Search results for: model of postural system behavior
25116 Using Social Network Analysis for Cyber Threat Intelligence
Authors: Vasileios Anastopoulos
Abstract:
Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis
Procedia PDF Downloads 17825115 Integrating Best Practices for Construction Waste in Quality Management Systems
Authors: Paola Villoria Sáez, Mercedes Del Río Merino, Jaime Santa Cruz Astorqui, Antonio Rodríguez Sánchez
Abstract:
The Spanish construction industry generates large volumes of waste. However, despite the legislative improvements introduced for construction and demolition waste (CDW), construction waste recycling rate remains well below other European countries and also below the target set for 2020. This situation can be due to many difficulties. i.e.: The difficulty of onsite segregation or the estimation in advance of the total amount generated. Despite these difficulties, the proper management of CDW must be one of the main aspects to be considered by the construction companies. In this sense, some large national companies are implementing Integrated Management Systems (IMS) including not only quality and safety aspects, but also environment issues. However, although this fact is a reality for large construction companies still the vast majority of companies need to adopt this trend. In short, it is common to find in small and medium enterprises a decentralized management system: A single system of quality management, another for system safety management and a third one for environmental management system (EMS). In addition, the EMSs currently used address CDW superficially and are mainly focus on other environmental concerns such as carbon emissions. Therefore, this research determines and implements a specific best practice management system for CDW based on eight procedures in a Spanish Construction company. The main advantages and drawbacks of its implementation are highlighted. Results of this study show that establishing and implementing a CDW management system in building works, improve CDW quantification as the company obtains their own CDW generation ratio. This helps construction stakeholders when developing CDW Management Plans and also helps to achieve a higher adjustment of CDW management costs. Finally, integrating this CDW system with the EMS of the company favors the cohesion of the construction process organization at all stages, establishing responsibilities in the field of waste and providing a greater control over the process.Keywords: construction and demolition waste, waste management, best practices, waste minimization, building, quality management systems
Procedia PDF Downloads 53325114 Gender Recognition with Deep Belief Networks
Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang
Abstract:
A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs
Procedia PDF Downloads 45325113 A Multilingual Model in the Multicultural World
Authors: Marina Petrova
Abstract:
Language policy issues related to the preservation and development of the native languages of the Russian peoples and the state languages of the national republics are increasingly becoming the focus of recent attention of educators and parents, public and national figures. Is it legal to teach the national language or the mother tongue as the state language? Due to that dispute language phobia moods easily evolve into xenophobia among the population. However, a civilized, intelligent multicultural personality can only be formed if the country develops bilingualism and multilingualism, and languages as a political tool help to find ‘keys’ to sufficiently closed national communities both within a poly-ethnic state and in internal relations of multilingual countries. The purpose of this study is to design and theoretically substantiate an efficient model of language education in the innovatively developing Republic of Sakha. 800 participants from different educational institutions of Yakutia worked at developing a multilingual model of education. This investigation is of considerable practical importance because researchers could build a methodical system designed to create conditions for the formation of a cultural language personality and the development of the multilingual communicative competence of Yakut youth, necessary for communication in native, Russian and foreign languages. The selected methodology of humane-personal and competence approaches is reliable and valid. Researchers used a variety of sources of information, including access to related scientific fields (philosophy of education, sociology, humane and social pedagogy, psychology, effective psychotherapy, methods of teaching Russian, psycholinguistics, socio-cultural education, ethnoculturology, ethnopsychology). Of special note is the application of theoretical and empirical research methods, a combination of academic analysis of the problem and experienced training, positive results of experimental work, representative series, correct processing and statistical reliability of the obtained data. It ensures the validity of the investigation’s findings as well as their broad introduction into practice of life-long language education.Keywords: intercultural communication, language policy, multilingual and multicultural education, the Sakha Republic of Yakutia
Procedia PDF Downloads 22225112 Comparison of Various Policies under Different Maintenance Strategies on a Multi-Component System
Authors: Demet Ozgur-Unluakin, Busenur Turkali, Ayse Karacaorenli
Abstract:
Maintenance strategies can be classified into two types, which are reactive and proactive, with respect to the time of the failure and maintenance. If the maintenance activity is done after a breakdown, it is called reactive maintenance. On the other hand, proactive maintenance, which is further divided as preventive and predictive, focuses on maintaining components before a failure occurs to prevent expensive halts. Recently, the number of interacting components in a system has increased rapidly and therefore, the structure of the systems have become more complex. This situation has made it difficult to provide the right maintenance decisions. Herewith, determining effective decisions has played a significant role. In multi-component systems, many methodologies and strategies can be applied when a component or a system has already broken down or when it is desired to identify and avoid proactively defects that could lead to future failure. This study focuses on the comparison of various maintenance strategies on a multi-component dynamic system. Components in the system are hidden, although there exists partial observability to the decision maker and they deteriorate in time. Several predefined policies under corrective, preventive and predictive maintenance strategies are considered to minimize the total maintenance cost in a planning horizon. The policies are simulated via Dynamic Bayesian Networks on a multi-component system with different policy parameters and cost scenarios, and their performances are evaluated. Results show that when the difference between the corrective and proactive maintenance cost is low, none of the proactive maintenance policies is significantly better than the corrective maintenance. However, when the difference is increased, at least one policy parameter for each proactive maintenance strategy gives significantly lower cost than the corrective maintenance.Keywords: decision making, dynamic Bayesian networks, maintenance, multi-component systems, reliability
Procedia PDF Downloads 12925111 Percolation Transition in an Agglomeration of Spherical Particles
Authors: Johannes J. Schneider, Mathias S. Weyland, Peter Eggenberger Hotz, William D. Jamieson, Oliver Castell, Alessia Faggian, Rudolf M. Füchslin
Abstract:
Agglomerations of polydisperse systems of spherical particles are created in computer simulations using a simplified stochastic-hydrodynamic model: Particles sink to the bottom of the cylinder, taking into account gravity reduced by the buoyant force, the Stokes friction force, the added mass effect, and random velocity changes. Two types of particles are considered, with one of them being able to create connections to neighboring particles of the same type, thus forming a network within the agglomeration at the bottom of a cylinder. Decreasing the fraction of these particles, a percolation transition occurs. The critical regime is determined by investigating the maximum cluster size and the percolation susceptibility.Keywords: binary system, maximum cluster size, percolation, polydisperse
Procedia PDF Downloads 6125110 Digital Employment of Disabled People: Empirical Study from Shanghai
Abstract:
Across the globe, ICTs are influencing employment both as an industry that creates jobs and as a tool that empowers disabled people to access new forms of work, in innovative and more flexible ways. The advancements in ICT and the number of apps and solutions that support persons with physical, cognitive and intellectual disabilities challenge traditional biased notions and offer a pathway out of traditional sheltered workshops. As the global leader in digital technology innovation, China is arguably a leader in the use of digital technology as a 'lever' in ending the economic and social marginalization of the disabled. This study investigates factors that influence adoption and use of employment-oriented ICT applications among disabled people in China and seeks to integrate three theoretical approaches: the technology acceptance model (TAM), the uses and gratifications (U&G) approach, and the social model of disability. To that end, the study used data from self-reported survey of 214 disabled adults who have been involved in two top-down 'Internet + employment' programs promoted by local disabled persons’ federation in Shanghai. A structural equation model employed in the study demonstrates that the use of employment-oriented ICT applications is affected by demographic factors of gender, categories of disability, education and marital status. The organizational support of local social organizations demonstrates significate effects on the motivations of disabled people. Results from the focus group interviews particularly suggested that to maximize the positive impact of ICTs on employment, there is significant need to build stakeholder capacity on how ICTs could benefits persons with disabilities.Keywords: disabled people, ICTs, technology acceptance model, uses and gratifications, the social model of disability
Procedia PDF Downloads 10825109 Combined Analysis of m⁶A and m⁵C Modulators on the Prognosis of Hepatocellular Carcinoma
Authors: Hongmeng Su, Luyu Zhao, Yanyan Qian, Hong Fan
Abstract:
Aim: Hepatocellular carcinoma (HCC) is one of the most common malignant tumors that endanger human health seriously. RNA methylation, especially N6-methyladenosine (m⁶A) and 5-methylcytosine (m⁵C), a crucial epigenetic transcriptional regulatory mechanism, plays an important role in tumorigenesis, progression and prognosis. This research aims to systematically evaluate the prognostic value of m⁶A and m⁵C modulators in HCC patients. Methods: Twenty-four modulators of m⁶A and m⁵C were candidates to analyze their expression level and their contribution to predict the prognosis of HCC. Consensus clustering analysis was applied to classify HCC patients. Cox and LASSO regression were used to construct the risk model. According to the risk score, HCC patients were divided into high-risk and low/medium-risk groups. The clinical pathology factors of HCC patients were analyzed by univariate and multivariate Cox regression analysis. Results: The HCC patients were classified into 2 clusters with significant differences in overall survival and clinical characteristics. Nine-gene risk model was constructed including METTL3, VIRMA, YTHDF1, YTHDF2, NOP2, NSUN4, NSUN5, DNMT3A and ALYREF. It was indicated that the risk score could serve as an independent prognostic factor for patients with HCC. Conclusion: This study constructed a Nine-gene risk model by modulators of m⁶A and m⁵C and investigated its effect on the clinical prognosis of HCC. This model may provide important consideration for the therapeutic strategy and prognosis evaluation analysis of patients with HCC.Keywords: hepatocellular carcinoma, m⁶A, m⁵C, prognosis, RNA methylation
Procedia PDF Downloads 6825108 Teaching the Tacit Nuances of Japanese Onomatopoeia through an E-Learning System: An Evaluation Approach of Narrative Interpretation
Authors: Xiao-Yan Li, Takashi Hashimoto, Guanhong Li, Shuo Yang
Abstract:
In Japanese, onomatopoeia is an important element in the lively expression of feelings and experiences. It is very difficult for students of Japanese to acquire onomatopoeia, especially, its nuances. In this paper, based on traditional L2 learning theories, we propose a new method to improve the efficiency of teaching the nuances – both explicit and tacit - to non-native speakers of Japanese. The method for teaching the tacit nuances of onomatopoeia consists of three elements. First is to teach the formal rules representing the explicit nuances of onomatopoeic words. Second is to have the students create new onomatopoeic words by utilizing those formal rules. The last element is to provide feedback by evaluating the onomatopoeias created. Our previous study used five-grade relative estimation. However students were confused about the five-grade system, because they could not understand the evaluation criteria only based on a figure. In this new system, then, we built an evaluation database through native speakers’ narrative interpretation. We asked Japanese native speakers to describe their awareness of the nuances of onomatopoeia in writing. Then they voted on site and defined priorities for showing to learners on the system. To verify the effectiveness of the proposed method and the learning system, we conducted a preliminary experiment involving two groups of subjects. While Group A got feedback about the appropriateness of their onomatopoeic constructions from the native speakers’ narrative interpretation, Group B got feedback just in the form of the five-grade relative estimation. A questionnaire survey administered to all of the learners clarified our learning system availability and also identified areas that should be improved. Repetitive learning of word-formation rules, creating new onomatopoeias and gaining new awareness from narrative interpretation is the total process used to teach the explicit and tacit nuances of onomatopoeia.Keywords: onomatopoeia, tacit nuance, narrative interpretation, e-learning system, second language teaching
Procedia PDF Downloads 39625107 Integration of UPQC Based on Fuzzy Controller for Power Quality Enhancement in Distributed Network
Authors: M. Habab, C. Benachaiba, B. Mazari, H. Madi, C. Benoudjafer
Abstract:
The use of Distributed Generation (DG) has been increasing in recent years to fill the gap between energy supply and demand. This paper presents the grid connected wind energy system with UPQC based on fuzzy controller to compensate for voltage and current disturbances. The proposed system can improve power quality at the point of installation on power distribution systems. Simulation results show the capability of the DG-UPQC intelligent system to compensate sags voltage and current harmonics at the Point of Common Coupling (PCC).Keywords: shunt active filter, series active filter, UPQC, power quality, sags voltage, distributed generation, wind turbine
Procedia PDF Downloads 40725106 Design and Implementation of a Wearable Artificial Kidney Prototype for Home Dialysis
Authors: R. A. Qawasma, F. M. Haddad, H. O. Salhab
Abstract:
Hemodialysis is a life-preserving treatment for a number of patients with kidney failure. The standard procedure of hemodialysis is three times a week during the hemodialysis procedure, the patient usually suffering from many inconvenient, exhausting feeling and effect on the heart and cardiovascular system are the most common signs. This paper provides a solution to reduce the previous problems by designing a wearable artificial kidney (WAK) taking in consideration a minimization the size of the dialysis machine. The WAK system consists of two circuits: blood circuit and dialysate circuit. The blood from the patient is filtered in the dialyzer before returning back to the patient. Several parameters using an advanced microcontroller and array of sensors. WAK equipped with visible and audible alarm system to aware the patients if there is any problem.Keywords: artificial kidney, home dialysis, renal failure, wearable kidney
Procedia PDF Downloads 23525105 Degradation of Acetaminophen with Fe3O4 and Fe2+ as Activator of Peroxymonosulfate
Authors: Chaoqun Tan, Naiyun Gao, Xiaoyan Xin
Abstract:
Perxymonosulfate (PMS)-based oxidation processes, as an alternative of hydrogen peroxide-based oxidation processes, are more and more popular because of reactive radical species (SO4-•, OH•) produced in systems. Magnetic nano-scaled particles Fe3O4 and ferrous anion (Fe2+) were studied for the activation of PMS for degradation of acetaminophen (APAP) in water. The Fe3O4 MNPs were found to effectively catalyze PMS for APAP and the reactions well followed a pseudo-first-order kinetics pattern (R2 > 0.95), while the degradation of APAP in PMS-Fe2+ system proceeds through two stages: a fast stage and a much slower stage. Within 5 min, approximately 7% and 18% of 10 ppm APAP was accomplished by 0.2 mM PMS in Fe3O4 (0.8g/L) and Fe2+ (0.1mM) activation process. However, as reaction proceed to 120 min, approximately 75% and 35% of APAP was removed in Fe3O4 activation process and Fe2+ activation process, respectively. Within 120 min, the mineralization of APAP was about 7.5% and 5.0% (initial APAP of 10 ppm and [PMS]0 of 0.2 mM) in Fe3O4-PMS and Fe2+-PMS system, while the mineralization could be greatly increased to about 31% and 40% as [PMS]0 increased to 2.0 mM in in Fe3O4-PMS and Fe2+-PMS system, respectively. At last, the production of reactive radical species were validated directly from Electron Paramagnetic Resonance (ESR) tests with 0.1 M 5,5-dimethyl-1-pyrrolidine N-oxide (DMPO). Plausible mechanisms on the radical generation from Fe3O4 and Fe2+ activation of PMS are proposed on the results of radial identification tests. The results demonstrated that Fe3O4 MNPs activated PMS and Fe2+ anion activated PMS systems are promising technologies for water pollution caused by contaminants such as pharmaceutical. Fe3O4-PMS system is more suitable for slowly remediation, while Fe2+-PMS system is more suitable for fast remediation.Keywords: acetaminophen, peroxymonosulfate, radicals, Fe3O4
Procedia PDF Downloads 25725104 Feasibility Study of a Solar Solid Desiccant Cooling System in Algerian Areas
Authors: N. Hatraf, l. Merabeti, M. Abbas
Abstract:
The interest in air conditioning using renewable energies is increasing. The Thermal energy produced from the solar energy can be transformed to useful cooling and heating through the thermo chemical or thermo physical processes by using thermally activated energy conversion system. Solid desiccant conditioning systems can represent a reliable alternative solution compared with other thermal cooling technologies. Their basic characteristics refer to the capability to regulate both temperature and humidity of the conditioned space in one side and to its potential in electrical energy saving in the other side. The ambient air contains so much water that very high dehumidification rates are required. For a continuous dehumidification of the process air the water adsorbed on the desiccant material has to be removed, which is done by allowing hot air to flow through the desiccant material (regeneration). Basically, solid desiccant cooling system transfers moisture from the inlet air to the silica gel by using two processes: absorption process and the regeneration process; The silica gel in the desiccant wheel which is the most important device in the system absorbs the moisture from the incoming air to the desiccant material in this case the silica gel, then it changes the heat with an rotary heat exchanger, after that the air passes through an humidifier to have the humidity required before entering to the local. The main aim of this paper is to study how the dehumidification rate, the generation temperature and many other factors influence the efficiency of a solid desiccant system by using TRNSYS software.Keywords: desiccation, dehumidification, TRNSYS, efficiency
Procedia PDF Downloads 41925103 A Molding Surface Auto-inspection System
Authors: Ssu-Han Chen, Der-Baau Perng
Abstract:
Molding process in IC manufacturing secures chips against the harms done by hot, moisture or other external forces. While a chip was being molded, defects like cracks, dilapidation, or voids may be embedding on the molding surface. The molding surfaces the study poises to treat and the ones on the market, though, differ in the surface where texture similar to defects is everywhere. Manual inspection usually passes over low-contrast cracks or voids; hence an automatic optical inspection system for molding surface is necessary. The proposed system is consisted of a CCD, a coaxial light, a back light as well as a motion control unit. Based on the property of statistical textures of the molding surface, a series of digital image processing and classification procedure is carried out. After training of the parameter associated with above algorithm, result of the experiment suggests that the accuracy rate is up to 93.75%, contributing to the inspection quality of IC molding surface.Keywords: molding surface, machine vision, statistical texture, discrete Fourier transformation
Procedia PDF Downloads 43125102 The Effect of Health Program on the Fitness Ability of Abnormal BMI University Students
Authors: Hui-Fang Lee, Meng-Chu Liu, Wen-Chi Lu, Hsuan-Jung Hsieh
Abstract:
The purpose of the study was to examine the effect of health program on the fitness ability of abnormal BMI students of Ching-Yun University of Science and Technology. In order to achieve this purpose, self-regulation theory and dietary education were applied, and the effect of 10-week sports activities and three-day diet records on pre-test and post-test of fitness activities was analyzed. There were 40 original participants. Then, nine people who were with normal BMI, low attendance or unfinished fitness test were eliminated from this research. The valid samples were 31 (77.5%) participants. The fitness activities included sit-bending, one minute sit-up, standing long jump, and three-minute stage boarding. The averages of three-day diet records were compared, and differences of pre-test and post-test of the four fitness activities were analyzed with paired-samples t test. The results showed that there was a significant difference between pre-test and post of male students’ BMI and one minute sit-up. Females’ sit-bending and one minute sit-up had the same effect. Females had high fat intake in three-day diet records. The research showed that the use of self-regulation theory and dietary education, the implementation of sports activities and three-day diet records could significantly enhance the physical fitness indicators or effects. While in the course of sports, we should guide students to think about the gap between self-behavior and ideal behavior, then realize the main reasons and improving methods, and finally go towards the goal and improve the effect of physical fitness.Keywords: self-regulation theory, dietary education, three-day diet records, physical fitness
Procedia PDF Downloads 32325101 Effect of Coriolis Force on Magnetoconvection in an Anisotropic Porous Medium
Authors: N. F. M. Mokhtar, N. Z. A. Hamid
Abstract:
This paper reports an analytical investigation of the stability and thermal convection in a horizontal anisotropic porous medium in the presence of Coriolis force and magnetic field. The Darcy model is used in the momentum equation and Boussinesq approximation is considered for the density variation of the porous medium. The upper and lower boundaries of the porous medium are assumed to be conducting to temperature perturbation and we used first order Chebyshev polynomial Tau method to solve the resulting eigenvalue problem. Analytical solution is obtained for the case of stationary convection. It is found that the porous layer system becomes unstable when the mechanical anisotropy parameter elevated and increasing the Coriolis force and magnetic field help to stabilize the anisotropy porous medium.Keywords: anisotropic, Chebyshev tau method, Coriolis force, Magnetic field
Procedia PDF Downloads 21425100 Application to Monitor the Citizens for Corona and Get Medical Aids or Assistance from Hospitals
Authors: Vathsala Kaluarachchi, Oshani Wimalarathna, Charith Vandebona, Gayani Chandrarathna, Lakmal Rupasinghe, Windhya Rankothge
Abstract:
It is the fundamental function of a monitoring system to allow users to collect and process data. A worldwide threat, the corona outbreak has wreaked havoc in Sri Lanka, and the situation has gotten out of hand. Since the epidemic, the Sri Lankan government has been unable to establish a systematic system for monitoring corona patients and providing emergency care in the event of an outbreak. Most patients have been held at home because of the high number of patients reported in the nation, but they do not yet have access to a functioning medical system. It has resulted in an increase in the number of patients who have been left untreated because of a lack of medical care. The absence of competent medical monitoring is the biggest cause of mortality for many people nowadays, according to our survey. As a result, a smartphone app for analyzing the patient's state and determining whether they should be hospitalized will be developed. Using the data supplied, we are aiming to send an alarm letter or SMS to the hospital once the system recognizes them. Since we know what those patients need and when they need it, we will put up a desktop program at the hospital to monitor their progress. Deep learning, image processing and application development, natural language processing, and blockchain management are some of the components of the research solution. The purpose of this research paper is to introduce a mechanism to connect hospitals and patients even when they are physically apart. Further data security and user-friendliness are enhanced through blockchain and NLP.Keywords: blockchain, deep learning, NLP, monitoring system
Procedia PDF Downloads 13325099 Dynamics Characterizations of Dielectric Electro- Active Polymer Pull Actuator for Vibration Control
Authors: Abdul Malek Abdul Wahab, Emiliano Rustighi
Abstract:
The elastomeric dielectric material has become a new alternative for actuator technology recently. The characteristic of dielectric elastomer that induces significant strain by applying voltage attracts the attention of many researchers to study this material in actuator technology. Thus, for a couple of years, Danfoss Ventures A/S has established their dielectric electro-active polymer (DEAP), which called Polypower. The main objective of this work was to investigate the characterization of PolyPower folded actuator as a ‘pull’ actuator for vibration control. A range of experiment was carried out on folded actuator including passive (without electrical stimulate) and active (with electrical stimulate) testing. For both categories static and dynamic testing have been done to determine the behavior of folded DEAP actuator. Voltage-Strain experiment determines that DEAP folded actuator is the non-linear system. The voltage supplied has no effect on the natural frequency which shows by ongoing dynamic testing. Finally, varies AC voltage with different amplitude and frequency has been provided to DEAP folded actuator. This experiment shows the parameter that influences the performance of DEAP folded actuator. As a result, the actuator performance dominated by the frequency dependence of the elastic response and was less influenced by dielectric properties.Keywords: elastomeric dielectric, dielectric electro-active polymer, folded actuator, voltage-strain
Procedia PDF Downloads 32025098 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 22725097 Modeling Study of Short Fiber Orientation in Simple Injection Molding Processes
Authors: Ihsane Modhaffar, Kamal Gueraoui, Abouelkacem Qais, Abderrahmane Maaouni, Samir Men-La-Yakhaf, Hamid Eltourroug
Abstract:
The main objective of this paper is to develop a Computational Fluid Dynamics (CFD) model to simulate and characterize the fiber suspension in flow in rectangular cavities. The model is intended to describe the velocity profile and to predict the fiber orientation. The flow was considered to be incompressible, and behave as Newtonian fluid containing suspensions of short-fibers. The numerical model for determination of velocity profile and fiber orientation during mold-filling stage of injection molding process was solved using finite volume method. The governing equations of this problem are: the continuity, the momentum and the energy. The obtained results were compared to available experimental findings. A good agreement between the numerical results and the experimental data was achieved.Keywords: injection, composites, short-fiber reinforced thermoplastics, fiber orientation, incompressible fluid, numerical simulation
Procedia PDF Downloads 46525096 Pilot Trial of Evidence-Based Integrative Group Therapy to Improve Executive Functioning among Adults: Implications for Community Mental Health and Training Clinics
Authors: B. Parchem, M. Watanabe, D. Modrakovic, L. Mathew, A. Franklin, M. Cao, R. E. Broudy
Abstract:
Objective: Executive functioning (EF) deficits underlie several mental health diagnoses including ADHD, anxiety, and depression. Community mental health clinics face extensive waitlists for services with many referrals involving EF deficits. A pilot trial of a four-week group therapy was developed using key components from Cognitive-Behavioral Therapy (CBT), Dialectical Behavior Therapy (DBT), and mindfulness with an aim to improve EF skills and offer low-fee services. Method: Eight adults (M = 34.5) waiting for services at a community clinic were enrolled in a four-week group therapy at an in-house training clinic for doctoral trainees. Baseline EF, pre-/post-intervention ADHD and distress symptoms, group satisfaction, and curriculum helpfulness were assessed. Results: Downward trends in ADHD and distress symptoms pre/post-intervention were not significant. Favorable responses on group satisfaction and helpfulness suggest clinical utility. Conclusion: Preliminary pilot data from a brief group therapy to improve EF may be an efficacious, acceptable, and feasible intervention for adults waiting for services at community mental health and training clinics where there are high demands and limits to services and staffs.Keywords: executive functioning, cognitive-behavioral therapy, dialectical behavior therapy, mindfulness, adult group therapy
Procedia PDF Downloads 16325095 Optimal Design of a PV/Diesel Hybrid System for Decentralized Areas through Economic Criteria
Authors: David B. Tsuanyo, Didier Aussel, Yao Azoumah, Pierre Neveu
Abstract:
An innovative concept called “Flexy-Energy”is developing at 2iE. This concept aims to produce electricity at lower cost by smartly mix different available energies sources in accordance to the load profile of the region. With a higher solar irradiation and due to the fact that Diesel generator are massively used in sub-Saharan rural areas, PV/Diesel hybrid systems could be a good application of this concept and a good solution to electrify this region, provided they are reliable, cost effective and economically attractive to investors. Presentation of the developed approach is the aims of this paper. The PV/Diesel hybrid system designed consists to produce electricity and/or heat from a coupling between Diesel gensets and PV panels without batteries storage, while ensuring the substitution of gasoil by bio-fuels available in the area where the system will be installed. The optimal design of this system is based on his technical performances; the Life Cycle Cost (LCC) and Levelized Cost of Energy are developed and use as economic criteria. The Net Present Value (NPV), the internal rate of return (IRR) and the discounted payback (DPB) are also evaluated according to dual electricity pricing (in sunny and unsunny hours). The PV/Diesel hybrid system obtained is compared to the standalone Diesel gensets. The approach carried out in this paper has been applied to Siby village in Mali (Latitude 12 ° 23'N 8 ° 20'W) with 295 kWh as daily demand. This approach provides optimal physical characteristics (size of the components, number of component) and dynamical characteristics in real time (number of Diesel generator on, their load rate, fuel specific consumptions, and PV penetration rate) of the system. The system obtained is slightly cost effective; but could be improved with optimized tariffing strategies.Keywords: investments criteria, optimization, PV hybrid, sizing, rural electrification
Procedia PDF Downloads 44125094 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 19825093 Removal of Cr⁶⁺, Co²⁺ and Ni²⁺ Ions from Aqueous Solutions by Algerian Enteromorpha compressa (L.) Biomass
Authors: Asma Aid, Samira Amokrane, Djamel Nibou, Hadj Mekatel
Abstract:
The marine Enteromorpha Compressa (L.) (ECL) biomass was used as a low-cost biological adsorbent for the removal of Cr⁶⁺, Co²⁺ and Ni²⁺ ions from artificially contaminated aqueous solutions. The operating variables pH, the initial concentration C₀, the solid/liquid ratio R and the temperature T were studied. A full factorial experimental design technique enabled us to obtain a mathematical model describing the adsorption of Cr⁶⁺, Co²⁺ and Ni²⁺ ions and to study the main effects and interactions among operational parameters. The equilibrium isotherm has been analyzed by Langmuir, Freundlich, and Dubinin-Radushkevich models; it has been found that the adsorption process follows the Langmuir model for the used ions. Kinetic studies showed that the pseudo-second-order model correlates our experimental data. Thermodynamic parameters showed the endothermic heat of adsorption and the spontaneity of the adsorption process for Cr⁶⁺ ions and exothermic heat of adsorption for Co²⁺ and Ni²⁺ ions.Keywords: enteromorpha Compressa, adsorption process, Cr⁶⁺, Co²⁺ and Ni²⁺, equilibrium isotherm
Procedia PDF Downloads 19625092 A Saltwater Battery Inspired by the Membrane Potential Found in Biological Cells
Authors: Ross Lee, Pritpal Singh, Andrew Jester
Abstract:
As the world transitions to a more sustainable energy economy, the deployment of energy storage technologies is expected to increase to develop a more resilient grid system. However, current technologies are associated with various environmental and safety issues throughout their entire lifecycle; therefore, new battery technology is necessary for grid applications to curtail these risks. Biological cells, such as human neurons and electrolytes in the electric eel, can serve as a more sustainable design template for a new bio-inspired (i.e., biomimetic) battery. Within biological cells, an electrochemical gradient across the cell membrane forms the membrane potential, which serves as the driving force for ion transport into/out of the cell, akin to the charging/discharging of a battery cell. This work serves as the first step to developing such a biomimetic battery cell, starting with the fabrication and characterization of ion-selective membranes to facilitate ion transport through the cell. Performance characteristics (e.g., cell voltage, power density, specific energy, roundtrip efficiency) for the cell under investigation are compared to incumbent battery technologies and biological cells to assess the readiness level for this emerging technology. Using a Na⁺-Form Nafion-117 membrane, the cell in this work successfully demonstrated behavior similar to human neurons; these findings will inform how cell components can be re-engineered to enhance device performance.Keywords: battery, biomimetic, electrolytes, human neurons, ion-selective membranes, membrane potential
Procedia PDF Downloads 11825091 Analyzing the Shearing-Layer Concept Applied to Urban Green System
Authors: S. Pushkar, O. Verbitsky
Abstract:
Currently, green rating systems are mainly utilized for correctly sizing mechanical and electrical systems, which have short lifetime expectancies. In these systems, passive solar and bio-climatic architecture, which have long lifetime expectancies, are neglected. Urban rating systems consider buildings and services in addition to neighborhoods and public transportation as integral parts of the built environment. The main goal of this study was to develop a more consistent point allocation system for urban building standards by using six different lifetime shearing layers: Site, Structure, Skin, Services, Space, and Stuff, each reflecting distinct environmental damages. This shearing-layer concept was applied to internationally well-known rating systems: Leadership in Energy and Environmental Design (LEED) for Neighborhood Development, BRE Environmental Assessment Method (BREEAM) for Communities, and Comprehensive Assessment System for Building Environmental Efficiency (CASBEE) for Urban Development. The results showed that LEED for Neighborhood Development and BREEAM for Communities focused on long-lifetime-expectancy building designs, whereas CASBEE for Urban Development gave equal importance to the Building and Service Layers. Moreover, although this rating system was applied using a building-scale assessment, “Urban Area + Buildings” focuses on a short-lifetime-expectancy system design, neglecting to improve the architectural design by considering bio-climatic and passive solar aspects.Keywords: green rating system, urban community, sustainable design, standardization, shearing-layer concept, passive solar architecture
Procedia PDF Downloads 57925090 Artificial Intelligence and Personhood: An African Perspective
Authors: Meshandren Naidoo, Amy Gooden
Abstract:
The concept of personhood extending from the moral status of an artificial intelligence system has been explored – but predominantly from a Western conception of personhood. African personhood, however, is distinctly different from Western personhood in that communitarianism is central rather than individualism. Given the decolonization projects happening in Africa, it’s paramount to consider these views. This research demonstrates that the African notion of personhood may extend for an artificial intelligent system where the pre-conditions are met.Keywords: artificial intelligence, ethics, law, personhood, policy
Procedia PDF Downloads 13025089 Technical Aspects of Closing the Loop in Depth-of-Anesthesia Control
Authors: Gorazd Karer
Abstract:
When performing a diagnostic procedure or surgery in general anesthesia (GA), a proper introduction and dosing of anesthetic agents are one of the main tasks of the anesthesiologist. However, depth of anesthesia (DoA) also seems to be a suitable process for closed-loop control implementation. To implement such a system, one must be able to acquire the relevant signals online and in real-time, as well as stream the calculated control signal to the infusion pump. However, during a procedure, patient monitors and infusion pumps are purposely unable to connect to an external (possibly medically unapproved) device for safety reasons, thus preventing closed-loop control. The paper proposes a conceptual solution to the aforementioned problem. First, it presents some important aspects of contemporary clinical practice. Next, it introduces the closed-loop-control-system structure and the relevant information flow. Focusing on transferring the data from the patient to the computer, it presents a non-invasive image-based system for signal acquisition from a patient monitor for online depth-of-anesthesia assessment. Furthermore, it introduces a UDP-based communication method that can be used for transmitting the calculated anesthetic inflow to the infusion pump. The proposed system is independent of a medical device manufacturer and is implemented in Matlab-Simulink, which can be conveniently used for DoA control implementation. The proposed scheme has been tested in a simulated GA setting and is ready to be evaluated in an operating theatre. However, the proposed system is only a step towards a proper closed-loop control system for DoA, which could routinely be used in clinical practice.Keywords: closed-loop control, depth of anesthesia (DoA), modeling, optical signal acquisition, patient state index (PSi), UDP communication protocol
Procedia PDF Downloads 21725088 Evaluating Performance of an Anomaly Detection Module with Artificial Neural Network Implementation
Authors: Edward Guillén, Jhordany Rodriguez, Rafael Páez
Abstract:
Anomaly detection techniques have been focused on two main components: data extraction and selection and the second one is the analysis performed over the obtained data. The goal of this paper is to analyze the influence that each of these components has over the system performance by evaluating detection over network scenarios with different setups. The independent variables are as follows: the number of system inputs, the way the inputs are codified and the complexity of the analysis techniques. For the analysis, some approaches of artificial neural networks are implemented with different number of layers. The obtained results show the influence that each of these variables has in the system performance.Keywords: network intrusion detection, machine learning, artificial neural network, anomaly detection module
Procedia PDF Downloads 34325087 Stigmatization of Individuals Who Receive Mental Health Treatment and the Role of Social Media: A Cross-Generational Cohort Design and Extension
Authors: Denise Ben-Porath, Tracy Masterson
Abstract:
In the past, individuals who struggled with and sought treatment for mental health difficulties were stigmatized. However, the current generation holds more open attitudes around mental health issues. Indeed, public figures such as Demi Lovato, Naomi Osaka, and Simone Biles have taken to social media to break the silence around mental health, discussing their own struggles and the benefits of treatment. Thus, there is considerable reason to believe that this generation would hold fewer stigmatizing attitudes toward mental health difficulties and treatment compared to previous ones. In this study, we explored possible changes in stigma on mental health diagnosis and treatment seeking behavior between two generations: Gen Z, the current generation, and Gen X, those born between 1965-1980. It was hypothesized that Gen Z would hold less stigmatizing views on mental illness than Gen X. To examine possible changes in stigma attitudes between these two generations, we conducted a cross-generational cohort design by using the same methodology employed 20 years ago from the Ben-Porath (2002) study. Thus, participants were randomly assigned to read one of the following four case vignettes employed in the Ben-Porath (2002) study: (a) “Tom” who has received psychotherapy due to depression (b) “Tom” who has been depressed but received no psychological help, (c) “Tom” who has received medical treatment due to a back pain, or (d) “Tom” who had a back pain but did not receive medical attention. After reading the vignette, participants rated “Tom” on various personality dimensions using the IFQ Questionnaire and answered questions about their frequency of social media use and willingness to seek mental health treatment on a scale from 1-10. Identical to the results 20 years prior, a significant main effect was found for diagnosis with “Tom” being viewed in more negative terms when he was described as having depression vs. a medical condition (back pain) [F (1, 376) = 126.53, p < .001]. However, in the study conducted 20 years earlier, a significant interaction was found between diagnosis and help-seeking behavior [F (1, 376) = 8.28, p < .005]. Specifically, “Tom” was viewed in the most negative terms when described as depressed and seeking treatment. Alternatively, the current study failed to find a significant interaction between depression and help seeking behavior. These findings suggest that while individuals who hold a mental health diagnosis may still be stigmatized as they were 20 years prior, seeking treatment for mental health issues may be less so. Findings are discussed in the context of social media use and its impact on destigmatization.Keywords: stigma, mental illness, help-seeking, social media
Procedia PDF Downloads 81