Search results for: application attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8626

Search results for: application attack

8026 The Effectiveness of First World Asylum Practices in Deterring Applications, Offering Bureaucratic Deniability, and Violating Human Rights: A Greek Case Study

Authors: Claudia Huerta, Pepijn Doornenbal, Walaa Elsiddig

Abstract:

Rising waves of nationalism around the world have led first-world migration receiving countries to exploit the ambiguity of international refugee law and establish asylum application processes that deter applications, allow for bureaucratic deniability, and violate human rights. This case study of Greek asylum application practices argues that the 'pre-application' asylum process in Greece violates the spirit of international law by making it incredibly difficult for potential asylum seekers to apply for asylum, in essence violating the human rights of thousands of asylum seekers. This study’s focus is on the Greek mainland’s asylum 'pre-application' process, which in 2016 began to require those wishing to apply for asylum to do so during extremely restricted hours via a basic Skype line. The average wait to simply begin the registration process to apply for asylum is 81 days, during which time applicants are forced to live illegally in Greece. This study’s methodology in analyzing the 'pre-application' process consists of hours of interviews with asylum seekers, NGOs, and the Asylum Service office on the ground in Athens, as well as an analysis of the Greek Asylum Service historical asylum registration statistics. This study presents three main findings: the delays associated with the Skype system in Greece are the result of system design, as proven by a statistical analysis of Greek asylum registrations, NGOs have been co-opted by the state to perform state functions during the process, and the government’s use of technology is both purposefully lazy and discriminatory. In conclusion, the study argues that such asylum practices are part of a pattern of first-world migration receiving countries policies’ which discourage asylum seekers from applying and fall short of the standards in international law.

Keywords: asylum, European Union, governance, Greece, irregular, migration, policy, refugee, Skype

Procedia PDF Downloads 115
8025 Effectiveness of a Communication Training on Workplace Bullying Using Mobile Phone Application for Nurses

Authors: Jiyeon Kang, Yeon Jin Jeong, Hoon Heo

Abstract:

Purpose: Bullying in nursing workplace has been a serious problem that increases the turnover of nurses. Few studies have examined the effects of communication training on workplace bullying for nurses, and all used a single-group design and a small sample size. Thus, more rigorous research has been needed to evaluate the effects properly. This research was aimed to identify the effects of the mobile type communication training of responses on bullying behaviors among nurses. Methods: A randomized controlled trial was performed. Subjects were 62 critical care nurses working in university hospitals in Busan, South Korea. We developed a mobile phone application to train nurses to deal with bullying situation. This application includes 6 common bullying situations and appropriate empathetic communication (non-violent communication) samples in the form of webtoons. The experimental group used this application for 4 weeks, and we measured interpersonal relationship, workplace bullying, symptom experience, and intention to leave before, post, and 8 weeks after the intervention from both experimental and control groups. The effect of the intervention was analyzed using repeated measures ANOVA. Results: The mobile type communication training developed in this study was effective for decreasing nurses’ intention to leave workplace (F = 5.11, p = .027). However, it had no effect on interpersonal relationship (F = 2.54, p = .116), workplace bullying (F = 2.99, p = .089) or symptom experience (F = 2.81, p = .099). The beneficial effects on intention to leave lasted at least up to 4 weeks after the training. Conclusion: The mobile type communication training can be utilized as an effective personal coping strategy for workplace bullying among nurses. Further studies on the long-term effects of the communication training are necessary.

Keywords: bullying, communication, mobile applications, nurses, training, workplace

Procedia PDF Downloads 322
8024 Application of Benford's Law in Analysis of Frankfurt Stock Exchange Index (DAX) Percentage Changes

Authors: Mario Zgela

Abstract:

Application of Benford’s Law is very rarely covered in the field of stock market analysis, especially in percentage change of stock market indices. Deutscher Aktien IndeX (DAX) is very important stock market index of Frankfurt Deutsche Börse which serves as underlying basis for large number of financial instruments. It is calculated for selected 30 German blue chips stocks. In this paper, Benford's Law first digit test is applied on 10 year DAX daily percentage changes in order to check compliance. Deviations of 10 year DAX percentage changes set as well as distortions of certain subsets from Benford's Law distribution are detected. It is possible that deviations are the outcome of speculations; and psychological influence should not be eliminated.

Keywords: Benford's Law, DAX, index percentage changes, stock market

Procedia PDF Downloads 276
8023 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Saaid, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, experimental investigation, aerodynamic performance

Procedia PDF Downloads 419
8022 Facebook Spam and Spam Filter Using Artificial Neural Networks

Authors: A. Fahim, Mutahira N. Naseem

Abstract:

SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.

Keywords: artificial neural networks, facebook spam, social networking sites, spam filter

Procedia PDF Downloads 363
8021 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

Authors: Michaela Vašková

Abstract:

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.

Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event

Procedia PDF Downloads 416
8020 Exploring Smartphone Applications for Enhancing Second Language Vocabulary Learning

Authors: Abdulmajeed Almansour

Abstract:

Learning a foreign language with the assistant of technological tools has become an interest of learners and educators. Increased use of smartphones among undergraduate students has made them popular for not only social communication but also for entertainment and educational purposes. Smartphones have provided remarkable advantages in language learning process. Learning vocabulary is an important part of learning a language. The use of smartphone applications for English vocabulary learning provides an opportunity for learners to improve vocabulary knowledge beyond the classroom wall anytime anywhere. Recently, various smartphone applications were created specifically for vocabulary learning. This paper aims to explore the use of smartphone application Memrise designed for vocabulary learning to enhance academic vocabulary among undergraduate students. It examines whether the use of a Memrise smartphone application designed course enhances the academic vocabulary learning among ESL learners. The research paradigm used in this paper followed a mixed research model combining quantitative and qualitative research. The study included two hundred undergraduate students randomly assigned to the experimental and controlled group during the first academic year at the Faculty of English Language, Imam University. The research instruments included an attitudinal questionnaire and an English vocabulary pre-test administered to students at the beginning of the semester whereas post-test and semi-structured interviews administered at the end of the semester. The findings of the attitudinal questionnaire revealed a positive attitude towards using smartphones in learning vocabulary. The post-test scores showed a significant difference in the experimental group performance. The results from the semi-structure interviews showed that there were positive attitudes towards Memrise smartphone application. The students found the application enjoyable, convenient and efficient learning tool. From the study, the use of the Memrise application is seen to have long-term and motivational benefits to students. For this reason, there is a need for further research to identify the long-term optimal effects of learning a language using smartphone applications.

Keywords: second language vocabulary learning, academic vocabulary, mobile learning technologies, smartphone applications

Procedia PDF Downloads 147
8019 Reduced Tillage and Bio-stimulant Application Can Improve Soil Microbial Enzyme Activity in a Dryland Cropping System

Authors: Flackson Tshuma, James Bennett, Pieter Andreas Swanepoel, Johan Labuschagne, Stephan van der Westhuizen, Francis Rayns

Abstract:

Amongst other things, tillage and synthetic agrochemicals can be effective methods of seedbed preparation and pest control. Nonetheless, frequent and intensive tillage and excessive application of synthetic agrochemicals, such as herbicides and insecticides, can reduce soil microbial enzyme activity. A decline in soil microbial enzyme activity can negatively affect nutrient cycling and crop productivity. In this study, the effects of four tillage treatments; continuous mouldboard plough; shallow tine-tillage to a depth of about 75 mm; no-tillage; and tillage rotation (involving shallow tine-tillage once every four years in rotation with three years of no-tillage), and two rates of synthetic agrochemicals (standard: with regular application of synthetic agrochemicals; and reduced: fewer synthetic agrochemicals in combination with bio-chemicals/ or bio-stimulants) on soil microbial enzyme activity were investigated between 2018 and 2020 in a typical Mediterranean climate zone in South Africa. Four different bio-stimulants applied contained: Trichoderma asperellum, fulvic acid, silicic acid, and Nereocystis luetkeana extracts, respectively. The study was laid out as a complete randomised block design with four replicated blocks. Each block had 14 plots, and each plot measured 50 m x 6 m. The study aimed to assess the combined impact of tillage practices and reduced rates of synthetic agrochemical application on soil microbial enzyme activity in a dryland cropping system. It was hypothesised that the application of bio-stimulants in combination with minimum soil disturbance will lead to a greater increase in microbial enzyme activity than the effect of applying either in isolation. Six soil cores were randomly and aseptically collected from each plot for microbial enzyme activity analysis from the 0-150 mm layer of a field trial under a dryland crop rotation system in the Swartland region. The activities of four microbial enzymes, β-glucosidase, acid phosphatase, alkaline phosphatase and urease, were assessed. The enzymes are essential for the cycling of glucose, phosphorus, and nitrogen, respectively. Microbial enzyme activity generally increased with a reduction of both tillage intensity and synthetic agrochemical application. The use of the mouldboard plough led to the least (P<0.05) microbial enzyme activity relative to the reduced tillage treatments, whereas the system with bio-stimulants (reduced synthetic agrochemicals) led to the highest (P<0.05) microbial enzyme activity relative to the standard systems. The application of bio-stimulants in combination with reduced tillage, particularly no-tillage, could be beneficial for enzyme activity in a dryland farming system.

Keywords: bio-stimulants, soil microbial enzymes, synthetic agrochemicals, tillage

Procedia PDF Downloads 65
8018 New Standardized Framework for Developing Mobile Applications (Based On Real Case Studies and CMMI)

Authors: Ammar Khader Almasri

Abstract:

The software processes play a vital role for delivering a high quality software system that meets the user’s needs. There are many software development models which are used by most system developers, which can be categorized into two categories (traditional and new methodologies). Mobile applications like other desktop applications need appropriate and well-working software development process. Nevertheless, mobile applications have different features which limit their performance and efficiency like application size, mobile hardware features. Moreover, this research aims to help developers in using a standardized model for developing mobile applications.

Keywords: software development process, agile methods , moblile application development, traditional methods

Procedia PDF Downloads 373
8017 Analyse of User Interface Design in Mobile Teaching Apps

Authors: Asma Ashoul

Abstract:

Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.

Keywords: developer, application, interface design, layout, Agile, client

Procedia PDF Downloads 102
8016 Aluminum Matrix Composites Reinforced by Glassy Carbon-Titanium Spatial Structure

Authors: B. Hekner, J. Myalski, P. Wrzesniowski

Abstract:

This study presents aluminum matrix composites reinforced by glassy carbon (GC) and titanium (Ti). In the first step, the heterophase (GC+Ti), spatial form (similar to skeleton) of reinforcement was obtained via own method. The polyurethane foam (with spatial, open-cells structure) covered by suspension of Ti particles in phenolic resin was pyrolyzed. In the second step, the prepared heterogeneous foams were infiltrated by aluminium alloy. The manufactured composites are designated to industrial application, especially as a material used in tribological field. From this point of view, the glassy carbon was applied to stabilise a coefficient of friction on the required value 0.6 and reduce wear. Furthermore, the wear can be limited due to titanium phase application, which reveals high mechanical properties. Moreover, fabrication of thin titanium layer on the carbon skeleton leads to reduce contact between aluminium alloy and carbon and thus aluminium carbide phase creation. However, the main modification involves the manufacturing of reinforcement in the form of 3D, skeleton foam. This kind on reinforcement reveals a few important advantages compared to classical form of reinforcement-particles: possibility to control homogeneity of reinforcement phase in composite material; low-advanced technique of composite manufacturing- infiltration; possibility to application the reinforcement only in required places of material; strict control of phase composition; High quality of bonding between components of material. This research is founded by NCN in the UMO-2016/23/N/ST8/00994.

Keywords: metal matrix composites, MMC, glassy carbon, heterophase composites, tribological application

Procedia PDF Downloads 109
8015 Chemical Control Management Strategies for Corm Rot in Gladiolus communis L. under Field Conditions

Authors: Shahbaz Ahmad, Muhammad Ali, Sahar Naz

Abstract:

Corm rot is caused by the fungus Fusarium oxysporum f.sp. gladioli and it causes remarkable losses to the growers. Experiment was conducted in order to find some viable recommendations for this agronomically as well as economically important problem. Four fungicides, namely Carbendazim, Mancozeb, Thiophanate methyl and Chlorothalonil were used to control corm rot in gladiolus field. Fungicides were applied singly as foliar, in irrigation as well as with sulphuric acid in variable doses. The results revealed that application of all fungicides was variably effective to control corm rot in acid mixed irrigation followed by fungicide in irrigation. The application of all fungicides in various combinations was observed to be ineffective at all three doses.

Keywords: gladiolus, corm rot, Fusarium oxysporum, fungicides

Procedia PDF Downloads 422
8014 Analysis of Chatterjea Type F-Contraction in F-Metric Space and Application

Authors: Awais Asif

Abstract:

This article investigates fixed point theorems of Chatterjea type F-contraction in the setting of F-metric space. We relax the conditions of F-contraction and define modified F-contraction for two mappings. The study provides fixed point results for both single-valued and multivalued mappings. The results are further extended to common fixed point theorems for two mappings. Moreover, to discuss the applicability of our results, an application is provided, which shows the role of our results in finding the solution to functional equations in dynamic programming. Our results generalize and extend the existing results in the literature.

Keywords: Chatterjea type F-contraction, F-cauchy sequence, F-convergent, multi valued mappings

Procedia PDF Downloads 125
8013 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 55
8012 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 139
8011 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 141
8010 Application of Fractional Model Predictive Control to Thermal System

Authors: Aymen Rhouma, Khaled Hcheichi, Sami Hafsi

Abstract:

The article presents an application of Fractional Model Predictive Control (FMPC) to a fractional order thermal system using Controlled Auto Regressive Integrated Moving Average (CARIMA) model obtained by discretization of a continuous fractional differential equation. Moreover, the output deviation approach is exploited to design the K -step ahead output predictor, and the corresponding control law is obtained by solving a quadratic cost function. Experiment results onto a thermal system are presented to emphasize the performances and the effectiveness of the proposed predictive controller.

Keywords: fractional model predictive control, fractional order systems, thermal system, predictive control

Procedia PDF Downloads 399
8009 Development of Mobile Application for Internship Program Management Using the Concept of Model View Controller (MVC) Pattern

Authors: Shutchapol Chopvitayakun

Abstract:

Nowadays, especially for the last 5 years, mobile devices, mobile applications and mobile users, through the deployment of wireless communication and mobile phone cellular network, all these components are growing significantly bigger and stronger. They are being integrated into each other to create multiple purposes and pervasive deployments into every business and non-business sector such as education, medicine, traveling, finance, real estate and many more. Objective of this study was to develop a mobile application for seniors or last-year students who enroll the internship program at each tertiary school (undergraduate school) and do onsite practice at real field sties, real organizations and real workspaces. During the internship session, all students as the interns are required to exercise, drilling and training onsite with specific locations and specific tasks or may be some assignments from their supervisor. Their work spaces are both private and government corporates and enterprises. This mobile application is developed under schema of a transactional processing system that enables users to keep daily work or practice log, monitor true working locations and ability to follow daily tasks of each trainee. Moreover, it provides useful guidance from each intern’s advisor, in case of emergency. Finally, it can summarize all transactional data then calculate each internship cumulated hours from the field practice session for each individual intern.

Keywords: internship, mobile application, Android OS, smart phone devices, mobile transactional processing system, guidance and monitoring, tertiary education, senior students, model view controller (MVC)

Procedia PDF Downloads 301
8008 A Study on Unix Process Crash Based on Efficient Process Management Method

Authors: Guo Haonan, Chen Peiyu, Zhao Hanyu, Burra Venkata Durga Kumar

Abstract:

Unix and Unix-like operating systems are widely used due to their high stability but are limited by the parent-child process structure, and the child process depends on the parent process, so the crash of a single process may cause the entire process group or even the entire system to fail. Another possibility of unexpected process termination is that the system administrator inadvertently closed the terminal or pseudo-terminal where the application was launched, causing the application process to terminate unexpectedly. This paper mainly analyzes the reasons for the problems and proposes two solutions.

Keywords: process management, daemon, login-bash and non-login bash, process group

Procedia PDF Downloads 118
8007 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases

Authors: Suglo Tohari Luri

Abstract:

Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.

Keywords: data, engine, intelligence, customer, neo4j, database

Procedia PDF Downloads 185
8006 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Mohamady, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, DU96-W180 airfoil, flow streams

Procedia PDF Downloads 369
8005 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 153
8004 Evaluation of Robot Application in Hospitality

Authors: Lina Zhong, Sunny Sun, Rob Law

Abstract:

Artificial intelligence has been developing rapidly. Previous studies have evaluated hotel technology either from an employee or consumer perspective. However, impacts, which mainly include the social and economic impacts of hotel robots, are unknown as they are newly introduced. To bridge the aforementioned research gap, this study evaluates hotel robots from contextual, diagnostic, evaluative, and strategic aspects using framework analysis as a basis to assist hotel managers in real-time hotel marketing strategy management, adjustment and revenue achievement. Findings show that, from a consumer perspective, the overall acceptance of hotel robots is low. The main implication is that the cost of hotel robots should be carefully estimated, and the investment should be made based on phases.

Keywords: application, evaluation, framework analysis, hotel robot

Procedia PDF Downloads 159
8003 Development of Soft 3D Printing Materials for Textile Applications

Authors: Chi-Chung Marven Chick, Chu-Po Ho, Sau-Chuen Joe Au, Wing-Fai Sidney Wong, Chi-Wai Kan

Abstract:

Recently, 3D printing becomes popular process for manufacturing, especially has special attention in textile applications. However, there are various types of 3D printing materials, including plastic, resin, rubber, ceramics, gold, platinum, silver, iron, titanium but not all these materials are suitable for textile application. Generally speaking, 3D printing of textile mainly uses thermoplastic polymers such as acrylonitrile butadiene styrene (ABS), polylactide (PLA), polycaprolactone (PCL), thermoplastic polyurethane (TPU), polyethylene terephthalate glycol-modified (PETG), polystyrene (PS), polypropylene (PP). Due to the characteristics of the polymers, 3D printed textiles usually have low air permeability and poor comfortable. Therefore, in this paper, we will review the possible materials suitable for textile application with desired physical and mechanical properties.

Keywords: 3D printing, 3D printing materials, textile, properties

Procedia PDF Downloads 46
8002 Application of Production Planning to Improve Operation in Local Factory

Authors: Bashayer Al-Enezi, Budoor Al-Sabti, Eman Al-Durai, Fatmah Kalban, Meshael Ahmed

Abstract:

Production planning and control principles are concerned with planning, controlling and balancing all aspects of manufacturing including raw materials, finished goods, production schedules, and equipment requirements. Hence, an effective production planning and control system is very critical to the success of any factory. This project will focus on the application of production planning and control principles on “The National Canned Food Production and Trading Company (NCFP)” factory to find problems or areas for improvement.

Keywords: production planning, operations improvement, inventory management, National Canned Food Production and Trading Company (NCFP)

Procedia PDF Downloads 489
8001 Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles

Authors: R. Mkahl, A. Nait-Sidi-Moh, M. Wack

Abstract:

Batteries of electric vehicles (BEV) are becoming more attractive with the advancement of new battery technologies and promotion of electric vehicles. BEV batteries are recharged on board vehicles using either the grid (G2V for Grid to Vehicle) or renewable energies in a stand-alone application (H2V for Home to Vehicle). This paper deals with the modeling, sizing and control of a photo voltaic stand-alone application that can charge the BEV at home. The modeling approach and developed mathematical models describing the system components are detailed. Simulation and experimental results are presented and commented.

Keywords: electric vehicles, photovoltaic energy, lead-acid batteries, charging process, modeling, simulation, experimental tests

Procedia PDF Downloads 426
8000 Corrosion Investigation of Superalloys, Molybdenum and TZM in Chloride Molten Salts

Authors: Craig Jantzen, Tim Abram, Dirk Engelberg, Hugues Lambert, Daniel Cooper

Abstract:

Molten salts are of high interest for use as coolants in nuclear reactors due to favourable high temperature and thermodynamic properties. The corrosive behaviour of molten salts however pose a materials integrity challenge. Three Ni / Ni-Fe based and two Mo based alloys have been exposed to molten eutectics (LiCl-KCl at 59.5:40.5 mol% and KCl-MgCl2 at 68:32 mol%) at 600°C and 800°C for durations up to 500hrs. Corrosion was observed to preferentially attack alloy constituents in order of their reactivity, with chromium the most vulnerable and depleted element. Alloy weight-loss per unit area was calculated to give linear corrosion rates, discounting any initial rapid corrosion of impurities. Further analysis was carried out using ICP-MS, SEM and EDX techniques to give a more detailed view of the corrosion mechanisms.

Keywords: molten salt, salt, corrosion, high temperature, licl, KCL, MgCl, molybdenum, nickel, superalloys

Procedia PDF Downloads 429
7999 Elastic Constants of Heat Treated Wood

Authors: Ergun Guntekin

Abstract:

Effects of heat treatment on elastic constants of Black pine (Pinus nigra) wood were investigated. Specimens were exposed to heat under atmospheric pressure at two different temperatures (180 and 210 °C) and three different time levels (2, 5, 8 hours). Three Young’s modulus in three anatomical directions, six Poisson’s ratios and three Shear modulus values associated with the main directions were evaluated by compression tests. Compression strength of the samples in three principal directions was also determined. All of the properties of the specimens tested were altered by heat treatment. The degree of alteration depends on the temperature as well as duration applied. Results indicate that EL and compression strength in L direction were not significantly influenced, compression strength in R direction significantly decreased, ER, ET and compression strength in T direction were increased for shorter periods, then dropped for 8-hour application of 180 ºC. ER was not significantly affected, compression strength in R direction and EL was significantly decreased, ET and compression strength in T direction were increased for shorter periods, then decreased for 8-hour application of 210 ºC. The shear modulus of the samples was decreased with application of treatment combinations. Most of the Poisson’s ratios were not affected by heat treatment.

Keywords: black pine, elastic constants, heat treatment, wood

Procedia PDF Downloads 145
7998 The Maximum Throughput Analysis of UAV Datalink 802.11b Protocol

Authors: Inkyu Kim, SangMan Moon

Abstract:

This IEEE 802.11b protocol provides up to 11Mbps data rate, whereas aerospace industry wants to seek higher data rate COTS data link system in the UAV. The Total Maximum Throughput (TMT) and delay time are studied on many researchers in the past years This paper provides theoretical data throughput performance of UAV formation flight data link using the existing 802.11b performance theory. We operate the UAV formation flight with more than 30 quad copters with 802.11b protocol. We may be predicting that UAV formation flight numbers have to bound data link protocol performance limitations.

Keywords: UAV datalink, UAV formation flight datalink, UAV WLAN datalink application, UAV IEEE 802.11b datalink application

Procedia PDF Downloads 375
7997 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs

Authors: Dingyang Hu, Dan Liu

Abstract:

DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.

Keywords: adversarial sample, gradient, probability, black box

Procedia PDF Downloads 82