Search results for: threat intelligence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2486

Search results for: threat intelligence

1496 Farmers Perception and Awareness to Climate Change in Some Selected Local Government Areas in Jigawa State, Nigeria

Authors: M. M. Ubayo, U. S. Babuga, A. Garba

Abstract:

The study examined the level of climate change awareness and perception by rice farmers in Jigawa State, Nigeria. A multi-stage and purposive sampling technique was used to select respondents. The state is divided into four agricultural zones namely Birninkudu zone, Gumel zone, Hadejia zone, and Kazaure zone. Two agricultural zones (Gumel zone and Hadejia zones) were purposively selected. Six Local Government Areas (LGAs) were randomly selected from the two zones. Also, twenty rice farmers were purposively selected from each of the LGAS. Data were analyzed using frequency and percentages. The result shows that 83.3% of the respondents are aware of the climate change impact on their rice output. Personal experience is the main sources of climate change information in the study area, another 45.6% adopted use of irrigation as the most effective measure to combating climate change, 25.5% use of early maturing variety. Further studies are needed on how to combat the threat and menace of the climate change in the study area.

Keywords: awareness, perception, climate, change, Jigawa

Procedia PDF Downloads 378
1495 A Non-Invasive Blood Glucose Monitoring System Using near-Infrared Spectroscopy with Remote Data Logging

Authors: Bodhayan Nandi, Shubhajit Roy Chowdhury

Abstract:

This paper presents the development of a portable blood glucose monitoring device based on Near-Infrared Spectroscopy. The system supports Internet connectivity through WiFi and uploads the time series data of glucose concentration of patients to a server. In addition, the server is given sufficient intelligence to predict the future pathophysiological state of a patient given the current and past pathophysiological data. This will enable to prognosticate the approaching critical condition of the patient much before the critical condition actually occurs.The server hosts web applications to allow authorized users to monitor the data remotely.

Keywords: non invasive, blood glucose concentration, microcontroller, IoT, application server, database server

Procedia PDF Downloads 208
1494 Detection of Total Aflatoxin in Flour of Wheat and Maize Samples in Albania Using ELISA

Authors: Aferdita Dinaku, Jonida Canaj

Abstract:

Aflatoxins are potentially toxic metabolites produced by certain kinds of fungi (molds) that are found naturally all over the world; they can contaminate food crops and pose a serious health threat to humans by mutagenic and carcinogenic effects. Several types of aflatoxin (14 or more) occur in nature. In Albanian nutrition, cereals (especially wheat and corn) are common ingredients in some traditional meals. This study aimed to investigate the presence of aflatoxins in the flour of wheat and maize that are consumed in Albania’s markets. The samples were collected randomly in different markets in Albania and detected by the ELISA method, measured in 450 nm. The concentration of total aflatoxins was analyzed by enzyme-linked immunosorbent assay (ELISA), and they were ranged between 0.05-1.09 ppb. However, the screened mycotoxin levels in the samples were lower than the maximum permissible limits of European Commission No 1881/2006 (4 μg/kg). The linearity of calibration curves was good for total aflatoxins (B1, B2, G1, G2, M1) (R²=0.99) in the concentration range 0.005-4.05 ppb. The samples were analyzed in two replicated measurements and for each sample, the standard deviation (statistical parameter) is calculated. The results showed that the flour samples are safe, but the necessity of performing such tests is necessary.

Keywords: aflatoxins, ELISA technique, food contamination, flour

Procedia PDF Downloads 150
1493 An Exploration of the Quality of Primary Caregiving Relationships between Adolescents Orphaned through Acquired Immune Deficiency Syndrome and Grandmothers, Based on the Narratives of Stakeholders

Authors: Mmapula Petunia Tsweleng

Abstract:

This qualitative study presents an exploration and findings thereof the quality of primary caregiving relationships between adolescents orphaned through Acquired Immune Deficiency Syndrome (AIDS) and their grandmothers. This exploration was based on in-depth narratives of 6 stakeholders who provided community-based psychosocial support services to children and families affected by AIDS. The narratives show that grandmothers provided high-quality parental care and support to the orphans. Furthermore, stakeholders categorised grandmother caregiving as genuine. Findings also show that the orphans thrived emotionally, socially, and cognitively and performed well academically. However, it was also identified that grandmothers’ caregiving had elements of overprotectiveness as well as susceptibility to manipulation -which appeared to be a threat to the positive development of the orphans. Relevant interventions, with a special focus on strengthening grandmother caregiving, are needed. Special attention should be on equipping grandmothers with a better understanding of adolescent behaviours and abilities to provide appropriate monitoring and supervision.

Keywords: adolescent orphans, AIDS, caregiving relationships, grandmothers

Procedia PDF Downloads 62
1492 Evolution of Reported Bluetongue Outbreaks inAlgeria: Epidemiological Situation

Authors: Amel Benatallah, Michel Marie, Faical Ghozlane

Abstract:

Bluetongue (BT) is a major concern of veterinary services and a real threat to the sheep population. Epidemiological situation of blue tongue has revealed that in 2000, the serotype 2 (BTV2) was isolated and identified. The vector of BTV has affected 10 provinces out of 48 provinces in the country. As a result, 28 outbreaks were reported with 191 cases including 29 deaths. In 2006, the vector of the FCO has still hit Algeria, but this time with another serotype, the BTV 1. The latter was responsible for the resurgence of the disease in 11 provinces (29 outbreaks with 265 reported cases and 36 deaths).The same serotype (BTV1) was isolated and identified in 2008 in two provinces (2 outbreaks with 15 cases revealing 5 deaths) , in 2009 in 5 provinces (19 outbreaks with 78 reported cases and 20 deaths). In addition, 2010 and 2011 saw the resurgence of the same serotype (BTV1) respectively in 9 (46 outbreaks with 131 cases including and 25 deaths) and 7 provinces (16 outbreaks with 63 reported cases and 6 deaths). Serological and entomological surveys were conducted in Algeria during the period from 2000 to 2007 in order to identify the different BTV strains of existing FCO in Algeria in addition to vector Culicoides Imicola and to study the ecology of this vector to limit its movement in the country.

Keywords: blue tongue, serotype, vectors, culicoides imicola, BTV, FCO

Procedia PDF Downloads 333
1491 Emotion Detection in a General Human-Robot Interaction System Optimized for Embedded Platforms

Authors: Julio Vega

Abstract:

Expression recognition is a field of Artificial Intelligence whose main objectives are to recognize basic forms of affective expression that appear on people’s faces and contributing to behavioral studies. In this work, a ROS node has been developed that, based on Deep Learning techniques, is capable of detecting the facial expressions of the people that appear in the image. These algorithms were optimized so that they can be executed in real time on an embedded platform. The experiments were carried out in a PC with a USB camera and in a Raspberry Pi 4 with a PiCamera. The final results shows a plausible system, which is capable to work in real time even in an embedded platform.

Keywords: python, low-cost, raspberry pi, emotion detection, human-robot interaction, ROS node

Procedia PDF Downloads 123
1490 Reaction of Nine Candidate Wheat Lines/Mutants against Leaf Rust: Lodging and Aphid Population under Field Condition

Authors: Muhammad Mohsan, Mehboob Ur-Rahman, Sana Zulfiqar, Shumila Ashfaq

Abstract:

Brown Rust (Puccinia triticina), also known as leaf rust, pose a serious threat to wheat cultivation in the world. Nine candidate wheat lines/mutants were subjected to rust inoculation, lodging and aphid population in vivo conditions. Four lines/mutants (E-284, E-505, 2008-6 MR and 2008-14MR) were found resistant to leaf rust attack. Two lines (PGMB 15-29 and 2011-1 MR) displayed moderately resistant reactions against the disease. Three lines/mutants were depicted as susceptible to leaf rust. The lowest population of aphids, i.e., 16.67, was observed on 2008-14MR. Three lines/mutants (NN1-47, NN1-89 and PGMB 15-29) were found under zero level of lodging. The presence and absence of different leaf rust-resistant genes like Lr13, Lr34, Lr46 and Lr67 were assessed with the help of molecular markers. All the wheat lines/mutants were found loaded with leaf rust-resistant genes such as Lr13 and Lr 34, while Lr46 and Lr67 were found in 66% of wheat lines/mutants. The resistant source can be exploited in the breeding program to develop rust, aphid and lodging with race-nonspecific resistant wheat variety.

Keywords: wheat, leaf rust, lodging, aphid

Procedia PDF Downloads 79
1489 Obstacle Detection and Path Tracking Application for Disables

Authors: Aliya Ashraf, Mehreen Sirshar, Fatima Akhtar, Farwa Kazmi, Jawaria Wazir

Abstract:

Vision, the basis for performing navigational tasks, is absent or greatly reduced in visually impaired people due to which they face many hurdles. For increasing the navigational capabilities of visually impaired people a desktop application ODAPTA is presented in this paper. The application uses camera to capture video from surroundings, apply various image processing algorithms to get information about path and obstacles, tracks them and delivers that information to user through voice commands. Experimental results show that the application works effectively for straight paths in daylight.

Keywords: visually impaired, ODAPTA, Region of Interest (ROI), driver fatigue, face detection, expression recognition, CCD camera, artificial intelligence

Procedia PDF Downloads 544
1488 Artificial Intelligence-Aided Extended Kalman Filter for Magnetometer-Based Orbit Determination

Authors: Gilberto Goracci, Fabio Curti

Abstract:

This work presents a robust, light, and inexpensive algorithm to perform autonomous orbit determination using onboard magnetometer data in real-time. Magnetometers are low-cost and reliable sensors typically available on a spacecraft for attitude determination purposes, thus representing an interesting choice to perform real-time orbit determination without the need to add additional sensors to the spacecraft itself. Magnetic field measurements can be exploited by Extended/Unscented Kalman Filters (EKF/UKF) for orbit determination purposes to make up for GPS outages, yielding errors of a few kilometers and tens of meters per second in the position and velocity of a spacecraft, respectively. While this level of accuracy shows that Kalman filtering represents a solid baseline for autonomous orbit determination, it is not enough to provide a reliable state estimation in the absence of GPS signals. This work combines the solidity and reliability of the EKF with the versatility of a Recurrent Neural Network (RNN) architecture to further increase the precision of the state estimation. Deep learning models, in fact, can grasp nonlinear relations between the inputs, in this case, the magnetometer data and the EKF state estimations, and the targets, namely the true position, and velocity of the spacecraft. The model has been pre-trained on Sun-Synchronous orbits (SSO) up to 2126 kilometers of altitude with different initial conditions and levels of noise to cover a wide range of possible real-case scenarios. The orbits have been propagated considering J2-level dynamics, and the geomagnetic field has been modeled using the International Geomagnetic Reference Field (IGRF) coefficients up to the 13th order. The training of the module can be completed offline using the expected orbit of the spacecraft to heavily reduce the onboard computational burden. Once the spacecraft is launched, the model can use the GPS signal, if available, to fine-tune the parameters on the actual orbit onboard in real-time and work autonomously during GPS outages. In this way, the provided module shows versatility, as it can be applied to any mission operating in SSO, but at the same time, the training is completed and eventually fine-tuned, on the specific orbit, increasing performances and reliability. The results provided by this study show an increase of one order of magnitude in the precision of state estimate with respect to the use of the EKF alone. Tests on simulated and real data will be shown.

Keywords: artificial intelligence, extended Kalman filter, orbit determination, magnetic field

Procedia PDF Downloads 98
1487 Between Riots and Protests: A Structural Approach to Urban Environmental Uprisings in China

Authors: Zi Zhu

Abstract:

The last decade has witnessed increasing urban environmental uprisings in China, as thousands of citizens swarmed into streets to express their deep concerns about the environmental threat and public health through various collective actions. The prevalent western approaches to collective actions, which usually treat urban riots and social movements as distinct phenomenon, have plagued an adequate analysis of the urban environmental uprisings in China. The increasing urban environmental contention can neither be categorized into riots nor social movements, as they carry the features of both: at first sight, they are spontaneous, disorganized and disruptive with an absence of observable mobilization process; however, unlike riots in the west, these collective actions conveyed explicit demand in a mostly non-destructive way rather than a pure expression of frustration. This article proposes a different approach to urban environmental uprisings in China which concerns the diminishing boundaries between riots and social movements and points to the underlying structural causes to the unique forms of urban environmental contention. Taking the urban anti-PX protests as examples, this article analyzes the societal and political structural environment faced by the Chinese environmental protesters and its influence on the origin and development of their contention.

Keywords: urban environmental uprisings, China, anti-PX protests, opportunity structure

Procedia PDF Downloads 285
1486 Transformational Leadership in the United States to Negate Current Ethnocentrisms

Authors: Molly Meadows

Abstract:

Following the presidency of Donald J. Trump, Americans have become hyperaware of ethnocentrisms that plague the culture. The president's egoist ethics encouraged a divide between what the citizens of the US identified as just or unjust. In the race for global supremacy and leading ideology, fears have arisen, exacerbated by the ethnocentricity of the country's leader, pointing to the possible harmful ethical standards of competing nations. Due to the concept of ethical absolutism, an international code of ethics would not be possible, and the changes needed to eliminate the stigma surrounding other cultures of thought would need to come from the governing body of the US. As the current leading global ideology, the US would need its government to embody a transformational leadership style in order to unite the motivations of the citizens and encourage intercultural tolerance.

Keywords: ethics, transformational leadership, American politics, egoism, cultural intelligence, ethical relativism

Procedia PDF Downloads 90
1485 A Data-Driven Approach for Studying the Washout Effects of Rain on Air Pollution

Authors: N. David, H. O. Gao

Abstract:

Air pollution is a serious environmental threat on a global scale and can cause harm to human health, morbidity and premature mortality. Reliable monitoring and control systems are therefore necessary to develop coping skills against the hazards associated with this phenomenon. However, existing environmental monitoring means often do not provide a sufficient response due to practical and technical limitations. Commercial microwave links that form the infrastructure for transmitting data between cell phone towers can be harnessed to map rain at high tempo-spatial resolution. Rainfall causes a decrease in the signal strength received by these wireless communication links allowing it to be used as a built-in sensor network to map the phenomenon. In this study, we point to the potential that lies in this system to indirectly monitor areas where air pollution is reduced. The relationship between pollutant wash-off and rainfall provides an opportunity to acquire important spatial information about air quality using existing cell-phone tower signals. Since the density of microwave communication networks is high relative to any dedicated sensor arrays, it could be possible to rely on this available observation tool for studying precipitation scavenging on air pollutants, for model needs and more.

Keywords: air pollution, commercial microwave links, rainfall, washout

Procedia PDF Downloads 106
1484 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 138
1483 Parallel Particle Swarm Optimization Optimized LDI Controller with Lyapunov Stability Criterion for Nonlinear Structural Systems

Authors: P. W. Tsai, W. L. Hong, C. W. Chen, C. Y. Chen

Abstract:

In this paper, we present a neural network (NN) based approach represent a nonlinear Tagagi-Sugeno (T-S) system. A linear differential inclusion (LDI) state-space representation is utilized to deal with the NN models. Taking advantage of the LDI representation, the stability conditions and controller design are derived for a class of nonlinear structural systems. Moreover, the concept of utilizing the Parallel Particle Swarm Optimization (PPSO) algorithm to solve the common P matrix under the stability criteria is given in this paper.

Keywords: Lyapunov stability, parallel particle swarm optimization, linear differential inclusion, artificial intelligence

Procedia PDF Downloads 648
1482 The Integration of Fintech Technologies in Crowdfunding: A Catalyst for Financial Inclusion and Responsible Finance

Authors: Badrane Hasnaa, Bouzahir Brahim

Abstract:

This article examines the impact of fintech technologies on crowdfunding, particularly their potential to enhance financial inclusion and promote responsible finance. It explores how the adoption of blockchain, artificial intelligence, and other fintech innovations is transforming crowdfunding by making it more accessible, transparent, and ethical. By analyzing case studies and recent data, the article illustrates how these technologies help overcome traditional barriers to financing while promoting sustainable financial practices. The findings suggest that integrating fintech into crowdfunding can not only broaden access to funding for marginalized populations but also encourage more responsible management of financial resources, contributing to a fairer and more resilient economy.

Keywords: crowdfunding, fintech, inclusion financière, finance responsible, blockchain, resilience financière

Procedia PDF Downloads 9
1481 ​​An Overview and Analysis of ChatGPT 3.5/4.0​

Authors: Sarah Mohammed, Huda Allagany, Ayah Barakat, Muna Elyas

Abstract:

This paper delves into the history and development of ChatGPT, tracing its evolution from its inception by OpenAI to its current state, and emphasizing its design improvements and strategic partnerships. It also explores the performance and applicability of ChatGPT versions 3.5 and 4 in various contexts, examining its capabilities and limitations in producing accurate and relevant responses. Utilizing a quantitative approach, user satisfaction, speed of response, learning capabilities, and overall utility in academic performance were assessed through surveys and analysis tools. Findings indicate that while ChatGPT generally delivers high accuracy and speed in responses, the need for clarification and more specific user instructions persists. The study highlights the tool's increasing integration across different sectors, showcasing its potential in educational and professional settings.

Keywords: artificial intelligence, chat GPT, analysis, education

Procedia PDF Downloads 40
1480 Autonomous Quantum Competitive Learning

Authors: Mohammed A. Zidan, Alaa Sagheer, Nasser Metwally

Abstract:

Real-time learning is an important goal that most of artificial intelligence researches try to achieve it. There are a lot of problems and applications which require low cost learning such as learn a robot to be able to classify and recognize patterns in real time and real-time recall. In this contribution, we suggest a model of quantum competitive learning based on a series of quantum gates and additional operator. The proposed model enables to recognize any incomplete patterns, where we can increase the probability of recognizing the pattern at the expense of the undesired ones. Moreover, these undesired ones could be utilized as new patterns for the system. The proposed model is much better compared with classical approaches and more powerful than the current quantum competitive learning approaches.

Keywords: competitive learning, quantum gates, quantum gates, winner-take-all

Procedia PDF Downloads 462
1479 GenAI Agents in Product Management: A Case Study from the Manufacturing Sector

Authors: Aron Witkowski, Andrzej Wodecki

Abstract:

Purpose: This study aims to explore the feasibility and effectiveness of utilizing Generative Artificial Intelligence (GenAI) agents as product managers within the manufacturing sector. It seeks to evaluate whether current GenAI capabilities can fulfill the complex requirements of product management and deliver comparable outcomes to human counterparts. Study Design/Methodology/Approach: This research involved the creation of a support application for product managers, utilizing high-quality sources on product management and generative AI technologies. The application was designed to assist in various aspects of product management tasks. To evaluate its effectiveness, a study was conducted involving 10 experienced product managers from the manufacturing sector. These professionals were tasked with using the application and providing feedback on the tool's responses to common questions and challenges they encounter in their daily work. The study employed a mixed-methods approach, combining quantitative assessments of the tool's performance with qualitative interviews to gather detailed insights into the user experience and perceived value of the application. Findings: The findings reveal that GenAI-based product management agents exhibit significant potential in handling routine tasks, data analysis, and predictive modeling. However, there are notable limitations in areas requiring nuanced decision-making, creativity, and complex stakeholder interactions. The case study demonstrates that while GenAI can augment human capabilities, it is not yet fully equipped to independently manage the holistic responsibilities of a product manager in the manufacturing sector. Originality/Value: This research provides an analysis of GenAI's role in product management within the manufacturing industry, contributing to the limited body of literature on the application of GenAI agents in this domain. It offers practical insights into the current capabilities and limitations of GenAI, helping organizations make informed decisions about integrating AI into their product management strategies. Implications for Academic and Practical Fields: For academia, the study suggests new avenues for research in AI-human collaboration and the development of advanced AI systems capable of higher-level managerial functions. Practically, it provides industry professionals with a nuanced understanding of how GenAI can be leveraged to enhance product management, guiding investments in AI technologies and training programs to bridge identified gaps.

Keywords: generative artificial intelligence, GenAI, NPD, new product development, product management, manufacturing

Procedia PDF Downloads 40
1478 Modelling Vehicle Fuel Consumption Utilising Artificial Neural Networks

Authors: Aydin Azizi, Aburrahman Tanira

Abstract:

The main source of energy used in this modern age is fossil fuels. There is a myriad of problems that come with the use of fossil fuels, out of which the issues with the greatest impact are its scarcity and the cost it imposes on the planet. Fossil fuels are the only plausible option for many vital functions and processes; the most important of these is transportation. Thus, using this source of energy wisely and as efficiently as possible is a must. The aim of this work was to explore utilising mathematical modelling and artificial intelligence techniques to enhance fuel consumption in passenger cars by focusing on the speed at which cars are driven. An artificial neural network with an error less than 0.05 was developed to be applied practically as to predict the rate of fuel consumption in vehicles.

Keywords: mathematical modeling, neural networks, fuel consumption, fossil fuel

Procedia PDF Downloads 399
1477 Proposal for a Web System for the Control of Fungal Diseases in Grapes in Fruits Markets

Authors: Carlos Tarmeño Noriega, Igor Aguilar Alonso

Abstract:

Fungal diseases are common in vineyards; they cause a decrease in the quality of the products that can be sold, generating distrust of the customer towards the seller when buying fruit. Currently, technology allows the classification of fruits according to their characteristics thanks to artificial intelligence. This study proposes the implementation of a control system that allows the identification of the main fungal diseases present in the Italia grape, making use of a convolutional neural network (CNN), OpenCV, and TensorFlow. The methodology used was based on a collection of 20 articles referring to the proposed research on quality control, classification, and recognition of fruits through artificial vision techniques.

Keywords: computer vision, convolutional neural networks, quality control, fruit market, OpenCV, TensorFlow

Procedia PDF Downloads 75
1476 Biological Expressions of Hamilton’s Rule in Human Populations: The Deep Psychological Influence of Defensive and Offensive Motivations Found in Human Conflicts and Sporting Events

Authors: Monty Vacura

Abstract:

Hamilton’s Rule is a universal law of biology expressed in protists, plants and animals. When applied to human populations, this model explains: 1) Origin of religion in society as a biopsychological need naturally selected to increase population size; 2) Instincts of racism expressed through intergroup competition; 3) Simultaneous selection for human cooperation and conflict, love and hate; 4) Places Dawkins’s selfish gene as the r, relationship variable; 5) Flipping the equation variable themes (close relationship to distant relationship, and benefit to threat) the new equation can now be used to identify the offensive and defensive sides of conflict; 6) Connection between sporting events and instinctive social messaging for stimulating offensive and defensive responses; 6) Pathway to reduce human sacrifice through manipulation of variables. This paper discusses the deep psychological influences of Hamilton’s Rule. Suggestions are provided to reduce human deaths via our instinctive sacrificial behavior, by consciously monitoring Hamilton’s Rule variables highlighted throughout our media outlets.

Keywords: psychology, Hamilton’s rule, evolution, human instincts

Procedia PDF Downloads 35
1475 Applying Big Data Analysis to Efficiently Exploit the Vast Unconventional Tight Oil Reserves

Authors: Shengnan Chen, Shuhua Wang

Abstract:

Successful production of hydrocarbon from unconventional tight oil reserves has changed the energy landscape in North America. The oil contained within these reservoirs typically will not flow to the wellbore at economic rates without assistance from advanced horizontal well and multi-stage hydraulic fracturing. Efficient and economic development of these reserves is a priority of society, government, and industry, especially under the current low oil prices. Meanwhile, society needs technological and process innovations to enhance oil recovery while concurrently reducing environmental impacts. Recently, big data analysis and artificial intelligence become very popular, developing data-driven insights for better designs and decisions in various engineering disciplines. However, the application of data mining in petroleum engineering is still in its infancy. The objective of this research aims to apply intelligent data analysis and data-driven models to exploit unconventional oil reserves both efficiently and economically. More specifically, a comprehensive database including the reservoir geological data, reservoir geophysical data, well completion data and production data for thousands of wells is firstly established to discover the valuable insights and knowledge related to tight oil reserves development. Several data analysis methods are introduced to analysis such a huge dataset. For example, K-means clustering is used to partition all observations into clusters; principle component analysis is applied to emphasize the variation and bring out strong patterns in the dataset, making the big data easy to explore and visualize; exploratory factor analysis (EFA) is used to identify the complex interrelationships between well completion data and well production data. Different data mining techniques, such as artificial neural network, fuzzy logic, and machine learning technique are then summarized, and appropriate ones are selected to analyze the database based on the prediction accuracy, model robustness, and reproducibility. Advanced knowledge and patterned are finally recognized and integrated into a modified self-adaptive differential evolution optimization workflow to enhance the oil recovery and maximize the net present value (NPV) of the unconventional oil resources. This research will advance the knowledge in the development of unconventional oil reserves and bridge the gap between the big data and performance optimizations in these formations. The newly developed data-driven optimization workflow is a powerful approach to guide field operation, which leads to better designs, higher oil recovery and economic return of future wells in the unconventional oil reserves.

Keywords: big data, artificial intelligence, enhance oil recovery, unconventional oil reserves

Procedia PDF Downloads 280
1474 Emerging Technology for 6G Networks

Authors: Yaseein S. Hussein, Victor P. Gil Jiménez, Abdulmajeed Al-Jumaily

Abstract:

Due to the rapid advancement of technology, there is an increasing demand for wireless connections that are both fast and reliable, with minimal latency. New wireless communication standards are developed every decade, and the year 2030 is expected to see the introduction of 6G. The primary objectives of 6G network and terminal designs are focused on sustainability and environmental friendliness. The International Telecommunication Union-Recommendation division (ITU-R) has established the minimum requirements for 6G, with peak and user data rates of 1 Tbps and 10-100 Gbps, respectively. In this context, Light Fidelity (Li-Fi) technology is the most promising candidate to meet these requirements. This article will explore the various advantages, features, and potential applications of Li-Fi technology, and compare it with 5G networking, to showcase its potential impact among other emerging technologies that aim to enable 6G networks.

Keywords: 6G networks, artificial intelligence (AI), Li-Fi technology, Terahertz (THz) communication, visible light communication (VLC)

Procedia PDF Downloads 86
1473 An Analyze on ISIS Terror Organization: The Reasons That Emerged ISIS and Its Effects on Both Local and Global Security

Authors: Serkan Kocapinar

Abstract:

Since June 2014, the extremist terrorist group known as the Islamic State of Iraq and the Levant, with its financial resources, as well as the world’s richest in terms of human resources, is a terrorist organization utilizing the most advanced weapons. It has established a state in the occupied region, appointed provincial and district managers, and declared the so-called Caliphate. Despite being a terrorist organization, it is selling the oil which it has seized from the captured regions with low prices. Consequently, it has been achieving great income from these sales. Currently the actual number of terrorists in the area is around from 20,000 to 31,000 according to the CIA assessment. It is estimated that it has extended its domain beyond from the Middle East to the Asia-Pacific coast and has had millions of supporters worldwide. In addition, it is claimed that it has several sleeper cells in some countries and could perform very catastrophic attacks to the countries fighting against it by activating its cells when necessary. The sharp rise of ISIS in just a year has also attracted the attention of terrorist groups such as Boko Haram around the world and some groups expressed their allegiance to ISIS. With this growing power and influence, ISIS is becoming more and more effective threat for not only the region but also for the entire world. The purpose of this study is to show what lies under the rising of ISIS terror organization and how it affects the security concerns.

Keywords: ISIS, security, terrorism, threats

Procedia PDF Downloads 291
1472 Deployment of Attack Helicopters in Conventional Warfare: The Gulf War

Authors: Mehmet Karabekir

Abstract:

Attack helicopters (AHs) are usually deployed in conventional warfare to destroy armored and mechanized forces of enemy. In addition, AHs are able to perform various tasks in the deep, and close operations – intelligence, surveillance, reconnaissance, air assault operations, and search and rescue operations. Apache helicopters were properly employed in the Gulf Wars and contributed the success of campaign by destroying a large number of armored and mechanized vehicles of Iraq Army. The purpose of this article is to discuss the deployment of AHs in conventional warfare in the light of Gulf Wars. First, the employment of AHs in deep and close operations will be addressed regarding the doctrine. Second, the US armed forces AH-64 doctrinal and tactical usage will be argued in the 1st and 2nd Gulf Wars.

Keywords: attack helicopter, conventional warfare, gulf wars

Procedia PDF Downloads 466
1471 Terraria AI: YOLO Interface for Decision-Making Algorithms

Authors: Emmanuel Barrantes Chaves, Ernesto Rivera Alvarado

Abstract:

This paper presents a method to enable agents for the Terraria game to evaluate algorithms commonly used in general video game artificial intelligence competitions. The usage of the ‘You Only Look Once’ model in the first layer of the process obtains information from the screen, translating this information into a video game description language known as “Video Game Description Language”; the agents take that as input to make decisions. For this, the state-of-the-art algorithms were tested and compared; Monte Carlo Tree Search and Rolling Horizon Evolutionary; in this case, Rolling Horizon Evolutionary shows a better performance. This approach’s main advantage is that a VGDL beforehand is unnecessary. It will be built on the fly and opens the road for using more games as a framework for AI.

Keywords: AI, MCTS, RHEA, Terraria, VGDL, YOLOv5

Procedia PDF Downloads 89
1470 Enhancing Human Security Through Conmprehensive Counter-terrorism Measures

Authors: Alhaji Khuzaima Mohammed Osman, Zaeem Sheikh Abdul Wadudi Haruna

Abstract:

This article aims to explore the crucial link between counter-terrorism efforts and the preservation of human security. As acts of terrorism continue to pose significant threats to societies worldwide, it is imperative to develop effective strategies that mitigate risks while safeguarding the rights and well-being of individuals. This paper discusses key aspects of counter-terrorism and human security, emphasizing the need for a comprehensive approach that integrates intelligence, prevention, response, and resilience-building measures. By highlighting successful case studies and lessons learned, this article provides valuable insights for policymakers, law enforcement agencies, and practitioners in their quest to address terrorism and foster human security.

Keywords: human security, risk mitigation, terrorist activities, civil liberties

Procedia PDF Downloads 78
1469 Child Labour and the Challenges of National Security in Nigeria: A Study of Aba Urban, Abia State, Nigeria

Authors: Anyaogu Paul

Abstract:

The study examines the problem of child labour in respect to National security in Nigeria. The current situation reflects a chronic urban poverty, which can compel parents and guardians to send their children and wards of school age to engage in income yielding activities to augment family income. The study sought to explain the basis of child labour, its causes and its effects on its victim and society at large. A social survey research design was employed to select the respondents. A sample size of 250 respondents was selected from targeted population of children below the age of 18 years. A questionnaire instrument was employed to collect data. An accidental sampling technique was employed to select the respondents. The findings revealed that child labour is on the increase and a serious threat to national security and social cohesion. The study recommends that the Nigerian government should enforce the laws on child labour and provide opportunities for job creation for urban dwellers. More so, government should also provide free and compulsory education at primary and secondary school levels of education.

Keywords: child labour, family income, national security, survey research

Procedia PDF Downloads 420
1468 Application of Artificial Intelligence to Schedule Operability of Waterfront Facilities in Macro Tide Dominated Wide Estuarine Harbour

Authors: A. Basu, A. A. Purohit, M. M. Vaidya, M. D. Kudale

Abstract:

Mumbai, being traditionally the epicenter of India's trade and commerce, the existing major ports such as Mumbai and Jawaharlal Nehru Ports (JN) situated in Thane estuary are also developing its waterfront facilities. Various developments over the passage of decades in this region have changed the tidal flux entering/leaving the estuary. The intake at Pir-Pau is facing the problem of shortage of water in view of advancement of shoreline, while jetty near Ulwe faces the problem of ship scheduling due to existence of shallower depths between JN Port and Ulwe Bunder. In order to solve these problems, it is inevitable to have information about tide levels over a long duration by field measurements. However, field measurement is a tedious and costly affair; application of artificial intelligence was used to predict water levels by training the network for the measured tide data for one lunar tidal cycle. The application of two layered feed forward Artificial Neural Network (ANN) with back-propagation training algorithms such as Gradient Descent (GD) and Levenberg-Marquardt (LM) was used to predict the yearly tide levels at waterfront structures namely at Ulwe Bunder and Pir-Pau. The tide data collected at Apollo Bunder, Ulwe, and Vashi for a period of lunar tidal cycle (2013) was used to train, validate and test the neural networks. These trained networks having high co-relation coefficients (R= 0.998) were used to predict the tide at Ulwe, and Vashi for its verification with the measured tide for the year 2000 & 2013. The results indicate that the predicted tide levels by ANN give reasonably accurate estimation of tide. Hence, the trained network is used to predict the yearly tide data (2015) for Ulwe. Subsequently, the yearly tide data (2015) at Pir-Pau was predicted by using the neural network which was trained with the help of measured tide data (2000) of Apollo and Pir-Pau. The analysis of measured data and study reveals that: The measured tidal data at Pir-Pau, Vashi and Ulwe indicate that there is maximum amplification of tide by about 10-20 cm with a phase lag of 10-20 minutes with reference to the tide at Apollo Bunder (Mumbai). LM training algorithm is faster than GD and with increase in number of neurons in hidden layer and the performance of the network increases. The predicted tide levels by ANN at Pir-Pau and Ulwe provides valuable information about the occurrence of high and low water levels to plan the operation of pumping at Pir-Pau and improve ship schedule at Ulwe.

Keywords: artificial neural network, back-propagation, tide data, training algorithm

Procedia PDF Downloads 474
1467 Economic Benefit of Wild Animals: A Possible Threat to Conservation in Ovia Southwest, Edo State, Nigeria

Authors: B. G. Oguntuase, M. O. Olofinsae

Abstract:

This study was carried out to assess the contribution of bush meat to Edo people’s livelihood and the consequence of utilization on conservation. Five markets were selected in Ovia Southwest local government area of Edo State, twenty bush meat sellers were selected from each market. Direct observations were made to document the composition of wild animals under sale in the study area. A total of one hundred questionnaires were administered to the respondents. The questionnaires were all retrieved and analyzed using descriptive analysis. The results show that thirteen animal species are being traded in the area. The price for the animal species (whole animal) ranged from N200 to N9,520. Respondents reported that there is a decline in the animal population over time. Between 64% and 95% of the respondents acknowledged population decline in seven of the thirteen animal species available for sale compared to what it used to be some ten years ago. Sales of wild animal species could be regarded as a profitable business in the rural community, supporting livelihood of the community, but could have devastating effect on conservation as already observed in this study if harvesting of wild animals is not regulated on controlled or sustainable basis.

Keywords: conservation, economic benefits, hunting, population, wild animals

Procedia PDF Downloads 460