Search results for: pen and paper or computer
25073 Extensions to Chen's Minimizing Equal Mass Paralellogram Solutions
Authors: Abdalla Manur, Daniel Offin, Alessandro Arsie
Abstract:
In this paper, we study the extension of the minimizing equal mass parallelogram solutions which was derived by Chen in 2001. Chen’s solution was minimizing for one quarter of the period [0; T], where numerical integration had been used in his proof. This paper focuses on extending the minimization property to intervals of time [0; 2T] and [0; 4T].Keywords: action, Hamiltoian, N-body, symmetry
Procedia PDF Downloads 168925072 Modernization Causing Loss of Cultural Identity: A Case Study of Maheshkhali, Bangladesh
Authors: Sarika Siraj
Abstract:
Nothing talks more about the identity of a place than its cultural heritage. More often than ever, it is the architecture of the place that embodies its cultural heritage. With these thoughts in mind, this paper looks closely into the present scene of earthen architecture of Bangladesh and the changes it has been going through due to modernity. Along with the gradual erasure of this sustainable practice, a loss of cultural identity can be observed in present times. This paper intends to examine the loss along with the reasons, taking the village of Maheshkhali, located in south east Bangladesh, as a case study for this research. Based on the empirical findings, this paper will contextualize sustainability as well as discuss western development as a creator of new cultural identities in eastern countries.Keywords: cultural identity, sustainability, architecture, heritage
Procedia PDF Downloads 8325071 Analysis of a Coupled Hydro-Sedimentological Numerical Model for the Western Tombolo of Giens
Authors: Yves Lacroix, Van Van Than, Didier Léandri, Pierre Liardet
Abstract:
The western Tombolo of the Giens peninsula in southern France, known as Almanarre beach, is subject to coastal erosion. We are trying to use computer simulation in order to propose solutions to stop this erosion. Our aim was first to determine the main factors for this erosion and successfully apply a coupled hydro-sedimentological numerical model based on observations and measurements that have been performed on the site for decades. We have gathered all available information and data about waves, winds, currents, tides, bathymetry, coastal line, and sediments concerning the site. These have been divided into two sets: one devoted to calibrating a numerical model using Mike 21 software, the other to serve as a reference in order to numerically compare the present situation to what it could be if we implemented different types of underwater constructions. This paper presents the first part of the study: selecting and melting different sources into a coherent data basis, identifying the main erosion factors, and calibrating the coupled software model against the selected reference period. Our results bring calibration of the numerical model with good fitting coefficients. They also show that the winter South-Western storm events conjugated to depressive weather conditions constitute a major factor of erosion, mainly due to wave impact in the northern part of the Almanarre beach. Together, current and wind impact is shown negligible.Keywords: Almanarre beach, coastal erosion, hydro-sedimentological, numerical model
Procedia PDF Downloads 37625070 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles
Authors: Anthony Overmars, Sitalakshmi Venkatraman
Abstract:
This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography
Procedia PDF Downloads 23925069 Application and Evaluation of 3D Printing Technology in Customized Fashion Industry
Authors: A. Ezza, B. M. Babar Ramzan, C. Hira
Abstract:
This study deliberates emerging design activates in 3D printing technology, the paper provides the insight into the broad opportunities in 3D printing applications in fashion world. 3D printing is becoming a reason for reduction of lead time. The process engenders the precise models and one of prototype components for design approbation; trail and testing significance through the production components to be utilized in true working environments. This emerging technology have given elevate to an emergent realm of digitally fabricated art and design. Bitonic Creations, CONTINUUM (3D printed shoes), Jiri Evenhuis, Michael Schmidt have be giving extensive amassments of haute couture dresses and accessories. Cosyflex TM, N12 undergarments are examples of an innovative process for 3D printing. Varied types of liquid polymers such as latex, silicon, polyurethane and Teflon as well as a variety of textile fibers such as cotton, viscose and polyamide enable tailor made fabrics for any need. Patterns, perforations, embossing and embellishments may be created by printing on 3D structure base plate. Computer solidifies material feedstock layer by layer with micro-millimeter detail. In lieu of producing textiles by meter, then cutting and sewing them into final product, 3D printing can become a reason to make sewing equipment obsolete. The findings positively corroborates the expected advantage of 3D printed sample that seem to facilitate the first steps for designer.Keywords: 3D printing, customization, fashion industry, Haute couture
Procedia PDF Downloads 56625068 Cantilever Secant Pile Constructed in Sand: Numerical Comparative Study and Design Aids – Part II
Authors: Khaled R. Khater
Abstract:
All civil engineering projects include excavation work and therefore need some retaining structures. Cantilever secant pile walls are an economical supporting system up to 5.0-m depths. The parameters controlling wall tip displacement are the focus of this paper. So, two analysis techniques have been investigated and arbitrated. They are the conventional method and finite element analysis. Accordingly, two computer programs have been used, Excel sheet and Plaxis-2D. Two soil models have been used throughout this study. They are Mohr-Coulomb soil model and Isotropic Hardening soil models. During this study, two soil densities have been considered, i.e. loose and dense sand. Ten wall rigidities have been analyzed covering ranges of perfectly flexible to completely rigid walls. Three excavation depths, i.e. 3.0-m, 4.0-m and 5.0-m were tested to cover the practical range of secant piles. This work submits beneficial hints about secant piles to assist designers and specification committees. Also, finite element analysis, isotropic hardening, is recommended to be the fair judge when two designs conflict. A rational procedure using empirical equations has been suggested to upgrade the conventional method to predict wall tip displacement ‘δ’. Also, a reasonable limitation of ‘δ’ as a function of excavation depth, ‘h’ has been suggested. Also, it has been found that, after a certain penetration depth any further increase of it does not positively affect the wall tip displacement, i.e. over design and uneconomic.Keywords: design aids, numerical analysis, secant pile, Wall tip displacement
Procedia PDF Downloads 18925067 Remote Radiation Mapping Based on UAV Formation
Authors: Martin Arguelles Perez, Woosoon Yim, Alexander Barzilov
Abstract:
High-fidelity radiation monitoring is an essential component in the enhancement of the situational awareness capabilities of the Department of Energy’s Office of Environmental Management (DOE-EM) personnel. In this paper, multiple units of unmanned aerial vehicles (UAVs) each equipped with a cadmium zinc telluride (CZT) gamma-ray sensor are used for radiation source localization, which can provide vital real-time data for the EM tasks. To achieve this goal, a fully autonomous system of multicopter-based UAV swarm in 3D tetrahedron formation is used for surveying the area of interest and performing radiation source localization. The CZT sensor used in this study is suitable for small-size multicopter UAVs due to its small size and ease of interfacing with the UAV’s onboard electronics for high-resolution gamma spectroscopy enabling the characterization of radiation hazards. The multicopter platform with a fully autonomous flight feature is suitable for low-altitude applications such as radiation contamination sites. The conventional approach uses a single UAV mapping in a predefined waypoint path to predict the relative location and strength of the source, which can be time-consuming for radiation localization tasks. The proposed UAV swarm-based approach can significantly improve its ability to search for and track radiation sources. In this paper, two approaches are developed using (a) 2D planar circular (3 UAVs) and (b) 3D tetrahedron formation (4 UAVs). In both approaches, accurate estimation of the gradient vector is crucial for heading angle calculation. Each UAV carries the CZT sensor; the real-time radiation data are used for the calculation of a bulk heading vector for the swarm to achieve a UAV swarm’s source-seeking behavior. Also, a spinning formation is studied for both cases to improve gradient estimation near a radiation source. In the 3D tetrahedron formation, a UAV located closest to the source is designated as a lead unit to maintain the tetrahedron formation in space. Such a formation demonstrated a collective and coordinated movement for estimating a gradient vector for the radiation source and determining an optimal heading direction of the swarm. The proposed radiation localization technique is studied by computer simulation and validated experimentally in the indoor flight testbed using gamma sources. The technology presented in this paper provides the capability to readily add/replace radiation sensors to the UAV platforms in the field conditions enabling extensive condition measurement and greatly improving situational awareness and event management. Furthermore, the proposed radiation localization approach allows long-term measurements to be efficiently performed at wide areas of interest to prevent disasters and reduce dose risks to people and infrastructure.Keywords: radiation, unmanned aerial system(UAV), source localization, UAV swarm, tetrahedron formation
Procedia PDF Downloads 9925066 Shaheen Bagh Protests: Women, Public Spaces, Citizenship and Dissent
Authors: Priyanka Joshi
Abstract:
The paper traces the evolving relationship between women, public spaces, and citizenship and dissent by analyzing acts of dissent led by women. The paper outlines this relationship in the context of the protests held in Shaheen Bagh, Delhi against the Citizenship Amendment Act (CAA), National Registry of Citizens (NRC), and National Population Register (NPR) in 2019. Additionally, the paper aims to explore how the multiple identities of the protestors in Shaheen Bagh affected the nature, implications, and responses to the protests. To do so, the paper will analyze three key areas in relationship with women, namely, public spaces, citizenship, and dissent. In doing so, it will examine the gendered access to public spaces and its implications on the realization of one’s citizenship rights. Moreover, it will explore the historical notions of citizenship, its contemporary understanding, the exclusionary nature of citizenship, and the conflict between community rights and individual rights with respect to women’s rights. In context of dissent, it will evaluate the understanding of dissent and trace the difference in the experience of dissent based on gender by reviewing social movements led and maintained by women. This paper will utilize secondary data to explore the questions it poses. This includes a study of books and journal articles in conjunction with media reports concerning gender, public spaces, citizenship, and dissent. It will apply an intersectional lens in its analysis.Keywords: citizenship, dissent, public spaces, Shaheen Bagh, women
Procedia PDF Downloads 15125065 Social Media as a Tool for Political Communication: A Case Study of India
Authors: Srikanth Bade
Abstract:
This paper discusses how the usage of social media has altered certain discourses and communicated with the political institutions for major actions in Indian scenario. The advent of new technology in the form of social media has engrossed the general public to discuss in the open forum. How they promulgated their ideas into action is captured in this study. Moreover, these discourses happening in the social media is analyzed from certain philosophical traditions by adopting a framework. Hence, this paper analyses the role of social media in political communication and change the political discourse. Also, this paper tries to address the issue that whether the deliberation made through social media had indeed communicated the issue of political matters to the decision making authorities.Keywords: collective action and social capital, political communication, political discourse, social media
Procedia PDF Downloads 15825064 A Study on the Difficulties and Countermeasures of Uyghur Students’ English Learning in Hotan District, Xinjiang
Authors: Tingting Zou
Abstract:
This paper firstly presents an overview of the situation of Xinjiang and Hotan, and describes the current status and features of Uyghur students’ English education. Then it summarizes the research on the theories of Third Language Acquisition and Foreign Language Learning Motivation at home and abroad. Further, through the data collected by the questionnaire, the paper points out the three main problems and causes of Uyghur students’ English learning in Hotan, Xinjiang. Finally, the paper draws a conclusion and puts forward some suggestions on how to improve their English learning quality based on the theory of Foreign Language Learning Motivation.Keywords: countermeasures and difficulties, English learning, Hotan Xinjiang, Uyghur students
Procedia PDF Downloads 9625063 Transcending the Boundary of Traumas: Spatial Trauma in Richard Powers' 'The Echo Maker'
Authors: Nodi Islam
Abstract:
This paper critically reads Richard Powers’ novel The Echo Maker to read and understand the personal traumas of the characters in the novel depending on the various situations they face throughout the story. Also, the paper attempts to read different traumas and disorders due to their different situations. With a focus on the individual experiences, this paper addresses the core issues of trauma, which triggers their reactions and reads the novel through theories of Freud, Caruth, and other critics in this field. While transcending the boundary of personal and collective trauma, this paper suggests that traumas not only arise from the core mental issues, from both past or present memories; it also depends on places too which can be called, according to Yi-Fu Tuan, topophobia. Intimate places such as home provoke not only attachment and expectation but also produce fear in a person. Failure in identifying with such places means losing a central piece of identity of the individual. In order to analyse the traumas in the novel, the characters’ association with homes and places has been provided. This paper attempts to suggest that people are not traumatised because of what Freud explained as unpleasant memories of the past but also intimacy and lost identities related to a place can trigger trauma.Keywords: spatial trauma, traumatic stress disorder, identity and place, core mental issues
Procedia PDF Downloads 14925062 Helicopter Exhaust Gases Cooler in Terms of Computational Fluid Dynamics (CFD) Analysis
Authors: Mateusz Paszko, Ksenia Siadkowska
Abstract:
Due to the low-altitude and relatively low-speed flight, helicopters are easy targets for actual combat assets e.g. infrared-guided missiles. Current techniques aim to increase the combat effectiveness of the military helicopters. Protection of the helicopter in flight from early detection, tracking and finally destruction can be realized in many ways. One of them is cooling hot exhaust gasses, emitting from the engines to the atmosphere in special heat exchangers. Nowadays, this process is realized in ejective coolers, where strong heat and momentum exchange between hot exhaust gases and cold air ejected from atmosphere takes place. Flow effects of air, exhaust gases; mixture of those two and the heat transfer between cold air and hot exhaust gases are given by differential equations of: Mass transportation–flow continuity, ejection of cold air through expanding exhaust gasses, conservation of momentum, energy and physical relationship equations. Calculation of those processes in ejective cooler by means of classic mathematical analysis is extremely hard or even impossible. Because of this, it is necessary to apply the numeric approach with modern, numeric computer programs. The paper discussed the general usability of the Computational Fluid Dynamics (CFD) in a process of projecting the ejective exhaust gases cooler cooperating with helicopter turbine engine. In this work, the CFD calculations have been performed for ejective-based cooler cooperating with the PA W3 helicopter’s engines.Keywords: aviation, CFD analysis, ejective-cooler, helicopter techniques
Procedia PDF Downloads 33225061 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique
Authors: Mario A. Blanco, Nicholas Burkhardt
Abstract:
An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer
Procedia PDF Downloads 36125060 A Prediction Method of Pollutants Distribution Pattern: Flare Motion Using Computational Fluid Dynamics (CFD) Fluent Model with Weather Research Forecast Input Model during Transition Season
Authors: Benedictus Asriparusa, Lathifah Al Hakimi, Aulia Husada
Abstract:
A large amount of energy is being wasted by the release of natural gas associated with the oil industry. This release interrupts the environment particularly atmosphere layer condition globally which contributes to global warming impact. This research presents an overview of the methods employed by researchers in PT. Chevron Pacific Indonesia in the Minas area to determine a new prediction method of measuring and reducing gas flaring and its emission. The method emphasizes advanced research which involved analytical studies, numerical studies, modeling, and computer simulations, amongst other techniques. A flaring system is the controlled burning of natural gas in the course of routine oil and gas production operations. This burning occurs at the end of a flare stack or boom. The combustion process releases emissions of greenhouse gases such as NO2, CO2, SO2, etc. This condition will affect the chemical composition of air and environment around the boundary layer mainly during transition season. Transition season in Indonesia is absolutely very difficult condition to predict its pattern caused by the difference of two air mass conditions. This paper research focused on transition season in 2013. A simulation to create the new pattern of the pollutants distribution is needed. This paper has outlines trends in gas flaring modeling and current developments to predict the dominant variables in the pollutants distribution. A Fluent model is used to simulate the distribution of pollutants gas coming out of the stack, whereas WRF model output is used to overcome the limitations of the analysis of meteorological data and atmospheric conditions in the study area. Based on the running model, the most influence factor was wind speed. The goal of the simulation is to predict the new pattern based on the time of fastest wind and slowest wind occurs for pollutants distribution. According to the simulation results, it can be seen that the fastest wind (last of March) moves pollutants in a horizontal direction and the slowest wind (middle of May) moves pollutants vertically. Besides, the design of flare stack in compliance according to EPA Oil and Gas Facility Stack Parameters likely shows pollutants concentration remains on the under threshold NAAQS (National Ambient Air Quality Standards).Keywords: flare motion, new prediction, pollutants distribution, transition season, WRF model
Procedia PDF Downloads 55625059 Implementation of 'Bay Al-Salam' in Agricultural Banking of Bangladesh: An Islamic Banking Perspective
Authors: M. Obydul Haque Kamaly
Abstract:
This paper aims to provide a brief discussion on bay al-salam as a method of implementing Islamic Banking in the agricultural arena of Bangladesh. For this purpose, the nature and conditions of bay al-salam contracts will be first discussed. Next, the paper will focus on the comparison between conventional banks and Islamic banks and should answer how bay al-salam can be used as a popular method in agricultural transactions in the country. The paper is based on secondary data which is to describe bay al-salam as future proceedings for Islamic banking. Evidence suggests Islamic banking is very much practiced like modern conventional banking with certain restrictions imposed by Sharia and addresses a large number of business requirements successfully. Thus, it’s time for us to implement Islamic banking (bay al-salam) on our agricultural arena and to get most benefits from them.Keywords: bay al-salam, agricultural banking, Islamic banking, implementation
Procedia PDF Downloads 26325058 Modeling of Glycine Transporters in Mammalian Using the Probability Approach
Authors: K. S. Zaytsev, Y. R. Nartsissov
Abstract:
Glycine is one of the key inhibitory neurotransmitters in Central nervous system (CNS) meanwhile glycinergic transmission is highly dependable on its appropriate reuptake from synaptic cleft. Glycine transporters (GlyT) of types 1 and 2 are the enzymes providing glycine transport back to neuronal and glial cells along with Na⁺ and Cl⁻ co-transport. The distribution and stoichiometry of GlyT1 and GlyT2 differ in details, and GlyT2 is more interesting for the research as it reuptakes glycine to neuron cells, whereas GlyT1 is located in glial cells. In the process of GlyT2 activity, the translocation of the amino acid is accompanied with binding of both one chloride and three sodium ions consequently (two sodium ions for GlyT1). In the present study, we developed a computer simulator of GlyT2 and GlyT1 activity based on known experimental data for quantitative estimation of membrane glycine transport. The trait of a single protein functioning was described using the probability approach where each enzyme state was considered separately. Created scheme of transporter functioning realized as a consequence of elemental steps allowed to take into account each event of substrate association and dissociation. Computer experiments using up-to-date kinetic parameters allowed receiving the number of translocated glycine molecules, Na⁺ and Cl⁻ ions per time period. Flexibility of developed software makes it possible to evaluate glycine reuptake pattern in time under different internal characteristics of enzyme conformational transitions. We investigated the behavior of the system in a wide range of equilibrium constant (from 0.2 to 100), which is not determined experimentally. The significant influence of equilibrium constant in the range from 0.2 to 10 on the glycine transfer process is shown. The environmental conditions such as ion and glycine concentrations are decisive if the values of the constant are outside the specified range.Keywords: glycine, inhibitory neurotransmitters, probability approach, single protein functioning
Procedia PDF Downloads 11925057 Accentuation Moods of Blaming Utterances in Egyptian Arabic: A Pragmatic Study of Prosodic Focus
Authors: Reda A. H. Mahmoud
Abstract:
This paper investigates the pragmatic meaning of prosodic focus through four accentuation moods of blaming utterances in Egyptian Arabic. Prosodic focus results in various pragmatic meanings when the speaker utters the same blaming expression in different emotional moods: the angry, the mocking, the frustrated, and the informative moods. The main objective of this study is to interpret the meanings of these four accentuation moods in relation to their illocutionary forces and pre-locutionary effects, the integrated features of prosodic focus (e.g., tone movement distributions, pitch accents, lengthening of vowels, deaccentuation of certain syllables/words, and tempo), and the consonance between the former prosodic features and certain lexico-grammatical components to communicate the intentions of the speaker. The data on blaming utterances has been collected via elicitation and pre-recorded material, and the selection of blaming utterances is based on the criteria of lexical and prosodic regularity to be processed and verified by three computer programs, Praat, Speech Analyzer, and Spectrogram Freeware. A dual pragmatic approach is established to interpret expressive blaming utterance and their lexico-grammatical distributions into intonational focus structure units. The pragmatic component of this approach explains the variable psychological attitudes through the expressions of blaming and their effects whereas the analysis of prosodic focus structure is used to describe the intonational contours of blaming utterances and other prosodic features. The study concludes that every accentuation mood has its different prosodic configuration which influences the listener’s interpretation of the pragmatic meanings of blaming utterances.Keywords: pragmatics, pragmatic interpretation, prosody, prosodic focus
Procedia PDF Downloads 15225056 Investigating the Abolishment of Virginity Testing in South Africa
Authors: Nqobizwe Mvelo Ngema
Abstract:
This paper argues that the custom of virginity testing has been revived in order to combat against social ills such as unwanted pregnancies, immorality, promiscuity and the spread of HIV/AIDS. However, virginity testing is not free from challenges such as the belief that having sexual intercourse with a virgin can cure men from AIDS, virginity testing is not accurate because there is scientific evidence supporting the fact that there many ways of losing virginity other than sexual intercourse, for example, the usage of tampons and participation in physical activities may tear the hymen. South African parliament took some positive steps in combatting against harm associated with virginity testing by regulating it in the Children’s Act. It is argued, in this paper, that the abolition of virginity testing may lead to paper law and it would be premature to abolish virginity testing in South Africa.Keywords: equality rights, virginity testing, human rights, interdisciplinary law and legal studies
Procedia PDF Downloads 52725055 Motives for Using Electronic Journalism More than Daily Newspapers in Palestine
Authors: Motaz Alshawwa
Abstract:
This current study aims to know journalists' motives for dealing with electronic journalism more than paper journalism in Palestine. The participants of the study were (250) journalists. To achieve the study objective, a questionnaire was used that was composed of (18) questions. The results of the study showed that the motives dealing with electronic journalism were utilitarian motives that were represented by knowing the local news. We find a statistically significant relationship at the level of significance of 0.05 between the uses of electronic journalism and gender, and there are statistically significant differences at the level of 0.05 in the motives of dealing with electronic journalism. The study recommends the daily paper journals in Palestine should meet the various and different needs of the public.Keywords: electronic journalism, journalist, paper journalism, utilitarian motives
Procedia PDF Downloads 8825054 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 25925053 A Deep Learning Approach to Online Social Network Account Compromisation
Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang
Abstract:
The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.Keywords: computer security, network security, online social network, account compromisation
Procedia PDF Downloads 11925052 Lifestyle Behaviors among Jordanian Obese Children Aged 6-9 Years: A Cross-Sectional Study
Authors: Ayman Bani Salameh
Abstract:
Background: Obesity in children is in increasing in developed and developing countries, which leads to morbidity and premature mortality. Lifestyle behaviors are an important issue in minimizing this problem and subsequent complications. Thus, this study purposed to assess lifestyle behaviors, including dietary habits and physical activity, among Jordanian obese children aged 6-9 years. Methods: A cross-sectional study was conducted on 324 children aged 6-9 years using a questionnaire consisting of items measuring dietary habits (7 items) and physical activity (8 items). Results: Findings showed that obese children had bad dietary habits involved in the number of meals eaten day (M= 5.06, SD=1.14), number of snacks of sweet/ chocolates daily (M= 3. 61, SD=0.82), and number of glasses of sweet fizzy drinks/day (M= 3.39, SD=0.96). Moreover, they had poor physical activity represented in the number of playing or training in an activity like dancing, swimming, and walking in the past week (M= 0.06, SD=1.01), number of days in participating in moderate physical activity last week (M= 0.06, SD=1.01), time spending in using a computer, watching TV, watching videos or using the internet as a part of study or homework in the last week (M= 16.88, SD=2.37), and ), time spending in using a computer, watching TV, watching videos or using the internet for fun or recreation in the past week (M= 14.44, SD=2.37). Conclusion: Obese children aged 6-9 had unhealthy lifestyle behaviors, which could expose them to a high risk of increasing comorbidities associated with obesity. Therefore, this preliminary study helps develop an intervention program based on modifying unhealthy behaviors, including bad dietary habits and a sedentary lifestyle. The results provide baseline data about the strategies for developing intervention programs for weight reduction.Keywords: obesity, children, behaviors, lifestyle
Procedia PDF Downloads 8325051 Reforming Corporate Criminal Liability in English Law: Lessons and Experiences from Canada
Authors: John Kong Shan Ho
Abstract:
In June 2022, the Law Commission of England and Wales published an options paper to examine how the law on corporate criminal liability can be reformed under the English system. The paper merely details options for reform and does not seek to make recommendations. However, the paper has ruled out the “respondeat superior” approach of the US and “corporate culture” approach of Australia as reform options. On balance, the preferred reform option of the Law Commission is the “senior officer” approach as currently adopted in Canada. This article is written against such background and argues that due to similarities between the English and Canadian systems, the latter’s approach is more ideal to be adopted by the former as a model for reform in this area.Keywords: corporate criminal liability, identification principle, directing mind and will, England, Canada
Procedia PDF Downloads 10525050 Textile Cottage Industry: A Facilitator for Capacity Building and Youth Empowerment
Authors: Salihu Maiwada
Abstract:
The large scale textile industry in Nigeria was at one time the second largest employer of labor after government. With recent developments and changing situations, there is a serious decline in this sector which consequently forced the local textile industries to close down and the workers retrenched. the category of people worst hit was the youths and the middle age. This paper examines the potentials of the textile cottage industry as a facilitator for capacity building and economic empowerment among the Nigerian youths. The paper focuses on economic viability, persistence, and above-all, its potentials for poverty reduction as well as self employment. The methodology used in the study is the survey method and the instrument used to collect the necessary information is field interview. The results obtained showed that the textile cottage industries are flourishing and the Nigerian youths are engaged in the practice. In addition, the paper suggests areas that require government's financial intervention which will facilitate the establishment and ensure the sustainability of the textile cottage industry. The paper concludes with some recommendations for the youths and for the government.Keywords: capacity building, economic, empowerment, persistence, sustainability, youths
Procedia PDF Downloads 58725049 A Review of Information Systems Development in Developing Countries
Authors: B. N. Asare, O. A. Ajigini
Abstract:
Information systems (IS) are highly important in the operation of private and public organisations in developing and developed countries. Developing countries are saddled with many project failures during the implementation of information systems. However, successful information systems are greatly needed in developing countries in order to enhance their economies. This paper is highly important in view of the high failure rate of information systems in developing countries which needs to be reduced to minimum acceptable levels by means of recommended interventions. This paper centres on a review of IS development in developing countries. The paper presents evidences of the IS successes and failures in developing countries and posits a model to address the IS failures. The proposed model can then be utilised by developing countries to reduce their IS project implementation failure rate. A comparison is drawn between IS development in developing countries and developed countries. The paper provides valuable information to assist in reducing IS failure, and developing IS models and theories on IS development for developing countries.Keywords: developing countries, information systems, IS development, information systems failure, information systems success, information systems success model
Procedia PDF Downloads 38025048 Graphic User Interface Design Principles for Designing Augmented Reality Applications
Authors: Afshan Ejaz, Syed Asim Ali
Abstract:
The reality is a combination of perception, reconstruction, and interaction. Augmented Reality is the advancement that layer over consistent everyday existence which includes content based interface, voice-based interfaces, voice-based interface and guide based or gesture-based interfaces, so designing augmented reality application interfaces is a difficult task for the maker. Designing a user interface which is not only easy to use and easy to learn but its more interactive and self-explanatory which have high perceived affordability, perceived usefulness, consistency and high discoverability so that the user could easily recognized and understand the design. For this purpose, a lot of interface design principles such as learnability, Affordance, Simplicity, Memorability, Feedback, Visibility, Flexibly and others are introduced but there no such principles which explain the most appropriate interface design principles for designing an Augmented Reality application interfaces. Therefore, the basic goal of introducing design principles for Augmented Reality application interfaces is to match the user efforts and the computer display (‘plot user input onto computer output’) using an appropriate interface action symbol (‘metaphors’) or to make that application easy to use, easy to understand and easy to discover. In this study by observing Augmented reality system and interfaces, few of well-known design principle related to GUI (‘user-centered design’) are identify and through them, few issues are shown which can be determined through the design principles. With the help of multiple studies, our study suggests different interface design principles which makes designing Augmented Reality application interface more easier and more helpful for the maker as these principles make the interface more interactive, learnable and more usable. To accomplish and test our finding, Pokémon Go an Augmented Reality game was selected and all the suggested principles are implement and test on its interface. From the results, our study concludes that our identified principles are most important principles while developing and testing any Augmented Reality application interface.Keywords: GUI, augmented reality, metaphors, affordance, perception, satisfaction, cognitive burden
Procedia PDF Downloads 16925047 The Forensic Analysis of Engravers' Handwriting
Authors: Olivia Rybak-Karkosz
Abstract:
The purpose of this paper is to present the result of scientific research using forensic handwriting analysis. It was conducted to verify the stability and lability of handwriting of engravers and check if gravers transfer their traits from handwriting to plates and other surfaces they rework. This research methodology consisted of completing representative samples of signatures of gravers written on a piece of paper using a ballpen and signatures engraved on other surfaces. The forensic handwriting analysis was conducted using the graphic-comparative method (graphic method), and all traits were analysed. The paper contains a concluding statement of the similarities and differences between the samples.Keywords: artist’s signatures, engraving, forensic handwriting analysis, graphic-comparative method
Procedia PDF Downloads 10225046 Leadership, Corruption, and Governance in Nigeria since 1960: The Way Forward
Authors: Reginald Chikere Keke
Abstract:
This paper examined leadership failure consequent on endemic corruption as being the bane of good governance in Nigeria since independence in 1960 and the way forward. Nigeria is lavishly gifted by nature of abundance in human and material resources to be harnessed a strategic, resolute, ingenious, and inventive leadership. For leadership to drive sustainable growth in society, it must be rooted in the cultural values of the people. This, however, is contrary in Nigeria owing to unscrupulous leadership miscarriage, corruption, and bad governance. Using the eclectic approach, the paper scrutinizes the issues of leadership, corruption, and governance to clearly show how bad leadership and governance have destroyed the national fabric and the way out of Nigeria's development quack mire. Furthermore, this paper examined the perplexing nature of corruption in Nigeria that has made it the only lucrative endeavor for politicians and their cronies, leading Nigeria to be regarded as the world's poverty capital. This paper advocate that Nigerians and the international community must endeavor to enshrine effective leadership and good governance through strong institutions, laws, and individuals who have zero tolerance for corruption and mediocrity in the polity. Only then will the fatherland of everyone’s dreams will be realized, and the labors of our hero’s past will not be in vain.Keywords: corruption, leadership, governance, Nigeria
Procedia PDF Downloads 13025045 Wave of Islamic Fintech: Revolutionizing Malaysia's Islamic Banking and Finance Regulatory Landscape
Authors: Ho Wen Hui, Azwina Wati Abdull Manaf, Asfarina Kartika Mohd Shakri
Abstract:
The global trend of Fintech had taken the Malaysian shore by storm in recent years, thus making the studies and observations of its impacts more critical than ever. Additionally, Fintech has grown to become an unavoidable subject in the Islamic Banking and Finance (IBF) industry. In relation to that, this paper seeks to analyze the development of Fintech parallel with the IBF industry and its connection to Islamic economics. While the scarcity of studies on this area is apparent, it is found that there is a need to regulate the development of the Fintech Industry and its effects while analyzing the ramifications and positive effects of Fintech towards parties involved in IBF industry. This paper objectively studies the phenomenon of Islamic Fintech around the world as a whole as well as more specifically in Malaysia. The paper will then explore on the existing regulatory instruments in Malaysia, study their boundaries as well as limitations and contribute on possible reform to regulate Islamic Fintech in this jurisdiction. It is aimed that this paper will prompt and encourage more thorough studies to be conducted on the topic of Fintech which would subsequently contribute to a positive growth of the IBF industry worldwide.Keywords: financial technology, FinTech, Islamic banking & finance, regulation
Procedia PDF Downloads 22825044 The Current And Prospective Legal Regime of Non-Orbital Flights
Authors: Olga Koutsika
Abstract:
The paper deals primarily with the question of the legal framework of non-orbital flights. The submission is based upon two pillars, starting with the ill-defined current legal regime and proceeding to further recommendations for the prospective legal regime for non-orbital flights. For this reason, the paper focuses on certain key legal aspects of the topic, including among other things liability, responsibility, jurisdiction, registration and authorisation. Furthermore, taking into consideration the hybrid nature of both the craft conducting non-orbital flights and of the flights themselves, which exit airspace but do not enter an orbit in outer space, the paper addresses each legal question from the perspective of both air law and space law and concludes to a number of recommendations regarding the applicability of each legal regime for each legal question individually.Keywords: current regime, legal framework, non-orbital flights, prospective regime
Procedia PDF Downloads 383