Search results for: hiding information in plain sight
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10879

Search results for: hiding information in plain sight

10849 An Approach for Thermal Resistance Prediction of Plain Socks in Wet State

Authors: Tariq Mansoor, Lubos Hes, Vladimir Bajzik

Abstract:

Socks comfort has great significance in our daily life. This significance even increased when we have undergone a work of low or high activity. It causes the sweating of our body with different rates. In this study, plain socks with differential fibre composition were wetted to saturated level. Then after successive intervals of conditioning, these socks are characterized by thermal resistance in dry and wet states. Theoretical thermal resistance is predicted by using combined filling coefficients and thermal conductivity of wet polymers instead of dry polymer (fibre) in different models. By this modification, different mathematical models could predict thermal resistance at different moisture levels. Furthermore, predicted thermal resistance by different models has reasonable correlation range between (0.84 -0.98) with experimental results in both dry (lab conditions moisture) and wet states. "This work is supported by Technical University of Liberec under SGC-2019. Project number is 21314".

Keywords: thermal resistance, mathematical model, plain socks, moisture loss rate

Procedia PDF Downloads 166
10848 Numerical Analysis of Heat Transfer Enhancement in Heat Exchangers by using Dimpled Tube

Authors: Bader Alhumaidi Alsubaei, Zahid H. Akash, Ali Imam Sunny

Abstract:

The heat transfer coefficient can be improved passively by using a dimpled surface on the tube. The contact area where heat transfer takes place can be enlarged and turbulence will be purposefully produced inside the duct; as a consequence, higher heat transfer quality will be achieved by employing an extended inner or outer surface (dimpled surface). In order to compare the rate and quality of heat transfer between a regular-shaped pipe and a dimpled pipe, a dimpled tube with a fixed dimple radius was created. Numerical analysis of the plain and dimpled pipes was performed using ANSYS. A 23% increase in Nusselt number was seen for dimpled tubes compared to plain tubes. In comparison to plain tubes, dimpled tubes' increase in thermal performance index was found to be between 8% and 10%. An increase in pressure drop of 18% was noted.

Keywords: heat transfer, dimpled tube, CFD, ANSYS

Procedia PDF Downloads 75
10847 Alive Cemeteries with Augmented Reality and Semantic Web Technologies

Authors: Tamás Matuszka, Attila Kiss

Abstract:

Due the proliferation of smartphones in everyday use, several different outdoor navigation systems have become available. Since these smartphones are able to connect to the Internet, the users can obtain location-based information during the navigation as well. The users could interactively get to know the specifics of a particular area (for instance, ancient cultural area, Statue Park, cemetery) with the help of thus obtained information. In this paper, we present an Augmented Reality system which uses Semantic Web technologies and is based on the interaction between the user and the smartphone. The system allows navigating through a specific area and provides information and details about the sight an interactive manner.

Keywords: augmented reality, semantic web, human computer interaction, mobile application

Procedia PDF Downloads 310
10846 High Performance Electrocardiogram Steganography Based on Fast Discrete Cosine Transform

Authors: Liang-Ta Cheng, Ching-Yu Yang

Abstract:

Based on fast discrete cosine transform (FDCT), the authors present a high capacity and high perceived quality method for electrocardiogram (ECG) signal. By using a simple adjusting policy to the 1-dimentional (1-D) DCT coefficients, a large volume of secret message can be effectively embedded in an ECG host signal and be successfully extracted at the intended receiver. Simulations confirmed that the resulting perceived quality is good, while the hiding capability of the proposed method significantly outperforms that of existing techniques. In addition, our proposed method has a certain degree of robustness. Since the computational complexity is low, it is feasible for our method being employed in real-time applications.

Keywords: data hiding, ECG steganography, fast discrete cosine transform, 1-D DCT bundle, real-time applications

Procedia PDF Downloads 165
10845 Evaluation of Ecological Resilience in Mountain-plain Transition Zones: A Case Study of Dujiangyan City, Chengdu

Authors: Zhu Zhizheng, Huang Yong, Li Tong

Abstract:

In the context of land and space development and resource environmental protection. Due to its special geographical location, mountain-plain transition zones are limited by many factors such as topography, mountain forest protection, etc., and their ecology is also more sensitive, with the characteristics of disaster susceptibility and resource gradient. Taking Dujiangyan City, Chengdu as an example, this paper establishes resilience evaluation indicators on the basis of ecological suitability evaluation through the analysis of current situation data and relevant policies: water conservation evaluation, soil and water conservation evaluation, biodiversity evaluation, soil erosion sensitivity evaluation, etc. Based on GIS spatial analysis, the ecological suitability and resilience evaluation results of Dujiangyan city were obtained by disjunction operation. The ecological resilience level of Dujiangyan city was divided into three categories: high, medium and low, with an area ratio of 50.81%, 16.4% and 32.79%, respectively. This paper can provide ideas for solving the contradiction between man and land in the mountain-plain transition zones, and also provide a certain basis for the construction of regional ecological protection and the delineation of three zones and three lines.

Keywords: urban and rural planning, ecological resilience, dujiangyan city, mountain-plain transition zones

Procedia PDF Downloads 83
10844 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 268
10843 A Preliminary Development of Virtual Sight-Seeing Website for Thai Temples on Rattanakosin Island

Authors: Pijitra Jomsri

Abstract:

Currently, the sources of cultures and tourist attractions are presented in online documentary form only. In order to make them more virtual, the researcher then collected and presented them in the form of Virtual Temple. The prototype, which is a replica of the actual location, was developed to the website and allows people who are interested in Rattanakosin Island can see in form of Panorama Pan View. By this way, anyone can access the data and appreciate the beauty of Rattanakosin Island in the virtual model like the real place. The result from the experiment showed that the levels of the knowledge on Thai temples in Rattanakosin Island increased; moreover, the users were highly satisfied with the systems. It can be concluded that virtual temples can support to publicize Thai arts, cultures and travels, as well as it can be utilized effectively.

Keywords: virtual sight-seeing, Rattanakosin Island, Thai temples, virtual temple

Procedia PDF Downloads 312
10842 Confidence Levels among UK Emergency Medicine Doctors in Performing Emergency Lateral Canthotomy: Should it be a Key Skill in the ED

Authors: Mohanad Moustafa, Julia Sieberer, Rhys Davies

Abstract:

Background: Orbital compartment syndrome (OCS) is a sight-threatening Ophthalmologic emergency caused by rapidly increasing intraorbital pressure. It is usually caused by a retrobulbar hemorrhage as a result of trauma. If not treated in a timely manner, permanent vision loss can occur. Lateral canthotomy and cantholysis are minor procedures that can be performed bedside with equipment available in the emergency department. The aim of the procedure is to release the attachments between the suspensory ligaments of the eye and the bony orbital wall, leading to a decrease in intraorbital pressure and preventing irreversible loss of vision. As most Ophthalmologists across the UK provide non-resident on-call service, this may lead to a delay in the treatment of OCS and stresses the need for Emergency medical staff to be able to provide this sight-saving procedure independently. Aim: To survey current training, experience, and confidence levels among Emergency Medicine doctors in performing emergency lateral canthotomy and to establish whether these variables change the following teaching from experienced ophthalmologists. RESULTS: Most EM registrars had little to no experience in performing lateral canthotomy and cantholysis. The majority of them showed a significant increase in their confidence to perform the procedure following ophthalmic-led teaching. The survey also showed that the registrars felt such training should be added to/part of the EM curriculum. Conclusion: The involvement of Ophthalmologists in the teaching of EM doctors to recognise and treat OCS independently may prevent delays in treatment and reduce the risk of permanent sight loss. This project showed potential in improving patient care and will lead to a National Survey of EM doctors across the UK.

Keywords: lateral canthotomy, retrobulbar hemorrhage, Ophthalmology, orbital compartment syndrome, sight loss, blindness

Procedia PDF Downloads 73
10841 The Effect of the Pronunciation of Emphatic Sounds on Perceived Masculinity/Femininity

Authors: M. Sayyour, M. Abdulkareem, O. Osman, S. Salmeh

Abstract:

Emphatic sounds in Arabic are /tˤ/, /sˤ/, /dˤ/, and /ðˤ/. They involve a secondary articulation in the pharynx area as opposed to their counterparts: /t/,/s/,/d/and /ð/. Although they are present in most Arabic dialects, some dialects have lost this class as a historical development, such as Maltese Arabic. It has been found that there is a difference in the pronunciation of these emphatic sounds between the two genders, arguing that males tend to produce more evident emphasis than females. This study builds on these studies by trying to investigate whether listeners perceive fully emphatic sounds as more masculine and less emphatic sounds as more feminine. Furthermore, the study aims to find out which is more important in this perception process: the emphatic consonant itself or the vowel following it. To test this, natural and manipulated tokens of two male and two female speakers were used. The natural tokens include words that have emphatic consonant and emphatic vowel and tokens that have plain consonant and plain vowel. The manipulated tokens include words that have emphatic consonant but central vowel and plain consonant followed by the same central vowel. These manipulated tokens allow us to see whether the consonant will still affect the perception even if the vowel is controlled. Another group of words that contained no emphatic sounds was used as a control group. The total number of tokens (natural, manipulated, and control) are 160 tokens. After that, 60 university students (30 males and 30 females) listened to these tokens and responded by choosing a specific character that they think is likely to produce each token. The characters’ descriptions are carefully written with two degrees of femininity and two degrees of masculinity. The preliminary results for the femininity level showed that the highest degree of femininity was for tokens that contain a plain consonant and a plain vowel. The lowest level of femininity was given for tokens that have fully emphatic consonant and vowel. For the manipulated tokens that contained plain consonant and central vowel, the femininity degree was high which indicates that the consonant is more important than the vowel, while for the manipulated tokens that contain emphatic consonant and a central vowel, the femininity level was higher than that for the tokens that have emphatic consonant and emphatic vowel, which indicates that the vowel is more important for the perception of emphatic consonants. These results are interpreted in light of feminist linguistic theories, linguistic expectations, performed gender and linguistic change theories.

Keywords: Emphatic sounds, gender studies, perception, sociophonetics

Procedia PDF Downloads 348
10840 Evaluation of Satellite and Radar Rainfall Product over Seyhan Plain

Authors: Kazım Kaba, Erdem Erdi, M. Akif Erdoğan, H. Mustafa Kandırmaz

Abstract:

Rainfall is crucial data source for very different discipline such as agriculture, hydrology and climate. Therefore rain rate should be known well both spatial and temporal for any area. Rainfall is measured by using rain-gauge at meteorological ground stations traditionally for many years. At the present time, rainfall products are acquired from radar and satellite images with a temporal and spatial continuity. In this study, we investigated the accuracy of these rainfall data according to rain-gauge data. For this purpose, we used Adana-Hatay radar hourly total precipitation product (RN1) and Meteosat convective rainfall rate (CRR) product over Seyhan plain. We calculated daily rainfall values from RN1 and CRR hourly precipitation products. We used the data of rainy days of four stations located within range of the radar from October 2013 to November 2015. In the study, we examined two rainfall data over Seyhan plain and the correlation between the rain-gauge data and two raster rainfall data was observed lowly.

Keywords: meteosat, radar, rainfall, rain-gauge, Turkey

Procedia PDF Downloads 292
10839 Modelling Interactions between Saturated and Unsaturated Zones by Hydrus 1D, Plain of Kairouan, Central Tunisia

Authors: Mariem Saadi, Sabri Kanzari, Adel Zghibi

Abstract:

In semi-arid areas like the Kairouan region, the constant irrigation with saline water and the overuse of groundwater resources, soils and aquifers salinization has become an increasing concern. In this study, a methodology has been developed to evaluate the groundwater contamination risk based on the unsaturated zone hydraulic properties. Two soil profiles with different ranges of salinity, one located in the north of the plain and another one in the south of plain (each 30 m deep) and both characterized by direct recharge of the aquifer were chosen. Simulations were conducted with Hydrus-1D code using measured precipitation data for the period 1998-2003 and calculated evapotranspiration for both chosen profiles. Four combinations of initial conditions of water content and salt concentration were used for the simulation process in order to find the best match between simulated and measured values. The success of the calibration of Hydrus-1D allowed the investigation of some scenarios in order to assess the contamination risk under different natural conditions. The aquifer risk contamination is related to the natural conditions where it increased while facing climate change and temperature increase and decreased in the presence of a clay layer in the unsaturated zone. Hydrus-1D was a useful tool to predict the groundwater level and quality in the case of a direct recharge and in the absence of any information related to the soil layers except for the texture.

Keywords: Hydrus-1D, Kairouan, salinization, semi-arid region, solute transport, unsaturated zone

Procedia PDF Downloads 154
10838 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques

Authors: Misha Alexander, S. B. Waykar

Abstract:

Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.

Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping

Procedia PDF Downloads 382
10837 Reproductive Health Behavior and Nutritional Status of Plain Land Ethnic Women in Bangladesh

Authors: Zainal Abedin

Abstract:

Introduction: Reproductive health is one of the major priorities of global health and is a fundamental and inalienable part of women’s health due to childbearing, and it is closely associated with nutritional status. Objective: This study was done to assess reproductive health behavior and nutritional status of reproductive-age ethnic women residing in plain land. Method: It was a cross-sectional study conducted among conveniently selected 120 reproductive-aged ethnic women at three Upazila of Rajshahi District. Nutritional status was determined by the WHO cut-off value of BMI for the Asian population. Results: About 88% of respondents noticed that they seek treatment in response to disease, and most of them seek treatment from the pharmacy attendant. Two-thirds of women used contraceptives, and 76% of women received antenatal care visits from Govt health centers, private clinics, and NGO clinics, but 86% of respondents delivered at home. In terms of nutritional status, 70% were normal, 23% underweight, and 7% overweight. Conclusion: Though most of them were normal regarding nutritional status but one-fourth were still underweight. Local pharmacy/quack-dependent treatment should be reduced.

Keywords: reproductive health behavior, nutritional status, plain land, ethnic women

Procedia PDF Downloads 44
10836 Effect of Fiber Types and Elevated Temperatures on the Bond Characteristic of Fiber Reinforced Concretes

Authors: Erdoğan Özbay, Hakan T. Türker, Müzeyyen Balçıkanlı, Mohamed Lachemi

Abstract:

In this paper, the effects of fiber types and elevated temperatures on compressive strength, modulus of rapture and the bond characteristics of fiber reinforced concretes (FRC) are presented. By using the three different types of fibers (steel fiber-SF, polypropylene-PPF and polyvinyl alcohol-PVA), FRC specimens were produced and exposed to elevated temperatures up to 800 ºC for 1.5 hours. In addition, a plain concrete (without fiber) was produced and used as a control. Test results obtained showed that the steel fiber reinforced concrete (SFRC) had the highest compressive strength, modulus of rapture and bond stress values at room temperatures, the residual bond, flexural and compressive strengths of both FRC and plain concrete dropped sharply after exposure to high temperatures. The results also indicated that the reduction of bond, flexural and compressive strengths with increasing the exposed temperature was relatively less for SFRC than for plain, and FRC with PPF and PVA.

Keywords: bond stress, compressive strength, elevated temperatures, fiber reinforced concrete, modulus of rapture

Procedia PDF Downloads 391
10835 Enhanced Bit Error Rate in Visible Light Communication: A New LED Hexagonal Array Distribution

Authors: Karim Matter, Heba Fayed, Ahmed Abd-Elaziz, Moustafa Hussein

Abstract:

Due to the exponential growth of mobile devices and wireless services, a huge demand for radiofrequency has increased. The presence of several frequencies causes interference between cells, which must be minimized to get the lower Bit Error Rate (BER). For this reason, it is of great interest to use visible light communication (VLC). This paper suggests a VLC system that decreases the BER by applying a new LED distribution with a hexagonal shape using a Frequency Reuse (FR) concept to mitigate the interference between the reused frequencies inside the hexagonal shape. The BER is measured in two scenarios, Line of Sight (LoS) and Non-Line of Sight (Non-LoS), for each technique that we used. The recommended values of BER in the proposed model for Soft Frequency Reuse (SFR) in the case of Los at 4, 8, and 10 dB signal to noise ratio (SNR), are 3.6×10⁻⁶, 6.03×10⁻¹³, and 2.66×10⁻¹⁸, respectively.

Keywords: visible light communication (VLC), field of view (FoV), hexagonal array, frequency reuse

Procedia PDF Downloads 127
10834 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 450
10833 Management of Al-Khaldiyah Road (Al Khobar) in Order to Optimize Safety and Improve Sight View

Authors: Amer Alsari, Hassan Alhalal, Tahar Ayadat, Andi Asiz, Omar KM Ouda

Abstract:

Al Khaldiyah is a regional road situated in west-south of Al Khobar, precisely in the area of Half Moon Bay. It is characterized by four lines, which become six lines in some places, in both directions extending over about 10 km length. The road extends between the bridge near the Air Force Base and Half Moon Bay Road. Many accidents have been observed in this road notably over the last two years. Many injuries and deaths were recorded, some of the victims were PMU students. Consequently, management of the road to eliminate or reduce accidents to a large extend becomes imperative. The main goal of this project are to propose sustainable solutions for the purpose optimizing safety and improving its sight view by designing some appropriate junctions including bridge and tunnel in the critical locations.

Keywords: management, road, accident, traffic, safety, sustainable, solutions

Procedia PDF Downloads 412
10832 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography

Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway

Abstract:

This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.

Keywords: steganography, stego, LSB, crop

Procedia PDF Downloads 240
10831 Strength and Permeability Characteristics of Fiber Reinforced Concrete

Authors: Amrit Pal Singh Arora

Abstract:

The paper reports the results of a study undertaken to study the effects of addition of steel fibres of different aspect ratios on the permeability and strength characteristics of steel fiber reinforced fly ash concrete (SFRC). Corrugated steel fibres having a diameter of 0.6 mm and lengths of 12.5 mm, 30 mm and 50 mm were used in this study. Cube samples of 100 mm x 100 mm x 100 mm were cast from mixes replacing 0%, 10%, 20% and 30% cement content by fly ash with and without fibres and tested for the determination of coefficient of water permeability, compressive and split tensile strengths after 7 and 28 days of curing. Plain concrete samples were also cast and tested for reference purposes. Permeability was observed to decrease significantly for all concrete mixes with the addition of steel fibers as compared to plain concrete. The replacement of cement content by fly ash results in an increase in the coefficient of water permeability. With the addition of fly ash to the plain mix the7 day compressive and split tensile strengths decreased, however both the compressive and split tensile strengths increased with increase in curing age.

Keywords: curing age, fiber shape, fly ash, Darcy’s law, Ppermeability

Procedia PDF Downloads 280
10830 Impact of Agriculture on the Groundwater Quality: Case of the Alluvial Plain of Nil River (North-Eastern Algerian)

Authors: S. Benessam, T. H. Debieche, A. Drouiche, F. Zahi, S. Mahdid

Abstract:

The intensive use of the chemical fertilizers and the pesticides in agriculture often produces a contamination of the groundwater by organic pollutants. The irrigation and/or rainwater transport the pollutants towards groundwater or water surface. Among these pollutants, one finds the nitrogen, often observed in the agricultural zones in the nitrate form. In order to understand the form and chemical mobility of nitrogen in groundwater, this study was conducted. A two-monthly monitoring of the parameters physicochemical and chemistry of water of the alluvial plain of Nil river (North-eastern Algerian) were carried out during the period from November 2013 to January 2015 as well as an in-situ investigation of the various chemical products used by the farmers. The results show a raise concentration of nitrates in the wells (depth < 20 m) of the plain, which the concentrations arrive at 50 mg/L (standard of potable water). On the other hand in drillings (depth > 20 m), one observes two behaviors. The first in the upstream part, where the aquifer is unconfined and the medium is oxidizing, one observes the weak nitrate concentrations, indicating its absorption by the ground during the infiltration of water towards the groundwater. The second in the central and downstream parts, where the groundwater is locally confined and the reducing medium, one observes an absence of nitrates and the appearance of nitrites and ammonium, indicating the reduction of nitrates. The projection of the analyses on diagrams Eh-pH of nitrogen has enabled to us to determine the intervals of variation of the nitrogen forms. This study also highlighted the effect of the rains, the pumping and the nature of the geological formations in the form and the mobility of nitrogen in the plain.

Keywords: groundwater, nitrogen, mobility, speciation

Procedia PDF Downloads 218
10829 Assessment of the Groundwater Agricultural Pollution Risk: Case of the Semi-Arid Region (Batna-East Algeria)

Authors: Dib Imane, Chettah Wahid, Khedidja Abdelhamid

Abstract:

The plain of Gadaïne - Ain Yaghout, located in the wilaya of Batna (Eastern Algeria), experiences intensive human activities, particularly in agricultural practices which are accompanied by an increasing use of chemical fertilizers and manure. These activities lead to a degradation of the quality of water resources. In order to protect the quality of groundwater in this plain and formulate effective strategies to mitigate or avoid any contamination of groundwater, a risk assessment using the European method known as “COSTE Action 620” was applied to the mio-. plio-quaternary aquifer of this plain. Risk assessment requires the identification of existing dangers and their potential impact on groundwater by using a system of evaluation and weighting. In addition, it also requires the integration of the hydrogeological factors that influence the movement of contaminants by means of the intrinsic vulnerability maps of groundwater, which were produced according to the modified DRASTIC method. The overall danger on the plain ranges from very low to high. Farms containing stables, houses detached from the public sewer system, and sometimes manure piles were assigned a weighting factor expressing the highest degree of harmfulness; this created a medium to high danger index. Large areas for agricultural practice and grazing are characterized, successively, by low to very low danger. Therefore, the risks present at the study site are classified according to a range from medium to very high-risk intensity. These classes successively represent 3%, 49%, and 0.2% of the surface of the plain. Cultivated land and farms present a high to very high level of risk successively. In addition, with the exception of the salt mine, which presents a very high level of risk, the gas stations and cemeteries, as well as the railway line, represent a high level of risk.

Keywords: semi-arid, quality of water resources, risk assessment, vulnerability, contaminants

Procedia PDF Downloads 17
10828 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 323
10827 The Impact of Surface Roughness and PTFE/TiF3/FeF3 Additives in Plain ZDDP Oil on the Friction and Wear Behavior Using Thermal and Tribological Analysis under Extreme Pressure Condition

Authors: Gabi N. Nehme, Saeed Ghalambor

Abstract:

The use of titanium fluoride and iron fluoride (TiF3/FeF3) catalysts in combination with polutetrafluoroethylene (PTFE) in plain zinc dialkyldithiophosphate (ZDDP) oil is important for the study of engine tribocomponents and is increasingly a strategy to improve the formation of tribofilm and to provide low friction and excellent wear protection in reduced phosphorus plain ZDDP oil. The influence of surface roughness and the concentration of TiF3/FeF3/PTFE were investigated using bearing steel samples dipped in lubricant solution @100°C for two different heating time durations. This paper addresses the effects of water drop contact angle using different surface finishes after treating them with different lubricant combination. The calculated water drop contact angles were analyzed using Design of Experiment software (DOE) and it was determined that a 0.05 μm Ra surface roughness would provide an excellent TiF3/FeF3/PTFE coating for antiwear resistance as reflected in the scanning electron microscopy (SEM) images and the tribological testing under extreme pressure conditions. Both friction and wear performance depend greatly on the PTFE/and catalysts in plain ZDDP oil with 0.05% phosphorous and on the surface finish of bearing steel. The friction and wear reducing effects, which was observed in the tribological tests, indicated a better micro lubrication effect of the 0.05 μm Ra surface roughness treated at 100°C for 24 hours when compared to the 0.1 μm Ra surface roughness with the same treatment.

Keywords: scanning electron microscopy, ZDDP, catalysts, PTFE, friction, wear

Procedia PDF Downloads 314
10826 Fear of Crime Among Females on University Campuses

Authors: Shahed, Tala, Ahlam, Marah, Sara, Shaden

Abstract:

Research on fear of crime has shown that there are many influences on it, including gender, age, and geographic location. For example, women are more afraid of crime than men. The campus has a high crime rate and fear of crime due to many hiding places and blind spots; women are more likely than men to be victims of certain types of crime, such as rape and verbal and sexual harassment. And it became clear that older female students have a different perception of the place over time and other knowledge and fear of it, another study at Hashemite University. This study aims to understand better how the environment affects the negative experiences of female students and how their age and familiarity environment affects their sense of safety. This study also examines whether CPTED can be used to help prevent crime. The Broken Windows Theory also states that crime occurs in areas with overt indications of criminal activity, antisocial behavior, and civil unrest. This is related to the principle of CPTED maintenance and monitoring, activity support, regional development, and access control. Given their increased vulnerability to harassment, “sexual harassment” can refer to different behaviors. On campuses, harassment was happening everywhere, but it was most prevalent in "blind spots" that were out of sight and deserted. This study uses a methodology based on quantitative data that depends on putting a number on the amount of a particular phenomenon that exists in the world. The main finding shows how CPTED works in an academic context and what adjustments need to be made.

Keywords: Hashmite University, CPTED, crime prevention, university campus, fear of crime, female faer, broken window theory

Procedia PDF Downloads 56
10825 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 311
10824 Physical Dynamics of Planet Earth and Their Implications for Global Climate Change and Mitigation: A Case Study of Sistan Plain, Balochistan Region, Southeastern Iran

Authors: Hamidoddin Yousefi, Ahmad Nikbakht

Abstract:

The Sistan Plain, situated in the Balochistan region of southeastern Iran, is renowned for its arid climatic conditions and prevailing winds that persist for approximately 120 days annually. The region faces multiple challenges, including drought susceptibility, exacerbated by wind erosion, temperature fluctuations, and the influence of policies implemented by neighboring Afghanistan and Iran. This study focuses on investigating the characteristics of jet streams within the Sistan Plain and their implications for global climate change. Various models are employed to analyze convective mass fluxes, horizontal moisture transport, temporal variance, and the calculation of radiation convective equilibrium within the atmosphere. Key considerations encompass the distribution of relative humidity, dry air, and absolute humidity. Moreover, the research aims to predict the interplay between jet streams and human activities, particularly regarding their environmental impacts and water scarcity. The investigation encompasses both local and global environmental consequences, drawing upon historical climate change data and comprehensive field research. The anticipated outcomes of this study hold substantial potential for mitigating global climate change and its associated environmental ramifications. By comprehending the dynamics of jet streams and their interconnections with human activities, effective strategies can be formulated to address water scarcity and minimize environmental degradation.

Keywords: Sistani plain, Baluchistan, Hamoun lake, climate change, jet streams, environmental impact, water scarcity, mitigation

Procedia PDF Downloads 38
10823 Building a Measure of Sensory Preferences For (Wrestling and Boxing) Players

Authors: Mohamed Nabhan

Abstract:

The research aims to build a measure of sensory preferences for (wrestling and boxing) players. The researchers used the descriptive approach and a sample of (8) consisting of (40) wrestling players, (40) boxing players with different scales, and they were chosen in a deliberate random way, and the most important results were that there were statistically significant differences between wrestlers and boxers in the sensory preferences of their senses. There is no indication in the sensory preferences for the senses of “sight and hearing” and that the significance is in favor of the wrestlers in the senses of “sight and touch,” and there is a convergence in the sense of hearing. Through the value of the averagesAfter collecting the data and statistical treatments and the results reached by the researcher, it was possible to reach: The following conclusions and recommendations: There are differences between wrestling and boxing players in their sensory preferences, the senses used in learning, due to several reasons, the most important of which may be as follows:- Scales for the player and for each sport separately. The nature of the game, the performance of skills, and dealing with the opponent or competitor.Tools used in performance and training.

Keywords: sensory preferences, sensory scale, wrestling players, boxing players

Procedia PDF Downloads 84
10822 Controlled Size Synthesis of ZnO and PEG-ZnO NPs and Their Biological Evaluation

Authors: Mahnoor Khan, Bashir Ahmad, Khizar Hayat, Saad Ahmad Khan, Laiba Ahmad, Shumaila Bashir, Abid Ali Khan

Abstract:

The objective of this study was to synthesize the smallest possible size of ZnO NPs using a modified wet chemical synthesis method and to prepare core shell using polyethylene glycol (PEG) as shell material. Advanced and sophisticated techniques were used to confirm the synthesis, size, and shape of these NPs. Rounded, clustered NPs of size 5.343 nm were formed. Both the plain and core shell NPs were tested against MDR bacteria (E. cloacae, E. amnigenus, Shigella, S. odorifacae, Citrobacter, and E. coli). Both of the NPs showed excellent antibacterial properties, whereas E. cloacae showed maximum zone of inhibition of 16 mm, 27 mm, and 32 mm for 500 μg/ml, 1000 μg/ml, and 1500 μg/ml, respectively for plain ZnO NPs and 18 mm, 28 mm and 35 mm for 500 μg/ml, 1000 μg/ml and 1500 μg/ml for core shell NPs. These NPs were also biocompatible on human red blood cells showing little hemolysis of only 4% for 70 μg/ml for plain NPs and 1.5% for 70 μg/ml for core shell NPs. Core shell NPs were highly biocompatible because of the PEG. Their therapeutic effect as photosensitizers in photodynamic therapy (PDT) for cancer treatment was also monitored. The cytotoxicity of ZnO and PEG-ZnO was evaluated using MTT assay. Our results demonstrated that these NPs could generate ROS inside tumor cells after irradiation which in turn initiates an apoptotic pathway leading to cell death hence proving to be an effective candidate for PDT.

Keywords: ZnO, hemolysis, cytotoxiciy assay, photodynamic therapy, antibacterial

Procedia PDF Downloads 107
10821 The Use Management of the Knowledge Management and the Information Technologies in the Competitive Strategy of a Self-Propelling Industry

Authors: Guerrero Ramírez Sandra, Ramos Salinas Norma Maricela, Muriel Amezcua Vanesa

Abstract:

This article presents the beginning of a wider study that intends to demonstrate how within organizations of the automotive industry from the city of Querétaro. Knowledge management and technological management are required, as well as people’s initiative and the interaction embedded at the interior of it, with the appropriate environment that facilitates information conversion with wide information technologies management (ITM) range. A company was identified for the pilot study of this research, where descriptive and inferential research information was obtained. The results of the pilot suggest that some respondents did noted entity the knowledge management topic, even if staffs have access to information technology (IT) that serve to enhance access to knowledge (through internet, email, databases, external and internal company personnel, suppliers, customers and competitors) data, this implicates that there are Knowledge Management (KM) problems. The data shows that academically well-prepared organizations normally do not recognize the importance of knowledge in the business, nor in the implementation of it, which at the end is a great influence on how to manage it, so that it should guide the company to greater in sight towards a competitive strategy search, given that the company has an excellent technological infrastructure and KM was not exploited. Cultural diversity is another factor that was observed by the staff.

Keywords: Knowledge Management (KM), Technological Knowledge Management (TKM), Technology Information Management (TI), access to knowledge

Procedia PDF Downloads 473
10820 External Retinal Prosthesis Image Processing System Used One-Cue Saliency Map Based on DSP

Authors: Yili Chen, Jixiang Fu, Zhihua Liu, Zhicheng Zhang, Rongmao Li, Nan Fu, Yaoqin Xie

Abstract:

Retinal prothesis is designed to help the blind to get some sight.It is made up of internal part and external part.In external part ,there is made up of camera, image processing, and RF transmitter.In internal part, there is RF receiver, implant chip,micro-electrode.The image got from the camera should be processed by suitable stragies to corresponds to stimulus the electrode.Nowadays, the number of the micro-electrode is hundreds and we don’t know the mechanism how the elctrode stimulus the optic nerve, an easy way to the hypothesis is that the pixel in the image is correspondence to the electrode.So it is a question how to get the important information of the image captured from the picture.There are many strategies to experimented to get the most important information as soon as possible, due to the real time system.ROI is a useful algorithem to extract the region of the interest.Our paper will explain the details of the orinciples and functions of the ROI.And based on this, we simplified the ROI algrithem,and used it in outside image prcessing DSP system of the retinal prothesis.Results show that our image processing stratiges is suitable for real-time retinal prothesis and can cut redundant information and help useful information to express in the low-size image.

Keywords: image processing, region of interest, saliency map, low-size image, useful information express, cut redundant information in image

Procedia PDF Downloads 251