Search results for: black hole attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1770

Search results for: black hole attack

720 Utilization of Sphagnum Moss as a Jeepney Emission Filter for Smoke Density Reduction

Authors: Monique Joyce L. Disamburum, Nicole C. Faustino, Ashley Angela A. Fazon, Jessie F. Rubonal

Abstract:

Traditional jeepneys contribute significantly to air pollution in the Philippines, negatively affecting both the environment and people. In response, the researchers investigated Sphagnum moss which has high adsorbent properties and can be used as a filter. Therefore, this research aims to create a muffler filter additive to reduce the smoke density emitted by traditional jeepneys. Various materials, such as moss, cornstarch, a metal pipe, bolts, and a papermaking screen frame, were gathered. The moss underwent a blending process with a cornstarch mixture until it achieved a pulp-like consistency, subsequently molded using a papermaking screen frame and left for sun drying. Following this, a metal prototype was created by drilling holes around the tumbler and inserting bolts. The mesh wire containing the filter was carefully placed into the hole, secured by two bolts. In the final phase, there were three setups, each undergoing one trial in the LTO emission testing. Each trial consisted of six rounds of purging, and after that the average smoke density was measured. According to the findings of this study, the filter aided in lowering the average smoke density. The one layer setup produced an average of 1.521, whereas the two layer setup produced an average of 1.082. Using One-Way Anova, it was demonstrated that there is a significant difference between the setups. Furthermore, the Tukey HSD Post Hoc test revealed that Setups A and C differed significantly (p = 0.04604), with Setup C being the most successful in reducing smoke density (mean difference -1.4128). Overall, the researchers came to the conclusion that employing Sphagnum moss as a filter can lower the average smoke density released by traditional jeepneys.

Keywords: sphagnum moss, Jeepney filter, smoke density, Jeepney emission

Procedia PDF Downloads 38
719 Study of the Microflora of Cedar Forests with Different Degrees of Decline in the National Park Belezma (Batna, Algeria)

Authors: Cherak Imen, Sellami Mehdi

Abstract:

The Atlas cedar, Cedrus atlantica, is endemic to the mountains of North Africa. This is one of the most valuable softwood, both economically, ecologically, aesthetically and culturally. In Algeria, the cedar forests currently have worrying symptoms of decline which therefore require special monitoring. Fungal endophytes are involved in various diseases of the Atlas cedar. They attack all organs on which they cause many symptoms. These microflora live in complex interaction with plants. In this study, we identified a total of 09 mycotaxons collected needles Cedarwood at three stations with different degrees of decline (Talmet, Boumerzoug and Tuggurt) in the National Park Belezma (Batna, Algeria). The study conducted on a total of 12 trees were identified 08 mycoendophytes in Talmet station, 04 species in the Boumerzoug station and 03 in Tuggurt station. The total species richness mycoendophytes depending on the types of cedar forests showed that the largest diversity was recorded at the cedar forest healthy, Alternaria is the most common type in all stations. This work should be completed by further detailed studies to identify other endophyte species and better know its interactions with the Atlas cedar.

Keywords: Cedrus atlantica, endophytic fungi, microflora, mycotaxons, mycoendophyte

Procedia PDF Downloads 336
718 Efficacy of TiO₂ in the Removal of an Acid Dye by Photo Catalytic Degradation

Authors: Laila Mahtout, Kerami Ahmed, Rabhi Souhila

Abstract:

The objective of this work is to reduce the impact on the environment of an acid dye (Black Eriochrome T) using catalytic photo-degradation in the presence of the semiconductor powder (TiO₂) previously characterized. A series of tests have been carried out in order to demonstrate the influence of certain parameters on the degree of dye degradation by titanium dioxide in the presence of UV rays, such as contact time, the powder mass and the pH of the solution. X-ray diffraction analysis of the powder showed that the anatase structure is predominant and the rutile phase is presented by peaks of low intensity. The various chemical groups which characterize the presence of the bands corresponding to the anatase and rutile form and other chemical functions have been detected by the Fourier Transform Infrared spectroscopy. The photo degradation of the NET by TiO₂ is very interesting because it gives encouraging results. The study of photo-degradation at different concentrations of the dye showed that the lower concentrations give better removal rates. The degree of degradation of the dye increases with increasing pH; it reaches the maximum value at pH = 9. The ideal mass of TiO₂ which gives the high removal rate is 1.2 g/l. Thermal treatment of TiO₂ with the addition of CuO with contents of 5%, 10%, and 15% respectively gives better results of degradation of the NET dye. The high percentage of elimination is observed at a CuO content of 15%.

Keywords: acid dye, ultraviolet rays, degradation, photocatalyse

Procedia PDF Downloads 181
717 Tutankhamen’s Shrines (Naoses): Scientific Identification of Wood Species and Technology

Authors: Medhat Abdallah, Ahmed Abdrabou

Abstract:

Tutankhamen tomb was discovered on November 1922 by Howard carter, the grave was relatively intact and crammed full of the most beautiful burial items and furniture, the black shrine-shaped boxes on sleds studied here founded in treasury chamber. This study aims to identify the wood species used in making those shrines, illustrate technology of manufacture. Optical Microscope (OM), 3D software and Imaging Processes including; Visible light, Raking light and Visible-induced infrared luminescence were effective in illustrating wooden joints and techniques of manufacture. The results revealed that cedar of Lebanon Cedrus libani and sycamore fig Ficus sycomorus had been used for making the shrines’ boards and sleds while tamarisk Tamarix sp., Turkey Oak Quercus cerris L., and Sidder (nabk) Zizyphus spina christi used for making dowels. The wooden joint of mortise and tenon was used to connect the body of the shrine to the sled, while wooden pegs used to connect roof and cornice to the shrine body.

Keywords: Tutankhamen, wood species, optical microscope, Cedrus libani, Ficus sycomorus

Procedia PDF Downloads 198
716 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 348
715 Doped and Co-doped ZnO Based Nanoparticles and their Photocatalytic and Gas Sensing Property

Authors: Neha Verma, Manik Rakhra

Abstract:

Statement of the Problem: Nowadays, a tremendous increase in population and advanced industrialization augment the problems related to air and water pollutions. Growing industries promoting environmental danger, which is an alarming threat to the ecosystem. For safeguard, the environment, detection of perilous gases and release of colored wastewater is required for eutrophication pollution. Researchers around the globe are trying their best efforts to save the environment. For this remediation advanced oxidation process is used for potential applications. ZnO is an important semiconductor photocatalyst with high photocatalytic and gas sensing activities. For efficient photocatalytic and gas sensing properties, it is necessary to prepare a doped/co-doped ZnO compound to decrease the electron-hole recombination rates. However, lanthanide doped and co-doped metal oxide is seldom studied for photocatalytic and gas sensing applications. The purpose of this study is to describe the best photocatalyst for the photodegradation of dyes and gas sensing properties. Methodology & Theoretical Orientation: Economical framework has to be used for the synthesis of ZnO. In the depth literature survey, a simple combustion method is utilized for gas sensing and photocatalytic activities. Findings: Rare earth doped and co-doped ZnO nanoparticles were the best photocatalysts for photodegradation of organic dyes and different gas sensing applications by varying various factors such as pH, aging time, and different concentrations of doping and codoping metals in ZnO. Complete degradation of dye was observed only in min. Gas sensing nanodevice showed a better response and quick recovery time for doped/co-doped ZnO. Conclusion & Significance: In order to prevent air and water pollution, well crystalline ZnO nanoparticles were synthesized by rapid and economic method, which is used as photocatalyst for photodegradation of organic dyes and gas sensing applications to sense the release of hazardous gases from the environment.

Keywords: ZnO, photocatalyst, photodegradation of dye, gas sensor

Procedia PDF Downloads 148
714 Spectrophotometric Determination of Photohydroxylated Products of Humic Acid in the Presence of Salicylate Probe

Authors: Julide Hizal Yucesoy, Batuhan Yardimci, Aysem Arda, Resat Apak

Abstract:

Humic substances produce reactive oxygene species such as hydroxyl, phenoxy and superoxide radicals by oxidizing in a wide pH and reduction potential range. Hydroxyl radicals, produced by reducing agents such as antioxidants and/or peroxides, attack on salicylate probe, and form 2,3-dihydroxybenzoate, 2,4-dihydroxybenzoate and 2,5-dihydroxybenzoate species. These species are quantitatively determined by using HPLC Method. Humic substances undergo photodegradation by UV radiation. As a result of their antioxidant properties, they produce hydroxyl radicals. In the presence of salicylate probe, these hydroxyl radicals react with salicylate molecules to form hydroxylated products (dihidroxybenzoate isomers). In this study, humic acid was photodegraded in a photoreactor at 254 nm (400W), formed hydroxyl radicals were caught by salicylate probe. The total concentration of hydroxylated salicylate species was measured by using spectrophotometric CUPRAC Method. And also, using results of time dependent experiments, kinetic of photohydroxylation was determined at different pHs. This method has been applied for the first time to measure the concentration of hydroxylated products. It allows to achieve the results easier than HPLC Method.

Keywords: CUPRAC method, humic acid, photohydroxylation, salicylate probe

Procedia PDF Downloads 195
713 Application of a Universal Distortion Correction Method in Stereo-Based Digital Image Correlation Measurement

Authors: Hu Zhenxing, Gao Jianxin

Abstract:

Stereo-based digital image correlation (also referred to as three-dimensional (3D) digital image correlation (DIC)) is a technique for both 3D shape and surface deformation measurement of a component, which has found increasing applications in academia and industries. The accuracy of the reconstructed coordinate depends on many factors such as configuration of the setup, stereo-matching, distortion, etc. Most of these factors have been investigated in literature. For instance, the configuration of a binocular vision system determines the systematic errors. The stereo-matching errors depend on the speckle quality and the matching algorithm, which can only be controlled in a limited range. And the distortion is non-linear particularly in a complex imaging acquisition system. Thus, the distortion correction should be carefully considered. Moreover, the distortion function is difficult to formulate in a complex imaging acquisition system using conventional models in such cases where microscopes and other complex lenses are involved. The errors of the distortion correction will propagate to the reconstructed 3D coordinates. To address the problem, an accurate mapping method based on 2D B-spline functions is proposed in this study. The mapping functions are used to convert the distorted coordinates into an ideal plane without distortions. This approach is suitable for any image acquisition distortion models. It is used as a prior process to convert the distorted coordinate to an ideal position, which enables the camera to conform to the pin-hole model. A procedure of this approach is presented for stereo-based DIC. Using 3D speckle image generation, numerical simulations were carried out to compare the accuracy of both the conventional method and the proposed approach.

Keywords: distortion, stereo-based digital image correlation, b-spline, 3D, 2D

Procedia PDF Downloads 488
712 Ghana’s Human Sexual Rights and Family Values Bill, 2021, and the Experiences of the LGBTQ+ Community

Authors: Michael Augustus Akagbor

Abstract:

Same-sex relationships have always existed in Ghana. In coastal towns such as James Town in the heart of the country’s capital, persons who were sexually different and attracted to members of their own sex were able to live their lives openly as queer persons without any fear for their lives. Since 2006, this idyllic existence has been under attack, with LGBTQ+ communities suffering violence and discrimination. This paper highlights the lived experiences of the LGBTIQ+ community in Ghana against the backdrop of the anti-gay bill - The Promotion of Proper Human Sexual Rights and Ghanaian Family Values Bill, 2021 (now renamed the Human Sexual Rights and Family Values Bill, 2021), currently before Parliament, introduced by eight members of Parliament as a Private Members’ Bill, and its implications for the LGBTQ+ community. The paper makes recommendations to key stakeholders on strategies to counter the cultural and religious arguments/strategies and activism of the anti-LGBTQ+ movement in Ghana. It relied on secondary data from a variety of sources, including the Bill before Parliament, media reports, and baseline surveys and studies conducted by LGBTQ organizations and other Civil Society Organizations (CSOs) in Ghana and elsewhere.

Keywords: sexual rights, promotion, family values, lgbtq+, ghana, discrimination

Procedia PDF Downloads 77
711 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 204
710 Analysis of Brain Signals Using Neural Networks Optimized by Co-Evolution Algorithms

Authors: Zahra Abdolkarimi, Naser Zourikalatehsamad,

Abstract:

Up to 40 years ago, after recognition of epilepsy, it was generally believed that these attacks occurred randomly and suddenly. However, thanks to the advance of mathematics and engineering, such attacks can be predicted within a few minutes or hours. In this way, various algorithms for long-term prediction of the time and frequency of the first attack are presented. In this paper, by considering the nonlinear nature of brain signals and dynamic recorded brain signals, ANFIS model is presented to predict the brain signals, since according to physiologic structure of the onset of attacks, more complex neural structures can better model the signal during attacks. Contribution of this work is the co-evolution algorithm for optimization of ANFIS network parameters. Our objective is to predict brain signals based on time series obtained from brain signals of the people suffering from epilepsy using ANFIS. Results reveal that compared to other methods, this method has less sensitivity to uncertainties such as presence of noise and interruption in recorded signals of the brain as well as more accuracy. Long-term prediction capacity of the model illustrates the usage of planted systems for warning medication and preventing brain signals.

Keywords: co-evolution algorithms, brain signals, time series, neural networks, ANFIS model, physiologic structure, time prediction, epilepsy suffering, illustrates model

Procedia PDF Downloads 266
709 Water and Sanitation Challenges: A Case of King Sabatha Dalindyebo Municipality

Authors: Masibulele Fiko, Sanjay Balkara, Beauty Makiwane, Samson Asoba

Abstract:

Several municipalities in the Eastern Cape Province of South Africa suffer from severe infrastructure dilapidation and a backlog in repairs and replacement. This scourge is most critical in black dominated areas, such as the rural communities and townships. Several critical service delivery activities have been impaired consequent to the deteriorating facilities and a lot of human endeavors impacted adversely. As such, this study investigated the water and sanitation challenges in King Sabatha Dalindyebo municipality, Eastern Cape Province of South Africa. Questionnaires were distributed to the communities and interviews were conducted with the communities’ leaders. The Participants mentioned that their main sources of water supply were a dam, streams, springs and wells; and the distances to the water sources were thought to be too long and women were often attacked and sometimes raped. South African local authorities are facing problems of insufficient funds to meet their daily operations. The municipality should provide street taps. The alternative way for government to supply financial aid to local authorities is to introduce the private sector in the service rendering process.

Keywords: communities, sanitation, managers, municipality

Procedia PDF Downloads 112
708 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 105
707 Logistics Information Systems in the Distribution of Flour in Nigeria

Authors: Cornelius Femi Popoola

Abstract:

This study investigated logistics information systems in the distribution of flour in Nigeria. A case study design was used and 50 staff of Honeywell Flour Mill was sampled for the study. Data generated through a questionnaire were analysed using correlation and regression analysis. The findings of the study revealed that logistic information systems such as e-commerce, interactive telephone systems and electronic data interchange positively correlated with the distribution of flour in Honeywell Flour Mill. Finding also deduced that e-commerce, interactive telephone systems and electronic data interchange jointly and positively contribute to the distribution of flour in Honeywell Flour Mill in Nigeria (R = .935; Adj. R2 = .642; F (3,47) = 14.739; p < .05). The study therefore recommended that Honeywell Flour Mill should upgrade their logistic information systems to computer-to-computer communication of business transactions and documents, as well adopt new technology such as, tracking-and-tracing systems (barcode scanning for packages and palettes), tracking vehicles with Global Positioning System (GPS), measuring vehicle performance with ‘black boxes’ (containing logistic data), and Automatic Equipment Identification (AEI) into their systems.

Keywords: e-commerce, electronic data interchange, flour distribution, information system, interactive telephone systems

Procedia PDF Downloads 542
706 Simplified 3R2C Building Thermal Network Model: A Case Study

Authors: S. M. Mahbobur Rahman

Abstract:

Whole building energy simulation models are widely used for predicting future energy consumption, performance diagnosis and optimum control.  Black box building energy modeling approach has been heavily studied in the past decade. The thermal response of a building can also be modeled using a network of interconnected resistors (R) and capacitors (C) at each node called R-C network. In this study, a model building, Case 600, as described in the “Standard Method of Test for the Evaluation of Building Energy Analysis Computer Program”, ASHRAE standard 140, is studied along with a 3R2C thermal network model and the ASHRAE clear sky solar radiation model. Although building an energy model involves two important parts of building component i.e., the envelope and internal mass, the effect of building internal mass is not considered in this study. All the characteristic parameters of the building envelope are evaluated as on Case 600. Finally, monthly building energy consumption from the thermal network model is compared with a simple-box energy model within reasonable accuracy. From the results, 0.6-9.4% variation of monthly energy consumption is observed because of the south-facing windows.

Keywords: ASHRAE case study, clear sky solar radiation model, energy modeling, thermal network model

Procedia PDF Downloads 131
705 Development of Biodegradable Plastic as Mango Fruit Bag

Authors: Andres M. Tuates Jr., Ofero A. Caparino

Abstract:

Plastics have achieved a dominant position in agriculture because of their transparency, lightness in weight, impermeability to water and their resistance to microbial attack. However, this generates a higher quantity of wastes that are difficult to dispose of by farmers. To address these problems, the project aim to develop and evaluate the biodegradable film for mango fruit bag during development. The PBS and starch were melt-blended in a twin-screw extruder and then blown into film extrusion machine. The physic-chemical-mechanical properties of biodegradable fruit bag were done following standard methods of test. Field testing of fruit bag was also conducted to evaluate its durability and efficiency field condition. The PHilMech-FiC fruit bag is made of biodegradable material measuring 6 x 8 inches with a thickness of 150 microns. The tensile strength is within the range of LDPE while the elongation is within the range of HDPE. It is projected that after thirty-six (36) weeks, the film will be totally degraded. Results of field testing show that the quality of harvested fruits using PHilMech-FiC biodegradable fruit bag in terms of percent marketable, non-marketable and export, peel color at the ripe stage, flesh color, TSS, oBrix, percent edible portion is comparable with the existing bagging materials such as Chinese brown paper bag and old newspaper.

Keywords: cassava starch, PBS, biodegradable, chemical, mechanical properties

Procedia PDF Downloads 266
704 Enhanced Decolourization and Biodegradation of Textile Azo and Xanthene Dyes by Using Bacterial Isolates

Authors: Gimhani Madhushika Hewayalage, Thilini Ariyadasa, Sanja Gunawardena

Abstract:

In Sri Lanka, the largest contribution for the industrial export earnings is governed by textile and apparel industry. However, this industry generates huge quantities of effluent consists of unfixed dyes which enhance the effluent colour and toxicity thereby leading towards environmental pollution. Therefore, the effluent should properly be treated prior to the release into the environment. The biological technique has now captured much attention as an environmental-friendly and cost-competitive effluent decolourization method due to the drawbacks of physical and chemical treatment techniques. The present study has focused on identifying dye decolourizing potential of several bacterial isolates obtained from the effluent of the local textile industry. Yellow EXF, Red EXF, Blue EXF, Nova Black WNN and Nylosan-Rhodamine-EB dyes have been selected for the study to represent different chromophore groups such as Azo and Xanthene. The rates of decolorization of each dye have been investigated by employing distinct bacterial isolates. Bacterial isolate which exhibited effective dye decolorizing potential was identified as Proteus mirabilis using 16S rRNA gene sequencing analysis. The high decolorizing rates of identified bacterial strain indicate its potential applicability in the treatment of dye-containing wastewaters.

Keywords: azo, bacterial, biological, decolourization, xanthene

Procedia PDF Downloads 245
703 Understanding the Impact of Spatial Light Distribution on Object Identification in Low Vision: A Pilot Psychophysical Study

Authors: Alexandre Faure, Yoko Mizokami, éRic Dinet

Abstract:

These recent years, the potential of light in assisting visually impaired people in their indoor mobility has been demonstrated by different studies. Implementing smart lighting systems for selective visual enhancement, especially designed for low-vision people, is an approach that breaks with the existing visual aids. The appearance of the surface of an object is significantly influenced by the lighting conditions and the constituent materials of the objects. Appearance of objects may appear to be different from expectation. Therefore, lighting conditions lead to an important part of accurate material recognition. The main objective of this work was to investigate the effect of the spatial distribution of light on object identification in the context of low vision. The purpose was to determine whether and what specific lighting approaches should be preferred for visually impaired people. A psychophysical experiment was designed to study the ability of individuals to identify the smallest cube of a pair under different lighting diffusion conditions. Participants were divided into two distinct groups: a reference group of observers with normal or corrected-to-normal visual acuity and a test group, in which observers were required to wear visual impairment simulation glasses. All participants were presented with pairs of cubes in a "miniature room" and were instructed to estimate the relative size of the two cubes. The miniature room replicates real-life settings, adorned with decorations and separated from external light sources by black curtains. The correlated color temperature was set to 6000 K, and the horizontal illuminance at the object level at approximately 240 lux. The objects presented for comparison consisted of 11 white cubes and 11 black cubes of different sizes manufactured with a 3D printer. Participants were seated 60 cm away from the objects. Two different levels of light diffuseness were implemented. After receiving instructions, participants were asked to judge whether the two presented cubes were the same size or if one was smaller. They provided one of five possible answers: "Left one is smaller," "Left one is smaller but unsure," "Same size," "Right one is smaller," or "Right one is smaller but unsure.". The method of constant stimuli was used, presenting stimulus pairs in a random order to prevent learning and expectation biases. Each pair consisted of a comparison stimulus and a reference cube. A psychometric function was constructed to link stimulus value with the frequency of correct detection, aiming to determine the 50% correct detection threshold. Collected data were analyzed through graphs illustrating participants' responses to stimuli, with accuracy increasing as the size difference between cubes grew. Statistical analyses, including 2-way ANOVA tests, showed that light diffuseness had no significant impact on the difference threshold, whereas object color had a significant influence in low vision scenarios. The first results and trends derived from this pilot experiment clearly and strongly suggest that future investigations could explore extreme diffusion conditions to comprehensively assess the impact of diffusion on object identification. For example, the first findings related to light diffuseness may be attributed to the range of manipulation, emphasizing the need to explore how other lighting-related factors interact with diffuseness.

Keywords: Lighting, Low Vision, Visual Aid, Object Identification, Psychophysical Experiment

Procedia PDF Downloads 52
702 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 243
701 Photocatalytic Degradation of Methylene Blue Dye Using Cuprous Oxide/Graphene Nanocomposite

Authors: Bekan Bogale, Tsegaye Girma Asere, Tilahun Yai, Fekadu Melak

Abstract:

Aims: To study photocatalytic degradation of methylene blue dye on cuprous oxide/graphene nanocomposite. Background: Cuprous oxide (Cu2O) nanoparticles are among the metal oxides that demonstrated photocatalytic activity. However, the stability of Cu2O nanoparticles due to the fast recombination rate of electron/hole pairs remains a significant challenge in their photocatalytic applications. This, in turn, leads to mismatching of the effective bandgap separation, tending to reduce the photocatalytic activity of the desired organic waste (MB). To overcome these limitations, graphene has been combined with cuprous oxides, resulting in cuprous oxide/graphene nanocomposite as a promising photocatalyst. Objective: In this study, Cu2O/graphene nanocomposite was synthesized and evaluated for its photocatalytic performance of methylene blue (MB) dye degradation. Method: Cu2O/graphene nanocomposites were synthesized from graphite powder and copper nitrate using the facile sol-gel method. Batch experiments have been conducted to assess the applications of the nanocomposites for MB degradation. Parameters such as contact time, catalyst dosage, and pH of the solution were optimized for maximum MB degradation. The prepared nanocomposites were characterized by using UV-Vis, FTIR, XRD, and SEM. The photocatalytic performance of Cu2O/graphene nanocomposites was compared against Cu2O nanoparticles for cationic MB dye degradation. Results: Cu2O/graphene nanocomposite exhibits higher photocatalytic activity for MB degradation (with a degradation efficiency of 94%) than pure Cu2O nanoparticles (67%). This has been accomplished after 180 min of irradiation under visible light. The kinetics of MB degradation by Cu2O/graphene composites can be demonstrated by the second-order kinetic model. The synthesized nanocomposite can be used for more than three cycles of photocatalytic MB degradation. Conclusion: This work indicated new insights into Cu2O/graphene nanocomposite as high-performance in photocatalysis to degrade MB, playing a great role in environmental protection in relation to MB dye.

Keywords: methylene blue, photocatalysis, cuprous oxide, graphene nanocomposite

Procedia PDF Downloads 174
700 Filler Elastomers Abrasion at Steady State: Optimal Use Conditions

Authors: Djeridi Rachid, Ould Ouali Mohand

Abstract:

The search of a mechanism for the elastomer abrasive wear study is an open issue. The practice difficulties are complex due to the complexity of deformation mechanism, to the complex mechanism of the material tearing and to the marked interactions between the tribological parameters. In this work, we present an experimental technique to study the elastomers abrasive wear. The interaction 'elastomer/indenter' implicate dependant ant temporary of different tribological parameters. Consequently, the phenomenon that governs this interaction is not easy to explain. An optimal elastomers compounding and an adequate utilization conditions of these materials that define its resistance at the abrasion is discussed. The results are confronted to theoretical models: the weight loss variation in function of blade angle or in function of cycle number is in agreement with rupture models and with the mechanism of fissures propagation during the material tearing in abrasive wear of filler elastomers. The weight loss in function of the sliding velocity shows the existence of a critical velocity that corresponds to the maximal wear. The adding of silica or black carbon influences in a different manner on wear abrasive behavior of filler elastomers.

Keywords: abrasion wear, filler elastomer, tribology, hyperelastic

Procedia PDF Downloads 305
699 Detection of Elephant Endotheliotropic Herpes Virus in a Wild Asian Elephant Calf in Thailand by Using Real-Time PCR

Authors: Bopit Puyati, Anchittha Kaewchana, Nuntita Ruksachat

Abstract:

In January 2018, a male wild elephant, approximately 2 years old, was found dead in Phu Luang Wildlife Sanctuary, Loei province. The elephant was likely to die around 2 weeks earlier. The carcass was decayed without any signs of attack or bullet. No organs were removed. A deadly viral disease was suspected. Different organs including lung, liver, intestine and tongue were collected and submitted to the veterinary research and development center, Surin province for viral detection. The samples were then examined with real-time PCR for detecting U41 Major DNA binding protein (MDBP) gene and with conventional PCR for the presence of specific polymerase gene. We used tumor necrosis factor (TNF) gene as the internal control. In our real-time PCR, elephant endotheliotropic herpesvirus (EEHV) was recovered from lung, liver, and tongue whereas only tongue provided a positive result in the conventional PCR. All samples were positive with TNF gene detection. To our knowledge, this is the first report of EEHV detection in wild elephant in Thailand. EEHV surveillance in this wild population is strongly suggested. Linkage between EEHV in wild and domestic elephants should be further explored.

Keywords: elephant endotheliotropic herpes virus, PCR, Thailand, wild Asian elephant

Procedia PDF Downloads 131
698 Explainable Graph Attention Networks

Authors: David Pham, Yongfeng Zhang

Abstract:

Graphs are an important structure for data storage and computation. Recent years have seen the success of deep learning on graphs such as Graph Neural Networks (GNN) on various data mining and machine learning tasks. However, most of the deep learning models on graphs cannot easily explain their predictions and are thus often labelled as “black boxes.” For example, Graph Attention Network (GAT) is a frequently used GNN architecture, which adopts an attention mechanism to carefully select the neighborhood nodes for message passing and aggregation. However, it is difficult to explain why certain neighbors are selected while others are not and how the selected neighbors contribute to the final classification result. In this paper, we present a graph learning model called Explainable Graph Attention Network (XGAT), which integrates graph attention modeling and explainability. We use a single model to target both the accuracy and explainability of problem spaces and show that in the context of graph attention modeling, we can design a unified neighborhood selection strategy that selects appropriate neighbor nodes for both better accuracy and enhanced explainability. To justify this, we conduct extensive experiments to better understand the behavior of our model under different conditions and show an increase in both accuracy and explainability.

Keywords: explainable AI, graph attention network, graph neural network, node classification

Procedia PDF Downloads 172
697 Pulse Method for Investigation of Zr-C Phase Diagram at High Carbon Content Domain under High Temperatures

Authors: Arseniy M. Kondratyev, Sergey V. Onufriev, Alexander I. Savvatimskiy

Abstract:

The microsecond electrical pulse heating technique which provides uniform energy input into an investigated specimen is considered. In the present study we investigated ZrC+C carbide specimens in a form of a thin layer (about 5 microns thick) that were produced using a method of magnetron sputtering on insulating substrates. Specimens contained (at. %): Zr–17.88; C–67.69; N–8.13; O–5.98. Current through the specimen, voltage drop across it and radiation at the wavelength of 856 nm were recorded in the experiments. It enabled us to calculate the input energy, specific heat (from 2300 to 4500 K) and resistivity (referred to the initial dimensions of a specimen). To obtain the true temperature a black body specimen was used. Temperature of the beginning and completion of a phase transition (solid–liquid) was measured.Temperature of the onset of melting was 3150 K at the input energy 2.65 kJ/g; temperature of the completion of melting was 3450 K at the input energy 5.2 kJ/g. The specific heat of the solid phase of investigated carbide calculated using our data on temperature and imparted energy, is close to 0.75 J/gК for temperature range 2100–2800 K. Our results are considered together with the equilibrium Zr-C phase diagram.

Keywords: pulse heating, zirconium carbide, high temperatures, melting

Procedia PDF Downloads 315
696 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 175
695 The Evaluation of Children Who Had Chest Pain on Pediatric Emergency Department

Authors: Sabiha Sahin

Abstract:

Background: Chest pain is a common complaint in children visiting the emergency department (ED). True organic problems like cardiac disease are rare. We assess the etiology of chest pain among children visiting a Pediatric ED in Eskisehir Osmangazi University. Method: We prospectively evaluated of children with chest pain who visited our Pediatric ED between 1 January 2013 and 31 December 2014. Any case of trauma-associated chest pain was excluded from this study. Results: A total of 100 patients (54 boys, 46 girls), mean age: 11,86±3,51 (age range, 6–17 years) were enrolled into this study; 100 patients had chest radiograms (100 %). Pneumonia was identified in 15 patients. All patients had electrocardiogram study (100 %) and 16 of them showed abnormalities. Additional diagnostic tests were performed on all patients including complete blood count analysis, cardiac markers (CK-MB, Troponin I) and lactate (blood gas analysis). Echocardiograms were performed on all patients and 16 of them showed abnormality (five of majör abnormality). Panendoscopy was done in 20 patients, and gastroesophageal reflux was found in 12 (%12). Overall, idiopathic chest pain and myalgia was the most common diagnosis (32 %). Other associated disorders were asthma (12 %), panic attack (13 %). Conclusion: The most common cause of chest pain prompting a child to visit the ED is idiopathic chest pain. Careful physical examination can reveal important clues and save many unnecessary examinations.

Keywords: child, chest pain, pediatric emergency department, evaluation

Procedia PDF Downloads 247
694 Designing of Nano-materials for Waste Heat Conversion into Electrical Energy Thermoelectric generator

Authors: Wiqar Hussain Shah

Abstract:

The electrical and thermal properties of the doped Tellurium Telluride (Tl10Te6) chalcogenide nano-particles are mainly characterized by a competition between metallic (hole doped concentration) and semi-conducting state. We have studied the effects of Sn doping on the electrical and thermoelectric properties of Tl10-xSnxTe6 (1.00 ≤x≤ 2.00), nano-particles, prepared by solid state reactions in sealed silica tubes and ball milling method. Structurally, all these compounds were found to be phase pure as confirmed by the x-rays diffractometery (XRD) and energy dispersive X-ray spectroscopy (EDS) analysis. Additionally crystal structure data were used to model the data and support the findings. The particles size was calculated from the XRD data by Scherrer’s formula. The EDS was used for an elemental analysis of the sample and declares the percentage of elements present in the system. The thermo-power or Seebeck co-efficient (S) was measured for all these compounds which show that S increases with increasing temperature from 295 to 550 K. The Seebeck coefficient is positive for the whole temperature range, showing p-type semiconductor characteristics. The electrical conductivity was investigated by four probe resistivity techniques revealed that the electrical conductivity decreases with increasing temperature, and also simultaneously with increasing Sn concentration. While for Seebeck coefficient the trend is opposite which is increases with increasing temperature. These increasing behavior of Seebeck coefficient leads to high power factor which are increases with increasing temperature and Sn concentration except For Tl8Sn2Te6 because of lowest electrical conductivity but its power factor increases well with increasing temperature.

Keywords: Sn doping in Tellurium Telluride nano-materials, electron holes competition, Seebeck co-efficient, effects of Sn doping on Electrical conductivity, effects on Power factor

Procedia PDF Downloads 37
693 Forensic Applications of Quantum Dots

Authors: Samaneh Nabavi, Hadi Shirzad, Somayeh Khanjani, Shirin Jalili

Abstract:

Quantum dots (QDs) are semiconductor nanocrystals that exhibit intrinsic optical and electrical properties that are size dependent due to the quantum confinement effect. Quantum confinement is brought about by the fact that in bulk semiconductor material the electronic structure consists of continuous bands, and that as the size of the semiconductor material decreases its radius becomes less than the Bohr exciton radius (the distance between the electron and electron-hole) and discrete energy levels result. As a result QDs have a broad absorption range and a narrow emission which correlates to the band gap energy (E), and hence QD size. QDs can thus be tuned to give the desired wavelength of fluorescence emission.Due to their unique properties, QDs have attracted considerable attention in different scientific areas. Also, they have been considered for forensic applications in recent years. The ability of QDs to fluoresce up to 20 times brighter than available fluorescent dyes makes them an attractive nanomaterial for enhancing the visualization of latent fingermarks, or poorly developed fingermarks. Furthermore, the potential applications of QDs in the detection of nitroaromatic explosives, such as TNT, based on directive fluorescence quenching of QDs, electron transfer quenching process or fluorescence resonance energy transfer have been paid to attention. DNA analysis is associated tightly with forensic applications in molecular diagnostics. The amount of DNA acquired at a criminal site is inherently limited. This limited amount of human DNA has to be quantified accurately after the process of DNA extraction. Accordingly, highly sensitive detection of human genomic DNA is an essential issue for forensic study. QDs have also a variety of advantages as an emission probe in forensic DNA quantification.

Keywords: forensic science, quantum dots, DNA typing, explosive sensor, fingermark analysis

Procedia PDF Downloads 842
692 The Application of Insects in Forensic Investigations

Authors: Shirin Jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani

Abstract:

Forensic entomology is the science of study and analysis of insects evidences to aid in criminal investigation. Being aware of the distribution, biology, ecology and behavior of insects, which are founded at crime scene can provide information about when, where and how the crime has been committed. It has many application in criminal investigations. Its main use is estimation of the minimum time after death in suspicious death. The close association between insects and corpses and the use of insects in criminal investigations is the subject of forensic entomology. Because insects attack to the decomposing corpse and spawning on it from the initial stages. Forensic scientists can estimate the postmortem index by studying the insects population and the developing larval stages.In addition, toxicological and molecular studies of these insects can reveal the cause of death or even the identity of a victim. It also be used to detect drugs and poisons, and determination of incident location. Gathering robust entomological evidences is made possible for experts by recent Techniques. They can provide vital information about death, corpse movement or burial, submersion interval, time of decapitation, identification of specific sites of trauma, post-mortem artefacts on the body, use of drugs, linking a suspect to the scene of a crime, sexual molestations and the identification of suspects.

Keywords: Forensic entomology, post mortem interval, insects, larvae

Procedia PDF Downloads 491
691 Contribution of Crime Scene and Autopsy Investigation to the Solving of the Case in the Case of Death as a Result of Self-Harm

Authors: Murat Mert, Yusuf Ozer, Fatih Kolay

Abstract:

Behaviour of giving harm to the body in literature has been named as “self-injury”, “self-mutilation” ve “self-harm”. “Self-injury”, or “self-mutilation” is generally used for the same meaning and mentioned as an action which is committed to the body itself directly. As is seen that alcohol and drug users have injured their bodies because of deprivation, whereas behaviour of self-injury in some societies is accepted as religious and cultural, it has nevertheless been diagnosed in people who have a borderline personality disorder, histrionic personality disorder, psychotic personality disorder and mood disorder. There has not been any direct self-murder tendency in people having self-harmed. However, death cases can be seen together with loss of consciousness depending on loss of blood by exceeding the limit in the course of injury action. 34- year old – male person who was alcohol addicted, having had a psycological treatment beforehand, had mutilated his small intestine together with fatty tissue by cutting his body with a razor-blade at the thought of insects strolling around the body (delirium tremens) due to deprivation attack and had died in the result of various cuts. In this study, crime scene investigation and death mechanism of the person having had self-harmed in a result of abstinence syndrome will be explained. Relevant criteria which differentiate this case from homicide will be examined.

Keywords: self-injury, autopsy, abstinence syndrome, CSI

Procedia PDF Downloads 84