Search results for: adversary emulation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 52

Search results for: adversary emulation

22 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 498
21 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 420
20 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology

Authors: Mark Davey

Abstract:

Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.

Keywords: embedded systems, multiprocessor, network on chip, side channel

Procedia PDF Downloads 42
19 A Picture is worth a Billion Bits: Real-Time Image Reconstruction from Dense Binary Pixels

Authors: Tal Remez, Or Litany, Alex Bronstein

Abstract:

The pursuit of smaller pixel sizes at ever increasing resolution in digital image sensors is mainly driven by the stringent price and form-factor requirements of sensors and optics in the cellular phone market. Recently, Eric Fossum proposed a novel concept of an image sensor with dense sub-diffraction limit one-bit pixels (jots), which can be considered a digital emulation of silver halide photographic film. This idea has been recently embodied as the EPFL Gigavision camera. A major bottleneck in the design of such sensors is the image reconstruction process, producing a continuous high dynamic range image from oversampled binary measurements. The extreme quantization of the Poisson statistics is incompatible with the assumptions of most standard image processing and enhancement frameworks. The recently proposed maximum-likelihood (ML) approach addresses this difficulty, but suffers from image artifacts and has impractically high computational complexity. In this work, we study a variant of a sensor with binary threshold pixels and propose a reconstruction algorithm combining an ML data fitting term with a sparse synthesis prior. We also show an efficient hardware-friendly real-time approximation of this inverse operator. Promising results are shown on synthetic data as well as on HDR data emulated using multiple exposures of a regular CMOS sensor.

Keywords: binary pixels, maximum likelihood, neural networks, sparse coding

Procedia PDF Downloads 172
18 Biomimetic Architecture from the Inspiration by Nature to the Innovation of the Saharan Architecture

Authors: Yassine Mohammed Benyoucef, Razin Andery Dionisovich

Abstract:

Biomimicry is an old approach, but in the scientific conceptualization is new, as an approach of innovation based on the emulation of Nature, in recent years, this approach brings many potential theories and innovations in the architecture field. Indeed, these innovations have changed our view towards other Natural organisms also to the design processes in architecture, now the use of the biomimicry approach allows the application of a great sustainable development. The Sahara area is heading towards a sustainable policy with the desire to develop this rich context in terms of architecture, because of the rapid evolution of the architectural and urban concepts and the technology acceleration in one side, and under the pressure of the architectural crisis and the accelerated urbanization in the Saharan cities on the other side, the imperatives of sustainable development, ecology, climate adaptation, energy needs, are strongly imposed. Besides that, the new architectural and urban projects in the Saharan cities are not reliable in terms of energy efficiency and design and relationship with the environment. This article discusses the using of biomimetic strategy in the sustainable development of Saharan architecture. The aim of the article is to present a synthesis of biomimicry approach and propose the biomimicry as a solution for the development of Saharan architecture which can use this approach as a sustainable and innovation strategy. The biomimicry is the solution for effective strategies of development and can have a great potential point to meet the current challenges of designing efficient for forms or structures, energy efficiency, and climate issues. Moreover, the Sahara can be a favorable soil for great changes, the use of this approach is the key for the most optimal strategies and sustainable development of the Saharan architecture.

Keywords: biomimicry, Sahara, architecture, nature, innovation, technology

Procedia PDF Downloads 159
17 Agile Smartphone Porting and App Integration of Signal Processing Algorithms Obtained through Rapid Development

Authors: Marvin Chibuzo Offiah, Susanne Rosenthal, Markus Borschbach

Abstract:

Certain research projects in Computer Science often involve research on existing signal processing algorithms and developing improvements on them. Research budgets are usually limited, hence there is limited time for implementing the algorithms from scratch. It is therefore common practice, to use implementations provided by other researchers as a template. These are most commonly provided in a rapid development, i.e. 4th generation, programming language, usually Matlab. Rapid development is a common method in Computer Science research for quickly implementing and testing new developed algorithms, which is also a common task within agile project organization. The growing relevance of mobile devices in the computer market also gives rise to the need to demonstrate the successful executability and performance measurement of these algorithms on a mobile device operating system and processor, particularly on a smartphone. Open mobile systems such as Android, are most suitable for this task, which is to be performed most efficiently. Furthermore, efficiently implementing an interaction between the algorithm and a graphical user interface (GUI) that runs exclusively on the mobile device is necessary in cases where the project’s goal statement also includes such a task. This paper examines different proposed solutions for porting computer algorithms obtained through rapid development into a GUI-based smartphone Android app and evaluates their feasibilities. Accordingly, the feasible methods are tested and a short success report is given for each tested method.

Keywords: SMARTNAVI, Smartphone, App, Programming languages, Rapid Development, MATLAB, Octave, C/C++, Java, Android, NDK, SDK, Linux, Ubuntu, Emulation, GUI

Procedia PDF Downloads 457
16 Critical Vision Innovation and Creativity in the Architecture and Urbanism of the Land in Islam between Traditionalism and Positivism

Authors: Wafeek Mohamed Ibrahim Mohamed

Abstract:

In the era of globalization and openness informational. Anyone who thinks about innovation in the earth population in Islam in our contemporary reality, he will find that it is not destined to its civilized extension to last. The purpose of the research is a trial to reach a realistic vision for creative, innovative and intellectual thought for the earth population in Islam as an instrument to Confrontation and observe the changes that have affected in the architecture of the land during different eras. Through knowing the controls of the ruling legitimacy(that served as definitions and laws which formulate its features) and using customs, traditions, and conventions as a telescope for the earth population in Islam, It explained the impact of them on features of creative formation for the architecture of the land in our contemporary reality. The study shows a modern vision to identify innovation in the earth population in Islam. As well as reformulating its mental image and monitoring its changes in Islamic heritage cities. This will be done through a two main branches: firstly, set forth a theory represented in studying creative concepts which formulate the population of the earth in Islam. Such as initiative and responsibility for reviving the dead land, the lane [alley] as formation unit and social solidarity,… Etc.. The second branch is preparing a practical, critical vision for innovative conceptual thought for the architecture of the land of Islam, through studying the development of a traditional Islamic city., The conceptual thought of making the birth festival ["Al-Refaee"] and its emulation for governing roles in the traditional city building. The research concludes The necessity of forming the suggested a creative vision for identifying how to re-form the conceptual for our contemporary population of the earth. It poses an important question which is how to return to creativity in the architecture of the land of Islam in our built environments.

Keywords: innovation and creation, architecture, the land in Islam, criticism of design

Procedia PDF Downloads 427
15 Combustion Characteristic of Propane/Acetylene Fuel Blends Pool Fire

Authors: Yubo Bi, Xiao Chen, Shouxiang Lu

Abstract:

A kind of gas-fueled burner, named Burning Rate Emulator, was proposed for the purpose of the emulation of condensed fuel recently. The gaseous fuel can be pure combustible fuel gas or blends of gaseous fuel or inert gas. However, this concept was recently proposed without detailed study on the combustion characteristic of fuel blends. In this study, two kinds of common gaseous fuels were selected, propane and acetylene, to provide the combustion heat as well as a large amount of smoke, which widely exists in liquid and solid fuel burning process. A set of experiments were carried out using a gas-fueled burner with a diameter of 8 cm. The total volume flow rate of propane and acetylene was kept at 3 liters per minute. The volume fraction of propane varied from 0% to 100% at interval of 10%. It is found that the flame height increases with propane volume fraction, which may be caused by the increase of heat release rate, as the energy density of propane is larger than that of acetylene. The dimensionless flame height is correlated against dimensionless heat release rate, which shows a power function relationship. The radiation fraction of the flame does not show a monotonic relationship with propane volume fraction. With the increase of propane volume fraction from 0% to 100%, the value of radiation fraction increases first and reach a maximum value around 0.46 at a propane volume fraction of 10%, and then decreases continuously to a value of 0.25 at the propane volume fraction of 100%. The flame radiation is related to the soot in the flame. The trend of the radiation fraction reflects that there may be a synergistic effect of soot formation between propane and acetylene which can be guessed from the significantly high radiation fraction at a propane volume fraction of 10%. This work provides data for combustion of gaseous fuel blends pool fire and also give reference on the design of Burning Rate Emulator.

Keywords: Burning Rate Emulator, fuel blends pool fire, flame height, radiation fraction

Procedia PDF Downloads 203
14 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 295
13 The Studies of the Impact of Biomimicry and Sustainability on Urban Design

Authors: Nourhane Mohamed El Haridi, Mostafa El Arabi, Zeyad El Sayad

Abstract:

Biomimicry is defined, by Benyus the natural sciences writer, as imitating or taking inspiration from nature’s forms and processes to solve human problems. Biomimicry is the conscious emulation of life’s genius. As the design community realizes the tremendous impact human constructions have on the world, environmental designers look to new approaches like biomimicry to advance sustainable design. Building leading the declaration made by biomimicry scientists that a full imitation of nature engages form, ecosystem, and process; this paper uses a logic approach to interpret human and environmental wholeness. Designers would benefit from both integrating social theory with environmental thinking and from combining their substantive skills with techniques for getting sustainable biomimic urban design. Integrating biomimicryʹs “Life’s Principles” into a built environment process model will make biomimicry more accessible and thus more widely accepted throughout the industry, and the sustainability of all species will benefit. The Biomimicry Guild hypothesizes the incorporation of these principles, called Lifeʹs Principles, increase the likelihood of sustainability for a respective design, and make it more likely that the design will have a greater impact on sustainability for future generations of all species as mentioned by Benyus in her book. This thesis utilizes Life’s Principles as a foundation for a design process model intended for application on built environment projects at various scales. This paper takes a look at the importance of the integration of biomimicry in urban design to get more sustainable cities and better life, by analyzing the principles of both sustainability and biomimicry, and applying these ideas on futuristic or existing cities to make a biomimic sustainable city more healthier and more conductive to life, and get a better biomimic urban design. A group of experts, architects, biologists, scientists, economists and ecologists should work together to face all the financial and designing difficulties, to have better solutions and good innovative ideas for biomimic sustainable urban design, it is not the only solution, but it is one of the best studies for a better future.

Keywords: biomimicry, built environment, sustainability, urban design

Procedia PDF Downloads 487
12 Rethinking Africa's 'Great Runner': Authoritarianism and Development in Post-Cold War Ethiopia

Authors: Frew Yirgalem Mane

Abstract:

This study has examined Africa’s experiment with authoritarian model of development drawing from the experience of Ethiopia. With the tectonic crisis of neoliberal ideology, the dominant policy agenda in Africa pertains to bringing the state back to development. More concretely, countries epitomized by Ethiopia, Rwanda and Uganda have been constructing a highly interventionist state with authoritarian character. The central motive appears to facilitate development and salvage people out of appalling and grinding poverty. Each country warrants closer inspection. However, this study focuses on Ethiopia- a country often applauded as ‘Africa’s Great Run’ for delivering socio-economic success over the past two decades. In fact, inspired by East Asia’s including Chinese model of authoritarian development, Ethiopia orchestrated a vanguard party, centralized rent control system with politicized bureaucracy and militaristic mobilization resources for development. This arrangement may explain Ethiopia economic success story as one the fastest growing countries in the world. However, this paper detected, Ethiopia’s attempt to bring the state back in development has precipitated institutionalization of a new breed of authoritarianism and informalization of public institutions. Ethiopia’s model of state-led development may constitute a noticeable shift away from the vengeful adherence to neoliberal policies. However, the manner the model has been practiced proved to be neither smooth nor appears to address Ethiopia’s aspiration for political and economic transformation. Partly, this can be illustrated by recent widespread grievances that fed into the popular uprising and animated opposition against the state. Sources of the grievance are complex, but they are highly ingrained with the way the authoritarian model of development is functioning and also the model’s dis-functioning in terms of benefiting people. In light of these findings, the study has arrived at the following conclusion. Africa’s attempt to emulate development models from other countries is not such a ‘bad’ thing. However, emulation makes sense if it is contextualized and sensitive to complex local socio-economic interests.

Keywords: Africa, authoritarianism, development, Ethiopia, neoliberalism

Procedia PDF Downloads 146
11 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications

Procedia PDF Downloads 189
10 Development of Optimized Eye Mascara Packages with Bioinspired Spiral Methodology

Authors: Daniela Brioschi, Rovilson Mafalda, Silvia Titotto

Abstract:

In the present days, packages are considered a fundamental element in the commercialization of products and services. A good package is capable of helping to attract new customers and also increasing a product’s purchase intent. In this scenario, packaging design emerges as an important tool, since products and design of their packaging are so interconnected that they are no longer seen as separate elements. Packaging design is, in fact, capable of generating desire for a product. The packaging market for cosmetics, especially makeup market, has also been experiencing an increasing level of sophistication and requirements. Considering packaging represents an important link of communication with the final user and plays a significant role on the sales process, it is of great importance that packages accomplish not only with functional requirements but also with the visual appeal. One of the possibilities for the design of packages and, in this context, packages for make-up, is the bioinspired design – or biomimicry. The bio-inspired design presents a promising paradigm for innovation in both design and sustainable design, by using biological system analogies to develop solutions. It has gained importance as a widely diffused movement in design for environmentally conscious development and is also responsible for several useful and innovative designs. As eye mascara packages are also part of the constant evolution on the design for cosmetics area and the traditional packages present the disadvantage of product drying along time, this project aims to develop a new and innovative package for this product, by using a selected bioinspired design methodology during the development process and also suitable computational tools. In order to guide the development process of the package, it was chosen the spiral methodology, conceived by The Biomimicry Institut, which consists of a reliable tool, since it was based on traditional design methodologies. The spiral design comprises identification, translation, discovery, abstraction, emulation and evaluation steps, that can work iteratively as the process develops as a spiral. As support tool for packaging, 3D modelling is being used by the software Inventor Autodesk Inventor 2018. Although this is an ongoing research, first results showed that spiral methodology design, together with Autodesk Inventor, consist of suitable instruments for the bio-inspired design process, and also nature proved itself to be an amazing and inexhaustible source of inspiration.

Keywords: bio-inspired design, design methodology, packaging, cosmetics

Procedia PDF Downloads 157
9 Multilingualism in Medieval Romance: A French Case Study

Authors: Brindusa Grigoriu

Abstract:

Inscribing itself in the field of the history of multilingual communities with a focus on the evolution of language didactics, our paper aims at providing a pragmatic-interactional approach on a corpus proposing to scholars of the international scientific community a relevant text of early modern European literature: the first romance in French, The Conte of Flore and Blanchefleur by Robert d’Orbigny (1150). The multicultural context described by the romance is one in which an Arab-speaking prince, Floire, and his Francophone protégée, Blanchefleur, learn Latin together at the court of Spain and become fluent enough to turn it into the language of their love. This learning process is made up of interactional patterns of affective relevance, in which the proficiency of the protagonists in the domain of emotive acts becomes a matter of linguistic and pragmatic emulation. From five to ten years old, the pupils are efficiently stimulated by their teacher of Latin, Gaidon – a Moorish scholar of the royal entourage – to cultivate their competencies of oral expression and reading comprehension (of Antiquity classics), while enjoying an ever greater freedom of written expression, including the composition of love poems in this second language of culture and emotional education. Another relevant parameter of the educational process at court is that Latin shares its prominent role as a language of culture with French, whose exemplary learner is the (Moorish) queen herself. Indeed, the adult 'First lady' strives to become a pupil benefitting from lifelong learning provided by a fortuitous slave-teacher with little training, her anonymous chambermaid and Blanchefleur’s mother, who, despite her status of a war trophy, enjoys her Majesty’s confidence as a cultural agent of change in linguistic and theological fields. Thus, the two foreign languages taught at Spains’s court, Latin and French – as opposed to Arabic -, suggest a spiritual authority allowing the mutual enrichment of intercultural pioneers of cross-linguistic communication, in the aftermath of religious wars. Durably, and significantly – if not everlastingly – the language of physical violence rooted in intra-cultural solipsism is replaced by two Romance languages which seem to embody, together and yet distinctly, the parlance of peace-making.

Keywords: multilingualism, history of European language learning, French and Latin learners, multicultural context of medieval romance

Procedia PDF Downloads 112
8 The Protection of Artificial Intelligence (AI)-Generated Creative Works Through Authorship: A Comparative Analysis Between the UK and Nigerian Copyright Experience to Determine Lessons to Be Learnt from the UK

Authors: Esther Ekundayo

Abstract:

The nature of AI-generated works makes it difficult to identify an author. Although, some scholars have suggested that all the players involved in its creation should be allocated authorship according to their respective contribution. From the programmer who creates and designs the AI to the investor who finances the AI and to the user of the AI who most likely ends up creating the work in question. While others suggested that this issue may be resolved by the UK computer-generated works (CGW) provision under Section 9(3) of the Copyright Designs and Patents Act 1988. However, under the UK and Nigerian copyright law, only human-created works are recognised. This is usually assessed based on their originality. This simply means that the work must have been created as a result of its author’s creative and intellectual abilities and not copied. Such works are literary, dramatic, musical and artistic works and are those that have recently been a topic of discussion with regards to generative artificial intelligence (Generative AI). Unlike Nigeria, the UK CDPA recognises computer-generated works and vests its authorship with the human who made the necessary arrangement for its creation . However, making necessary arrangement in the case of Nova Productions Ltd v Mazooma Games Ltd was interpreted similarly to the traditional authorship principle, which requires the skills of the creator to prove originality. Although, some recommend that computer-generated works complicates this issue, and AI-generated works should enter the public domain as authorship cannot be allocated to AI itself. Additionally, the UKIPO recognising these issues in line with the growing AI trend in a public consultation launched in the year 2022, considered whether computer-generated works should be protected at all and why. If not, whether a new right with a different scope and term of protection should be introduced. However, it concluded that the issue of computer-generated works would be revisited as AI was still in its early stages. Conversely, due to the recent developments in this area with regards to Generative AI systems such as ChatGPT, Midjourney, DALL-E and AIVA, amongst others, which can produce human-like copyright creations, it is therefore important to examine the relevant issues which have the possibility of altering traditional copyright principles as we know it. Considering that the UK and Nigeria are both common law jurisdictions but with slightly differing approaches to this area, this research, therefore, seeks to answer the following questions by comparative analysis: 1)Who is the author of an AI-generated work? 2)Is the UK’s CGW provision worthy of emulation by the Nigerian law? 3) Would a sui generis law be capable of protecting AI-generated works and its author under both jurisdictions? This research further examines the possible barriers to the implementation of the new law in Nigeria, such as limited technical expertise and lack of awareness by the policymakers, amongst others.

Keywords: authorship, artificial intelligence (AI), generative ai, computer-generated works, copyright, technology

Procedia PDF Downloads 49
7 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 69
6 A Generalized Framework for Adaptive Machine Learning Deployments in Algorithmic Trading

Authors: Robert Caulk

Abstract:

A generalized framework for adaptive machine learning deployments in algorithmic trading is introduced, tested, and released as open-source code. The presented software aims to test the hypothesis that recent data contains enough information to form a probabilistically favorable short-term price prediction. Further, the framework contains various adaptive machine learning techniques that are geared toward generating profit during strong trends and minimizing losses during trend changes. Results demonstrate that this adaptive machine learning approach is capable of capturing trends and generating profit. The presentation also discusses the importance of defining the parameter space associated with the dynamic training data-set and using the parameter space to identify and remove outliers from prediction data points. Meanwhile, the generalized architecture enables common users to exploit the powerful machinery while focusing on high-level feature engineering and model testing. The presentation also highlights common strengths and weaknesses associated with the presented technique and presents a broad range of well-tested starting points for feature set construction, target setting, and statistical methods for enforcing risk management and maintaining probabilistically favorable entry and exit points. The presentation also describes the end-to-end data processing tools associated with FreqAI, including automatic data fetching, data aggregation, feature engineering, safe and robust data pre-processing, outlier detection, custom machine learning and statistical tools, data post-processing, and adaptive training backtest emulation, and deployment of adaptive training in live environments. Finally, the generalized user interface is also discussed in the presentation. Feature engineering is simplified so that users can seed their feature sets with common indicator libraries (e.g. TA-lib, pandas-ta). The user also feeds data expansion parameters to fill out a large feature set for the model, which can contain as many as 10,000+ features. The presentation describes the various object-oriented programming techniques employed to make FreqAI agnostic to third-party libraries and external data sources. In other words, the back-end is constructed in such a way that users can leverage a broad range of common regression libraries (Catboost, LightGBM, Sklearn, etc) as well as common Neural Network libraries (TensorFlow, PyTorch) without worrying about the logistical complexities associated with data handling and API interactions. The presentation finishes by drawing conclusions about the most important parameters associated with a live deployment of the adaptive learning framework and provides the road map for future development in FreqAI.

Keywords: machine learning, market trend detection, open-source, adaptive learning, parameter space exploration

Procedia PDF Downloads 63
5 Active Victim Participation in the Criminal Justice System: The Indian Scenario

Authors: Narayani Sepaha

Abstract:

In earlier days, the sufferer was burdened to prove the offence as well as to put the offender to punishment. The adversary system of legal procedure was characterized simply by two parties: the prosecution and the defence. With the onset of this system, firstly the judge started acting as a neutral arbitrator, and secondly, the state inadvertently started assuming the lead role and thereby relegated the victims to the position of oblivion. In this process, with the increasing role of police forces and the government, the victims got systematically excluded from the key stages of the case proceedings and were reduced to the stature of a prosecution witness. This paper tries to emphasise the increasing control over the various stages of the trial, by other stakeholders, leading to the marginalization of victims in the trial process. This monopolization has signalled the onset of an era of gross neglect of victims in the whole criminal justice system. This consciousness led some reformists to raise their concerns over the issue, during the early part of the 20th century. They started supporting the efforts which advocated giving prominence to the participation of victims in the trial process. This paved the way for the evolution of the science of victimology. Markedly the innovativeness to work out facts, seek opinions and statements of the victims and reassure that their voice is also heard has ensured the revival of their rightful roles in the justice delivery system. Many countries, like the US, have set an example by acknowledging the advantages of participation of victims in trials like in the proceedings of the Ariel Castro Kidnappings of Cleveland, Ohio and enacting laws for protecting their rights within the framework of the legal system to ensure speedy and righteous delivery of justice in some of the most complicated cases. An attempt has been made to flag that the accused have several rights in contrast to the near absence of separate laws for victims of crime, in India. It is sad to note that, even in the initial process of registering a crime the victims are subjected to the mercy of the officers in charge and thus begins the silent suffering of these victims, which continues throughout the process of their trial. The paper further contends, that the degree of victim participation in trials and its impact on the outcomes, can be debated and evaluated, but its potential to alter their position and make them regain their lost status cannot be ignored. Victim participation in trial proceedings will help the court in perceiving the facts of the case in a better manner and in arriving at a balanced view of the case. This will not only serve to protect the overall interest of the victims but will act to reinforce the faith in the criminal justice delivery system. It is pertinent to mention that there is an urgent need to review the accused centric prosecution system and introduce appropriate amendments so that the marginalization of victims comes to an end.

Keywords: victim participation, criminal justice, India, trial, marginalised

Procedia PDF Downloads 130
4 Portrayal of Kolkata(the former capital of India) in the ‘Kolkata Trilogy’- A Comparative Study of the Films by Mrinal Sen and Satyajit Ray

Authors: Ronit Chakraborty

Abstract:

Kolkata, formerly known as Calcutta, is the capital of West Bengal state and the former capital of India (1722-1911) of British India. Located at the heart of Hugli river (one of the main channels of Ganges river), the city is the heart of the state, which forms a base for commerce, transport and manufacture. The large and vibrant city thrives amidst the economic, social and political issues arising from the pages of history to the contemporary times. The unique nature, grandeurs, public debates on tea-stalls and obviously the charismatic scenic beauty and heritage keep the city to be criticized in all horizons, across the world. Movies in India are a big source of knowledge, which can be used as a powerful tool for political mobilization and to indirectly communicate with voters since cinema can be used as a tool of propaganda as it has a wide range of public interests. History proves the fact that films produced in India have been apt enough in making public interests be deeply portrayed through their content in a versatile manner. Such is the portrayal of India’s first capital, Kolkata and its ultimate truth being organizingly laid over by the trilogy of two international fame directors-Mrinal Sen and Satyajit Ray, through their ‘magnum opus- the ‘Kolkata trilogy’. Mrinal Sen’s Interview(1971), Calcutta 71(1972), Padatik(The Guerilla Fighter)(1973) and Satyajit Ray’s Pratidwandi (The Adversary)(1970), Seemabaddha(Company Limited)(1971), Jana Aranya(1976). These films picturized the contemporary Kolkata trends, issues and crises arising amidst the political set-up both by the positive and negative variables attributing to the day-to-day happenings of the city. The movies have been set amidst the turmoil that the nation was going through during Indira Gandhi’s declaration of Emergency, resulting from the general sense of disillusionment that prevailed during that time. Ray wasn't affiliated to any political party and his films largely contributed towards the contemporary conditions prevailing in the society. Mrinal Sen, being a Marxist was in constant search of the bitter truth that the society had to offer through his lens under the prevailing darkness through his trilogy. The research paper attempts to widely view and draw a comparative study of the overall description of the city of Kolkata as portrayed by Sen and Ray in their respective trilogies. By the usage of the visual content analysis method, the researcher has explored the six movies; both the trilogies of Mrinal Sen and Satyajit Ray and tried to analyse the differences as well as the similarities pertaining to understand India’s first capital city Kolkata in various dimensions along with its circumference.

Keywords: Kolkata, trilogy, Satyajit Ray, Mrinal Sen, films, comparative study

Procedia PDF Downloads 231
3 Research Project on Learning Rationality in Strategic Behaviors: Interdisciplinary Educational Activities in Italian High Schools

Authors: Giovanna Bimonte, Luigi Senatore, Francesco Saverio Tortoriello, Ilaria Veronesi

Abstract:

The education process considers capabilities not only to be seen as a means to a certain end but rather as an effective purpose. Sen's capability approach challenges human capital theory, which sees education as an ordinary investment undertaken by individuals. A complex reality requires complex thinking capable of interpreting the dynamics of society's changes to be able to make decisions that can be rational for private, ethical and social contexts. Education is not something removed from the cultural and social context; it exists and is structured within it. In Italy, the "Mathematical High School Project" is a didactic research project is based on additional laboratory courses in extracurricular hours where mathematics intends to bring itself in a dialectical relationship with other disciplines as a cultural bridge between the two cultures, the humanistic and the scientific ones, with interdisciplinary educational modules on themes of strong impact in younger life. This interdisciplinary mathematics presents topics related to the most advanced technologies and contemporary socio-economic frameworks to demonstrate how mathematics is not only a key to reading but also a key to resolving complex problems. The recent developments in mathematics provide the potential for profound and highly beneficial changes in mathematics education at all levels, such as in socio-economic decisions. The research project is built to investigate whether repeated interactions can successfully promote cooperation among students as rational choice and if the skill, the context and the school background can influence the strategies choice and the rationality. A Laboratory on Game Theory as mathematical theory was conducted in the 4th year of the Mathematical High Schools and in an ordinary scientific high school of the Scientific degree program. Students played two simultaneous games of repeated Prisoner's Dilemma with an indefinite horizon, with two different competitors in each round; even though the competitors in each round will remain the same for the duration of the game. The results highlight that most of the students in the two classes used the two games with an immunization strategy against the risk of losing: in one of the games, they started by playing Cooperate, and in the other by the strategy of Compete. In the literature, theoretical models and experiments show that in the case of repeated interactions with the same adversary, the optimal cooperation strategy can be achieved by tit-for-tat mechanisms. In higher education, individual capacities cannot be examined independently, as conceptual framework presupposes a social construction of individuals interacting and competing, making individual and collective choices. The paper will outline all the results of the experimentation and the future development of the research.

Keywords: game theory, interdisciplinarity, mathematics education, mathematical high school

Procedia PDF Downloads 41
2 A Mother’s Silent Adversary: A Case of Pregnant Woman with Cervical Cancer

Authors: Paola Millare, Nelinda Catherine Pangilinan

Abstract:

Background and Aim: Cervical cancer is the most commonly diagnosed gynecological malignancy during pregnancy. Owing to the rarity of the disease, and the complexity of all factors that have to be taken into consideration, standardization of treatment is very difficult. Cervical cancer is the second most common malignancy among women. The treatment of cancer during pregnancy is most challenging in the case of cervical cancer, since the pregnant uterus itself is affected. This report aims to present a case of cervical cancer in a pregnant woman and how to manage this case and several issues accompanied with it. Methods: This is a case of a 28 year-old, Gravida 4 Para 2 (1111), who presented with watery to mucoid, whitish, non-foul smelling and increasing in amount. Internal examination revealed normal external genitalia, parous outlet, cervix was transformed into a fungating mass measuring 5x4 cm, with left parametrial involvement, body of uterus was enlarged to 24 weeks size, no adnexal mass or tenderness. She had cervical punch biopsy, which revealed, adenocarcinoma, well-differentiated cervical tissue. Standard management for cases with stage 2B cervical carcinoma was to start radiation or radical hysterectomy. In the case of patients diagnosed with cervical cancer and currently pregnant, these kind of management will result to fetal loss. The patient still declined the said management and opted to delay the treatment and wait for her baby to reach at least term and proceed to cesarean section as route of delivery. Results: The patient underwent an elective cesarean section at 37th weeks age of gestation, with an outcome of a term, live baby boy APGAR score 7,9 birthweight 2600 grams. One month postpartum, the patient followed up and completed radiotherapy, chemotherapy and brachytherapy. She was advised to go back after 6 months for monitoring. On her last check up, an internal examination was done which revealed normal external genitalia, vagina admits 2 fingers with ease, there is a palpable fungating mass at the cervix measuring 2x2 cm. A repeat gynecologic oncologic ultrasound was done revealing cervical mass, endophytic, grade 1 color score with stromal invasion 35% post radiation reactive lymph nodes with intact paracolpium, pericervical, and parametrial involvement. The patient was then advised to undergo pelvic boost and for close monitoring of the cervical mass. Conclusion: Cervical cancer in pregnancy is rare but is a dilemma for women and their physicians. Treatment should be multidisciplinary and individualized following careful counseling. In this case, the treatment was clearly on the side of preventing the progression of cervical cancer while she is pregnant, however due to ethical reasons, the management deviates on the right of the patient to decide for her own health and her unborn child. The collaborative collection of data relating to treatment and outcome is strongly encouraged.

Keywords: cancer, cervical, ethical, pregnancy

Procedia PDF Downloads 213
1 Sensorless Machine Parameter-Free Control of Doubly Fed Reluctance Wind Turbine Generator

Authors: Mohammad R. Aghakashkooli, Milutin G. Jovanovic

Abstract:

The brushless doubly-fed reluctance generator (BDFRG) is an emerging, medium-speed alternative to a conventional wound rotor slip-ring doubly-fed induction generator (DFIG) in wind energy conversion systems (WECS). It can provide competitive overall performance and similar low failure rates of a typically 30% rated back-to-back power electronics converter in 2:1 speed ranges but with the following important reliability and cost advantages over DFIG: the maintenance-free operation afforded by its brushless structure, 50% synchronous speed with the same number of rotor poles (allowing the use of a more compact, and more efficient two-stage gearbox instead of a vulnerable three-stage one), and superior grid integration properties including simpler protection for the low voltage ride through compliance of the fractional converter due to the comparatively higher leakage inductances and lower fault currents. Vector controlled pulse-width-modulated converters generally feature a much lower total harmonic distortion relative to hysteresis counterparts with variable switching rates and as such have been a predominant choice for BDFRG (and DFIG) wind turbines. Eliminating a shaft position sensor, which is often required for control implementation in this case, would be desirable to address the associated reliability issues. This fact has largely motivated the recent growing research of sensorless methods and developments of various rotor position and/or speed estimation techniques for this purpose. The main limitation of all the observer-based control approaches for grid-connected wind power applications of the BDFRG reported in the open literature is the requirement for pre-commissioning procedures and prior knowledge of the machine inductances, which are usually difficult to accurately identify by off-line testing. A model reference adaptive system (MRAS) based sensor-less vector control scheme to be presented will overcome this shortcoming. The true machine parameter independence of the proposed field-oriented algorithm, offering robust, inherently decoupled real and reactive power control of the grid-connected winding, is achieved by on-line estimation of the inductance ratio, the underlying rotor angular velocity and position MRAS observer being reliant upon. Such an observer configuration will be more practical to implement and clearly preferable to the existing machine parameter dependent solutions, and especially bearing in mind that with very little modifications it can be adapted for commercial DFIGs with immediately obvious further industrial benefits and prospects of this work. The excellent encoder-less controller performance with maximum power point tracking in the base speed region will be demonstrated by realistic simulation studies using large-scale BDFRG design data and verified by experimental results on a small laboratory prototype of the WECS emulation facility.

Keywords: brushless doubly fed reluctance generator, model reference adaptive system, sensorless vector control, wind energy conversion

Procedia PDF Downloads 34