYS Fluent basing on Reynolds-Averaged Navier-Stokes (RANS) solver incorporated with k-ω Shear Stress Transport (SST) turbulence model to assess the possible spurious influence of test section walls over the jet exit near field area of interest. The strong bow shock, barrel shock, and Mach disk as well as lambda separation region in front of nozzle were observed as images taken by high-speed camera examine the interaction of the jet and the free stream. In addition, the development of large-scale vortex structures (counter-rotating vortex pair) was detected. The history of complex static pressure pattern on the plate was recorded and compared to the force measurement data as well as numerical simulation data. The analysis of the obtained results, especially in the wake of the jet showed important features of the interaction mechanisms between the lateral jet and the flow field.Keywords: flow visualization techniques, pressure measurements, reaction control jet, supersonic cross flow
Procedia PDF Downloads 2994217 The Use of Secondary Crystallization in Cement-Based Composites
Authors: Nikol Žižková, Šárka Keprdová, Rostislav Drochytka
Abstract:
The paper focuses on the study of the properties of cement-based composites produced using secondary crystallization (crystalline additive). In this study, cement mortar made with secondary crystallization was exposed to an aggressive environment and the influence of secondary crystallization on the degradation of the cementitious composite was investigated. The results indicate that the crystalline additive contributed to increasing the resistance of the cement-based composite to the attack of the selected environments (sodium sulphate solution and ammonium chloride solution).Keywords: secondary crystallization, cement-based composites, durability, degradation of the cementitious composite
Procedia PDF Downloads 3994216 Synthesis of Carboxylate Gemini Surfactant
Authors: Rui Wang, Shanfa Tang, Yuanwu Dong, Siyao Wang
Abstract:
A carboxylate Gemini surfactant N, N`-bis (3-chloro-2 -hydroxypropane-N-dodecyl secondary amine) p-phenylenediamine diacetate sodium (GD12-P-12) was synthesized by substitution and ring-opening reaction from p-phenylenediamine, sodium chloroacetate, epichlorohydrin, and dodecylamine. The synthesis conditions were optimized by controlling variables. The structure of GD12-P-12 was characterized by FT-IR and 1H NMR, and its foam performance, interfacial tension, viscosity was evaluated. The results show that the molecular structure of the synthesized product is consistent with that of the target product, the GD12-P-12 can reduce the oil-water interfacial tension to 7.49×10⁻³mN/m (ultra-low interfacial tension level) in 20min. GD12-P-12 surfactant has excellent foam performance, ultra-low interfacial tension, good temperature-resistant viscosity-increasing properties, has good application prospect in foam flooding.Keywords: gemini surfactant, optimization of synthesis conditions, foam performance, low interfacial tension
Procedia PDF Downloads 1224215 A Flipped Classroom Approach for Non Science Majors
Authors: Nidhi Gadura
Abstract:
To ensure student success in a non majors biology course, a flipped classroom pedagogical approach is developed and implemented. All students are assigned online lectures to listen to before they come to class. A three hour lecture is split into one hour of online component, one hour of in class lecture and one hour of worksheets done by students in the classroom. This deviation from a traditional 3 hour in class lecture has resulted in increased student interest in science as well as better understanding of difficult scientific concepts. A pre and post survey was given to measure the interest rates and grades were used to measure the success rates. While the overall grade average did not change dramatically, students reported a better appreciation of biology. Also, students overwhelmingly like the use of worksheets in class to help them understand the concepts. They liked the fact that they could listen to lectures at their own pace on line and even repeat if needed. The flipped classroom approach turned out to work really well our non science majors and the author is ready to implement this in other classrooms.Keywords: flipped classroom, non science majors, pedagogy, technological pedagogical model
Procedia PDF Downloads 4184214 Characterization of Volatiles Botrytis cinerea in Blueberry Using Solid Phase Micro Extraction, Gas Chromatography Mass Spectrometry
Authors: Ahmed Auda, Manjree Agarwala, Giles Hardya, Yonglin Rena
Abstract:
Botrytis cinerea is a major pest for many plants. It can attack a wide range of plant parts. It can attack buds, flowers, and leaves, stems, and fruit. However, B. cinerea can be mixed with other diseases that cause the same damage. There are many species of botrytis and more than one different strains of each. Botrytis might infect the foliage of nursery stock stored through winter in damp conditions. There are no known resistant plants. Botrytis must have nutrients or food source before it infests the plant. Nutrients leaking from wounded plant parts or dying tissue like old flower petals give the required nutrients. From this food, the fungus becomes more attackers and invades healthy tissue. Dark to light brown rot forms in the ill tissue. High humidity conditions support the growth of this fungus. However, we suppose that selection pressure can act on the morphological and neurophysiologic filter properties of the receiver and on both the biochemical and the physiological regulation of the signal. Communication is implied when signal and receiver evolves toward more and more specific matching, culminating. In other hand, receivers respond to portions of a body odor bouquet which is released to the environment not as an (intentional) signal but as an unavoidable consequence of metabolic activity or tissue damage. Each year Botrytis species can cause considerable economic losses to plant crops. Even with the application of strict quarantine and control measures, these fungi can still find their way into crops and cause the imposition of onerous restrictions on exports. Blueberry fruit mould caused by a fungal infection usually results in major losses during post-harvest storage. Therefore, the management of infection in early stages of disease development is necessary to minimize losses. The overall purpose of this study will develop sensitive, cheap, quick and robust diagnostic techniques for the detection of B. cinerea in blueberry. The specific aim was designed to investigate the performance of volatile organic compounds (VOCs) in the detection and discrimination of blueberry fruits infected by fungal pathogens with an emphasis on Botrytis in the early storage stage of post-harvest.Keywords: botrytis cinerea, blueberry, GC/MS, VOCs
Procedia PDF Downloads 2414213 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks
Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad
Abstract:
In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.Keywords: network security, intrusion detection, honeypot, snort, nmap
Procedia PDF Downloads 5674212 Automatic Intelligent Analysis of Malware Behaviour
Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato
Abstract:
In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.Keywords: malware behaviour, modelling, parsing, search, pattern matching
Procedia PDF Downloads 3324211 Surfactant Improved Heavy Oil Recovery in Sandstone Reservoirs by Wettability Alteration
Authors: Rabia Hunky, Hayat Kalifa, Bai
Abstract:
The wettability of carbonate reservoirs has been widely recognized as an important parameter in oil recovery by flooding technology. Many surfactants have been studied for this application. However, the importance of wettability alteration in sandstone reservoirs by surfactant has been poorly studied. In this paper, our recent study of the relationship between rock surface wettability and cumulative oil recovery for sandstone cores is reported. In our research, it has been found there is a good agreement between the wettability and oil recovery. Nonionic surfactants, Tomadol® 25-12 and Tomadol® 45-13, are very effective in wettability alteration of sandstone core surface from highly oil-wet conditions to water-wet conditions. By spontaneous imbibition test, Interfacial tension, and contact angle measurement these two surfactants exhibit the highest recovery of the synthetic oil made with heavy oil. Based on these experimental results, we can further conclude that the contact angle measurement and imbibition test can be used as rapid screening tools to identify better EOR surfactants to increase heavy oil recovery from sandstone reservoirs.Keywords: EOR, oil gas, IOR, WC, IF, oil and gas
Procedia PDF Downloads 1034210 Review of Dielectric Permittivity Measurement Techniques
Authors: Ahmad H. Abdelgwad, Galal E. Nadim, Tarek M. Said, Amr M. Gody
Abstract:
The prime objective of this manuscript is to provide intensive review of the techniques used for permittivity measurements. The measurement techniques, relevant for any desired application, rely on the nature of the measured dielectric material, both electrically and physically, the degree of accuracy required, and the frequency of interest. Regardless of the way that distinctive sorts of instruments can be utilized, measuring devices that provide reliable determinations of the required electrical properties including the obscure material in the frequency range of interest can be considered. The challenge in making precise dielectric property or permittivity measurements is in designing of the material specimen holder for those measurements (RF and MW frequency ranges) and adequately modeling the circuit for reliable computation of the permittivity from the electrical measurements. If the RF circuit parameters such as the impedance or admittance are estimated appropriately at a certain frequency, the material’s permittivity at this frequency can be estimated by the equations which relate the way in which the dielectric properties of the material affect on the parameters of the circuit.Keywords: dielectric permittivity, free space measurement, waveguide techniques, coaxial probe, cavity resonator
Procedia PDF Downloads 3694209 Design a Network for Implementation a Hospital Information System
Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇
Abstract:
A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network
Procedia PDF Downloads 4404208 Stability of Stochastic Model Predictive Control for Schrödinger Equation with Finite Approximation
Authors: Tomoaki Hashimoto
Abstract:
Recent technological advance has prompted significant interest in developing the control theory of quantum systems. Following the increasing interest in the control of quantum dynamics, this paper examines the control problem of Schrödinger equation because quantum dynamics is basically governed by Schrödinger equation. From the practical point of view, stochastic disturbances cannot be avoided in the implementation of control method for quantum systems. Thus, we consider here the robust stabilization problem of Schrödinger equation against stochastic disturbances. In this paper, we adopt model predictive control method in which control performance over a finite future is optimized with a performance index that has a moving initial and terminal time. The objective of this study is to derive the stability criterion for model predictive control of Schrödinger equation under stochastic disturbances.Keywords: optimal control, stochastic systems, quantum systems, stabilization
Procedia PDF Downloads 4584207 Estimating City-Level Rooftop Rainwater Harvesting Potential with a Focus on Sustainability
Authors: Priya Madhuri P., Kamini J., Jayanthi S. C.
Abstract:
Rooftop rainwater harvesting is a crucial practice to address water scarcity, pollution, and flooding. This study aims to estimate the rooftop rainwater harvesting potential (RRWHP) for Suryapet, India, using building footprint data and average rainfall data. The study uses rainfall grids from the India Meteorological Department and Very High Resolution Satellite data to capture building footprints and calculate the RRWHP for a five-year period (2015-2020). Buildings with an area of more than 20 square meters are considered. A conservative figure of 60% efficiency for the catchment area is considered. The study chose 31,770 buildings with an effective rooftop area of around 1.56 sq. km. The city experiences annual rainfall values ranging from 791 mm to 987 mm, with August being the wettest month. The projected annual rooftop rainwater harvesting potential is 1.3 billion litres.Keywords: buildings, rooftop rainwater harvesting, sustainable water management, urban
Procedia PDF Downloads 384206 Culvert Blockage Evaluation Using Australian Rainfall And Runoff 2019
Authors: Rob Leslie, Taher Karimian
Abstract:
The blockage of cross drainage structures is a risk that needs to be understood and managed or lessened through the design. A blockage is a random event, influenced by site-specific factors, which needs to be quantified for design. Under and overestimation of blockage can have major impacts on flood risk and cost associated with drainage structures. The importance of this matter is heightened for those projects located within sensitive lands. It is a particularly complex problem for large linear infrastructure projects (e.g., rail corridors) located within floodplains where blockage factors can influence flooding upstream and downstream of the infrastructure. The selection of the appropriate blockage factors for hydraulic modeling has been subject to extensive research by hydraulic engineers. This paper has been prepared to review the current Australian Rainfall and Runoff 2019 (ARR 2019) methodology for blockage assessment by applying this method to a transport corridor brownfield upgrade case study in New South Wales. The results of applying the method are also validated against asset data and maintenance records. ARR 2019 – Book 6, Chapter 6 includes advice and an approach for estimating the blockage of bridges and culverts. This paper concentrates specifically on the blockage of cross drainage structures. The method has been developed to estimate the blockage level for culverts affected by sediment or debris due to flooding. The objective of the approach is to evaluate a numerical blockage factor that can be utilized in a hydraulic assessment of cross drainage structures. The project included an assessment of over 200 cross drainage structures. In order to estimate a blockage factor for use in the hydraulic model, a process has been advanced that considers the qualitative factors (e.g., Debris type, debris availability) and site-specific hydraulic factors that influence blockage. A site rating associated with the debris potential (i.e., availability, transportability, mobility) at each crossing was completed using the method outlined in ARR 2019 guidelines. The hydraulic results inputs (i.e., flow velocity, flow depth) and qualitative factors at each crossing were developed into an advanced spreadsheet where the design blockage level for cross drainage structures were determined based on the condition relating Inlet Clear Width and L10 (average length of the longest 10% of the debris reaching the site) and the Adjusted Debris Potential. Asset data, including site photos and maintenance records, were then reviewed and compared with the blockage assessment to check the validity of the results. The results of this assessment demonstrate that the estimated blockage factors at each crossing location using ARR 2019 guidelines are well-validated with the asset data. The primary finding of the study is that the ARR 2019 methodology is a suitable approach for culvert blockage assessment that has been validated against a case study spanning a large geographical area and multiple sub-catchments. The study also found that the methodology can be effectively coded within a spreadsheet or similar analytical tool to automate its application.Keywords: ARR 2019, blockage, culverts, methodology
Procedia PDF Downloads 3614205 Natural Hazards and Their Costs in Albanian Part of Ohrid Graben
Authors: Mentor Sulollari
Abstract:
Albania, according to (UNU-EHS) United Nations University, Institute for Environment and Human Security studies for 2015, is listed as the number one country in Europe for the possibility to be caught by natural catastrophes. This is conditioned by unstudied human activity, which has seriously damaged the environment. Albanian part of Ohrid graben that lies in Southeast of Albania, is endangered by landslides and floods, as a result of uncontrolled urban development and low level of investment in infrastructure, rugged terrain in its western part and capricious climate caused by global warming. To be dealt with natural disasters, which cause casualties and material damage, it is important to study them in order to anticipate and reduce damages in future. As part of this study is the construction of natural hazards map, which show us where they are distributed, and which are the vulnerable areas. This article will also be dealing with socio-economic and environmental costs of those events and what are the measures to be taken to reduce them.Keywords: flooding, landslides, natural catastrophes mapping, Pogradec, lake Ohrid, Albanian part of Ohrid graben
Procedia PDF Downloads 2974204 Machine Learning Driven Analysis of Kepler Objects of Interest to Identify Exoplanets
Authors: Akshat Kumar, Vidushi
Abstract:
This paper identifies 27 KOIs, 26 of which are currently classified as candidates and one as false positives that have a high probability of being confirmed. For this purpose, 11 machine learning algorithms were implemented on the cumulative kepler dataset sourced from the NASA exoplanet archive; it was observed that the best-performing model was HistGradientBoosting and XGBoost with a test accuracy of 93.5%, and the lowest-performing model was Gaussian NB with a test accuracy of 54%, to test model performance F1, cross-validation score and RUC curve was calculated. Based on the learned models, the significant characteristics for confirm exoplanets were identified, putting emphasis on the object’s transit and stellar properties; these characteristics were namely koi_count, koi_prad, koi_period, koi_dor, koi_ror, and koi_smass, which were later considered to filter out the potential KOIs. The paper also calculates the Earth similarity index based on the planetary radius and equilibrium temperature for each KOI identified to aid in their classification.Keywords: Kepler objects of interest, exoplanets, space exploration, machine learning, earth similarity index, transit photometry
Procedia PDF Downloads 754203 Entrepreneurship Education as a 21st Century Strategy for Economic Growth and Sustainable Development
Authors: M. Fems Kurotimi, Agada Franklin, Godsave Aladei, Opigo Helen
Abstract:
Within the last 30 years, entrepreneurship education (EE) has continued to gain massive interest both in the field of research and among policy makers. This surge in interest can be attributed to the perceived importance EE plays in the equipping of potential entrepreneurs and as a 21st century strategy to foster economic growth and development. This paper sets out to ascertain the correlation between EE and economic growth and development. A desk research approach was adopted where a multiplicity of literatures in the field were studied intensely. The findings reveal that indeed EE has a positive effect on entrepreneurship engagement thereby fostering economic growth and development. However, some research studies reported the contrary. That although EE may be able to equip potential entrepreneurs with requisite entrepreneurial skills and competencies, it will only be successful in producing entrepreneurs if they are internally driven to become entrepreneurs, because we cannot make people what they are not. The findings also reveal that countries that adopted EE early have more innovations inspired by entrepreneurs and are more developed than those that only recently adopted EE as a viable tool for entrepreneurship and economic development.Keywords: entrepreneurship, entrepreneurship education, economic development, economic growth, sustainable development
Procedia PDF Downloads 3364202 Teleconnection between El Nino-Southern Oscillation and Seasonal Flow of the Surma River and Possibilities of Long Range Flood Forecasting
Authors: Monika Saha, A. T. M. Hasan Zobeyer, Nasreen Jahan
Abstract:
El Nino-Southern Oscillation (ENSO) is the interaction between atmosphere and ocean in tropical Pacific which causes inconsistent warm/cold weather in tropical central and eastern Pacific Ocean. Due to the impact of climate change, ENSO events are becoming stronger in recent times, and therefore it is very important to study the influence of ENSO in climate studies. Bangladesh, being in the low-lying deltaic floodplain, experiences the worst consequences due to flooding every year. To reduce the catastrophe of severe flooding events, non-structural measures such as flood forecasting can be helpful in taking adequate precautions and steps. Forecasting seasonal flood with a longer lead time of several months is a key component of flood damage control and water management. The objective of this research is to identify the possible strength of teleconnection between ENSO and river flow of Surma and examine the potential possibility of long lead flood forecasting in the wet season. Surma is one of the major rivers of Bangladesh and is a part of the Surma-Meghna river system. In this research, sea surface temperature (SST) has been considered as the ENSO index and the lead time is at least a few months which is greater than the basin response time. The teleconnection has been assessed by the correlation analysis between July-August-September (JAS) flow of Surma and SST of Nino 4 region of the corresponding months. Cumulative frequency distribution of standardized JAS flow of Surma has also been determined as part of assessing the possible teleconnection. Discharge data of Surma river from 1975 to 2015 is used in this analysis, and remarkable increased value of correlation coefficient between flow and ENSO has been observed from 1985. From the cumulative frequency distribution of the standardized JAS flow, it has been marked that in any year the JAS flow has approximately 50% probability of exceeding the long-term average JAS flow. During El Nino year (warm episode of ENSO) this probability of exceedance drops to 23% and while in La Nina year (cold episode of ENSO) it increases to 78%. Discriminant analysis which is known as 'Categoric Prediction' has been performed to identify the possibilities of long lead flood forecasting. It has helped to categorize the flow data (high, average and low) based on the classification of predicted SST (warm, normal and cold). From the discriminant analysis, it has been found that for Surma river, the probability of a high flood in the cold period is 75% and the probability of a low flood in the warm period is 33%. A synoptic parameter, forecasting index (FI) has also been calculated here to judge the forecast skill and to compare different forecasts. This study will help the concerned authorities and the stakeholders to take long-term water resources decisions and formulate policies on river basin management which will reduce possible damage of life, agriculture, and property.Keywords: El Nino-Southern Oscillation, sea surface temperature, surma river, teleconnection, cumulative frequency distribution, discriminant analysis, forecasting index
Procedia PDF Downloads 1544201 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2684200 Identification of Shocks from Unconventional Monetary Policy Measures
Authors: Margarita Grushanina
Abstract:
After several prominent central banks including European Central Bank (ECB), Federal Reserve System (Fed), Bank of Japan and Bank of England employed unconventional monetary policies in the aftermath of the financial crisis of 2008-2009 the problem of identification of the effects from such policies became of great interest. One of the main difficulties in identification of shocks from unconventional monetary policy measures in structural VAR analysis is that they often are anticipated, which leads to a non-fundamental MA representation of the VAR model. Moreover, the unconventional monetary policy actions may indirectly transmit to markets information about the future stance of the interest rate, which raises a question of the plausibility of the assumption of orthogonality between shocks from unconventional and conventional policy measures. This paper offers a method of identification that takes into account the abovementioned issues. The author uses factor-augmented VARs to increase the information set and identification through heteroskedasticity of error terms and rank restrictions on the errors’ second moments’ matrix to deal with the cross-correlation of the structural shocks.Keywords: factor-augmented VARs, identification through heteroskedasticity, monetary policy, structural VARs
Procedia PDF Downloads 3484199 The Role of Law Corruption and Culture in Investment Fund Manager Fees
Authors: Samir Assal
Abstract:
This paper considers an international sample of venture capital and private equity funds to assess the role of law, corruption and culture in setting fund manager fees in terms of their fixed management fees, carried interest performance fees, clawbacks of fees and cash versus share distributions of fees. The data highlight a role of legal conditions in shaping fees paid to fund managers. In countries with better legal conditions, fixed fees are lower, carried interest fees are higher, clawbacks are less likely, and share distributions are more likely. These findings suggest legal conditions help to align the interests of managers and shareholders. More specifically, we examine which element of legal conditions matter most, and discover that corruption levels play a pronounced role in shaping fund manager fee contracts. We also show that cultural forces such as Hofstede’s measures of power distance and uncertainty avoidance likewise play a role in influencing fees.Keywords: managerial compensation, incentive contracts, private equity, law and finance
Procedia PDF Downloads 3094198 A Case Study Approach to the Rate the Eco Sensitivity of Green Infrastructure Solutions
Abstract:
In the area of civil infrastructure, there is an urgent need to apply technologies that deliver infrastructure sustainably in a way that is cost-effective. Civil engineering projects can have a significant impact on ecological and social systems if not correctly planned, designed and implemented. It can impact climate change by addressing the issue of flooding and sustainability. Poor design choices now can result in future generations to live in a climate with depleted resources and without green spaces. The objectives of the research study were to rate the sensitivity of various greener infrastructure technologies that can be used in township infrastructure, at the various stages of the project. This paper discusses the Green Township Infrastructure Design Toolkit, that is used to rate the sustainability of infrastructure service projects. Various case studies were undertaken on a range of infrastructure projects to test the sensitivity of various design solution against sustainability criteria. The Green reporting tools ensure efficient, economical and sustainable provision of infrastructure services.Keywords: eco-efficiency, green infrastructure, green technology, infrastructure design, sustainable development
Procedia PDF Downloads 382