Search results for: cross-border insolvency provisions in the 2016 code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3156

Search results for: cross-border insolvency provisions in the 2016 code

3066 Study on the Effect of Coupling Fluid Compressible-Deformable Wall on the Flow of Molten Polymers

Authors: Mohamed Driouich, Kamal Gueraoui, Mohamed Sammouda

Abstract:

The main objective of this work is to establish a numerical code for studying the flow of molten polymers in deformable pipes. Using an iterative numerical method based on finite differences, we determine the profiles of the fluid velocity, the temperature and the apparent viscosity of the fluid. The numerical code presented can also be applied to other industrial applications.

Keywords: numerical code, molten polymers, deformable pipes, finite differences

Procedia PDF Downloads 574
3065 Some Codes for Variants in Graphs

Authors: Sofia Ait Bouazza

Abstract:

We consider the problem of finding a minimum identifying code in a graph. This problem was initially introduced in 1998 and has been since fundamentally connected to a wide range of applications (fault diagnosis, location detection …). Suppose we have a building into which we need to place fire alarms. Suppose each alarm is designed so that it can detect any fire that starts either in the room in which it is located or in any room that shares a doorway with the room. We want to detect any fire that may occur or use the alarms which are sounding to not only to not only detect any fire but be able to tell exactly where the fire is located in the building. For reasons of cost, we want to use as few alarms as necessary. The first problem involves finding a minimum domination set of a graph. If the alarms are three state alarms capable of distinguishing between a fire in the same room as the alarm and a fire in an adjacent room, we are trying to find a minimum locating domination set. If the alarms are two state alarms that can only sound if there is a fire somewhere nearby, we are looking for a differentiating domination set of a graph. These three areas are the subject of much active research; we primarily focus on the third problem. An identifying code of a graph G is a dominating set C such that every vertex x of G is distinguished from other vertices by the set of vertices in C that are at distance at most r≥1 from x. When only vertices out of the code are asked to be identified, we get the related concept of a locating dominating set. The problem of finding an identifying code (resp a locating dominating code) of minimum size is a NP-hard problem, even when the input graph belongs to a number of specific graph classes. Therefore, we study this problem in some restricted classes of undirected graphs like split graph, line graph and path in a directed graph. Then we present some results on the identifying code by giving an exact value of upper total locating domination and a total 2-identifying code in directed and undirected graph. Moreover we determine exact values of locating dominating code and edge identifying code of thin headless spider and locating dominating code of complete suns.

Keywords: identiying codes, locating dominating set, split graphs, thin headless spider

Procedia PDF Downloads 478
3064 Enhancing Code Security with AI-Powered Vulnerability Detection

Authors: Zzibu Mark Brian

Abstract:

As software systems become increasingly complex, ensuring code security is a growing concern. Traditional vulnerability detection methods often rely on manual code reviews or static analysis tools, which can be time-consuming and prone to errors. This paper presents a distinct approach to enhancing code security by leveraging artificial intelligence (AI) and machine learning (ML) techniques. Our proposed system utilizes a combination of natural language processing (NLP) and deep learning algorithms to identify and classify vulnerabilities in real-world codebases. By analyzing vast amounts of open-source code data, our AI-powered tool learns to recognize patterns and anomalies indicative of security weaknesses. We evaluated our system on a dataset of over 10,000 open-source projects, achieving an accuracy rate of 92% in detecting known vulnerabilities. Furthermore, our tool identified previously unknown vulnerabilities in popular libraries and frameworks, demonstrating its potential for improving software security.

Keywords: AI, machine language, cord security, machine leaning

Procedia PDF Downloads 36
3063 Tool for Fast Detection of Java Code Snippets

Authors: Tomáš Bublík, Miroslav Virius

Abstract:

This paper presents general results on the Java source code snippet detection problem. We propose the tool which uses graph and sub graph isomorphism detection. A number of solutions for all of these tasks have been proposed in the literature. However, although that all these solutions are really fast, they compare just the constant static trees. Our solution offers to enter an input sample dynamically with the Scripthon language while preserving an acceptable speed. We used several optimizations to achieve very low number of comparisons during the matching algorithm.

Keywords: AST, Java, tree matching, scripthon source code recognition

Procedia PDF Downloads 425
3062 Zero Cross-Correlation Codes Based on Balanced Incomplete Block Design: Performance Analysis and Applications

Authors: Garadi Ahmed, Boubakar S. Bouazza

Abstract:

The Zero Cross-Correlation (C, w) code is a family of binary sequences of length C and constant Hamming-weight, the cross correlation between any two sequences equal zero. In this paper, we evaluate the performance of ZCC code based on Balanced Incomplete Block Design (BIBD) for Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) system using direct detection. The BER obtained is better than 10-9 for five simultaneous users.

Keywords: spectral amplitude coding-optical code-division-multiple-access (SAC-OCDMA), phase induced intensity noise (PIIN), balanced incomplete block design (BIBD), zero cross-correlation (ZCC)

Procedia PDF Downloads 366
3061 Curricular Reforms for Inclusive Education: Equalization of Opportunities for the Physically Challenged Persons

Authors: Ede Jairus Adagba

Abstract:

The National Policy on Education has made elaborate and fascinating provisions for the education of the people with Special Needs. This category of people includes the physically challenged, the disadvantaged, the gifted and talented. However, the focus of this paper is people that are physically challenged. The paper reasons that in spite of the commendable provisions, the present curricular and learning conditions are not conducive enough to cater for the interest of the physically challenged persons. As a panacea, some curricular and physical condition reforms are proposed. These are hoped to facilitate access to inclusive education and equalization for opportunities of the physically challenged.

Keywords: curricular reforms, equalization, inclusive education, physically challenged persons

Procedia PDF Downloads 304
3060 The Right to State Lands: A Case Study of a Squatter Community in Egypt

Authors: Salwa Salman

Abstract:

On February 2016, Egypt’s President Abdel Fattah Al-Sisi ordered the former Prime Minister, Ibrahim Mehleb, to establish a committee responsible for retrieving looted state lands or providing squatters with land titles according to their individual cases. The specificity of desert lands emerges from its unique position in both Islamic law and Egypt’s Civil Code. In Egypt, desert lands can be transferred to private ownership through peaceful occupation and cultivation. This study explores the (re-) conceptualization of land rights, state territoriality, and sovereignty as a part of an emerging narrative on informal land tenure. Through the lens of an informal settlement, the study employs methodological insights from studies in the anthropology of development and their interpretation of Foucauldian discourse analysis to examine official representations on squatting over state lands and put them in conversation with individual narratives on land ownership and dispossession. It also employs Bruno Latour’s actor-network theory to explore the development of social networks through primary land contracts and informal local resource management.

Keywords: State lands, squatter community, Islamic law, Egypt’s Civil Code

Procedia PDF Downloads 171
3059 Evaluation of Model-Based Code Generation for Embedded Systems–Mature Approach for Development in Evolution

Authors: Nikolay P. Brayanov, Anna V. Stoynova

Abstract:

Model-based development approach is gaining more support and acceptance. Its higher abstraction level brings simplification of systems’ description that allows domain experts to do their best without particular knowledge in programming. The different levels of simulation support the rapid prototyping, verifying and validating the product even before it exists physically. Nowadays model-based approach is beneficial for modelling of complex embedded systems as well as a generation of code for many different hardware platforms. Moreover, it is possible to be applied in safety-relevant industries like automotive, which brings extra automation of the expensive device certification process and especially in the software qualification. Using it, some companies report about cost savings and quality improvements, but there are others claiming no major changes or even about cost increases. This publication demonstrates the level of maturity and autonomy of model-based approach for code generation. It is based on a real live automotive seat heater (ASH) module, developed using The Mathworks, Inc. tools. The model, created with Simulink, Stateflow and Matlab is used for automatic generation of C code with Embedded Coder. To prove the maturity of the process, Code generation advisor is used for automatic configuration. All additional configuration parameters are set to auto, when applicable, leaving the generation process to function autonomously. As a result of the investigation, the publication compares the quality of generated embedded code and a manually developed one. The measurements show that generally, the code generated by automatic approach is not worse than the manual one. A deeper analysis of the technical parameters enumerates the disadvantages, part of them identified as topics for our future work.

Keywords: embedded code generation, embedded C code quality, embedded systems, model-based development

Procedia PDF Downloads 244
3058 Development of Lead-Bismuth Eutectic Sub-Channel Code Available for Wire Spacer

Authors: Qi Lu, Jian Deng, Daishun Huang, Chao Guo

Abstract:

The lead cooled fast reactor is considered as one of the most potential Generation IV nuclear systems due to the low working pressure, the appreciable neutron economy, and the considerable passive characteristics. Meanwhile, the lead bismuth eutectic (LBE) has the related advantages of lead with the weaker corrosiveness, which has been paid much attention by recent decades. Moreover, the sub-channel code is a necessary analysis tool for the reactor thermal-hydraulic design and safety analysis, which has been developed combined with the accumulation of LBE experimental data and the understanding of physical phenomena. In this study, a sub-channel code available for LBE was developed, and the corresponding geometric characterization method of typical sub-channels was described in detail, especially for for the fuel assembly with wire spacer. As for this sub-channel code, the transversal thermal conduction through gap was taken into account. In addition, the physical properties, the heat transfer model, the flow resistance model and the turbulent mixing model were analyzed. Finally, the thermal-hydraulic experiments of LBE conducted on THEADES (THErmal-hydraulics and Ads DESign) were selected as the evaluation data of this sub-channel code, including 19 rods with wire spacer, and the calculated results were in good agreement with the experimental results.

Keywords: lead bismuth eutectic, sub-channel code, wire spacer, transversal thermal conduction

Procedia PDF Downloads 131
3057 Assessment of Implementation of the Health and Safety Contents of the Nigerian Factories Act by Small and Medium Scale Industries in Anambra State, Nigeria

Authors: Vivian Uchechi Okpala

Abstract:

Background: Millions of workers die every year as a result of occupational hazards, accidents and injuries, which are as a result of non- compliance to the laws or legislations guiding the health, safety and welfare of workers in the industries. This and many more lead to the assessment of implementation of the health and safety contents of the Nigerian Factories Act (NFA) by small and medium scale industries in Anambra State. Objectives: The study is aimed at achieving the following specific objectives; to assess the extent of implementation of Part-II Health and Part -III Safety (General Provisions), implementation of Part II Health and Part -III Safety (General Provisions Nigerian Factories Acts based on the age of the industries, locations of the industries and level of education of the workers of the small and medium scale industries Methods: the research design that was used for this study was descriptive survey research design, Area of this study was Anambra state, The population for this study comprised 180 chairmen/presidents of union workers of manufacturing industries in Anambra State, The instrument used for this study was structured questionnaire titled ‘assessment of implementation of NFA health and safety contents by small and medium scale industries, results: From the analysis, the following findings were made: Results: The medium scale industries implemented the Part-II Health and Part III Safety (General provisions) better than the small scale industries in Anambra state, the age of the industries, location of the industries and the level of education of the workers in the industries significantly influenced the implementation of the Part III Safety (General Provisions) of NFA, the location of the industries significantly influenced the implementation of the Part II-Health (General Provisions) of NFA. Conclusion: there was generally a certain level of implementation of the factories Act, there is need for more improvement, strict inspection by the regulatory agencies. Implications of the study were highlighted and several suggestions for further studies were made. Based on the findings, several recommendations were made including that the Ministry of Labour and Productivity and the Ministry of Health should strengthen planned information, strict policies to sanction the offenders. Keywords: Occupational Health and Safety, Nigerian Factories Act

Keywords: occupational health and safety, Nigerian factories act, workers, welfare

Procedia PDF Downloads 140
3056 Anticipation of Bending Reinforcement Based on Iranian Concrete Code Using Meta-Heuristic Tools

Authors: Seyed Sadegh Naseralavi, Najmeh Bemani

Abstract:

In this paper, different concrete codes including America, New Zealand, Mexico, Italy, India, Canada, Hong Kong, Euro Code and Britain are compared with the Iranian concrete design code. First, by using Adaptive Neuro Fuzzy Inference System (ANFIS), the codes having the most correlation with the Iranian ninth issue of the national regulation are determined. Consequently, two anticipated methods are used for comparing the codes: Artificial Neural Network (ANN) and Multi-variable regression. The results show that ANN performs better. Predicting is done by using only tensile steel ratio and with ignoring the compression steel ratio.

Keywords: adaptive neuro fuzzy inference system, anticipate method, artificial neural network, concrete design code, multi-variable regression

Procedia PDF Downloads 284
3055 Investigation of the Capability of REALP5 to Solve Complex Fuel Geometry

Authors: D. Abdelrazek, M. NaguibAly, A. A. Badawi, Asmaa G. Abo Elnour, A. A. El-Kafas

Abstract:

This work is developed within IAEA Coordinated Research Program 1496, “Innovative methods in research reactor analysis: Benchmark against experimental data on neutronics and thermal-hydraulic computational methods and tools for operation and safety analysis of research reactors.” The study investigates the capability of Code RELAP5/Mod3.4 to solve complex geometry complexity. Its results are compared to the results of PARET, a common code in thermal hydraulic analysis for research reactors, belonging to MTR-PC groups. The WWR-SM reactor at the Institute of Nuclear Physics (INP) in the Republic of Uzbekistan is simulated using both PARET and RELAP5 at steady state. Results from the two codes are compared. REALP5 code succeeded in solving the complex fuel geometry. The PARET code needed some calculations to obtain the final result. Although the final results from the PARET are more accurate, the small differences in both results makes using RELAP5 code recommended in case of complex fuel assemblies.

Keywords: complex fuel geometry, PARET, RELAP5, WWR-SM reactor

Procedia PDF Downloads 333
3054 Efficient Relay Selection Scheme Utilizing OVSF Code in Cooperative Communication System

Authors: Yeong-Seop Ahn, Myoung-Jin Kim, Young-Min Ko, Hyoung-Kyu Song

Abstract:

This paper proposes a relay selection scheme utilizing an orthogonal variable spreading factor (OVSF) code in a cooperative communication. The relay selection scheme influences on the communication performance in the cooperative communication. Conventional relay selection schemes such as the best harmonic mean relay selection scheme or the threshold-based relay selection scheme should know information such as channel state information (CSI) in advance. The proposed relay selection scheme does not require information in advance by using a reference signal utilizing the OVSF code. The simulation result shows that bit error rate (BER) performance of proposed relay selection scheme is similar to the best harmonic mean relay selection scheme that is known as one of the optimal relay selection schemes.

Keywords: cooperative communication, relay selection, OFDM, OVSF code

Procedia PDF Downloads 637
3053 Student Attendance System Applying Reed Solomon ECC

Authors: Mohd Noah A. Rahman, Armandurni Abd Rahman, Afzaal H. Seyal, Md Rizal Md Hendry

Abstract:

The article reports an automated student attendance system modeled and developed for use at a Vocational school. This project focuses on developing an application using a QR code utilizing the Reed-Solomon error correction code using a smartphone scanned through a webcam. This system enables us to speed up the process of taking attendance and would save us valuable teaching time. This is planned to help students avoid consequences that may result from poor attendances which will eventually penalize them from sitting their final examination as required.

Keywords: QR code, Reed-Solomon, error correction, system design.

Procedia PDF Downloads 392
3052 Jopara: Conversational Code Switching Between Spanish and Guarani a Sociolinguistic Study

Authors: Maria Alejandra Mareco

Abstract:

The purpose of this paper is to explore a communicative strategy used by Guaraní-Spanish bilingual speakers. It will be presented in English or Spanish. This strategy is conversational code-switching, which is used by people from rural as well as urban areas in Formosa, Argentina and Paraguay. Guarani is an Aboriginal Language that is the official language in Paraguay. Code-switching is a language-processing phenomenon that creates communicative and social meaning in a given community. This paper poses a broad question at the onset of this study: Spanish-Guaraní speakers tend to use four different conversational code-switching patterns in their oral alternations, these four categories being: quotation, addressee specification, reiteration, and interjections. Later, spoken data were prioritized in terms of their importance and potential impact on the hypothesis outlined. Different groups of people were observed in real-world settings. They consisted of fourteen proficient Spanish Guaraní bilingual speakers from different social groups and ages. Afterward, a group of informants was chosen to obtain a wide range of natural encounters. Informants were observed with special attention to their natural communication, particularly oral interactions. Furthermore, the relationship between interlocutors during code-switching, as based on a negotiation between them, was considered of most relevance. Results were evaluated according to the interpretative method by testing the co-occurrence of the four conversational categories described above. The testing instruments identified that the four aspects of Spanish Guaraní code-switching introduced above were applied.

Keywords: bilingualism, code switching, aboriginal language, language contact

Procedia PDF Downloads 5
3051 Time Efficient Color Coding for Structured-Light 3D Scanner

Authors: Po-Hao Huang, Pei-Ju Chiang

Abstract:

The structured light 3D scanner is commonly used for measuring the 3D shape of an object. Through projecting designed light patterns on the object, deformed patterns can be obtained and used for the geometric shape reconstruction. At present, Gray code is the most reliable and commonly used light pattern in the structured light 3D scanner. However, the trade-off between scanning efficiency and accuracy is a long-standing and challenging problem. The design of light patterns plays a significant role in the scanning efficiency and accuracy. Thereby, we proposed a novel encoding method integrating color information and Gray-code to improve the scanning efficiency. We will demonstrate that with the proposed method, the scanning time can be reduced to approximate half of the one needed by Gray-code without reduction of precision.

Keywords: gray-code, structured light scanner, 3D shape acquisition, 3D reconstruction

Procedia PDF Downloads 457
3050 Private Law, Public Justice: Another Look at Imprisonment for Debt under the Jordanian Law

Authors: Haitham A. Haloush

Abstract:

Debtors' imprisonment in Jordan is a problematic issue since it impinges upon required financial guarantees that are presumably offered by debtors on the one hand, and infringes flagrantly the International Covenant on Civil and Political Rights on the other hand. Jordan lacks regulatory provisions in this respect and debtors' imprisonment is indirectly exercised in Jordan without giving a special legal attention to this concern. From this perspective, this research reviews the available regulations, standard laws and codes of conduct that might guide the implementation of the International Covenant on Civil and Political Rights in the Jordanian context. Furthermore, this article will examine the suitability of the Jordanian legal system in providing sufficient protection for debtors. The author argues that there are serious obstacles in this aspect.

Keywords: the Jordanian civil code, the Jordanian execution law, imprisonment for debt, good faith, the Jordanian constitution, the international covenant on civil and political rights

Procedia PDF Downloads 122
3049 Static Analysis Deployment Model for Code Quality on Research and Development Projects of Software Development

Authors: Jeong-Hyun Park, Young-Sik Park, Hyo-Teag Jung

Abstract:

This paper presents static analysis deployment model for code quality on R&D Projects of SW Development. The proposed model includes the scope of R&D projects and index for static analysis of source code, operation model and execution process, environments and infrastructure system for R&D projects of SW development. There is the static analysis result of pilot project as case study based on the proposed deployment model and environment, and strategic considerations for success operation of the proposed static analysis deployment model for R&D Projects of SW Development. The proposed static analysis deployment model in this paper will be adapted and improved continuously for quality upgrade of R&D projects, and customer satisfaction of developed source codes and products.

Keywords: static analysis, code quality, coding rules, automation tool

Procedia PDF Downloads 520
3048 Appearance-Based Discrimination in a Workplace: An Emerging Problem for Labor Law Relationships

Authors: Irmina Miernicka

Abstract:

Nowadays, dress codes and widely understood appearance are becoming more important in the workplace. They are often used in the workplace to standardize image of an employer, to communicate a corporate image and ensure that customers can easily identify it. It is also a way to build professionalism of employer. Additionally, in many cases, an employer will introduce a dress code for health and safety reasons. Employers more often oblige employees to follow certain rules concerning their clothing, grooming, make-up, body art or even weight. An important research problem is to find the limits of the employer's interference with the external appearance of employees. They are primarily determined by the two main obligations of the employer, i. e. the obligation to respect the employee's personal rights and the principle of equal treatment and non-discrimination in employment. It should also be remembered that the limits of the employer's interference will be different when certain rules concerning the employee's appearance result directly from the provisions of laws and other acts of universally binding law (workwear, official clothing, and uniform). The analysis of this issue was based on literature and jurisprudence, both domestic and foreign, including the U.S. and European case law, and led the author to put forward a thesis that there are four main principles, which will protect the employer from the allegation of discrimination. First, it is the principle of adequacy - the means requirements regarding dress code must be appropriate to the position and type of work performed by the employee. Secondly, in accordance with the purpose limitation principle, an employer may introduce certain requirements regarding the appearance of employees if there is a legitimate, objective justification for this (such as work safety or type of work performed), not dictated by the employer's subjective feelings and preferences. Thirdly, these requirements must not place an excessive burden on workers and be disproportionate in relation to the employer's objective (principle of proportionality). Fourthly, the employer should also ensure that the requirements imposed in the workplace are equally burdensome and enforceable from all groups of employees. Otherwise, it may expose itself to grounds of discrimination based on sex or age. At the same time, it is also possible to differentiate the situation of some employees if these differences are small and reflect established habits and traditions and if employees are obliged to maintain the same level of professionalism in their positions. Although this subject may seem to be insignificant, frequent application of dress codes and increasing awareness of both employees and employers indicate that its legal aspects need to be thoroughly analyzed. Many legal cases brought before U.S. and European courts show that employees look for legal protection when they consider that their rights are violated by dress code introduced in a workplace.

Keywords: labor law, the appearance of an employee, discrimination in the workplace, dress code in a workplace

Procedia PDF Downloads 123
3047 Measuring the Effect of the Privatization of the Kuwait Stock Exchange on Its Performance

Authors: Mohamad H. Atyeh, Wael Alrashed, Steven Telford

Abstract:

The main objective of this research is to measure if there have been any notable changes in the trading actives of the Kuwait stock Exchange (KSE) after the privatization process that took place on the 25th of April 2016. The data that are used to test if there is any change in the KSE market performance are the daily indices for the period from the 25th of April 2016 till the 24th of October 2016 (after privatization) and a similar six months period before the date of the privatization from the 24th of October 2015 till the 24th of April 2016. In addition, as a control, the study included a period that is a period parallel to the six months period after the privatization. The results indicate that privatization is associated with lower variability for the majority of variables, but that the observed switch in slope direction is not actually a product of privatization, but rather one of serial correlation.

Keywords: privatization, Kuwait stock exchange (KSE), market capitalization (MCAP), capital markets authority (CMA), Boursa Kuwait securities company (BKSC)

Procedia PDF Downloads 297
3046 Performance Evaluation of One and Two Dimensional Prime Codes for Optical Code Division Multiple Access Systems

Authors: Gurjit Kaur, Neena Gupta

Abstract:

In this paper, we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension, i.e. time slots, whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research, we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for Optical Code Division Multiple Access (OCDMA) system on a single platform. Analysis shows that 2D prime code supports lesser number of active users than 1D codes, but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 337
3045 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 503
3044 International Law and Its Role in Protecting Human Rights

Authors: Yrfet Shkreli

Abstract:

To determine the content of human rights norms in national constitutions, international law - in the form of treaties, declarations and case law from international monitoring bodies, and comparative case law from other countries - is often discussed in the judgments of domestic courts. This paper explores the extent to which international law has influenced domestic human rights case law in Africa. The paper first explores how the human rights provisions of African constitutions came into being before turning to the role played by international law in the constitutional order of various African states and how treaties, declarations and findings of international monitoring bodies have been used in African countries to interpret and expand on constitutional human rights provisions.

Keywords: European Union, global governance, globalization, normative power

Procedia PDF Downloads 365
3043 Simulation of 140 Kv X– Ray Tube by MCNP4C Code

Authors: Amin Sahebnasagh, Karim Adinehvand, Bakhtiar Azadbakht

Abstract:

In this study, we used Monte Carlo code (MCNP4C) that is a general method, for simulation, electron source and electric field, a disc source with 0.05 cm radius in direct of anode are used, radius of disc source show focal spot of x-ray tube that here is 0.05 cm. In this simulation, anode is from tungsten with 18.9 g/cm3 density and angle of anode is 180. we simulated x-ray tube for 140 kv. For increasing of speed data acquisition we use F5 tally. With determination the exact position of F5 tally in program, outputs are acquired. In this spectrum the start point is about 0.02 Mev, the absorption edges are about 0.06 Mev and 0.07 Mev and average energy is about 0.05 Mev.

Keywords: x-spectrum, simulation, Monte Carlo, MCNP4C code

Procedia PDF Downloads 646
3042 State’s Responsibility of Space Debris

Authors: Athari Farhani

Abstract:

Abstract The existence of space debris is a direct implication of human activities in outer space. The amount of orbital debris resulting from human exploration and use of outer space has been steadily increasing in the history of human exploration and use of outer space, so that space debris in the responsibility of the launching state. Space debris not only hs a direct impact on environmentalpollution but can also harm and endanger the safety of human life. Despite the legal provisions governing the exploration and use of outer space, both international space law and liability convention, however, these legal provisions are only basic prinsiples, so that further thought or effort are needed, such as new international legal instruments to regulate the existence of space debris. The method used in this research is normative juridical with an approach to written legal regulation, especially international agreements related to space law.

Keywords: state’s responsibility, space debris, outerspace, international law

Procedia PDF Downloads 105
3041 Four Phase Methodology for Developing Secure Software

Authors: Carlos Gonzalez-Flores, Ernesto Liñan-García

Abstract:

A simple and robust approach for developing secure software. A Four Phase methodology consists in developing the non-secure software in phase one, and for the next three phases, one phase for each of the secure developing types (i.e. self-protected software, secure code transformation, and the secure shield). Our methodology requires first the determination and understanding of the type of security level needed for the software. The methodology proposes the use of several teams to accomplish this task. One Software Engineering Developing Team, a Compiler Team, a Specification and Requirements Testing Team, and for each of the secure software developing types: three teams of Secure Software Developing, three teams of Code Breakers, and three teams of Intrusion Analysis. These teams will interact among each other and make decisions to provide a secure software code protected against a required level of intruder.

Keywords: secure software, four phases methodology, software engineering, code breakers, intrusion analysis

Procedia PDF Downloads 398
3040 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 141
3039 Influence of Error Correction Codes on the Quality of Optical Broadband Connections

Authors: Mouna Hemdi, Jamel bel Hadj Tahar

Abstract:

The increasing development of multimedia applications requiring the simultaneous transport of several different services contributes to the evolution of the need for very high-speed network. In this paper, we propose an effective solution to achieve the very high speed while retaining elements of the optical transmission channel. So our study focuses on error correcting codes that aim for quality improvement on duty. We present a comparison of the quality of service for single channels and integrating the code BCH, RS and LDPC in order to find the best code in the different conditions of the transmission.

Keywords: code error correction, high speed broadband, optical transmission, information systems security

Procedia PDF Downloads 393
3038 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 123
3037 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts

Authors: Reza Shakoori

Abstract:

This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.

Keywords: Arabic, chain code normalization, OCR systems, image processing

Procedia PDF Downloads 404