Search results for: employee security behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9349

Search results for: employee security behavior

7759 Universality and Synchronization in Complex Quadratic Networks

Authors: Anca Radulescu, Danae Evans

Abstract:

The relationship between a network’s hardwiring and its emergent dynamics are central to neuroscience. We study the principles of this correspondence in a canonical setup (in which network nodes exhibit well-studied complex quadratic dynamics), then test their universality in biological networks. By extending methods from discrete dynamics, we study the effects of network connectivity on temporal patterns, encapsulating long-term behavior into the rich topology of network Mandelbrot sets. Then elements of fractal geometry can be used to predict and classify network behavior.

Keywords: canonical model, complex dynamics, dynamic networks, fractals, Mandelbrot set, network connectivity

Procedia PDF Downloads 290
7758 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 129
7757 Behavioral Similarities between Perpetrators of School Violence and Having a Parent Incarcerated during Adolescence

Authors: Darynne Madison Dela Gente, Panayiota Courelli

Abstract:

Similarities in behavior between perpetrators of school violence and those with a parent in prison raise concern when considering the root causes of a student’s violent behavior. Dealing with parental incarceration is highly consequential on a student’s emotional well-being and may cause aggressive behavior that can lead to them becoming a perpetrator of school violence. These students are more likely to have interpersonal issues, antisocial tendencies, and a hostile demeanor, which are factors that closely align with indicators of an offender of violence. Developmental risk factors of parental incarceration are heavily understudied and often overlooked. This literature review aims to analyze the correlation between having a parent in prison and exhibiting physical or verbal aggression in a school environment. Furthermore, it strives to bring awareness to the inconsistencies in existing research and encourage a greater depth of study of the behavioral impacts, specifically in an academic setting. Furthermore, it will elaborate on the effectiveness of current intervention programs, such as Project Avary, Hope House, Kids Mates Inc., and Girl Scouts Beyond Bars, which provide immense support, as well as proposed methods of implementation in a school environment. Creating a space for these students to cope ultimately aids in the prevention of violent behaviors and intergenerational incarceration. Access to intervention programs, especially in schools located in areas with high rates of incarceration, would greatly reduce the risk of these students becoming perpetrators of school violence.

Keywords: adolescent behavior, adolescent mental health, parental incarceration, school violence prevention

Procedia PDF Downloads 79
7756 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 131
7755 Modeling of International Financial Integration: A Multicriteria Decision

Authors: Zouari Ezzeddine, Tarchoun Monaem

Abstract:

Despite the multiplicity of advanced approaches, the concept of financial integration couldn’t be an explicit analysis. Indeed, empirical studies appear that the measures of international financial integration are one-dimensional analyses. For the ambivalence of the concept and its multiple determinants, it must be analyzed in multidimensional level. The interest of this research is a proposal of a decision support by multicriteria approach for determining the positions of countries according to their international and financial dependencies links with the behavior of financial actors (trying to make governance decisions or diversification strategies of international portfolio ...

Keywords: financial integration, decision support, behavior, multicriteria approach, governance and diversification

Procedia PDF Downloads 508
7754 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 241
7753 Gender Differences in Risk Aversion Behavior: Case Study of Saudi Arabia and Jordan

Authors: Razan Salem

Abstract:

Men and women have different approaches towards investing, both in terms of strategies and risk attitudes. This study aims to focus mainly on investigating the financial risk behaviors of Arab women investors and to examine the financial risk tolerance levels of Arab women relative to Arab men investors. Using survey data on 547 Arab men and women investors, the results of Wilcoxon Signed-Rank (One-Sample) test Mann-Whitney U test reveal that Arab women are risk-averse investors and have lower financial risk tolerance levels relative to Arab men. Such findings can be explained by the fact of women's nature and lower investment literacy levels. Further, the current political uncertainty in the Arab region may be considered as another explanation of Arab women’s risk aversion behavior. The study's findings support the existing literature by validating the stereotype of “women are more risk-averse than men” in the Arab region. Overall, when it comes to investment and financial behaviors, women around the world behave similarly.

Keywords: Arab region, culture, financial risk behavior, gender differences, women investors

Procedia PDF Downloads 150
7752 Investigating the Molecular Behavior of H₂O in Caso 4 -2h₂o Two-Dimensional Nanoscale System

Authors: Manal Alhazmi, Artem Mishchenko

Abstract:

A molecular fluids' behavior and interaction with other materials at the nanoscale is a complex process. Nanoscale fluids behave so differently than macroscale fluids and interact with other materials in unique ways. It is, therefore, feasible to understand the molecular behavior of H₂O in such two-dimensional nanoscale systems by studying (CaSO4-2H2O), commonly known as gypsum. In the present study, spectroscopic measurements on a 2D structure of exfoliated gypsum crystals are carried out by Raman and IR spectroscopy. An array of gypsum flakes with thicknesses ranging from 8nm to 100nm were observed and analyzed for their Raman and IR spectrum. Water molecules stretching modes spectra lines were also measured and observed in nanoscale gypsum flakes and compared with those of bulk crystals. CaSO4-2H2O crystals have Raman and infrared bands at 3341 cm-1 resulting from the weak hydrogen bonds between the water molecules. This internal vibration of water molecules, together with external vibrations with other atoms, are responsible for these bands. There is a shift of about 70 cm-1 In the peak position of thin flakes with respect to the bulk crystal, which is a result of the different atomic arrangement from bulk to thin flake on the nano scale. An additional peak was observed in Raman spectra around 2910-3137 cm⁻¹ in thin flakes but is missing in bulk crystal. This additional peak is attributed to a combined mode of water internal (stretching mode at 3394cm⁻¹) and external vibrations. In addition to Raman and infra- red analysis of gypsum 2D structure, electrical measurements were conducted to reveal the water molecules transport behavior in such systems. Electrical capacitance of the fabricated device is measured and found to be (0.0686 *10-12) F, and the calculated dielectric constant (ε) is (12.26).

Keywords: gypsum, infra-red spectroscopy, raman spectroscopy, H₂O behavior

Procedia PDF Downloads 91
7751 An Effective Change in the Strategic Structure of Quality Management Systems: The Organization’s Needs Management

Authors: Joel Carlos Vieira Reinhardt, Mariana de Freitas Dewes, Odair Lelis Gonçalez

Abstract:

This paper proposes a method to implement a strategic framework for the quality management system that considers the analysis of prospective scenarios in the determination of policy, mission, vision, objectives, processes, monitoring, and goals. Semantic categorization of qualitative testimonial research on employee perception shows it was possible to implement an effective change in the organizations at the Department of Aerospace Science and Technology through the focus on the organization's needs management, producing a rupture with the historical managerial practice.

Keywords: management of company needs, mission, prospective scenarios, quality management, quality policy, vision

Procedia PDF Downloads 96
7750 Use of Structural Family Therapy and Dialectical Behavior Therapy with High-Conflict Couples

Authors: Eman Tadros, Natasha Finney

Abstract:

The following case study involving a high-conflict, Children’s Services Bureau (CSB) referred couple is analyzed and reviewed through an integrated lens of structural family therapy and dialectical behavior therapy. In structural family therapy, normal family development is not characterized by a lack of problems, but instead by families’ having developed a functional structure for dealing with their problems. Whereas, in dialectical behavioral therapy normal family development can be characterized by having a supportive and validating environment, where all family members feel a sense of acceptance and validation for who they are and where they are in life. The clinical case conceptualization highlights the importance of conceptualizing how change occurs within a therapeutic setting. In the current case study, the couple did not only experience high-conflict, but there were also issues of substance use, health issues, and other complicating factors. Clinicians should view their clients holistically and tailor their treatment to fit their unique needs. In this framework, change occurs within the family unit, by accepting each member as they are, while at the same time working together to change maladaptive familial structures.

Keywords: couples, dialectical behavior therapy, high-conflict, structural family therapy

Procedia PDF Downloads 328
7749 Energy Box Programme in the Netherlands

Authors: B. E. Weber, N. Vrielink, M. G. Rietbergen

Abstract:

This paper explores the long-term effects of the Energy Box trajectory on households in the private rental sector, specifically households experiencing energy poverty. The concept of energy poverty has been getting increasing attention among policymakers over the past few years. In the Netherlands, as far as we know, there are no national policies on alleviating energy poverty, which negatively impacts energy-poor households. The Energy Box can help households experiencing energy poverty by stimulating them to improve the energy efficiency of their home by changing their energy-saving behavior. Important long-term effects are that respondents indicate that they live in a more environmentally friendly way and that they save money on their energy bills. Households feel engaged with the concept of energy-saving and can see the benefits of changing their energy-saving behavior. Respondents perceived the Energy Box as a means to live more environmentally friendly, instead of it solely being a means to save money on energy bills. The findings show that most respondents signed up for the Energy Box are interested in energy-saving as a lifestyle choice instead of a financial choice, which would likely be the case for households experiencing energy poverty.

Keywords: energy-saving behavior, energy poverty, poverty, private rental sector

Procedia PDF Downloads 91
7748 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 279
7747 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 416
7746 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia

Authors: Rachel Thomas Tharmabalan

Abstract:

The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.

Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems

Procedia PDF Downloads 140
7745 Thermo-Mechanical Behavior of Steel-Wood Connections of Wooden Structures Under the Effect of a Fire

Authors: Ahmed Alagha, Belkacem Lamri, Abdelhak Kada.

Abstract:

Steel-wood assemblies often have complex geometric configurations whose overall behavior under the effect of a fire is conditioned by the thermal response, by combining the two materials steel and wood, whose thermal characteristics are greatly influenced by high temperatures. The objective of this work is to study the thermal behavior of a steel-wood connection, with or without insulating material, subjected to an ISO834 standard fire model. The analysis is developed by the analytical approach using the Eurocode, and numerically, by the finite element method, through the ANSYS calculation code. The design of the connections is evaluated at room temperature taking the cases of single shear and double shear. The thermal behavior of the connections is simulated in transient state while taking into account the modes of heat transfer by convection and by radiation. The variation of temperature as a function of time is evaluated in different positions of the connections while talking about the heat produced and the formation of the carbon layer. The results relate to the temperature distributions in the connection elements as a function of the duration of the fire. The results of the thermal analysis show that the temperature increases rapidly and reaches more than 260 °C in the steel material for an hour of exposure to fire. The temperature development in wood material is different from that in steel because of its thermal properties. Wood heats up on the outside and burns, its surface can reach very high temperatures in points on the surface.

Keywords: Eurocode 5, finite elements, ISO834, simple shear, thermal behaviour, wood-steel connection

Procedia PDF Downloads 67
7744 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 115
7743 Music Piracy Revisited: Agent-Based Modelling and Simulation of Illegal Consumption Behavior

Authors: U. S. Putro, L. Mayangsari, M. Siallagan, N. P. Tjahyani

Abstract:

National Collective Management Institute (LKMN) in Indonesia stated that legal music products were about 77.552.008 unit while illegal music products were about 22.0688.225 unit in 1996 and this number keeps getting worse every year. Consequently, Indonesia named as one of the countries with high piracy levels in 2005. This study models people decision toward unlawful behavior, music content piracy in particular, using agent-based modeling and simulation (ABMS). The classification of actors in the model constructed in this study are legal consumer, illegal consumer, and neutral consumer. The decision toward piracy among the actors is a manifestation of the social norm which attributes are social pressure, peer pressure, social approval, and perceived prevalence of piracy. The influencing attributes fluctuate depending on the majority of surrounding behavior called social network. There are two main interventions undertaken in the model, campaign and peer influence, which leads to scenarios in the simulation: positively-framed descriptive norm message, negatively-framed descriptive norm message, positively-framed injunctive norm with benefits message, and negatively-framed injunctive norm with costs message. Using NetLogo, the model is simulated in 30 runs with 10.000 iteration for each run. The initial number of agent was set 100 proportion of 95:5 for illegal consumption. The assumption of proportion is based on the data stated that 95% sales of music industry are pirated. The finding of this study is that negatively-framed descriptive norm message has a worse reversed effect toward music piracy. The study discovers that selecting the context-based campaign is the key process to reduce the level of intention toward music piracy as unlawful behavior by increasing the compliance awareness. The context of Indonesia reveals that that majority of people has actively engaged in music piracy as unlawful behavior, so that people think that this illegal act is common behavior. Therefore, providing the information about how widespread and big this problem is could make people do the illegal consumption behavior instead. The positively-framed descriptive norm message scenario works best to reduce music piracy numbers as it focuses on supporting positive behavior and subject to the right perception on this phenomenon. Music piracy is not merely economical, but rather social phenomenon due to the underlying motivation of the actors which has shifted toward community sharing. The indication of misconception of value co-creation in the context of music piracy in Indonesia is also discussed. This study contributes theoretically that understanding how social norm configures the behavior of decision-making process is essential to breakdown the phenomenon of unlawful behavior in music industry. In practice, this study proposes that reward-based and context-based strategy is the most relevant strategy for stakeholders in music industry. Furthermore, this study provides an opportunity that findings may generalize well beyond music piracy context. As an emerging body of work that systematically constructs the backstage of law and social affect decision-making process, it is interesting to see how the model is implemented in other decision-behavior related situation.

Keywords: music piracy, social norm, behavioral decision-making, agent-based model, value co-creation

Procedia PDF Downloads 175
7742 Dealing the Disruptive Behaviour amongst Students with Autism through Circus

Authors: K. A. Razhiyah

Abstract:

Disruptive behavior is a problem that is usually associated with those with autism. There is a need to overcome this behavioral problem because the negative impact of this problem does not only effect the social relation of the students but also can cause uneasiness to those around them. This condition will be worse if the techniques used failed to motivate students to change the behaviour. The purpose of this study was to determine the effect of the circus games technique on the disruptive behavior amongst students with autism. The positive results of the intervention that was carried out for three months show the reduction in disruptive behaviour, and also improvement in the turn-taking and focusing ability aspect. Positive changes shown by the students had an encouraging effect and in a way are helping them in the teaching and learning process.

Keywords: autism, desruptive behaviour, circus, effect

Procedia PDF Downloads 227
7741 Associated Map and Inter-Purchase Time Model for Multiple-Category Products

Authors: Ching-I Chen

Abstract:

The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.

Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce

Procedia PDF Downloads 353
7740 Improvement of Buckling Behavior of Cold Formed Steel Uprights with Open Cross Section Used in Storage Rack Systems

Authors: Yasar Pala, Safa Senaysoy, Emre Calis

Abstract:

In this paper, structural behavior and improvement of buckling behavior of cold formed steel uprights with open cross-section used storage rack system are studied. As a first step, in the case of a stiffener having an inclined part on the flange, experimental and nonlinear finite element analysis are carried out for three different upright lengths. In the uprights with long length, global buckling is observed while distortional buckling and local buckling are observed in the uprights with medium length and those with short length, respectively. After this point, the study is divided into two groups. One of these groups is the case where the stiffener on the flange is folded at 90°. For this case, four different distances of the stiffener from the web are taken into account. In the other group, the case where different depth of stiffener on the web is considered. Combining experimental and finite element results, the cross-section giving the ultimate critical buckling load is selected.

Keywords: steel, upright, buckling, modes, nonlinear finite element analysis, optimization

Procedia PDF Downloads 246
7739 Study the Behavior of Different Composite Short Columns (DST) with Prismatic Sections under Bending Load

Authors: V. Sadeghi Balkanlou, M. Reza Bagerzadeh Karimi, A. Hasanbakloo, B. Bagheri Azar

Abstract:

In this paper, the behavior of different types of DST columns has been studied under bending load. Briefly, composite columns consist of an internal carbon steel tube and an external stainless steel wall that the between the walls are filled with concrete. Composite columns are expected to combine the advantages of all three materials and have the advantage of high flexural stiffness of CFDST columns. In this research, ABAQUS software is used for finite element analysis then the results of ultimate strength of the composite sections are illustrated.

Keywords: DST, stainless steel, carbon steel, ABAQUS, straigh columns, tapered columns

Procedia PDF Downloads 368
7738 A Hybrid Model of Structural Equation Modelling-Artificial Neural Networks: Prediction of Influential Factors on Eating Behaviors

Authors: Maryam Kheirollahpour, Mahmoud Danaee, Amir Faisal Merican, Asma Ahmad Shariff

Abstract:

Background: The presence of nonlinearity among the risk factors of eating behavior causes a bias in the prediction models. The accuracy of estimation of eating behaviors risk factors in the primary prevention of obesity has been established. Objective: The aim of this study was to explore the potential of a hybrid model of structural equation modeling (SEM) and Artificial Neural Networks (ANN) to predict eating behaviors. Methods: The Partial Least Square-SEM (PLS-SEM) and a hybrid model (SEM-Artificial Neural Networks (SEM-ANN)) were applied to evaluate the factors affecting eating behavior patterns among university students. 340 university students participated in this study. The PLS-SEM analysis was used to check the effect of emotional eating scale (EES), body shape concern (BSC), and body appreciation scale (BAS) on different categories of eating behavior patterns (EBP). Then, the hybrid model was conducted using multilayer perceptron (MLP) with feedforward network topology. Moreover, Levenberg-Marquardt, which is a supervised learning model, was applied as a learning method for MLP training. The Tangent/sigmoid function was used for the input layer while the linear function applied for the output layer. The coefficient of determination (R²) and mean square error (MSE) was calculated. Results: It was proved that the hybrid model was superior to PLS-SEM methods. Using hybrid model, the optimal network happened at MPLP 3-17-8, while the R² of the model was increased by 27%, while, the MSE was decreased by 9.6%. Moreover, it was found that which one of these factors have significantly affected on healthy and unhealthy eating behavior patterns. The p-value was reported to be less than 0.01 for most of the paths. Conclusion/Importance: Thus, a hybrid approach could be suggested as a significant methodological contribution from a statistical standpoint, and it can be implemented as software to be able to predict models with the highest accuracy.

Keywords: hybrid model, structural equation modeling, artificial neural networks, eating behavior patterns

Procedia PDF Downloads 127
7737 Biodiversity of the National Production through Companion Plants Analysis

Authors: Astrid Rivera, Diego Villatoro

Abstract:

The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.

Keywords: biodiversity, food security, companion plats, nutrition

Procedia PDF Downloads 182
7736 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035

Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo

Abstract:

This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.

Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases

Procedia PDF Downloads 77
7735 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 254
7734 Spin Resolved Electronic Behavior of Zno Nanoribbons

Authors: Serkan Caliskan

Abstract:

The aim of this study is to understand the spin-resolved properties of ZnO armchair and zigzag nanoribbons. The spin polarization can be induced by either geometry of the nanoribbons or ferromagnetic electrodes. Hence, spin-dependent behavior is revealed in these nanostructures in the absence of external magnetic field. Both electronic structure and magnetic properties of the nanoribbons are analyzed, employing first-principles calculations through Density Functional Theory. The relevant properties using the spin-dependent band structure, conductance, transmission, density of states and magnetic moment are elucidated. These results can be utilized to describe the nanoscale structures and stimulate the experimental works.

Keywords: first principles, spin polarized transport, ZnO device, ZnO nanoribbons

Procedia PDF Downloads 174
7733 Thermal Analysis of a Composite of Coco Fiber and Látex

Authors: Elmo Thiago Lins Cöuras Ford, Valentina Alessandra Carvalho do Vale

Abstract:

Given the unquestionable need of environmental preservation, the natural fibers have been seen as a salutary alternative for production of composites in substitution to the synthetic fibers, vitreous and metallic. In this work, the behavior of a composite was analyzed done with fiber of the peel of the coconut as reinforcement and latex as head office, when submitted the source of heat. The temperature profiles were verified in the internal surfaces and it expresses of the composite as well as the temperature gradient in the same. It was also analyzed the behavior of this composite when submitted to a cold source. As consequence, in function of the answers of the system, conclusions were reached.

Keywords: natural fiber, composite, temperature, latex, gradient

Procedia PDF Downloads 793
7732 Towards A New Maturity Model for Information System

Authors: Ossama Matrane

Abstract:

Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.

Keywords: information system, maturity models, information security management, OPM3, IT governance

Procedia PDF Downloads 426
7731 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 100
7730 Comparative Study on the Precipitation Behavior in Two Al-Mg Alloys (Al-12 wt. % Mg and Al-8 wt. % Mg)

Authors: C. Amrane, D. Haman

Abstract:

Aluminum-magnesium alloys are widely used in industry thanks to their mechanical properties and corrosion resistivity. These properties are related to the magnesium content and to the applied heat treatments. Although they are already well studied, questions concerning the microstructural stability and the effect of different heat treatments are still being asked. In this work we have presented a comparative study on the behavior of the precipitation reactions during different heat treatment in two different Al-Mg alloys (Al–8 wt. % Mg and Al–12 wt. % Mg). For this purpose, we have used various experimental techniques as dilatometry, calorimetry, optical microscopy, and microhardness measurements. The obtained results shown that, the precipitation kinetics and the mechanical responses to the applied heat treatments, of the two studied alloys, are different.

Keywords: Al-Mg alloys, precipitation, hardness, heat treatments

Procedia PDF Downloads 367