Search results for: unknown environments
1821 Web Proxy Detection via Bipartite Graphs and One-Mode Projections
Authors: Zhipeng Chen, Peng Zhang, Qingyun Liu, Li Guo
Abstract:
With the Internet becoming the dominant channel for business and life, many IPs are increasingly masked using web proxies for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets. Moreover, as Internet traffic continues to grow in size and complexity, it has become an increasingly challenging task to detect the proxy service due to their dynamic update and high anonymity. In this paper, we present an approach based on behavioral graph analysis to study the behavior similarity of web proxy users. Specifically, we use bipartite graphs to model host communications from network traffic and build one-mode projections of bipartite graphs for discovering social-behavior similarity of web proxy users. Based on the similarity matrices of end-users from the derived one-mode projection graphs, we apply a simple yet effective spectral clustering algorithm to discover the inherent web proxy users behavior clusters. The web proxy URL may vary from time to time. Still, the inherent interest would not. So, based on the intuition, by dint of our private tools implemented by WebDriver, we examine whether the top URLs visited by the web proxy users are web proxies. Our experiment results based on real datasets show that the behavior clusters not only reduce the number of URLs analysis but also provide an effective way to detect the web proxies, especially for the unknown web proxies.Keywords: bipartite graph, one-mode projection, clustering, web proxy detection
Procedia PDF Downloads 2451820 Adaptive Multipath Mitigation Acquisition Approach for Global Positioning System Software Receivers
Authors: Animut Meseret Simachew
Abstract:
Parallel Code Phase Search Acquisition (PCSA) Algorithm has been considered as a promising method in GPS software receivers for detection and estimation of the accurate correlation peak between the received Global Positioning System (GPS) signal and locally generated replicas. GPS signal acquisition in highly dense multipath environments is the main research challenge. In this work, we proposed a robust variable step-size (RVSS) PCSA algorithm based on fast frequency transform (FFT) filtering technique to mitigate short time delay multipath signals. Simulation results reveal the effectiveness of the proposed algorithm over the conventional PCSA algorithm. The proposed RVSS-PCSA algorithm equalizes the received carrier wiped-off signal with locally generated C/A code.Keywords: adaptive PCSA, detection and estimation, GPS signal acquisition, GPS software receiver
Procedia PDF Downloads 1171819 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls
Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu
Abstract:
Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.Keywords: android, API Calls, machine learning, permissions combination
Procedia PDF Downloads 3291818 The Influence of Learning Styles on Learners Grade Achievement in E-Learning Environments: An Empirical Study
Authors: Thomas Yeboah, Gifty Akouko Sarpong
Abstract:
Every learner has a specific learning style that helps him/her to study best. This means that any learning method (e-learning method or traditional face-to-face method) a learner chooses should address the learning style of the learner. Therefore, the main purpose of this research is to investigate whether learners’ grade achievement in e-learning environment is improved for learners with a particular learning style. In this research, purposive sampling technique was employed for selecting the sample size of three hundred and twenty (320) students studying a course UGRC 140 Science and Technology in our Lives at Christian Service University College. Data were analyzed by using, percentages, T -test, and one-way ANOVA. A thorough analysis was done on the data collected and the results revealed that learners with the Assimilator learning style and the converger learning style obtained higher grade achievement than both diverger learning style and accommodative learning style. Again, the results also revealed that accommodative learning style was not good enough for e-learning method.Keywords: e-learning, learning style, grade achievement, accomodative, divergent, convergent, assimilative
Procedia PDF Downloads 4321817 The Role of Video in Teaching and Learning Pronunciation: A Case Study
Authors: Kafi Razzaq Ahmed
Abstract:
Speaking fluently in a second language requires vocabulary, grammar, and pronunciation skills. Teaching the English language entails teaching pronunciation. In professional literature, there have been a lot of attempts to integrate technology into improving the pronunciation of learners. The technique is also neglected in Kurdish contexts, Salahaddin University – Erbil included. Thus, the main aim of the research is to point out the efficiency of using video materials for both language teachers and learners within and beyond classroom learning and teaching environments to enhance student's pronunciation. To collect practical data, a research project has been designed. In subsequent research, a posttest will be administered after each lesson to 100 first-year students at Salahaddin University-Erbil English departments. All students will be taught the same material using different methods, one based on video materials and the other based on the traditional approach to teaching pronunciation. Finally, the results of both tests will be analyzed (also knowing the attitudes of both the teachers and the students about both lessons) to indicate the impact of using video in the process of teaching and learning pronunciation.Keywords: video, pronunciation, teaching, learning
Procedia PDF Downloads 1091816 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 961815 Assessment of the Neuroprotective Effect of Oral Hypoglycemic Agents in Patients with Acute Ischemic Stroke
Authors: A. Alhusban, M. Alqawasmeh, F. Alfawares
Abstract:
Introduction: Diabetes is a chronic health problem and a major risk factor of stroke. A number of therapeutic modalities exist for diabetes management. It’s still unknown whether the different oral hypoglycemic agents would ameliorate the detrimental effect of diabetes on stroke severity. The objective of this work is to assess the effect of pretreatment with oral hypoglycemic agents, insulin and their combination on stroke severity at presentation. Patients and Methods: Patients admitted to the King Abdullah University Hospital (KAUH)-Jordan with ischemic stroke between January 2015 and December 2016 were evaluated and their comorbid diseases, treatment on admission and their neurologic severity was assessed using the National Institute of Health Stroke Scale (NIHSS) were documented. Stroke severity was compared for non-diabetic patients and diabetic patients treated with different antidiabetic agents. Results: Data from 324 patients with acute stroke was documented. The median age of participants was 69 years. Diabetes was documented in about 50% of the patients. Multinomial regression analysis identified diabetes treatment status as an independent predictor of neurological severity of stroke (p=0.032). Patients treated with oral hypoglycemic agents had a significantly lower NIHSS as compared to nondiabetic patients and insulin treated patients (p < 0.02). The positive effect of oral hypoglycemic agents was blunted by insulin co-treatment. Insulin did not alter the severity of stroke as compared to non-diabetics. Conclusion: Oral hypoglycemic agents may reduce the severity of neurologic deficit of ischemic stroke and may have neuroprotective effect.Keywords: diabetes, stroke, neuroprotection, oral hypoglycemic agents
Procedia PDF Downloads 1641814 Marginalized Two-Part Joint Models for Generalized Gamma Family of Distributions
Authors: Mohadeseh Shojaei Shahrokhabadi, Ding-Geng (Din) Chen
Abstract:
Positive continuous outcomes with a substantial number of zero values and incomplete longitudinal follow-up are quite common in medical cost data. To jointly model semi-continuous longitudinal cost data and survival data and to provide marginalized covariate effect estimates, a marginalized two-part joint model (MTJM) has been developed for outcome variables with lognormal distributions. In this paper, we propose MTJM models for outcome variables from a generalized gamma (GG) family of distributions. The GG distribution constitutes a general family that includes approximately all of the most frequently used distributions like the Gamma, Exponential, Weibull, and Log Normal. In the proposed MTJM-GG model, the conditional mean from a conventional two-part model with a three-parameter GG distribution is parameterized to provide the marginal interpretation for regression coefficients. In addition, MTJM-gamma and MTJM-Weibull are developed as special cases of MTJM-GG. To illustrate the applicability of the MTJM-GG, we applied the model to a set of real electronic health record data recently collected in Iran, and we provided SAS code for application. The simulation results showed that when the outcome distribution is unknown or misspecified, which is usually the case in real data sets, the MTJM-GG consistently outperforms other models. The GG family of distribution facilitates estimating a model with improved fit over the MTJM-gamma, standard Weibull, or Log-Normal distributions.Keywords: marginalized two-part model, zero-inflated, right-skewed, semi-continuous, generalized gamma
Procedia PDF Downloads 1761813 The Effects of an Online Career Intervention on University Students’ Levels of Career Adaptability
Authors: Anna Veres
Abstract:
People’s ability to adapt to a constantly changing environment is essential. Career adaptability is central to Career Construction Theory, where proper adaptation to new situations, changing environments, and jobs require adequate career development. Based on current career theories and the possibilities offered by digital technology, the primary goal of this study is to develop career adaptability through an online tool. Its secondary goal is to apply for an online career intervention program and explore its developmental possibilities. A total of 132 university students from the bachelor program took part in the study, from which 65 students received a four-week online career intervention, while 67 participants formed the control group. Based on the results, it can state that career adaptability can be developed, and there is a great demand and interest from university students to use career-related programs on online platforms. Career interventions should be performed online as well if there is suitable software and a well-constructed program. Limitations and further implications are discussed.Keywords: career adaptability, career development, online career intervention, university students
Procedia PDF Downloads 1401812 Effects of Aging on Ultra: Triathlon Performance
Authors: Richard S. Jatau, Kankanala Venkateswarlu, Bulus Kpame
Abstract:
The purpose of this critical review is to find out what is known and what is unknown about the effects of aging on endurance performance, especially on ultra- triathlon performance. It has been shown that among master’s athlete’s peak levels of performance decreased by 50% by age 50 it has also been clearly revealed that age associated atrophy, weakness and fatigability cannot be halted, although year round athletic training can slow down this age associated decline. Studies have further revealed that 30% to 50% decrease in skeletal muscle mass between ages 40 and 80 years, which is accompanied by an equal or even greater decline in strength and power and an increase in muscle weakness and fatigability. Studies on ultra- triathlon athletes revealed that 30 to 39 year old showed fastest time, with athletes in younger and older age groups were slower. It appears that the length of the endurance performance appears to influence age related endurance performance decline in short distance triathlons. A significant decline seems to start at the age of 40 to 50 years, whereas in long distance triathlons this decline seems to start after the age of 65 years. However, it is not clear whether this decline is related in any way to the training methods used, the duration of training, or the frequency of training. It’s also not clear whether the triathlon athletes experience more injuries due to long hours of training. It’s also not clear whether these athletes used performance enhancing drugs to enhance their performance. It’s not also clear whiles there has been tremendous increase in the number of athletes specializing in triathlon. On the basis of our experience and available research evidence we have provided answers to some of these questions. We concluded that aging associated decline in ultra–endurance performance is inevitable although it can be slowed down.Keywords: aging, triathlon, atrophy, endurance
Procedia PDF Downloads 3731811 The Strategy of Traditional Religious Culture Tourism: Taking Taiwan Minhsiung Infernal Lord Festival for Example
Authors: Ching-Yi Wang
Abstract:
The purpose of this study is to explore strategies for integrate Minhsiung environments and cultural resources for Infernal Lord Festival. Minhsiung Infernal Lord Festival is one of the famous religious event in Chia-Yi County, Taiwan. This religious event and the life of local residents are inseparable. Minhsiung Infernal Lord Festival has a rich cultural ceremonies meaning and sentiment of local concern. This study apply field study, document analysis and interviews to analyze Minhsiung Township’s featured attractions and folklore events. The research results reveal the difficulties and strategies while incorporating culture elements into culture tourism. This study hopes to provide innovative techniques for the purpose of prolonging the feasibility of future development of the tradition folk culture.Keywords: Taiwan folk culture, Minhsiung Infernal Lord Festival, religious tourism, folklore, cultural tourism
Procedia PDF Downloads 3401810 Incidence, Pattern and Risk Factors of Congenial Heart Diseases in Neonates in a Tertiary Care Hospital, Egyptian Study
Authors: Gehan Hussein, Hams Ahmad, Baher Matta, Yasmeen Mansi, Mohamad Fawzi
Abstract:
Background: Congenital heart disease (CHD) is a common problem worldwide with variable incidence in different countries. The exact etiology is unknown, suggested to be multifactorial. We aimed to study the incidence of various CHD in a neonatal intensive care unit (NICU) in a tertiary care hospital in Egypt and the possible associations with variable risk factors. Methods: Prospective study was conducted over a period of one year (2013 /2014) at NICU KasrAlAini School of Medicine, Cairo University. Questionnaire about possible maternal and/or paternal risk factors for CHD, clinical examination, bedside echocardiography were done. Cases were classified into groups: group 1 without CHD and group 2 with CHD. Results: from 723 neonates admitted to NICU, 180 cases were proved to have CHD, 58 % of them were males. patent ductus arteriosus(PDA) was the most common CHD (70%), followed by an atrial septal defect (ASD8%), while Fallot tetralogy and single ventricle were the least common (0.45 %) for each. CHD was found in 30 % of consanguineous parents Maternal age ≥ 35 years at the time of conception was associated with increased incidence of PDA (p= 0.45 %). Maternal diabetes and insulin intake were significantly associated with cases of CHD (p=0.02 &0.001 respectively), maternal hypertension and hypothyroidism were both associated with VSD, but the difference did not reach statistical significance (P=0.36 &0.44respectively). Maternal passive smoking was significantly associated with PDA (p=0.03). Conclusion: The most frequent CHD in the studied population was PDA, followed by ASD. Maternal conditions as diabetes was associated with VSD occurrence.Keywords: NICU, risk factors, congenital heart disease, echocardiography
Procedia PDF Downloads 1921809 Two Different Learning Environments: Arabic International Students Coping with the Australian Learning System
Authors: H. van Rensburg, B. Adcock, B. Al Mansouri
Abstract:
This paper discusses the impact of pedagogical and learning differences on Arabic international students’ (AIS) learning when they come to study in Australia. It describes the difference in teaching and learning methods between the students’ home countries in the Arabic world and Australia. There are many research papers that discuss the general experiences of international students in the western learning systems, including Australia. However, there is little research conducted specifically about AIS learning in Australia. Therefore, the data was collected through in-depth, semi-structured interviews with AIS who are learning at an Australian regional university in Queensland. For that reason, this paper contributes to fill a gap by reporting on the learning experiences of AIS in Australia and, more specifically, on the AIS’ pedagogical experiences. Not only discussing the learning experiences of AIS, but also discussing the cultural adaptation using the Oberg’s cultural adaptation model. This paper suggests some learning strategies that may benefit AIS and academic lecturers when teaching students from a completely different culture and language.Keywords: arabic international students, cultural adaption, learning differences, learning systems
Procedia PDF Downloads 6041808 Impact of Four Reading and Library Factors on the Grade Average of Ugandan Secondary School Students: A Quantitative Study
Authors: Valeda Dent
Abstract:
This study explores reading and library factors related to secondary school student academic outcomes in rural areas in Uganda. This mixed methods study utilized quantitative data collected as part of a more extensive project to explore six student factors in relation to students’ school, library, and home environments. The Kitengesa Community Library in Uganda (www.kitengesalibrary.org) served as the site for this study. The factors explored for this study include reading frequency, library use frequency, library access, overall grade average (OGA), and presence and type of reading materials in the home. Results indicated that both reading frequency and certain types of reading materials read for recreational purposes are correlated with higher OGA. Reading frequency was positively correlated with student OGA for all students.Keywords: rural village libraries, secondary school students, reading, academic achievement
Procedia PDF Downloads 2301807 Comparative Analysis of Water-Based Alumina Nanoparticles with Water-Based Cupric Nanoparticles Past an Exponentially Accelerated Vertical Radiative Riga Plate with Heat Transfer
Authors: Kanayo Kenneth Asogwa
Abstract:
The influence of the flow of nanoparticles in nanofluids across a vertical surface is significant, and its application in medical sciences, engineering, pharmaceutical, and food industries is enormous & widely published. However, the comparative examination of alumina nanoparticles with cupric nanoparticles past a rapid progressive Riga plate remains unknown. Thus, this report investigates water-based alumina and cupric nanoparticles passing through an exponentially accelerated Riga plate. Nanofluids containing copper (II) oxide (CuO) and aluminum oxide (Al2O3) nanoparticles are considered. The Laplace transform technique is used to solve the partial differential equations guiding the flow. The effect of various factors on skin friction coefficient, Nusselt number, velocity and temperature profiles is investigated and reported in tabular and graphical form. The upsurge of Modified Hartmann number and radiative impact improves copper (II) oxide nanofluid compared to aluminum oxide nanofluid due to Lorentz force and since CuO is a better heat conductor. At the same time, heat absorption and reactive species favor a slight decline in Alumina nanofluid than Cupric nanofluid in the thermal and velocity fields. The higher density of Cupric nanofluid is enhanced by increasing nanoparticle volume fraction over Alumina nanofluid with a decline in velocity distribution.Keywords: alumina, cupric, nanoparticles, water-based
Procedia PDF Downloads 2021806 Enabling Enterprise Information System Interoperability: A Future Perspective
Authors: Mahdi Alkaeed, Adeel Ehsan
Abstract:
Enterprise information systems (EIS) act as the backbone of organizations that belong to different domains. These systems not only play a major role in the efficient usage of resources and time but also throw light on the future roadmap for the enterprise. In today's rapidly expanding world of business and technology, enterprise systems from various heterogenous environments have to exchange information at some point, be it within the same organization or between different organizations. This reality strengthens the importance of interoperability between these systems, which is one of the key enablers of systems collaboration. Both information technology infrastructure and business processes have to be aligned with each other to achieve this effect. This will be difficult to attain if traditional tightly coupled architecture is used. Instead, a more loosely coupled service-oriented architecture has to be used. That would enable an effective interoperability level between different EIS. This paper discusses and presents the current work that has been done in the field of EIS interoperability. Along the way, it also discusses the challenges, solutions to tackle those challenges presented in the studied literature, and limitations, if any.Keywords: enterprise systems interoperability, collaboration and integration, service-based architecture, open system architecture
Procedia PDF Downloads 1121805 Study of the Behavior of an Organic Coating Applied on Algerian Oil Tanker in Seawater
Authors: N. Hammouda, K. Belmokre
Abstract:
The paints are used extensively today in the industry to protect the metallic structures of the aggressive environments. This work is devoted to the study of corrosion resistance and aging behavior of a paint coating providing external protection for oil tankers. To avoid problems related to corrosion of these vessels, two protection modes are provided: An electro chemical active protection (cathodic protection of the hull). A passive protection by external painting. Investigations are conducted using stationary and non-stationary electro chemical tools such as electro chemical impedance spectroscopy has allowed us to characterize the protective qualities of these films. The application of the EIS on our damaged in-situ painting shows the existence of several capacitive loops which is an indicator of the failure of our tested paint. Microscopic analysis (micrograph) helped bring essential elements in understanding the degradation of our paint condition and immersion training corrosion products.Keywords: epoxy paints, electrochemical impedance spectroscopy, corrosion mechanisms, seawater
Procedia PDF Downloads 3911804 Consumer Experience of 3D Body Scanning Technology and Acceptance of Related E-Commerce Market Applications in Saudi Arabia
Authors: Moudi Almousa
Abstract:
This research paper explores Saudi Arabian female consumers’ experiences using 3D body scanning technology and their level of acceptance of possible market applications of this technology to adopt for apparel online shopping. Data was collected for 82 women after being scanned then viewed a short video explaining three possible scenarios of 3D body scanning applications, which include size prediction, customization, and virtual try-on, before completing the survey questionnaire. Although respondents have strong positive responses towards the scanning experience, the majority were concerned about their privacy during the scanning process. The results indicated that size prediction and virtual try on had greater market application potential and a higher chance of crossing the gap based on consumer interest. The results of the study also indicated a strong positive correlation between respondents’ concern with inability to try on apparel products in online environments and their willingness to use the 3D possible market applications.Keywords: 3D body scanning, market applications, online, apparel fit
Procedia PDF Downloads 1451803 Procedural Protocol for Dual Energy Computed Tomography (DECT) Inversion
Authors: Rezvan Ravanfar Haghighi, S. Chatterjee, Pratik Kumar, V. C. Vani, Priya Jagia, Sanjiv Sharma, Susama Rani Mandal, R. Lakshmy
Abstract:
The dual energy computed tomography (DECT) aims at noting the HU(V) values for the sample at two different voltages V=V1, V2 and thus obtain the electron densities (ρe) and effective atomic number (Zeff) of the substance. In the present paper, we aim to obtain a numerical algorithm by which (ρe, Zeff) can be obtained from the HU(100) and HU(140) data, where V=100, 140 kVp. The idea is to use this inversion method to characterize and distinguish between the lipid and fibrous coronary artery plaques.With the idea to develop the inversion algorithm for low Zeff materials, as is the case with non calcified coronary artery plaque, we prepare aqueous samples whose calculated values of (ρe, Zeff) lie in the range (2.65×1023≤ ρe≤ 3.64×1023 per cc ) and (6.80≤ Zeff ≤ 8.90). We fill the phantom with these known samples and experimentally determine HU(100) and HU(140) for the same pixels. Knowing that the HU(V) values are related to the attenuation coefficient of the system, we present an algorithm by which the (ρe, Zeff) is calibrated with respect to (HU(100), HU(140)). The calibration is done with a known set of 20 samples; its accuracy is checked with a different set of 23 known samples. We find that the calibration gives the ρe with an accuracy of ± 4% while Zeff is found within ±1% of the actual value, the confidence being 95%.In this inversion method (ρe, Zeff) of the scanned sample can be found by eliminating the effects of the CT machine and also by ensuring that the determination of the two unknowns (ρe, Zeff) does not interfere with each other. It is found that this algorithm can be used for prediction of chemical characteristic (ρe, Zeff) of unknown scanned materials with 95% confidence level, by inversion of the DECT data.Keywords: chemical composition, dual-energy computed tomography, inversion algorithm
Procedia PDF Downloads 4381802 Sustainable Food Systems in Community Development: Integrating Urban Food Security into a Growing Population
Authors: Opal Giulianelli, Pegah Zamani
Abstract:
Sustainable food has become a frequently debated topic in recent years due to a consumer push for environmentally sustainable food. While some research works on improving the monoculture farm systems that are currently in use, others focus on expanding the definition of sustainable food systems. This research looks at those concepts of alternative food systems applied to a more extensive city system. The goal is to create a theoretical site plan that could be implemented in emerging cities and other urban environments. This site plan combines the ideas of environmentally sustainable food development, such as food forests, urban farming, and community gardens. This would represent one part of a larger sustainable food system that can be altered depending on the environment or the people it is serving. However, this research is being carried out with the southeast United States in mind and, therefore, may prove difficult to apply to other regions, especially those of radically different climates.Keywords: alternative food systems, urban design, food forests, aquaponics, hydroponics, food security, food system design
Procedia PDF Downloads 1021801 Impact of Workplace Psychology on Architect's Work Satisfaction
Authors: Sriram Prabhakar
Abstract:
Architects are known for long and unfriendly work hours and thus adapt to routines mandated by nature and surroundings of their work. Work gratification among architects is necessary to have a healthy working condition that sequentially supports to create built environments as work satisfaction has been low among Architects and are also exposed to a number of stress factors like long working hours, the slow pace of work, high workload, and lack of job safety with low pay which negatively impacts their well-being. Additionally, architects have only a limited scope to use their creative skill. This paper studies the case of work satisfaction and the factors that impact it in the state of Indian architects. An eloquent survey in the form of a questionnaire and standardized interviews will be utilized to form a comprehensive method for the study. Factors that basically affect workplaces include restraining over thermal conditions, indoor air quality, recreational spaces, acoustics, views, lighting, and ergonomics. The expected outcome of the paper is to check architects' workplace psychology and their control on their work environment.Keywords: architects, gratification, stressors, workplace psychology
Procedia PDF Downloads 2241800 Prediction of Compressive Strength of Concrete from Early Age Test Result Using Design of Experiments (Rsm)
Authors: Salem Alsanusi, Loubna Bentaher
Abstract:
Response Surface Methods (RSM) provide statistically validated predictive models that can then be manipulated for finding optimal process configurations. Variation transmitted to responses from poorly controlled process factors can be accounted for by the mathematical technique of propagation of error (POE), which facilitates ‘finding the flats’ on the surfaces generated by RSM. The dual response approach to RSM captures the standard deviation of the output as well as the average. It accounts for unknown sources of variation. Dual response plus propagation of error (POE) provides a more useful model of overall response variation. In our case, we implemented this technique in predicting compressive strength of concrete of 28 days in age. Since 28 days is quite time consuming, while it is important to ensure the quality control process. This paper investigates the potential of using design of experiments (DOE-RSM) to predict the compressive strength of concrete at 28th day. Data used for this study was carried out from experiment schemes at university of Benghazi, civil engineering department. A total of 114 sets of data were implemented. ACI mix design method was utilized for the mix design. No admixtures were used, only the main concrete mix constituents such as cement, coarse-aggregate, fine aggregate and water were utilized in all mixes. Different mix proportions of the ingredients and different water cement ratio were used. The proposed mathematical models are capable of predicting the required concrete compressive strength of concrete from early ages.Keywords: mix proportioning, response surface methodology, compressive strength, optimal design
Procedia PDF Downloads 2671799 A Retrospective Study of Dog Bite Occurrence and Anti Rabies Vaccination of Dogs in Veterinary Clinics in Aba, Abia State Nigeria from January 2016 to December 2020
Authors: Innocent C. Abazie, Odukoya A. Olatunde, Ochuko Orakpoghenor, Bamidele J. Kolawole, Hannah L. Kolawole
Abstract:
This study was carried out to obtain five-year retrospective data on dog bite cases and antirabies vaccination of dogs in relation to rabies control in Aba, Abia state, Nigeria. Data for retrospective studies (2016 - 2020) was collected from both government and private veterinary clinics in Aba. A total of 66 dog bite cases were reported between January 2016 and December 2020 with a majority of victims being adults (51.5%) within the ages of 18 – 50 years. On the prevalence of dog bite cases according to the gender of victims, males (75.8%) were mostly involved compared to female victims (24.2%). Anatomically, the majority of bite wounds (65.2%) were on the legs. The monthly distribution of bites indicates a higher frequency in the months of January and March (dry season). Local 28 (43.8%) and exotic breeds 30(46.8%) of dogs were mostly involved in the dog bite cases. The majority of the dogs (92.2%) involved in the bite cases were known dogs whose owners could be contacted, while a very few proportion (7.8%) were stray dogs. Results of this study indicated that only 16 (25%) of the offending dogs had a current antirabies vaccination record, 8 (12.5%) had an unknown vaccination record, while the largest proportion, 40 (62.5%) of the offending dogs had no current vaccination record. Public awareness of the danger of dog bites in relation to rabies and increased antirabies vaccination of dogs as a means of controlling the disease is recommended.Keywords: Aba, dog bite, rabies, vaccination profile
Procedia PDF Downloads 811798 Learning through Gaming with Mobile Devices
Authors: Luis Rodrigo Valencia Pérez, Juan Manuel Peña Aguilar, Adelina Morita Alexander, Alberto Lamadrid Alvarez, Héctor Fernando Valencia Pérez
Abstract:
Financial education is among the areas of opportunity in the Spanish-speaking from an early age to high school, through mobile devices such as cell phones and tablets using ludic and fun applications like interactive games, children can learn money management and investment through time, thereby fostering the habit of saving and/or sound management of cash and family business resources, having interaction with an uncontrolled environment such as the involvement of other players in the external decisions of the environment in which the game is play. The application proposed in Phase 1 (design and development) was designed in multi-user environments, under methodologies of hybrid programming for any platform on the market and designed under CMMI standards that allow for quality production over time, following up on these improvements counting with continuous user feedback and usage statistics.Keywords: mobile educational games, ludic games, children, multiuser, design and software development
Procedia PDF Downloads 3821797 Biological Treatment of a Mixture of Iodine-Containing Aromatic Compounds from Industrial Wastewaster
Authors: A. Elain, M. Le Fellic, A. Le Pemp, N. Hachet
Abstract:
Iodinated Compounds (IC) are widely detected contaminants in most aquatic environments including sewage treatment plant, surface water, ground water and even drinking water, up to the µg.L-1 range. As IC contribute in the adsorbable organic halides (AOX) level, their removal or dehalogenation is expected. We report here on the biodegradability of a mixture of IC from an industrial effluent using a microbial consortium adapted to grow on IC as well as the native microorganisms. Both aerobic and anaerobic treatments were studied during batch experiments in 500-mL flasks. The degree of mineralization and recovery of iodide were monitored by HPLC-UV, TOC analysis and potentiometric titration. Providing ethanol as an electron acceptor was found to stimulate anaerobic reductive deiodination of IC while sodium chloride even at high concentration (22 g.l-1) had no influence on the degradation rates nor on the microbial viability. Phylogenetic analysis of 16S RNA gene sequence (MicroSeq®) was applied to provide a better understanding of the degradative microbial community.Keywords: iodinated compounds, biodegradability, deiodination, electron-accepting conditions, microbial consortium
Procedia PDF Downloads 3291796 In-door Localization Algorithm and Appropriate Implementation Using Wireless Sensor Networks
Authors: Adeniran K. Ademuwagun, Alastair Allen
Abstract:
The relationship dependence between RSS and distance in an enclosed environment is an important consideration because it is a factor that can influence the reliability of any localization algorithm founded on RSS. Several algorithms effectively reduce the variance of RSS to improve localization or accuracy performance. Our proposed algorithm essentially avoids this pitfall and consequently, its high adaptability in the face of erratic radio signal. Using 3 anchors in close proximity of each other, we are able to establish that RSS can be used as reliable indicator for localization with an acceptable degree of accuracy. Inherent in this concept, is the ability for each prospective anchor to validate (guarantee) the position or the proximity of the other 2 anchors involved in the localization and vice versa. This procedure ensures that the uncertainties of radio signals due to multipath effects in enclosed environments are minimized. A major driver of this idea is the implicit topological relationship among sensors due to raw radio signal strength. The algorithm is an area based algorithm; however, it does not trade accuracy for precision (i.e the size of the returned area).Keywords: anchor nodes, centroid algorithm, communication graph, radio signal strength
Procedia PDF Downloads 5081795 A New Concept for Deriving the Expected Value of Fuzzy Random Variables
Authors: Liang-Hsuan Chen, Chia-Jung Chang
Abstract:
Fuzzy random variables have been introduced as an imprecise concept of numeric values for characterizing the imprecise knowledge. The descriptive parameters can be used to describe the primary features of a set of fuzzy random observations. In fuzzy environments, the expected values are usually represented as fuzzy-valued, interval-valued or numeric-valued descriptive parameters using various metrics. Instead of the concept of area metric that is usually adopted in the relevant studies, the numeric expected value is proposed by the concept of distance metric in this study based on two characters (fuzziness and randomness) of FRVs. Comparing with the existing measures, although the results show that the proposed numeric expected value is same with those using the different metric, if only triangular membership functions are used. However, the proposed approach has the advantages of intuitiveness and computational efficiency, when the membership functions are not triangular types. An example with three datasets is provided for verifying the proposed approach.Keywords: fuzzy random variables, distance measure, expected value, descriptive parameters
Procedia PDF Downloads 3431794 The Effect of Environmental, Social, and Governance (ESG) Ratings on Financial Performance: Evidence from MENA Countries
Authors: Taha Almarayhe
Abstract:
This study addresses the gap in understanding the effect of environmental, social, and governance (ESG) practices on firm performance within the Middle East and North Africa (MENA) region. Using a sample of 340 publicly traded firms across ten MENA countries (2007–2017) and employing ordinary least squares (OLS) regression, the study evaluates how ESG ratings impact both accounting-based performance measures—such as return on assets (ROA), return on equity (ROE), and earnings per share (EPS)—and market-based measures like Tobin’s Q and dividend yield. Results reveal that ESG ratings positively and significantly influence financial performance, particularly in countries with strong regulatory environments. This research contributes empirical insights to the literature on ESG’s financial impact, particularly by comparing cross-country data within the MENA region. It provides valuable guidance for investors and managers aiming to enhance financial outcomes through sustainable business practices.Keywords: ESG ratings, financial performance, MENA countries, environmental disclosures
Procedia PDF Downloads 101793 A Practice of Zero Trust Architecture in Financial Transactions
Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu
Abstract:
In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.Keywords: zero trust, trading terminal, architecture, network security, cybersecurity
Procedia PDF Downloads 1671792 A Brief Review of Urban Green Vegetation (Green Wall) in Reduction of Air Pollution
Authors: Masoumeh Pirhadi
Abstract:
Air pollution is becoming a major health problem affecting millions. In support of this observation, the world health organization estimates that many people feel unhealthy due to pollution. This is a coupled fact that one of the main global sources of air pollution in cities is greenhouse gas emissions due heavy traffic. Green walls are developed as a sustainable strategy to reduce pollution by increasing vegetation in developed areas without occupying space in the city. This concept an offer advantageous environmental benefits and they can also be proposed for aesthetic purposes, and today they are used to preserve the urban environment. Green walls can also create environments that can promote a healthy lifestyle. Findings of multiple studies also indicate that Green infrastructure in cities is a strategy for improving air quality and increasing the sustainability of cities. Since these green solutions (green walls) act as porous materials that affect the diffusion of air pollution they can also act as a removing air vents that clean the air. Therefore, implementation of this strategy can be considered as a prominent factor in achieving a cleaner environment.Keywords: green vegetation, air pollution, green wall, urban area
Procedia PDF Downloads 155