Search results for: web user profile
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4310

Search results for: web user profile

2360 Comparison of Petrophysical Relationship for Soil Water Content Estimation at Peat Soil Area Using GPR Common-Offset Measurements

Authors: Nurul Izzati Abd Karim, Samira Albati Kamaruddin, Rozaimi Che Hasan

Abstract:

The appropriate petrophysical relationship is needed for Soil Water Content (SWC) estimation especially when using Ground Penetrating Radar (GPR). Ground penetrating radar is a geophysical tool that provides indirectly the parameter of SWC. This paper examines the performance of few published petrophysical relationships to obtain SWC estimates from in-situ GPR common- offset survey measurements with gravimetric measurements at peat soil area. Gravimetric measurements were conducted to support of GPR measurements for the accuracy assessment. Further, GPR with dual frequencies (250MHhz and 700MHz) were used in the survey measurements to obtain the dielectric permittivity. Three empirical equations (i.e., Roth’s equation, Schaap’s equation and Idi’s equation) were selected for the study, used to compute the soil water content from dielectric permittivity of the GPR profile. The results indicate that Schaap’s equation provides strong correlation with SWC as measured by GPR data sets and gravimetric measurements.

Keywords: common-offset measurements, ground penetrating radar, petrophysical relationship, soil water content

Procedia PDF Downloads 255
2359 The Design of Information Technology System for Traceability of Thailand’s Tubtimjun Roseapple

Authors: Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom, Sawanath Treesathon

Abstract:

As there are several countries which import agriculture product from Thailand, those countries demand Thailand to establish the traceability system. The traceability system is the tool to reduce the risk in the supply chain in a very effective way as it will help the stakeholder in the supply chain to identify the defect point which will reduce the cost of operation in the supply chain. This research is aimed to design the traceability system for Tubtimjun roseapple for exporting to China, and it is the qualitative research. The data was collected from the expert in the tuntimjun roseapple and fruit exporting industry, and the data was used to design the traceability system. The design of the tubtimjun roseapple traceability system was followed the theory of supply chain which starts from the upstream of the supply chain to the downstream of the supply chain to support the process and condition of the exporting which included the database designing, system architecture, user interface design and information technology of the traceability system.

Keywords: design information, technology system, traceability, tubtimjun roseapple

Procedia PDF Downloads 172
2358 Investigation of TEC Using YOUTHSAT RaBIT Payload Data for Low Latitude Regions

Authors: Perumalla Naveen Kumar

Abstract:

Global Positioning System (GPS) is used for civilian and military user positioning applications. The accuracy of GPS is degrading mainly because of ionospheric error. It is very important to analyze the effects of ionosphere on the performance of satellite systems especially in the low latitude regions. These variations depend on the Total Electron Content (TEC) in the ionosphere. To investigate the variations in the atmosphere, a mini satellite known as YOUTHSAT is launched by India. This is the outcome of the collaboration between India and USSR. One of the YOUTHSAT Indian payload is RaBIT (Radio Beacon for Ionospheric Tomography). In this paper, YOUTHSAT RaBIT payload data for the three typical days of 2011 are considered. The analysis is carried out for four Indian stations. The variations of Slant TEC, elevation angle and azimuth angles are analyzed with respect to local time. The obtained results are encouraging.

Keywords: Global Positioning System (GPS), Total Electron Content (TEC), YOUTHSAT, Radio Beacon for Ionospheric Tomography (RaBIT)

Procedia PDF Downloads 385
2357 Numerical Prediction of Bearing Strength on Composite Bolted Joint Using Three Dimensional Puck Failure Criteria

Authors: M. S. Meon, M. N. Rao, K-U. Schröder

Abstract:

Mechanical fasteners especially bolting is commonly used in joining carbon-fiber reinforced polymer (CFRP) composite structures due to their good joinability and easy for maintenance characteristics. Since this approach involves with notching, a proper progressive damage model (PDM) need to be implemented and verified to capture existence of damages in the structure. A three dimensional (3D) failure criteria of Puck is established to predict the ultimate bearing failure of such joint. The failure criteria incorporated with degradation scheme are coded based on user subroutine executed in Abaqus. Single lap joint (SLJ) of composite bolted joint is used as target configuration. The results revealed that the PDM adopted here could sufficiently predict the behaviour of composite bolted joint up to ultimate bearing failure. In addition, mesh refinement near holes increased the accuracy of predicted strength as well as computational effort.

Keywords: bearing strength, bolted joint, degradation scheme, progressive damage model

Procedia PDF Downloads 503
2356 The Influence of Organisational Culture on the Implementation of Enterprise Resource Planning

Authors: Redha M. Elhuni

Abstract:

The critical key success factors, which have to be targeted with appropriate change management, are the user acceptance and support of a new Enterprise Resource Planning (ERP) system at the early implementation stages. This becomes even more important in Arab context where national and organisational culture with a different value and belief system, resulting in different management styles, might not complement with Western business culture embedded in the predefined standard business processes of existing ERP packages. This study explains and critically evaluates research into national and organizational culture and the influence of different national cultures on the implementation and reengineering process of ERP packages in an Arab context. Using a case study, realized through a quantitative survey testing five of Martinsons’s and Davison’s propositions in a Libyan sample company, confirmed the expected results from the literature review that culture has an impact on the implementation process and that employee empowerment is an unavoidable consequence of an ERP implementation.

Keywords: enterprise resource planning, ERP systems, organisational culture, Arab context

Procedia PDF Downloads 320
2355 The Importance of Applying Established Web Site Design Principles on an Online Performance Management System

Authors: R. W. Brown, P. J. Blignaut

Abstract:

An online performance management system was evaluated, and recommendations were made to improve the system. The study shows the effects of not adhering to the established web design principles and conventions. Furthermore, the study indicates that if the online performance management system is not well designed, it may have negative effects on the overall usability of the system and these negative effects will have consequences for both the employer and employees. The evaluation was done in terms of the usability metrics of effectiveness, efficiency and user satisfaction. Effectiveness was measured in terms of the success rate with which users could execute prescribed tasks in a sandbox system. Efficiency was expressed in terms of the time it took participants to understand what is expected of them and to execute the tasks. Post-test questionnaires were used in order to determine the satisfaction of the participants. Recommendations were made to improve the usability of the online performance management system.

Keywords: eye tracking, human resource management, performance management, usability

Procedia PDF Downloads 206
2354 Students’ Perceptions on Educational Game for Learning Programming Subject: A Case Study

Authors: Roslina Ibrahim, Azizah Jaafar, Khalili Khalil

Abstract:

Educational games (EG) are regarded as a promising teaching and learning tool for the new generation. Growing number of studies and literatures can be found in EG studies. Both academic researchers and commercial developers come out with various educational games prototypes and titles. Despite that, acceptance of educational games still lacks among the students. It is important to understanding students’ perceptions of EG, since they are the main stakeholder of the technology. Thus, this study seeks to understand perceptions of undergraduates’ students using a framework originated from user acceptance theory. The framework consists of six constructs with twenty-eight items. Data collection was done on 180 undergraduate students of Universiti Teknologi Malaysia, Kuala Lumpur using self-developed online EG called ROBO-C. Data analysis was done using descriptive, factor analysis and correlations. Performance expectancy, effort expectancy, attitude, and enjoyment factors were found significantly correlated with the intention to use EG. This study provides more understanding towards the use of educational games among students.

Keywords: educational games, perceptions, acceptance, UTAUT

Procedia PDF Downloads 413
2353 BER Analysis of Energy Detection Spectrum Sensing in Cognitive Radio Using GNU Radio

Authors: B. Siva Kumar Reddy, B. Lakshmi

Abstract:

Cognitive Radio is a turning out technology that empowers viable usage of the spectrum. Energy Detector-based Sensing is the most broadly utilized spectrum sensing strategy. Besides, it is a lot of generic as receivers does not like any information on the primary user's signals, channel data, of even the sort of modulation. This paper puts forth the execution of energy detection sensing for AM (Amplitude Modulated) signal at 710 KHz, FM (Frequency Modulated) signal at 103.45 MHz (local station frequency), Wi-Fi signal at 2.4 GHz and WiMAX signals at 6 GHz. The OFDM/OFDMA based WiMAX physical layer with convolutional channel coding is actualized utilizing USRP N210 (Universal Software Radio Peripheral) and GNU Radio based Software Defined Radio (SDR). Test outcomes demonstrated the BER (Bit Error Rate) augmentation with channel noise and BER execution is dissected for different Eb/N0 (the energy per bit to noise power spectral density ratio) values.

Keywords: BER, Cognitive Radio, GNU Radio, OFDM, SDR, WiMAX

Procedia PDF Downloads 504
2352 Simplified Mobile AR Platform Design for Augmented Tourism

Authors: Eric Hawkinson, Edgaras Artemciukas

Abstract:

This study outlines iterations of designing mobile augmented reality (MAR) applications for tourism specific contexts. Using a design based research model, several cycles of development to implementation were analyzed and refined upon with the goal of building a MAR platform that would facilitate the creation of augmented tours and environments by non-technical users. The project took on several stages, and through the process, a simple framework was begun to be established that can inform the design and use of MAR applications for tourism contexts. As a result of these iterations of development, a platform was developed that can allow novice computer users to create augmented tourism environments. This system was able to connect existing tools in widespread use such as Google Forms and connect them to computer vision algorithms needed for more advanced augmented tourism environments. The study concludes with a discussion of this MAR platform and reveals design elements that have implications for tourism contexts. The study also points to future case uses and design approaches for augmented tourism.

Keywords: augmented tourism, augmented reality, user experience, mobile design, e-tourism

Procedia PDF Downloads 220
2351 MCDM Spectrum Handover Models for Cognitive Wireless Networks

Authors: Cesar Hernández, Diego Giral, Fernando Santa

Abstract:

The spectral handoff is important in cognitive wireless networks to ensure an adequate quality of service and performance for secondary user communications. This work proposes a benchmarking of performance of the three spectrum handoff models: VIKOR, SAW and MEW. Four evaluation metrics are used. These metrics are, accumulative average of failed handoffs, accumulative average of handoffs performed, accumulative average of transmission bandwidth and, accumulative average of the transmission delay. As a difference with related work, the performance of the three spectrum handoff models was validated with captured data of spectral occupancy in experiments realized at the GSM frequency band (824 MHz-849 MHz). These data represent the actual behavior of the licensed users for this wireless frequency band. The results of the comparative show that VIKOR Algorithm provides 15.8% performance improvement compared to a SAW Algorithm and, 12.1% better than the MEW Algorithm.

Keywords: cognitive radio, decision making, MEW, SAW, spectrum handoff, VIKOR

Procedia PDF Downloads 439
2350 An Exploratory Factor and Cluster Analysis of the Willingness to Pay for Last Mile Delivery

Authors: Maximilian Engelhardt, Stephan Seeck

Abstract:

The COVID-19 pandemic is accelerating the already growing field of e-commerce. The resulting urban freight transport volume leads to traffic and negative environmental impact. Furthermore, the service level of parcel logistics service provider is lacking far behind the expectations of consumer. These challenges can be solved by radically reorganize the urban last mile distribution structure: parcels could be consolidated in a micro hub within the inner city and delivered within time windows by cargo bike. This approach leads to a significant improvement of consumer satisfaction with their overall delivery experience. However, this approach also leads to significantly increased costs per parcel. While there is a relevant share of online shoppers that are willing to pay for such a delivery service there are no deeper insights about this target group available in the literature. Being aware of the importance of knowing target groups for businesses, the aim of this paper is to elaborate the most important factors that determine the willingness to pay for sustainable and service-oriented parcel delivery (factor analysis) and to derive customer segments (cluster analysis). In order to answer those questions, a data set is analyzed using quantitative methods of multivariate statistics. The data set was generated via an online survey in September and October 2020 within the five largest cities in Germany (n = 1.071). The data set contains socio-demographic, living-related and value-related variables, e.g. age, income, city, living situation and willingness to pay. In a prior work of the author, the data was analyzed applying descriptive and inference statistical methods that only provided limited insights regarding the above-mentioned research questions. The analysis in an exploratory way using factor and cluster analysis promise deeper insights of relevant influencing factors and segments for user behavior of the mentioned parcel delivery concept. The analysis model is built and implemented with help of the statistical software language R. The data analysis is currently performed and will be completed in December 2021. It is expected that the results will show the most relevant factors that are determining user behavior of sustainable and service-oriented parcel deliveries (e.g. age, current service experience, willingness to pay) and give deeper insights in characteristics that describe the segments that are more or less willing to pay for a better parcel delivery service. Based on the expected results, relevant implications and conclusions can be derived for startups that are about to change the way parcels are delivered: more customer-orientated by time window-delivery and parcel consolidation, more environmental-friendly by cargo bike. The results will give detailed insights regarding their target groups of parcel recipients. Further research can be conducted by exploring alternative revenue models (beyond the parcel recipient) that could compensate the additional costs, e.g. online-shops that increase their service-level or municipalities that reduce traffic on their streets.

Keywords: customer segmentation, e-commerce, last mile delivery, parcel service, urban logistics, willingness-to-pay

Procedia PDF Downloads 109
2349 Low-Cost Embedded Biometric System Based on Fingervein Modality

Authors: Randa Boukhris, Alima Damak, Dorra Sellami

Abstract:

Fingervein biometric authentication is one of the most popular and accurate technologies. However, low cost embedded solution is still an open problem. In this paper, a real-time implementation of fingervein recognition process embedded in Raspberry-Pi has been proposed. The use of Raspberry-Pi reduces overall system cost and size while allowing an easy user interface. Implementation of a target technology has guided to opt some specific parallel and simple processing algorithms. In the proposed system, we use four structural directional kernel elements for filtering finger vein images. Then, a Top-Hat and Bottom-Hat kernel filters are used to enhance the visibility and the appearance of venous images. For feature extraction step, a simple Local Directional Code (LDC) descriptor is applied. The proposed system presents an Error Equal Rate (EER) and Identification Rate (IR), respectively, equal to 0.02 and 98%. Furthermore, experimental results show that real-time operations have good performance.

Keywords: biometric, Bottom-Hat, Fingervein, LDC, Rasberry-Pi, ROI, Top-Hat

Procedia PDF Downloads 206
2348 Equilibrium Modeling of a Two Stage Downdraft Gasifier Using Different Gasification Fluids

Authors: F. R. M. Nascimento, E. E. S. Lora, J. C. E. Palácio

Abstract:

A mathematical model to investigate the performance of a two stage fixed bed downdraft gasifier operating with air, steam and oxygen mixtures as the gasifying fluid has been developed. The various conditions of mixtures for a double stage fluid entry, have been performed. The model has been validated through a series of experimental tests performed by NEST – The Excellence Group in Thermal and Distributed Generation of the Federal University of Itajubá. Influence of mixtures are analyzed through the Steam to Biomass (SB), Equivalence Ratio (ER) and the Oxygen Concentration (OP) parameters in order to predict the best operating conditions to obtain adequate output gas quality, once is a key parameter for subsequent gas processing in the synthesis of biofuels, heat and electricity generation. Results show that there is an optimal combination in the steam and oxygen content of the gasifying fluid which allows the user find the best conditions to design and operate the equipment according to the desired application.

Keywords: air, equilibrium, downdraft, fixed bed gasification, mathematical modeling, mixtures, oxygen steam

Procedia PDF Downloads 482
2347 Decoding Urban Stress Mapping Criteria in Urban Heritage Cores: Gandhi Park, Kerala Case Study

Authors: Ansal D'cruz, Anurup K., Saritha G. Parambath

Abstract:

Physical and mental strain is a growing concern arising from various stressors in an urban context. However, these stressors are relatively less explored in the domain of urban design, especially in Indian cities where the central business district falls within the heritage core. An attempt is made in the context of the heritage core of Thiruvananthapuram city, Kerala, to understand and identify the connection between the built environment and urban stress. The criteria for establishing the indicators were obtained through a systematic literature review. A thorough study conducted in Gandhi Park, East Fort area using the identified criteria resulted in valuable insights into various urban stressors. Onsite surveys established the correlation between the built environment and user stress levels. The study concludes with guidelines for approaching urban stress in urban parks in an Indian context.

Keywords: urban stress, built environment, mental health, urban stressors, urban design

Procedia PDF Downloads 67
2346 Untargeted Small Metabolite Identification from Thermally Treated Tualang Honey

Authors: Lee Suan Chua

Abstract:

This study investigated the effects of thermal treatment on Tualang honey sample in terms of honey colour and heat-induced small metabolites. The heating process was carried out in a temperature controlled water batch at 90 °C for 4 hours. The honey samples were put in cylinder tubes with the dimension of 1 cm diameter and 10 cm length for homogenous heat transfer. The results found that the thermal treatment produced not only hydroxylmethylfurfural, but also other harmful substances such as phthalic anhydride and radiolytic byproducts. The degradation of honey protein was reported due to the detection of free amino acids such as cysteine and phenylalanine in heat-treated honey samples. Sugar dehydration also occurred because fragmented di-galactose was identified based on the presence of characteristic ions in the mass fragmentation pattern. The honey colour was found getting darker as the heating duration was increased up to 4 hours. Approximately, 60 mm PFund of increment was noticed for the honey colour with the colour change rate of 14.8 mm PFund per hour. Based on the principal component analysis, the chemical profile of Tualang honey was significantly altered after 2 hours of heating at 90 °C.

Keywords: honey colour, hydroxylmethylfurfural, thermal treatment, tualang honey

Procedia PDF Downloads 378
2345 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 116
2344 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 398
2343 Establishing Reference Intervals for Routine Coagulation Tests

Authors: Santina Sahibon, Sivasooriar Sivaneson, Martin Giddy, Nelson Nheu, Siti Sazeelah, Choo Kok Ming, Thuhairah Abdul Rahman, Fatmawati Binti Kamal

Abstract:

Introduction: Establishing population-based reference intervals (RI) are essential when evaluating laboratory test results and for method verification. Our laboratory initiated an exercise to establish RI for routine coagulation profile as part of the method verification procedure and to determine any differences in RI between three analyzers planned to be used in the laboratory. Methodology: 145 blood samples were collected and analysed for activated partial thromboplastin time (aPTT), prothrombin time (PT), international normalized ratio (INR), and fibrinogen] using three coagulation analysers which were CA104, CA660, and CS-2500 (Sysmex, USA). RI was established at 2.5th and 97.5th percentiles. Results: The RI for aPTT between C104, C660 and CS-2500 are (RI: 20.5-30.2 sec), (RI: 21.5-29.2 sec) and (RI: 22.7-30.3 sec) respectively. The RI for PT were (RI: 7.5-10.3 sec), (RI: 9.2- 11.1 sec) and (RI: 9.8-11.9 sec) for C104, CA660 and CS-2500 respectively. INR had an RI of (RI: 0.87- 1.16), (RI: 0.89-1.10) and (0.90-1.11) respectively on CA104, C660 and CS-2500. Fibrinogen RI was (RI: 2.04-4.62 g/L) and (2.05-4.76 g/L) on the CA660 and CS-2500, respectively. Conclusion: The RI was similar across the analytical platforms for aPTT, INR, and fibrinogen. However, CA104 showed lower RI compared to the other two analysers for PT. This highlights the potential variability in results between instruments that need to be addressed when verifying RI.

Keywords: coagulation, reference interval, APTT, PT, INR, fibrinogen

Procedia PDF Downloads 190
2342 Triadic Relationship of Icon Design for Semi-Literate Communities

Authors: Peng-Hui Maffee Wan, Klarissa Ting Ting Chang, Rax Suen Chun Lung

Abstract:

Icons, or pictorial and graphical objects, are commonly used in Human-Computer Interaction (HCI) fields as the mediator in order to communicate information to users. Yet there has been little studies focusing on a majority of the world’s population, semi-literate communities, in terms of the fundamental know-how for designing icons for such population. In this study, two sets of icons belonging in different icon taxonomy, abstract and concrete are designed for a mobile application for semi-literate agricultural communities. In this paper, we propose a triadic relationship of an icon, namely meaning, task and mental image, which inherits the triadic relationship of a sign. User testing with the application and a post-pilot questionnaire are conducted as the experimental approach in two rural villages in India. Icons belonging to concrete taxonomy perform better than abstract icons on the premise that the design of the icon fulfills the underlying rules of the proposed triadic relationship.

Keywords: icon, GUI, mobile app, semi-literate

Procedia PDF Downloads 491
2341 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 292
2340 Development of a Thermodynamic Model for Ladle Metallurgy Steel Making Processes Using Factsage and Its Macro Facility

Authors: Prasenjit Singha, Ajay Kumar Shukla

Abstract:

To produce high-quality steel in larger volumes, dynamic control of composition and temperature throughout the process is essential. In this paper, we developed a mass transfer model based on thermodynamics to simulate the ladle metallurgy steel-making process using FactSage and its macro facility. The overall heat and mass transfer processes consist of one equilibrium chamber, two non-equilibrium chambers, and one adiabatic reactor. The flow of material, as well as heat transfer, occurs across four interconnected unit chambers and a reactor. We used the macro programming facility of FactSage™ software to understand the thermochemical model of the secondary steel making process. In our model, we varied the oxygen content during the process and studied their effect on the composition of the final hot metal and slag. The model has been validated with respect to the plant data for the steel composition, which is similar to the ladle metallurgy steel-making process in the industry. The resulting composition profile serves as a guiding tool to optimize the process of ladle metallurgy in steel-making industries.

Keywords: desulphurization, degassing, factsage, reactor

Procedia PDF Downloads 221
2339 The Effect of User Comments on Traffic Application Usage

Authors: I. Gokasar, G. Bakioglu

Abstract:

With the unprecedented rates of technological improvements, people start to solve their problems with the help of technological tools. According to application stores and websites in which people evaluate and comment on the traffic apps, there are more than 100 traffic applications which have different features with respect to their purpose of usage ranging from the features of traffic apps for public transit modes to the features of traffic apps for private cars. This study focuses on the top 30 traffic applications which were chosen with respect to their download counts. All data about the traffic applications were obtained from related websites. The purpose of this study is to analyze traffic applications in terms of their categorical attributes with the help of developing a regression model. The analysis results suggest that negative interpretations (e.g., being deficient) does not lead to lower star ratings of the applications. However, those negative interpretations result in a smaller increase in star rate. In addition, women use higher star rates than men for the evaluation of traffic applications.

Keywords: traffic app, real–time information, traffic congestion, regression analysis, dummy variables

Procedia PDF Downloads 430
2338 Integrating Non-Psychoactive Phytocannabinoids and Their Cyclodextrin Inclusion Complexes into the Treatment of Glioblastoma

Authors: Kyriaki Hatziagapiou, Konstantinos Bethanis, Olti Nikola, Elias Christoforides, Eleni Koniari, Eleni Kakouri, George Lambrou, Christina Kanaka-Gantenbein

Abstract:

Glioblastoma multiforme (GBM) remains a serious health challenge, as current therapeutic modalities continue to yield unsatisfactory results, with the average survival rarely exceeding 1-2 years. Natural compounds still provide some of the most promising approaches for discovering new drugs. The non-psychotropic cannabidiol (CBD) deriving from Cannabis sativa L. provides such promise. CBD is endowed with anticancer, antioxidant, and genoprotective properties as established in vitro and in in vivo experiments. CBD’s selectivity towards cancer cells and its safe profile suggest its usage in cancer therapies. However, the bioavailability of oral CBD is low due to poor aqueous solubility, erratic gastrointestinal absorption, and significant first-pass metabolism, hampering its therapeutic potential and resulting in a variable pharmacokinetic profile. In this context, CBD can take great advantage of nanomedicine-based formulation strategies. Cyclodextrins (CDs) are cyclic oligosaccharides used in the pharmaceutical industry to incorporate apolar molecules inside their hydrophobic cavity, increasing their stability, water solubility, and bioavailability or decreasing their side effects. CBD-inclusion complexes with CDs could be a good strategy to improve its properties, like solubility and stability to harness its full therapeutic potential. The current research aims to study the potential cytotoxic effect of CBD and CBD-CDs complexes CBD-RMβCD (randomly methylated β-cyclodextrin) and CBD-HPβCD (hydroxypropyl-b-CD) on the A172 glioblastoma cell line. CBD is diluted in 10% DMSO, and CBD/CDs solutions are prepared by mixing solid CBD, solid CDs, and dH2O. For the biological assays, A172 cells are incubated at a range of concentrations of CBD, CBD-RMβCD and CBD-HPβCD, RMβCD, and HPβCD (0,03125-4 mg/ml) at 24, 48, and 72 hours. Analysis of cell viability after incubation with the compounds is performed with Alamar Blue viability assay. CBD’s dilution to DMSO 10% was inadequate, as crystals are observed; thus cytotoxicity experiments are not assessed. CBD’s solubility is enhanced in the presence of both CDs. CBD/CDs exert significant cytotoxicity in a dose and time-dependent manner (p < 0.005 for exposed cells to any concentration at 48, 72, and 96 hours versus cells not exposed); as their concentration and time of exposure increases, the reduction of resazurin to resofurin decreases, indicating a reduction in cell viability. The cytotoxic effect is more pronounced in cells exposed to CBD-HPβCD for all concentrations and time-points. RMβCD and HPβCD at the highest concentration of 4 mg/ml also exerted antitumor action per se since manifesting cell growth inhibition. The results of our study could afford the basis of research regarding the use of natural products and their inclusion complexes as anticancer agents and the shift to targeted therapy with higher efficacy and limited toxicity. Acknowledgments: The research is partly funded by ΙΚΥ (State Scholarships Foundation) – Post-doc Scholarships-Partnership Agreement 2014-2020.

Keywords: cannabidiol, cyclodextrins, glioblastoma, hydroxypropyl-b-Cyclodextrin, randomly-methylated-β-cyclodextrin

Procedia PDF Downloads 182
2337 Forensic Analysis of Thumbnail Images in Windows 10

Authors: George Kurian, Hongmei Chi

Abstract:

Digital evidence plays a critical role in most legal investigations. In many cases, thumbnail databases show important information in that investigation. The probability of having digital evidence retrieved from a computer or smart device has increased, even though the previous user removed data and deleted apps on those devices. Due to the increase in digital forensics, the ability to store residual information from various thumbnail applications has improved. This paper will focus on investigating thumbnail information from Windows 10. Thumbnail images of interest in forensic investigations may be intact even when the original pictures have been deleted. It is our research goal to recover useful information from thumbnails. In this research project, we use various forensics tools to collect left thumbnail information from deleted videos or pictures. We examine and describe the various thumbnail sources in Windows and propose a methodology for thumbnail collection and analysis from laptops or desktops. A machine learning algorithm is adopted to help speed up content from thumbnail pictures.

Keywords: digital forensic, forensic tools, soundness, thumbnail, machine learning, OCR

Procedia PDF Downloads 135
2336 Assessment of Teacher Qualification Status of University Teachers in North West Nigeria; Bayero University Kano in Perspective

Authors: Collins Augustine Ekpiwre

Abstract:

Both the National Policy on Education (NPE) and the Teachers’ Registration Council of Nigeria (TRCN) gave the directive that all teachers in Nigerian schools should be trained teachers to enable them to be more effective in their teaching responsibilities. This applies to university teachers as well; they are required to acquire teacher qualifications such as Post Graduate Diploma in Education (PGDE) or Professional Diploma in Education (PDE) or Technical Teachers Certificate (TTC) or at least, National Certificate of Education (NCE) in addition to possessing academic qualifications in their specialized areas of study. It is on this ground that this study carried out an assessment of university teachers’ qualification status in Bayero University, Kano. The population of the study comprised all the teachers in the university. Data was collected through an examination of the documented official records of the qualification profile of all the teachers in the university obtained from its various faculties. The collected data was analyzed through descriptive statistic of simple percentage and frequency. Based on the findings of the study and in order to strengthen the teacher qualification status of teachers in the university, a few recommendations, for example, special salary scale should be made available to university teachers with appropriate teacher qualifications, were offered.

Keywords: Teacher, university teacher, teacher qualification, university education

Procedia PDF Downloads 431
2335 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 267
2334 Design and Implementation of an AI-Enabled Task Assistance and Management System

Authors: Arun Prasad Jaganathan

Abstract:

In today's dynamic industrial world, traditional task allocation methods often fall short in adapting to evolving operational conditions. This paper introduces an AI-enabled task assistance and management system designed to overcome the limitations of conventional approaches. By using artificial intelligence (AI) and machine learning (ML), the system intelligently interprets user instructions, analyzes tasks, and allocates resources based on real-time data and environmental factors. Additionally, geolocation tracking enables proactive identification of potential delays, ensuring timely interventions. With its transparent reporting mechanisms, the system provides stakeholders with clear insights into task progress, fostering accountability and informed decision-making. The paper presents a comprehensive overview of the system architecture, algorithm, and implementation, highlighting its potential to revolutionize task management across diverse industries.

Keywords: artificial intelligence, machine learning, task allocation, operational efficiency, resource optimization

Procedia PDF Downloads 62
2333 Cost-Based Analysis of Cloud and Traditional ERP Systems in Small and Medium Enterprises

Authors: Indu Saini, Ashu Khanna, S. K. Peddoju

Abstract:

Cloud computing is the new buzz word today attracting high interest among various domains like business enterprises, Particularly in Small and Medium Enterprises. As it is a pay-per-use model, SMEs have high expectations that adapting this model will not only make them flexible, hassle-free but also economic. In view of such expectations, this paper analyses the possibility of adapting cloud computing technologies in SMEs in light of economic concerns. In this paper, two hypotheses are developed to compare the average annual per-user costs of using Enterprise Resource Planning systems in two ways, The traditional approach and the cloud approach. A web based survey is conducted apart from the Interviews with the peers to collect the data across the selected SMEs and t-test is performed to compare both the technologies on the proposed hypothesis. Results achieved are produced and discussed.

Keywords: cloud computing, small and medium enterprises, enterprise resource solutions, interviews

Procedia PDF Downloads 338
2332 Continuous Wave Interference Effects on Global Position System Signal Quality

Authors: Fang Ye, Han Yu, Yibing Li

Abstract:

Radio interference is one of the major concerns in using the global positioning system (GPS) for civilian and military applications. Interference signals are produced not only through all electronic systems but also illegal jammers. Among different types of interferences, continuous wave (CW) interference has strong adverse impacts on the quality of the received signal. In this paper, we make more detailed analysis for CW interference effects on GPS signal quality. Based on the C/A code spectrum lines, the influence of CW interference on the acquisition performance of GPS receivers is further analysed. This influence is supported by simulation results using GPS software receiver. As the most important user parameter of GPS receivers, the mathematical expression of bit error probability is also derived in the presence of CW interference, and the expression is consistent with the Monte Carlo simulation results. The research on CW interference provides some theoretical gist and new thoughts on monitoring the radio noise environment and improving the anti-jamming ability of GPS receivers.

Keywords: GPS, CW interference, acquisition performance, bit error probability, Monte Carlo

Procedia PDF Downloads 263
2331 Transverse Vibration of Elastic Beam Resting on Variable Elastic Foundation Subjected to moving Load

Authors: Idowu Ibikunle Albert, Atilade Adesanya Oluwafemi, Okedeyi Abiodun Sikiru, Mustapha Rilwan Adewale

Abstract:

These present-day all areas of transport have experienced large advances characterized by increases in the speeds and weight of vehicles. As a result, this paper considered the Transverse Vibration of an Elastic Beam Resting on a Variable Elastic Foundation Subjected to a moving Load. The beam is presumed to be uniformly distributed and has simple support at both ends. The moving distributed moving mass is assumed to move with constant velocity. The governing equations, which are fourth-order partial differential equations, were reduced to second-order partial differential equations using an analytical method in terms of series solution and solved by a numerical method using mathematical software (Maple). Results show that an increase in the values of beam parameters, moving Mass M, and k-stiffness K, significantly reduces the deflection profile of the vibrating beam. In the results, it was equally found that moving mass is greater than moving force.

Keywords: elastic beam, moving load, response of structure, variable elastic foundation

Procedia PDF Downloads 123