Search results for: interest flooding attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4766

Search results for: interest flooding attack

4526 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345
4525 Increasing Recoverable Oil in Northern Afghanistan Kashkari Oil Field by Low-Salinity Water Flooding

Authors: Zabihullah Mahdi, Khwaja Naweed Seddiqi

Abstract:

Afghanistan is located in a tectonically complex and dynamic area, surrounded by rocks that originated on the mother continent of Gondwanaland. The northern Afghanistan basin, which runs along the country's northern border, has the potential for petroleum generation and accumulation. The Amu Darya basin has the largest petroleum potential in the region. Sedimentation occurred in the Amu Darya basin from the Jurassic to the Eocene epochs. Kashkari oil field is located in northern Afghanistan's Amu Darya basin. The field structure consists of a narrow northeast-southwest (NE-SW) anticline with two structural highs, the northwest limb being mild and the southeast limb being steep. The first oil production well in the Kashkari oil field was drilled in 1976, and a total of ten wells were drilled in the area between 1976 and 1979. The amount of original oil in place (OOIP) in the Kashkari oil field, based on the results of surveys and calculations conducted by research institutions, is estimated to be around 140 MMbbls. The objective of this study is to increase recoverable oil reserves in the Kashkari oil field through the implementation of low-salinity water flooding (LSWF) enhanced oil recovery (EOR) technique. The LSWF involved conducting a core flooding laboratory test consisting of four sequential steps with varying salinities. The test commenced with the use of formation water (FW) as the initial salinity, which was subsequently reduced to a salinity level of 0.1%. Afterward, the numerical simulation model of core scale oil recovery by LSWF was designed by Computer Modelling Group’s General Equation Modeler (CMG-GEM) software to evaluate the applicability of the technology to the field scale. Next, the Kahskari oil field simulation model was designed, and the LSWF method was applied to it. To obtain reasonable results, laboratory settings (temperature, pressure, rock, and oil characteristics) are designed as far as possible based on the condition of the Kashkari oil field, and several injection and production patterns are investigated. The relative permeability of oil and water in this study was obtained using Corey’s equation. In the Kashkari oilfield simulation model, three models: 1. Base model (with no water injection), 2. FW injection model, and 3. The LSW injection model was considered for the evaluation of the LSWF effect on oil recovery. Based on the results of the LSWF laboratory experiment and computer simulation analysis, the oil recovery increased rapidly after the FW was injected into the core. Subsequently, by injecting 1% salinity water, a gradual increase of 4% oil can be observed. About 6.4% of the field is produced by the application of the LSWF technique. The results of LSWF (salinity 0.1%) on the Kashkari oil field suggest that this technology can be a successful method for developing Kashkari oil production.

Keywords: low-salinity water flooding, immiscible displacement, Kashkari oil field, two-phase flow, numerical reservoir simulation model

Procedia PDF Downloads 39
4524 Making a Resilient Livable City: Explorations of Smart Management Mechanism for Aging Society’s Disaster Prevention

Authors: Wei-Kuang Liu, Ya-Hsu Chiang

Abstract:

In the coming of an aging society, the issues of living quality, health care, and social security for the elderly have been gradually taken seriously. In order to maintain favorable living condition, urban societies are also facing the challenge of disasters caused by extreme climate change. However, in the practice of disaster prevention, elderly people are always weak due to their physiological conditions. That is to say, in the planning of resilient urbanism, the aging society is relatively in need of more care. Thus, this research aims to map areas where have high-density elderly population and fragile environmental condition in Taiwan, and to understand the actual situation of disaster prevention management in these areas, so as to provide suggestions for the development of intellectual resilient urban management. The research takes the cities of Taoyuan and Taichung as examples for explorations. According to GIS mapping of areas with high aging index, high-density population and high flooding potential, the communities of Sihai and Fuyuan in Taoyuan and the communities of Taichang and Nanshih in Taichung are highlighted. In these communities, it can be found that there are more elderly population and less labor population with high-density living condition. In addition, they are located in the areas where they have experienced severe flooding in the recent past. Based on a series of interviews with community organizations, there is only one community out of the four using flood information mobile app and Line messages for the management of disaster prevention, and the others still rely on the traditional approaches that manage the works of disaster prevention by their community security patrol teams and community volunteers. The interview outcome shows that most elderly people are not interested in learning the use of intellectual devices. Therefore, this research suggests to keep doing the GIS mapping of areas with high aging index, high-density population and high flooding potential for grasping the high-risk communities and to help develop smart monitor and forecast systems for disaster prevention practice in these areas. Based on case-study explorations, the research also advises that it is important to develop easy-to-use bottom-up and two-way immediate communication mechanism for the management of aging society’s disaster prevention.

Keywords: aging society, disaster prevention, GIS, resilient, Taiwan

Procedia PDF Downloads 117
4523 The Effect of Static Balance Enhance by Table Tennis Training Intervening on Deaf Children

Authors: Yi-Chun Chang, Ching-Ting Hsu, Wei-Hua Ho, Yueh-Tung Kuo

Abstract:

Children with hearing impairment have deficits of balance and motors. Although most of parents teach deaf children communication skills in early life, but rarely teach the deficits of balance. The purpose of this study was to investigate whether static balance improved after table tennis training. Table tennis training was provided four times a week for eight weeks to two 12-year-old deaf children. The table tennis training included crossover footwork, sideway attack, backhand block-sideways-flutter forehand attack, and one-on-one tight training. Data were gathered weekly and statistical comparisons were made with a paired t-test. We observed that the dominant leg is better than the non-dominant leg in static balance and girl balance ability is better than boy. The final result shows that table tennis training significantly improves the deaf children’s static balance performance. It indicates that table tennis training on deaf children helps the static balance ability.

Keywords: deaf children, static balance, table tennis, vestibular structure

Procedia PDF Downloads 433
4522 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset

Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor

Abstract:

The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.

Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques

Procedia PDF Downloads 11
4521 Flood Hazard and Risk Mapping to Assess Ice-Jam Flood Mitigation Measures

Authors: Karl-Erich Lindenschmidt, Apurba Das, Joel Trudell, Keanne Russell

Abstract:

In this presentation, we explore options for mitigating ice-jam flooding along the Athabasca River in western Canada. Not only flood hazard, expressed in this case as the probability of flood depths and extents being exceeded, but also flood risk, in which annual expected damages are calculated. Flood risk is calculated, which allows a cost-benefit analysis to be made so that decisions on the best mitigation options are not based solely on flood hazard but also on the costs related to flood damages and the benefits of mitigation. The river ice model is used to simulate extreme ice-jam flood events with which scenarios are run to determine flood exposure and damages in flood-prone areas along the river. We will concentrate on three mitigation options – the placement of a dike, artificial breakage of the ice cover along the river, the installation of an ice-control structure, and the construction of a reservoir. However, any mitigation option is not totally failsafe. For example, dikes can still be overtopped and breached, and ice jams may still occur in areas of the river where ice covers have been artificially broken up. Hence, for all options, it is recommended that zoning of building developments away from greater flood hazard areas be upheld. Flood mitigation can have a negative effect of giving inhabitants a false sense of security that flooding may not happen again, leading to zoning policies being relaxed. (Text adapted from Lindenschmidt [2022] "Ice Destabilization Study - Phase 2", submitted to the Regional Municipality of Wood Buffalo, Alberta, Canada)

Keywords: ice jam, flood hazard, flood risk river ice modelling, flood risk

Procedia PDF Downloads 185
4520 Unsteady 3D Post-Stall Aerodynamics Accounting for Effective Loss in Camber Due to Flow Separation

Authors: Aritras Roy, Rinku Mukherjee

Abstract:

The current study couples a quasi-steady Vortex Lattice Method and a camber correcting technique, ‘Decambering’ for unsteady post-stall flow prediction. The wake is force-free and discrete such that the wake lattices move with the free-stream once shed from the wing. It is observed that the time-averaged unsteady coefficient of lift sees a relative drop at post-stall angles of attack in comparison to its steady counterpart for some angles of attack. Multiple solutions occur at post-stall and three different algorithms to choose solutions in these regimes show both unsteadiness and non-convergence of the iterations. The distribution of coefficient of lift on the wing span also shows sawtooth. Distribution of vorticity changes both along span and in the direction of the free-stream as the wake develops over time with distinct roll-up, which increases with time.

Keywords: post-stall, unsteady, wing, aerodynamics

Procedia PDF Downloads 370
4519 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme

Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh

Abstract:

This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.

Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature

Procedia PDF Downloads 501
4518 The Influence of the Company's Financial Performance and Macroeconomic Factors to Stock Return

Authors: Angrita Denziana, Haninun, Hepiana Patmarina, Ferdinan Fatah

Abstract:

The aims of the study are to determine the effect of the company's financial performance with Return on Asset (ROA) and Return on Equity (ROE) indicators. The macroeconomic factors with the indicators of Indonesia interest rate (SBI) and exchange rate on stock returns of non-financial companies listed in IDX. The results of this study indicate that the variable of ROA has negative effect on stock returns, ROE has a positive effect on stock returns, and the variable interest rate and exchange rate of SBI has positive effect on stock returns. From the analysis data by using regression model, independent variables ROA, ROE, SBI interest rate and the exchange rate very significant (p value < 0.01). Thus, all the above variable can be used as the basis for investment decision making for investment in Indonesia Stock Exchange (IDX) mainly for shares in the non- financial companies.

Keywords: ROA, ROE, interest rate, exchange rate, stock return

Procedia PDF Downloads 429
4517 A Design of an Augmented Reality Based Virtual Heritage Application

Authors: Stephen Barnes, Ian Mills, Frances Cleary

Abstract:

Augmented and virtual reality-based applications offer many benefits for the heritage and tourism sector. This technology provides a platform to showcase the regions of interest to people without the need for them to be physically present, which has had a positive impact on enticing tourists to visit those locations. However, the technology also provides the opportunity to present historical artefacts in a form that accurately represents their original, intended appearance. Three sites of interest were identified in the Lingaun Valley in South East Ireland, wherein virtual representations of site-specific artefacts of interest were created via a multidisciplinary team encompassing archaeology, art history, 3D modelling, design, and software development. The collated information has been presented to users via an augmented reality mobile-based application that provides information in an engaging manner that encourages an interest in history as well as visits to the sites in the Lingaun Valley.

Keywords: augmented reality, virtual heritage, 3D modelling, archaeology, virtual representation

Procedia PDF Downloads 81
4516 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete

Authors: Gashaw Abebaw

Abstract:

Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.

Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan

Procedia PDF Downloads 119
4515 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 63
4514 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel

Authors: Afif J. Arabi

Abstract:

On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.

Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory

Procedia PDF Downloads 44
4513 Impact of Mathematical Modeling on Mathematics Achievement, Attitude, and Interest of Pre-Service Teachers in Niger State, Nigeria

Authors: Mohammed Abubakar Ndanusa, A. A. Hassan, R. W. Gimba, A. M. Alfa, M. T. Abari

Abstract:

This study investigated the Impact of Mathematical Modeling on Mathematics Achievement, Attitude and Interest of Pre-Service Teachers in Niger States, Nigeria. It was an attempt to ease students’ difficulties in comprehending mathematics. The study used randomized pretest, posttest control group design. Two Colleges of Education were purposively selected from Niger State with a sample size of eighty-four 84 students. Three research instruments used are Mathematical Modeling Achievement Test (MMAT), Attitudes Towards Mathematical Modeling Questionnaire (ATMMQ) and Mathematical Modeling Students Interest Questionnaire (MMSIQ). Pearson Product Moment Correlation (PPMC) formula was used for MMAT and Alpha Cronbach was used for ATMMQ and MMSIQ to determine their reliability coefficient and the values the following values were obtained respectively 0.76, 0.75 and 0.73. Independent t-test statistics was used to test hypothesis One while Mann Whitney U-test was used to test hypothesis Two and Three. Findings revealed that students taught Mathematics using Mathematical Modeling performed better than their counterparts taught using lecture method. However, there was a significant difference in the attitude and interest of pre-service mathematics teachers after being exposed to mathematical modeling. The strategy, therefore, was recommended to be used by Mathematics teachers with a view to improving students’ attitude and interest towards Mathematics. Also, modeling should be taught at NCE level in order to prepare pre-service teachers towards real task in the field of Mathematics.

Keywords: achievement, attitude, interest, mathematical modeling, pre-service teachers

Procedia PDF Downloads 304
4512 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 254
4511 Estimation of the Effectiveness of Tasik Kemajuan and Tasik Inovasi as Flood Detention Pond at UTHM Campus

Authors: Noor Aliza Binti Ahmad, Azra Munirah Mat Daud, Sabariah Musa, Mohamad Azhar MK

Abstract:

Flooding is a common natural disaster in Malaysia triggered by heavy rainfall. Urbanization that increases the construction of paved areas, subsequently raise surface runoff and reduce time of concentration. It increases flood magnitude and so that leads to greater flood problems as what has happened at Universiti Tun Hussein Onn Malaysia (UTHM) area in December 2006 and earlier 2007. Tasik Kemajuan and Tasik Inovasi were constructed as recreation ponds and have also functioned as flood ponds. Unfortunately, the flood problem still occurs persistently. Thus, the effectiveness of Tasik Kemajuan and Tasik Inovasi in reducing the flood problems need to be investigated and the causes of flood events at UTHM Campus need to be evaluated. The results from this study show that the conditions of Tasik Kemajuan and Tasik Inovasi are effective in reducing the flood water levels. It also can be concluded that increasing water level in both lakes in UTHM Campus are significantly influenced by presence of the grass and rubbish. During dry condition, the flow rates with three different days are 59.38m3/s, 60.71m3/s and 59.08m3/s and while for wet condition in two different days are 89.59 m3/s and 86.61m3/s. In conclusion, this system should be improved to prevent future flooding either widened or reduced drainage floor, and also perform maintenance on the plants that live around the lake.

Keywords: drainage system, flood detention, lakes, storm water

Procedia PDF Downloads 323
4510 Identification of Vulnerable Zone Due to Cyclone-Induced Storm Surge in the Exposed Coast of Bangladesh

Authors: Mohiuddin Sakib, Fatin Nihal, Rabeya Akter, Anisul Haque, Munsur Rahman, Wasif-E-Elahi

Abstract:

Surge generating cyclones are one of the deadliest natural disasters that threaten the life of coastal environment and communities worldwide. Due to the geographic location, ‘low lying alluvial plain, geomorphologic characteristics and 710 kilometers exposed coastline, Bangladesh is considered as one of the greatest vulnerable country for storm surge flooding. Bay of Bengal is possessing the highest potential of creating storm surge inundation to the coastal areas. Bangladesh is the most exposed country to tropical cyclone with an average of four cyclone striking every years. Frequent cyclone landfall made the country one of the worst sufferer within the world for cyclone induced storm surge flooding and casualties. During the years from 1797 to 2009 Bangladesh has been hit by 63 severe cyclones with strengths of different magnitudes. Though detailed studies were done focusing on the specific cyclone like Sidr or Aila, no study was conducted where vulnerable areas of exposed coast were identified based on the strength of cyclones. This study classifies the vulnerable areas of the exposed coast based on storm surge inundation depth and area due to cyclones of varying strengths. Classification of the exposed coast based on hazard induced cyclonic vulnerability will help the decision makers to take appropriate policies for reducing damage and loss.

Keywords: cyclone, landfall, storm surge, exposed coastline, vulnerability

Procedia PDF Downloads 399
4509 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 250
4508 Performance Investigation of UAV Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion

Authors: Ebrahim Hassan Kapeel, Ahmed Mohsen Kamel, Hossan Hendy, Yehia Z. Elhalwagy

Abstract:

Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control lawisdesigned for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.

Keywords: UAV dynamic model, attitude control, nonlinear PID, dynamic inversion

Procedia PDF Downloads 110
4507 Variability of Climatic Elements in Nigeria Over Recent 100 Years

Authors: T. Salami, O. S. Idowu, N. J. Bello

Abstract:

Climatic variability is an essential issue when dealing with the issue of climate change. Variability of some climate parameter helps to determine how variable the climatic condition of a region will behave. The most important of these climatic variables which help to determine the climatic condition in an area are both the Temperature and Precipitation. This research deals with Longterm climatic variability in Nigeria. Variables examined in this analysis include near-surface temperature, near surface minimum temperature, maximum temperature, relative humidity, vapour pressure, precipitation, wet-day frequency and cloud cover using data ranging between 1901-2010. Analyses were carried out and the following methods were used: - Regression and EOF analysis. Results show that the annual average, minimum and maximum near-surface temperature all gradually increases from 1901 to 2010. And they are in the same case in a wet season and dry season. Minimum near-surface temperature, with its linear trends are significant for annual, wet season and dry season means. However, the diurnal temperature range decreases in the recent 100 years imply that the minimum near-surface temperature has increased more than the maximum. Both precipitation and wet day frequency decline from the analysis, demonstrating that Nigeria has become dryer than before by the way of rainfall. Temperature and precipitation variability has become very high during these periods especially in the Northern areas. Areas which had excessive rainfall were confronted with flooding and other related issues while area that had less precipitation were all confronted with drought. More practical issues will be presented.

Keywords: climate, variability, flooding, excessive rainfall

Procedia PDF Downloads 384
4506 The Correlation of Economic Variables on Domestic Investment

Authors: Amirreza Attarzadeh

Abstract:

This paper aims to investigate the relationship between economic variables, e.g., inflation rate, interest rate, trade openness and the growth rate of GDP, with domestic investment. The present study also draws on conceptual economy related theories to verify the negative effect of interest rates on domestic investment. However, trade openness and growth rate had a positive correlation, and the inflation rate may have a positive or negative impact on domestic investment.

Keywords: inflation rate, growth rate of GDP, interest rate and trade openness, domestic investment

Procedia PDF Downloads 407
4505 Is the Addition of Computed Tomography with Angiography Superior to a Non-Contrast Neuroimaging Only Strategy for Patients with Suspected Stroke or Transient Ischemic Attack Presenting to the Emergency Department?

Authors: Alisha M. Ebrahim, Bijoy K. Menon, Eddy Lang, Shelagh B. Coutts, Katie Lin

Abstract:

Introduction: Frontline emergency physicians require clear and evidence-based approaches to guide neuroimaging investigations for patients presenting with suspected acute stroke or transient ischemic attack (TIA). Various forms of computed tomography (CT) are currently available for initial investigation, including non-contrast CT (NCCT), CT angiography head and neck (CTA), and CT perfusion (CTP). However, there is uncertainty around optimal imaging choice for cost-effectiveness, particularly for minor or resolved neurological symptoms. In addition to the cost of CTA and CTP testing, there is also a concern for increased incidental findings, which may contribute to the burden of overdiagnosis. Methods: In this cross-sectional observational study, analysis was conducted on 586 anonymized triage and diagnostic imaging (DI) reports for neuroimaging orders completed on patients presenting to adult emergency departments (EDs) with a suspected stroke or TIA from January-December 2019. The primary outcome of interest is the diagnostic yield of NCCT+CTA compared to NCCT alone for patients presenting to urban academic EDs with Canadian Emergency Department Information System (CEDIS) complaints of “symptoms of stroke” (specifically acute stroke and TIA indications). DI reports were coded into 4 pre-specified categories (endorsed by a panel of stroke experts): no abnormalities, clinically significant findings (requiring immediate or follow-up clinical action), incidental findings (not meeting prespecified criteria for clinical significance), and both significant and incidental findings. Standard descriptive statistics were performed. A two-sided p-value <0.05 was considered significant. Results: 75% of patients received NCCT+CTA imaging, 21% received NCCT alone, and 4% received NCCT+CTA+CTP. The diagnostic yield of NCCT+CTA imaging for prespecified clinically significant findings was 24%, compared to only 9% in those who received NCCT alone. The proportion of incidental findings was 30% in the NCCT only group and 32% in the NCCT+CTA group. CTP did not significantly increase the yield of significant or incidental findings. Conclusion: In this cohort of patients presenting with suspected stroke or TIA, an NCCT+CTA neuroimaging strategy had a higher diagnostic yield for clinically significant findings than NCCT alone without significantly increasing the number of incidental findings identified.

Keywords: stroke, diagnostic yield, neuroimaging, emergency department, CT

Procedia PDF Downloads 100
4504 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 196
4503 Demonic Possession and Health Care Complications: Concept and Remedy from Islamic Point-of-View

Authors: Khalid Ishola Bello

Abstract:

Many religions and cultures believe in the existence of invisible beings who co-exist with man on earth. Muslims, for example, believe in malaikah (Angel) and jinn (demon), who have their source of creation from light and flame, respectively. Jinn, according to Islamic texts, possesses unique characteristics which give them an advantage over the man. Invisibility, transforming into or taking possession of another being are parts of advantages jinn have above man. Hence, jinn can attack man and truncate his well-being by causing malfunction of his physiological and psychological realms, which may go beyond physical health care. It is on this background that this paper aims to articulate the possibility of a demonic attack on human health and the care processes recommended by Islam to heal and restore well-being of the victim. Through analysis of the inductive, deductive, and historical approaches, the process of ruqyah (healing method based on recitation of the Qur’an) and hijamah (cupping) therapies shall be analyzed. The finding shows the efficacy of Islamic remedies to demonic possession, which usually complicates health challenges in the care of man. This alternative approach is therefore recommended for holistic health care since physical health care cannot fix spiritual health challenges.

Keywords: wellbeing, healthcare, demonic possession, cupping, jinn

Procedia PDF Downloads 64
4502 Small and Medium-Sized Enterprises, Flash Flooding and Organisational Resilience Capacity: Qualitative Findings on Implications of the Catastrophic 2017 Flash Flood Event in Mandra, Greece

Authors: Antonis Skouloudis, Georgios Deligiannakis, Panagiotis Vouros, Konstantinos Evangelinos, Loannis Nikolaou

Abstract:

On November 15th, 2017, a catastrophic flash flood devastated the city of Mandra in Central Greece, resulting in 24 fatalities and extensive damages to the built environment and infrastructure. It was Greece's deadliest and most destructive flood event for the past 40 years. In this paper, we examine the consequences of this event too small and medium-sized enterprises (SMEs) operating in Mandra during the flood event, which were affected by the floodwaters to varying extents. In this context, we conducted semi-structured interviews with business owners-managers of 45 SMEs located in flood inundated areas and are still active nowadays, based on an interview guide that spanned 27 topics. The topics pertained to the disaster experience of the business and business owners-managers, knowledge and attitudes towards climate change and extreme weather, aspects of disaster preparedness and related assistance needs. Our findings reveal that the vast majority of the affected businesses experienced heavy damages in equipment and infrastructure or total destruction, which resulted in business interruption from several weeks up to several months. Assistance from relatives or friends helped for the damage repairs and business recovery, while state compensations were deemed insufficient compared to the extent of the damages. Most interviewees pinpoint flooding as one of the most critical risks, and many connect it with the climate crisis. However, they are either not willing or unable to apply property-level prevention measures in their businesses due to cost considerations or complex and cumbersome bureaucratic processes. In all cases, the business owners are fully aware of the flood hazard implications, and since the recovery from the event, they have engaged in basic mitigation measures and contingency plans in case of future flood events. Such plans include insurance contracts whenever possible (as the vast majority of the affected SMEs were uninsured at the time of the 2017 event) as well as simple relocations of critical equipment within their property. The study offers fruitful insights on latent drivers and barriers of SMEs' resilience capacity to flash flooding. In this respect, findings such as ours, highlighting tensions that underpin behavioral responses and experiences, can feed into a) bottom-up approaches for devising actionable and practical guidelines, manuals and/or standards on business preparedness to flooding, and, ultimately, b) policy-making for an enabling environment towards a flood-resilient SME sector.

Keywords: flash flood, small and medium-sized enterprises, organizational resilience capacity, disaster preparedness, qualitative study

Procedia PDF Downloads 132
4501 The Importance and Role of Sukuk Marketing as an Islamic Bond in the Economy

Authors: Ilhan Keskin, Hasan Bulent Kantarci

Abstract:

In this study, one of the tools of Islamic financing known as “Sukuk” a non-interest bearing investment which has started to be implemented in Turkey and the world as a whole is discussed. In order to increase the vitality and efficiency of the economy, by taking lessons from the recent economic crisis new developments in the banking and investment sector are being expanded. The purpose of all investors is to obtain more revenue through the use of capital. The inability of traditional investment tools to meet the expectations of investors and the interest based financial system where one investor benefits at the expense of another there has been the need for a different, reliable and non-interest bearing financial market that is consistent with the Islamic rule. As a result an alternative and more reliable interest free financing tool “Sukuk” rental certificates covering people who are sensitive to Islamic rules, appeal to all segments, hidden remaining capital that contributes to the economy, reduce disparities in income distribution, common risk sharing system of profit and loss sharing has emerged. Today, for the structural countries by examining the state of the world market economy the applicability, enactment and future issues associated with this attractive kind of Islamic finance namely the “Sukuk” market has been explained.

Keywords: Islamic finance, islamic markets, non-interest bearing, rental certificates

Procedia PDF Downloads 524
4500 Investigating the Socio-ecological Impacts of Sea Level Rise on Coastal Rural Communities in Ghana

Authors: Benjamin Ankomah-Asare, Richard Adade

Abstract:

Sea level rise (SLR) poses a significant threat to coastal communities globally. Ghana has over the years implemented protective measures such as the construction of groynes and revetment to serve as barriers to sea waves in major cities and towns to prevent sea erosion and flooding. For vulnerable rural coastal communities, the planned retreat is often proposed; however, relocation costs are often underestimated as losses of future social and cultural value are not always adequately taken into account. Through a mixed-methods approach combining qualitative interviews, surveys, and spatial analysis, the study examined the experiences of coastal rural communities in Ghana and assess the effectiveness of relocation strategies in addressing the socio-economic and environmental challenges posed by sea level rise. The study revealed the devastating consequences of sea level rise on these communities, including increased flooding, erosion, and saltwater intrusion into freshwater sources. Moreover, it highlights the adaptive capacities within these communities and how factors such as infrastructure, economic activities, cultural heritage, and governance structures shape their resilience in the face of environmental change. While relocation can be an effective strategy in reducing the risks associated with sea level rise, the study recommends that proper implementation of this adaptation strategy can be achieved when coupled with community-led planning, participatory decision-making, and targeted support for vulnerable groups.

Keywords: sea level rise, relocation, socio-ecological impacts, rural communities

Procedia PDF Downloads 49
4499 Fostering Student Interest in Senior Secondary Two Biology Using Prior Knowledge of Behavioural Objectives and Assertive Questioning Strategies in Benue State, Nigeria

Authors: John Odo Ogah

Abstract:

The study investigated ways of fostering students’ interest in senior secondary two Biology, using prior knowledge of behavioural objectives and assertive questioning strategies in Benue State of Nigeria. A quasi-experimental research design was adopted; the population comprised 8,571 senior Secondary two students. The sample consisted of 265 SSII biology students selected from six government schools in the study area using a multi-staged sampling technique. Data was generated using the Biology Interest Inventory (BII). The instrument was validated and subjected to reliability analysis using Cronbach’s Alpha formula, which yielded a coefficient of 0.73. Three research questions guided the study, while three hypotheses were formulated and tested. Data collected were analyzed using means, bar graphs, and standard deviations to answer the research questions, while analysis of covariance (ANCOVA) was employed in testing the hypotheses at 0.05 level of significance. The finding revealed that there is a significant difference in the mean interest ratings of students taught cellular respiration and excretory system using assertive questioning strategy, prior knowledge of behavioural objectives strategy and lecture method (p=0.000˂0.05). There is no significant difference in the mean interest ratings of male and female students taught cellular respiration and excretory systems using an assertive questioning strategy (p=0.790>0.05). There is significant difference in the mean interest ratings of male and female students taught cellular respiration and execratory system using prior knowledge of behavioural objectives strategy (p=0.028˂0.05). It was recommended, among others, that teachers should endeavor to utilize prior knowledge of behavioral objectives strategy in teaching biology in order to harness its benefits as it enhances students’ interest.

Keywords: interest, assertive, questioning, prior, knowledge

Procedia PDF Downloads 53
4498 Performance Investigation of Unmanned Aerial Vehicles Attitude Control Based on Modified PI-D and Nonlinear Dynamic Inversion

Authors: Ebrahim H. Kapeel, Ahmed M. Kamel, Hossam Hendy, Yehia Z. Elhalwagy

Abstract:

Interest in autopilot design has been raised intensely as a result of recent advancements in Unmanned Aerial vehicles (UAVs). Due to the enormous number of applications that UAVs can achieve, the number of applied control theories used for them has increased in recent years. These small fixed-wing UAVs are suffering high non-linearity, sensitivity to disturbances, and coupling effects between their channels. In this work, the nonlinear dynamic inversion (NDI) control law is designed for a nonlinear small fixed-wing UAV model. The NDI is preferable for varied operating conditions, there is no need for a scheduling controller. Moreover, it’s applicable for high angles of attack. For the designed flight controller validation, a nonlinear Modified PI-D controller is performed with our model. A comparative study between both controllers is achieved to evaluate the NDI performance. Simulation results and analysis are proposed to illustrate the effectiveness of the designed controller based on NDI.

Keywords: attitude control, nonlinear PID, dynamic inversion

Procedia PDF Downloads 110
4497 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers

Authors: Pawan Kumar, Pitamber Singh Negi

Abstract:

Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.

Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed

Procedia PDF Downloads 148