Search results for: interest flooding attack
4197 Pioneer Synthesis and Characterization of Boron Containing Hard Materials
Authors: Gülşah Çelik Gül, Figen Kurtuluş
Abstract:
The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction
Procedia PDF Downloads 5934196 Stabilization of Rotational Motion of Spacecrafts Using Quantized Two Torque Inputs Based on Random Dither
Authors: Yusuke Kuramitsu, Tomoaki Hashimoto, Hirokazu Tahara
Abstract:
The control problem of underactuated spacecrafts has attracted a considerable amount of interest. The control method for a spacecraft equipped with less than three control torques is useful when one of the three control torques had failed. On the other hand, the quantized control of systems is one of the important research topics in recent years. The random dither quantization method that transforms a given continuous signal to a discrete signal by adding artificial random noise to the continuous signal before quantization has also attracted a considerable amount of interest. The objective of this study is to develop the control method based on random dither quantization method for stabilizing the rotational motion of a rigid spacecraft with two control inputs. In this paper, the effectiveness of random dither quantization control method for the stabilization of rotational motion of spacecrafts with two torque inputs is verified by numerical simulations.Keywords: spacecraft control, quantized control, nonlinear control, random dither method
Procedia PDF Downloads 1804195 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 3854194 Identification of Information War in Lithuania
Authors: Vitalijus Leibenka
Abstract:
After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia
Procedia PDF Downloads 624193 Absence of Arbitrator Duty of Disclosure under the English Arbitration Act 1996
Authors: Qusai Alshahwan
Abstract:
The arbitrator’s duties of independence and impartiality play a significant role in delivering arbitral awards which legitimate the fundamental of arbitration concepts. For this reason, the international and national arbitration rules require arbitrators to be independent and impartial to solve the arbitration disputes fairly between the parties. However, solving the disputes fairly also requires arbitrators to disclose any existing conflicts of interest with the parties to avoid misunderstanding and late challenges. In contrary with the international and national arbitration rules, the English Arbitration Act 1996 does not include independence as a separate ground for arbitrator’s removal, and importantly the English Arbitration Act 1996 is deliberately silent to the arbitrator duty of disclosure. The absence of arbitrator duty of disclosure is an issue had generated uncertainty and concerns for the arbitration community under the English jurisdiction, particularly when the English courts rejected the IBA guidelines of arbitrator conflict of interest such as in case of Halliburton v Chubb for example. This article is highlighting on the legal consequences of the absence of arbitrator duty of disclosure under the English Arbitration Act 1996 and the arbitrator's contractual obligations.Keywords: arbitration, impartiality, independence, duty of disclosure, English Arbitration Act 1996
Procedia PDF Downloads 1314192 Hominin Niche in the Times of Climate Change
Authors: Emilia Hunt, Sally C. Reynolds, Fiona Coward, Fabio Parracho Silva, Philip Hopley
Abstract:
Ecological niche modeling is widely used in conservation studies, but application to the extinct hominin species is a relatively new approach. Being able to understand what ecological niches were occupied by respective hominin species provides a new perspective into influences on evolutionary processes. Niche separation or overlap can tell us more about specific requirements of the species within the given timeframe. Many of the ancestral species lived through enormous climate changes: glacial and interglacial periods, changes in rainfall, leading to desertification or flooding of regions and displayed impressive levels of adaptation necessary for their survival. This paper reviews niche modeling methodologies and their application to hominin studies. Traditional conservation methods might not be directly applicable to extinct species and are not comparable to hominins. Hominin niche also includes aspects of technologies, use of fire and extended communication, which are not traditionally used in building conservation models. Future perspectives on how to improve niche modeling for extinct hominin species will be discussed.Keywords: hominin niche, climate change, evolution, adaptation, ecological niche modelling
Procedia PDF Downloads 1894191 Application of Flory Paterson’s Theory on the Volumetric Properties of Liquid Mixtures: 1,2-Dichloroethane with Aliphatic and Cyclic Ethers
Authors: Linda Boussaid, Farid Brahim Belaribi
Abstract:
The physico-chemical properties of liquid materials in the industrial field, in general, and in that of the chemical industries, in particular, constitutes a prerequisite for the design of equipment, for the resolution of specific problems (related to the techniques of purification and separation, at risk in the transport of certain materials, etc.) and, therefore, at the production stage. Chloroalkanes, ethers constitute three chemical families having an industrial, theoretical and environmental interest. For example, these compounds are used in various applications in the chemical and pharmaceutical industries. In addition, they contribute to the particular thermodynamic behavior (deviation from ideality, association, etc.) of certain mixtures which constitute a severe test for predictive theoretical models. Finally, due to the degradation of the environment in the world, a renewed interest is observed for ethers, because some of their physicochemical properties could contribute to lower pollution (ethers would be used as additives in aqueous fuels.). This work is a thermodynamic, experimental and theoretical study of the volumetric properties of liquid binary systems formed from compounds belonging to the chemical families of chloroalkanes, ethers, having an industrial, theoretical and environmental interest. Experimental determination of the densities and excess volumes of the systems studied, at different temperatures in the interval [278.15-333.15] K and at atmospheric pressure, using an AntonPaar vibrating tube densitometer of the DMA5000 type. This contribution of experimental data, on the volumetric properties of the binary liquid mixtures of 1,2-dichloroethane with an ether, supplemented by an application of the theoretical model of Prigogine-Flory-Patterson PFP, will probably contribute to the enrichment of the thermodynamic database and the further development of the theory of Flory in its Prigogine-Flory-Patterson (PFP) version, for a better understanding of the thermodynamic behavior of these liquid binary mixturesKeywords: prigogine-flory-patterson (pfp), propriétés volumétrique , volume d’excés, ethers
Procedia PDF Downloads 914190 Major Mechanisms of Atmospheric Moisture Transport and Their Role in Precipitation Extreme Events in the Amazonia
Authors: Luis Gimeno, Rosmeri da Rocha, Raquel Nieto, Tercio Ambrizzi, Alex Ramos, Anita Drumond
Abstract:
The transport of moisture from oceanic sources to the continents represents the atmospheric branch of the water cycle, forming the connection between evaporation from the ocean and precipitation over the continents. In this regard two large scale dynamical/meteorological structures appear to play a key role, namely Low Level Jet (LLJ) systems and Atmospheric Rivers (ARs). The former are particularly important in tropical and subtropical regions; the latter is mostly confined to extratropical regions. A key question relates to the anomalies in the transport of moisture observed during natural hazards related to extremes of precipitation (i.e., drought or wet spells). In this study we will be focused on these two major atmospheric moisture transport mechanisms (LLJs and ARs) and its role in precipitation extreme events (droughts and wet spells) in the Amazonia paying particular attention to i) intensification (decreasing) of moisture transport by them and its role in wet spells (droughts), and ii) changes in their positions and occurrence with associated flooding and wet spells.Keywords: droughts, wet spells, amazonia, LLJs, atmospheric rivers
Procedia PDF Downloads 3024189 CE Method for Development of Japan's Stochastic Earthquake Catalogue
Authors: Babak Kamrani, Nozar Kishi
Abstract:
Stochastic catalog represents the events module of the earthquake loss estimation models. It includes series of events with different magnitudes and corresponding frequencies/probabilities. For the development of the stochastic catalog, random or uniform sampling methods are used to sample the events from the seismicity model. For covering all the Magnitude Frequency Distribution (MFD), a huge number of events should be generated for the above-mentioned methods. Characteristic Event (CE) method chooses the events based on the interest of the insurance industry. We divide the MFD of each source into bins. We have chosen the bins based on the probability of the interest by the insurance industry. First, we have collected the information for the available seismic sources. Sources are divided into Fault sources, subduction, and events without specific fault source. We have developed the MFD for each of the individual and areal source based on the seismicity of the sources. Afterward, we have calculated the CE magnitudes based on the desired probability. To develop the stochastic catalog, we have introduced uncertainty to the location of the events too.Keywords: stochastic catalogue, earthquake loss, uncertainty, characteristic event
Procedia PDF Downloads 2994188 Pulsatile Drug Delivery System for Chronopharmacological Disorders
Authors: S. S. Patil, B. U. Janugade, S. V. Patil
Abstract:
Pulsatile systems are gaining a lot of interest as they deliver the drug at the right site of action at the right time and in the right amount, thus providing spatial and temporal delivery thus increasing patient compliance. These systems are designed according to the circadian rhythm of the body. Chronotherapeutics is the discipline concerned with the delivery of drugs according to inherent activities of a disease over a certain period of time. It is becoming increasingly more evident that the specific time that patients take their medication may be even more significant than was recognized in the past. The tradition of prescribing medication at evenly spaced time intervals throughout the day, in an attempt to maintain constant drug levels throughout a 24-hour period, may be changing as researcher’s report that some medications may work better if their administration is coordinated with day-night patterns and biological rhythms. The potential benefits of chronotherapeutics have been demonstrated in the management of a number of diseases. In particular, there is a great deal of interest in how chronotherapy can particularly benefit patients suffering from allergic rhinitis, rheumatoid arthritis and related disorders, asthma, cancer, cardiovascular diseases, and peptic ulcer disease.Keywords: pulsatile drug delivery, chronotherapeutics, circadian rhythm, asthma, chronobiology
Procedia PDF Downloads 3654187 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 2284186 Numerical Investigation of Multiphase Flow in Pipelines
Authors: Gozel Judakova, Markus Bause
Abstract:
We present and analyze reliable numerical techniques for simulating complex flow and transport phenomena related to natural gas transportation in pipelines. Such kind of problems are of high interest in the field of petroleum and environmental engineering. Modeling and understanding natural gas flow and transformation processes during transportation is important for the sake of physical realism and the design and operation of pipeline systems. In our approach a two fluid flow model based on a system of coupled hyperbolic conservation laws is considered for describing natural gas flow undergoing hydratization. The accurate numerical approximation of two-phase gas flow remains subject of strong interest in the scientific community. Such hyperbolic problems are characterized by solutions with steep gradients or discontinuities, and their approximation by standard finite element techniques typically gives rise to spurious oscillations and numerical artefacts. Recently, stabilized and discontinuous Galerkin finite element techniques have attracted researchers’ interest. They are highly adapted to the hyperbolic nature of our two-phase flow model. In the presentation a streamline upwind Petrov-Galerkin approach and a discontinuous Galerkin finite element method for the numerical approximation of our flow model of two coupled systems of Euler equations are presented. Then the efficiency and reliability of stabilized continuous and discontinous finite element methods for the approximation is carefully analyzed and the potential of the either classes of numerical schemes is investigated. In particular, standard benchmark problems of two-phase flow like the shock tube problem are used for the comparative numerical study.Keywords: discontinuous Galerkin method, Euler system, inviscid two-fluid model, streamline upwind Petrov-Galerkin method, twophase flow
Procedia PDF Downloads 3294185 Analysing Stem Student Interests in Developing Critical Thinking Skills in Pakistan
Authors: Muhammad Ramzan
Abstract:
STEM Education and Critical Thinking Skills are important 21st-century skills. STEM Education is necessary to promote secondary school students’ critical thinking skills. These skills are critical for teachers to respond to students. Pakistan is in the preliminary stages of integrating STEM Education in institutions like other developing countries. Unfortunately, most secondary school students in Pakistan are unaware of STEM Education and teachers are not applying critical thinking skills in classrooms. The study's objectives mainly deal with; to identify the importance of STEM Education in the teaching-learning process; to find out the factors affecting critical thinking skills that can develop interest in students in STEM Education and suggestions on how to improve critical thinking skills in students regarding STEM Education. This study was descriptive. The population of the study was secondary school students. Data was collected from 200 secondary school students through a questionnaire. The research results show that critical thinking skills develop interest in students towards STEM Education.Keywords: STEM education, teachers, students, critical thinking skills, teaching and learning process
Procedia PDF Downloads 444184 Life in Bequia in the Era of Climate Change: Societal Perception of Adaptation and Vulnerability
Authors: Sherry Ann Ganase, Sandra Sookram
Abstract:
This study examines adaptation measures and factors that influence adaptation decisions in Bequia by using multiple linear regression and a structural equation model. Using survey data, the results suggest that households are knowledgeable and concerned about climate change but lack knowledge about the measures needed to adapt. The findings from the SEM suggest that a positive relationship exist between vulnerability and adaptation, vulnerability and perception, along with a negative relationship between perception and adaptation. This suggests that being aware of the terms associated with climate change and knowledge about climate change is insufficient for implementing adaptation measures; instead the risk and importance placed on climate change, vulnerability experienced with household flooding, drainage and expected threat of future sea level are the main factors that influence the adaptation decision. The results obtained in this study are beneficial to all as adaptation requires a collective effort by stakeholders.Keywords: adaptation, Bequia, multiple linear regression, structural equation model
Procedia PDF Downloads 4634183 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review
Authors: M. Cortés, E. Vera, M. Avella
Abstract:
Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites
Procedia PDF Downloads 4444182 An Exploration of the Effects of Individual and Interpersonal Factors on Saudi Learners' Motivation to Learn English as a Foreign Language
Authors: Fakieh Alrabai
Abstract:
This paper presents an experimental study designed to explore some of the learner’s individual and interpersonal factors (e.g. persistence, interest, regulation, satisfaction, appreciation, etc.) that Saudi learners experience when learning English as a Foreign Language and how learners’ perceptions of these factors influence various aspects of their motivation to learn English language. As part of the study, a 27-item structured survey was administered to a randomly selected sample of 105 Saudi learners from public schools and universities. Data collected through the survey were subjected to some basic statistical analyses, such as "mean" and "standard deviation". Based on the results from the analysis, a number of generalizations and conclusions are made in relation to how these inherent factors affect Saudi learners’ motivation to learn English as a foreign language. In addition, some recommendations are offered to Saudi academics on how to effectively make use of such factors, which may enable Saudi teachers and learners of English as a foreign language to achieve better learning outcomes in an area widely associated by Saudis with lack of success.Keywords: persistence, interest, appreciation, satisfaction, SL/FL motivation
Procedia PDF Downloads 4164181 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 4324180 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy
Abstract:
In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack
Procedia PDF Downloads 3944179 Non-Standard Monetary Policy Measures and Their Consequences
Authors: Aleksandra Nocoń (Szunke)
Abstract:
The study is a review of the literature concerning the consequences of non-standard monetary policy, which are used by central banks during unconventional periods, threatening instability of the banking sector. In particular, the attention was paid to the effects of non-standard monetary policy tools for financial markets. However, the empirical evidence about their effects and real consequences for the financial markets are still not final. The main aim of the study is to survey the consequences of standard and non-standard monetary policy instruments, implemented during the global financial crisis in the United States, United Kingdom and Euroland, with particular attention to the results for the stabilization of global financial markets. The study analyses the consequences for short and long-term market interest rates, interbank interest rates and LIBOR-OIS spread. The study consists mainly of the empirical review, indicating the impact of the implementation of these tools for the financial markets. The following research methods were used in the study: literature studies, including domestic and foreign literature, cause and effect analysis and statistical analysis.Keywords: asset purchase facility, consequences of monetary policy instruments, non-standard monetary policy, quantitative easing
Procedia PDF Downloads 3314178 Analysis of Rainfall Hazard in North East of Algeria
Authors: Imene Skhakhfa, Lahbaci Ouerdachi
Abstract:
The design of sewerage systems is directly related to rainfall, which has a highly random character. Showers are usually described by three characteristics: intensity, volume and duration. Several studies considered only in two of the three models. The objective of our work is to perform an analysis of the impact of three variables on put in charge of sewerage system, responsible for misbehavior, origin of urban flooding. 30 events were considered events for the longest, most rushed and most intense period which runs from 1986 -2001. We built the IDF curves and heavy projects double symmetrical triangles associated with this selection. A simulation of the operation, with the model canoe, sewage from the city of Annaba (Algeria) in the three rain solicitation project, double triangles associated with events considered. It appears that the sewage of the city of Annaba, in terms of charging, is much more sensitive to rain most precipitous, and the more intense causing loadings and last the longest. Further analysis of all the rain and the field measurements are underway to confirm the test simulations.Keywords: intensity, volume, duration, sewerage, design, simulation
Procedia PDF Downloads 4454177 Swarm Optimization of Unmanned Vehicles and Object Localization
Authors: Venkataramana Sovenahalli Badigar, B. M. Suryakanth, Akshar Prasanna, Karthik Veeramalai, Vishwak Ram Vishwak Ram
Abstract:
Technological advances have led to widespread autonomy in vehicles. Empowering these autonomous with the intelligence to cooperate amongst themselves leads to a more efficient use of the resources available to them. This paper proposes a demonstration of a swarm algorithm implemented on a group of autonomous vehicles. The demonstration involves two ground bots and an aerial drone which cooperate amongst them to locate an object of interest. The object of interest is modelled using a high-intensity light source which acts as a beacon. The ground bots are light sensitive and move towards the beacon. The ground bots and the drone traverse in random paths and jointly locate the beacon. This finds application in various scenarios in where human interference is difficult such as search and rescue during natural disasters, delivering crucial packages in perilous situations, etc. Experimental results show that the modified swarm algorithm implemented in this system has better performance compared to fully random based moving algorithm for object localization and tracking.Keywords: swarm algorithm, object localization, ground bots, drone, beacon
Procedia PDF Downloads 2574176 Methodology for Obtaining Food Licenses in India
Authors: Rathna Malhotra Gaur
Abstract:
Owing to multiplicity and competition in the Indian food industry, it was always important for the government of India to bring in reforms that would protect the interest of the consumer and also the food operator. To further this objective, Food Safety, and Standards Act, 2006 (hereinafter referred to as FSSAI) was enacted for laying down science-based standards for articles and food and to regulate their storage, distribution, manufacture, same and import and to ensure safe food availability to the citizens of India. One of the safeguards towards consumer interest is the enactment of Food Safety and Standards (Licensing and Registration of Food Businesses, Regulation, 2011 within the mandate of FSSAI. It is mandatory for every food operator in India to get the registration certificate and procurement of food Licenses before starting operations in the country. All the nuances pertaining to the procurement of licenses are dealt with under these regulations. These regulations also lay down detailed provisions with regard to the conditions that the operator has to adhere to once the License is procured, going to the integrities of the safety and hygiene standards to be maintained by the food operators. This paper is an exhaustive effort to examine the provisions of obtaining the registration and License in India and the conditions that need to be fulfilled subsequently and further on the validity and renewal of these Food Licenses.Keywords: food laws, food licenses, food registration, penalty
Procedia PDF Downloads 1774175 Coronavirus Academic Paper Sorting Application
Authors: Christina A. van Hal, Xiaoqian Jiang, Luyao Chen, Yan Chu, Robert D. Jolly, Yaobin Lin, Jitian Zhao, Kang Lin Hsieh
Abstract:
The COVID-19 Literature Summary App was created for the primary purpose of enabling academicians and clinicians to quickly sort through the vast array of recent coronavirus publications by topics of interest. Multiple methods of summarizing and sorting the manuscripts were created. A summary page introduces the application function and capabilities, while an interactive map provides daily updates on infection, death, and recovery rates. A page with a pivot table allows publication sorting by topic, with an interactive data table that allows sorting topics by columns, as wells as the capability to view abstracts. Additionally, publications may be sorted by the medical topics they cover. We used the CORD-19 database to compile lists of publications. The data table can sort binary variables, allowing the user to pick desired publication topics, such as papers that describe COVID-19 symptoms. The application is primarily designed for use by researchers but can be used by anybody who wants a faster and more efficient means of locating papers of interest.Keywords: COVID-19, literature summary, information retrieval, Snorkel
Procedia PDF Downloads 1524174 The Politics and Consequences of Decentralized Vocational Education: The Modified System of Vocational Studies in Ghana
Authors: Nkrumak Micheal Atta Ofori
Abstract:
The Vocational System is a decentralized Studies System implemented in Ghana as vocation studies strategy for grassroot that focuses on providing individuals with the specific skills, knowledge, and training necessary for a particular trade, craft, profession, or occupation. This article asks how devolution of vocational studies to local level authorities produces responsive and accountable representation and sustainable vocational learning under the vocational Studies System. It focuses on two case studies: Asokore Mampong and Atwima kwanwoma Municipal. Then, the paper asks how senior high school are developing new material and social practices around the vocational studies System to rebuild their livelihoods and socio-economic wellbeing. Here, the article focusses on Kumasi District, drawing lessons for the two other cases. The article shows how the creation of representative groups under the Vocational Studies System provides the democratic space necessary for effective representation of community aspirations. However, due to elite capture, the interests of privilege few people are promoted. The state vocational training fails to devolve relevant and discretionary resources to local teachers and do not follow the prescribed policy processes of the Vocational Studies System. Hence, local teachers are unable to promote responsive and accountable representation. Rural communities continue to show great interest in the Vocational Studies System, but the interest is bias towards gaining access to vocational training schools for advancing studies. There is no active engagement of the locals in vocational training, and hence, the Vocational Studies System exists only to promote individual interest of communities. This article shows how ‘failed’ interventions can gain popular support for rhetoric and individual gains.Keywords: vocational studies system, devolution of vocational studies, local-level authorities, senior high schools and vocational learning, community aspirations and representation
Procedia PDF Downloads 784173 On the Evaluation of Different Turbulence Models through the Displacement of Oil-Water Flow in Porous Media
Authors: Sidique Gawusu, Xiaobing Zhang
Abstract:
Turbulence models play a significant role in all computational fluid dynamics based modelling approaches. There is, however, no general turbulence model suitable for all flow scenarios. Therefore, a successful numerical modelling approach is only achievable if a more appropriate closure model is used. This paper evaluates different turbulence models in numerical modelling of oil-water flow within the Eulerian-Eulerian approach. A comparison among the obtained numerical results and published benchmark data showed reasonable agreement. The domain was meshed using structured mesh, and grid test was performed to ascertain grid independence. The evaluation of the models was made through analysis of velocity and pressure profiles across the domain. The models were tested for their suitability to accurately obtain a scalable and precise numerical experience. As a result, it is found that all the models except Standard-ω provide comparable results. The study also revealed new insights on flow in porous media, specifically oil reservoirs.Keywords: turbulence modelling, simulation, multi-phase flows, water-flooding, heavy oil
Procedia PDF Downloads 2794172 Net Fee and Commission Income Determinants of European Cooperative Banks
Authors: Karolína Vozková, Matěj Kuc
Abstract:
Net fee and commission income is one of the key elements of a bank’s core income. In the current low-interest rate environment, this type of income is gaining importance relative to net interest income. This paper analyses the effects of bank and country specific determinants of net fee and commission income on a set of cooperative banks from European countries in the 2007-2014 period. In order to do that, dynamic panel data methods (system Generalized Methods of Moments) were employed. Subsequently, alternative panel data methods were run as robustness checks of the analysis. Strong positive impact of bank concentration on the share of net fee and commission income was found, which proves that cooperative banks tend to display a higher share of fee income in less competitive markets. This is probably connected with the fact that they stick with their traditional deposit-taking and loan-providing model and fees on these services are driven down by the competitors. Moreover, compared to commercial banks, cooperatives do not expand heavily into non-traditional fee bearing services under competition and their overall fee income share is therefore decreasing with the increased competitiveness of the sector.Keywords: cooperative banking, dynamic panel data models, net fee and commission income, system GMM
Procedia PDF Downloads 3304171 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1244170 The Study of Flood Resilient House in Ebo-Town
Authors: Alagie Salieu Nankey
Abstract:
Flood-resistant house is the key mechanism to withstand flood hazards in Ebo-Town. It emerged simple yet powerful way of mitigating flooding in the community of Ebo- Town. Even though there are different types of buildings, little is known yet how and why flood affects building severely. In this paper, we examine three different types of flood-resistant buildings that are suitable for Ebo Town. We gather content and contextual features from six (6) respondents and used this data set to identify factors that are significantly associated with the flood-resistant house. Moreover, we built a suitable design concept. We found that amongst all the theories studied in the literature study Slit or Elevated House is the most suitable building design in Ebo-Town and Pile foundation is the most appropriate foundation type in the study area. Amongst contextual features, local materials are the most economical materials for the proposed design. This research proposes a framework that explains the theoretical relationships between flood hazard zones and flood-resistant houses in Ebo Town. Moreover, this research informs the design of sense-making and analytics tools for the resistant house.Keywords: flood-resistant, slit, flood hazard zone, pile foundation
Procedia PDF Downloads 444169 Phone Number Spoofing Attack in VoLTE
Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 5224168 Insights into Archaeological Human Sample Microbiome Using 16S rRNA Gene Sequencing
Authors: Alisa Kazarina, Guntis Gerhards, Elina Petersone-Gordina, Ilva Pole, Viktorija Igumnova, Janis Kimsis, Valentina Capligina, Renate Ranka
Abstract:
Human body is inhabited by a vast number of microorganisms, collectively known as the human microbiome, and there is a tremendous interest in evolutionary changes in human microbial ecology, diversity and function. The field of paleomicrobiology, study of ancient human microbiome, is powered by modern techniques of Next Generation Sequencing (NGS), which allows extracting microbial genomic data directly from archaeological sample of interest. One of the major techniques is 16S rRNA gene sequencing, by which certain 16S rRNA gene hypervariable regions are being amplified and sequenced. However, some limitations of this method exist including the taxonomic precision and efficacy of different regions used. The aim of this study was to evaluate the phylogenetic sensitivity of different 16S rRNA gene hypervariable regions for microbiome studies in the archaeological samples. Towards this aim, archaeological bone samples and corresponding soil samples from each burial environment were collected in Medieval cemeteries in Latvia. The Ion 16S™ Metagenomics Kit targeting different 16S rRNA gene hypervariable regions was used for library construction (Ion Torrent technologies). Sequenced data were analysed by using appropriate bioinformatic techniques; alignment and taxonomic representation was done using Mothur program. Sequences of most abundant genus were further aligned to E. coli 16S rRNA gene reference sequence using MEGA7 in order to identify the hypervariable region of the segment of interest. Our results showed that different hypervariable regions had different discriminatory power depending on the groups of microbes, as well as the nature of samples. On the basis of our results, we suggest that wider range of primers used can provide more accurate recapitulation of microbial communities in archaeological samples. Acknowledgements. This work was supported by the ERAF grant Nr. 1.1.1.1/16/A/101.Keywords: 16S rRNA gene, ancient human microbiome, archaeology, bioinformatics, genomics, microbiome, molecular biology, next-generation sequencing
Procedia PDF Downloads 190