Search results for: scope of cyber attacks
1399 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things
Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy
Abstract:
The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.Keywords: internet of things, authentication, cryptography, security protocol
Procedia PDF Downloads 1191398 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Abstract:
Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.Keywords: attribution trace, probabilistic relevance, network attack, attacker identification
Procedia PDF Downloads 3651397 Intersubjectivity of Forensic Handwriting Analysis
Authors: Marta Nawrocka
Abstract:
In each of the legal proceedings, in which expert evidence is carried out, a major concern is the assessment of the evidential value of expert reports. Judicial institutions, while making decisions, rely heavily on the expert reports, because they usually do not possess 'special knowledge' from a certain fields of science which makes it impossible for them to verify the results presented in the processes. In handwriting studies, the standards of analysis are developed. They unify procedures used by experts in comparing signs and in constructing expert reports. However, the methods used by experts are usually of a qualitative nature. They rely on the application of knowledge and experience of expert and in effect give significant range of margin in the assessment. Moreover, the standards used by experts are still not very precise and the process of reaching the conclusions is poorly understood. The above-mentioned circumstances indicate that expert opinions in the field of handwriting analysis, for many reasons, may not be sufficiently reliable. It is assumed that this state of affairs has its source in a very low level of intersubjectivity of measuring scales and analysis procedures, which consist elements of this kind of analysis. Intersubjectivity is a feature of cognition which (in relation to methods) indicates the degree of consistency of results that different people receive using the same method. The higher the level of intersubjectivity is, the more reliable and credible the method can be considered. The aim of the conducted research was to determine the degree of intersubjectivity of the methods used by the experts from the scope of handwriting analysis. 30 experts took part in the study and each of them received two signatures, with varying degrees of readability, for analysis. Their task was to distinguish graphic characteristics in the signature, estimate the evidential value of the found characteristics and estimate the evidential value of the signature. The obtained results were compared with each other using the Alpha Krippendorff’s statistic, which numerically determines the degree of compatibility of the results (assessments) that different people receive under the same conditions using the same method. The estimation of the degree of compatibility of the experts' results for each of these tasks allowed to determine the degree of intersubjectivity of the studied method. The study showed that during the analysis, the experts identified different signature characteristics and attributed different evidential value to them. In this scope, intersubjectivity turned out to be low. In addition, it turned out that experts in various ways called and described the same characteristics, and the language used was often inconsistent and imprecise. Thus, significant differences have been noted on the basis of language and applied nomenclature. On the other hand, experts attributed a similar evidential value to the entire signature (set of characteristics), which indicates that in this range, they were relatively consistent.Keywords: forensic sciences experts, handwriting analysis, inter-rater reliability, reliability of methods
Procedia PDF Downloads 1481396 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics
Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood
Abstract:
We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.Keywords: digital forensics, cloud computing, cyber security, spark, Kubernetes, Kafka
Procedia PDF Downloads 3911395 A Voice Signal Encryption Scheme Based on Chaotic Theory
Authors: Hailang Yang
Abstract:
To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)
Procedia PDF Downloads 501394 Scope of Lasers in Periodontics
Authors: Atmaja Patel
Abstract:
Since the development of lasers in 1951, the first medical application was reported by Goldman in 1962. In 1960, T.H. Maiman produced the first Ruby laser and was used in cardiovascular surgery by McGuff in 1963. After a long time of investigations and new developments in laser technology first clinical applications were performed by Choy and Ginsburg in 1983. Introduction of the first true dental laser was in 1989. This paper is to highlight the various treatments and prevention of periodontal diseases. Lasers have become more predictable and effective form of treatment for periodontal diseases. The advantages of lasers include reduced use of anaesthesia, coagulation that yields a dry surgical field and hence better visibility, reduced need of sutures, minimal swelling and scarring, less pain and medication, faster healing and increased patient acceptance.Keywords: lasers, periodontal surgery, diode laser, healing
Procedia PDF Downloads 3161393 Boryl Radical-Promoted Dehydroxylative Alkylation of 3-Hydroxyoxindole Derivatives
Authors: Tesfaye Tebeka Simur, Tian-Yu Peng, Yi-Feng Wang, Xiu-Wei Wu, Feng-Lian Zhang
Abstract:
A boryl radical-promoted dehydroxylative alkylation of 3-hydroxy-oxindole derivatives is achieved. The reaction starts from addition of 4-dimethylaminopyridine (DMAP)-boryl radical to the amide carbonyl oxygen atom, which induces a spin-center shift process to promote the C−O bond cleavage. The elimination of a hydroxide anion from a free hydroxy group is also accomplished. Capture of the generated carbon radical with alkenes furnishes a variety of C-3 alkylated oxindoles. This method features a simple operation and broad substrate scope.Keywords: boryl radical, C-O, C-F, C=C, C=N bond activation, spin center shift
Procedia PDF Downloads 1001392 Measuring the Economic Impact of Cultural Heritage: Comparative Analysis of the Multiplier Approach and the Value Chain Approach
Authors: Nina Ponikvar, Katja Zajc Kejžar
Abstract:
While the positive impacts of heritage on a broad societal spectrum have long been recognized and measured, the economic effects of the heritage sector are often less visible and frequently underestimated. At macro level, economic effects are usually studied based on one of the two mainstream approach, i.e. either the multiplier approach or the value chain approach. Consequently, there is limited comparability of the empirical results due to the use of different methodological approach in the literature. Furthermore, it is also not clear on which criteria the used approach was selected. Our aim is to bring the attention to the difference in the scope of effects that are encompassed by the two most frequent methodological approaches to valuation of economic effects of cultural heritage on macroeconomic level, i.e. the multiplier approach and the value chain approach. We show that while the multiplier approach provides a systematic, theory-based view of economic impacts but requires more data and analysis, the value chain approach has less solid theoretical foundations and depends on the availability of appropriate data to identify the contribution of cultural heritage to other sectors. We conclude that the multiplier approach underestimates the economic impact of cultural heritage, mainly due to the narrow definition of cultural heritage in the statistical classification and the inability to identify part of the contribution of cultural heritage that is hidden in other sectors. Yet it is not possible to clearly determine whether the value chain method overestimates or underestimates the actual economic impact of cultural heritage since there is a risk that the direct effects are overestimated and double counted, but not all indirect and induced effects are considered. Accordingly, these two approaches are not substitutes but rather complementary. Consequently, a direct comparison of the estimated impacts is not possible and should not be done due to the different scope. To illustrate the difference of the impact assessment of the cultural heritage, we apply both approaches to the case of Slovenia in the 2015-2022 period and measure the economic impact of cultural heritage sector in terms of turnover, gross value added and employment. The empirical results clearly show that the estimation of the economic impact of a sector using the multiplier approach is more conservative, while the estimates based on value added capture a much broader range of impacts. According to the multiplier approach, each euro in cultural heritage sector generates an additional 0.14 euros in indirect effects and an additional 0.44 euros in induced effects. Based on the value-added approach, the indirect economic effect of the “narrow” heritage sectors is amplified by the impact of cultural heritage activities on other sectors. Accordingly, every euro of sales and every euro of gross value added in the cultural heritage sector generates approximately 6 euros of sales and 4 to 5 euros of value added in other sectors. In addition, each employee in the cultural heritage sector is linked to 4 to 5 jobs in other sectors.Keywords: economic value of cultural heritage, multiplier approach, value chain approach, indirect effects, slovenia
Procedia PDF Downloads 751391 The Old Man And The Sea: From A Gerotranscendence Perpective
Abstract:
The Old Man and The Sea is a novella written by Ernest Hemingway that depicts an old fisherman’ journey out into the deep sea in his pursuit to catch a big fish. Through this novella, Hemingway creates a world for his protagonist, Santiago who is portrayed as an old man who has gone eighty-four days without catching a fish, at last hooks an eighteen-foot marlin, the largest he ever known. The old man endures pain and struggles to bring back to shore. Looking through the lens of gerotranscendence, we can see that the old man has his dreams, and goals in life. In his pursuit for happiness, he has fought tirelessly to ward off the shark attacks and finally he won even though only half of his fish is left. Hemingway has portrayed Santiago as an old man as a transcendent self leaping from the dimension of “The Self” to the cosmic dimension with the personal and social relationship dimension in tow. The Old Man and The Sea offers a glimpse of the struggles of an old man, who is old and gaunt but spiritually undefeated in his battle out in the sea. He is surprisingly strong and powerful despite his old age, he respects the sea, the birds. the turtles, the sharks and the fish. He can endure suffering and is focussed on achieving his goals. This is what Hemingway has portrayed Santiago to be a gerotranscendent in the eyes of the gerotranscendental approach in respect of the changes and development as seen in Santiago, the protagonist in this novella.Keywords: gerotranscendence, gerotranscendenatal, old man, the sea, hemingway
Procedia PDF Downloads 321390 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases
Authors: Suglo Tohari Luri
Abstract:
Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.Keywords: data, engine, intelligence, customer, neo4j, database
Procedia PDF Downloads 1931389 Data Modeling and Calibration of In-Line Pultrusion and Laser Ablation Machine Processes
Authors: David F. Nettleton, Christian Wasiak, Jonas Dorissen, David Gillen, Alexandr Tretyak, Elodie Bugnicourt, Alejandro Rosales
Abstract:
In this work, preliminary results are given for the modeling and calibration of two inline processes, pultrusion, and laser ablation, using machine learning techniques. The end product of the processes is the core of a medical guidewire, manufactured to comply with a user specification of diameter and flexibility. An ensemble approach is followed which requires training several models. Two state of the art machine learning algorithms are benchmarked: Kernel Recursive Least Squares (KRLS) and Support Vector Regression (SVR). The final objective is to build a precise digital model of the pultrusion and laser ablation process in order to calibrate the resulting diameter and flexibility of a medical guidewire, which is the end product while taking into account the friction on the forming die. The result is an ensemble of models, whose output is within a strict required tolerance and which covers the required range of diameter and flexibility of the guidewire end product. The modeling and automatic calibration of complex in-line industrial processes is a key aspect of the Industry 4.0 movement for cyber-physical systems.Keywords: calibration, data modeling, industrial processes, machine learning
Procedia PDF Downloads 2951388 The Europeanization of Minority and Disability Rights: A Comparative View
Authors: Katharina Crepaz
Abstract:
Both minority rights and disability rights are relatively new fields for policy-making in a European context, and both are affected by the EU’s diversity mainstreaming approach, as well as by the non-discrimination legislation drafted at the European level. These processes correspond to the classic understanding of Europeanization, namely a “top-down” stream of influence from the European to the national and subnational levels. However, both minority and disability rights movements also show instances of “bottom-up” Europeanization, e.g. transnational advocacy networks and efforts to reach joint goals at the EU-level. This paper aims to provide a comparative perspective on Europeanization in both fields, pointing out similar dynamics and patterns, but also explaining in which sectors outcomes may be different and which domestic and other scope conditions may be responsible for these differences.Keywords: europeanization, disability rights, minority rights, comparative perspective
Procedia PDF Downloads 4171387 Synthetic Dermal Template Use in the Reconstruction of a Chronic Scalp Wound
Authors: Stephanie Cornish
Abstract:
The use of synthetic dermal templates, also known as dermal matrices, such as PolyNovo® Biodegradable Temporising Matrix (BTM), has been well established in the reconstruction of acute wounds with a full thickness defect of the skin. Its use has become common place in the treatment of full thickness burns and is not unfamiliar in the realm of necrotising fasciitis, free flap donor site reconstruction, and the management of acute traumatic wounds. However, the use of dermal templates for more chronic wounds is rare. The authors present the successful use of BTM in the reconstruction of a chronic scalp wound following the excision of a malignancy and multiple previous failed attempts at repair, thus demonstrating the potential for an increased scope of use.Keywords: dermal template, BTM, chronic, scalp wound, reconstruction
Procedia PDF Downloads 891386 Digital Watermarking Based on Visual Cryptography and Histogram
Authors: R. Rama Kishore, Sunesh
Abstract:
Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.Keywords: digital watermarking, visual cryptography, histogram, butter worth filter
Procedia PDF Downloads 3551385 On Grammatical Metaphors: A Corpus-Based Reflection on the Academic Texts Written in the Field of Environmental Management
Authors: Masoomeh Estaji, Ahdie Tahamtani
Abstract:
Considering the necessity of conducting research and publishing academic papers during Master’s and Ph.D. programs, graduate students are in dire need of improving their writing skills through either writing courses or self-study planning. One key feature that could aid academic papers to look more sophisticated is the application of grammatical metaphors (GMs). These types of metaphors represent the ‘non-congruent’ and ‘implicit’ ways of decoding meaning through which one grammatical category is replaced by another, more implied counterpart, which can alter the readers’ understanding of the text as well. Although a number of studies have been conducted on the application of GMs across various disciplines, almost none has been devoted to the field of environmental management, and the scope of the previous studies has been relatively limited compared to the present work. In the current study, attempts were made to analyze different types of GMs used in academic papers published in top-tiered journals in the field of environmental management, and make a list of the most frequently used GMs based on their functions in this particular discipline to make the teaching of academic writing courses more explicit and the composition of academic texts more well-structured. To fulfill these purposes, a corpus-based analysis based on the two theoretical models of Martin et al. (1997) and Liardet (2014) was run. Through two stages of manual analysis and concordancers, ten recent academic articles entailing 132490 words published in two prestigious journals were precisely scrutinized. The results yielded that through the whole IMRaD sections of the articles, among all types of ideational GMs, material processes were the most frequent types. The second and the third ranks would apply to the relational and mental categories, respectively. Regarding the use of interpersonal GMs, objective expanding metaphors were the highest in number. In contrast, subjective interpersonal metaphors, either expanding or contracting, were the least significant. This would suggest that scholars in the field of Environmental Management tended to shift the focus on the main procedures and explain technical phenomenon in detail, rather than to compare and contrast other statements and subjective beliefs. Moreover, since no instances of verbal ideational metaphors were detected, it could be deduced that the act of ‘saying or articulating’ something might be against the standards of the academic genre. One other assumption would be that the application of ideational GMs is context-embedded and that the more technical they are, the least frequent they become. For further studies, it is suggested that the employment of GMs to be studied in a wider scope and other disciplines, and the third type of GMs known as ‘textual’ metaphors to be included as well.Keywords: English for specific purposes, grammatical metaphor, academic texts, corpus-based analysis
Procedia PDF Downloads 1661384 Real-Time Aerial Marine Surveillance System for Safe Navigation
Authors: Vinesh Thiruchelvam, Umar Mumtaz Chowdry, Sathish Kumar Selvaperumal
Abstract:
The prime purpose of the project is to provide a sophisticated system for surveillance specialized for the Port Authorities in the Maritime Industry. The current aerial surveillance does not have a wide dimensioning view. The channels of communication is shared and not exclusive allowing for communications errors or disturbance mainly due to traffic. The scope is to analyze the various aspects as real-time aerial and marine surveillance is one of the most important methods which could ensure the domain security of the sailors. The system will improve real time data as obtained for the controller base station. The key implementation will be based on camera speed, angle and adherence to a sustainable power utilization module.Keywords: SMS, real time, GUI, maritime industry
Procedia PDF Downloads 4971383 Urban Rehabilitation Assessment: Buildings' Integrity and Embodied Energy
Authors: Joana Mourão
Abstract:
Transition to a low carbon economy requires changes in consumption and production patterns, including the improvement of existing buildings’ environmental performance. Urban rehabilitation is a top policy priority in Europe, creating an opportunity to increase this performance. However, urban rehabilitation comprises different typologies of interventions with distinct levels of consideration for cultural urban heritage values and for environmental values, thus with different impacts. Cities rely on both material and non-material forms of heritage that are deep-rooted and resilient. One of the most relevant parts of that urban heritage is the historical pre-industrial housing stock, with an extensive presence in many European cities, as Lisbon. This stock is rehabilitated and transformed at the framework of urban management and local governance traditions, as well as the framework of the global economy, and in that context, faces opportunities and threats that need evaluation and control. The scope of this article is to define methodological bases and research lines for the assessment of impacts that urban rehabilitation initiatives set on the vulnerable and historical pre-industrial urban housing stock, considering it as an environmental and cultural unreplaceable material value and resource. As a framework, this article reviews the concepts of urban regeneration, urban renewal, current buildings conservation and refurbishment, and energy refurbishment of buildings, seeking to define key typologies of urban rehabilitation that represent different approaches to the urban fabric, in terms of scope, actors, and priorities. Moreover, main types of interventions - basing on a case-study in a XVIII century neighborhood in Lisbon - are defined and analyzed in terms of the elements lost in each type of intervention, and relating those to urbanistic, architectonic and constructive values of urban heritage, as well as to environmental and energy efficiency. Further, the article overviews environmental cultural heritage assessment and life-cycle assessment tools, selecting relevant and feasible impact assessment criteria for urban buildings rehabilitation regulation, focusing on multi-level urban heritage integrity. Urbanistic, architectonic, constructive and energetic integrity are studied as criteria for impact assessment and specific indicators are proposed. The role of these criteria in sustainable urban management is discussed. Throughout this article, the key challenges for urban rehabilitation planning and management, concerning urban built heritage as a resource for sustainability, are discussed and clarified.Keywords: urban rehabilitation, impact assessment criteria, buildings integrity, embodied energy
Procedia PDF Downloads 1951382 Cell Patterns and Tissue Metamorphoses Based on Cell Surface Mechanism
Authors: Reyhane Hamed Kamran
Abstract:
Early stage morphogenesis requires the execution of complex systems that direct the nearby conduct of gatherings of cells. The organization of such instruments has been, for the most part, deciphered through the recognizable proof of moderated groups of flagging pathways that spatially and transiently control cell conduct. In any case, how this data is handled to control cell shape and cell elements is an open territory of examination. The structure that rises up out of differing controls, for example, cell science, material science, and formative science, focuses to bond and cortical actin arranges as controllers of cell surface mechanics. In this specific circumstance, a scope of formative marvels can be clarified by the guideline of cell surface pressure.Keywords: cell, tissue damage, morphogenesis, cell conduct
Procedia PDF Downloads 1031381 Cell Patterns and Tissue Metamorphoses Based on Cell Surface Mechanics
Authors: Narin Salehiyan
Abstract:
Early stage morphogenesis requires the execution of complex systems that direct the nearby conduct of gatherings of cells. The organization of such instruments has been, for the most part, deciphered through the recognizable proof of moderated groups of flagging pathways that spatially and transiently control cell conduct. In any case, how this data is handled to control cell shape and cell elements is an open territory of examination. The structure that rises up out of differing controls, for example, cell science, material science and formative science, focuses to bond and cortical actin arranges as controllers of cell surface mechanics. In this specific circumstance, a scope of formative marvels can be clarified by the guideline of cell surface pressure.Keywords: cell, tissue damage, morphogenesis, cell conduct
Procedia PDF Downloads 811380 Platooning Method Using Dynamic Correlation of Destination Vectors in Urban Areas
Authors: Yuya Tanigami, Naoaki Yamanaka, Satoru Okamoto
Abstract:
Economic losses due to delays in traffic congestion regarding urban transportation networks have become a more serious social problem as traffic volume increases. Platooning has recently been attracting attention from many researchers to alleviate traffic jams, especially on the highway. On highways, platooning can have positive effects, such as reducing inter-vehicular distance and reducing air resistance. However, the impacts of platooning on urban roads have not been addressed in detail since traffic lights may break the platoons. In this study, we propose a platooning method using L2 norm and cosine similarity to form a platoon with highly similar routes. Also, we investigate the sorting method within a platoon according to each vehicle’s straightness. Our proposed sorting platoon method, which uses two lanes, eliminates Head of Line Blocking at the intersection and improves throughput at intersections. This paper proposes a cyber-physical system (CPS) approach to collaborative urban platoon control. We conduct simulations using the traffic simulator SUMO and the road network, which imitates Manhattan Island. Results from the SUMO confirmed that our method shortens the average travel time by 10-20%. This paper shows the validity of forming a platoon based on destination vectors and sorting vehicles within a platoon.Keywords: CPS, platooning, connected car, vector correlation
Procedia PDF Downloads 741379 Scope of Heavy Oil as a Fuel of the Future
Authors: Kiran P. Chadayamuri, Saransh Bagdi
Abstract:
Increasing imbalance between energy supply and demand has made nations and companies involved in the energy sector to boost up their research and find suitable solutions. With the high rates at which conventional oil and gas resources are depleting, efficient exploration and exploitation of heavy oil could just be the answer. Heavy oil may be defined as crude oil having API gravity value of less than 20⁰. They are highly viscous, have low hydrogen to carbon ratios and are known to produce high carbon residues. They have high contents of asphaltenes, heavy metals, sulphur and nitrogen in them. Due to these properties extraction, transportation and refining of crude oil have its share of challenges. Lack of suitable technology has hindered its production in the past, but now things are going in a more positive direction. The aim of this paper is to study the various advantages of heavy oil, associated limitations and its feasibility as a fuel of the future.Keywords: energy, heavy oil, fuel, future
Procedia PDF Downloads 2841378 Smoker Recognition from Lung X-Ray Images Using Convolutional Neural Network
Authors: Moumita Chanda, Md. Fazlul Karim Patwary
Abstract:
Smoking is one of the most popular recreational drug use behaviors, and it contributes to birth defects, COPD, heart attacks, and erectile dysfunction. To completely eradicate this disease, it is imperative that it be identified and treated. Numerous smoking cessation programs have been created, and they demonstrate how beneficial it may be to help someone stop smoking at the ideal time. A tomography meter is an effective smoking detector. Other wearables, such as RF-based proximity sensors worn on the collar and wrist to detect when the hand is close to the mouth, have been proposed in the past, but they are not impervious to deceptive variables. In this study, we create a machine that can discriminate between smokers and non-smokers in real-time with high sensitivity and specificity by watching and collecting the human lung and analyzing the X-ray data using machine learning. If it has the highest accuracy, this machine could be utilized in a hospital, in the selection of candidates for the army or police, or in university entrance.Keywords: CNN, smoker detection, non-smoker detection, OpenCV, artificial Intelligence, X-ray Image detection
Procedia PDF Downloads 831377 Identity Management in Virtual Worlds Based on Biometrics Watermarking
Authors: S. Bader, N. Essoukri Ben Amara
Abstract:
With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world
Procedia PDF Downloads 2631376 User Selections on Social Network Applications
Authors: C. C. Liang
Abstract:
MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.Keywords: consumer behavior, social media, technology acceptance model, flow experience
Procedia PDF Downloads 3551375 Continuous Catalytic Hydrogenation and Purification for Synthesis Non-Phthalate
Authors: Chia-Ling Li
Abstract:
The scope of this article includes the production of 10,000 metric tons of non-phthalate per annum. The production process will include hydrogenation, separation, purification, and recycling of unprocessed feedstock. Based on experimental data, conversion and selectivity were chosen as reaction model parameters. The synthesis and separation processes of non-phthalate and phthalate were established by using Aspen Plus software. The article will be divided into six parts: estimation of physical properties, integration of production processes, purification case study, utility consumption, economic feasibility study and identification of bottlenecks. The purities of products was higher than 99.9 wt. %. Process parameters have important guiding significance to the commercialization of hydrogenation of phthalate.Keywords: economic analysis, hydrogenation, non-phthalate, process simulation
Procedia PDF Downloads 2761374 India’s Role in Afghanistan in the Post 9/11 Era
Authors: Fayiz Saifurahman
Abstract:
Afghanistan's geopolitically and geo-strategically location has remained the attention of Indian policy. On 11 September 2001, the terrorist attacks in the United States and the announcement of the United States, fight for international war against the Taliban in November 2001 provided India a chance to pursue its foreign policy goals of achieving a good position in the region and emerging as an international power. Therefore, post-9/11, India strengthened its efforts to re-establish its power in Afghanistan. The objectives of this study are to study the India-Afghanistan relation in the post 9/11 and to discuss the initial role of India in Afghanistan. The research method was conducted on a qualitative method based on descriptive. The research findings propose that; Indian foreign policy should be analyzed and increase its soft power. Afghanistan has definitely provided a significant occasion for India to increase its power in Afghanistan. In this linkage, Indian determinations have been to intrude all parts in Afghanistan to make them reliant on Indian cooperation.Keywords: Afghanistan, war, power, policy.
Procedia PDF Downloads 2311373 Survival Chances and Costs after Heart Attacks: An Instrumental Variable Approach
Authors: Alice Sanwald, Thomas Schober
Abstract:
We analyze mortality and follow-up costs of heart attack patients using administrative data from Austria (2002-2011). As treatment intensity in a hospital largely depends on whether it has a catheterization laboratory, we focus on the effects of patients' initial admission to these specialized hospitals. To account for the nonrandom selection of patients into hospitals, we exploit individuals' place of residence as a source of exogenous variation in an instrumental variable framework. We find that the initial admission to specialized hospitals increases patients' survival chances substantially. The effect on 3-year mortality is -9.5 percentage points. A separation of the sample into subgroups shows the strongest effects in relative terms for patients below the age of 65. We do not find significant effects on longterm inpatient costs and find only marginal increases in outpatient costs.Keywords: acute myocardial infarction, mortality, costs, instrumental variables, heart attack
Procedia PDF Downloads 4341372 Pleading the Belly: Sentencing of Convicted Pregnant Women under the Common Law
Authors: Nana Yaw Ofori Gyasi
Abstract:
Under the Common Law, there was a procedure called pleading the belly which allowed a woman who had reached the advanced stage of pregnancy to receive a reprieve of her death sentence until after she had put to bed. The plea was replaced with a legislation, which provides that a pregnant woman would automatically have her death sentence commuted to life imprisonment with hard labour. This Common Law principle has been continued and enacted into law by the various countries where the Common Law is practiced. This paper takes a look at what it terms as Pregnancy Legislations in some selected Common Law countries such as United States of America, Canada, England and Wales, Ghana and India to examine the scope, procedure and effect of such legislations. The paper adopts a comparative study approach to ascertain the country with the widest scope, non-complicated procedure and far-reaching effects of the Pregnancy Legislations. It is observed that some legislations make provision for the conversion of death penalty to life imprisonment for capital offences and also prescribe non-custodial sentence for non-capital offences. There are other legislations that merely suspend the death penalty while the convict is found to be pregnant. In terms of the procedure, some of the legislations make the issue of pregnancy a question of fact to be determined by a jury and in other legislations, the trial judge makes that determination after the judge is satisfied on the question of the convict being pregnant. The effects of the Pregnancy Legislation are observed to be varying. Women who give birth in prison are highly at risk of having stillbirth. Most of the prisons do not have adequate facilities to support expectant and lactating mothers while in prison. It has also been observed that with the number of female prisoners increasing over the years, custodial sentence for convicted pregnant women has a wider societal effect. The paper identifies certain gaps left in some of the legislations which relate to the procedure to be followed after custodial sentence is suspended for a convicted pregnant woman. The time the accused person got pregnant- whether before her arrest or during trial- and the effect of the timing of the pregnancy are gaps left in some of the legislations. The paper argues that such gaps should be filled by the legislator to prevent accused persons taking undue advantage of the Pregnancy Legislations. It is further argued that if convicted pregnant women will have to spend time in prison at all for very heinous crimes, the prison facilities should be improved so that expectant and lactating mothers can comfortably care for their babies and themselves to prevent dire health consequences for such mothers and the society at a whole.Keywords: sentence of pregnant women, custodial sentence, , pregnant women, , common law
Procedia PDF Downloads 451371 Citizenship Education and Access to Information for Political Socialization and Unity in Nigeria
Authors: Alh Rauf Bello Bella
Abstract:
The main purpose of citizenship education if properly executed is to create awareness and enlightenment in the society to bring tolerance and political unity among the people. For the citizenry to have a meaningful participation for the achievement of this objective in a modern society where democracy thrives, all citizens should also have access to information on all matters affecting their lives and well-being. The paper therefore examines the scope of citizenship education and the complementary role of information providers in the quest for political socialization and national unity. It emphasizes some issues of national unity which should be addressed through proper enlightenment of the citizenry and access to relevant and timely information at the grassroots.Keywords: citizenship education, national unity, political socialization, Nigeria
Procedia PDF Downloads 4751370 Disentangling Palliative Care and Euthanasia/Assisted Suicide in Dementia Care
Authors: Michael Joseph Passmore
Abstract:
Euthanasia, or assisted suicide (EAS), refers to the provision of medical assistance to individuals seeking to end their own lives. In Canada, the issue of EAS has been the subject of debate and legislative action for many years. In 2016, the Canadian government passed the Medical Assistance in Dying (MAID) Act. This legalized EAS in Canada is subject to certain eligibility criteria. In 2023, debate in Canada continues regarding the scope of MAID practice and associated legislation. Dementia is an illness that causes suffering at the end of life. Persons suffering due to dementia deserve timely and effective palliative care.Keywords: palliative care, neurocognitive disorder, dementia, Alzheimer’s disease, euthanasia, assisted suicide, medical ethics, bioethics
Procedia PDF Downloads 91