Search results for: interest flooding attack
3477 Quantification of Factors Contributing to Wave-In-Deck on Fixed Jacket Platforms
Authors: C. Y. Ng, A. M. Johan, A. E. Kajuputra
Abstract:
Wave-in-deck phenomenon for fixed jacket platforms at shallow water condition has been reported as a notable risk to the workability and reliability of the platform. Reduction in reservoir pressure, due to the extraction of hydrocarbon for an extended period of time, has caused the occurrence of seabed subsidence. Platform experiencing subsidence promotes reduction of air gaps, which eventually allows the waves to attack the bottom decks. The impact of the wave-in-deck generates additional loads to the structure and therefore increases the values of the moment arms. Higher moment arms trigger instability in terms of overturning, eventually decreases the reserve strength ratio (RSR) values of the structure. The mechanics of wave-in-decks, however, is still not well understood and have not been fully incorporated into the design codes and standards. Hence, it is necessary to revisit the current design codes and standards for platform design optimization. The aim of this study is to evaluate the effects of RSR due to wave-in-deck on four-legged jacket platforms in Malaysia. Base shear values with regards to calibration and modifications of wave characteristics were obtained using SESAM GeniE. Correspondingly, pushover analysis is conducted using USFOS to retrieve the RSR. The effects of the contributing factors i.e. the wave height, wave period and water depth with regards to the RSR and base shear values were analyzed and discussed. This research proposal is important in optimizing the design life of the existing and aging offshore structures. Outcomes of this research are expected to provide a proper evaluation of the wave-in-deck mechanics and in return contribute to the current mitigation strategies in managing the issue.Keywords: wave-in-deck loads, wave effects, water depth, fixed jacket platforms
Procedia PDF Downloads 4273476 Is There a Month Effect on the Deposits Interest Rates? Evidence from the Greek Banking Industry during the Period 2003-13
Authors: Konstantopoulos N., Samitas A., E. Vasileiou, Kinias I.
Abstract:
This article introduces a new view on the month effect study. Applying a Markov Switching Regime model on data from the Greek Time Deposits (TDs) market for the time span January 2003 to October 2013, we examine if there is a month effect on the Greek banking industry. The empirical findings provide convincing evidence for a new king of monthly anomaly. The explanation for the specific abnormality may be the upward deposits window dressing. Further research should be done in order to examine if the specific calendar effect exists in other countries or it is only a Greek phenomenon.Keywords: calendar anomalies, banking crisis, month effect, Greek banking industry
Procedia PDF Downloads 3703475 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning
Authors: Angela Mathias Kavishe
Abstract:
Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.Keywords: cyberstalking, embodiment, gender-based violence, internet
Procedia PDF Downloads 503474 Adhesion Study of Repair Mortar Based in Dune and Crushed Limestone Sand
Authors: Krobba Benharzallah, Kenai Said, Bouhicha Mohamed, Lakhdari Mohammed Fatah, Merah Ahmed
Abstract:
In recent years, great interest has been directed towards the use of local materials and natural resources in building and public works. This is to satisfy the enormous need for these materials and contribute to sustainable development. Among these resources, dune sand and limestone crushed sand, which can be an interesting alternative to the replacement of siliceous alluvial sands for the formulation of a repair mortar. The results found show that the particle size correction of dune sand by limestone sand and the addition of a superplasticizer are very beneficial in terms of adhesion and mechanical strength.Keywords: repair mortar, dune sand, crushed limestone sand, adhesion, mechanical strength
Procedia PDF Downloads 1623473 Morphostructural Characterization of Zinc and Manganese Nano-Oxides
Authors: Adriana-Gabriela Plaiasu, Catalin Marian Ducu
Abstract:
The interest in the unique properties associated with materials having structures on a nanometer scale has been increasing at an exponential rate in last decade. Among the functional mineral compounds such as perovskite (CaTiO3), rutile (TiO2), CaF2, spinel (MgAl2O4), wurtzite (ZnS), zincite (ZnO) and the cupric oxide (CuO) has been used in numerous applications such as catalysis, semiconductors, batteries, gas sensors, biosensors, field transistors and medicine. The Solar Physical Vapor Deposition (SPVD) presented in the paper as elaboration method is an original process to prepare nanopowders working under concentrated sunlight in 2kW solar furnaces. The influence of the synthesis parameters on the chemical and microstructural characteristics of zinc and manganese oxides synthesized nanophases has been systematically studied using XRD, TEM and SEM.Keywords: characterization, morphological, nano-oxides, structural
Procedia PDF Downloads 2783472 Flood Mapping Using Height above the Nearest Drainage Model: A Case Study in Fredericton, NB, Canada
Authors: Morteza Esfandiari, Shabnam Jabari, Heather MacGrath, David Coleman
Abstract:
Flood is a severe issue in different places in the world as well as the city of Fredericton, New Brunswick, Canada. The downtown area of Fredericton is close to the Saint John River, which is susceptible to flood around May every year. Recently, the frequency of flooding seems to be increased, especially after the fact that the downtown area and surrounding urban/agricultural lands got flooded in two consecutive years in 2018 and 2019. In order to have an explicit vision of flood span and damage to affected areas, it is necessary to use either flood inundation modelling or satellite data. Due to contingent availability and weather dependency of optical satellites, and limited existing data for the high cost of hydrodynamic models, it is not always feasible to rely on these sources of data to generate quality flood maps after or during the catastrophe. Height Above the Nearest Drainage (HAND), a state-of-the-art topo-hydrological index, normalizes the height of a basin based on the relative elevation along with the stream network and specifies the gravitational or the relative drainage potential of an area. HAND is a relative height difference between the stream network and each cell on a Digital Terrain Model (DTM). The stream layer is provided through a multi-step, time-consuming process which does not always result in an optimal representation of the river centerline depending on the topographic complexity of that region. HAND is used in numerous case studies with quite acceptable and sometimes unexpected results because of natural and human-made features on the surface of the earth. Some of these features might cause a disturbance in the generated model, and consequently, the model might not be able to predict the flow simulation accurately. We propose to include a previously existing stream layer generated by the province of New Brunswick and benefit from culvert maps to improve the water flow simulation and accordingly the accuracy of HAND model. By considering these parameters in our processing, we were able to increase the accuracy of the model from nearly 74% to almost 92%. The improved model can be used for generating highly accurate flood maps, which is necessary for future urban planning and flood damage estimation without any need for satellite imagery or hydrodynamic computations.Keywords: HAND, DTM, rapid floodplain, simplified conceptual models
Procedia PDF Downloads 1513471 Rapid Flood Damage Assessment of Population and Crops Using Remotely Sensed Data
Authors: Urooj Saeed, Sajid Rashid Ahmad, Iqra Khalid, Sahar Mirza, Imtiaz Younas
Abstract:
Pakistan, a flood-prone country, has experienced worst floods in the recent past which have caused extensive damage to the urban and rural areas by loss of lives, damage to infrastructure and agricultural fields. Poor flood management system in the country has projected the risks of damages as the increasing frequency and magnitude of floods are felt as a consequence of climate change; affecting national economy directly or indirectly. To combat the needs of flood emergency, this paper focuses on remotely sensed data based approach for rapid mapping and monitoring of flood extent and its damages so that fast dissemination of information can be done, from local to national level. In this research study, spatial extent of the flooding caused by heavy rains of 2014 has been mapped by using space borne data to assess the crop damages and affected population in sixteen districts of Punjab. For this purpose, moderate resolution imaging spectroradiometer (MODIS) was used to daily mark the flood extent by using Normalised Difference Water Index (NDWI). The highest flood value data was integrated with the LandScan 2014, 1km x 1km grid based population, to calculate the affected population in flood hazard zone. It was estimated that the floods covered an area of 16,870 square kilometers, with 3.0 million population affected. Moreover, to assess the flood damages, Object Based Image Analysis (OBIA) aided with spectral signatures was applied on Landsat image to attain the thematic layers of healthy (0.54 million acre) and damaged crops (0.43 million acre). The study yields that the population of Jhang district (28% of 2.5 million population) was affected the most. Whereas, in terms of crops, Jhang and Muzzafargarh are the ‘highest damaged’ ranked district of floods 2014 in Punjab. This study was completed within 24 hours of the peak flood time, and proves to be an effective methodology for rapid assessment of damages due to flood hazardKeywords: flood hazard, space borne data, object based image analysis, rapid damage assessment
Procedia PDF Downloads 3283470 Job Shop Scheduling: Classification, Constraints and Objective Functions
Authors: Majid Abdolrazzagh-Nezhad, Salwani Abdullah
Abstract:
The job-shop scheduling problem (JSSP) is an important decision facing those involved in the fields of industry, economics and management. This problem is a class of combinational optimization problem known as the NP-hard problem. JSSPs deal with a set of machines and a set of jobs with various predetermined routes through the machines, where the objective is to assemble a schedule of jobs that minimizes certain criteria such as makespan, maximum lateness, and total weighted tardiness. Over the past several decades, interest in meta-heuristic approaches to address JSSPs has increased due to the ability of these approaches to generate solutions which are better than those generated from heuristics alone. This article provides the classification, constraints and objective functions imposed on JSSPs that are available in the literature.Keywords: job-shop scheduling, classification, constraints, objective functions
Procedia PDF Downloads 4443469 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead
Authors: Behrooz Daneshmand
Abstract:
Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.Keywords: software-defined networking, security, SDN, 5G/IMT-2020
Procedia PDF Downloads 993468 An Elegant Technique to Achieve ZCS in a Boost Converter Incorporating Complete Energy Transfer
Authors: Nagesh Vangala, Rayudu Mannam
Abstract:
Soft switching has attracted the interest of various researchers constantly. Many techniques are in vogue to achieve soft switching (ZVS and/or ZCS) in Boost converters. These techniques utilize an auxiliary switch to incorporate the ZCS/ZVS. Such schemes require additional control circuit and induce complexity in design. This paper proposes an elegant fly back approach which guarantees zero current switching of the main Switch without the need for any additional active device. A simple flyback transformer scheme is implemented which absorbs the initial turn ON energy (or the Reverse recovery energy of Boost diode) and delivers to the output.Keywords: boost converter, complete energy transfer, flyback, zero current switching
Procedia PDF Downloads 3973467 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures
Authors: Zeinab Ranjbar
Abstract:
Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security
Procedia PDF Downloads 3863466 Satisfaction on English Language Learning with Online System
Authors: Suwaree Yordchim
Abstract:
The objective is to study the satisfaction on English with an online learning. Online learning system mainly consists of English lessons, exercises, tests, web boards, and supplementary lessons for language practice. The sample groups are 80 Thai students studying English for Business Communication, majoring in Hotel and Lodging Management. The data are analyzed by mean, standard deviation (S.D.) value from the questionnaires. The results were found that the most average of satisfaction on academic aspects are technological searching tool through E-learning system that support the students’ learning (4.51), knowledge evaluation on prepost learning and teaching (4.45), and change for project selections according to their interest, subject contents including practice in the real situations (4.45), respectively.Keywords: English language learning, online system, online learning, supplementary lessons
Procedia PDF Downloads 4653465 Using Nature-Based Solutions to Decarbonize Buildings in Canadian Cities
Authors: Zahra Jandaghian, Mehdi Ghobadi, Michal Bartko, Alex Hayes, Marianne Armstrong, Alexandra Thompson, Michael Lacasse
Abstract:
The Intergovernmental Panel on Climate Change (IPCC) report stated the urgent need to cut greenhouse gas emissions to avoid the adverse impacts of climatic changes. The United Nations has forecasted that nearly 70 percent of people will live in urban areas by 2050 resulting in a doubling of the global building stock. Given that buildings are currently recognised as emitting 40 percent of global carbon emissions, there is thus an urgent incentive to decarbonize existing buildings and to build net-zero carbon buildings. To attain net zero carbon emissions in communities in the future requires action in two directions: I) reduction of emissions; and II) removal of on-going emissions from the atmosphere once de-carbonization measures have been implemented. Nature-based solutions (NBS) have a significant role to play in achieving net zero carbon communities, spanning both emission reductions and removal of on-going emissions. NBS for the decarbonisation of buildings can be achieved by using green roofs and green walls – increasing vertical and horizontal vegetation on the building envelopes – and using nature-based materials that either emit less heat to the atmosphere thus decreasing photochemical reaction rates, or store substantial amount of carbon during the whole building service life within their structure. The NBS approach can also mitigate urban flooding and overheating, improve urban climate and air quality, and provide better living conditions for the urban population. For existing buildings, de-carbonization mostly requires retrofitting existing envelopes efficiently to use NBS techniques whereas for future construction, de-carbonization involves designing new buildings with low carbon materials as well as having the integrity and system capacity to effectively employ NBS. This paper presents the opportunities and challenges in respect to the de-carbonization of buildings using NBS for both building retrofits and new construction. This review documents the effectiveness of NBS to de-carbonize Canadian buildings, identifies the missing links to implement these techniques in cold climatic conditions, and determine a road map and immediate approaches to mitigate the adverse impacts of climate change such as urban heat islanding. Recommendations are drafted for possible inclusion in the Canadian building and energy codes.Keywords: decarbonization, nature-based solutions, GHG emissions, greenery enhancement, buildings
Procedia PDF Downloads 933464 Influence of the Location of Flood Embankments on the Condition of Oxbow Lakes and Riparian Forests: A Case Study of the Middle Odra River Beds on the Example of Dragonflies (Odonata), Ground Beetles (Coleoptera: Carabidae) and Plant Communities
Authors: Magda Gorczyca, Zofia Nocoń
Abstract:
Past and current studies from different countries showed that river engineering leads to environmental degradation and extinction of many species - often those protected by local and international wildlife conservation laws. Through the years, the main focus of rivers utilization has shifted from industrial applications to recreation and wildlife preservation with a focus on keeping the biodiversity which plays a significant role in preventing climate changes. Thus an opportunity appeared to recreate flooding areas and natural habitats, which are very rare in the scale of Europe. Additionally, river restoration helps to avoid floodings and periodic droughts, which are usually very damaging to the economy. In this research, the biodiversity of dragonflies and ground beetles was analyzed in the context of plant communities and forest stands structure. Results were enriched with data from past and current literature. A comparison was made between two parts of the Odra river. A part where oxbow lake and riparian forest were separated from the river bed by embankment and a part of the river with floodplains left intact. Validity assessment of embankments relocation was made based on the research results. In the period between May and September, insects were collected, phytosociological analysis were taken, and forest stand structure properties were specified. In the part of the river not separated by the embankments, rare and protected species of plants were spotted (e.g., Trapanatans, Salvinianatans) as well as greater species and quantitive diversity of dragonfly. Ground beetles fauna, though, was richer in the area separated by the embankment. Even though the research was done during only one season and in a limited area, the results can be a starting point for further extended research and may contribute to acquiring legal wildlife protection and restoration of the researched area. During the research, the presence of invasive species Impatiens parviflora, Echinocystislobata, and Procyonlotor were observed, which may lead to loss of the natural values of the researched areas.Keywords: carabidae, floodplains, middle Odra river, Odonata, oxbow lakes, riparian forests
Procedia PDF Downloads 1413463 L2 Reading in Distance Education: Analysis of Students' Reading Attitude and Interests
Authors: Ma. Junithesmer, D. Rosales
Abstract:
The study is a baseline description of students’ attitude and interests about L2 reading in a state university in the Philippines that uses distance education as a delivery mode. Most research conducted on this area dealt with the analysis of reading in a traditional school set-up. For this reason, this research was written to discover if there are implications as regards students’ preferences, interests and attitude reveal about L2 reading in a non-traditional set-up. To form the corpus of this study, it included the literature and studies about reading, preferred technological devices, titles of books and authors, reading medium traditional/ print and electronic books that juxtapose with students’ interest and feelings when reading at home and in school; and their views about their strengths and weaknesses as readers.Keywords: distance education, L2 reading, reading, reading attitude
Procedia PDF Downloads 3453462 The Relation Between Social Class, Race Homophily and Mental Health Outcomes of Black College Students
Authors: Omari W. Keeles
Abstract:
Attention to social class and race processes could illuminate within- group differences in Black students' experiences that help explain variation in adjustment. Of interest is how social class relates to development of intragroup connections with other Black students on campus in ways that promote or inhibit well-being. The present study’s findings suggest that students from lower class backgrounds may be more restrictive or limited in opportunities around their intragroup friendship networks than more affluent students. Furthermore, Black social relationship networks were related to positive mental health adjustment important to healthy psychological functioning and development.Keywords: black students, social class, homophily, psychological adjustment
Procedia PDF Downloads 4503461 Effect of Carbon Nanotubes on Nanocomposite from Nanofibrillated Cellulose
Authors: M. Z. Shazana, R. Rosazley, M. A. Izzati, A. W. Fareezal, I. Rushdan, A. B. Suriani, S. Zakaria
Abstract:
There is an increasing interest in the development of flexible energy storage for application of Carbon Nanotubes and nanofibrillated cellulose (NFC). In this study, nanocomposite is consisting of Carbon Nanotube (CNT) mixed with suspension of nanofibrillated cellulose (NFC) from Oil Palm Empty Fruit Bunch (OPEFB). The use of Carbon Nanotube (CNT) as additive nanocomposite was improved the conductivity and mechanical properties of nanocomposite from nanofibrillated cellulose (NFC). The nanocomposite were characterized for electrical conductivity and mechanical properties in uniaxial tension, which were tensile to measure the bond of fibers in nanocomposite. The processing route is environmental friendly which leads to well-mixed structures and good results as well.Keywords: carbon nanotube (CNT), nanofibrillated cellulose (NFC), mechanical properties, electrical conductivity
Procedia PDF Downloads 3343460 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 3183459 Effect of Palm Bunch Ash and Neem (Azardirachta indica A. Juss) Leaf Powder on Termite Infestation in Groundnut Field
Authors: K. O. Ogbedeh, C. P. Ekwe, G. O. Ihejirika, S. A. Dialoke, O. P. Onyewuchi, C. P. Anyanwu, I. E. Kalu
Abstract:
As one of the major pests of field crops, termites attack groundnut at all stages of its development, especially during prolonged dry spell. Effect of palm bunch ash and neem(Azardirachta indica A. Juss) leaf powder on termite infestation in groundnut field in Owerri, Nigeria was investigated in this study. The field trial was carried out in 2016 at the Teaching and Research Farm of the Federal University of Technology, Owerri, Nigeria. The experiment was laid out in a 3x3 Factorial fitted into a Randomized Complete Block Design (RCBD) with three replications. The treatments include three rates of palm bunch ash at 0.0 (control), 1.0 and 2.0tons/ha and three rates of neem leaf powder at 0.0(control), 1.0, 2.0 tons/ha respectively. Data were collected on percentage emergence, termite incidence and termite severity. These were subjected to analysis of variance (ANOVA), and means were separated using least significant difference at 5% level of probability. The result shows that there were no significant (P= 0.05) differences in percentage emergence amongst treatment means due to palm bunch ash and neem leaf powder applications. Contrarily, palm bunch ash at 2.0 tons/ha recorded the least termite incidence especially at twelve weeks after planting (12WAP) with a value of 22.20% while control plot maintained highest values at 6WAP (48.70%) and 12WAP (48.30%) respectively. Also palm bunch ash at 2.0tons/ha depressed termite severity more than other treatments especially at 2 and 4 WAP (0.56) respectively. Control plots on the other hand consistently maintained highest termite severity throughout the trial with the highest value at 2 and 12WAP (1.56). Conclusively, palm bunch ash exhibited highest depressive action against termite on groundnut especially at higher application value (2.0tons/ha).Keywords: groundnut, incidence, neem, palm, severity, termites
Procedia PDF Downloads 2293458 Effectiveness of Language Learning Strategy Instruction Based on CALLA on Iranian EFL Language Strategy Use
Authors: Reza Khani, Ziba Hosseini
Abstract:
Ever since the importance of language learning strategy instruction (LLS) has been distinguished, there has been growing interest on how to teach LLS in language learning classrooms. So thus this study attempted to implement language strategy instruction based on CALLA approach for Iranian EFL learners in a real classroom setting. The study was testing the hypothesis that strategy instruction result in improved linguistic strategy of students. The participant of the study were 240 EFL learners who received language learning instruction for four months. The data collected using Oxford strategy inventory for language learning. The results indicated the instruction had statistically significant effect on language strategy use of intervention group who received instruction.Keywords: CALLA, language learning strategy, language learning strategy instruction, Iranian EFL language strategy
Procedia PDF Downloads 5703457 Use of Indian Food Mascot Design as an Advertising Tool in Maintaining and Growing the Brand Name
Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabarti
Abstract:
Mascots provide memories to viewers, and numerous promotional campaigns with different appearances, continue to trigger viewers and capture their interest. This study investigates the effect of Indian food mascot designs and influence on enhancing communication; thereby, building long-term brand recognition by the consumers. This paper presents a descriptive approach to Indian food mascot design as an advertising tool, and its research adopts a quantitative methodology. The study confirms that mascots have an ability to communicate a message in an effective manner; all though they are simple in terms of design and fashion trend, they have the capability to build positive reactions.Keywords: food mascot, brand recognitions, advertising, humour
Procedia PDF Downloads 1783456 The Role of Knowledge and Institutional Challenges to the Adoption of Sustainable Urban Drainage in Saudi Arabia: Implications for Sustainable Environmental Development
Authors: Ali Alahmari
Abstract:
Saudi Arabia is facing increasing challenges in managing urban drainage, due to a combination of factors including climate change and urban expansion. Traditional drainage systems are unable to cope with demand, resulting in flooding and damage to property. Consequently, new ways of dealing with this issue need to be found and Sustainable Urban Drainage Systems (SUDS) appear to be a possible solution. This paper suggests that knowledge is a central issue in the adoption of Sustainable Urban Drainage approaches, as revealed through qualitative research with representative officials and professionals from key government departments and organisations in Riyadh. Semi-structured interviews were conducted with twenty-six participants. The interviews explored the challenges of adopting sustainable drainage approaches, and grounded theory analysis was used to examine the role of knowledge. However, a number of barriers have been identified with regard to the adoption of sustainable drainage approaches, such as the marginal status of sustainability in drainage decisions; lack of technical standards for other unconventional drainage solutions, and lack of consideration by decision makers of contributions from environmental and geographical studies. Due to centralisation, decision-making processes are complex and time-consuming, resulting in the discouragement of the adoption of new knowledge and approaches. Stakeholders with knowledge of sustainable approaches are often excluded from the hierarchical system of urban planning and drainage management. In addition, the multiplicity of actors involved in the implementation of the drainage system, as well as the different technical standards involved, often causes problems around coordination and cooperation. Although those with procedural and explicit knowledge have revealed a range of opportunities, such as a significant increase in government support for rainwater drainage in urban areas, they also identified a number of obstacles. These are mainly related to the lack of specialists in sustainable approaches, and a reluctance to involve external experts. Therefore, recommendations for overcoming some of these challenges are presented, which include enhancing the decision-making process through applying decentralisation and promoting awareness of sustainability through establishing educational and outreach programmes. This may serve to increase knowledge and facilitate the adoption of sustainable drainage approaches to promote sustainable development in the context of Saudi Arabia.Keywords: climate change, decision-making processes, new knowledge and approaches, resistance to change, Saudi Arabia, SUDS, urban expansion
Procedia PDF Downloads 1493455 The Use of Optical-Radar Remotely-Sensed Data for Characterizing Geomorphic, Structural and Hydrologic Features and Modeling Groundwater Prospective Zones in Arid Zones
Authors: Mohamed Abdelkareem
Abstract:
Remote sensing data contributed on predicting the prospective areas of water resources. Integration of microwave and multispectral data along with climatic, hydrologic, and geological data has been used here. In this article, Sentinel-2, Landsat-8 Operational Land Imager (OLI), Shuttle Radar Topography Mission (SRTM), Tropical Rainfall Measuring Mission (TRMM), and Advanced Land Observing Satellite (ALOS) Phased Array Type L‐band Synthetic Aperture Radar (PALSAR) data were utilized to identify the geological, hydrologic and structural features of Wadi Asyuti which represents a defunct tributary of the Nile basin, in the eastern Sahara. The image transformation of Sentinel-2 and Landsat-8 data allowed characterizing the different varieties of rock units. Integration of microwave remotely-sensed data and GIS techniques provided information on physical characteristics of catchments and rainfall zones that are of a crucial role for mapping groundwater prospective zones. A fused Landsat-8 OLI and ALOS/PALSAR data improved the structural elements that difficult to reveal using optical data. Lineament extraction and interpretation indicated that the area is clearly shaped by the NE-SW graben that is cut by NW-SE trend. Such structures allowed the accumulation of thick sediments in the downstream area. Processing of recent OLI data acquired on March 15, 2014, verified the flood potential maps and offered the opportunity to extract the extent of the flooding zone of the recent flash flood event (March 9, 2014), as well as revealed infiltration characteristics. Several layers including geology, slope, topography, drainage density, lineament density, soil characteristics, rainfall, and morphometric characteristics were combined after assigning a weight for each using a GIS-based knowledge-driven approach. The results revealed that the predicted groundwater potential zones (GPZs) can be arranged into six distinctive groups, depending on their probability for groundwater, namely very low, low, moderate, high very, high, and excellent. Field and well data validated the delineated zones.Keywords: GIS, remote sensing, groundwater, Egypt
Procedia PDF Downloads 983454 Positive Outcomes of Internship for Students Majoring in Mathematics
Authors: Irina Peterburgsky
Abstract:
We have been working on finding internship positions for our math and computer science majors. Among many other positive outcomes of internship for students majoring in mathematics, there are: students see new applications of mathematics to real life and see new scientific problems; they learn new methods, tools, etc. that they have not seen in their classes; they appreciate the power of mathematics that increases their interest in learning mathematics; they make decisions to take more advanced math courses; students understand better what their potentials, strong points, and limitations are; learn what work ethic is; learn how to work as a member of a team at a workplace; understand better how to offer their help and how to ask for help; start building their professional relationship; build self-confidence as young professionals, and what is the most important - they get a better understanding of their goals in their future professional careers.Keywords: internship, mathematics, positive outcoms for students, workplace
Procedia PDF Downloads 1813453 Screening of Different Exotic Varieties of Potato through Adaptability Trial for Local Cultivation
Authors: Arslan Shehroz, Muhammad Amjad Ali, Amjad Abbas, Imran Ramzan, Muhammad Zunair Latif
Abstract:
Potato (Solanum tuberosum L.) is the 4th most important food crop of the world after wheat, rice and maize. It is the staple food in many European countries. Being rich in starch (one of the main three food ingredients) and having the highest productivity per unit area, has great potential to address the challenge of the food security. Processed potato is also used as chips and crisps etc as ‘fast food’. There are many biotic and abiotic factors which check the production of potato and become hurdle in achievement production potential of potato. 20 new varieties along with two checks were evaluated. Plant to plant and row to row distances were maintained as 20 cm and 75 cm, respectively. The trial was conducted according to the randomized complete block design with three replications. Normal agronomic and plant protection measures were carried out in the crop. It is revealed from the experiment that exotic variety 171 gave the highest yield of 35.5 t/ha followed by Masai with 31.0 t/ha tuber yield. The check variety Simply Red 24.2 t/ha yield, while the lowest tuber yield (1.5 t/ha) was produced by the exotic variety KWS-06-125. The maximum emergence was shown by the Variety Red Sun (89.7 %). The lowest emergence was shown by the variety Camel (71.7%). Regarding tuber grades, it was noted that the maximum Ration size tubers were produced by the exotic variety Compass (3.7%), whereas 11 varieties did not produce ration size tubers at all. The variety Red Sun produced lowest percentage of small size tubers (12.7%) whereas maximum small size tubers (93.0%) were produced by the variety Jitka. Regarding disease infestation, it was noted that the maximum scab incidence (4.0%) was recorded on the variety Masai, maximum rhizoctonia attack (60.0%) was recorded on the variety Camel and maximum tuber cracking (0.7%) was noted on the variety Vendulla.Keywords: check variety, potato, potential and yield, trial
Procedia PDF Downloads 3783452 Numerical Aeroacoustics Investigation of Eroded and Coated Leading Edge of NACA 64- 618 Airfoil
Authors: Zeinab Gharibi, B. Stoevesandt, J. Peinke
Abstract:
Long term surface erosion of wind turbine blades, especially at the leading edge, impairs aerodynamic performance; therefore, lowers efficiency of the blades mostly in the high-speed rotor tip regions. Blade protection provides significant improvements in annual energy production, reduces costly downtime, and protects the integrity of the blades. However, this protection still influences the aerodynamic behavior, and broadband noise caused by interaction between the impinging turbulence and blade’s leading edge. This paper presents an extensive numerical aeroacoustics approach by investigating the sound power spectra of the eroded and coated NACA 64-618 wind turbine airfoil and evaluates aeroacoustics improvements after the protection procedure. Using computational fluid dynamics (CFD), different quasi 2D numerical grids were implemented and special attention was paid to the refinement of the boundary layers. The noise sources were captured and decoupled with acoustic propagation via the derived formulation of Curle’s analogy implemented in OpenFOAM. Therefore, the noise spectra were compared for clean, coated and eroded profiles in the range of chord-based Reynolds number (1.6e6 ≤ Re ≤ 11.5e6). Angle of attack was zero in all cases. Verifications were conducted for the clean profile using available experimental data. Sensitivity studies for the far-field were done on different observational positions. Furthermore, beamforming studies were done simulating an Archimedean spiral microphone array for far-field noise directivity patterns. Comparing the noise spectra of the coated and eroded geometries, results show that, coating clearly improves aerodynamic and acoustic performance of the eroded airfoil.Keywords: computational fluid dynamics, computational aeroacoustics, leading edge, OpenFOAM
Procedia PDF Downloads 2233451 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 3613450 Obstacle Detection and Path Tracking Application for Disables
Authors: Aliya Ashraf, Mehreen Sirshar, Fatima Akhtar, Farwa Kazmi, Jawaria Wazir
Abstract:
Vision, the basis for performing navigational tasks, is absent or greatly reduced in visually impaired people due to which they face many hurdles. For increasing the navigational capabilities of visually impaired people a desktop application ODAPTA is presented in this paper. The application uses camera to capture video from surroundings, apply various image processing algorithms to get information about path and obstacles, tracks them and delivers that information to user through voice commands. Experimental results show that the application works effectively for straight paths in daylight.Keywords: visually impaired, ODAPTA, Region of Interest (ROI), driver fatigue, face detection, expression recognition, CCD camera, artificial intelligence
Procedia PDF Downloads 5493449 Q-Learning of Bee-Like Robots Through Obstacle Avoidance
Authors: Jawairia Rasheed
Abstract:
Modern robots are often used for search and rescue purpose. One of the key areas of interest in such cases is learning complex environments. One of the key methodologies for robots in such cases is reinforcement learning. In reinforcement learning robots learn to move the path to reach the goal while avoiding obstacles. Q-learning, one of the most advancement of reinforcement learning is used for making the robots to learn the path. Robots learn by interacting with the environment to reach the goal. In this paper simulation model of bee-like robots is implemented in NETLOGO. In the start the learning rate was less and it increased with the passage of time. The bees successfully learned to reach the goal while avoiding obstacles through Q-learning technique.Keywords: reinforlearning of bee like robots for reaching the goalcement learning for randomly placed obstacles, obstacle avoidance through q-learning, q-learning for obstacle avoidance,
Procedia PDF Downloads 1013448 Particle Migration in Shear Thinning Viscoelastic Fluid
Authors: Shamik Hazra, Sushanta Mitra, Ashis Sen
Abstract:
Despite growing interest of microparticle manipulation in non-Newtonian fluids, combined effect of viscoelasticity and shear thinning on particle lateral position is not well understood. We performed experiments with rigid microparticles of 15 µm diamater in popular Shear thinning viscoelastic (STVE) liquid poyethylene oxide (PEO) of different molecular weights (MW) and concentrations (c), for Reynolds number (Re) < 1. Microparticles in an STVE liquid revealed four different migration regimes: original streamline (OS), bimodal (BM), centre migration (CM) and defocusing (DF), depending upon the Re and c and interplay of different forces is also elucidated. Our investigation will be helpful to select proper polymer concentration to achieve desired particle focusing inside microchannel.Keywords: lateral migration, microparticle, polyethylene oxide, shear thinning, viscoelasticity
Procedia PDF Downloads 148