Search results for: intellectual property information analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 35716

Search results for: intellectual property information analysis

34906 The Adoption of Process Management for Accounting Information Systems in Thailand

Authors: Manirath Wongsim

Abstract:

Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.

Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption

Procedia PDF Downloads 462
34905 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 167
34904 Optimal Economic Restructuring Aimed at an Optimal Increase in GDP Constrained by a Decrease in Energy Consumption and CO2 Emissions

Authors: Alexander Vaninsky

Abstract:

The objective of this paper is finding the way of economic restructuring - that is, change in the shares of sectoral gross outputs - resulting in the maximum possible increase in the gross domestic product (GDP) combined with decreases in energy consumption and CO2 emissions. It uses an input-output model for the GDP and factorial models for the energy consumption and CO2 emissions to determine the projection of the gradient of GDP, and the antigradients of the energy consumption and CO2 emissions, respectively, on a subspace formed by the structure-related variables. Since the gradient (antigradient) provides a direction of the steepest increase (decrease) of the objective function, and their projections retain this property for the functions' limitation to the subspace, each of the three directional vectors solves a particular problem of optimal structural change. In the next step, a type of factor analysis is applied to find a convex combination of the projected gradient and antigradients having maximal possible positive correlation with each of the three. This convex combination provides the desired direction of the structural change. The national economy of the United States is used as an example of applications.

Keywords: economic restructuring, input-output analysis, divisia index, factorial decomposition, E3 models

Procedia PDF Downloads 312
34903 Design of Two-Channel Quincunx Quadrature Mirror Filter Banks Using Digital All-Pass Lattice Filters

Authors: Ju-Hong Lee, Chong-Jia Ciou

Abstract:

This paper deals with the problem of two-dimensional (2-D) recursive two-channel quincunx quadrature mirror filter (QQMF) banks design. The analysis and synthesis filters of the 2-D recursive QQMF bank are composed of 2-D recursive digital allpass lattice filters (DALFs) with symmetric half-plane (SHP) support regions. Using the 2-D doubly complementary half-band (DC-HB) property possessed by the analysis and synthesis filters, we facilitate the design of the proposed QQMF bank. For finding the coefficients of the 2-D recursive SHP DALFs, we present a structure of 2-D recursive digital allpass filters by using 2-D SHP recursive digital all-pass lattice filters (DALFs). The novelty of using 2-D SHP recursive DALFs to construct a 2-D recursive QQMF bank is that the resulting 2-D recursive QQMF bank provides better performance than the existing 2-D recursive QQMF banks. Simulation results are also presented for illustration and comparison.

Keywords: all-pass digital filter, lattice structure, quincunx QMF bank, symmetric half-plane digital filter

Procedia PDF Downloads 355
34902 Conformal Invariance and F(R,T) Gravity

Authors: P. Y. Tsyba, O. V. Razina, E. Güdekli, R. Myrzakulov

Abstract:

In this paper, we consider the equation of motion for the F(R,T) gravity on their property of conformal invariance. It is shown that in the general case such a theory is not conformally invariant. Special cases for the functions v and u, in which the properties of the theory can appear, were studied.

Keywords: conformal invariance, gravity, space-time, metric

Procedia PDF Downloads 657
34901 Design Criteria for an Internal Information Technology Cost Allocation to Support Business Information Technology Alignment

Authors: Andrea Schnabl, Mario Bernhart

Abstract:

The controlling instrument of an internal cost allocation (IT chargeback) is commonly used to make IT costs transparent and controllable. Information Technology (IT) became, especially for information industries, a central competitive factor. Consequently, the focus is not on minimizing IT costs but on the strategic aligned application of IT. Hence, an internal IT cost allocation should be designed to enhance the business-IT alignment (strategic alignment of IT) in order to support the effective application of IT from a company’s point of view. To identify design criteria for an internal cost allocation to support business alignment a case study analysis at a typical medium-sized firm in information industry is performed. Documents, Key Performance Indicators, and cost accounting data over a period of 10 years are analyzed and interviews are performed. The derived design criteria are evaluated by 6 heads of IT departments from 6 different companies, which have an internal IT cost allocation at use. By applying these design criteria an internal cost allocation serves not only for cost controlling but also as an instrument in strategic IT management.

Keywords: accounting for IT services, Business IT Alignment, internal cost allocation, IT controlling, IT governance, strategic IT management

Procedia PDF Downloads 154
34900 [Keynote Talk]: Discovering Liouville-Type Problems for p-Energy Minimizing Maps in Closed Half-Ellipsoids by Calculus Variation Method

Authors: Lina Wu, Jia Liu, Ye Li

Abstract:

The goal of this project is to investigate constant properties (called the Liouville-type Problem) for a p-stable map as a local or global minimum of a p-energy functional where the domain is a Euclidean space and the target space is a closed half-ellipsoid. The First and Second Variation Formulas for a p-energy functional has been applied in the Calculus Variation Method as computation techniques. Stokes’ Theorem, Cauchy-Schwarz Inequality, Hardy-Sobolev type Inequalities, and the Bochner Formula as estimation techniques have been used to estimate the lower bound and the upper bound of the derived p-Harmonic Stability Inequality. One challenging point in this project is to construct a family of variation maps such that the images of variation maps must be guaranteed in a closed half-ellipsoid. The other challenging point is to find a contradiction between the lower bound and the upper bound in an analysis of p-Harmonic Stability Inequality when a p-energy minimizing map is not constant. Therefore, the possibility of a non-constant p-energy minimizing map has been ruled out and the constant property for a p-energy minimizing map has been obtained. Our research finding is to explore the constant property for a p-stable map from a Euclidean space into a closed half-ellipsoid in a certain range of p. The certain range of p is determined by the dimension values of a Euclidean space (the domain) and an ellipsoid (the target space). The certain range of p is also bounded by the curvature values on an ellipsoid (that is, the ratio of the longest axis to the shortest axis). Regarding Liouville-type results for a p-stable map, our research finding on an ellipsoid is a generalization of mathematicians’ results on a sphere. Our result is also an extension of mathematicians’ Liouville-type results from a special ellipsoid with only one parameter to any ellipsoid with (n+1) parameters in the general setting.

Keywords: Bochner formula, Calculus Stokes' Theorem, Cauchy-Schwarz Inequality, first and second variation formulas, Liouville-type problem, p-harmonic map

Procedia PDF Downloads 269
34899 A Portable Device for Pulse Wave Velocity Measurements

Authors: Chien-Lin Wang, Cha-Ling Ko, Tainsong Chen

Abstract:

Pulse wave velocity (PWV) of blood flow provides important information of vessel property and blood pressure which can be used to assess cardiovascular disease. However, the above measurements need expensive equipment, such as Doppler ultrasound, MRI, angiography etc. The photoplethysmograph (PPG) signals are commonly utilized to detect blood volume changes. In this study, two infrared (IR) probes are designed and placed at a fixed distance from finger base and fingertip. An analog circuit with automatic gain adjustment is implemented to get the stable original PPG signals from above two IR probes. In order to obtain the time delay precisely between two PPG signals, we obtain the pulse transit time from the second derivative of the original PPG signals. To get a portable, wireless and low power consumption PWV measurement device, the low energy Bluetooth 4.0 (BLE) and the microprocessor (Cortex™-M3) are used in this study. The PWV is highly correlated with blood pressure. This portable device has potential to be used for continuous blood pressure monitoring.

Keywords: pulse wave velocity, photoplethysmography, portable device, biomedical engineering

Procedia PDF Downloads 525
34898 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 25
34897 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications

Authors: Ariq Bani Hardi

Abstract:

Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?

Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic

Procedia PDF Downloads 125
34896 A Hedonic Valuation Approach to Valuing Combined Sewer Overflow Reductions

Authors: Matt S. Van Deren, Michael Papenfus

Abstract:

Seattle is one of the hundreds of cities in the United States that relies on a combined sewer system to collect and convey municipal wastewater. By design, these systems convey all wastewater, including industrial and commercial wastewater, human sewage, and stormwater runoff, through a single network of pipes. Serious problems arise for combined sewer systems during heavy precipitation events when treatment plants and storage facilities are unable to accommodate the influx of wastewater needing treatment, causing the sewer system to overflow into local waterways through sewer outfalls. CSOs (Combined Sewer Overflows) pose a serious threat to human and environmental health. Principal pollutants found in CSO discharge include microbial pathogens, comprising of bacteria, viruses, parasites, oxygen-depleting substances, suspended solids, chemicals or chemical mixtures, and excess nutrients, primarily nitrogen and phosphorus. While concentrations of these pollutants can vary between overflow events, CSOs have the potential to spread disease and waterborne illnesses, contaminate drinking water supplies, disrupt aquatic life, and effect a waterbody’s designated use. This paper estimates the economic impact of CSOs on residential property values. Using residential property sales data from Seattle, Washington, this paper employs a hedonic valuation model that controls for housing and neighborhood characteristics, as well as spatial and temporal effects, to predict a consumer’s willingness to pay for improved water quality near their homes. Initial results indicate that a 100,000-gallon decrease in the average annual overflow discharged from a sewer outfall within 300 meters of a home is associated with a 0.053% increase in the property’s sale price. For the average home in the sample, the price increase is estimated to be $18,860.23. These findings reveal some of the important economic benefits of improving water quality by reducing the frequency and severity of combined sewer overflows.

Keywords: benefits, hedonic, Seattle, sewer

Procedia PDF Downloads 173
34895 Exploring the Landscape of Information Visualization through a Mark Lombardi Lens

Authors: Alon Friedman, Antonio Sanchez Chinchon

Abstract:

This bibliometric study takes an artistic and storytelling approach to explore the term ”information visualization.” Analyzing over 1008 titles collected from databases that specialize in data visualization research, we examine the titles of these publications to report on the characteristics and development trends in the field. Employing a qualitative methodology, we delve into the titles of these publications, extracting leading terms and exploring the cooccurrence of these terms to gain deeper insights. By systematically analyzing the leading terms and their relationships within the titles, we shed light on the prevailing themes that shape the landscape of ”information visualization” by employing the artist Mark Lombardi’s techniques to visualize our findings. By doing so, this study provides valuable insights into bibliometrics visualization while also opening new avenues for leveraging art and storytelling to enhance data representation.

Keywords: bibliometrics analysis, Mark Lombardi design, information visualization, qualitative methodology

Procedia PDF Downloads 81
34894 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 142
34893 Clash of Civilizations without Civilizational Groups: Revisiting Samuel P. Huntington's Clash of Civilizations Theory

Authors: Jamal Abdi

Abstract:

This paper offers a critique of Samuel P. Huntington's Clash of Civilizations thesis. The overriding argument is that Huntington's thesis is characterized by failure to distinguish between 'groups' and 'categories'. Multinational civilizations overcoming their internal collective action problems, which would enable them to pursue a unified strategy vis-à-vis the West, is a rather foundational assumption in his theory. Without assigning sufficient intellectual attention to the processes through which multinational civilizations may gain the capacity for concerted action, i.e., become a group, he contended that the post-cold-war world would be shaped in large measure by interactions among seven or eight major civilizations. Thus, failure in providing a convincing analysis of multi-national civilizations' transition from categories to groups is a significant weakness in Huntington's clash theory. It is also suggested that so-called Islamic terrorism and the war on terror is not to be taken as an expression of the presence of clash between a Western and an Islamic civilization, as terrorist organizations would be superfluous in a world characterized by clash of civilizations. Consequences of multinational civilizations becoming a group are discussed in relation to contemporary Western superiority.

Keywords: clash of civilizations, groups, categories, groupism

Procedia PDF Downloads 202
34892 Change Point Analysis in Average Ozone Layer Temperature Using Exponential Lomax Distribution

Authors: Amjad Abdullah, Amjad Yahya, Bushra Aljohani, Amani Alghamdi

Abstract:

Change point detection is an important part of data analysis. The presence of a change point refers to a significant change in the behavior of a time series. In this article, we examine the detection of multiple change points of parameters of the exponential Lomax distribution, which is broad and flexible compared with other distributions while fitting data. We used the Schwarz information criterion and binary segmentation to detect multiple change points in publicly available data on the average temperature in the ozone layer. The change points were successfully located.

Keywords: binary segmentation, change point, exponentialLomax distribution, information criterion

Procedia PDF Downloads 171
34891 Pricing Effects on Equitable Distribution of Forest Products and Livelihood Improvement in Nepalese Community Forestry

Authors: Laxuman Thakuri

Abstract:

Despite the large number of in-depth case studies focused on policy analysis, institutional arrangement, and collective action of common property resource management; how the local institutions take the pricing decision of forest products in community forest management and what kinds of effects produce it, the answers of these questions are largely silent among the policy-makers and researchers alike. The study examined how the local institutions take the pricing decision of forest products in the lowland community forestry of Nepal and how the decisions affect to equitable distribution of benefits and livelihood improvement which are also objectives of Nepalese community forestry. The study assumes that forest products pricing decisions have multiple effects on equitable distribution and livelihood improvement in the areas having heterogeneous socio-economic conditions. The dissertation was carried out at four community forests of lowland, Nepal that has characteristics of high value species, matured-experience of community forest management and better record-keeping system of forest products production, pricing and distribution. The questionnaire survey, individual to group discussions and direct field observation were applied for data collection from the field, and Lorenz curve, gini-coefficient, χ²-text, and SWOT (Strong, Weak, Opportunity, and Threat) analysis were performed for data analysis and results interpretation. The dissertation demonstrates that the low pricing strategy of high-value forest products was supposed crucial to increase the access of socio-economically weak households, and to and control over the important forest products such as timber, but found counter productive as the strategy increased the access of socio-economically better-off households at higher rate. In addition, the strategy contradicts to collect a large-scale community fund and carry out livelihood improvement activities as per the community forestry objectives. The crucial part of the study is despite the fact of low pricing strategy; the timber alone contributed large part of community fund collection. The results revealed close relation between pricing decisions and livelihood objectives. The action research result shows that positive price discrimination can slightly reduce the prevailing inequality and increase the fund. However, it lacks to harness the full price of forest products and collects a large-scale community fund. For broader outcomes of common property resource management in terms of resource sustainability, equity, and livelihood opportunity, the study suggests local institutions to harness the full price of resource products with respect to the local market.

Keywords: community, equitable, forest, livelihood, socioeconomic, Nepal

Procedia PDF Downloads 531
34890 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 147
34889 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions

Authors: Siddharth Krishnaswamy

Abstract:

Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.

Keywords: analysis, food security indicators, response, resilience analysis

Procedia PDF Downloads 329
34888 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 68
34887 Anticancer Effect of Doxorubicin Using Injectable Hydrogel

Authors: Prasamsha Panta, Da Yeon Kim, Ja Yong Jang, Min Jae Kim, Jae Ho Kim, Moon Suk Kim

Abstract:

Introduction: Among the many anticancer drugs used clinically, doxorubicin (Dox), was one of widely used drugs to treat many types of solid tumors such as liver, colon, breast, or lung. Intratumoral injection of chemotherapeutic agents is a potentially more effective alternative to systemic administration because direct delivery of the anticancer drug to the target may improve both the stability and efficacy of anticancer drugs. Injectable in situ-forming gels have attracted considerable attention because they can achieve site specific drug delivery, long term action periods, and improved patient compliance. Objective: Objective of present study is to confirm clinical benefit of intratumoral chemotherapy using injectable in situ-forming poly(ethylene glycol)-b-polycaprolactone diblock copolymer (MP) and Dox with increase in efficacy and reducing the toxicity in patients with cancer diseases. Methods and methodology: We prepared biodegradable MP hydrogel and measured viscosity for the evaluation of thermo-sensitive property. In vivo antitumor activity was performed with normal saline, MP only, single free Dox, repeat free Dox, and Dox-loaded MP gel. The remaining amount of Dox drug was measured using HPLC after the mouse was sacrified. For cytotoxicity studies WST-1 assay was performed. Histological analysis was done with H&E and TUNEL processes respectively. Results: The works in this experiment showed that Dox-loaded MP have biodegradable drug depot property. Dox-loaded MP gels showed remarkable in vitro cytotoxicity activities against cancer cells. Finally, this work indicates that injection of Dox-loaded MP allowed Dox to act effectively in the tumor and induced long-lasting supression of tumor growth. Conclusion: This work has examined the potential clinical utility of intratumorally injected Dox-loaded MP gel, which shows significant effect of higher local Dox retention compared with systemically administered Dox.

Keywords: injectable in-situ forming hydrogel, anticancer, doxorubicin, intratumoral injection

Procedia PDF Downloads 404
34886 Domain Switching Characteristics of Lead Zirconate Titanate Piezoelectric Ceramic

Authors: Mitsuhiro Okayasu

Abstract:

To better understand the lattice characteristics of lead zirconate titanate (PZT) ceramics, the lattice orientations and domain-switching characteristics have been directly examined during loading and unloading using various experimental techniques. Upon loading, the PZT ceramics are fractured linear and nonlinearly during the compressive loading process. The strain characteristics of the PZT ceramic were directly affected by both the lattice and domain switching strain. Due to the piezoelectric ceramic, electrical activity of lightning-like behavior occurs in the PZT ceramics, which attributed to the severe domain-switching leading to weak piezoelectric property. The characteristics of domain-switching and reverse switching are detected during the loading and unloading processes. The amount of domain-switching depends on the grain, due to different stress levels. In addition, two patterns of 90˚ domain-switching systems are characterized, namely (i) 90˚ turn about the tetragonal c-axis and (ii) 90˚ rotation of the tetragonal a-axis. In this case, PZT ceramic was loaded by the thermal stress at 80°C. Extent of domain switching is related to the direction of c-axis of the tetragonal structure, e.g., that axis, orientated close to the loading direction, makes severe domain switching. It is considered that there is 90˚ domain switching, but in actual, the angle of domain switching is less than 90˚, e.g., 85.4° ~ 90.0°. In situ TEM observation of the domain switching characteristics of PZT ceramic has been conducted with increasing the sample temperature from 25°C to 300°C, and the domain switching like behavior is directly observed from the lattice image, where the severe domain switching occurs less than 100°C.

Keywords: PZT, lead zirconate titanate, piezoelectric ceramic, domain switching, material property

Procedia PDF Downloads 198
34885 Statecraft: Building a Hindu Nationalist Intellectual Ecosystem in India

Authors: Anuradha Sajjanhar

Abstract:

The rise of authoritarian populist regimes has been accompanied by hardened nationalism and heightened divisions between 'us' and 'them'. Political actors reinforce these sentiments through coercion, but also through inciting fear about imagined threats and by transforming public discourse about policy concerns. Extremist ideas can penetrate national policy, as newly appointed intellectuals and 'experts' in knowledge-producing institutions, such as government committees, universities, and think tanks, succeed in transforming public discourse. While attacking left and liberal academics, universities, and the press, the current Indian government is building new institutions to provide authority to its particularly rigid, nationalist discourse. This paper examines the building of a Hindu-nationalist intellectual ecosystem in India, interrogating the key role of hyper-nationalist think tanks. While some are explicit about their political and ideological leanings, others claim neutrality and pursue their agenda through coded technocratic language and resonant historical narratives. Their key is to change thinking by normalizing it. Six years before winning the election in 2014, India’s Hindu-nationalist party, the BJP, put together its own network of elite policy experts. In a national newspaper, the vice-president of the BJP described this as an intentional shift: from 'being action-oriented to solidifying its ideological underpinnings in a policy framework'. When the BJP came to power in 2014, 'experts' from these think tanks filled key positions in the central government. The BJP has since been circulating dominant ideas of Hindu supremacy through regional parties, grassroots political organisations, and civil society organisations. These think tanks have the authority to articulate and legitimate Hindu nationalism within a credible technocratic policy framework. This paper is based on ethnography and over 50 interviews in New Delhi, before and after the BJP’s staggering election victory in 2019. It outlines the party’s attempt to take over existing institutions while developing its own cadre of nationalist policy-making professionals.

Keywords: ideology, politics, South Asia, technocracy

Procedia PDF Downloads 118
34884 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies

Authors: Dumitru Valentin Florentin

Abstract:

The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.

Keywords: information technologies, impact, company, Romania, empirical study

Procedia PDF Downloads 419
34883 Beta Titanium Alloys: The Lowest Elastic Modulus for Biomedical Applications: A Review

Authors: Mohsin Talib Mohammed, Zahid A. Khan, Arshad N. Siddiquee

Abstract:

Biometallic materials are the most important materials for use in biomedical applications especially in manufacturing a variety of biological artificial replacements in a modern worlds, e.g. hip, knee or shoulder joints, due to their advanced characteristics. Titanium (Ti) and its alloys are used extensively in biomedical applications based on their high specific strength and excellent corrosion resistance. Beta-Ti alloys containing completely biocompatible elements are exceptionally prospective materials for manufacturing of bioimplants. They have superior mechanical, chemical and electrochemical properties for use as biomaterials. These biomaterials have the ability to introduce the most important property of biochemical compatibility which is low elastic modulus. This review examines current information on the recent developments in alloying elements leading to improvements of beta Ti alloys for use as biomaterials. Moreover, this paper focuses mainly on the evolution, evaluation and development of the modulus of elasticity as an effective factor on the performance of beta alloys.

Keywords: beta alloys, biomedical applications, titanium alloys, Young's modulus

Procedia PDF Downloads 319
34882 Developing Elusive Frame for Creativity, ICT and Teacher Education

Authors: Rahul Malhotra, Anu Malhotra, Veena Bana

Abstract:

Information and Communication Technology (ICT) plays an imperative part in enhancing the quality of life, together with education. This research work is an important consequence to endow with substantiation for the effective use of Information and Communication Technology (ICT) tools for educational rationale. Perspective teachers and students of technical education from various regions of Rajasthan participated in the survey based research work. Condensed from the analysis and interpretations of the data collected from Perspective teachers and students of technical education from various regions of Rajasthan, it is inevitable that use of Information and Communication Technology (ICT) for educational purpose can augment student’s creativity and achievement ability. The Chi-Square statistics produce the evidence of the effective use of Information and Communication Technology (ICT) in enhancing the creativity and achievement ability of the perspective teachers and students of technical education.

Keywords: ICT, education, creativity, elusive frame

Procedia PDF Downloads 458
34881 The Functions of “Question” and Its Role in Education Process: Quranic Approach

Authors: Sara Tusian, Zahra Salehi Motaahed, Narges Sajjadie, Nikoo Dialame

Abstract:

One of the methods which have frequently been used in Quran is the “question”. In the Quran, in addition to the content, methods are also important. Using analysis-interpretation method, the present study has investigated Quranic questions, and extracted its functions from educational perspective. In so doing, it has first investigated all the questions in Quran and then taking the three-stage classification of education into account, it has offered question functions. The results obtained from this study suggest that question functions in Quran are presented in three categories: the preparation stage (including preparation of the audience, revising the insights, and internal Evolution); main body (including the granting the insight, and elimination of intellectual negligence and the question of innate and logical axioms, the introducting of the realm of thinking, creating emotional arousal and alleged in the claim) and the third stage as modification and revision (including invitation to move in the framework of tasks using the individual beliefs to reveal the contradictions and, Error detection and contribution to change the function) that each of which has a special role in the education process.

Keywords: education, question, Quranic questions, Quran

Procedia PDF Downloads 499
34880 Evaluation and Strategic Development of IT in Accounting in Turkey

Authors: Eda Kocakaya, Sebahat Seker, Dogan Argun

Abstract:

The aim of this study is to determine the process of information technologies and the connections between concepts in accounting management services in Turkey. The objective of this study is to determine the adaptation and evaluation process of information technologies and the connections between concepts and differences in accounting management services in Turkey. The situation and determination of the IT applications of Accounting Management were studied. The applications of • Billing • Order Processing • Accounts Receivable/Payable Management • Contract Management • Bank Account Management Were discussed in this study. The IT applications were demonstrated and realized in actual accounting services. The sectoral representative's companies were selected, and the IT application was searched by bibliometric analysis.

Keywords: management, accounting, information technologies, adaptation

Procedia PDF Downloads 307
34879 Visual Analytics of Higher Order Information for Trajectory Datasets

Authors: Ye Wang, Ickjai Lee

Abstract:

Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.

Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data

Procedia PDF Downloads 402
34878 Small Target Recognition Based on Trajectory Information

Authors: Saad Alkentar, Abdulkareem Assalem

Abstract:

Recognizing small targets has always posed a significant challenge in image analysis. Over long distances, the image signal-to-noise ratio tends to be low, limiting the amount of useful information available to detection systems. Consequently, visual target recognition becomes an intricate task to tackle. In this study, we introduce a Track Before Detect (TBD) approach that leverages target trajectory information (coordinates) to effectively distinguish between noise and potential targets. By reframing the problem as a multivariate time series classification, we have achieved remarkable results. Specifically, our TBD method achieves an impressive 97% accuracy in separating target signals from noise within a mere half-second time span (consisting of 10 data points). Furthermore, when classifying the identified targets into our predefined categories—airplane, drone, and bird—we achieve an outstanding classification accuracy of 96% over a more extended period of 1.5 seconds (comprising 30 data points).

Keywords: small targets, drones, trajectory information, TBD, multivariate time series

Procedia PDF Downloads 42
34877 Independent Control over Surface Charge and Wettability Using Polyelectrolyte Architecture

Authors: Shanshan Guo, Xiaoying Zhu, Dominik Jańczewski, Koon Gee Neoh

Abstract:

Surface charge and wettability are two prominent physical factors governing cell adhesion and have been extensively studied in the literature. However, a comparison between the two driving forces in terms of their independent and cooperative effects in affecting cell adhesion is rarely explored on a systematic and quantitative level. Herein, we formulate a protocol which allows two-dimensional and independent control over both surface charge and wettability. This protocol enables the unambiguous comparison of the effects of these two properties on cell adhesion. This strategy is implemented by controlling both the relative thickness of polyion layers in the layer-by-layer assembly and the polyion side chain chemical structures. The 2D property matrix spans surface isoelectric point ranging from 5 to 9 and water contact angle from 35º to 70º, with other interferential factors (e.g. roughness) eliminated. The interplay between these two surface variables influences 3T3 fibroblast cell adhesion. The results show that both surface charge and wettability have an effect on its adhesion. The combined effects of positive charge and hydrophilicity led to the highest cell adhesion whereas negative charge and hydrophobicity led to the lowest cell adhesion. Our design strategy can potentially form the basis for studying the distinct behaviors of electrostatic force or wettability driven interfacial phenomena and serving as a reference in future studies assessing cell adhesion to surfaces with known charge and wettability within the property range studied here.

Keywords: cell adhesion, layer-by-layer, surface charge, surface wettability

Procedia PDF Downloads 268