Search results for: special memory
2239 Simulation of Immiscibility Regions in Sodium Borosilicate Glasses
Authors: Djamila Aboutaleb, Brahim Safi
Abstract:
In this paper, sodium borosilicates glasses were prepared by melting in air. These heat-resistant transparent glasses have subjected subsequently isothermal treatments at different times, which have transformed them at opaque glass (milky white color). Such changes indicate that these glasses showed clearly phase separation (immiscibility). The immiscibility region in a sodium borosilicate ternary system was investigated in this work, i.e. to determine the regions from which some compositions can show phase separation. For this we went through the conditions of thermodynamic equilibrium, which were translated later by mathematical equations to find an approximate solution. The latter has been translated in a simulation which was established thereafter to find the immiscibility regions in this type of special glasses.Keywords: sodium borosilicate, heat-resistant, isothermal treatments, immiscibility, thermodynamics
Procedia PDF Downloads 3372238 Design, Control and Autonomous Trajectory Tracking of an Octorotor Rotorcraft
Authors: Seyed Jamal Haddadi, M. Reza Mehranpour, Roya Sadat Mortazavi, Zahra Sadat Mortazavi
Abstract:
Principal aim of this research is trajectory tracking, attitude and position control scheme in real flight mode by an Octorotor helicopter. For more stability, in this Unmanned Aerial Vehicle (UAV), number of motors is increased to eight motors which end of each arm installed two coaxial counter rotating motors. Dynamic model of this Octorotor includes of motion equation for translation and rotation. Utilized controller is proportional-integral-derivative (PID) control loop. The proposed controller is designed such that to be able to attenuate an effect of external wind disturbance and guarantee stability in this condition. The trajectory is determined by a Global Positioning System (GPS). Also an ARM CortexM4 is used as microprocessor. Electronic board of this UAV designed as able to records all of the sensors data, similar to an aircraft black box in external memory. Finally after auto landing of Octorotor, flight data is shown in MATLAB software and Experimental results of the proposed controller show the effectiveness of our approach on the Autonomous Quadrotor in real conditions.Keywords: octorotor, design, PID controller, autonomous, trajectory tracking
Procedia PDF Downloads 3062237 Reading Out of Curiosity: Making Undergraduates Competent in English
Authors: Ruwan Gunawardane
Abstract:
Second language teaching and learning is a complex process in which various factors are identified as having a negative impact on the competency in English among undergraduates of Sri Lanka. One such issue is the lack of intrinsic motivation among them to learn English despite the fact that they all know the importance of English. This study attempted to ascertain how the intrinsic motivation of undergraduates to learn English can be improved through reading out of curiosity. Humans are curious by nature, and cognitive psychology says that curiosity facilitates learning, memory, and motivation. The researcher carried out this study during the closure of universities due to the outbreak of the coronavirus through ‘Online Reading Café’, an online reading programme introduced by himself. He invited 1166 students of the Faculty of Science, University of Ruhuna, to read 50 articles taken from CNN and the BBC and posted at least two to three articles on the LMS of the faculty almost every day over a period of 23 days. The themes of the articles were based on the universe, exploration of planets, scientific experiments, evolution, etc., and the students were encouraged to collect as many words, phrases, and sentence structures as possible while reading and to form meaningful sentences using them. The data obtained through the students’ feedback was qualitatively analyzed. It was found that these undergraduates were interested in reading something out of curiosity, due to which intrinsic motivation is enhanced, and it facilitates competence in L2.Keywords: English, competence, reading, curiosity
Procedia PDF Downloads 1382236 A Reflection of the Contemporary Life of Urban People Through Mixed Media Art
Authors: Van Huong Mai, Kanokwan Nithiratphat, Adool Booncham
Abstract:
The Movement of Contemporary Life consisted of two purposes, which were to study the movement and development of the modern life and to create the visual arts, which were paintings expressed via the form of apartment buildings was used from mixed media (digital printing and acrylic painting on canvas) which conveyed the rapid pace of modern life leading to diverse movements in viewer’s feeling. The operation of this creation was collected field data, documentary data, and influence from creative work. The data analysis was analyzed in order to theme, form, technique, and process to satisfy of concept and special character of the pieces.Keywords: movement, contemporary life, visual art, acrylic painting, digital art, urban space
Procedia PDF Downloads 992235 Image Captioning with Vision-Language Models
Authors: Promise Ekpo Osaine, Daniel Melesse
Abstract:
Image captioning is an active area of research in the multi-modal artificial intelligence (AI) community as it connects vision and language understanding, especially in settings where it is required that a model understands the content shown in an image and generates semantically and grammatically correct descriptions. In this project, we followed a standard approach to a deep learning-based image captioning model, injecting architecture for the encoder-decoder setup, where the encoder extracts image features, and the decoder generates a sequence of words that represents the image content. As such, we investigated image encoders, which are ResNet101, InceptionResNetV2, EfficientNetB7, EfficientNetV2M, and CLIP. As a caption generation structure, we explored long short-term memory (LSTM). The CLIP-LSTM model demonstrated superior performance compared to the encoder-decoder models, achieving a BLEU-1 score of 0.904 and a BLEU-4 score of 0.640. Additionally, among the CNN-LSTM models, EfficientNetV2M-LSTM exhibited the highest performance with a BLEU-1 score of 0.896 and a BLEU-4 score of 0.586 while using a single-layer LSTM.Keywords: multi-modal AI systems, image captioning, encoder, decoder, BLUE score
Procedia PDF Downloads 782234 Airborne Molecular Contamination in Clean Room Environment
Authors: T. Rajamäki
Abstract:
In clean room environment molecular contamination in very small concentrations can cause significant harm for the components and processes. This is commonly referred as airborne molecular contamination (AMC). There is a shortage of high sensitivity continuous measurement data for existence and behavior of several of these contaminants. Accordingly, in most cases correlation between concentration of harmful molecules and their effect on processes is not known. In addition, the formation and distribution of contaminating molecules are unclear. In this work sensitive optical techniques are applied in clean room facilities for investigation of concentrations, forming mechanisms and effects of contaminating molecules. Special emphasis is on reactive acid and base gases ammonia (NH3) and hydrogen fluoride (HF). They are the key chemicals in several operations taking place in clean room processes.Keywords: AMC, clean room, concentration, reactive gas
Procedia PDF Downloads 2832233 Intangible Capital and Stock Prices: A Study of Jordanian Companies
Authors: Almoutassem Bellah Nasser
Abstract:
This paper is aimed at calculating the intangible assets of Jordanian economy. This effort is a response to the demand from corporations for these services which reflects a perceived gap in internal and external financial reporting on intangible investments. The main conclusion of the paper is to suggest that the way forward to a standardized, more comparable approach to measuring intangible capital is to employ CIV method of valuation. Published macroeconomic data traditionally exclude most intangible investment from measured GDP. This situation is beginning to change as some attempts have been made to measure the amount of intangible assets. It was found that intangible assets account for $164.20 million in all the listed companies of Jordan. All this money does not appear on the balance sheets of these companies and hence requires special attention of policy makers for better utilization.Keywords: intangible capital, stock prices, Amman Stock Exchange
Procedia PDF Downloads 3802232 To Study the New Invocation of Biometric Authentication Technique
Authors: Aparna Gulhane
Abstract:
Biometrics is the science and technology of measuring and analyzing biological data form the basis of research in biological measuring techniques for the purpose of people identification and recognition. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. Biometric systems are used to authenticate the person's identity. The idea is to use the special characteristics of a person to identify him. These papers present a biometric authentication techniques and actual deployment of potential by overall invocation of biometrics recognition, with an independent testing of various biometric authentication products and technology.Keywords: types of biometrics, importance of biometric, review for biometrics and getting a new implementation, biometric authentication technique
Procedia PDF Downloads 3222231 Evaluating the Service Quality and Customers’ Satisfaction for Lihpaoland in Taiwan
Authors: Wan-Yu Liu, Tiffany April Lin, Yu-Chieh Tang, Yi-Lin Wang, Chieh-Hui Li
Abstract:
As the national income in Taiwan has been raised, the life style of the public has also been changed, so that the tourism industry gradually moves from a service industry to an experience economy. The Lihpaoland is one of the most popular theme parks in Taiwan. However, the related works on performance of service quality of the park have been lacking since its re-operation in 2012. Therefore, this study investigates the quality of software/hardware facilities and services of the Lihpaoland, and aims to achieve the following three goals: 1) analyzing how various sample data of tourists leads to different results for service quality of LihpaoLand; 2) analyzing how tourists respond to the service tangibility, service reliability, service responsiveness, service guarantee, and service empathy of LihpaoLand; 3) according to the theoretical and empirical results, proposing how to improve the overall facilities and services of LihpaoLand, and hoping to provide suggestions to the LihpaoLand or other related businesses to make decision. The survey was conducted on the tourists to the LihpaoLand using convenience sampling, and 400 questionnaires were collected successfully. Analysis results show that tourists paid much attention to maintenance of amusement facilities and safety of the park, and were satisfied with them, which are great advantages of the park. However, transportation around the LihpaoLand was inadequate, and the price of the Fullon hotel (which is the hotel closest to the LihpaoLand) were not accepted by tourists – more promotion events are recommended. Additionally, the shows are not diversified, and should be improved with the highest priority. Tourists did not pay attention to service personnel’s clothing and the ticket price, but they were not satisfied with them. Hence, this study recommends to design more distinctive costumes and conduct ticket promotions. Accordingly, the suggestions made in this study for LihpaoLand are stated as follows: 1) Diversified amusement facilities should be provided to satisfy the needs at different ages. 2) Cheep but tasty catering and more distinctive souvenirs should be offered. 3) Diversified propaganda schemes should be strengthened to increase number of tourists. 4) Quality and professional of the service staff should be enhanced to acquire public praise and tourists revisiting. 5) Ticket promotions in peak seasons, low seasons, and special events should be conducted. 6) Proper traffic flows should be planned and combined with technologies to reduce waiting time of tourists. 7) The features of theme landscape in LihpaoLand should be strengthened to increase willingness of the tourists with special preferences to visit the park. 8) Ticket discounts or premier points card promotions should be adopted to reward the tourists with high loyalty.Keywords: service quality, customers’ satisfaction, theme park, Taiwan
Procedia PDF Downloads 4722230 Potential Ecological Risk Index of the Northern Egyptian Lagoons, South of Mediterranean Sea, Egypt
Authors: Mohamed El-Bady
Abstract:
The Northern Egyptian Lagoons are (from east to west) Bardawil Lagoon, Manzala Lagoon, Burullus Lagoon, Edku Lagoons and Mariute Lagoon. These lagoons have been received the bulk of drainage water from the lands of Delta and from the other coastal areas. Where, the heavy metals can occur in Lagoons environments through a variety of sources, including industries, wastewaters and domestic effluents. The potential ecological risk index (RI) calculation of the bottom sediments of the northern lagoons depends on contamination factor (CF), potential ecological risk factor and proposed toxic response factor (Tr). Each lagoon with special indices according to its conditions.Keywords: Northern Lagoons, Nile Delta, ecological risk index, contamination factor
Procedia PDF Downloads 3432229 Recovery of Heavy Metals by Ion Exchange on the Zeolite Materials
Abstract:
Zeolites are a family of mineral compounds. With special properties that have led to several important industrial applications. Ion exchange has enabled the first industrial application in the field of water treatment. The exchange by aqueous pathway is the method most used in the case of such microporous materials and this technique will be used in this work. The objective of this work is to find performance materials for the recovery of heavy metals such as cadmium. The study is to compare the properties of different ion exchange zeolite Na-X, Na-A, their physical mixture and the composite A (LTA) / X (FAU). After the synthesis of various zeolites X and A, it was designed a model Core-Shell to form a composite zeolite A on zeolite X. Finally, ion exchange studies were performed on these zeolite materials. The cation is exclusively tested for cadmium, a toxic element and is harmful to health and the environment.Keywords: zeolite A, zeolite X, ion exchange, water treatment
Procedia PDF Downloads 4322228 Variations of Metaphors: Wittgenstein's Contribution to Literary Studies
Authors: Dorit Lemberger
Abstract:
Wittgenstein directly used the term "metaphor" only infrequently and with reservations, but his writings include a number of metaphors that have become imprinted in the philosophical memory of Western thought. For example, the ladder in his book Tractatus, or in Philosophical investigations - the ancient city, the beetle in a box, the fly in the fly-bottle, and the duck-rabbit. In light of Wittgenstein's stressing, throughout his investigations, that the only language that exists is ordinary language, and that there is no "second-order" language, the question should be asked: How do these metaphors function, specifically, and in general, how are we to relate to language use that exceeds the normal? Wittgenstein did not disregard such phenomena, but he proposed viewing them in a different way, that would enable understanding them as uses in ordinary language, without necessarily exceeding such language. Two important terms that he coined in this context are "secondary sense" and "experience of meaning". Each denotes language use as reflective of a subjective element characteristic of the speaker, such as intent, experience, or emphasis of a certain aspect. More recent Wittgenstein scholars added the term "quasi-metaphor", that refers to his discussion of the possibility of aesthetic judgment. This paper will examine how, according to Wittgenstein, these terms function without exceeding ordinary language, and will illustrate how they can be applied, in an analysis of the poem "Butterfly" by Nelly Sachs.Keywords: metaphor, quasi-metaphor, secondary sense, experience of meaning
Procedia PDF Downloads 4382227 Optimal Delivery of Two Similar Products to N Ordered Customers
Authors: Epaminondas G. Kyriakidis, Theodosis D. Dimitrakos, Constantinos C. Karamatsoukis
Abstract:
The vehicle routing problem (VRP) is a well-known problem in Operations Research and has been widely studied during the last fifty-five years. The context of the VRP is that of delivering products located at a central depot to customers who are scattered in a geographical area and have placed orders for these products. A vehicle or a fleet of vehicles start their routes from the depot and visit the customers in order to satisfy their demands. Special attention has been given to the capacitated VRP in which the vehicles have limited carrying capacity of the goods that must be delivered. In the present work, we present a specific capacitated stochastic vehicle routing problem which has realistic applications to distributions of materials to shops or to healthcare facilities or to military units. A vehicle starts its route from a depot loaded with items of two similar but not identical products. We name these products, product 1 and product 2. The vehicle must deliver the products to N customers according to a predefined sequence. This means that first customer 1 must be serviced, then customer 2 must be serviced, then customer 3 must be serviced and so on. The vehicle has a finite capacity and after servicing all customers it returns to the depot. It is assumed that each customer prefers either product 1 or product 2 with known probabilities. The actual preference of each customer becomes known when the vehicle visits the customer. It is also assumed that the quantity that each customer demands is a random variable with known distribution. The actual demand is revealed upon the vehicle’s arrival at customer’s site. The demand of each customer cannot exceed the vehicle capacity and the vehicle is allowed during its route to return to the depot to restock with quantities of both products. The travel costs between consecutive customers and the travel costs between the customers and the depot are known. If there is shortage for the desired product, it is permitted to deliver the other product at a reduced price. The objective is to find the optimal routing strategy, i.e. the routing strategy that minimizes the expected total cost among all possible strategies. It is possible to find the optimal routing strategy using a suitable stochastic dynamic programming algorithm. It is also possible to prove that the optimal routing strategy has a specific threshold-type structure, i.e. it is characterized by critical numbers. This structural result enables us to construct an efficient special-purpose dynamic programming algorithm that operates only over those routing strategies having this structure. The findings of the present study lead us to the conclusion that the dynamic programming method may be a very useful tool for the solution of specific vehicle routing problems. A problem for future research could be the study of a similar stochastic vehicle routing problem in which the vehicle instead of delivering, it collects products from ordered customers.Keywords: collection of similar products, dynamic programming, stochastic demands, stochastic preferences, vehicle routing problem
Procedia PDF Downloads 2672226 Optimizing Inanda Dam Using Water Resources Models
Authors: O. I. Nkwonta, B. Dzwairo, J. Adeyemo, A. Jaiyola, N. Sawyerr, F. Otieno
Abstract:
The effective management of water resources is of great importance to ensure the supply of water resources to support changing water requirements over a selected planning horizon and in a sustainable and cost-effective way. Essentially, the purpose of the water resources planning process is to balance the available water resources in a system with the water requirements and losses to which the system is subjected. In such situations, Water resources yield and planning model can be used to solve those difficulties. It has an advantage over other models by managing model runs, developing a representative system network, modelling incremental sub-catchments, creating a variety of standard system features, special modelling features, and run result output options.Keywords: complex, water resources, planning, cost effective and management
Procedia PDF Downloads 5732225 The Underground Ecosystem of Credit Card Frauds
Authors: Abhinav Singh
Abstract:
Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem
Procedia PDF Downloads 4392224 Sweepline Algorithm for Voronoi Diagram of Polygonal Sites
Authors: Dmitry A. Koptelov, Leonid M. Mestetskiy
Abstract:
Voronoi Diagram (VD) of finite set of disjoint simple polygons, called sites, is a partition of plane into loci (for each site at the locus) – regions, consisting of points that are closer to a given site than to all other. Set of polygons is a universal model for many applications in engineering, geoinformatics, design, computer vision, and graphics. VD of polygons construction usually done with a reduction to task of constructing VD of segments, for which there are effective O(n log n) algorithms for n segments. Preprocessing – constructing segments from polygons’ sides, and postprocessing – polygon’s loci construction by merging the loci of the sides of each polygon are also included in reduction. This approach doesn’t take into account two specific properties of the resulting segment sites. Firstly, all this segments are connected in pairs in the vertices of the polygons. Secondly, on the one side of each segment lies the interior of the polygon. The polygon is obviously included in its locus. Using this properties in the algorithm for VD construction is a resource to reduce computations. The article proposes an algorithm for the direct construction of VD of polygonal sites. Algorithm is based on sweepline paradigm, allowing to effectively take into account these properties. The solution is performed based on reduction. Preprocessing is the constructing of set of sites from vertices and edges of polygons. Each site has an orientation such that the interior of the polygon lies to the left of it. Proposed algorithm constructs VD for set of oriented sites with sweepline paradigm. Postprocessing is a selecting of edges of this VD formed by the centers of empty circles touching different polygons. Improving the efficiency of the proposed sweepline algorithm in comparison with the general Fortune algorithm is achieved due to the following fundamental solutions: 1. Algorithm constructs only such VD edges, which are on the outside of polygons. Concept of oriented sites allowed to avoid construction of VD edges located inside the polygons. 2. The list of events in sweepline algorithm has a special property: the majority of events are connected with “medium” polygon vertices, where one incident polygon side lies behind the sweepline and the other in front of it. The proposed algorithm processes such events in constant time and not in logarithmic time, as in the general Fortune algorithm. The proposed algorithm is fully implemented and tested on a large number of examples. The high reliability and efficiency of the algorithm is also confirmed by computational experiments with complex sets of several thousand polygons. It should be noted that, despite the considerable time that has passed since the publication of Fortune's algorithm in 1986, a full-scale implementation of this algorithm for an arbitrary set of segment sites has not been made. The proposed algorithm fills this gap for an important special case - a set of sites formed by polygons.Keywords: voronoi diagram, sweepline, polygon sites, fortunes' algorithm, segment sites
Procedia PDF Downloads 1772223 The Effects of Normal Aging on Reasoning Ability: A Dual-Process Approach
Authors: Jamie A. Prowse Turner, Jamie I. D. Campbell, Valerie A. Thompson
Abstract:
The objective of the current research was to use a dual-process theory framework to explain these age-related differences in reasoning. Seventy-two older (M = 80.0 years) and 72 younger (M = 24.6 years) adults were given a variety of reasoning tests (i.e., a syllogistic task, base rate task, the Cognitive Reflection Test, and a perspective manipulation), as well as independent tests of capacity (working memory, processing speed, and inhibition), thinking styles, and metacognitive ability, to account for these age-related differences. It was revealed that age-related differences were limited to problems that required Type 2 processing and were related to differences in cognitive capacity, individual difference factors, and strategy choice. Furthermore, older adults’ performance can be improved by reasoning from another’s’ perspective and cannot, at this time, be explained by metacognitive differences between young and older adults. All of these findings fit well within a dual-process theory of reasoning, which provides an integrative framework accounting for previous findings and the findings presented in the current manuscript.Keywords: aging, dual-process theory, performance, reasoning ability
Procedia PDF Downloads 1922222 Decolonizing Print Culture and Bibliography Through Digital Visualizations of Artists’ Books at the University of Miami
Authors: Alejandra G. Barbón, José Vila, Dania Vazquez
Abstract:
This study seeks to contribute to the advancement of library and archival sciences in the areas of records management, knowledge organization, and information architecture, particularly focusing on the enhancement of bibliographical description through the incorporation of visual interactive designs aimed to enrich the library users’ experience. In an era of heightened awareness about the legacy of hiddenness across special and rare collections in libraries and archives, along with the need for inclusivity in academia, the University of Miami Libraries has embarked on an innovative project that intersects the realms of print culture, decolonization, and digital technology. This proposal presents an exciting initiative to revitalize the study of Artists’ Books collections by employing digital visual representations to decolonize bibliographic records of some of the most unique materials and foster a more holistic understanding of cultural heritage. Artists' Books, a dynamic and interdisciplinary art form, challenge conventional bibliographic classification systems, making them ripe for the exploration of alternative approaches. This project involves the creation of a digital platform that combines multimedia elements for digital representations, interactive information retrieval systems, innovative information architecture, trending bibliographic cataloging and metadata initiatives, and collaborative curation to transform how we engage with and understand these collections. By embracing the potential of technology, we aim to transcend traditional constraints and address the historical biases that have influenced bibliographic practices. In essence, this study showcases a groundbreaking endeavor at the University of Miami Libraries that seeks to not only enhance bibliographic practices but also confront the legacy of hiddenness across special and rare collections in libraries and archives while strengthening conventional bibliographic description. By embracing digital visualizations, we aim to provide new pathways for understanding Artists' Books collections in a manner that is more inclusive, dynamic, and forward-looking. This project exemplifies the University’s dedication to fostering critical engagement, embracing technological innovation, and promoting diverse and equitable classifications and representations of cultural heritage.Keywords: decolonizing bibliographic cataloging frameworks, digital visualizations information architecture platforms, collaborative curation and inclusivity for records management, engagement and accessibility increasing interaction design and user experience
Procedia PDF Downloads 752221 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 1872220 Protection of Television Programme Formats in Comparative Law
Authors: Mustafa Arikan, Ibrahim Ercan
Abstract:
In this paper, protection of program formats was investigated in terms of program formats. Protection of program formats was studied in the French Law in the sense of competition law and CPI. Since the English Judicial system exhibits differences from the legal system of Continental Europe, its investigation bears a special significance. The subject was also handled in German Law at length. Indeed, German Law was investigated in detail within the overall framework of the study. Here, the court decisions in the German Law and the views in the doctrine were expressed in general. There are many court decisions in the American legal system concerning the subject. These decisions also present alternatives in terms of a solution to the problem.Keywords: comparative law, protection of television programme formats, intellectual property, american legal system
Procedia PDF Downloads 3312219 Educational Plan and Program of the Subject: Maintenance of Electric Power Equipment
Authors: Rade M. Ciric, Sasa Mandic
Abstract:
Students of Higher Education Technical School of Professional Studies, in Novi Sad follow the subject Maintenance of electric power equipment at the Electrotechnical Department. This paper presents educational plan and program of the subject Maintenance of electric power equipment. The course deals with the problems of preventive and investing maintenance of transformer stations (TS), performing and maintenance of grounding of TS and pillars, as well as tracing and detection the location of the cables failure. There is a special elaborated subject concerning the safe work conditions for the electrician during network maintenance, as well as the basics of making and keeping technical documentation of the equipment.Keywords: educational plan and program, electric power equipment, maintenance, technical documentation, safe work
Procedia PDF Downloads 4672218 Downhole Corrosion Inhibition Treatment for Water Supply Wells
Authors: Nayif Alrasheedi, Sultan Almutairi
Abstract:
Field-wide, a water supply wells’ downhole corrosion inhibition program is being applied to maintain downhole component integrity and keep the fluid corrosivity below 5 MPY. Batch treatment is currently used to inject the oil field chemical. This work is a case study consisting of analytical procedures used to optimize the frequency of the good corrosion inhibition treatments. During the study, a corrosion cell was fitted with a special three-electrode configuration for electrochemical measurements, electrochemical linear polarization, corrosion monitoring, and microbial analysis. This study revealed that the current practice is not able to mitigate material corrosion in the downhole system for more than three months.Keywords: downhole corrosion inhibition, electrochemical measurements, electrochemical linear polarization, corrosion monitoring
Procedia PDF Downloads 1862217 The Religious Economic Behavior of People in Dusit Province
Authors: Sivilai Jayankura
Abstract:
This research aims to study the religious economic behavior that effect the lifestyle of the people in Dusit area. The result shows that religious identity salience makes people increase contributions to public goods. Most of the Buddhism decrease contributions to public goods, expect others to contribute less to public goods, and become less risk averse. We find no evidence of religious identity salience effects on disutility of work effort, discount rates or generosity in life spending. Mostly the people like to make merit in the temple during special day of religion. The atmosphere in the temple leads the people like to travel and merit at the temple near their home.Keywords: Dusit province, identity, lifestyle, religious economic behavior
Procedia PDF Downloads 3292216 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment
Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay
Abstract:
Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.Keywords: machine learning, system performance, performance metrics, IoT, edge
Procedia PDF Downloads 1952215 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges
Authors: Dalvin D. Hill, Hector M. Castro Garcia
Abstract:
A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables
Procedia PDF Downloads 1302214 Education as a Factor Which Reduces Poverty
Authors: E. V. Fakhrutdinova, Y. S. Kolesnikova, E. A. Karasik, V. M. Zagidullina
Abstract:
Poverty as the social and economic phenomenon exists in any society and represents a many-sided problem. In this sense it is universal and for many centuries serves as a research objects for scientists. Special attention to a problem of poverty in Russia is caused, first of all, by the critical growth of inequality and by scales of expansion of poverty, considerable decrease in the level and quality of life of the population, decrease in availability of education during the period of reforming. The expansion of poverty on the working members of society, youth, which has to provide reproduction of the population is alarming. As poverty is the reason of weakening of national security of the country, degradation of the population, decline in the quality of the human capital, complication of a demographic situation, strengthening of social contradictions in society, so far as the reduction of poverty, so, the increase in production. Poverty: the characteristic of an economic situation of the individual or social group at which they can't satisfy certain minimum requirements necessary for life, preservations of working capacity and reproduction. Poverty became one of the critical factors expelling people from the system of the institutional interactions reducing social space in which their relations were building breaking their social identity. Complication of the problem of poverty in modern society happened due to penetration of the related relations into many spheres of life. It is known that negative consequences of poverty display not only at the personal level of the poor person, but also at the level of interpersonal social interactions, decline in the quality and level of development of the human capital, and also at social and economic system in general. We conducted a research on the influence of education on the change of poverty level of the population. We consider education as a resource for an increase of the income and social mobility. Dependence of the income of the population on the level of education, availability of education (level of education and quality of education) on the level of income of families is found. Differentiation of quality and number of educational services for children depending on the level of the income of families is revealed. Influence of a factor of poverty on the availability of education is also studied. We consider expenses on education as the limiter of access to education. We consider education as a factor of fixation and aggravation of a property inequality. In the solution of problems of poverty the defining condition is the state regulation of social and economic development by means of creation of the effective institutional environment. The state has to develop measures for an increase of availability of various services to all categories of citizens, in particular services of health care and education, especially for poor citizens enters. The special attention regarding an increase of availability of education services has to be paid to creation of system of social elevators.Keywords: poverty, education, human capital, quality of life
Procedia PDF Downloads 3232213 Development of a Real-Time Brain-Computer Interface for Interactive Robot Therapy: An Exploration of EEG and EMG Features during Hypnosis
Authors: Maryam Alimardani, Kazuo Hiraki
Abstract:
This study presents a framework for development of a new generation of therapy robots that can interact with users by monitoring their physiological and mental states. Here, we focused on one of the controversial methods of therapy, hypnotherapy. Hypnosis has shown to be useful in treatment of many clinical conditions. But, even for healthy people, it can be used as an effective technique for relaxation or enhancement of memory and concentration. Our aim is to develop a robot that collects information about user’s mental and physical states using electroencephalogram (EEG) and electromyography (EMG) signals and performs costeffective hypnosis at the comfort of user’s house. The presented framework consists of three main steps: (1) Find the EEG-correlates of mind state before, during, and after hypnosis and establish a cognitive model for state changes, (2) Develop a system that can track the changes in EEG and EMG activities in real time and determines if the user is ready for suggestion, and (3) Implement our system in a humanoid robot that will talk and conduct hypnosis on users based on their mental states. This paper presents a pilot study in regard to the first stage, detection of EEG and EMG features during hypnosis.Keywords: hypnosis, EEG, robotherapy, brain-computer interface (BCI)
Procedia PDF Downloads 2572212 Corresponding Effect of Mycorhizal fungi and Pistachio on Absorption of Nutrition and Resistance on Salinity in Pistacia vera, L.
Authors: Hamid Mohammadi, S. H. Eftekhar Afzali
Abstract:
The irregular usage of chemical fertilizer cause different types of water and soil pollution and problems in health of human in past decades and organic fertilizer has been considered more and more. Mycorrhizal fungi have symbiosis with plant families and significantly effect on plant growth. Proper management of these symbiosis causes to reduce the usage of chemical fertilizers and absorb nutrition especially phosphor. Pistacia vera is endemic in Iran and is one of the most important products for this country. Considering special circumstances of pistachio orchards according to increasing salinity of water and soil and mismanagement of fertilizer reveals the necessity of the usage of Mycorrhizal fungi in these orchards.Keywords: pistachio, mycorhiza, nutrition, salinity
Procedia PDF Downloads 5022211 Improvements and Implementation Solutions to Reduce the Computational Load for Traffic Situational Awareness with Alerts (TSAA)
Authors: Salvatore Luongo, Carlo Luongo
Abstract:
This paper discusses the implementation solutions to reduce the computational load for the Traffic Situational Awareness with Alerts (TSAA) application, based on Automatic Dependent Surveillance-Broadcast (ADS-B) technology. In 2008, there were 23 total mid-air collisions involving general aviation fixed-wing aircraft, 6 of which were fatal leading to 21 fatalities. These collisions occurred during visual meteorological conditions, indicating the limitations of the see-and-avoid concept for mid-air collision avoidance as defined in the Federal Aviation Administration’s (FAA). The commercial aviation aircraft are already equipped with collision avoidance system called TCAS, which is based on classic transponder technology. This system dramatically reduced the number of mid-air collisions involving air transport aircraft. In general aviation, the same reduction in mid-air collisions has not occurred, so this reduction is the main objective of the TSAA application. The major difference between the original conflict detection application and the TSAA application is that the conflict detection is focused on preventing loss of separation in en-route environments. Instead TSAA is devoted to reducing the probability of mid-air collision in all phases of flight. The TSAA application increases the flight crew traffic situation awareness providing alerts of traffic that are detected in conflict with ownship in support of the see-and-avoid responsibility. The relevant effort has been spent in the design process and the code generation in order to maximize the efficiency and performances in terms of computational load and memory consumption reduction. The TSAA architecture is divided into two high-level systems: the “Threats database” and the “Conflict detector”. The first one receives the traffic data from ADS-B device and provides the memorization of the target’s data history. Conflict detector module estimates ownship and targets trajectories in order to perform the detection of possible future loss of separation between ownship and each target. Finally, the alerts are verified by additional conflict verification logic, in order to prevent possible undesirable behaviors of the alert flag. In order to reduce the computational load, a pre-check evaluation module is used. This pre-check is only a computational optimization, so the performances of the conflict detector system are not modified in terms of number of alerts detected. The pre-check module uses analytical trajectories propagation for both target and ownship. This allows major accuracy and avoids the step-by-step propagation, which requests major computational load. Furthermore, the pre-check permits to exclude the target that is certainly not a threat, using an analytical and efficient geometrical approach, in order to decrease the computational load for the following modules. This software improvement is not suggested by FAA documents, and so it is the main innovation of this work. The efficiency and efficacy of this enhancement are verified using fast-time and real-time simulations and by the execution on a real device in several FAA scenarios. The final implementation also permits the FAA software certification in compliance with DO-178B standard. The computational load reduction allows the installation of TSAA application also on devices with multiple applications and/or low capacity in terms of available memory and computational capabilitiesKeywords: traffic situation awareness, general aviation, aircraft conflict detection, computational load reduction, implementation solutions, software certification
Procedia PDF Downloads 2862210 Right to Return and Narrative in Refugee Camps: Case Study in Palestinian Displacement
Authors: Naomi I. Austin
Abstract:
Following WWII, the Geneva Conventions and Universal Declaration of Human Rights declared the right to return an unalienable right. The right to return has been disputed by the Israeli government and upheld as an individual by prominent Palestinian activists. Those who contest the Palestinian right to return argue that it would effectively end the state of Israel. After the conquest of Lebanon, the concept of a two-state solution has been effectively shut down. This research paper will seek to utilize interviews from NGO actors and those displaced to be gathered from fieldwork conducted in refugee camps and bases of international actors, exploring durable and multilateral solutions for not only the refugee crisis but the forced displacement of Palestinians that go beyond state actors and government entities. The research will center on the perspective of those displaced to generate a plausible solution to mitigate negative effects on displaced persons. This paper will seek to address whether the right to return is plausible with the expansion of Israeli territorial conquest and the impact of the Israeli expansion on migrations within the Mediterranean region and the EU, especially with policies of integration into the host community.Keywords: durable solutions, forced displacement, protracted conflict, refugee studies, narrative building, memory, right to return
Procedia PDF Downloads 19