Search results for: mobile information behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17284

Search results for: mobile information behavior

10984 A Variable Incremental Conductance MPPT Algorithm Applied to Photovoltaic Water Pumping System

Authors: Sarah Abdourraziq, Rachid Elbachtiri

Abstract:

The use of solar energy as a source for pumping water is one of the promising areas in the photovoltaic (PV) application. The energy of photovoltaic pumping systems (PVPS) can be widely improved by employing an MPPT algorithm. This will lead consequently to maximize the electrical motor speed of the system. This paper presents a modified incremental conductance (IncCond) MPPT algorithm with direct control method applied to a standalone PV pumping system. The influence of the algorithm parameters on system behavior is investigated and compared with the traditional (INC) method. The studied system consists of a PV panel, a DC-DC boost converter, and a PMDC motor-pump. The simulation of the system by MATLAB-SIMULINK is carried out. Simulation results found are satisfactory.

Keywords: photovoltaic pumping system (PVPS), incremental conductance (INC), MPPT algorithm, boost converter

Procedia PDF Downloads 387
10983 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 75
10982 A Stock Exchange Analysis in Turkish Logistics Sector: Modeling, Forecasting, and Comparison with Logistics Indices

Authors: Eti Mizrahi, Gizem İntepe

Abstract:

The geographical location of Turkey that stretches from Asia to Europe and Russia to Africa makes it an important logistics hub in the region. Although logistics is a developing sector in Turkey, the stock market representation is still low with only two companies listed in Turkey’s stock exchange since 2010. In this paper, we use the daily values of these two listed stocks as a benchmark for the logistics sector. After modeling logistics stock prices, an empirical examination is conducted between the existing logistics indices and these stock prices. The paper investigates whether the measures of logistics stocks are correlated with newly available logistics indices. It also shows the reflection of the economic activity in the logistics sector on the stock exchange market. The results presented in this paper are the first analysis of the behavior of logistics indices and logistics stock prices for Turkey.

Keywords: forecasting, logistic stock exchange, modeling, Africa

Procedia PDF Downloads 527
10981 Inference for Compound Truncated Poisson Lognormal Model with Application to Maximum Precipitation Data

Authors: M. Z. Raqab, Debasis Kundu, M. A. Meraou

Abstract:

In this paper, we have analyzed maximum precipitation data during a particular period of time obtained from different stations in the Global Historical Climatological Network of the USA. One important point to mention is that some stations are shut down on certain days for some reason or the other. Hence, the maximum values are recorded by excluding those readings. It is assumed that the number of stations that operate follows zero-truncated Poisson random variables, and the daily precipitation follows a lognormal random variable. We call this model a compound truncated Poisson lognormal model. The proposed model has three unknown parameters, and it can take a variety of shapes. The maximum likelihood estimators can be obtained quite conveniently using Expectation-Maximization (EM) algorithm. Approximate maximum likelihood estimators are also derived. The associated confidence intervals also can be obtained from the observed Fisher information matrix. Simulation results have been performed to check the performance of the EM algorithm, and it is observed that the EM algorithm works quite well in this case. When we analyze the precipitation data set using the proposed model, it is observed that the proposed model provides a better fit than some of the existing models.

Keywords: compound Poisson lognormal distribution, EM algorithm, maximum likelihood estimation, approximate maximum likelihood estimation, Fisher information, skew distribution

Procedia PDF Downloads 99
10980 Influence of Online Sports Events on Betting among Nigerian Youth

Authors: Babajide Olufemi Diyaolu

Abstract:

The opportunity provided by advances in technology as regards sports betting is so numerous that even at one's comfort, with the use of a phone, Nigerian youth are found engaging in all kinds of betting. Today it is more difficult to differentiate a true fan as there are quite a number of them that became fans as a result of betting on live games. This study investigated the influence of online sports events on betting among Nigerian youth. A descriptive survey research design was used, and the population consists of all Nigerian youth that engages in betting and live within the southwest zone of Nigeria. A simple random sampling technique was used to pick three states from the southwest zone of Nigeria. Two thousand five hundred respondents comprising males and female were sampled from the three states. A structured questionnaire on online sports event contribution to sports betting (OSECSB) was used. The Instrument consists of three sections. Section A seeks information on the demographic data of the respondents. Section B seeks information on online sports events, while section C is used to extract information on sports betting. The modified instrument, which consists of 14 items, has a reliability coefficient of 0.74. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded, and analyzed using descriptive statistics of frequency counts, percentage and pie chart, and inferential statistics of multiple regressions. The findings of this study revealed that online sports betting is a significant predictor of an increase in sports betting among Nigerian youth. The media and television, as well as globalization and the internet coupled with social media and various online platforms, have all contributed to the immense increase in sports betting. The increase in the advertisement of the betting platform during live matches, especially football, is becoming more alarming. In most organized international events, the media attention, as well as sponsorship right, are now been given to one or two betting platforms. There is a need for all stakeholders to put in place school-based intervention programs to reorientate our youth about the consequences of addiction to betting. Such programs must include meta-analyses and emotional control towards sports betting.

Keywords: betting platform, Nigerian fans, Nigerian youth, sports betting

Procedia PDF Downloads 68
10979 Comparison of E-Waste Management in Switzerland and in Australia: A Qualitative Content Analysis

Authors: Md Tasbirul Islam, Pablo Dias, Nazmul Huda

Abstract:

E-waste/Waste electrical and electronic equipment (WEEE) is one of the fastest growing waste streams across the globe. This paper aims to compare the e-waste management system in Switzerland and Australia in terms of four features - legislative initiatives, disposal practice, collection and financial mechanisms. The qualitative content analysis is employed as a research method in the study. Data were collected from various published academic research papers, industry reports, and web sources. In addition, a questionnaire survey is conducted in Australia to understand the public awareness and opinions on the features. The results of the study provide valuable insights to policymakers in Australia developing better e-waste management system in conjunction with the public consensus, and the state-of-the-art operational strategies currently being practiced in Switzerland.

Keywords: E-waste management, WEEE, awareness, pro-environmental behavior, Australia, Switzerland

Procedia PDF Downloads 266
10978 A Closed-Form Solution and Comparison for a One-Dimensional Orthorhombic Quasicrystal and Crystal Plate

Authors: Arpit Bhardwaj, Koushik Roy

Abstract:

The work includes derivation of the exact-closed form solution for simply supported quasicrystal and crystal plates by using propagator matrix method under surface loading and free vibration. As a numerical example a quasicrystal and a crystal plate are considered, and after investigation, the variation of displacement and stress fields along the thickness of these two plates are presented. Further, it includes analyzing the displacement and stress fields for two plates having two different stacking arrangement, i.e., QuasiCrystal/Crystal/QuasiCrystal and Crystal/QuasiCrystal/Crystal and comparing their results. This will not only tell us the change in the behavior of displacement and stress fields in two different materials but also how these get changed after trying their different combinations. For the free vibration case, Crystal and Quasicrystal plates along with their different stacking arrangements are considered, and displacements are plotted in all directions for different Mode Shapes.

Keywords: free vibration, multilayered plates, surface loading, quasicrystals

Procedia PDF Downloads 134
10977 The Impact of Environmental Corporate Social Responsibility (ECSR) and the Perceived Moral Intensity on the Intention of Ethical Investment

Authors: Chiung-Yao Huang, Yu-Cheng Lin, Chiung-Hui Chen

Abstract:

This study seeks to examine perceived environmental corporate social responsibility (ECSR) with a focus on negative environmental questions, related to intention of ethical investment intention after a environmental failure recovery. An empirical test was employed to test the hypotheses. We manipulated the information on negative ECSR activities of a hypothetical firm in a experimental design with a failure recovery treatment. The company’s negative ECSR recovery was depicted in a positive perspective (depicting a follow-up strong social action), whereas in the negative ECSR treatment it was described in a negative perspective (depicting a follow-up non social action). In both treatments, information about other key characteristics of the focal company were kept constant. Investors’ intentions to invest in the company’s stock were evaluated by multi-item scales. Results indicate that positive ECSR recovery information about a firm enhances investors’ intentions to invest in the company’s stock. In addition, perceived moral intensity has a significant impact on the intention of ethical investment and that perceived moral intensity also serves as a key moderating variable in the relationship between negative ECSR and the intention of ethical investment. Finally, theoretical and managerial implications of the findings are discussed. Practical implications: The results suggest that managers may need to be aware of perceived moral intensity as a key variable in restoring the intention of ethical investment. The results further suggest that perceived moral intensity has a direct, and it also has an moderating influence between ECSR and the intention of ethical investment. Originality/value: In an attempt to deepen the understanding of how investors perceptions of firm environmental CSR are connected with other investor‐related outcomes through ECSR recovery, the present research proposes a comprehensive model which encompasses ECSR and other key relationship constructs after a ECSR failure and recovery.

Keywords: ethical investment, Environmental Corporate Social Responsibility(ECSR), ECSR recovery, moral intensity

Procedia PDF Downloads 338
10976 Evaluation of Interaction Between Fans and Celebrities in New Media

Authors: Mohadese Motahari

Abstract:

In general, we consider the phenomenon of "fandism" or extreme fandom to be an aspect of fandom for a person, a group, or a collection, which leads to extreme support for them. So, for example, we consider a fan or a "fanatic" (which literally means a "fanatical person") to be a person who is extremely interested in a certain topic or topics and has a special passion and fascination for that issue. It may also be beyond the scope of logic and normal behavior of the society. With the expansion of the media and the advancement of technology, the phenomenon of fandom also underwent many changes and not only became more intense, but a large economy was also formed alongside it, and it is becoming more and more important every day. This economy, which emerged from the past with the formation of the first media, has now taken a different form with the development of media and social networks, as well as the change in the interaction between celebrities and audiences. Earning huge amounts of money with special methods in every social network and every media is achieved through fans and fandoms. In this article, we have studied the relationship between fans and famous people with reference to the economic debates surrounding it.

Keywords: fandism, famous people, social media, new media

Procedia PDF Downloads 79
10975 Study of Heat Transfer in the Absorber Plates of a Flat-Plate Solar Collector Using Dual-Phase-Lag Model

Authors: Yu-Ching Yang, Haw-Long Lee, Win-Jin Chang

Abstract:

The present work numerically analyzes the transient heat transfer in the absorber plates of a flat-plate solar collector based on the dual-phase-lag (DPL) heat conduction model. An efficient numerical scheme involving the hybrid application of the Laplace transform and control volume methods is used to solve the linear hyperbolic heat conduction equation. This work also examines the effect of different medium parameters on the behavior of heat transfer. Results show that, while the heat-flux phase lag induces thermal waves in the medium, the temperature-gradient phase lag smoothens the thermal waves by promoting non-Fourier diffusion-like conduction into the medium.

Keywords: absorber plates, dual-phase-lag, non-Fourier, solar collector

Procedia PDF Downloads 379
10974 Composition and Catalytic Behaviour of Biogenic Iron Containing Materials Obtained by Leptothrix Bacteria Cultivation in Different Growth Media

Authors: M. Shopska, D. Paneva, G. Kadinov, Z. Cherkezova-Zheleva, I. Mitov

Abstract:

The iron containing materials are used as catalysts in different processes. The chemical methods of their synthesis use toxic and expensive chemicals; sophisticated devices; energy consumption processes that raise their cost. Besides, dangerous waste products are formed. At present time such syntheses are out of date and wasteless technologies are indispensable. The bioinspired technologies are consistent with the ecological requirements. Different microorganisms participate in the biomineralization of the iron and some phytochemicals are involved, too. The methods for biogenic production of iron containing materials are clean, simple, nontoxic, realized at ambient temperature and pressure, cheaper. The biogenic iron materials embrace different iron compounds. Due to their origin these substances are nanosized, amorphous or poorly crystalline, porous and have number of useful properties like SPM, high magnetism, low toxicity, biocompatibility, absorption of microwaves, high surface area/volume ratio, active sites on the surface with unusual coordination that distinguish them from the bulk materials. The biogenic iron materials are applied in the heterogeneous catalysis in different roles - precursor, active component, support, immobilizer. The application of biogenic iron oxide materials gives rise to increased catalytic activity in comparison with those of abiotic origin. In our study we investigated the catalytic behavior of biomasses obtained by cultivation of Leptothrix bacteria in three nutrition media – Adler, Fedorov, and Lieske. The biomass composition was studied by Moessbauer spectroscopy and transmission IRS. Catalytic experiments on CO oxidation were carried out using in situ DRIFTS. Our results showed that: i) the used biomasses contain α-FeOOH, γ-FeOOH, γ-Fe2O3 in different ratios; ii) the biomass formed in Adler medium contains γ-FeOOH as main phase. The CO conversion was about 50% as evaluated by decreased integrated band intensity in the gas mixture spectra during the reaction. The main phase in the spent sample is γ-Fe2O3; iii) the biomass formed in Lieske medium contains α-FeOOH. The CO conversion was about 20%. The main phase in the spent sample is α-Fe2O3; iv) the biomass formed in Fedorov medium contains γ-Fe2O3 as main phase. CO conversion in the test reaction was about 19%. The results showed that the catalytic activity up to 200°C resulted predominantly from α-FeOOH and γ-FeOOH. The catalytic activity at temperatures higher than 200°C was due to the formation of γ-Fe2O3. The oxyhydroxides, which are the principal compounds in the biomass, have low catalytic activity in the used reaction; the maghemite has relatively good catalytic activity; the hematite has activity commensurate with that of the oxyhydroxides. Moreover it can be affirmed that catalytic activity is inherent in maghemite, which is obtained by transformation of the biogenic lepidocrocite, i.e. it has biogenic precursor.

Keywords: nanosized biogenic iron compounds, catalytic behavior in reaction of CO oxidation, in situ DRIFTS, Moessbauer spectroscopy

Procedia PDF Downloads 361
10973 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System

Authors: Farheen Tabassum, Shoab Ahmed Khan

Abstract:

The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.

Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS

Procedia PDF Downloads 346
10972 Model Order Reduction Using Hybrid Genetic Algorithm and Simulated Annealing

Authors: Khaled Salah

Abstract:

Model order reduction has been one of the most challenging topics in the past years. In this paper, a hybrid solution of genetic algorithm (GA) and simulated annealing algorithm (SA) are used to approximate high-order transfer functions (TFs) to lower-order TFs. In this approach, hybrid algorithm is applied to model order reduction putting in consideration improving accuracy and preserving the properties of the original model which are two important issues for improving the performance of simulation and computation and maintaining the behavior of the original complex models being reduced. Compared to conventional mathematical methods that have been used to obtain a reduced order model of high order complex models, our proposed method provides better results in terms of reducing run-time. Thus, the proposed technique could be used in electronic design automation (EDA) tools.

Keywords: genetic algorithm, simulated annealing, model reduction, transfer function

Procedia PDF Downloads 134
10971 Bacterial Diversity in Human Intestinal Microbiota and Correlations with Nutritional Behavior, Physiology, Xenobiotics Intake and Antimicrobial Resistance in Obese, Overweight and Eutrophic Individuals

Authors: Thais O. de Paula, Marjorie R. A. Sarmiento, Francis M. Borges, Alessandra B. Ferreira-Machado, Juliana A. Resende, Dioneia E. Cesar, Vania L. Silva, Claudio G. Diniz

Abstract:

Obesity is currently a worldwide public health threat, being considered a pandemic multifactorial disease related to the human gut microbiota (GM). Add to that GM is considered an important reservoir of antimicrobial resistance genes (ARG) and little is known on GM and ARG in obesity, considering the altered physiology and xenobiotics intake. As regional and social behavior may play important roles in GM modulation, and most of the studies are based on small sample size and various methodological approaches resulting in difficulties for data comparisons, this study was focused on the investigation of GM bacterial diversity in obese (OB), overweight (OW) and eutrophic individuals (ET) considering their nutritional, clinical and social characteristics; and comparative screening of AGR related to their physiology and xenobiotics intake. Microbial community was accessed by FISH considering phyla as a taxonomic level, and PCR-DGGE followed by dendrograms evaluation (UPGMA method) from fecal metagenome of 72 volunteers classified according to their body mass index (BMI). Nutritional, clinical, social parameters and xenobiotics intake were recorded for correlation analysis. The fecal metagenome was also used as template for PCR targeting 59 different ARG. Overall, 62% of OB were hypertensive, and 12% or 4% were, regarding the OW and ET individuals. Most of the OB were rated as low income (80%). Lower relative bacterial densities were observed in the OB compared to ET for almost all studied taxa (p < 0.05) with Firmicutes/Bacteroidetes ratio increased in the OB group. OW individuals showed a bacterial density representative of GM more likely to the OB. All the participants were clustered in 3 different groups based on the PCR-DGGE fingerprint patterns (C1, C2, C3), being OB mostly grouped in C1 (83.3%) and ET mostly grouped in C3 (50%). The cluster C2 showed to be transitional. Among 27 ARG detected, a cluster of 17 was observed in all groups suggesting a common core. In general, ARG were observed mostly within OB individuals followed by OW and ET. The ratio between ARG and bacterial groups may suggest that AGR were more related to enterobacteria. Positive correlations were observed between ARG and BMI, calories and xenobiotics intake (especially use of sweeteners). As with nutritional and clinical characteristics, our data may suggest that GM of OW individuals behave in a heterogeneous pattern, occasionally more likely to the OB or to the ET. Regardless the regional and social behaviors of our population, the methodological approaches in this study were complementary and confirmatory. The imbalance of GM over the health-disease interface in obesity is a matter of fact, but its influence in host's physiology is still to be clearly elucidated to help understanding the multifactorial etiology of obesity. Although the results are in agreement with observations that GM is altered in obesity, the altered physiology in OB individuals seems to be also associated to the increased xenobiotics intake and may interfere with GM towards antimicrobial resistance, as observed by the fecal metagenome and ARG screening. Support: FAPEMIG, CNPQ, CAPES, PPGCBIO/UFJF.

Keywords: antimicrobial resistance, bacterial diversity, gut microbiota, obesity

Procedia PDF Downloads 153
10970 Influence of Bondage Discipline Sadism Masochism (BDSM) On Fashion Industry on Fashion Industry

Authors: Utkarsh Goley

Abstract:

BDSM, or Bondage Discipline Sadism Masochism, is a controversial and often misunderstood practice that has had a presence in the fashion industry for decades. BDSM-inspired fashion can be seen in various forms, from leather harnesses and corsets to studded collars and latex clothing. BDSM fashion is often associated with edginess, rebellion, and sexuality. It has been embraced by subcultures such as punk, Goth, and fetish, as well as mainstream fashion designers looking to push boundaries and make a statement. However, the use of BDSM imagery in fashion has also been criticized for promoting objectification, exploitation, and the normalization of abusive behavior. Some argue that the fashion industry's depiction of BDSM often reinforces harmful stereotypes and misconceptions about the practice. Despite the controversy, BDSM-inspired fashion continues to have a place in the industry, with designers and consumers alike finding value in its aesthetic appeal and provocative nature. As with any aspect of fashion, the role of BDSM in the industry will continue to evolve and adapt to changing cultural norms and societal attitudes.

Keywords: BDSM, leather, fashion, lycra

Procedia PDF Downloads 169
10969 Seismic Behavior of a Jumbo Container Crane in the Low Seismicity Zone Using Time-History Analyses

Authors: Huy Q. Tran, Bac V. Nguyen, Choonghyun Kang, Jungwon Huh

Abstract:

Jumbo container crane is an important part of port structures that needs to be designed properly, even when the port locates in low seismicity zone such as in Korea. In this paper, 30 artificial ground motions derived from the elastic response spectra of Korean Building Code (2005) are used for time history analysis. It is found that the uplift might not occur in this analysis when the crane locates in the low seismic zone. Therefore, a selection of a pinned or a gap element for base supporting has not much effect on the determination of the total base shear. The relationships between the total base shear and peak ground acceleration (PGA) and the relationships between the portal drift and the PGA are proposed in this study.

Keywords: jumbo container crane, portal drift, time history analysis, total base shear

Procedia PDF Downloads 179
10968 Tobacco Taxation and the Heterogeneity of Smokers' Responses to Price Increases

Authors: Simone Tedeschi, Francesco Crespi, Paolo Liberati, Massimo Paradiso, Antonio Sciala

Abstract:

This paper aims at contributing to the understanding of smokers’ responses to cigarette prices increases with a focus on heterogeneity, both across individuals and price levels. To do this, a stated preference quasi-experimental design grounded in a random utility framework is proposed to evaluate the effect on smokers’ utility of the price level and variation, along with social conditioning and health impact perception. The analysis is based on individual-level data drawn from a unique survey gathering very detailed information on Italian smokers’ habits. In particular, qualitative information on the individual reactions triggered by changes in prices of different magnitude and composition are exploited. The main findings stemming from the analysis are the following; the average price elasticity of cigarette consumption is comparable with previous estimates for advanced economies (-.32). However, the decomposition of this result across five latent-classes of smokers, reveals extreme heterogeneity in terms of price responsiveness, implying a potential price elasticity that ranges between 0.05 to almost 1. Such heterogeneity is in part explained by observable characteristics such as age, income, gender, education as well as (current and lagged) smoking intensity. Moreover, price responsiveness is far from being independent from the size of the prospected price increase. Finally, by comparing even and uneven price variations, it is shown that uniform across-brand price increases are able to limit the scope of product substitutions and downgrade. Estimated price-response heterogeneity has significant implications for tax policy. Among them, first, it provides evidence and a rationale for why the aggregate price elasticity is likely to follow a strictly increasing pattern as a function of the experienced price variation. This information is crucial for forecasting the effect of a given tax-driven price change on tax revenue. Second, it provides some guidance on how to design excise tax reforms to balance public health and revenue goals.

Keywords: smoking behaviour, preference heterogeneity, price responsiveness, cigarette taxation, random utility models

Procedia PDF Downloads 149
10967 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 432
10966 Conventional and Islamic Perspective in Accounting: Potential for Alternative Reporting Framework

Authors: Shibly Abdullah

Abstract:

This paper provides an overview of fundamental philosophical and functional differences in conventional and Islamic accounting. The aim of this research is to undertake a detailed analysis focus on specific illustrations drawn from both these systems and highlight how these differences implicate in recording financial transactions and preparation of financial reports for a range of stakeholders. Accounting as being universally considered as a platform for providing a ‘true and fair’ view of corporate entities can be challenged in the current world view, as the business environment has evolved and transformed significantly. Growth of the non-traditional corporate entity such as Islamic financial institutions, fundamentally questions the applicability of conventional accounting standards in preparation of Shariah-compliant financial reporting. Coupled with this, there are significant concerns about the wider applicability of Islamic accounting standards and framework in order to achieve reporting practices satisfying the information needs generally. Against the backdrop of such a context, this paper raises fundamental question as to how potential convergence could be achieved between these two systems in order to provide users’ a transparent and comparable state of financial information resulting in an alternative framework of financial reporting.

Keywords: accounting, conventional accounting, corporate reporting, Islamic accounting

Procedia PDF Downloads 269
10965 Machine Learning and Internet of Thing for Smart-Hydrology of the Mantaro River Basin

Authors: Julio Jesus Salazar, Julio Jesus De Lama

Abstract:

the fundamental objective of hydrological studies applied to the engineering field is to determine the statistically consistent volumes or water flows that, in each case, allow us to size or design a series of elements or structures to effectively manage and develop a river basin. To determine these values, there are several ways of working within the framework of traditional hydrology: (1) Study each of the factors that influence the hydrological cycle, (2) Study the historical behavior of the hydrology of the area, (3) Study the historical behavior of hydrologically similar zones, and (4) Other studies (rain simulators or experimental basins). Of course, this range of studies in a certain basin is very varied and complex and presents the difficulty of collecting the data in real time. In this complex space, the study of variables can only be overcome by collecting and transmitting data to decision centers through the Internet of things and artificial intelligence. Thus, this research work implemented the learning project of the sub-basin of the Shullcas river in the Andean basin of the Mantaro river in Peru. The sensor firmware to collect and communicate hydrological parameter data was programmed and tested in similar basins of the European Union. The Machine Learning applications was programmed to choose the algorithms that direct the best solution to the determination of the rainfall-runoff relationship captured in the different polygons of the sub-basin. Tests were carried out in the mountains of Europe, and in the sub-basins of the Shullcas river (Huancayo) and the Yauli river (Jauja) with heights close to 5000 m.a.s.l., giving the following conclusions: to guarantee a correct communication, the distance between devices should not pass the 15 km. It is advisable to minimize the energy consumption of the devices and avoid collisions between packages, the distances oscillate between 5 and 10 km, in this way the transmission power can be reduced and a higher bitrate can be used. In case the communication elements of the devices of the network (internet of things) installed in the basin do not have good visibility between them, the distance should be reduced to the range of 1-3 km. The energy efficiency of the Atmel microcontrollers present in Arduino is not adequate to meet the requirements of system autonomy. To increase the autonomy of the system, it is recommended to use low consumption systems, such as the Ashton Raggatt McDougall or ARM Cortex L (Ultra Low Power) microcontrollers or even the Cortex M; and high-performance direct current (DC) to direct current (DC) converters. The Machine Learning System has initiated the learning of the Shullcas system to generate the best hydrology of the sub-basin. This will improve as machine learning and the data entered in the big data coincide every second. This will provide services to each of the applications of the complex system to return the best data of determined flows.

Keywords: hydrology, internet of things, machine learning, river basin

Procedia PDF Downloads 149
10964 Influence of Vesicular Arbuscular Mycorrhiza on Growth of Cucumis myriocarpus Indigenous Leafy Vegetable

Authors: Pontsho E. Tseke, Phatu W. Mashela

Abstract:

Climate-smart agriculture dictates that underusilised indigenous plant, which served as food for local marginalized communities, be assessed for introduction into mainstream agriculture. Most of the underutilised indigenous plants had survived adverse conditions in the wild; with limited information on how the interact with most abiotic and biotic factors. Cucumis myriocarpus leafy vegetable has nutritional, pharmacological and industrial applications, with limited information on how it interacts with effective microorganisms. The objective of this study was to determine the effects vesicular arbuscular mycorrhiza (VAM) on the growth of C. myriocarpus indigenous leafy vegetable under greenhouse conditions. Four-weeks-old seedlings of C. myriocarpus were transplanted into 20-cm-diameter plastic pots. Two weeks after transplanting, VAM was applied at 0, 10, 20, 30, 40, 50, 60 and 70 g Biocult-VAM plant. At 56 days after treatments, plant growth variables of C. myriocarpus with increase Biocult-VAM levels exhibited positive quadratic relations. Plant variables and increasing concentrations of salinity exhibited positive quadric relations, with 95 to 99% associations. Inclusion, Biocult-VAM can be used in sustainable production of C. myriocarpus for functional food security.

Keywords: abiotic, biotic, rhizasphere, sustainable agriculture

Procedia PDF Downloads 263
10963 Simulation Research of City Bus Fuel Consumption during the CUEDC Australian Driving Cycle

Authors: P. Kacejko, M. Wendeker

Abstract:

The fuel consumption of city buses depends on a number of factors that characterize the technical properties of the bus and driver, as well as traffic conditions. This parameter related to greenhouse gas emissions is regulated by law in many countries. This applies to both fuel consumption and exhaust emissions. Simulation studies are a way to reduce the costs of optimization studies. The paper describes simulation research of fuel consumption city bus driving. Parameters of the developed model are based on experimental results obtained on chassis dynamometer test stand and road tests. The object of the study was a city bus equipped with a compression-ignition engine. The verified model was applied to simulate the behavior of a bus during the CUEDC Australian Driving Cycle. The results of the calculations showed a direct influence of driving dynamics on fuel consumption.

Keywords: Australian Driving Cycle, city bus, diesel engine, fuel consumption

Procedia PDF Downloads 107
10962 The Distribution and Environmental Behavior of Heavy Metals in Jajarm Bauxite Mine, Northeast Iran

Authors: Hossein Hassani, Ali Rezaei

Abstract:

Heavy metals are naturally occurring elements that have a high atomic weight and a density at least five times greater than that of water. Their multiple industrial, domestic, agricultural, medical, and technological applications have led to their wide distribution in the environment, raising concerns over their potential effects on human health and the environment. Environmental protection against various pollutants, such as heavy metals formed by industries, mines and modern technologies, is a concern for researchers and industry. In order to assess the contamination of soils the distribution and environmental behavior have been investigated. Jajarm bauxite mine, the most important deposits have been discovered in Iran, which is about 22 million tons of reserve, and is the main mineral of the Diaspora. With a view to estimate the heavy metals ratio of the Jajarm bauxite mine area and to evaluate the pollution level, 50 samples have been collected and have been analyzed for the heavy metals of As, Cd, Cu, Hg, Ni and Pb with the help of Inductively Coupled Plasma-Mass Spectrometer (ICP- MS). In this study, we have dealt with determining evaluation criteria including contamination factor (CF), average concentration (AV), enrichment factor (EF) and geoaccumulation index (GI) to assess the risk of pollution from heavy metals(As, Cd, Cu, Hg, Ni and Pb) in Jajarm bauxite mine. In the samples of the studied, the average of recorded concentration of elements for Arsenic, Cadmium, Copper, Mercury, Nickel and Lead are 18, 0.11, 12, 0.07, 58 and 51 (mg/kg) respectively. The comparison of the heavy metals concentration average and the toxic potential in the samples has shown that an average with respect to the world average of the uncontaminated soil amounts. The average of Pb and As elements shows a higher quantity with respect to the world average quantity. The pollution factor for the study elements has been calculated on the basis of the soil background concentration and has been categorized on the basis of the uncontaminated world soil average with respect to the Hakanson classification. The calculation of the corrected pollutant degree shows the degree of the bulk intermediate pollutant (1.55-2.0) for the average soil sampling of the study area which is on the basis of the background quantity and the world average quantity of the uncontaminated soils. The provided conclusion from calculation of the concentrated factor, for some of the samples show that the average of the lead and arsenic elements stations are more than the background values and the unnatural metal concentration are covered under the study area, That's because the process of mining and mineral extraction. Given conclusion from the calculation of Geoaccumulation index of the soil sampling can explain that the copper, nickel, cadmium, arsenic, lead and mercury elements are Uncontamination. In general, the results indicate that the Jajarm bauxite mine of heavy metal pollution is uncontaminated area and extract the mineral from the mine, not create environmental hazards in the region.

Keywords: enrichment factor, geoaccumulation index, heavy metals, Jajarm bauxite mine, pollution

Procedia PDF Downloads 277
10961 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 178
10960 Drivers of Satisfaction and Dissatisfaction in Camping Tourism: A Case Study from Croatia

Authors: Darko Prebežac, Josip Mikulić, Maja Šerić, Damir Krešić

Abstract:

Camping tourism is recognized as a growing segment of the broader tourism industry, currently evolving from an inexpensive, temporary sojourn in a rural environment into a highly fragmented niche tourism sector. The trends among public-managed campgrounds seem to be moving away from rustic campgrounds that provide only a tent pad and a fire ring to more developed facilities that offer a range of different amenities, where campers still search for unique experiences that go above the opportunity to experience nature and social interaction. In addition, while camping styles and options changed significantly over the last years, coastal camping in particular became valorized as is it regarded with a heightened sense of nostalgia. Alongside this growing interest in the camping tourism, a demand for quality servicing infrastructure emerged in order to satisfy the wide variety of needs, wants, and expectations of an increasingly demanding traveling public. However, camping activity in general and quality of camping experience and campers’ satisfaction in particular remain an under-researched area of the tourism and consumption behavior literature. In this line, very few studies addressed the issue of quality product/service provision in satisfying nature based tourists and in driving their future behavior with respect to potential re-visitation and recommendation intention. The present study thus aims to investigate the drivers of positive and negative campsite experience using the case of Croatia. Due to the well-preserved nature and indented coastline, camping tourism has a long tradition in Croatia and represents one of the most important and most developed tourism products. During the last decade the number of tourist overnights in Croatian camps has increased by 26% amounting to 16.5 million in 2014. Moreover, according to Eurostat the market share of campsites in the EU is around 14%, indicating that the market share of Croatian campsites is almost double large compared to the EU average. Currently, there are a total of 250 camps in Croatia with approximately 75.8 thousands accommodation units. It is further noteworthy that Croatian camps have higher average occupancy rates and a higher average length of stay as compared to the national average of all types of accommodation. In order to explore the main drivers of positive and negative campsite experiences, this study uses principal components analysis (PCA) and an impact-asymmetry analysis (IAA). Using the PCA, first the main dimensions of the campsite experience are extracted in an exploratory manner. Using the IAA, the extracted factors are investigated for their potentials to create customer delight and/or frustration. The results provide valuable insight to both researchers and practitioners regarding the understanding of campsite satisfaction.

Keywords: Camping tourism, campsite, impact-asymmetry analysis, satisfaction

Procedia PDF Downloads 175
10959 A Study on Pattern of Acute Poisoning in Patients Admitted to Emergency Wards in a Tertiary Care Hospital

Authors: Sathvika Reddy, Devi Revathi

Abstract:

Background: In India, deliberate self-harm (DSH) with poisoning agents carries a significant impact on morbidity and mortality. Changes in the patterns of poisoning vary across various geographical locations. It is important to know the patterns in a given region in order to facilitate rapid clinical diagnosis, appropriate treatment to reduce associated morbidity and mortality. Aim and Objective: To study the patterns, treatment outcomes of acute poisoning in patients admitted to emergency wards in a tertiary care hospital and to provide poison information services. Materials and Methods: This study was conducted at M.S Ramaiah Memorial and Teaching Hospital from November 2016 to March 2017. The patient’s data was obtained from patient case sheet, interaction with health care professionals, interviewing patients and their caretakers (if possible), and were documented in a suitably designed form. Results: The study involved 131 patients with a mean age of 27.76 ± 15.5 years. Majority of the patients were in the age group 21-30 years, literates (n=53) dwelling in urban (n=113) areas belonging to upper middle class (n=50). Analgesics and antipyretics were commonly utilized in intentional drug overdosage (n=49). Envenomation constituted n=21(16.03%). Furthermore, a significant relationship was observed between marital status and self-poisoning (n=64) (P < 0.001) which commonly occurred through oral ingestion. The outcomes were correlated with the GCS and PSS system and n=85 recovered, n=17 were discharged against medical advice, and n=4 died, and n=4 were lost to follow up respectively. The poison information queries include drug overdose (n=29) and management related queries (n=22) provided majorly by residents (n=45) to update knowledge (n=11) and for better patient care (n=40). Conclusion: The trend in poisoning is dynamic. Medications were identified as the main cause of poisoning in urban areas of India. Educational programs with more emphasis on preventive measures are necessary to create awareness among the general public.

Keywords: poisoning, suicides, clinical pharmacist, envenomation, poison information services

Procedia PDF Downloads 154
10958 FC and ZFC Studies of Nickel Nano Ferrites and Ni Doped Lithium Nano Ferrites by Citrate-Gel Auto Combustion Method

Authors: D. Ravinder

Abstract:

Nickel ferrites and Ni doped Lithium nano ferrites [Li0.5Fe0.5]1-xNixFe2O4 with x= 0.8 and 1.0 synthesized by citrate-gel auto combustion method. The broad peaks in the X-ray diffraction pattern (XRD) indicate a crystalline behavior of the prepared samples. Low temperature magnetization studies i,e Field Cooled (FC) and Zero Field Cooled (ZFC) magnetic studies of the investigated samples are measured by using vibrating sample magnetometer (VSM). The magnetization of the prepared samples as a function of an applied magnetic field 10 T was measured at two different temperatures 5 K and 310 K. Field Cooled (FC) and Zero Field Cooled (ZFC) magnetization measurements under an applied field of 100 Oe and 1000 Oe in the temperature range of 5–375 K were carried out.

Keywords: ferro-spinels, field cooled (FC), Zero Field Cooled (ZFC) and blocking temperature, superpara magnetism, drug delivery applications

Procedia PDF Downloads 541
10957 Linguistic Symbols Principle Construction in Cultural Creative Product Design

Authors: Pei-Jun Xue, Ming-Yu Hsiao

Abstract:

Language is the emblem of a culture, representing the extension of cultural life. In addition, it is also an important tool for communication and message transmission. It carries not only information but also covers the self-conscious of the information constructor as well as the situational experiences of users from different backgrounds. Moreover, design can be regarded as a language, a dynamic process of coding and decoding. With the designers’ experiences in everyday life, they bring them into the products’ experiences. Considered from the aspects of atmosphere and the five senses, a designer should consider and reconsider how to communicate the messages effectively to suit the users’ needs. In the process of language learning, we should understand the construction behind it and the rules of the compositions of language codes. Regarding the understanding of the design of works or the form of product construction, it is necessary for us to understand the coding system during the process of product construction. The form (signifiers) and meanings (signified) of Chinese characters are closely related. At the same time, it is also a process of simplifying the complicated to the simple. This study discusses the chinese characters that used in the cultural symbols construction, and analysis of existing products by Peirce's semiotic triangles. Through people's cognition of Chinese characters and constitute method, help to understand the way of construction product symbol.

Keywords: cultural-creative product design, cultural product, cultural symbols, linguistic symbols

Procedia PDF Downloads 441
10956 Impact of National Institutions on Corporate Social Performance

Authors: Debdatta Mukherjee, Abhiman Das, Amit Garg

Abstract:

In recent years, there is a growing interest about corporate social responsibility of firms in both academic literature and business world. Since business forms a part of society incorporating socio-environment concerns into its value chain, activities are vital for ensuring mutual sustainability and prosperity. But, until now most of the works have been either descriptive or normative rather than positivist in tone. Even the few ones with a positivist approach have mostly studied the link between corporate financial performance and corporate social performance. However, these studies have been severely criticized by many eminent authors on grounds that they lack a theoretical basis for their findings. They have also argued that apart from corporate financial performance, there must be certain other crucial influences that are likely to determine corporate social performance of firms. In fact, several studies have indicated that firms operating in distinct national institutions show significant variations in the corporate social responsibility practices that they undertake. This clearly suggests that the institutional context of a country in which the firms operate is a key determinant of corporate social performance of firms. Therefore, this paper uses an institutional framework to understand why corporate social performance of firms vary across countries. It examines the impact of country level institutions on corporate social performance using a sample of 3240 global publicly-held firms across 33 countries covering the period 2010-2015. The country level institutions include public institutions, private institutions, markets and capacity to innovate. Econometric Analysis has been mainly used to assess this impact. A three way panel data analysis using fixed effects has been used to test and validate appropriate hypotheses. Most of the empirical findings confirm our hypotheses and the economic significance indicates the specific impact of each variable and their importance relative to others. The results suggest that institutional determinants like ethical behavior of private institutions, goods market, labor market and innovation capacity of a country are significantly related to the corporate social performance of firms. Based on our findings, few implications for policy makers from across the world have also been suggested. The institutions in a country should promote competition. The government should use policy levers for upgrading home demands, like setting challenging yet flexible safety, quality and environment standards, and framing policies governing buyer information, providing innovative recourses to low quality goods and services and promoting early adoption of new and technologically advanced products. Moreover, the institution building in a country should be such that they facilitate and improve the capacity of firms to innovate. Therefore, the proposed study argues that country level institutions impact corporate social performance of firms, empirically validates the same, suggest policy implications and attempts to contribute to an extended understanding of corporate social responsibility and corporate social performance in a multinational context.

Keywords: corporate social performance, corporate social responsibility, institutions, markets

Procedia PDF Downloads 155
10955 Video Materials as a Persuasive Strategy in Tourism Discourse

Authors: Ganna Zakharova

Abstract:

The persuasive influence of tourism promotional materials is very much experienced nowadays. In order to attract the attention of viewers, marketers choose various techniques in their digital texts. Video is an essential element for attraction and seduction; it is a trigger element for tourists. This solution for web marketing engages and convinces potential tourists to book a tourism product. Embedding video materials into a website provides useful information, create different feelings in viewers, and help them finalize their decisions. The present article discusses video solutions for health tourism websites used to allure potential tourists. The paper reviews the influential elements of persuasive tourism marketing videos. The article highlights how these components as persuasive strategies of tourism promotional materials can influence the decisions of tourism websites’ users. The result section provides the real examples of the deployment of the mentioned technique to convince the audience by the website of 'Karpaty' resort (Ukraine). This technique is worth attention as it plays an important role in the promotion of tourism services. The data collection of this study will provide updated information in relation to the rhetoric of tourism.

Keywords: tourism discourse, persuasive video, influential videos in marketing, persuasive discourse, tourism promotion

Procedia PDF Downloads 111