Search results for: problem posing
4640 Challenges and Opportunities of Cloud-Based E-Learning Systems
Authors: Kashif Laeeq, Zubair A. Shaikh
Abstract:
The paradigm of education is drastically changing from conventional to e-learning model. Due to ease of learning with various other benefits, several educational institutions are adopting the e-learning models. Some institutions are still willing to transform their educational system on to e-learning, but due to limited resources, they are still compromising on the old traditional system. The cloud computing could be one of the best solutions to overcome this problem by providing hardware, software, and infrastructure resources with cost efficient manner. The adoption of cloud computing in education will bring revolution in this paradigm. This paper introduces various positive features of e-learning and presents a way how cloud computing technology can be provisioned e-learning model. This paper also investigates the numerous challenges and opportunities that would be observed in cloud computing adoption in e-learning domain. The concept and knowledge present in this paper may create a new direction of research in the domain of cloud-based e-learning.Keywords: cloud-based e-learning, e-learning, cloud computing application, smart learning
Procedia PDF Downloads 4104639 Hybrid Obfuscation Technique for Reverse Engineering Problem
Authors: Asma’a Mahfoud, Abu Bakar Md. Sultan, Abdul Azim Abd, Norhayati Mohd Ali, Novia Admodisastro
Abstract:
Obfuscation is a practice to make something difficult and complicated. Programming code is ordinarily obfuscated to protect the intellectual property (IP) and prevent the attacker from reverse engineering (RE) a copyrighted software program. Obfuscation may involve encrypting some or all the code, transforming out potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels, or adding unused or meaningless code to an application binary. Obfuscation techniques were not performing effectively recently as the reversing tools are able to break the obfuscated code. We propose in this paper a hybrid obfuscation technique that contains three approaches of renaming. Experimentation was conducted to test the effectiveness of the proposed technique. The experimentation has presented a promising result, where the reversing tools were not able to read the code.Keywords: intellectual property, obfuscation, software security, reverse engineering
Procedia PDF Downloads 1494638 Considering the Reliability of Measurements Issue in Distributed Adaptive Estimation Algorithms
Authors: Wael M. Bazzi, Amir Rastegarnia, Azam Khalili
Abstract:
In this paper we consider the issue of reliability of measurements in distributed adaptive estimation problem. To this aim, we assume a sensor network with different observation noise variance among the sensors and propose new estimation method based on incremental distributed least mean-square (IDLMS) algorithm. The proposed method contains two phases: I) Estimation of each sensors observation noise variance, and II) Estimation of the desired parameter using the estimated observation variances. To deal with the reliability of measurements, in the second phase of the proposed algorithm, the step-size parameter is adjusted for each sensor according to its observation noise variance. As our simulation results show, the proposed algorithm considerably improves the performance of the IDLMS algorithm in the same condition.Keywords: adaptive filter, distributed estimation, sensor network, IDLMS algorithm
Procedia PDF Downloads 6354637 Increase of Energy Efficiency by Means of Application of Active Bearings
Authors: Alexander Babin, Leonid Savin
Abstract:
In the present paper, increasing of energy efficiency of a thrust hybrid bearing with a central feeding chamber is considered. The mathematical model was developed to determine the pressure distribution and the reaction forces, based on the Reynolds equation and static characteristics’ equations. The boundary problem of pressure distribution calculation was solved using the method of finite differences. For various types of lubricants, geometry and operational characteristics, axial gaps can be determined, where the minimal friction coefficient is provided. The next part of the study considers the application of servovalves in order to maintain the desired position of the rotor. The report features the calculation results and the analysis of the influence of the operational and geometric parameters on the energy efficiency of mechatronic fluid-film bearings.Keywords: active bearings, energy efficiency, mathematical model, mechatronics, thrust multipad bearing
Procedia PDF Downloads 2844636 Ergonomic Design of Speed Control Humps/Dips
Authors: Emad Khorshid, Habib Awada
Abstract:
Newly developed Ergonomic speed control hump/Dip designs are conducted. The numerical simulation for the driver-vehicle-hump dynamic system will be performed using computer software. The design problem for which the speed hump or dip should provide: (1) discomfort feeling to the driver if speed is over the specified limit, and (2) normal/good comfort level to the driver (and or other passengers) if the speed is within the limit. For comparison reasons, different vehicles suspension systems (active, semi-active and non-active suspension) are used in the simulation. The measuring of the acceptable range of vibration will be referenced to the British standard BS6841, ISO 2631/1 and the new ISO 2631/5. All these standards are related to human health and comfort level in terms of acceptable range of whole body vibration exposure.Keywords: speed hump, speed dip, ergonomic design, human health, vehicle modeling
Procedia PDF Downloads 3724635 Consensus Problem of High-Order Multi-Agent Systems under Predictor-Based Algorithm
Authors: Cheng-Lin Liu, Fei Liu
Abstract:
For the multi-agent systems with agent's dynamics described by high-order integrator, and usual consensus algorithm composed of the state coordination control parts is proposed. Under communication delay, consensus algorithm in asynchronously-coupled form just can make the agents achieve a stationary consensus, and sufficient consensus condition is obtained based on frequency-domain analysis. To recover the original consensus state of the high-order agents without communication delay, besides, a predictor-based consensus algorithm is constructed via multiplying the delayed neighboring agents' states by a delay-related compensation part, and sufficient consensus condition is also obtained. Simulation illustrates the correctness of the results.Keywords: high-order dynamic agents, communication delay, consensus, predictor-based algorithm
Procedia PDF Downloads 5734634 Human Posture Estimation Based on Multiple Viewpoints
Authors: Jiahe Liu, HongyangYu, Feng Qian, Miao Luo
Abstract:
This study aimed to address the problem of improving the confidence of key points by fusing multi-view information, thereby estimating human posture more accurately. We first obtained multi-view image information and then used the MvP algorithm to fuse this multi-view information together to obtain a set of high-confidence human key points. We used these as the input for the Spatio-Temporal Graph Convolution (ST-GCN). ST-GCN is a deep learning model used for processing spatio-temporal data, which can effectively capture spatio-temporal relationships in video sequences. By using the MvP algorithm to fuse multi-view information and inputting it into the spatio-temporal graph convolution model, this study provides an effective method to improve the accuracy of human posture estimation and provides strong support for further research and application in related fields.Keywords: multi-view, pose estimation, ST-GCN, joint fusion
Procedia PDF Downloads 714633 The Variable Sampling Interval Xbar Chart versus the Double Sampling Xbar Chart
Authors: Michael B. C. Khoo, J. L. Khoo, W. C. Yeong, W. L. Teoh
Abstract:
The Shewhart Xbar control chart is a useful process monitoring tool in manufacturing industries to detect the presence of assignable causes. However, it is insensitive in detecting small process shifts. To circumvent this problem, adaptive control charts are suggested. An adaptive chart enables at least one of the chart’s parameters to be adjusted to increase the chart’s sensitivity. Two common adaptive charts that exist in the literature are the double sampling (DS) Xbar and variable sampling interval (VSI) Xbar charts. This paper compares the performances of the DS and VSI Xbar charts, based on the average time to signal (ATS) criterion. The ATS profiles of the DS Xbar and VSI Xbar charts are obtained using the Mathematica and Statistical Analysis System (SAS) programs, respectively. The results show that the VSI Xbar chart is generally superior to the DS Xbar chart.Keywords: adaptive charts, average time to signal, double sampling, charts, variable sampling interval
Procedia PDF Downloads 2884632 Software Evolution Based Activity Diagrams
Authors: Zine-Eddine Bouras, Abdelouaheb Talai
Abstract:
During the last two decades, the software evolution community has intensively tackled the software merging issue whose main objective is to merge in a consistent way different versions of software in order to obtain a new version. Well-established approaches, mainly based on the dependence analysis techniques, have been used to bring suitable solutions. These approaches concern the source code or software architectures. However, these solutions are more expensive due to the complexity and size. In this paper, we overcome this problem by operating at a high level of abstraction. The objective of this paper is to investigate the software merging at the level of UML activity diagrams, which is a new interesting issue. Its purpose is to merge activity diagrams instead of source code. The proposed approach, based on dependence analysis techniques, is illustrated through an appropriate case study.Keywords: activity diagram, activity diagram slicing, dependency analysis, software merging
Procedia PDF Downloads 3314631 Parameters Tuning of a PID Controller on a DC Motor Using Honey Bee and Genetic Algorithms
Authors: Saeid Jalilzadeh
Abstract:
PID controllers are widely used to control the industrial plants because of their robustness and simple structures. Tuning of the controller's parameters to get a desired response is difficult and time consuming. With the development of computer technology and artificial intelligence in automatic control field, all kinds of parameters tuning methods of PID controller have emerged in endlessly, which bring much energy for the study of PID controller, but many advanced tuning methods behave not so perfect as to be expected. Honey Bee algorithm (HBA) and genetic algorithm (GA) are extensively used for real parameter optimization in diverse fields of study. This paper describes an application of HBA and GA to the problem of designing a PID controller whose parameters comprise proportionality constant, integral constant and derivative constant. Presence of three parameters to optimize makes the task of designing a PID controller more challenging than conventional P, PI, and PD controllers design. The suitability of the proposed approach has been demonstrated through computer simulation using MATLAB/SIMULINK.Keywords: controller, GA, optimization, PID, PSO
Procedia PDF Downloads 5454630 Using Scilab® as New Introductory Method in Numerical Calculations and Programming for Computational Fluid Dynamics (CFD)
Authors: Nicoly Coelho, Eduardo Vieira Vilas Boas, Paulo Orestes Formigoni
Abstract:
Faced with the remarkable developments in the various segments of modern engineering, provided by the increasing technological development, professionals of all educational areas need to overcome the difficulties generated due to the good understanding of those who are starting their academic journey. Aiming to overcome these difficulties, this article aims at an introduction to the basic study of numerical methods applied to fluid mechanics and thermodynamics, demonstrating the modeling and simulations with its substance, and a detailed explanation of the fundamental numerical solution for the use of finite difference method, using SCILAB, a free software easily accessible as it is free and can be used for any research center or university, anywhere, both in developed and developing countries. It is known that the Computational Fluid Dynamics (CFD) is a necessary tool for engineers and professionals who study fluid mechanics, however, the teaching of this area of knowledge in undergraduate programs faced some difficulties due to software costs and the degree of difficulty of mathematical problems involved in this way the matter is treated only in postgraduate courses. This work aims to bring the use of DFC low cost in teaching Transport Phenomena for graduation analyzing a small classic case of fundamental thermodynamics with Scilab® program. The study starts from the basic theory involving the equation the partial differential equation governing heat transfer problem, implies the need for mastery of students, discretization processes that include the basic principles of series expansion Taylor responsible for generating a system capable of convergence check equations using the concepts of Sassenfeld, finally coming to be solved by Gauss-Seidel method. In this work we demonstrated processes involving both simple problems solved manually, as well as the complex problems that required computer implementation, for which we use a small algorithm with less than 200 lines in Scilab® in heat transfer study of a heated plate in rectangular shape on four sides with different temperatures on either side, producing a two-dimensional transport with colored graphic simulation. With the spread of computer technology, numerous programs have emerged requiring great researcher programming skills. Thinking that this ability to program DFC is the main problem to be overcome, both by students and by researchers, we present in this article a hint of use of programs with less complex interface, thus enabling less difficulty in producing graphical modeling and simulation for DFC with an extension of the programming area of experience for undergraduates.Keywords: numerical methods, finite difference method, heat transfer, Scilab
Procedia PDF Downloads 3884629 Compass Bar: A Visualization Technique for Out-of-View-Objects in Head-Mounted Displays
Authors: Alessandro Evangelista, Vito M. Manghisi, Michele Gattullo, Enricoandrea Laviola
Abstract:
In this work, we propose a custom visualization technique for Out-Of-View-Objects in Virtual and Augmented Reality applications using Head Mounted Displays. In the last two decades, Augmented Reality (AR) and Virtual Reality (VR) technologies experienced a remarkable growth of applications for navigation, interaction, and collaboration in different types of environments, real or virtual. Both environments can be potentially very complex, as they can include many virtual objects located in different places. Given the natural limitation of the human Field of View (about 210° horizontal and 150° vertical), humans cannot perceive objects outside this angular range. Moreover, despite recent technological advances in AR e VR Head-Mounted Displays (HMDs), these devices still suffer from a limited Field of View, especially regarding Optical See-Through displays, thus greatly amplifying the challenge of visualizing out-of-view objects. This problem is not negligible when the user needs to be aware of the number and the position of the out-of-view objects in the environment. For instance, during a maintenance operation on a construction site where virtual objects serve to improve the dangers' awareness. Providing such information can enhance the comprehension of the scene, enable fast navigation and focused search, and improve users' safety. In our research, we investigated how to represent out-of-view-objects in HMD User Interfaces (UI). Inspired by commercial video games such as Call of Duty Modern Warfare, we designed a customized Compass. By exploiting the Unity 3D graphics engine, we implemented our custom solution that can be used both in AR and VR environments. The Compass Bar consists of a graduated bar (in degrees) at the top center of the UI. The values of the bar range from -180 (far left) to +180 (far right), the zero is placed in front of the user. Two vertical lines on the bar show the amplitude of the user's field of view. Every virtual object within the scene is represented onto the compass bar as a specific color-coded proxy icon (a circular ring with a colored dot at its center). To provide the user with information about the distance, we implemented a specific algorithm that increases the size of the inner dot as the user approaches the virtual object (i.e., when the user reaches the object, the dot fills the ring). This visualization technique for out-of-view objects has some advantages. It allows users to be quickly aware of the number and the position of the virtual objects in the environment. For instance, if the compass bar displays the proxy icon at about +90, users will immediately know that the virtual object is to their right and so on. Furthermore, by having qualitative information about the distance, users can optimize their speed, thus gaining effectiveness in their work. Given the small size and position of the Compass Bar, our solution also helps lessening the occlusion problem thus increasing user acceptance and engagement. As soon as the lockdown measures will allow, we will carry out user-tests comparing this solution with other state-of-the-art existing ones such as 3D Radar, SidebARs and EyeSee360.Keywords: augmented reality, situation awareness, virtual reality, visualization design
Procedia PDF Downloads 1294628 Volcanostratigraphy Reconaissance Study Using Ridge Continuity to Solve Complex Volcanic Deposit Problems, Case Study Old Sunda Volcano
Authors: Afy Syahidan ACHMAD, Astin NURDIANA, SURYANTINI
Abstract:
In volcanic arc environment we can find multiple volcanic deposits which overlapped with another volcanic deposit so it will complicates source and distribution determination. This problem getting more difficult when we can not trace any deposit border evidences in field especially in high vegetation volcanic area, or overlapped deposit with same characteristics. Main purpose of this study is to solve complex volcanostratigraphy mapping problems trough ridge, valley, and river continuity. This method application carried out in Old Sunda Volcanic, West Java, Indonesia. Using 1:100.000 and 1:50.000 topographic map, and regional geology map, old sunda volcanic deposit was differentiated in regional level and detail level. Final product of this method is volcanostratigraphy unit determination in reconnaissance stage to simplify mapping process.Keywords: volcanostratigraphy, study, method, volcanic deposit
Procedia PDF Downloads 4064627 Nosocomial Infections and Prevention in in Intensive Care Units and Intensive Care
Authors: Kaous Samira
Abstract:
The lack of hand hygiene can contribute to nosocomial infections, including Central-venous-catheter-related bloodstream infections (CRBSI). An investigation from severally hospitals examined the frequency of hand hygiene in an OR among perioperative staff members who did not perform a surgical scrub. Among 50 operations (120 hours) that were observed, only 2% of staff members performed hand hygiene practices upon entering the OR, and 8.4% of staff performed hand hygiene upon leaving the OR. In addition, when performing radial arterial catheter placement, 0% of staff members wore gloves. Another study (A1170) surveyed healthcare providers regarding hand hygiene compliance. All of the 107 providers surveyed agreed that they should maintain hand hygiene, and most respondents believed that their own compliance was high. The author suggests that the low compliance problem associated with hand hygiene worldwide is a behavioral one among healthcare providers that requires acknowledgment and change.Keywords: aneshesia, investigation, IOP, SBP
Procedia PDF Downloads 464626 Attitude Stabilization of Satellites Using Random Dither Quantization
Authors: Kazuma Okada, Tomoaki Hashimoto, Hirokazu Tahara
Abstract:
Recently, the effectiveness of random dither quantization method for linear feedback control systems has been shown in several papers. However, the random dither quantization method has not yet been applied to nonlinear feedback control systems. The objective of this paper is to verify the effectiveness of random dither quantization method for nonlinear feedback control systems. For this purpose, we consider the attitude stabilization problem of satellites using discrete-level actuators. Namely, this paper provides a control method based on the random dither quantization method for stabilizing the attitude of satellites using discrete-level actuators.Keywords: quantized control, nonlinear systems, random dither quantization
Procedia PDF Downloads 2434625 Polish Adversarial Trial: Analysing the Fairness of New Model of Appeal Proceedings in the Context of Delivered Research
Authors: Cezary Kulesza, Katarzyna Lapinska
Abstract:
Regarding the nature of the notion of fair trial, one must see the source of the fair trial principle in the following acts of international law: art. 6 of the ECHR of 1950 and art.14 the International Covenant on Civil and Political Rights of 1966, as well as in art. 45 of the Polish Constitution. However, the problem is that the above-mentioned acts essentially apply the principle of a fair trial to the main hearing and not to appeal proceedings. Therefore, the main thesis of the work is to answer the question whether the Polish model of appeal proceedings is fair. The paper presents the problem of fair appeal proceedings in Poland in comparative perspective. Thus, the authors discuss the basic features of English, German and Russian appeal systems. The matter is also analysed in the context of the last reforms of Polish criminal procedure, because since 2013 Polish parliament has significantly changed criminal procedure almost three times: by the Act of 27th September, 2013, the Act of 20th February, 2015 which came into effect on 1st July, 2015 and the Act of 11th March, 2016. The most astonishing is that these three amendments have been varying from each other – changing Polish criminal procedure to more adversarial one and then rejecting all measures just involved in previous acts. Additional intent of the Polish legislator was amending the forms of plea bargaining: conviction of the defendant without trial or voluntary submission to a penalty, which were supposed to become tools allowing accelerating the criminal process and, at the same time, implementing the principle of speedy procedure. The next part of the paper will discuss the matter, how the changes of plea bargaining and the main trial influenced the appellate procedure in Poland. The authors deal with the right to appeal against judgments issued in negotiated case-ending settlements in the light of Art. 2 of Protocol No. 7 to the ECHR and the Polish Constitution. The last part of the presentation will focus on the basic changes in the appeals against judgments issued after the main trial. This part of the paper also presents the results of examination of court files held in the Polish Appeal Courts in Białystok, Łódź and Warsaw. From these considerations it is concluded that the Polish CCP of 1997 in ordinary proceedings basically meets both standards: the standard adopted in Protocol No. 7 of the Convention and the Polish constitutional standard. But the examination of case files shows in particular the following phenomena: low effectiveness of appeals and growing stability of the challenged judgments of district courts, extensive duration of appeal proceedings and narrow scope of evidence proceedings before the appellate courts. On the other hand, limitations of the right to appeal against the judgments issued in consensual modes of criminal proceedings justify the fear that such final judgments may violate the principle of criminal accurate response or the principle of material truth.Keywords: adversarial trial, appeal, ECHR, England, evidence, fair trial, Germany, Polish criminal procedure, reform, Russia
Procedia PDF Downloads 1474624 An Electronic and Performance Test for the Applicants to Faculty of Education for Early Childhood in Egypt for Measuring the Skills of Teacher Students
Authors: Ahmed Amin Mousa, Gehan Azam
Abstract:
The current study presents an electronic test to measure teaching skills. This test is a part of the admission system of the Faculty of Education for Early Childhood, Cairo University. The test has been prepared to evaluate university students who apply for admission the Faculty. It measures some social and physiological skills which are important for successful teachers, such as emotional adjustment and problem solving; moreover, the extent of their love for children and their capability to interact with them. The test has been approved by 13 experts. Finally, it has been introduced to 1,100 students during the admission system of the academic year 2016/2017. The results showed that most of the applicants have an auditory learning style. In addition, 97% of them have the minimum requirement skills for teaching children.Keywords: electronic test, performance, early childhood, skills, teacher student
Procedia PDF Downloads 2554623 Controlled Chemotherapy Strategy Applied to HIV Model
Authors: Shohel Ahmed, Md. Abdul Alim, Sumaiya Rahman
Abstract:
Optimal control can be helpful to test and compare different vaccination strategies of a certain disease. The mathematical model of HIV we consider here is a set of ordinary differential equations (ODEs) describing the interactions of CD4+T cells of the immune system with the human immunodeficiency virus (HIV). As an early treatment setting, we investigate an optimal chemotherapy strategy where control represents the percentage of effect the chemotherapy has on the system. The aim is to obtain a new optimal chemotherapeutic strategy where an isoperimetric constraint on the chemotherapy supply plays a crucial role. We outline the steps in formulating an optimal control problem, derive optimality conditions and demonstrate numerical results of an optimal control for the model. Numerical results illustrate how such a constraint alters the optimal vaccination schedule and its effect on cell-virus interactions.Keywords: chemotherapy of HIV, optimal control involving ODEs, optimality conditions, Pontryagin’s maximum principle
Procedia PDF Downloads 3364622 Effect of Highly Pressurized Dispersion Arc Nozzle on Breakup of Oil Leakage in Offshore
Authors: N. M. M. Ammar, S. M. Mustaqim, N. M. Nadzir
Abstract:
The most important problem occurs on oil spills in sea water is to reduce the oil spills size. This study deals with the development of high pressurized nozzle using dispersion method for oil leakage in offshore. 3D numerical simulation results were obtained using ANSYS Fluent 13.0 code and correlate with the experimental data for validation. This paper studies the contribution of the process on flow speed and pressure of the flow from two different geometrical designs of nozzles and to generate a spray pattern suitable for dispersant application. Factor of size distribution of droplets generated by the nozzle is calculated using pressures ranging from 2 to 6 bars. Results obtain from both analyses shows a significant spray pattern and flow distribution as well as distance. Results also show a significant contribution on the effect of oil leakage in terms of the diameter of the oil spills break up.Keywords: arc nozzle, CFD simulation, droplets, oil spills
Procedia PDF Downloads 4204621 Analysis of Formation Methods of Range Profiles for an X-Band Coastal Surveillance Radar
Authors: Nguyen Van Loi, Le Thanh Son, Tran Trung Kien
Abstract:
The paper deals with the problem of the formation of range profiles (RPs) for an X-band coastal surveillance radar. Two popular methods, the difference operator method, and the window-based method, are reviewed and analyzed via two tests with different datasets. The test results show that although the original window-based method achieves a better performance than the difference operator method, it has three main drawbacks that are the use of 3 or 4 peaks of an RP for creating the windows, the extension of the window size using the power sum of three adjacent cells in the left and the right sides of the windows and the same threshold applied for all types of vessels to finish the formation process of RPs. These drawbacks lead to inaccurate RPs due to the low signal-to-clutter ratio. Therefore, some suggestions are proposed to improve the original window-based method.Keywords: range profile, difference operator method, window-based method, automatic target recognition
Procedia PDF Downloads 1274620 The Prevalence of Overweight and Obesity among Adolescents in Public and Private Schools in Two Senatorial Districts of Osun State, Nigeria
Authors: O. Akinola, R. Mustapha
Abstract:
Obesity is the most serious long-term health problem currently facing adolescents and its prevalence increasing worldwide including developing countries. A cross-sectional study was carried out among age 11-19 years in both public and private school in the urban area of the state. The data was collected using pretest self-administered questionnaire; Anthropometric measurement was also used to examine their nutritional status. Obesity status were determined using BMI cut off point, the overweight was found to be 3.06% among female and 0.6% among male whereas the prevalence of obesity was 0.46% in female and non among male. 62.6% snack daily, fruit consumption pattern was low 0.6%, and 43.7% spend between 4-5 hours watching television daily after school. A positive association exists between the lifestyle and nutritional status of the respondents. Education effort to improve nutrition knowledge can be incorporated into course curriculum and focus on various components within the system when implementing preventive measure on obesity.Keywords: adolescent, obesity, overweight, prevalence
Procedia PDF Downloads 3354619 Tamper Resistance Evaluation Tests with Noise Resources
Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi
Abstract:
Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources
Procedia PDF Downloads 5054618 A System to Detect Inappropriate Messages in Online Social Networks
Authors: Shivani Singh, Shantanu Nakhare, Kalyani Nair, Rohan Shetty
Abstract:
As social networking is growing at a rapid pace today it is vital that we work on improving its management. Research has shown that the content present in online social networks may have significant influence on impressionable minds. If such platforms are misused, it will lead to negative consequences. Detecting insults or inappropriate messages continues to be one of the most challenging aspects of Online Social Networks (OSNs) today. We address this problem through a Machine Learning Based Soft Text Classifier approach using Support Vector Machine algorithm. The proposed system acts as a screening mechanism the alerts the user about such messages. The messages are classified according to their subject matter and each comment is labeled for the presence of profanity and insults.Keywords: machine learning, online social networks, soft text classifier, support vector machine
Procedia PDF Downloads 5104617 Application of Model Tree in the Prediction of TBM Rate of Penetration with Synthetic Minority Oversampling Technique
Authors: Ehsan Mehryaar
Abstract:
The rate of penetration is (RoP) one of the vital factors in the cost and time of tunnel boring projects; therefore, predicting it can lead to a substantial increase in the efficiency of the project. RoP is heavily dependent geological properties of the project site and TBM properties. In this study, 151-point data from Queen’s water tunnel is collected, which includes unconfined compression strength, peak slope index, angle with weak planes, and distance between planes of weaknesses. Since the size of the data is small, it was observed that it is imbalanced. To solve that problem synthetic minority oversampling technique is utilized. The model based on the model tree is proposed, where each leaf consists of a support vector machine model. Proposed model performance is then compared to existing empirical equations in the literature.Keywords: Model tree, SMOTE, rate of penetration, TBM(tunnel boring machine), SVM
Procedia PDF Downloads 1754616 The Criteria of the Aesthetic Quality of Art: Contemporary Photography
Authors: Artem Surkov
Abstract:
This work is devoted to a problem of aesthetic quality determinism in the context of contemporary art. The object of study is photography regarding as a kind of art which demands specific system of quality marking. Objective: To define aesthetic criteria in photography art. For current searching different kind of texts by such powerful authors like Clement Greenberg and Rosalind Krauss, Theodor Adorno and Herbert Marcuse, Charlott Cotton and Boris Groys, Viktor Miziano and Ekaterina Degot' were analyzed. Before all, there are two different kinds of photography: the classic art photography (by Ansel Adams) and the photography as kind of art (by Andreas Gursky). In this text we are talking about the photography as kind of art. The main principle of current searching is synthesis of two different approaches: modernism and postmodernism. This method helps us to define uniform criteria of aesthetic quality in photography as kind of art. The criteria mentioned in conclusion paragraph are: aesthetic rationality, aesthetic economy, awareness (using photographic technics or references), and intention to go beyond form, practice and method.Keywords: aesthetic, art, criteria of quality, photography, visually
Procedia PDF Downloads 4194615 Design and Māori Values: A Rebrand Project for the Social Enterprise Sector
Authors: M. Kiarna, S. Junjira, S. Casey, M. Nolwazi, M. S. Marcos, A. T. Tatiana, L. Cassandra
Abstract:
This paper details a rebrand design project developed for a non-profitable organization called Te Roopu Waiora (TRW), which is currently located in Auckland, Aotearoa New Zealand. This social enterprise is dedicated to supporting the Māori community living with sensorial, physical and intellectual disabilities (whānau hauā). As part of a year three bachelor design brief, the rebrand project enabled students to reflect on Kaupapa Māori principles and appropriately address the values of the organisation. As such, the methodology used a pragmatic paradigm approach and mixed methods design practices involving a human-centred design to problem solving. As result, the student project culminated in the development in a range of cohesive design artefacts, aiming to improve the rentability and perception of the brand with the audience and stakeholders.Keywords: design in Aotearoa New Zealand, Kaupapa Māori, branding, design education, human-centered design
Procedia PDF Downloads 1364614 Study on the Suppression of Hydrogen Generation by Aluminum-Containing Waste Incineration Ash and Water
Authors: Hideyuki Onodera, Ryoji Imai, Masahiro Sakai
Abstract:
Explosions have occurred in incineration plants in conveyors, ash pits, and other locations. The cause of such explosions is thought to be the reaction of metallic aluminum contained in the ash with water used to cool the ash and prevent scattering, resulting in the generation of hydrogen. Given this background, conveyors and other equipment have been damaged by explosions, which has hindered the stable operation of incineration plants. In addition, workers may be injured by equipment explosions, creating an unsafe situation. To remedy these problems, it is necessary to devise a way to prevent hydrogen explosions from occurring. To overcome this problem, we conducted a hydrogen generation reaction experiment using simulated incinerator ash powder containing aluminum, calcium oxide and water and confirmed that conditions exist to stop the hydrogen generation reaction. The results of this research may contribute to the suppression of hydrogen explosions at incineration plants.Keywords: waste incinerated ash, aluminum, water, hydrogen, suppression of hydrogen generation, incineration plant
Procedia PDF Downloads 314613 Learning Grammars for Detection of Disaster-Related Micro Events
Authors: Josef Steinberger, Vanni Zavarella, Hristo Tanev
Abstract:
Natural disasters cause tens of thousands of victims and massive material damages. We refer to all those events caused by natural disasters, such as damage on people, infrastructure, vehicles, services and resource supply, as micro events. This paper addresses the problem of micro - event detection in online media sources. We present a natural language grammar learning algorithm and apply it to online news. The algorithm in question is based on distributional clustering and detection of word collocations. We also explore the extraction of micro-events from social media and describe a Twitter mining robot, who uses combinations of keywords to detect tweets which talk about effects of disasters.Keywords: online news, natural language processing, machine learning, event extraction, crisis computing, disaster effects, Twitter
Procedia PDF Downloads 4814612 Identifying Promoters and Their Types Based on a Two-Layer Approach
Authors: Bin Liu
Abstract:
Prokaryotic promoter, consisted of two short DNA sequences located at in -35 and -10 positions, is responsible for controlling the initiation and expression of gene expression. Different types of promoters have different functions, and their consensus sequences are similar. In addition, their consensus sequences may be different for the same type of promoter, which poses difficulties for promoter identification. Unfortunately, all existing computational methods treat promoter identification as a binary classification task and can only identify whether a query sequence belongs to a specific promoter type. It is desired to develop computational methods for effectively identifying promoters and their types. Here, a two-layer predictor is proposed to try to deal with the problem. The first layer is designed to predict whether a given sequence is a promoter and the second layer predicts the type of promoter that is judged as a promoter. Meanwhile, we also analyze the importance of feature and sequence conversation in two aspects: promoter identification and promoter type identification. To the best knowledge of ours, it is the first computational predictor to detect promoters and their types.Keywords: promoter, promoter type, random forest, sequence information
Procedia PDF Downloads 1864611 A Dirty Page Migration Method in Process of Memory Migration Based on Pre-copy Technology
Authors: Kang Zijian, Zhang Tingyu, Burra Venkata Durga Kumar
Abstract:
This article investigates the challenges in memory migration during the live migration of virtual machines. We found three challenges probably existing in pre-copy technology. One of the main challenges is the challenge of downtime migration. Decrease the downtime could promise the normal work for a virtual machine. Although pre-copy technology is greatly decreasing the downtime, we still need to shut down the machine in order to finish the last round of data transfer. This paper provides an optimization scheme for the problems existing in pro-copy technology, mainly the optimization of the dirty page migration mechanism. The typical pre-copy technology copy n-1th’s dirty pages in nth turn. However, our idea is to create a double iteration method to solve this problem.Keywords: virtual machine, pre-copy technology, memory migration process, downtime, dirty pages migration method
Procedia PDF Downloads 152