Search results for: library’s user
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2766

Search results for: library’s user

1056 Improved Simultaneous Performance in the Time Domain and in the Frequency Domain

Authors: Azeddine Ghodbane, David Bensoussan, Maher Hammami

Abstract:

An innovative approach for controlling unstable and invertible systems has demonstrated superior performance compared to conventional controllers. It has been successfully applied to a levitation system and drone control. Simulations have yielded satisfactory performances when applied to a satellite antenna controller. This design method, based on sensitivity analysis, has also been extended to handle multivariable unstable and invertible systems that exhibit dominant diagonal characteristics at high frequencies, enabling decentralized control. Furthermore, this control method has been expanded to the realm of adaptive control. In this study, we introduce an alternative adaptive architecture that enhances both time and frequency performance, helpfully mitigating the effects of disturbances from the input plant and external disturbances affecting the output. To facilitate superior performance in both the time and frequency domains, we have developed user-friendly interactive design methods using the GeoGebra platform.

Keywords: control theory, decentralized control, sensitivity theory, input-output stability theory, robust multivariable feedback control design

Procedia PDF Downloads 106
1055 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 85
1054 Leveraging Quality Metrics in Voting Model Based Thread Retrieval

Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim

Abstract:

Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.

Keywords: content quality, forum search, thread retrieval, voting techniques

Procedia PDF Downloads 207
1053 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)

Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat

Abstract:

The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.

Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring

Procedia PDF Downloads 391
1052 A Case Study: Community Forestry in Nepal: Achievements and Challenges

Authors: Bhmika Raiu

Abstract:

The community forestry programme in Nepal officially started in the late 1970s. Since then concerning movement has been evolving to involve local communities in the management and utilization of forests. The policy of the government was originally intended to meet the basic forest products required by the communities through active participation in forest development and management. Later, it was expanded to include the mobilization and empowerment of the members of community forest user groups in the development of their local communities. It was observed that the trend of forest degradation has decreased since the handing over of national forests to local communities, but a number of unintended social anomalies have also cropped up. Such anomalies essentially constitute of the inequity and unfairness in the local and national level and in terms of long-term sustainability of forest resources. This paper provides an overview of various issues of community forestry, especially focusing on the major achievements made in community forestry. It calls for rethinking the community forestry programme in order to face the present day challenges of linking community forestry with livelihood promotion, good governance, and sustainable forest management. It also lays out strategies for reforms in community forestry.

Keywords: community forest, livelihood promotion, challenges, achievements

Procedia PDF Downloads 369
1051 Motor Controller Implementation Using Model Based Design

Authors: Cau Tran, Tu Nguyen, Tien Pham

Abstract:

Model-based design (MBD) is a mathematical and visual technique for addressing design issues in the fields of communications, signal processing, and complicated control systems. It is utilized in several automotive, aerospace, industrial, and motion control applications. Virtual models are at the center of the software development process with model based design. A method used in the creation of embedded software is model-based design. In this study, the LAT motor is modeled in a simulation environment, and the LAT motor control is designed with a cascade structure, a speed and current control loop, and a controller that is used in the next part. A PID structure serves as this controller. Based on techniques and motor parameters that match the design goals, the PID controller is created for the model using traditional design principles. The MBD approach will be used to build embedded software for motor control. The paper will be divided into three distinct sections. The first section will introduce the design process and the benefits and drawbacks of the MBD technique. The design of control software for LAT motors will be the main topic of the next section. The experiment's results are the subject of the last section.

Keywords: model based design, limited angle torque, intellectual property core, hardware description language, controller area network, user datagram protocol

Procedia PDF Downloads 92
1050 The Use of Orthodontic Pacifiers to Prevent Pacifier Induced Malocclusion - A Literature Review

Authors: Maliha Ahmed Suleman, Sidra Ahmed Suleman

Abstract:

Introduction: The use of pacifiers is common amongst infants and young children as a comforting behavior. These non-nutritive sucking habits can be detrimental to the developing occlusion should they persist while the permanent dentition is established. Orthodontic pacifiers have been recommended as an alternative to conventional pacifiers as they are considered to have less interference with orofacial development. However, there is a lack of consensus on whether this is true. Aim and objectives: To review the prevalence of malocclusion associated with the use of orthodontic pacifiers. Methodology: Literature was identified through a rigorous search of the Embase, Pubmed, CINAHL, and Cochrane Library databases. Articles published from 2000 onwards were included. In total, 5 suitable papers were identified. Results: One study showed that the use of orthodontic pacifiers increased the risk of malocclusion, as seen through a greater prevalence of accentuated overjet, posterior crossbites, and anterior open bites in comparison to individuals who did not use pacifiers. However, this study found that there was a clinically significant reduction in the prevalence of anterior open bites amongst orthodontic pacifier users in comparison to conventional pacifier users. Another study found that both types of pacifiers lead to malocclusion; however, they found no difference in the mean overjet and prevalence of anterior open bites amongst conventional and orthodontic pacifier users. In contrast, one study suggested that orthodontic pacifiers do not seem to be related to the development of malocclusions in the primary dentitions, and using them between the ages of 0-3 months was actually beneficial as it prevents thumb-sucking habits. One of the systemic reviews concluded that orthodontic pacifiers do not seem to reduce the occurrence of posterior crossbites; however, they could reduce the development of open bites by virtue of their thin neck design. Whereas another systematic review concluded that there were no differences as to the effects on the stomatognathic system when comparing conventional and orthodontic pacifiers. Conclusion: There is limited and conflicting evidence to support the notion that orthodontic pacifiers can reduce the prevalence of malocclusion when compared to conventional pacifiers. Well-designed randomized controlled trials are required in the future in order to thoroughly assess the effects of orthodontic pacifiers on the developing occlusion and orofacial structures.

Keywords: orthodontics, pacifier, malocclusion, review

Procedia PDF Downloads 76
1049 Integrated Grey Rational Analysis-Standard Deviation Method for Handover in Heterogeneous Networks

Authors: Mohanad Alhabo, Naveed Nawaz, Mahmoud Al-Faris

Abstract:

The dense deployment of small cells is a promising solution to enhance the coverage and capacity of the heterogeneous networks (HetNets). However, the unplanned deployment could bring new challenges to the network ranging from interference, unnecessary handovers and handover failures. This will cause a degradation in the quality of service (QoS) delivered to the end user. In this paper, we propose an integrated Grey Rational Analysis Standard Deviation based handover method (GRA-SD) for HetNet. The proposed method integrates the Standard Deviation (SD) technique to acquire the weight of the handover metrics and the GRA method to select the best handover base station. The performance of the GRA-SD method is evaluated and compared with the traditional Multiple Attribute Decision Making (MADM) methods including Simple Additive Weighting (SAW) and VIKOR methods. Results reveal that the proposed method has outperformed the other methods in terms of minimizing the number of frequent unnecessary handovers and handover failures, in addition to improving the energy efficiency.

Keywords: energy efficiency, handover, HetNets, MADM, small cells

Procedia PDF Downloads 110
1048 A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking

Authors: Esmeralda Hysenbelliu

Abstract:

Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years.

Keywords: challenges, IPTV service, requirements, software defined networking (SDN)

Procedia PDF Downloads 267
1047 The Amount of Conformity of Persian Subject Headlines with Users' Social Tagging

Authors: Amir Reza Asnafi, Masoumeh Kazemizadeh, Najmeh Salemi

Abstract:

Due to the diversity of information resources in the web0.2 environment, which is increasing in number from time to time, the social tagging system should be used to discuss Internet resources. Studying the relevance of social tags to thematic headings can help enrich resources and make them more accessible to resources. The present research is of applied-theoretical type and research method of content analysis. In this study, using the listing method and content analysis, the level of accurate, approximate, relative, and non-conformity of social labels of books available in the field of information science and bibliography of Kitabrah website with Persian subject headings was determined. The exact matching of subject headings with social tags averaged 22 items, the approximate matching of subject headings with social tags averaged 36 items, the relative matching of thematic headings with social tags averaged 36 social items, and the average matching titles did not match the title. The average is 116. According to the findings, the exact matching of subject headings with social labels is the lowest and the most inconsistent. This study showed that the average non-compliance of subject headings with social labels is even higher than the sum of the three types of exact, relative, and approximate matching. As a result, the relevance of thematic titles to social labels is low. Due to the fact that the subject headings are in the form of static text and users are not allowed to interact and insert new selected words and topics, and on the other hand, in websites based on Web 2 and based on the social classification system, this possibility is available for users. An important point of the present study and the studies that have matched the syntactic and semantic matching of social labels with thematic headings is that the degree of conformity of thematic headings with social labels is low. Therefore, these two methods can complement each other and create a hybrid cataloging that includes subject headings and social tags. The low level of conformity of thematic headings with social tags confirms the results of backgrounds and writings that have compared the social tags of books with the thematic headings of the Library of Congress. It is not enough to match social labels with thematic headings. It can be said that these two methods can be complementary.

Keywords: Web 2/0, social tags, subject headings, hybrid cataloging

Procedia PDF Downloads 156
1046 Providing Support for Minority LGBTQ Students: Developing a Queer Studies Course

Authors: Karen Butler

Abstract:

The LGBTQ youth of color face stigma related to both race and gender identity. Effectively dealing with racial/ethnic discrimination requires strong connections to family and one’s racial/ethnic group. However, LGBTQ youth of color seldom receive support from family, peer groups or church groups. Moreover, ethnic communities often perceive LGBTQ identities as a rejection of ethnic heritage. Thus, stigma places these young people at greater risk for substance use, violence, risky sexual behaviors, suicide, and homelessness. Offering a Queer Studies (QS) class is one way to facilitate a safer and more inclusive environment for LGBTQ students, faculty and staff. The discipline of Queer Studies encompasses theories and thinkers from numerous fields: cultural studies, gay and lesbian studies, race studies, women's studies, media, postmodernism, post-colonialism, psychoanalysis and more. We began our course development by researching existing programs and classes. Several course syllabi were examined and course materials such as readings, videos, and guest speakers were assessed for possible inclusion. We also employed informal survey methods with students and faculty in order to gauge interest in the course. We then developed a sample course syllabus and began the process of new course approval. Feedback thus far indicates that students of various sexual orientations and gender identities are interested in the course and understand the need to offer it; faculty in Psychology, Social Work, and Interdisciplinary Studies are interested in cross-listing the course; library staff is willing to assist with course material acquisition, and the administration is supportive. The purpose of this session is to 1) explore the various health and wellness issues facing LGBTQ students of color and 2) share our experience of developing a QS course in health education in order to address these needs. This process, from initial recognition of the need to a course offering, will be described and discussed in the hopes that participants will increase their awareness of the issues. A QS course would be an appropriate requirement for any number of majors as well as an elective for any major.

Keywords: black colleges, health education, LGBTQ, queer studies

Procedia PDF Downloads 142
1045 Study of the Uncertainty Behaviour for the Specific Total Enthalpy of the Hypersonic Plasma Wind Tunnel Scirocco at Italian Aerospace Research Center

Authors: Adolfo Martucci, Iulian Mihai

Abstract:

By means of the expansion through a Conical Nozzle and the low pressure inside the Test Chamber, a large hypersonic stable flow takes place for a duration of up to 30 minutes. Downstream the Test Chamber, the diffuser has the function of reducing the flow velocity to subsonic values, and as a consequence, the temperature increases again. In order to cool down the flow, a heat exchanger is present at the end of the diffuser. The Vacuum System generates the necessary vacuum conditions for the correct hypersonic flow generation, and the DeNOx system, which follows the Vacuum System, reduces the nitrogen oxide concentrations created inside the plasma flow behind the limits imposed by Italian law. This very large, powerful, and complex facility allows researchers and engineers to reproduce entire re-entry trajectories of space vehicles into the atmosphere. One of the most important parameters for a hypersonic flowfield representative of re-entry conditions is the specific total enthalpy. This is the whole energy content of the fluid, and it represents how severe could be the conditions around a spacecraft re-entering from a space mission or, in our case, inside a hypersonic wind tunnel. It is possible to reach very high values of enthalpy (up to 45 MJ/kg) that, together with the large allowable size of the models, represent huge possibilities for making on-ground experiments regarding the atmospheric re-entry field. The maximum nozzle exit section diameter is 1950 mm, where values of Mach number very much higher than 1 can be reached. The specific total enthalpy is evaluated by means of a number of measurements, each of them concurring with its value and its uncertainty. The scope of the present paper is the evaluation of the sensibility of the uncertainty of the specific total enthalpy versus all the parameters and measurements involved. The sensors that, if improved, could give the highest advantages have so been individuated. Several simulations in Python with the METAS library and by means of Monte Carlo simulations are presented together with the obtained results and discussions about them.

Keywords: hypersonic, uncertainty, enthalpy, simulations

Procedia PDF Downloads 88
1044 Like Life Itself: Elemental Affordances in the Creation of Transmedia Storyworlds-The Four Broken Hearts Case Study

Authors: Muhammad Babar Suleman

Abstract:

Transgressing the boundaries of the real and the virtual, the temporal and the spatial and the personal and the political, Four Broken Hearts is a hybrid storyworld encompassing film, live performance, location-based experiences and social media. The project is scheduled for launch early next year and is currently a work-in-progress undergoing initial user testing. The story of Four Broken Hearts is being told by taking each of the classic elements of fiction- character, setting, exposition, climax and denouement - and bringing them ‘to life’ in the medium that conveys them to the highest degree of mimesis: Characters are built and explored through social media, Setting is experienced through location-based storytelling, the Backstory is fleshed out using film and the Climax is performed as an immersive drama. By taking advantage of what each medium does best while complementing the other mediums, Four Broken Hearts is presented in the form of a rich transmedia experience that allows audiences to explore the story world across many different platforms while still tying it all together within a cohesive narrative. This article presents an investigation of the project’s narrative outputs produced so far.

Keywords: narratology, storyworld, transmedia, narrative, storytelling

Procedia PDF Downloads 303
1043 Shariah Compliance Space Planning for Hotel Room Design

Authors: Syaza Bt. Saifuddin, Rashidi Bin Othman, Muhammad Hafizuddin Akmal Bin Md Hashim, Ismail Bin Jasmani, Noor Hanita Bt. Abdul Majid

Abstract:

This paper illustrates the background of various concepts, approaches, terminologies used to describe the basic framework of an Islamic Hotel Room design. This paper reviews the theoretical views in establishing a suitable and optimum environment for Muslim as well as non-Muslim guests in hotel rooms while according to shariah. It involves a few research methodologies that requires the researcher to study on a few characteristics needed to create more efficient rooms in terms of social interaction, economic growth and other tolerable elements. This paper intends on revealing the elements that are vital and may contribute for hotels in achieving a more conclusive research on space planning for hotel rooms focusing on the shariah and Muslim guests. Malaysia is an Islamic country and has billion of tourists coming over for business and recreational purposes. Therefore, having a righteous environment that best suit this target user is important in terms of generating the economy as well as providing a better understanding to the community on the benefits of applying these qualities in a conventional resort design.

Keywords: design, Islam, room, shariah compliant hotel

Procedia PDF Downloads 334
1042 Graph Based Traffic Analysis and Delay Prediction Using a Custom Built Dataset

Authors: Gabriele Borg, Alexei Debono, Charlie Abela

Abstract:

There on a constant rise in the availability of high volumes of data gathered from multiple sources, resulting in an abundance of unprocessed information that can be used to monitor patterns and trends in user behaviour. Similarly, year after year, Malta is also constantly experiencing ongoing population growth and an increase in mobilization demand. This research takes advantage of data which is continuously being sourced and converting it into useful information related to the traffic problem on the Maltese roads. The scope of this paper is to provide a methodology to create a custom dataset (MalTra - Malta Traffic) compiled from multiple participants from various locations across the island to identify the most common routes taken to expose the main areas of activity. This use of big data is seen being used in various technologies and is referred to as ITSs (Intelligent Transportation Systems), which has been concluded that there is significant potential in utilising such sources of data on a nationwide scale. Furthermore, a series of traffic prediction graph neural network models are conducted to compare MalTra to large-scale traffic datasets.

Keywords: graph neural networks, traffic management, big data, mobile data patterns

Procedia PDF Downloads 120
1041 A Qualitative Study Exploring Factors Influencing the Uptake of and Engagement with Health and Wellbeing Smartphone Apps

Authors: D. Szinay, O. Perski, A. Jones, T. Chadborn, J. Brown, F. Naughton

Abstract:

Background: The uptake of health and wellbeing smartphone apps is largely influenced by popularity indicators (e.g., rankings), rather than evidence-based content. Rapid disengagement is common. This study aims to explore how and why potential users 1) select and 2) engage with such apps, and 3) how increased engagement could be promoted. Methods: Semi-structured interviews and a think-aloud approach were used to allow participants to verbalise their thoughts whilst searching for a health or wellbeing app online, followed by a guided search in the UK National Health Service (NHS) 'Apps Library' and Public Health England’s (PHE) 'One You' website. Recruitment took place between June and August 2019. Adults interested in using an app for behaviour change were recruited through social media. Data were analysed using the framework approach. The analysis is both inductive and deductive, with the coding framework being informed by the Theoretical Domains Framework. The results are further mapped onto the COM-B (Capability, Opportunity, Motivation - Behaviour) model. The study protocol is registered on the Open Science Framework (https://osf.io/jrkd3/). Results: The following targets were identified as playing a key role in increasing the uptake of and engagement with health and wellbeing apps: 1) psychological capability (e.g., reduced cognitive load); 2) physical opportunity (e.g., low financial cost); 3) social opportunity (e.g., embedded social media); 4) automatic motivation (e.g., positive feedback). Participants believed that the promotion of evidence-based apps on NHS-related websites could be enhanced through active promotion on social media, adverts on the internet, and in general practitioner practices. Future Implications: These results can inform the development of interventions aiming to promote the uptake of and engagement with evidence-based health and wellbeing apps, a priority within the UK NHS Long Term Plan ('digital first'). The targets identified across the COM-B domains could help organisations that provide platforms for such apps to increase impact through better selection of apps.

Keywords: behaviour change, COM-B model, digital health, mhealth

Procedia PDF Downloads 155
1040 Analysis of Importance of Culture in Distributed Design Based on the Case Study at the University of Strathclyde

Authors: Zixuan Yang

Abstract:

This paper presents an analysis of the necessary consideration culture in distributed design through a thorough literature review and case study. The literature review has identified that the need for understanding cultural differences in product design and user evaluations is highlighted by analyzing cross-cultural influences; culture plays a significant role in distributed work, particularly in establishing team cohesion, trust, and credibility early in the project. By applying approaches of Geert Hofstede's dimensions and Fukuyama's trust analysis, a case study of a global design project, i.e., multicultural distributed teamwork solving the problem in terms of reducing the risk of deep vein thrombosis, showcases cultural dynamics, emphasizing trust-building and decision-making. The lessons learned emphasized the importance of cultural awareness, adaptability, and the utilization of scientific theories to enable effective cross-cultural collaborations in global design, providing valuable insights into navigating cultural diversity within design practices.

Keywords: culture, distributed design, global design, Geert Hofstede's dimensions, Fukuyama's trust analysis

Procedia PDF Downloads 59
1039 Urban Big Data: An Experimental Approach to Building-Value Estimation Using Web-Based Data

Authors: Sun-Young Jang, Sung-Ah Kim, Dongyoun Shin

Abstract:

Current real-estate value estimation, difficult for laymen, usually is performed by specialists. This paper presents an automated estimation process based on big data and machine-learning technology that calculates influences of building conditions on real-estate price measurement. The present study analyzed actual building sales sample data for Nonhyeon-dong, Gangnam-gu, Seoul, Korea, measuring the major influencing factors among the various building conditions. Further to that analysis, a prediction model was established and applied using RapidMiner Studio, a graphical user interface (GUI)-based tool for derivation of machine-learning prototypes. The prediction model is formulated by reference to previous examples. When new examples are applied, it analyses and predicts accordingly. The analysis process discerns the crucial factors effecting price increases by calculation of weighted values. The model was verified, and its accuracy determined, by comparing its predicted values with actual price increases.

Keywords: apartment complex, big data, life-cycle building value analysis, machine learning

Procedia PDF Downloads 368
1038 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 164
1037 Aiding Water Flow in Irrigation Technology with a Pedal Operated Manual Pump

Authors: Isaac Ali Kwasu, Aje Tokan

Abstract:

The research was set to design a manually pedal operated water pump to aid water flow technology for irrigation activities for rural farmers. The development was carried out first by a prototype design to guide the fabrication. All items needed for the fabrication were used for the final product. The machine is operated manually by pedaling. This engages all the parts of the machine into active motion. Energy is generated and transfer finally to the pumping unit which is wired with plastic pipes. The pumping unit which is wired with PVC pipes, both linked to the water source and the reservoir respectively. The (rpm) revolution per minute of the machine is approximated at 3130 depending on the pedaling speed of the user. The machine does not have gear arrangement yet can give high (rpm) for effective performance. The pumping performance of the machine is 125 liters in one minute and can sustain small scale irrigation farming activities and to supplement water management system to sustain crop growth.

Keywords: pump, development, manual, flywheel, sprocket, pulley, machine, v belt, chain, hub, pipe, steel, mechanism, irrigation, prototype, fabrication

Procedia PDF Downloads 199
1036 Exploring Pre-Trained Automatic Speech Recognition Model HuBERT for Early Alzheimer’s Disease and Mild Cognitive Impairment Detection in Speech

Authors: Monica Gonzalez Machorro

Abstract:

Dementia is hard to diagnose because of the lack of early physical symptoms. Early dementia recognition is key to improving the living condition of patients. Speech technology is considered a valuable biomarker for this challenge. Recent works have utilized conventional acoustic features and machine learning methods to detect dementia in speech. BERT-like classifiers have reported the most promising performance. One constraint, nonetheless, is that these studies are either based on human transcripts or on transcripts produced by automatic speech recognition (ASR) systems. This research contribution is to explore a method that does not require transcriptions to detect early Alzheimer’s disease (AD) and mild cognitive impairment (MCI). This is achieved by fine-tuning a pre-trained ASR model for the downstream early AD and MCI tasks. To do so, a subset of the thoroughly studied Pitt Corpus is customized. The subset is balanced for class, age, and gender. Data processing also involves cropping the samples into 10-second segments. For comparison purposes, a baseline model is defined by training and testing a Random Forest with 20 extracted acoustic features using the librosa library implemented in Python. These are: zero-crossing rate, MFCCs, spectral bandwidth, spectral centroid, root mean square, and short-time Fourier transform. The baseline model achieved a 58% accuracy. To fine-tune HuBERT as a classifier, an average pooling strategy is employed to merge the 3D representations from audio into 2D representations, and a linear layer is added. The pre-trained model used is ‘hubert-large-ls960-ft’. Empirically, the number of epochs selected is 5, and the batch size defined is 1. Experiments show that our proposed method reaches a 69% balanced accuracy. This suggests that the linguistic and speech information encoded in the self-supervised ASR-based model is able to learn acoustic cues of AD and MCI.

Keywords: automatic speech recognition, early Alzheimer’s recognition, mild cognitive impairment, speech impairment

Procedia PDF Downloads 120
1035 Implementation of Successive Interference Cancellation Algorithms in the 5g Downlink

Authors: Mokrani Mohamed Amine

Abstract:

In this paper, we have implemented successive interference cancellation algorithms in the 5G downlink. We have calculated the maximum throughput in Frequency Division Duplex (FDD) mode in the downlink, where we have obtained a value equal to 836932 b/ms. The transmitter is of type Multiple Input Multiple Output (MIMO) with eight transmitting and receiving antennas. Each antenna among eight transmits simultaneously a data rate of 104616 b/ms that contains the binary messages of the three users; in this case, the Cyclic Redundancy Check CRC is negligible, and the MIMO category is the spatial diversity. The technology used for this is called Non-Orthogonal Multiple Access (NOMA) with a Quadrature Phase Shift Keying (QPSK) modulation. The transmission is done in a Rayleigh fading channel with the presence of obstacles. The MIMO Successive Interference Cancellation (SIC) receiver with two transmitting and receiving antennas recovers its binary message without errors for certain values of transmission power such as 50 dBm, with 0.054485% errors when the transmitted power is 20dBm and with 0.00286763% errors for a transmitted power of 32 dBm(in the case of user 1) as well as with 0.0114705% errors when the transmitted power is 20 dBm also with 0.00286763% errors for a power of 24 dBm(in the case of user2) by applying the steps involved in SIC.

Keywords: 5G, NOMA, QPSK, TBS, LDPC, SIC, capacity

Procedia PDF Downloads 96
1034 Time and Wavelength Division Multiplexing Passive Optical Network Comparative Analysis: Modulation Formats and Channel Spacings

Authors: A. Fayad, Q. Alqhazaly, T. Cinkler

Abstract:

In light of the substantial increase in end-user requirements and the incessant need of network operators to upgrade the capabilities of access networks, in this paper, the performance of the different modulation formats on eight-channels Time and Wavelength Division Multiplexing Passive Optical Network (TWDM-PON) transmission system has been examined and compared. Limitations and features of modulation formats have been determined to outline the most suitable design to enhance the data rate and transmission reach to obtain the best performance of the network. The considered modulation formats are On-Off Keying Non-Return-to-Zero (NRZ-OOK), Carrier Suppressed Return to Zero (CSRZ), Duo Binary (DB), Modified Duo Binary (MODB), Quadrature Phase Shift Keying (QPSK), and Differential Quadrature Phase Shift Keying (DQPSK). The performance has been analyzed by varying transmission distances and bit rates under different channel spacing. Furthermore, the system is evaluated in terms of minimum Bit Error Rate (BER) and Quality factor (Qf) without applying any dispersion compensation technique, or any optical amplifier. Optisystem software was used for simulation purposes.

Keywords: BER, DuoBinary, NRZ-OOK, TWDM-PON

Procedia PDF Downloads 144
1033 Intelligent Tooling Embedded Sensors for Monitoring the Wear of Cutting Tools in Turning Applications

Authors: Hatim Laalej, Jon Stammers

Abstract:

In machining, monitoring of tool wear is essential for achieving the desired dimensional accuracy and surface finish of a machined workpiece. Currently, the task of monitoring the wear on the cutting tool is carried out by the operator who performs manual inspections of the cutting tool, causing undesirable stoppages of machine tools and consequently resulting in costs incurred from loss of productivity. The cutting tool consumable costs may also be higher than necessary when tools are changed before the end of their useful life. Furthermore, damage can be caused to the workpiece when tools are not changed soon enough leading to a significant increase in the costs of manufacturing. The present study is concerned with the development of break sensor printed on the flank surface of poly-crystalline diamond (PCD) cutting to perform on-line condition monitoring of the cutting tool used to machine Titanium Ti-6al-4v bar. The results clearly show that there is a strong correlation between the break sensor measurements and the amount of wear in the cutting tool. These findings are significant in that they help the user/operator of the machine tool to determine the condition of the cutting tool without the need of performing manual inspection, thereby reducing the manufacturing costs such as the machine down time.

Keywords: machining, manufacturing, tool wear, signal processing

Procedia PDF Downloads 235
1032 The Influence of Social Media on Gym Memberships in the UAE

Authors: Mohammad Obeidat

Abstract:

In recent years, social media has revolutionized the way businesses market their products and services. Platforms such as Instagram, Facebook, YouTube, and TikTok have become powerful tools for reaching large audiences and engaging with consumers in real-time. These platforms allow businesses to create visually appealing content, interact with customers, and leverage user-generated content to enhance brand visibility and credibility. Recent statistics indicate that businesses that actively participate in social media marketing see improvements in brand visibility, customer engagement, and revenue generation. For example, several studies reveal that 70% of business-to-consumer marketers have gained customers through Facebook. This study aims to contribute to the academic literature on social media marketing and consumer behavior, specifically within the context of the fitness industry in the UAE. The findings will provide valuable insights for gym and fitness center managers, marketers, and social media strategists looking to enhance their engagement with potential customers. By understanding the impact of social media on purchasing decisions, businesses can tailor their marketing efforts to meet consumer expectations better and drive membership growth.

Keywords: social media, consumer behavior, digital native, influencer

Procedia PDF Downloads 37
1031 The Implementation of the Multi-Agent Classification System (MACS) in Compliance with FIPA Specifications

Authors: Mohamed R. Mhereeg

Abstract:

The paper discusses the implementation of the MultiAgent classification System (MACS) and utilizing it to provide an automated and accurate classification of end users developing applications in the spreadsheet domain. However, different technologies have been brought together to build MACS. The strength of the system is the integration of the agent technology with the FIPA specifications together with other technologies, which are the .NET widows service based agents, the Windows Communication Foundation (WCF) services, the Service Oriented Architecture (SOA), and Oracle Data Mining (ODM). Microsoft's .NET windows service based agents were utilized to develop the monitoring agents of MACS, the .NET WCF services together with SOA approach allowed the distribution and communication between agents over the WWW. The Monitoring Agents (MAs) were configured to execute automatically to monitor excel spreadsheets development activities by content. Data gathered by the Monitoring Agents from various resources over a period of time was collected and filtered by a Database Updater Agent (DUA) residing in the .NET client application of the system. This agent then transfers and stores the data in Oracle server database via Oracle stored procedures for further processing that leads to the classification of the end user developers.

Keywords: MACS, implementation, multi-agent, SOA, autonomous, WCF

Procedia PDF Downloads 267
1030 Applying Risk Taking in Islamic Finance: A Fiqhī Viewpoint

Authors: Mohamed Fairooz Abdul Khir

Abstract:

The linkage between liability for risk and legitimacy of reward is a governing principle that must be fully observed in financial transactions. It is the cornerstone of any Islamic business or financial deal. The absence of risk taking principle may give rise to numerous prohibited elements such as ribā, gharar and gambling that violate the objectives of financial transactions. However, fiqhī domains from which it emanates have not been clearly spelled out by the scholars. In addition, the concept of risk taking in relation to contemporary risks associated with financial contracts, such as credit risk, liquidity risk, reputational risk and market risk, needs further scrutiny as regard their Sharīʿah bases. Hence, this study is imperatively significant to prove that absence of risk taking concept in Islamic financial instruments give rise to prohibited elements particularly ribā. This study is primarily intended to clarify the concept of risk in Islamic financial transactions from the fiqhī perspective and evaluate analytically the selected issues involving risk taking based on the established concept of risk taking from fiqhī viewpoint. The selected issues are amongst others charging cost of fund on defaulting customers, holding the lessee liable for total loss of leased asset under ijārah thumma al-bayʿ and capital guarantee under mushārakah based instruments. This is a library research in which data has been collected from various materials such as classical fiqh books, regulators’ policy guidelines and journal articles. This study employed deductive and inductive methods to analyze the data critically in search for conclusive findings. It suggests that business risks have to be evaluated based on their subjects namely (i) property (māl) and (ii) work (ʿamal) to ensure that Islamic financial instruments structured based on certain Sharīʿah principles are not diverted from the risk taking concept embedded in them. Analysis of the above selected cases substantiates that when risk taking principle is breached, the prohibited elements such as ribā, gharar and maysir do arise and that they impede the realization of the maqāṣid al-Sharīʿah intended from Islamic financial contracts.

Keywords: Islamic finance, ownership risk, ribā, risk taking

Procedia PDF Downloads 323
1029 Emotion Oriented Students' Opinioned Topic Detection for Course Reviews in Massive Open Online Course

Authors: Zhi Liu, Xian Peng, Monika Domanska, Lingyun Kang, Sannyuya Liu

Abstract:

Massive Open education has become increasingly popular among worldwide learners. An increasing number of course reviews are being generated in Massive Open Online Course (MOOC) platform, which offers an interactive feedback channel for learners to express opinions and feelings in learning. These reviews typically contain subjective emotion and topic information towards the courses. However, it is time-consuming to artificially detect these opinions. In this paper, we propose an emotion-oriented topic detection model to automatically detect the students’ opinioned aspects in course reviews. The known overall emotion orientation and emotional words in each review are used to guide the joint probabilistic modeling of emotion and aspects in reviews. Through the experiment on real-life review data, it is verified that the distribution of course-emotion-aspect can be calculated to capture the most significant opinioned topics in each course unit. This proposed technique helps in conducting intelligent learning analytics for teachers to improve pedagogies and for developers to promote user experiences.

Keywords: Massive Open Online Course (MOOC), course reviews, topic model, emotion recognition, topical aspects

Procedia PDF Downloads 256
1028 Cellulose Enhancement in Wood Used in Pulp Production by Overexpression of Korrigan and Sucrose Synthase Genes

Authors: Anil Kumar, Diwakar Aggarwal, M. Sudhakara Reddy

Abstract:

The wood of Eucalyptus, Populus and bamboos are some important species used as raw material for the manufacture of pulp. However, higher levels of lignin pose a problem during Kraft pulping and yield of pulp is also lower. In order to increase the yield of pulp per unit wood and reduce the use of chemicals during kraft pulping it is important to reduce the lignin content and/or increase cellulose content in wood. Cellulose biosynthesis in wood takes place by the coordinated action of many enzymes. The two important enzymes are KORRIGAN and SUCROSE SYNTHASE. KORRIGAN (Endo-1,4--glucanase) is implicated in the process of editing growing cellulose chains and improvement of the crystallinity of produced cellulose, whereas SUCROSE SYNTHASE is involved in providing substrate (UDP-glucose) for growing cellulose chains. The present study was aimed at the cloning, characterization and overexpression of these genes in Eucalyptus and Populus. An efficient shoot organogenesis protocol from leaf explants taken from micro shoots of the species has been developed. Agrobacterium mediated genetic transformation using Agrobacterium tumefaciens strain EHA105 and LBA4404 harboring binary vector pBI121 was achieved. Both the genes were cloned from cDNA library of Populus deltoides. These were subsequently characterized using various bioinformatics tools. The cloned genes were then inserted into pBI121 under the CaMV35S promotors replacing GUS gene. The constructs were then mobilized into above strains of Agrobacterium and used for the transformation work. Subsequently, genetic transformation of these clones with target genes following already developed protocol is in progress. Four transgenic lines of Eucalyptus tereticornis overexpressing Korrigan gene under the strong constitutive promoters CaMV35S have been developed, which are being further evaluated. Work on development of more transgenic lines overexpressing these genes in Populus and Eucalyptus is also in progress. This presentation will focus on important developments in this direction.

Keywords: Eucalyptus tereticornis, genetic transformation, Kraft pulping Populus deltoides

Procedia PDF Downloads 133
1027 Method for Improving Antidepressants Adherence in Patients with Depressive Disorder: Systemic Review and Meta-Analysis

Authors: Juntip Kanjanasilp, Ratree Sawangjit, Kanokporn Meelap, Kwanchanok Kruthakool

Abstract:

Depression is a common mental health disorder. Antidepressants are effective pharmacological treatments, but most patients have low medication adherence. This study aims to systematic review and meta-analysis what method increase the antidepressants adherence efficiently and improve clinical outcome. Systematic review of articles of randomized controlled trials obtained by a computerized literature search of The Cochrane, Library, Pubmed, Embase, PsycINFO, CINAHL, Education search, Web of Science and ThaiLIS (28 December 2017). Twenty-three studies were included and assessed the quality of research by ROB 2.0. The results reported that printing media improved in number of people who had medication adherence statistical significantly (p= 0.018), but education, phone call, and program utilization were no different (p=0.172, p=0.127, p=0.659). There was no significant difference in pharmacist’s group, health care team’s group and physician’s group (p=0.329, p=0.070, p=0.040). Times of intervention at 1 month and 6 months improved medication adherence significantly (p= 0.0001, p=0.013). There was significantly improved adherence in single intervention (p=0.027) but no different in multiple interventions (p=0.154). When we analyzed medication adherence with the mean score, no improved adherence was found, not relevant with who gives the intervention and times to intervention. However, the multiple interventions group was statistically significant improved medication adherence (p=0.040). Phone call and the physician’s group were statistically significant improved clinical outcomes in number of improved patients (0.025 and 0.020, respectively). But in the pharmacist’s group and physician’s group were not found difference in the mean score of clinical outcomes (p=0.993, p=0.120, respectively). Times to intervention and number of intervention were not significant difference than usual care. The overall intervention can increase antidepressant adherence, especially the printing media, and the appropriate timing of the intervention is at least 6 months. For effective treatment, the provider should have experience and expert in caring for patients with depressive disorders, such as a psychiatrist. Medical personnel should have knowledge in caring for these patients also.

Keywords: depression, medication adherence, clinical outcomes, systematic review, meta-analysis

Procedia PDF Downloads 130