Search results for: rationalized hiding
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 92

Search results for: rationalized hiding

62 Establishment of Bit Selective Mode Storage Covert Channel in VANETs

Authors: Amarpreet Singh, Kimi Manchanda

Abstract:

Intended for providing the security in the VANETS (Vehicular Ad hoc Network) scenario, the covert storage channel is implemented through data transmitted between the sender and the receiver. Covert channels are the logical links which are used for the communication purpose and hiding the secure data from the intruders. This paper refers to the Establishment of bit selective mode covert storage channels in VANETS. In this scenario, the data is being transmitted with two modes i.e. the normal mode and the covert mode. During the communication between vehicles in this scenario, the controlling of bits is possible through the optional bits of IPV6 Header Format. This implementation is fulfilled with the help of Network simulator.

Keywords: covert mode, normal mode, VANET, OBU, on-board unit

Procedia PDF Downloads 338
61 Secured Transmission and Reserving Space in Images Before Encryption to Embed Data

Authors: G. R. Navaneesh, E. Nagarajan, C. H. Rajam Raju

Abstract:

Nowadays the multimedia data are used to store some secure information. All previous methods allocate a space in image for data embedding purpose after encryption. In this paper, we propose a novel method by reserving space in image with a boundary surrounded before encryption with a traditional RDH algorithm, which makes it easy for the data hider to reversibly embed data in the encrypted images. The proposed method can achieve real time performance, that is, data extraction and image recovery are free of any error. A secure transmission process is also discussed in this paper, which improves the efficiency by ten times compared to other processes as discussed.

Keywords: secure communication, reserving room before encryption, least significant bits, image encryption, reversible data hiding

Procedia PDF Downloads 375
60 Evaluating Factors Impacting Functioning Management Control Systems Becoming Dysfunctional Beyond Intra-Organizational Boundaries

Authors: Martin Kartomo

Abstract:

Though Management Control Systems (MCS) research has evolved beyond intra-organizational boundaries, there is limited understanding of the impact of a functioning MCS being functional beyond intra-organizational boundaries. The purpose of this research is to investigate factors that have an impact on functioning management Control Systems (MCS)becoming (dys-)functional beyond its intra-organizational boundaries. To bridge the theoretical gap, a systematic literature review is conducted to identify inter-and extra-organizational factors that are purposely suggested or unintendingly mentioned by MCS researchers to evaluate functioning MCS becoming (dys-)functional. A conceptual map is rationalized and constructed from five contingent inter-and extra-organizational MCS frameworks illuminating under-investigated MSC research areas and allowing new research avenues based on academically known factors. A multiple case study followed by a co-researcher discussion group with the purpose of identifying academically unknown factors for evaluating MCS (dys-)functionality beyond its intra-organizational boundaries. The study's result will help bridge the gap between what academics know and not know of evaluating MCS being functional beyond intra-organizational boundaries with the opportunity to develop better, more complete theories. Furthermore, it will help organizations to evaluate the impact of their activities beyond intra-organizational boundaries.

Keywords: management control systems, management control systems evaluation, management controls, control system

Procedia PDF Downloads 151
59 Fast Reductive Defluorination of Branched Perfluorooctane Sulfonic Acids by Cobalt Phthalocyanine: Electrochemical Studies and Mechanistic Insights

Authors: Maryam Mirabediny, Tsz Tin Yu, Jun Sun, Matthew Lee, Denis M. O’Carroll, Michael J. Manefield, Björn Akermark, Biswanath Das, Naresh Kumar

Abstract:

Branched perfluorooctane sulfonic acid (PFOS) is recognized as a threatening environmental pollutant due to its high persistence and bioaccumulation in various environmental matrices as well as for its toxic effects on humans and wildlife, even at very low concentrations. This study reports the first investigation of branched PFOS defluorination catalyzed by metal phthalocyanines. The reaction conditions were optimized using the different reductants and temperatures. Cobalt phthalocyanine, when combined with Ti citrate as a reducing agent, was able to defluorinate 10.9% of technical PFOS within 8 hours. In contrast, vitamin B12 only showed 2.4% defluorination during the same period under similar conditions. The defluorination mediated by cobalt phthalocyanine and Ti citrate system corresponds to 54.5% of all branched PFOS isomers (br-PFOS isomers). Isomer-specific degradation was also investigated via high-resolution LC-orbitrap, followed by their relative rates. The difference in catalytic efficacy of various phthalocyanine complexes is rationalized by their structures and electrochemical response. Lastly, a new defluorination mechanism is proposed based on the newly detected degradation products after the phthalocyanines treatment and the previous studies.

Keywords: branched isomers, catalyst, reductive defluorination, water remediation

Procedia PDF Downloads 73
58 Towards an Adornian Critical Theory of the Environment

Authors: Dominic Roulx

Abstract:

Many scholars have in the past decade emphasized the relevance of Adorno’s criticism of the rationalized domination of nature (Naturbeherrschung) for thinking the environmental crisis. Beyond the intersubjective critical models of thinkers such as Habermas and Honneth, Adorno’s critical theory has the benefit, according to them, of disclosing the entwinement of social and natural domination in a critically productive way. The author will be arguing in this paper that Adorno’s model of critical theory displays a theoretical framework that is both original and relevant for thinking the ins and outs of the currentenvironmental crisis. To do so, he first construe Adorno’s understanding of the historical domination of nature and argue that Adorno’s method for its criticizing is immanent critique. He puts emphasis on how his understanding of the domination of nature implicitly implies an account of thedialectical relationship between reason and nature. In doing so, he presents a naturalistic understanding of his idea of the primacy of the object. Second, regarding Adorno’s concept of nature, he discusses what he sees as the shortcomings of many commentators’ understanding of the concept of nature in Adorno. He contends that they tend to fall short of Adorno’s concept of nature in failing to make sense of its thoroughly negative signification, thereby falling into an uncritical and fetichized comprehension of “nature. Third, he discusses the prospect for a possible “reconciliation” (Versöhnung) of nature with society. Highlighting how the domination of nature proves to produce the necessary conditions for its own overcoming, he contends that reconciliation with nature relies mainly on the subject’s capacity for critical self-reflection.

Keywords: german philosophy, adorno, nature, environmental crisis

Procedia PDF Downloads 60
57 Performants: Making the Organization of Concerts Easier

Authors: Ioannis Andrianakis, Panagiotis Panagiotopoulos, Kyriakos Chatzidimitriou, Dimitrios Tampakis, Manolis Falelakis

Abstract:

Live music, whether performed in organized venues, restaurants, hotels or any other spots, creates value chains that support and develop local economies and tourism development. In this paper, we describe PerformAnts, a platform that increases the mobility of musicians and their accessibility to remotely located venues by rationalizing the cost of live acts. By analyzing the event history and taking into account their potential availability, the platform provides bespoke recommendations to both bands and venues while also facilitating the organization of tours and helping rationalize transportation expenses by realizing an innovative mechanism called “chain booking”. Moreover, the platform provides an environment where complicated tasks such as technical and financial negotiations, concert promotion or copyrights are easily manipulated by users using best practices. The proposed solution provides important benefits to the whole spectrum of small/medium size concert organizers, as the complexity and the cost of the production are rationalized. The environment is also very beneficial for local talent, musicians that are very mobile, venues located away from large urban areas or in touristic destinations, and managers who will be in a position to coordinate a larger number of musicians without extra effort.

Keywords: machine learning, music industry, creative industries, web applications

Procedia PDF Downloads 70
56 The Populist Rhetoric: The Symmetry of Environmentalism and Gandhianism in the Indian Mainstream Academia

Authors: Akanksha Indora

Abstract:

Environmental problems are considered a vital social issue in terms of the world’s problems with pollution, environmental degradation, and resource depletion. And populism is about appropriating the social issues according to the social condition for mobilizing a mass and constructing a ‘general will’. Populism encourages a move towards a common cause, it channelizes the emotions of the ‘common people’ towards a nation and nature. The Gandhian ideology has been received as a dominant ideology and the ‘only’ solution to environmental problems. This paper strives to understand the symmetry of environmentalism and Gandhianismi.e., how the debate on the environment in India has been primarily studied through the Gandhian ideology. The Indian Social Sciences visualize the broader issues of the environment from these perspectives, thus, making it a hegemonic approach. Being anti pluralist rhetoric is major rhetoric in the becoming of a populist. This paper shall focus on the idea that how this hegemonic construction of Gandhian ideology in the debates on environmentalism has contributed to the making of anti-pluralistic rhetoric. This anti-pluralistic rhetoric has eliminated the possibility of a pluralistic perspective in the debates on the environment. The quest for a moral inspiration embedded in Gandhianism, whose situatedness is found in the Hindu Social order, seems to have been completely rationalized through the larger politics of knowledge and thus making it appear as the only way forward when it is not.

Keywords: environmental populism, gandhianism, populist rhetoric, environmentalism

Procedia PDF Downloads 74
55 A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites

Authors: Che-Wei Lee, Bay-Erl Lai

Abstract:

A new steganographic method via the use of numeric data on public websites with self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the selected numeric items in a website as if they are part of the website’s numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego-numeric-content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.

Keywords: steganography, data hiding, secret authentication, secret sharing

Procedia PDF Downloads 217
54 An Empirical Investigation into the Effect of Macroeconomic Policy on Economic Growth in Nigeria

Authors: Rakiya Abba

Abstract:

This paper investigates the effect of the money supply, exchange and interest rate on economic growth in Nigeria through the application of Augmented Dickey-Fuller technique in testing the unit root property of the series and Granger causality test of causation between GDP, money supply, the exchange, and interest rate. The results of unit root suggest that all the variables in the model are stationary at 1, 5 and 10 percent level of significance, and the results of Causality suggest that money supply and exchange granger cause IR, the result further reveals two – way causation existed between M2 and EXR while IR granger cause GDP the null hypothesis is rejected and GDP does not granger cause IR as indicated by their probability values of 0.4805 and confirmed by F-statistics values of 0.75483. The results revealed that M2 and EXR do not granger causes GDP, the null hypothesis is accepted at 75percent 18percent respectively as indicated by their probability values of 0.7472 and 0.1830 respectively; also, GDP does not granger cause M2 and EXR. The Johansen cointegration result indicates that despite GDP does not granger cause M2, IR, and EXR, but there existed 1 cointegrating equation, implying the existence of long-run relationship between GDP, M2 IR, and EXR. A major policy implication of this result is that economic growth is function of and money supply and exchange rate, effective monetary policies should direct on manipulating instruments and importance should be placed on justification for adopting a particular policy be rationalized in order to increase growth in economy

Keywords: economic growth, money supply, interest rate, exchange rate, causality

Procedia PDF Downloads 242
53 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 268
52 A Machine Learning Approach to Detecting Evasive PDF Malware

Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran

Abstract:

The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.

Keywords: PDF, PDF malware, decision tree classifier, random forest classifier

Procedia PDF Downloads 55
51 Philippine English: An Exploratory Mixed-Methods Inquiry on Digital Immigrants and Digital Natives' Variety

Authors: Lesley Karen Penera

Abstract:

Despite the countless that has been drawn to investigate Philippine English for a myriad of reasons, none was known to have ventured on a probe of its grammatical features as used in a technology-driven linguistic landscape by two generations in the digital age. Propelled by the assumption of an emerging Philippine English variety, this paper determined the grammatical features that characterize the digital native-immigrants’ Philippine English. It also ascertained whether mistake or deviation instigated the use of the features, and established this variety’s level of comprehensibility. This exploratory mixed-methods inquiry employed some qualitative and quantitative data drawn from a social networking site, the digital native-immigrant group, and the comprehensibility-raters who were selected through non-random purposive sampling. The study yields 8 grammatical features, mostly deemed results of deviation, yet the texts characterized by such features were mostly rated with excellent comprehensibility. This substantiates some of the grammatical features identified in earlier studies, provides evidentiary proof that the digital groups’ Philippine English is not bound by the standard of syntactic accuracy and corroborates the assertion on language’s manipulability as an instrument fashioned to satisfy the users’ need for successful communication in actual instances for use of English past the walls of any university where the variety is cultivated. The same could also be rationalized by some respondents’ position on grammar and accuracy to be less vital than one’s facility to communicate effectively.

Keywords: comprehensibility, deviation, digital immigrants, digital natives, mistake, Philippine English variety

Procedia PDF Downloads 132
50 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 450
49 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 323
48 The Public Relations Activities on Social Networking Sites for Communication to the Customer: Case Study the Company in Thailand

Authors: Phakit Treesukol

Abstract:

The purpose of this investigation is to ascertain Internet users’ behaviours towards companies’ public relations activities on social networking sites. In order to conduct a study of Internet users’ behaviour, data was collected using the quota sampling method from a total of 100 Internet users who are members of SNS and used the Internet during the period 10 December 2009 to 9 January 2010. An online self-administrated questionnaire was distributed through Facebook, Hi5 and Twitter to Internet users by using snowball sampling technique. Results of the study showed that the majority of the respondents were using social networking sites with the main purpose to contact their friends. Presently, most of the respondents were not regularly receiving companies’ public relations activities on social networking sites. The highest frequency of survey responses by the respondents was for hiding or deleting information introducing new products or services from companies on SNS also as well.

Keywords: media uses and gratification, online activities, public relations activities, social networking sites

Procedia PDF Downloads 225
47 A Hybrid Watermarking Model Based on Frequency of Occurrence

Authors: Hamza A. A. Al-Sewadi, Adnan H. M. Al-Helali, Samaa A. K. Khamis

Abstract:

Ownership proofs of multimedia such as text, image, audio or video files can be achieved by the burial of watermark is them. It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications would be in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: authentication, copyright protection, information hiding, ownership, watermarking

Procedia PDF Downloads 541
46 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 346
45 Text Based Shuffling Algorithm on Graphics Processing Unit for Digital Watermarking

Authors: Zayar Phyo, Ei Chaw Htoon

Abstract:

In a New-LSB based Steganography method, the Fisher-Yates algorithm is used to permute an existing array randomly. However, that algorithm performance became slower and occurred memory overflow problem while processing the large dimension of images. Therefore, the Text-Based Shuffling algorithm aimed to select only necessary pixels as hiding characters at the specific position of an image according to the length of the input text. In this paper, the enhanced text-based shuffling algorithm is presented with the powered of GPU to improve more excellent performance. The proposed algorithm employs the OpenCL Aparapi framework, along with XORShift Kernel including the Pseudo-Random Number Generator (PRNG) Kernel. PRNG is applied to produce random numbers inside the kernel of OpenCL. The experiment of the proposed algorithm is carried out by practicing GPU that it can perform faster-processing speed and better efficiency without getting the disruption of unnecessary operating system tasks.

Keywords: LSB based steganography, Fisher-Yates algorithm, text-based shuffling algorithm, OpenCL, XORShiftKernel

Procedia PDF Downloads 121
44 Stability Optimization of NABH₄ via PH and H₂O:NABH₄ Ratios for Large Scale Hydrogen Production

Authors: Parth Mehta, Vedasri Bai Khavala, Prabhu Rajagopal, Tiju Thomas

Abstract:

There is an increasing need for alternative clean fuels, and hydrogen (H₂) has long been considered a promising solution with a high calorific value (142MJ/kg). However, the storage of H₂ and expensive processes for its generation have hindered its usage. Sodium borohydride (NaBH₄) can potentially be used as an economically viable means of H₂ storage. Thus far, there have been attempts to optimize the life of NaBH₄ (half-life) in aqueous media by stabilizing it with sodium hydroxide (NaOH) for various pH values. Other reports have shown that H₂ yield and reaction kinetics remained constant for all ratios of H₂O to NaBH₄ > 30:1, without any acidic catalysts. Here we highlight the importance of pH and H₂O: NaBH₄ ratio (80:1, 40:1, 20:1 and 10:1 by weight), for NaBH₄ stabilization (half-life reaction time at room temperature) and corrosion minimization of H₂ reactor components. It is interesting to observe that at any particular pH>10 (e.g., pH = 10, 11 and 12), the H₂O: NaBH₄ ratio does not have the expected linear dependence with stability. On the contrary, high stability was observed at the ratio of 10:1 H₂O: NaBH₄ across all pH>10. When the H₂O: NaBH₄ ratio is increased from 10:1 to 20:1 and beyond (till 80:1), constant stability (% degradation) is observed with respect to time. For practical usage (consumption within 6 hours of making NaBH₄ solution), 15% degradation at pH 11 and NaBH₄: H₂O ratio of 10:1 is recommended. Increasing this ratio demands higher NaOH concentration at the same pH, thus requiring a higher concentration or volume of acid (e.g., HCl) for H₂ generation. The reactions are done with tap water to render the results useful from an industrial standpoint. The observed stability regimes are rationalized based on complexes associated with NaBH₄ when solvated in water, which depend sensitively on both pH and NaBH₄: H₂O ratio.

Keywords: hydrogen, sodium borohydride, stability optimization, H₂O:NaBH₄ ratio

Procedia PDF Downloads 90
43 Photophysics and Rotational Relaxation Dynamics of 6-Methoxyquinoline Fluorophore in Cationic Alkyltrimethylammonium Bromide Micelles

Authors: Tej Varma Y, Debi D. Pant

Abstract:

Photophysics and rotational dynamics of the fluorescent probe, 6-methoxyquinoline (6MQ) with cationic surfactant, alkyltrimethylammonium bromide (nTAB) micelle solutions have been investigated (n = 12, 14 and 16). Absorption and emission peaks of the dye have been observed to shift at concentrations around critical micellar concentration (cmc) of nTAB compared to that of bulk solutions suggesting probe is in a lower polar environment. The probe senses changes in polarity (ET (30)) brought about by variation of surfactant chain length concentration and is invariably solubilized in the aqueous interface or palisade layer. The order of change in polarity observed was DTAB > CTAB > TTAB. The binding constant study shows that the probe binds strongest with TTAB (is of the order TTAB > CTAB > DTAB) due to deeper penetration into the micelle. The anisotropy decay for the probe in all the nTAB micelles studied have been rationalized based on a two-step model consisting of fast-restricted rotation of the probe and slow lateral diffusion of the probe in the micelle that is coupled to the overall rotation of the micelle. Fluorescence lifetime measurements of probe in the cationic micelles demonstrate the close proximity of the 6MQ to the Br - counterions. The fluorescence lifetimes of TTAB and DTAB are much shorter than in CTAB. These results indicate that 6MQ resides to a substantial degree in the head group region of the micelles. All the changes observed in the steady state fluorescence, microenvironment, fluorescence lifetimes, fluorescence anisotropy, and other calculations are in agreement with each other suggesting binding of the cationic surfactant with the neutral dye molecule.

Keywords: photophysics, chain length, ntaB, micelles

Procedia PDF Downloads 605
42 Effect of Porous Multi-Layer Envelope System on Effective Wind Pressure of Building Ventilation

Authors: Ying-Chang Yu, Yuan-Lung Lo

Abstract:

Building ventilation performance is an important indicator of indoor comfort. However, in addition to the geometry of the building or the proportion of the opening, the ventilation performance is also very much related to the actual wind pressure of the building. There are more and more contemporary building designs built with multi-layer exterior envelope. Due to ventilation and view observatory requirement, the porous outer layer of the building is commonly adopted and has a significant wind damping effect, causing the phenomenon of actual wind pressure loss. However, the relationship between the wind damping effect and the actual wind pressure is not linear. This effect can make the indoor ventilation of the building rationalized to reasonable range under the condition of high wind pressure, and also maintain a good amount of ventilation performance under the condition of low wind pressure. In this study, wind tunnel experiments were carried out to simulate the different wind pressures flow through the porous outer layer, and observe the actual wind pressure strength engage with the window layer to find the decreasing relationship between the damping effect of the porous shell and the wind pressure. Experiment specimen scale was designed to be 1:50 for testing real-world building conditions; the study found that the porous enclosure has protective shielding without affecting low-pressure ventilation. Current study observed the porous skin may damp more wind energy to ease the wind pressure under high-speed wind. Differential wind speed may drop the pressure into similar pressure level by using porous skin. The actual mechanism and value of this phenomenon will need further study in the future.

Keywords: multi-layer facade, porous media, wind damping, wind tunnel test, building ventilation

Procedia PDF Downloads 106
41 High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks

Authors: Amal Khalifa, Nicolas Vana Santos

Abstract:

Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods.

Keywords: deep learning, steganography, image, discrete wavelet transform, fusion

Procedia PDF Downloads 42
40 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 260
39 Assessment of Low Income Housing Delivery, Accessibility and Affordability Problem in Nigeria

Authors: Asimiyu Mohammed Jinadu

Abstract:

Housing is a basic necessity of life. Housing plays a central role in the life of living organisms as it provides the basic platform for the life support systems in human settlements. It is considered a social service and a basic right. Despite the importance of housing, Nigeria as a nation is faced with the problem of quantitative and qualitative shortfall in the number of housing units required to accommodate the citizens. This study examined the accessibility and affordability problems of low-income housing in Nigeria. It relied on secondary data obtained for the records of government ministries and agencies. Descriptive statistics were used in the analysis, and the information was presented in simple tables and charts. The findings show that over the years the government has provided serviced plots of land, owner occupier houses and mortgage loans for the people. As at 2016, the Federal Housing Authority (FHA) has completed a total of 23,038 housing units while another 14, 488 units were on-going under the Public Private Partnership scheme across the country. The study revealed that a total of 910, 671 housing units were proposed by the Government under the various low-income housing programmes between 1960 and 2017, but only 156, 336 units were delivered within the period, representing 17.17% success rate. Amongst others, the low-income group faced the problems of low access to and unaffordability of the few low-income housing delivered in Nigeria. The study recommended that all abandoned housing projects should be reviewed, rationalized, completed and made available to the targeted low-income people. Investment in micro housing finance, design and implementation of pro-poor housing programme and massive investment in innovative slum upgrading programmes by both the government and private sector are also recommended to ameliorate the housing problems of the low-income group in Nigeria.

Keywords: housing, low income group, problem, programme

Procedia PDF Downloads 221
38 Low Probability of Intercept (LPI) Signal Detection and Analysis Using Choi-Williams Distribution

Authors: V. S. S. Kumar, V. Ramya

Abstract:

In the modern electronic warfare, the signal scenario is changing at a rapid pace with the introduction of Low Probability of Intercept (LPI) radars. In the modern battlefield, radar system faces serious threats from passive intercept receivers such as Electronic Attack (EA) and Anti-Radiation Missiles (ARMs). To perform necessary target detection and tracking and simultaneously hide themselves from enemy attack, radar systems should be LPI. These LPI radars use a variety of complex signal modulation schemes together with pulse compression with the aid of advancement in signal processing capabilities of the radar such that the radar performs target detection and tracking while simultaneously hiding enemy from attack such as EA etc., thus posing a major challenge to the ES/ELINT receivers. Today an increasing number of LPI radars are being introduced into the modern platforms and weapon systems so these LPI radars created a requirement for the armed forces to develop new techniques, strategies and equipment to counter them. This paper presents various modulation techniques used in generation of LPI signals and development of Time Frequency Algorithms to analyse those signals.

Keywords: anti-radiation missiles, cross terms, electronic attack, electronic intelligence, electronic warfare, intercept receiver, low probability of intercept

Procedia PDF Downloads 409
37 The Impact of Initiators on Fast Drying Traffic Marking Paint

Authors: Maryam Taheri, Mehdi Jahanfar, Kenji Ogino

Abstract:

Fast drying traffic marking paint comprising a solvent-borne resin, a filler, a pigment and a solvent that is especially suitable for colder ambient (temperatures near freezing) applications, where waterborne traffic paint cannot be used. Acrylic resins based on methyl methacrylate, butyl acrylate, acrylic acid, and styrene were synthesized in different solvents using organic peroxide initiators such as peroxyester, peroxyketal, dialkylperoxide and azo. After polymerization, the molecular weight (Mw), polydispersity index= PDI (Mw/Mn), viscosity, total residual monomer and APHA color were evaluated and results of organic peroxide initiators (t- butyl and t-amyl derivatives) were also compared with the azo initiator. The Mw, PDI, viscosity, mass conversation and APHA color of resins with t-amyl derivatives of organic peroxide initiators are very proper. The results of the traffic marking paints test such as non-volatile matter, no- pick- up time, hiding power, resistance to wear and water resistance study that produced with these resins also confirm this.

Keywords: fast drying traffic marking paint, acrylic resin, organic peroxide initiator, peroxyester, peroxyketal, dialkylperoxide and azo initiator

Procedia PDF Downloads 177
36 Using OMICs Approaches to Investigate Venomic Insights into the Spider Web Silk

Authors: Franciele G. Esteves, Jose R. A. dos Santos-Pinto, Caroline L. de Souza, Mario S. Palma

Abstract:

Orb-weaving spiders use a very strong, stickiness, and elastic web to catch the prey. These web properties would be enough for the entrapment of prey; however, these spiders may be hiding venomous secrets on the web, which are being revealed now. Here we provide strong proteome, peptidome, and transcriptomic evidence for the presence of toxic components on the web silk from Nephila clavipes. Our scientific outcomes revealed, both in the web silk and in the silk-producing glands, a wide diversity of toxins/neurotoxins, defensins, and proteolytic enzymes. These toxins/neurotoxins are similar to toxins isolated from animal venoms, such as Sphigomyelinase D, Latrotoxins, Zodatoxins, Ctenitoxin Pn and Pk, Agatoxins and Theraphotoxin. Moreover, the insect-toxicity results with the web silk crude extract demonstrated that these toxic components can be lethal and/or cause paralytic effects to the prey. Therefore, through OMICs approaches, the results presented until now may contribute to a better understanding of the chemical and ecological interaction of these compounds in insect-prey capture by spider web N. clavipes, demonstrating that the web is not only a simple mechanical tool but has a chemical-active involvement in prey capture. Moreover, the results can also contribute to future studies of possible development of a selective insecticide or even in possible pharmacological applications.

Keywords: web silk toxins, silk-produncing glands, de novo transcriptome assembly, LCMS-based proteomics

Procedia PDF Downloads 104
35 Disaster Victim Identification: A Social Science Perspective

Authors: Victor Toom

Abstract:

Albeit it is never possible to anticipate the full range of difficulties after a catastrophe, efforts to identify victims of mass casualty events have become institutionalized and standardized with the aim of effectively and efficiently addressing the many challenges and contingencies. Such ‘disaster victim identification’ (DVI) practices are dependent on the forensic sciences, are subject of national legislation, and are reliant on technical and organizational protocols to mitigate the many complexities in the wake of catastrophe. Apart from such technological, legal and bureaucratic elements constituting a DVI operation, victims’ families and their emotions are also part and parcel of any effort to identify casualties of mass human fatality incidents. Take for example the fact that forensic experts require (antemortem) information from the group of relatives to make identification possible. An identified body or body part is also repatriated to kin. Relatives are thus main stakeholders in DVI operations. Much has been achieved in years past regarding facilitating victims’ families’ issues and their emotions. Yet, how families are dealt with by experts and authorities is still considered a difficult topic. Due to sensitivities and required emphatic interaction with families on the one hand, and the rationalized DVI efforts, on the other hand, there is still scope for improving communication, providing information and meaningful inclusion of relatives in the DVI effort. This paper aims to bridge the standardized world of DVI efforts and families’ experienced realities and makes suggestions to further improve DVI efforts through inclusion of victims’ families. Based on qualitative interviews, the paper narrates involvement and experiences of inter alia DVI practitioners, victims’ families, advocates and clergy in the wake of the 1995 Srebrenica genocide which killed approximately 8,000 men, and the 9/11 in New York City with 2,750 victims. The paper shows that there are several models of including victims’ families into a DVI operation, and it argues for a model of where victims’ families become a partner in DVI operations.

Keywords: disaster victim identification (DVI), victims’ families, social science (qualitative), 9/11 attacks, Srebrenica genocide

Procedia PDF Downloads 202
34 Medical Image Watermark and Tamper Detection Using Constant Correlation Spread Spectrum Watermarking

Authors: Peter U. Eze, P. Udaya, Robin J. Evans

Abstract:

Data hiding can be achieved by Steganography or invisible digital watermarking. For digital watermarking, both accurate retrieval of the embedded watermark and the integrity of the cover image are important. Medical image security in Teleradiology is one of the applications where the embedded patient record needs to be extracted with accuracy as well as the medical image integrity verified. In this research paper, the Constant Correlation Spread Spectrum digital watermarking for medical image tamper detection and accurate embedded watermark retrieval is introduced. In the proposed method, a watermark bit from a patient record is spread in a medical image sub-block such that the correlation of all watermarked sub-blocks with a spreading code, W, would have a constant value, p. The constant correlation p, spreading code, W and the size of the sub-blocks constitute the secret key. Tamper detection is achieved by flagging any sub-block whose correlation value deviates by more than a small value, ℇ, from p. The major features of our new scheme include: (1) Improving watermark detection accuracy for high-pixel depth medical images by reducing the Bit Error Rate (BER) to Zero and (2) block-level tamper detection in a single computational process with simultaneous watermark detection, thereby increasing utility with the same computational cost.

Keywords: Constant Correlation, Medical Image, Spread Spectrum, Tamper Detection, Watermarking

Procedia PDF Downloads 163
33 Managing Risks of Civil War: Accounting Practices in Egyptian Households

Authors: Sumohon Matilal, Neveen Abdelrehim

Abstract:

The purpose of this study is to examine the way households manage the risks of civil war, using the calculative practices of accounting as a lens. As is the case with other social phenomena, accounting serves as a conduit for attributing values and rationales to crisis and in the process makes it visible and calculable. Our focus, in particular, is on the dialogue facilitated by the numerical logic of accounting between the householder and a crisis scenario, such as civil war. In other words, we seek to study how the risk of war is rationalized through household budgets, income and expenditure statements etc. and how such accounting constructs in turn shape attitudes toward earnings and spending in a wartime economy. The existing literature on war and accounting demonstrates how an accounting logic can have potentially destabilising consequences and how it is used to legitimise war. However, very few scholars have looked at the way accounting constructs are used to internalise the effects of war in an average household and the behavioural consequences that arise from such accounting. Relatedly, scholars studying household accounting have mostly focussed on the links between gender and hierarchy in relation to managing the financial affairs. Few have focused on the role of household accounts in a crisis scenario. This study intends to fill this gap. We draw upon Egypt, a country in the middle of civil war since 2011 for our purpose. We intend to carry out 15-20 semi-structured interviews with middle income households in Cairo that maintain some form of accounts to study the following issues: 1. How do people internalise the risks of civil war? What kind of accounting constructs do they use (this may take the form of simple budgets, income-expenditure notes/statements on a periodic basis, spreadsheets etc.) 2. How has civil war affected household expenditure? Are people spending more/less than before? 3. How has civil war affected household income? Are people finding it difficult/easy to survive on the pre-war income? 4. How is such accounting affecting household behaviour towards earnings and expenditure? Are families prioritising expenditure on necessities alone? Are they refraining from indulging in luxuries? Are family members doing two or three jobs to cope with difficult times? Are families increasingly turning toward borrowing? Is credit available? From whom?

Keywords: risk, accounting, war, crisis

Procedia PDF Downloads 179