Search results for: counter insurgency
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 121

Search results for: counter insurgency

91 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: Cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1156
90 Disparity in Socio-Economic Development and Its Implications on Communal Conflicts: A Study on India's North-Eastern Region

Authors: Debasis Neogi

Abstract:

India-s North-Eastern part, comprising of seven states, is a lowly developed, tribal population dominated region in India. Inspite of the common Mongoloid origin and lifestyle of majority of the population residing here, sharp differences exist in the status of their socio-economic development. The present paper, through a state-wise analysis, makes an attempt to find out the extent of this disparity, especially on the socio-economic front. It illustrates the situations prevailing in health, education, economic and social cohesion sector. Discussion on the implications of such disparity on social stability finds that the causes of frequent insurgency activities, that have been penetrating the region for a long time, thereby creating communal conflicts, can be traced in the economic deprivation and disparity. In the last section, the paper makes policy prescription and suggests how by taking care of disparity and deprivation both poverty and the problem of communal conflicts can be controlled.

Keywords: Disparity, development, deprivation, communal conflicts.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4740
89 Double Pass Solar Air Heater with Transvers Fins and without Absorber Plate

Authors: A. J. Mahmood, L. B. Y. Aldabbagh

Abstract:

The counter flow solar air heaters, with four transverse fins and wire mesh layers are constructed and investigated experimentally for thermal efficiency at a geographic location of Cyprus in the city of Famagusta. The absorber plate is replaced by sixteen steel wire mesh layers, 0.18 x 0.18cm in cross section opening and a 0.02cm in diameter. The wire mesh layers arranged in three groups, first and second include 6 layers, while the third include 4 layers. All layers fixed in the duct parallel to the glazing and each group separated from the others by wood frame thickness of 0.5cm to reduce the pressure drop. The transverse fins arranged in a way to force the air to flow through the bed like eight letter path with flow depth 3cm. The proposed design has increased the heat transfer rate, but on other hand causes a high pressure drop. The obtained results show that, for air mass flow rate range between 0.011-0.036kg/s, the thermal efficiency increases with increasing the air mass flow. The maximum efficiency obtained is 65.6% for the mass flow rate of 0.036kg/s. Moreover, the temperature difference between the outlet flow and the ambient temperature, ΔT, reduces as the air mass flow rate increase. The maximum difference between the outlet and ambient temperature obtained was 43°C for double pass for minimum mass flow rate of 0.011kg/s. Comparison with a conventional solar air heater collector shows a significantly development in the thermal efficiency.

Keywords: Counter flow, solar air heater (SAH), Wire mesh, Fins, Thermal efficiency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3181
88 The Application of Specialized Memory Manager in Interactive CAD Systems

Authors: Wei Song, Lian-he Yang

Abstract:

Interactive CAD systems have to allocate and deallocate memory frequently. Frequent memory allocation and deallocation can play a significant role in degrading application performance. An application may use memory in a very specific way and pay a performance penalty for functionality it does not need. We could counter that by developing specialized memory managers.

Keywords: Interactive CAD systems, Specialized Memory Manager.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1324
87 Countering Radicalization to Violent Extremism: A Comparative Study of Canada, the UK and South East Asia

Authors: Daniel Alati

Abstract:

Recent high-profile terrorist events in Canada, the United Kingdom and Europe – the London Bridge attacks, the terrorist attacks in Nice, France and Barcelona, Spain, the 2014 Ottawa Parliament attacks and the 2017 attacks in Edmonton – have all raised levels of public and academic concern with so-called “lone-wolf” and “radicalized” terrorism. Similarly, several countries outside of the “Western” world have been dealing with radicalization to violent extremism for several years. Many South East Asian countries, including Indonesia, Malaysia, Singapore and the Philippines have all had experience with what might be described as ISIS or extremist-inspired acts of terrorism. Indeed, it appears the greatest strength of groups such as ISIS has been their ability to spread a global message of violent extremism that has led to radicalization in markedly different jurisdictions throughout the world. These markedly different jurisdictions have responded with counter-radicalization strategies that warrant further comparative analysis. This paper utilizes an inter-disciplinary legal methodology. In doing so, it compares legal, political, cultural and historical aspects of the counter-radicalization strategies employed by Canada, the United Kingdom and several South East Asian countries (Indonesia, Malaysia, Singapore and the Philippines). Whilst acknowledging significant legal and political differences between these jurisdictions, the paper engages in these analyses with an eye towards understanding which best practices might be shared between the jurisdictions. In doing so, it presents valuable findings of a comparative nature that are useful to both academic and practitioner audiences in several jurisdictions.

Keywords: Canada, United Kingdom, South East Asia, comparative law and politics, radicalization to violent extremism, terrorism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1754
86 Watermark-based Counter for Restricting Digital Audio Consumption

Authors: Mikko Löytynoja, Nedeljko Cvejic, Tapio Seppänen

Abstract:

In this paper we introduce three watermarking methods that can be used to count the number of times that a user has played some content. The proposed methods are tested with audio content in our experimental system using the most common signal processing attacks. The test results show that the watermarking methods used enable the watermark to be extracted under the most common attacks with a low bit error rate.

Keywords: Digital rights management, restricted usage, content protection, spread spectrum, audio watermarking.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1466
85 Hydrogen Production by Gasification of Biomass from Copoazu Waste

Authors: Emilio Delgado, William Aperador, Alis Pataquiva

Abstract:

Biomass is becoming a large renewable resource for power generation; it is involved in higher frequency in environmentally clean processes, and even it is used for biofuels preparation. On the other hand, hydrogen – other energy source – can be produced in a variety of methods including gasification of biomass. In this study, the production of hydrogen by gasification of biomass waste is examined. This work explores the production of a gaseous mixture with high power potential from Amazonas´ specie known as copoazu, using a counter-flow fixed-bed bioreactor.

Keywords: Copoazu, Gasification, Hydrogen production.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1779
84 Modeling of Titanium Alloy Implant for Fractured Distal Femur

Authors: Abhishek Soni, Bhagat Singh

Abstract:

In the present work, reverse engineering (RE) approach has been used to create a 3D model of a fractured femur bone using the computed tomography (CT) scan data. Thereafter, counter fit fixation plates of Titanium alloy (Ti6Al4V) have been designed and analyzed considering physiological static loading conditions. From the analysis, it has been inferred that the stresses and deformation developed are quite low. It implies that these designed customized fixation plates are able to provide stable fixation resulting in improved fracture union.

Keywords: Biomechanical evaluations, customized implant, reverse engineering, titanium alloy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 721
83 A Literature Review on Nutritional Supplements for the Treatment of Obesity

Authors: Monika Nuffer, Wesley Nuffer

Abstract:

The problem of obesity is one that continues to be faced in the United States health care system and across the developing world. Prescription medications are available, but are often very expensive with minimal insurance coverage. The over-the-counter diet aid industry is a robust one, selling billions of dollars in products every year. It is important for clinicians to understand the myriad of different nutritional supplements marketed for obesity, and to weigh the evidence behind these products. This manuscript outlines the most commonly used nutritional supplements currently marketed for weight loss, reviewing the evidence with a focus on the efficacy and safety of these products.

Keywords: Obesity, weight loss, herbal products, nutritional supplements

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1895
82 Simulation and Analysis of Polyetheretherketone Implants for Diaphysis Femur Fracture

Authors: Abhishek Soni, Bhagat Singh

Abstract:

In the present work, reverse engineering approach has been used to create a 3D model of a fractured femur diaphysis bone using the computed tomography (CT) scan data. Thereafter, a counter fit fixation plate of polyetheretherketone (PEEK) composite has been designed and analyzed considering static physiological loading conditions. Static stress distribution and deformation analysis of the plate have been performed. From the analysis, it has been found that the stresses and deformation developed are quite low. This implies that these designed fixation plates will be able to provide stable fixation and thus resulting in improved fracture union.

Keywords: Customized implant, deformation, femur diaphysis, stress.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 684
81 A Retrospective Review of Sino-US Relations: Foreign Relations Strategies of Trump and Biden

Authors: Wanda Luen-Wun Siu, Xiaowen Zhang

Abstract:

This study used the methodology of a retrospective review to assess Sino-US relations and foreign relations strategies of Trump and Biden and found that while the Trump administration has ignited a trade war and a technology war with China, the stage is set for the Biden administration as to how it will handle Sino-US relations. We conclude that Biden is apparently tough on China and may counter the influence of China but will seek to maintain strategic cooperation with China on issues of mutual interest and there might be a renegotiation of the trade deal.

Keywords: Donald Trump, Joe Biden, Sino-US relations, US foreign relations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 790
80 A method of Authentication for Quantum Networks

Authors: Stefan Rass

Abstract:

Quantum cryptography offers a way of key agreement, which is unbreakable by any external adversary. Authentication is of crucial importance, as perfect secrecy is worthless if the identity of the addressee cannot be ensured before sending important information. Message authentication has been studied thoroughly, but no approach seems to be able to explicitly counter meet-in-the-middle impersonation attacks. The goal of this paper is the development of an authentication scheme being resistant against active adversaries controlling the communication channel. The scheme is built on top of a key-establishment protocol and is unconditionally secure if built upon quantum cryptographic key exchange. In general, the security is the same as for the key-agreement protocol lying underneath.

Keywords: Meet-in-the-middle attack, quantum key distribution, quantum networks, unconditionally secure authentication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1906
79 Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Authors: Erhan Turgut, Salih Ergün, Abdülkadir Öz

Abstract:

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Keywords: Terrorism, Counter-terrorism, Military Status Law-enforcement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2194
78 Decentralised Edge Authentication in the Industrial Enterprise IoT Space

Authors: C. P. Autry, A.W. Roscoe

Abstract:

Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication.

Keywords: Authentication, enterprise IoT cybersecurity, public key infrastructure, trusted third party.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 474
77 Efficacy of Anti-phishing Measures and Strategies - A Research Analysis

Authors: Gundeep Singh Bindra

Abstract:

Statistics indicate that more than 1000 phishing attacks are launched every month. With 57 million people hit by the fraud so far in America alone, how do we combat phishing?This publication aims to discuss strategies in the war against Phishing. This study is an examination of the analysis and critique found in the ways adopted at various levels to counter the crescendo of phishing attacks and new techniques being adopted for the same. An analysis of the measures taken up by the varied popular Mail servers and popular browsers is done under this study. This work intends to increase the understanding and awareness of the internet user across the globe and even discusses plausible countermeasures at the users as well as the developers end. This conceptual paper will contribute to future research on similar topics.

Keywords: Anti-phishing, countermeasures, effectiveness, fake pages, security analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2769
76 Comparative Analysis of Transient-Fault Tolerant Schemes for Network on Chips

Authors: Muhammad Ali, Awais Adnan

Abstract:

Network on a chip (NoC) has been proposed as a viable solution to counter the inefficiency of buses in the current VLSI on-chip interconnects. However, as the silicon chip accommodates more transistors, the probability of transient faults is increasing, making fault tolerance a key concern in scaling chips. In packet based communication on a chip, transient failures can corrupt the data packet and hence, undermine the accuracy of data communication. In this paper, we present a comparative analysis of transient fault tolerant techniques including end-to-end, node-by-node, and stochastic communication based on flooding principle.

Keywords: NoC, fault-tolerance, transient faults.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1366
75 Attacks and Counter Measures in BST Overlay Structure of Peer-To-Peer System

Authors: Guruprasad Khataniar, Hitesh Tahbildar, Prakriti Prava Das

Abstract:

There are various overlay structures that provide efficient and scalable solutions for point and range query in a peer-topeer network. Overlay structure based on m-Binary Search Tree (BST) is one such popular technique. It deals with the division of the tree into different key intervals and then assigning the key intervals to a BST. The popularity of the BST makes this overlay structure vulnerable to different kinds of attacks. Here we present four such possible attacks namely index poisoning attack, eclipse attack, pollution attack and syn flooding attack. The functionality of BST is affected by these attacks. We also provide different security techniques that can be applied against these attacks.

Keywords: BST, eclipse attack, index poisoning attack, pollution attack, syn flooding attack.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1621
74 Simulation of Obstacle Avoidance for Multiple Autonomous Vehicles in a Dynamic Environment Using Q-Learning

Authors: Andreas D. Jansson

Abstract:

The availability of inexpensive, yet competent hardware allows for increased level of automation and self-optimization in the context of Industry 4.0. However, such agents require high quality information about their surroundings along with a robust strategy for collision avoidance, as they may cause expensive damage to equipment or other agents otherwise. Manually defining a strategy to cover all possibilities is both time-consuming and counter-productive given the capabilities of modern hardware. This paper explores the idea of a model-free self-optimizing obstacle avoidance strategy for multiple autonomous agents in a simulated dynamic environment using the Q-learning algorithm.

Keywords: Autonomous vehicles, industry 4.0, multi-agent system, obstacle avoidance, Q-learning, simulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 513
73 Characteristic of Discrete Raman Amplifier at Different Pump Configurations

Authors: Parekhan M. Jaff

Abstract:

This paper describes the gain and noise performances of discrete Raman amplifier as a function of fiber lengths and the signal input powers for different pump configurations. Simulation has been done by using optisystem 7.0 software simulation at signal wavelength of 1550 nm and a pump wavelength of 1450nm. The results showed that the gain is higher in bidirectional pumping than in counter pumping, the gain changes with increasing the fiber length while the noise figure remain the same for short fiber lengths and the gain saturates differently for different pumping configuration at different fiber lengths and power levels of the signal.

Keywords: Optical Amplifier, Raman Amplifier DiscreteRaman Amplifier (DRA), Wavelength Division Multiplexing(WDM).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2619
72 Status and Requirements of Counter-Cyberterrorism

Authors: Jeong-Tae Kim, Tchanghee Hyun

Abstract:

The number of intrusions and attacks against critical infrastructures and other information networks is increasing rapidly. While there is no identified evidence that terrorist organizations are currently planning a coordinated attack against the vulnerabilities of computer systems and network connected to critical infrastructure, and origins of the indiscriminate cyber attacks that infect computers on network remain largely unknown. The growing trend toward the use of more automated and menacing attack tools has also overwhelmed some of the current methodologies used for tracking cyber attacks. There is an ample possibility that this kind of cyber attacks can be transform to cyberterrorism caused by illegal purposes. Cyberterrorism is a matter of vital importance to national welfare. Therefore, each countries and organizations have to take a proper measure to meet the situation and consider effective legislation about cyberterrorism.

Keywords: Cyberterrorism, cyber attack, information security, legislation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2795
71 Housing Rehabilitation as a Means of Urban Regeneration and Population Integration

Authors: Andreas L. Savvides

Abstract:

The proposed paper examines strategies whose aim is to counter the all too often sighted process of abandonment that characterizes contemporary cities. The city of Nicosia in Cyprus is used as an indicative case study, whereby several recent projects are presented as capitalizing on traditional cultural assets to revive the downtown. The reuse of existing building stock as museums, performing arts centers and theaters but also as in the form of various housing typologies is geared to strengthen the ranks of local residents and to spur economic growth. Unlike the examples from the 1960s, the architecture of more recent adaptive reuse for urban regeneration seems to be geared in reinforcing a connection to the city where the buildings often reflect the characteristics of their urban context.

Keywords: Public Housing, Building Rehabilitation, Urban Regeneration, Population Integration

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1865
70 Effect of Network Communication Overhead on the Performance of Adaptive Speculative Locking Protocol

Authors: Waqar Haque, Pai Qi

Abstract:

The speculative locking (SL) protocol extends the twophase locking (2PL) protocol to allow for parallelism among conflicting transactions. The adaptive speculative locking (ASL) protocol provided further enhancements and outperformed SL protocols under most conditions. Neither of these protocols consider the impact of network latency on the performance of the distributed database systems. We have studied the performance of ASL protocol taking into account the communication overhead. The results indicate that though system load can counter network latency, it can still become a bottleneck in many situations. The impact of latency on performance depends on many factors including the system resources. A flexible discrete event simulator was used as the testbed for this study.

Keywords: concurrency control, distributed database systems, speculative locking

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1698
69 Emotional, Behavioural and Social Development: Modality of Hierarchy of Needs in Supporting Parents with Special Needs

Authors: Fadzilah Abdul Rahman

Abstract:

Emotional development is developed between the parents and their child. Behavioural development is also developed between the parents and their child. Social Development is how parents can help their special needs child to adapt to society and to face challenges. In promoting a lifelong learning mindset, enhancing skill sets and readiness to face challenges, parents would be able to counter balance these challenges during their care giving process and better manage their expectations through understanding the hierarchy of needs modality towards a positive attitude, and in turn, improve their quality of life and participation in society. This paper aims to demonstrate how the hierarchy of needs can be applied in various situations of caregiving for parents with a special needs child.

Keywords: Hierarchy of needs, parents, special needs, care-giving.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2291
68 Natural Gas Sweetening by Wetted-Wire Column

Authors: Sarah Taheri, Shahram Ghanbari Pakdehi, Arash Rezaei

Abstract:

Natural gas usually includes H2S component which is very toxic, hazardous and corrosive to environment, human being and process equipments, respectively. Therefore, sweetening of the gas (separation of H2S) is inevitable. To achieve this purpose, using packed-bed columns with liquid absorbents such as MEA or DEA is very common. Due to some problems of usual packed columns especially high pressure drop of gas phase, a novel kind of them called wetted-wire column (WWC) has been invented. The column decreases the pressure drop significantly and improves the absorption efficiency. The packings are very thin rods (like wire) and as long as column. The column has 100 wires with a triangular arrangement and counter current flows of gas and liquid phases. The observation showed that at the same conditions, the absorption performance was quite comparable to conventional packed-bed towers and a very low pressure drop.

Keywords: H2S, Natural gas, separation, wetted-wire column (WWC).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2008
67 Cryogenic Freezing Process Optimization Based On Desirability Function on the Path of Steepest Ascent

Authors: R. Uporn, P. Luangpaiboon

Abstract:

This paper presents a comparative study of statistical methods for the multi-response surface optimization of a cryogenic freezing process. Taguchi design and analysis and steepest ascent methods based on the desirability function were conducted to ascertain the influential factors of a cryogenic freezing process and their optimal levels. The more preferable levels of the set point, exhaust fan speed, retention time and flow direction are set at -90oC, 20 Hz, 18 minutes and Counter Current, respectively. The overall desirability level is 0.7044.

Keywords: Cryogenic Freezing Process, Taguchi Design and Analysis, Response Surface Method, Steepest Ascent Method and Desirability Function Approach.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1833
66 Italian Central Guarantee Fund: An Analysis of the Guaranteed SMEs’ Default Risk

Authors: M. C. Arcuri, L. Gai, F. Ielasi

Abstract:

Italian Central Guarantee Fund (CGF) has the purpose to facilitate Small and Medium-sized Enterprises (SMEs)’ access to credit. The aim of the paper is to study the evaluation method adopted by the CGF with regard to SMEs requiring its intervention. This is even more important in the light of the recent CGF reform. We analyse an initial sample of more than 500.000 guarantees from 2012 to 2018. We distinguish between a counter-guarantee delivered to a mutual guarantee institution and a guarantee directly delivered to a bank. We investigate the impact of variables related to the operations and the SMEs on Altman Z’’-score and the score consistent with CGF methodology. We verify that the type of intervention affects the scores and the initial condition changes with the new assessment criterions. 

Keywords: Banks, default risk, Italian Guarantee Fund, mutual guarantee institutions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1110
65 A Novel Tracking Method Using Filtering and Geometry

Authors: Sang Hoon Lee, Jong Sue Bae, Taewan Kim, Jin Mo Song, Jong Ju Kim

Abstract:

Image target detection and tracking methods based on target information such as intensity, shape model, histogram and target dynamics have been proven to be robust to target model variations and background clutters as shown by recent researches. However, no definitive answer has been given to occluded target by counter measure or limited field of view(FOV). In this paper, we will present a novel tracking method using filtering and computational geometry. This paper has two central goals: 1) to deal with vulnerable target measurements; and 2) to maintain target tracking out of FOV using non-target-originated information. The experimental results, obtained with airborne images, show a robust tracking ability with respect to the existing approaches. In exploring the questions of target tracking, this paper will be limited to consideration of airborne image.

Keywords: Tracking, Computational geometry, Homography, Filter

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1787
64 Energy Models for Analyzing the Economic Wide Impact of the Environmental Policies

Authors: Majdi M. Alomari, Nafesah I. Alshdaifat, Mohammad S. Widyan

Abstract:

Different countries have introduced different schemes and policies to counter global warming. The rationale behind the proposed policies and the potential barriers to successful implementation of the policies adopted by the countries were analyzed and estimated based on different models. It is argued that these models enhance the transparency and provide a better understanding to the policy makers. However, these models are underpinned with several structural and baseline assumptions. These assumptions, modeling features and future prediction of emission reductions and other implication such as cost and benefits of a transition to a low-carbon economy and its economy wide impacts were discussed. On the other hand, there are potential barriers in the form political, financial, and cultural and many others that pose a threat to the mitigation options.

Keywords: Economic wide impact, energy models, environmental policy instruments, mitigating CO2 emission.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1556
63 Counter-Policies by Industrial Countries to Tackle Global Warming, from Perspective of the Kyoto Protocol

Authors: Yau-Ting, Sung, Hsueh-Chih, Chen, Hui-Peng, Hsiung, Hsun-Tsum, Huang

Abstract:

In accordance with environmental impacts contended in Kyoto Protocol, the study aims to explore the different administrative and non-administrative measurements that industrial countries, such as America, German, Japan, Korea, Holland and British take to face with the increasing Global Warming phenomena. By large, these measurements consist of versatile dimensions, including of education and advocating, economical instruments, research developments and instances, restricted instruments, voluntary contacts, exchangeable permit for carbon-release and public investments. The results of discussion for the study are as follows: both economical impacts as well as reformations for nations that are affected via Kyoto Protocol, and human testifying for variables of global surroundings in the age of Kyoto Protocol.

Keywords: Global warming, Kyoto protocol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1762
62 Measurement of Steady Streaming from an Oscillating Bubble Using Particle Image Velocimetry

Authors: Yongseok Kwon, Woowon Jeong, Eunjin Cho, Sangkug Chung, Kyehan Rhee

Abstract:

Steady streaming flow fields induced by a 500 mm bubble oscillating at 12 kHz were measured using microscopic particle image velocimetry (PIV). The accuracy of velocity measurement using a micro PIV system was checked by comparing the measured velocity fields with the theoretical velocity profiles in fully developed laminar flow. The steady streaming flow velocities were measured in the sagittal plane of the bubble attached on the wall. Measured velocity fields showed upward jet flow with two symmetric counter-rotating vortices, and the maximum streaming velocity was about 12 mm/s, which was within the velocity ranges measured by other researchers. The measured streamlines were compared with the analytical solution, and they also showed a reasonable agreement.

Keywords: Oscillating bubble, Particle-Image-Velocimetry microstreaming.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1819