Search results for: computer code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3663

Search results for: computer code

1893 Effect of Double-Skin Facade Configuration on the Energy Performance of Office Building in Maritime Desert Climate

Authors: B. Umaru Mohammed, Faris A. Al-Maziad, Mohammad Y. Numan

Abstract:

One of the most important factors affecting the energy performance within a building is a carefully and efficiently designed facade. The primary aim of this research was to identify and present the potentiality of utilising Double-Skin Facade (DSF) construction and critically examine its effect on the energy consumption of an office building located within a maritime desert climate as to the conventional single-skin curtain wall system. A comparative analysis of the effect on the overall energy consumption within an office building was investigated in which a combination of various Double-Skin Facade configurations, systems, and cavity depths, glazing types and orientations were utilised. A computer dynamic modelling was utilised in order to ensure accurate calculations and efficient simulations of the various DSF systems due to the complex nature of the various functions within the Facade cavity. Through the use of the dynamic thermal modelling simulations, the best cavity size glazed type and orientation were determined to lead to a detailed analysis of the efficiency of each respective combination of Double-Skin Facade construction. As such the optimal facade combination for use within an office building located in a maritime desert climate was identified. Results demonstrated that a multi-story Facade, depending on its configuration, save up to 5% on annual cooling loads respect to a Corridor Facade and while vented can save unto 12% when compared to the single skin façade, on annual cooling load in the maritime desert climate. The selected configuration of the DSF from SSF saves an overall annual cooling load of 32%.A comparative analysis of the effect on the overall energy consumption within an office building was investigated in which a combination of various Double-Skin Facade configurations, systems, and cavity depths, glazing types and orientations were utilized. A computer dynamic modelling was utilized in order to ensure accurate calculations and efficient simulations of the various DSF systems due to the complex nature of the various functions within the Facade cavity. Through the use of the dynamic thermal modelling simulations, the best cavity size glazed type and orientation were determined to lead to a detailed analysis of the efficiency of each respective combination of Double-Skin Facade construction. As such the optimal facade combination for use within an office building located in a maritime desert climate was identified. Results demonstrated that a multi-story Facade, depending on its configuration, save up to 5% on annual cooling loads respect to a Corridor Facade and while vented can save unto 12% when compared to the single skin facade, on annual cooling load in the maritime desert climate. The selected configuration of the DSF from SSF saves an overall annual cooling load of 32%.

Keywords: computer dynamics modelling, comparative analysis, energy computation, double skin facade, single skin curtain wall, maritime desert climate

Procedia PDF Downloads 342
1892 An Inquiry on 2-Mass and Wheeled Mobile Robot Dynamics

Authors: Boguslaw Schreyer

Abstract:

In this paper, a general dynamical model is derived using the Lagrange formalism. The two masses: sprang and unsprang are included in a six-degree of freedom model for a sprung mass. The unsprung mass is included and shown only in a simplified model, although its equations have also been derived by an author. The simplified equations, more suitable for the computer model of robot’s dynamics are also shown.

Keywords: dynamics, mobile, robot, wheeled mobile robots

Procedia PDF Downloads 337
1891 Investigating the Effect of Using Amorphous Silica Ash Obtained from Rice Husk as a Partial Replacement of Ordinary Portland Cement on the Mechanical and Microstructure Properties of Cement Paste and Mortar

Authors: Aliyu Usman, Muhaammed Bello Ibrahim, Yusuf D. Amartey, Jibrin M. Kaura

Abstract:

This research is aimed at investigating the effect of using amorphous silica ash (ASA) obtained from rice husk as a partial replacement of ordinary Portland cement (OPC) on the mechanical and microstructure properties of cement paste and mortar. ASA was used in partial replacement of ordinary Portland cement in the following percentages 3 percent, 5 percent, 8 percent and 10 percent. These partial replacements were used to produce Cement-ASA paste and Cement-ASA mortar. ASA was found to contain all the major chemical compounds found in cement with the exception of alumina, which are SiO2 (91.5%), CaO (2.84%), Fe2O3 (1.96%), and loss on ignition (LOI) was found to be 9.18%. It also contains other minor oxides found in cement. Consistency of Cement-ASA paste was found to increase with increase in ASA replacement. Likewise, the setting time and soundness of the Cement-ASA paste also increases with increase in ASA replacements. The test on hardened mortar were destructive in nature which include flexural strength test on prismatic beam (40mm x 40mm x 160mm) at 2, 7, 14 and 28 days curing and compressive strength test on the cube size (40mm x 40mm, by using the auxiliary steel platens) at 2,7,14 and 28 days curing. The Cement-ASA mortar flexural and compressive strengths were found to be increasing with curing time and decreases with cement replacement by ASA. It was observed that 5 percent replacement of cement with ASA attained the highest strength for all the curing ages and all the percentage replacements attained the targeted compressive strength of 6N/mm2 for 28 days. There is an increase in the drying shrinkage of Cement-ASA mortar with curing time, it was also observed that the drying shrinkages for all the curing ages were greater than the control specimen all of which were greater than the code recommendation of less than 0.03%. The scanning electron microscope (SEM) was used to study the Cement-ASA mortar microstructure and to also look for hydration product and morphology.

Keywords: amorphous silica ash, cement mortar, cement paste, scanning electron microscope

Procedia PDF Downloads 435
1890 Development of a Paediatric Head Model for the Computational Analysis of Head Impact Interactions

Authors: G. A. Khalid, M. D. Jones, R. Prabhu, A. Mason-Jones, W. Whittington, H. Bakhtiarydavijani, P. S. Theobald

Abstract:

Head injury in childhood is a common cause of death or permanent disability from injury. However, despite its frequency and significance, there is little understanding of how a child’s head responds during injurious loading. Whilst Infant Post Mortem Human Subject (PMHS) experimentation is a logical approach to understand injury biomechanics, it is the authors’ opinion that a lack of subject availability is hindering potential progress. Computer modelling adds great value when considering adult populations; however, its potential remains largely untapped for infant surrogates. The complexities of child growth and development, which result in age dependent changes in anatomy, geometry and physical response characteristics, present new challenges for computational simulation. Further geometric challenges are presented by the intricate infant cranial bones, which are separated by sutures and fontanelles and demonstrate a visible fibre orientation. This study presents an FE model of a newborn infant’s head, developed from high-resolution computer tomography scans, informed by published tissue material properties. To mimic the fibre orientation of immature cranial bone, anisotropic properties were applied to the FE cranial bone model, with elastic moduli representing the bone response both parallel and perpendicular to the fibre orientation. Biofiedility of the computational model was confirmed by global validation against published PMHS data, by replicating experimental impact tests with a series of computational simulations, in terms of head kinematic responses. Numerical results confirm that the FE head model’s mechanical response is in favourable agreement with the PMHS drop test results.

Keywords: finite element analysis, impact simulation, infant head trauma, material properties, post mortem human subjects

Procedia PDF Downloads 326
1889 The Impacts of an Adapted Literature Circle Model on Reading Comprehension, Engagement, and Cooperation in an EFL Reading Course

Authors: Tiantian Feng

Abstract:

There is a dearth of research on the literary circle as a teaching strategy in English as a Foreign Language (EFL) classes in Chinese colleges and universities and even fewer empirical studies on its impacts. In this one-quarter, design-based project, the researcher aims to increase students’ engagement, cooperation, and, on top of that, reading comprehension performance by utilizing a researcher-developed, adapted reading circle model in an EFL reading course at a Chinese college. The model also integrated team-based learning and portfolio assessment, with an emphasis on the specialization of individual responsibilities, contributions, and outcomes in reading projects, with the goal of addressing current issues in EFL classes at Chinese colleges, such as passive learning, test orientation, ineffective and uncooperative teamwork, and lack of dynamics. In this quasi-experimental research, two groups of students enrolled in the course were invited to participate in four in-class team projects, with the intervention class following the adapted literature circle model and team members rotating as Leader, Coordinator, Brain trust, and Reporter. The researcher/instructor used a sequential explanatory mixed-methods approach to quantitatively analyze the final grades for the pre-and post-tests, as well as individual scores for team projects and will code students' artifacts in the next step, with the results to be reported in a subsequent paper(s). Initial analysis showed that both groups saw an increase in final grades, but the intervention group enjoyed a more significant boost, suggesting that the adapted reading circle model is effective in improving students’ reading comprehension performance. This research not only closes the empirical research gap of literature circles in college EFL classes in China but also adds to the pool of effective ways to optimize reading comprehension performance and class performance in college EFL classes.

Keywords: literature circle, EFL teaching, college english reading, reading comprehension

Procedia PDF Downloads 100
1888 Development of Pre-Mitigation Measures and Its Impact on Life-Cycle Cost of Facilities: Indian Scenario

Authors: Mahima Shrivastava, Soumya Kar, B. Swetha Malika, Lalu Saheb, M. Muthu Kumar, P. V. Ponambala Moorthi

Abstract:

Natural hazards and manmade destruction causes both economic and societal losses. Generalized pre-mitigation strategies introduced and adopted for prevention of disaster all over the world are capable of augmenting the resiliency and optimizing the life-cycle cost of facilities. In countries like India where varied topographical feature exists requires location specific mitigation measures and strategies to be followed for better enhancement by event-driven and code-driven approaches. Present state of vindication measures followed and adopted, lags dominance in accomplishing the required development. In addition, serious concern and debate over climate change plays a vital role in enhancing the need and requirement for the development of time bound adaptive mitigation measures. For the development of long-term sustainable policies incorporation of future climatic variation is inevitable. This will further assist in assessing the impact brought about by the climate change on life-cycle cost of facilities. This paper develops more definite region specific and time bound pre-mitigation measures, by reviewing the present state of mitigation measures in India and all over the world for improving life-cycle cost of facilities. For the development of region specific adoptive measures, Indian regions were divided based on multiple-calamity prone regions and geo-referencing tools were used to incorporate the effect of climate changes on life-cycle cost assessment. This study puts forward significant effort in establishing sustainable policies and helps decision makers in planning for pre-mitigation measures for different regions. It will further contribute towards evaluating the life cycle cost of facilities by adopting the developed measures.

Keywords: climate change, geo-referencing tools, life-cycle cost, multiple-calamity prone regions, pre-mitigation strategies, sustainable policies

Procedia PDF Downloads 381
1887 Computation of Radiotherapy Treatment Plans Based on CT to ED Conversion Curves

Authors: B. Petrović, L. Rutonjski, M. Baucal, M. Teodorović, O. Čudić, B. Basarić

Abstract:

Radiotherapy treatment planning computers use CT data of the patient. For the computation of a treatment plan, treatment planning system must have an information on electron densities of tissues scanned by CT. This information is given by the conversion curve CT (CT number) to ED (electron density), or simply calibration curve. Every treatment planning system (TPS) has built in default CT to ED conversion curves, for the CTs of different manufacturers. However, it is always recommended to verify the CT to ED conversion curve before actual clinical use. Objective of this study was to check how the default curve already provided matches the curve actually measured on a specific CT, and how much it influences the calculation of a treatment planning computer. The examined CT scanners were from the same manufacturer, but four different scanners from three generations. The measurements of all calibration curves were done with the dedicated phantom CIRS 062M Electron Density Phantom. The phantom was scanned, and according to real HU values read at the CT console computer, CT to ED conversion curves were generated for different materials, for same tube voltage 140 kV. Another phantom, CIRS Thorax 002 LFC which represents an average human torso in proportion, density and two-dimensional structure, was used for verification. The treatment planning was done on CT slices of scanned CIRS LFC 002 phantom, for selected cases. Interest points were set in the lungs, and in the spinal cord, and doses recorded in TPS. The overall calculated treatment times for four scanners and default scanner did not differ more than 0.8%. Overall interest point dose in bone differed max 0.6% while for single fields was maximum 2.7% (lateral field). Overall interest point dose in lungs differed max 1.1% while for single fields was maximum 2.6% (lateral field). It is known that user should verify the CT to ED conversion curve, but often, developing countries are facing lack of QA equipment, and often use default data provided. We have concluded that the CT to ED curves obtained differ in certain points of a curve, generally in the region of higher densities. This influences the treatment planning result which is not significant, but definitely does make difference in the calculated dose.

Keywords: Computation of treatment plan, conversion curve, radiotherapy, electron density

Procedia PDF Downloads 490
1886 Photoactivated Chromophore for Keratitis-Cross Linking Window Absorption Alone versus Combined Pack-CXL Window Absorption and Standard Anti-microbial Therapy for Treatment of Infectious Keratitis: A Prospective Study

Authors: Mohammed M. Mahdy Tawfeek

Abstract:

Objective: The aim of this work is to compare the outcome of photoactivated chromophore for keratitis-cross linking (PACK-CXL) window absorption (WA) alone with combined PACK-CXL WA and standard anti-microbial therapy (SAT) for the treatment of infectious keratitis. Patients and Methods: This is a randomized prospective comparative clinical trial. Thirty eyes with clinically suspected infectious keratitis were randomly assigned into two equal groups of 15 eyes each: Group (A) was treated by PACK-CXL WA alone and group (B) was treated by PACK-CXL WA combined with SAT. Identification of organisms was made by lab study before treatment. Corneal healing was evaluated by corneal examination and anterior segment OCT (AS-OCT). Written informed consent was obtained from all participants and the study was approved by the research ethics committee of the Faculty of Medicine, Zagazig University. The work has been carried out in accordance with The Code of Ethics of the World Medical Association (Declaration of Helsinki) for studies involving humans. Results: Complete healing and resolution (Successful treatment) were observed in 10 eyes (66.7%) of a group (A) and 14 eyes (93.3%) of group (B) and failure was observed in 5 eyes (33.3%) of a group (A) and one eye (6.67%) of group (B). They were statistically significant (P =0.042 and 0.003) in a comparison between both groups regarding success and failure of treatment, respectively. Complete corneal healing was reported in the third month postoperatively in 10 eyes (66.7%) of group (A) and 14 eyes (93.3%) of group (B). Complications were absent in 12 patients (80%) in group (A) and 14 patients (93.3%) of group (B); however, perforation and impending perforation were found in 3 patients of group (A) and only one patient of group (B). Conclusion: PACK-CXL is a promising, non-invasive treatment option for infectious keratitis, especially when performed with the window absorption (WA) technique, either alone or combined with SAT. It has a synergistic effect with a standard antimicrobial treatment that gives good outcome results in the treatment of infectious keratitis. Also, it avoids the antibiotics resistance that has become rapidly spreading worldwide.

Keywords: corneal cross linking, infectious keratitis, PACK-CXL, window absorption

Procedia PDF Downloads 141
1885 (De)Criminalising Sex Toys in Thailand: A Law and Economics Approach

Authors: Piyanee Khumpao

Abstract:

Under the Thai Penal Code and Customs Act, sex toys are criminalized and completely prohibited through the legal interpretation as obscene objects by law enforcement, despite there is no explicit legal sanction against them. The purpose of preventing people from accessing sex toys is to preserve public morals. However, sex toys are still available, exposed, and sold publicly in main cities throughout Thailand. They are easily observed by people of any age. This paper argues that sexuality is human nature and human right. Human deserves sexual pleasure as long as getting sexual pleasure does not inflict any harm on others. Using sex toys in private (individually and/or as a couple with mutual consent) does not constitute any harm nor degrade public moral. Therefore, the complete ban of sex toys shall be lifted and decriminalized. Nevertheless, the economic analysis illustrates that criminalization and prohibition of sex toys would lead to its black market – higher price and lower quantity. Although it is socially desirable to have fewer sex toys in the market, there will usually be high demand for them because sexual pleasure is natural and, hence, people have a lower price elasticity of demand for such things, including pornography. Thus, its deterrent effect is not very effective. Moreover, sex toys vendors still always exist because higher price incentivizes them to act illegally and may gain benefits from selling low-quality sex toys. Consequently, consumers do not have a choice to select high-quality sex toys at a reasonable price. Then, they are forced to purchase low quality sex toys at a higher price. They also may suffer from health issues as well as other harms from its dangerous/toxic substances since lower quality products are manufactured poorly to save costs. A law and economics approach supports the decriminalization of sex toys in Thailand. Other measures to control its availability shall be adopted to protect the vulnerable, such as children. Options are i) zoning or regulation on-premises selling sex toys as in Singapore, Japan, and China, ii) regulations of sex toys as medical apparatus like in the state of Alabama, and iii) the prevention of sex toys exposure in the real (physical) appearance (i.e., allowing virtual exposure of sex toys) like in India.

Keywords: human nature, law and economics approach, sex toys, sexual pleasure

Procedia PDF Downloads 128
1884 Modeling of Conjugate Heat Transfer including Radiation in a Kerosene/Air Certification Burner

Authors: Lancelot Boulet, Pierre Benard, Ghislain Lartigue, Vincent Moureau, Nicolas Chauvet, Sheddia Didorally

Abstract:

International aeronautic standards demand a fire certification for engines that demonstrate their resistance. This demonstration relies on tests performed with prototype engines in the late stages of the development. Hardest tests require to place a kerosene standardized flame in front of the engine casing during a given time with imposed temperature and heat flux. The purpose of this work is to provide a better characterization of a kerosene/air certification burner in order to minimize the risks of test failure. A first Large-Eddy Simulation (LES) study of the certification burner permitted to model and simulate this burner, including both adiabatic and Conjugate Heat Transfer (CHT) computations. Carried out on unstructured grids with 40 million tetrahedral cells, using the finite-volume YALES2 code, spray combustion, forced convection on walls and conduction in the solid parts of the burner were coupled to achieve a detailed description of heat transfer. It highlighted the fact that conduction inside the solid has a real impact on the flame topology and the combustion regime. However, in the absence of radiative heat transfer, unrealistic temperature of the equipment was obtained. The aim of the present study is to include the radiative heat transfer in order to reach the same temperature given by experimental measurements. First, various test-cases are conducted to validate the coupling between the different heat solvers. Then, adiabatic case, CHT case, as well as CHT including radiative transfer are studied and compared. The LES model is finally applied to investigate the heat transfer in a flame impaction configuration. The aim is to progress on fire test modeling so as to reach a good confidence level as far as success of the certification test is concerned.

Keywords: conjugate heat transfer, fire resistance test, large-eddy simulation, radiative transfer, turbulent combustion

Procedia PDF Downloads 224
1883 Topography Effects on Wind Turbines Wake Flow

Authors: H. Daaou Nedjari, O. Guerri, M. Saighi

Abstract:

A numerical study was conducted to optimize the positioning of wind turbines over complex terrains. Thus, a two-dimensional disk model was used to calculate the flow velocity deficit in wind farms for both flat and complex configurations. The wind turbine wake was assessed using the hybrid methods that combine CFD (Computational Fluid Dynamics) with the actuator disc model. The wind turbine rotor has been defined with a thrust force, coupled with the Navier-Stokes equations that were resolved by an open source computational code (Code_Saturne V3.0 developed by EDF) The simulations were conducted in atmospheric boundary layer condition considering a two-dimensional region located at the north of Algeria at 36.74°N longitude, 02.97°E latitude. The topography elevation values were collected according to a longitudinal direction of 1km downwind. The wind turbine sited over topography was simulated for different elevation variations. The main of this study is to determine the topography effect on the behavior of wind farm wake flow. For this, the wake model applied in complex terrain needs to selects the singularity effects of topography on the vertical wind flow without rotor disc first. This step allows to determine the existence of mixing scales and friction forces zone near the ground. So, according to the ground relief the wind flow waS disturbed by turbulence and a significant speed variation. Thus, the singularities of the velocity field were thoroughly collected and thrust coefficient Ct was calculated using the specific speed. In addition, to evaluate the land effect on the wake shape, the flow field was also simulated considering different rotor hub heights. Indeed, the distance between the ground and the hub height of turbine (Hhub) was tested in a flat terrain for different locations as Hhub=1.125D, Hhub = 1.5D and Hhub=2D (D is rotor diameter) considering a roughness value of z0=0.01m. This study has demonstrated that topographical farm induce a significant effect on wind turbines wakes, compared to that on flat terrain.

Keywords: CFD, wind turbine wake, k-epsilon model, turbulence, complex topography

Procedia PDF Downloads 564
1882 The Comparison of Dismount Skill between National and International Men’s Artistic Gymnastics in Parallel Bars Apparatus

Authors: Chen ChihYu, Tang Wen Tzu, Chen Kuang Hui

Abstract:

Aim —To compare the dismount skill between Taiwanese and elite international gymnastics in parallel bars following the 2017-2020 code of points. Methods—The gymnasts who advanced to the parallel bars event finals of these four competitions including World Championships, Universiade, the National Games of Taiwan, and the National Intercollegiate Athletic Games of Taiwan both 2017 and 2019 were selected in this study. The dismount skill of parallel bars was analyzed, and the average difficulty score was compared by one-way ANOVA. Descriptive statistics were applied to present the type of dismount skill and the difficulty of each gymnast in these four competitions. The data from World Championships and Universiade were combined as the international group (INT), and data of Taiwanese National Games and National Intercollegiate Athletic Games were also combined as the national group (NAT). The differences between INT and NAT were analyzed by the Chi-square test. The statistical significance of this study was set at α= 0.05. Results— i) There was a significant difference in the mean parallel bars dismount skill in these four competitions analyzed by one-way ANOVA. Both dismount scores of World Championships and Universiade were significantly higher than in Taiwanese National Games and National Intercollegiate Athletic Games (0.58±0.08 & 0.56±0.08 > 0.42±0.06 & 40±0.06, p < 0.05). ii) Most of the gymnasts in World Championships and Universiade selected the 0.6-point skill as the parallel bars dismount element, and for the Taiwanese National Games and the National Intercollegiate Athletic Games, most of the gymnasts performed the 0.4-point dismount skill. iii) The result of the Chi-square test has shown that there was a significant difference in the selection of parallel bars dismount skill. The INT group used the E or E+ difficulty element as the dismount skill, and the NAT group selected the D or D- difficulty element. Conclusion— The level of parallel bars dismount in Taiwanese gymnastics is inferior to elite international gymnastics. It is suggested that Taiwanese gymnastics must try to practice the F difficulty dismount (double salto forward tucked with half twist) in the future.

Keywords: Artistic Gymnastics World Championships, dismount, difficulty score, element

Procedia PDF Downloads 144
1881 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors

Authors: Lok Yi Joyce Poon

Abstract:

China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.

Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay

Procedia PDF Downloads 393
1880 Evaluation of Redundancy Architectures Based on System on Chip Internal Interfaces for Future Unmanned Aerial Vehicles Flight Control Computer

Authors: Sebastian Hiergeist

Abstract:

It is a common view that Unmanned Aerial Vehicles (UAV) tend to migrate into the civil airspace. This trend is challenging UAV manufacturer in plenty ways, as there come up a lot of new requirements and functional aspects. On the higher application levels, this might be collision detection and avoidance and similar features, whereas all these functions only act as input for the flight control components of the aircraft. The flight control computer (FCC) is the central component when it comes up to ensure a continuous safe flight and landing. As these systems are flight critical, they have to be built up redundantly to be able to provide a Fail-Operational behavior. Recent architectural approaches of FCCs used in UAV systems are often based on very simple microprocessors in combination with proprietary Application-Specific Integrated Circuit (ASIC) or Field Programmable Gate Array (FPGA) extensions implementing the whole redundancy functionality. In the future, such simple microprocessors may not be available anymore as they are more and more replaced by higher sophisticated System on Chip (SoC). As the avionic industry cannot provide enough market power to significantly influence the development of new semiconductor products, the use of solutions from foreign markets is almost inevitable. Products stemming from the industrial market developed according to IEC 61508, or automotive SoCs, according to ISO 26262, can be seen as candidates as they have been developed for similar environments. Current available SoC from the industrial or automotive sector provides quite a broad selection of interfaces like, i.e., Ethernet, SPI or FlexRay, that might come into account for the implementation of a redundancy network. In this context, possible network architectures shall be investigated which could be established by using the interfaces stated above. Of importance here is the avoidance of any single point of failures, as well as a proper segregation in distinct fault containment regions. The performed analysis is supported by the use of guidelines, published by the aviation authorities (FAA and EASA), on the reliability of data networks. The main focus clearly lies on the reachable level of safety, but also other aspects like performance and determinism play an important role and are considered in the research. Due to the further increase in design complexity of recent and future SoCs, also the risk of design errors, which might lead to common mode faults, increases. Thus in the context of this work also the aspect of dissimilarity will be considered to limit the effect of design errors. To achieve this, the work is limited to broadly available interfaces available in products from the most common silicon manufacturer. The resulting work shall support the design of future UAV FCCs by giving a guideline on building up a redundancy network between SoCs, solely using on board interfaces. Therefore the author will provide a detailed usability analysis on available interfaces provided by recent SoC solutions, suggestions on possible redundancy architectures based on these interfaces and an assessment of the most relevant characteristics of the suggested network architectures, like e.g. safety or performance.

Keywords: redundancy, System-on-Chip, UAV, flight control computer (FCC)

Procedia PDF Downloads 221
1879 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 407
1878 Digital Revolution a Veritable Infrastructure for Technological Development

Authors: Osakwe Jude Odiakaosa

Abstract:

Today’s digital society is characterized by e-education or e-learning, e-commerce, and so on. All these have been propelled by digital revolution. Digital technology such as computer technology, Global Positioning System (GPS) and Geographic Information System (GIS) has been having a tremendous impact on the field of technology. This development has positively affected the scope, methods, speed of data acquisition, data management and the rate of delivery of the results (map and other map products) of data processing. This paper tries to address the impact of revolution brought by digital technology.

Keywords: digital revolution, internet, technology, data management

Procedia PDF Downloads 450
1877 Broadband Platinum Disulfide Based Saturable Absorber Used for Optical Fiber Mode Locking Lasers

Authors: Hui Long, Chun Yin Tang, Ping Kwong Cheng, Xin Yu Wang, Wayesh Qarony, Yuen Hong Tsang

Abstract:

Two dimensional (2D) materials have recently attained substantial research interest since the discovery of graphene. However, the zero-bandgap feature of the graphene limits its nonlinear optical applications, e.g., saturable absorption for these applications require strong light-matter interaction. Nevertheless, the excellent optoelectronic properties, such as broad tunable bandgap energy and high carrier mobility of Group 10 transition metal dichalcogenides 2D materials, e.g., PtS2 introduce new degree of freedoms in the optoelectronic applications. This work reports our recent research findings regarding the saturable absorption property of PtS2 layered 2D material and its possibility to be used as saturable absorber (SA) for ultrafast mode locking fiber laser. The demonstration of mode locking operation by using the fabricated PtS2 as SA will be discussed. The PtS2/PVA SA used in this experiment is made up of some few layered PtS2 nanosheets fabricated via a simple ultrasonic liquid exfoliation. The operational wavelength located at ~1 micron is demonstrated from Yb-doped mode locking fiber laser ring cavity by using the PtS2 SA. The fabricated PtS2 saturable absorber offers strong nonlinear properties, and it is capable of producing regular mode locking laser pulses with pulse to pulse duration matched with the round-trip cavity time. The results confirm successful mode locking operation achieved by the fabricated PtS2 material. This work opens some new opportunities for these PtS2 materials for the ultrafast laser generation. Acknowledgments: This work is financially supported by Shenzhen Science and Technology Innovation Commission (JCYJ20170303160136888) and the Research Grants Council of Hong Kong, China (GRF 152109/16E, PolyU code: B-Q52T).

Keywords: platinum disulfide, PtS2, saturable absorption, saturable absorber, mode locking laser

Procedia PDF Downloads 189
1876 Strong Ground Motion Characteristics Revealed by Accelerograms in Ms8.0 Wenchuan Earthquake

Authors: Jie Su, Zhenghua Zhou, Yushi Wang, Yongyi Li

Abstract:

The ground motion characteristics, which are given by the analysis of acceleration records, underlie the formulation and revision of the seismic design code of structural engineering. China Digital Strong Motion Network had recorded a lot of accelerograms of main shock from 478 permanent seismic stations, during the Ms8.0 Wenchuan earthquake on 12th May, 2008. These accelerograms provided a large number of essential data for the analysis of ground motion characteristics of the event. The spatial distribution characteristics, rupture directivity effect, hanging-wall and footwall effect had been studied based on these acceleration records. The results showed that the contours of horizontal peak ground acceleration and peak velocity were approximately parallel to the seismogenic fault which demonstrated that the distribution of the ground motion intensity was obviously controlled by the spatial extension direction of the seismogenic fault. Compared with the peak ground acceleration (PGA) recorded on the sites away from which the front of the fault rupture propagates, the PGA recorded on the sites toward which the front of the fault rupture propagates had larger amplitude and shorter duration, which indicated a significant rupture directivity effect. With the similar fault distance, the PGA of the hanging-wall is apparently greater than that of the foot-wall, while the peak velocity fails to observe this rule. Taking account of the seismic intensity distribution of Wenchuan Ms8.0 earthquake, the shape of strong ground motion contours was significantly affected by the directional effect in the regions with Chinese seismic intensity level VI ~ VIII. However, in the regions whose Chinese seismic intensity level are equal or greater than VIII, the mutual positional relationship between the strong ground motion contours and the surface outcrop trace of the fault was evidently influenced by the hanging-wall and foot-wall effect.

Keywords: hanging-wall and foot-wall effect, peak ground acceleration, rupture directivity effect, strong ground motion

Procedia PDF Downloads 351
1875 Smart Signature - Medical Communication without Barrier

Authors: Chia-Ying Lin

Abstract:

This paper explains how to enhance doctor-patient communication and nurse-patient communication through multiple intelligence signing methods and user-centered. It is hoped that through the implementation of the "electronic consent", the problems faced by the paper consent can be solved: storage methods, resource utilization, convenience, correctness of information, integrated management, statistical analysis and other related issues. Make better use and allocation of resources to provide better medical quality. First, invite the medical records department to assist in the inventory of paper consent in the hospital: organising, classifying, merging, coding, and setting. Second, plan the electronic consent configuration file: set the form number, consent form group, fields and templates, and the corresponding doctor's order code. Next, Summarize four types of rapid methods of electronic consent: according to the doctor's order, according to the medical behavior, according to the schedule, and manually generate the consent form. Finally, system promotion and adjustment: form an "electronic consent promotion team" to improve, follow five major processes: planning, development, testing, release, and feedback, and invite clinical units to raise the difficulties faced in the promotion, and make improvements to the problems. The electronic signature rate of the whole hospital will increase from 4% in January 2022 to 79% in November 2022. Use the saved resources more effectively, including: reduce paper usage (reduce carbon footprint), reduce the cost of ink cartridges, re-plan and use the space for paper medical records, and save human resources to provide better services. Through the introduction of information technology and technology, the main spirit of "lean management" is implemented. Transforming and reengineering the process to eliminate unnecessary waste is also the highest purpose of this project.

Keywords: smart signature, electronic consent, electronic medical records, user-centered, doctor-patient communication, nurse-patient communication

Procedia PDF Downloads 126
1874 Mathematical Modeling and Simulation of Convective Heat Transfer System in Adjustable Flat Collector Orientation for Commercial Solar Dryers

Authors: Adeaga Ibiyemi Iyabo, Adeaga Oyetunde Adeoye

Abstract:

Interestingly, mechanical drying methods has played a major role in the commercialization of agricultural and agricultural allied sectors. In the overall, drying enhances the favorable storability and preservation of agricultural produce which in turn promotes its producibility, marketability, salability, and profitability. Recent researches have shown that solar drying is easier, affordable, controllable, and of course, cleaner and purer than other means of drying methods. It is, therefore, needful to persistently appraise solar dryers with a view to improving on the existing advantages. In this paper, mathematical equations were formulated for solar dryer using mass conservation law, material balance law and least cost savings method. Computer codes were written in Visual Basic.Net. The developed computer software, which considered Ibadan, a strategic south-western geographical location in Nigeria, was used to investigate the relationship between variable orientation angle of flat plate collector on solar energy trapped, derived monthly heat load, available energy supplied by solar and fraction supplied by solar energy when 50000 Kg/Month of produce was dried over a year. At variable collector tilt angle of 10°.13°,15°,18°, 20°, the derived monthly heat load, available energy supplied by solar were 1211224.63MJ, 102121.34MJ, 0.111; 3299274.63MJ, 10121.34MJ, 0.132; 5999364.706MJ, 171222.859MJ, 0.286; 4211224.63MJ, 132121.34MJ, 0.121; 2200224.63MJ, 112121.34MJ, 0.104, respectively .These results showed that if optimum collector angle is not reached, those factors needed for efficient and cost reduction drying will be difficult to attain. Therefore, this software has revealed that off - optimum collector angle in commercial solar drying does not worth it, hence the importance of the software in decision making as to the optimum collector angle of orientation.

Keywords: energy, ibadan, heat - load, visual-basic.net

Procedia PDF Downloads 411
1873 An Advanced Automated Brain Tumor Diagnostics Approach

Authors: Berkan Ural, Arif Eser, Sinan Apaydin

Abstract:

Medical image processing is generally become a challenging task nowadays. Indeed, processing of brain MRI images is one of the difficult parts of this area. This study proposes a hybrid well-defined approach which is consisted from tumor detection, extraction and analyzing steps. This approach is mainly consisted from a computer aided diagnostics system for identifying and detecting the tumor formation in any region of the brain and this system is commonly used for early prediction of brain tumor using advanced image processing and probabilistic neural network methods, respectively. For this approach, generally, some advanced noise removal functions, image processing methods such as automatic segmentation and morphological operations are used to detect the brain tumor boundaries and to obtain the important feature parameters of the tumor region. All stages of the approach are done specifically with using MATLAB software. Generally, for this approach, firstly tumor is successfully detected and the tumor area is contoured with a specific colored circle by the computer aided diagnostics program. Then, the tumor is segmented and some morphological processes are achieved to increase the visibility of the tumor area. Moreover, while this process continues, the tumor area and important shape based features are also calculated. Finally, with using the probabilistic neural network method and with using some advanced classification steps, tumor area and the type of the tumor are clearly obtained. Also, the future aim of this study is to detect the severity of lesions through classes of brain tumor which is achieved through advanced multi classification and neural network stages and creating a user friendly environment using GUI in MATLAB. In the experimental part of the study, generally, 100 images are used to train the diagnostics system and 100 out of sample images are also used to test and to check the whole results. The preliminary results demonstrate the high classification accuracy for the neural network structure. Finally, according to the results, this situation also motivates us to extend this framework to detect and localize the tumors in the other organs.

Keywords: image processing algorithms, magnetic resonance imaging, neural network, pattern recognition

Procedia PDF Downloads 420
1872 Montelukast Doesn’t Decrease the Risk of Cardiovascular Disease in Asthma Patients in Taiwan

Authors: Sheng Yu Chen, Shi-Heng Wang

Abstract:

Aim: Based on human, animal experiments, and genetic studies, cysteinyl leukotrienes, LTC4, LTD4, and LTE4, are inflammatory substances that are metabolized by 5-lipooxygenase from arachidonic acid, and these substances trigger asthma. In addition, the synthetic pathway of cysteinyl leukotriene is relevant to the increase in cardiovascular diseases such as myocardial ischemia and stroke. Given the situation, we aim to investigate whether cysteinyl leukotrienes receptor antagonist (LTRA), montelukast which cures those who have asthma has potential protective effects on cardiovascular diseases. Method: We conducted a cohort study, and enrolled participants which are newly diagnosed with asthma (ICD-9 CM code 493. X) between 2002 to 2011. The data source is from Taiwan National Health Insurance Research Database Patients with a previous history of myocardial infarction or ischemic stroke were excluded. Among the remaining participants, every montelukast user was matched with two randomly non-users by sex, and age. The incident cardiovascular diseases, including myocardial infarction and ischemic stroke, were regarded as outcomes. We followed the participants until outcomes come first or the end of the following period. To explore the protective effect of montelukast on the risk of cardiovascular disease, we use multivariable Cox regression to estimate the hazard ratio with adjustment for potential confounding factors. Result: There are 55876 newly diagnosed asthma patients who had at least one claim of inpatient admission or at least three claims of outpatient records. We enrolled 5350 montelukast users and 10700 non-users in this cohort study. The following mean (±SD) time of the Montelukast group is 5 (±2.19 )years, and the non-users group is 6.2 5.47 (± 2.641) years. By using multivariable Cox regression, our analysis indicated that the risk of incident cardiovascular diseases between montelukast users (n=43, 0.8%) and non-users (n=111, 1.04%) is approximately equal. [adjusted hazard ratio 0.992; P-value:0.9643] Conclusion: In this population-based study, we found that the use of montelukast is not associated with a decrease in incident MI or IS.

Keywords: asthma, inflammation, montelukast, insurance research database, cardiovascular diseases

Procedia PDF Downloads 83
1871 The Impact of Virtual Learning Strategy on Youth Learning Motivation in Malaysian Higher Learning Instituitions

Authors: Hafizah Harun, Habibah Harun, Azlina Kamaruddin

Abstract:

Virtual reality has become a powerful and promising tool in education because of their unique technological characteristics that differentiate them from the other ICT applications. Despite the numerous interpretations of its definition, virtual reality can be concisely and precisely described as the integration of computer graphics and various input and display technologies to create the illusion of immersion in a computer generated reality. Generally, there are two major types based on the level of interaction and immersive environment that are immersive and non-immersive virtual reality. In the study of the role of virtual reality in built environment education, Horne and Thompson were reported as saying that the benefits of using visualization technologies were seen as having the potential to improve and extend the learning process, increase student motivation and awareness, and add to the diversity of teaching methods. Youngblut reported that students enjoy working with virtual worlds and this experience can be highly motivating. The impact of virtual reality on youth learning in Malaysia is currently not well explored because the technology is still not widely used here. Only a handful of the universities, such as University Malaya, MMU, and Unimas are applying virtual reality strategy in some of their undergraduate programs. From the literature, it has been identified that there are several virtual reality learning strategies currently available. Therefore, this study aims to investigate the impact of Virtual Reality strategy on Youth Learning Motivation in Malaysian higher learning institutions. We will explore the relationship between virtual reality (gaming, laboratory, simulation) and youth leaning motivation. Another aspect that we will explore is the framework for virtual reality implementation at higher learning institution in Malaysia. This study will be carried out quantitatively by distributing questionnaires to respondents from sample universities. Data analysis are descriptive and multiple regression. Researcher will carry out a pilot test prior to distributing the questionnaires to 300 undergraduate students who are undergoing their courses in virtual reality environment. The respondents come from two universities, MMU CyberJaya and University Malaya. The expected outcomes from this study are the identification of which virtual reality strategy has most impact on students’ motivation in learning and a proposed framework of virtual reality implementation at higher learning.

Keywords: virtual reality, learning strategy, youth learning, motivation

Procedia PDF Downloads 390
1870 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments

Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek

Abstract:

Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.

Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking

Procedia PDF Downloads 290
1869 Understanding Water Governance in the Central Rift Valley of Ethiopia: Zooming into Transparency, Accountability, and Participation

Authors: Endalew Jibat, Feyera Senbeta, Tesfaye Zeleke, Fitsum Hagos

Abstract:

Water governance considers multi-sector participation beyond the state; and for sustainable use of water resources, appropriate laws, policies, regulations, and institutions needs to be developed and put in place. Water policy, a critical and integral instrument of water governance, guided water use schemes and ensures equitable water distribution among users. The Ethiopian Central Rift Valley (CRV) is wealthy of water resources, but these water resources are currently under severe strain owing to an imbalance in human-water interactions. The main aim of the study was to examine the state of water resources governance in the CRV of Ethiopia, and the impact of the Ethiopian Water Resources Management Policy on water governance. Key informant interviews (KII), focused group discussions, and document reviews were used to gather data for the study. The NVivo 11 program was used to organize, code, and analyze the data. The results revealed that water resources governance practices such as water allocation and apportionment, comprehensive and integrated water management plans, water resources protection, and conservation activities were rarely implemented. Water resources management policy mechanisms were not fully put in place. Lack of coherence in water policy implementation, absence of clear roles and responsibilities of stakeholders, absence of transparency and accountability in irrigation water service delivery, and lack of meaningful participation of key actors in water governance decision-making were the primary shortcomings observed. Factors such as over-abstraction, deterioration of buffer zone, and chemical erosion from surrounding farming have contributed to the reduction in water volume and quality in the CRV. These challenges have influenced aquatic ecosystem services and threaten the livelihoods of the surrounding communities. Hence, reforms relating to policy coherence and enforcement, stakeholder involvement, water distribution strategies, and the application of water governance principles must be given more emphasis.

Keywords: water resources, irrigation, governance, water allocation, governance principles, stakeholders engagement, central rift valley

Procedia PDF Downloads 94
1868 Everyday Interactions among Imprisoned Sex Offenders: A Qualitative Study within the 'Due Palazzi' Prison in Padua

Authors: Matteo Mazzucato, Elena Faccio, Antonio Iudici

Abstract:

Prison is a social reality constructed by everyday interactions between an inmate, other social actors (cellmates, prison officers, educationalists and psychologists or other detainees) and the external world which participates in this complex construction through the social discourses on prison reality and its problems. Being a detainee means performing a self dealing with processes of stereotypization, attribution of a social role and prejudices assigned by various interlocutors and depending on what kind of crime one has been convicted of. Among all inmates, sex offenders are the ones who risk more to be socially condemned beyond a legal sentence since they have committed one of the most hated and disapproved crime. Regarding this, prison has to be considered as a critical context in which all community expectations and beliefs are converged: for common sense, rapists and child molesters are dangerous people who have to be stigmatized, punished and isolated. Furthermore, other detainees share a code of conduct by which the ‘sex offender’ is collocated at the lowest level of the social hierarchy of the prison. The penitentiary administration too defines this kind of detainee as a ‘vulnerable person to protect’ while prison staff considers him as a particular inmate who has to be treated and definitely changed. Considering all the complexities connected with being imprisoned as a sex offender, our research aimed at exploring how people convicted of sex crimes are called upon to manage all these hetero-narrations about their selves. Set this goal, textual data retrieved from this qualitative research show that sex offenders tend to not face the stigma assigned to them. They are rather used to minimize the story telling about their selves and costruct alternative biographies to be shared with other inmates. Managing narrations about their selves in this way permits to distance them from all the threats perceived living together with other detainees but it blocks sex offenders’ ri-signification of their offences during prison treatment. Given these results, prison administration should develop activities in order to create fields of interaction between detainees where experiencing new versions of their selves spendable even in external social situations. Regarding this it’s important to re-consider prison as part of the community and the sex offenders as a member of it.

Keywords: interactions, qualitative research, prison reality, sex offender

Procedia PDF Downloads 222
1867 Application of Hydrologic Engineering Centers and River Analysis System Model for Hydrodynamic Analysis of Arial Khan River

Authors: Najeeb Hassan, Mahmudur Rahman

Abstract:

Arial Khan River is one of the main south-eastward outlets of the River Padma. This river maintains a meander channel through its course and is erosional in nature. The specific objective of the research is to study and evaluate the hydrological characteristics in the form of assessing changes of cross-sections, discharge, water level and velocity profile in different stations and to create a hydrodynamic model of the Arial Khan River. Necessary data have been collected from Bangladesh Water Development Board (BWDB) and Center for Environment and Geographic Information Services (CEGIS). Satellite images have been observed from Google earth. In this study, hydrodynamic model of Arial Khan River has been developed using well known steady open channel flow code Hydrologic Engineering Centers and River Analysis System (HEC-RAS) using field surveyed geometric data. Cross-section properties at 22 locations of River Arial Khan for the years 2011, 2013 and 2015 were also analysed. 1-D HEC-RAS model has been developed using the cross sectional data of 2015 and appropriate boundary condition is being used to run the model. This Arial Khan River model is calibrated using the pick discharge of 2015. The applicable value of Mannings roughness coefficient (n) is adjusted through the process of calibration. The value of water level which ties with the observed data to an acceptable accuracy is taken as calibrated model. The 1-D HEC-RAS model then validated by using the pick discharges from 2009-2018. Variation in observed water level in the model and collected water level data is being compared to validate the model. It is observed that due to seasonal variation, discharge of the river changes rapidly and Mannings roughness coefficient (n) also changes due to the vegetation growth along the river banks. This river model may act as a tool to measure flood area in future. By considering the past pick flow discharge, it is strongly recommended to improve the carrying capacity of Arial Khan River to protect the surrounding areas from flash flood.

Keywords: BWDB, CEGIS, HEC-RAS

Procedia PDF Downloads 188
1866 Justice and the Juvenile: Changing Trends and Developments

Authors: Shikhar Shrivastava, Varun Khare

Abstract:

Background: We are confronted by a society that is becoming more complex, more mobile, and more dysfunctional. Teen pregnancy, suicide, elopement, and the perusal of dangerous drugs have become commonplace. In addition, children do not settle their disputes as they once did. Guns and knives are quotidian. Therefore, it has been an exigent to have a "Juvenile Code" that would provide specific substantive and procedural rules for juveniles in the justice system. However, until the twentieth century, there was little difference between how the justice system treated adults and children. Age was considered only in terms of appropriate punishment and juveniles were eligible for the same punishment as adults. Findings: The increased prevalence and legislative support for specialized courts, Juvenile Justice Boards, including juvenile drug, mental health and truancy court programs, as well as diversion programs and evidence-based approaches into the fabric of juvenile justice are just a few examples of recent advances. In India, various measures were taken to prosecute young offenders who committed violent crimes as adults. But it was argued that equating juveniles with adult criminals was neither scientifically correct nor normatively defensible. It would defeat the very purpose of the justice system. Methodology and Conclusion: This paper attempts to bring forth the results of analytical and descriptive research that examined changing trends in juvenile justice legislation. It covers the investigative and inspective practices of police, the various administrative agencies who have roles in implementing the legislation, the courts, and the detention centers. In this paper we shall discuss about how the juvenile justice system is the dumping ground for many of a youths’ problem. The changing notions of justice, from retributive to restorative and rehabilitative shall be discussed. A comparative study of the Juvenile act in India and that of the U.S has been discussed. Specific social institutions and forces that explain juvenile delinquency are identified. In addition, various influences on juvenile delinquency are noted, such as families, schools, peer groups and communities. The text concludes by addressing socialization, deterrence, imprisonments, alternatives, restitution and preventions.

Keywords: juvenile, justice system, retributive, rehabilitative, delinquency

Procedia PDF Downloads 458
1865 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 297
1864 Property and Inheritance Rights for Women Whose Husbands Disappeared during the Last War in Kosovo: Case Studies: Krusha e Vogël and Krusha e Madhe, Region of Prizren, Kosovo

Authors: Venera Goxha

Abstract:

Property and inheritance rights for women whose husbands were killed or disappeared during the last war in Kosovo is the purpose of this study, respectively, the access of these women to family real estate. The case study is about women whose husbands were killed or disappeared during the last war in Kosovo and who, on this occasion, earned the title of 'widow'.The research is conducted in the villages of Krusha e Vogël - Municipality of Prizren, and Krusha e Madhe - Municipality of Rahovec, one of the most suffered villages from the recent war in Kosovo. Krusha e Vogël, as a result of the recent war, has 113 male victims, or 70% of all men from the age of 13 to the age of 77, leaving widows and orphans. In the village of Krusha e Madhe, 243 Albanians were massacred by Serbs living in the same village, leaving widows and orphaned children alive. According to these data, most of the Krushian families, as heads of households, have surviving wives and widows. Therefore, being the head of the family and facing a mountain of challenges, such as economic, social, and cultural, the issue of how these women have approached the property and family heritage is considered. The equal right to property and inheritance is a right that is guaranteed to women with all legislation in force, starting from the Constitution of the Republic of Kosovo onwards. Article 7 of the Constitution of Kosovo and the subsequent legal framework recognizes the equality of women and the equal division of property between heirs, daughters, and sons. However, some of the legislation does not successfully reflect the current reality in Kosovo. All these ambiguities follow from the ‘patriarchal law’ of the Albanians in the time of the early Middle Ages, later known as the ‘Kanun of Lekë Dukagjini’. At the time it was written and applied, it weighted the law in force, but later over time, it passed into tradition, culture, and mentality. The Kanun of Lekë Dukagjini, in no context, has treated women equally to men. The female, according to the Kanun, was a working tool, a creature to be born, to work, to carry, to raise children, and to remain faithful to the husband even when the husband is not faithful.

Keywords: property rights, heritage, widows, code

Procedia PDF Downloads 64