Search results for: interest flooding attack
4139 Creating a Professional Knowledge Base for Multi-Grade Teaching: Case Studies
Authors: Matshidiso Joyce Taole, Linley Cornish
Abstract:
Teacher’s professional knowledge has become the focus of interest over decades and the interest has intensified in the 21st century. Teachers are expected to develop their professional academic expertise continually, on an ongoing basis. Such professional development may relate to acquiring enhanced expertise in terms of leadership, curriculum development, teaching and learning, assessment of/for learning and feedback for enhanced learning. The paper focuses on professional knowledge base required for teachers in multi-grade contexts. This paper argues that although teacher knowledge is strongly related to individual experiences and contexts, there are elements of teacher knowledge that are particular to multi-grade context. The study employed qualitative design using interviews and observations. The participants were multi-grade teachers and teaching principals. The study revealed that teachers need to develop skills such as learner grouping, differentiating the curriculum, planning, time management and be life-long learners so that they stay relevant and up to date with developments not only in the education sector but globally. This will help teachers to learn increasingly sophisticated methods for engaging the diverse needs of students in their classrooms.Keywords: curriculum differentiation, multi-grade, planning, teacher knowledge
Procedia PDF Downloads 4174138 Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.Keywords: image security, random LSB, steganography, visual cryptography
Procedia PDF Downloads 3304137 Eucalyptus camaldulensis Leaves Attacked by the Gall Wasp Leptocybe invasa: A Phyto-Volatile Constituents Study
Authors: Maged El-Sayed Mohamed
Abstract:
Eucalyptus camaldulensis is one on the most well-known species of the genus Eucalyptus in the Middle east, its importance relay on the high production of its unique volatile constituents which exhibits many medicinal and pharmacological activities. The gall-forming wasp (Leptocybe invasa) has recently come into sight as the main pest attacking E. camaldulensis and causing severe injury. The wasp lays its eggs in the petiole and midrib of leaves and stems of young shoots of E. camaldulensis, which leads to gall formation. Gall formation by L. invasa damages growing shoot and leaves of Eucalyptus, resulting in abscission of leaves and drying. AIM: This study is an attempt to investigate the effect of the gall wasp (Leptocybe invasa) attack on the volatile constitutes of E. camaldulensis. This could help in the control of this wasp through stimulating plant defenses or production of a new allelochemicals or insecticide. The study of volatile constitutes of Eucalyptus before and after attack by the wasp can help the re-use and recycle of the infected Eucalyptus trees for new pharmacological and medicinal activities. Methodology: The fresh gall wasp-attacked and healthy leaves (100 g each) were cut and immediately subjected to hydrodistillation using Clevenger-type apparatus for 3 hours. The volatile fractions isolated were analyzed using Gas chromatography/mass spectrometry (GC/MS). Kovat’s retention indices (RI) were calculated with respect to a set of co-injected standard hydrocarbons (C10-C28). Compounds were identified by comparing their spectral data and retention indices with Wiley Registry of Mass Spectral Data 10th edition (April 2013), NIST 11 Mass Spectral Library (NIST11/2011/EPA/NIH) and literature data. Results: Fifty-nine components representing 89.13 and 88.60% of the total volatile fraction content respectively were quantitatively analyzed. Twenty-six major compounds at an average concentration greater than 0.1 ± 0.02% have been used for the statistical comparison. From those major components, twenty-one were found in both the attacked and healthy Eucalyptus leaves’ fractions in different concentration and five components, mono terpene p-Mentha-2-4(8) diene and the sesquiterpenes δ-elemene, β-elemene, E-caryophyllene and Bicyclogermacrene, were unique and only produced in the attacked-leaves’ fraction. CONCLUSION: Newly produced components or those commonly found in the volatile fraction and changed in concentration could represent a part of the plant defense mechanisms or might be an element of the plant allelopathic and communication mechanisms. Identification of the components of the gall wasp-damaged leaves can help in their recycling for different physiological, pharmacological and medicinal uses.Keywords: Eucalyptus camaldulensis, eucalyptus recycling, gall wasp, Leptocybe invasa, plant defense mechanisms, Terpene fraction
Procedia PDF Downloads 3584136 Integrating a Universal Forensic DNA Database: Anticipated Deterrent Effects
Authors: Karen Fang
Abstract:
Investigative genetic genealogy has attracted much interest in both the field of ethics and the public eye due to its global application in criminal cases. Arguments have been made regarding privacy and informed consent, especially with law enforcement using consumer genetic testing results to convict individuals. In the case of public interest, DNA databases have the strong potential to significantly reduce crime, which in turn leads to safer communities and better futures. With the advancement of genetic technologies, the integration of a universal forensic DNA database in violent crimes, crimes against children, and missing person cases is expected to deter crime while protecting one’s privacy. Rather than collecting whole genomes from the whole population, STR profiles can be used to identify unrelated individuals without compromising personal information such as physical appearance, disease risk, and geographical origin, and additionally, reduce cost and storage space. STR DNA profiling is already used in the forensic science field and going a step further benefits several areas, including the reduction in recidivism, improved criminal court case turnaround time, and just punishment. Furthermore, adding individuals to the database as early as possible prevents young offenders and first-time offenders from participating in criminal activity. It is important to highlight that DNA databases should be inclusive and tightly governed, and the misconception on the use of DNA based on crime television series and other media sources should be addressed. Nonetheless, deterrent effects have been observed in countries like the US and Denmark with DNA databases that consist of serious violent offenders. Fewer crimes were reported, and fewer people were convicted of those crimes- a favorable outcome, not even the death penalty could provide. Currently, there is no better alternative than a universal forensic DNA database made up of STR profiles. It can open doors for investigative genetic genealogy and fostering better communities. Expanding the appropriate use of DNA databases is ethically acceptable and positively impacts the public.Keywords: bioethics, deterrent effects, DNA database, investigative genetic genealogy, privacy, public interest
Procedia PDF Downloads 1494135 Geographical Data Visualization Using Video Games Technologies
Authors: Nizar Karim Uribe-Orihuela, Fernando Brambila-Paz, Ivette Caldelas, Rodrigo Montufar-Chaveznava
Abstract:
In this paper, we present the advances corresponding to the implementation of a strategy to visualize geographical data using a Software Development Kit (SDK) for video games. We use multispectral images from Landsat 7 platform and Laser Imaging Detection and Ranging (LIDAR) data from The National Institute of Geography and Statistics of Mexican (INEGI). We select a place of interest to visualize from Landsat platform and make some processing to the image (rotations, atmospheric correction and enhancement). The resulting image will be our gray scale color-map to fusion with the LIDAR data, which was selected using the same coordinates than in Landsat. The LIDAR data is translated to 8-bit raw data. Both images are fused in a software developed using Unity (an SDK employed for video games). The resulting image is then displayed and can be explored moving around. The idea is the software could be used for students of geology and geophysics at the Engineering School of the National University of Mexico. They will download the software and images corresponding to a geological place of interest to a smartphone and could virtually visit and explore the site with a virtual reality visor such as Google cardboard.Keywords: virtual reality, interactive technologies, geographical data visualization, video games technologies, educational material
Procedia PDF Downloads 2464134 Blast Resistance Enhancement of Structures Subjected to Improvised Explosive Devices Attack: A Numerical Study
Authors: Michael I. Okereke, Ambrose I. Akpoyomare
Abstract:
This paper presents a numerical study of the impact mechanic of metallic and sandwich structures incorporate with blast resistance enhancements. The study focuses on structures that have been exposed to improvised explosives devices (IEDs) attacks. The results show numerical conclusions on mechanisms to ensure blast resistance enhancement for the applications studied in this work. The work has identified optimal panel configuration both in geometry and configurations to ensure optimal blast resistance response to such IEDs discharges. Findings from this work will drive improvements in especially military and civilian vehicles in countries where blast attacks on vehicular occupants are quite rampant like Pakistan and Afghanistan.Keywords: blast resistance, blast enhancement, explosives, material behavior
Procedia PDF Downloads 3734133 External Retinal Prosthesis Image Processing System Used One-Cue Saliency Map Based on DSP
Authors: Yili Chen, Jixiang Fu, Zhihua Liu, Zhicheng Zhang, Rongmao Li, Nan Fu, Yaoqin Xie
Abstract:
Retinal prothesis is designed to help the blind to get some sight.It is made up of internal part and external part.In external part ,there is made up of camera, image processing, and RF transmitter.In internal part, there is RF receiver, implant chip,micro-electrode.The image got from the camera should be processed by suitable stragies to corresponds to stimulus the electrode.Nowadays, the number of the micro-electrode is hundreds and we don’t know the mechanism how the elctrode stimulus the optic nerve, an easy way to the hypothesis is that the pixel in the image is correspondence to the electrode.So it is a question how to get the important information of the image captured from the picture.There are many strategies to experimented to get the most important information as soon as possible, due to the real time system.ROI is a useful algorithem to extract the region of the interest.Our paper will explain the details of the orinciples and functions of the ROI.And based on this, we simplified the ROI algrithem,and used it in outside image prcessing DSP system of the retinal prothesis.Results show that our image processing stratiges is suitable for real-time retinal prothesis and can cut redundant information and help useful information to express in the low-size image.Keywords: image processing, region of interest, saliency map, low-size image, useful information express, cut redundant information in image
Procedia PDF Downloads 2824132 Red Green Blue Image Encryption Based on Paillier Cryptographic System
Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson
Abstract:
In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier
Procedia PDF Downloads 2384131 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report
Authors: Khaled Alabduljabbar
Abstract:
Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy
Procedia PDF Downloads 894130 An investigation of Leading Edge and Trailing Edge Corrugation for Low Reynolds Number Application
Authors: Syed Hassan Raza Shah, Mohammad Mohammad Ali
Abstract:
The flow over a smoothly profiled airfoil at a low Reynolds number is highly susceptible to separate even at a very low angle of attack. An investigation was made to study the effect of leading-edge and trailing-edge corrugation with the spanwise change in the ridges resulted due to the change in the chord length for an infinite wing. The wind tunnel results using NACA0018 wings revealed that leading and trailing edge corrugation did not have any benefit in terms of aerodynamic efficiency or delayed stall. The leading edge and trailing edge corrugation didn't change the lift curve slope, with the leading edge corrugation wing stalling first in the range of Reynolds number of 50,000 to 125,000.Keywords: leading and trailing edge corrugations, low reynolds number, wind tunnel testing, NACA0018
Procedia PDF Downloads 2914129 Computation of Radiotherapy Treatment Plans Based on CT to ED Conversion Curves
Authors: B. Petrović, L. Rutonjski, M. Baucal, M. Teodorović, O. Čudić, B. Basarić
Abstract:
Radiotherapy treatment planning computers use CT data of the patient. For the computation of a treatment plan, treatment planning system must have an information on electron densities of tissues scanned by CT. This information is given by the conversion curve CT (CT number) to ED (electron density), or simply calibration curve. Every treatment planning system (TPS) has built in default CT to ED conversion curves, for the CTs of different manufacturers. However, it is always recommended to verify the CT to ED conversion curve before actual clinical use. Objective of this study was to check how the default curve already provided matches the curve actually measured on a specific CT, and how much it influences the calculation of a treatment planning computer. The examined CT scanners were from the same manufacturer, but four different scanners from three generations. The measurements of all calibration curves were done with the dedicated phantom CIRS 062M Electron Density Phantom. The phantom was scanned, and according to real HU values read at the CT console computer, CT to ED conversion curves were generated for different materials, for same tube voltage 140 kV. Another phantom, CIRS Thorax 002 LFC which represents an average human torso in proportion, density and two-dimensional structure, was used for verification. The treatment planning was done on CT slices of scanned CIRS LFC 002 phantom, for selected cases. Interest points were set in the lungs, and in the spinal cord, and doses recorded in TPS. The overall calculated treatment times for four scanners and default scanner did not differ more than 0.8%. Overall interest point dose in bone differed max 0.6% while for single fields was maximum 2.7% (lateral field). Overall interest point dose in lungs differed max 1.1% while for single fields was maximum 2.6% (lateral field). It is known that user should verify the CT to ED conversion curve, but often, developing countries are facing lack of QA equipment, and often use default data provided. We have concluded that the CT to ED curves obtained differ in certain points of a curve, generally in the region of higher densities. This influences the treatment planning result which is not significant, but definitely does make difference in the calculated dose.Keywords: Computation of treatment plan, conversion curve, radiotherapy, electron density
Procedia PDF Downloads 4864128 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat
Authors: Basman Elhadidi, Islam Elqatary, Osama Saaid, Hesham Othman
Abstract:
An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.Keywords: active slat, flow control, experimental investigation, aerodynamic performance
Procedia PDF Downloads 4374127 Project-Bbased Learning (PBL) Taken to Extremes: Full-Year/Full-Time PBL Replacement of Core Curriculum
Authors: Stephen Grant Atkins
Abstract:
Radical use of project-based learning (PBL) in a small New Zealand business school provides an opportunity to longitudinally examine its effects over a decade of pre-Covid data. Prior to this business school’s implementation of PBL, starting in 2012, the business pedagogy literature presented just one example of PBL replacing an entire core-set of courses. In that instance, a British business school merged four of its ‘degree Year 3’ accounting courses into one PBL semester. As radical as that would have seemed, to students aged 20-to-22, the PBL experiment conducted in a New Zealand business school was notably more extreme: 41 nationally-approved Learning Outcomes (L.O.s), these deriving from 8 separate core courses, were aggregated into one grand set of L.O.s, and then treated as a ‘full-year’/‘full-time’ single course. The 8 courses in question were all components of this business school’s compulsory ‘degree Year 1’ curriculum. Thus, the students involved were notably younger (…ages 17-to-19…), and no ‘part-time’ enrolments were allowed. Of interest are this PBL experiment’s effects on subsequent performance outcomes in ‘degree Years 2 & 3’ (….which continued to operate in their traditional ways). Of special interest is the quality of ‘group project’ outcomes. This is because traditionally, ‘degree Year 1’ course assessments are only minimally based on group work. This PBL experiment altered that practice radically, such that PBL ‘degree Year 1’ alumni entered their remaining two years of business coursework with far more ‘project group’ experience. Timeline-wise, thus of interest here, firstly, is ‘degree Year 2’ performance outcomes data from years 2010-2012 + 2016-2018, and likewise ‘degree Year 3’ data for years 2011-2013 + 2017-2019. Those years provide a pre-&-post comparative baseline for performance outcomes in students never exposed to this school’s radical PBL experiment. That baseline is then compared to PBL alumni outcomes (2013-2016….including’Student Evaluation of Course Quality’ outcomes…) to clarify ‘radical PBL’ effects.Keywords: project-based learning, longitudinal mixed-methods, students criticism, effects-on-learning
Procedia PDF Downloads 974126 Facebook Spam and Spam Filter Using Artificial Neural Networks
Authors: A. Fahim, Mutahira N. Naseem
Abstract:
SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.Keywords: artificial neural networks, facebook spam, social networking sites, spam filter
Procedia PDF Downloads 3724125 Rock Property Calculation for Determine Hydrocarbon Zone Based on Petrophysical Principal and Sequence Stratigraphic Correlation in Blok M
Authors: Muhammad Tarmidzi, Reza M. G. Gani, Andri Luthfi
Abstract:
The purpose of this study is to identify rock zone containing hydrocarbons with calculating rock property includes volume shale, total porosity, effective porosity and water saturation. Identification method rock property based on GR log, resistivity log, neutron log and density rock. Zoning is based on sequence stratigraphic markers that are sequence boundary (SB), transgressive surface (TS) and flooding surface (FS) which correlating ten well log in blok “M”. The results of sequence stratigraphic correlation consist of eight zone that are two LST zone, three TST zone and three HST zone. The result of rock property calculation in each zone is showing two LST zone containing hydrocarbons. LST-1 zone has average volume shale (Vsh) 25%, average total porosity (PHIT) 14%, average effective porosity (PHIE) 11% and average water saturation 0,83. LST-2 zone has average volume shale (Vsh) 19%, average total porosity (PHIT) 21%, average effective porosity (PHIE) 17% and average water saturation 0,82.Keywords: hydrocarbons zone, petrophysic, rock property, sequence stratigraphic
Procedia PDF Downloads 3274124 Enhancing Students’ Achievement, Interest and Retention in Chemistry through an Integrated Teaching/Learning Approach
Authors: K. V. F. Fatokun, P. A. Eniayeju
Abstract:
This study concerns the effects of concept mapping-guided discovery integrated teaching approach on the learning style and achievement of chemistry students. The sample comprised 162 senior secondary school (SS 2) students drawn from two science schools in Nasarawa State which have equivalent mean scores of 9.68 and 9.49 in their pre-test. Five instruments were developed and validated while the sixth was purely adopted by the investigator for the study, Four null hypotheses were tested at α = 0.05 level of significance. Chi square analysis showed that there is a significant shift in students’ learning style from accommodating and diverging to converging and assimilating when exposed to concept mapping- guided discovery approach. Also t-test and ANOVA that those in experimental group achieve and retain content learnt better. Results of the Scheffe’s test for multiple comparisons showed that boys in the experimental group performed better than girls. It is therefore concluded that the concept mapping-guided discovery integrated approach should be used in secondary schools to successfully teach electrochemistry. It is strongly recommended that chemistry teachers should be encouraged to adopt this method for teaching difficult concepts.Keywords: integrated teaching approach, concept mapping-guided discovery, achievement, retention, learning styles and interest
Procedia PDF Downloads 3294123 The Other Dreamers: A Study of the Relationship between Returned Migration and Entrepreneurship
Authors: Pascual García, Francisco Ochoa, Jessica Ordoñez
Abstract:
The links between migration and development have been widely written and analyzed from different perspectives. However, the nexus between entrepreneurship and migration is of recent interest. The different studies related to this have focused on the ventures of ethnic enclaves, or on transnational businesses, which link the community of origin and destination. Beyond this perspective, this work analyzes the return migration, (a few studies until now, but forming part of a theoretical body of migration). As a result of the European crisis started between 2007-2008. Many Ecuadorians who lived in Europe, decided to return to their place of origin. The rise of the price of the oil and commodities presented a better panorama in Ecuador than in Europe. Faced with the magnitude of returnees, the opportunities for entrepreneurship in Ecuador increased (Accumulation of human capital, social capital, learned skills and capital). Thus there is an interest in the possibility of returned migrants in the country to start a business in their place of origin. The following study is the result of this. A survey of 110 returned migrants was carried out in the south of Ecuador and, using a Probit econometric model, we determined that the variables specified as geographic area, sex, education level are not significant, so they are not determinant when undertaking. However, time abroad and skills learned, if they were significant at the time of the decision to start a business.Keywords: entrepreneurship, development, migration, returned migration
Procedia PDF Downloads 2104122 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes
Authors: Bruno Vilić Belina, Jadranko Matuško
Abstract:
The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control
Procedia PDF Downloads 684121 Analyzing the Effects of Supply and Demand Shocks in the Spanish Economy
Authors: José M Martín-Moreno, Rafaela Pérez, Jesús Ruiz
Abstract:
In this paper we use a small open economy Dynamic Stochastic General Equilibrium Model (DSGE) for the Spanish economy to search for a deeper characterization of the determinants of Spain’s macroeconomic fluctuations throughout the period 1970-2008. In order to do this, we distinguish between tradable and non-tradable goods to take into account the fact that the presence of non-tradable goods in this economy is one of the largest in the world. We estimate a DSGE model with supply and demand shocks (sectorial productivity, public spending, international real interest rate and preferences) using Kalman Filter techniques. We find the following results. First of all, our variance decomposition analysis suggests that 1) the preference shock basically accounts for private consumption volatility, 2) the idiosyncratic productivity shock accounts for non-tradable output volatility, and 3) the sectorial productivity shock along with the international interest rate both greatly account for tradable output. Secondly, the model closely replicates the time path observed in the data for the Spanish economy and finally, the model captures the main cyclical qualitative features of this economy reasonably well.Keywords: business cycle, DSGE models, Kalman filter estimation, small open economy
Procedia PDF Downloads 4164120 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 1544119 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution
Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang
Abstract:
Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution
Procedia PDF Downloads 1584118 Bathymetric Change of Brahmaputra River and Its Influence on Flooding Scenario
Authors: Arup Kumar Sarma, Rohan Kar
Abstract:
The development of physical model of River like Brahmaputra, which finds its origin in the Chema Yundung glacier of Tibet and flows through India and Bangladesh, is always expensive and very much time consuming. With the advancement of computational technique, mathematical modeling has found wide application. MIKE 21C is one such commercial software, developed by Danish Hydraulic Institute (DHI), with the depth-averaged approach and a two-dimensional curvilinear finite-difference model, which is capable of modeling hydrodynamic and morphological processes with some limitations. The main purpose of this study are to generate bathymetry of the River Brahmaputra starting from “Sadia” at upstream to “Dhubri,” at downstream stretching a distance of approximately 695 km, for four different years: 1957, 1971, 1977, and 1981 over the grid generated in the MIKE 21C and to carry out the hydrodynamic simulation for these years to analyze the effect of bathymetry change on the surface water elevation. The study has established that bathymetric change can influence the flood level significantly in some of the river reaches and therefore the modification or updating of regular bathymetry is very much essential for the reliable flood routing in alluvial rivers.Keywords: bathymetry, brahmaputra river, hydrodynamic model, surface water elevation
Procedia PDF Downloads 4554117 Synthetic Cannabinoids: Extraction, Identification and Purification
Authors: Niki K. Burns, James R. Pearson, Paul G. Stevenson, Xavier A. Conlan
Abstract:
In Australian state Victoria, synthetic cannabinoids have recently been made illegal under an amendment to the drugs, poisons and controlled substances act 1981. Identification of synthetic cannabinoids in popular brands of ‘incense’ and ‘potpourri’ has been a difficult and challenging task due to the sample complexity and changes observed in the chemical composition of the cannabinoids of interest. This study has developed analytical methodology for the targeted extraction and determination of synthetic cannabinoids available pre-ban. A simple solvent extraction and solid phase extraction methodology was developed that selectively extracted the cannabinoid of interest. High performance liquid chromatography coupled with UV‐visible and chemiluminescence detection (acidic potassium permanganate and tris (2,2‐bipyridine) ruthenium(III)) were used to interrogate the synthetic cannabinoid products. Mass spectrometry and nuclear magnetic resonance spectroscopy were used for structural elucidation of the synthetic cannabinoids. The tris(2,2‐bipyridine)ruthenium(III) detection was found to offer better sensitivity than the permanganate based reagents. In twelve different brands of herbal incense, cannabinoids were extracted and identified including UR‐144, XLR 11, AM2201, 5‐F‐AKB48 and A796‐260.Keywords: electrospray mass spectrometry, high performance liquid chromatography, solid phase extraction, synthetic cannabinoids
Procedia PDF Downloads 4684116 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes
Authors: Jiri Barta
Abstract:
At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.Keywords: computer simulation, communication, continuity, critical infrastructure, information systems, safety
Procedia PDF Downloads 3334115 Effect of Fractional Flow Curves on the Heavy Oil and Light Oil Recoveries in Petroleum Reservoirs
Authors: Abdul Jamil Nazari, Shigeo Honma
Abstract:
This paper evaluates and compares the effect of fractional flow curves on the heavy oil and light oil recoveries in a petroleum reservoir. Fingering of flowing water is one of the serious problems of the oil displacement by water and another problem is the estimation of the amount of recover oil from a petroleum reservoir. To address these problems, the fractional flow of heavy oil and light oil are investigated. The fractional flow approach treats the multi-phases flow rate as a total mixed fluid and then describes the individual phases as fractional of the total flow. Laboratory experiments are implemented for two different types of oils, heavy oil, and light oil, to experimentally obtain relative permeability and fractional flow curves. Application of the light oil fractional curve, which exhibits a regular S-shape, to the water flooding method showed that a large amount of mobile oil in the reservoir is displaced by water injection. In contrast, the fractional flow curve of heavy oil does not display an S-shape because of its high viscosity. Although the advance of the injected waterfront is faster than in light oil reservoirs, a significant amount of mobile oil remains behind the waterfront.Keywords: fractional flow, relative permeability, oil recovery, water fingering
Procedia PDF Downloads 3034114 GC-MS Analysis of Essential Oil From Satureja Hispidula: A Medicinal Plant from Algeria
Authors: Habiba Rechek, Ammar Haouat, Ratiba Mekkiou, Diana C. G. A. Pinto, Artur M. S. Silva
Abstract:
Satureja hispidula is an aromatic and medicinal plant belonging to the family of Lamiaceae native to Algeria, just like mint or thyme. Although she is less known to the general public than her more famous cousins, this species has many therapeutic properties that have been used for centuries in traditional medicine of some regions. For generations, Satureja hispidula has been used in traditional medicine to treat various ailments, including respiratory diseases and diabetes. Its aroma, often described as close to that of mint, gives it a special interest in aromatherapy. Due to the growing interest in the beneficial properties of plant-derived essential oils, the aim of this study is to analyze the chemical composition of S. hispidula essential oil by gas chromatography coupled with mass spectrometry (GC-MS). Identifying the main constituents of essential oil will allow better understanding its chemical nature and exploring its potential for culinary and therapeutic application. The study of the essential oil of S. hispidula reveals a composition rich in 83 compounds, including menthone, pulegone and piperitone as main constituents. This gas chromatography analysis coupled with mass spectrometry provides valuable information about the chemical nature of this oil. However, more in-depth studies are needed to explore the potentially health-enhancing properties of this essential oil.Keywords: satureja hispidula, GC-MS, essential oil, menthone, pulegone
Procedia PDF Downloads 274113 The Effect of Deficit Financing on Macro-Economic Variables in Nigeria (1970-2013)
Authors: Ezeoke Callistus Obiora, Ezeoke Nneka Angela
Abstract:
The study investigated the effect of deficit financing on macroeconomic variables in Nigeria. The specific objectives included to find out the relationship between deficit financing and GDP, interest rate, inflation rate, money supply, exchange rate and private investment respectively on a time series covering a period of 44 years (1970 – 2013). The Ordinary Least Square multiple regression produced statistics for the coefficient of determination (R2), F-test, t-test used for the interpretation of the study. The findings revealed that Deficit financing has significant positive effect on GDP and exchange rate. Again, deficit financing has a positive and insignificant relationship inflation, money supply and investment. Only interest rate recorded negative yet insignificant relationship with deficit financing. The implications of the findings are that deficit financing can be a veritable tool for boosting economic development in Nigeria, but the influential positively rising exchange rate implies that deficit financing devalues the Naira exchange rate to other currencies indicating that deficit financing can affect Nigerians competitive advantage at the world market. Thus, the study concludes that deficit financing has not encouraged economic growth in Nigeria.Keywords: deficit financing, money supply, exchange rate, inflation, GDP, investment, Nigeria
Procedia PDF Downloads 4784112 Contribution to the Study of the Use of Pesticides in the Regions of Tizi Ouzou
Authors: Ramdane Gaouir
Abstract:
Farmers in the two regions of Tizi-Ouzou, DBK and Tadmait, face different crop pests, namely, fungal diseases, insect attack as well as different types of deficiencies. To fight against all these threats, they resort to the use of a wide variety of chemicals. Our survey carried out in these two regions, aims to identify the different types of pesticides used, the method of management of the packaging generated by these phytosanitary products as well as the evaluation of the effect of these products on the farmers' health and the environment. The results obtained highlighted the use of two types of pesticides with a very wide application, namely fungicides and insecticides. The two most widely identified chemical families are neonicotoids and organophosphates, which are among the most toxic and persistent pesticides in the environment. The management method of packaging and the application of products by spraying reflect the lack of training and the unawareness of farmers vis-à-vis the impact of pesticides on their health and on the environment.Keywords: farmers, crops, pesticides, fungicides, neonicotinoids, organochlorines
Procedia PDF Downloads 954111 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat
Authors: Basman Elhadidi, Islam Elqatary, Osama Mohamady, Hesham Othman
Abstract:
An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.Keywords: active slat, flow control, DU96-W180 airfoil, flow streams
Procedia PDF Downloads 3784110 Clicking Based Graphical Password Scheme Resistant to Spyware
Authors: Bandar Alahmadi
Abstract:
The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.Keywords: security, password, authentication, attack, applications
Procedia PDF Downloads 165