Search results for: UAE civil code
1534 Mondoc: Informal Lightweight Ontology for Faceted Semantic Classification of Hypernymy
Authors: M. Regina Carreira-Lopez
Abstract:
Lightweight ontologies seek to concrete union relationships between a parent node, and a secondary node, also called "child node". This logic relation (L) can be formally defined as a triple ontological relation (LO) equivalent to LO in ⟨LN, LE, LC⟩, and where LN represents a finite set of nodes (N); LE is a set of entities (E), each of which represents a relationship between nodes to form a rooted tree of ⟨LN, LE⟩; and LC is a finite set of concepts (C), encoded in a formal language (FL). Mondoc enables more refined searches on semantic and classified facets for retrieving specialized knowledge about Atlantic migrations, from the Declaration of Independence of the United States of America (1776) and to the end of the Spanish Civil War (1939). The model looks forward to increasing documentary relevance by applying an inverse frequency of co-ocurrent hypernymy phenomena for a concrete dataset of textual corpora, with RMySQL package. Mondoc profiles archival utilities implementing SQL programming code, and allows data export to XML schemas, for achieving semantic and faceted analysis of speech by analyzing keywords in context (KWIC). The methodology applies random and unrestricted sampling techniques with RMySQL to verify the resonance phenomena of inverse documentary relevance between the number of co-occurrences of the same term (t) in more than two documents of a set of texts (D). Secondly, the research also evidences co-associations between (t) and their corresponding synonyms and antonyms (synsets) are also inverse. The results from grouping facets or polysemic words with synsets in more than two textual corpora within their syntagmatic context (nouns, verbs, adjectives, etc.) state how to proceed with semantic indexing of hypernymy phenomena for subject-heading lists and for authority lists for documentary and archival purposes. Mondoc contributes to the development of web directories and seems to achieve a proper and more selective search of e-documents (classification ontology). It can also foster on-line catalogs production for semantic authorities, or concepts, through XML schemas, because its applications could be used for implementing data models, by a prior adaptation of the based-ontology to structured meta-languages, such as OWL, RDF (descriptive ontology). Mondoc serves to the classification of concepts and applies a semantic indexing approach of facets. It enables information retrieval, as well as quantitative and qualitative data interpretation. The model reproduces a triple tuple ⟨LN, LE, LT, LCF L, BKF⟩ where LN is a set of entities that connect with other nodes to concrete a rooted tree in ⟨LN, LE⟩. LT specifies a set of terms, and LCF acts as a finite set of concepts, encoded in a formal language, L. Mondoc only resolves partial problems of linguistic ambiguity (in case of synonymy and antonymy), but neither the pragmatic dimension of natural language nor the cognitive perspective is addressed. To achieve this goal, forthcoming programming developments should target at oriented meta-languages with structured documents in XML.Keywords: hypernymy, information retrieval, lightweight ontology, resonance
Procedia PDF Downloads 1251533 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability
Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola
Abstract:
Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.Keywords: data, employee, malware, work place
Procedia PDF Downloads 3831532 How Geant4 Hadronic Models Handle Tracking of Pion Particles Resulting from Antiproton Annihilation
Authors: M. B. Tavakoli, R. Reiazi, M. M. Mohammadi, K. Jabbari
Abstract:
From 2003, AD4/ACE experiment in CERN tried to investigate different aspects of antiproton as a new modality in particle therapy. Because of lack of reliable absolute dose measurements attempts to find out the radiobiological characteristics of antiproton have not reached to a reasonable result yet. From the other side, application of Geant4 in medical approaches is increased followed by Geant4-DNA project which focuses on using this code to predict radiation effects in the cellular scale. This way we can exploit Geant4-DNA results for antiproton. Unfortunately, previous studies showed there are serious problem in simulating an antiproton beam using Geant4. Since most of the problem was in the Bragg peak region which antiproton annihilates there, in this work we tried to understand if the problem came from the way in which Geant4 handles annihilation products especially pion particles. This way, we can predict the source of the dose discrepancies between Geant4 simulations and dose measurements done in CERN.Keywords: Geant4, antiproton, annihilation, pion plus, pion minus
Procedia PDF Downloads 6571531 Magnetohydrodynamic Flows in a Misaligned Duct under a Uniform Magnetic Field
Authors: Mengqi Zhu, Chang Nyung Kim
Abstract:
This study numerically investigates three-dimensional liquid-metal (LM) magnetohydrodynamic (MHD) flows in a misaligned duct under a uniform magnetic field. The duct consists of two misaligned horizontal channels (one is inflow channel, the other is outflow channel) and one central vertical channel. Computational fluid dynamics simulations are performed to predict the behavior of the MHD flows, using commercial code CFX. In the current study, a case with Hartmann number 1000 is considered. The electromagnetic features of LM MHD flows are elucidated to examine the interdependency of the flow velocity, current density, electric potential, pressure drop and Lorentz force. The results show that pressure decreases linearly along the main flow direction.Keywords: CFX, liquid-metal magnetohydrodynamic flows, misaligned duct, pressure drop
Procedia PDF Downloads 2841530 Heterogeneous Artifacts Construction for Software Evolution Control
Authors: Mounir Zekkaoui, Abdelhadi Fennan
Abstract:
The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make changes more or less important to many heterogeneous software artifacts such as source code, analysis and design models, unit testing, XML deployment descriptors, user guides, and others. These changes can be a source of degradation in functional, qualitative or behavioral terms of modified software. Hence the need for a unified approach for extraction and representation of different heterogeneous artifacts in order to ensure a unified and detailed description of heterogeneous software artifacts, exploitable by several software tools and allowing to responsible for the evolution of carry out the reasoning change concerned.Keywords: heterogeneous software artifacts, software evolution control, unified approach, meta model, software architecture
Procedia PDF Downloads 4461529 Prediction of Unsaturated Permeability Functions for Clayey Soil
Authors: F. Louati, H. Trabelsi, M. Jamei
Abstract:
Desiccation cracks following drainage-humidification cycles. With water loss, mainly due to evaporation, suction in the soil increases, producing volumetric shrinkage and tensile stress. When the tensile stress reaches tensile strength, the soil cracks. Desiccation cracks networks can directly control soil hydraulic properties. The aim of this study was for quantifying the hydraulic properties for examples the water retention curve, the saturated hydraulic conductivity, the unsaturated hydraulic conductivity function, the shrinkage dynamics in Tibar soil- clay soil in the Northern of Tunisia. Then a numerical simulation of unsaturated hydraulic properties for a crack network has been attempted. The finite elements code ‘CODE_BRIGHT’ can be used to follow the hydraulic distribution in cracked porous media.Keywords: desiccation, cracks, permeability, unsaturated hydraulic flow, simulation
Procedia PDF Downloads 3001528 Structural, Electronic and Optical Properties of LiₓNa1-ₓH for Hydrogen Storage
Authors: B. Bahloul
Abstract:
This study investigates the structural, electronic, and optical properties of LiH and NaH compounds, as well as their ternary mixed crystals LiₓNa1-ₓH, adopting a face-centered cubic structure with space group Fm-3m (number 225). The structural and electronic characteristics are examined using density functional theory (DFT), while empirical methods, specifically the modified Moss relation, are employed for analyzing optical properties. The exchange-correlation potential is determined through the generalized gradient approximation (PBEsol-GGA) within the density functional theory (DFT) framework, utilizing the projected augmented wave pseudopotentials (PAW) approach. The Quantum Espresso code is employed for conducting these calculations. The calculated lattice parameters at equilibrium volume and the bulk modulus for x=0 and x=1 exhibit good agreement with existing literature data. Additionally, the LiₓNa1-ₓH alloys are identified as having a direct band gap.Keywords: DFT, structural, electronic, optical properties
Procedia PDF Downloads 711527 Study of the Behavior of Bolted Joints with and Without Reinforcement
Authors: Karim Akkouche
Abstract:
Many methods have been developed for characterizing the behavior of bolted joints. However, in the presence of a certain model of stiffeners, no orientation was given in relation to their modeling. To this end, multitude of coarse errors can arise in the reproduction of the propagation of efforts and in representation of the modes of deformations. Considering these particularities, a numerical investigation was carried out in our laboratory. In this paper we will present a comparative study between three types of assemblies. A non-linear 3D modeling was chosen, given that it takes into consideration geometric and material non-linearity, using the Finite Element calculation code ABAQUS. Initially, we evaluated the influence of the presence of each stiffener on the "global" behavior of the assemblies, this by analyzing their Moment-Rotation curves, also by referring to the classification system proposed by NF EN 1993- 1.8 which is based on the resisting moment Mj-Rd and the initial stiffness Sj.int. In a second step, we evaluated the "local" behavior of their components by referring to the stress-strain curves.Keywords: assembly, post-beam, end plate, nonlinearity
Procedia PDF Downloads 741526 Dilation Effect on 3D Passive Earth Pressure Coefficients for Retaining Wall
Authors: Khelifa Tarek, Benmebarek Sadok
Abstract:
The 2D passive earth pressures acting on rigid retaining walls problem has been widely treated in the literature using different approaches (limit equilibrium, limit analysis, slip line and numerical computation), however, the 3D passive earth pressures problem has received less attention. This paper is concerned with the numerical study of 3D passive earth pressures induced by the translation of a rigid rough retaining wall for associated and non-associated soils. Using the explicit finite difference code FLAC3D, the increase of the passive earth pressures due to the decrease of the wall breadth is investigated. The results given by the present numerical analysis are compared with other investigation. The influence of the angle of dilation on the coefficients is also studied.Keywords: numerical modeling, FLAC3D, retaining wall, passive earth pressures, angle of dilation
Procedia PDF Downloads 3241525 Electron Bernstein Wave Heating in the Toroidally Magnetized System
Authors: Johan Buermans, Kristel Crombé, Niek Desmet, Laura Dittrich, Andrei Goriaev, Yurii Kovtun, Daniel López-Rodriguez, Sören Möller, Per Petersson, Maja Verstraeten
Abstract:
The International Thermonuclear Experimental Reactor (ITER) will rely on three sources of external heating to produce and sustain a plasma; Neutral Beam Injection (NBI), Ion Cyclotron Resonance Heating (ICRH), and Electron Cyclotron Resonance Heating (ECRH). ECRH is a way to heat the electrons in a plasma by resonant absorption of electromagnetic waves. The energy of the electrons is transferred indirectly to the ions by collisions. The electron cyclotron heating system can be directed to deposit heat in particular regions in the plasma (https://www.iter.org/mach/Heating). Electron Cyclotron Resonance Heating (ECRH) at the fundamental resonance in X-mode is limited by a low cut-off density. Electromagnetic waves cannot propagate in the region between this cut-off and the Upper Hybrid Resonance (UHR) and cannot reach the Electron Cyclotron Resonance (ECR) position. Higher harmonic heating is hence preferred in heating scenarios nowadays to overcome this problem. Additional power deposition mechanisms can occur above this threshold to increase the plasma density. This includes collisional losses in the evanescent region, resonant power coupling at the UHR, tunneling of the X-wave with resonant coupling at the ECR, and conversion to the Electron Bernstein Wave (EBW) with resonant coupling at the ECR. A more profound knowledge of these deposition mechanisms can help determine the optimal plasma production scenarios. Several ECRH experiments are performed on the TOroidally MAgnetized System (TOMAS) to identify the conditions for Electron Bernstein Wave (EBW) heating. Density and temperature profiles are measured with movable Triple Langmuir Probes in the horizontal and vertical directions. Measurements of the forwarded and reflected power allow evaluation of the coupling efficiency. Optical emission spectroscopy and camera images also contribute to plasma characterization. The influence of the injected power, magnetic field, gas pressure, and wave polarization on the different deposition mechanisms is studied, and the contribution of the Electron Bernstein Wave is evaluated. The TOMATOR 1D hydrogen-helium plasma simulator numerically describes the evolution of current less magnetized Radio Frequency plasmas in a tokamak based on Braginskii’s legal continuity and heat balance equations. This code was initially benchmarked with experimental data from TCV to determine the transport coefficients. The code is used to model the plasma parameters and the power deposition profiles. The modeling is compared with the data from the experiments.Keywords: electron Bernstein wave, Langmuir probe, plasma characterization, TOMAS
Procedia PDF Downloads 961524 Software Defined Storage: Object Storage over Hadoop Platform
Authors: Amritesh Srivastava, Gaurav Sharma
Abstract:
The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.Keywords: Hadoop, HBase, object storage, REST
Procedia PDF Downloads 3391523 Numerical Analysis of Reinforced Embankment on Algeria Sabkha Subgrade
Authors: N. Benmebarek, F. Berrabah, S. Benmebarek
Abstract:
This paper is interested by numerical analysis using PLAXIS code of geosynthetic reinforced embankment crossing a section about 11 km on sabkha soil of Chott El Hodna in Algeria. The site observations indicated that the surface soil of this sabkha is very sensitive to moisture and complicated by the presence of locally weak zones. Therefore, serious difficulties were encountered during building the first embankment layer. This paper focuses on the use of geosynthetic to mitigate the difficulty encountered. Due to the absence of an accepted design methods, parametric studies are carried out to assess the effect of basal embankment reinforcement on both the bearing capacity and compaction conditions. The results showed the contribution conditions of geosynthetics to improve the bearing capacity of sabkha soil.Keywords: reinforced embankment, numerical modelling, geosynthetics, weak bearing capacity
Procedia PDF Downloads 2971522 Seamless MATLAB® to Register-Transfer Level Design Methodology Using High-Level Synthesis
Authors: Petri Solanti, Russell Klein
Abstract:
Many designers are asking for an automated path from an abstract mathematical MATLAB model to a high-quality Register-Transfer Level (RTL) hardware description. Manual transformations of MATLAB or intermediate code are needed, when the design abstraction is changed. Design conversion is problematic as it is multidimensional and it requires many different design steps to translate the mathematical representation of the desired functionality to an efficient hardware description with the same behavior and configurability. Yet, a manual model conversion is not an insurmountable task. Using currently available design tools and an appropriate design methodology, converting a MATLAB model to efficient hardware is a reasonable effort. This paper describes a simple and flexible design methodology that was developed together with several design teams.Keywords: design methodology, high-level synthesis, MATLAB, verification
Procedia PDF Downloads 1391521 Selecting The Contractor using Multi Criteria Decision Making in National Gas Company of Lorestan Province of Iran
Authors: Fatemeh Jaferi, Moslem Parsa, Heshmatolah Shams Khorramabadi
Abstract:
In this modern fluctuating world, organizations need to outsource some parts of their activities (project) to providers in order to show a quick response to their changing requirements. In fact, a number of companies and institutes have contractors do their projects and have some specific criteria in contractor selection. Therefore, a set of scientific tools is needed to select the best contractors to execute the project according to appropriate criteria. Multi-criteria decision making (MCDM) has been employed in the present study as a powerful tool in ranking and selecting the appropriate contractor. In this study, devolving second-source (civil) project to contractors in the National Gas Company of Lorestan Province (Iran) has been found and therefore, 5 civil companies have been evaluated. Evaluation criteria include executive experience, qualification of technical staff, good experience and company's rate, technical interview, affordability, equipment and machinery. Criteria's weights are found through experts' opinions along with AHP and contractors ranked through TOPSIS and AHP. The order of ranking contractors based on MCDM methods differs by changing the formula in the study. In the next phase, the number of criteria and their weights has been sensitivity analysed through using AHP. Adding each criterion changed contractors' ranking. Similarly, changing weights resulted in a change in ranking. Adopting the stated strategy resulted in the facts that not only is an appropriate scientific method available to select the most qualified contractors to execute gas project, but also a great attention is paid to picking needed criteria for selecting contractors. Consequently, executing such project is undertaken by most qualified contractors resulted in optimum use of limited resource, accelerating the implementation of project, increasing quality and finally boosting organizational efficiency.Keywords: multi-criteria decision making, project, management, contractor selection, gas company
Procedia PDF Downloads 4051520 Optimization of Structures with Mixed Integer Non-linear Programming (MINLP)
Authors: Stojan Kravanja, Andrej Ivanič, Tomaž Žula
Abstract:
This contribution focuses on structural optimization in civil engineering using mixed integer non-linear programming (MINLP). MINLP is characterized as a versatile method that can handle both continuous and discrete optimization variables simultaneously. Continuous variables are used to optimize parameters such as dimensions, stresses, masses, or costs, while discrete variables represent binary decisions to determine the presence or absence of structural elements within a structure while also calculating discrete materials and standard sections. The optimization process is divided into three main steps. First, a mechanical superstructure with a variety of different topology-, material- and dimensional alternatives. Next, a MINLP model is formulated to encapsulate the optimization problem. Finally, an optimal solution is searched in the direction of the defined objective function while respecting the structural constraints. The economic or mass objective function of the material and labor costs of a structure is subjected to the constraints known from structural analysis. These constraints include equations for the calculation of internal forces and deflections, as well as equations for the dimensioning of structural components (in accordance with the Eurocode standards). Given the complex, non-convex and highly non-linear nature of optimization problems in civil engineering, the Modified Outer-Approximation/Equality-Relaxation (OA/ER) algorithm is applied. This algorithm alternately solves subproblems of non-linear programming (NLP) and main problems of mixed-integer linear programming (MILP), in this way gradually refines the solution space up to the optimal solution. The NLP corresponds to the continuous optimization of parameters (with fixed topology, discrete materials and standard dimensions, all determined in the previous MILP), while the MILP involves a global approximation to the superstructure of alternatives, where a new topology, materials, standard dimensions are determined. The optimization of a convex problem is stopped when the MILP solution becomes better than the best NLP solution. Otherwise, it is terminated when the NLP solution can no longer be improved. While the OA/ER algorithm, like all other algorithms, does not guarantee global optimality due to the presence of non-convex functions, various modifications, including convexity tests, are implemented in OA/ER to mitigate these difficulties. The effectiveness of the proposed MINLP approach is demonstrated by its application to various structural optimization tasks, such as mass optimization of steel buildings, cost optimization of timber halls, composite floor systems, etc. Special optimization models have been developed for the optimization of these structures. The MINLP optimizations, facilitated by the user-friendly software package MIPSYN, provide insights into a mass or cost-optimal solutions, optimal structural topologies, optimal material and standard cross-section choices, confirming MINLP as a valuable method for the optimization of structures in civil engineering.Keywords: MINLP, mixed-integer non-linear programming, optimization, structures
Procedia PDF Downloads 461519 Honneth, Feenberg, and the Redemption of Critical Theory of Technology
Authors: David Schafer
Abstract:
Critical Theory is in sore need of a workable account of technology. It had one in the writings of Herbert Marcuse, or so it seemed until Jürgen Habermas mounted a critique in 'Technology and Science as Ideology' (Habermas, 1970) that decisively put it away. Ever since Marcuse’s work has been regarded outdated – a 'philosophy of consciousness' no longer seriously tenable. But with Marcuse’s view has gone the important insight that technology is no norm-free system (as Habermas portrays it) but can be laden with social bias. Andrew Feenberg is among a few serious scholars who have perceived this problem in post-Habermasian critical theory and has sought to revive a basically Marcusean account of technology. On his view, while so-called ‘technical elements’ that physically make up technologies are neutral with regard to social interests, there is a sense in which we may speak of a normative grammar or ‘technical code’ built-in to technology that can be socially biased in favor of certain groups over others (Feenberg, 2002). According to Feenberg, those perspectives on technology are reified which consider technology only by their technical elements to the neglect of their technical codes. Nevertheless, Feenberg’s account fails to explain what is normatively problematic with such reified views of technology. His plausible claim that they represent false perspectives on technology by itself does not explain how such views may be oppressive, even though Feenberg surely wants to be doing that stronger level of normative theorizing. Perceiving this deficit in his own account of reification, he tries to adopt Habermas’s version of systems-theory to ground his own critical theory of technology (Feenberg, 1999). But this is a curious move in light of Feenberg’s own legitimate critiques of Habermas’s portrayals of technology as reified or ‘norm-free.’ This paper argues that a better foundation may be found in Axel Honneth’s recent text, Freedom’s Right (Honneth, 2014). Though Honneth there says little explicitly about technology, he offers an implicit account of reification formulated in opposition to Habermas’s systems-theoretic approach. On this ‘normative functionalist’ account of reification, social spheres are reified when participants prioritize individualist ideals of freedom (moral and legal freedom) to the neglect of an intersubjective form of freedom-through-recognition that Honneth calls ‘social freedom.’ Such misprioritization is ultimately problematic because it is unsustainable: individual freedom is philosophically and institutionally dependent upon social freedom. The main difficulty in adopting Honneth’s social theory for the purposes of a theory of technology, however, is that the notion of social freedom is predicable only of social institutions, whereas it appears difficult to conceive of technology as an institution. Nevertheless, in light of Feenberg’s work, the idea that technology includes within itself a normative grammar (technical code) takes on much plausibility. To the extent that this normative grammar may be understood by the category of social freedom, Honneth’s dialectical account of the relationship between individual and social forms of freedom provides a more solid basis from which to ground the normative claims of Feenberg’s sociological account of technology than Habermas’s systems theory.Keywords: Habermas, Honneth, technology, Feenberg
Procedia PDF Downloads 1981518 Applying Arima Data Mining Techniques to ERP to Generate Sales Demand Forecasting: A Case Study
Authors: Ghaleb Y. Abbasi, Israa Abu Rumman
Abstract:
This paper modeled sales history archived from 2012 to 2015 bulked in monthly bins for five products for a medical supply company in Jordan. The sales forecasts and extracted consistent patterns in the sales demand history from the Enterprise Resource Planning (ERP) system were used to predict future forecasting and generate sales demand forecasting using time series analysis statistical technique called Auto Regressive Integrated Moving Average (ARIMA). This was used to model and estimate realistic sales demand patterns and predict future forecasting to decide the best models for five products. Analysis revealed that the current replenishment system indicated inventory overstocking.Keywords: ARIMA models, sales demand forecasting, time series, R code
Procedia PDF Downloads 3851517 A Study of Agile Based Approaches to Improve Software Quality
Authors: Gurmeet Kaur
Abstract:
Agile software development methods are being recognized as popular, and efficient approach to the development of software system that has a short delivery period with high quality also that meets customer requirements with zero defect. In agile software development, quality means quality of code where in the quality is maintained through the use of methods or approaches like refactoring, test driven development, behavior driven development, acceptance test driven development, and demand driven development. Software quality is measured in term of metrics such as the number of defects during development of software. Usage of above mentioned methods or approaches, reduces the possibilities of defects in developed software, and hence improve quality. This paper focuses on study of agile based quality methods or approaches for software development that ensures improved quality of software as well as reduced cost, and customer satisfaction. Procedia PDF Downloads 1721516 Effect of Design Parameters on Porpoising Instability of a High Speed Planing Craft
Authors: Lokeswara Rao P., Naga Venkata Rakesh N., V. Anantha Subramanian
Abstract:
It is important to estimate, predict, and avoid the dynamic instability of high speed planing crafts. It is known that design parameters like relative location of center of gravity with respect to the dynamic lift centre and length to beam ratio of the craft have influence on the tendency to porpoise. This paper analyzes the hydrodynamic performance on the basis of the semi-empirical Savitsky method and also estimates the same by numerical simulations based on Reynolds Averaged Navier Stokes (RANS) equations using a commercial code namely, STAR- CCM+. The paper examines through the same numerical simulation considering dynamic equilibrium, the changing running trim, which results in porpoising. Some interesting results emerge from the study and this leads to early detection of the instability.Keywords: CFD, planing hull, porpoising, Savitsky method
Procedia PDF Downloads 1801515 Study on Network-Based Technology for Detecting Potentially Malicious Websites
Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
Abstract:
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits
Procedia PDF Downloads 3661514 Real Time Detection, Prediction and Reconstitution of Rain Drops
Authors: R. Burahee, B. Chassinat, T. de Laclos, A. Dépée, A. Sastim
Abstract:
The purpose of this paper is to propose a solution to detect, predict and reconstitute rain drops in real time – during the night – using an embedded material with an infrared camera. To prevent the system from needing too high hardware resources, simple models are considered in a powerful image treatment algorithm reducing considerably calculation time in OpenCV software. Using a smart model – drops will be matched thanks to a process running through two consecutive pictures for implementing a sophisticated tracking system. With this system drops computed trajectory gives information for predicting their future location. Thanks to this technique, treatment part can be reduced. The hardware system composed by a Raspberry Pi is optimized to host efficiently this code for real time execution.Keywords: reconstitution, prediction, detection, rain drop, real time, raspberry, infrared
Procedia PDF Downloads 4191513 The Effect of the Adhesive Ductility on Bond Characteristics of CFRP/Steel Double Strap Joints Subjected to Dynamic Tensile Loadings
Authors: Haider Al-Zubaidy, Xiao-Ling Zhao, Riadh Al-Mahaidi
Abstract:
In recent years, the technique adhesively-bonded fibre reinforced polymer (FRP) composites has found its way into civil engineering applications and it has attracted a widespread attention as a viable alternative strategy for the retrofitting of civil infrastructure such as bridges and buildings. When adopting this method, adhesive has a significant role and controls the general performance and degree of enhancement of the strengthened and/or upgraded structures. This is because the ultimate member strength is highly affected by the failure mode which is considerably dependent on the utilised adhesive. This paper concerns with experimental investigations on the effect of the adhesive used on the bond between CFRP patch and steel plate under medium impact tensile loading. Experiment were conducted using double strap joints and these samples were prepared using two different types of adhesives, Araldite 420 and MBrace saturant. Drop mass rig was used to carry out dynamic tests at impact speeds of 3.35, 4.43 and m/s while quasi-static tests were implemented at 2mm/min using Instrone machine. In this test program, ultimate load-carrying capacity and failure modes were examined for all loading speeds. For both static and dynamic tests, the adhesive type has a significant effect on ultimate joint strength. It was found that the double strap joints prepared using Araldite 420 showed higher strength than those prepared utilising MBrace saturant adhesive. Failure mechanism for joints prepared using Araldite 420 is completely different from those samples prepared utilising MBrace saturant. CFRP failure is the most common failure pattern for joints with Araldite 420, whereas the dominant failure for joints with MBrace saturant adhesive is adhesive failure.Keywords: CFRP/steel double strap joints, adhesives of different ductility, dynamic tensile loading, bond between CFRP and steel
Procedia PDF Downloads 2361512 The Road to Abolition of Death Penalty in China: With the Perspective of the Ninth Amendment
Authors: Huang Gui
Abstract:
This paper supplies some possible approaches of the death penalty reform in China basic on the analyzing the reformation conducted by the Ninth Amendment. There now are 46 crimes punishable by death, and this penalty still plays a significant role in the criminal punishment structure. In order to abolish entirely the death penalty in Penal Code, the legislature of China should gradually abolish the death penalty for the nonviolent crimes and then for the nonlethal violent crimes and finally for the lethal violent crimes. In the case where the death penalty has not yet been abolished completely, increasing the applicable conditions of suspension of execution of death penalty and reducing the scope of applicable objects (elderly defendant and other kinds of special objects) of death penalty would be an effective road to control and limit the use of death penalty in judicial practice.Keywords: death penalty, the eighth amendment, the ninth amendment, suspension of execution of death, immediate execution of death, China
Procedia PDF Downloads 4781511 Visualizing Class Metrics and Object Calls for Software Systems
Authors: Mohammad Alnabhan, Awni Hammouri, Mustafa Hammad, Anas Al-Badareen, Omamah Al-Thnebat
Abstract:
Software visualization is one of the main techniques used to simplify the presentation of software systems and enhance their understandability. It is used to present the software system in a visual manner using simple, clear and meaningful symbols. This study proposes a new 2D software visualization approach. In this approach, each class is represented by rectangle, the name of the class placed above the rectangle, the size of class (Line of Code) represented by the height of the rectangle. The methods and the attributes are represented by circles and triangles respectively. The relationships among classes correspond to arrows. The proposed visualization approach was evaluated in terms of applicability and efficiency. Results have confirmed successful implementation of the proposed approach, and its ability to provide a simple and effective graphical presentation of extracted software components and properties.Keywords: software visualization, software metrics, calling relationships, 2D graphs
Procedia PDF Downloads 2051510 Persistent Ribosomal In-Frame Mis-Translation of Stop Codons as Amino Acids in Multiple Open Reading Frames of a Human Long Non-Coding RNA
Authors: Leonard Lipovich, Pattaraporn Thepsuwan, Anton-Scott Goustin, Juan Cai, Donghong Ju, James B. Brown
Abstract:
Two-thirds of human genes do not encode any known proteins. Aside from long non-coding RNA (lncRNA) genes with recently-discovered functions, the ~40,000 non-protein-coding human genes remain poorly understood, and a role for their transcripts as de-facto unconventional messenger RNAs has not been formally excluded. Ribosome profiling (Riboseq) predicts translational potential, but without independent evidence of proteins from lncRNA open reading frames (ORFs), ribosome binding of lncRNAs does not prove translation. Previously, we mass-spectrometrically documented translation of specific lncRNAs in human K562 and GM12878 cells. We now examined lncRNA translation in human MCF7 cells, integrating strand-specific Illumina RNAseq, Riboseq, and deep mass spectrometry in biological quadruplicates performed at two core facilities (BGI, China; City of Hope, USA). We excluded known-protein matches. UCSC Genome Browser-assisted manual annotation of imperfect (tryptic-digest-peptides)-to-(lncRNA-three-frame-translations) alignments revealed three peptides hypothetically explicable by 'stop-to-nonstop' in-frame replacement of stop codons by amino acids in two ORFs of the lncRNA MMP24-AS1. To search for this phenomenon genomewide, we designed and implemented a novel pipeline, matching tryptic-digest spectra to wildcard-instead-of-stop versions of repeat-masked, six-frame, whole-genome translations. Along with singleton putative stop-to-nonstop events affecting four other lncRNAs, we identified 24 additional peptides with stop-to-nonstop in-frame substitutions from multiple positive-strand MMP24-AS1 ORFs. Only UAG and UGA, never UAA, stop codons were impacted. All MMP24-AS1-matching spectra met the same significance thresholds as high-confidence known-protein signatures. Targeted resequencing of MMP24-AS1 genomic DNA and cDNA from the same samples did not reveal any mutations, polymorphisms, or sequencing-detectable RNA editing. This unprecedented apparent gene-specific violation of the genetic code highlights the importance of matching peptides to whole-genome, not known-genes-only, ORFs in mass-spectrometry workflows, and suggests a new mechanism enhancing the combinatorial complexity of the proteome. Funding: NIH Director’s New Innovator Award 1DP2-CA196375 to LL.Keywords: genetic code, lncRNA, long non-coding RNA, mass spectrometry, proteogenomics, ribo-seq, ribosome, RNAseq
Procedia PDF Downloads 2351509 Bayesian Structural Identification with Systematic Uncertainty Using Multiple Responses
Authors: André Jesus, Yanjie Zhu, Irwanda Laory
Abstract:
Structural health monitoring is one of the most promising technologies concerning aversion of structural risk and economic savings. Analysts often have to deal with a considerable variety of uncertainties that arise during a monitoring process. Namely the widespread application of numerical models (model-based) is accompanied by a widespread concern about quantifying the uncertainties prevailing in their use. Some of these uncertainties are related with the deterministic nature of the model (code uncertainty) others with the variability of its inputs (parameter uncertainty) and the discrepancy between a model/experiment (systematic uncertainty). The actual process always exhibits a random behaviour (observation error) even when conditions are set identically (residual variation). Bayesian inference assumes that parameters of a model are random variables with an associated PDF, which can be inferred from experimental data. However in many Bayesian methods the determination of systematic uncertainty can be problematic. In this work systematic uncertainty is associated with a discrepancy function. The numerical model and discrepancy function are approximated by Gaussian processes (surrogate model). Finally, to avoid the computational burden of a fully Bayesian approach the parameters that characterise the Gaussian processes were estimated in a four stage process (modular Bayesian approach). The proposed methodology has been successfully applied on fields such as geoscience, biomedics, particle physics but never on the SHM context. This approach considerably reduces the computational burden; although the extent of the considered uncertainties is lower (second order effects are neglected). To successfully identify the considered uncertainties this formulation was extended to consider multiple responses. The efficiency of the algorithm has been tested on a small scale aluminium bridge structure, subjected to a thermal expansion due to infrared heaters. Comparison of its performance with responses measured at different points of the structure and associated degrees of identifiability is also carried out. A numerical FEM model of the structure was developed and the stiffness from its supports is considered as a parameter to calibrate. Results show that the modular Bayesian approach performed best when responses of the same type had the lowest spatial correlation. Based on previous literature, using different types of responses (strain, acceleration, and displacement) should also improve the identifiability problem. Uncertainties due to parametric variability, observation error, residual variability, code variability and systematic uncertainty were all recovered. For this example the algorithm performance was stable and considerably quicker than Bayesian methods that account for the full extent of uncertainties. Future research with real-life examples is required to fully access the advantages and limitations of the proposed methodology.Keywords: bayesian, calibration, numerical model, system identification, systematic uncertainty, Gaussian process
Procedia PDF Downloads 3261508 AIPM:An Integrator and Pull Request Matching Model in Github
Authors: Zhifang Liao, Yanbing Li, Li Xu, Yan Zhang, Xiaoping Fan, Jinsong Wu
Abstract:
Pull Request (PR) is the primary method for code contributions from the external contributors in Github. PR review is an essential part of open source software developments for maintaining the quality of software. Matching a new PR of an appropriate integrator will make the PR review more effective. However, PR and integrator matching are now organized manually in Github. To reduce this cost, we presented an AIPM model to predict highly relevant integrator of incoming PRs. AIPM uses topic model to extract topics from the PRs, and builds a one-to-one correspondence between topics and integrators. Then, AIPM finds the most suitable integrator according to the maximum entry of the topic-document distribution. On average, AIPM can reach a precision of 60%, and even in some projects, can reach a precision of 80%.Keywords: pull Request, integrator matching, Github, open source project, topic model
Procedia PDF Downloads 3001507 Object-Oriented Program Comprehension by Identification of Software Components and Their Connexions
Authors: Abdelhak-Djamel Seriai, Selim Kebir, Allaoua Chaoui
Abstract:
During the last decades, object oriented program- ming has been massively used to build large-scale systems. However, evolution and maintenance of such systems become a laborious task because of the lack of object oriented programming to offer a precise view of the functional building blocks of the system. This lack is caused by the fine granularity of classes and objects. In this paper, we use a post object-oriented technology namely software components, to propose an approach based on the identification of the functional building blocks of an object oriented system by analyzing its source code. These functional blocks are specified as software components and the result is a multi-layer component based software architecture.Keywords: software comprehension, software component, object oriented, software architecture, reverse engineering
Procedia PDF Downloads 4121506 Authorship Attribution Using Sociolinguistic Profiling When Considering Civil and Criminal Cases
Authors: Diana A. Sokolova
Abstract:
This article is devoted to one of the possibilities for identifying the author of an oral or written text - sociolinguistic profiling. Sociolinguistic profiling is utilized as a forensic linguistics technique to identify individuals through language patterns, particularly in criminal cases. It examines how social factors influence language use. This study aims to showcase the significance of linguistic profiling for attributing authorship in texts and emphasizes the necessity for its continuous enhancement while considering its strengths and weaknesses. The study employs semantic-syntactic, lexical-semantic, linguopragmatic, logical, presupposition, authorization, and content analysis methods to investigate linguistic profiling. The research highlights the relevance of sociolinguistic profiling in authorship attribution and underscores the importance of ongoing refinement of the technique, considering its limitations. This study emphasizes the practical application of linguistic profiling in legal settings and underscores the impact of social factors on language use, contributing to the field of forensic linguistics. Data collection involves collecting oral and written texts from criminal and civil court cases to analyze language patterns for authorship attribution. The collected data is analyzed using various linguistic analysis methods to identify individual characteristics and patterns that can aid in authorship attribution. The study addresses the effectiveness of sociolinguistic profiling in identifying authors of texts and explores the impact of social factors on language use in legal contexts. In spite of advantages challenges in linguistics profiling have spurred debates and controversies in academic circles, legal environments, and the public sphere. So, this research highlights the significance of sociolinguistic profiling in authorship attribution and emphasizes the need for further development of this method, considering its strengths and weaknesses.Keywords: authorship attribution, detection of identifying, dialect, features, forensic linguistics, social influence, sociolinguistics, unique speech characteristics
Procedia PDF Downloads 381505 Numerical Simulation of Two-Dimensional Porous Cylinder Flow in In-Line Arrangement
Authors: Hamad Alhajeri, Abdulrahman Almutairi, A. H. Alenezi, M. H. Alhajeri, Ayedh Alajmi
Abstract:
The flow around three porous cylinders in inline arrangement is investigated in this paper computationally using the commercial code FLUENT. The arrangement generally operates with the dirty gases passing through the porous cylinders, the particulate material being deposited on the outside of the cylinders. However, in a combined cycle power plant, filtration is required to allow the hot exhaust gases to be fed to a turbine without causing any physical damage to the turbine blades. Three cylinder elements are placed in a two-dimensional rectangle duct with fixed face velocity and varying the velocity ratio between the approach and face velocity. Particle trajectories are obtained for a number of particle diameters and different inlet (approach) velocity to face filtration velocity ratios to investigate the behavior of particles around the cylinder.Keywords: porous cylinders, CFD, fluid flow, filtration
Procedia PDF Downloads 484