Search results for: application attack
8031 A Method for Multimedia User Interface Design for Mobile Learning
Authors: Shimaa Nagro, Russell Campion
Abstract:
Mobile devices are becoming ever more widely available, with growing functionality, and are increasingly used as an enabling technology to give students access to educational material anytime and anywhere. However, the design of educational material user interfaces for mobile devices is beset by many unresolved research issues such as those arising from emphasising the information concepts then mapping this information to appropriate media (modelling information then mapping media effectively). This report describes a multimedia user interface design method for mobile learning. The method covers specification of user requirements and information architecture, media selection to represent the information content, design for directing attention to important information, and interaction design to enhance user engagement based on Human-Computer Interaction design strategies (HCI). The method will be evaluated by three different case studies to prove the method is suitable for application to different areas / applications, these are; an application to teach about major computer networking concepts, an application to deliver a history-based topic; (after these case studies have been completed, the method will be revised to remove deficiencies and then used to develop a third case study), an application to teach mathematical principles. At this point, the method will again be revised into its final format. A usability evaluation will be carried out to measure the usefulness and effectiveness of the method. The investigation will combine qualitative and quantitative methods, including interviews and questionnaires for data collection and three case studies for validating the MDMLM method. The researcher has successfully produced the method at this point which is now under validation and testing procedures. From this point forward in the report, the researcher will refer to the method using the MDMLM abbreviation which means Multimedia Design Mobile Learning Method.Keywords: human-computer interaction, interface design, mobile learning, education
Procedia PDF Downloads 2468030 An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server
Authors: Ahmed Khattab, Bassem Shetta
Abstract:
Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development.Keywords: Raspberry Pi, E-mail, home automation, temperature sensor, PIR sensor, actuators, relay
Procedia PDF Downloads 2628029 Soil Water Retention and Van Genuchten Parameters following Tillage and Manure Effects
Authors: Shahin Farajifar, Azadeh Safadoust, Ali Akbar Mahboubi
Abstract:
A study was conducted to evaluate hydraulic properties of a sandy loam soil and corn (Zea mays L.) crop production under a short-term tillage and manure combinations field experiment carried out in west of Iran. Treatments included composted cattle manure application rates [0, 30, and 60 Mg (dry weight) ha-1] and tillage systems [no-tillage (NT), chisel plowing (CP), and moldboard plowing (MP)] arranged in a split-plot design. Soil water characteristic curve (SWCC) and saturated hydraulic conductivity (Ks) were significantly affected by manure and tillage treatments. At any matric suction, the soil water content was in the order of MP>CP>NT. At all matric suctions, the amount of water retained by the soil increased as manure application rate increased (i.e. 60>30>0 Mg ha-1). Similar to the tillage effects, at high suctions the differences of water retained due to manure addition were less than that at low suctions. The change of SWCC from tillage methods and manure applications may attribute to the change of pore size and aggregate size distributions. Soil Ks was in the order of CP>MP>NT for the first two layers and in the order of MP>CP and NT for the deeper soil layer. The Ks also increased with increasing rates of manure application (i.e. 60>30>0 Mg ha-1). This was due to the increase in the total pore size and continuity.Keywords: corn, manuure, saturated hydraulic conductivity, soil water characteristic curve, tillage
Procedia PDF Downloads 748028 Economic Conflict between the United Kingdom and the European Community 1945-1975
Authors: Soumia Hebbri
Abstract:
The relationship between Britain and the European Union is phenomenally complex with a great opposition to Europe in the British Conservative and Labour Parties emerged since 1945. During the history and development of the European Union, Europe saw a lack of British involvement until 1961, after refusing to sign the Treaties of Rome of 1957 for being a member of the European Economic Community. Britain then applied to join the EEC in 1961 under Harold Macmillan’s Conservative Government, its application led by the Chief Negotiator Edward Heath. This application was vetoed by President de Gaulle. With de Gaulle out of power Britain. finally could joined in 1973. But again Labour and conservative both found themselves divided on the issue and they hold a referendum under labour on whether to continue the UK’s membership.Keywords: the European Union, the British, economic community, de Gaulle
Procedia PDF Downloads 4918027 Stability Design by Geometrical Nonlinear Analysis Using Equivalent Geometric Imperfections
Authors: S. Fominow, C. Dobert
Abstract:
The present article describes the research that deals with the development of equivalent geometric imperfections for the stability design of steel members considering lateral-torsional buckling. The application of these equivalent imperfections takes into account the stiffness-reducing effects due to inelasticity and residual stresses, which lead to a reduction of the load carrying capacity of slender members and structures. This allows the application of a simplified design method, that is performed in three steps. Application of equivalent geometric imperfections, determination of internal forces using geometrical non-linear analysis (GNIA) and verification of the cross-section resistance at the most unfavourable location. All three verification steps are closely related and influence the results. The derivation of the equivalent imperfections was carried out in several steps. First, reference lateral-torsional buckling resistances for various rolled I-sections, slenderness grades, load shapes and steel grades were determined. This was done either with geometric and material non-linear analysis with geometrical imperfections and residual stresses (GMNIA) or for standard cases based on the equivalent member method. With the aim of obtaining identical lateral-torsional buckling resistances as the reference resistances from the application of the design method, the required sizes for equivalent imperfections were derived. For this purpose, a program based on the FEM method has been developed. Based on these results, several proposals for the specification of equivalent geometric imperfections have been developed. These differ in the shape of the applied equivalent geometric imperfection, the model of the cross-sectional resistance and the steel grade. The proposed design methods allow a wide range of applications and a reliable calculation of the lateral-torsional buckling resistances, as comparisons between the calculated resistances and the reference resistances have shown.Keywords: equivalent geometric imperfections, GMNIA, lateral-torsional buckling, non-linear finite element analysis
Procedia PDF Downloads 1568026 Optimum Design of Photovoltaic Water Pumping System Application
Authors: Sarah Abdourraziq, Rachid El Bachtiri
Abstract:
The solar power source for pumping water is one of the most promising areas in photovoltaic applications. The implementation of these systems allows to protect the environment and reduce the CO2 gas emission compared to systems trained by diesel generators. This paper presents a comparative study between the photovoltaic pumping system driven by DC motor, and AC motor to define the optimum design of this application. The studied system consists of PV array, DC-DC Boost Converter, inverter, motor-pump set and storage tank. The comparison was carried out to define the characteristics and the performance of each system. Each subsystem is modeled in order to simulate the whole system in MATLAB/ Simulink. The results show the efficiency of the proposed technique.Keywords: photovoltaic water pumping system, DC motor-pump, AC motor-pump, DC-DC boost converter
Procedia PDF Downloads 3278025 The Usage of Artificial Intelligence in Instagram
Authors: Alanod Alqasim, Yasmine Iskandarani, Sita Algethami, Jawaher alzughaiby
Abstract:
This study focuses on the usage of AI (Artificial Intelligence) systems and features on the Instagram application and how it influences user experience and satisfaction. The aim is to evaluate the techniques and current capabilities, restrictions, and potential future directions of AI in an Instagram application. Following a concise explanation of the core concepts underlying AI usage on Instagram. To answer this question, 19 randomly selected users were asked to complete a 9-question survey on their experience and satisfaction with the app's features (Filters, user preferences, translation tool) and authenticity. The results revealed that there were three prevalent allegations. These declarations include that Instagram has an extremely attractive user interface; secondly, Instagram creates a strong sense of community; and lastly, Instagram has an important influence on mental health.Keywords: AI (Artificial Intelligence), instagram, features, satisfaction, experience
Procedia PDF Downloads 828024 Application Potential of Selected Tools in Context of Critical Infrastructure Protection and Risk Analysis
Authors: Hromada Martin
Abstract:
Risk analysis is considered as a fundamental aspect relevant for ensuring the level of critical infrastructure protection, where the critical infrastructure is seen as system, asset or its part which is important for maintaining the vital societal functions. Article actually discusses and analyzes the potential application of selected tools of information support for the implementation and within the framework of risk analysis and critical infrastructure protection. Use of the information in relation to their risk analysis can be viewed as a form of simplifying the analytical process. It is clear that these instruments (information support) for these purposes are countless, so they were selected representatives who have already been applied in the selected area of critical infrastructure, or they can be used. All presented fact were the basis for critical infrastructure resilience evaluation methodology development.Keywords: critical infrastructure, protection, resilience, risk analysis
Procedia PDF Downloads 6388023 Management of the Asthma Crisis in the Unit of Intensive Care of the General Hospital of Reference of Kinshasa
Authors: Eddy K. Mukadi
Abstract:
The aim of this study was to provide contributing elements to improve the management of the asthma crisis in the intensive care unit of the General Reference Hospital of Kinshasa. This was a descriptive study of all patients in the intensive care unit presenting with the asthma attack during the period from February 5, 2013 to February 5, 2014. The main data were obtained from consultation registry and medical records. A total of 35 patients, 21 of whom were male (majority) compared to 14 female. Average age of patients was 46.48 plus or minus 16.98 with extremes ranging from 21-75 years. The clinic was dominated by dyspnea in 100% of cases, followed by rales with 91.4% of cases. In spite of the control of the crisis obtained after the treatment with B2 mimetic by inhalation was introduced A 91.5%; 88% corticosteroids; 80% oxygen, the therapeutic principle recommended for the management of asthma attacks was not respected in the majority of cases. This is why we suggest that improving the quality of care to be administered to patients will yield more adequate results.Keywords: asthma crisis, intensive care, general hospital, Kinshasa
Procedia PDF Downloads 2328022 Digital Twin of Real Electrical Distribution System with Real Time Recursive Load Flow Calculation and State Estimation
Authors: Anosh Arshad Sundhu, Francesco Giordano, Giacomo Della Croce, Maurizio Arnone
Abstract:
Digital Twin (DT) is a technology that generates a virtual representation of a physical system or process, enabling real-time monitoring, analysis, and simulation. DT of an Electrical Distribution System (EDS) can perform online analysis by integrating the static and real-time data in order to show the current grid status and predictions about the future status to the Distribution System Operator (DSO), producers and consumers. DT technology for EDS also offers the opportunity to DSO to test hypothetical scenarios. This paper discusses the development of a DT of an EDS by Smart Grid Controller (SGC) application, which is developed using open-source libraries and languages. The developed application can be integrated with Supervisory Control and Data Acquisition System (SCADA) of any EDS for creating the DT. The paper shows the performance of developed tools inside the application, tested on real EDS for grid observability, Smart Recursive Load Flow (SRLF) calculation and state estimation of loads in MV feeders.Keywords: digital twin, distributed energy resources, remote terminal units, supervisory control and data acquisition system, smart recursive load flow
Procedia PDF Downloads 1108021 Application of Remote Sensing Technique on the Monitoring of Mine Eco-Environment
Authors: Haidong Li, Weishou Shen, Guoping Lv, Tao Wang
Abstract:
Aiming to overcome the limitation of the application of traditional remote sensing (RS) technique in the mine eco-environmental monitoring, in this paper, we first classified the eco-environmental damages caused by mining activities and then introduced the principle, classification and characteristics of the Light Detection and Ranging (LiDAR) technique. The potentiality of LiDAR technique in the mine eco-environmental monitoring was analyzed, particularly in extracting vertical structure parameters of vegetation, through comparing the feasibility and applicability of traditional RS method and LiDAR technique in monitoring different types of indicators. The application situation of LiDAR technique in extracting typical mine indicators, such as land destruction in mining areas, damage of ecological integrity and natural soil erosion. The result showed that the LiDAR technique has the ability to monitor most of the mine eco-environmental indicators, and exhibited higher accuracy comparing with traditional RS technique, specifically speaking, the applicability of LiDAR technique on each indicator depends on the accuracy requirement of mine eco-environmental monitoring. In the item of large mine, LiDAR three-dimensional point cloud data not only could be used as the complementary data source of optical RS, Airborne/Satellite LiDAR could also fulfill the demand of extracting vertical structure parameters of vegetation in large areas.Keywords: LiDAR, mine, ecological damage, monitoring, traditional remote sensing technique
Procedia PDF Downloads 3978020 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 1538019 A Density Functional Theory Study of Metal-Porphyrin Graphene for CO2 Hydration
Authors: Manju Verma, Parag A. Deshpande
Abstract:
Electronic structure calculations of hydrogen terminated metal-porphyrin graphene were carried out to explore the catalytic activity for CO2 hydration reaction. A ruthenium atom was substituted in place of carbon atom of graphene and ruthenium chelated carbon atoms were replaced by four nitrogen atoms in metal-porphyrin graphene system. Ruthenium atom created the active site for CO2 hydration reaction. Ruthenium-porphyrin graphene followed the mechanism of carbonic anhydrase enzyme for CO2 conversion to HCO3- ion. CO2 hydration reaction over ruthenium-porphyrin graphene proceeded via the elementary steps: OH- formation from H2O dissociation, CO2 bending in presence of nucleophilic attack of OH- ion, HCO3- ion formation from proton migration, HCO3- ion desorption by H2O addition. Proton transfer to yield HCO3- ion was observed as a rate limiting step from free energy landscape.Keywords: ruthenium-porphyrin graphene, CO2 hydration, carbonic anhydrase, heterogeneous catalyst, density functional theory
Procedia PDF Downloads 2608018 An Application of E-Learning Technology for Students with Deafness and Hearing Impairment
Authors: Eyup Bayram Guzel
Abstract:
There have been growing awareness that technology offers unique and promising advantages by offering up-to-data educational materials in promoting teaching and learning materials, new strategies for building enhanced communication environment for people with disabilities and specifically for this study concentrated on the students with deafness and hearing impairments. Creating e-learning environment where teachers and students work in collaboration to develop better educational outcomes is the foremost reason of conducting this research. This study examined the perspectives of special education teachers’ regarding an application of e-learning software called Multimedia Builder on the students with deafness and hearing impairments. Initial and follow up interviews were conducted with 15 special education teachers around the scope of qualitative case study. Grounded approach has been used to analyse and interpret the data. The research results revealed that application of Multimedia Builder software were influential on reading, sign language, vocabulary improvements, computer and ICT usage developments and on audio-visual learning achievements for the advantages of students with deafness and hearing impairments. The implications of the study encouraged the ways of using e-learning tools and strategies to promote unique and comprehensive learning experiences for the targeted students and their teachers.Keywords: e-learning, special education, deafness and hearing impairment, computer-ICT usage.
Procedia PDF Downloads 4388017 Design and Application of NFC-Based Identity and Access Management in Cloud Services
Authors: Shin-Jer Yang, Kai-Tai Yang
Abstract:
In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device
Procedia PDF Downloads 4358016 Applying Sequential Pattern Mining to Generate Block for Scheduling Problems
Authors: Meng-Hui Chen, Chen-Yu Kao, Chia-Yu Hsu, Pei-Chann Chang
Abstract:
The main idea in this paper is using sequential pattern mining to find the information which is helpful for finding high performance solutions. By combining this information, it is defined as blocks. Using the blocks to generate artificial chromosomes (ACs) could improve the structure of solutions. Estimation of Distribution Algorithms (EDAs) is adapted to solve the combinatorial problems. Nevertheless many of these approaches are advantageous for this application, but only some of them are used to enhance the efficiency of application. Generating ACs uses patterns and EDAs could increase the diversity. According to the experimental result, the algorithm which we proposed has a better performance to solve the permutation flow-shop problems.Keywords: combinatorial problems, sequential pattern mining, estimationof distribution algorithms, artificial chromosomes
Procedia PDF Downloads 6118015 Mental Accounting Theory Development Review and Application
Authors: Kang-Hsien Li
Abstract:
Along with global industries in using technology to enhance the application, make the study drawn more close to the people’s behavior and produce data analysis, extended out from the mental accounting of prospect theory, this paper provides the marketing and financial applications in the field of exploration and discussions with the future. For the foreseeable future, the payment behavior depends on the form of currency, which affects a variety of product types on the marketing of marketing strategy to provide diverse payment methods to enhance the overall sales performance. This not only affects people's consumption also affects people's investments. Credit card, PayPal, Apple pay, Bitcoin and any other with advances in technology and other emerging payment instruments, began to affect people for the value and the concept of money. Such as the planning of national social welfare policies, monetary and financial regulators and regulators. The expansion can be expected to discuss marketing and finance-related mental problems at the same time, recent studies reflect two different ideas, the first idea is that individuals affected by situational frames, not broad impact at the event level, affected by the people basically mental, second idea is that when an individual event affects a broader range, and majority of people will choose the same at the time that the rational choice. That are applied to practical application of marketing, at the same time provide an explanation in the financial market under the anomalies, due to the financial markets has varied investment products and different market participants, that also highlights these two points. It would provide in-depth description of humanity's mental. Certainly, about discuss mental accounting aspects, while artificial intelligence application development, although people would be able to reduce prejudice decisions, that will also lead to more discussion on the economic and marketing strategy.Keywords: mental accounting, behavior economics, consumer behaviors, decision-making
Procedia PDF Downloads 4518014 Application of Axiomatic Design in Industrial Control and Automation Software
Authors: Aydin Homay, Mario de Sousa, Martin Wollschlaeger
Abstract:
Axiomatic design is a system design methodology that systematically analyses the transformation of customer needs into functional requirements, design parameters, and process variables. This approach aims to create high-quality product or system designs by adhering to specific design principles or axioms, namely, the independence and information axiom. The application of axiomatic design in the design of industrial control and automation software systems could be challenging due to the high flexibility exposed by the software system and the coupling enforced by the hardware part. This paper aims to present how to use axiomatic design for designing industrial control and automation software systems and how to satisfy the independence axiom within these tightly coupled systems.Keywords: axiomatic design, decoupling, uncoupling, automation
Procedia PDF Downloads 508013 The Development of Sports Medicine and Physical Fitness in China from Reviewing Their Studies from the Journal of China Sports Science
Authors: Dong Zhan
Abstract:
China sports science is the core periodical of scientific research in the field of sports in China at present. It is the first academic periodical ranked in China. The author has studied the characteristics and trends of articles on sports medicine and physical fitness published in the journal since it founded. Now, the articles on sports medicine and physical fitness published in the Journal of Sports Science from 2013 to 2017 are reviewed. The results show that 1) The characteristics of previous sports medicine articles showed that there were more articles on the basis of sports medicine than that on the application. The research on animal experiments was far more than that on the human body. Moreover, the trend was getting worse and worse as time goes on. But in the past five years, there had been a marked improvement. The basic/application has been improved from 2.1/1 to 1.3/1. This shows that sports medicine researchers have been paid more attention to the application research in sports medicine. 2) There are few articles on sports injury, because the state put the sports injury specialty into the medical colleges, and the research scope of sports research institutes does not include sports injury. It cannot meet the need for the development of sports medicine, and it should change sooner or later. 3) In the past, researchers’ effort was on athletes' physical health, not on ordinary people. Now, there is a great change, they not only research on the sportsmen’s health but also research on the health of the ordinary people. 4) Researchers mainly studied on the young people’s physical fitness in the past; now, it has been greatly improved. Researchers study on the physical health of the elderly, especially those over the age of 60. Numbers of paper researching on the young were much more than those on the old. In the past 10 years, the ratio of number of paper researching on the young to the old people was (young/old) 16.6/1, while in the past 5 years, this ratio was 6.3/1. However, this is not enough. China has a large population and needs to focus on promoting the health of the people. Conclusion: It is important to pay more attention to the application research on sports medicine and on the physical fitness, and it is also important to make a research on physical health of the elderly.Keywords: sports medicine, people's health, the young, the old
Procedia PDF Downloads 1528012 Towards Resilient Cloud Computing through Cyber Risk Assessment
Authors: Hilalah Alturkistani, Alaa AlFaadhel, Nora AlJahani, Fatiha Djebbar
Abstract:
Cloud computing is one of the most widely used technology which provides opportunities and services to government entities, large companies, and standard users. However, cybersecurity risk management studies of cloud computing and resiliency approaches are lacking. This paper proposes resilient cloud cybersecurity risk assessment and management tailored specifically, to Dropbox with two approaches:1) technical-based solution motivated by a cybersecurity risk assessment of cloud services, and 2)a target personnel-based solution guided by cybersecurity-related survey among employees to identify their knowledge that qualifies them withstand to any cyberattack. The proposed work attempts to identify cloud vulnerabilities, assess threats and detect high risk components, to finally propose appropriate safeguards such as failure predicting and removing, redundancy or load balancing techniques for quick recovery and return to pre-attack state if failure happens.Keywords: cybersecurity risk management plan, resilient cloud computing, cyberattacks, cybersecurity risk assessment
Procedia PDF Downloads 1428011 Effects of Injectable Thermosensitive Hydrogel Containing Chitosan as a Barrier for Prevention of Post-operative Peritoneal Adhesion in Rats
Authors: Sara Javanmardi, Sepehr Aziziz, Baharak Divband, Masoumeh Firouzamandi
Abstract:
Post-operative adhesions are the most common cause of intestinal obstruction, female infertility and chronic abdominal pain. We developed a novel approach for preventing post-operative peritoneal adhesions using a biodegradable and thermosensitive curcumin hydrogel in rats. Thirteen male Sprague-Dawley rats were assigned randomly into five groups of six animals each: In SHAM group, the cecum was exteriorized, gently manipulated and sent back into the abdomen. In CONTROL group, the surgical abrasion was performed with no further treatment. In Hydrogel group, surgical abrasion was performed with local application of blank hydrogel (1 mL). In Curcumin group, surgical abrasion was performed with local application of curcumin (1 mL). In CUR/HGEL group, surgical abrasion was performed with local application of curcumin hydrogel (1 mL). On day 10, adhesions were assessed using a standardized scale (Evans model), and samples were collected for the Real-time PCR. Real-time PCR was performed to determine mRNA levels of VCAM-1, ICAM-1 and GAPDH. The macroscopic adhesion intensity showed statistically significant differences between the CUR/HGEL and other groups (P=0.0005). The findings of the present study revealed there were statistically significant differences between the groups regarding adhesion band length and numbers (P<0.0001). The protein and mRNA expression of VCAM-1 and ICAM-1 in secal tissues were significantly down regulated due to curcumin-hydrogel application in CUR/HGEL compared to other groups (p<0.05). The thermosensitive hydrogel could reduce the severity and even prevent formation of intra-abdominal adhesion. Curcumin hydrogel could serve as a potential barrier agent to prevent post-operative peritoneal adhesion in rats.Keywords: peritoneal adhesion, hydrogel, curcumijn, ICAM-1, VCAM-1
Procedia PDF Downloads 888010 Static Application Security Testing Approach for Non-Standard Smart Contracts
Authors: Antonio Horta, Renato Marinho, Raimir Holanda
Abstract:
Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.Keywords: blockchain, reentrancy, static application security testing, smart contracts
Procedia PDF Downloads 888009 Developing an AI-Driven Application for Real-Time Emotion Recognition from Human Vocal Patterns
Authors: Sayor Ajfar Aaron, Mushfiqur Rahman, Sajjat Hossain Abir, Ashif Newaz
Abstract:
This study delves into the development of an artificial intelligence application designed for real-time emotion recognition from human vocal patterns. Utilizing advanced machine learning algorithms, including deep learning and neural networks, the paper highlights both the technical challenges and potential opportunities in accurately interpreting emotional cues from speech. Key findings demonstrate the critical role of diverse training datasets and the impact of ambient noise on recognition accuracy, offering insights into future directions for improving robustness and applicability in real-world scenarios.Keywords: artificial intelligence, convolutional neural network, emotion recognition, vocal patterns
Procedia PDF Downloads 528008 AquaCrop Model Simulation for Water Productivity of Teff (Eragrostic tef): A Case Study in the Central Rift Valley of Ethiopia
Authors: Yenesew Mengiste Yihun, Abraham Mehari Haile, Teklu Erkossa, Bart Schultz
Abstract:
Teff (Eragrostic tef) is a staple food in Ethiopia. The local and international demand for the crop is ever increasing pushing the current price five times compared with that in 2006. To meet this escalating demand increasing production including using irrigation is imperative. Optimum application of irrigation water, especially in semi-arid areas is profoundly important. AquaCrop model application in irrigation water scheduling and simulation of water productivity helps both irrigation planners and agricultural water managers. This paper presents simulation and evaluation of AquaCrop model in optimizing the yield and biomass response to variation in timing and rate of irrigation water application. Canopy expansion, canopy senescence and harvest index are the key physiological processes sensitive to water stress. For full irrigation water application treatment there was a strong relationship between the measured and simulated canopy and biomass with r2 and d values of 0.87 and 0.96 for canopy and 0.97 and 0.74 for biomass, respectively. However, the model under estimated the simulated yield and biomass for higher water stress level. For treatment receiving full irrigation the harvest index value obtained were 29%. The harvest index value shows generally a decreasing trend under water stress condition. AquaCrop model calibration and validation using the dry season field experiments of 2010/2011 and 2011/2012 shows that AquaCrop adequately simulated the yield response to different irrigation water scenarios. We conclude that the AquaCrop model can be used in irrigation water scheduling and optimizing water productivity of Teff grown under water scarce semi-arid conditions.Keywords: AquaCrop, climate smart agriculture, simulation, teff, water security, water stress regions
Procedia PDF Downloads 4068007 Efficiency Analysis of Trader in Thailand and Laos Border Trade: Case Study of Textile and Garment Products
Authors: Varutorn Tulnawat, Padcharee Phasuk
Abstract:
This paper investigates the issue of China’s dumping on border trade between Thailand and Laos. From the pass mostly, the border trade goods are traditional textile and garment mainly served locals and tourists which majority of traders is of small and medium size. In the present day the competition is fierce, the volume of trade has expanded far beyond its original intent. The major competitors in Thai-Laos border trade are China, Vietnam and also South Korea. This research measures and compares the efficiency and ability to survive the onslaught of Thai and Laos firm along Thailand (Nong Kai province) and Laos (Vientiane) border. Two attack strategies are observed, price cutting and incense such as full facilitation for big volume order. Data Envelopment Analysis (DEA) is applied to data surveyed from 90 Thai and Laos entrepreneurs. The expected results are the proportion of efficiency and inefficiency firms. Points of inefficiency and suggested improvement are also discussed.Keywords: border trade, dea, textile, garment
Procedia PDF Downloads 2458006 Improving Graduate Student Writing Skills: Best Practices and Outcomes
Authors: Jamie Sundvall, Lisa Jennings
Abstract:
A decline in writing skills and abilities of students entering graduate school has become a focus for university systems within the United States. This decline has become a national trend that requires reflection on the intervention strategies used to address the deficit and unintended consequences as outcomes in the profession. Social work faculty is challenged to increase written scholarship within the academic setting. However, when a large number of students in each course have writing deficits, there is a shift from focus on content, ability to demonstrate competency, and application of core social work concepts. This qualitative study focuses on the experiences of online faculty who support increasing scholarship through writing and are following best practices preparing students academically to see improvements in written presentation in classroom work. This study outlines best practices to improve written academic presentation, especially in an online setting. The research also highlights how a student’s ability to show competency and application of concepts may be overlooked in the online setting. This can lead to new social workers who are prepared academically, but may unable to effectively advocate and document thought presentation in their writing. The intended progression of writing across all levels of higher education moves from summary, to application, and into abstract problem solving. Initial findings indicate that it is important to reflect on practices used to address writing deficits in terms of academic writing, competency, and application. It is equally important to reflect on how these methods of intervention impact a student post-graduation. Specifically, for faculty, it is valuable to assess a social worker’s ability to engage in continuity of documentation and advocacy at micro, mezzo, macro, and international levels of practice.Keywords: intervention, professional impact, scholarship, writing
Procedia PDF Downloads 1398005 Application of Corporate Social Responsibility in Small Manufacturing Enterprises
Authors: Winai Rungrittidetch
Abstract:
This paper investigated the operational system, procedures, outcomes, and obstacles during the application of the Corporate Social Responsibility by the small enterprises and other involved groups in the anchor production business of the core firm, Jatura Charoen Chai Company Limited. The paper also aimed to discover ways to improve the stakeholders who participated in the CSR training and advisory programme. The paper utilized the qualitative methodology which included documentary review and semi- structured interview. The interviews were made with 8 respondents as the representative of different groups of the company’s stakeholder. The findings drew out the lessons learned from the participation of the selected small manufacturing enterprises in the CSR training and advisory programme. Some suggestions were also made, addressing the significance of the Philosophy of Sufficiency Economy.Keywords: corporate, social, responsibility, enterprises
Procedia PDF Downloads 3498004 Producing Fertilizers of Increased Environmental and Agrochemical Efficiency via Application of Plant-available Inorganic Coatings
Authors: Andrey Norov
Abstract:
Reduction of inefficient losses of nutrients when using mineral fertilizers is a very important and urgent challenge, which is of both economic and environmental significance. The loss of nutrients to the environment leads to the release of greenhouse gases, eutrophication of water bodies, soil salinization and degradation, and other undesirable phenomena. This report focuses on slow and controlled release fertilizers produced through the application of inorganic coatings, which make the released nutrients plant-available. There are shown the advantages of these fertilizers their improved physical and chemical properties, as well as the effect of the coatings on yield growth and on the degree of nutrient efficiency. This type of fertilizers is an alternative to other polymer-coated fertilizers and is more ecofriendly. The production method is protected by the Russian patent.Keywords: coatings, controlled release, fertilizer, nutrients, nutrient efficiency, yield increase
Procedia PDF Downloads 958003 Experimental Study of Various Sandwich Composites
Authors: R. Naveen, E. Vanitha, S. Gayathri
Abstract:
The use of Sandwich composite materials in aerospace and civil infrastructure application has been increasing especially due to their enormously low weight that leads to a reduction in the total weight and fuel consumption, high flexural and transverse shear stiffness, and corrosion resistance. The essential properties of sandwich materials vary according to the application area of the structure. The objectives of this study are to identify the mechanical behaviour and failure mechanisms of sandwich structures made of bamboo, V- board and metal (Aluminium as face sheet and Foam as Core material). The three-point bending test and UTM (Universal testing machine) experimental tests are done for three specimens for each type of sandwich composites. From the experiment results of three sandwich composites, bamboo shows high Young’s modulus of elasticity and low density.Keywords: bamboo sandwich composite, metal sandwich composite, sandwich composite, v-board sandwich composite
Procedia PDF Downloads 2578002 Mobile Agent Security Using Reference Monitor Based Security Framework
Authors: Sandhya Armoogum
Abstract:
In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.Keywords: security, mobile agents, reference monitor, trust
Procedia PDF Downloads 440