Search results for: mean square process
14379 Recognition of Early Enterococcus Faecalis through Image Treatment by Using Octave
Authors: Laura Victoria Vigoya Morales, David Rolando Suarez Mora
Abstract:
The problem of detecting enterococcus faecalis is receiving considerable attention with the new cases of beachgoers infected with the bacteria, which can be found in fecal matter. The process detection of this kind of bacteria would be taking a long time, which waste time and money as a result of closing recreation place, like beach or pools. Hence, new methods for automating the process of detecting and recognition of this bacteria has become in a challenge. This article describes a novel approach to detect the enterococcus faecalis bacteria in water by using an octave algorithm, which embody a network neural. This document shows result of performance, quality and integrity of the algorithm.Keywords: Enterococcus faecalis, image treatment, octave and network neuronal
Procedia PDF Downloads 23014378 Microstructural Evolution of Maraging Steels from Powder Particles to Additively Manufactured Samples
Authors: Seyedamirreza Shamsdini, Mohsen Mohammadi
Abstract:
In this research, 18Ni-300 maraging steel powder particles are investigated by studying particle size distribution along with their morphology and grain structure. The powder analysis shows mostly spherical morphologies with cellular structures. A laser-based additive manufacturing process, selective laser melting (SLM) is used to produce samples for further investigation of mechanical properties and microstructure. Several uniaxial tensile tests are performed on the as-built parts to evaluate the mechanical properties. The macroscopic properties, as well as microscopic studies, are then investigated on the printed parts. Hardness measurements, as well as porosity levels, are measured for each sample and are correlated with microstructures through electron microscopy techniques such as Scanning Electron Microscopy (SEM) and Transmission Electron Microscopy (TEM). The grain structure is studied for the as-printed specimens and compared to the powder particle microstructure. The cellular structure of the printed samples is observed to have dendritic forms with dendrite width dimensions similar to the powder particle cells. The process parameter is changed, and the study is performed for different powder layer thickness, and the resultant mechanical properties and grain structure are shown to be similar. A phase study is conducted both on the powder and the printed samples using X-Ray Diffraction (XRD) techniques, and the austenite phase is observed to at first decrease due to the manufacturing process and again during the uniaxial tensile deformation. The martensitic structure is formed in the first stage based on the heating cycles of the manufacturing process and the remaining austenite is shown to be transformed to martensite due to different deformation mechanisms.Keywords: additive manufacturing, maraging steel, mechanical properties, microstructure
Procedia PDF Downloads 16014377 Hydrothermal Synthesis of ZIF-7 Crystals and Their Composite ZIF-7/CS Membranes for Water/Ethanol Separation
Authors: Kai-Sheng Ji, Yi-Feng Lin
Abstract:
The pervaporation process for solvent and water separation has attracted research attention due to its lower energy consumption compared with conventional distillation processes. The membranes used for the pervaporation approach should exhibit high flux and separation factors. In this study, the ZIF-7 crystal particles were successfully incorporated into chitosan (CS) membranes to form ZIF-7/CS mixed-matrix membranes. The as-prepared ZIF-7/CS mixed-matrix membranes were used to separate mixtures of water/ethanol at 25℃ in the pervaporation process. The mixed-matrix membranes with different ZIF-7 wt% incorporation showed better separation efficiency than the pristine CS membranes because of the smaller pore size of the mixed-matrix membranes. The separation factor and the flux of the ZIF-7/CS membranes clearly exceed the upper limit of the previously reported CS-based and mixed-matrix membranes.Keywords: pervaporation, chitosan, ZIF-7, memberane separation
Procedia PDF Downloads 43014376 Mechanisms of Ginger Bioactive Compounds Extract Using Soxhlet and Accelerated Water Extraction
Authors: M. N. Azian, A. N. Ilia Anisa, Y. Iwai
Abstract:
The mechanism for extraction bioactive compounds from plant matrix is essential for optimizing the extraction process. As a benchmark technique, a soxhlet extraction has been utilized for discussing the mechanism and compared with an accelerated water extraction. The trends of both techniques show that the process involves extraction and degradation. The highest yields of 6-, 8-, 10-gingerols and 6-shogaol in soxhlet extraction were 13.948, 7.12, 10.312 and 2.306 mg/g, respectively. The optimum 6-, 8-, 10-gingerols and 6-shogaol extracted by the accelerated water extraction at 140oC were 68.97±3.95 mg/g at 3min, 18.98±3.04 mg/g at 5min, 5.167±2.35 mg/g at 3min and 14.57±6.27 mg/g at 3min, respectively. The effect of temperature at 3mins shows that the concentration of 6-shogaol increased rapidly as decreasing the recovery of 6-gingerol.Keywords: mechanism, ginger bioactive compounds, soxhlet extraction, accelerated water extraction
Procedia PDF Downloads 43414375 About Multi-Resolution Techniques for Large Eddy Simulation of Reactive Multi-Phase Flows
Authors: Giacomo Rossi, Bernardo Favini, Eugenio Giacomazzi, Franca Rita Picchia, Nunzio Maria Salvatore Arcidiacono
Abstract:
A numerical technique for mesh refinement in the HeaRT (Heat Release and Transfer) numerical code is presented. In the CFD framework, Large Eddy Simulation (LES) approach is gaining in importance as a tool for simulating turbulent combustion processes, also if this approach has an high computational cost due to the complexity of the turbulent modeling and the high number of grid points necessary to obtain a good numerical solution. In particular, when a numerical simulation of a big domain is performed with a structured grid, the number of grid points can increase so much that the simulation becomes impossible: this problem can be overcame with a mesh refinement technique. Mesh refinement technique developed for HeaRT numerical code (a staggered finite difference code) is based on an high order reconstruction of the variables at the grid interfaces by means of a least square quasi-ENO interpolation: numerical code is written in modern Fortran (2003 standard of newer) and is parallelized using domain decomposition and message passing interface (MPI) standard.Keywords: LES, multi-resolution, ENO, fortran
Procedia PDF Downloads 36614374 Prevalence and Antimicrobial Susceptibility of Thermophilic Campylobacter Strains Isolated from Humans and Poultry in Batna
Authors: Baali Mohamed
Abstract:
Campylobacter are among the most common human bacterial gastroenteritis cases in many countries, and poultry meat is considered as a major source of human campylobacteriosis. This study is conducted, on one hand, to determine the prevalence of infection with thermotolerant Campylobacter both in broiler flocks and men, and to study their sensitivity to antibiotics, and secondly for comparing the two methods of isolation of Campylobacter thermotolerant: technique of passive filtration and selective isolation technique using the Karmali medium. This study examined 310 samples, 260 of avian origin and 50 of human origin, during the period from June 2011 to March 2012. Detecting Campylobacter thermotolerant is conducted using the standard ISO 10272. The results show that 66% (95% CI : 60-72%) of avian samples are contaminated with C. TT (172/260). The study of antibiotic susceptibility revealed that all strains (100%) are resistant to ampicillin and amoxicillin/clavulanic acid, 90% to erythromycin, 66.3% to tetracycline, 53.3% to chloramphenicol and 46.7% to enrofloxacin. However, no resistance is noted to gentamycin. In human samples, three strains of C. thermotolerant are detected, with a contamination rate of 6%. The results of the statistical analysis using the chi-square test (χ2) showed that Campylobacter infection, on the one hand, had seasonal variation with a summer peak (p < 0.05) and, on the other hand, are not influenced by the size of the herd.Keywords: thermotolerant campylobacter, broiler, man, Karmali
Procedia PDF Downloads 39514373 The Tribological Behaviors of Vacuum Gas Nitriding Titanium and Steel Substrates at Different Process Temperatures
Authors: Hikmet Cicek
Abstract:
Metal nitrides show excellence tribological properties and they used for especially on machine parts. In this work, the vacuum gas nitriding proses were applied to the titanium, D2 and 52100 steel substrates at three different proses temperatures (500 °C, 600°C and 700 °C). Structural, mechanical and tribological properties of the samples were characterized. X-Ray diffractometer, scanning electron microscope and energy dispersive spectroscopy analyses were conducted to determine structural properties. Microhardness test and pin-on-disc wear test were made to observe tribological properties. Coefficient of friction, wear rate and wear traces were examined comparatively. According to the test results, the process temperature very effective parameter for the vacuum gas nitriding method.Keywords: gas nitriding, tribology, wear, coating
Procedia PDF Downloads 19914372 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 4814371 Microfinance and Women Empowerment in Bangladesh: Impact in Economic Dimension
Authors: Abm Mostafa, Rumbidzai Mukono, Peijie Wang
Abstract:
Using 285 respondents from two microfinance institutions, this research aims to assess the impact of microfinance on women’s economic empowerment in Bangladesh. Empirical measures of economic empowerment used in this paper are underpinned by a bargaining theory of household. Questionnaire is used for data collection following purposive sampling. Descriptive statistics, chi-square test, Kruskal-Wallis test, binary, and ordinal logistic regressions are deployed for data analysis. The findings of this study show that around three quarters of respondents have increased household income. They have increased their savings overwhelmingly; nonetheless, many of them are found to have a very small amount of savings. Still, more than half of the respondents are reported to have increased their savings when it is checked against at least 500 BDT per month. On the contrary, the percentage of women is moderate in terms of increasing control over finances. Empirical findings demonstrate the evidence of a relationship between the amount of loan and women’s household income, their savings, and control over finances. Nonetheless, no relationship is found in women’s areas. This study infers that women’s access to financial resources is fundamental to empower them in economic dimension.Keywords: microfinance, women, economic, empowerment, Bangladesh
Procedia PDF Downloads 13214370 Removal of Mixed Heavy Metals from Contaminated Clay Soils Using Pulsed Electrokinetic Process
Authors: Nuhu Dalhat Mu’azu, Abdullahi Usman, A. Bukhari, Muhammad Hussain Essa, Salihu Lukman
Abstract:
Electrokinetic remediation process was employed for the removal of four (4) heavy metals (Cr, Cu, Hg and Pb) from contaminated clay and bentonite soils under pulsed current supply mode. The effects of voltage gradient, pulse duty cycle and bentonite/clay ratio on the simultaneous removal efficiencies of the heavy metals were investigated. A total of thirteen experiments were designed and conducted according to factorial design with each experiment allowed to continuously ran for 3 weeks. Results obtained showed that increase in bentonite ratio decreased the removal efficiency of the heavy metals with no significant effect on the energy consumption. Conversely, increase in both voltage gradient and pulse duty cycle increased the heavy metals removal efficiencies with increased in energy consumption. Additionally, increase in voltage gradient increased the electrical conductivity and the soil pH due to due to continuous refill and replacement of process fluids as they decomposed under the induced voltage gradient. Under different operating conditions, the maximum removal efficiencies obtained for Cr, Cu, Hg, and Pb were 21.87, 83.2, 62.4, 78.06 and 16.65% respectively.Keywords: clay, bentonite, soil remediation, mixed contaminants, heavy metals, and electrokinetic-adsorption
Procedia PDF Downloads 43214369 Integrated Design of Froth Flotation Process in Sludge Oil Recovery Using Cavitation Nanobubbles for Increase the Efficiency and High Viscose Compatibility
Authors: Yolla Miranda, Marini Altyra, Karina Kalmapuspita Imas
Abstract:
Oily sludge wastes always fill in upstream and downstream petroleum industry process. Sludge still contains oil that can use for energy storage. Recycling sludge is a method to handling it for reduce the toxicity and very probable to get the remaining oil around 20% from its volume. Froth flotation, a common method based on chemical unit for separate fine solid particles from an aqueous suspension. The basic composition of froth flotation is the capture of oil droplets or small solids by air bubbles in an aqueous slurry, followed by their levitation and collection in a froth layer. This method has been known as no intensive energy requirement and easy to apply. But the low efficiency and unable treat the high viscosity become the biggest problem in froth flotation unit. This study give the design to manage the high viscosity of sludge first and then entering the froth flotation including cavitation tube on it to change the bubbles into nano particles. The recovery in flotation starts with the collision and adhesion of hydrophobic particles to the air bubbles followed by transportation of the hydrophobic particle-bubble aggregate from the collection zone to the froth zone, drainage and enrichment of the froth, and finally by its overflow removal from the cell top. The effective particle separation by froth flotation relies on the efficient capture of hydrophobic particles by air bubbles in three steps. The important step is collision. Decreasing the bubble particles will increasing the collision effect. It cause the process more efficient. The pre-treatment, froth flotation, and cavitation tube integrated each other. The design shows the integrated unit and its process.Keywords: sludge oil recovery, froth flotation, cavitation tube, nanobubbles, high viscosity
Procedia PDF Downloads 37814368 The Marketing Mix in Small Sized Hotels: A Case of Pattaya, Thailand
Authors: Anyapak Prapannetivuth
Abstract:
The purpose of this research is to investigate the marketing mix that is perceived to be important for the small sized hotels in Pattaya. Unlike previous studies, this research provides insights through a review of the marketing activities performed by the small sized hotels. Nine owners and marketing manager of small sized hotels and resorts, all local Chonburi people, were selected for an in-depth interview. A snowball sampling process was employed. The research suggests that seven marketing mixes (e.g. Product, Price, Place, Promotion, People, Physical Evidence and Process) were commonly used by these hotels, however, three types – People, price and physical evidence were considered most important by the owners.Keywords: marketing mix, marketing tools, small sized hotels, pattaya
Procedia PDF Downloads 28714367 Optimization of Assay Parameters of L-Glutaminase from Bacillus cereus MTCC1305 Using Artificial Neural Network
Authors: P. Singh, R. M. Banik
Abstract:
Artificial neural network (ANN) was employed to optimize assay parameters viz., time, temperature, pH of reaction mixture, enzyme volume and substrate concentration of L-glutaminase from Bacillus cereus MTCC 1305. ANN model showed high value of coefficient of determination (0.9999), low value of root mean square error (0.6697) and low value of absolute average deviation. A multilayer perceptron neural network trained with an error back-propagation algorithm was incorporated for developing a predictive model and its topology was obtained as 5-3-1 after applying Levenberg Marquardt (LM) training algorithm. The predicted activity of L-glutaminase was obtained as 633.7349 U/l by considering optimum assay parameters, viz., pH of reaction mixture (7.5), reaction time (20 minutes), incubation temperature (35˚C), substrate concentration (40mM), and enzyme volume (0.5ml). The predicted data was verified by running experiment at simulated optimum assay condition and activity was obtained as 634.00 U/l. The application of ANN model for optimization of assay conditions improved the activity of L-glutaminase by 1.499 fold.Keywords: Bacillus cereus, L-glutaminase, assay parameters, artificial neural network
Procedia PDF Downloads 42914366 Adaptive Anchor Weighting for Improved Localization with Levenberg-Marquardt Optimization
Authors: Basak Can
Abstract:
This paper introduces an iterative and weighted localization method that utilizes a unique cost function formulation to significantly enhance the performance of positioning systems. The system employs locators, such as Gateways (GWs), to estimate and track the position of an End Node (EN). Performance is evaluated relative to the number of locators, with known locations determined through calibration. Performance evaluation is presented utilizing low cost single-antenna Bluetooth Low Energy (BLE) devices. The proposed approach can be applied to alternative Internet of Things (IoT) modulation schemes, as well as Ultra WideBand (UWB) or millimeter-wave (mmWave) based devices. In non-line-of-sight (NLOS) scenarios, using four or eight locators yields a 95th percentile localization performance of 2.2 meters and 1.5 meters, respectively, in a 4,305 square feet indoor area with BLE 5.1 devices. This method outperforms conventional RSSI-based techniques, achieving a 51% improvement with four locators and a 52 % improvement with eight locators. Future work involves modeling interference impact and implementing data curation across multiple channels to mitigate such effects.Keywords: lateration, least squares, Levenberg-Marquardt algorithm, localization, path-loss, RMS error, RSSI, sensors, shadow fading, weighted localization
Procedia PDF Downloads 2514365 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods
Authors: Issa Qabaja, Fadi Thabtah
Abstract:
Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.Keywords: data mining, email classification, phishing, online security
Procedia PDF Downloads 43214364 Investigation of Extreme Gradient Boosting Model Prediction of Soil Strain-Shear Modulus
Authors: Ehsan Mehryaar, Reza Bushehri
Abstract:
One of the principal parameters defining the clay soil dynamic response is the strain-shear modulus relation. Predicting the strain and, subsequently, shear modulus reduction of the soil is essential for performance analysis of structures exposed to earthquake and dynamic loadings. Many soil properties affect soil’s dynamic behavior. In order to capture those effects, in this study, a database containing 1193 data points consists of maximum shear modulus, strain, moisture content, initial void ratio, plastic limit, liquid limit, initial confining pressure resulting from dynamic laboratory testing of 21 clays is collected for predicting the shear modulus vs. strain curve of soil. A model based on an extreme gradient boosting technique is proposed. A tree-structured parzan estimator hyper-parameter tuning algorithm is utilized simultaneously to find the best hyper-parameters for the model. The performance of the model is compared to the existing empirical equations using the coefficient of correlation and root mean square error.Keywords: XGBoost, hyper-parameter tuning, soil shear modulus, dynamic response
Procedia PDF Downloads 20114363 Evaluation of Corrosion Caused by Biogenic Sulfuric Acid (BSA) on the Concrete Structures of Sewerage Systems: Chemical Tests
Authors: M. Cortés, E. Vera, O. Rojas
Abstract:
The research studies of the kinetics of the corrosion process that attacks concrete and occurs within sewerage systems agree on the amount of variables that interfere in the process. This study aims to check the impact of the pH levels of the corrosive environment and the concrete surface, the concentrations of chemical sulfuric acid, and in turn, measure the resistance of concrete to this attack under controlled laboratory conditions; it also aims to contribute to the development of further research related to the topic, in order to compare the impact of biogenic sulfuric acid and chemical sulfuric acid involvement on concrete structures, especially in scenarios such as sewerage systems.Keywords: acid sulfuric, concrete, corrosion, biogenic
Procedia PDF Downloads 38014362 Practicing Participatory Approach in Social Forestry to Strengthen Sustainability in a Rural Area of Bangladesh
Authors: A B M Enamol Hassan
Abstract:
The forest storing up in Bangladesh is of deep concern to policy analysts because of increasing encroachment that results in deforestation and degradation of the ecosystem. To address these problems, forest-dependent people, as responsible for encroachment, could be involved in the co-management process along with other local stakeholders through a participatory approach. On the basis of this premise, this paper conceptualizes and empirically assesses the integration of all stakeholders in the co-management process through two lenses such as participation and collaboration. The study also analyzed the issues of sustainability in local communities along with examining constraints that limit the processes of integration. The study used a qualitative research method, which included face-to-face interviews with semi-structured questionnaires and field notes following the purposive sampling technique focusing on Comilla Sadar South Upazila (CSSU), Bangladesh. The findings of this paper reveal beneficiaries, Bangladesh Forest Department (BFD) and Union Parishad (UP), come together as leading actors, while NGOs and business entrepreneurs are ignored in the co-management process of social forestry. However, integrated management contributes to the strength of community sustainability, although it has some major limitations causing the matter of concerns among the local communities and policy analysts.Keywords: integration, participation, collaboration, stakeholders, community sustainability
Procedia PDF Downloads 17914361 Advanced Approach to Analysis the Thin Strip Profile in Cold Rolling of Pair Roll Crossing and Shifting Mill Using an Arbitrary Lagrangian-Eulerian Technique
Authors: Abdulrahman Aljabri, Essam R. I. Mahmoud, Hamad Almohamedi, Zhengyi Jiang
Abstract:
Cold rolled thin strip has received intensive attention through technological and theoretical progress in the rolling process, as well as researchers have focused on its control during rolling as an essential parameter for producing thinner strip with good shape and profile. An advanced approach has been proposed to analysis the thin strip profile in cold rolling of pair roll crossing and shifting mill using Finite Element Analysis (FEA) with an ALE technique. The ALE (Arbitrary Lagrangian-Eulerian) techniques to enable more flexibility of the ALE technique in the adjustment of the finite element mesh, which provides a significant tool for simulating the thin strip under realistic rolling process constraint and provide accurate model results. The FEA can provide theoretical basis for the 3D model of controlling the strip shape and profile in thin strip rolling, and deliver an optimal rolling process parameter, and suggest corrective changes during cold rolling of thin strip.Keywords: pair roll crossing, work roll shifting, strip shape and profile, finite element modeling
Procedia PDF Downloads 9614360 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm
Authors: Vahid Bayrami Rad
Abstract:
Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.Keywords: arduino board, artificial intelligence, image processing, solenoid lock
Procedia PDF Downloads 6914359 Projectification: Using Project Management Methodology to Manage the Academic Program Review
Authors: Adam Marks, Munir Majdalawieh, Maytha Al Ali
Abstract:
While research is rich with what criteria could be included in the academic program review processes, there is rarely any mention of how this significant and complex process should be managed. This paper proposes using project management methodology in alignment with the program review criteria of the Dickeson’s Prioritizing Academic Programs model. Project management and academic program review share two distinct characteristics; one is their life cycle, and the second is the core knowledge areas they use. This aligned and structured approach offers academic administrators a step-by-step guide that can help them manage this process and effectively assess academic programs.Keywords: project management, academic program, program review, education, higher education institution, strategic management
Procedia PDF Downloads 36714358 The Impact of Technology on Architecture and Graphic Designs
Authors: Feby Zaki Raouf Fawzy
Abstract:
Nowadays, design and architecture are being affected and undergoing change with the rapid advancements in technology, economics, politics, society, and culture. Architecture has been transforming with the latest developments after the inclusion of computers in design. Integration of design into the computational environment has revolutionized architecture and unique perspectives in architecture have been gained. The history of architecture shows the various technological developments and changes in which architecture has transformed with time. Therefore, the analysis of integration between technology and the history of the architectural process makes it possible to build a consensus on the idea of how architecture is to proceed. In this study, each period that occurs with the integration of technology into architecture is addressed within the historical process. At the same time, changes in architecture via technology are identified as important milestones and predictions with regards to the future of architecture have been determined. Developments and changes in technology and the use of technology in architecture within years are analyzed in charts and graphs comparatively. The historical process of architecture and its transformation via technology is supported by a detailed literature review, and they are consolidated with the examination of focal points of 20th-century architecture under the titles parametric design, genetic architecture, simulation, and biomimicry. It is concluded that with the historical research between past and present, the developments in architecture cannot keep up with the advancements in technology, and recent developments in technology overshadow architecture; even technology decides the direction of architecture. As a result, a scenario is presented with regard to the reach of technology in the future of architecture and the role of the architect.Keywords: design and development the information technology architecture, enterprise architecture, enterprise architecture design result, TOGAF architecture development method (ADM)
Procedia PDF Downloads 6914357 Information Technology in Assessing Risks and Threats in the Transition of the Brand to the Digital Environment
Authors: Spanova Yerkezhan, Amantay Ayan, Alimzhanova Laura
Abstract:
This article discusses the concept of rebranding and its relationship to cybersecurity. Rebranding is the process of changing the appearance and image of a company or organization in order to appeal to new customers or change the perception of a company. It can be a powerful tool for businesses looking to renew their reputation or expand into new markets. In today's digital age, companies increasingly rely on technology and the internet to conduct business; rebranding can also present significant cybersecurity risks. This is because a rebranding effort can create new vulnerabilities for companies, particularly in terms of their online presence. This article explores the potential hazards associated with rebranding and provides recommendations for mitigating those risks. It also highlights the importance of considering cybersecurity in the rebranding process and how it can be integrated into the overall strategy for a successful and secure rebranding.Keywords: rebranding, cybersecurity, cyberattack, logo, vulnerability
Procedia PDF Downloads 16614356 Developing Digital Twins of Steel Hull Processes
Authors: V. Ložar, N. Hadžić, T. Opetuk, R. Keser
Abstract:
The development of digital twins strongly depends on efficient algorithms and their capability to mirror real-life processes. Nowadays, such efforts are required to establish factories of the future faced with new demands of custom-made production. The ship hull processes face these challenges too. Therefore, it is important to implement design and evaluation approaches based on production system engineering. In this study, the recently developed finite state method is employed to describe the stell hull process as a platform for the implementation of digital twinning technology. The application is justified by comparing the finite state method with the analytical approach. This method is employed to rebuild a model of a real shipyard ship hull process using a combination of serial and splitting lines. The key performance indicators such as the production rate, work in process, probability of starvation, and blockade are calculated and compared to the corresponding results obtained through a simulation approach using the software tool Enterprise dynamics. This study confirms that the finite state method is a suitable tool for digital twinning applications. The conclusion highlights the advantages and disadvantages of methods employed in this context.Keywords: digital twin, finite state method, production system engineering, shipyard
Procedia PDF Downloads 9914355 Deep Learning Approach to Trademark Design Code Identification
Authors: Girish J. Showkatramani, Arthi M. Krishna, Sashi Nareddi, Naresh Nula, Aaron Pepe, Glen Brown, Greg Gabel, Chris Doninger
Abstract:
Trademark examination and approval is a complex process that involves analysis and review of the design components of the marks such as the visual representation as well as the textual data associated with marks such as marks' description. Currently, the process of identifying marks with similar visual representation is done manually in United States Patent and Trademark Office (USPTO) and takes a considerable amount of time. Moreover, the accuracy of these searches depends heavily on the experts determining the trademark design codes used to catalog the visual design codes in the mark. In this study, we explore several methods to automate trademark design code classification. Based on recent successes of convolutional neural networks in image classification, we have used several different convolutional neural networks such as Google’s Inception v3, Inception-ResNet-v2, and Xception net. The study also looks into other techniques to augment the results from CNNs such as using Open Source Computer Vision Library (OpenCV) to pre-process the images. This paper reports the results of the various models trained on year of annotated trademark images.Keywords: trademark design code, convolutional neural networks, trademark image classification, trademark image search, Inception-ResNet-v2
Procedia PDF Downloads 23214354 The Failure and Energy Mechanism of Rock-Like Material with Single Flaw
Authors: Yu Chen
Abstract:
This paper investigates the influence of flaw on failure process of rock-like material under uniaxial compression. In laboratory, the uniaxial compression tests of intact specimens and a series of specimens within single flaw were conducted. The inclination angle of flaws includes 0°, 15°, 30°, 45°, 60°, 75° and 90°. Based on the laboratory tests, the corresponding models of numerical simulation were built and loaded in PFC2D. After analysing the crack initiation and failure modes, deformation field, and energy mechanism for both laboratory tests and numerical simulation, it can be concluded that the influence of flaws on the failure process is determined by its inclination. The characteristic stresses increase as flaw angle rising basically. The tensile cracks develop from gentle flaws (α ≤ 30°) and the shear cracks develop from other flaws. The propagation of cracks changes during failure process and the failure mode of a specimen corresponds to the orientation of the flaw. A flaw has significant influence on the transverse deformation field at the middle of the specimen, except the 75° and 90° flaw sample. The input energy, strain energy and dissipation energy of specimens show approximate increase trends with flaw angle rising and it presents large difference on the energy distribution.Keywords: failure pattern, particle deformation field, energy mechanism, PFC
Procedia PDF Downloads 21314353 Cognitive Methods for Detecting Deception During the Criminal Investigation Process
Authors: Laid Fekih
Abstract:
Background: It is difficult to detect lying, deception, and misrepresentation just by looking at verbal or non-verbal expression during the criminal investigation process, as there is a common belief that it is possible to tell whether a person is lying or telling the truth just by looking at the way they act or behave. The process of detecting lies and deception during the criminal investigation process needs more studies and research to overcome the difficulties facing the investigators. Method: The present study aimed to identify the effectiveness of cognitive methods and techniques in detecting deception during the criminal investigation. It adopted the quasi-experimental method and covered a sample of (20) defendants distributed randomly into two homogeneous groups, an experimental group of (10) defendants be subject to criminal investigation by applying cognitive techniques to detect deception and a second experimental group of (10) defendants be subject to the direct investigation method. The tool that used is a guided interview based on models of investigative questions according to the cognitive deception detection approach, which consists of three techniques of Vrij: imposing the cognitive burden, encouragement to provide more information, and ask unexpected questions, and the Direct Investigation Method. Results: Results revealed a significant difference between the two groups in term of lie detection accuracy in favour of defendants be subject to criminal investigation by applying cognitive techniques, the cognitive deception detection approach produced superior total accuracy rates both with human observers and through an analysis of objective criteria. The cognitive deception detection approach produced superior accuracy results in truth detection: 71%, deception detection: 70% compared to a direct investigation method truth detection: 52%; deception detection: 49%. Conclusion: The study recommended if practitioners use a cognitive deception detection technique, they will correctly classify more individuals than when they use a direct investigation method.Keywords: the cognitive lie detection approach, deception, criminal investigation, mental health
Procedia PDF Downloads 6614352 Role of Water Supply in the Functioning of the MLDB Systems
Authors: Ramanpreet Kaur, Upasana Sharma
Abstract:
The purpose of this paper is to address the challenges faced by MLDB system at the piston foundry plant due to interruption in supply of water. For the MLDB system to work in Model, two sub-units must be connected to the robotic main unit. The system cannot function without robotics and water supply by the fan (WSF). Insufficient water supply is the cause of system failure. The system operates at top performance using two sub-units. If one sub-unit fails, the system capacity is reduced. Priority of repair is given to the main unit i.e. Robotic and WSF. To solve the problem, semi-Markov process and regenerative point technique are used. Relevant graphs are also included to particular case.Keywords: MLDB system, robotic, semi-Markov process, regenerative point technique
Procedia PDF Downloads 7714351 Effect of the Birth Order and Arrival of Younger Siblings on the Development of a Child: Evidence from India
Authors: Swati Srivastava, Ashish Kumar Upadhyay
Abstract:
Using longitudinal data from three waves of Young Lives Study and Ordinary Least Square methods, study has investigated the effect of birth order and arrival of younger siblings on child development in India. Study used child’s height for age z-score, weight for age z-score, BMI for age z-score, Peabody Picture Vocabulary Test (PPVT-Score)c, maths score, Early Grade Reading Assessment Test (ERGA) score, and memory score to measure the physical and cognitive development of child during wave-3. Findings suggest that having a high birth order is detrimental for child development and the gap between adjacent siblings is larger for children late in the birth sequences than early in the birth sequences. Study also reported that not only older siblings but arrival of younger siblings before assessment of test also reduces the development of a child. The effects become stronger in case of female children than male children.Keywords: height for age z-score, weight for age z-score, BMI for z-score, PPVT score, math score, EGRA score, memory score, birth order, siblings, Young Lives Study, India
Procedia PDF Downloads 33514350 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka
Authors: Prasansha Kumari
Abstract:
This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.Keywords: compatibility, complexity, mobile banking, observability, risk
Procedia PDF Downloads 203