Search results for: effective angle of attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11038

Search results for: effective angle of attack

10078 Facebook Spam and Spam Filter Using Artificial Neural Networks

Authors: A. Fahim, Mutahira N. Naseem

Abstract:

SPAM is any unwanted electronic message or material in any form posted to many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites facebook become the leading one. With increase in usage different users start abusive use of facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays facebook users faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.

Keywords: artificial neural networks, facebook spam, social networking sites, spam filter

Procedia PDF Downloads 369
10077 Multi-Walled Carbon Nanotubes as Nucleating Agents

Authors: Rabindranath Jana, Plabani Basu, Keka Rana

Abstract:

Nucleating agents are widely used to modify the properties of various polymers. The rate of crystallization and the size of the crystals have a strong impact on mechanical and optical properties of a polymer. The addition of nucleating agents to the semi-crystalline polymers provides a surface on which the crystal growth can start easily. As a consequence, fast crystal formation will result in many small crystal domains so that the cycle times for injection molding may be reduced. Moreover, the mechanical properties e.g., modulus, tensile strength, heat distortion temperature and hardness may increase. In the present work, multi-walled carbon nanotubes (MWNTs) as nucleating agents for the crystallization of poly (e-caprolactone)diol (PCL). Thus nanocomposites of PCL filled with MWNTs were prepared by solution blending. Differential scanning calorimetry (DSC) tests were carried out to study the effect of CNTs on on-isothermal crystallization of PCL. The polarizing optical microscopy (POM), and wide-angle X-ray diffraction (WAXD) were used to study the morphology and crystal structure of PCL and its nanocomposites. It is found that MWNTs act as effective nucleating agents that significantly shorten the induction period of crystallization and however, decrease the crystallization rate of PCL, exhibiting a remarkable decrease in the Avrami exponent n, surface folding energy σe and crystallization activation energy ΔE. The carbon-based fillers act as templates for hard block chains of PCL to form an ordered structure on the surface of nanoparticles during the induction period, bringing about some increase in equilibrium temperature. The melting process of PCL and its nanocomposites are also studied; the nanocomposites exhibit two melting peaks at higher crystallization temperature which mainly refer to the melting of the crystals with different crystal sizes however, PCL shows only one melting temperature.

Keywords: poly(e-caprolactone)diol, multiwalled carbon nanotubes, composite materials, nonisothermal crystallization, crystal structure, nucleation

Procedia PDF Downloads 489
10076 Influential Parameters in Estimating Soil Properties from Cone Penetrating Test: An Artificial Neural Network Study

Authors: Ahmed G. Mahgoub, Dahlia H. Hafez, Mostafa A. Abu Kiefa

Abstract:

The Cone Penetration Test (CPT) is a common in-situ test which generally investigates a much greater volume of soil more quickly than possible from sampling and laboratory tests. Therefore, it has the potential to realize both cost savings and assessment of soil properties rapidly and continuously. The principle objective of this paper is to demonstrate the feasibility and efficiency of using artificial neural networks (ANNs) to predict the soil angle of internal friction (Φ) and the soil modulus of elasticity (E) from CPT results considering the uncertainties and non-linearities of the soil. In addition, ANNs are used to study the influence of different parameters and recommend which parameters should be included as input parameters to improve the prediction. Neural networks discover relationships in the input data sets through the iterative presentation of the data and intrinsic mapping characteristics of neural topologies. General Regression Neural Network (GRNN) is one of the powerful neural network architectures which is utilized in this study. A large amount of field and experimental data including CPT results, plate load tests, direct shear box, grain size distribution and calculated data of overburden pressure was obtained from a large project in the United Arab Emirates. This data was used for the training and the validation of the neural network. A comparison was made between the obtained results from the ANN's approach, and some common traditional correlations that predict Φ and E from CPT results with respect to the actual results of the collected data. The results show that the ANN is a very powerful tool. Very good agreement was obtained between estimated results from ANN and actual measured results with comparison to other correlations available in the literature. The study recommends some easily available parameters that should be included in the estimation of the soil properties to improve the prediction models. It is shown that the use of friction ration in the estimation of Φ and the use of fines content in the estimation of E considerable improve the prediction models.

Keywords: angle of internal friction, cone penetrating test, general regression neural network, soil modulus of elasticity

Procedia PDF Downloads 412
10075 Robust Control of Cyber-Physical System under Cyber Attacks Based on Invariant Tubes

Authors: Bruno Vilić Belina, Jadranko Matuško

Abstract:

The rapid development of cyber-physical systems significantly influences modern control systems introducing a whole new range of applications of control systems but also putting them under new challenges to ensure their resiliency to possible cyber attacks, either in the form of data integrity attacks or deception attacks. This paper presents a model predictive approach to the control of cyber-physical systems robust to cyber attacks. We assume that a cyber attack can be modelled as an additive disturbance that acts in the measuring channel. For such a system, we designed a tube-based predictive controller based. The performance of the designed controller has been verified in Matlab/Simulink environment.

Keywords: control systems, cyber attacks, resiliency, robustness, tube based model predictive control

Procedia PDF Downloads 63
10074 An Analysis of Pick Travel Distances for Non-Traditional Unit Load Warehouses with Multiple P/D Points

Authors: Subir S. Rao

Abstract:

Existing warehouse configurations use non-traditional aisle designs with a central P/D point in their models, which is mathematically simple but less practical. Many warehouses use multiple P/D points to avoid congestion for pickers, and different warehouses have different flow policies and infrastructure for using the P/D points. Many warehouses use multiple P/D points with non-traditional aisle designs in their analytical models. Standard warehouse models introduce one-sided multiple P/D points in a flying-V warehouse and minimize pick distance for a one-way travel between an active P/D point and a pick location with P/D points, assuming uniform flow rates. A simulation of the mathematical model generally uses four fixed configurations of P/D points which are on two different sides of the warehouse. It can be easily proved that if the source and destination P/D points are both chosen randomly, in a uniform way, then minimizing the one-way travel is the same as minimizing the two-way travel. Another warehouse configuration analytically models the warehouse for multiple one-sided P/D points while keeping the angle of the cross-aisles and picking aisles as a decision variable. The minimization of the one-way pick travel distance from the P/D point to the pick location by finding the optimal position/angle of the cross-aisle and picking aisle for warehouses having different numbers of multiple P/D points with variable flow rates is also one of the objectives. Most models of warehouses with multiple P/D points are one-way travel models and we extend these analytical models to minimize the two-way pick travel distance wherein the destination P/D is chosen optimally for the return route, which is not similar to minimizing the one-way travel. In most warehouse models, the return P/D is chosen randomly, but in our research, the return route P/D point is chosen optimally. Such warehouses are common in practice, where the flow rates at the P/D points are flexible and depend totally on the position of the picks. A good warehouse management system is efficient in consolidating orders over multiple P/D points in warehouses where the P/D is flexible in function. In the latter arrangement, pickers and shrink-wrap processes are not assigned to particular P/D points, which ultimately makes the P/D points more flexible and easy to use interchangeably for picking and deposits. The number of P/D points considered in this research uniformly increases from a single-central one to a maximum of each aisle symmetrically having a P/D point below it.

Keywords: non-traditional warehouse, V cross-aisle, multiple P/D point, pick travel distance

Procedia PDF Downloads 33
10073 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 146
10072 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 150
10071 Creating Positive Learning Environment

Authors: Samia Hassan, Fouzia Latif

Abstract:

In many countries, education is still far from being a knowledge industry in the sense of own practices that are not yet being transformed by knowledge about the efficacy of those practices. The core question of this paper is why students get bored in class? Have we balanced between the creation and advancement of an engaging learning community and effective learning environment? And between, giving kids confidence to achieve their maximum and potential goals, we sand managing student’s behavior. We conclude that creating a positive learning environment enhances opportunities for young children to feel safe, secure, and to supported in order to do their best learning. Many factors can use in classrooms aid to the positive environment like course content, class preparation, and behavior.

Keywords: effective, environment, learning, positive

Procedia PDF Downloads 560
10070 Determination of the Structural Parameters of Calcium Phosphate for Biomedical Use

Authors: María Magdalena Méndez-González, Miguel García Rocha, Carlos Manuel Yermo De la Cruz

Abstract:

Calcium phosphate (Ca5(PO4)3(X)) is widely used in orthopedic applications and is widely used as powder and granules. However, their presence in bone is in the form of nanometric needles 60 nm in length with a non-stoichiometric phase of apatite contains CO3-2, Na+, OH-, F-, and other ions in a matrix of collagen fibers. The crystal size, morphology control and interaction with cells are essential for the development of nanotechnology. The structural results of calcium phosphate, synthesized by chemical precipitation with crystal size of 22.85 nm are presented in this paper. The calcium phosphate powders were analyzed by X-ray diffraction, energy dispersive spectroscopy (EDS), infrared spectroscopy and FT-IR transmission electron microscopy. Network parameters, atomic positions, the indexing of the planes and the calculation of FWHM (full width at half maximum) were obtained. The crystal size was also calculated using the Scherer equation d (hkl) = cλ/βcosѲ. Where c is a constant related to the shape of the crystal, the wavelength of the radiation used for a copper anode is 1.54060Å, Ѳ is the Bragg diffraction angle, and β is the width average peak height of greater intensity. Diffraction pattern corresponding to the calcium phosphate called hydroxyapatite phase of a hexagonal crystal system was obtained. It belongs to the space group P63m with lattice parameters a = 9.4394 Å and c = 6.8861 Å. The most intense peak is obtained 2Ѳ = 31.55 (FWHM = 0.4798), with a preferred orientation in 121. The intensity difference between the experimental data and the calculated values is attributable to the temperature at which the sintering was performed. The intensity of the highest peak is at angle 2Ѳ = 32.11. The structure of calcium phosphate obtained was a hexagonal configuration. The intensity changes in the peaks of the diffraction pattern, in the lattice parameters at the corners, indicating the possible presence of a dopant. That each calcium atom is surrounded by a tetrahedron of oxygen and hydrogen was observed by infrared spectra. The unit cell pattern corresponds to hydroxyapatite and transmission electron microscopic crystal morphology corresponding to the hexagonal phase with a preferential growth along the c-plane was obtained.

Keywords: structure, nanoparticles, calcium phosphate, metallurgical and materials engineering

Procedia PDF Downloads 497
10069 A Numerical Method to Evaluate the Elastoplastic Material Properties of Fiber Reinforced Composite

Authors: M. Palizvan, M. H. Sadr, M. T. Abadi

Abstract:

The representative volume element (RVE) plays a central role in the mechanics of random heterogeneous materials with a view to predicting their effective properties. In this paper, a computational homogenization methodology, developed to determine effective linear elastic properties of composite materials, is extended to predict the effective nonlinear elastoplastic response of long fiber reinforced composite. Finite element simulations of volumes of different sizes and fiber volume fractures are performed for calculation of the overall response RVE. The dependencies of the overall stress-strain curves on the number of fibers inside the RVE are studied in the 2D cases. Volume averaged stress-strain responses are generated from RVEs and compared with the finite element calculations available in the literature at moderate and high fiber volume fractions. For these materials, the existence of an RVE is demonstrated for the sizes of RVE corresponding to 10–100 times the diameter of the fibers. In addition, the response of small size RVE is found anisotropic, whereas the average of all large ones leads to recover the isotropic material properties.

Keywords: homogenization, periodic boundary condition, elastoplastic properties, RVE

Procedia PDF Downloads 149
10068 Space Time Adaptive Algorithm in Bi-Static Passive Radar Systems for Clutter Mitigation

Authors: D. Venu, N. V. Koteswara Rao

Abstract:

Space – time adaptive processing (STAP) is an effective tool for detecting a moving target in spaceborne or airborne radar systems. Since airborne passive radar systems utilize broadcast, navigation and excellent communication signals to perform various surveillance tasks and also has attracted significant interest from the distinct past, therefore the need of the hour is to have cost effective systems as compared to conventional active radar systems. Moreover, requirements of small number of secondary samples for effective clutter suppression in bi-static passive radar offer abundant illuminator resources for passive surveillance radar systems. This paper presents a framework for incorporating knowledge sources directly in the space-time beam former of airborne adaptive radars. STAP algorithm for clutter mitigation for passive bi-static radar has better quantitation of the reduction in sample size thereby amalgamating the earlier data bank with existing radar data sets. Also, we proposed a novel method to estimate the clutter matrix and perform STAP for efficient clutter suppression based on small sample size. Furthermore, the effectiveness of the proposed algorithm is verified using MATLAB simulations in order to validate STAP algorithm for passive bi-static radar. In conclusion, this study highlights the importance for various applications which augments traditional active radars using cost-effective measures.

Keywords: bistatic radar, clutter, covariance matrix passive radar, STAP

Procedia PDF Downloads 290
10067 Contribution to the Study of the Use of Pesticides in the Regions of Tizi Ouzou

Authors: Ramdane Gaouir

Abstract:

Farmers in the two regions of Tizi-Ouzou, DBK and Tadmait, face different crop pests, namely, fungal diseases, insect attack as well as different types of deficiencies. To fight against all these threats, they resort to the use of a wide variety of chemicals. Our survey carried out in these two regions, aims to identify the different types of pesticides used, the method of management of the packaging generated by these phytosanitary products as well as the evaluation of the effect of these products on the farmers' health and the environment. The results obtained highlighted the use of two types of pesticides with a very wide application, namely fungicides and insecticides. The two most widely identified chemical families are neonicotoids and organophosphates, which are among the most toxic and persistent pesticides in the environment. The management method of packaging and the application of products by spraying reflect the lack of training and the unawareness of farmers vis-à-vis the impact of pesticides on their health and on the environment.

Keywords: farmers, crops, pesticides, fungicides, neonicotinoids, organochlorines

Procedia PDF Downloads 85
10066 Development of Superhydrophobic Cotton Fabrics and Their Functional Properties

Authors: Muhammad Zaman Khan, Vijay Baheti, Jiri Militky

Abstract:

The present study is focused on the development of multifunctional cotton fabric while having good physiological comfort properties. The functional properties developed include superhydrophobicity (Lotus effect) and UV protection. For this, TiO₂ nanoparticles along with fluorocarbon and organic-inorganic binder have been used to optimize the multifunctional properties. Deposition of TiO₂ nanoparticles with water repellent finish on cotton fabric has been carried out using the pad dry cure method at fix parameters. The morphology and elemental composition of as-deposited particles have been studied by using SEM and EDS. The chemical composition of nanoparticles was determined using energy dispersive spectroscopy. The treated samples exhibited excellent water repellency and UV protection factor. The study of the comfort properties of fabric showed that it had excellent physiological comfort properties. Optimized concentration of water repellent chemical (50g/l) was used in formulations with TiO₂ nanoparticles and organic-inorganic binder. Four formulations were prepared according to the design of the experiment. The formulations were applied to the cotton fabric by roller padding at room temperature (15–20°C). Surface morphology was investigated via SEM images. EDS analysis was also carried out to analyze the composition and atomic percentage of elements. The water contact angle (WCA) of cotton fabric increases with increase in TiO₂ nanoparticles concentration and reaches its maximum value (157°) when the concentration of TiO₂ is 20g/l. The water sliding angle (WSA) decreases and gains minimum value at the same concentration of TiO₂ at which WCA is highest. It was seen samples treated with formulations of TiO₂ nanoparticles exhibits excellent UPF, UV-A and UV-B blocking. However, there was no significant deterioration of air permeability. The water vapor permeability was also slightly decreased (4%) but is acceptable. It can be concluded that there is no significant change in both air and water vapor permeability after nanoparticles coating on the surface of the cotton fabric. The coated cotton fabric has little effect on the stiffness. The stiffness of coated samples was not increased significantly; thus comfort of cotton fabric is not decreased. This functionalized cotton fabric also exhibits good physiological comfort properties. ''The authors are also thankful to student grant competition 21312 provided at Technical University of Liberec''.

Keywords: comfort, functional, nanoparticles, UV protective

Procedia PDF Downloads 140
10065 Experimental and Numerical Investigation of Flow Control Using a Novel Active Slat

Authors: Basman Elhadidi, Islam Elqatary, Osama Mohamady, Hesham Othman

Abstract:

An active slat is developed to increase the lift and delay the separation for a DU96-W180 airfoil. The active slat is a fixed slat that can be closed, fully opened or intermittently opened by a rotating vane depending on the need. Experimental results show that the active slat has reduced the mean pressure and increased the mean velocity on the suction side of the airfoil for all positive angles of attack, indicating an increase of lift. The experimental data and numerical simulations also show that the direction of actuator vane rotation can influence the mixing of the flow streams on the suction side and hence influence the aerodynamic performance.

Keywords: active slat, flow control, DU96-W180 airfoil, flow streams

Procedia PDF Downloads 372
10064 Post-Combustion CO₂ Capture: From Membrane Synthesis to Module Intensification

Authors: Imran Khan Swati, Mohammad Younas

Abstract:

This work aims to explore the potential applications of polymeric hydrophobic membranes and green ionic liquids (ILs). Protic and aprotic ILs were synthesized in the lab., characterized, and tested for CO₂/N₂ and CO₂/CH₄ separation using hydrophobic polymeric membranes via supported ionic liquid membrane (SILM). ILs were verified by FTIR spectroscopy. The SILMs were stable at room temperature up to 0.5 MPa. For CO₂, [BSmim][tos] had the greatest coefficient of solubility and permeability, along with all ILs. At 0.5 MPa, IL [BSmim][tos] was found with a selectivity of 56.2 and 47.5 for pure CO₂/N₂ and CO₂/CH₄, respectively. The ILs synthesized for this study are rated as [BSmim][tos]>[BSmpy][tos]>[Bmim][Cl]>[Bpy][Cl] based on their SILM separation performance. Furthermore, high values of selectivity of [BSmim][tos] and [BSmpy][tos] support the use of ILs for CO₂ separation using SILMs. The study was extended to synthesize and test the ammonium-based ILs, [2-HEA][f] and [2-HEA][Hs]. These ILs achieved 50 % less selectivity for CO₂/N₂ as compared to [BSmim][tos] and [BSmpy][tos]. Nevertheless, the permeability of CO₂ achieved with [2-HEA][f] and [2-HEA][Hs] is more than 20 times higher than the [BSmim][tos] and [BSmpy][tos]. Later, the CO₂/N₂ permeability and selectivity study was extended using a flat sheet membrane contactor with recirculated IL. The contact angle effects, liquid entry pressure (LEP), initial CO₂ concentration, and type of solvents and membrane material on the CO₂ capture efficiency and membrane wetting in the post-combustion capture (PCC) process have been experimentally investigated and evaluated. Polytetrafluoroethylene (PTFE) has shown the most hydrophobic property with 6-170 loss in the contact angle. Furthermore, [Omim][BF4] and [Bmim][BF6] have exhibited only 5-8 % loss in LEP using PTFE membrane support. The CO₂ capture efficiency has been achieved as 80.8-99.8 % in different combinations of ILs and membrane support, keeping all other variables constant. While increasing CO₂ concentration from 15 to 45 % vol., an increase of nearly three folds in the CO₂ mass transfer flux was observed. The combination of [Omim][BF4] and PTFE membrane witnessed good long-term stability with only a 20 % loss in CO₂ capture efficiency in 480 min of continuous operation. A 3- D simulation model for non-dispersive solvent absorption in membrane contactors provides insight into the optimum design of a separation system for a specific application minimizing the overall cost and making the process environment-friendly.

Keywords: Post-combustion CO2 capture, membrane synthesis, process development, permeability and selectivity, ionic liquids

Procedia PDF Downloads 66
10063 Numerical Investigation of Turbulent Flow Control by Suction and Injection on a Subsonic NACA23012 Airfoil by Proper Orthogonal Decomposition Analysis and Perturbed Reynolds Averaged Navier‐Stokes Equations

Authors: Azam Zare

Abstract:

Separation flow control for performance enhancement over airfoils at high incidence angle has become an increasingly important topic. This work details the characteristics of an efficient feedback control of the turbulent subsonic flow over NACA23012 airfoil using forced reduced‐order model based on the proper orthogonal decomposition/Galerkin projection and perturbation method on the compressible Reynolds Averaged Navier‐Stokes equations. The forced reduced‐order model is used in the optimal control of the turbulent separated flow over a NACA23012 airfoil at Mach number of 0.2, Reynolds number of 5×106, and high incidence angle of 24° using blowing/suction controlling jets. The Spallart-Almaras turbulence model is implemented for high Reynolds number calculations. The main shortcoming of the POD/Galerkin projection on flow equations for controlling purposes is that the blowing/suction controlling jet velocity does not show up explicitly in the resulting reduced order model. Combining perturbation method and POD/Galerkin projection on flow equations introduce a forced reduced‐order model that can predict the time-varying influence of the blowing/suction controlling jet velocity. An optimal control theory based on forced reduced‐order system is used to design a control law for a nonlinear reduced‐order model, which attempts to minimize the vorticity content in the turbulent flow field over NACA23012 airfoil. Numerical simulations were performed to help understand the behavior of the controlled suction jet at 12% to 18% chord from leading edge and a pair of blowing/suction jets at 15% to 18% and 24% to 30% chord from leading edge, respectively. Analysis of streamline profiles indicates that the blowing/suction jets are efficient in removing separation bubbles and increasing the lift coefficient up to 22%, while the perturbation method can predict the flow field in an accurate Manner.

Keywords: flow control, POD, Galerkin projection, separation

Procedia PDF Downloads 146
10062 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 157
10061 A Study on The Relationship between Building Façade and Solar Energy Utilization Potential in Urban Residential Area in West China

Authors: T. Wen, Y. Liu, J. Wang, W. Zheng, T. Shao

Abstract:

Along with the increasing density of urban population, solar energy potential of building facade in high-density residential areas become a question that needs to be addressed. This paper studies how the solar energy utilization potential of building facades in different locations of a residential areas changes with different building layouts and orientations in Xining, a typical city in west China which possesses large solar radiation resource. Solar energy potential of three typical building layouts of residential areas, which are parallel determinant, gable misalignment, transverse misalignment, are discussed in detail. First of all, through the data collection and statistics of Xining new residential area, the most representative building parameters are extracted, including building layout, building height, building layers, and building shape. Secondly, according to the results of building parameters extraction, a general model is established and analyzed with rhinoceros 6.0 and its own plug-in grasshopper. Finally, results of the various simulations and data analyses are presented in a visualized way. The results show that there are great differences in the solar energy potential of building facades in different locations of residential areas under three typical building layouts. Generally speaking, the solar energy potential of the west peripheral location is the largest, followed by the East peripheral location, and the middle location is the smallest. When the deflection angle is the same, the solar energy potential shows the result that the West deflection is greater than the East deflection. In addition, the optimal building azimuth range under these three typical building layouts is obtained. Within this range, the solar energy potential of the residential area can always maintain a high level. Beyond this range, the solar energy potential drops sharply. Finally, it is found that when the solar energy potential is maximum, the deflection angle is not positive south, but 5 °or 15°south by west. The results of this study can provide decision analysis basis for residential design of Xining city to improve solar energy utilization potential and provide a reference for solar energy utilization design of urban residential buildings in other similar areas.

Keywords: building facade, solar energy potential, solar radiation, urban residential area, visualization, Xining city

Procedia PDF Downloads 172
10060 The Characteristics of the Operating Parameters of the Vertical Axis Wind Turbine for the Selected Wind Speed

Authors: Zdzislaw Kaminski, Zbigniew Czyz

Abstract:

The paper discusses the results of the research into a wind turbine with a vertical axis of rotation which was performed with the open return wind tunnel, Gunt HM 170, at the laboratory of the Department of Thermodynamics, Fluid Mechanics and Propulsion Aviation Systems of Lublin University of Technology. Wind tunnel experiments are a necessary step to construct any new type of wind turbine, to validate design assumptions and numerical results. This research focused on the rotor with the blades capable of modifying their working surfaces, i.e. absorbing wind kinetic energy. The operation of this rotor is based on adjusting angular aperture α of the top and bottom parts of the blades mounted on an axis. If this angle α increases, the working surface which absorbs wind kinetic energy also increases. The study was performed on scaled and geometrically similar models with the criteria of similarity relevant for the type of research preserved. The rotors with varied angular apertures of their blades were printed for the research with a powder 3D printer, ZPrinter® 450. This paper presents the research results for the selected flow speed of 6.5 m/s for the three angular apertures of the rotor blades, i.e. 30°, 60°, 90° at varied speeds. The test stand enables the turbine rotor to be braked to achieve the required speed and airflow speed and torque to be recorded. Accordingly, the torque and power as a function of airflow were plotted. The rotor with its adjustable blades enables turbine power to be adjusted within a wide range of wind speeds. A variable angular aperture of blade working surfaces α in a wind turbine enables us to control the speed of the turbine and consequently its output power. Reducing the angular aperture of working surfaces results in reduced speed, and if a special current generator applied, electrical output power is reduced, too. Speed adjusted by changing angle α enables the maximum load acting on rotor blades to be controlled. The solution under study is a kind of safety against a damage of a turbine due to possible high wind speed.

Keywords: drive torque, renewable energy, power, wind turbine, wind tunnel

Procedia PDF Downloads 251
10059 Behavior and Obesity: The Perception of Healthcare Professionals Concerning the Role of Behavior on Obesity

Authors: Saeed Wahass

Abstract:

Objective: Obesity is epidemic, affecting all societies and cultures. Most serious medical illnesses are attributed to obesity. For this reason, all healthcare systems worldwide have focused on obesity for both intervention and prevention. However, there is scientific evidence supporting that obesity is treatable through implementing different modalities of interventions. They include biological interventions like medications and bariatric surgeries and behavioral interventions. It seems healthcare professionals may suggest the quick and the easiest interventions for obesity like surgery, ignoring other modesties that might require efforts from their sides and patients as well. Searching on the onset, progression and prevention, behavior plays a major role. As a result, psychological interventions have become increasingly core for intervention and prevention of obesity. They are effective and cost effective in dealing with obesity. Methods: A questionnaire describing the role of behavior on obesity and the way it can be prevented and treated was distributed to a group of health professionals who are dealing with obesity e.g. bariatric surgeons, bariatric physicians, psychologists, health educators, nurses and social workers. Results: 88% of healthcare professionals believed that behavior plays a major role on the onset and progression of obesity, 95% of them recognized that obesity can be prevented with consideration for behavior factors. A major proportion (87%) of the respondents see that psychological interventions are effective and cost effective in treating obesity. Conclusions: It optimistically appears that the majority of healthcare professionals believe that behavior is a key component in understanding, preventing and treating obesity. This outcome may help in developing specific training courses for healthcare professionals, who are dealing with obesity concerning the way they can treat patients behaviorally and, moreover, educating the community.

Keywords: behavior, obesity, healthcare provider, psychological interventions

Procedia PDF Downloads 486
10058 The Effect of Tax Avoidance on Firm Value: Evidence from Amman Stock Exchange

Authors: Mohammad Abu Nassar, Mahmoud Al Khalilah, Hussein Abu Nassar

Abstract:

The purpose of this study is to examine whether corporate tax avoidance practices can impact firm value in the Jordanian context. The study employs a quantitative approach using s sample of (124) industrial and services companies listed on the Amman Stock Exchange for the period from 2010 to 2019. Multiple linear regression analysis has been applied to test the study's hypothesis. The study employs effective tax rate and book-tax difference to measure tax avoidance and Tobin's Q factor to measure firm value. The results of the study revealed that tax avoidance practices, when measured using effective tax rates, do not significantly impact firm value. When the book-tax difference is used to measure tax avoidance, the study results showed a negative impact on firm value. The result of the study has not supported the traditional view of tax avoidance as a transfer of wealth from the government to shareholders for industrial and services companies listed on the Amman Stock Exchange, indicating that Jordanian firms should not use tax avoidance strategies to enhance their value.

Keywords: tax avoidance, effective tax rate, book-tax difference, firm value, Amman stock exchange

Procedia PDF Downloads 153
10057 Analysis of Histogram Asymmetry for Waste Recognition

Authors: Janusz Bobulski, Kamila Pasternak

Abstract:

Despite many years of effort and research, the problem of waste management is still current. So far, no fully effective waste management system has been developed. Many programs and projects improve statistics on the percentage of waste recycled every year. In these efforts, it is worth using modern Computer Vision techniques supported by artificial intelligence. In the article, we present a method of identifying plastic waste based on the asymmetry analysis of the histogram of the image containing the waste. The method is simple but effective (94%), which allows it to be implemented on devices with low computing power, in particular on microcomputers. Such de-vices will be used both at home and in waste sorting plants.

Keywords: waste management, environmental protection, image processing, computer vision

Procedia PDF Downloads 113
10056 Efficient Deep Neural Networks for Real-Time Strawberry Freshness Monitoring: A Transfer Learning Approach

Authors: Mst. Tuhin Akter, Sharun Akter Khushbu, S. M. Shaqib

Abstract:

A real-time system architecture is highly effective for monitoring and detecting various damaged products or fruits that may deteriorate over time or become infected with diseases. Deep learning models have proven to be effective in building such architectures. However, building a deep learning model from scratch is a time-consuming and costly process. A more efficient solution is to utilize deep neural network (DNN) based transfer learning models in the real-time monitoring architecture. This study focuses on using a novel strawberry dataset to develop effective transfer learning models for the proposed real-time monitoring system architecture, specifically for evaluating and detecting strawberry freshness. Several state-of-the-art transfer learning models were employed, and the best performing model was found to be Xception, demonstrating higher performance across evaluation metrics such as accuracy, recall, precision, and F1-score.

Keywords: strawberry freshness evaluation, deep neural network, transfer learning, image augmentation

Procedia PDF Downloads 77
10055 Atmospheric Dispersion Modeling for a Hypothetical Accidental Release from the 3 MW TRIGA Research Reactor of Bangladesh

Authors: G. R. Khan, Sadia Mahjabin, A. S. Mollah, M. R. Mawla

Abstract:

Atmospheric dispersion modeling is significant for any nuclear facilities in the country to predict the impact of radiological doses on environment as well as human health. That is why to ensure safety of workers and population at plant site; Atmospheric dispersion modeling and radiation dose calculations were carried out for a hypothetical accidental release of airborne radionuclide from the 3 MW TRIGA research reactor of Savar, Bangladesh. It is designed with reactor core which consists of 100 fuel elements(1.82245 cm in diameter and 38.1 cm in length), arranged in an annular corefor steady-state and square wave power level of 3 MW (thermal) and for pulsing with maximum power level of 860MWth.The fuel is in the form of a uniform mixture of 20% uranium and 80% zirconium hydride. Total effective doses (TEDs) to the public at various downwind distances were evaluated with a health physics computer code “HotSpot” developed by Lawrence Livermore National Laboratory, USA. The doses were estimated at different Pasquill stability classes (categories A-F) with site-specific averaged meteorological conditions. The meteorological data, such as, average wind speed, frequency distribution of wind direction, etc. have also been analyzed based on the data collected near the reactor site. The results of effective doses obtained remain within the recommended maximum effective dose.

Keywords: accidental release, dispersion modeling, total effective dose, TRIGA

Procedia PDF Downloads 130
10054 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 95
10053 STC Parameters versus Real Time Measured Parameters to Determine Cost Effectiveness of PV Panels

Authors: V. E. Selaule, R. M. Schoeman H. C. Z. Pienaar

Abstract:

Research has shown that solar energy is a renewable energy resource with the most potential when compared to other renewable energy resources in South Africa. There are many makes of Photovoltaic (PV) panels on the market and it is difficult to assess which to use. PV panel manufacturers use Standard Test Conditions (STC) to rate their PV panels. STC conditions are different from the actual operating environmental conditions were the PV panels are used. This paper describes a practical method to determine the most cost effective available PV panel. The method shows that PV panel manufacturer STC ratings cannot be used to select a cost effective PV panel.

Keywords: PV orientation, PV panel, PV STC, Solar energy

Procedia PDF Downloads 466
10052 Corrosion Investigation of Superalloys, Molybdenum and TZM in Chloride Molten Salts

Authors: Craig Jantzen, Tim Abram, Dirk Engelberg, Hugues Lambert, Daniel Cooper

Abstract:

Molten salts are of high interest for use as coolants in nuclear reactors due to favourable high temperature and thermodynamic properties. The corrosive behaviour of molten salts however pose a materials integrity challenge. Three Ni / Ni-Fe based and two Mo based alloys have been exposed to molten eutectics (LiCl-KCl at 59.5:40.5 mol% and KCl-MgCl2 at 68:32 mol%) at 600°C and 800°C for durations up to 500hrs. Corrosion was observed to preferentially attack alloy constituents in order of their reactivity, with chromium the most vulnerable and depleted element. Alloy weight-loss per unit area was calculated to give linear corrosion rates, discounting any initial rapid corrosion of impurities. Further analysis was carried out using ICP-MS, SEM and EDX techniques to give a more detailed view of the corrosion mechanisms.

Keywords: molten salt, salt, corrosion, high temperature, licl, KCL, MgCl, molybdenum, nickel, superalloys

Procedia PDF Downloads 438
10051 Barriers towards Effective Participation in Physically Oriented Leisure Time Activities: A Case Study of Federal College of Education, Pankshin Plateau State, Nigeria

Authors: Mulak Moses Yokdi

Abstract:

Correct use of leisure time has suffered neglect in our society and the people ignorantly think that the trend does not matter. The researcher felt concerned about the issue and went on to find out why using FCE, Pankshin workers as a case study. Four hypotheses were used, considering such variables as leadership, traditional activities, stress due to work pressure and time constraint. The participants selected for the study were one hundred and ten members of FCE, Pankshin staff. A self-developed questionnaire was the instrument used. Chi-square (x2) was employed to test the hypotheses at P = 0.005; df = 3. The statistics of percentages was also used to describe the situation as implicated by the data. The results showed that all hypotheses were significant (P = 0.05). It was concluded that the four variables were impediments to effective participation in physically oriented leisure time activities among the FCE, Staff. Based on the findings, it was recommended that the FCE should get good leadership, create good awareness for people to understand why they should be effectively involved in physically oriented leisure time activities.

Keywords: barriers, effective participation, leisure time, physically oriented, work pressure, time constraint

Procedia PDF Downloads 359
10050 Submicron Laser-Induced Dot, Ripple and Wrinkle Structures and Their Applications

Authors: P. Slepicka, N. Slepickova Kasalkova, I. Michaljanicova, O. Nedela, Z. Kolska, V. Svorcik

Abstract:

Polymers exposed to laser or plasma treatment or modified with different wet methods which enable the introduction of nanoparticles or biologically active species, such as amino-acids, may find many applications both as biocompatible or anti-bacterial materials or on the contrary, can be applied for a decrease in the number of cells on the treated surface which opens application in single cell units. For the experiments, two types of materials were chosen, a representative of non-biodegradable polymers, polyethersulphone (PES) and polyhydroxybutyrate (PHB) as biodegradable material. Exposure of solid substrate to laser well below the ablation threshold can lead to formation of various surface structures. The ripples have a period roughly comparable to the wavelength of the incident laser radiation, and their dimensions depend on many factors, such as chemical composition of the polymer substrate, laser wavelength and the angle of incidence. On the contrary, biopolymers may significantly change their surface roughness and thus influence cell compatibility. The focus was on the surface treatment of PES and PHB by pulse excimer KrF laser with wavelength of 248 nm. The changes of physicochemical properties, surface morphology, surface chemistry and ablation of exposed polymers were studied both for PES and PHB. Several analytical methods involving atomic force microscopy, gravimetry, scanning electron microscopy and others were used for the analysis of the treated surface. It was found that the combination of certain input parameters leads not only to the formation of optimal narrow pattern, but to the combination of a ripple and a wrinkle-like structure, which could be an optimal candidate for cell attachment. The interaction of different types of cells and their interactions with the laser exposed surface were studied. It was found that laser treatment contributes as a major factor for wettability/contact angle change. The combination of optimal laser energy and pulse number was used for the construction of a surface with an anti-cellular response. Due to the simple laser treatment, we were able to prepare a biopolymer surface with higher roughness and thus significantly influence the area of growth of different types of cells (U-2 OS cells).

Keywords: cell response, excimer laser, polymer treatment, periodic pattern, surface morphology

Procedia PDF Downloads 230
10049 Black-Box-Base Generic Perturbation Generation Method under Salient Graphs

Authors: Dingyang Hu, Dan Liu

Abstract:

DNN (Deep Neural Network) deep learning models are widely used in classification, prediction, and other task scenarios. To address the difficulties of generic adversarial perturbation generation for deep learning models under black-box conditions, a generic adversarial ingestion generation method based on a saliency map (CJsp) is proposed to obtain salient image regions by counting the factors that influence the input features of an image on the output results. This method can be understood as a saliency map attack algorithm to obtain false classification results by reducing the weights of salient feature points. Experiments also demonstrate that this method can obtain a high success rate of migration attacks and is a batch adversarial sample generation method.

Keywords: adversarial sample, gradient, probability, black box

Procedia PDF Downloads 91