Search results for: code reuse attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2384

Search results for: code reuse attack

1634 Mining Scientific Literature to Discover Potential Research Data Sources: An Exploratory Study in the Field of Haemato-Oncology

Authors: A. Anastasiou, K. S. Tingay

Abstract:

Background: Discovering suitable datasets is an important part of health research, particularly for projects working with clinical data from patients organized in cohorts (cohort data), but with the proliferation of so many national and international initiatives, it is becoming increasingly difficult for research teams to locate real world datasets that are most relevant to their project objectives. We present a method for identifying healthcare institutes in the European Union (EU) which may hold haemato-oncology (HO) data. A key enabler of this research was the bibInsight platform, a scientometric data management and analysis system developed by the authors at Swansea University. Method: A PubMed search was conducted using HO clinical terms taken from previous work. The resulting XML file was processed using the bibInsight platform, linking affiliations to the Global Research Identifier Database (GRID). GRID is an international, standardized list of institutions, including the city and country in which the institution exists, as well as a category of the main business type, e.g., Academic, Healthcare, Government, Company. Countries were limited to the 28 current EU members, and institute type to 'Healthcare'. An article was considered valid if at least one author was affiliated with an EU-based healthcare institute. Results: The PubMed search produced 21,310 articles, consisting of 9,885 distinct affiliations with correspondence in GRID. Of these articles, 760 were from EU countries, and 390 of these were healthcare institutes. One affiliation was excluded as being a veterinary hospital. Two EU countries did not have any publications in our analysis dataset. The results were analysed by country and by individual healthcare institute. Networks both within the EU and internationally show institutional collaborations, which may suggest a willingness to share data for research purposes. Geographical mapping can ensure that data has broad population coverage. Collaborations with industry or government may exclude healthcare institutes that may have embargos or additional costs associated with data access. Conclusions: Data reuse is becoming increasingly important both for ensuring the validity of results, and economy of available resources. The ability to identify potential, specific data sources from over twenty thousand articles in less than an hour could assist in improving knowledge of, and access to, data sources. As our method has not yet specified if these healthcare institutes are holding data, or merely publishing on that topic, future work will involve text mining of data-specific concordant terms to identify numbers of participants, demographics, study methodologies, and sub-topics of interest.

Keywords: data reuse, data discovery, data linkage, journal articles, text mining

Procedia PDF Downloads 112
1633 Microstructure Evolution and Pre-transformation Microstructure Reconstruction in Ti-6Al-4V Alloy

Authors: Shreyash Hadke, Manendra Singh Parihar, Rajesh Khatirkar

Abstract:

In the present investigation, the variation in the microstructure with the changes in the heat treatment conditions i.e. temperature and time was observed. Ti-6Al-4V alloy was subject to solution annealing treatments in β (1066C) and α+β phase (930C and 850C) followed by quenching, air cooling and furnace cooling to room temperature respectively. The effect of solution annealing and cooling on the microstructure was studied by using optical microscopy (OM), scanning electron microscopy (SEM), electron backscattered diffraction (EBSD) and x-ray diffraction (XRD). The chemical composition of the β phase for different conditions was determined with the help of energy dispersive spectrometer (EDS) attached to SEM. Furnace cooling resulted in the development of coarser structure (α+β), while air cooling resulted in much finer structure with widmanstatten morphology of α at the grain boundaries. Quenching from solution annealing temperature formed α’ martensite, their proportion being dependent on the temperature in β phase field. It is well known that the transformation of β to α follows Burger orientation relationship (OR). In order to reconstruct the microstructure of parent β phase, a MATLAB code was written using neighbor-to-neighbor, triplet method and Tari’s method. The code was tested on the annealed samples (1066C solution annealing temperature followed by furnace cooling to room temperature). The parent phase data thus generated was then plotted using the TSL-OIM software. The reconstruction results of the above methods were compared and analyzed. The Tari’s approach (clustering approach) gave better results compared to neighbor-to-neighbor and triplet method but the time taken by the triplet method was least compared to the other two methods.

Keywords: Ti-6Al-4V alloy, microstructure, electron backscattered diffraction, parent phase reconstruction

Procedia PDF Downloads 443
1632 Treatment of Dredged Marine Sediments for Their Reuse in Road Construction

Authors: F. Ben Abdelghani, W. Maherezi

Abstract:

Dredging operations generate, each year, a great quantity of marine sediments. These raw materials can not be used in road construction without a specific treatment process. Sediments suitability tests has shown that most of studied sediments are not suitable to be used in road construction. In order to improve their compacity and their mechanical performance, addition of a granular material is recommended. The use of a dredged sand, to improve the granular mixture containing sediments, allows a better management of the two types of dredge materials (sand and sediment). In this study, a new road material containing dredged marine sediments and dredged sand is formulated and treated by adding various binders. Mechanical performance investigation of different mixtures by measuring Proctor-IPI values and simple compressive strengths is realized.

Keywords: dredged sediments, suitability tests, road construction, hydraulic binder, mechanical performance

Procedia PDF Downloads 359
1631 Treatment of Olive Mill Wastewater by Electrocoagulation Processes and Water Resources Management

Authors: Walid K. M. Bani Salameh, Hesham Ahmad, Mohammad Al-Shannag

Abstract:

In Jordan having deficit atmospheric precipitation, an increase in water demand during summer months . Jordan can be regarded with a relatively high potential for waste water recycling and reuse. The main purpose of this paper was to investigate the removal of Total suspended solids (TSS) and chemical oxygen demand (COD) for olive mill waste water (OMW) by the electrocoagulation (EC) process. In the combination of electrocoagulation by using coupled iron–aluminum electrodes the optimum working pH was found to be in range 6. The efficiency of the electrocoagulation process allowed removal of TSS and COD about 82.5% and 47.5% respectively at 45 mA/cm2 after 70 minutes by using coupled iron–aluminum electrodes. These results showed that the optimum TSS and COD removal was obtained at the optimum experimental parameters such as current density, pH, and reaction time.

Keywords: olive mill wastewater, electrode, electrocoagulation (EC), TSS, COD

Procedia PDF Downloads 388
1630 A Performance Model for Designing Network in Reverse Logistic

Authors: S. Dhib, S. A. Addouche, T. Loukil, A. Elmhamedi

Abstract:

In this paper, a reverse supply chain network is investigated for a decision making. This decision is surrounded by complex flows of returned products, due to the increasing quantity, the type of returned products and the variety of recovery option products (reuse, recycling, and refurbishment). The most important problem in the reverse logistic network (RLN) is to orient returned products to the suitable type of recovery option. However, returned products orientations from collect sources to the recovery disposition have not well considered in performance model. In this study, we propose a performance model for designing a network configuration on reverse logistics. Conceptual and analytical models are developed with taking into account operational, economic and environmental factors on designing network.

Keywords: reverse logistics, network design, performance model, open loop configuration

Procedia PDF Downloads 434
1629 Tracing Digital Traces of Phatic Communion in #Mooc

Authors: Judith Enriquez-Gibson

Abstract:

This paper meddles with the notion of phatic communion introduced 90 years ago by Malinowski, who was a Polish-born British anthropologist. It explores the phatic in Twitter within the contents of tweets related to moocs (massive online open courses) as a topic or trend. It is not about moocs though. It is about practices that could easily be hidden or neglected if we let big or massive topics take the lead or if we simply follow the computational or secret codes behind Twitter itself and third party software analytics. It draws from media and cultural studies. Though at first it appears data-driven as I submitted data collection and analytics into the hands of a third party software, Twitonomy, the aim is to follow how phatic communion might be practised in a social media site, such as Twitter. Lurking becomes its research method to analyse mooc-related tweets. A total of 3,000 tweets were collected on 11 October 2013 (UK timezone). The emphasis of lurking is to engage with Twitter as a system of connectivity. One interesting finding is that a click is in fact a phatic practice. A click breaks the silence. A click in one of the mooc website is actually a tweet. A tweet was posted on behalf of a user who simply chose to click without formulating the text and perhaps without knowing that it contains #mooc. Surely, this mechanism is not about reciprocity. To break the silence, users did not use words. They just clicked the ‘tweet button’ on a mooc website. A click performs and maintains connectivity – and Twitter as the medium in attendance in our everyday, available when needed to be of service. In conclusion, the phatic culture of breaking silence in Twitter does not have to submit to the power of code and analytics. It is a matter of human code.

Keywords: click, Twitter, phatic communion, social media data, mooc

Procedia PDF Downloads 409
1628 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast

Authors: Ayubi Wirara, Ardya Suryadinata

Abstract:

Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.

Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem

Procedia PDF Downloads 336
1627 A Study of Language Choice and Use among Young Thai in Malaysia

Authors: Din Eak Arathai

Abstract:

The purpose of this research report is to investigate the language choice and use among the young generation of Malaysian Thais community. Besides that, it aims to investigate if there is a difference in language choice across the different domains. It will also examine if there has been a language shift from Thai to other languages by the young generation of Thai community in Malaysia. First the study focuses on the proficiency of Thai and other languages used by hundred (100) respondents belonging to young generation of Malaysian Thais aged range from 18-35. Next, language use and choice will be presented with a focus on the domains of family, friendship, entertainment and social. Finally, based on the findings and data collected, we will be able to see if language shift from Thai to other languages has occurred among the young Thai generation in Malaysia. The instrument used in this study was a 30-item questionnaire and the findings of the data analysis were presented in the form of frequency counts and percentages. The findings found that Thai language remains the most preferred language of choice among young Malaysian Thais but usage of other languages, such as Malay, English and Mandarin has increased and begun to influence the language choice of young Malaysian Thais and their proficiency of their mother tongue.In all the domains studied, Thai is almost exclusively the preferred language used when communicating with family. Malay is the most preferred language in communicating with friends while English is the most preferred language when communicating with colleagues. With regards to social and entertainment activities, young Malaysian Thais show great affinity for entertainment in the Thai language. In conclusion, the result of the study showed the beginning of young Malaysian Thais shifting to other languages, especially English and Malay through their daily choices when communicating with friends and family and especially through their language preferences in entertainment.

Keywords: language choice, language use, language shift, language maintenance, young Malaysian Thais, code switching, code mixing

Procedia PDF Downloads 493
1626 Experimental and Numerical Performance Analysis for Steam Jet Ejectors

Authors: Abdellah Hanafi, G. M. Mostafa, Mohamed Mortada, Ahmed Hamed

Abstract:

The steam ejectors are the heart of most of the desalination systems that employ vacuum. The systems that employ low grade thermal energy sources like solar energy and geothermal energy use the ejector to drive the system instead of high grade electric energy. The jet-ejector is used to create vacuum employing the flow of steam or air and using the severe pressure drop at the outlet of the main nozzle. The present work involves developing a one dimensional mathematical model for designing jet-ejectors and transform it into computer code using Engineering Equation solver (EES) software. The model receives the required operating conditions at the inlets and outlet of the ejector as inputs and produces the corresponding dimensions required to reach these conditions. The one-dimensional model has been validated using an existed model working on Abu-Qir power station. A prototype has been designed according to the one-dimensional model and attached to a special test bench to be tested before using it in the solar desalination pilot plant. The tested ejector will be responsible for the startup evacuation of the system and adjusting the vacuum of the evaporating effects. The tested prototype has shown a good agreement with the results of the code. In addition a numerical analysis has been applied on one of the designed geometry to give an image of the pressure and velocity distribution inside the ejector from a side, and from other side, to show the difference in results between the two-dimensional ideal gas model and real prototype. The commercial edition of ANSYS Fluent v.14 software is used to solve the two-dimensional axisymmetric case.

Keywords: solar energy, jet ejector, vacuum, evaporating effects

Procedia PDF Downloads 615
1625 Production of Biodiesel Using Brine Waste as a Heterogeneous Catalyst

Authors: Hilary Rutto, Linda Sibali

Abstract:

In these modern times, we constantly search for new and innovative technologies to lift the burden of our extreme energy demand. The overall purpose of biofuel production research is to source an alternative energy source to replace the normal use of fossil fuel as liquid petroleum products. This experiment looks at the basis of biodiesel production with regards to alternative catalysts that can be used to produce biodiesel. The key factors that will be addressed during the experiments will focus on temperature variation, catalyst additions to the overall reaction, methanol to oil ratio, and the impact of agitation on the reaction. Brine samples sources from nearby plants will be evaluated and tested thoroughly and the key characteristics of these brine samples analysed for the verification of its use as a possible catalyst in biodiesel production. The one factor at a time experimental approach was used in this experiment, and the recycle and reuse characteristics of the heterogeneous catalyst was evaluated.

Keywords: brine sludge, heterogenous catalyst, biodiesel, one factor

Procedia PDF Downloads 164
1624 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 374
1623 Starting Torque Study of Darrieus Wind Turbine

Authors: M. Douak, Z. Aouachria

Abstract:

The aim of our study is to project an optimized wind turbine of Darrieus type. This type of wind turbine is characterized by a low starting torque in comparison with the Savonius rotor allowing them to operate for a period greater than wind speed. This led us to reconsider the Darrieus rotor to optimize a design which will increase its starting torque. The study of a system of monitoring and control of the angle of attack of blade profile, which allows an auto start to wind speeds as low as possible is presented for the straight blade of Darrieus turbine. The study continues to extend to other configurations namely those of parabolic type.

Keywords: Darrieus turbine, pitch angle, self stating, wind energy

Procedia PDF Downloads 342
1622 The Existence of Beauveria bassiana in the Third Generation of Corn Seedling

Authors: Itji Diana Daud, Nuniek Widiayani

Abstract:

The fungus Beauveria bassiana can be endophytic in maize. The fungus was recovered in culture from stems, leaves and roots after a month planting. This phenomenon was shown until the third generation of the corn. The result from laboratory shows that B. bassiana appear in F1, F2 and F3 in order 70, 80 and 90% in the roots, 80% in the stems in all generation, 90, 80 and 70% in leaves. In CFU’s ml-1 of B. bassiana in corn seed, show F1 was 8.9 x 106, F2 was 8.1 x 106 and F3 was 7.8 x 106. The research showed that B. Bassiana as endophyte still remain to the third generation. Innovation to the corn seed which is endophyte seed is essential to protect from the attack of corn borer and to avoid the usage of insecticide.

Keywords: endophytic, recovered, third generation, Beauveria bassiana

Procedia PDF Downloads 275
1621 Cultural Resources Management of the Early Hospitals in Jordan between: 1890-1950

Authors: Jawdat Goussous, Samer Abu Ghazaleh

Abstract:

Heritage is closely linked with the national identity and because Jordan is a rich country of heritage where many civilizations had lived from early beginning of history ,therefore the conservation of this heritage is national task that gives many benefits as correlation between local inhabitance and enhance the linked with spirit of place . This study takes into account the most important concentration on some of old hospitals in Jordan ,which were constructed between 1890-1950 ,looking in their historical and architectural heritage values gained by their architectural distinguished ,longevity and their linked with events that happened in the region. then Focus on the study and analysis of some of them in terms of conservation methodology that have been followed to conserve the early hospitals such as preservation ,maintenance ,adaptive reuse , And their positive effects on these buildings, emphasize the importance of these buildings because of their historical and architectural values.

Keywords: evangelical missionary, early hospitals, medical services, renovation

Procedia PDF Downloads 453
1620 Vermicomposting of Textile Industries’ Dyeing Sludge by Using Eisenia foetida

Authors: Kunwar D. Yadav, Dayanand Sharma

Abstract:

Surat City in India is famous for textile and dyeing industries which generate textile sludge in huge quantity. Textile sludge contains harmful chemicals which are poisonous and carcinogenic. The safe disposal and reuse of textile dyeing sludge are challenging for owner of textile industries and government of the state. The aim of present study was the vermicomposting of textile industries dyeing sludge with cow dung and Eisenia foetida as earthworm spices. The vermicompost reactor of 0.3 m3 capacity was used for vermicomposting. Textile dyeing sludge was mixed with cow dung in different proportion, i.e., 0:100 (C1), 10:90 (C2), 20:80 (C3), 30:70 (C4). Vermicomposting duration was 120 days. All the combinations of the feed mixture, the pH was increased to a range 7.45-7.78, percentage of total organic carbon was decreased to a range of 31-33.3%, total nitrogen was decreased to a range of 1.15-1.32%, total phosphorus was increased in the range of 6.2-7.9 (g/kg).

Keywords: cow dung, Eisenia foetida, textile sludge, vermicompost

Procedia PDF Downloads 210
1619 Improvement in Ni (II) Adsorption Capacity by Using Fe-Nano Zeolite

Authors: Pham-Thi Huong, Byeong-Kyu Lee, Jitae Kim, Chi-Hyeon Lee

Abstract:

Fe-nano zeolite adsorbent was used for removal of Ni (II) ions from aqueous solution. The adsorbent was characterized by Fourier transform infrared spectroscopy (FT-IR), scanning electron microscopy (SEM) and the surface area Brunauer–Emmett–Teller (BET) using for analysis of functional groups, morphology and surface area. Bath adsorption experiments were analyzed on the effect of pH, time, adsorbent doses and initial Ni (II) concentration. The optimum pH for Ni (II) removal using Fe-nano zeolite was found at 5.0 and 90 min of reaction time. The maximum adsorption capacity of Ni (II) was 231.68 mg/g based on the Langmuir isotherm. The kinetics data for the adsorption process was fitted with the pseudo-second-order model. The desorption of Ni (II) from Ni-loaded Fe-nano zeolite was analyzed and even after 10 cycles 72 % desorption was achieved. These finding supported that Fe-nano zeolite with high adsorption capacity, high reuse ability would be utilized for Ni (II) removal from water.

Keywords: Fe-nano zeolite, adsorption, Ni (II) removal, regeneration

Procedia PDF Downloads 227
1618 Establishment and Evaluation of Information System for Chemotherapy Care

Authors: Yi-Ting Liu, Pei-Ying Wen

Abstract:

In order to improve the overall safety of chemotherapy, safety-protecting net was established for the whole process from prescribing by physicians, transcribing by nurses, dispensing by pharmacists to administering by nurses. The information system was used to check and monitor whole process of administration and related sheets were computerized to simplify the paper work.

Keywords: chemotherapy, bar code medication administration, medication safety

Procedia PDF Downloads 292
1617 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications

Authors: Ariq Bani Hardi

Abstract:

Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?

Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic

Procedia PDF Downloads 125
1616 Is the Addition of Computed Tomography with Angiography Superior to a Non-Contrast Neuroimaging Only Strategy for Patients with Suspected Stroke or Transient Ischemic Attack Presenting to the Emergency Department?

Authors: Alisha M. Ebrahim, Bijoy K. Menon, Eddy Lang, Shelagh B. Coutts, Katie Lin

Abstract:

Introduction: Frontline emergency physicians require clear and evidence-based approaches to guide neuroimaging investigations for patients presenting with suspected acute stroke or transient ischemic attack (TIA). Various forms of computed tomography (CT) are currently available for initial investigation, including non-contrast CT (NCCT), CT angiography head and neck (CTA), and CT perfusion (CTP). However, there is uncertainty around optimal imaging choice for cost-effectiveness, particularly for minor or resolved neurological symptoms. In addition to the cost of CTA and CTP testing, there is also a concern for increased incidental findings, which may contribute to the burden of overdiagnosis. Methods: In this cross-sectional observational study, analysis was conducted on 586 anonymized triage and diagnostic imaging (DI) reports for neuroimaging orders completed on patients presenting to adult emergency departments (EDs) with a suspected stroke or TIA from January-December 2019. The primary outcome of interest is the diagnostic yield of NCCT+CTA compared to NCCT alone for patients presenting to urban academic EDs with Canadian Emergency Department Information System (CEDIS) complaints of “symptoms of stroke” (specifically acute stroke and TIA indications). DI reports were coded into 4 pre-specified categories (endorsed by a panel of stroke experts): no abnormalities, clinically significant findings (requiring immediate or follow-up clinical action), incidental findings (not meeting prespecified criteria for clinical significance), and both significant and incidental findings. Standard descriptive statistics were performed. A two-sided p-value <0.05 was considered significant. Results: 75% of patients received NCCT+CTA imaging, 21% received NCCT alone, and 4% received NCCT+CTA+CTP. The diagnostic yield of NCCT+CTA imaging for prespecified clinically significant findings was 24%, compared to only 9% in those who received NCCT alone. The proportion of incidental findings was 30% in the NCCT only group and 32% in the NCCT+CTA group. CTP did not significantly increase the yield of significant or incidental findings. Conclusion: In this cohort of patients presenting with suspected stroke or TIA, an NCCT+CTA neuroimaging strategy had a higher diagnostic yield for clinically significant findings than NCCT alone without significantly increasing the number of incidental findings identified.

Keywords: stroke, diagnostic yield, neuroimaging, emergency department, CT

Procedia PDF Downloads 96
1615 Recycled Waste Glass Powder as a Partial Cement Replacement in Polymer-Modified Mortars

Authors: Nikol Žižková

Abstract:

The aim of this study was to observe the behavior of polymer-modified cement mortars with regard to the use of a pozzolanic admixture. Polymer-modified mortars (PMMs) containing various types of waste glass (waste packing glass and fluorescent tube glass) were produced always with 20% of cement substituted with a pozzolanic-active material. Ethylene/vinyl acetate copolymer (EVA) was used for polymeric modification. The findings confirm the possibility of using the waste glass examined herein as a partial substitute for cement in the production of PMM, which contributes to the preservation of non-renewable raw material resources and to the efficiency of waste glass material reuse.

Keywords: recycled waste glass, polymer-modified mortars, pozzolanic admixture, ethylene/vinyl acetate copolymer

Procedia PDF Downloads 248
1614 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 379
1613 Numerical Simulation of Large-Scale Landslide-Generated Impulse Waves With a Soil‒Water Coupling Smooth Particle Hydrodynamics Model

Authors: Can Huang, Xiaoliang Wang, Qingquan Liu

Abstract:

Soil‒water coupling is an important process in landslide-generated impulse waves (LGIW) problems, accompanied by large deformation of soil, strong interface coupling and three-dimensional effect. A meshless particle method, smooth particle hydrodynamics (SPH) has great advantages in dealing with complex interface and multiphase coupling problems. This study presents an improved soil‒water coupled model to simulate LGIW problems based on an open source code DualSPHysics (v4.0). Aiming to solve the low efficiency problem in modeling real large-scale LGIW problems, graphics processing unit (GPU) acceleration technology is implemented into this code. An experimental example, subaerial landslide-generated water waves, is simulated to demonstrate the accuracy of this model. Then, the Huangtian LGIW, a real large-scale LGIW problem is modeled to reproduce the entire disaster chain, including landslide dynamics, fluid‒solid interaction, and surge wave generation. The convergence analysis shows that a particle distance of 5.0 m can provide a converged landslide deposit and surge wave for this example. Numerical simulation results are in good agreement with the limited field survey data. The application example of the Huangtian LGIW provides a typical reference for large-scale LGIW assessments, which can provide reliable information on landslide dynamics, interface coupling behavior, and surge wave characteristics.

Keywords: soil‒water coupling, landslide-generated impulse wave, large-scale, SPH

Procedia PDF Downloads 59
1612 The Istrian Istrovenetian-Croatian Bilingual Corpus

Authors: Nada Poropat Jeletic, Gordana Hrzica

Abstract:

Bilingual conversational corpora represent a meaningful and the most comprehensive data source for investigating the genuine contact phenomena in non-monitored bi-lingual speech productions. They can be particularly useful for bilingual research since some features of bilingual interaction can hardly be accessed with more traditional methodologies (e.g., elicitation tasks). The method of language sampling provides the resources for describing language interaction in a bilingual community and/or in bilingual situations (e.g. code-switching, amount of languages used, number of languages used, etc.). To capture these phenomena in genuine communication situations, such sampling should be as close as possible to spontaneous communication. Bilingual spoken corpus design is methodologically demanding. Therefore this paper aims at describing the methodological challenges that apply to the corpus design of the conversational corpus design of the Istrian Istrovenetian-Croatian Bilingual Corpus. Croatian is the first official language of the Croatian-Italian officially bilingual Istria County, while Istrovenetian is a diatopic subvariety of Venetian, a longlasting lingua franca in the Istrian peninsula, the mother tongue of the members of the Italian National Community in Istria and the primary code of informal everyday communication among the Istrian Italophone population. Within the CLARIN infrastructure, TalkBank is being used, as it provides relevant procedures for designing and analyzing bilingual corpora. Furthermore, it allows public availability allows for easy replication of studies and cumulative progress as a research community builds up around the corpus, while the tools developed within the field of corpus linguistics enable easy retrieval and analysis of information. The method of language sampling employed is kept at the level of spontaneous communication, in order to maximise the naturalness of the collected conversational data. All speakers have provided written informed consent in which they agree to be recorded at a random point within the period of one month after signing the consent. Participants are administered a background questionnaire providing information about the socioeconomic status and the exposure and language usage in the participants social networks. Recording data are being transcribed, phonologically adapted within a standard-sized orthographic form, coded and segmented (speech streams are being segmented into communication units based on syntactic criteria) and are being marked following the CHAT transcription system and its associated CLAN suite of programmes within the TalkBank toolkit. The corpus consists of transcribed sound recordings of 36 bilingual speakers, while the target is to publish the whole corpus by the end of 2020, by sampling spontaneous conversations among approximately 100 speakers from all the bilingual areas of Istria for ensuring representativeness (the participants are being recruited across three generations of native bilingual speakers in all the bilingual areas of the peninsula). Conversational corpora are still rare in TalkBank, so the Corpus will contribute to BilingBank as a highly relevant and scientifically reliable resource for an internationally established and active research community. The impact of the research of communities with societal bilingualism will contribute to the growing body of research on bilingualism and multilingualism, especially regarding topics of language dominance, language attrition and loss, interference and code-switching etc.

Keywords: conversational corpora, bilingual corpora, code-switching, language sampling, corpus design methodology

Procedia PDF Downloads 140
1611 The Use of Secondary Crystallization in Cement-Based Composites

Authors: Nikol Žižková, Šárka Keprdová, Rostislav Drochytka

Abstract:

The paper focuses on the study of the properties of cement-based composites produced using secondary crystallization (crystalline additive). In this study, cement mortar made with secondary crystallization was exposed to an aggressive environment and the influence of secondary crystallization on the degradation of the cementitious composite was investigated. The results indicate that the crystalline additive contributed to increasing the resistance of the cement-based composite to the attack of the selected environments (sodium sulphate solution and ammonium chloride solution).

Keywords: secondary crystallization, cement-based composites, durability, degradation of the cementitious composite

Procedia PDF Downloads 396
1610 Characterization of Volatiles Botrytis cinerea in Blueberry Using Solid Phase Micro Extraction, Gas Chromatography Mass Spectrometry

Authors: Ahmed Auda, Manjree Agarwala, Giles Hardya, Yonglin Rena

Abstract:

Botrytis cinerea is a major pest for many plants. It can attack a wide range of plant parts. It can attack buds, flowers, and leaves, stems, and fruit. However, B. cinerea can be mixed with other diseases that cause the same damage. There are many species of botrytis and more than one different strains of each. Botrytis might infect the foliage of nursery stock stored through winter in damp conditions. There are no known resistant plants. Botrytis must have nutrients or food source before it infests the plant. Nutrients leaking from wounded plant parts or dying tissue like old flower petals give the required nutrients. From this food, the fungus becomes more attackers and invades healthy tissue. Dark to light brown rot forms in the ill tissue. High humidity conditions support the growth of this fungus. However, we suppose that selection pressure can act on the morphological and neurophysiologic filter properties of the receiver and on both the biochemical and the physiological regulation of the signal. Communication is implied when signal and receiver evolves toward more and more specific matching, culminating. In other hand, receivers respond to portions of a body odor bouquet which is released to the environment not as an (intentional) signal but as an unavoidable consequence of metabolic activity or tissue damage. Each year Botrytis species can cause considerable economic losses to plant crops. Even with the application of strict quarantine and control measures, these fungi can still find their way into crops and cause the imposition of onerous restrictions on exports. Blueberry fruit mould caused by a fungal infection usually results in major losses during post-harvest storage. Therefore, the management of infection in early stages of disease development is necessary to minimize losses. The overall purpose of this study will develop sensitive, cheap, quick and robust diagnostic techniques for the detection of B. cinerea in blueberry. The specific aim was designed to investigate the performance of volatile organic compounds (VOCs) in the detection and discrimination of blueberry fruits infected by fungal pathogens with an emphasis on Botrytis in the early storage stage of post-harvest.

Keywords: botrytis cinerea, blueberry, GC/MS, VOCs

Procedia PDF Downloads 239
1609 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 560
1608 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 328
1607 CO2 Emission and Cost Optimization of Reinforced Concrete Frame Designed by Performance Based Design Approach

Authors: Jin Woo Hwang, Byung Kwan Oh, Yousok Kim, Hyo Seon Park

Abstract:

As greenhouse effect has been recognized as serious environmental problem of the world, interests in carbon dioxide (CO2) emission which comprises major part of greenhouse gas (GHG) emissions have been increased recently. Since construction industry takes a relatively large portion of total CO2 emissions of the world, extensive studies about reducing CO2 emissions in construction and operation of building have been carried out after the 2000s. Also, performance based design (PBD) methodology based on nonlinear analysis has been robustly developed after Northridge Earthquake in 1994 to assure and assess seismic performance of building more exactly because structural engineers recognized that prescriptive code based design approach cannot address inelastic earthquake responses directly and assure performance of building exactly. Although CO2 emissions and PBD approach are recent rising issues on construction industry and structural engineering, there were few or no researches considering these two issues simultaneously. Thus, the objective of this study is to minimize the CO2 emissions and cost of building designed by PBD approach in structural design stage considering structural materials. 4 story and 4 span reinforced concrete building optimally designed to minimize CO2 emissions and cost of building and to satisfy specific seismic performance (collapse prevention in maximum considered earthquake) of building satisfying prescriptive code regulations using non-dominated sorting genetic algorithm-II (NSGA-II). Optimized design result showed that minimized CO2 emissions and cost of building were acquired satisfying specific seismic performance. Therefore, the methodology proposed in this paper can be used to reduce both CO2 emissions and cost of building designed by PBD approach.

Keywords: CO2 emissions, performance based design, optimization, sustainable design

Procedia PDF Downloads 403
1606 Health Post A Sustainable Prototype for the Third World

Authors: Chizzoniti Domenico, Beggiora Klizia, Cattani Letizia, Moscatelli Monica

Abstract:

This paper concerns the study of sustainable construction materials applied on the "Health Post", a prototype for the primary health care situated in alienated areas of the world. It's suitable for social and climatic Sub-Saharan context; however, it could be moved in other countries of the world with similar urgent needs. The idea is to create a Health Post with local construction materials that have a low environmental impact and promote the local workforce allowing reuse of traditional building techniques lowering production costs and transport. The aim of Primary Health Care Centre is to be a flexible and expandable structure identifying a modular form that can be repeated several times to expand its existing functions. In this way it could be not only a health care centre but also a socio-cultural facility.

Keywords: low costs building, sustainable construction materials, green construction system, prototype, health care, emergency

Procedia PDF Downloads 477
1605 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 434