Search results for: interest flooding attack
4109 Educational Deprivation and Their Determinants in India: Evidence from National Sample Survey
Authors: Mukesh Ranjan
Abstract:
Applying probit model on the micro data of NSS 71st round on education for understanding the access to education post the passage of Right to Education act,2009 in India. The empirical analysis shows that at all India level the mean age of enrollment in school is 5.5 years and drop-out age is around 14 years (or studied up to class 7) and around 60 percent females never get enrolled in any school in their lifetime. Nearly 20 percent children in Bihar never seen school and surprisingly, the relatively developed states like Gujarat, Maharashtra, Karnataka, Kerala and Tamil Nadu have more than one-third of the children and half of the children in Andhra Pradesh, West Bengal and Orissa as educationally wasted. The relative contribution in educational wastage is maximum by Bengal (10 %) while UP contributed a maximum of 30 % in educational non-enrollment in the country. Educational wastage is more likely to increase with age. Marriage is a resistive factor in getting education. Muslims are educationally more deprived than Hindus. Larger family and rich household are less likely to be educationally deprived. Major reasons for drop-out until 9 years were lack of interest in education and financial constraint; between 10-12 years, lack of interest and unable to cope up with studies and post 12 years financial constraint, marriage and other household reasons.Keywords: probit model, educational wastage, educational non-enrollment, educational deprivation
Procedia PDF Downloads 3054108 Preliminary Study on Chinese Traditional Garden Making Based on Water Storage Projects
Authors: Liu Fangxin, Zhao Jijun
Abstract:
Nowadays, China and the world are facing the same problems of flooding, city waterlogging and other environment issues. Throughout history, China had many excellent experiences dealing with the flood, and can be used as a significant reference for contemporary urban construction. In view of this, the research used the method of literature analysis to find out the main water storage measures in ancient cities, including reservoir storage and pond water storage. And it used the case study method to introduce the historical evolution, engineering measures and landscape design of 4 typical ancient Chinese cities in details. Then we found the pond and the reservoir were the main infrastructures for the ancient Chinese city to avoid the waterlogging and flood. At last this paper summed up the historical experience of Chinese traditional water storage and made conclusions that the establishment of a reasonable green water storage facilities could be used to solve today's rain and flood problems, and hoped to give some enlightenment of stormwater management to our modern city.Keywords: ancient Chinese cities, water storage project, Chinese classical gardening, stormwater management, green facilities
Procedia PDF Downloads 3374107 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability
Procedia PDF Downloads 1074106 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs
Authors: Dingyang Hu, Dan Liu
Abstract:
DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.Keywords: adversarial sample, gradient, probability, black box
Procedia PDF Downloads 1044105 The Association of Southeast Asian Nations (ASEAN) and the Dynamics of Resistance to Sovereignty Violation: The Case of East Timor (1975-1999)
Authors: Laura Southgate
Abstract:
The Association of Southeast Asian Nations (ASEAN), as well as much of the scholarship on the organisation, celebrates its ability to uphold the principle of regional autonomy, understood as upholding the norm of non-intervention by external powers in regional affairs. Yet, in practice, this has been repeatedly violated. This dichotomy between rhetoric and practice suggests an interesting avenue for further study. The East Timor crisis (1975-1999) has been selected as a case-study to test the dynamics of ASEAN state resistance to sovereignty violation in two distinct timeframes: Indonesia’s initial invasion of the territory in 1975, and the ensuing humanitarian crisis in 1999 which resulted in a UN-mandated, Australian-led peacekeeping intervention force. These time-periods demonstrate variation on the dependent variable. It is necessary to observe covariation in order to derive observations in support of a causal theory. To establish covariation, my independent variable is therefore a continuous variable characterised by variation in convergence of interest. Change of this variable should change the value of the dependent variable, thus establishing causal direction. This paper investigates the history of ASEAN’s relationship to the norm of non-intervention. It offers an alternative understanding of ASEAN’s history, written in terms of the relationship between a key ASEAN state, which I call a ‘vanguard state’, and selected external powers. This paper will consider when ASEAN resistance to sovereignty violation has succeeded, and when it has failed. It will contend that variation in outcomes associated with vanguard state resistance to sovereignty violation can be best explained by levels of interest convergence between the ASEAN vanguard state and designated external actors. Evidence will be provided to support the hypothesis that in 1999, ASEAN’s failure to resist violations to the sovereignty of Indonesia was a consequence of low interest convergence between Indonesia and the external powers. Conversely, in 1975, ASEAN’s ability to resist violations to the sovereignty of Indonesia was a consequence of high interest convergence between Indonesia and the external powers. As the vanguard state, Indonesia was able to apply pressure on the ASEAN states and obtain unanimous support for Indonesia’s East Timor policy in 1975 and 1999. However, the key factor explaining the variance in outcomes in both time periods resides in the critical role played by external actors. This view represents a serious challenge to much of the existing scholarship that emphasises ASEAN’s ability to defend regional autonomy. As these cases attempt to show, ASEAN autonomy is much more contingent than portrayed in the existing literature.Keywords: ASEAN, east timor, intervention, sovereignty
Procedia PDF Downloads 3584104 Domestic Violence, Well-Being and Women's Inclusion: Evidence from Northern Ireland
Authors: Jessica Leigh Doyle
Abstract:
In recent years there has been increasing academic and policy interest in domestic violence (DV) and in the implications of DV for the physical and psychological well-being of those who experience it. Yet, despite this interest, very few detailed empirical explorations of these issues have been conducted to date. Of the detailed empirical work that does exist, most studies have focused narrowly on physical violence and the impact of physical violence on rates of depression, post-traumatic stress disorder (PTSD) and substance use. This has often been to the exclusion of wider experiences of DV in relation to psychological, sexual and financial abuse, and of broader victim self-perceptions of psychological well-being that include self-esteem, social participation and quality of life as core components. This paper contributes towards filling this gap by examining these issues on the basis of comprehensive empirical evidence from the Northern Ireland context. Using qualitative methods, the paper presents the findings from 63 semi-structured interviews with women victims of DV from across Northern Ireland. The findings discuss the varied types of violence (physical, psychological, sexual, and financial) that women experience, how these experiences shape their broad physical and psychological well-being and capacity to live active and fulfilling lives and the processes of recovery from IPV. The implications of these findings for research and policy are then discussed.Keywords: domestic violence, gender equality, intimate partner violence, violence against women, well-being
Procedia PDF Downloads 2844103 Mediation in Turkey
Authors: Ibrahim Ercan, Mustafa Arikan
Abstract:
In recent years, alternative dispute resolution methods have attracted the attention of many country’s legislators. Instead of solving the disputes by litigation, putting the end to a dispute by parties themselves is more important for the preservation of social peace. Therefore, alternative dispute resolution methods (ADR) have been discussed more intensively in Turkey as well as the whole world. After these discussions, Mediation Act was adopted on 07.06.2012 and entered into force on 21.06.2013. According to the Mediation Act, it is only possible to mediate issues arising from the private law. Also, it is not compulsory to go to mediation in Turkish law, it is optional. Therefore, the parties are completely free to choose mediation method in dispute resolution. Mediators need to be a lawyer with experience in five years. Therefore, it is not possible to be a mediator who is not lawyers. Beyond five years of experience, getting education and success in exams about especially body language and psychology is also very important to be a mediator. If the parties compromise as a result of mediation, a document is issued. This document will also have the ability to exercising availability under certain circumstances. Thus, the parties will not need to apply to the court again. On the contrary, they will find the opportunity to execute this document, so they can regain their debts. However, the Mediation Act has entered into force in a period of nearly two years of history; it is possible to say that the interest in mediation is not at the expected level. Therefore, making mediation mandatory for some disputes has been discussed recently. At this point, once the mediation becomes mandatory and good results follows it, this institution will be able to find a serious interest in Turkey. Otherwise, if the results will not be satisfying, the mediation method will be removed.Keywords: alternative dispute resolution methods, mediation act, mediation, mediator, mediation in Turkey
Procedia PDF Downloads 3654102 Interrogating Democracy and Development in Africa: A Case Study of Nigeria
Authors: Yusuf Bala
Abstract:
The last decades of the 20th Centaury witnessed renewed hope about the birth of democracy and development in Africa the interface between democracy and development in Africa has long engaged the sustained interest of scholars and researchers across Africa. The process was actively supported by all segment of society, labour students market women, rural dweller who saw in it, the prospects of reversing the trend of political despair and in disillusionment that hither to characterized political life in Africa. The political tyranny and dictatorship while having it own clientele and beneficiaries had negative and suffocating effect on the majority of the people. The democratic aspiration of the Africa people is not only confined to the Arena of political Democracy of election and granting of civil and political rights, but it involves the demand for economic empowerment better living standards of the people and adequate social welfare indeed, for the majority of the people democracy is meaningful only when it delivers socio-economic goods. However, democracy and development have generated enormous interest no conclusive evidence seems to be shared in Africa. In the course of this research emphasis shall be made on certain issues, such as issues of corruption in democracy in Africa, ethnic conflict and democracy in Africa contribution of women to democratic practice and women participation in political arena, is still very low, democratization process and industrial relation in Africa as factor that hinder the development of Democracy in Africa, a case study of Nigeria.Keywords: democracy, development, dictatorship, conflict, ethnicity
Procedia PDF Downloads 3184101 Gas Injection Transport Mechanism for Shale Oil Recovery
Authors: Chinedu Ejike
Abstract:
The United States is now energy self-sufficient due to the production of shale oil reserves. With more than half of it being tapped daily in the United States, these unconventional reserves are massive and provide immense potential for future energy demands. Drilling horizontal wells and fracking are the primary methods for developing these reserves. Regrettably, recovery efficiency is rarely greater than 10%. As a result, optimizing recuperation offers a significant benefit. Huff and puff gas flooding and cyclic gas injection have all been demonstrated to be more successful than tapping the remaining oil in place. Methane, nitrogen, and carbon (IV) oxide, among other high-pressure gases, can be injected. Operators use Darcy's law to assess a reservoir's productive capacity, but they are unaware that the law may not apply to shale oil reserves. This is due to the fact that, unlike pressure differences alone, diffusion, concentration, and gas selection all play a role in the flow of gas injected into the wellbore. The reservoir drainage and oil sweep efficiency rates are determined by the transport method. This research assesses the parameters that influence the gas injection transport mechanism. Understanding the process causing these factors could accelerate recovery by two to three times, according to peer-reviewed studies and effective field testing.Keywords: enhanced oil recovery, gas injection, shale oil, transport mechanism, unconventional reserve
Procedia PDF Downloads 1734100 Analysis the Trajectory of the Spacecraft during the Transition to the Planet's Orbit Using Aerobraking in the Atmosphere of the Planet
Authors: Zaw Min Tun
Abstract:
The paper focuses on the spacecraft’s trajectory transition from interplanetary hyperbolic orbit to the planet’s orbit using the aerobraking in the atmosphere of the planet. A considerable mass of fuel is consumed during the spacecraft transition from the planet’s gravitation assist trajectory into the planet’s satellite orbit. To reduce the fuel consumption in this transition need to slow down the spacecraft’s velocity in the planet’s atmosphere and reduce its orbital transition time. The paper is devoted to the use of the planet’s atmosphere for slowing down the spacecraft during its transition into the satellite orbit with uncertain atmospheric parameters. To reduce the orbital transition time of the spacecraft is controlled by the change of attack angles’ values at the aerodynamic deceleration path and adjusting the minimum flight altitude of the spacecraft at the pericenter of the planet’s upper atmosphere.Keywords: aerobraking, atmosphere of the planet, orbital transition time, Spacecraft’s trajectory
Procedia PDF Downloads 3054099 Impact of Chemical Flooding on Displacement Efficiency in Shallow Carbonate Marine Reservoir (Case Study)
Authors: Tarek Duzan, Walid Eddib
Abstract:
The marine shallow carbonate reservoir (G- Eocene) is one of the biggest mature water drive reservoir of Waha Oil Company. The cumulative oil produced up to date is about to eighty percent of the booked original oil in place at ninety five percent of Water cut. However, the company believes that there is a good amount of remaining oil left need to be recovered. Many laboratory studies have been conducted to see the possibility drain the commercial oil left behind using two types of gases, namely, carbone dioxide and enriched hydrocarbon gas injection. The conclusions of those cases were inconclusive Technically and Economically. Therefore, the company has decided to verify another Tertiary Recovery (EOR) technique that may be applied to the interested reservoir. A global screening criteria and quick Laboratory chemical tests have been conducted by using many types of chemical injection into real rock samples. The outcomes were unique economically and provide a significant increase in the commercial oil left. Finally, the company has started conducting a sector pilot plan before proceeding with a full plan. There are many wellbores available to use in a potential field Enhanced Oil Recovery.Keywords: chemical lab. test, ASP, rock types, oil samples, and global screening criteria
Procedia PDF Downloads 1384098 Determinant Factor Analysis of Foreign Direct Investment in Asean-6 Countries Period 2004-2012
Authors: Eleonora Sofilda, Ria Amalia, Muhammad Zilal Hamzah
Abstract:
Foreign direct investment is one of the sources of financing or capital that important for a country, especially for developing countries. This investment also provides a great contribution to development through the transfer of assets, management improving, and transfer of technology in enhancing the economy of a country. In the other side currently in ASEAN countries emerge the interesting phenomenon where some big producers are re-locate their basic production among those countries. This research is aimed to analyze the factors that affect capital inflows of foreign direct investment into the 6 ASEAN countries (Indonesia, Malaysia, Singapore, Thailand, Philippines, and Vietnam) in period 2004-2012. This study uses panel data analysis to determine the factors that affect of foreign direct investment in 6 ASEAN. The factors that affect of foreign direct investment (FDI) are the gross domestic product (GDP), global competitiveness (GCI), interest rate, exchange rate and trade openness (TO). Result of panel data analysis show that three independent variables (GCI, GDP, and TO) have a significant effect to the FDI in 6 ASEAN Countries.Keywords: foreign direct investment, the gross domestic product, global competitiveness, interest rate, exchange rate, trade openness, panel data analysis
Procedia PDF Downloads 4694097 Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce
Authors: Wenjie Qin, Kewei Lv
Abstract:
In 1996, Boneh and Venkatesan proposed the Hidden Number Problem (HNP) and proved the most significant bits (MSB) of computational Diffie-Hellman key exchange scheme and related schemes are unpredictable bits. They also gave a method which is a lattice rounding technique to solve HNP in non-uniform model. In this paper, we put forward a new concept that is Schnorr-MSB-HNP. We also reduce the problem of solving Schnorr signature private key with a few consecutive most significant bits of random nonce (used at each signature generation) to Schnorr-MSB-HNP, then we use the rounding technique to solve the Schnorr-MSB-HNP. We have come to the conclusion that if there is a ‘miraculous box’ which inputs the random nonce and outputs 2loglogq (q is a prime number) most significant bits of nonce, the signature private key will be obtained by choosing 2logq signature messages randomly. Thus we get an attack on the Schnorr signature private key.Keywords: rounding technique, most significant bits, Schnorr signature algorithm, nonce, Schnorr-MSB-HNP
Procedia PDF Downloads 2334096 Bank Customers' Satisfaction, Customers' Loyalty and Additional Purchases of Banking Products and Services: A Case Study from the Czech Republic
Authors: Jaroslav Belás, Anna Chochoľáková, Lenka Gabčová
Abstract:
The aim of this article was to examine and quantify the dependence of additional purchases of banking products from customer loyalty and dependence of bank clients’ loyalty on the customers’ satisfaction. In this context, in our research from 2014, the respondents were divided into satisfied (loyal) and dissatisfied (disloyal) banking clients and their attitudes in the area of loyalty and additional purchases of banking products were compared. The differences in attitudes were examined by means of Pearson statistics. It was found out that satisfied customers compared with those dissatisfied clients significantly more advise their bank to their friends, also they often consider that they would use their bank in the future, they are more resistant to the offers from the other banks as well. Loyal customers are more interested in the services of their own banks when considering investments in the financial market, keep their savings in their own bank, take out a mortgage loan from their own bank and use other banking products and services offered by their own bank as well. According to the results of our research, with the different intensities the loyalty of customers is transforming into a potential purchase of additional banking products. The greatest potential interest of the bank customers was in keeping their own savings in the bank and mortgage loans. The intensity of interest in the purchase of financial investments and other products was relatively low.Keywords: commercial bank, bank customers’ satisfaction, loyalty of bank clients, additional purchases of banking products and services
Procedia PDF Downloads 4784095 From Teaching Methods to Learning Styles: Toward Humanizing Education and Building Rapport with Students at Sultan Qaboos University
Authors: Mounir Ben Zid
Abstract:
The controversy over the most effective teaching method to facilitate the increase of a student's knowledge has remained a frustration for poetry teachers at Sultan Qaboos University in Oman for the last ten years. Scholars and educationists have pursued answers to this question, and tremendous effort has been marshalled to discover the optimum teaching strategy, with little success. The present study stems from this perpetual frustration among teachers of poetry and the dispute about the repertoire of teaching methods. It attempts to shed light on an alternative direction which, it is believed, has received less scholarly attention than deserved. It emphasizes the need to create a democratic and human atmosphere of learning, arouses students' genuine interest, provides students with aesthetic pleasure, and enable them to appreciate and enjoy the beauty and musicality of words in poems. More important, this teaching-learning style should aim to secure rapport with students, invite teachers to inspire the passion and love of poetry in their students and help them not to lose the sense of wonder and enthusiasm that should be in the forefront of enjoying poetry. Hence, it is the need of the time that, after they have an interest, feeling and desire for poetry, university students can move to heavier tasks and discussions about poetry and how to further understand and analyze what is being portrayed. It is timely that the pendulum swung in support of the humanization of education and building rapport with students at Sultan Qaboos University.Keywords: education, humanization, learning style, Rapport
Procedia PDF Downloads 2454094 An Unexpected Helping Hand: Consequences of Redistribution on Personal Ideology
Authors: Simon B.A. Egli, Katja Rost
Abstract:
Literature on redistributive preferences has proliferated in past decades. A core assumption behind it is that variation in redistributive preferences can explain different levels of redistribution. In contrast, this paper considers the reverse. What if it is redistribution that changes redistributive preferences? The core assumption behind the argument is that if self-interest - which we label concrete preferences - and ideology - which we label abstract preferences - come into conflict, the former will prevail and lead to an adjustment of the latter. To test the hypothesis, data from a survey conducted in Switzerland during the first wave of the COVID-19 crisis is used. A significant portion of the workforce at the time unexpectedly received state money through the short-time working program. Short-time work was used as a proxy for self-interest and was tested (1) on the support given to hypothetical, ailing firms during the crisis and (2) on the prioritization of justice principles guiding state action. In a first step, several models using OLS-regressions on political orientation were estimated to test our hypothesis as well as to check for non-linear effects. We expected support for ailing firms to be the same regardless of ideology but only for people on short-time work. The results both confirm our hypothesis and suggest a non-linear effect. Far-right individuals on short-time work were disproportionally supportive compared to moderate ones. In a second step, ordered logit models were estimated to test the impact of short-time work and political orientation on the rankings of the distributive justice principles need, performance, entitlement, and equality. The results show that being on short-time work significantly alters the prioritization of justice principles. Right-wing individuals are much more likely to prioritize need and equality over performance and entitlement when they receive government assistance. No such effect is found among left-wing individuals. In conclusion, we provide moderate to strong evidence that unexpectedly finding oneself at the receiving end changes redistributive preferences if personal ideology is antithetical to redistribution. The implications of our findings on the study of populism, personal ideologies, and political change are discussed.Keywords: COVID-19, ideology, redistribution, redistributive preferences, self-interest
Procedia PDF Downloads 1404093 Assessment of Causes of Building Collapse in Nigeria
Authors: Olufemi Oyedele
Abstract:
Building collapse (BC) in Nigeria is becoming a regular occurrence, each recording great casualties in the number of lives and materials lost. Building collapse is a situation where building which has been completed and occupied, completed but not occupied or under construction, collapses on its own due to action or inaction of man or due to natural event like earthquake, storm, flooding, tsunami or wildfire. It is different from building demolition. There are various causes of building collapse and each case requires expert judgment to decide the cause of its collapse. Rate of building collapse is a reflection of the level of organization and control of building activities and degree of sophistication of the construction professionals in a country. This study explored the use of case study by examining the causes of six (6) collapsed buildings (CB) across Nigeria. Samples of materials from the sites of the collapsed buildings were taken for testing and analysis, while critical observations were made at the sites to note the conditions of the ground (building base). The study found out that majority of the building collapses in Nigeria were due to poor workmanship, sub-standard building materials, followed by bad building base and poor design. The National Building Code 2006 is not effective due to lack of enforcement and the Physical Development Departments of states and Federal Capital Territory are just mere agents of corruption allowing all types of construction without building approvals.Keywords: building collapse, concrete tests, differential settlement, integrity test, quality control
Procedia PDF Downloads 5354092 Strategic Evaluation of Existing Drainage System in Apalit, Pampanga
Authors: Jennifer de Jesus, Ares Baron Talusan, Steven Valerio
Abstract:
This paper aims to conduct an evaluation of the drainage system in a specific village in Apalit, Pampanga using the geographic information system to easily identify inadequate drainage lines that needs rehabilitation to aid in flooding problem in the area. The researchers will be utilizing two methods and software to be able to strategically assess each drainage line in the village– the two methods were the rational method and the Manning's Formula for Open Channel Flow and compared it to each other, and the software to be used was Google Earth Pro by 2020 Google LLC. The results must satisfy the statement QManning > QRational to be able to see if the specific line and section is adequate; otherwise, it is inadequate; dimensions needed to be recomputed until it became adequate. The use of the software is the visualization of data collected from the computations to clearly see in which areas the drainage lines were adequate or not. The researchers were then able to conclude that the drainage system should be considered inadequate, seeing as most of the lines are unable to accommodate certain intensities of rainfall. The researchers have also concluded that line rehabilitation is a must to proceed.Keywords: strategic evaluation, drainage system, as-built plans, inadequacy, rainfall intensity-duration-frequency data, rational method, manning’s equation for open channel flow
Procedia PDF Downloads 1284091 Green Roofs and Xeriscape Planting that Contribute to Sustainable Urban Green Space
Authors: Derya Sarı, Banu Karasah
Abstract:
In the recent years, urban green areas decrease dramatically as a result of increasing industrialization and population growth. At the same time, green spaces provide many ecosystem services such as controls of air pollution, noise reduction, prevents flooding and reduces the stress in the urban areas. Therefore, the plants help to these areas to get more livable and active, and also plants are one of the most significant identity elements in these open spaces. Roof gardens comes significant design comprehension as a result of global warming and also they contribute to cities with regard to ecological, economic, visual and recreational aspects. This study is mainly based on evaluation potential of green roofs and xeriscape planting design approach of Artvin (Turkey) known that generally has a remarkable floristic richness. Artvin is located on a sloping terrain, and the amount of green spaces that can be used is very limited in this city. Therefore, green roofs approach should be evaluated to supply urban green space sustainability. This study shows that it is appropriate about 20 perennial plants for green roofs and xeriscape planting design in Artvin city center. Usage of native plant species would be support to sustainable urban green spaces.Keywords: Artvin, green roofs, urban green spaces, xeriscape planting
Procedia PDF Downloads 4744090 Pedagogical Content Knowledge for Nature of Science: In Search for a Meaning for the Construct
Authors: Elaosi Vhurumuku
Abstract:
During the past twenty years, there has been an increased interest by science educators in researching and developing teachers’ pedagogical content knowledge for teaching the nature of science (PCKNOS). While there has been this surge in interest in the idea of PCKNOS, there has not been a common understanding among NOS researchers as to how exactly the PCKNOS concept should be construed. In this paper, we analyse and evaluate published accredited journal articles on PCKNOS research. We also draw from our teaching experiences. The major points of foci are the researchers’ presentations of SMKNOS and their centres of attention regarding the elements of PCKNOS. Our content, cluster analysis, and evaluation of the studies on PCKNOS reveal that most researchers have presented SMKNOS in the form of a heuristic or a set of heuristics (targeted NOS ideas) to be mastered by teachers or learners. Furthermore, we found that most of the researchers’ attention has been on developing and recommending teacher pedagogical practices for teaching NOS. From this, we synthesize and propose a subject knowledge content structure and a pedagogical approach that we believe is relevant and appropriate for secondary school and science teacher education if the goal of science education for scientific literacy is to be achieved. The justification of our arguments is rooted in tracing and unpacking the origins and meaning of pedagogical content knowledge (PCK). From our analysis, synthesis, and evaluation, as well as teaching experiences, we distil and construct a meaning for the PCKNOS construct.Keywords: pedagogical content knowledge, teaching, nature of science, construct, subject matter knowledge
Procedia PDF Downloads 974089 Heat Transfer and Friction Factor Study for Triangular Duct Solar Air Heater Having Discrete V-Shaped Ribs
Authors: Varun Goel
Abstract:
Solar energy is a good option among renewable energy resources due to its easy availability and abundance. The simplest and most efficient way to utilize solar energy is to convert it into thermal energy and this can be done with the help of solar collectors. The thermal performance of such collectors is poor due to less heat transfer from the collector surface to air. In this work, experimental investigations of single pass solar air heater having triangular duct and provided with roughness element on the underside of the absorber plate. V-shaped ribs are used for investigation having three different values of relative roughness pitch (p/e) ranges from 4-16 for a fixed value of angle of attack (α), relative roughness height (e/Dh) and a relative gap distance (d/x) values are 60°, 0.044 and 0.60 respectively. Result shows that considerable augmentation in heat transfer has been obtained by providing roughness.Keywords: artificial roughness, solar air heater, triangular duct, V-shaped ribs
Procedia PDF Downloads 4524088 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation
Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal
Abstract:
We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).Keywords: authentication, edge computing, industrial IoT, post-quantum resistance
Procedia PDF Downloads 1974087 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.Keywords: attack modelling, crime commission process, crime script, situational crime prevention
Procedia PDF Downloads 1264086 Aerodynamics of Nature Inspired Turbine Blade Using Computational Simulation
Authors: Seung Ki Lee, Richard Kyung
Abstract:
In the airfoil analysis, as the camber is greater, the minimal angle of attack causing the stall and maximum lift force increases. The shape of the turbine blades is similar to the shape of the wings of planes. After major wars, many remarkable blade shapes are made through researches about optimal blade shape. The blade shapes developed by National Advisory Committee for Aeronautics, NACA, is well known. In this paper, using computational and numerical analysis, the NACA airfoils are analyzed. This research shows that the blades vary with their thickness, which thinner blades are expected to be better. There is no significant difference of coefficient of lift due to the difference in thickness, but the coefficient of drag increases as the thickness increases.Keywords: blades, drag force, national advisory committee for aeronautics airfoils, turbine
Procedia PDF Downloads 2264085 Flood Control Structures in the River Göta Älv to Protect Gothenburg City (Sweden) during the 21st Century: Preliminary Evaluation
Authors: M. Irannezhad, E. H. N. Gashti, U. Moback, B. Kløve
Abstract:
Climate change because of increases in concentration level of greenhouse gases emissions to the atmosphere will result in mean sea level rise about +1 m by 2100. To prevent coastal floods resulted from the sea level rising, different flood control structures have been built, e.g. the Thames barrier on the Thames River in London (UK), with acceptable protection levels at least so far. Gothenburg located on the southwest coast of Sweden, with the River Göta älv running through it, is one of vulnerable cities to the accelerated rises in mean sea level. Developing a water level model by MATLAB, we evaluated using a sea barrage in the Göta älv River as the flood control structure for protecting the Gothenburg city during this century. Considering three operational scenarios for two barriers in upstream and downstream, the highest sea level was estimated to + 2.95 m above the current mean sea level by 2100. To verify flood protection against such high sea levels, both barriers have to be closed. To prevent high water level in the River Göta älv reservoir, the barriers would be open when the sea level is low. The suggested flood control structures would successfully protect the city from flooding events during this century.Keywords: climate change, flood control structures, gothenburg, sea level rising, water level mode
Procedia PDF Downloads 3564084 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys
Authors: Chalee Thammarat
Abstract:
Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security
Procedia PDF Downloads 4304083 Vantage Point–Visual Culture, Popular Media, and Contemporary Educational Practice
Authors: Elvin Karaaslan Klose
Abstract:
In the field of Visual Culture, Art Education students are given the opportunity to discuss topics of interest that are closer to their own social life and media consumption habits. In contrast to the established corpus of literature and sources about Art History, educators are challenged to find topics and examples from Popular Culture and Contemporary Art that provide familiarity, depth and inspiration for students’ future practice, both as educators as well as artists. In order to establish a welcoming and fruitful discussion environment at the beginning of an introductory Visual Culture Education course with fourth year Art Education students, the class watched and subsequently discussed the movie “Vantage Point”. Using the descriptive method and content analysis; video recordings, discussion transcripts and learning diaries were summarized to highlight students’ critical points of view towards commonly experienced but rarely reflected on topics of Popular and Visual Culture. As an introduction into more theory-based forms of discussion, watching and intensely discussing a movie has proven useful by proving a combination of a familiar media type with an unfamiliar educational context. Resulting areas of interest have served as a starting point for later research, discussion and artistic production in the scope of an introductory Visual Culture Education course.Keywords: visual culture, critical pedagogy, media literacy, art education
Procedia PDF Downloads 6724082 Diagnosis and Analysis of Automated Liver and Tumor Segmentation on CT
Authors: R. R. Ramsheeja, R. Sreeraj
Abstract:
For view the internal structures of the human body such as liver, brain, kidney etc have a wide range of different modalities for medical images are provided nowadays. Computer Tomography is one of the most significant medical image modalities. In this paper use CT liver images for study the use of automatic computer aided techniques to calculate the volume of the liver tumor. Segmentation method is used for the detection of tumor from the CT scan is proposed. Gaussian filter is used for denoising the liver image and Adaptive Thresholding algorithm is used for segmentation. Multiple Region Of Interest(ROI) based method that may help to characteristic the feature different. It provides a significant impact on classification performance. Due to the characteristic of liver tumor lesion, inherent difficulties appear selective. For a better performance, a novel proposed system is introduced. Multiple ROI based feature selection and classification are performed. In order to obtain of relevant features for Support Vector Machine(SVM) classifier is important for better generalization performance. The proposed system helps to improve the better classification performance, reason in which we can see a significant reduction of features is used. The diagnosis of liver cancer from the computer tomography images is very difficult in nature. Early detection of liver tumor is very helpful to save the human life.Keywords: computed tomography (CT), multiple region of interest(ROI), feature values, segmentation, SVM classification
Procedia PDF Downloads 5094081 Simon Says: What Should I Study?
Authors: Fonteyne Lot
Abstract:
SIMON (Study capacities and Interest Monitor is a freely accessible online self-assessment tool that allows secondary education pupils to evaluate their interests and capacities in order to choose a post-secondary major that maximally suits their potential. The tool consists of two broad domains that correspond with two general questions pupils ask: 'What study fields interest me?' and 'Am I capable to succeed in this field of study?'. The first question is addressed by a RIASEC-type interest inventory that links personal interests to post-secondary majors. Pupils are provided with a personal profile and an overview of majors with their degree of congruence. The output is dynamic: respondents can manipulate their score and they can compare their results to the profile of all fields of study. That way they are stimulated to explore the broad range of majors. To answer whether pupils are capable of succeeding in a preferred major, a battery of tests is provided. This battery comprises a range of factors that are predictive of academic success. Traditional predictors such as (educational) background and cognitive variables (mathematical and verbal skills) are included. Moreover, non-cognitive predictors of academic success (such as 'motivation', 'test anxiety', 'academic self-efficacy' and 'study skills') are assessed. These non-cognitive factors are generally not included in admission decisions although research shows they are incrementally predictive of success and are less discriminating. These tests inform pupils on potential causes of success and failure. More important, pupils receive their personal chances of success per major. These differential probabilities are validated through the underlying research on academic success of students. For example, the research has shown that we can identify 22 % of the failing students in psychology and educational sciences. In this group, our prediction is 95% accurate. SIMON leads more students to a suitable major which in turn alleviates student success and retention. Apart from these benefits, the instrument grants insight into risk factors of academic failure. It also supports and fosters the development of evidence-based remedial interventions and therefore gives way to a more efficient use of means.Keywords: academic success, online self-assessment, student retention, vocational choice
Procedia PDF Downloads 4044080 A Retrospective Cohort Study on an Outbreak of Gastroenteritis Linked to a Buffet Lunch Served during a Conference in Accra
Authors: Benjamin Osei Tutu, Sharon Annison
Abstract:
On 21st November, 2016, an outbreak of foodborne illness occurred after a buffet lunch served during a stakeholders’ consultation meeting held in Accra. An investigation was conducted to characterise the affected people, determine the etiologic food, the source of contamination and the etiologic agent and to implement appropriate public health measures to prevent future occurrences. A retrospective cohort study was conducted via telephone interviews, using a structured questionnaire developed from the buffet menu. A case was defined as any person suffering from symptoms of foodborne illness e.g. diarrhoea and/or abdominal cramps after eating food served during the stakeholder consultation meeting in Accra on 21st November, 2016. The exposure status of all the members of the cohort was assessed by taking the food history of each respondent during the telephone interview. The data obtained was analysed using Epi Info 7. An environmental risk assessment was conducted to ascertain the source of the food contamination. Risks of foodborne infection from the foods eaten were determined using attack rates and odds ratios. Data was obtained from 54 people who consumed food served during the stakeholders’ meeting. Out of this population, 44 people reported with symptoms of food poisoning representing 81.45% (overall attack rate). The peak incubation period was seven hours with a minimum and maximum incubation periods of four and 17 hours, respectively. The commonly reported symptoms were diarrhoea (97.73%, 43/44), vomiting (84.09%, 37/44) and abdominal cramps (75.00%, 33/44). From the incubation period, duration of illness and the symptoms, toxin-mediated food poisoning was suspected. The environmental risk assessment of the implicated catering facility indicated a lack of time/temperature control, inadequate knowledge on food safety among workers and sanitation issues. Limited number of food samples was received for microbiological analysis. Multivariate analysis indicated that illness was significantly associated with the consumption of the snacks served (OR 14.78, P < 0.001). No stool and blood or samples of etiologic food were available for organism isolation; however, the suspected etiologic agent was Staphylococcus aureus or Clostridium perfringens. The outbreak could probably be due to the consumption of unwholesome snack (tuna sandwich or chicken. The contamination and/or growth of the etiologic agent in the snack may be due to the breakdown in cleanliness, time/temperature control and good food handling practices. Training of food handlers in basic food hygiene and safety is recommended.Keywords: Accra, buffet, conference, C. perfringens, cohort study, food poisoning, gastroenteritis, office workers, Staphylococcus aureus
Procedia PDF Downloads 230