Search results for: internet behaviour
1010 Security Analysis of Mod. S Transponder Technology and Attack Examples
Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.Keywords: flight safety, hijack, mod S transponder, security analysis
Procedia PDF Downloads 2951009 Improving Waste Recycling and Resource Productivity by Integrating Smart Resource Tracking System
Authors: Atiq Zaman
Abstract:
The high contamination rate in the recycling waste stream is one of the major problems in Australia. In addition, a lack of reliable waste data makes it even more difficult for designing and implementing an effective waste management plan. This article conceptualizes the opportunity to improve resource productivity by integrating smart resource tracking system (SRTS) into the Australian household waste management system. The application of the smart resource tracking system will be implemented through the following ways: (i) mobile application-based resource tracking system used to measure the household’s material flow; (ii) RFID, smart image and weighing system used to track waste generation, recycling and contamination; (iii) informing and motivating manufacturer and retailers to improve their problematic products’ packaging; and (iv) ensure quality and reliable data through open-sourced cloud data for public use. The smart mobile application, imaging, radio-frequency identification (RFID) and weighing technologies are not new, but the very straightforward idea of using these technologies in the household resource consumption, waste bins and collection trucks will open up a new era of accurately measuring and effectively managing our waste. The idea will bring the most urgently needed reliable, data and clarity on household consumption, recycling behaviour and waste management practices in the context of available local infrastructure and policies. Therefore, the findings of this study would be very important for decision makers to improve resource productivity in the waste industry by using smart resource tracking system.Keywords: smart devices, mobile application, smart sensors, resource tracking, waste management, resource productivity
Procedia PDF Downloads 1441008 Self Help Groups among the Ao Nagas : A Case Study of Alongkima of Nagaland, NorthEast India
Authors: Imkongtenla Pongen
Abstract:
Self Help Groups (SGHs) are socio-commercial instruments in addressing urban poverty and strengthening livelihoods. Being a member of Self Help Group helped in mutual exchanges of ideas, develop risk taking behaviour, learns flexibility in planning of a programme, and interpersonal communication within the group. In the present study, an attempt has been made to examine the functions, characteristics and practices of Self Help Groups and its impact on sustainable development among the Ao Nagas of Alongkima, Nagaland, NorthEast India. They are a tribal group and racially belong to the Mongoloid stock and linguistically to the Tibeto-Burman group. They follow endogamous, patriarchal, and patrilineal system. Major characteristics of Self Help groups in this study are found to be team spirit and group cohesiveness. Such groups are found to be geared towards a number of self-sufficiency based business ventures. The problems faced in normal functioning of the groups are unpunctuality and the inability to attend a meeting by all the members .Participation in such groups has increased women’s influence over the economic resources and decision making in the household, improved self-confidence and living standard, capacity building, self- dependent and self-reliant with no educational and entrepreneurial background, generate savings and hone their skills as motivators and leaders. All these has enhanced her status in every sphere of life in par with the opposite gender. In a nutshell, we can say that what she cannot achieve as an individual, she can achieve as a member of a Self Help Group. Hence, we should try to develop mechanisms to guarantee the sustainability of Self Help Groups which depends on the way they can deal with both internal and external conflicts like globalization and competition from new markets.Keywords: Ao nagas, microfinance, self help group, women empowerment
Procedia PDF Downloads 3411007 Management of ASD with Co-morbid OCD: A Literature Review to Compare the Pharmacological and Psychological Treatment Options in Individuals Under the Age of 18
Authors: Gursimran Jandu, Melissa Nelson, Mia Ingram, Hana Jalal
Abstract:
There is a significant overlap between autism spectrum disorder (ASD) and obsessive-compulsive disorder (OCD), with up to 90% of young people diagnosed with ASD having this co-morbidity. Distinguishing between the symptoms of the two leads to issues with accurate treatment, yet this is paramount in benefiting the young person. There are two distinct methods of treatment, psychological or pharmacological, with clinicians tending to choose one or the other, potentially due to the lack of research available. This report reviews the efficacy of psychological and pharmacological treatments for young people diagnosed with ASD and co-morbid OCD. A literature review was performed on papers from the last fifteen years including ‘ASD’, ‘OCD’ and individuals under the age of 18. Eleven papers were selected as relevant. The report looks at the comparison between more traditional methods, such as selective-serotonin-reuptake-inhibitors (SSRI) and Cognitive behaviour therapy (CBT), and newer therapies, such as modified or intensive ASD focused psychotherapies, and the use of other medication classes. On reviewing the data, it was identified that there was a distinct lack of information on this important topic. The most widely used treatment was medication such as Fluoxetine, an SSRI, which rarely showed improvement in symptoms or outcomes. This is in contrast to modified forms of CBT which often reduces symptoms or even results in OCD remission. With increased research into non-traditional management of these co-morbid conditions, it is clear there is scope that modified CBT may become the future treatment of choice for OCD in young people with ASD.Keywords: autism spectrum disorder, intensive or adapted cognitive behavioural therapy, obsessive compulsive disorder, pharmacological management
Procedia PDF Downloads 91006 Customer Involvement in the Development of New Sustainable Products: A Review of the Literature
Authors: Natalia Moreira, Trevor Wood-Harper
Abstract:
The acceptance of sustainable products by the final consumer is still one of the challenges of the industry, which constantly seeks alternative approaches to successfully be accepted in the global market. A large set of methods and approaches have been discussed and analysed throughout the literature. Considering the current need for sustainable development and the current pace of consumption, the need for a combined solution towards the development of new products became clear, forcing researchers in product development to propose alternatives to the previous standard product development models. This paper presents, through a systemic analysis of the literature on product development, eco-design and consumer involvement, a set of alternatives regarding consumer involvement towards the development of sustainable products and how these approaches could help improve the sustainable industry’s establishment in the general market. The initial findings of the research show that the understanding of the benefits of sustainable behaviour lead to a more conscious acquisition and eventually to the implementation of sustainable change in the consumer. Thus this paper is the initial approach towards the development of new sustainable products using the fashion industry as an example of practical implementation and acceptance by the consumers. By comparing the existing literature and critically analysing it this paper concluded that the consumer involvement is strategic to improve the general understanding of sustainability and its features. The use of consumers and communities has been studied since the early 90s in order to exemplify uses and to guarantee a fast comprehension. The analysis done also includes the importance of this approach for the increase of innovation and ground breaking developments, thus requiring further research and practical implementation in order to better understand the implications and limitations of this methodology.Keywords: consumer involvement, products development, sustainability, eco-design
Procedia PDF Downloads 5941005 Big Data in Telecom Industry: Effective Predictive Techniques on Call Detail Records
Authors: Sara ElElimy, Samir Moustafa
Abstract:
Mobile network operators start to face many challenges in the digital era, especially with high demands from customers. Since mobile network operators are considered a source of big data, traditional techniques are not effective with new era of big data, Internet of things (IoT) and 5G; as a result, handling effectively different big datasets becomes a vital task for operators with the continuous growth of data and moving from long term evolution (LTE) to 5G. So, there is an urgent need for effective Big data analytics to predict future demands, traffic, and network performance to full fill the requirements of the fifth generation of mobile network technology. In this paper, we introduce data science techniques using machine learning and deep learning algorithms: the autoregressive integrated moving average (ARIMA), Bayesian-based curve fitting, and recurrent neural network (RNN) are employed for a data-driven application to mobile network operators. The main framework included in models are identification parameters of each model, estimation, prediction, and final data-driven application of this prediction from business and network performance applications. These models are applied to Telecom Italia Big Data challenge call detail records (CDRs) datasets. The performance of these models is found out using a specific well-known evaluation criteria shows that ARIMA (machine learning-based model) is more accurate as a predictive model in such a dataset than the RNN (deep learning model).Keywords: big data analytics, machine learning, CDRs, 5G
Procedia PDF Downloads 1391004 Effect of Fermentation Time on Some Functional Properties of Moringa (Moringa oleifera) Seed Flour
Authors: Ocheme B. Ocheme, Omobolanle O. Oloyede, S. James, Eleojo V. Akpa
Abstract:
The effect of fermentation time on some functional properties of Moringa (Moringa oleifera) seed flour was examined. Fermentation, an effective processing method used to improve nutritional quality of plant foods, tends to affect the characteristics of food components and their behaviour in food systems just like other processing methods. Hence the need for this study. Moringa seeds were fermented naturally by soaking in potable water and allowing it to stand for 12, 24, 48 and 72 hours. At the end of fermentation, the seeds were oven dried at 600C for 12 hours and then milled into flour. Flour obtained from unfermented seeds served as control: hence a total of five flour samples. The functional properties were analyzed using standard methods. Fermentation significantly (p<0.05) increased the water holding capacity of Moringa seed flour from 0.86g/g - 2.31g/g. The highest value was observed after 48 hours of fermentation The same trend was observed for oil absorption capacity with values between 0.87 and 1.91g/g. Flour from unfermented Moringa seeds had a bulk density of 0.60g/cm3 which was significantly (p<0.05) higher than the bulk densities of flours from seeds fermented for 12, 24 and 48. Fermentation significantly (p<0.05) decreased the dispersibility of Moringa seed flours from 36% to 21, 24, 29 and 20% after 12, 24, 48 and 72 hours of fermentation respectively. The flours’ emulsifying capacities increased significantly (p<0.05) with increasing fermentation time with values between 50 – 68%. The flour obtained from seeds fermented for 12 hours had a significantly (p<0.05) higher foaming capacity of 16% while the flour obtained from seeds fermented for 0, 24 and 72 hours had the least foaming capacities of 9%. Flours from seeds fermented for 12 and 48 hours had better functional properties than flours from seeds fermented for 24 and 72 hours.Keywords: fermentation, flour, functional properties, Moringa
Procedia PDF Downloads 6881003 Early-Stage Venture Investment Model: Evidence from Saudi Arabia
Authors: Tibah Alharbi, Renzo Cordina, David Power
Abstract:
Relatively few studies have explored how venture capitalist investors (VCs) make investment decisions and the information they rely on when taking an equity stake in an investee company. In addition, little is known about how much investors monitor start-ups after the decision to invest has been made. The VC scene in the US or European context is understood better than that of developing countries such as those in the Middle East. Although some differences among VC investors have been identified, the reasons behind such differences have not been fully explored – especially in a country such as Saudi Arabia. Therefore, this research seeks to understand the impact of external factors on the VC investor’ behaviour. The unique cultural and legal environments in the Kingdom of Saudi Arabia, the growing VC sector in the country, and the increasing importance attached to start-ups under the Saudi Government’s Vision 2030 program make such an investigation timely. Ascertaining the perceptions of VC investors in such a context will provide a deeper understanding of the determinants of VC investment in a novel setting. Using semi-structured interviews with over 20 participants, the research explores the structure of VC funds, the cycle of the VC investment in a start-up from the sourcing of deals, the screening and evaluation of such deals, the closing of such deals, and finally, the monitoring of such investments before the decision to exit such deals at the appropriate time. The results show some similarities to the VC model, which characterizes such investment in the US and Europe, but several differences emerge given the unique cultural and legal settings within the Kingdom. The results provide an in-depth understanding of the VC investors’ mindset relative to the existing studies in the literature.Keywords: exit, monitoring, start-ups, venture capital
Procedia PDF Downloads 1451002 Effects of E-Learning Mode of Instruction and Conventional Mode of Instruction on Student’s Achievement in English Language in Senior Secondary Schools, Ibadan Municipal, Nigeria
Authors: Ibode Osa Felix
Abstract:
The use of e-Learning is presently intensified in the academic world following the outbreak of the Covid-19 pandemic in early 2020. Hitherto, e-learning had made its debut in teaching and learning many years ago when it emerged as an aspect of Computer Based Teaching, but never before has its patronage become so important and popular as currently obtains. Previous studies revealed that there is an ongoing debate among researchers on the efficacy of the E-learning mode of instruction over the traditional teaching method. Therefore, the study examined the effect of E-learning and Conventional Mode of Instruction on Students Achievement in the English Language. The study is a quasi-experimental study in which 230 students, from three public secondary schools, were selected through a simple random sampling technique. Three instruments were developed, namely, E-learning Instructional Guide (ELIG), Conventional Method of Instructional Guide (CMIG), and English Language Achievement Test (ELAT). The result revealed that students taught through the conventional method had better results than students taught online. The result also shows that girls taught with the conventional method of teaching performed better than boys in the English Language. The study, therefore, recommended that effort should be made by the educational authorities in Nigeria to provide internet facilities to enhance practices among learners and provide electricity to power e-learning equipment in the secondary schools. This will boost e-learning practices among teachers and students and consequently overtake conventional method of teaching in due course.Keywords: e-learning, conventional method of teaching, achievement in english, electricity
Procedia PDF Downloads 1701001 Exploring Alignability Effects and the Role of Information Structure in Promoting Uptake of Energy Efficient Technologies
Authors: Rebecca Hafner, David Elmes, Daniel Read
Abstract:
The current research applies decision-making theory to the problem of increasing uptake of energy efficient technologies in the market place, where uptake is currently slower than one might predict following rational choice models. We apply the alignable/non-alignable features effect and explore the impact of varying information structure on the consumers’ preference for standard versus energy efficient technologies. In two studies we present participants with a choice between similar (boiler vs. boiler) vs. dissimilar (boiler vs. heat pump) technologies, described by a list of alignable and non-alignable attributes. In study One there is a preference for alignability when options are similar; an effect mediated by an increased tendency to infer missing information is the same. No effects of alignability on preference are found when options differ. One explanation for this split-shift in attentional focus is a change in construal levels potentially induced by the added consideration of environmental concern. Study two was designed to explore the interplay between alignability and construal level in greater detail. We manipulated construal level via a thought prime task prior to taking part in the same heating systems choice task, and find that there is a general preference for non-alignability, regardless of option type. We draw theoretical and applied implications for the type of information structure best suited for the promotion of energy efficient technologies.Keywords: alignability effects, decision making, energy-efficient technologies, sustainable behaviour change
Procedia PDF Downloads 3131000 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia
Authors: Shaya Alshahrani
Abstract:
Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection
Procedia PDF Downloads 148999 The Experience of Gay Men Using Dating Applications in Their Emerging Adulthood
Authors: Chuang Bing-Kai, Shih Hsiang-Ju
Abstract:
Previous studies showed that emergent adults used dating applications the most since it would satisfy their needs for intimacy. It's also found that those emergent adults were mostly non-heterosexual. What’s more, in this digital era, more and more bisexuals and homosexuals choose to establish connections with others through Internet to seek a sense of belonging. However, studies rarely focused on gay men in their emergent adulthood to explore their experiences of dating applications. The purpose of this study was to explore the experience of gay men using dating applications in their emerging adulthood and to understand their self-presentations and the process of it among different relationships while interacting with others upon using dating applications. The semi-structured interview was conducted with those gay men who aged from 18 to 29, felt attracted to people with same gender physically and mentally, considered themselves homosexual from their subjective understanding and had been using dating applications for more than half a year. Research invitations were distributed with the assistance of social media platforms and LGBTQ+ friends in the community. This study adopted a qualitative research approach and applied hermeneutic phenomenology as the method to analyze the transcripts transcribed from the recorded audio, and to explore their using experiences and self-presentations while interacting with others while using dating apps. It’s expected to find out that there are four stages in the self-presentation process including establishing personal identity, self-exploration and experimentation, exploring shared interest and values, developing and maintaining connections. Plus, gay men’s motives to use dating apps play an important role in this process and thus influence how they position the apps in their life. Through this study, professional workers can better understand gay men’s considerations and strategies in their self-presentation process as well as the impact of using motives.Keywords: dating applications, emerging adulthood, gay men, hermeneutic phenomenology
Procedia PDF Downloads 49998 Associated Map and Inter-Purchase Time Model for Multiple-Category Products
Authors: Ching-I Chen
Abstract:
The continued rise of e-commerce is the main driver of the rapid growth of global online purchase. Consumers can nearly buy everything they want at one occasion through online shopping. The purchase behavior models which focus on single product category are insufficient to describe online shopping behavior. Therefore, analysis of multi-category purchase gets more and more popular. For example, market basket analysis explores customers’ buying tendency of the association between product categories. The information derived from market basket analysis facilitates to make cross-selling strategies and product recommendation system. To detect the association between different product categories, we use the market basket analysis with the multidimensional scaling technique to build an associated map which describes how likely multiple product categories are bought at the same time. Besides, we also build an inter-purchase time model for associated products to describe how likely a product will be bought after its associated product is bought. We classify inter-purchase time behaviors of multi-category products into nine types, and use a mixture regression model to integrate those behaviors under our assumptions of purchase sequences. Our sample data is from comScore which provides a panelist-label database that captures detailed browsing and buying behavior of internet users across the United States. Finding the inter-purchase time from books to movie is shorter than the inter-purchase time from movies to books. According to the model analysis and empirical results, this research finally proposes the applications and recommendations in the management.Keywords: multiple-category purchase behavior, inter-purchase time, market basket analysis, e-commerce
Procedia PDF Downloads 368997 Influence of Counterface and Environmental Conditions on the Lubricity of Multilayer Graphene Coatings Produced on Nickel by Chemical Vapour Deposition
Authors: Iram Zahra
Abstract:
Friction and wear properties of multilayer graphene coatings (MLG) on nickel substrate were investigated at the macroscale, and different failure mechanisms working at the interface of nickel-graphene coatings were evaluated. Multilayer graphene coatings were produced on a nickel substrate using the atmospheric chemical vapour deposition (CVD) technique. Wear tests were performed on the pin-on-disk tribometer apparatus under dry air conditions, and using the saltwater solution, distilled water, and mineral oil lubricants and counterparts used in these wear tests were fabricated of stainless steel, chromium, and silicon nitride. The wear test parameters such as rotational speed, wear track diameter, temperature, relative humidity, and load were 60 rpm, 6 mm, 22˚C, 45%, and 2N, respectively. To analyse the friction and wear behaviour, coefficient of friction (COF) vs time curves were plotted, and the sliding surfaces of the samples and counterparts were examined using the optical microscope. Results indicated that graphene-coated nickel in mineral oil lubrication and dry conditions gave the minimum average value of COP (0.05) and wear track width ( ̴151 µm) against the three different types of counterparts. In contrast, uncoated nickel samples indicated a maximum wear track width ( ̴411 µm) and COF (0.5). Thorough investigation and analysis concluded that graphene-coated samples have two times lower COF and three times lower wear than the bare nickel samples. Furthermore, mechanical failures were significantly lower in the case of graphene-coated nickel. The overall findings suggested that multilayer graphene coatings have drastically decreased wear and friction on nickel substrate at the macroscale under various lubricating conditions and against different counterparts.Keywords: friction, lubricity, multilayer graphene, sliding, wear
Procedia PDF Downloads 140996 Challenges of Solid Waste Management: Insights into the Management and Disposal Behaviour in Bauchi Metropolis of Northeast Nigeria
Authors: Salisu Abdullahi Dalhat, Ibrahim Aliyu Adamu, Abubakar Magaji, Ridwan Adebola Adedigba
Abstract:
The paper examined the municipal solid waste disposal methods and the environmental issues associated with the management of solid waste in Bauchi Metropolis, Nigeria. Data were obtained through the administration of structured questionnaires, oral interviews, and field observations, as well as the desk review method. The research identifies how the city was composed of both biodegradable and non-biodegradable materials, which are mostly paper waste, polythene, and plastic materials. Most of the solid wastes are left unattended for a long period. Poor design of dump sites, ineffective management of urban development plans, and poor enforcement of environmental laws were observed to be the major causes of poor waste management, and in a few areas where large waste containers are provided, they are hardly used by the community. The major environmental issues resulting from improper disposal and poor management of solid waste in the Bauchi metropolis are a nuisance of the waste to the environment, emitting of methane gas which contributes to climate change, blockage of drainages during rainstorms causing flooding within the metropolis as well as the decomposition of such waste leading to contamination of groundwater thereby leading to the cholera outbreak. Relevant stakeholders should, without compromise, design enforceable short, workable bye-laws; local supervisors should be stationed at the designated dump sites across the city as well as public enlightenment/sensitization campaigns could be the way out.Keywords: biodegradable, contamination, cholera outbreak, solid waste, solid waste management, urban development
Procedia PDF Downloads 125995 Identification Algorithm of Critical Interface, Modelling Perils on Critical Infrastructure Subjects
Authors: Jiří. J. Urbánek, Hana Malachová, Josef Krahulec, Jitka Johanidisová
Abstract:
The paper deals with crisis situations investigation and modelling within the organizations of critical infrastructure. Every crisis situation has an origin in the emergency event occurrence in the organizations of energetic critical infrastructure especially. Here, the emergency events can be both the expected events, then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping or the unexpected event (Black Swan effect) – without pre-prepared scenario, but it needs operational coping of crisis situations as well. The forms, characteristics, behaviour and utilization of crisis scenarios have various qualities, depending on real critical infrastructure organization prevention and training processes. An aim is always better organizational security and continuity obtainment. This paper objective is to find and investigate critical/ crisis zones and functions in critical situations models of critical infrastructure organization. The DYVELOP (Dynamic Vector Logistics of Processes) method is able to identify problematic critical zones and functions, displaying critical interfaces among actors of crisis situations on the DYVELOP maps named Blazons. Firstly, for realization of this ability is necessary to derive and create identification algorithm of critical interfaces. The locations of critical interfaces are the flags of crisis situation in real organization of critical infrastructure. Conclusive, the model of critical interface will be displayed at real organization of Czech energetic crisis infrastructure subject in Black Out peril environment. The Blazons need live power Point presentation for better comprehension of this paper mission.Keywords: algorithm, crisis, DYVELOP, infrastructure
Procedia PDF Downloads 409994 Hash Based Block Matching for Digital Evidence Image Files from Forensic Software Tools
Abstract:
Internet use, intelligent communication tools, and social media have all become an integral part of our daily life as a result of rapid developments in information technology. However, this widespread use increases crimes committed in the digital environment. Therefore, digital forensics, dealing with various crimes committed in digital environment, has become an important research topic. It is in the research scope of digital forensics to investigate digital evidences such as computer, cell phone, hard disk, DVD, etc. and to report whether it contains any crime related elements. There are many software and hardware tools developed for use in the digital evidence acquisition process. Today, the most widely used digital evidence investigation tools are based on the principle of finding all the data taken place in digital evidence that is matched with specified criteria and presenting it to the investigator (e.g. text files, files starting with letter A, etc.). Then, digital forensics experts carry out data analysis to figure out whether these data are related to a potential crime. Examination of a 1 TB hard disk may take hours or even days, depending on the expertise and experience of the examiner. In addition, it depends on examiner’s experience, and may change overall result involving in different cases overlooked. In this study, a hash-based matching and digital evidence evaluation method is proposed, and it is aimed to automatically classify the evidence containing criminal elements, thereby shortening the time of the digital evidence examination process and preventing human errors.Keywords: block matching, digital evidence, hash list, evaluation of digital evidence
Procedia PDF Downloads 255993 Influence of Foundation Size on Seismic Response of Mid-rise Buildings Considering Soil-Structure-Interaction
Authors: Quoc Van Nguyen, Behzad Fatahi, Aslan S. Hokmabadi
Abstract:
Performance based seismic design is a modern approach to earthquake-resistant design shifting emphasis from “strength” to “performance”. Soil-Structure Interaction (SSI) can influence the performance level of structures significantly. In this paper, a fifteen storey moment resisting frame sitting on a shallow foundation (footing) with different sizes is simulated numerically using ABAQUS software. The developed three dimensional numerical simulation accounts for nonlinear behaviour of the soil medium by considering the variation of soil stiffness and damping as a function of developed shear strain in the soil elements during earthquake. Elastic-perfectly plastic model is adopted to simulate piles and structural elements. Quiet boundary conditions are assigned to the numerical model and appropriate interface elements, capable of modelling sliding and separation between the foundation and soil elements, are considered. Numerical results in terms of base shear, lateral deformations, and inter-storey drifts of the structure are compared for the cases of soil-structure interaction system with different foundation sizes as well as fixed base condition (excluding SSI). It can be concluded that conventional design procedures excluding SSI may result in aggressive design. Moreover, the size of the foundation can influence the dynamic characteristics and seismic response of the building due to SSI and should therefore be given careful consideration in order to ensure a safe and cost effective seismic design.Keywords: soil-structure-interaction, seismic response, shallow foundation, abaqus, rayleigh damping
Procedia PDF Downloads 506992 The Impact of Online Advertising on Generation Y’s Purchase Decision in Malaysia
Authors: Mui Joo Tang, Eang Teng Chan
Abstract:
Advertising is commonly used to foster sales and reputation of an institution. It is at first the growth of print advertising that has increased the population and number of periodicals of newspaper and its circulation. The rise of Internet and online media has somehow blurred the role of media and advertising though the intention is still to reach out to audience and to increase sales. The relationship between advertising and audience on a product purchase through persuasion has been developing from print media to online media. From the changing media environment and audience, it is the concern of this research to study the impact of online advertising to such a relationship cycle. The content of online advertisements is much of text, multimedia, photo, audio and video. The messages of such content format may indeed bring impacts to its audience and its credibility. This study is therefore reflecting the effectiveness of online advertisement and its influences on generation Y in their purchasing behavior. This study uses Media Dependency Theory to analyze the relationship between the impact of online advertisement and media usage pattern of generation Y. Hierarchy of Effectiveness Model is used as a marketing communication model to study the effectiveness of advertising and further to determine the impact of online advertisement on generation Y in their purchasing decision making. This research uses online survey to reach out the sample of generation Y. The results have shown that online advertisements do not affect much on purchase decision making even though generation Y relies much on the media content including online advertisement for its information and believing in its credibility. There are few other external factors that may interrupt the effectiveness of online advertising. The very obvious influence of purchasing behavior is actually derived from the peers.Keywords: generation Y, purchase decision, print media, online advertising, persuasion
Procedia PDF Downloads 527991 Exploration of Correlation between Design Principles and Elements with the Visual Aesthetic in Residential Interiors
Authors: Ikra Khan, Reenu Singh
Abstract:
Composition is essential when designing the interiors of residential spaces. The ability to adopt a unique style of using design principles and design elements is another. This research report explores how the visual aesthetic within a space is achieved through the use of design principles and design elements while maintaining a signature style. It also observes the relationship between design styles and compositions that are achieved as a result of the implementation of the principles. Information collected from books and the internet helped to understand how a composition can be achieved in residential interiors by resorting to design principles and design elements as tools for achieving an aesthetic composition. It also helped determine the results of authentic representation of design ideas and how they make one’s work exceptional. A questionnaire survey was also conducted to understand the impact of a visually aesthetic residential interior of a signature style on the lifestyle of individuals residing in them. The findings denote a pattern in the application of design principles and design elements. Individual principles and elements or a combination of the same are used to achieve an aesthetically pleasing composition. This was supported by creating CAD illustrations of two different residential projects with varying approaches and design styles. These illustrations include mood boards, 3D models, and sectional elevations as rendered views to understand the concept design and its translation via these mediums. A direct relation is observed between the application of design principles and design elements to achieve visually aesthetic residential interiors that suit an individual’s taste. These practices can be applied when designing bespoke commercial as well as industrial interiors that are suited to specific aesthetic and functional needs.Keywords: composition, design principles, elements, interiors, residential spaces
Procedia PDF Downloads 103990 Gulfnet: The Advent of Computer Networking in Saudi Arabia and Its Social Impact
Authors: Abdullah Almowanes
Abstract:
The speed of adoption of new information and communication technologies is often seen as an indicator of the growth of knowledge- and technological innovation-based regional economies. Indeed, technological progress and scientific inquiry in any society have undergone a particularly profound transformation with the introduction of computer networks. In the spring of 1981, the Bitnet network was launched to link thousands of nodes all over the world. In 1985 and as one of the first adopters of Bitnet, Saudi Arabia launched a Bitnet-based network named Gulfnet that linked computer centers, universities, and libraries of Saudi Arabia and other Gulf countries through high speed communication lines. In this paper, the origins and the deployment of Gulfnet are discussed as well as social, economical, political, and cultural ramifications of the new information reality created by the network. Despite its significance, the social and cultural aspects of Gulfnet have not been investigated in history of science and technology literature to a satisfactory degree before. The presented research is based on an extensive archival research aimed at seeking out and analyzing of primary evidence from archival sources and records. During its decade and a half-long existence, Gulfnet demonstrated that the scope and functionality of public computer networks in Saudi Arabia have to be fine-tuned for compliance with Islamic culture and political system of the country. It also helped lay the groundwork for the subsequent introduction of the Internet. Since 1980s, in just few decades, the proliferation of computer networks has transformed communications world-wide.Keywords: Bitnet, computer networks, computing and culture, Gulfnet, Saudi Arabia
Procedia PDF Downloads 245989 Algerian EFL Students' Perceptions towards the Development of Writing through Weblog Storytelling
Authors: Nawel Mansouri
Abstract:
Weblog as a form of internet-based resources has become popular as an authentic and constructive learning tool, especially in the language classroom. This research explores the use of weblog storytelling as a pedagogical tool to develop Algerian EFL students’ creative writing. This study aims to investigate the effectiveness of weblog- writing and the attitudes of both Algerian EFL students and teachers towards weblog storytelling. It also seeks to explore the potential benefits and problems that may affect the use of weblog and investigate the possible solutions to overcome the problems encountered. The research work relies on a mixed-method approach which combines both qualitative and quantitative methods. A questionnaire will be applied to both EFL teachers and students as a means to obtain preliminary data. Interviews will be integrated in accordance with the primary data that will be gathered from the questionnaire with the aim of validating its accuracy or as a strategy to follow up any unexpected results. An intervention will take place on the integration of weblog- writing among 15 Algerian EFL students for a period of two months where students are required to write five narrative essays about their personal experiences, give feedback through the use of a rubric to two or three of their peers, and edit their work based on the feedback. After completion, questionnaires and interviews will also take place as a medium to obtain both the students’ perspectives towards the use of weblog as an innovative teaching approach. This study is interesting because weblog storytelling has recently been emerged as a new form of digital communication and it is a new concept within Algerian context. Furthermore, the students will not just develop their writing skill through weblog storytelling but it can also serve as a tool to develop students’ critical thinking, creativity, and autonomy.Keywords: Weblog writing, EFL writing, EFL learners' attitudes, EFL teachers' views
Procedia PDF Downloads 174988 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories
Authors: Hatice Idil Gorgen
Abstract:
This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.Keywords: discourse, post colonialism, post modernism, objectivity
Procedia PDF Downloads 160987 A Modular and Reusable Bond Graph Model of Epithelial Transport in the Proximal Convoluted Tubule
Authors: Leyla Noroozbabaee, David Nickerson
Abstract:
We introduce a modular, consistent, reusable bond graph model of the renal nephron’s proximal convoluted tubule (PCT), which can reproduce biological behaviour. In this work, we focus on ion and volume transport in the proximal convoluted tubule of the renal nephron. Modelling complex systems requires complex modelling problems to be broken down into manageable pieces. This can be enabled by developing models of subsystems that are subsequently coupled hierarchically. Because they are based on a graph structure. In the current work, we define two modular subsystems: the resistive module representing the membrane and the capacitive module representing solution compartments. Each module is analyzed based on thermodynamic processes, and all the subsystems are reintegrated into circuit theory in network thermodynamics. The epithelial transport system we introduce in the current study consists of five transport membranes and four solution compartments. Coupled dissipations in the system occur in the membrane subsystems and coupled free-energy increasing, or decreasing processes appear in solution compartment subsystems. These structural subsystems also consist of elementary thermodynamic processes: dissipations, free-energy change, and power conversions. We provide free and open access to the Python implementation to ensure our model is accessible, enabling the reader to explore the model through setting their simulations and reproducibility tests.Keywords: Bond Graph, Epithelial Transport, Water Transport, Mathematical Modeling
Procedia PDF Downloads 87986 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University
Authors: Wipada Chaiwchan
Abstract:
This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).Keywords: social network, behaviors, social media, computer information systems
Procedia PDF Downloads 394985 The Patterns and Levels of Physical Activity and Sedentary Behavior of Primary School Learners in Eastern Cape Province, South Africa
Authors: Howard Gomwe, Eunice Seekoe, Philemon Lyoka, Chioneso Show Marange, Dennyford Mafa
Abstract:
Background: This study was designed to assess PA levels and sedentary behavior among primary school learners in the Eastern Cape province of South Africa. Methods: A cross-sectional study was adopted to assess the patterns and levels of PA and sedentary behavior using the Physical Activity Questionnaire for Older Children (PAQ-C). Results: Using complete case analysis, 870 randomly selected participants (boys = 351 and girls = 519) aged 9 to 14 years were retained. The sample comprised of primary school learners, both boys and girls; aged 9-14 years old, who were randomly selected from rural, urban and peri-urban areas in the Eastern Cape Province of South Africa. Overly, the sample had a mean PAQ-C score of 2.33 ± 0.43. The mean of PA in boys was significantly higher (p = 0.003) in comparison with the girls. The 13 to 14 age group had a significantly higher PA level (p = 0.014). Learners from urban areas (n = 136; 77.3%) engaged more in sedentary behaviour as compared to those from rural areas (n = 252; 54.9%). Conclusion: The findings demonstrated low levels of PA and high engagement of sedentary behavior, which have negative implications on the health, growth and development of children. The study, therefore, recommends relevant stakeholders to implement interventions aimed to promote the increase in PA and reduction in sedentary behaviors for primary school learners in the Eastern Cape province in South Africa.Keywords: learners, physical activity, sedentary behavior, south Africa
Procedia PDF Downloads 222984 The Role of Phase Morphology on the Corrosion Fatigue Mechanism in Marine Steel
Authors: Victor Igwemezie, Ali Mehmanparast
Abstract:
The correct knowledge of corrosion fatigue mechanism in marine steel is very important. This is because it enables the design, selection, and use of steels for offshore applications. It also supports realistic corrosion fatigue life prediction of marine structures. A study has been conducted to increase the understanding of corrosion fatigue mechanism in marine steels. The materials investigated are normalized and advanced S355 Thermomechanical control process (TMCP) steels commonly used in the design of offshore wind turbine support structures. The experimental study was carried out by conducting corrosion fatigue tests under conditions pertinent to offshore wind turbine operations, using the state of the art facilities. A careful microstructural study of the crack growth path was conducted using metallurgical optical microscope (OM), scanning electron microscope (SEM) and Energy Dispersive X-Ray Spectroscopy (EDX). The test was conducted on three subgrades of S355 steel: S355J2+N, S355G8+M and S355G10+M and the data compared with similar studies in the literature. The result shows that the ferrite-pearlite morphology primarily controls the corrosion-fatigue crack growth path in marine steels. A corrosion fatigue mechanism which relies on the hydrogen embrittlement of the grain boundaries and pearlite phase is used to explain the crack propagation behaviour. The crack growth trend in the Paris region of the da/dN vs. ΔK curve is used to explain the dependency of the corrosion-fatigue crack growth rate on the ferrite-pearlite morphology.Keywords: corrosion-fatigue mechanism, fatigue crack growth rate, ferritic-pearlitic steel, microstructure, phase morphology
Procedia PDF Downloads 160983 Depletion Behavior of Potassium by Continuous Cropping Using Rice as a Test Crop
Authors: Rafeza Begum, Mohammad Mokhlesur Rahman, Safikul Moula, Rafiqul Islam
Abstract:
Potassium (K) is crucial for healthy soil and plant growth. However, K fertilization is either disregarded or poorly underutilized in Bangladesh agriculture, despite the great demand for crops. This could eventually result in a significant depletion of the soil's potassium reserves, irreversible alteration of the minerals that contain potassium, and detrimental effects on crop productivity. Soil K mining in Bangladesh is a worrying problem, and we need to evaluate it thoroughly and find remedies. A pot culture experiment was conducted in the greenhouse of Bangladesh Institute of Nuclear Agriculture (BINA) using eleven soil series of Bangladesh in order to see the depletion behaviour of potassium (K) by continuous cropping using rice (var. Iratom-24) as the test crop. The soil series were Ranishankhail, Kaonia. Sonatala, Silmondi, Gopalpur, Ishurdi, Sara, Kongsha, Nunni, Lauta and Amnura on which four successive rice plants (45 days duration) were raised with (100 ppm K) or without addition of potassium. Nitrogen, phosphorus, sulfur and zinc were applied as basal to all pots. Potassium application resulted in higher dry matter yield, increased K concentration and uptake in all the soils compared with no K treatment; which gradually decreased in the subsequent harvests. Furthermore, plant takes up K not only from exchangeable pool but also from non-exchangeable sites and a minimum replenishment of K from the soil reserve was observed. Continuous cropping has resulted in the depletion of available K of the soil. The result indicated that in order to sustain higher crop yield under intensive cultivation, the addition of potash fertilizer is necessary.Keywords: potassium, exchangeable pool, depletion behavior., Soil series
Procedia PDF Downloads 126982 SIP Flooding Attacks Detection and Prevention Using Shannon, Renyi and Tsallis Entropy
Authors: Neda Seyyedi, Reza Berangi
Abstract:
Voice over IP (VOIP) network, also known as Internet telephony, is growing increasingly having occupied a large part of the communications market. With the growth of each technology, the related security issues become of particular importance. Taking advantage of this technology in different environments with numerous features put at our disposal, there arises an increasing need to address the security threats. Being IP-based and playing a signaling role in VOIP networks, Session Initiation Protocol (SIP) lets the invaders use weaknesses of the protocol to disable VOIP service. One of the most important threats is denial of service attack, a branch of which in this article we have discussed as flooding attacks. These attacks make server resources wasted and deprive it from delivering service to authorized users. Distributed denial of service attacks and attacks with a low rate can mislead many attack detection mechanisms. In this paper, we introduce a mechanism which not only detects distributed denial of service attacks and low rate attacks, but can also identify the attackers accurately. We detect and prevent flooding attacks in SIP protocol using Shannon (FDP-S), Renyi (FDP-R) and Tsallis (FDP-T) entropy. We conducted an experiment to compare the percentage of detection and rate of false alarm messages using any of the Shannon, Renyi and Tsallis entropy as a measure of disorder. Implementation results show that, according to the parametric nature of the Renyi and Tsallis entropy, by changing the parameters, different detection percentages and false alarm rates will be gained with the possibility to adjust the sensitivity of the detection mechanism.Keywords: VOIP networks, flooding attacks, entropy, computer networks
Procedia PDF Downloads 405981 The Research of Students Internet in Choosing the Technical and Professional Course in Izeh: Educational Year 2001-2002
Authors: Seyyed Kavous Abbasi
Abstract:
Technical and professional branch is a subcategory of high school educational system. It deals with the programs which have been designed for the promotion of applied science and necessary skill and growth of potential talents in students. The purpose of performance of this branch is preparing of preponderance of in police in different section of industries and service. The aim of this research is the survey of group relation family, economic, educational and individual factors and the student's tendency toward technical professional courses. The method of the study is descriptive survey. 195 subjects were chosen randomly from all the male and female students of technical and professional school in Izeh. Instrument for this research was research-made questionnaire consisting of 22 questions on the base of likers spectrum. The reliability of this questionnaire has been estimated 0.8. Analyses of research data has been performed in two levels of descriptive and inferential statistics. Analyses of data has shown that the family factors with average of 3.12, individual factors 3.95, economic factors 3.92 and educational factors 3.57 more than middle level have more effects , in comparison with the factor of group relation with average of 2.79 less than average level in tendency the technical and professional course . Comparison of effective factors in tendency to technical and professional course has shown that individual factors had the most effects and the group relation factors had the least effects. Comparison between male and female subject's ideas showed that there is a different between their ideas about economics and family factors.Keywords: high school, relation family, individual factors, analysis interest
Procedia PDF Downloads 245