Search results for: information behavior
14923 Microstructure and High Temperature Deformation Behavior of Cast 310S Alloy
Authors: Jung-Ho Moon, Myung-Gon Yoon, Tae Kwon Ha
Abstract:
High temperature deformation behavior of cast 310S stainless steel has been investigated in this study by performing tensile and compression tests at temperatures from 900 to 1200°C. Rectangular ingots of which the dimensions were 350×350×100 in millimeter were cast using vacuum induction melting. Phase equilibrium was calculated using the FactSage®, thermodynamic software and database. Thermal expansion coefficient was also measured on the ingot in the temperature range from room temperature to 1200°C. Tensile strength of cast 310S stainless steel was 9 MPa at 1200°C, which is a little higher than that of a wrought 310S. With temperature decreased, tensile strength increased rapidly and reached up to 72 MPa at 900°C. Elongation also increased with temperature decreased. Microstructure observation revealed that σ phase was precipitated along the grain boundary and within the matrix over 1200°C, which is detrimental to high temperature elongation.Keywords: stainless steel, STS 310S, high temperature deformation, microstructure, mechanical properties
Procedia PDF Downloads 40114922 E-Hailing Taxi Industry Management Mode Innovation Based on the Credit Evaluation
Authors: Yuan-lin Liu, Ye Li, Tian Xia
Abstract:
There are some shortcomings in Chinese existing taxi management modes. This paper suggests to establish the third-party comprehensive information management platform and put forward an evaluation model based on credit. Four indicators are used to evaluate the drivers’ credit, they are passengers’ evaluation score, driving behavior evaluation, drivers’ average bad record number, and personal credit score. A weighted clustering method is used to achieve credit level evaluation for taxi drivers. The management of taxi industry is based on the credit level, while the grade of the drivers is accorded to their credit rating. Credit rating determines the cost, income levels, the market access, useful period of license and the level of wage and bonus, as well as violation fine. These methods can make the credit evaluation effective. In conclusion, more credit data will help to set up a more accurate and detailed classification standard library.Keywords: credit, mobile internet, e-hailing taxi, management mode, weighted cluster
Procedia PDF Downloads 32614921 College Students’ Multitasking and Its Causes
Authors: Huey-Wen Chou, Shuo-Heng Liang
Abstract:
This study focuses on studying college students’ multitasking with cellphones/laptops during lectures. In-class multitasking behavior is defined as the activities students engaged that are irrelevant to learning. This study aims to understand if students' learning engagement affects students' multitasking as well as to investigate the causes or motivations that contribute to the occurrence of multitasking behavior. Survey data were collected and analyzed by PLS method and multiple regression to test the research model and hypothesis. Major results include: 1. Students' multitasking motivation positively predicts students’ in-class multitasking. 2. Factors affecting multitasking in class, including efficiency, entertainment and social needs, significantly impact on multitasking. 3. Polychronic personality traits will positively predict students’ multitasking. 4. Students' classroom learning engagement negatively predicts multitasking. 5. Course attributes negatively predict student learning engagement and positively predict student multitasking.Keywords: engagement, monochronic personality, multitasking, learning, personality traits
Procedia PDF Downloads 13414920 The Role of Social Media on Political Behaviour in Malaysia
Authors: Ismail Sualman, Mohd Khairuddin Othman
Abstract:
General Election has been the backbone of democracy that permits people to choose their representatives as they deem fit. The support preferences of the voter differ from one to another, particularly in a plural society like Malaysia. The turning up of high numbers of young voters during the Malaysia 14th General Election has been said to have been caused by social media including Facebook, Twitter, WhatsApp, Instagram, YouTube and Telegram, WeChat and SMS/MMs. It has been observed that, besides using social media as an interaction tool among social friends, it is also an important source of information to know about issues, politics and politicians. This paper exhibits the role of social media in providing political information to young voters, before an election and during the election campaign. This study examines how this information is being translated into election support. A total of 799 Malay young respondents in Selangor have been surveyed and interviewed. This study revealed that social media has become the source of political information among Malay young voters. This research suggested that social media had a significant effect on the support during the election. Social media plays an important role in carrying information such as current issues, voting trends, candidate imagery and matters that may influence the view of young voters. The information obtained from social media has been translated into a voting decision.Keywords: social media, political behaviour, voters’ choice, election.
Procedia PDF Downloads 14814919 Improving Biodegradation Behavior of Fabricated WE43 Magnesium Alloy by High-Temperature Oxidation
Authors: Jinge Liu, Shuyuan Min, Bingchuan Liu, Bangzhao Yin, Bo Peng, Peng Wen, Yun Tian
Abstract:
WE43 magnesium alloy can be additively manufactured via laser powder bed fusion (LPBF) for biodegradable applications, but the as-built WE43 exhibits an excessively rapid corrosion rate. High-temperature oxidation (HTO) was performed on the as-built WE43 to improve its biodegradation behavior. A sandwich structure including an oxide layer at the surface, a transition layer in the middle, and the matrix was generated influenced by the oxidation reaction and diffusion of RE atoms when heated at 525 ℃for 8 hours. The oxide layer consisted of Y₂O₃ and Nd₂O₃ oxides with a thickness of 2-3 μm. The transition layer is composed of α-Mg and Y₂O₃ with a thickness of 60-70 μm, while Mg24RE5 could be observed except α-Mg and Y₂O₃. The oxide layer and transition layer appeared to have an effective passivation effect. The as-built WE43 lost 40% weight after the in vitro immersion test for three days and finally broke into debris after seven days of immersion. The high-temperature oxidation samples kept the structural integrity and lost only 6.88 % weight after 28-day immersion. The corrosion rate of HTO samples was significantly controlled, which improved the biocompatibility of the as-built WE43 at the same time. The samples after HTO had better osteogenic capability according to ALP activity. Moreover, as built WE43 performed unqualified in cell adhesion and hemolytic test due to its excessively rapid corrosion rate. While as for HTO samples, cells adhered well, and the hemolysis ratio was only 1.59%.Keywords: laser powder bed fusion, biodegradable metal, high temperature oxidation, biodegradation behavior, WE43
Procedia PDF Downloads 10614918 Biodegradation Behavior of Cellulose Acetate with DS 2.5 in Simulated Soil
Authors: Roberta Ranielle M. de Freitas, Vagner R. Botaro
Abstract:
The relationship between biodegradation and mechanical behavior is fundamental for studies of the application of cellulose acetate films as a possible material for biodegradable packaging. In this work, the biodegradation of cellulose acetate (CA) with DS 2.5 was analyzed in simulated soil. CA films were prepared by casting and buried in the simulated soil. Samples were taken monthly and analyzed, the total time of biodegradation was 6 months. To characterize the biodegradable CA, the DMA technique was employed. The main result showed that the time of exposure to the simulated soil affects the mechanical properties of the films and the values of crystallinity. By DMA analysis, it was possible to conclude that as the CA is biodegraded, its mechanical properties were altered, for example, storage modulus has increased with biodegradation and the modulus of loss has decreased. Analyzes of DSC, XRD, and FTIR were also carried out to characterize the biodegradation of CA, which corroborated with the results of DMA. The observation of the carbonyl band by FTIR and crystalline indices obtained by XRD were important to evaluate the degradation of CA during the exposure time.Keywords: biodegradation, cellulose acetate, DMA, simulated soil
Procedia PDF Downloads 21814917 Efficient GIS Based Public Health System for Disease Prevention
Authors: K. M. G. T. R. Waidyarathna, S. M. Vidanagamachchi
Abstract:
Public Health System exists in Sri Lanka has a satisfactory complete information flow when compared to other systems in developing countries. The availability of a good health information system contributed immensely to achieve health indices that are in line with the developed countries like US and UK. The health information flow at the moment is completely paper based. In Sri Lanka, the fields like banking, accounting and engineering have incorporated information and communication technology to the same extent that can be observed in any other country. The field of medicine has behind those fields throughout the world mainly due to its complexity, issues like privacy, confidentially and lack of people with knowledge in both fields of Information Technology (IT) and Medicine. Sri Lanka’s situation is much worse and the gap is rapidly increasing with huge IT initiatives by private-public partnerships in all other countries. The major goal of the framework is to support minimizing the spreading diseases. To achieve that a web based framework should be implemented for this application domain with web mapping. The aim of this GIS based public health system is a secure, flexible, easy to maintain environment for creating and maintaining public health records and easy to interact with relevant parties.Keywords: DHIS2, GIS, public health, Sri Lanka
Procedia PDF Downloads 56514916 How Cyber Insurers and Managed Security Companies Influence the Content and Meaning of Privacy Law and Cybersecurity Compliance
Authors: Shauhin Talesh
Abstract:
Cyber risks--loss exposure associated with the use of electronic equipment, computers, information technology, and virtual reality--are among the biggest threats facing businesses and consumers. Despite these threats, private organizations are not significantly changing their behavior in response. Although many organizations do have formal cybersecurity policies in place, the majority believe they are insufficiently prepared for cybersecurity incidences, and have not conducted proper risk assessments or invested necessary training and resources to protect consumers’ electronic information. Drawing on empirical observations over the past 5 years, this article explains why insurers who manage cybersecurity and privacy law compliance among organizations have not been more successful in curtailing breaches. The analysis draws on Talesh's “new institutional theory of insurance,” which explains how insurers shape the content and meaning of law among organizations that purchase insurance. In response to vague and fragmented privacy laws and a lack of strong government oversight, insurers offer cyber insurance and a series of risk-management services to their customers. These services convey legitimacy to the public and to the insureds but fall short of improving the robustness of organizations, rendering them largely symbolic. Cyber insurers and managed security companies have flooded the market with high-level technical tools that they claim mitigate risk, but all they've really accomplished is to institutionalize a norm that policyholders need these tools to avoid cybersecurity incidents. Federal and state regulators and industry-based rating agencies have deferred to cyber insurers without evidence that these tools actually improve security.Keywords: regulation, compliance, insurance, cybersecurity, privacy law, organizations, risk management
Procedia PDF Downloads 1114915 The Coexistence of Quality Practices and Frozen Concept in R and D Projects
Authors: Ayala Kobo-Greenhut, Amos Notea, Izhar Ben-Shlomo
Abstract:
In R&D projects, there is no doubt about the need to change a current concept to an alternative one over time (i.e., concept leaping). Concept leaping is required since with most R&D projects uncertainty is present as they take place in dynamic environments. Despite the importance of concept leaping when needed, R&D teams may fail to do so (i.e., frozen concept). This research suggests a possible reason why frozen concept happens in the framework of quality engineering and control engineering. We suggest that frozen concept occurs since concept determines the derived plan and its implementation may be considered as equivalent to a closed-loop process, and is subject to the problem of not recognizing gaps as failures. We suggest that although implementing quality practices into an R&D project’s routine has many advantages, it intensifies the frozen concept problem since working according to quality practices relates to exploitation of learning behavior, while leaping to a new concept relates to exploring learning behavior.Keywords: closed loop, control engineering, design, leaping, frozen concept, quality engineering, quality practices
Procedia PDF Downloads 47314914 Evaluating the Educational Intervention Based on Web and Integrative Model of Behavior Prediction to Promote Physical Activities and HS-CRP Factor among Nurses
Authors: Arsalan Ghaderi
Abstract:
Introduction: Inactivity is one of the most important risk factors for cardiovascular disease. According to the study prevalence of inactivity in Iran, about 67.5% and in the staff, and especially nurses, are similar. The inflammatory index (HS-CRP) is highly predictive of the progression of these diseases. Physical activity education is very important in preventing these diseases. One of the modern educational methods is web-based theory-based education. Methods: This is a semi-experimental interventional study which was conducted in Isfahan and Kurdistan universities of medical sciences in two stages. A cross-sectional study was done to determine the status of physical activity and its predictive factors. Then, intervention was performed, and six months later the data were retrieved. The data was collected using a demographic questionnaire, an integrative model of behavior prediction constructs, a standard physical activity questionnaire and (HS-CRP) test. Data were analyzed by SPSS software. Results: Physical activity was low in 66.6% of nurses, 25.4% were moderate and 8% severe. According to Pearson correlation matrix, the highest correlation was found between behavioral intention and skill structures (0.553**), subjective norms (0.222**) and self-efficacy (0.198**). The relationship between age and physical activity in the first study was reverse and significant. After intervention, there was a significant change in attitudes, self-efficacy, skill and behavioral intention in the intervention group. This change was significant in attitudes, self-efficacy and environmental conditions of the control group. HS-CRP index decreased significantly after intervention in both groups, but there was not a significant relationship between inflammatory index and physical activity score. The change in physical activity level was significant only in the control group. Conclusion: Despite the effect of educational intervention on attitude, self-efficacy, skill, and behavioral intention, the results showed that if factors such as environmental factors are not corrected, training and changing structures cannot lead to physical activity behavior. On the other hand, no correlation between physical activity and HS-CRP showed that this index can be influenced by other factors, and this should be considered in any intervention to reduce the HS-CRP index.Keywords: HS-CRP, integrative model of behavior prediction, physical activity, nurses, web-based education
Procedia PDF Downloads 11714913 Experimental Characterization of the AA7075 Aluminum Alloy Using Hot Shear Tensile Test
Authors: Trunal Bhujangrao, Catherine Froustey, Fernando Veiga, Philippe Darnis, Franck Girot Mata
Abstract:
The understanding of the material behavior under shear loading has great importance for a researcher in manufacturing processes like cutting, machining, milling, turning, friction stir welding, etc. where the material experiences large deformation at high temperature. For such material behavior analysis, hot shear tests provide a useful means to investigate the evolution of the microstructure at a wide range of temperature and to improve the material behavior model. Shear tests can be performed by direct shear loading (e.g. torsion of thin-walled tubular samples), or appropriate specimen design to convert a tensile or compressive load into shear (e.g. simple shear tests). The simple shear tests are straightforward and designed to obtained very large deformation. However, many of these shear tests are concerned only with the elastic response of the material. It is becoming increasingly important to capture a plastic response of the material. Plastic deformation is significantly more complex and is known to depend more heavily on the strain rate, temperature, deformation, etc. Besides, there is not enough work is done on high-temperature shear loading, because of geometrical instability occurred during the plastic deformation. The aim of this study is to design a new shear tensile specimen geometry to convert the tensile load into dominant shear loading under plastic deformation. Design of the specimen geometry is based on FEM. The material used in this paper is AA7075 alloy, tested quasi statically under elevated temperature. Finally, the microstructural changes taking place duringKeywords: AA7075 alloy, dynamic recrystallization, edge effect, large strain, shear tensile test
Procedia PDF Downloads 14914912 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security
Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama
Abstract:
This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach
Procedia PDF Downloads 29214911 Receptiveness of Market Segmentation Towards Online Shopping Attitude: A Quality Management Strategy for Online Passenger Car Market
Authors: Noor Hasmini Abdghani, Nik Kamariah Nikmat, Nor Hayati Ahmad
Abstract:
Rapid growth of the internet technology led to changes in the consumer lifestyles. This involved customer buying behaviour-based internet that create new kind of buying strategy. Hence, it has summoned many of world firms including Malaysia to generate new quality strategy in preparation to face new customer buying lifestyles. Particularly, this study focused on identifying online customer segment of automobile passenger car customers. Secondly, the objective is to understand online customer’s receptiveness towards internet technologies. This study distributed 700 questionnaires whereby 582 were returned representing 83% response rate. The data were analysed using factor and regression analyses. The result from the factor analysis precipitates four online passenger car segmentations in Malaysia, which are: Segment (1)- Automobile Online shopping Preferences, Segment (2)- Automobile Online Brand Comparison, Segment (3)- Automobile Online Information Seeking and Segment (4)- Automobile Offline Shopping Preferences. In understanding the online customer’s receptiveness towards internet, the regression result shows that there is significant relationship between each of four segments of online passenger car customer with attitude towards automobile online shopping. This implies that, for online customers to have receptiveness toward internet technologies, he or she must have preferences toward online shopping or at least prefer to browse any related information online even if the actual purchase is made at the traditional store. With this proposed segmentation strategy, the firms especially the automobile firms will be able to understand their online customer behavior. At least, the proposed segmentation strategy will help the firms to strategize quality management approach for their online customers’ buying decision making.Keywords: Automobile, Market Segmentation, Online Shopping Attitude, Quality Management Strategy
Procedia PDF Downloads 54114910 Simulation of Dynamic Behavior of Seismic Isolators Using a Parallel Elasto-Plastic Model
Authors: Nicolò Vaiana, Giorgio Serino
Abstract:
In this paper, a one-dimensional (1d) Parallel Elasto- Plastic Model (PEPM), able to simulate the uniaxial dynamic behavior of seismic isolators having a continuously decreasing tangent stiffness with increasing displacement, is presented. The parallel modeling concept is applied to discretize the continuously decreasing tangent stiffness function, thus allowing to simulate the dynamic behavior of seismic isolation bearings by putting linear elastic and nonlinear elastic-perfectly plastic elements in parallel. The mathematical model has been validated by comparing the experimental force-displacement hysteresis loops, obtained testing a helical wire rope isolator and a recycled rubber-fiber reinforced bearing, with those predicted numerically. Good agreement between the simulated and experimental results shows that the proposed model can be an effective numerical tool to predict the forcedisplacement relationship of seismic isolators within relatively large displacements. Compared to the widely used Bouc-Wen model, the proposed one allows to avoid the numerical solution of a first order ordinary nonlinear differential equation for each time step of a nonlinear time history analysis, thus reducing the computation effort, and requires the evaluation of only three model parameters from experimental tests, namely the initial tangent stiffness, the asymptotic tangent stiffness, and a parameter defining the transition from the initial to the asymptotic tangent stiffness.Keywords: base isolation, earthquake engineering, parallel elasto-plastic model, seismic isolators, softening hysteresis loops
Procedia PDF Downloads 28314909 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm
Authors: Vaibhav Barve
Abstract:
Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.Keywords: data embedding, decryption, encryption, reversible data hiding, steganography
Procedia PDF Downloads 28814908 Production of Metal Matrix Composites with Diamond for Abrasive Cutting Resistance by Gas Infiltration Casting
Authors: Haydar S. Al Shabbani, M. Marshall, R. Goodall
Abstract:
Metal matrix composites (MMCs) have been explored for many applications for many decades. Recently, this includes investigations for thermal applications associated with electronics, such as in heat sinks. Here, to promote thermal conductivity, composites of a metal matrix with diamond particles are used. However, this class of composites has not yet been extensively examined for mechanical and tribological behavior, especially for applications that require extreme mechanical and tribological strength, such as the resistance to abrasive cutting. Therefore, this research seeks to develop a composite material with metal matrix and diamond particles which resist abrasive and cutting forces. The development progresses through a series of steps, exploring methods to process the material, understanding the mechanics of abrasive behavior and optimizing the composite structure to resist abrasive cutting. In processing, infiltration casting under gas pressure has been applied to molten aluminum to obtain a significant penetration of the metal into a preform of diamond particles. Different diamond particle sizes were used with different surface modifications (coated/uncoated), and to compare resulting composites with the same particle sizes. Al-1 wt.% Mg as a matrix alloy was utilised to investigate the possible effect of Mg on bonding phases during the infiltration process. The mechanical behavior and microstructure of the materials produced have been characterised. These tests showed that the surface modification of the diamond particles with a reactive material (Ti-coating) has an important role for enhancing the bonding between the aluminium matrix and diamond reinforcement as apparent under SEM observation. The effect of this improved bond is seen in the cutting resistance of the material.Keywords: aluminium, composites, diamond, Ti-coated, tribology
Procedia PDF Downloads 27114907 Effect of Surface Treatments on the Cohesive Response of Nylon 6/silica Interfaces
Authors: S. Arabnejad, D. W. C. Cheong, H. Chaobin, V. P. W. Shim
Abstract:
Debonding is the one of the fundamental damage mechanisms in particle field composites. This phenomenon gains more importance in nano composites because of the extensive interfacial region present in these materials. Understanding the debonding mechanism accurately, can help in understanding and predicting the response of nano composites as the interface deteriorates. The small length scale of the phenomenon makes the experimental characterization complicated and the results of it, far from real physical behavior. In this study the damage process in nylon-6/silica interface is examined through Molecular Dynamics (MD) modeling and simulations. The silica has been modeled with three forms of surfaces – without any surface treatment, with the surface treatment of 3-aminopropyltriethoxysilane (APTES) and with Hexamethyldisilazane (HMDZ) surface treatment. The APTES surface modification used to create functional groups on the silica surface, reacts and form covalent bonds with nylon 6 chains while the HMDZ surface treatment only interacts with both particle and polymer by non-bond interaction. The MD model in this study uses a PCFF force field. The atomic model is generated in a periodic box with a layer of vacuum on top of the polymer layer. This layer of vacuum is large enough that assures us from not having any interaction between particle and substrate after debonding. Results show that each of these three models show a different traction separation behavior. However, all of them show an almost bilinear traction separation behavior. The study also reveals a strong correlation between the length of APTES surface treatment and the cohesive strength of the interface.Keywords: debonding, surface treatment, cohesive response, separation behaviour
Procedia PDF Downloads 46014906 Prediction of Solidification Behavior of Al Alloy in a Cube Mold Cavity
Authors: N. P. Yadav, Deepti Verma
Abstract:
This paper focuses on the mathematical modeling for solidification of Al alloy in a cube mould cavity to study the solidification behavior of casting process. The parametric investigation of solidification process inside the cavity was performed by using computational solidification/melting model coupled with Volume of fluid (VOF) model. The implicit filling algorithm is used in this study to understand the overall process from the filling stage to solidification in a model metal casting process. The model is validated with past studied at same conditions. The solidification process are analyzed by including the effect of pouring velocity and temperature of liquid metal, effect of wall temperature as well natural convection from the wall and geometry of the cavity. These studies show the possibility of various defects during solidification process.Keywords: buoyancy driven flow, natural convection driven flow, residual flow, secondary flow, volume of fluid
Procedia PDF Downloads 41714905 An Improved Image Steganography Technique Based on Least Significant Bit Insertion
Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo
Abstract:
In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.Keywords: steganography, image steganography, least significant bits, bit map image
Procedia PDF Downloads 26714904 A Study of Human Communication in an Internet Community
Authors: Andrew Laghos
Abstract:
The Internet is a big part of our everyday lives. People can now access the internet from a variety of places including home, college, and work. Many airports, hotels, restaurants and cafeterias, provide free wireless internet to their visitors. Using technologies like computers, tablets, and mobile phones, we spend a lot of our time online getting entertained, getting informed, and communicating with each other. This study deals with the latter part, namely, human communication through the Internet. People can communicate with each other using social media, social network sites (SNS), e-mail, messengers, chatrooms, and so on. By connecting with each other they form virtual communities. Regarding SNS, types of connections that can be studied include friendships and cliques. Analyzing these connections is important to help us understand online user behavior. The method of Social Network Analysis (SNA) was used on a case study, and results revealed the existence of some useful patterns of interactivity between the participants. The study ends with implications of the results and ideas for future research.Keywords: human communication, internet communities, online user behavior, psychology
Procedia PDF Downloads 49814903 Effectiveness of the Use of Polycarboxylic Ether Superplasticizers in High Performance Concrete Containing Silica Fume
Authors: Alya Harichane, Badreddine Harichane
Abstract:
The incorporation of polycarboxylate ether superplasticizer (PCE) and silica fume (SF) in high-performance concretes (HPC) leads to the achievement of remarkable rheological and mechanical improvements. In the fresh state, PCEs are adsorbed on cement particles and dispersants, in turn promoting the workability of the concrete. Silica fume enables a very well compacted concrete to be obtained, which is characterized by high mechanical parameters in its hardened state. Some PCEs are incompatible with silica fume, which can result in the loss of slump and in poor rheological behavior. The main objective of the research is the study of the influence of three types of PCEs, which all have a different molecular architecture, on the rheological and mechanical behavior of high-performance concretes containing 10% of SF as a partial replacement of cement. The results show that the carboxylic density of PCE has an influence on its compatibility with SF.Keywords: polycarboxylate-ether superplasticizer, rheology, compressive strength, high-performance concrete, silica fume
Procedia PDF Downloads 7614902 Applied Behavior Analysis and Speech Language Pathology Interprofessional Practice to Support Autistic Children with Complex Communication Needs
Authors: Kimberly Ho, Maeve Donnelly
Abstract:
In this paper, a speech-language pathologist (SLP) and Board Certified Behavior Analysts® (BCBA) with a combined professional experience of almost 50 years will discuss their experiences working with individuals on the autism spectrum. Some autistic children require augmentative and alternative communication (AAC) to meet their communication needs. These learners present with unique strengths and challenges, often requiring intervention from a team of professionals to generalize skills across environments. Collaboration between SLPs and BCBAs will be discussed in terms of strengths and challenges. Applied behavior analysis (ABA) will be defined and explained in the context of the treatment of learners on the autism spectrum with complex communication needs (CCN). The requirement for collaboration will be discussed by the governing boards for both BCBAs and SLPs. The strengths of each discipline will be compared along with difficulties faced when professionals experience disciplinary centrism. The challenges in teaching autistic learners with CCN will be reviewed. Case studies will be shared in which BCBAs and SLPs engage in interprofessional practice to support autistic children who use AAC to participate in a social skills group. Learner outcomes will be shared and assessed through both an SLP and BCBA perspective. Finally, ideas will be provided to promote the interprofessional practice, including establishing a shared framework, avoiding professional jargon and moving towards common terminology, and focusing on the data to ensure the efficacy of treatment.Keywords: autism, cross disciplinary collaboration, augmentative and alternative communication, generalization
Procedia PDF Downloads 12614901 A PROMETHEE-BELIEF Approach for Multi-Criteria Decision Making Problems with Incomplete Information
Abstract:
Multi-criteria decision aid methods consider decision problems where numerous alternatives are evaluated on several criteria. These methods are used to deal with perfect information. However, in practice, it is obvious that this information requirement is too much strict. In fact, the imperfect data provided by more or less reliable decision makers usually affect decision results since any decision is closely linked to the quality and availability of information. In this paper, a PROMETHEE-BELIEF approach is proposed to help multi-criteria decisions based on incomplete information. This approach solves problems with incomplete decision matrix and unknown weights within PROMETHEE method. On the base of belief function theory, our approach first determines the distributions of belief masses based on PROMETHEE’s net flows and then calculates weights. Subsequently, it aggregates the distribution masses associated to each criterion using Murphy’s modified combination rule in order to infer a global belief structure. The final action ranking is obtained via pignistic probability transformation. A case study of real-world application concerning the location of a waste treatment center from healthcare activities with infectious risk in the center of Tunisia is studied to illustrate the detailed process of the BELIEF-PROMETHEE approach.Keywords: belief function theory, incomplete information, multiple criteria analysis, PROMETHEE method
Procedia PDF Downloads 16714900 Physiology of Temporal Lobe and Limbic System
Authors: Khaled A. Abdel-Sater
Abstract:
There are four areas of the temporal lobe. Primary auditory area (areas 41 and 42); it is for the perception of auditory impulse, auditory association area (area 22, 21, and 20): Areas 21 and 20 are for understanding and interpretation of auditory sensation, recognition of language, and long-term memories. Area 22, also called Wernicke’s area, and a sensory speech centre. It is for interpretation of auditory and visual information, formation of thoughts in the mind, and choice of words to be used. Ideas and thoughts originate in it. The limbic system is a part of cortical and subcortical structure forming a ring around the brainstem. Cortical structures are the orbitofrontal area, subcallosal gyrus, cingulate gyrus, parahippocampal gyrus, and uncus. Subcortical structures are the hypothalamus, hippocampus, amygdala, septum, paraolfactory area, anterior nucleus of the thalamus portions of the basal ganglia. There are several physiological functions of the limbic system, including regulation of behavior, motivation, and emotion.Keywords: limbic system, motivation, emotions, temporal lobe
Procedia PDF Downloads 20214899 Towards the Management of Cybersecurity Threats in Organisations
Authors: O. A. Ajigini, E. N. Mwim
Abstract:
Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information
Procedia PDF Downloads 26014898 Prediction of Dubai Financial Market Stocks Movement Using K-Nearest Neighbor and Support Vector Regression
Authors: Abdulla D. Alblooshi
Abstract:
The stock market is a representation of human behavior and psychology, such as fear, greed, and discipline. Those are manifested in the form of price movements during the trading sessions. Therefore, predicting the stock movement and prices is a challenging effort. However, those trading sessions produce a large amount of data that can be utilized to train an AI agent for the purpose of predicting the stock movement. Predicting the stock market price action will be advantageous. In this paper, the stock movement data of three DFM listed stocks are studied using historical price movements and technical indicators value and used to train an agent using KNN and SVM methods to predict the future price movement. MATLAB Toolbox and a simple script is written to process and classify the information and output the prediction. It will also compare the different learning methods and parameters s using metrics like RMSE, MAE, and R².Keywords: KNN, ANN, style, SVM, stocks, technical indicators, RSI, MACD, moving averages, RMSE, MAE
Procedia PDF Downloads 17214897 A Vehicle Monitoring System Based on the LoRa Technique
Authors: Chao-Linag Hsieh, Zheng-Wei Ye, Chen-Kang Huang, Yeun-Chung Lee, Chih-Hong Sun, Tzai-Hung Wen, Jehn-Yih Juang, Joe-Air Jiang
Abstract:
Air pollution and climate warming become more and more intensified in many areas, especially in urban areas. Environmental parameters are critical information to air pollution and weather monitoring. Thus, it is necessary to develop a suitable air pollution and weather monitoring system for urban areas. In this study, a vehicle monitoring system (VMS) based on the IoT technique is developed. Cars are selected as the research tool because it can reach a greater number of streets to collect data. The VMS can monitor different environmental parameters, including ambient temperature and humidity, and air quality parameters, including PM2.5, NO2, CO, and O3. The VMS can provide other information, including GPS signals and the vibration information through driving a car on the street. Different sensor modules are used to measure the parameters and collect the measured data and transmit them to a cloud server through the LoRa protocol. A user interface is used to show the sensing data storing at the cloud server. To examine the performance of the system, a researcher drove a Nissan x-trail 1998 to the area close to the Da’an District office in Taipei to collect monitoring data. The collected data are instantly shown on the user interface. The four kinds of information are provided by the interface: GPS positions, weather parameters, vehicle information, and air quality information. With the VMS, users can obtain the information regarding air quality and weather conditions when they drive their car to an urban area. Also, government agencies can make decisions on traffic planning based on the information provided by the proposed VMS.Keywords: LoRa, monitoring system, smart city, vehicle
Procedia PDF Downloads 41914896 Evaluation of Published Materials in Meeting the Information Needs of Students in Three Selected College Libraries in Oyo State, Nigeria
Authors: Rafiat Olasumbo Akande
Abstract:
Most college libraries in Oyo State show signs of unhealthy collection practices like the preponderance of non-recent collections and indiscriminate acquisition of sub-standard books from hawkers. The objective of this study, therefore, is to determine the extent at which available published materials in those college libraries are able to meet both knowledge and information needs of students in those institutions. A descriptive survey was conducted among 18 librarians and 21 library officers in three colleges purposively selected for the exercise using simple sampling technique. In all, 279 questionnaires were administered and out of those 279 administered, 265 were returned and analyzed using Statistical Package for Social Science (SPSS). Three College Librarian were also interviewed. Findings from the study showed that due to the paucity of funds, obsolete materials, and sub-standard materials being procured from roadside book hawkers hinders the college libraries in meeting the information needs of the students in these college libraries. It then concluded that only when there is standard procedure for collection management and acquisition of library materials that the knowledge and information needs of the students could be met. The study recommends that students and curriculum review committee members from various departments should always be involved in determining materials needed by the library to meet students information needs and that institution authority must fund, monitor and ensure compliance with the acquisition policy in place in the college libraries.Keywords: libraries, published materials, information needs, college, evaluation, students
Procedia PDF Downloads 16714895 The Impact of Enzymatic Treatments on the Pasting Behavior and Its Reflection on Stalling and Quality of Bread
Authors: Sayed Mostafa, Mohamed Shebl
Abstract:
The problem of bread stalling is still one of the most troubling problems for those interested in manufacturing bakery products, as increasing the freshness period of bread is considered one of the most important factors that help encourage this industry due to its important role in reducing expected losses. Therefore, this study aims to improve the quality of pan bread and increase its freshness period by enzymatic treatments, including maltogenic α-amylase (MAA), amyloglucosidase (AGS), glucoseoxidase (GOX) and phospholipase (PhL). Rheological and pasting behavior of wheat flour were estimated in addition to the physical, texture, and sensory parameters of the final product. The addition of MAA resulted in a decrease in peak viscosity, breakdown, setback, and pasting temperature. The addition of MAA also led to a reduction in falling number values. Enzymatic treatments (MAA and PhL) exhibited higher alkaline water retention capacity of pan bread compared to untreated pan bread (control) throughout different storage periods. Furthermore, other enzymes displayed varying effects on bread quality; for instance, AGS enhanced the crust color, while a high concentration of GOX improved the specific volume of the bread. Conclusion: The research findings demonstrate that the enzymatic treatments can significantly improve its quality attributes, such as specific volume, increase the alkaline water retention capacity with lower hardness value, which reflects bread freshness during storage periods, and improve sensory characteristics.Keywords: anti-stalling agents, enzymatic treatments, maltogenic α-amylase, amyloglucosidase, glucoseoxidase, phospholipase, pasting behavior, wheat flour
Procedia PDF Downloads 1314894 A Comparative Study of Approaches in User-Centred Health Information Retrieval
Authors: Harsh Thakkar, Ganesh Iyer
Abstract:
In this paper, we survey various user-centered or context-based biomedical health information retrieval systems. We present and discuss the performance of systems submitted in CLEF eHealth 2014 Task 3 for this purpose. We classify and focus on comparing the two most prevalent retrieval models in biomedical information retrieval namely: Language Model (LM) and Vector Space Model (VSM). We also report on the effectiveness of using external medical resources and ontologies like MeSH, Metamap, UMLS, etc. We observed that the LM based retrieval systems outperform VSM based systems on various fronts. From the results we conclude that the state-of-art system scores for MAP was 0.4146, P@10 was 0.7560 and NDCG@10 was 0.7445, respectively. All of these score were reported by systems built on language modeling approaches.Keywords: clinical document retrieval, concept-based information retrieval, query expansion, language models, vector space models
Procedia PDF Downloads 322