Search results for: quantum secure direct communcation practicality
3427 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network
Abstract:
Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering
Procedia PDF Downloads 1263426 An Analysis of How Students Perceive Their Self-Efficacy in Online Speaking Classes
Authors: Heny Hartono, Cecilia Titiek Murniati
Abstract:
The pandemic has given teachers and students no other choice but having full online learning. In such an emergency situation as the time of the covid-19 pandemic, the application of LMS (Learner Management System) in higher education is the most reasonable solution for students and teachers. In fact, the online learning requires all elements of a higher education systems, including the human resources, infrastructure, and supporting systems such as the application, server, and stable internet connection. The readiness of the higher education institution in preparing the online system may secure those who are involved in the online learning process. It may also result in students’ self-efficacy in online learning. This research aimed to investigate how students perceive their self-efficacy in online English learning, especially in speaking classes which is considered as a productive language skill. This research collects qualitative data with narrative inquiry involving 25 students of speaking classes as the respondents. The results of this study show that students perceive their self-efficacy in speaking online classes as not very high.Keywords: self-efficacy, online learning, speaking class, college students, e-learning
Procedia PDF Downloads 993425 The Direct Deconvolutional Model in the Large-Eddy Simulation of Turbulence
Authors: Ning Chang, Zelong Yuan, Yunpeng Wang, Jianchun Wang
Abstract:
The utilization of Large Eddy Simulation (LES) has been extensive in turbulence research. LES concentrates on resolving the significant grid-scale motions while representing smaller scales through subfilter-scale (SFS) models. The deconvolution model, among the available SFS models, has proven successful in LES of engineering and geophysical flows. Nevertheless, the thorough investigation of how sub-filter scale dynamics and filter anisotropy affect SFS modeling accuracy remains lacking. The outcomes of LES are significantly influenced by filter selection and grid anisotropy, factors that have not been adequately addressed in earlier studies. This study examines two crucial aspects of LES: Firstly, the accuracy of direct deconvolution models (DDM) is evaluated concerning sub-filter scale (SFS) dynamics across varying filter-to-grid ratios (FGR) in isotropic turbulence. Various invertible filters are employed, including Gaussian, Helmholtz I and II, Butterworth, Chebyshev I and II, Cauchy, Pao, and rapidly decaying filters. The importance of FGR becomes evident as it plays a critical role in controlling errors for precise SFS stress prediction. When FGR is set to 1, the DDM models struggle to faithfully reconstruct SFS stress due to inadequate resolution of SFS dynamics. Notably, prediction accuracy improves when FGR is set to 2, leading to accurate reconstruction of SFS stress, except for cases involving Helmholtz I and II filters. Remarkably high precision, nearly 100%, is achieved at an FGR of 4 for all DDM models. Furthermore, the study extends to filter anisotropy and its impact on SFS dynamics and LES accuracy. By utilizing the dynamic Smagorinsky model (DSM), dynamic mixed model (DMM), and direct deconvolution model (DDM) with anisotropic filters, aspect ratios (AR) ranging from 1 to 16 are examined in LES filters. The results emphasize the DDM’s proficiency in accurately predicting SFS stresses under highly anisotropic filtering conditions. Notably high correlation coefficients exceeding 90% are observed in the a priori study for the DDM’s reconstructed SFS stresses, surpassing those of the DSM and DMM models. However, these correlations tend to decrease as filter anisotropy increases. In the a posteriori analysis, the DDM model consistently outperforms the DSM and DMM models across various turbulence statistics, including velocity spectra, probability density functions related to vorticity, SFS energy flux, velocity increments, strainrate tensors, and SFS stress. It is evident that as filter anisotropy intensifies, the results of DSM and DMM deteriorate, while the DDM consistently delivers satisfactory outcomes across all filter-anisotropy scenarios. These findings underscore the potential of the DDM framework as a valuable tool for advancing the development of sophisticated SFS models for LES in turbulence research.Keywords: deconvolution model, large eddy simulation, subfilter scale modeling, turbulence
Procedia PDF Downloads 753424 Secure E-Voting Using Blockchain Technology
Authors: Barkha Ramteke, Sonali Ridhorkar
Abstract:
An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.Keywords: blockchain, AMV chain, electronic voting, decentralized
Procedia PDF Downloads 1363423 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids
Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel
Abstract:
Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.Keywords: cyber security, performance, protocols, security standards, smart grid
Procedia PDF Downloads 3233422 Design and Implementation of Automated Car Anti-Collision System Device Using Distance Sensor
Authors: Mehrab Masayeed Habib, Tasneem Sanjana, Ahmed Amin Rumel
Abstract:
Automated car anti-collision system is a trending technology of science. A car anti-collision system is an automobile safety system. The aim of this paper was to describe designing a car anti-collision system device to reduce the severity of an accident. The purpose of this device is to prevent collision among cars and objects to reduce the accidental death of human. This project gives an overview of secure & smooth journey of car as well as the certainty of human life. This system is controlled by microcontroller PIC. Sharp distance sensor is used to detect any object within the danger range. A crystal oscillator is used to produce the oscillation and generates the clock pulse of the microcontroller. An LCD is used to give information about the safe distance and a buzzer is used as alarm. An actuator is used as automatic break and inside the actuator; there is a motor driver that runs the actuator. For coding ‘microC PRO for PIC’ was used and ’Proteus Design Suite version 8 Software’ was used for simulation.Keywords: sharp distance sensor, microcontroller, MicroC PRO for PIC, proteus, actuator, automobile anti-collision system
Procedia PDF Downloads 4733421 Characterization of Surface Suction Grippers for Continuous-Discontinuous Fiber Reinforced Semi-Finished Parts of an Automated Handling and Preforming Operation
Authors: Jürgen Fleischer, Woramon Pangboonyanon, Dominic Lesage
Abstract:
Non-metallic lightweight materials such as fiber reinforced plastics (FRP) become very significant at present. Prepregs e.g. SMC and unidirectional tape (UD-tape) are one of raw materials used to produce FRP. This study concerns with the manufacturing steps of handling and preforming of this UD-SMC and focuses on the investigation of gripper characteristics regarding gripping forces in normal and lateral direction, in order to identify suitable operating pressures for a secure gripping operation. A reliable handling and preforming operation results in a higher adding value of the overall process chain. As a result, the suitable operating pressures depending on travelling direction for each material type could be shown. Moreover, system boundary conditions regarding allowable pulling force in normal and lateral directions during preforming could be measured.Keywords: continuous-discontinuous fiber reinforced plastics, UD-SMC-prepreg, handling, preforming, prepregs, sheet moulding compounds, surface suction gripper
Procedia PDF Downloads 2223420 Enhancement in the Absorption Efficiency of Gaas/Inas Nanowire Solar Cells through a Decrease in Light Reflection
Authors: Latef M. Ali, Farah A. Abed
Abstract:
In this paper, the effect of the Barium fluoride (BaF2) layer on the absorption efficiency of GaAs/InAs nanowire solar cells was investigated using the finite difference time domain (FDTD) method. By inserting the BaF2 as antireflection with the dominant size of 10 nm to fill the space between the shells of wires on the Si (111) substrate. The absorption is significantly improved due to the strong reabsorption of light reflected at the shells and compared with the reference cells. The present simulation leads to a higher absorption efficiency (Qabs) and reaches a value of 97%, and the external quantum efficiencies (EQEs) above 92% are observed. The current density (Jsc) increases by 0.22 mA/cm2 and the open-circuit voltage (Voc) is enhanced by 0.11 mV.Keywords: nanowire solar cells, absorption efficiency, photovoltaic, band structures, fdtd simulation
Procedia PDF Downloads 723419 A Case Study of Response to Dual Genotype Chronic Hepatitis C/HIV Co-Infection to Fixed Dose Sofosbuvir/Ledipasvir
Authors: Tabassum Yasmin, Hamid Pahlevan
Abstract:
HIV/Hepatitis C co-infection treatments have evolved substantially and they have similar sustained virologic response rates as those of Hepatitis C monoinfected population. There are a few studies on therapy of patients with dual genotypes, especially in HIV/Hepatic C coinfected group. Most studies portrayed case reports of dual genotype chronic Hepatitis C coinfection treatment with Sofosbuvir/Ledipasvir and Ribavirin. A 79-year-old male with a history of HIV on Truvada and Isentress had chronic Hepatitis C with 1a and 2 genotypes. The patient has a history of alcohol intake for 40 years but recently stopped drinking alcohol. He has a history of intravenous drug use in the past and currently is not using any recreational drugs. Patient has Fibro score of 0.7 with Metavir score F2 to F4. AFP is 3.2. The HCV RNA is 493,034 IU/ML. The HBV viral DNA is < 1.30 (not detected). The CD4 is 687CU/MM. The FIB 4 is 3.34 with APRI index 0.717. The HIV viral load is 101 copies/ML. MRI abdomen did not show any liver abnormality. Fixed dose Sofosbuvir/Ledipasvir was used for therapy without Ribavirin. He tolerated medication except for some minor gastrointestinal side effects like abdominal bloating. He demonstrated 100% adherence rate. Patient completed 12 weeks of therapy. HCV RNA was undetectable at 4 and 12 weeks. He achieved SVR at week 12 and subsequently had undetectable RNA for 2 years. Dual genotype prevalence in chronic hepatitis C population is rare, especially in HIV/hepatic coinfection. Our case demonstrates that dual genotypic cases can still be successfully treated with Direct Acting Antiviral agents. The newer agents for therapy for pan genotypes were not available at the time the patient was being treated. We demonstrated that dual agent therapy was still able to maintain SVR in our patient.Keywords: HIV/Hepatitis C, SVR (sustained virologic response), DAA (direct active antiviral agents, dual genotype
Procedia PDF Downloads 1963418 Self-Organizing Map Network for Wheeled Robot Movement Optimization
Authors: Boguslaw Schreyer
Abstract:
The paper investigates the application of the Kohonen’s Self-Organizing Map (SOM) to the wheeled robot starting and braking dynamic states. In securing wheeled robot stability as well as minimum starting and braking time, it is important to ensure correct torque distribution as well as proper slope of braking and driving moments. In this paper, a correct movement distribution has been formulated, securing optimum adhesion coefficient and good transversal stability of a wheeled robot. A neural tuner has been proposed to secure the above properties, although most of the attention is attached to the SOM network application. If the delay of the torque application or torque release is not negligible, it is important to change the rising and falling slopes of the torque. The road/surface condition is also paramount in robot dynamic states control. As the road conditions may randomly change in time, application of the SOM network has been suggested in order to classify the actual road conditions.Keywords: slip control, SOM network, torque distribution, wheeled Robot
Procedia PDF Downloads 1263417 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures
Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir
Abstract:
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.Keywords: Iot, DID, authorization, verifiable credentials
Procedia PDF Downloads 763416 Nonlinear Multivariable Analysis of CO2 Emissions in China
Authors: Hsiao-Tien Pao, Yi-Ying Li, Hsin-Chia Fu
Abstract:
This paper addressed the impacts of energy consumption, economic growth, financial development, and population size on environmental degradation using grey relational analysis (GRA) for China, where foreign direct investment (FDI) inflows is the proxy variable for financial development. The more recent historical data during the period 2004–2011 are used, because the use of very old data for data analysis may not be suitable for rapidly developing countries. The results of the GRA indicate that the linkage effects of energy consumption–emissions and GDP–emissions are ranked first and second, respectively. These reveal that energy consumption and economic growth are strongly correlated with emissions. Higher economic growth requires more energy consumption and increasing environmental pollution. Likewise, more efficient energy use needs a higher level of economic development. Therefore, policies to improve energy efficiency and create a low-carbon economy can reduce emissions without hurting economic growth. The finding of FDI–emissions linkage is ranked third. This indicates that China do not apply weak environmental regulations to attract inward FDI. Furthermore, China’s government in attracting inward FDI should strengthen environmental policy. The finding of population–emissions linkage effect is ranked fourth, implying that population size does not directly affect CO2 emissions, even though China has the world’s largest population, and Chinese people are very economical use of energy-related products. Overall, the energy conservation, improving efficiency, managing demand, and financial development, which aim at curtailing waste of energy, reducing both energy consumption and emissions, and without loss of the country’s competitiveness, can be adopted for developing economies. The GRA is one of the best way to use a lower data to build a dynamic analysis model.Keywords: China, CO₂ emissions, foreign direct investment, grey relational analysis
Procedia PDF Downloads 4033415 Strong Antiferromagnetic Super Exchange in AgF2
Authors: Wojciech Grochala
Abstract:
AgF2 is an important two-dimensional antiferromagnet and an analogue of [CuO2]2– sheet. However, the strength of magnetic superexchange as well as magnetic dimensionality have not been explored before . Here we report our recent Raman and neutron scattering experiments which led to better understanding of the magnetic properties of the title compound. It turns out that intra-sheet magnetic superexchange constant reaches 70 meV, thus some 2/3 of the value measured for parent compounds of oxocuprate superconductors which is over 100 meV. The ratio of intra-to-inter-sheet superexchange constants is of the order of 102 rendering AgF2 a quasi-2D material, similar to the said oxocuprates. The quantum mechanical calculations reproduce the abovementioned values quite well and they point out to substantial covalence of the Ag–F bonding. After 3 decades of intense research on layered oxocuprates, AgF2 now stands as a second-to-none analogue of these fascinating systems. It remains to be seen whether this 012 parent compound may be doped in order to achieve superconductivity.Keywords: antiferromagnets, superexchange, silver, fluorine
Procedia PDF Downloads 1293414 High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks
Authors: Amal Khalifa, Nicolas Vana Santos
Abstract:
Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods.Keywords: deep learning, steganography, image, discrete wavelet transform, fusion
Procedia PDF Downloads 903413 Competitive Intelligence within the Maritime Security Intelligence
Authors: Dicky R. Munaf, Ayu Bulan Tisna
Abstract:
Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology
Procedia PDF Downloads 5003412 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 1463411 Examining the Structural Model of Mindfulness and Headache Intensity With the Mediation of Resilience and Perfectionism in Migraine Patients
Authors: Alireza Monzavi Chaleshtari, Mahnaz Aliakbari Dehkordi, Nazila Esmaeili, Ahmad Alipour, Amin Asadi Hieh
Abstract:
Headache disorders are one of the most common disorders of the nervous system and are associated with suffering, disability, and financial costs for patients. Mindfulness as a lifestyle, in line with human nature, has the ability to affect the emotional system, i.e. thoughts, body sensations, raw emotions and action impulses of people. The aim of this study was to test the fit of structural model of mindfulness and severity of headache mediated by resilience and perfectionism in patients with migraine. Methods: The statistical population of this study included all patients with migraine referred to neurologists in Tehran in the spring and summer of 1401. The inclusion criteria were diagnosis of migraine by a neurologist, not having mental disorders or other physical diseases, and having at least a diploma. According to the number of research variables, 180 people were selected by convenience sampling method, which online answered the Ahvaz perfectionism questionnaire (AMQ), Connor and Davidson resilience questionnaire (CD-RISC), Ahvaz migraine headache questionnaire (APS) and 5-factor mindfulness questionnaire ((MAAS). Data were analyzed using structural equation modeling and Amos software. Results: The results showed that the direct pathways of mindfulness were not significant for severe headache (P <0.05), but other direct pathways - mindfulness to resilience, mindfulness to perfectionism, resilience to severe headache and perfectionism to severe headache), Was significant (P <0.01). After modifying and removing the non-significant paths, the final model fitted. Mediating variables Resilience and perfectionism mediated all paths of predictor variables to the criterion. Conclusion: According to the findings of the present study, mindfulness in migraine patients reduces the severity of headache by promoting resilience and reducing perfectionism.Keywords: migraine, headache severity, mindfulness, resilience, perfectionism
Procedia PDF Downloads 793410 Opto-Electronic Properties of Novel Structures: Sila-Fulleranes
Authors: Farah Marsusi, Mohammad Qasemnazhand
Abstract:
Density-functional theory (DFT) was applied to investigate the geometry and electronic properties H-terminated Si-fullerene (Si-fullerane). Natural bond orbital (NBO) analysis confirms sp3 hybridization nature of Si-Si bonds in Si-fulleranes. Quantum confinement effect (QCE) does not affect band gap (BG) so strongly in the size between 1 to 1.7 nm. In contrast, the geometry and symmetry of the cage have significant influence on BG. In contrast to their carbon analogues, pentagon rings increase the stability of the cages. Functionalized Si-cages are stable and can be chemically very active. The electronic properties are highly sensitive to the surface chemistry via functionalization with different chemical groups. As a result, BGs and chemical activities of these cages can be drastically tuned through the chemistry of the surface.Keywords: density functional theory, sila-fullerens, NBO analysis, opto-electronic properties
Procedia PDF Downloads 2983409 Food Composition Tables Used as an Instrument to Estimate the Nutrient Ingest in Ecuador
Authors: Ortiz M. Rocío, Rocha G. Karina, Domenech A. Gloria
Abstract:
There are several tools to assess the nutritional status of the population. A main instrument commonly used to build those tools is the food composition tables (FCT). Despite the importance of FCT, there are many error sources and variability factors that can be presented on building those tables and can lead to an under or over estimation of ingest of nutrients of a population. This work identified different food composition tables used as an instrument to estimate the nutrient ingest in Ecuador.The collection of data for choosing FCT was made through key informants –self completed questionnaires-, supplemented with institutional web research. A questionnaire with general variables (origin, year of edition, etc) and methodological variables (method of elaboration, information of the table, etc) was passed to the identified FCT. Those variables were defined based on an extensive literature review. A descriptive analysis of content was performed. Ten printed tables and three databases were reported which were all indistinctly treated as food composition tables. We managed to get information from 69% of the references. Several informants referred to printed documents that were not accessible. In addition, searching the internet was not successful. Of the 9 final tables, n=8 are from Latin America, and, n= 5 of these were constructed by indirect method (collection of already published data) having as a main source of information a database from the United States department of agriculture USDA. One FCT was constructed by using direct method (bromatological analysis) and has its origin in Ecuador. The 100% of the tables made a clear distinction of the food and its method of cooking, 88% of FCT expressed values of nutrients per 100g of edible portion, 77% gave precise additional information about the use of the table, and 55% presented all the macro and micro nutrients on a detailed way. The more complete FCT were: INCAP (Central America), Composition of foods (Mexico). The more referred table was: Ecuadorian food composition table of 1965 (70%). The indirect method was used for most tables within this study. However, this method has the disadvantage that it generates less reliable food composition tables because foods show variations in composition. Therefore, a database cannot accurately predict the composition of any isolated sample of a food product.In conclusion, analyzing the pros and cons, and, despite being a FCT elaborated by using an indirect method, it is considered appropriate to work with the FCT of INCAP Central America, given the proximity to our country and a food items list that is very similar to ours. Also, it is imperative to have as a reference the table of composition for Ecuadorian food, which, although is not updated, was constructed using the direct method with Ecuadorian foods. Hence, both tables will be used to elaborate a questionnaire with the purpose of assessing the food consumption of the Ecuadorian population. In case of having disparate values, we will proceed by taking just the INCAP values because this is an updated table.Keywords: Ecuadorian food composition tables, FCT elaborated by direct method, ingest of nutrients of Ecuadorians, Latin America food composition tables
Procedia PDF Downloads 4323408 Tensile and Direct Shear Responses of Basalt-Fibre Reinforced Composite Using Alkali Activate Binder
Authors: S. Candamano, A. Iorfida, L. Pagnotta, F. Crea
Abstract:
Basalt fabric reinforced cementitious composites (FRCM) have attracted great attention because they result in being effective in structural strengthening and eco-efficient. In this study, authors investigate their mechanical behavior when an alkali-activated binder, with tuned properties and containing high amounts of industrial by-products, such as ground granulated blast furnace slag, is used. Reinforcement is made up of a balanced, coated bidirectional fabric made out of basalt fibres and stainless steel micro-wire, with a mesh size of 8x8 mm and an equivalent design thickness equal to 0.064 mm. Mortars mixes have been prepared by maintaining constant the water/(reactive powders) and sand/(reactive powders) ratios at 0.53 and 2.7 respectively. Tensile tests were carried out on composite specimens of nominal dimensions equal to 500 mm x 50 mm x 10 mm, with 6 embedded rovings in the loading direction. Direct shear tests (DST), aimed to the stress-transfer mechanism and failure modes of basalt-FRCM composites, were carried out on brickwork substrate using an externally bonded basalt-FRCM composite strip 10 mm thick, 50 mm wide and a bonded length of 300 mm. Mortars exhibit, after 28 days of curing, a compressive strength of 32 MPa and a flexural strength of 5.5 MPa. Main hydration product is a poorly crystalline CASH gel. The constitutive behavior of the composite has been identified by means of direct tensile tests, with response curves showing a tri-linear behavior. The first linear phase represents the uncracked (I) stage, the second (II) is identified by crack development and the third (III) corresponds to cracked stage, completely developed up to failure. All specimens exhibit a crack pattern throughout the gauge length and failure occurred as a result of sequential tensile failure of the fibre bundles, after reaching the ultimate tensile strength. The behavior is mainly governed by cracks development (II) and widening (III) up to failure. The main average values related to the stages are σI= 173 MPa and εI= 0.026% that are the stress and strain of the transition point between stages I and II, corresponding to the first mortar cracking; σu = 456 MPa and εu= 2.20% that are the ultimate tensile strength and strain, respectively. The tensile modulus of elasticity in stage III is EIII= 41 GPa. All single-lap shear test specimens failed due to composite debonding. It occurred at the internal fabric-to-matrix interface, and it was the result of fracture of the matrix between the fibre bundles. For all specimens, transversal cracks were visible on the external surface of the composite and involved only the external matrix layer. This cracking appears when the interfacial shear stresses increase and slippage of the fabric at the internal matrix layer interface occurs. Since the external matrix layer is bonded to the reinforcement fabric, it translates with the slipped fabric. Average peak load around 945 N, peak stress around 308 MPa, and global slip around 6 mm were measured. The preliminary test results allow affirming that Alkali Activated Binders can be considered a potentially valid alternative to traditional mortars in designing FRCM composites.Keywords: alkali activated binders, basalt-FRCM composites, direct shear tests, structural strengthening
Procedia PDF Downloads 1233407 Tensile and Bond Characterization of Basalt-Fabric Reinforced Alkali Activated Matrix
Authors: S. Candamano, A. Iorfida, F. Crea, A. Macario
Abstract:
Recently, basalt fabric reinforced cementitious composites (FRCM) have attracted great attention because they result to be effective in structural strengthening and cost/environment efficient. In this study, authors investigate their mechanical behavior when an inorganic matrix, belonging to the family of alkali-activated binders, is used. In particular, the matrix has been designed to contain high amounts of industrial by-products and waste, such as Ground Granulated Blast Furnace Slag (GGBFS) and Fly Ash. Fresh state properties, such as workability, mechanical properties and shrinkage behavior of the matrix have been measured, while microstructures and reaction products were analyzed by Scanning Electron Microscopy and X-Ray Diffractometry. Reinforcement is made up of a balanced, coated bidirectional fabric made out of basalt fibres and stainless steel micro-wire, with a mesh size of 8x8 mm and an equivalent design thickness equal to 0.064 mm. Mortars mixes have been prepared by maintaining constant the water/(reactive powders) and sand/(reactive powders) ratios at 0.53 and 2.7 respectively. An appropriate experimental campaign based on direct tensile tests on composite specimens and single-lap shear bond test on brickwork substrate has been thus carried out to investigate their mechanical behavior under tension, the stress-transfer mechanism and failure modes. Tensile tests were carried out on composite specimens of nominal dimensions equal to 500 mm x 50 mm x 10 mm, with 6 embedded rovings in the loading direction. Direct shear tests (DST) were carried out on brickwork substrate using an externally bonded basalt-FRCM composite strip 10 mm thick, 50 mm wide and a bonded length of 300 mm. Mortars exhibit, after 28 days of curing, an average compressive strength of 32 MPa and flexural strength of 5.5 MPa. Main hydration product is a poorly crystalline aluminium-modified calcium silicate hydrate (C-A-S-H) gel. The constitutive behavior of the composite has been identified by means of direct tensile tests, with response curves showing a tri-linear behavior. Test results indicate that the behavior is mainly governed by cracks development (II) and widening (III) up to failure. The ultimate tensile strength and strain were respectively σᵤ = 456 MPa and ɛᵤ= 2.20%. The tensile modulus of elasticity in stage III was EIII= 41 GPa. All single-lap shear test specimens failed due to composite debonding. It occurred at the internal fabric-to-matrix interface, and it was the result of a fracture of the matrix between the fibre bundles. For all specimens, transversal cracks were visible on the external surface of the composite and involved only the external matrix layer. This cracking appears when the interfacial shear stresses increase and slippage of the fabric at the internal matrix layer interface occurs. Since the external matrix layer is bonded to the reinforcement fabric, it translates with the slipped fabric. Average peak load around 945 N, peak stress around 308 MPa and global slip around 6 mm were measured. The preliminary test results allow affirming that Alkali-Activated Materials can be considered a potentially valid alternative to traditional mortars in designing FRCM composites.Keywords: Alkali-activated binders, Basalt-FRCM composites, direct shear tests, structural strengthening
Procedia PDF Downloads 1293406 Analyzing the Influence of Principals’ Cultural Intelligence on Teachers’ Perceived Diversity Climate
Authors: Meghry Nazarian, Ibrahim Duyar
Abstract:
Effective management of a diverse workforce in the United Arab Emirates (UAE) presents peculiar importance as two-thirds of residents are expatriates who have diverse ethnic and cultural backgrounds. Like any other organization in the country, UAE schools have become upmost diverse settings in the world. The purpose of this study was to examine whether principals’ cultural intelligence has direct and indirect (moderating) influences on teachers’ perceived diversity climate. A quantitative causal-comparative research design was employed to analyze the data. Participants included random samples of principals and teachers working in the private and charter schools in the Emirate of Abu Dhabi. The data-gathering online questionnaires included previously developed and validated scales as the measures of study variables. More specifically, the multidimensional short-form measure of Cultural Intelligence (CQ) and the diversity climate scale were used to measure the study variables. Multivariate statistics, including the analysis of multivariate analysis of variance (MANCOVA) and structural equation modeling (SEM), were employed to examine the relationships between the study variables. The preliminary analyses of data showed that principals and teachers have differing views of diversity management and climate in schools. Findings also showed that principals’ cultural intelligence has both direct and moderating influences on teachers’ perceived diversity climate. The study findings are expected to inform policymakers and practicing educational leaders in addressing diversity management in a country where the majority of the residents are the minority who have diverse ethnic and cultural backgrounds.Keywords: diversity management, united arab emirates, school principals’ cultural intelligence (CQ), teachers’ perceived diversity climate
Procedia PDF Downloads 1123405 The Evolution of Strike and Intelligence Functions in Special Operations Forces
Authors: John Hardy
Abstract:
The expansion of special operations forces (SOF) in the twenty-first century is often discussed in terms of the size and disposition of SOF units. Research regarding the number SOF personnel, the equipment SOF units procure, and the variety of roles and mission that SOF fulfill in contemporary conflicts paints a fascinating picture of changing expectations for the use of force. A strong indicator of the changing nature of SOF in contemporary conflicts is the fusion of strike and intelligence functions in the SOF in many countries. What were once more distinct roles on the kind of battlefield generally associated with the concept of conventional warfare have become intermingled in the era of persistent conflict which SOF face. This study presents a historical analysis of the co-evolution of the intelligence and direct action functions carried out by SOF in counterterrorism, counterinsurgency, and training and mentoring missions between 2004 and 2016. The study focuses primarily on innovation in the US military and the diffusion of key concepts to US allies first, and then more broadly afterward. The findings show that there were three key phases of evolution throughout the period of study, each coinciding with a process of innovation and doctrinal adaptation. The first phase was characterized by the fusion of intelligence at the tactical and operational levels. The second phase was characterized by the industrial counterterrorism campaigns used by US SOF against irregular enemies in Iraq and Afghanistan. The third phase was characterized by increasing forward collection of actionable intelligence by SOF force elements in the course of direct action raids. The evolution of strike and intelligence functions in SOF operations between 2004 and 2016 was significantly influenced by reciprocity. Intelligence fusion led to more effective targeting, which then increased intelligence collection. Strike and intelligence functions were then enhanced by greater emphasis on intelligence exploitation during operations, which further increased the effectiveness of both strike and intelligence operations.Keywords: counterinsurgency, counterterrorism, intelligence, irregular warfare, military operations, special operations forces
Procedia PDF Downloads 2683404 Numerical Investigation of Entropy Signatures in Fluid Turbulence: Poisson Equation for Pressure Transformation from Navier-Stokes Equation
Authors: Samuel Ahamefula Mba
Abstract:
Fluid turbulence is a complex and nonlinear phenomenon that occurs in various natural and industrial processes. Understanding turbulence remains a challenging task due to its intricate nature. One approach to gain insights into turbulence is through the study of entropy, which quantifies the disorder or randomness of a system. This research presents a numerical investigation of entropy signatures in fluid turbulence. The work is to develop a numerical framework to describe and analyse fluid turbulence in terms of entropy. This decomposes the turbulent flow field into different scales, ranging from large energy-containing eddies to small dissipative structures, thus establishing a correlation between entropy and other turbulence statistics. This entropy-based framework provides a powerful tool for understanding the underlying mechanisms driving turbulence and its impact on various phenomena. This work necessitates the derivation of the Poisson equation for pressure transformation of Navier-Stokes equation and using Chebyshev-Finite Difference techniques to effectively resolve it. To carry out the mathematical analysis, consider bounded domains with smooth solutions and non-periodic boundary conditions. To address this, a hybrid computational approach combining direct numerical simulation (DNS) and Large Eddy Simulation with Wall Models (LES-WM) is utilized to perform extensive simulations of turbulent flows. The potential impact ranges from industrial process optimization and improved prediction of weather patterns.Keywords: turbulence, Navier-Stokes equation, Poisson pressure equation, numerical investigation, Chebyshev-finite difference, hybrid computational approach, large Eddy simulation with wall models, direct numerical simulation
Procedia PDF Downloads 943403 Conservation Importance of Independent Smallholdings in Safeguarding Biodiversity in Oil Palm Plantations
Authors: Arzyana Sunkar, Yanto Santosa
Abstract:
The expansions of independent smallholdings in Indonesia are feared to increase the negative ecological impacts of oil palm plantation on biodiversity. Hence, research is required to identify the conservation importance of independent smallholder oil palm plantations on biodiversity. This paper discussed the role of independent smallholdings in the conservation of biodiversity in oil palm plantations and to compare it with High Conservation Value Forest as a conservation standard of RSPO. The research was conducted from March to April 2016. Data on biodiversity were collected on 16 plantations and 8 private oil palm plantations in the Districts of Kampar, Pelalawan, Kuantan, Singingi and Siak of Riau Province, Indonesia. In addition, data on community environmental perceptions of both smallholder plantation and High Conservation Value (HCV) Forest were also collected. Species that were observed were birds and earthworms. Data on birds were collected using transect method, while identification of earthworm was determine by taking some soil samples and counting the number of individual earthworm found for each worm species. The research used direct interview with oil palm owners and community members, as well as direct observation to examine the environmental conditions of each plantation. In general, field observation and measurement have found that birds species richness was higher in the forested HCV Forest. Nevertheless, if compared to non-forested HCV, bird’s species richness was higher in the independent smallholdings. On the other hand, different results were observed for earthworm, where the density was higher in the independent smallholdings than in the HCV. It can be concluded from this research that managing independent smallholder oil palm plantations and forested HCV forest could enhance biodiversity conservation. The results of this study justified the importance of retaining forested area to safeguard biodiversity in oil palm plantation.Keywords: biodiversity conservation, high conservation value forest, independent smallholdings, oil palm plantations
Procedia PDF Downloads 2233402 Design and Implementation of Pseudorandom Number Generator Using Android Sensors
Authors: Mochamad Beta Auditama, Yusuf Kurniawan
Abstract:
A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk.Keywords: Android hardware-based sensor, deterministic process, entropy source, random number generation/generators
Procedia PDF Downloads 3743401 A Hybrid Multi-Pole Fe₇₈Si₁₃B₉+FeSi₃ Soft Magnetic Core for Application in the Stators of the Low-Power Permanent Magnet Brushless Direct Current Motors
Authors: P. Zackiewicz, M. Hreczka, R. Kolano, A. Kolano-Burian
Abstract:
New types of materials applied as the stators in the Permanent Magnet Brushless Direct Current motors used in the heart supporting pumps are presented. The main focus of this work is the research on the fabrication of a hybrid nine-pole soft magnetic core consisting of a soft magnetic carrier ring with rectangular notches, made from the FeSi3 strip, and nine soft magnetic poles. This soft magnetic core is made in three stages: (a) preparation of the carrier rings from soft magnetic material with the lowest possible power losses and suitable stiffness, (b) preparation of trapezoidal soft magnetic poles from Metglas 2605 SA1 type ribbons, and (c) making durable connection between the poles and the carrier ring, capable of withstanding a four-times greater tearing force than that present during normal operation of the motor pump. All magnetic properties measurements were made using Remacomp C-1200 (Magnet Physik, Germany) and 450 Gaussometer (Lake Shore, USA) and the electrical characteristics were measured using laboratory generator DF1723009TC (NDN, Poland). Specific measurement techniques used to determine properties of the hybrid cores were presented. Obtained results allow developing the fabrication technology with an account of the intended application of these cores in the stators of the low-power PMBLDC motors used in implanted heart operation supporting pumps. The proposed measurement methodology is appropriate for assessing the quality of the stators.Keywords: amorphous materials, heart supporting pump, PMBLDC motor, soft magnetic materials
Procedia PDF Downloads 2123400 Socioeconomic Impact of Marine Invertebrates Collection on Chuiba and Maringanha Beaches
Authors: Siran Offman, Hermes Pacule, Teofilo Nhamuhuco
Abstract:
Marine invertebrates are very important for the livelihood of coastal communities, particularly in Pemba City. The study was conducted From June 2011 to March 2012. The aim of this study is to determine the socioeconomic impact of collecting marine invertebrates in communities and Chuiba Maringanha. Data were collected biweekly during the spring tide ebb in the intertidal zone, and through structured surveys, the confrontation of data was done through direct observation in the neighborhoods. In total 40 collectors was surveyed and it was found that activity of collecting marine invertebrates is practiced by women 57.2% and men 42.5%. Their ages ranged from 9 to 45 years, and the range was 25-32 dominant with 30.5% and collection practice 5-7 times per week they spend about 4-6 hours a day. The collection methods are direct harvesting by hand aided by knives, sharp irons, and transport use pots, buckets, basins, shawls. Were identified in total 8 marketable species namely: Octopus vulgaris 8.6 Kg, Cyprea Tigers 7 units, Cypraea annulus 48 kg, 40 kg holuturias, Cyprea bully, Atrina vexilium 10 kg, Modiulus philiphinarum and lambis lambis. The species with the greatest economic value are sea cucumber (3 Usd/ kg) and Octopus vulgaris ( 2.5 Usd/ kg) more commercialized. The socio-economic impacts on communities of collectors the average income of collectors varies from 0.5 to 5 Usd/ day and the money are intended to purchase food and agricultural instruments. The other socioeconomics impacts are illiteracy with 36% dropout, and 28% have never studied 87% of unemployed collectors, a high number of family members, weak economic power, poor housing made the basis of local materials and relies on community wells to access water, and most do not have electric power.Keywords: socio-economic, impacts, collecting marine invertebrates, communities
Procedia PDF Downloads 3203399 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints
Authors: Amjad Khan
Abstract:
The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking
Procedia PDF Downloads 2843398 Influence of a Cationic Membrane in a Double Compartment Filter-Press Reactor on the Atenolol Electro-Oxidation
Authors: Alan N. A. Heberle, Salatiel W. Da Silva, Valentin Perez-Herranz, Andrea M. Bernardes
Abstract:
Contaminants of emerging concern are substances widely used, such as pharmaceutical products. These compounds represent risk for both wild and human life since they are not completely removed from wastewater by conventional wastewater treatment plants. In the environment, they can be harm even in low concentration (µ or ng/L), causing bacterial resistance, endocrine disruption, cancer, among other harmful effects. One of the most common taken medicine to treat cardiocirculatory diseases is the Atenolol (ATL), a β-Blocker, which is toxic to aquatic life. In this way, it is necessary to implement a methodology, which is capable to promote the degradation of the ATL, to avoid the environmental detriment. A very promising technology is the advanced electrochemical oxidation (AEO), which mechanisms are based on the electrogeneration of reactive radicals (mediated oxidation) and/or on the direct substance discharge by electron transfer from contaminant to electrode surface (direct oxidation). The hydroxyl (HO•) and sulfate (SO₄•⁻) radicals can be generated, depending on the reactional medium. Besides that, at some condition, the peroxydisulfate (S₂O₈²⁻) ion is also generated from the SO₄• reaction in pairs. Both radicals, ion, and the direct contaminant discharge can break down the molecule, resulting in the degradation and/or mineralization. However, ATL molecule and byproducts can still remain in the treated solution. On this wise, some efforts can be done to implement the AEO process, being one of them the use of a cationic membrane to separate the cathodic (reduction) from the anodic (oxidation) reactor compartment. The aim of this study is investigate the influence of the implementation of a cationic membrane (Nafion®-117) to separate both cathodic and anodic, AEO reactor compartments. The studied reactor was a filter-press, with bath recirculation mode, flow 60 L/h. The anode was an Nb/BDD2500 and the cathode a stainless steel, both bidimensional, geometric surface area 100 cm². The solution feeding the anodic compartment was prepared with ATL 100 mg/L using Na₂SO₄ 4 g/L as support electrolyte. In the cathodic compartment, it was used a solution containing Na₂SO₄ 71 g/L. Between both solutions was placed the membrane. The applied currents densities (iₐₚₚ) of 5, 20 and 40 mA/cm² were studied over 240 minutes treatment time. Besides that, the ATL decay was analyzed by ultraviolet spectroscopy (UV/Vis). The mineralization was determined performing total organic carbon (TOC) in TOC-L CPH Shimadzu. In the cases without membrane, the iₐₚₚ 5, 20 and 40 mA/cm² resulted in 55, 87 and 98 % ATL degradation at the end of treatment time, respectively. However, with membrane, the degradation, for the same iₐₚₚ, was 90, 100 and 100 %, spending 240, 120, 40 min for the maximum degradation, respectively. The mineralization, without membrane, for the same studied iₐₚₚ, was 40, 55 and 72 %, respectively at 240 min, but with membrane, all tested iₐₚₚ reached 80 % of mineralization, differing only in the time spent, 240, 150 and 120 min, for the maximum mineralization, respectively. The membrane increased the ATL oxidation, probably due to avoid oxidant ions (S₂O₈²⁻) reduction on the cathode surface.Keywords: contaminants of emerging concern, advanced electrochemical oxidation, atenolol, cationic membrane, double compartment reactor
Procedia PDF Downloads 136