Search results for: physical layer technology
5840 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 2335839 Integrating RAG with Prompt Engineering for Dynamic Log Parsing and Anomaly Detections
Authors: Liu Lin Xin
Abstract:
With the increasing complexity of systems, log parsing and anomaly detection have become crucial for maintaining system stability. However, traditional methods often struggle with adaptability and accuracy, especially when dealing with rapidly evolving log content and unfamiliar domains. To address these challenges, this paper proposes approach that integrates Retrieval Augmented Generation (RAG) technology with Prompt Engineering for Large Language Models, applied specifically in LogPrompt. This approach enables dynamic log parsing and intelligent anomaly detection by combining real-time information retrieval with prompt optimization. The proposed method significantly enhances the adaptability of log analysis and improves the interpretability of results. Experimental results on several public datasets demonstrate the method's superior performance, particularly in scenarios lacking training data, where it significantly outperforms traditional methods. This paper introduces a novel technical pathway for log parsing and anomaly detection, showcasing the substantial theoretical value and practical potential.Keywords: log parsing, anomaly detection, RAG, prompt engineering, LLMs
Procedia PDF Downloads 355838 Utilizing Hybrid File Mapping for High-Performance I/O
Authors: Jaechun No
Abstract:
As the technology of NAND flash memory rapidly grows, SSD is becoming an excellent alternative for storage solutions, because of its high random I/O throughput and low power consumption. These SSD potentials have drawn great attention from IT enterprises that seek for better I/O performance. However, high SSD cost per capacity makes it less desirable to construct a large-scale storage subsystem solely composed of SSD devices. An alternative is to build a hybrid storage subsystem where both HDD and SSD devices are incorporated in an economic manner, while employing the strengths of both devices. This paper presents a hybrid file system, called hybridFS, that attempts to utilize the advantages of HDD and SSD devices, to provide a single, virtual address space by integrating both devices. HybridFS not only proposes an efficient implementation for the file management in the hybrid storage subsystem but also suggests an experimental framework for making use of the excellent features of existing file systems. Several performance evaluations were conducted to verify the effectiveness and suitability of hybridFS.Keywords: hybrid file mapping, data layout, hybrid device integration, extent allocation
Procedia PDF Downloads 5065837 Efficiency of Natural Metabolites on Quality Milk Production in Mixed Breed Cows.
Authors: Mariam Azam, Sajjad Ur Rahman, Mukarram Bashir, Muhammad Tahir, Seemal Javaid, Jawad, Aoun Muhammad, Muhammad Zohaib, Hannan Khan
Abstract:
Products of microbial origin are of great importance as they have proved their value in healthcare and nutrition, use of these microbial metabolites acquired from partially fermented soya hulls and wheat bran along with Saccharomyces cerevisiae (DL-22 S/N) substantiates to be a great source for an increase in the total milk production and quality yield.1×109 CFU/ml cells of Saccharomyces cerevisiae (DL-22 S/N) were further grown under in-vivo conditions for the assessment of quality milk production. Two groups with twelve cows, each having the same physical characteristics (Group A and Group B), were under study, Group A was daily fed with 12gm of biological metabolites and 22% protein-pelleted feed. On the other hand, the animals of Group B were provided with no metabolites in their feed. In thirty days of trial, improvement in the overall health, body score, milk protein, milk fat, yield, incidence rate of mastitis, ash, and solid not fat (SNF) was observed. The collected data showed that the average quality milk production was elevated up to 0.45 liter/h/d. However, a reduction in the milk fats up to 0.45% and uplift in the SNF value up to 0.53% of cow milk was also observed. At the same time, the incidence rate of mastitis recorded for the animals under trial was reduced to half, and improved non specific immunity was reported.Keywords: microbial metabolites, post-biotics, animal supplements, animal nutrition, proteins, animal production, fermentation
Procedia PDF Downloads 1015836 Effects of Rockdust as a Soil Stabilizing Agent on Poor Subgrade Soil
Authors: Muhammad Munawar
Abstract:
Pavement destruction is normally associated with the horizontal relocation of subgrade because of pavement engrossing water and inordinate avoidance and differential settlement of material underneath the pavement. The aim of the research is to study the effect of the additives (rockdust) on the stability and the increase of bearing capacity of selected soils in Mardan City. The physical, chemical and designing properties of soil were contemplated, and the soil was treated with added admixture rockdust with the goal of stabilizing the local soil. The stabilization or modification of soil is done by blending of rock dust to soils in the scope of 0 to 85% by the rate increment of 5%, 10%, and 15% individually. The following test was done for treated sample: Atterberg limits (liquid limit, plasticity index, plastic limit), standard compaction test, the California bearing test and the direct shear test. The results demonstrated that the gradation of soil is narrow from the particle size analysis. Plasticity index (P.I), Liquid limit (L.L) and plastic limit (P.L) were shown reduction with the addition of Rock dust. It was concluded that the maximum dry density is increasing with the addition of rockdust up to 10%, beyond 10%, it shows reduction in their content. It was discovered that the Cohesion C diminished, the angle of internal friction and the California bearing ratio (C.B.R) was improved with the addition of Rock dust. The investigation demonstrated that the best stabilizer for the contextual investigation (Toru road Mardan) is the rock dust and the ideal dosage is 10 %.Keywords: rockdust, stabilization, modification, CBR
Procedia PDF Downloads 2835835 Numerical Solution of Space Fractional Order Linear/Nonlinear Reaction-Advection Diffusion Equation Using Jacobi Polynomial
Authors: Shubham Jaiswal
Abstract:
During modelling of many physical problems and engineering processes, fractional calculus plays an important role. Those are greatly described by fractional differential equations (FDEs). So a reliable and efficient technique to solve such types of FDEs is needed. In this article, a numerical solution of a class of fractional differential equations namely space fractional order reaction-advection dispersion equations subject to initial and boundary conditions is derived. In the proposed approach shifted Jacobi polynomials are used to approximate the solutions together with shifted Jacobi operational matrix of fractional order and spectral collocation method. The main advantage of this approach is that it converts such problems in the systems of algebraic equations which are easier to be solved. The proposed approach is effective to solve the linear as well as non-linear FDEs. To show the reliability, validity and high accuracy of proposed approach, the numerical results of some illustrative examples are reported, which are compared with the existing analytical results already reported in the literature. The error analysis for each case exhibited through graphs and tables confirms the exponential convergence rate of the proposed method.Keywords: space fractional order linear/nonlinear reaction-advection diffusion equation, shifted Jacobi polynomials, operational matrix, collocation method, Caputo derivative
Procedia PDF Downloads 4455834 Models of Start-Ups Created in Cooperation with a State University
Authors: Roman Knizek, Denisa Knizkova, Ludmila Fridrichova
Abstract:
The academic environment in Central Europe has recently been transforming itself and is trying to link its research and development with the private sector. However, compared to Western countries, there is a lack of history and continuity because of the centrally controlled economy from the end of the Second World War until the early 1990s. There are two basic models of how to carry out technology transfer between the academic and the business world. The first is to develop something new and then find a suitable private sector partner; the second is to find a partner who has the basic idea and then develop something new in collaboration. This study, unlike some other ones, describes two specific cases that took place in cooperation with the Technical University of Liberec, Faculty of Textiles. As was said before, in one case, a product was first developed, and after that, an investor was sought, and in the other case, there was an investor who wanted a specific product and wanted to help with its development. The study describes the various advantages and disadvantages, including a practical example of the creation of a subsequent start-up.Keywords: start-up, state university, academic environment, licensing agreement
Procedia PDF Downloads 165833 Flexible Work Arrangements for Managers-Gender Diversity and Organizational Development in German Firms
Authors: Marc Gärtner, Monika Huesmann, Katharina Schiederig
Abstract:
While workplace flexibility provides opportunities to better balance work and family care, careers in management are still predominantly based on physical presence, blurred boundaries and a culture of availability at the workplace. Thus, carers (mostly women) still experience disadvantages and stalled careers. In a multi-case study, funded by the German Federal Ministry of Education and Research, success factors and barriers of flexible work arrangements in five big organizations, including three of the largest German companies, have been identified. Using qualitative interview methods, the working models of 10 female and male users of flexible work arrangements like part time, home office and job sharing have been studied. The study group applied a 360-degree approach with focus groups, covering the users’ themselves, their superiors, colleagues and staff as well as in-house human resource managers. The group interviews reveal that success of flexible models is mainly built on three factors: (a) the inclusiveness of the organizational culture, (b) the commitment of leaders and especially the supervisors, and (c) the fitting of the model and the user(s). Flexibilization of time and space can indeed contribute to a better work-life balance. This is, however, not a necessary outcome, as the interviews suggest, but depends on the right implementation of the right model in the particular work environment. Beyond the actual study results, the presentation will also assess the methodological approach.Keywords: flexible work, leadership, organizational culture, work-life balance
Procedia PDF Downloads 3565832 Low-Cost Embedded Biometric System Based on Fingervein Modality
Authors: Randa Boukhris, Alima Damak, Dorra Sellami
Abstract:
Fingervein biometric authentication is one of the most popular and accurate technologies. However, low cost embedded solution is still an open problem. In this paper, a real-time implementation of fingervein recognition process embedded in Raspberry-Pi has been proposed. The use of Raspberry-Pi reduces overall system cost and size while allowing an easy user interface. Implementation of a target technology has guided to opt some specific parallel and simple processing algorithms. In the proposed system, we use four structural directional kernel elements for filtering finger vein images. Then, a Top-Hat and Bottom-Hat kernel filters are used to enhance the visibility and the appearance of venous images. For feature extraction step, a simple Local Directional Code (LDC) descriptor is applied. The proposed system presents an Error Equal Rate (EER) and Identification Rate (IR), respectively, equal to 0.02 and 98%. Furthermore, experimental results show that real-time operations have good performance.Keywords: biometric, Bottom-Hat, Fingervein, LDC, Rasberry-Pi, ROI, Top-Hat
Procedia PDF Downloads 2055831 Determination of the Bearing Capacity of Granular Pumice Soils by Laboratory Tests
Authors: Mustafa Yildiz, Ali Sinan Soganci
Abstract:
Pumice soils are countered in many projects such as transportation roads, channels and residential units throughout the World. The pumice deposits are characterized by the vesicular nature of their particles. When the pumice soils are evaluated considering the geotechnical viewpoint, they differ from silica sands in terms of physical and engineering characteristics. These differences are low grain strength, high friction angle, void ratio and compressibility. At stresses greater than a few hundred kPa, the stress-strain-strength behaviour of these soils is determined by particle crushing. Particle crushing leads to changes in the density and reduction in the components of shear stress due to expansion. In this study, the bearing capacity and behaviour of granular pumice soils compared to sand-gravels were investigated by laboratory model tests. Firstly the geotechnical properties of granular pumice soils were determined; then, the behaviour of pumice soils with an equivalent diameter of sand and gravel soils were investigated by model rectangular and circular foundation types and were compared with each other. For this purpose, basic types of model footing (15*15 cm, 20*20 cm, Φ=15 cm and Φ=20 cm) have been selected. When the experimental results of model bearing capacity are analyzed, the values of sand and gravel bearing capacity tests were found to be 1.0-1.5 times higher than the bearing capacity of pumice the same size. This fact has shown that sand and gravel have a higher bearing capacity than pumice of the similar particle sizes.Keywords: pumice soils, laboratory model tests, bearing capacity, laboratory model tests, Nevşehir
Procedia PDF Downloads 2145830 Instruct Students Effective Ways to Reach an Advanced Level after Graduation
Authors: Huynh Tan Hoi
Abstract:
Considered as one of the hardest languages in the world, Japanese is still the language that many young people choose to learn. Today, with the development of technology, learning foreign languages in general and Japanese language, in particular, is not an impossible barrier. Learning materials are not only from paper books, songs but also through software programs of smartphones or computers. Especially, students who begin to explore effective skills to study this language need to access modern technologies to improve their learning much better. When using the software, some students may feel embarrassed and challenged, but everything would go smoothly after a few days. After completing the course, students will get more knowledge, achieve a higher knowledge such as N2 or N1 Japanese Language Proficiency Test Certificate. In this research paper, 35 students who are studying at Ho Chi Minh City FPT University were asked to complete the questionnaire at the beginning of July up to August of 2018. Through this research, we realize that with the guidance of lecturers, the necessity of using modern software and some effective methods are indispensable in term of improving quality of teaching and learning process.Keywords: higher knowledge, Japanese, methods, software, students
Procedia PDF Downloads 2275829 Methods Used to Perform Requirements Elicitation for Healthcare Software Development
Authors: Tang Jiacheng, Fang Tianyu, Liu Yicen, Xiang Xingzhou
Abstract:
The proportion of healthcare services is increasing throughout the globe. The convergence of mobile technology is driving new business opportunities, innovations in healthcare service delivery and the promise of a better life tomorrow for different populations with various healthcare needs. One of the most important phases for the combination of health care and mobile applications is to elicit requirements correctly. In this paper, four articles from different research directions with four topics on healthcare were detailed analyzed and summarized. We identified the underlying problems in guidance to develop mobile applications to provide healthcare service for Older adults, Women in menopause, Patients undergoing covid. These case studies cover several elicitation methods: survey, prototyping, focus group interview and questionnaire. And the effectiveness of these methods was analyzed along with the advantages and limitations of these methods, which is beneficial to adapt the elicitation methods for future software development process.Keywords: healthcare, software requirement elicitation, mobile applications, prototyping, focus group interview
Procedia PDF Downloads 1485828 Biosorption of Manganese Mine Effluents Using Crude Chitin from Philippine Bivalves
Authors: Randy Molejona Jr., Elaine Nicole Saquin
Abstract:
The area around the Ajuy river in Iloilo, Philippines, is currently being mined for manganese ore, and river water samples exceed the maximum manganese contaminant level set by US-EPA. At the same time, the surplus of local bivalve waste is another environmental concern. Synthetic chemical treatment compromises water quality, leaving toxic residues. Therefore, an alternative treatment process is biosorption or using the physical and chemical properties of biomass to adsorb heavy metals in contaminated water. The study aims to extract crude chitin from shell wastes of Bractechlamys vexillum, Perna viridis, and Placuna placenta and determine its adsorption capacity on manganese in simulated and actual mine water. Crude chitin was obtained by pulverization, deproteinization, demineralization, and decolorization of shells. Biosorption by flocculation followed 5 g: 50 mL chitin-to-water ratio. Filtrates were analyzed using MP-AES after 24 hours. In both actual and simulated mine water, respectively, B. vexillum yielded the highest adsorption percentage of 91.43% and 99.58%, comparable to P. placenta of 91.43% and 99.37%, while significantly different to P. viridis of -57.14% and 31.53%, (p < 0.05). FT-IR validated the presence of chitin in shells based on carbonyl-containing functional groups at peaks 1530-1560 cm⁻¹ and 1660-1680 cm⁻¹. SEM micrographs showed the amorphous and non-homogenous structure of chitin. Thus, crude chitin from B. vexillum and P. placenta can be bio-sorbents for water treatment of manganese-impacted effluents, and promote appropriate waste management of local bivalves.Keywords: biosorption, chitin, FT-IR, mine effluents, SEM
Procedia PDF Downloads 2025827 A Case Study Approach to the Rate the Eco Sensitivity of Green Infrastructure Solutions
Abstract:
In the area of civil infrastructure, there is an urgent need to apply technologies that deliver infrastructure sustainably in a way that is cost-effective. Civil engineering projects can have a significant impact on ecological and social systems if not correctly planned, designed and implemented. It can impact climate change by addressing the issue of flooding and sustainability. Poor design choices now can result in future generations to live in a climate with depleted resources and without green spaces. The objectives of the research study were to rate the sensitivity of various greener infrastructure technologies that can be used in township infrastructure, at the various stages of the project. This paper discusses the Green Township Infrastructure Design Toolkit, that is used to rate the sustainability of infrastructure service projects. Various case studies were undertaken on a range of infrastructure projects to test the sensitivity of various design solution against sustainability criteria. The Green reporting tools ensure efficient, economical and sustainable provision of infrastructure services.Keywords: eco-efficiency, green infrastructure, green technology, infrastructure design, sustainable development
Procedia PDF Downloads 3825826 Survey of Epidemiology and Mechanisms of Badminton Injury Using Medical Check-Up and Questionnaire of School Age Badminton Players
Authors: Xiao Zhou, Kazuhiro Imai, Xiaoxuan Liu
Abstract:
Badminton is one type of racket sports that requires repetitive overhead motion, with the shoulder in abduction/external rotation and requires players to perform jumps, lunges, and quick directional changes. These characteristics could be stressful for body regions that may cause badminton injuries. Regarding racket players including badminton players, there have not been any studies that have utilized medical check-up to evaluate epidemiology and mechanism of injuries. In addition, epidemiology of badminton injury in school age badminton players is unknown. The first purpose of this study was to investigate the badminton injuries, physical fitness parameters, and intensity of shoulder pain using medical check-up so that the mechanisms of shoulder injuries might be revealed. The second purpose of this study was to survey the distribution of badminton injuries in elementary school age players so that injury prevention can be implemented as early as possible. The results of this study revealed that shoulder pain occurred in all players, and present shoulder pain players had smaller weight, greater shoulder external rotation (ER) gain, significantly thinner circumference of upper limbs and greater trunk extension. Identifying players with specific of these factors may enhance the prevention of badminton injury. This study also shows that there are high incidences of knee, ankle, plantar, and shoulder injury or pain in elementary school age badminton players. Injury prevention program might be implemented for elementary school age players.Keywords: badminton injury, epidemiology, medical check-up, school age players
Procedia PDF Downloads 1385825 The Effect of Blood Flow Restriction on the Knee Rehabilitation
Authors: O. Casasayas, M. Vigo, R. Navarro, P. Ragazzi, P. Alvarez, A. Perez-Bellmunt
Abstract:
Introduction: The blood flow restriction training (BFR) is a method of muscle training that allows increasing the stress of muscle tissue to enhance the muscle cross-section and strength. This type of training has clear benefits in the rehabilitation field since it can improve muscle strength using low mechanical loads. The aim of this study is to know in which knee pathologies BFR has been used, what methodology was used and what were the obtained results. Study design: We performed a systematic literature search using strategies for the concepts of “blood flow restriction OR blood flow restriction training AND knee” in Medline. Articles were screened by authors and included if they used the blood flow restriction training in pathology of the knee. Results: The pathology more frequently treated by BFR was knee osteoarthritis and the variables most analyzed were strength and pain. The vascular occlusion used was 80% in the major part of studies. The groups of BFR obtained an increase of strength with less pain but not always the results are statistically significant. The evidence levels are poor in the high number of studies because in some cases there is not a control group or the evaluators were not blinded. Conclusion: The use of BFR is useful to improve muscle strength in knee pathology since it does not increase the pain, but more studies are needed to see (comprehend) if this type of treatment obtains better results than a conventional therapy. No studies have been found that compare the different occlusion effects in both the strength improvement and the pain reduction. Neither studies that analyse the effects of BFR on the muscle contractile parameters have been found.Keywords: blood flow restriction training, knee, arthroscopy knee, physical therapy
Procedia PDF Downloads 1685824 A Fast Calculation Approach for Position Identification in a Distance Space
Authors: Dawei Cai, Yuya Tokuda
Abstract:
The market of localization based service (LBS) is expanding. The acquisition of physical location is the fundamental basis for LBS. GPS, the de facto standard for outdoor localization, does not work well in indoor environment due to the blocking of signals by walls and ceiling. To acquire high accurate localization in an indoor environment, many techniques have been developed. Triangulation approach is often used for identifying the location, but a heavy and complex computation is necessary to calculate the location of the distances between the object and several source points. This computation is also time and power consumption, and not favorable to a mobile device that needs a long action life with battery. To provide a low power consumption approach for a mobile device, this paper presents a fast calculation approach to identify the location of the object without online solving solutions to simultaneous quadratic equations. In our approach, we divide the location identification into two parts, one is offline, and other is online. In offline mode, we make a mapping process that maps the location area to distance space and find a simple formula that can be used to identify the location of the object online with very light computation. The characteristic of the approach is a good tradeoff between the accuracy and computational amount. Therefore, this approach can be used in smartphone and other mobile devices that need a long work time. To show the performance, some simulation experimental results are provided also in the paper.Keywords: indoor localization, location based service, triangulation, fast calculation, mobile device
Procedia PDF Downloads 1745823 Research on the Spatial Evolution of Tourism-Oriented Rural Settlements: Take the Xiaochanfangyu Village, Dongshuichang Village, Maojiayu Village in Jixian County, Tianjin City as Examples
Authors: Yu Zhang, Jie Wu, Li Dong
Abstract:
Rural tourism is the service industry which regards the agricultural production, rural life, rural nature and cultural landscape as the tourist attraction. It aims to meet the needs of the city tourists such as country sightseeing, vacation, and leisure. According to the difference of the tourist resources, the rural settlements can be divided into different types: The type of tourism resources, scenic spot, and peri-urban. In the past ten years, the rural tourism has promoted the industrial transformation and economic growth in rural areas of China. And it is conducive to the coordinated development of urban and rural areas and has greatly improved the ecological environment and the standard of living for farmers in rural areas. At the same time, a large number of buildings and sites are built in the countryside in order to enhance the tourist attraction and the ability of tourist reception and also to increase the travel comfort and convenience, which has significant influence on the spatial evolution of the village settlement. This article takes the XiangYing Subdistrict, which is in JinPu District of Dalian in China as the exemplification and uses the technology of Remote Sensing (RS), Geographic Information System (GIS) and the technology of Landscape Spatial Analysis to study the influence of the rural tourism development in the rural settlement spaces in four steps. First, acquiring the remote sensing image data at different times of 8 administrative villages in the XiangYing Subdistrict, by using the remote sensing application EDRAS8.6; second, vectoring basic maps of XiangYing Subdistrict including its land-use map with the application of ArcGIS 9.3, associating with social and economic attribute data of rural settlements and analyzing on the rural evolution visually; third, quantifying the comparison of these patches in rural settlements by using the landscape spatial calculation application Fragstats 3.3 and analyzing on the evolution of the spatial structure of settlement in macro and medium scale; finally, summarizing the evolution characteristics and internal reasons of tourism-oriented rural settlements. The main findings of this article include: first of all, there is difference in the evolution of the spatial structure between the developing rural settlements and undeveloped rural settlements among the eight administrative villages; secondly, the villages relying on the surrounding tourist attractions, the villages developing agricultural ecological garden and the villages with natural or historical and cultural resources have different laws of development; then, the rural settlements whose tourism development in germination period, development period and mature period have different characteristics of spatial evolution; finally, the different evolution modes of the tourism-oriented rural settlement space have different influences on the protection and inheritance of the village scene. The development of tourism has a significant impact on the spatial evolution of rural settlement. The intensive use of rural land and natural resources is the fundamental principle to protect the rural cultural landscape and ecological environment as well as the critical way to improve the attraction of rural tourism and promote the sustainable development of countryside.Keywords: landscape pattern, rural settlement, spatial evolution, tourism-oriented, Xiangying Subdistrict
Procedia PDF Downloads 2915822 Competencies of a Commercial Grain Farmer: A Classic Grounded Theory Approach
Authors: Thapelo Jacob Moloi
Abstract:
This paper purports to present the findings in relation to the competencies of commercial grain farmers using a classic grounded theory method. A total of about eighteen semi-structured interviews with farmers, former farmers, farm workers, and agriculture experts were conducted. Findings explored competencies in the form of skills, knowledge and personal attributes that commercial grain farmers possess. Skills range from production skills, financial management skill, time management skill, human resource management skill, planning skill to mechanical skill. Knowledge ranges from soil preparation, locality, and technology to weather knowledge. The personal attributes that contribute to shaping a commercial grain farmer are so many, but for this study, seven stood out as a passion, work dedication, self-efficacy, humbleness, intelligence, emotional stability, and patience.Keywords: grain farming, farming competencies, classic grounded theory, competency model
Procedia PDF Downloads 795821 The Effect of Doing Sports Actively on the Brand Awareness and the Brand Loyalty of Young Consumer
Authors: Murat Erdoğdu, Mehmet Öçalan
Abstract:
The main aim of this study is to find out the effects of the concepts of the brand awareness and the brand loyalty of teenagers (13-18) on their criteria to buy the products that attract high interest in the groups that do sports actively and vice versa. The training shoes that are thought to have high interests of teenagers were chosen in the study (because every student uses training shoes at least in physical education lessons) and searching the criteria to choose these products is one of the aims of this study. The sample of the research consisted of 775 teenagers doing sports (218 females, 557 males) and 752 teenagers not doing sports (399 females, 353 males) from the primary and secondary schools in the center of Ankara. 1527 students in total voluntarily participated in the study. When the effects of the brand functions perceived about the sample on the brand awareness was analyzed, it was found out that all of three function types have a positive and significant effect on the brand awareness. It was found out that there was a positive and average relationship between the dependence on a brand and the brand loyalty. It was understood that there was a positive and weak relationship between the brand loyalty and the general brand awareness in training shoes among teenagers. The groups of the teenagers doing sports and of the teenagers not doing sports showed significant differences in their preferences about training shoes. The effects of the criteria to buy training shoes on the brand loyalty showed significant differences in the groups. In addition, it was determined that according to their variables of doing sports actively, the teenagers doing sports actively have significantly higher brand awareness and brand loyalty than the teenagers not doing sports.Keywords: brand awareness, brand loyalty sports marketing, teenagers, the level of doing sports
Procedia PDF Downloads 4515820 Research on the Risks of Railroad Receiving and Dispatching Trains Operators: Natural Language Processing Risk Text Mining
Authors: Yangze Lan, Ruihua Xv, Feng Zhou, Yijia Shan, Longhao Zhang, Qinghui Xv
Abstract:
Receiving and dispatching trains is an important part of railroad organization, and the risky evaluation of operating personnel is still reflected by scores, lacking further excavation of wrong answers and operating accidents. With natural language processing (NLP) technology, this study extracts the keywords and key phrases of 40 relevant risk events about receiving and dispatching trains and reclassifies the risk events into 8 categories, such as train approach and signal risks, dispatching command risks, and so on. Based on the historical risk data of personnel, the K-Means clustering method is used to classify the risk level of personnel. The result indicates that the high-risk operating personnel need to strengthen the training of train receiving and dispatching operations towards essential trains and abnormal situations.Keywords: receiving and dispatching trains, natural language processing, risk evaluation, K-means clustering
Procedia PDF Downloads 915819 Exploration of the Psychological Aspect of Empowerment of Marginalized Women Working in the Unorganized Sector of Metropolis City
Authors: Sharmistha Chanda, Anindita Chaudhuri
Abstract:
This exploratory study highlights the psychological aspects of women's empowerment to find the importance of the psychological dimension of empowerment, such as; meaning, competence, self-determination, impact, and assumption, especially in the weaker marginalized section of women. A large proportion of rural, suburban, and urban poor survive by working in unorganized sectors of metropolitan cities. Relative Poverty and lack of employment in rural areas and small towns drive many people to the metropolitan city for work and livelihood. Women working in that field remain unrecognized as people of low socio-economic status. They are usually willing to do domestic work as daily wage workers, single wage earners, street vendors, family businesses like agricultural activities, domestic workers, and self-employed. Usually, these women accept such jobs because they do not have such an opportunity as they lack the basic level of education that is required for better-paid jobs. The unorganized sector, on the other hand, has no such clear-cut employer-employee relationships and lacks most forms of social protection. Having no fixed employer, these workers are casual, contractual, migrant, home-based, own-account workers who attempt to earn a living from whatever meager assets and skills they possess. Women have become more empowered both financially and individually through small-scale business ownership or entrepreneurship development and in household-based work. In-depth interviews have been done with 10 participants in order to understand their living styles, habits, self-identity, and empowerment in their society in order to evaluate the key challenges that they may face following by qualitative research approach. Transcription has been done from the collected data. The three-layer coding technique guides the data analysis process, encompassing – open coding, axial coding, and selective coding. Women’s Entrepreneurship is one of the foremost concerns as the Government, and non-government institutions are readily serving this domain with the primary objectives of promoting self-employment opportunities in general and empowering women in specific. Thus, despite hardship and unrecognition unorganized sector provides a huge array of opportunities for rural and sub-urban poor to earn. Also, the upper section of society tends to depend on this working force. This study gave an idea about the well-being, and meaning in life, life satisfaction on the basis of their lived experience.Keywords: marginalized women, psychological empowerment, relative poverty, and unorganized sector.
Procedia PDF Downloads 585818 Warfield Spying Robot Using LoRa
Authors: Madhavi T., Sireesha Sakhamuri, Hema Sri A., Harika K.
Abstract:
Today as technological advancements are taking place, these advancements are being used by the armed forces to reduce the risk of their losses and to defeat their enemies. The development of sophisticated technology relies mostly on the use of high- tech weapons or machinery. Robotics is one of the hot spheres of the modern age in which nations concentrate on the state of war and peace for military purposes. They have been in use for demining and rescue operations for some time now but are being propelled by using them for combat and spy missions. This project focuses on creating a LoRa-based spying robot with a wireless IP camera attached to it that can rising the human target. This robot transmits the signal via an IP camera to the base station. One of this project’s major applications can be analyzed using a PC that can be used to control the robot’s movement. The robot sends the signal through the LoRa transceiver at the base station to the LoRa transceiver mounted on the robot. With this function, the, robot can relay videos in real- time along with anti-collision capabilities and the enemies in the war zone cannot recognize them. More importantly, this project focuses on increasing communication using LoRa.Keywords: lora, IP cam, metal detector, laser shoot
Procedia PDF Downloads 1115817 TACTICAL: Ram Image Retrieval in Linux Using Protected Mode Architecture’s Paging Technique
Authors: Sedat Aktas, Egemen Ulusoy, Remzi Yildirim
Abstract:
This article explains how to get a ram image from a computer with a Linux operating system and what steps should be followed while getting it. What we mean by taking a ram image is the process of dumping the physical memory instantly and writing it to a file. This process can be likened to taking a picture of everything in the computer’s memory at that moment. This process is very important for tools that analyze ram images. Volatility can be given as an example because before these tools can analyze ram, images must be taken. These tools are used extensively in the forensic world. Forensic, on the other hand, is a set of processes for digitally examining the information on any computer or server on behalf of official authorities. In this article, the protected mode architecture in the Linux operating system is examined, and the way to save the image sample of the kernel driver and system memory to disk is followed. Tables and access methods to be used in the operating system are examined based on the basic architecture of the operating system, and the most appropriate methods and application methods are transferred to the article. Since there is no article directly related to this study on Linux in the literature, it is aimed to contribute to the literature with this study on obtaining ram images. LIME can be mentioned as a similar tool, but there is no explanation about the memory dumping method of this tool. Considering the frequency of use of these tools, the contribution of the study in the field of forensic medicine has been the main motivation of the study due to the intense studies on ram image in the field of forensics.Keywords: linux, paging, addressing, ram-image, memory dumping, kernel modules, forensic
Procedia PDF Downloads 1185816 The Generalized Lemaitre-Tolman-Bondi Solutions in Modeling the Cosmological Black Holes
Authors: Elena M. Kopteva, Pavlina Jaluvkova, Zdenek Stuchlik
Abstract:
In spite of the numerous attempts to close the discussion about the influence of cosmological expansion on local gravitationally bounded systems, this question arises in literature again and again and remains still far from its final resolution. Here one of the main problems is the problem of obtaining a physically adequate model of strongly gravitating object immersed in non-static cosmological background. Such objects are usually called ‘cosmological’ black holes and are of great interest in wide set of cosmological and astrophysical areas. In this work the set of new exact solutions of the Einstein equations is derived for the flat space that generalizes the known Lemaitre-Tolman-Bondi solution for the case of nonzero pressure. The solutions obtained are pretending to describe the black hole immersed in nonstatic cosmological background and give a possibility to investigate the hot problems concerning the effects of the cosmological expansion in gravitationally bounded systems, the structure formation in the early universe, black hole thermodynamics and other related problems. It is shown that each of the solutions obtained contains either the Reissner-Nordstrom or the Schwarzschild black hole in the central region of the space. It is demonstrated that the approach of the mass function use in solving of the Einstein equations allows clear physical interpretation of the resulting solutions, that is of much benefit to any their concrete application.Keywords: exact solutions of the Einstein equations, cosmological black holes, generalized Lemaitre-Tolman-Bondi solutions, nonzero pressure
Procedia PDF Downloads 4235815 Texturing of Tool Insert Using Femtosecond Laser
Authors: Ashfaq Khan, Aftab Khan, Mushtaq Khan, Sarem Sattar, Mohammad A Sheikh, Lin Li
Abstract:
Chip removal processes are one of key processes of the manufacturing industry where chip removal is conducted by tool inserts of exceptionally hard materials. Tungsten carbide has been extensively used as tool insert for machining processes involving chip removal processes. These hard materials are generally fabricated by single step sintering process as further modification after fabrication in these materials cannot be done easily. Advances in tool surface modification have revealed that advantages such as improved tribological properties and extended tool life can be harnessed from the same tool by texturing the tool rake surface. Moreover, it has been observed that the shape and location of the texture also influences the behavior. Although texturing offers plentiful advantages the challenge lies in the generation of textures on the tool surface. Extremely hard material such as diamond is required to process tungsten carbide. Laser is unique processing tool that does not have a physical contact with the material and thus does not wear. In this research the potential of utilizing laser for texturing of tungsten carbide to develop custom features would be studied. A parametric study of texturing of Tungsten Carbide with a femtosecond laser would be conducted to investigate the process parameters and establish the feasible processing window. The effect of fluence, scan speed and number of repetition would be viewed in detail. Moreover, the mechanism for the generation of features would also be reviewed.Keywords: laser, texturing, femtosecond, tungsten carbide
Procedia PDF Downloads 6585814 Implementation of Big Data Concepts Led by the Business Pressures
Authors: Snezana Savoska, Blagoj Ristevski, Violeta Manevska, Zlatko Savoski, Ilija Jolevski
Abstract:
Big data is widely accepted by the pharmaceutical companies as a result of business demands create through legal pressure. Pharmaceutical companies have many legal demands as well as standards’ demands and have to adapt their procedures to the legislation. To manage with these demands, they have to standardize the usage of the current information technology and use the latest software tools. This paper highlights some important aspects of experience with big data projects implementation in a pharmaceutical Macedonian company. These projects made improvements of their business processes by the help of new software tools selected to comply with legal and business demands. They use IT as a strategic tool to obtain competitive advantage on the market and to reengineer the processes towards new Internet economy and quality demands. The company is required to manage vast amounts of structured as well as unstructured data. For these reasons, they implement projects for emerging and appropriate software tools which have to deal with big data concepts accepted in the company.Keywords: big data, unstructured data, SAP ERP, documentum
Procedia PDF Downloads 2715813 How Educational Settings Can Influence Development of Creativity through Play in Young Children
Authors: D. M. W. Munasinghe
Abstract:
This study focuses on how teachers view and use play to influence creativity in preschool children. Play is strongly featured in most of the discussions about creativity in young children. Hence, it was noted through direct observation that most preschool teachers are not concerned with promoting play to develop the child’s creativity. Therefore, this study attempts to investigate how the teachers use play, for the development of creativity in the preschool environment. The survey method was used as the research design and interviews, observations and document perusal were used as data collection methods. The sample consisted of 20 preschools from selected administrative divisions in the Colombo district. It was revealed that a majority of preschool teachers used folk games as a means of involving children in play. Teachers assume that this type of guided play will motivate the child learn new words, memorization and provide enjoyment. Eighty percent of the preschool teachers used the play equipment installed in the preschool premises to encourage children to get involved in activities calculated at promoting the physical development of the child. In 40% of the preschools visited it was noticed that when children were given their break they created their own forms of free play and enjoyed themselves thoroughly in the little time available to them. Also, about 20% of preschool teachers promoted imaginative play with their preschoolers. There was also the situation where the role of play was interpreted negatively by the teachers who assigned the children to copy letters and numerals during the time assigned for play. This has a negative impact on the child’s creativity. In conclusion, it was felt that the teachers do not make the best use of the opportunity available to use the child’s enthusiasm to stimulate creative actions his/her and that there is no suitable environment to develop creativity through play.Keywords: creativity, preschool children, preschool environment, play method
Procedia PDF Downloads 3865812 Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence
Authors: Muhammad Nooraiman bin Noorashid, Mohd Sharizuan bin Mohd Omar, Mohd Zabri Adil bin Talib, Aswami Fadillah bin Mohd Ariffin
Abstract:
Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.Keywords: cryptocurrency, bitcoin, digital wallet, digital forensics
Procedia PDF Downloads 3415811 Web 2.0 in Higher Education: The Instructors’ Acceptance in Higher Educational Institutes in Kingdom of Bahrain
Authors: Amal M. Alrayes, Hayat M. Ali
Abstract:
Since the beginning of distance education with the rapid evolution of technology, the social network plays a vital role in the educational process to enforce the interaction been the learners and teachers. There are many Web 2.0 technologies, services and tools designed for educational purposes. This research aims to investigate instructors’ acceptance towards web-based learning systems in higher educational institutes in Kingdom of Bahrain. Questionnaire is used to investigate the instructors’ usage of Web 2.0 and the factors affecting their acceptance. The results confirm that instructors had high accessibility to such technologies. However, patterns of use were complex. Whilst most expressed interest in using online technologies to support learning activities, learners seemed cautious about other values associated with web-based system, such as the shared construction of knowledge in a public format. The research concludes that there are main factors that affect instructors’ adoption which are security, performance expectation, perceived benefits, subjective norm, and perceived usefulness.Keywords: Web 2.0, higher education, acceptance, students' perception
Procedia PDF Downloads 337