Search results for: memory protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3511

Search results for: memory protection

2641 Sharing Experience in Authentic Learning for Mobile Security

Authors: Kai Qian, Lixin Tao

Abstract:

Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.

Keywords: mobile computing, Android, network, security, labware

Procedia PDF Downloads 407
2640 Trees in Different Vegetation Types of Mt. Hamiguitan Range, Davao Oriental, Mindanao Island, Philippines

Authors: Janece Jean A. Polizon, Victor B. Amoroso

Abstract:

Mt. Hamiguitan Range in Davao Oriental, Mindanao Island, Philippines is the only protected area with pygmy forest and a priority site for protection and conservation. This range harbors different vegetation types such as agroecosystem, dipterocarp forest, montane forest and mossy forest. This study was conducted to determine the diversity of trees and shrubs in different vegetation types of Mt. Hamiguitan Range. Transect walk and 16 sampling plots of 20 x 20 m were established in the different vegetation types. Specimens collected were classified and identified using the Flora Malesiana and type images. Assessment of status was determined based on International Union for the Conservation of Nature (IUCN). There were 223 species of trees, 141 genera and 71 families. Of the vegetation types, the pygmy forest obtained a comparatively high diversity value of H=1.348 followed by montane forest with H=1.284. The high species importance value (SIV) of Diospyros philippinensis for trees indicates that these species have an important role in regulating the stability of the ecosystem. The tree profile of the pygmy forest is different due to the ultramafic substrate causing the dwarfness of the trees. These forest types should be given high priority for protection and conservation.

Keywords: diversity, Mt Hamiguitan, vegetation, trees, shrubs

Procedia PDF Downloads 410
2639 Optimizing Parallel Computing Systems: A Java-Based Approach to Modeling and Performance Analysis

Authors: Maher Ali Rusho, Sudipta Halder

Abstract:

The purpose of the study is to develop optimal solutions for models of parallel computing systems using the Java language. During the study, programmes were written for the examined models of parallel computing systems. The result of the parallel sorting code is the output of a sorted array of random numbers. When processing data in parallel, the time spent on processing and the first elements of the list of squared numbers are displayed. When processing requests asynchronously, processing completion messages are displayed for each task with a slight delay. The main results include the development of optimisation methods for algorithms and processes, such as the division of tasks into subtasks, the use of non-blocking algorithms, effective memory management, and load balancing, as well as the construction of diagrams and comparison of these methods by characteristics, including descriptions, implementation examples, and advantages. In addition, various specialised libraries were analysed to improve the performance and scalability of the models. The results of the work performed showed a substantial improvement in response time, bandwidth, and resource efficiency in parallel computing systems. Scalability and load analysis assessments were conducted, demonstrating how the system responds to an increase in data volume or the number of threads. Profiling tools were used to analyse performance in detail and identify bottlenecks in models, which improved the architecture and implementation of parallel computing systems. The obtained results emphasise the importance of choosing the right methods and tools for optimising parallel computing systems, which can substantially improve their performance and efficiency.

Keywords: algorithm optimisation, memory management, load balancing, performance profiling, asynchronous programming.

Procedia PDF Downloads 14
2638 Pistachio Supplementation Ameliorates the Motor and Cognitive Deficits in Rotenone-Induced Rat Model of Parkinson’s Disease

Authors: Saida Haider, Syeda Madiha

Abstract:

Parkinson’s disease (PD) is a common neurological disorder characterized by motor deficits and loss of dopaminergic neurons. Oxidative stress is said to play a pivotal role in the pathophysiology of the disease. In the present study, PD was induced by injection of rotenone (1.5 mg/kg/day, s.c.) for eight days. Pistachio (800 mg/kg/day, p.o.) was given for two weeks. At the end of treatment brains were dissected out and striatum was isolated for biochemical and neurochemical analysis. Morris water maze (MWM) test and novel object recognition (NOR) task was used to test the memory function while motor behavior was determined by open field test (OFT), Kondziela inverted screen test (KIST), pole test (PT), beam walking test (BWT), inclined plane test (IPT) and footprint (FP) test. Several dietary components have been evaluated as potential therapeutic compounds in many neurodegenerative diseases. Increasing evidence shows that nuts have protective effects against various diseases by improving the oxidative status and reducing lipid peroxidation. Pistachio is the only nut that contains anthocyanin, a potent antioxidant having neuroprotective properties. Results showed that pistachio supplementation significantly restored the rotenone-induced motor deficits and improved the memory performance. Moreover, rats treated with pistachio also exhibited enhanced oxidative status and increased dopamine (DA) and 5-hydroxytryptamine (5-HT) concentration in striatum. In conclusion, to our best knowledge, we have for the first time shown that pistachio nut possesses neuroprotective effects against rotenone-induced motor and cognitive deficits. These beneficial effects of pistachio may be attributed to its high content of natural antioxidant and phenolic compounds. Hence, consumption of pistachio regularly as part of a daily diet can be beneficial in the prevention and treatment of PD.

Keywords: rotenone, pistachio, oxidative stress, Parkinson’s disease

Procedia PDF Downloads 110
2637 The Relationship between Fluctuation of Biological Signal: Finger Plethysmogram in Conversation and Anthropophobic Tendency

Authors: Haruo Okabayashi

Abstract:

Human biological signals (pulse wave and brain wave, etc.) have a rhythm which shows fluctuations. This study investigates the relationship between fluctuations of biological signals which are shown by a finger plethysmogram (i.e., finger pulse wave) in conversation and anthropophobic tendency, and identifies whether the fluctuation could be an index of mental health. 32 college students participated in the experiment. The finger plethysmogram of each subject was measured in the following conversation situations: Fun memory talking/listening situation and regrettable memory talking/ listening situation for three minutes each. Lyspect 3.5 was used to collect the data of the finger plethysmogram. Since Lyspect calculates the Lyapunov spectrum, it is possible to obtain the largest Lyapunov exponent (LLE). LLE is an indicator of the fluctuation and shows the degree to which a measure is going away from close proximity to the track in a dynamical system. Before the finger plethysmogram experiment, each participant took the psychological test questionnaire “Anthropophobic Scale.” The scale measures the social phobia trend close to the consciousness of social phobia. It is revealed that there is a remarkable relationship between the fluctuation of the finger plethysmography and anthropophobic tendency scale in talking about a regrettable story in conversation: The participants (N=15) who have a low anthropophobic tendency show significantly more fluctuation of finger pulse waves than the participants (N=17) who have a high anthropophobic tendency (F (1, 31) =5.66, p<0.05). That is, the participants who have a low anthropophobic tendency make conversation flexibly using large fluctuation of biological signal; on the other hand, the participants who have a high anthropophobic tendency constrain a conversation because of small fluctuation. Therefore, fluctuation is not an error but an important drive to make better relationships with others and go towards the development of interaction. In considering mental health, the fluctuation of biological signals would be an important indicator.

Keywords: anthropophobic tendency, finger plethymogram, fluctuation of biological signal, LLE

Procedia PDF Downloads 239
2636 Collaborative Governance in Dutch Flood Risk Management: An Historical Analysis

Authors: Emma Avoyan

Abstract:

The safety standards for flood protection in the Netherlands have been revised recently. It is expected that all major flood-protection structures will have to be reinforced to meet the new standards. The Dutch Flood Protection Programme aims at accomplishing this task through innovative integrated projects such as construction of multi-functional flood defenses. In these projects, flood safety purposes will be combined with spatial planning, nature development, emergency management or other sectoral objectives. Therefore, implementation of dike reinforcement projects requires early involvement and collaboration between public and private sectors, different governmental actors and agencies. The development and implementation of such integrated projects has been an issue in Dutch flood risk management since long. Therefore, this article analyses how cross-sector collaboration within flood risk governance in the Netherlands has evolved over time, and how this development can be explained. The integrative framework for collaborative governance is applied as an analytical tool to map external factors framing possibilities as well as constraints for cross-sector collaboration in Dutch flood risk domain. Supported by an extensive document and literature analysis, the paper offers insights on how the system context and different drivers changing over time either promoted or hindered cross-sector collaboration between flood protection sector, urban development, nature conservation or any other sector involved in flood risk governance. The system context refers to the multi-layered and interrelated suite of conditions that influence the formation and performance of complex governance systems, such as collaborative governance regimes, whereas the drivers initiate and enable the overall process of collaboration. In addition, by applying a method of process tracing we identify a causal and chronological chain of events shaping cross-sectoral interaction in Dutch flood risk management. Our results indicate that in order to evaluate the performance of complex governance systems, it is important to firstly study the system context that shapes it. Clear understanding of the system conditions and drivers for collaboration gives insight into the possibilities of and constraints for effective performance of complex governance systems. The performance of the governance system is affected by the system conditions, while at the same time the governance system can also change the system conditions. Our results show that the sequence of changes within the system conditions and drivers over time affect how cross-sector interaction in Dutch flood risk governance system happens now. Moreover, we have traced the potential of this governance system to shape and change the system context.

Keywords: collaborative governance, cross-sector interaction, flood risk management, the Netherlands

Procedia PDF Downloads 132
2635 Design and Development of On-Line, On-Site, In-Situ Induction Motor Performance Analyser

Authors: G. S. Ayyappan, Srinivas Kota, Jaffer R. C. Sheriff, C. Prakash Chandra Joshua

Abstract:

In the present scenario of energy crises, energy conservation in the electrical machines is very important in the industries. In order to conserve energy, one needs to monitor the performance of an induction motor on-site and in-situ. The instruments available for this purpose are very meager and very expensive. This paper deals with the design and development of induction motor performance analyser on-line, on-site, and in-situ. The system measures only few electrical input parameters like input voltage, line current, power factor, frequency, powers, and motor shaft speed. These measured data are coupled to name plate details and compute the operating efficiency of induction motor. This system employs the method of computing motor losses with the help of equivalent circuit parameters. The equivalent circuit parameters of the concerned motor are estimated using the developed algorithm at any load conditions and stored in the system memory. The developed instrument is a reliable, accurate, compact, rugged, and cost-effective one. This portable instrument could be used as a handy tool to study the performance of both slip ring and cage induction motors. During the analysis, the data can be stored in SD Memory card and one can perform various analyses like load vs. efficiency, torque vs. speed characteristics, etc. With the help of the developed instrument, one can operate the motor around its Best Operating Point (BOP). Continuous monitoring of the motor efficiency could lead to Life Cycle Assessment (LCA) of motors. LCA helps in taking decisions on motor replacement or retaining or refurbishment.

Keywords: energy conservation, equivalent circuit parameters, induction motor efficiency, life cycle assessment, motor performance analysis

Procedia PDF Downloads 385
2634 Data Protection and Regulation Compliance on Handling Physical Child Abuse Scenarios- A Scoping Review

Authors: Ana Mafalda Silva, Rebeca Fontes, Ana Paula Vaz, Carla Carreira, Ana Corte-Real

Abstract:

Decades of research on the topic of interpersonal violence against minors highlight five main conclusions: 1) it causes harmful effects on children's development and health; 2) it is prevalent; 3) it violates children's rights; 4) it can be prevented and 5) parents are the main aggressors. The child abuse scenario is identified through clinical observation, administrative data and self-reports. The most used instruments are self-reports; however, there are no valid and reliable self-report instruments for minors, which consist of a retrospective interpretation of the situation by the victim already in her adult phase and/or by her parents. Clinical observation and collection of information, namely from the orofacial region, are essential in the early identification of these situations. The management of medical data, such as personal data, must comply with the General Data Protection Regulation (GDPR), in Europe, and with the General Law of Data Protection (LGPD), in Brazil. This review aims to answer the question: In a situation of medical assistance to minors, in the suspicion of interpersonal violence, due to mistreatment, is it necessary for the guardians to provide consent in the registration and sharing of personal data, namely medical ones. A scoping review was carried out based on a search by the Web of Science and Pubmed search engines. Four papers and two documents from the grey literature were selected. As found, the process of identifying and signaling child abuse by the health professional, and the necessary early intervention in defense of the minor as a victim of abuse, comply with the guidelines expressed in the GDPR and LGPD. This way, the notification in maltreatment scenarios by health professionals should be a priority and there shouldn’t be the fear or anxiety of legal repercussions that stands in the way of collecting and treating the data necessary for the signaling procedure that safeguards and promotes the welfare of children living with abuse.

Keywords: child abuse, disease notifications, ethics, healthcare assistance

Procedia PDF Downloads 96
2633 Judicial Activism and the Supreme Court of India

Authors: Shreeya Umashankar

Abstract:

The Supreme Court of India has emerged as the most powerful organ of State and amongst the foremost constitutional courts in the world through the instrument of Public Interest Litigation (PIL), the exercise of writ jurisdiction and the expansive interpretation of fundamental rights guaranteed by the Constitution of India. Judicial activism impinging on every facet of governance has become the norm in recent times. This paper traces the evolution of judicial activism since Independence through pronouncements of the Supreme Court. It brings out distinct phases in this evolution– the initial phase of judicial restraint, the first phase of an activist judiciary where the Supreme Court primarily was concerned with protection of fundamental rights and humane treatment of citizens; the second phase where the Supreme Court took keen interest in preservation and protection of the environment; the third phase where the Supreme Court extended its reach into the socio-economic arena and the fourth phase when issues of transparency and probity in governance led to interventions by the Supreme Court. The paper illustrates through judgements of the Supreme Court that the instrument of the PIL and the exercise of writ jurisdiction by the Supreme Court go beyond the traditional postulates of judicial processes and political theory on separation of powers between the organs of State.

Keywords: fundamental rights, judicial activism, public interest litigation, Supreme Court of India

Procedia PDF Downloads 627
2632 A Comparative Study of Cognitive Functions in Relapsing-Remitting Multiple Sclerosis Patients, Secondary-Progressive Multiple Sclerosis Patients and Normal People

Authors: Alireza Pirkhaefi

Abstract:

Background: Multiple sclerosis (MS) is one of the most common diseases of the central nervous system (brain and spinal cord). Given the importance of cognitive disorders in patients with multiple sclerosis, the present study was in order to compare cognitive functions (Working memory, Attention and Centralization, and Visual-spatial perception) in patients with relapsing- remitting multiple sclerosis (RRMS) and secondary progressive multiple sclerosis (SPMS). Method: Present study was performed as a retrospective study. This research was conducted with Ex-Post Facto method. The samples of research consisted of 60 patients with multiple sclerosis (30 patients relapsing-retrograde and 30 patients secondary progressive), who were selected from Tehran Community of MS Patients Supported as convenience sampling. 30 normal persons were also selected as a comparison group. Montreal Cognitive Assessment (MOCA) was used to assess cognitive functions. Data were analyzed using multivariate analysis of variance. Results: The results showed that there were significant differences among cognitive functioning in patients with RRMS, SPMS, and normal individuals. There were not significant differences in working memory between two groups of patients with RRMS and SPMS; while significant differences in these variables were seen between the two groups and normal individuals. Also, results showed significant differences in attention and centralization and visual-spatial perception among three groups. Conclusions: Results showed that there are differences between cognitive functions of RRMS and SPMS patients so that the functions of RRMS patients are better than SPMS patients. These results have a critical role in improvement of cognitive functions; reduce the factors causing disability due to cognitive impairment, and especially overall health of society.

Keywords: multiple sclerosis, cognitive function, secondary-progressive, normal subjects

Procedia PDF Downloads 239
2631 Other-Generated Disclosure: A Challenge to Privacy on Social Network Sites

Authors: Tharntip Tawnie Chutikulrungsee, Oliver Kisalay Burmeister, Maumita Bhattacharya, Dragana Calic

Abstract:

Sharing on social network sites (SNSs) has rapidly emerged as a new social norm and has become a global phenomenon. Billions of users reveal not only their own information (self disclosure) but also information about others (other-generated disclosure), resulting in a risk and a serious threat to either personal or informational privacy. Self-disclosure (SD) has been extensively researched in the literature, particularly regarding control of individual and existing privacy management. However, far too little attention has been paid to other-generated disclosure (OGD), especially by insiders. OGD has a strong influence on self-presentation, self-image, and electronic word of mouth (eWOM). Moreover, OGD is more credible and less likely manipulated than SD, but lacks privacy control and legal protection to some extent. This article examines OGD in depth, ranging from motivation to both online and offline impacts, based upon lived experiences from both ‘the disclosed’ and ‘the discloser’. Using purposive sampling, this phenomenological study involves an online survey and in-depth interviews. The findings report the influence of peer disclosure as well as users’ strategies to mitigate privacy issues. This article also calls attention to the challenge of OGD privacy and inadequacies in the law related to privacy protection in the digital domain.

Keywords: facebook, online privacy, other-generated disclosure, social networks sites (SNSs)

Procedia PDF Downloads 252
2630 The Executive Functioning Profile of Children and Adolescents with a Diagnosis of OCD: A Systematic Review and Meta-Analysis

Authors: Parker Townes, Aisouda Savadlou, Shoshana Weiss, Marina Jarenova, Suzzane Ferris, Dan Devoe, Russel Schachar, Scott Patten, Tomas Lange, Marlena Colasanto, Holly McGinn, Paul Arnold

Abstract:

Some research suggests obsessive-compulsive disorder (OCD) is associated with impaired executive functioning: higher-level mental processes involved in carrying out tasks and solving problems. Relevant literature was identified systematically through online databases. Meta-analyses were conducted for task performance metrics reported by at least two articles. Results were synthesized by the executive functioning domain measured through each performance metric. Heterogeneous literature was identified, typically involving few studies using consistent measures. From 29 included studies, analyses were conducted on 33 performance metrics from 12 tasks. Results suggest moderate associations of working memory (two out of five tasks presented significant findings), planning (one out of two tasks presented significant findings), and visuospatial abilities (one out of two tasks presented significant findings) with OCD in youth. There was inadequate literature or contradictory findings for other executive functioning domains. These findings suggest working memory, planning, and visuospatial abilities are impaired in pediatric OCD, with mixed results. More work is needed to identify the effect of age and sex on these results. Acknowledgment: This work was supported by the Alberta Innovates Translational Health Chair in Child and Youth Mental Health. The funders had no role in the design, conducting, writing, or decision to submit this article for publication.

Keywords: obsessive-compulsive disorder, neurocognition, executive functioning, adolescents, children

Procedia PDF Downloads 101
2629 Investigation of Electrochemical, Morphological, Rheological and Mechanical Properties of Nano-Layered Graphene/Zinc Nanoparticles Incorporated Cold Galvanizing Compound at Reduced Pigment Volume Concentration

Authors: Muhammad Abid

Abstract:

The ultimate goal of this research was to produce a cold galvanizing compound (CGC) at reduced pigment volume concentration (PVC) to protect metallic structures from corrosion. The influence of the partial replacement of Zn dust by nano-layered graphene (NGr) and Zn metal nanoparticles on the electrochemical, morphological, rheological, and mechanical properties of CGC was investigated. EIS was used to explore the electrochemical nature of coatings. The EIS results revealed that the partial replacement of Zn by NGr and Zn nanoparticles enhanced the cathodic protection at reduced PVC (4:1) by improving the electrical contact between the Zn particles and the metal substrate. The Tafel scan was conducted to support the cathodic behaviour of the coatings. The sample formulated solely with Zn at PVC 4:1 was found to be dominated in physical barrier characteristics over cathodic protection. By increasing the concentration of NGr in the formulation, the corrosion potential shifted towards a more negative side. The coating with 1.5% NGr showed the highest galvanic action at reduced PVC. FE-SEM confirmed the interconnected network of conducting particles. The coating without NGr and Zn nanoparticles at PVC 4:1 showed significant gaps between the Zn dust particles. The novelty was evidenced when micrographs showed the consistent distribution of NGr and Zn nanoparticles all over the surface, which acted as a bridge between spherical Zn particles and provided cathodic protection at a reduced PVC. The layered structure of graphene also improved the physical shielding effect of the coatings, which limited the diffusion of electrolytes and corrosion products (oxides/hydroxides) into the coatings, which was reflected by the salt spray test. The rheological properties of coatings showed good liquid/fluid properties. All the coatings showed excellent adhesion but had different strength values. A real-time scratch resistance assessment showed all the coatings had good scratch resistance.

Keywords: protective coatings, anti-corrosion, galvanization, graphene, nanomaterials, polymers

Procedia PDF Downloads 97
2628 Contribution at Dimensioning of the Energy Dissipation Basin

Authors: M. Aouimeur

Abstract:

The environmental risks of a dam and particularly the security in the Valley downstream of it,, is a very complex problem. Integrated management and risk-sharing become more and more indispensable. The definition of "vulnerability “concept can provide assistance to controlling the efficiency of protective measures and the characterization of each valley relatively to the floods's risk. Security can be enhanced through the integrated land management. The social sciences may be associated to the operational systems of civil protection, in particular warning networks. The passage of extreme floods in the site of the dam causes the rupture of this structure and important damages downstream the dam. The river bed could be damaged by erosion if it is not well protected. Also, we may encounter some scouring and flooding problems in the downstream area of the dam. Therefore, the protection of the dam is crucial. It must have an energy dissipator in a specific place. The basin of dissipation plays a very important role for the security of the dam and the protection of the environment against floods downstream the dam. It allows to dissipate the potential energy created by the dam with the passage of the extreme flood on the weir and regularize in a natural manner and with more security the discharge or elevation of the water plan on the crest of the weir, also it permits to reduce the speed of the flow downstream the dam, in order to obtain an identical speed to the river bed. The problem of the dimensioning of a classic dissipation basin is in the determination of the necessary parameters for the dimensioning of this structure. This communication presents a simple graphical method, that is fast and complete, and a methodology which determines the main features of the hydraulic jump, necessary parameters for sizing the classic dissipation basin. This graphical method takes into account the constraints imposed by the reality of the terrain or the practice such as the one related to the topography of the site, the preservation of the environment equilibrium and the technical and economic side.This methodology is to impose the loss of head DH dissipated by the hydraulic jump as a hypothesis (free design) to determine all the others parameters of classical dissipation basin. We can impose the loss of head DH dissipated by the hydraulic jump that is equal to a selected value or to a certain percentage of the upstream total head created by the dam. With the parameter DH+ =(DH/k),(k: critical depth),the elaborate graphical representation allows to find the other parameters, the multiplication of these parameters by k gives the main characteristics of the hydraulic jump, necessary parameters for the dimensioning of classic dissipation basin.This solution is often preferred for sizing the dissipation basins of small concrete dams. The results verification and their comparison to practical data, confirm the validity and reliability of the elaborate graphical method.

Keywords: dimensioning, energy dissipation basin, hydraulic jump, protection of the environment

Procedia PDF Downloads 584
2627 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 95
2626 Document-level Sentiment Analysis: An Exploratory Case Study of Low-resource Language Urdu

Authors: Ammarah Irum, Muhammad Ali Tahir

Abstract:

Document-level sentiment analysis in Urdu is a challenging Natural Language Processing (NLP) task due to the difficulty of working with lengthy texts in a language with constrained resources. Deep learning models, which are complex neural network architectures, are well-suited to text-based applications in addition to data formats like audio, image, and video. To investigate the potential of deep learning for Urdu sentiment analysis, we implemented five different deep learning models, including Bidirectional Long Short Term Memory (BiLSTM), Convolutional Neural Network (CNN), Convolutional Neural Network with Bidirectional Long Short Term Memory (CNN-BiLSTM), and Bidirectional Encoder Representation from Transformer (BERT). In this study, we developed a hybrid deep learning model called BiLSTM-Single Layer Multi Filter Convolutional Neural Network (BiLSTM-SLMFCNN) by fusing BiLSTM and CNN architecture. The proposed and baseline techniques are applied on Urdu Customer Support data set and IMDB Urdu movie review data set by using pre-trained Urdu word embedding that are suitable for sentiment analysis at the document level. Results of these techniques are evaluated and our proposed model outperforms all other deep learning techniques for Urdu sentiment analysis. BiLSTM-SLMFCNN outperformed the baseline deep learning models and achieved 83%, 79%, 83% and 94% accuracy on small, medium and large sized IMDB Urdu movie review data set and Urdu Customer Support data set respectively.

Keywords: urdu sentiment analysis, deep learning, natural language processing, opinion mining, low-resource language

Procedia PDF Downloads 74
2625 Criminal Liability for Copyright and Related Rights Infringement: Albania Legislation Perspective

Authors: Ilda Muçmataj, Anjeza Liçenji, Borana Kalemi

Abstract:

Copyright and related rights have been pivotal in driving the economic growth of nations worldwide and fostering culture and new forms of entertainment. The introduction of the internet and technological advancement has significantly expanded the opportunities for creators and rights holders to promote their works and boost their revenues. However, this digital era has also brought about complex challenges, leading to a more extensive range of copyright infringement, primarily due to the substantial surge in piracy and counterfeiting. Despite being reported internationally, the mechanisms to tackle and the responsibility for enforcing copyright infringements often remain rooted in national jurisdictions, resulting in a gap between the scale of the problem and the efficacy of enforcement measures. Thus, it is essential to ensure adequate legal protection, a vital safeguard for authors' economic and moral interests, information security, innovative development promotion, and intellectual creativity preservation. This paper describes Albanian criminal law-based copyright enforcement legislation, focusing on doctrinal guidance and practical judicial considerations. Lastly, the paper offers recommendations for enhancing copyright protection and related rights.

Keywords: author, copyright infringement, copyright, criminal liability, intellectual property, piracy

Procedia PDF Downloads 39
2624 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 93
2623 The Impact of Cognitive Load on Deceit Detection and Memory Recall in Children’s Interviews: A Meta-Analysis

Authors: Sevilay Çankaya

Abstract:

The detection of deception in children’s interviews is essential for statement veracity. The widely used method for deception detection is building cognitive load, which is the logic of the cognitive interview (CI), and its effectiveness for adults is approved. This meta-analysis delves into the effectiveness of inducing cognitive load as a means of enhancing veracity detection during interviews with children. Additionally, the effectiveness of cognitive load on children's total number of events recalled is assessed as a second part of the analysis. The current meta-analysis includes ten effect sizes from search using databases. For the effect size calculation, Hedge’s g was used with a random effect model by using CMA version 2. Heterogeneity analysis was conducted to detect potential moderators. The overall result indicated that cognitive load had no significant effect on veracity outcomes (g =0.052, 95% CI [-.006,1.25]). However, a high level of heterogeneity was found (I² = 92%). Age, participants’ characteristics, interview setting, and characteristics of the interviewer were coded as possible moderators to explain variance. Age was significant moderator (β = .021; p = .03, R2 = 75%) but the analysis did not reveal statistically significant effects for other potential moderators: participants’ characteristics (Q = 0.106, df = 1, p = .744), interview setting (Q = 2.04, df = 1, p = .154), and characteristics of interviewer (Q = 2.96, df = 1, p = .086). For the second outcome, the total number of events recalled, the overall effect was significant (g =4.121, 95% CI [2.256,5.985]). The cognitive load was effective in total recalled events when interviewing with children. All in all, while age plays a crucial role in determining the impact of cognitive load on veracity, the surrounding context, interviewer attributes, and inherent participant traits may not significantly alter the relationship. These findings throw light on the need for more focused, age-specific methods when using cognitive load measures. It may be possible to improve the precision and dependability of deceit detection in children's interviews with the help of more studies in this field.

Keywords: deceit detection, cognitive load, memory recall, children interviews, meta-analysis

Procedia PDF Downloads 57
2622 Blocking of Random Chat Apps at Home Routers for Juvenile Protection in South Korea

Authors: Min Jin Kwon, Seung Won Kim, Eui Yeon Kim, Haeyoung Lee

Abstract:

Numerous anonymous chat apps that help people to connect with random strangers have been released in South Korea. However, they become a serious problem for young people since young people often use them for channels of prostitution or sexual violence. Although ISPs in South Korea are responsible for making inappropriate content inaccessible on their networks, they do not block traffic of random chat apps since 1) the use of random chat apps is entirely legal. 2) it is reported that they use HTTP proxy blocking so that non-HTTP traffic cannot be blocked. In this paper, we propose a service model that can block random chat apps at home routers. A service provider manages a blacklist that contains blocked apps’ information. Home routers that subscribe the service filter the traffic of the apps out using deep packet inspection. We have implemented a prototype of the proposed model, including a centralized server providing the blacklist, a Raspberry Pi-based home router that can filter traffic of the apps out, and an Android app used by the router’s administrator to locally customize the blacklist.

Keywords: deep packet inspection, internet filtering, juvenile protection, technical blocking

Procedia PDF Downloads 350
2621 Rooftop Rainwater Harvesting for Sustainable Organic Farming: Insights from Smart cities in India

Authors: Rajkumar Ghosh

Abstract:

India faces a critical task of water shortage, specifically during dry seasons, which adversely impacts agricultural productivity and food protection. Natural farming, specializing in sustainable practices, demands green water management in smart cities in India. This paper examines how rooftop rainwater harvesting (RRWH) can alleviate water scarcity and support sustainable organic farming practices in India. RRWH emerges as a promising way to increase water availability for the duration of dry intervals and decrease reliance on traditional water sources in smart cities. The look at explores the capacity of RRWH to enhance water use performance, help crop growth, enhance soil health, and promote ecological stability inside the farming ecosystem. The medical paper delves into the advantages, challenges, and implementation techniques of RRWH in organic farming. It addresses demanding situations, including seasonal variability of rainfall, limited rooftop vicinity, and monetary concerns. Moreover, it analyses broader environmental and socio-economic implications of RRWH for sustainable agriculture, emphasizing water conservation, biodiversity protection, and the social properly-being of farming communities. The belief underscores the importance of RRWH as a sustainable solution for reaching the aim of sustainable agriculture in natural farming in India. It emphasizes the want for further studies, policy advocacy, and capacity-building initiatives to promote RRWH adoption and assist the transformation in the direction of sustainable organic farming systems. The paper proposes adaptive strategies to triumph over demanding situations and optimize the advantages of RRWH in organic farming. By way of doing so, India can make vast development in addressing water scarcity issues and making sure a greater resilient and sustainable agricultural future in smart cities.

Keywords: rooftop rainwater harvesting, organic farming, green water management, food protection, ecological stabilty

Procedia PDF Downloads 106
2620 Study of the Energy Efficiency of Buildings under Tropical Climate with a View to Sustainable Development: Choice of Material Adapted to the Protection of the Environment

Authors: Guarry Montrose, Ted Soubdhan

Abstract:

In the context of sustainable development and climate change, the adaptation of buildings to the climatic context in hot climates is a necessity if we want to improve living conditions in housing and reduce the risks to the health and productivity of occupants due to thermal discomfort in buildings. One can find a wide variety of efficient solutions but with high costs. In developing countries, especially tropical countries, we need to appreciate a technology with a very limited cost that is affordable for everyone, energy efficient and protects the environment. Biosourced insulation is a product based on plant fibers, animal products or products from recyclable paper or clothing. Their development meets the objectives of maintaining biodiversity, reducing waste and protecting the environment. In tropical or hot countries, the aim is to protect the building from solar thermal radiation, a source of discomfort. The aim of this work is in line with the logic of energy control and environmental protection, the approach is to make the occupants of buildings comfortable, reduce their carbon dioxide emissions (CO2) and decrease their energy consumption (energy efficiency). We have chosen to study the thermo-physical properties of banana leaves and sawdust, especially their thermal conductivities, direct measurements were made using the flash method and the hot plate method. We also measured the heat flow on both sides of each sample by the hot box method. The results from these different experiences show that these materials are very efficient used as insulation. We have also conducted a building thermal simulation using banana leaves as one of the materials under Design Builder software. Air-conditioning load as well as CO2 release was used as performance indicator. When the air-conditioned building cell is protected on the roof by banana leaves and integrated into the walls with solar protection of the glazing, it saves up to 64.3% of energy and avoids 57% of CO2 emissions.

Keywords: plant fibers, tropical climates, sustainable development, waste reduction

Procedia PDF Downloads 184
2619 Impact of Stress and Protein Malnutrition on the Potential Role of Epigallocatechin-3-Gallate in Providing Protection from Nephrotoxicity and Hepatotoxicity Induced by Aluminum in Rats

Authors: Azza A. Ali, Mona G. Khalil, Hemat A. Elariny, Shereen S. El Shaer

Abstract:

Background: Aluminium (Al) is very abundant metal in the earth’s crust. It is a constituent of cooking utensils, medicines, cosmetics, some foods and food additives. Salts of Al are widely used in the treatment of drinking water for purification purposes. Excessive and prolonged exposure to Al causes oxidative stress and impairment of many physiological functions. Its accumulation in liver and kidney causes hepatotoxicity and nephrotoxicity. Social isolation (SI) or Protein malnutrition (PM) also increases oxidative stress and may enhance the toxicity of Al as well as the degeneration in liver and kidney. Epigallocatechin-3-gallate (EGCG) is the most abundant catechin in green tea and has strong antioxidant as well as anti-inflammatory activities and can protect against oxidative stress-induced degenerations. Objective: To study the influence of stress or PM on Al-induced nephrotoxicity and hepatotoxicity in rats, as well as on the potential role of EGCG in providing protection. Methods: Rats received daily AlCl3 (70 mg/kg, IP) for three weeks (Al-toxicity groups) except one normal control group received saline. Al-toxicity groups were divided into four treated and four untreated groups; treated rats received EGCG (10 mg/kg, IP) together with AlCl3. One group of both treated and untreated rats served as control for each of them, and the others were subjected to either stress (mild using isolation or high using electric shock) or to PM (10% casein diet). Specimens of liver and kidney were used for assessment of levels of inflammatory mediators as TNF-α, IL6β, nuclear factor kappa B (NF-κB), oxidative stress (MDA, SOD, TAC, NO), Caspase-3 and for DNA fragmentation as well as for histopathological examinations. Biochemical changes were also measured in the serum as total lipids, cholesterol, triglycerides, glucose, proteins, bilirubin, creatinine and urea as well as the level of Alanine aminotransferase (ALT), aspartate aminotransferase (AST), alkaline phosphatase (ALP) and lactate deshydrogenase (LDH). Results: Nephrotoxicity and hepatotoxicity induced by Al were enhanced in rats exposed to stress and to PM. The influence of stress was more pronounced than PM. Al-toxicity was indicated by the increase in liver and kidney MDA, NO, TNF-α, IL-6β, NF-κB, caspase-3, DNA fragmentation and in ALT, AST, ALP, LDH and total lipids, cholesterol, triglycerides, glucose, proteins, bilirubin, creatinine and urea levels, together with the decrease in total proteins, SOD, TAC. EGCG provided protection against hazards of Al as indicated by the decrease in MDA, NO, TNF-α, IL-6β, NF-κB, caspase-3 and DNA fragmentation as well as in levels of ALT, AST, ALP, LDH and total lipids, cholesterol, triglycerides, glucose, proteins, bilirubin, creatinine and urea in liver and kidney, together with the increase in total proteins, SOD, TAC and confirmed by histopathological examinations. It provided more pronounced protection in high stressful conditions than in mild one than in PM. Conclusion: Stress have a bad impact on Al-induced nephrotoxicity and hepatotoxicity more than PM. Thus it can clarify and maximize the role of EGCG in providing protection. Consequently, administration of EGCG is advised with excessive Al-exposure to avoid nephrotoxicity and hepatotoxicity especially in populations more subjected to stress or PM.

Keywords: aluminum, stress, protein malnutrition, nephrotoxicity, hepatotoxicity, epigallocatechin-3-gallate, rats

Procedia PDF Downloads 307
2618 Dose Measurement in Veterinary Radiology Using Thermoluminescent Dosimeter

Authors: E. Saeedian, M. Shakerian, A. Zarif Sanayei, Z. Rakeb, F. N. Alizadeh, S. Sarshough, S. Sina

Abstract:

Radiological protection for plants and animals is an area of regulatory importance. Acute doses of 0.1 Gy/d (10 rad/d) or below are highly unlikely to produce permanent, measurable negative effects on populations or communities of plants or animals. The advancement of radio diagnostics for domestic animals, particularly dogs and cats, has gained popularity in veterinary medicine. As pets are considered to be members of the family worldwide, they are entitled to the same care and protection. It is important to have a system of radiological protection for nonhuman organisms that complies with the focus on human health as outlined in ICRP publication 19. The present study attempts to assess surface-skin entrance doses in small pets undergoing abdominal radio diagnostic procedures utilizing a direct measurements technique with a thermoluminescent dosimeter. These measurements allow the determination of the entrance skin dose (ESD) by calculating the amount of radiation absorbed by the skin during exposure. A group of Thirty TLD-100 dosimeters produced by Harshaw Company, each with repeatability greater than 95% and calibration using ¹³⁷Cs gamma source, were utilized to measure doses to ten small pets, including cats and dogs in the radiological department in a veterinary clinic in Shiraz, Iran. Radiological procedures were performed using a portable imaging unit (Philips Super M100, Philips Medical System, Germany) to acquire images of the abdomen; ten exams of abdomen images of different pets were monitored, measuring the thicknesses of the two projections (lateral and ventrodorsal) and the distance of the X-ray source from the surface of each pet during the exams. A group of two dosimeters was used for each pet which has been stacked on their skin on the abdomen region. The outcome of this study involved medical procedures with the same kVp, mAs, and nearly identical positions for different diagnostic X-ray procedures executed over a period of two months. The result showed the mean ESD value was 260.34±50.06 µGy due to the approximate size of pets. Based on the results, the ESD value is associated with animal size, and larger animals have higher values. If a procedure doesn't require repetition, the dose can be optimized. For smaller animals, the main challenge in veterinary radiology is the dose increase caused by repetitions, which is most noticeable in the ventrodorsal position due to the difficulty in immobilizing the animal. Animals are an area of regulatory importance. Acute doses of 0.1 Gy/d (10 rad/d) or below are highly unlikely to produce permanent, measurable negative effects on populations or communities of plants or animals. The advancement of radio diagnostics for domestic animals, particularly dogs and cats, has gained popularity in veterinary medicine. As pets are considered to be members of the family worldwide, they are entitled to the same care and protection. It is important to have a system of radiological protection for nonhuman organisms that complies with the focus on human health as outlined in ICRP publication 19. The present study attempts to assess surface-skin entrance doses in small pets undergoing abdominal radio diagnostic procedures utilizing direct measurements.

Keywords: direct dose measuring, dosimetry, radiation protection, veterinary medicine

Procedia PDF Downloads 72
2617 Tourism and Sustainability Example Projects in the EU

Authors: Renee Yi-Mond Yuan

Abstract:

The fast development of tourism industries around the world, has largely contributed to many cities, and countries economical and social progress. Past year Taiwan in particular was ranked among one of fastest raise growth country. Thanks to the prominent importance of this phenomenon; seasonal mobility or multipurpose trips have reached more than 1 Billion tourists crossing International borders and more than 4 billion intramural travelers that have nourished the economy and employment in the service sector in most attractive regions, representing about one tenth of World GDP amount, including trade, research, cultural or journalistic purposes. Then the increased activities are giving pressure to the consumption of energy, water, resources, and Greenhouse Gas emissions. The further concentration of tourists in most beautiful sites of the World with consistent supply and reduced pollutions and means for waste control and risks management are challenging the preservation and protection of the natural original environment, including species and their ecosystems, ethnics and their cultures or languages, protection of inherited landscapes and monuments for the future generations to come. In this article, few projects will be analyzed, methods and directions in the EU sustainable development scheme giving way to economical and social activities and preserve rural areas and remote countryside as well as smarter cities development. EU ETS forecasting escalation in the next few decades for road and air, and will reconsider investments and reliance on Biobased alternatives that may turn out solutions and contributions to sustain popularization of tourism development. Study of Examples of Stakeholders practices and Governments efforts, consumer’s attitude to bring new forms of more responsible holidays models: ecotourism, eco-certification, partnerships, investment in technologies and facilities, and possibly create greener perceptions and less impacting demands for the longer term through association, organizations and awards.

Keywords: tourism, sustainability, protection, risks management, change in rural/urban environment

Procedia PDF Downloads 335
2616 The Reef as Multiple: Coral Reefs between Exploitation and Protection along the Mexican Riviera Maya

Authors: Laura Otto

Abstract:

Sargasso algae currently threatens both livelihoods and marine eco systems along the Riviera Maya in Mexico. While the area was previously known for its white beaches, pristine waters, and intact, colorful reefs, the algae has turned the beaches into ‘stinky stretches of sand,’ made the water brown, and has led to reef degradation causing coral colonies to die off in vast amounts. Drawing on ethnographic research in the area, this paper shows how the reef was exploited for tourism before the Sargasso algae landed, and reef protection played a minor role among hoteliers, tourists, and tour operators. However, since Sargasso began arriving in large quantities, the reef has taken on new significance. Both natural science research and the everyday handling of Sargasso along the coast show that an intact reef provides a natural barrier for the algae and keeps them from reaching the beaches. Clean beaches are important to various local actors–among them, hotel operators, tourists, environmentalists – and against the backdrop of beach commodification, reefs are now taking on new meaning. The paper consequently discusses the commodification of beaches as more-than-human entanglements and illuminates which new human-environment relationships are currently emerging in the Anthropocene.

Keywords: anthropocene, human-environment-relations, fieldwork, mexico

Procedia PDF Downloads 219
2615 Comparative Study on the Influence of Different Drugs against Aluminium- Induced Nephrotoxicity and Hepatotoxicity in Rats

Authors: Azza A. Ali, Toqa M. Elnahhas, Abeer I. Abd El-Fattah, Mona M. Kamal, Karema Abu-Elfotuh

Abstract:

Background: Environmental pollution with the different aluminium (Al) containing compounds especially those in industrial waste water exposes people to higher than normal levels of Al that represents an environmental risk factor. Cosmetics, Al ware, and containers are also sources of Al besides some foods and food additives. In addition to its known neurotoxicity, Al affects other body structures like skeletal system, blood cells, liver and kidney. Accumulation of Al in kidney and liver induces nephrotoxicity and hepatotoxicity. Coenzyme Q10 (CoQ10) is a pseudo-vitamin substance primarily present in the mitochondria. It is a powerful antioxidant and acts as radical scavenger. Wheat grass is a natural product that contains carbohydrates, proteins, vitamins, minerals, enzymes and has antioxidant, anti-inflammatory, anticancer and cardiovascular protection activities. Cocoa is an excellent source of iron, potent antioxidants and can protect against many diseases. Vinpocetine is an antioxidant and anti inflammatory while zinc is an essential trace element involved in cell division and its deficiency is observed in many types of liver disease. Objective: To evaluate and compare the potency of different drugs (CoQ10, wheatgrass, cocoa, vinpocetine and zinc) against nephro- and hepato-toxicity induced by Al in rats. Methods: Rats were divided to seven groups and received daily for three weeks either saline for control group or AlCl3 (70 mg/kg, IP) for Al-toxicity model groups. Five groups of Al-toxicity model (treated groups) were orally received together with Al each of the following; CoQ10 (200mg/kg), wheat grass (100mg/kg), cocoa powder (24mg/kg), vinpocetine (20mg/kg) or zinc (32mg/kg). Biochemical changes in the serum level of Alanine aminotransferase (ALT), aspartate aminotransferase (AST), alkaline phosphatase (ALP), lactate deshydrogenase (LDH) as well as total bilirubin, lipids, cholesterol, triglycerides, glucose, proteins, creatinine and urea were measured. Liver and kidney specimens from all groups were also collected for the assessment of hepatic and nephrotic level of inflammatory mediators (TNF-α, IL-6β, nuclear factor kappa B (NF-κB), Caspase-3, oxidative parameters (MDA, SOD, TAC, NO) and DNA fragmentation. Histopathological changes in liver and kidney were also evaluated. Results: Three weeks of AlCl3 (70 mg/kg, IP) exposure induced nephro- and hepato-toxicity in rats. Treatment by the all used drugs showed protection against hazards of AlCl3. The protective effects were indicated by the significant decrease in ALT, AST, ALP, LDH as well as total bilirubin, lipids, cholesterol, triglycerides, glucose, creatinine and urea levels which were increased by Al. Liver and kidney of the treated groups showed decrease in MDA, NO, TNF-α, IL-6β, NF-κB, caspase-3 and DNA fragmentation which were increased by Al, together with significant increase in total proteins, SOD and TAC which were decreased by Al. The protection against both nephro- and hepato-toxicity was more pronounced especially with CoQ10 and wheat grass than the other used drugs. Histopathological examinations confirmed the biochemical results of toxicity and of protection. Conclusion: Protection from nephrotoxicity, hepatotoxicity and the consequent degenerations induced by Al can be achieved by using different drugs as CoQ10, wheatgrass, cocoa, vinpocetine and zinc, but CoQ10 as well as wheat grass possesses the most superior protection.

Keywords: aluminum, nephrotoxicity, hepatotoxicity, coenzyme Q10, wheatgrass, cocoa, vinpocetine, zinc

Procedia PDF Downloads 338
2614 Internal DC Short-Circuit Fault Analysis and Protection for VSI of Wind Power Generation Systems

Authors: Mehdi Radmehr, Amir Hamed Mashhadzadeh, Mehdi Jafari

Abstract:

Traditional HVDC systems are tough to DC short circuits as they are current regulated with a large reactance connected in series with cables. Multi-terminal DC wind farm topologies are attracting increasing research attempt. With AC/DC converters on the generator side, this topology can be developed into a multi-terminal DC network for wind power collection, which is especially suitable for large-scale offshore wind farms. For wind farms, the topology uses high-voltage direct-current transmission based on voltage-source converters (VSC-HVDC). Therefore, they do not suffer from over currents due to DC cable faults and there is no over current to react to. In this study, the multi-terminal DC wind farm topology is introduced. Then, possible internal DC faults are analyzed according to type and characteristic. Fault over current expressions are given in detail. Under this characteristic analysis, fault detection and detailed protection methods are proposed. Theoretical analysis and PSCAD/EMTDC simulations are provided.

Keywords: DC short circuits, multi-terminal DC wind farm topologies, HVDC transmission based on VSC, fault analysis

Procedia PDF Downloads 422
2613 Loss Function Optimization for CNN-Based Fingerprint Anti-Spoofing

Authors: Yehjune Heo

Abstract:

As biometric systems become widely deployed, the security of identification systems can be easily attacked by various spoof materials. This paper contributes to finding a reliable and practical anti-spoofing method using Convolutional Neural Networks (CNNs) based on the types of loss functions and optimizers. The types of CNNs used in this paper include AlexNet, VGGNet, and ResNet. By using various loss functions including Cross-Entropy, Center Loss, Cosine Proximity, and Hinge Loss, and various loss optimizers which include Adam, SGD, RMSProp, Adadelta, Adagrad, and Nadam, we obtained significant performance changes. We realize that choosing the correct loss function for each model is crucial since different loss functions lead to different errors on the same evaluation. By using a subset of the Livdet 2017 database, we validate our approach to compare the generalization power. It is important to note that we use a subset of LiveDet and the database is the same across all training and testing for each model. This way, we can compare the performance, in terms of generalization, for the unseen data across all different models. The best CNN (AlexNet) with the appropriate loss function and optimizers result in more than 3% of performance gain over the other CNN models with the default loss function and optimizer. In addition to the highest generalization performance, this paper also contains the models with high accuracy associated with parameters and mean average error rates to find the model that consumes the least memory and computation time for training and testing. Although AlexNet has less complexity over other CNN models, it is proven to be very efficient. For practical anti-spoofing systems, the deployed version should use a small amount of memory and should run very fast with high anti-spoofing performance. For our deployed version on smartphones, additional processing steps, such as quantization and pruning algorithms, have been applied in our final model.

Keywords: anti-spoofing, CNN, fingerprint recognition, loss function, optimizer

Procedia PDF Downloads 137
2612 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 193