Search results for: interest flooding attack
4047 Factors Affecting Employee’s Effectiveness at Job in Banking Sectors of Pakistan
Authors: Sajid Aman
Abstract:
Jobs in the banking sector in Pakistan are perceived as very tough, due to which employee turnover is very high. However, the managerial role is very important in influencing employees’ attitudes toward their turnout. This paper explores the manager’s role in influencing employees’ effectiveness on the job. The paper adopted a pragmatic approach by combining both qualitative and quantitative data. The study employed an exploratory sequential strategy under a mixed-method research design. Qualitative data was analyzed using thematic analysis. Five major themes, such as the manager’s attitude towards employees, his leadership style, listening to employee’s personal problems, provision of personal loans without interest and future career prospects, emerged as key factors increasing employee’s effectiveness in the banking sector. The quantitative data revealed that a manager’s attitude, leadership style, availability to listen to employees’ personal problems, and future career prospects and listening to employee’s personal problems are strongly associated with employees’ effectiveness at the job. However, personal loan without interest was noted as having no significant association with employee’s effectiveness at the job. The study concludes manager’s role is more important in the effectiveness of the employees at their job in the banking sector. It is suggested that managers should have a positive attitude towards employees and give time to listening to employee’s problems, even personal ones.Keywords: banking sector, employee’s effectiveness, manager’s role, leadership style
Procedia PDF Downloads 324046 The Role and Function of National Land Authority as Mediator in Land Dispute Settlements in Indonesia
Authors: Nia Kurniati, Efa Laela Fakhriah
Abstract:
The regulation in Indonesia provides space for the land dispute to be settled outside the court by the government through National Land. In this case, the bureaucrat of Badan Pertanahan Nasional (BPN) acts as mediator to reach a fair agreement between the disputing parties. Land dispute is from a party who denies the ownership of the other party of a land and denies legal-technical facts written on land certificate published by BPN. Appointing the bureaucrat of BPN as mediator in dispute settlements may possibly create conflict of interest since the object. It has become a concern since bureaucrat of BPN acts as mediator, he will be bias and partial in assisting the dispute settlement, thus the spirit and purposes of mediation will be hampered. This issue triggers to be thoroughly examined further in a relation with the role and function of BPN as land dispute mediator. The methodology used in this research is a normative-legal one with qualitative-legal analytical method. The object of this research is in the form of random sampling of land dispute cases being occurred in some areas. Several principles in mediation have to be made as the base of the consideration to appoint bureaucrat of BPN as mediator since the mediator is an impartial third party, working with both disputing parties and assisting them to reach a fair resolution written in agreement as a foundation of land dispute settlement. The existence of BPN as mediator in land dispute settlement encounters conflict of interest which uphold legal uncertainty to act objectively.Keywords: Indonesia, land dispute, mediator, national land authority
Procedia PDF Downloads 3104045 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia
Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana
Abstract:
Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization
Procedia PDF Downloads 2374044 Antigen-Presenting Cell Characteristics of Human γδ T Lymphocytes in Chronic Myeloid Leukemia
Authors: Piamsiri Sawaisorn, Tienrat Tangchaikeeree, Waraporn Chan-On, Chaniya Leepiyasakulchai, Rachanee Udomsangpetch, Suradej Hongeng, Kulachart Jangpatarapongsa
Abstract:
Human Vγ9Vδ2 T lymphocytes are regarded as promising effector cells for cancer immunotherapy since they have the ability to eliminate several tumor cells through non-peptide antigen recognition and non-major histocompatibility complex (MHC) restriction. An issue of recent interest is the capability to activate γδ T cells by use of a group of drugs, such as pamidronate, that cause accumulation of phosphoantigen which is recognized by γδ T cell receptors. Moreover, their antigen presenting cell-like phenotype and function have been confirmed in many clinical trials. In this study, Vγ9Vδ2 T cells derived from normal peripheral blood mononuclear cells were activated with pamidronate and the expanded Vγ9Vδ2 T cells can recognize and kill chronic myeloid leukemia (CML) cells treated with pamidronate through their cytotoxic activity. To support the strong role played by Vγ9Vδ2 T cells against cancer, we provide the evidence that Vγ9Vδ2 T cells activated with CML cell lysate antigen can efficiently express antigen presenting cell (APC) phenotype and function. In conclusion, pamidronate can be used in intentional activation of human Vγ9Vδ2 T cells and can increase the susceptibility of CML cells to cytotoxicity of Vγ9Vδ2 T cells. The activated Vγ9Vδ2 T cells by cancer cells lysate can show their APC characteristics, and so greatly increase the interest in exploring their therapeutic potential in hematologic malignancy.Keywords: γδ T lymphocytes, antigen-presenting cells, chronic myeloid leukemia, cancer, immunotherapy
Procedia PDF Downloads 1864043 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 3354042 Evaluation of Flood Events in Respect of Disaster Management in Turkey
Authors: Naci Büyükkaracığan, Hasan Uzun
Abstract:
Flood is the event which damage to the surrounding lands, residential places, infrastructure and vibrant, because of the streams overflow events from its bed for several reasons. Flood is a natural formation which develops due to its region's climatic conditions, technical and topographical characteristics. However, factors causing floods with global warming caused by human activity are events such as uncontrolled urbanization. Floods in Turkey are natural disasters which cause huge economic losses after the earthquake. At the same time, the flood disaster is one of the most observed hydrometeorological disasters, compared to 30%, in Turkey. Every year, there are around 200 flood-flood disasters and the disaster as a result of financial losses of $ 100 million per year are reported to occur in public institutions. The amount allocated for carrying out investment-project activities for reducing and controlling of flood damage control are around US $ 30 million per year. The existence of a linear increase in the number of flood disasters is noteworthy due to various reasons in the last 50 years of observation. In this study, first of all, big events of the flood in Turkey and their reasons were examined. And then, the information about the work to be done in order to prevent flooding by government was given with examples. Meteorological early warning systems, flood risk maps and regulation of urban development studies are described for this purpose. As a result, recommendations regarding in the event of the occurrence of floods disaster management were issues raised.Keywords: flood, disaster, disaster management, Türkiye
Procedia PDF Downloads 3294041 Exploring Social Impact of Emerging Technologies from Futuristic Data
Authors: Heeyeul Kwon, Yongtae Park
Abstract:
Despite the highly touted benefits, emerging technologies have unleashed pervasive concerns regarding unintended and unforeseen social impacts. Thus, those wishing to create safe and socially acceptable products need to identify such side effects and mitigate them prior to the market proliferation. Various methodologies in the field of technology assessment (TA), namely Delphi, impact assessment, and scenario planning, have been widely incorporated in such a circumstance. However, literatures face a major limitation in terms of sole reliance on participatory workshop activities. They unfortunately missed out the availability of a massive untapped data source of futuristic information flooding through the Internet. This research thus seeks to gain insights into utilization of futuristic data, future-oriented documents from the Internet, as a supplementary method to generate social impact scenarios whilst capturing perspectives of experts from a wide variety of disciplines. To this end, network analysis is conducted based on the social keywords extracted from the futuristic documents by text mining, which is then used as a guide to produce a comprehensive set of detailed scenarios. Our proposed approach facilitates harmonized depictions of possible hazardous consequences of emerging technologies and thereby makes decision makers more aware of, and responsive to, broad qualitative uncertainties.Keywords: emerging technologies, futuristic data, scenario, text mining
Procedia PDF Downloads 4914040 DG Allocation to Reduce Production Cost by Reducing Losses in Radial Distribution Systems Using Fuzzy
Authors: G. V. Siva Krishna Rao, B. Srinivasa Rao
Abstract:
Electrical energy is vital in every aspect of day-to-day life. Keen interest is taken on all possible sources of energy from which it can be generated and this led to the encouragement of generating electrical power using renewable energy resources such as solar, tidal waves and wind energy. Due to the increasing interest on renewable sources in recent times, the studies on integration of distributed generation to the power grid have rapidly increased. Distributed Generation (DG) is a promising solution to many power system problems such as voltage regulation, power loss and reduction in operational cost, etc. To reduce production cost, it is important to minimize the losses by determining the location and size of local generators to be placed in the radial distribution systems. In this paper, reduction of production cost by optimal size of DG unit operated at optimal power factor is dealt. The optimal size of the DG unit is calculated analytically using approximate reasoning suitable nodes and DG placement to minimize production cost with minimum loss is determined by fuzzy technique. Total Cost of Power generation is compared with and without DG unit for 1 year duration. The suggested method is programmed under MATLAB software and is tested on IEEE 33 bus system and the results are presented.Keywords: distributed generation, operational cost, exact loss formula, optimum size, optimum location
Procedia PDF Downloads 4844039 Three Dimensional Model of Full Scale Plate Load Test on Stone Column in Sabkha Deposit: Case Study from Jubail Industrial City - Saudi Arabia
Authors: Hassan. A. Abas, Saad A. Aiban
Abstract:
Soil improvement by means of stone column method is used to improve sabkha soils in order to limit total and differential settlement and to achieve the required bearing capacity. Full-scale plate test was performed on site to confirm the achievement of required bearing capacity at the specified settlement. Despite the fact that this technique is widely used to improve sabkha soils, there are no studies focusing on the behavior of stone columns in such problematic soils. Sabkha soils are known for its high compressibility, low strength and water sensitivity due to loss of salt cementation upon flooding during installation of stone columns. Numerical modeling of plate load test assist to understand complicated behavior of sabkha – stone column interaction. This paper presents a three-dimensional Finite element model, using PLAXIS 3D software, to simulate vertical plate load tests on a stone column installed in sabkha. The predicted settlement values are in reasonable agreement with the field measure values and the field load - settlement curve can be predicted with good accuracy.Keywords: soil improvement, stone column, sabkha, PLAXIS 3D
Procedia PDF Downloads 3884038 Wireless Sensor Anomaly Detection Using Soft Computing
Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh
Abstract:
We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.Keywords: IDS, Machine learning, WSN, ZigBee technology
Procedia PDF Downloads 5434037 Technology and Digitalization Enhance the Religious Culture
Abstract:
This research investigates novel methods to enhance people’s experience in religious culture through technology and digitization. This stage focuses on promoting Taiwanese culture regarding traditional religion. There are three primary research areas in this research field, namely the cultural and creative industry, digitalization, and digital games and cultural cognition. The research is designed based on mixed methodologies, which consist of two experiments. In Experiment I, experts who have religious and cultural background are being interviewed for qualitative data. The suggestions and opinions obtained from this experiment provide a deeper understanding of Taiwanese religious culture. In Experience II, quantitative approach is being adopted. This includes a survey among the younger generation in Taiwan to give a broader look at peoples’ thought about experiencing religious cultures with digitalization. This research allows us to determine the people’s interest in the digitalization of culture. It will help us to combine technology, culture, creativity, industrial, and cultural promotion. Including the design of applications, serious games, and immersive technology. This study shows that technology and digitalization can be used to help people to understand a traditional culture better. The outcome of this research can help designers and developers related to the cultural creativity industries by providing results on people’s interest regarding culture across three vital aspects: 1. Their attitude regarding the education of culture. 2. Their attitude regarding the promotion of culture. 3. Their attitude regarding the information on culture. In addition, this research will help designers who wish to implement cultural elements into their works. It also has great benefits for associations, governments, or individuals who try an innovative way of cultural perversion.Keywords: culture heritage, digital games, digitalization, traditional religious culture
Procedia PDF Downloads 1224036 Modelling and Investigation of Phase Change Phenomena of Multiple Water Droplets
Authors: K. R. Sultana, K. Pope, Y. S. Muzychka
Abstract:
In recent years, the research of heat transfer or phase change phenomena of liquid water droplets experiences a growing interest in aircraft icing, power transmission line icing, marine icing and wind turbine icing applications. This growing interest speeding up the research from single to multiple droplet phenomena. Impingements of multiple droplets and the resulting solidification phenomena after impact on a very cold surface is computationally studied in this paper. The model used in the current study solves the flow equation, composed of energy balance and the volume fraction equations. The main aim of the study is to investigate the effects of several thermo-physical properties (density, thermal conductivity and specific heat) on droplets freezing. The outcome is examined by various important factors, for instance, liquid fraction, total freezing time, droplet temperature and total heat transfer rate in the interface region. The liquid fraction helps to understand the complete phase change phenomena during solidification. Temperature distribution and heat transfer rate help to demonstrate the overall thermal exchange behaviors between the droplets and substrate surface. Findings of this research provide an important technical achievement for ice modeling and prediction studies.Keywords: droplets, CFD, thermos-physical properties, solidification
Procedia PDF Downloads 2434035 Effect of Heat Treatment on the Corrosion Behavior of Stainless Steel
Authors: Altoumi Alndalusi
Abstract:
The work examines the aqueous corrosion behavior of grades of stain less steel which are used as corrosion resistant castings for applications such as valve and pump bodies. The corrosion behavior of steels in the as-cast condition has been examined using potentiostatic studies to illustrate the need for correct thermal treatment. A metallurgical examination and chemical analysis were carried out to establish the morphology of the steel structure. Heat treatment was carried out in order to compare damage in relation to microstructure. Optical and scanning electron microscopy examinations confirmed that the austenitic steels suffers from severe localized inter-dendritic pitting attack, while non homogenized castings highly alloyed duplex steels gave inferior corrosion resistance. Through the heat treatment conditions a significant of phase transformation of the duplex steel C were occurred (from ferrite to austenite and sigma plus carbides) and were gave reduction resistance.Keywords: cast, corrosion, duplex stainless, heat treatment, material, steel
Procedia PDF Downloads 1754034 Magneto-Thermo-Mechanical Analysis of Electromagnetic Devices Using the Finite Element Method
Authors: Michael G. Pantelyat
Abstract:
Fundamental basics of pure and applied research in the area of magneto-thermo-mechanical numerical analysis and design of innovative electromagnetic devices (modern induction heaters, novel thermoelastic actuators, rotating electrical machines, induction cookers, electrophysical devices) are elaborated. Thus, mathematical models of magneto-thermo-mechanical processes in electromagnetic devices taking into account main interactions of interrelated phenomena are developed. In addition, graphical representation of coupled (multiphysics) phenomena under consideration is proposed. Besides, numerical techniques for nonlinear problems solution are developed. On this base, effective numerical algorithms for solution of actual problems of practical interest are proposed, validated and implemented in applied 2D and 3D computer codes developed. Many applied problems of practical interest regarding modern electrical engineering devices are numerically solved. Investigations of the influences of various interrelated physical phenomena (temperature dependences of material properties, thermal radiation, conditions of convective heat transfer, contact phenomena, etc.) on the accuracy of the electromagnetic, thermal and structural analyses are conducted. Important practical recommendations on the choice of rational structures, materials and operation modes of electromagnetic devices under consideration are proposed and implemented in industry.Keywords: electromagnetic devices, multiphysics, numerical analysis, simulation and design
Procedia PDF Downloads 3864033 An Assessment of Sexual Informational Needs of Breast Cancer Patients in Radiation Oncology
Authors: Li Hoon Lim, Nur Farhanah Said, Katie Simmons, Eric Pei Ping Pang, Sharon Mei Mei Wong
Abstract:
Background and Purpose: Research regarding the sexual impact of breast cancer treatment on Asian women is both sensitive and scarce. This study aims to assess and evaluate the sexual health needs and concerns of breast cancer radiotherapy patients. It is hoped that awareness will be increased and an appropriate intervention can be developed to address the needs of future breast cancer patients. Methods: 110 consecutive unselected breast cancer patients were recruited prospectively. Questionnaires were administered once for patient undergoing radiotherapy to the breast. This study employed an anonymous questionnaire; any breast radiotherapy patient who can read English can voluntarily receive and complete the survey. The questionnaire consisted of items addressing demographics, potential informational needs, and educational preferences. Results: Patients’ interest to address sexual concerns decreases with age (p=0.024). Coherently, sexual concerns of patients are reported to decrease with age (p=0.015) where 70% of all respondents below age 50 [age 20-29 (60%); 30-39 (56.3%); 40-49(55.1%)] have started to have sexual concerns regarding their treatment effects on their sexual health. Patients who underwent breast conservation surgery (42.2%) and reconstruction surgery (83.3%) were more likely to have concerns about sexual health versus patients who underwent mastectomy (36.7%) (p=0.032). 74.2% of patients with sexual concern regardless of age would initiate conversation with their healthcare providers (p < 0.001). Conclusions: The results showed a staggering interest of female patients wanting information on this area which would not only boost their confidence and body image but also address concerns of the effect of breast radiotherapy on sexual health during their treatment.Keywords: breast cancer, breast radiotherapy, sexual health, sexual impact
Procedia PDF Downloads 2074032 Use of a Relief Mobile Unit in the Humanitarian Cause
Authors: Stephani Ferreira da Silva Manso, Regina M. M. Dias Chiquetano
Abstract:
This article aims to present a research on one of the main aspects of response in humanitarian causes: agility of operations. Brazil is among the 10 countries with the highest number of people affected by disasters.The main types of disasters in Brazil include floods and mass movements. Focusing on a nongovernmental organization that began in the conflicts of First and Second World Wars, arriving in Brazil in 1984. In 2017, the organization has activated their emergency response mobile unit to reach families following flooding that affected around 9,000 people. In partnership with Truckvan, the mobile unit, has 45 m² of floor space and is divided into three compartments each designed to meet the main needs of the population: the first will be used to prepare hot meals, the second to washing and drying of clothes, and the third for the accomplishment of psychological support. This option will be available for situations where there are more than one thousand victims who are sheltered, even temporarily, and demand immediate care, which will be identified through the National Emergency Plan. In this way, the actions that were already done as donation of blankets, clothes, hygiene kits, among others, will be enhanced. Studies show that one of the biggest difficulties in responding to the disaster is in the first few hours after the disaster. This study aimed to show the organization's innovative results and to propose improvement actions in transportation focused on humanitarian aid as the concepts developed in the manufacture and adaptation of the mobile unit to the rescue environment. Thus, the principles of this humanitarian aid bus are very effective.Keywords: disasters, humanitarian cause, relief, unit mobile
Procedia PDF Downloads 1904031 Student Project on Using a Spreadsheet for Solving Differential Equations by Euler's Method
Authors: Andriy Didenko, Zanin Kavazovic
Abstract:
Engineering students often have certain difficulties in mastering major theoretical concepts in mathematical courses such as differential equations. Student projects were proposed to motivate students’ learning and can be used as a tool to promote students’ interest in the material. Authors propose a student project that includes the use of Microsoft Excel. This instructional tool is often overlooked by both educators and students. An integral component of the experimental part of such a project is the exploration of an interactive spreadsheet. The aim is to assist engineering students in better understanding of Euler’s method. This method is employed to numerically solve first order differential equations. At first, students are invited to select classic equations from a list presented in a form of a drop-down menu. For each of these equations, students can select and modify certain key parameters and observe the influence of initial condition on the solution. This will give students an insight into the behavior of the method in different configurations as solutions to equations are given in numerical and graphical forms. Further, students could also create their own equations by providing functions of their own choice and a variety of initial conditions. Moreover, they can visualize and explore the impact of the length of the time step on the convergence of a sequence of numerical solutions to the exact solution of the equation. As a final stage of the project, students are encouraged to develop their own spreadsheets for other numerical methods and other types of equations. Such projects promote students’ interest in mathematical applications and further improve their mathematical and programming skills.Keywords: student project, Euler's method, spreadsheet, engineering education
Procedia PDF Downloads 1354030 Combining the Deep Neural Network with the K-Means for Traffic Accident Prediction
Authors: Celso L. Fernando, Toshio Yoshii, Takahiro Tsubota
Abstract:
Understanding the causes of a road accident and predicting their occurrence is key to preventing deaths and serious injuries from road accident events. Traditional statistical methods such as the Poisson and the Logistics regressions have been used to find the association of the traffic environmental factors with the accident occurred; recently, an artificial neural network, ANN, a computational technique that learns from historical data to make a more accurate prediction, has emerged. Although the ability to make accurate predictions, the ANN has difficulty dealing with highly unbalanced attribute patterns distribution in the training dataset; in such circumstances, the ANN treats the minority group as noise. However, in the real world data, the minority group is often the group of interest; e.g., in the road traffic accident data, the events of the accident are the group of interest. This study proposes a combination of the k-means with the ANN to improve the predictive ability of the neural network model by alleviating the effect of the unbalanced distribution of the attribute patterns in the training dataset. The results show that the proposed method improves the ability of the neural network to make a prediction on a highly unbalanced distributed attribute patterns dataset; however, on an even distributed attribute patterns dataset, the proposed method performs almost like a standard neural network.Keywords: accident risks estimation, artificial neural network, deep learning, k-mean, road safety
Procedia PDF Downloads 1634029 Deradicalization for Former Terrorists through Entrepreneurship Program
Authors: Jamal Wiwoho, Pujiyono, Triyanto
Abstract:
Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.Keywords: deradicalization, terrorism, terrorists, entrepreneurship
Procedia PDF Downloads 2704028 Research on Detection of Web Page Visual Salience Region Based on Eye Tracker and Spectral Residual Model
Authors: Xiaoying Guo, Xiangyun Wang, Chunhua Jia
Abstract:
Web page has been one of the most important way of knowing the world. Humans catch a lot of information from it everyday. Thus, understanding where human looks when they surfing the web pages is rather important. In normal scenes, the down-top features and top-down tasks significantly affect humans’ eye movement. In this paper, we investigated if the conventional visual salience algorithm can properly predict humans’ visual attractive region when they viewing the web pages. First, we obtained the eye movement data when the participants viewing the web pages using an eye tracker. By the analysis of eye movement data, we studied the influence of visual saliency and thinking way on eye-movement pattern. The analysis result showed that thinking way affect human’ eye-movement pattern much more than visual saliency. Second, we compared the results of web page visual salience region extracted by Itti model and Spectral Residual (SR) model. The results showed that Spectral Residual (SR) model performs superior than Itti model by comparison with the heat map from eye movements. Considering the influence of mind habit on humans’ visual region of interest, we introduced one of the most important cue in mind habit-fixation position to improved the SR model. The result showed that the improved SR model can better predict the human visual region of interest in web pages.Keywords: web page salience region, eye-tracker, spectral residual, visual salience
Procedia PDF Downloads 2764027 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 3684026 Leadership Development in Nepal: Challenges and Prospects
Authors: Deepak Chaudhary
Abstract:
This paper attempts to analyze the leadership phenomena, its challenges, and prospects in Nepal. Literature is reviewed rigorously to explain the theoretical and empirical aspects of leadership. Besides, In-depth interviews with three national leaders were interviewed to know the challenges regarding polity and leadership. Similarly, a survey among 434 households in Katahari rural municipality and Godavari municipality was carried out to assess people’s perceptions of leaders. Leadership is normally pronounced in the wake of the success of the country’s development or crisis management. Real leaders are those who can avert any crisis successfully and proceed with the country in a progressive and normal way. Leadership’s working style can create a favorable institutional environment in the public institution that can lead development programs successfully. However, the literature suggests that Nepal is still struggling towards modernization in comparison to some East-Asian countries whose socio-economic situation was more similar in the 1950s. Similarly, Nepal has been facing several social movements after the 1990s, which resulted in a new political system, though the performance of the public institution has been a question and it goes to the leadership’s role. The poor tackling of natural disasters like earthquakes flooding, and pandemics raises the questions of the leadership’s role to some extent. The government of Nepal's record of developmental expenditures is dismal. However, leadership has been the central part of people, community, and country, and hence, the study of leadership phenomena in relation to a country’s well-being is intrinsic.Keywords: challenges, leadership, institutionalization, effectiveness
Procedia PDF Downloads 624025 Aqueous Hydrogen Sulphide in Slit-Shaped Silica Nano-Pores: Confinement Effects on Solubility, Structural and Dynamical Properties
Authors: Sakiru Badmos, David R. Cole, Alberto Striolo
Abstract:
It is known that confinement in nm-size pores affects many structural and transport properties of water and co-existing volatile species. Of particular interest for fluids in sub-surface systems, in catalysis, and in separations are reports that confinement can enhance the solubility of gases in water. Equilibrium molecular dynamics simulations were performed for aqueous H₂S confined in slit-shaped silica pores at 313K. The effect of pore width on the H₂S solubility in water was investigated. Other properties of interest include the molecular distribution of the various fluid molecules within the pores, the hydration structure for solvated H₂S molecules, and the dynamical properties of the confined fluids. The simulation results demonstrate that confinement reduces the H₂S solubility in water and that the solubility increases with pore size. Analysis of spatial distribution functions suggests that these results are due to perturbations on the coordination of water molecules around H₂S due to confinement. Confinement is found to dampen the dynamical properties of aqueous H₂S as well. Comparing the results obtained for aqueous H₂S to those reported elsewhere for aqueous CH₄, it can be concluded that H₂S permeates hydrated slit-shaped silica nano-pores faster than CH₄. In addition to contributing to better understanding the behavior of fluids in subsurface formations, these observations could also have important implications for developing new natural gas sweetening technologies.Keywords: confinement, interfacial properties, molecular dynamic simulation, sub-surface formations
Procedia PDF Downloads 1654024 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario
Authors: Shuqi Zhang
Abstract:
Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning
Procedia PDF Downloads 964023 Plasma Actuator Application to Control Surfaces of a Model Aircraft
Authors: Yuta Moriyama, Etsuo Morishita
Abstract:
Plasma actuator is very effective to recover stall flows over an upper airfoil surface. We first manufacture the actuator, test the stability of the device by trial and error basis and find the conditions for steady operations. We visualize the flow around an airfoil in the smoke tunnel and observe the stall recovery. The plasma actuator is stationary device and has no moving parts, and it might be an ideal device to control a model aircraft. We can use the actuator not only as a stall recovery device but also as a spoiler. We put the actuator near the leading edge of an elevator of a model aircraft as a spoiler, and measure the aerodynamic forces by a three-component balance. We observe the effect of the plasma actuator on the aerodynamic forces and the device effectiveness changes depending on the angle of attack whether it is positive or negative. We also visualize the flow caused by the plasma actuator by a desk-top Schlieren photography which is otherwise very difficult in a low-speed wind tunnel experiment.Keywords: aerodynamics, plasma actuator, model aircraft, wind tunnel
Procedia PDF Downloads 3734022 Influence of Branding and Consultancy Services on the Performance of Coaches, Athletes and Sports Managers in Nigeria
Authors: Yakubu Nkom Bityong, A. I. Kabido, K. Venkateswarlu
Abstract:
The influence of branding and consultancy services on sports development and marketing mix has been a matter of interest among coaches athletes and sports managers in Nigeria. Marketers use sports as a promotional vehicle towards attracting customers to their products and services. The use of images, names, and photographs of sports personalities to advertise beverages, cars, and a whole range of other products and services as it is clearly noticed all over the television, radio and print media has generated a lot of argument among consumers who have vested interest and are more drawn to their favorite teams and sports personalities than they are to many company products This paper examines the influence of branding and consultancy services on sports Performance of coaches, athletes and sports managers in Nigeria. From a population of 7,441 made up of coaches, athletes and sports managers, 372 respondents were sampled for the study. A self developed and standardized questionnaire was the instrument used for data collection. One-tailed t-test was used to test the hypothesis. Results revealed that branding and consultancy services influence the performances of coaches, athletes and sports managers in Nigeria. It was concluded that the establishment of the National Institute of Sports (NIS) in Lagos with affiliated sports training programmes in Nigerian Universities is responsible for boosting the performance of sports personalities in Nigeria. It was recommended that National Policy on Sports should be reviewed in order to inculcate new methods and strategies towards enhancing sports development initiatives in the country while stakeholders should intensify regular training and retraining programmes for coaches, athletes and sports managers to update their knowledge and skills.Keywords: branding, consultancy, sports performance, sports development
Procedia PDF Downloads 3864021 Assessment of Land Use and Land Cover Change in Lake Ol Bolossat Catchment, Nyandarua County, Kenya
Authors: John Wangui, Charles Gachene, Stephen Mureithi, Boniface Kiteme
Abstract:
Land use changes caused by demographic, natural variability, economic, technological and policy factors affect the goods and services derived from an ecosystem. In the past few decades, Lake Ol Bolossat catchment in Nyandarua County Kenya has been facing challenges of land cover changes threatening its capacity to perform ecosystems functions and adversely affecting communities and ecosystems downstream. This study assessed land cover changes in the catchment for a period of twenty eight years (from 1986 to 2014). Analysis of three Landsat images i.e. L5 TM 1986, L5 TM 1995 and L8 OLI/TIRS 2014 was done using ERDAS 9.2 software. The results show that dense forest, cropland and area under water increased by 27%, 29% and 3% respectively. On the other hand, open forest, dense grassland, open grassland, bushland and shrubland decreased by 3%, 3%, 11%, 26% and 1% respectively during the period under assessment. The lake was noted to have increased due to siltation caused by soil erosion causing a reduction in Lake’s depth and consequently causing temporary flooding of the wetland. The study concludes that the catchment is under high demographic pressure which would lead to resource use conflicts and therefore formulation of mitigation measures is highly recommended.Keywords: land cover, land use change, land degradation, Nyandarua, Remote sensing
Procedia PDF Downloads 3694020 What Constitutes Pre-School Mathematics and How It Look Like in the Classroom?
Authors: Chako G. Chako
Abstract:
This study reports on an ongoing research that explores pre-school mathematics. Participants in the study includes three pre-school teachers and their pre-school learners from one school in Gaborone. The school was purposefully selected based on its performance in Botswana’s 2019 national examinations. Specifically, the study is interested on teachers’ explanations of mathematics concepts embedded in pre-school mathematics tasks. The interest on explanations was informed by the view that suggests that, the mathematics learners get to learn, resides in teachers’ explanations. Recently, Botswana’s basic education has integrated pre-school education into the mainstream public primary school education. This move is part of the government’s drive to elevate Botswana to a knowledge-based-economy. It is believed that provision of pre-school education to all Batswana children will contribute immensely towards a knowledge-based-economy. Since pre-school is now a new phenomenon in our education, there is limited research at this level of education in Botswana. In particular, there is limited knowledge about what and how the teaching is conducted in Pre-Schools in Botswana. Hence, the study seeks to gain insight into what constitutes mathematics in tasks that learners are given, and how concepts are made accessible to Pre-school learners. The research question of interest for this study is stated as: What is the nature Pre-school teachers’ explanations of mathematics concepts embedded in tasks given to learners. Casting some light into what and how pre-school mathematics tasks are enacted is critical for policy and Pre-school teacher professional development. The sociocultural perspective framed the research. Adler and Rhonda’s (2014) notion of exemplification and explanatory communication are used to analyze tasks given to learners and teachers’ explanations respectively.Keywords: classroom, explanation, mathematics, pre-school, tasks
Procedia PDF Downloads 1564019 Survey on Malware Detection
Authors: Doaa Wael, Naswa Abdelbaky
Abstract:
Malware is malicious software that is built to cause destructive actions and damage information systems and networks. Malware infections increase rapidly, and types of malware have become more sophisticated, which makes the malware detection process more difficult. On the other side, the Internet of Things IoT technology is vulnerable to malware attacks. These IoT devices are always connected to the internet and lack security. This makes them easy for hackers to access. These malware attacks are becoming the go-to attack for hackers. Thus, in order to deal with this challenge, new malware detection techniques are needed. Currently, building a blockchain solution that allows IoT devices to download any file from the internet and to verify/approve whether it is malicious or not is the need of the hour. In recent years, blockchain technology has stood as a solution to everything due to its features like decentralization, persistence, and anonymity. Moreover, using blockchain technology overcomes some difficulties in malware detection and improves the malware detection ratio over-than the techniques that do not utilize blockchain technology. In this paper, we study malware detection models which are based on blockchain technology. Furthermore, we elaborate on the effect of blockchain technology in malware detection, especially in the android environment.Keywords: malware analysis, blockchain, malware attacks, malware detection approaches
Procedia PDF Downloads 874018 A Methodology for the Synthesis of Multi-Processors
Authors: Hamid Yasinian
Abstract:
Random epistemologies and hash tables have garnered minimal interest from both security experts and experts in the last several years. In fact, few information theorists would disagree with the evaluation of expert systems. In our research, we discover how flip-flop gates can be applied to the study of superpages. Though such a hypothesis at first glance seems perverse, it is derived from known results.Keywords: synthesis, multi-processors, interactive model, moor’s law
Procedia PDF Downloads 436