Search results for: compromise
168 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 436167 Mediation in Turkey
Authors: Ibrahim Ercan, Mustafa Arikan
Abstract:
In recent years, alternative dispute resolution methods have attracted the attention of many country’s legislators. Instead of solving the disputes by litigation, putting the end to a dispute by parties themselves is more important for the preservation of social peace. Therefore, alternative dispute resolution methods (ADR) have been discussed more intensively in Turkey as well as the whole world. After these discussions, Mediation Act was adopted on 07.06.2012 and entered into force on 21.06.2013. According to the Mediation Act, it is only possible to mediate issues arising from the private law. Also, it is not compulsory to go to mediation in Turkish law, it is optional. Therefore, the parties are completely free to choose mediation method in dispute resolution. Mediators need to be a lawyer with experience in five years. Therefore, it is not possible to be a mediator who is not lawyers. Beyond five years of experience, getting education and success in exams about especially body language and psychology is also very important to be a mediator. If the parties compromise as a result of mediation, a document is issued. This document will also have the ability to exercising availability under certain circumstances. Thus, the parties will not need to apply to the court again. On the contrary, they will find the opportunity to execute this document, so they can regain their debts. However, the Mediation Act has entered into force in a period of nearly two years of history; it is possible to say that the interest in mediation is not at the expected level. Therefore, making mediation mandatory for some disputes has been discussed recently. At this point, once the mediation becomes mandatory and good results follows it, this institution will be able to find a serious interest in Turkey. Otherwise, if the results will not be satisfying, the mediation method will be removed.Keywords: alternative dispute resolution methods, mediation act, mediation, mediator, mediation in Turkey
Procedia PDF Downloads 363166 Meteosat Second Generation Image Compression Based on the Radon Transform and Linear Predictive Coding: Comparison and Performance
Authors: Cherifi Mehdi, Lahdir Mourad, Ameur Soltane
Abstract:
Image compression is used to reduce the number of bits required to represent an image. The Meteosat Second Generation satellite (MSG) allows the acquisition of 12 image files every 15 minutes. Which results a large databases sizes. The transform selected in the images compression should contribute to reduce the data representing the images. The Radon transform retrieves the Radon points that represent the sum of the pixels in a given angle for each direction. Linear predictive coding (LPC) with filtering provides a good decorrelation of Radon points using a Predictor constitute by the Symmetric Nearest Neighbor filter (SNN) coefficients, which result losses during decompression. Finally, Run Length Coding (RLC) gives us a high and fixed compression ratio regardless of the input image. In this paper, a novel image compression method based on the Radon transform and linear predictive coding (LPC) for MSG images is proposed. MSG image compression based on the Radon transform and the LPC provides a good compromise between compression and quality of reconstruction. A comparison of our method with other whose two based on DCT and one on DWT bi-orthogonal filtering is evaluated to show the power of the Radon transform in its resistibility against the quantization noise and to evaluate the performance of our method. Evaluation criteria like PSNR and the compression ratio allows showing the efficiency of our method of compression.Keywords: image compression, radon transform, linear predictive coding (LPC), run lengthcoding (RLC), meteosat second generation (MSG)
Procedia PDF Downloads 418165 Judicial Personality: Observing the Acceptable Limits
Authors: Sonia Anand Knowlton
Abstract:
In many ways, judges can express their personality within and beyond their role as a judge. Judges can use their unique backgrounds and life experiences to inform their legal reasons and can also participate in certain extrajudicial activities outside of their role on the bench. For many judges, the line between the expression of this judicial personality, on the one hand, and the consequence of jeopardizing the public’s perception of their impartiality, on the other, is ambiguous if not wholly unclear. In the famous Canadian decision R v RDS, for instance, a Black judge who was hearing a case about police violence against a Black person was accused of being biased after she acknowledged that her community’s racial dynamics may have impacted the police’s conduct. Many within the legal community might find comfort in the belief that judges do not need to bring their ‘personality’ to the bench in order to uncover the law’s truths and impartially apply it. Indeed, and for a good reason, judges are often discouraged from allowing their personality to shine through in their role as a judge – because the expression of judicial personality can compromise the public perception of the impartiality of the administration of justice. This paper evaluates the theoretical constraints on the expression of judicial personality as a tool for legal decision-making and argues that judges from minority groups are held to a higher level of impartiality. Specifically, minority judges are disproportionately constrained from 1) using life experience to apply the law and 2) engaging in certain extrajudicial activities.Keywords: judging, legal decision making, judicial personality, extrajudicial activities
Procedia PDF Downloads 73164 Investigating the Dynamic Response of the Ballast
Authors: Osama Brinji, Wing Kong Chiu, Graham Tew
Abstract:
Understanding the stability of rail ballast is one of the most important aspects in the railways. An unstable track may cause some issues such as unnecessary vibration and ultimately loss of track quality. The track foundation plays an important role in the stabilization of the railway. The dynamic response of rail ballast in the vicinity of the rail sleeper can affect the stability of the rail track and this has not been studied in detail. A review of literature showed that most of the works focused on the area under the concrete sleeper. Although there are some theories about the shear (longitudinal) effect of the rail ballast, these have not properly been studied and hence are not well understood. The stability of a rail track will depend on the compactness of the ballast in its vicinity. This paper will try to determine the dynamic response of the ballast to identify its resonant behaviour. This preliminary research is one of several studies that examine the vibration response of the granular materials. The main aim is to use this information for future design of sleepers to ensure that any dynamic response of the sleeper will not compromise the state of compactness of the ballast. This paper will report on the dependence of damping and the natural frequency of the ballast as a function of depth and distance from the point of excitation introduced through a concrete block. The concrete block is used to simulate a sleeper and the ballast is simulated with gravel. In spite of these approximations, the results presented in the paper will show an agreement with theories and the assumptions that are used in study the mechanical behaviour of the rail ballast.Keywords: ballast, dynamic response, sleeper, stability
Procedia PDF Downloads 500163 The Influence of Audio on Perceived Quality of Segmentation
Authors: Silvio Ricardo Rodrigues Sanches, Bianca Cogo Barbosa, Beatriz Regina Brum, Cléber Gimenez Corrêa
Abstract:
To evaluate the quality of a segmentation algorithm, the authors use subjective or objective metrics. Although subjective metrics are more accurate than objective ones, objective metrics do not require user feedback to test an algorithm. Objective metrics require subjective experiments only during their development. Subjective experiments typically display to users some videos (generated from frames with segmentation errors) that simulate the environment of an application domain. This user feedback is crucial information for metric definition. In the subjective experiments applied to develop some state-of-the-art metrics used to test segmentation algorithms, the videos displayed during the experiments did not contain audio. Audio is an essential component in applications such as videoconference and augmented reality. If the audio influences the user’s perception, using only videos without audio in subjective experiments can compromise the efficiency of an objective metric generated using data from these experiments. This work aims to identify if the audio influences the user’s perception of segmentation quality in background substitution applications with audio. The proposed approach used a subjective method based on formal video quality assessment methods. The results showed that audio influences the quality of segmentation perceived by a user.Keywords: background substitution, influence of audio, segmentation evaluation, segmentation quality
Procedia PDF Downloads 115162 Role of Nano Gelatin and Hydrogel Based Scaffolds in Odontogenic Differentiation of Human Dental Pulp Stem Cells
Authors: Husain S. Yawer, Vasim Raja Panwar, Nidhi Priya
Abstract:
The objective of this study is to evaluate and compare the role of nano-gelatin and Bioengineered Scaffolds on the attachment, proliferation, and osteogenic differentiation of human dental pulp stem cells (DPSCs). Tooth decay and early fall have each been one of the most prevailing dental disorders which cause physical and emotional suffering and compromise the patient's quality of life. The design of novel scaffolding materials will be based on mimicking the architecture of natural dental extracellular matrix which may provide as in vivo environments for proper cell growth. This methodology will involve the combination of nano-fibred gelatin as well as biodegradable hydrogel based tooth scaffold. We have measured and optimized the Dental Pulp Stem Cells growth profile in cultures carried out on collagen-coated plastic surface, however, for tissue regeneration study, we aim to develop an enhanced microenvironment for stem cell growth and dental tissue regeneration. We believe biomimetic cell adhesion and scaffolds might provide a near in vivo growth environment for proper growth and differentiation of human DPSCs, which further help in dentin/pulp tissue regeneration.Keywords: nano-gelatin, stem cells, dental pulp, scaffold
Procedia PDF Downloads 328161 Comprehensive Review of Adversarial Machine Learning in PDF Malware
Authors: Preston Nabors, Nasseh Tabrizi
Abstract:
Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion
Procedia PDF Downloads 37160 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 263159 Antibacterial Activities, Chemical Constitutes and Acute Toxicity of Peganum Harmala L. Essential Oil
Authors: Samy Selim
Abstract:
Natural products are still major sources of innovative therapeutic agents for various conditions, including infectious diseases. Peganum harmala L. oil had wide range uses as traditional medicinal plants. The current study was designed to evaluate the antibacterial activity of P. harmala essential oil. The chemical constitutes and toxicity of these oils was also determined to obtain further information on the correlation between the chemical contents and antibacterial activity. The antibacterial effect of the essential oils of P. harmala oil was studied against some foodborne pathogenic bacteria species. The oil of plant was subjected to gas chromatography-mass spectrometry (GC/MS). The impact of oils administration on the change in rate of weight gain and complete blood picture in hamsters were investigated. P. harmala oil had strong antibacterial effect against bacterial species especially at minimum inhibitory concentration (MIC) less than 75.0 μg/ml. From the oil of P. harmala, forty one compounds were identified, and the major constituent was 1-hexyl-2-nitrocyclohexane (9.07%). Acute toxicity test was performed on hamsters and showed complete survival after 14 days, and there were no toxicity symptoms occurred. This study demonstrated that these essential oils seemed to be destitute of toxic effect which could compromise the medicinal use of these plants in folk medicine.Keywords: analysis mass spectrometry, antibacterial activities, acute toxicity, chemical constitutes, gas chromatography, weight gain, Peganum harmala
Procedia PDF Downloads 481158 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study
Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple
Abstract:
There is a dramatic surge in the adoption of machine learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. With the application of learning methods in such diverse domains, artificial intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been on developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and three defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt machine learning techniques in security-critical areas such as the nuclear industry without rigorous testing since they may be vulnerable to adversarial attacks. While common defence methods can effectively defend against different attacks, none of the three considered can provide protection against all five adversarial attacks analysed.Keywords: adversarial machine learning, attacks, defences, nuclear industry, crack detection
Procedia PDF Downloads 157157 Innovative Tool for Improving Teaching and Learning
Authors: Izharul Haq
Abstract:
Every one of us seek to aspire to gain quality education. The biggest stake holders are students who labor through years acquiring knowledge and skill to help them prepare for their career. Parents spend a fortune on their children’s education. Companies spend billions of dollars to enhance standards by developing new education products and services. Quality education is the golden key to a long lasting prosperity for the individual and the nation. But unfortunately, education standards are continuously deteriorating and it has become a global phenomenon. Unfortunately, teaching is often described as a ‘popularity contest’ and those teachers who are usually popular with students are often those who compromise teaching to appease students. Such teachers also ‘teach-to-the-test’ ensuring high test scores. Such teachers, hence, receive good student rating. Teachers who are conscientious, rigorous and thorough are often the victims of good appraisal. Government and private organizations are spending billions of dollars trying to capture the characteristics of a good teacher. But the results are still vague and inconclusive. At present there is no objective way to measure teaching effectiveness. In this paper we present an innovative method to objectively measure teaching effectiveness using a new teaching tool (TSquare). The TSquare tool used in the study is practical, easy to use, cost effective and requires no special equipment to implement. Hence it has a global appeal for poor and the rich countries alike.Keywords: measuring teaching effectiveness, quality in education, student learning, teaching styles
Procedia PDF Downloads 295156 Police Mothers at Home: Police Work and Danger-Protection Parenting Practices
Authors: Tricia Agocs, Debra Langan, Carrie B. Sanders
Abstract:
Studies of the challenges faced by women in policing have paid little attention to the specific experiences of Policewomen who are mothers. Guided by critical theorizing on the gendered nature of the police culture and domestic labor, 16 police officer mothers in Ontario, Canada, were interviewed. Our qualitative analyses explore their experiences of the “lion’s share” of domestic labor; the organizational, cultural, and operational features of policing; and the challenges of child care, and examine how these combine to foster particular stresses. In contrast to intensive mothering approaches that rely on the advice of external experts, our participants work to protect children by carefully constructing stories and asking questions that are based on their own on-the-job experiences with dangerous and/or abhorrent situations. As such, they engage in danger-protection parenting practices to prevent their children from becoming victims or offenders. Our research extends the theorizing on intensive/extensive mothering practices, builds on the scholarship on policing, and adds to the literature on women in nonstandard occupations. This sociological analysis of police mothers’ experiences and practices underscores the importance of understanding and working to change the social contexts, at work and at home, that compromise the well-being of police mothers and other emergency-response workers.Keywords: policewomen, mothers, parenting, danger, qualitative research
Procedia PDF Downloads 552155 Intimate Partner Offenders and Prevalent Affective-Cognitive Functioning: A Study with Inmates
Authors: Alexandra Serra, Nadia Torrão, Rui G. Serôdio, José A. Lima
Abstract:
The present study aimed to evaluate the incidence and the prevalence of domestic violence legitimatory beliefs, emotional regulation difficulties and, early maladaptive schemas regarding intimidate partner violence in a sample of 50 Portuguese inmates. As expected, results show high levels of legitimatory beliefs, significant difficulties of emotional regulation and a set of high levels of early maladaptive schemas that clearly compromise the inmates affective-cognitive functioning. The most prevalent set of maladaptive schemas are associated with depression, anxiety, hostility, reduced ability to empathize and, dependence on the approval of others, which, combined, may trigger aggressive responses towards the intimate’s partner. Being victimized in their childhood and having committing murder are not differentiating factors on the measures we analyzed, but alcohol consumption may be associated with an intensification of domestic violence legitimatory beliefs. In the discussion of our findings, we compare the pattern of the psychosocial measures we used with the equivalent results obtained with convicted individuals that attend a community compulsory program, specifically designed for domestic violence perpetrators. We also highlight the importance of implementing specialized interventions in prison settings focusing on an evidence-based-practice.Keywords: affective-cognitive functioning, intimate partner offenders, psychological research with inmates
Procedia PDF Downloads 415154 Mobile Health Apps Can Cause More Harm Due to Health Anxiety Than Good
Authors: Malik Takreem Ahmad, Pablo Lamata, Rasi Mizori
Abstract:
Background: In recent years, mobile health apps have grown in popularity as a means for people to track and manage their health. While there is increasing worry that these applications may potentially contribute to the emergence of health anxiety, they can also help to encourage healthy behaviours and provide access to health information. Objective: The objective of this literature review is to look at available mhealth apps and critically evaluate the compromise between reassurance and anxiety. Methodology: A literature review was carried out to analyse the effects of mhealth apps on the creation of health anxiety within the general population. PubMed and SCOPUS were used to search for relevant articles, and abstracts were screened using inclusion criteria of the terms: mhealth apps; e-Health; healthcare apps; cyberchondria; Health anxiety; illness anxiety disorder. A total of 27 studies were included in the review. Results and discussion: The findings suggest a direct relationship between mobile health app use and health anxiety. The impact of mobile health apps on health anxiety may depend on how they are used - individuals receiving a constant stream of health-related information may trigger unnecessary concern about one's health. The need for more regulation and oversight is identified, which can lead to app quality and safety consistency. There are also concerns about data security and privacy and the resulting "digital gap" for individuals without mobiles or internet access. Conclusion: While health apps can be valuable tools for managing and tracking health, individuals need to use them in a balanced and informed way to avoid increased anxiety.Keywords: mobile health, mhealth apps, cyberchondria, health anxiety
Procedia PDF Downloads 88153 Formulation and in Vitro Characterization of Bioactives Loaded Polymeric Nanoparticle Incorporated into Multiphase Hydrogel System for the Treatment of Infected Burn Wound
Authors: Rajni Kant Panik, Deependra Singh, Manju Singh
Abstract:
Despite significant advances in the treatment of severe burn injury, infection and sepsis persist as frequent causes of morbidity and mortality for burn victims due to extensive compromise of the skin and contiguous tissue that serve as a protective barrier against microbial invasion. In the setting of a burn wound infection, Staphylococcus aureus is the most commonly isolated pathogens from bloodstream infections in burn care hospitals. We aimed to develop a biocompatible system of Poly vinyl alcohol (PVA)-sodium alginate hydrogel carrying multiple drugs- catalase and mupirocin in controlled manner for effective and complete burn wound healing. PLGA nanoparticles of Catalase and mupirocin were prepared by homogenization method and optimized system was incorporated in PVA-sodium alginate slurry. PVA-sodium alginate hydrogels were prepared by freeze thaw method. The prepared dispersion was casted into films to prepare multiphase hydrogel system and characterized by in vitro and in vivo studies. The study clearly showed the beneficial effect of antioxidant enzyme and antibiotic in the treatment of infected burn wound, as evidenced by the reduced incidence of wound infection and the shortening of healing time.Keywords: burn wound, catalase, mupirocin, wound healing
Procedia PDF Downloads 501152 Prevalent Affective-Cognitive Functioning of Intimate Partner Offenders: A study with Inmates
Authors: Alexandra Serra, Nair Torrão, Rui G. Serôdio, José A. Lima
Abstract:
The present study aimed to evaluate the incidence and the prevalence of domestic violence legitimatory beliefs, emotional regulation difficulties and, early maladaptive schemas regarding intimidate partner violence in a sample of 50 Portuguese inmates. As expected, results show high levels of legitimatory beliefs, significant difficulties of emotional regulation and a set of high levels of early maladaptive schemas that clearly compromise the inmates affective-cognitive functioning. The most prevalent set of maladaptive schemas are associated with depression, anxiety, hostility, reduced ability to empathize and, dependence on the approval of others, which, combined, may trigger aggressive responses towards the intimate’s partner. Being victimized in their childhood and having committing murder are not differentiating factors on the measures we analyzed, but alcohol consumption may be associated with an intensification of domestic violence legitimatory beliefs. In the discussion of our findings, we compare the pattern of the psychosocial measures we used with the equivalent results obtained with convicted individuals that attend a community compulsory program, specifically designed for domestic violence perpetrators. We also highlight the importance of implementing specialized interventions in prison settings focusing on an evidence-based-practice.Keywords: domestic violence, intimate partner offenders, incidence and prevalence of legitimatory beliefs, Portuguese inmates
Procedia PDF Downloads 530151 Evaluating Language Loss Effect on Autobiographical Memory by Examining Memory Phenomenology in Bilingual Speakers
Authors: Anastasia Sorokina
Abstract:
Graduate language loss or attrition has been well documented in individuals who migrate and become emersed in a different language environment. This phenomenon of first language (L1) attrition is an example of non-pathological (not due to trauma) and can manifest itself in frequent pauses, search for words, or grammatical errors. While the widely experienced loss of one’s first language might seem harmless, there is convincing evidence from the disciplines of Developmental Psychology, Bilingual Studies, and even Psychotherapy that language plays a crucial role in the memory of self. In fact, we remember, store, and share personal memories with the help of language. Dual-Coding Theory suggests that language memory code deterioration could lead to forgetting. Yet, no one has investigated a possible connection between language loss and memory. The present study aims to address this research gap by examining a corpus of 1,495 memories of Russian-English bilinguals who are on a continuum of L1 (first language) attrition. Since phenomenological properties capture how well a memory is remembered, the following descriptors were selected - vividness, ease of recall, emotional valence, personal significance, and confidence in the event. A series of linear regression statistical analyses were run to examine the possible negative effects of L1 attrition on autobiographical memory. The results revealed that L1 attrition might compromise perceived vividness and confidence in the event, which is indicative of memory deterioration. These findings suggest the importance of heritage language maintenance in immigrant communities who might be forced to assimilate as language loss might negatively affect the memory of self.Keywords: L1 attrition, autobiographical memory, language loss, memory phenomenology, dual coding
Procedia PDF Downloads 118150 Alumina Supported Cu-Mn-Cr Catalysts for CO and VOCs oxidation
Authors: Krasimir Ivanov, Elitsa Kolentsova, Dimitar Dimitrov, Petya Petrova, Tatyana Tabakova
Abstract:
This work studies the effect of chemical composition on the activity and selectivity of γ–alumina supported CuO/ MnO2/Cr2O3 catalysts toward deep oxidation of CO, dimethyl ether (DME) and methanol. The catalysts were prepared by impregnation of the support with an aqueous solution of copper nitrate, manganese nitrate and CrO3 under different conditions. Thermal, XRD and TPR analysis were performed. The catalytic measurements of single compounds oxidation were carried out on continuous flow equipment with a four-channel isothermal stainless steel reactor. Flow-line equipment with an adiabatic reactor for simultaneous oxidation of all compounds under the conditions that mimic closely the industrial ones was used. The reactant and product gases were analyzed by means of on-line gas chromatographs. On the basis of XRD analysis it can be concluded that the active component of the mixed Cu-Mn-Cr/γ–alumina catalysts consists of at least six compounds – CuO, Cr2O3, MnO2, Cu1.5Mn1.5O4, Cu1.5Cr1.5O4 and CuCr2O4, depending on the Cu/Mn/Cr molar ratio. Chemical composition strongly influences catalytic properties, this influence being quite variable with regards to the different processes. The rate of CO oxidation rapidly decrease with increasing of chromium content in the active component while for the DME was observed the reverse trend. It was concluded that the best compromise are the catalysts with Cu/(Mn + Cr) molar ratio 1:5 and Mn/Cr molar ratio from 1:3 to 1:4.Keywords: Cu-Mn-Cr oxide catalysts, volatile organic compounds, deep oxidation, dimethyl ether (DME)
Procedia PDF Downloads 367149 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults
Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer
Abstract:
Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security
Procedia PDF Downloads 127148 Manufacturing and Characterization of Bioresorbable Self-Reinforced PLA Composites for Bone Applications
Authors: Carolina Pereira Lobato Costa, Cristina Pascual-González, Monica Echeverry, Javier LLorca, Carlos Gonzáléz, Juan Pedro Fernández-Bláquez
Abstract:
Although the potential of PLA self-reinforced composites for bone applications, not much literature addresses optimal manufacturing conditions. In this regard, this paper describes the woven self-reinforced PLA composites manufacturing processes: the commingling of yarns, weaving, and hot pressing and characterizes the manufactured laminates. Different structures and properties can be achieved by varying the hot compaction process parameters (pressure, holding time, and temperature). The specimens manufactured were characterized in terms of thermal properties (DSC), microstructure (C-scan optical microscope and SEM), strength (tensile test), and biocompatibility (MTT assays). Considering the final device, 155 ℃ for 10 min at 2 MPa act as the more appropriate hot pressing parameters. The laminate produced with these conditions has few voids/porosity, a tensile strength of 30.39 ± 1.21 MPa, and a modulus of 4.09 ± 0.24 GPa. Subsequently to the tensile testing was possible to observe fiber pullout from the fracture surfaces, confirming that this material behaves as a composite. From the results, no single laminate can fulfill all the requirements, being necessary to compromise in function of the priority property. Further investigation is required to improve materials' mechanical performance. Subsequently, process parameters and materials configuration can be adjusted depending on the place and type of implant to suit its function.Keywords: woven fabric, self-reinforced polymer composite, poly(lactic acid), biodegradable
Procedia PDF Downloads 193147 Jejunostomy and Protective Ileostomy in a Patient with Massive Necrotizing Enterocolitis: A Case Report
Authors: Rafael Ricieri, Rogerio Barros
Abstract:
Objective: This study is to report a case of massive necrotizing enterocolitis in a six-month-old patient, requiring ileostomy and protective jejunostomy as a damage control measure in the first exploratory laparotomy surgery in massive enterocolitis without a previous diagnosis. Methods: This study is a case report of success in making and closing a protective jejunostomy. However, the low number of publications on this staged and risky measure of surgical resolution encouraged the team to study the indication and especially the correct time for closing the patient's protective jejunostomy. The main study instrument will be the six-month-old patient's medical record. Results: Based on the observation of the case described, it was observed that the time for the closure of the described procedure (protective jejunostomy) varies according to the level of compromise of the health status of your patient and of an individual of each person. Early closure, or failure to close, can lead to a favorable problem for the patient since several problems can result from this closure, such as new intestinal perforations, hydroelectrolyte disturbances. Despite the risk of new perforations, we suggest closing the protective jejunostomy around the 14th day of the procedure, thus keeping the patient on broad-spectrum antibiotic therapy and absolute fasting, thus reducing the chances of new intestinal perforations. Associated with the closure of the jejunostomy, a gastric tube for decompression is necessary, and care in an intensive care unit and electrolyte replacement is necessary to maintain the stability of the case.Keywords: jejunostomy, ileostomy, enterocolitis, pediatric surgery, gastric surgery
Procedia PDF Downloads 83146 Use of Polymeric Materials in the Architectural Preservation
Authors: F. Z. Benabid, F. Zouai, A. Douibi, D. Benachour
Abstract:
These Fluorinated polymers and polyacrylics have known a wide use in the field of historical monuments. PVDF provides a great easiness to processing, a good UV resistance and good chemical inertia. Although the quality of physical characteristics of the PMMA and its low price with a respect to PVDF, its deterioration against UV radiations limits its use as protector agent for the stones. On the other hand, PVDF/PMMA blend is a compromise of a great development in the field of architectural restoration, since it is the best method in term of quality and price to make new polymeric materials having enhanced properties. Films of different compositions based on the two polymers within an adequate solvent (DMF) were obtained to perform an exposition to artificial ageing and to the salted fog, a spectroscopic analysis (FTIR and UV) and optical analysis (refractive index). Based on its great interest in the field of building, a variety of standard tests has been elaborated for the first time at the central laboratory of ENAP (Souk-Ahras) in order to evaluate our blend performance. The obtained results have allowed observing the behavior of the different compositions of the blend under various tests. The addition of PVDF to PMMA enhances the properties of this last to know the exhibition to the natural and artificial ageing and to the saline fog. On the other hand, PMMA enhances the optical properties of the blend. Finally, 70/30 composition of the blend is in concordance with results of previous works and it is the adequate proportion for an eventual application.Keywords: blend, PVDF, PMMA, preservation, historic monuments
Procedia PDF Downloads 308145 How Sustainable is Tourism Architecture in Uganda
Authors: Goodman Conrad Kazoroa
Abstract:
Among the most remarkable socioeconomic phenomena of the post-World War II era has been the expansion of the global tourism industry. Intensifying tourism activity is continuing to affect more and more places and there can no longer be any doubt as to the potential of this sector to affect fundamental economic, social-cultural and environmental change. A phenomenon with far reaching effects like this needs to be carefully controlled and planned so as not to compromise the chances for the future generations to enjoy this resource, therefore the issue of tourism sustainability, as a result, is unveiled. The concept of sustainable tourism remains vague in Uganda as the country has seen an increase in resorts, hotels and lodges especially in most of Uganda’s ecologically vulnerable areas National Parks. To many, sustainable tourism it is merely the application of the sustainable development idea to the sector of tourism. To others, it is the conservation of the environment and its natural resources, realising and appropriately using them to achieve sustainable built environments that promote tourism. Architecture and the built environment can be the first means to link the global dimension of this phenomenon of sustainable tourism to its local implications. The aim of this paper was to critically analyse the extent to which sustainability related considerations have been pursued in the built environments for Uganda’s national parks as means to achieving sustainable tourism. This was achieved by use of a sustainable architecture rating tool that was modified to fit Uganda’s context. The results of this are presented as the final results of the study. There are many examples of sustainable tourism resorts, or what tourism managers and developers claim are sustainable tourism resorts throughout the country. This paper reveals the truth, that is, true sustainable tourism resorts are very few and far between.Keywords: sustainable tourism, tourism architecture, sustainable architecture, sustainable tourism resorts
Procedia PDF Downloads 380144 Energy Conservation in Heat Exchangers
Authors: Nadia Allouache
Abstract:
Energy conservation is one of the major concerns in the modern high tech era due to the limited amount of energy resources and the increasing cost of energy. Predicting an efficient use of energy in thermal systems like heat exchangers can only be achieved if the second law of thermodynamics is accounted for. The performance of heat exchangers can be substantially improved by many passive heat transfer augmentation techniques. These letters permit to improve heat transfer rate and to increase exchange surface, but on the other side, they also increase the friction factor associated with the flow. This raises the question of how to employ these passive techniques in order to minimize the useful energy. The objective of this present study is to use a porous substrate attached to the walls as a passive enhancement technique in heat exchangers and to find the compromise between the hydrodynamic and thermal performances under turbulent flow conditions, by using a second law approach. A modified k- ε model is used to simulating the turbulent flow in the porous medium and the turbulent shear flow is accounted for in the entropy generation equation. A numerical modeling, based on the finite volume method is employed for discretizing the governing equations. Effects of several parameters are investigated such as the porous substrate properties and the flow conditions. Results show that under certain conditions of the porous layer thickness, its permeability, and its effective thermal conductivity the minimum rate of entropy production is obtained.Keywords: second law approach, annular heat exchanger, turbulent flow, porous medium, modified model, numerical analysis
Procedia PDF Downloads 285143 Alumina Supported Copper-Manganese Catalysts for Combustion of Exhaust Gases: Effect of Preparation Method
Authors: Krasimir Ivanov, Elitsa Kolentsova, Dimitar Dimitrov
Abstract:
The development of active and stable catalysts without noble metals for low temperature oxidation of exhaust gases remains a significant challenge. The purpose of this study is to determine the influence of the preparation method on the catalytic activity of the supported copper-manganese mixed oxides in terms of VOCs oxidation. The catalysts were prepared by impregnation of γ-Al2O3 with copper and manganese nitrates and acetates and the possibilities for CO, CH3OH and dimethyl ether (DME) oxidation were evaluated using continuous flow equipment with a four-channel isothermal stainless steel reactor. Effect of the support, Cu/Mn mole ratio, heat treatment of the precursor and active component loading were investigated. Highly active alumina supported Cu-Mn catalysts for CO and VOCs oxidation were synthesized. The effect of preparation conditions on the activity behavior of the catalysts was discussed. The synergetic interaction between copper and manganese species increases the activity for complete oxidation over mixed catalysts. Type of support, calcination temperature and active component loading along with catalyst composition are important factors, determining catalytic activity. Cu/Mn molar ratio of 1:5, heat treatment at 450oC and 20 % active component loading are the best compromise for production of active catalyst for simultaneous combustion of CO, CH3OH and DME.Keywords: copper-manganese catalysts, CO, VOCs oxidation, exhaust gases
Procedia PDF Downloads 410142 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks
Authors: Walid Abdallah, Noureddine Boudriga
Abstract:
Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based
Procedia PDF Downloads 657141 Numerical Analysis of the Aging Effects of RC Shear Walls Repaired by CFRP Sheets: Application of CEB-FIP MC 90 Model
Authors: Yeghnem Redha, Guerroudj Hicham Zakaria, Hanifi Hachemi Amar Lemiya, Meftah Sid Ahmed, Tounsi Abdelouahed, Adda Bedia El Abbas
Abstract:
Creep deformation of concrete is often responsible for excessive deflection at service loads which can compromise the performance of elements within a structure. Although laboratory test may be undertaken to determine the deformation properties of concrete, these are time-consuming, often expensive and generally not a practical option. Therefore, relatively simple empirically design code models are relied to predict the creep strain. This paper reviews the accuracy of creep and shrinkage predictions of reinforced concrete (RC) shear walls structures strengthened with carbon fibre reinforced polymer (CFRP) sheets, which is characterized by a widthwise varying fibre volume fraction. This review is yielded by CEB-FIB MC90 model. The time-dependent behavior was investigated to analyze their static behavior. In the numerical formulation, the adherents and the adhesives are all modelled as shear wall elements, using the mixed finite element method. Several tests were used to dem¬onstrate the accuracy and effectiveness of the proposed method. Numerical results from the present analysis are presented to illustrate the significance of the time-dependency of the lateral displacements.Keywords: RC shear walls strengthened, CFRP sheets, creep and shrinkage, CEB-FIP MC90 model, finite element method, static behavior
Procedia PDF Downloads 307140 Immigration without Settlement: Causes and Consequences of Exclusionary Migration Regime in East Asia
Authors: Yen-Fen Tseng
Abstract:
Studying migration regimes enables one to identify clusters of countries with policy features in common. A few researchers have pointed out the origin of hardship experienced by foreign workers in Taiwan, Japan, and South Korea, stems from their exclusionary migration regime. This paper aims to understand the causes and consequences of the East Asia migration regime, exploring the common exclusionary policies features of Taiwan, Japan, and South Korea, focusing on the foreign labor policy. It will then present explanations as to factors shaping migration regime; the perspective of factors within political system is adopted, as opposed to political economy and pluralist society approach. In the minds of political elites across East Asia, there exists a powerful belief in mono-ethnicity, namely, the benefits of mono-ethnicity and the social ill of “minority problems”. Guest workers policies of various alterations become the compromise between the want for foreign labor and the desire to maintain mono-ethnicity. The paper discusses the absence of immigrant settlement and formation of ethnic communities as a result of the reluctant hosts. Migrant workers in these societies commonly suffer from irregular working conditions as well as unprotected rights out of their denied legality. The case of Taiwan will be presented with greater details, drawing on data from both first-hand and secondary sources.Keywords: migration regime, guest worker policies, East Asia, society
Procedia PDF Downloads 379139 Family Living with Adolescent Mother: The Consequential Effects of Adolescent Pregnancy
Authors: Somsakhool Neelasmith, Darunee Jongudomkarn, Rutja Phuphaibul
Abstract:
Adolescent pregnancy is a major global concern including Thailand, which has long adopted policies and solutions to prevent such problem. Family is one of the key strategies to drive policy achievement whereas the various families and regional differences will be challenges. This article reports a preliminary study finding using qualitative case study methods, aiming to explore the situation of families living with adolescent mother in the North Eastern of Thailand or ISAN. Data were collected by in-depth interview with six key informants; five adolescent mothers age 14- 19 years and one mother in law of adolescent mother during November to December of 2017. The preliminary suggests that firstly, the adolescent pregnancy was found to be one of the significant issues among most of the families and that adolescent mothers and their family perceived other families were also faced with this problem with despite different conditions. Secondly, the parents assumed simultaneous roles as both parents and grandparents when one of their adolescent girls became an adolescent mother. Lastly, when perceiving that their adolescent daughter became pregnant, families addressed this issue by compromise with the related parties to maintain family and social relationship. This situation can be a potential intractable problem to adolescents and their families. Families may suffer from adolescent pregnancy with respect to health, economy and other family burdens. Moreover, the national development may be affected or delayed since this group of people is considered promising human resource. It is therefore required to further conduct in-depth research to cope with this issue particularly about the policies related to adolescent pregnancy.Keywords: adolescent mother, adolescent pregnancy, consequential effect, family living with adolescent mother
Procedia PDF Downloads 276