Search results for: application attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8781

Search results for: application attack

8091 Design and Study of a Low Power High Speed Full Adder Using GDI Multiplexer

Authors: Biswarup Mukherjee, Aniruddha Ghosal

Abstract:

In this paper, we propose a new technique for implementing a low power full adder using a set of GDI multiplexers. Full adder circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). Thus it is desirable to have low power operation for the sub components. The explored method of implementation achieves a low power design for the full adder. Simulated results using state-of-art Tanner tool indicates the superior performance of the proposed technique over conventional CMOS full adder. Detailed comparison of simulated results for the conventional and present method of implementation is presented.

Keywords: low power full adder, 2-T GDI MUX, ASIC (application specific integrated circuit), 12-T FA, CMOS (complementary metal oxide semiconductor)

Procedia PDF Downloads 348
8090 Loan Repayment Prediction Using Machine Learning: Model Development, Django Web Integration and Cloud Deployment

Authors: Seun Mayowa Sunday

Abstract:

Loan prediction is one of the most significant and recognised fields of research in the banking, insurance, and the financial security industries. Some prediction systems on the market include the construction of static software. However, due to the fact that static software only operates with strictly regulated rules, they cannot aid customers beyond these limitations. Application of many machine learning (ML) techniques are required for loan prediction. Four separate machine learning models, random forest (RF), decision tree (DT), k-nearest neighbour (KNN), and logistic regression, are used to create the loan prediction model. Using the anaconda navigator and the required machine learning (ML) libraries, models are created and evaluated using the appropriate measuring metrics. From the finding, the random forest performs with the highest accuracy of 80.17% which was later implemented into the Django framework. For real-time testing, the web application is deployed on the Alibabacloud which is among the top 4 biggest cloud computing provider. Hence, to the best of our knowledge, this research will serve as the first academic paper which combines the model development and the Django framework, with the deployment into the Alibaba cloud computing application.

Keywords: k-nearest neighbor, random forest, logistic regression, decision tree, django, cloud computing, alibaba cloud

Procedia PDF Downloads 135
8089 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 237
8088 Quaternized PPO/PSF Anion Exchange Membranes Doped with ZnO-Nanoparticles for Fuel Cell Application

Authors: P. F. Msomi, P. T. Nonjola, P. G. Ndungu, J. Ramontja

Abstract:

In view of the projected global energy demand and increasing levels of greenhouse gases and pollutants issues have inspired an intense search for alternative new energy technologies, which will provide clean, low cost and environmentally friendly solutions to meet the end user requirements. Alkaline anion exchange membrane fuel cells (AAEMFC) have been recognized as ideal candidates for the generation of such clean energy for future stationary and mobile applications due to their many advantages. The key component of the AAEMFC is the anion exchange membrane (AEM). In this report, a series of quaternized poly (2.6 dimethyl – 1.4 phenylene oxide)/ polysulfone (QPPO/PSF) blend anionic exchange membranes (AEM) were successfully fabricated and characterized for alkaline fuel cell application. Zinc Oxide (ZnO) nanoparticles were introduced in the polymer matrix to enhance the intrinsic properties of the AEM. The characteristic properties of the QPPO/PSF and QPPO/PSF-ZnO blend membrane were investigated with X-ray diffraction (XRD), thermogravimetric analysis (TGA) scanning electron microscope (SEM) and contact angle (CA). To confirm successful quaternisation, FT-IR spectroscopy and proton nuclear magnetic resonance (1H NMR) were used. Other properties such as ion exchange capacity (IEC), water uptake, contact angle and ion conductivity (IC) were also undertaken to check if the prepared nanocomposite materials are suitable for fuel cell application. The membrane intrinsic properties were found to be enhanced by the addition of ZnO nanoparticles. The addition of ZnO nanoparticles resulted to a highest IEC of 3.72 mmol/g and a 30-fold IC increase of the nanocomposite due to its lower methanol permeability. The above results indicate that QPPO/PSF-ZnO is a good candidate for AAEMFC application.

Keywords: anion exchange membrane, fuel cell, zinc oxide nanoparticle, nanocomposite

Procedia PDF Downloads 427
8087 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 141
8086 Energy Retrofitting Application Research to Achieve Energy Efficiency in Hot-Arid Climates in Residential Buildings: A Case Study of Saudi Arabia

Authors: A. Felimban, A. Prieto, U. Knaack, T. Klein

Abstract:

This study aims to present an overview of recent research in building energy-retrofitting strategy applications and analyzing them within the context of hot arid climate regions which is in this case study represented by the Kingdom of Saudi Arabia. The main goal of this research is to do an analytical study of recent research approaches to show where the primary gap in knowledge exists and outline which possible strategies are available that can be applied in future research. Also, the paper focuses on energy retrofitting strategies at a building envelop level. The study is limited to specific measures within the hot arid climate region. Scientific articles were carefully chosen as they met the expression criteria, such as retrofitting, energy-retrofitting, hot-arid, energy efficiency, residential buildings, which helped narrow the research scope. Then the papers were explored through descriptive analysis and justified results within the Saudi context in order to draw an overview of future opportunities from the field of study for the last two decades. The conclusions of the analysis of the recent research confirmed that the field of study had a research shortage on investigating actual applications and testing of newly introduced energy efficiency applications, lack of energy cost feasibility studies and there was also a lack of public awareness. In terms of research methods, it was found that simulation software was a major instrument used in energy retrofitting application research. The main knowledge gaps that were identified included the need for certain research regarding actual application testing; energy retrofitting strategies application feasibility; the lack of research on the importance of how strategies apply first followed by the user acceptance of developed scenarios.

Keywords: energy efficiency, energy retrofitting, hot arid, Saudi Arabia

Procedia PDF Downloads 122
8085 Application of Pattern Recognition Technique to the Quality Characterization of Superficial Microstructures in Steel Coatings

Authors: H. Gonzalez-Rivera, J. L. Palmeros-Torres

Abstract:

This paper describes the application of traditional computer vision techniques as a procedure for automatic measurement of the secondary dendrite arm spacing (SDAS) from microscopic images. The algorithm is capable of finding the lineal or curve-shaped secondary column of the main microstructure, measuring its length size in a micro-meter and counting the number of spaces between dendrites. The automatic characterization was compared with a set of 1728 manually characterized images, leading to an accuracy of −0.27 µm for the length size determination and a precision of ± 2.78 counts for dendrite spacing counting, also reducing the characterization time from 7 hours to 2 minutes.

Keywords: dendrite arm spacing, microstructure inspection, pattern recognition, polynomial regression

Procedia PDF Downloads 46
8084 Application of Simulated Annealing to Threshold Optimization in Distributed OS-CFAR System

Authors: L. Abdou, O. Taibaoui, A. Moumen, A. Talib Ahmed

Abstract:

This paper proposes an application of the simulated annealing to optimize the detection threshold in an ordered statistics constant false alarm rate (OS-CFAR) system. Using conventional optimization methods, such as the conjugate gradient, can lead to a local optimum and lose the global optimum. Also for a system with a number of sensors that is greater than or equal to three, it is difficult or impossible to find this optimum; Hence, the need to use other methods, such as meta-heuristics. From a variety of meta-heuristic techniques, we can find the simulated annealing (SA) method, inspired from a process used in metallurgy. This technique is based on the selection of an initial solution and the generation of a near solution randomly, in order to improve the criterion to optimize. In this work, two parameters will be subject to such optimisation and which are the statistical order (k) and the scaling factor (T). Two fusion rules; “AND” and “OR” were considered in the case where the signals are independent from sensor to sensor. The results showed that the application of the proposed method to the problem of optimisation in a distributed system is efficiency to resolve such problems. The advantage of this method is that it allows to browse the entire solutions space and to avoid theoretically the stagnation of the optimization process in an area of local minimum.

Keywords: distributed system, OS-CFAR system, independent sensors, simulating annealing

Procedia PDF Downloads 497
8083 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 335
8082 Application of the Discrete-Event Simulation When Optimizing of Business Processes in Trading Companies

Authors: Maxat Bokambayev, Bella Tussupova, Aisha Mamyrova, Erlan Izbasarov

Abstract:

Optimization of business processes in trading companies is reviewed in the report. There is the presentation of the “Wholesale Customer Order Handling Process” business process model applicable for small and medium businesses. It is proposed to apply the algorithm for automation of the customer order processing which will significantly reduce labor costs and time expenditures and increase the profitability of companies. An optimized business process is an element of the information system of accounting of spare parts trading network activity. The considered algorithm may find application in the trading industry as well.

Keywords: business processes, discrete-event simulation, management, trading industry

Procedia PDF Downloads 344
8081 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: application, environment, insecurity, sensor, wireless sensor network

Procedia PDF Downloads 263
8080 Natural Language News Generation from Big Data

Authors: Bastian Haarmann, Likas Sikorski

Abstract:

In this paper, we introduce an NLG application for the automatic creation of ready-to-publish texts from big data. The fully automatic generated stories have a high resemblance to the style in which the human writer would draw up a news story. Topics may include soccer games, stock exchange market reports, weather forecasts and many more. The generation of the texts runs according to the human language production. Each generated text is unique. Ready-to-publish stories written by a computer application can help humans to quickly grasp the outcomes of big data analyses, save time-consuming pre-formulations for journalists and cater to rather small audiences by offering stories that would otherwise not exist.

Keywords: big data, natural language generation, publishing, robotic journalism

Procedia PDF Downloads 431
8079 Improving Junior Doctor Induction Through the Use of Simple In-House Mobile Application

Authors: Dmitriy Chernov, Maria Karavassilis, Suhyoun Youn, Amna Izhar, Devasenan Devendra

Abstract:

Introduction and Background: A well-structured and comprehensive departmental induction improves patient safety and job satisfaction amongst doctors. The aims of our Project were as follows: 1. Assess the perceived preparedness of junior doctors starting their rotation in Acute Medicine at Watford General Hospital. 2. Develop a supplemental Induction Guide and Pocket reference in the form of an iOS mobile application. 3. To collect feedback after implementing the mobile application following a trial period of 8 weeks with a small cohort of junior doctors. Materials and Methods: A questionnaire was distributed to all new junior trainees starting in the department of Acute Medicine to assess their experience of current induction. A mobile Induction application was developed and trialled over a period of 8 weeks, distributed in addition to the existing didactic induction session. After the trial period, the same questionnaire was distributed to assess improvement in induction experience. Analytics data were collected with users’ consent to gauge user engagement and identify areas of improvement of the application. A feedback survey about the app was also distributed. Results: A total of 32 doctors used the application during the 8-week trial period. The application was accessed 7259 times in total, with the average user spending a cumulative of 37 minutes 22 seconds on the app. The most used section was Clinical Guidelines, accessed 1490 times. The App Feedback survey revealed positive reviews: 100% of participants (n=15/15) responded that the app improved their overall induction experience compared to other placements; 93% (n=14/15) responded that the app improved overall efficiency in completing daily ward jobs compared to previous rotations; and 93% (n=14/15) responded that the app improved patient safety overall. In the Pre-App and Post-App Induction Surveys, participants reported: a 48% improvement in awareness of practical aspects of the job; a 26% improvement of awareness on locating pathways and clinical guidelines; a 40% reduction of feelings of overwhelmingness. Conclusions and recommendations: This study demonstrates the importance of technology in Medical Education and Clinical Induction. The mobile application average engagement time equates to over 20 cumulative hours of on-the-job training delivered to each user, within an 8-week period. The most used and referred to section was clinical guidelines. This shows that there is high demand for an accessible pocket guide for this type of material. This simple mobile application resulted in a significant improvement in feedback about induction in our Department of Acute Medicine, and will likely impact workplace satisfaction. Limitations of the application include: post-app surveys had a small number of participants; the app is currently only available for iPhone users; some useful sections are nested deep within the app, lacks deep search functionality across all sections; lacks real time user feedback; and requires regular review and updates. Future steps for the app include: developing a web app, with an admin dashboard to simplify uploading and editing content; a comprehensive search functionality; and a user feedback and peer ratings system.

Keywords: mobile app, doctor induction, medical education, acute medicine

Procedia PDF Downloads 86
8078 Exploring the Use of Augmented Reality for Laboratory Lectures in Distance Learning

Authors: Michele Gattullo, Vito M. Manghisi, Alessandro Evangelista, Enricoandrea Laviola

Abstract:

In this work, we explored the use of Augmented Reality (AR) to support students in laboratory lectures in Distance Learning (DL), designing an application that proved to be ready for use next semester. AR could help students in the understanding of complex concepts as well as increase their motivation in the learning process. However, despite many prototypes in the literature, it is still less used in schools and universities. This is mainly due to the perceived limited advantages to the investment costs, especially regarding changes needed in the teaching modalities. However, with the spread of epidemiological emergency due to SARS-CoV-2, schools and universities were forced to a very rapid redefinition of consolidated processes towards forms of Distance Learning. Despite its many advantages, it suffers from the impossibility to carry out practical activities that are of crucial importance in STEM ("Science, Technology, Engineering e Math") didactics. In this context, AR perceived advantages increased a lot since teachers are more prepared for new teaching modalities, exploiting AR that allows students to carry on practical activities on their own instead of being physically present in laboratories. In this work, we designed an AR application for the support of engineering students in the understanding of assembly drawings of complex machines. Traditionally, this skill is acquired in the first years of the bachelor's degree in industrial engineering, through laboratory activities where the teacher shows the corresponding components (e.g., bearings, screws, shafts) in a real machine and their representation in the assembly drawing. This research aims to explore the effectiveness of AR to allow students to acquire this skill on their own without physically being in the laboratory. In a preliminary phase, we interviewed students to understand the main issues in the learning of this subject. This survey revealed that students had difficulty identifying machine components in an assembly drawing, matching between the 2D representation of a component and its real shape, and understanding the functionality of a component within the machine. We developed a mobile application using Unity3D, aiming to solve the mentioned issues. We designed the application in collaboration with the course professors. Natural feature tracking was used to associate the 2D printed assembly drawing with the corresponding 3D virtual model. The application can be displayed on students’ tablets or smartphones. Users could interact with selecting a component from a part list on the device. Then, 3D representations of components appear on the printed drawing, coupled with 3D virtual labels for their location and identification. Users could also interact with watching a 3D animation to learn how components are assembled. Students evaluated the application through a questionnaire based on the System Usability Scale (SUS). The survey was provided to 15 students selected among those we participated in the preliminary interview. The mean SUS score was 83 (SD 12.9) over a maximum of 100, allowing teachers to use the AR application in their courses. Another important finding is that almost all the students revealed that this application would provide significant power for comprehension on their own.

Keywords: augmented reality, distance learning, STEM didactics, technology in education

Procedia PDF Downloads 128
8077 Application of Data Mining for Aquifer Environmental Assessment

Authors: Saman Javadi, Mehdi Hashemy, Mohahammad Mahmoodi

Abstract:

Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. The common way to provide vulnerability map is DRASTIC. Meanwhile, application of the method is not easy to apply for any aquifer due to choosing appropriate constant values of weights and ranks. In this study, a new approach using k-means clustering is applied to make vulnerability maps. Four features of depth to groundwater, hydraulic conductivity, recharge value and vadose zone were considered at the same time as features of clustering. Five regions are recognized out of the case study represent zones with different level of vulnerability. The finding results show that clustering provides a realistic vulnerability map so that, Pearson’s correlation coefficients between nitrate concentrations and clustering vulnerability is obtained 61%.

Keywords: clustering, data mining, groundwater, vulnerability assessment

Procedia PDF Downloads 603
8076 Wireless Sensor Anomaly Detection Using Soft Computing

Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh

Abstract:

We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.

Keywords: IDS, Machine learning, WSN, ZigBee technology

Procedia PDF Downloads 543
8075 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 494
8074 The Economic Impact of Mediation: An Analysis in Time of Crisis

Authors: C. M. Cebola, V. H. Ferreira

Abstract:

In the past decade mediation has been legally implemented in European legal systems, especially after the publication by the European Union of the Directive 2008/52/EC on certain aspects of mediation in civil and mercantile matters. Developments in international trade and globalization in this new century have led to an increase of the number of litigations, often cross-border, and the courts have failed to respond adequately. We do not advocate that mediation should be promoted as the solution for all justice problems, but as a means with its own specificities that the parties may choose to consider as the best way to resolve their disputes. Thus, the implementation of mediation should be based on the advantages of its application. From the economic point of view, competitive negotiation can generate negative external effects in social terms. A solution reached in a court of law is not always the most efficient one considering all elements of society (economic social benefit). On the other hand, the administration of justice adds in economic terms transaction costs that can be mitigated by the application of other forms of conflict resolution, such as mediation. In this paper, the economic benefits of mediation will be analysed in the light of various studies on the functioning of justice. Several theoretical arguments will be confronted with empirical studies to demonstrate that mediation has significant positive economic effects. The objective is to contribute to the dissemination of mediation between companies and citizens, but also to demonstrate the cost to governments and states of still limited use of mediation, particularly in the current economic crisis and propose actions to develop the application of mediation.

Keywords: economic impact, litigation costs, mediation, solutions

Procedia PDF Downloads 280
8073 MR-Implantology: Exploring the Use for Mixed Reality in Dentistry Education

Authors: Areej R. Banjar, Abraham G. Campbell

Abstract:

The use of Mixed Reality (MR) in teaching and training is growing popular and can improve students’ ability to perform technical procedures. This short paper outlines the creation of an interactive educational MR 3D application that aims to improve the quality of instruction for dentistry students. This application is called MRImplantology and aims to teach the fundamentals and preoperative planning of dental implant placement. MRImplantology uses cone-beam computed tomography (CBCT) images as the source for 3D dental models that dentistry students will be able to freely manipulate within a 3D MR world to aid their learning process.

Keywords: augmented reality, education, dentistry, cone-beam computed tomography CBCT, head mounted display HMD, mixed reality

Procedia PDF Downloads 190
8072 Therapeutic Effects of Guar Gum Nanoparticles in Oxazolone-Induced Atopic Dermatitis

Authors: Nandita Ghosh, Shinjini Mitra, Ena Ray Banerjee

Abstract:

Atopic dermatitis (AD) is a chronic disease of the skin, involving itchy, reddish, and scaly lesions. It mainly affects children and has a high prevalence in developing countries. The AD may occur due to environmental or genetic factors. There is no permanent cure for the AD. Currently, all therapeutic strategies involve methods to simply alleviate the symptoms, and include lotions and corticosteroids, which have adverse effects. Use of phytochemicals and natural products has not yet been exploited fully. The particle used in this study is derived from Cyamopsis tetragonoloba, an edible polysaccharide with a galactomannan component. The mannose component mainly increases its specificity towards cellular uptake by mannose receptors, highly expressed by the macrophage. The aim of this study was to determine the therapeutic effect of guar gum nanoparticles (GN) in vitro and in vivo in the AD. To assess the wound healing capacity of the guar gum nanoparticle (GN), we first treated adherent NIH3T3 cells, with a scratch injury, with GN. GN successfully healed the wound caused by the scratch. In the in vivo experiment, Balb/c mice ear were topically treated with oxazolone (oxa) to induce AD and then were topically treated with GN. The ear thickness was increased significantly till day 28 on the treatment of Oxa. The GN application showed a significant decrease in the thickness as assessed on day 28. The total cell count of skin cells showed fold increase when treated with oxa, was again decreased on topical application of GN on the affected skin. The eosinophil count, as assessed by Giemsa staining was also increased when treated with oxa, GN application led to a significant decrease. The IgE level was assessed in the serum samples which showed that GN helped in restoring the alleviated IgE level. The T helper cells and the macrophage population showed increased percentage when treated with oxa, the GN application. This was examined by flow cytometry. The H&E staining of the ear tissue showed epidermal thickness in the oxa treated mice, GN application showed reduced cellular filtration followed by epidermal thickness. Thus our assays showed that GN was successful in alleviating the disease caused by Oxa when administered topically.

Keywords: allergen, inflammation, nanodrug, wound

Procedia PDF Downloads 243
8071 The Application of Data Mining Technology in Building Energy Consumption Data Analysis

Authors: Liang Zhao, Jili Zhang, Chongquan Zhong

Abstract:

Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.

Keywords: data mining, data analysis, prediction, optimization, building operational performance

Procedia PDF Downloads 852
8070 The Impact of a Leadership Change on Individuals' Behaviour and Incentives: Evidence from the Top Tier Italian Football League

Authors: Kaori Narita, Juan de Dios Tena Horrillo, Claudio Detotto

Abstract:

Decisions on replacement of leaders are of significance and high prevalence in any organization, and concerns many of its stakeholders, whether it is a leader in a political party or a CEO of a firm, as indicated by high media coverage of such events. This merits an investigation into the consequences and implications of a leadership change on the performances and behavior of organizations and their workers. Sport economics provides a fruitful field to explore these issues due to the high frequencies of managerial changes in professional sports clubs and the transparency and regularity of observations of team performance and players’ abilities. Much of the existing research on managerial change focuses on how this affects the performance of an organization. However, there is scarcely attention paid to the consequences of such events on the behavior of individuals within the organization. Changes in behavior and attitudes of a group of workers due to a managerial change could be of great interest in management science, psychology, and operational research. On the other hand, these changes cannot be observed in the final outcome of the organization, as this is affected by many other unobserved shocks, for example, the stress level of workers with the need to deal with a difficult situation. To fill this gap, this study shows the first attempt to evaluate the impact of managerial change on players’ behaviors such as attack intensity, aggressiveness, and efforts. The data used in this study is from the top tier Italian football league (“Serie A”), where an average of 13 within season replacements of head coaches were observed over the period of seasons from 2000/2001 to 2017/18. The preliminary estimation employs Pooled Ordinary Least Square (POLS) and club-season Fixed Effect (FE) in order to assess the marginal effect of having a new manager on the number of shots, corners and red/yellow cards after controlling for a home-field advantage, ex ante abilities and current positions in the league of a team and their opponent. The results from this preliminary estimation suggest that the teams do not show a significant difference in their behaviors before and after the managerial change. To build on these preliminary results, other methods, including propensity score matching and non-linear model estimates, will be used. Moreover, the study will further investigate these issues by considering other measurements of attack intensity, aggressiveness, and efforts, such as possessions, a number of fouls and the athletic performance of players, respectively. Finally, the study is going to investigate whether these results vary over the characteristics of a new head coach, for example, their age and experience as a manager and a player. Thus far, this study suggests that certain behaviours of individuals in an organisation are not immediately affected by a change in leadership. To confirm this preliminary finding and lead to a more solid conclusion, further investigation will be conducted in the aforementioned manner, and the results will be elaborated in the conference.

Keywords: behaviour, effort, manager characteristics, managerial change, sport economics

Procedia PDF Downloads 134
8069 Analysis of Impact Load Induced by Ultrasonic Cavitation Bubble Collapse Using Thin Film Pressure Sensors

Authors: Moiz S. Vohra, Nagalingam Arun Prasanth, Wei L. Tan, S. H. Yeo

Abstract:

The understanding of generation and collapse of acoustic cavitation bubbles are prerequisites for application of cavitation erosion. Microbubbles generated due to rapid fluctuation of pressure induced by propagation of ultrasonic wave lead to formation of high velocity microjets and or shock waves upon collapse. Due to vast application of ultrasonic, it is important to characterize and understand cavitation collapse pressure under the radiating surface at different conditions. A comparative investigation is carried out to determine impact load and dynamic pressure distribution exerted upon bubble collapse using thin film pressure sensors. Measurements were recorded at different input conditions such as amplitude, stand-off distance, insertion depth of the horn inside the liquid and pulse on-off time of acoustic vibrations. Impact force of 2.97 N is recorded at amplitude of 108 μm and stand-off distance of 1 mm from the sensor film, whereas impulsive force as low as 0.4 N is recorded at amplitude of 12 μm and stand-off distance of 5 mm from the sensor film. The results drawn from the investigation indicated that variety of impact loads can be achieved by controlling generation and collapse of bubbles, making it suitable to use for numerous application.

Keywords: ultrasonic cavitation, bubble collapse, pressure mapping sensor, impact load

Procedia PDF Downloads 339
8068 Monte Carlo Pathwise Sensitivities for Barrier Options with Application to Coco-Bond Calibration

Authors: Thomas Gerstner, Bastian von Harrach, Daniel Roth

Abstract:

The Monte Carlo pathwise sensitivities approach is well established for smooth payoff functions. In this work, we present a new Monte Carlo algorithm that is able to calculate the pathwise sensitivities for discontinuous payoff functions. Our main tool is the one-step survival idea of Glasserman and Staum. Although this technique yields to new terms per observation, while differentiating, the algorithm is still efficient. As an application, we use the results for a two-dimensional calibration of a Coco-Bond, which we model with different types of discretely monitored barrier options.

Keywords: Monte Carlo, discretely monitored barrier options, pathwise sensitivities, Coco-Bond

Procedia PDF Downloads 358
8067 Effect of Heat Treatment on the Corrosion Behavior of Stainless Steel

Authors: Altoumi Alndalusi

Abstract:

The work examines the aqueous corrosion behavior of grades of stain less steel which are used as corrosion resistant castings for applications such as valve and pump bodies. The corrosion behavior of steels in the as-cast condition has been examined using potentiostatic studies to illustrate the need for correct thermal treatment. A metallurgical examination and chemical analysis were carried out to establish the morphology of the steel structure. Heat treatment was carried out in order to compare damage in relation to microstructure. Optical and scanning electron microscopy examinations confirmed that the austenitic steels suffers from severe localized inter-dendritic pitting attack, while non homogenized castings highly alloyed duplex steels gave inferior corrosion resistance. Through the heat treatment conditions a significant of phase transformation of the duplex steel C were occurred (from ferrite to austenite and sigma plus carbides) and were gave reduction resistance.

Keywords: cast, corrosion, duplex stainless, heat treatment, material, steel

Procedia PDF Downloads 175
8066 Pattern Recognition Search: An Advancement Over Interpolation Search

Authors: Shahpar Yilmaz, Yasir Nadeem, Syed A. Mehdi

Abstract:

Searching for a record in a dataset is always a frequent task for any data structure-related application. Hence, a fast and efficient algorithm for the approach has its importance in yielding the quickest results and enhancing the overall productivity of the company. Interpolation search is one such technique used to search through a sorted set of elements. This paper proposes a new algorithm, an advancement over interpolation search for the application of search over a sorted array. Pattern Recognition Search or PR Search (PRS), like interpolation search, is a pattern-based divide and conquer algorithm whose objective is to reduce the sample size in order to quicken the process and it does so by treating the array as a perfect arithmetic progression series and thereby deducing the key element’s position. We look to highlight some of the key drawbacks of interpolation search, which are accounted for in the Pattern Recognition Search.

Keywords: array, complexity, index, sorting, space, time

Procedia PDF Downloads 243
8065 Impact of Experience-Oriented Marketing on the Buying Behaviour of the Consumers: An Application in Konya Selcuk University

Authors: Ebru Esen, Ömer Akkaya, Nattanan Pankrobkaew

Abstract:

Though the experience concept found its place in the field of marketing in 1982, it is today in front of us as an important phenomenon in understanding the consumer behaviours. In parallel with the globalization and intensification of the competition, the enterprises have been in an effort to provide unique experiences for their consumers by going beyond providing services with the products. In this context, experience-oriented marketing enables the enterprises to use the marketing strategies of providing experiences for their customers and to have advantages in terms of competition. Based on it, this article discusses the concepts of experience, experience-oriented marketing and buying behaviour of consumers as a whole, and details about the application conducted in Konya Selcuklu University.

Keywords: experience, experience marketing, buying behaviour of consumers

Procedia PDF Downloads 314
8064 A Quadratic Approach for Generating Pythagorean Triples

Authors: P. K. Rahul Krishna, S. Sandeep Kumar, Jayanthi Sunder Raj

Abstract:

The article explores one of the important relations between numbers-the Pythagorean triples (triplets) which finds its application in distance measurement, construction of roads, towers, buildings and wherever Pythagoras theorem finds its application. The Pythagorean triples are numbers, that satisfy the condition “In a given set of three natural numbers, the sum of squares of two natural numbers is equal to the square of the other natural number”. There are numerous methods and equations to obtain the triplets, which have their own merits and demerits. Here, quadratic approach for generating triples uses the hypotenuse leg difference method. The advantage is that variables are few and finally only three independent variables are present.

Keywords: arithmetic progression, hypotenuse leg difference method, natural numbers, Pythagorean triplets, quadratic equation

Procedia PDF Downloads 206
8063 Critical Discourse Analysis of Political TV Talk Show of Pakistani Media

Authors: Sumaira Saleem, Sajjad Hussain, Asma Kashif Shahzad, Hina Shaheen

Abstract:

This study aims at exploring the relationship between language and ideology and how such relationships are represented in the analysis of spoken texts, following Van Dijk’s Socio Cognitive Model (2002). In this study, it is tried to show that political Talk shows broadcast by Private TV channels are working apparatuses of ideology and store meanings which are not always obvious for readers. This analysis was about the situation created by Arslan Iftkhar, the son of ex-Chief Justice of Pakistan, Iftikhar Muhammad Chaudry and PTI Chief Imran Khan. Arslan Iftikhar submitted an application against Imran Khan that he is not able to become a member of parliament of Pakistan. In the application, he demanded the documents, which are submitted by Imran Khan at the time of Election to the Election Commission of Pakistan. Murad Ali from PTI also submitted an application against PM Nawaz Sharif to the Election Commission of Pakistan for providing the copies. It also suggests that these talk shows mystify the agency of processes by using various strategies. In other words, critical text analyses reveal how these choices enable speakers to manipulate the realizations of agency and power in the representation of action to produce particular meanings which are not always explicit for all readers.

Keywords: ECP, CDA, socio cognitive model, ideology, TV channels, power

Procedia PDF Downloads 738
8062 Exploring the Impact of Tillage and Manure on Soil Water Retention and Van Genuchten

Authors: Azadeh Safadoust, Ali Akbar Mahboubi

Abstract:

A study was conducted to evaluate hydraulic properties of a sandy loam soil and corn (Zea mays L.) crop production under a short-term tillage and manure combinations field experiment carried out in west of Iran. Treatments included composted cattle manure application rates [0, 30, and 60 Mg (dry weight) ha-1] and tillage systems [no-tillage (NT), chisel plowing (CP), and moldboard plowing (MP)] arranged in a split-plot design. Soil water characteristic curve (SWCC) and saturated hydraulic conductivity (Ks) were significantly affected by manure and tillage treatments. At any matric suction, the soil water content was in the order of MP>CP>NT. At all matric suctions, the amount of water retained by the soil increased as manure application rate increased (i.e. 60>30>0 Mg ha-1). Similar to the tillage effects, at high suctions the differences of water retained due to manure addition were less than that at low suctions. The change of SWCC from tillage methods and manure applications may attribute to the change of pore size and aggregate size distributions. Soil Ks was in the order of CP>MP>NT for the first two layers and in the order of MP>CP and NT for the deeper soil layer. The Ks also increased with increasing rates of manure application (i.e. 60>30>0 Mg ha-1). This was due to the increase in the total pore size and continuity.

Keywords: corn, manure, saturated hydraulic conductivity, soil water characteristic curve, tillage

Procedia PDF Downloads 75