Search results for: software evolution control
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16218

Search results for: software evolution control

14568 Web-Based Alcohol Prevention among Iranian Medical University Students: A Randomized Control Trail

Authors: Farzad Jalilian, Mehdi Mirzaei Alavijeh

Abstract:

Background: E-interventions as a universal approach to prevent a high-risk behavior, such as alcohol drinking. This study was conducted to evaluate web-based alcohol drinking preventative intervention efficiency among medical university students in Iran. Methods: Overall, 150 freshman and sophomore male student’s college students participated in this study as intervention and control group. This was a longitudinal randomized pre- and post-test series control group design panel study to implement a behavior modification based intervention to alcohol drinking prevention among college students. Cross-tabulation, t-test, repeated measures, and GEE by using SPSS statistical package, version 21 was used for the statistical analysis. The participants were followed up for 6 months with data collection scheduled at baseline, 3 and 6 months. The primary outcomes are attitude, self-control, and sensation seeking. Furthermore, the secondary outcome is comparing alcohol drinking among the study groups. Results: It was found significant reduce in average response for an attitude towards alcohol drinking and sensation seeking among intervention group (P < 0.05). But after intervention not significant difference between intervention and control group of improve self-control and reduce alcohol drinking (P > 0.05). Conclusion: Our intervention has been accompanied with reducing alcohol use rate. These findings indicate that e-intervention may be effectiveness approach to address the alcohol prevention among college students.

Keywords: e-interventions, alcohol drinking, students, Iran

Procedia PDF Downloads 411
14567 Impact of Pandemics on Cities and Societies

Authors: Deepak Jugran

Abstract:

Purpose: The purpose of this study is to identify how past Pandemics shaped social evolution and cities. Methodology: A historical and comparative analysis of major historical pandemics in human history their origin, transmission route, biological response and the aftereffects. A Comprehensive pre & post pandemic scenario and focuses selectively on major issues and pandemics that have deepest & lasting impact on society with available secondary data. Results: Past pandemics shaped the behavior of human societies and their cities and made them more resilient biologically, intellectually & socially endorsing the theory of “Survival of the fittest” by Sir Charles Darwin. Pandemics & Infectious diseases are here to stay and as a human society, we need to strengthen our collective response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, & especially animals who become carriers for these viruses. Conclusion: Pandemics always resulted in great mortality, but they also improved the overall individual human immunology & collective social response; at the same time, they also improved the public health system of cities, health delivery systems, water, sewage distribution system, institutionalized various welfare reforms and overall collective social response by the societies. It made human beings more resilient biologically, intellectually, and socially hence endorsing the theory of “AGIL” by Prof Talcott Parsons. Pandemics & infectious diseases are here to stay and as humans, we need to strengthen our city response & preparedness besides evolving mechanisms for strict controls on inter-continental movements of people, especially animals who always acted as carriers for these novel viruses. Pandemics over the years acted like natural storms, mitigated the prevailing social imbalances and laid the foundation for scientific discoveries. We understand that post-Covid-19, institutionalized city, state and national mechanisms will get strengthened and the recommendations issued by the various expert groups which were ignored earlier will now be implemented for reliable anticipation, better preparedness & help to minimize the impact of Pandemics. Our analysis does not intend to present chronological findings of pandemics but rather focuses selectively on major pandemics in history, their causes and how they wiped out an entire city’s population and influenced the societies, their behavior and facilitated social evolution.

Keywords: pandemics, Covid-19, social evolution, cities

Procedia PDF Downloads 104
14566 Analysis of Solar Thermal Power Plant in Algeria

Authors: M. Laissaoui

Abstract:

The present work has for objective the simulation of a hybrid solar combined cycle power plant, compared with combined cycle conventional (gas turbine and steam turbine), this type of power plants disposed an solar tour (heliostat field and volumetric receiver) insurant a part of the thermal energy necessary for the functioning of the gas turbine. This solar energy serves to feed with heat the combustion air of the gas turbine when he out of the compressor and the front entered the combustion chamber. The simulation of even central and made for three zones deferential to know the zone of Hassi R' mel, Bechare, and the zone of Messaad wilaya of El djelfa. The radiometric and meteorological data arise directly from the software meteonorme 7. The simulation of the energy performances is made by the software TRNSYS 16.1.

Keywords: concentrating solar power, heliostat, thermal, Algeria

Procedia PDF Downloads 463
14565 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 345
14564 Seawater Changes' Estimation at Tidal Flat in Korean Peninsula Using Drone Stereo Images

Authors: Hyoseong Lee, Duk-jin Kim, Jaehong Oh, Jungil Shin

Abstract:

Tidal flat in Korean peninsula is one of the largest biodiversity tidal flats in the world. Therefore, digital elevation models (DEM) is continuously demanded to monitor of the tidal flat. In this study, DEM of tidal flat, according to different times, was produced by means of the Drone and commercial software in order to measure seawater change during high tide at water-channel in tidal flat. To correct the produced DEMs of the tidal flat where is inaccessible to collect control points, the DEM matching method was applied by using the reference DEM instead of the survey. After the ortho-image was made from the corrected DEM, the land cover classified image was produced. The changes of seawater amount according to the times were analyzed by using the classified images and DEMs. As a result, it was confirmed that the amount of water rapidly increased as the time passed during high tide.

Keywords: tidal flat, drone, DEM, seawater change

Procedia PDF Downloads 197
14563 Position and Speed Tracking of DC Motor Based on Experimental Analysis in LabVIEW

Authors: Muhammad Ilyas, Awais Khan, Syed Ali Raza Shah

Abstract:

DC motors are widely used in industries to provide mechanical power in speed and torque. The position and speed control of DC motors is getting the interest of the scientific community in robotics, especially in the robotic arm, a flexible joint manipulator. The current research work is based on position control of DC motors using experimental investigations in LabVIEW. The linear control strategy is applied to track the position and speed of the DC motor with comparative analysis in the LabVIEW platform and simulation analysis in MATLAB. The tracking error in hardware setup based on LabVIEW programming is slightly greater than simulation analysis in MATLAB due to the inertial load of the motor during steady-state conditions. The controller output shows the input voltage applied to the dc motor varies between 0-8V to ensure minimal steady error while tracking the position and speed of the DC motor.

Keywords: DC motor, labview, proportional integral derivative control, position tracking, speed tracking

Procedia PDF Downloads 99
14562 Gaybe-Boom TV: Reading Homonormative Fatherhood on Israeli Television

Authors: Itay Harlap

Abstract:

Over the past decade, LGBT figures have become increasingly visible on Israeli television in its various channels and genres. In recent years, however, the representation of gays on Israeli television has undergone an interesting shift, whereby many television texts feature gay people as fathers. These texts, mostly news items and documentaries, usually present gay parenthood as a positive phenomenon. The question in paper is whether LGBT parenting (in reality and as representation) fated to be part of the homonormativity that characterizes the LGBT community in Israel, or can it be an alternative to the hegemonic discourse? This paper embraces a dialectical position and explores the tension between mainstream and radical, or homonormativity and queer politics in the specific Israeli Jewish context through a textual and discursive reading of a selection of television programs that revolve principally around gay parenting in Israel. The first part of this lecture addresses the cultural and social context that generated these representations, dealing with three key Israeli areas: The fertility cult, the evolution of the LGBT community, and the evolution of local television. The second part offers a queer reading of these ‘positive’ representations (mainly in special reports on the news and programs labeled as ‘documentaries’ by broadcasters) and highlight the possible price of the ‘bear hug’ given by Israeli media to gay parents. The last part focuses on a single case study, the TV serial drama Ima Veabaz, and suggests that this drama exposes the performative aspect of parenting and the connection between ethnicity and fertility, and offers an alternative to normative displays of gay parenting.

Keywords: fatherhood, heteronormativity, Israel, queer theory, television

Procedia PDF Downloads 360
14561 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 123
14560 Influence of Specimen Geometry (10*10*40), (12*12*60) and (5*20*120), on Determination of Toughness of Concrete Measurement of Critical Stress Intensity Factor: A Comparative Study

Authors: M. Benzerara, B. Redjel, B. Kebaili

Abstract:

The cracking of the concrete is a more crucial problem with the development of the complex structures related to technological progress. The projections in the knowledge of the breaking process make it possible today for better prevention of the risk of the fracture. The breaking strength brutal of a quasi-fragile material like the concrete called Toughness is measured by a breaking value of the factor of the intensity of the constraints K1C for which the crack is propagated, it is an intrinsic property of the material. Many studies reported in the literature treating of the concrete were carried out on specimens which are in fact inadequate compared to the intrinsic characteristic to identify. We started from this established fact, in order to compare the evolution of the parameter of toughness K1C measured by calling upon ordinary concrete specimens of three prismatic geometries different (10*10*40) Cm3, (12*12*60) Cm3 & (5*20*120) Cm3 containing from the side notches various depths simulating of the cracks was set up.The notches are carried out using triangular pyramidal plates into manufactured out of sheet coated placed at the center of the specimens at the time of the casting, then withdrawn to leave the trace of a crack. The tests are carried out in 3 points bending test in mode 1 of fracture, by using the techniques of mechanical fracture. The evolution of the parameter of toughness K1C measured with the three geometries specimens gives almost the same results. They are acceptable and return in the beach of the results determined by various researchers (toughness of the ordinary concrete turns to the turn of the 1 MPa √m). These results inform us about the presence of an economy on the level of the geometry specimen (5*20*120) Cm3, therefore, to use plates specimens later if one wants to master the toughness of this material complexes, astonishing but always essential that is the concrete.

Keywords: concrete, fissure, specimen, toughness

Procedia PDF Downloads 292
14559 Design of Robust and Intelligent Controller for Active Removal of Space Debris

Authors: Shabadini Sampath, Jinglang Feng

Abstract:

With huge kinetic energy, space debris poses a major threat to astronauts’ space activities and spacecraft in orbit if a collision happens. The active removal of space debris is required in order to avoid frequent collisions that would occur. In addition, the amount of space debris will increase uncontrollably, posing a threat to the safety of the entire space system. But the safe and reliable removal of large-scale space debris has been a huge challenge to date. While capturing and deorbiting space debris, the space manipulator has to achieve high control precision. However, due to uncertainties and unknown disturbances, there is difficulty in coordinating the control of the space manipulator. To address this challenge, this paper focuses on developing a robust and intelligent control algorithm that controls joint movement and restricts it on the sliding manifold by reducing uncertainties. A neural network adaptive sliding mode controller (NNASMC) is applied with the objective of finding the control law such that the joint motions of the space manipulator follow the given trajectory. A computed torque control (CTC) is an effective motion control strategy that is used in this paper for computing space manipulator arm torque to generate the required motion. Based on the Lyapunov stability theorem, the proposed intelligent controller NNASMC and CTC guarantees the robustness and global asymptotic stability of the closed-loop control system. Finally, the controllers used in the paper are modeled and simulated using MATLAB Simulink. The results are presented to prove the effectiveness of the proposed controller approach.

Keywords: GNC, active removal of space debris, AI controllers, MatLabSimulink

Procedia PDF Downloads 124
14558 Evaluation of Model-Based Code Generation for Embedded Systems–Mature Approach for Development in Evolution

Authors: Nikolay P. Brayanov, Anna V. Stoynova

Abstract:

Model-based development approach is gaining more support and acceptance. Its higher abstraction level brings simplification of systems’ description that allows domain experts to do their best without particular knowledge in programming. The different levels of simulation support the rapid prototyping, verifying and validating the product even before it exists physically. Nowadays model-based approach is beneficial for modelling of complex embedded systems as well as a generation of code for many different hardware platforms. Moreover, it is possible to be applied in safety-relevant industries like automotive, which brings extra automation of the expensive device certification process and especially in the software qualification. Using it, some companies report about cost savings and quality improvements, but there are others claiming no major changes or even about cost increases. This publication demonstrates the level of maturity and autonomy of model-based approach for code generation. It is based on a real live automotive seat heater (ASH) module, developed using The Mathworks, Inc. tools. The model, created with Simulink, Stateflow and Matlab is used for automatic generation of C code with Embedded Coder. To prove the maturity of the process, Code generation advisor is used for automatic configuration. All additional configuration parameters are set to auto, when applicable, leaving the generation process to function autonomously. As a result of the investigation, the publication compares the quality of generated embedded code and a manually developed one. The measurements show that generally, the code generated by automatic approach is not worse than the manual one. A deeper analysis of the technical parameters enumerates the disadvantages, part of them identified as topics for our future work.

Keywords: embedded code generation, embedded C code quality, embedded systems, model-based development

Procedia PDF Downloads 237
14557 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 130
14556 Morphological and Property Rights Control of Plot Pattern in Urban Regeneration: Case Inspiration from Germany and the United States

Authors: Nan Wu, Peng Liu

Abstract:

As a morphological element reflecting the land property rights structure, the plot pattern plays a crucial role in shaping the form and quality of the built environment. Therefore, it is one of the core control elements of urban regeneration. As China's urban development mode is shifting from growth-based development to urban regeneration, it is urgent to explore a more refined way for the planning control of the plot pattern, which further promotes the optimization of urban form and land property structure. European and American countries such as Germany and the United States began to deal with the planning control of plot patterns in urban regeneration earlier and established relatively mature methods and mechanisms. Therefore, this paper summarizes two typical scenarios of plot pattern regeneration in old cities in China: the first one is "limited scale plot pattern rezoning", which mainly deals with the regeneration scenario of tearing down the old and building the new, and the focus of its control is to establish an adaptive plot pattern rezoning methodology and mechanism; The second is "localized parcel regeneration under the existing property rights," which mainly deals with the renewal scenario of alteration and addition, and its control focuses on the establishment of control rules for individual plot regeneration. For the two typical plot pattern regeneration scenarios, Germany (Berlin) and the United States (New York) are selected as two international cases with reference significance, and the framework of plot pattern form and property rights control elements of urban regeneration is established from four latitudes, namely, the overall operation mode, form control methods, property rights control methods, and effective implementation prerequisites, so as to compare and analyze the plot pattern control methods of the two countries under different land systems and regeneration backgrounds. Among them, the German construction planning system has formed a more complete technical methodology for block-scale rezoning, and together with the overall urban design, it has created a practical example in the critical redevelopment of the inner city of Berlin. In the United States (New York), the zoning method establishes fine zoning regulations and rules for adjusting development rights based on the morphological indicators plots so as to realize effective control over the regeneration of local plots under the existing property rights pattern. On the basis of summarizing the international experience, we put forward the proposal of plot pattern and property rights control for the organic regeneration of old cities in China.

Keywords: plot pattern, urban regeneration, urban morphology, property rights, regulatory planning

Procedia PDF Downloads 36
14555 Performance of Growing Rahaji Bulls Fed Diets Containing Similar Concentrates and Different Crop Residues in a Semi-Arid Environment

Authors: Husaini Sama

Abstract:

The study was conducted, in a 120 - day’s trial, to monitor the performance of growing Rahaji bulls fed different crop residues. There were four experimental treatments, each containing three (3) bull-calves. The first three (experimental) diets were prepared with rice straw, millet stalks and a combination of the two in equal proportions. These 3 diets were supplemented with concentrates. Treatments 1, 2 and 3 consisted of rice straw, millet stalk and combination of rice straw and millet stalk in equal ratio, respectively as basal feeds, while, Treatment 4 (containing standard diet of cow pea haulms, rice straw and wheat offal) served as control to compare with the other treatments. Data on feed intake and livability was collected on daily basis and that of live weight gain and feed conversion ratio were collected fortnightly, but data on apparent nutrient retention trial was collected towards the end of the experiment. Water was offered ad libitum. Records obtained were subjected to statistical analysis using SPSS (1988) software package in accordance with a Completely Randomized Design (CRD). Results obtained indicated that feed intake was significantly higher (P<0.05) for calves on treatments 3 and 4 compared to those on treatments 1and 2. The study observed that it was cheaper to formulate diets 2 and 3 than the other 2 diets. The control diet (T4) was observed to be relatively more expensive than the other 3 formulated diets. It was concluded from the findings that, concentrate containing combination of rice straw and cereal stalks was economical and satisfactory for feeding growing Rahaji bulls in this ecological zone (Semi-arid environment).

Keywords: rahaji bulls, crop residues, concentrates, semi-arid environment

Procedia PDF Downloads 179
14554 Effect of Different Feed Composition on the Growth Performance in Early Weaned Piglets

Authors: Obuzor Eze Obuzor, Ekpoke Okurube Sliver

Abstract:

The study was carried out at Debee farms at Ahoada West Local Government area, Rivers State, Nigeria. To evaluate the impact of two different cost-effective available feed composition on growth performance of weaned piglets. Thirty weaned uncontrolled cross bred (Large white x pietrain) piglets of average initial weight of 3.04 Kg weaned at 30days were assigned to three dietary treatments, comprising three replicates of 10 weaned piglets each, piglets were kept at 7 °C in different pens with dimensions of 4.50 × 4.50 m. The design of the experiment was completely randomized design, data from the study were subjected to one-way analysis of variance (ANOVA) and significant means were separated using Duncan's Multiple Range Test using Statistical Analysis System (SAS) software for windows (2 0 0 3), statistical significance was assessed at P < 0.05 (95% confidence interval) while survival rate was calculated using simple percentage. A standard diet was prepared to meet the nutrient requirements of weaned piglets at (20.8% crude protein). The three diets were fed to the animals in concrete feeding trough, control diet (C) had soybean meal while first treatment had spent grain (T1) and the second treatment had wheat offal (T2) respectively. The experiment was partitioned into four weeks periods (days 1-7, 8-14, 15-21 and 22-28). Feed and water were given unrestrictedly throughout the period of the experiment. The feed intake and weights of the pigs were recorded on weekly basis. Feed conversion ratio and daily weight gain were calculated and the study lasted for four weeks. There was no significant (P>0.05) effect of diet on survival rate, final body weight, average daily weight gain, daily feed intake and feed conversion ratio. The overall performance showed that treatment one (T1) had survival rate (93%), improved daily weight gain (36.21 g), average daily feed intake (120.14 g) and had the best feed conversion ratio (0.29) similar high mean value with the control while treatment two (T2) had lowest and negative response to all parameters. It could be concluded that feed formulated with spent grain is cheaper than control (soybean meal) and also improved the growth performance of weaned piglets.

Keywords: piglets, weaning, feed conversions ratio, daily weight gain

Procedia PDF Downloads 58
14553 Using Groundwater Modeling System to Create a 3-D Groundwater Flow and Solute Transport Model for a Semiarid Region: A Case Study of the Nadhour Saouaf Sisseb El Alem Aquifer, Central Tunisia

Authors: Emna Bahri Hammami, Zammouri Mounira, Tarhouni Jamila

Abstract:

The Nadhour Saouaf Sisseb El Alem (NSSA) system comprises some of the most intensively exploited aquifers in central Tunisia. Since the 1970s, the growth in economic productivity linked to intensive agriculture in this semiarid region has been sustained by increasing pumping rates of the system’s groundwater. Exploitation of these aquifers has increased rapidly, ultimately causing their depletion. With the aim to better understand the behavior of the aquifer system and to predict its evolution, the paper presents a finite difference model of the groundwater flow and solute transport. The model is based on the Groundwater Modeling System (GMS) and was calibrated using data from 1970 to 2010. Groundwater levels observed in 1970 were used for the steady-state calibration. Groundwater levels observed from 1971 to 2010 served to calibrate the transient state. The impact of pumping discharge on the evolution of groundwater levels was studied through three hypothetical pumping scenarios. The first two scenarios replicated the approximate drawdown in the aquifer heads (about 17 m in scenario 1 and 23 m in scenario 2 in the center of NSSA) following an increase in pumping rates by 30% and 50% from their current values, respectively. In addition, pumping was stopped in the third scenario, which could increase groundwater reserves by about 7 Mm3/year. NSSA groundwater reserves could be improved considerably if the pumping rules were taken seriously.

Keywords: pumping, depletion, groundwater modeling system GMS, Nadhour Saouaf

Procedia PDF Downloads 215
14552 On-line Control of the Natural and Anthropogenic Safety in Krasnoyarsk Region

Authors: T. Penkova, A. Korobko, V. Nicheporchuk, L. Nozhenkova, A. Metus

Abstract:

This paper presents an approach of on-line control of the state of technosphere and environment objects based on the integration of Data Warehouse, OLAP and Expert systems technologies. It looks at the structure and content of data warehouse that provides consolidation and storage of monitoring data. There is a description of OLAP-models that provide a multidimensional analysis of monitoring data and dynamic analysis of principal parameters of controlled objects. The authors suggest some criteria of emergency risk assessment using expert knowledge about danger levels. It is demonstrated now some of the proposed solutions could be adopted in territorial decision making support systems. Operational control allows authorities to detect threat, prevent natural and anthropogenic emergencies and ensure a comprehensive safety of territory.

Keywords: decision making support systems, emergency risk assessment, natural and anthropogenic safety, on-line control, territory

Procedia PDF Downloads 397
14551 Test of Biological Control against Date Moth Ectomyelois ceratoniae zeller (Lepidoptera, Pyralidae) by Spinosad

Authors: Hadjeb Ayoub, Mehaoua Med Seghir, Ouakid M. Laid

Abstract:

Currently, chemical control is the only means used to control populations of the date moth (Ectomyelois ceratoniae) which is the most important and dangerous pest to palm groves in Algeria, conventional insecticides act faster, but their main drawback is it can’t be destroyed or degraded. In this context we conducted our work to explore the insecticidal activity of Spinpsad which is a bio-pesticide on the larval stages of Ectomyelois ceratoniae. The study of the effect of Spinosad on the mortality of different larval stages revealed that the doses used were significantly and positively correlated with mortality adjusted for different durations of exposure of larvae bio- pesticide. Lowest corrected mortality was observed in a short time and lethal in older larvae treated with the lowest concentration. While the higher mortality was observed in a longer duration of exposure in younger instars treated with the highest concentration.

Keywords: Ectomyelois ceratoniae, date palm, Spinosad, biological control, toxicology

Procedia PDF Downloads 429
14550 Requirements Management in Agile

Authors: Ravneet Kaur

Abstract:

The concept of Agile Requirements Engineering and Management is not new. However, the struggle to figure out how traditional Requirements Management Process fits within an Agile framework remains complex. This paper talks about a process that can merge the organization’s traditional Requirements Management Process nicely into the Agile Software Development Process. This process provides Traceability of the Product Backlog to the external documents on one hand and User Stories on the other hand. It also gives sufficient evidence that the system will deliver the right functionality with good quality in the form of various statistics and reports. In the nutshell, by overlaying a process on top of Agile, without disturbing the Agility, we are able to get synergic benefits in terms of productivity, profitability, its reporting, and end to end visibility to all Stakeholders. The framework can be used for just-in-time requirements definition or to build a repository of requirements for future use. The goal is to make sure that the business (specifically, the product owner) can clearly articulate what needs to be built and define what is of high quality. To accomplish this, the requirements cycle follows a Scrum-like process that mirrors the development cycle but stays two to three steps ahead. The goal is to create a process by which requirements can be thoroughly vetted, organized, and communicated in a manner that is iterative, timely, and quality-focused. Agile is quickly becoming the most popular way of developing software because it fosters continuous improvement, time-boxed development cycles, and more quickly delivering value to the end users. That value will be driven to a large extent by the quality and clarity of requirements that feed the software development process. An agile, lean, and timely approach to requirements as the starting point will help to ensure that the process is optimized.

Keywords: requirements management, Agile

Procedia PDF Downloads 363
14549 A Decision Support System for Flight Disruptions Management

Authors: Burak Erkayman, Emin Gundogar, Hayrettin Evirgen, Murat Sarı

Abstract:

With the increasing competition in recent years, airline companies tend to manage their operations aiming fewer losses in a robust manner. Airline operations are complex operations and have the necessity of being performed just in time and more knock-on relevant elements in the event of a disruption. In this study a knowledge based decision support system is suggested and software is developed. The developed software includes knowledge bases which are based on expert experience and government regulations, model bases and data bases. The results of the suggested approach are presented and improvable aspects of the approach are discussed.

Keywords: knowledge based systems, irregular operations, decision support systems, flight disruptions management

Procedia PDF Downloads 307
14548 A Brief Exploration on the Green Urban Design for Carbon Neutrality

Authors: Gaoyuan Wang, Tian Chen

Abstract:

China’s emission peak and carbon neutrality strategies lead to the transformation of development patterns and call for new green urban design thinking. This paper begins by revealing the evolution of green urban design thinking during the periods of carbon enlightenment, carbon dependency, and carbon decoupling from the perspective of the energy transition. Combined with the current energy situation, national strengths, and technological trends, the emergence of green urban design towards carbon neutrality becomes inevitable. Based on the preliminary analysis of its connotation, the characteristics of the new type of green urban design are generalized as low-carbon orientation, carbon-related objects, carbon-reduction means, and carbon-control patterns. Its theory is briefly clarified in terms of the human-earth synergism, quality-energy interconnection, and form-flow interpromotion. Then, its mechanism is analyzed combined with the core tasks of carbon neutrality, and the scope of design issues is defined, including carbon flow mapping, carbon source regulation, carbon sink construction, and carbon emission management. Finally, a multi-scale spatial response system is proposed across the region, city, cluster, and neighborhood level. The discussion aims to provide support for the innovation of green urban design theories and methods in the context of peak neutrality.

Keywords: carbon neutrality, green urban design, energy transition, theoretical exploration

Procedia PDF Downloads 168
14547 A Transformer-Based Question Answering Framework for Software Contract Risk Assessment

Authors: Qisheng Hu, Jianglei Han, Yue Yang, My Hoa Ha

Abstract:

When a company is considering purchasing software for commercial use, contract risk assessment is critical to identify risks to mitigate the potential adverse business impact, e.g., security, financial and regulatory risks. Contract risk assessment requires reviewers with specialized knowledge and time to evaluate the legal documents manually. Specifically, validating contracts for a software vendor requires the following steps: manual screening, interpreting legal documents, and extracting risk-prone segments. To automate the process, we proposed a framework to assist legal contract document risk identification, leveraging pre-trained deep learning models and natural language processing techniques. Given a set of pre-defined risk evaluation problems, our framework utilizes the pre-trained transformer-based models for question-answering to identify risk-prone sections in a contract. Furthermore, the question-answering model encodes the concatenated question-contract text and predicts the start and end position for clause extraction. Due to the limited labelled dataset for training, we leveraged transfer learning by fine-tuning the models with the CUAD dataset to enhance the model. On a dataset comprising 287 contract documents and 2000 labelled samples, our best model achieved an F1 score of 0.687.

Keywords: contract risk assessment, NLP, transfer learning, question answering

Procedia PDF Downloads 126
14546 Legal Allocation of Risks: A Computational Analysis of Force Majeure Clauses

Authors: Farshad Ghodoosi

Abstract:

This article analyzes the effect of supervening events in contracts. Contracts serve an important function: allocation of risks. In spite of its importance, the case law and the doctrine are messy and inconsistent. This article provides a fresh look at excuse doctrines (i.e., force majeure, impracticability, impossibility, and frustration) with a focus on force majeure clauses. The article makes the following contributions: First, it furnishes a new conceptual and theoretical framework of excuse doctrines. By distilling the decisions, it shows that excuse doctrines rests on the triangle of control, foreseeability, and contract language. Second, it analyzes force majeure clauses used by S&P 500 companies to understand the stickiness and similarity of such clauses and the events they cover. Third, using computational and statistical tools, it analyzes US cases since 1810 in order to assess the weight given to the triangle of control, foreseeability, and contract language. It shows that the control factor plays an important role in force majeure analysis, while the contractual interpretation is the least important factor. The Article concludes that it is the standard for control -whether the supervening event is beyond the control of the party- that determines the outcome of cases in the force majeure context and not necessarily the contractual language. This article has important implications on COVID-19-related contractual cases. Unlike the prevailing narrative that it is the language of the force majeure clause that’s determinative, this article shows that the primarily focus of the inquiry will be on whether the effects of COVID-19 have been beyond the control of the promisee. Normatively, the Article suggests that the trifactor of control, foreseeability, and contractual language are not effective for allocation of legal risks in times of crises. It puts forward a novel approach to force majeure clauses whereby that the courts should instead focus on the degree to which parties have relied on (expected) performance, in particular during the time of crisis.

Keywords: contractual risks, force majeure clauses, foreseeability, control, contractual language, computational analysis

Procedia PDF Downloads 139
14545 Analysis of Information Sharing and Capacity Constraint on Backlog Bullwhip Effect in Two Level Supply Chain

Authors: Matloub Hussaina

Abstract:

This paper investigates the impact of information sharing and capacity constraints on backlog bullwhip effect of Automatic Pipe Line Inventory and Order Based Production Control System (APIOBPCS). System dynamic simulation using iThink Software has been applied. It has been found that smooth ordering by Tier 1 can be achieved when Tier 1 has medium capacity constraints. Simulation experiments also show that information sharing helps to reduce 50% of backlog bullwhip effect in capacitated supply chains. This knowledge is of value per se, giving supply chain operations managers and designers a practical way in to controlling the backlog bullwhip effect. Future work should investigate the total cost implications of capacity constraints and safety stocks in multi-echelon supply chain.

Keywords: supply chain dynamics, information sharing, capacity constraints, simulation, APIOBPCS

Procedia PDF Downloads 310
14544 Reducing the Cooking Time of Bambara Groundnut (BGN)

Authors: Auswell Amfo-Antiri, Esther Eshun, Theresa A. Amu

Abstract:

Cooking Bambara groundnut (Bambara beans) is time and energy-consuming. Over time, some substances have been used to help reduce cooking time and save energy. This experimental study was carried out to find ways of reducing the cooking time of Bambara groundnut using selected organic substances. Twenty grams (20g) each of fresh pawpaw leaves, guava leaves, ginger, onion, and palm kernel were cooked with five samples of 200g of the creamy variety of raw Bambara groundnut. A control was cooked without any organic substance added. All six samples were cooked with equal quantities of water (4L); the gas mark used for cooking the samples was marked 5, the highest for the largest burner, using the same cooking pot. Gas matter. The control sample used 192 minutes to cook thoroughly. The ginger-treated sample (AET02) had the shortest cooking time of 145 minutes, followed by the onion-treated sample (AET05), with a cooking time of 157 minutes. The sample cooked with Palm kernel (AET06) and Pawpaw (AET04) used 172 minutes and 174 minutes, respectively, while sample AET03, cooked with Guava, used 185 minutes for cooking. The difference in cooking time for the sample treated with ginger (AET02) and onion (AET05) was 47 minutes and 35 minutes, respectively, as compared with the control. The comparison between Control and Pawpaw produced [p=0.163>0.05]; Control and Ginger yielded [p=0.006<0.05]; Control and Kernel resulted in [p=0.128>0.05]; Control and Guava resulted in [p=0.560>0.05]. The study concluded that ginger and onions comparatively reduced the cooking time for Bambara ground nut appreciably. The study recommended that ginger and onions could be used to reduce the cooking time of Bambara groundnut.

Keywords: cooking time, organic substances, ginger, onions, pawpaw leaves, guava leaves, bambara groundnut

Procedia PDF Downloads 75
14543 The Use of Haar Wavelet Mother Signal Tool for Performance Analysis Response of Distillation Column (Application to Moroccan Case Study)

Authors: Mahacine Amrani

Abstract:

This paper aims at reviewing some Moroccan industrial applications of wavelet especially in the dynamic identification of a process model using Haar wavelet mother response. Two recent Moroccan study cases are described using dynamic data originated by a distillation column and an industrial polyethylene process plant. The purpose of the wavelet scheme is to build on-line dynamic models. In both case studies, a comparison is carried out between the Haar wavelet mother response model and a linear difference equation model. Finally it concludes, on the base of the comparison of the process performances and the best responses, which may be useful to create an estimated on-line internal model control and its application towards model-predictive controllers (MPC). All calculations were implemented using AutoSignal Software.

Keywords: process performance, model, wavelets, Haar, Moroccan

Procedia PDF Downloads 313
14542 The Impact of Blended Learning on Developing the students' Writing Skills and the Perception of Instructors and Students: Hawassa University in Focus

Authors: Mulu G. Gencha, Gebremedhin Simon, Menna Olango

Abstract:

This study was conducted at Hawassa University (HwU) in the Southern Nation Nationalities Peoples Regional State (SNNPRS) of Ethiopia. The prime concern of this study was to examine the writing performances of experimental and control group students, perception of experimental group students, and subject instructors. The course was blended learning (BL). Blended learning is a hybrid of classroom and on-line learning. Participants were eighty students from the School of Computer Science. Forty students attended the BL delivery involved using Face-to-Face (FTF) and campus-based online instruction. All instructors, fifty, of School of Language and Communication Studies along with 10 FGD members participated in the study. The experimental group went to the computer lab two times a week for four months, March-June, 2012, using the local area network (LAN), and software (MOODLE) writing program. On the other hand, the control group, forty students, took the FTF writing course five times a week for four months in similar academic calendar. The three instruments, the attitude questionnaire, tests and FGD were designed to identify views of students, instructors, and FGD participants on BL. At the end of the study, students’ final course scores were evaluated. Data were analyzed using independent samples t-tests. A statistically, significant difference was found between the FTF and BL (p<0.05). The analysis showed that the BL group was more successful than the conventional group. Besides, both instructors and students had positive attitude towards BL. The final section of the thesis showed the potential benefits and challenges, considering the pedagogical implications for the BL, and recommended possible avenues for further works.

Keywords: blended learning, computer attitudes, computer usefulness, computer liking, computer confidence, computer phobia

Procedia PDF Downloads 407
14541 Comparative Study of Sound Intensity in Individuals Diagnosed with Antisocial Personality Disorder and Normal People

Authors: Nadia Warmilee

Abstract:

This study is s descriptive-analytical research and it aims at studying sound intensity in individuals with antisocial personality disorder and ordinary persons. Data were collected from experimental and control groups by interviews and a field research. Population was all male Iranian with antisocial personality disorder that three of them (a murderer and two individuals with antisocial personality disorder (APD) who have not committed any crimes yet) were selected purposefully. They were compared to three non-affected people. PRAAT software has been used to analyze the data. Results of this study show that there is a significant relationship between dysthymia and sound intensity values. Antisocial personality disorder also affects sound intensity fluctuations. The values of sound intensity are higher in non-affected people than affected one whilst these values are more monotonous. T-test was used to study significance or in significance of sound intensity difference in producing vowels.

Keywords: Acoustics, Sound Intensity, Antisocial Personality Disorder, Psycholinguistics

Procedia PDF Downloads 120
14540 Commutativity of Fractional Order Linear Time-Varying Systems

Authors: Salisu Ibrahim

Abstract:

The paper studies the commutativity associated with fractional order linear time-varying systems (LTVSs), which is an important area of study in control systems engineering. In this paper, we explore the properties of these systems and their ability to commute. We proposed the necessary and sufficient condition for commutativity for fractional order LTVSs. Through a simulation and mathematical analysis, we demonstrate that these systems exhibit commutativity under certain conditions. Our findings have implications for the design and control of fractional order systems in practical applications, science, and engineering. An example is given to show the effectiveness of the proposed method which is been computed by Mathematica and validated by the use of MATLAB (Simulink).

Keywords: fractional differential equation, physical systems, equivalent circuit, analog control

Procedia PDF Downloads 107
14539 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 165