Search results for: explosion proof
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 497

Search results for: explosion proof

317 Performance Evaluation of Distributed Deep Learning Frameworks in Cloud Environment

Authors: Shuen-Tai Wang, Fang-An Kuo, Chau-Yi Chou, Yu-Bin Fang

Abstract:

2016 has become the year of the Artificial Intelligence explosion. AI technologies are getting more and more matured that most world well-known tech giants are making large investment to increase the capabilities in AI. Machine learning is the science of getting computers to act without being explicitly programmed, and deep learning is a subset of machine learning that uses deep neural network to train a machine to learn  features directly from data. Deep learning realizes many machine learning applications which expand the field of AI. At the present time, deep learning frameworks have been widely deployed on servers for deep learning applications in both academia and industry. In training deep neural networks, there are many standard processes or algorithms, but the performance of different frameworks might be different. In this paper we evaluate the running performance of two state-of-the-art distributed deep learning frameworks that are running training calculation in parallel over multi GPU and multi nodes in our cloud environment. We evaluate the training performance of the frameworks with ResNet-50 convolutional neural network, and we analyze what factors that result in the performance among both distributed frameworks as well. Through the experimental analysis, we identify the overheads which could be further optimized. The main contribution is that the evaluation results provide further optimization directions in both performance tuning and algorithmic design.

Keywords: artificial intelligence, machine learning, deep learning, convolutional neural networks

Procedia PDF Downloads 183
316 AI-based Optimization Model for Plastics Biodegradable Substitutes

Authors: Zaid Almahmoud, Rana Mahmoud

Abstract:

To mitigate the environmental impacts of throwing away plastic waste, there has been a recent interest in manufacturing and producing biodegradable plastics. Here, we study a new class of biodegradable plastics which are mixed with external natural additives, including catalytic additives that lead to a successful degradation of the resulting material. To recommend the best alternative among multiple materials, we propose a multi-objective AI model that evaluates the material against multiple objectives given the material properties. As a proof of concept, the AI model was implemented in an expert system and evaluated using multiple materials. Our findings showed that Polyethylene Terephalate is potentially the best biodegradable plastic substitute based on its material properties. Therefore, it is recommended that governments shift the attention to the use of Polyethylene Terephalate in the manufacturing of bottles to gain a great environmental and sustainable benefits.

Keywords: plastic bottles, expert systems, multi-objective model, biodegradable substitutes

Procedia PDF Downloads 94
315 Irreducible Sign Patterns of Minimum Rank of 3 and Symmetric Sign Patterns That Allow Diagonalizability

Authors: Sriparna Bandopadhyay

Abstract:

It is known that irreducible sign patterns in general may not allow diagonalizability and in particular irreducible sign patterns with minimum rank greater than or equal to 4. It is also known that every irreducible sign pattern matrix with minimum rank of 2 allow diagonalizability with rank of 2 and the maximum rank of the sign pattern. In general sign patterns with minimum rank of 3 may not allow diagonalizability if the condition of irreducibility is dropped, but the problem of whether every irreducible sign pattern with minimum rank of 3 allows diagonalizability remains open. In this paper it is shown that irreducible sign patterns with minimum rank of 3 under certain conditions on the underlying graph allow diagonalizability. An alternate proof of the results that every sign pattern matrix with minimum rank of 2 and no zero lines allow diagonalizability with rank of 2 and also that every full sign pattern allows diagonalizability with all permissible ranks of the sign pattern is given. Some open problems regarding composite cycles in an irreducible symmetric sign pattern that support of a rank principal certificate are also answered.

Keywords: irreducible sign patterns, minimum rank, symmetric sign patterns, rank -principal certificate, allowing diagonalizability

Procedia PDF Downloads 74
314 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 247
313 From the Recursive Definition of Refutability to the Invalidity of Gödel’s 1931 Incompleteness

Authors: Paola Cattabriga

Abstract:

According to Gödel’s first incompleteness argument it is possible to construct a formally undecidable proposition in Principia mathematica, a statement that, although true, turns out to be neither provable nor refutable for the system, making therefore incomplete any formal system suitable for the arithmetic of integers. Its features and limitation effects are today widespread basics throughout whole scientific thought. This article brings Gödel’s achievement into question by the definition of the refutability predicate as a number-theoretical statement. We develop proof of invalidity of Theorem VI in Gödel’s 1931, the so-called Gödel’s first incompleteness theorem, in two steps: defining refutability within the same recursive status as provability and showing that as a consequence propositions (15) and (16), derived from definition 8.1 in Gödel’s 1931, are false and unacceptable for the system. The achievement of their falsity blocks the derivation of Theorem VI, which turns out to be therefore invalid, together with all the depending theorems. This article opens up thus new perspectives for mathematical research and for the overall scientific reasoning.

Keywords: Gödel numbering, incompleteness, provability predicate, refutability predicate

Procedia PDF Downloads 164
312 Impact of Entrepreneurial Education on Entrepreneurial Success through Entrepreneurial Mindset, Professional Growth, and Innovation

Authors: Hummaira Qudsia Yousaf, Sidra Munawar

Abstract:

The study aims to examine in which way entrepreneurial education and attitude affect the entrepreneur’s success with the help of an entrepreneurial mindset, professional growth, and innovation. The target population was the entrepreneurs of successful startups in Pakistan. Data was gathered through an e-questionnaire, and 230 responses were analyzed using the partial least square structural equation modeling (PLS-SEM). Resultantly, entrepreneurial education is an essential component for the development of an entrepreneurial mindset. Also, an entrepreneurial attitude is responsible for the entrepreneurial mindset, which enhances professional growth. Moreover, the study highlighted that innovation is as necessary as mindset and education are for entrepreneurs. Furthermore, the findings confirmed that professional growth brings innovation to the success of entrepreneurs. This study provides proof of how entrepreneurial education and attitude influence pupils’ success in making entrepreneurs. This study extends the scope of education by incorporating predictors, such as professional growth, innovation, and entrepreneurial success. The study is unique due to the usage of innovative techniques for professional growth that ultimately bring career success.

Keywords: entrepreneurial education, entrepreneurial attitude, entrepreneurial mindset, professional growth, entrepreneurial success, innovation

Procedia PDF Downloads 97
311 Cognitive Development Theories as Determinant of Children's Brand Recall and Ad Recognition: An Indian Perspective

Authors: Ruchika Sharma

Abstract:

In the past decade, there has been an explosion of research that has examined children’s understanding of TV advertisements and its persuasive intent, socialization of child consumer and child psychology. However, it is evident from the literature review that no studies in this area have covered advertising messages and its impact on children’s brand recall and ad recognition. Copywriters use various creative devices to lure the consumers and very impressionable consumers such as children face far more drastic effects of these creative ways of persuasion. On the basis of Piaget’s theory of cognitive development as a theoretical basis for predicting/understanding children’s response and understanding, a quasi-experiment was carried out for the study, that manipulated measurement timing and advertising messages (familiar vs. unfamiliar) keeping gender and age group as two prominent factors. This study also examines children’s understanding of Advertisements and its elements, predominantly - Language, keeping in view Fishbein’s model. Study revealed significant associations between above mentioned factors and children’s brand recall and ad identification. Further, to test the reliability of the findings on larger sample, bootstrap simulation technique was used. The simulation results are in accordance with the findings of experiment, suggesting that the conclusions obtained from the study can be generalized for entire children’s (as consumers) market in India.

Keywords: advertising, brand recall, cognitive development, preferences

Procedia PDF Downloads 268
310 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 116
309 Generalization of Zhou Fixed Point Theorem

Authors: Yu Lu

Abstract:

Fixed point theory is a basic tool for the study of the existence of Nash equilibria in game theory. This paper presents a significant generalization of the Veinott-Zhou fixed point theorem for increasing correspondences, which serves as an essential framework for investigating the existence of Nash equilibria in supermodular and quasisupermodular games. To establish our proofs, we explore different conceptions of multivalued increasingness and provide comprehensive results concerning the existence of the largest/least fixed point. We provide two distinct approaches to the proof, each offering unique insights and advantages. These advancements not only extend the applicability of the Veinott-Zhou theorem to a broader range of economic scenarios but also enhance the theoretical framework for analyzing equilibrium behavior in complex game-theoretic models. Our findings pave the way for future research in the development of more sophisticated models of economic behavior and strategic interaction.

Keywords: fixed-point, Tarski’s fixed-point theorem, Nash equilibrium, supermodular game

Procedia PDF Downloads 23
308 The Effect of Street Dust on Urban Environment

Authors: Turki M. Habeebullah, Abdel Hameed A. A. Awad, Said Munir, Atif M. F. Mohammed, Essam A. Morsy, Abdulaziz R. Seroji

Abstract:

Street dust has been knoweldged as an important source of air pollution. It does not remain deposited in a place for long, as it is easily resuspended back into the atmosphere. Street dust is a complex mixture derived from different sources: Deposited dust, traffic, tire, and brake wear, construction and demolition processes. The present study aims to evaluate the elementals ”iron, calcium, lead, cadmium, nickel, silicon, and selenium” and microbial “bacteria and fungi” contents associated street dust at the holy mosque areas. The street dust was collected by sweeping an arera~1m2 along the both sides of the road. The particles with diameter ≤ 1.7 µm constitued the highest percentages of the total particulate ≤45 µm. Moreover, The crustal species: iron and calcium were found in the highest concentrations, and proof that demolition and constricution were the main source of street dust. Also, the low biodiversity of microorganisms is attributed to severe weather conditions and characteristics of the arid environment.

Keywords: dust, microbial, environment, street

Procedia PDF Downloads 523
307 Stability of Ochratoxin a During Bread Making Process

Authors: Sara Heidari, Jafar Mohammadzadeh Milani, Elmira Pouladi Borj

Abstract:

In this research, stability of Ochratoxin A (OTA) during bread making process including fermentation with yeasts (Saccharomyces cerevisiae) and Sourdough (Lactobacillus casei, Lactobacillus rhamnosus, Lactobacillus acidophilus and Lactobacillus fermentum) and baking at 200°C were examined. Bread was prepared on a pilot-plant scale by using wheat flour spiked with standard solution of OTA. During this process, mycotoxin levels were determined after fermentation of the dough with sourdough and three types of yeast including active dry yeast, instant dry yeast and compressed yeast after further baking 200°C by high performance liquid chromatography (HPLC) with fluorescence detector after extraction and clean-up on an immunoaffinity column. According to the results, the highest stability of was observed in the first fermentation (first proof), while the lowest stability was observed in the baking stage in comparison to contaminated flour. In addition, compressed yeast showed the maximum impact on stability of OTA during bread making process.

Keywords: Ochratoxin A, bread, dough, yeast, sourdough

Procedia PDF Downloads 552
306 A Neural Network Classifier for Identifying Duplicate Image Entries in Real-Estate Databases

Authors: Sergey Ermolin, Olga Ermolin

Abstract:

A Deep Convolution Neural Network with Triplet Loss is used to identify duplicate images in real-estate advertisements in the presence of image artifacts such as watermarking, cropping, hue/brightness adjustment, and others. The effects of batch normalization, spatial dropout, and various convergence methodologies on the resulting detection accuracy are discussed. For comparative Return-on-Investment study (per industry request), end-2-end performance is benchmarked on both Nvidia Titan GPUs and Intel’s Xeon CPUs. A new real-estate dataset from San Francisco Bay Area is used for this work. Sufficient duplicate detection accuracy is achieved to supplement other database-grounded methods of duplicate removal. The implemented method is used in a Proof-of-Concept project in the real-estate industry.

Keywords: visual recognition, convolutional neural networks, triplet loss, spatial batch normalization with dropout, duplicate removal, advertisement technologies, performance benchmarking

Procedia PDF Downloads 316
305 Convergence of Sinc Methods Applied to Kuramoto-Sivashinsky Equation

Authors: Kamel Al-Khaled

Abstract:

A comparative study of the Sinc-Galerkin and Sinc-Collocation methods for solving the Kuramoto-Sivashinsky equation is given. Both approaches depend on using Sinc basis functions. Firstly, a numerical scheme using Sinc-Galerkin method is developed to approximate the solution of Kuramoto-Sivashinsky equation. Sinc approximations to both derivatives and indefinite integrals reduces the solution to an explicit system of algebraic equations. The error in the solution is shown to converge to the exact solution at an exponential. The convergence proof of the solution for the discrete system is given using fixed-point iteration. Secondly, a combination of a Crank-Nicolson formula in the time direction, with the Sinc-collocation in the space direction is presented, where the derivatives in the space variable are replaced by the necessary matrices to produce a system of algebraic equations. The methods are tested on two examples. The demonstrated results show that both of the presented methods more or less have the same accuracy.

Keywords: Sinc-Collocation, nonlinear PDEs, numerical methods, fixed-point

Procedia PDF Downloads 452
304 Investigating the Effect of Handicrafts Recreation on the Interior Design of Traditional Arts Gallery

Authors: Amir Masoud Dabagh, Mahsa Khaleghi

Abstract:

The world has entered a new phase of cultural, social, economic, and so on in the last two centuries. Apart from its positive benefits and achievements to the world, it has also incurred many costs, most of which can be mentioned as destroying or at least diminishing the role of the costumes, traditions and authentic culture of the past communities. Understanding what lasts in traditional arts is vital and worthy of study because receiving it and embracing art and forms of art using that last the artistic creation removes the age-old color and smell of its face, making it immortal and persistent in all ages. This paper attempts to present traditional art concepts and solutions for interior design with the approach of handicrafts recreation as a symbol and manifestation of national identity and proof of ancient civilizations, which is at the center of tourists' attention today. The research method is a descriptive-analytical one that first explores the theoretical foundations of research, which are the concepts of recreation and traditional arts, and analyzes the process of recreation that conceals the recollection of past experiences as well as the dynamics and creativity.

Keywords: recreation, handicrafts, interior design, concept, traditional arts

Procedia PDF Downloads 86
303 Proof of Concept Design and Development of a Computer-Aided Medical Evaluation of Symptoms Web App: An Expert System for Medical Diagnosis in General Practice

Authors: Ananda Perera

Abstract:

Computer-Assisted Medical Evaluation of Symptoms (CAMEOS) is a medical expert system designed to help General Practices (GPs) make an accurate diagnosis. CAMEOS comprises a knowledge base, user input, inference engine, reasoning module, and output statement. The knowledge base was developed by the author. User input is an Html file. The physician user collects data in the consultation. Data is sent to the inference engine at servers. CAMEOS uses set theory to simulate diagnostic reasoning. The program output is a list of differential diagnoses, the most probable diagnosis, and the diagnostic reasoning.

Keywords: CDSS, computerized decision support systems, expert systems, general practice, diagnosis, diagnostic systems, primary care diagnostic system, artificial intelligence in medicine

Procedia PDF Downloads 136
302 Heat Pipe Production and Life Performance Tests in Geosynchronous Telecom Satellites

Authors: Erkam Arslantas

Abstract:

Heat pipes one of the thermal control elements are used in communication satellites. A selection of the heat pipes of satellite thermal design will be emphasized how important and effective it is. In this article, manufacturing and performance control tests of heat pipes are reviewed from the current literature. The heat pipe is expected to function efficiently during all missions of the spacecraft from Beginning of Life (BOL) to End of Life (EOL). There are many parameters that are evaluated in manufacturing and performance control tests of the heat pipes which are used in satellites. These parameters are pressure design, leakage, noncondensable gas level (N.C.G), sine vibration, shock and static load capabilities, aging, bending, proof, final test etc. These parameters will be explained separately for the heat pipes in this review article and young researches working on the thermal control system of Geosynchronous Satellites systems can find easily related information in this article.

Keywords: communication satellite, heat pipe, performance test, thermal control

Procedia PDF Downloads 141
301 The Design of Acoustic Horns for Ultrasonic Aided Tube Double Side Flange Making

Authors: Kuen-Ming Shu, Jyun-Wei Chen

Abstract:

Encapsulated O-rings are specifically designed to address the problem of sealing the most hostile chemicals and extreme temperature applications. Ultrasonic vibration hot embossing and ultrasonic welding techniques provide a fast and reliable method to fabricate encapsulated O-ring. This paper performs the design and analysis method of the acoustic horns with double extrusion to process tube double side flange simultaneously. The paper deals with study through Finite Element Method (FEM) of ultrasonic stepped horn used to process a capsulated O-ring, the theoretical dimensions of horns, and their natural frequencies and amplitudes are obtained through the simulations of COMOSOL software. Furthermore, real horns were fabricated, tested and verified to proof the practical utility of these horns.

Keywords: encapsulated O-rings, ultrasonic vibration hot embossing, flange making, acoustic horn, finite element analysis

Procedia PDF Downloads 303
300 Generalized π-Armendariz Authentication Cryptosystem

Authors: Areej M. Abduldaim, Nadia M. G. Al-Saidi

Abstract:

Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.

Keywords: cryptosystem, identification, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol

Procedia PDF Downloads 192
299 Parallel Operated Rotary Frequency Converters within a Ship Micro-Grid System

Authors: Hamdy Ahmed Ashour

Abstract:

This paper studies the parallel operation of rotary frequency converters which can be used within a ship micro-grid system and also to supply ships and equipment in a harbour during off-sail and maintenance periods with their suitable voltage and frequency requirements in order to overcome the possible associated problems of overloading on a single converter. The paper theoretically and experimentally investigated the operation of 3-ph induction motor / 3-ph synchronous generator based rotary converters set. Concept of operation and merits of such converters has been discussed. Overall dynamic simulation model of two parallel operated rotary converters has been developed. Active and reactive load sharing of the two converters has been analyzed. Experimental setup has been implemented for proof of concept and practical validation. Simulation and experimental results have been obtained and well correlated; showing how the rotary converters based setup can be manipulated to achieve different requirements of operating conditions.

Keywords: experimental, frequency-converters, load-sharing, marine-applications, simulation, synchronization

Procedia PDF Downloads 430
298 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication

Authors: Aishwarya Shekhar, Himanshu Sharma

Abstract:

Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.

Keywords: confidentiality, deduplication, data compression, hybridity of cloud

Procedia PDF Downloads 362
297 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 124
296 Development of Application Architecture for RFID Based Indoor Tracking Using Passive RFID Tag

Authors: Sumaya Ismail, Aijaz Ahmad Rehi

Abstract:

Abstract The location tracking and positioning systems have technologically grown exponentially in recent decade. In particular, Global Position system (GPS) has become a universal norm to be a part of almost every software application directly or indirectly for the location based modules. However major drawback of GPS based system is their inability of working in indoor environments. Researchers are thus focused on the alternative technologies which can be used in indoor environments for a vast range of application domains which require indoor location tracking. One of the most popular technology used for indoor tracking is radio frequency identification (RFID). Due to its numerous advantages, including its cost effectiveness, it is considered as a technology of choice in indoor location tracking systems. To contribute to the emerging trend of the research, this paper proposes an application architecture of passive RFID tag based indoor location tracking system. For the proof of concept, a test bed will be developed to in this study. In addition, various indoor location tracking algorithms will be used to assess their appropriateness in the proposed application architecture.

Keywords: RFID, GPS, indoor location tracking, application architecture, passive RFID tag

Procedia PDF Downloads 89
295 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 103
294 Analysis of the Elastic Energy Released and Characterization of the Eruptive Episodes Intensity’s during 2014-2015 at El Reventador Volcano, Ecuador

Authors: Paúl I. Cornejo

Abstract:

The elastic energy released through Strombolian explosions has been quite studied, detailing various processes, sources, and precursory events at several volcanoes. We realized an analysis based on the relative partitioning of the elastic energy radiated into the atmosphere and ground by Strombolian-type explosions recorded at El Reventador volcano, using infrasound and seismic signals at high and moderate seismicity episodes during intense eruptive stages of explosive and effusive activity. Our results show that considerable values of Volcano Acoustic-Seismic Ratio (VASR or η) are obtained at high seismicity stages. VASR is a physical diagnostic of explosive degassing that we used to compare eruption mechanisms at El Reventador volcano for two datasets of explosions recorded at a Broad-Band BB seismic and infrasonic station located at ~5 kilometers from the vent. We conclude that the acoustic energy EA released during explosive activity (VASR η = 0.47, standard deviation σ = 0.8) is higher than the EA released during effusive activity; therefore, producing the highest values of η. Furthermore, we realized the analysis and characterization of the eruptive intensity for two episodes at high seismicity, calculating a η three-time higher for an episode of effusive activity with an occasional explosive component (η = 0.32, and σ = 0.42), than a η for an episode of only effusive activity (η = 0.11, and σ = 0.18), but more energetic.

Keywords: effusive, explosion quakes, explosive, Strombolian, VASR

Procedia PDF Downloads 159
293 Program Level Learning Outcomes in Music and Technology: Toward Improved Assessment and Better Communication

Authors: Susan Lewis

Abstract:

The assessment of learning outcomes at the program level has attracted much international interest from the perspectives of quality assurance and ongoing curricular redesign and renewal. This paper examines program-level learning outcomes in the field of music and technology, an area of study that has seen an explosion in program development over the past fifteen years. The Audio Engineering Society (AES) maintains an online directory of educational institutions worldwide, yielding the most comprehensive inventory of programs and courses in music and technology. The inventory includes courses, programs, and degrees in music and technology, music and computer science, music production, and the music industry. This paper focuses on published student learning outcomes for undergraduate degrees in music and technology and analyses commonalities at institutions in North America, the United Kingdom, and Europe. The results of a survey of student learning outcomes at twenty institutions indicates a focus on three distinct student learning outcomes: (1) cross-disciplinary knowledge in the fields of music and technology; (2) the practical application of training through the professional industry; and (3) the acquisition of skills in communication and collaboration. The paper then analyses assessment mechanisms for tracking student learning and achievement of learning outcomes at these institutions. The results indicate highly variable assessment practices. Conclusions offer recommendations for enhancing assessment techniques and better communicating learning outcomes to students.

Keywords: quality assurance, student learning; learning outcomes, music and technology

Procedia PDF Downloads 153
292 Performance-Based Quality Evaluation of Database Conceptual Schemas

Authors: Janusz Getta, Zhaoxi Pan

Abstract:

Performance-based quality evaluation of database conceptual schemas is an important aspect of database design process. It is evident that different conceptual schemas provide different logical schemas and performance of user applications strongly depends on logical and physical database structures. This work presents the entire process of performance-based quality evaluation of conceptual schemas. First, we show format. Then, the paper proposes a new specification of object algebra for representation of conceptual level database applications. Transformation of conceptual schemas and expression of object algebra into implementation schema and implementation in a particular database system allows for precise estimation of the processing costs of database applications and as a consequence for precise evaluation of performance-based quality of conceptual schemas. Then we describe an experiment as a proof of concept for the evaluation procedure presented in the paper.

Keywords: conceptual schema, implementation schema, logical schema, object algebra, performance evaluation, query processing

Procedia PDF Downloads 273
291 Fair Value Implementation of Financial Asset: Evidence in Indonesia’s Banking Sector

Authors: Alhamdi Alfi Fajri

Abstract:

The purpose of this study is to analyze and to give empirical proof about the effect of fair value implementation on financial asset against information asymmetry in Indonesia’s banking sector. This research tested the effect of fair value implementation on financial asset based on Statement of Financial Accounting Standard (PSAK) No. 55 and the fair value reliability measurement based on PSAK No. 60 against level of information asymmetry. The scope of research is Indonesia’s banking sector. The test’s result shows that the use of fair value based on PSAK No. 55 is significantly associated with information asymmetry. This positive relation is higher than the amortized cost implementation on financial asset. In addition, the fair value hierarchy based on PSAK No. 60 is significantly associated with information asymmetry. This research proves that the more reliable measurement of fair value on financial asset, the more observable fair value measurement and reduces level of information asymmetry.

Keywords: fair value, PSAK No. 55, PSAK No. 60, information asymmetry, bank

Procedia PDF Downloads 319
290 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 408
289 Utilization of Safety Measures in Prevention of Site Accidents in Nigerian Construction Industry

Authors: Samuel Opeyemi Williams, Razali Adul Hamid, Mohd Saidin Misman, Dominic Ileyemi Ajayi, Taki Eddine Seghier

Abstract:

Construction industry is famous with hazardous and high-risk environment with operatives facing a greater risk of work-related fatality or injury than operatives in other industries. It is characterised with different types of accident, ranging from electrocution, trip and slip, fall from height, struck-by, explosion, trench collapse, to scaffolding accidents, with each type being caused by different factors. However, accidents are unplanned, unforeseeable and unexpected events, but regardless of the high-risk nature of the industry, accidents are preventable. The aim of the paper is to determine the extent of the utilization of the safety measures, as well as identifying the factors underlining the non-usage. A research methodology consisting of a literature review was used to identify the types and causes of site accidents, while a well-structured questionnaire was used to determine the level of the usage of safety measures on site. The data were analysed with the results revealing the use of protective clothing, safety helmet, first aid, protective shoe, safety belt, and face shield to aid safety of workers, as well as ascribing non-usage of safety measures to cost, ignorance, lack of experts and non-inclusion in contract document. Recommendations are included in the paper suggesting the enforcement of the utilization of safety measures in reducing the spate of accident occurrence on construction sites.

Keywords: construction industry, safety measures, accident, prevention

Procedia PDF Downloads 295
288 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 470