Search results for: excessive internet use
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2368

Search results for: excessive internet use

808 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 208
807 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques

Authors: Pranjali Avinash Yadav-Deshmukh

Abstract:

Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.

Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction

Procedia PDF Downloads 388
806 The Use of Modern Technology to Enhance English Language Teaching and Learning: An Analysis

Authors: Fazilet Alachaher (Benzerdjeb)

Abstract:

From the chalkboard to the abacus and beyond, technology has always played an important role in education. Educational technology refers to any teaching tool that helps supports learning, and given the rapid advancements in Information Technology and multimedia applications, the potential to support the teaching of foreign languages in our universities is ever greater. In language teaching and learning, we have a lot of to choose from the world of technology: TV, CDs, DVDs, Computers, the Internet, Email, and Blogs. The use of modern technologies can enrich the experience of learning a foreign language because they provide features that are not present in traditional technology. They can offer a wide range of multimedia resources, opportunities for intensive one-to-one learning in language labs and resources for authentic materials, which can be motivating to both students and teachers. The advent of Information and Communication Technology (ICT) and online interaction can also open up new range of self-access and distance learning opportunities The two last decades have witnessed a revolution due to the onset of technology, and has changed the dynamics of various industries, and has also influenced the way people live and work in society. That is why using the multimedia to create a certain context to teach English has its unique advantages. This paper tries then to analyse the necessity of multimedia technology to language teaching and brings out the problems faced by using these technologies. It also aims at making English teachers aware of the strategies to use it in an effective manner.

Keywords: strategies English teaching, multimedia technology, advantages, disadvantages, English learning

Procedia PDF Downloads 464
805 Wearable Interface for Telepresence in Robotics

Authors: Uriel Martinez-Hernandez, Luke W. Boorman, Hamideh Kerdegari, Tony J. Prescott

Abstract:

In this paper, we present architecture for the study of telepresence, immersion and human-robot interaction. The architecture is built around a wearable interface, developed here, that provides the human with visual, audio and tactile feedback from a remote location. We have chosen to interface the system with the iCub humanoid robot, as it mimics many human sensory modalities, such as vision, with gaze control and tactile feedback. This allows for a straightforward integration of multiple sensory modalities, but also offers a more complete immersion experience for the human. These systems are integrated, controlled and synchronised by an architecture developed for telepresence and human-robot interaction. Our wearable interface allows human participants to observe and explore a remote location, while also being able to communicate verbally with humans located in the remote environment. Our approach has been tested from local, domestic and business venues, using wired, wireless and Internet based connections. This has involved the implementation of data compression to maintain data quality to improve the immersion experience. Initial testing has shown the wearable interface to be robust. The system will endow humans with the ability to explore and interact with other humans at remote locations using multiple sensing modalities.

Keywords: telepresence, telerobotics, human-robot interaction, virtual reality

Procedia PDF Downloads 290
804 Perceptions of Cybersecurity in Government Organizations: Case Study of Bhutan

Authors: Pema Choejey, David Murray, Chun Che Fung

Abstract:

Bhutan is becoming increasingly dependent on Information and Communications Technologies (ICTs), especially the Internet for performing the daily activities of governments, businesses, and individuals. Consequently, information systems and networks are becoming more exposed and vulnerable to cybersecurity threats. This paper highlights the findings of the survey study carried out to understand the perceptions of cybersecurity implementation among government organizations in Bhutan. About 280 ICT personnel were surveyed about the effectiveness of cybersecurity implementation in their organizations. A questionnaire based on a 5 point Likert scale was used to assess the perceptions of respondents. The questions were asked on cybersecurity practices such as cybersecurity policies, awareness and training, and risk management. The survey results show that less than 50% of respondents believe that the cybersecurity implementation is effective: cybersecurity policy (40%), risk management (23%), training and awareness (28%), system development life cycle (34%); incident management (26%), and communications and operational management (40%). The findings suggest that many of the cybersecurity practices are inadequately implemented and therefore, there exist a gap in achieving a required cybersecurity posture. This study recommends government organizations to establish a comprehensive cybersecurity program with emphasis on cybersecurity policy, risk management, and awareness and training. In addition, the research study has practical implications to both government and private organizations for implementing and managing cybersecurity.

Keywords: awareness and training, cybersecurity policy, risk management, security risks

Procedia PDF Downloads 347
803 Assessment and Optimisation of Building Services Electrical Loads for Off-Grid or Hybrid Operation

Authors: Desmond Young

Abstract:

In building services electrical design, a key element of any project will be assessing the electrical load requirements. This needs to be done early in the design process to allow the selection of infrastructure that would be required to meet the electrical needs of the type of building. The type of building will define the type of assessment made, and the values applied in defining the maximum demand for the building, and ultimately the size of supply or infrastructure required, and the application that needs to be made to the distribution network operator, or alternatively to an independent network operator. The fact that this assessment needs to be undertaken early in the design process provides limits on the type of assessment that can be used, as different methods require different types of information, and sometimes this information is not available until the latter stages of a project. A common method applied in the earlier design stages of a project, typically during stages 1,2 & 3, is the use of benchmarks. It is a possibility that some of the benchmarks applied are excessive in relation to the current loads that exist in a modern installation. This lack of accuracy is based on information which does not correspond to the actual equipment loads that are used. This includes lighting and small power loads, where the use of more efficient equipment and lighting has reduced the maximum demand required. The electrical load can be used as part of the process to assess the heat generated from the equipment, with the heat gains from other sources, this feeds into the sizing of the infrastructure required to cool the building. Any overestimation of the loads would contribute to the increase in the design load for the heating and ventilation systems. Finally, with the new policies driving the industry to decarbonise buildings, a prime example being the recently introduced London Plan, loads are potentially going to increase. In addition, with the advent of the pandemic and changes to working practices, and the adoption of electric heating and vehicles, a better understanding of the loads that should be applied will aid in ensuring that infrastructure is not oversized, as a cost to the client, or undersized to the detriment of the building. In addition, more accurate benchmarks and methods will allow assessments to be made for the incorporation of energy storage and renewable technologies as these technologies become more common in buildings new or refurbished.

Keywords: energy, ADMD, electrical load assessment, energy benchmarks

Procedia PDF Downloads 113
802 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278
801 Digital Self-Care Intervention Evaluation from the Perspective of Healthcare Users

Authors: Dina Ziadlou, Anthony Sunjaya, Joyzen Cortez Ramos, Romario Muñoz Ramos, Richard Dasselaar

Abstract:

This study aimed to evaluate the opinions of users using digital health technologies to prevent, promote, and maintain their health and well-being with or without the support of a healthcare provider to delineate an overview of the future patient journey while considering the strategic initiatives in the digital transformation era. This research collected the opinions of healthcare clients through a structural questionnaire to collect user accessibility, user knowledge, user experience, user engagement, and personalized medicine to investigate the mindset of the users and illustrate their opinions, expectations, needs, and voices about digital self-care expansion. In the realm of digital transformation, the accessibility of users to the internet, digital health platforms, tools, and mobile health applications have revolutionized the healthcare ecosystem toward nurturing informed and empowered patients who are tech-savvy and can take the initiative to be in charge of their health, involved in medical decision-making, and seek digital health innovations to prevent diseases and promote their healthy lifestyles. Therefore, the future of the patient journey is digital self-care intervention in a healthcare ecosystem where the partnership of patients in healthcare services is tied to their health information and action ownership.

Keywords: digital health, patient engagement, self-care intervention, digital self-care intervention, digital transformation

Procedia PDF Downloads 39
800 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 331
799 Interaction of Steel Slag and Zeolite on Ammonium Nitrogen Removal and Its Illumination on a New Carrier Filling Configuration for Constructed Wetlands

Authors: Hongtao Zhu, Dezhi Sun

Abstract:

Nitrogen and phosphorus are essential nutrients for biomass growth. But excessive nitrogen and phosphorus can contribute to accelerated eutrophication of lakes and rivers. Constructed wetland is an efficient and eco-friendly wastewater treatment technology with low operating cost and low-energy consumption. Because of high affinity with ammonium ion, zeolite, as a common substrate, is applied in constructed wetlands worldwide. Another substrate seen commonly for constructed wetlands is steel slag, which has high contents of Ca, Al, or Fe, and possesses a strong affinity with phosphate. Due to the excellent ammonium removal ability of zeolite and phosphate removal ability of steel slag, they were considered to be combined in the substrate bed of a constructed wetland in order to enhance the simultaneous removal efficiencies of nitrogen and phosphorus. In our early tests, zeolite and steel slag were combined with each other in order to simultaneously achieve a high removal efficiency of ammonium-nitrogen and phosphate-phosphorus. However, compared with the results when only zeolite was used, the removal efficiency of ammonia was sharply decreased when zeolite and steel slag were used together. The main objective of this study was to establish an overview of the interaction of steel slag and zeolite on ammonium nitrogen removal. The CaO dissolution from slag, as well as the effects of influencing parameters (i.e. pH and Ca2+ concentration) on the ammonium adsorption onto zeolite, was systematically studied. Modeling results of Ca2+ and OH- release from slag indicated that pseudo-second order reaction had a better fitness than pseudo-first order reaction. Changing pH value from 7 to 12 would result in a drastic reduction of the ammonium adsorption capacity on zeolite, from the peak at pH7. High Ca2+ concentration in solution could also inhibit the adsorption of ammonium onto zeolite. The mechanism for steel slag inhibiting the ammonium adsorption capacity of zeolite includes: on one hand, OH- released from steel slag can react with ammonium ions to produce molecular form ammonia (NH3∙H2O), which would cause the dissociation of NH4+ from zeolite. On the other hand, Ca2+ could replace the NH4+ ions to adhere onto the surface of zeolite. An innovative substrate filling configuration that zeolite and steel slag are placed sequentially was proposed to eliminate the disadvantageous effects of steel slag. Experimental results showed that the novel filling configuration was superior to the other two contrast filling configurations in terms of ammonium removal.

Keywords: ammonium nitrogen, constructed wetlands, steel slag, zeolite

Procedia PDF Downloads 255
798 In Search of Commonalities in the Determinants of Child Sex Ratios in India and People's of Republic of China

Authors: Suddhasil Siddhanta, Debasish Nandy

Abstract:

Child sex ratios pattern in the Asian Population is highly masculine mainly due to birth masculinity and gender bias in child mortality. The vast and the growing literature of female deficit in world population points out the diffusion of child sex ratio pattern in many Asian as well as neighboring European countries. However, little attention has been given to understand the common factors in different demographics in explaining child sex ratio pattern. Such a scholarship is extremely important as level of gender inequity is different in different country set up. Our paper tries to explain the major structural commonalities in the child masculinity pattern in two demographic billionaires - India and China. The analysis reveals that apart from geographical diffusion of sex selection technology, patrilocal social structure, as proxied by households with more than one generation in China and proportion of population aged 65 years and above in India, can explain significant variation of missing girl child in these two countries. Even after controlling for individual capacity building factors like educational attainment, or work force participation, the measure of social stratification is coming out to be the major determinant of child sex ratio variation. Other socio economic factors that perform much well are the agency building factors of the females, like changing pattern of marriage customs which is proxied by divorce and remarriage ratio for china and percentage of female marrying at or after the age of 20 years in India and the female workforce participation. Proportion of minorities in socio-religious composition of the population and gender bias in scholastic attainment in both these counties are also found to be significant in modeling child sex ratio variations. All these significant common factors associated with child sex ratio point toward the one single most important factor: the historical evolution of patriarchy and its contemporary perpetuation in both the countries. It seems that prohibition of sex selection might not be sufficient to combat the peculiar skewness of excessive maleness in child population in both these countries. Demand sided policies is therefore utmost important to root out the gender bias in child sex ratios.

Keywords: child sex ratios, gender bias, structural factors, prosperity, patrilocality

Procedia PDF Downloads 157
797 Human TP53 Three Dimentional (3D) Core Domain Hot Spot Mutations at Codon, 36, 72 and 240 are Associated with Oral Squamous Cell Carcinoma

Authors: Saima Saleem, Zubair Abbasi, Abdul Hameed, Mansoor Ahmed Khan, Navid Rashid Qureshi, Abid Azhar

Abstract:

Oral Squamous Cell Carcinoma (OSCC) is the leading cause of death in the developing countries like Pakistan. This problem aggravates because of the excessive use of available chewing products. In spite of widespread information on their use and purported legislations against their use the Pakistani markets are classical examples of selling chewable carcinogenic mutagens. Reported studies indicated that these products are rich in reactive oxygen species (ROS) and polyphenols. TP53 gene is involved in the suppression of tumor. It has been reported that somatic mutations caused by TP53 gene are the foundation of the cancer. This study aims to find the loss of TP53 functions due to mutation/polymorphism caused by genomic alteration and interaction with tobacco and its related ingredients. Total 260 tissues and blood specimens were collected from OSCC patients and compared with age and sex matched controls. Mutations in exons 2-11 of TP53 were examined by PCR-SSCP. Samples showing mobility shift were directly sequenced. Two mutations were found in exon 4 at nucleotide position 108 and 215 and one in exon 7 at nucleotide position 719 of the coding sequences in patient’s tumor samples. These results show that substitution of proline with arginine at codon 72 and serine with threonine at codon 240 of p53 protein. These polymorphic changes, found in tumor samples of OSCC, could be involved in loss of heterozygocity and apoptotic activity in the binding domain of TP53. The model of the mutated TP53 gene elaborated a nonfunctional unfolded p53 protein, suggesting an important role of these mutations in p53 protein inactivation and malfunction. This nonfunctional 3D model also indicates that exogenous tobacco related carcinogens may act as DNA-damaging agents affecting the structure of DNA. The interpretations could be helpful in establishing the pathways responsible for tumor formation in OSCC patients.

Keywords: TP53 mutation/polymorphism, OSCC, PCR-SSCP, direct DNA sequencing, 3D structure

Procedia PDF Downloads 367
796 Unveiling the Mystery: Median Arcuate Ligament Syndrome in a Middle-Aged Female Presenting with Abdominal Pain

Authors: Thaer Khaleel Swaid, Maryam Al Ahmad, Ishtiaq Ahmad

Abstract:

47-year-old female, known to have a liver cyst and hemangiomas, presented to the gastroenterology clinic for chronic moderate postprandial epigastric pain, which is aggravated by food, leaning forward and relieved on lying flat. The pain was associated with nausea, vomiting, heartburn and excessive burping. She opened her bowel daily, having well-formed stools without blood or mucus. The patient denied NSAID intake, smoking or alcohol. On physical examination during the episode of pain abdomen revealed a soft, lax abdomen and mild tenderness in the epigastric region without organomegaly. Bowel sounds were audible. Her routine hematological and biochemical parameters were within normal, including CBC, Celiac serology, Lipase, Metabolic profile and H pylori stool antigen. The patient underwent an Ultrasound of the abdomen which showed multiple liver cysts, hemangioma, normal GB and biliary tree. Based on the clinical picture and to narrow our differential diagnosis, an ultrasound Doppler for the abdomen was ordered, and it showed celiac artery peak systolic velocity in expiration is 270cm/s, suggestive of median arcuate ligament syndrome. She Had computerized tomography abdomen done and showed a Narrowing of the celiac artery at the origin, likely secondary to low insertion of the median arcuate ligament. Furthermore, Gastroscopy and, later on colonoscopy were done, which was unremarkable. A laparoscopic decompression of the celiac trunk was indicated, for which the patient was referred to vascular surgery. This case confirms that Median Arcuate Ligament syndrome is an unusual diagnosis and is always challenging. Usually, patients undergo extensive workups before a final diagnosis is achieved. Our case highlights the challenge of diagnosing MALS since this entity is rare. It is a good choice to perform abdominal ultrasound with Doppler imaging on a patient with symptoms such as postprandial angina.

Keywords: Unveiling the Mystery, MALS, rare entity, Rare vascular phenomenon

Procedia PDF Downloads 20
795 Online Formative Assessment Challenges Experienced by Grade 10 Physical Sciences Teachers during Remote Teaching and Learning

Authors: Celeste Labuschagne, Sam Ramaila, Thasmai Dhurumraj

Abstract:

Although formative assessment is acknowledged as crucial for teachers to gauge students’ understanding of subject content, applying formative assessment in an online context is more challenging than in a traditional Physical Sciences classroom. This study examines challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. The empirical investigation adopted a generic qualitative design and involved three purposively selected Grade 10 Physical Sciences teachers from three different schools and quintiles within the Tshwane North District in South Africa. Data were collected through individual and focus group interviews. Technological, pedagogical, and content knowledge (TPACK) was utilised as a theoretical framework underpinning the study. The study identified a myriad of challenges experienced by Grade 10 Physical Sciences teachers when enacting online formative assessment. These challenges include the utilisation of Annual Teaching Plans, lack of technological knowledge, and internet connectivity. The Department of Basic Education faces the key imperative to provide continuous teacher professional development and concomitant online learning materials that can facilitate meaningful enactment of online formative assessment in various educational settings.

Keywords: COVID-19, challenges, online formative assessment, physical sciences, TPACK

Procedia PDF Downloads 68
794 Black Protests in Poland: Analysis of Women's Movement in Poland, 2016-2018

Authors: Aneta Ostaszewska

Abstract:

The purpose of this research is to reflect on 'black protests' of women in Poland. 'Black protests' have been organized nationwide since October 2016 as a sign of opposition and resistance to anti-women government’s policy and its attempts to exacerbate abortion law. Women protest not only in the biggest cities (Warsaw, Cracow or Wroclaw) but in over 140 towns and villages all over Poland. The research represents qualitative methodological approach – an active research method. It has involved the observation, description, and analysis of 'black protests' carried out mainly in Warsaw (the capital of Poland). The focus has been on behavior and attitudes of protesting women: protesters’ slogans, statements, and views, the ways of dressing up, ways of participating and involvement in protests. Research also involves the analysis of social media discourse: the analysis of content published by women on social media. Black protests are an example of a grassroots social initiative of women in Poland. What unites women is opposition to government policy. The primary space of communication has become the Internet – especially social media (Facebook). A new social movement 'Dziewuchy dziewuchom' (Girls for girls) has been born as well as organization of 'Ogolnopolski Strajk Kobiet' (Nationwide women's strike) as a result of 'black protest'. These protests and marches became a way of emphasizing women’s subjectivity as well as political and civic activity.

Keywords: women, black protests, communitas, experience, Poland, abortion law

Procedia PDF Downloads 375
793 Effect of Varying Zener-Hollomon Parameter (Temperature and Flow Stress) and Stress Relaxation on Creep Response of Hot Deformed AA3104 Can Body Stock

Authors: Oyindamola Kayode, Sarah George, Roberto Borrageiro, Mike Shirran

Abstract:

A phenomenon identified by our industrial partner has experienced sag on AA3104 can body stock (CBS) transfer bar during transportation of the slab from the breakdown mill to the finishing mill. Excessive sag results in bottom scuffing of the slab onto the roller table, resulting in surface defects on the final product. It has been found that increasing the strain rate on the breakdown mill final pass results in a slab resistant to sag. The creep response for materials hot deformed at different Zener–Holloman parameter values needs to be evaluated experimentally to gain better understanding of the operating mechanism. This study investigates this identified phenomenon through laboratory simulation of the breakdown mill conditions for various strain rates by utilizing the Gleeble at UCT Centre for Materials Engineering. The experiment will determine the creep response for a range of conditions as well as quantifying the associated material microstructure (sub-grain size, grain structure etc). The experimental matrices were determined based on experimental conditions approximate to industrial hot breakdown rolling and carried out on the Gleeble 3800 at the Centre for Materials Engineering, University of Cape Town. Plane strain compression samples were used for this series of tests at an applied load that allow for better contact and exaggerated creep displacement. A tantalum barrier layer was used for increased conductivity and decreased risk of anvil welding. One set of tests with no in-situ hold time was performed, where the samples were quenched after deformation. The samples were retained for microstructure analysis of the micrographs from the light microscopy (LM), quantitative data and images from scanning electron microscopy (SEM) and energy dispersive X-ray (EDX), sub-grain size and grain structure from electron back scattered diffraction (EBSD).

Keywords: aluminium alloy, can-body stock, hot rolling, creep response, Zener-Hollomon parameter

Procedia PDF Downloads 86
792 Challenges for Interface Designers in Designing Sensor Dashboards in the Context of Industry 4.0

Authors: Naveen Kumar, Shyambihari Prajapati

Abstract:

Industry 4.0 is the fourth industrial revolution that focuses on interconnectivity of machine to machine, human to machine and human to human via Internet of Things (IoT). Technologies of industry 4.0 facilitate communication between human and machine through IoT and forms Cyber-Physical Production System (CPPS). In CPPS, multiple shop floors sensor data are connected through IoT and displayed through sensor dashboard to the operator. These sensor dashboards have enormous amount of information to be presented which becomes complex for operators to perform monitoring, controlling and interpretation tasks. Designing handheld sensor dashboards for supervision task will become a challenge for the interface designers. This paper reports emerging technologies of industry 4.0, changing context of increasing information complexity in consecutive industrial revolutions and upcoming design challenges for interface designers in context of Industry 4.0. Authors conclude that information complexity of sensor dashboards design has increased with consecutive industrial revolutions and designs of sensor dashboard causes cognitive load on users. Designing such complex dashboards interfaces in Industry 4.0 context will become main challenges for the interface designers.

Keywords: Industry4.0, sensor dashboard design, cyber-physical production system, Interface designer

Procedia PDF Downloads 130
791 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 62
790 Cairo’s Inferno of Pollution: Ecocritical Reading of “The Breeze Hunter” by Egyptian Writer Mohammed Makhzangi

Authors: Mila Fantinelli

Abstract:

Cairo is the perfect modern representation of a living hell between rising temperatures and failing architecture. The works of Egyptian writer Mohamed Makhzangi may prove to add more depth to the debate that surrounds the topic of pollution in Arab literature. This Egyptian writer, who studied medicine and psychiatry before dedicating his life to writing, sheds indeed further light on the ecological condition of Cairo. In relation to this, the short story “The breeze hunter” (2018) tackles the topic of “environmental architecture”, citing the research of Hassan Fathy in “Architecture for the Poor: An Experiment in Rural Egypt” which provides examples from history of inventions to counter the effects of the hot weather. Specifically, the main character of the story is a man living in Cairo in a small apartment, which turns into a living hell in the summer season because of the high temperatures. Catastrophic urban planning, therefore, prevents the mitigation of the torrid climate but rather worsens it. Makhzangi indeed refers to the environmental issue of pollution caused by the excessive number of air conditioners, which transform Cairo into an infernal island of heat while our country becomes warmer with the passing of time. His description of the city already intersects ecocriticism and environmental issues, tackling the topic of pollution inside of cities and the impact of climate change, of which Cairo is a perfect example. History has indeed provided ways in order to reduce the heat inside houses. Yet, these have all been ignored. As a result, through the teachings of Hassan Fathy, the narrator of the story builds an opening in the house to catch the natural breeze coming from the north. He, therefore, becomes the breeze hunter of Mansoura. However, polluted waves interrupt this brief rest, thus leading to a worsening of his conditions, leading to him suffering from the effects of crowding and the consequences of climate change and pollution. Makhzangi, therefore, reflects on how architecture and urbanism affect the psychological sanity of people and how the situation is worsened by the catastrophic consequences of climate change and pollution.

Keywords: ecocriticism, Arabic literature, pollution, environmental architecture, crowding

Procedia PDF Downloads 28
789 Timescape-Based Panoramic View for Historic Landmarks

Authors: H. Ali, A. Whitehead

Abstract:

Providing a panoramic view of famous landmarks around the world offers artistic and historic value for historians, tourists, and researchers. Exploring the history of famous landmarks by presenting a comprehensive view of a temporal panorama merged with geographical and historical information presents a unique challenge of dealing with images that span a long period, from the 1800’s up to the present. This work presents the concept of temporal panorama through a timeline display of aligned historic and modern images for many famous landmarks. Utilization of this panorama requires a collection of hundreds of thousands of landmark images from the Internet comprised of historic images and modern images of the digital age. These images have to be classified for subset selection to keep the more suitable images that chronologically document a landmark’s history. Processing of historic images captured using older analog technology under various different capturing conditions represents a big challenge when they have to be used with modern digital images. Successful processing of historic images to prepare them for next steps of temporal panorama creation represents an active contribution in cultural heritage preservation through the fulfillment of one of UNESCO goals in preservation and displaying famous worldwide landmarks.

Keywords: cultural heritage, image registration, image subset selection, registered image similarity, temporal panorama, timescapes

Procedia PDF Downloads 166
788 Anti-Corruption Strategies for Private Sector Development: Case Study for the Brazilian Automotive Industry

Authors: Rogerio Vieira Dos Reis

Abstract:

Countries like Brazil that despite fighting hard against corruption are not improving their corruption perception, especially due to systemic political corruption, should review their corruption prevention strategies. This thesis brings a case study based on an alternative way of preventing corruption: addressing the corruption drivers in public policies that lead to poor economic performance. After discussing the Brazilian industrial policies adopted recently, especially the measures towards the automotive sector, two corruption issues in this sector are analyzed: facilitating payment for fiscal benefits and buying the extension of fiscal benefits. In-depth interviews conducted with a policymaker and an executive of the automobile sector provide insights for identifying three main corruption drivers: excessive and unnecessary bureaucracy, a complex tax system and the existence of a closed market without setting performance requirements to be achieved by the benefited firms. Both the identification of the drivers of successful industrial policies and the proposal of anti-corruption strategies to ensure developmental outcomes are based on the economic perspective of industrial policy advocated by developmental authors and on the successful South Korean economic development experience. Structural anti-corruption measures include tax reform, the regulation of lobbying and legislation to allow corporate political contribution. Besides improving policymakers’ technical capabilities, measures at the ministry level include redesigning the automotive regimes as long-term policies focused on national investment with simple and clear rules and making fiscal benefits conditional upon performance targets focused on suppliers. This case study is of broader interest because it recommends the importance of adapting performance audits conducted by anti-corruption agencies, to focus not only on the delivery of public services, but also on the identification of potentially highly damaging corruption drivers in public policies that grant fiscal benefits to achieve developmental outcomes.

Keywords: Brazilian automotive sector, corruption, economic development, industrial policy, Inovar-Auto

Procedia PDF Downloads 213
787 An Evaluation of Kahoot Application and Its Environment as a Learning Tool

Authors: Muhammad Yasir Babar, Ebrahim Panah

Abstract:

Over the past 20 years, internet has seen continual advancement and with the advent of online technology, various types of web-based games have been developed. Games are frequently being used among different age groups from baby boomers to generation Z. Games are not only used for entertainment but also utilized as a learning approach transmitting education to a level that is more interesting and effective for students. One of the popular web-based education games is Kahoot with growing popularity and usage, which is being used in different fields of studies. However, little knowledge is available on university students’ perception of Kahoot environment and application for learning subjects. Hence, the objective of the current study is to investigate students’ perceptions of Kahoot application and environment as a learning tool. The study employed a survey approach by distributing Google Forms –created questionnaire, with high level of reliability index, to 62 students (11 males and 51 females). The findings show that students have positive attitudes towards Kahoot application and its environment for learning. Regarding Kahoot application, it was indicated that activities created using Kahoot are more interesting for students, Kahoot is useful for collaborative learning, and Kahoot enhances interest in learning lesson. In terms of Kahoot environment, it was found that using this application through mobile is easy for students, its design is simple and useful, Kahoot-created activities can easily be shared, and the application can easily be used on any platform. The findings of the study have implications for instructors, policymakers and curriculum developers.

Keywords: application, environment, Kahoot, learning tool

Procedia PDF Downloads 135
786 The Hotel Logging Behavior and Factors of Tourists in Bankontee District, Samut Songkhram Province, Thailand

Authors: Aticha Kwaengsopha

Abstract:

The purpose of this research was to study the behaviour and related factors that tourists utilized for making decisions to choose their accommodations at a tourist destination, Bangkontee district, Samut Songkhran Province, Thailand. The independent variables included gender, age, income, occupation, and region, while the three important dependent variables included selection behaviour, factors related selection process, and satisfaction of the accommodation service. A total of 400 Thai and international tourists were interviewed at tourist destination of Bangkontee. A questionnaire was used as the tool for collecting data. Descriptive statistics in this research included percentage, mean, and standard deviation. The findings revealed that the majority of respondents were single, female, and with the age between 23-30 years old. Most of the international tourists were from Asia and planned to stay in Thailand about 1-6 days. In addition, the majority of tourists preferred to travel in small groups of 3 persons. The majority of respondents used internet and word of mouth as the main tool to search for information. The majority of respondents spent most of their budget on food & drink, accommodation, and travelling. Even though the majority of tourists were satisfied with the quality of accommodation, the price range of accommodation, and the image of accommodation and the facilities of the accommodation, they indicated that they were not likely to re-visit Thailand in the near future.

Keywords: behaviour, decision factors, tourists, media engineering

Procedia PDF Downloads 276
785 Backwash Optimization for Drinking Water Treatment Biological Filters

Authors: Sarra K. Ikhlef, Onita Basu

Abstract:

Natural organic matter (NOM) removal efficiency using drinking water treatment biological filters can be highly influenced by backwashing conditions. Backwashing has the ability to remove the accumulated biomass and particles in order to regenerate the biological filters' removal capacity and prevent excessive headloss buildup. A lab scale system consisting of 3 biological filters was used in this study to examine the implications of different backwash strategies on biological filtration performance. The backwash procedures were evaluated based on their impacts on dissolved organic carbon (DOC) removals, biological filters’ biomass, backwash water volume usage, and particle removal. Results showed that under nutrient limited conditions, the simultaneous use of air and water under collapse pulsing conditions lead to a DOC removal of 22% which was significantly higher (p>0.05) than the 12% removal observed under water only backwash conditions. Employing a bed expansion of 20% under nutrient supplemented conditions compared to a 30% reference bed expansion while using the same amount of water volume lead to similar DOC removals. On the other hand, utilizing a higher bed expansion (40%) lead to significantly lower DOC removals (23%). Also, a backwash strategy that reduced the backwash water volume usage by about 20% resulted in similar DOC removals observed with the reference backwash. The backwash procedures investigated in this study showed no consistent impact on biological filters' biomass concentrations as measured by the phospholipids and the adenosine tri-phosphate (ATP) methods. Moreover, none of these two analyses showed a direct correlation with DOC removal. On the other hand, dissolved oxygen (DO) uptake showed a direct correlation with DOC removals. The addition of the extended terminal subfluidization wash (ETSW) demonstrated no apparent impact on DOC removals. ETSW also successfully eliminated the filter ripening sequence (FRS). As a result, the additional water usage resulting from implementing ETSW was compensated by water savings after restart. Results from this study provide insight to researchers and water treatment utilities on how to better optimize the backwashing procedure for the goal of optimizing the overall biological filtration process.

Keywords: biological filtration, backwashing, collapse pulsing, ETSW

Procedia PDF Downloads 274
784 Effective Use of Educational Technology for Teaching in Nigerian Colleges of Education

Authors: Edo O. Ekanem, Eme S. Ndeh, Ubong M. Nkok

Abstract:

The role of educational technology in teaching is of great importance because of its systematic way of conceptualizing the execution and evaluation of Educational process. This study therefore examines the use of Educational Technology for teaching in Colleges of Education in south south geo-political zone of Nigeria. Four specific purposes, four research questions and four null hypotheses guided the study. The study adopted descriptive research design of the survey type. A sample of 295 lecturers from six colleges of education was selected using stratified and simple random sampling techniques. The data for this study were collected through a self-designed questionnaire and was analyzed using frequency counts, percentage scores and t-test statistics. The hypotheses for the study were tested at 0.05 significance. Findings from the study reveal that Educational Technology facilities such as Internet, electronic notice boards and projectors were not adequately used for teaching in the Colleges. It was also found that most lecturers use more of visual media than electronic/digital media in the classrooms. Moreover, the study shows that lecturers’ use of educational technology is influenced by their highest academic qualification while their level of awareness about the value of technology in education is not gender based. Lecturers’ lack of competence, inadequate Educational Technology facilities and Power are among the factors that inhibit the adequate use of the facilities. Based on the findings, recommendations were made on how to ensure effective use of Educational Technology for teaching in the Colleges in Nigeria.

Keywords: colleges of education, educational technology, teaching, Nigeria

Procedia PDF Downloads 429
783 Availability, Accessibility and Utilization of Information and Communication Technology in Teaching and Learning Islamic Studies in Colleges of Education, North-Eastern, Nigeria

Authors: Bello Ali

Abstract:

The use of Information and Communication Technology (ICT) in tertiary institutions by lecturers and students has become a necessity for the enhancement of quality teaching and learning. This study examined availability, accessibility and utilization of ICT in Teaching-Learning Islamic Studies in Colleges of Education, North-East, Nigeria. The study adopted multi-stage sampling technique, in which, five out of the eleven Colleges of Education (both Federal and State owned) were purposively selected for the study. Primary data was drawn from the respondents by the use of questionnaire, interviews and observations. The results of the study, generally, indicate that the availability and accessibility to ICT facilities in Colleges of Education in North-East, Nigeria, especially in teaching/learning delivery of Islamic studies were relatively inadequate and rare to lecturers and students. The study further reveals that the respondents’ level of utilization of ICT is low and only few computer packages and internet services were involved in the ICT utilization, which is yet to reach the real expected situation of the globalization and advancement in the application of ICT if compared to other parts of the world, as far as the teaching and learning of Islamic studies is concerned. Observations and conclusion were drawn from the findings and finally, recommendations on how to improve on ICT availability, accessibility and utilization in teaching/ learning were suggested.

Keywords: accessibility, availability, college of education, ICT, Islamic studies, learning, North-East, teaching, utilization

Procedia PDF Downloads 364
782 Lightweight Hardware Firewall for Embedded System Based on Bus Transactions

Authors: Ziyuan Wu, Yulong Jia, Xiang Zhang, Wanting Zhou, Lei Li

Abstract:

The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method.

Keywords: IoT, security, SoC, bus architecture, lightweight hardware firewall, FPGA

Procedia PDF Downloads 63
781 Climate Crises: Consumers and Designers Attitude Towards Sustainability of Fast Fashion Products in Nigeria

Authors: Oluwambe Akinmoye

Abstract:

The textile industry in Nigeria has grown rapidly, fueled by rising demand for fast fashion driven by celebrity culture, fashion TV, and the Internet. However, this growth has come at a cost, with the industry contributing to environmental degradation, waste management crises, economic imbalances, and social injustices. This paper examines the attitudes of consumers and designers toward sustainability in the Nigerian textile and fast fashion industry. The study adopts a mixed-methods research design. Both qualitative and quantitative data were drawn from fast fashion consumers and designers. The sample of consumers and designers was determined using random and purposive sampling techniques. Data were elicited from the consumers and designers using questionnaires and focus group discussions, respectively, coupled with comprehensive literature reviews. The collected data were analyzed using descriptive statistics, content, and thematic analyses. Findings indicate that the strata of Nigerian society pay little attention to fast fashion sustainability. Conversely, designers have started to innovate and adopt sustainable practices by sourcing eco-friendly materials, yet they face significant barriers. The study emphasizes the need for a shift in the industry's approach to sustainability, with a greater concern on circular economy principles, sustainable materials, and fair labour practices.

Keywords: Fast fashion, textiles, sustainability, Climate crises, consumers, designers

Procedia PDF Downloads 9
780 Inertia Friction Pull Plug Welding, a New Weld Repair Technique of Aluminium Friction Stir Welding

Authors: Guoqing Wang, Yanhua Zhao, Lina Zhang, Jingbin Bai, Ruican Zhu

Abstract:

Friction stir welding with bobbin tool is a simple technique compared to conventional FSW since the backing fixture is no longer needed and assembling labor is reduced. It gets adopted more and more in the aerospace industry as a result. However, a post-weld problem, the left keyhole, has to be fixed by forced repair welding. To close the keyhole, the conventional fusion repair could be an option if the joint properties are not deteriorated; friction push plug welding, a forced repair, could be another except that a rigid support unit is demanded at the back of the weldment. Therefore, neither of the above ways is satisfaction in welding a large enclosed structure, like rocket propellant tank. Although friction pulls plug welding does not need a backing plate, the wide applications are still held back because of the disadvantages in respects of unappropriated tensile stress, (i.e. excessive stress causing neck shrinkage of plug that will bring about back defects while insufficient stress causing lack of heat input that will bring about face defects), complicated welding parameters (including rotation speed, transverse speed, friction force, welding pressure and upset),short welding time (approx. 0.5 sec.), narrow windows and poor stability of process. In this research, an updated technique called inertia friction pull plug welding, and its equipment was developed. The influencing rules of technological parameters on joint properties of inertia friction pull plug welding were observed. The microstructure characteristics were analyzed. Based on the elementary performance data acquired, the conclusion is made that the uniform energy provided by an inertia flywheel will be a guarantee to a stable welding process. Meanwhile, due to the abandon of backing plate, the inertia friction pull plug welding is considered as a promising technique in repairing keyhole of bobbin tool FSW and point type defects of aluminium base material.

Keywords: defect repairing, equipment, inertia friction pull plug welding, technological parameters

Procedia PDF Downloads 314
779 The Role of Media Relations in the Brand Image: Case Study in Three Brands of the Automobile Industry

Authors: Rosa Sobreira, Paula Arriscado

Abstract:

Marketers are aware that media relations is an important touch point, which is also cheaper, to bring their products and their brands to the consumer. They recognize the role of journalists as moderators and transformers of public opinion, and they realize their influence on brand image. And also, they know that readers, listeners, viewers and internet users "believe" more what they read, hear and see in the news than in an advertisement. The study is focused on the automotive industry and analyses the news published about three brands that share industrial facilities and components. We wanted to understand the role of the information created by the brand`s media team in the journalists’ work, and the impact on management, activation and differentiation of brands and their products` attributes and benefits. Based on a qualitative methodology, the analysis focused on press news, making comparison between media coverage and their “narratives” about the three cars from different brands. The results point to the fact that journalists easily integrate speech from the marks on their products. In the case of this study, we found that apart from the description of the many similarities between the three cars, the average speech also "struggled" for revealing the attributes that differentiate them. This interpretation of the results helps us to understand the "marriage" between branding and media. We believe also this paper let us to understand how journalists, through news, join the speech of the brands.

Keywords: brand management, media relations, differentiation, positioning

Procedia PDF Downloads 226