Search results for: Agent protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1107

Search results for: Agent protection

507 A Knowledge Acquisition Model Using Multi-Agents for KaaS

Authors: Dhanashree Nansaheb Kharde, Justus Selwyn

Abstract:

These days customer satisfaction plays vital role in any business. When customer searches for a product, significantly a junk of irrelevant information is what is given, leading to customer dissatisfaction. To provide exactly relevant information on the searched product, we are proposing a model of KaaS (Knowledge as a Service), which pre-processes the information using decision making paradigm using Multi-agents. Information obtained from various sources is taken to derive knowledge and they are linked to Cloud to capture new idea. The main focus of this work is to acquire relevant information (knowledge) related to product, then convert this knowledge into a service for customer satisfaction and deploy on cloud. For achieving these objectives we are have opted to use multi agents. They are communicating and interacting with each other, manipulate information, provide knowledge, to take decisions. The paper discusses about KaaS as an intelligent approach for Knowledge acquisition.

Keywords: Knowledge acquisition, multi-agents, intelligent user interface, ontology, intelligent agent.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1726
506 A Discriminatory Rewarding Mechanism for Sybil Detection with Applications to Tor

Authors: Asim Kumar Pal, Debabrata Nath, Sumit Chakraborty

Abstract:

This paper presents an economic game for sybil detection in a distributed computing environment. Cost parameters reflecting impacts of different sybil attacks are introduced in the sybil detection game. The optimal strategies for this game in which both sybil and non-sybil identities are expected to participate are devised. A cost sharing economic mechanism called Discriminatory Rewarding Mechanism for Sybil Detection is proposed based on this game. A detective accepts a security deposit from each active agent, negotiates with the agents and offers rewards to the sybils if the latter disclose their identity. The basic objective of the detective is to determine the optimum reward amount for each sybil which will encourage the maximum possible number of sybils to reveal themselves. Maintaining privacy is an important issue for the mechanism since the participants involved in the negotiation are generally reluctant to share their private information. The mechanism has been applied to Tor by introducing a reputation scoring function.

Keywords: Game theory, Incentive mechanism, Reputation, Sybil Attack

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1716
505 Abai Kunanbayev's Role in Enrichment of the Kazakh Language

Authors: Y.M. Paltore, B.N. Zhubatova, A.A. Mustafayeva

Abstract:

Abai Kunanbayev is famous for being enlightener, composer, interpreter, social agent, philosopher, reformer, who wanted to enrich Kazakh literature by emergence with Russian and European culture, and also as a founder of Kazakh written literary language. Abai Kunanbayev was born in 1845 in East Kazakhstan area and passed away in 1904 in his hometown. His oeuvre absorbed and reflected all changes in the life of Kazakh society of the second half of XIX century. Because ХІХ century, especially its second half, was an important transition period for Kazakhstan, which radically changed traditional way of Kazakh society and predetermined further development in consequence of activation of Russian colonial policy and approval of commodity-money relations in Steppe Land.Abai Kunanbayev, besides Arabic and Persian common words and loanwords from Quran in his words of edification, had used a lot of words of Arabic, Persian, Latin, Russian, Nogai, Shaghatai, Polish, Greek, Turkish, which are used in the Kazakh language.

Keywords: Abai Kunanbayev, the Kazakh, Russian languages, literature

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2863
504 Modelling of Multi-Agent Systems for the Scheduling of Multi-EV Charging from Power Limited Sources

Authors: Manan’Iarivo Rasolonjanahary, Chris Bingham, Nigel Schofield, Masoud Bazargan

Abstract:

This paper presents the research and application of model predictive scheduled charging of electric vehicles (EV) subject to limited available power resource. To focus on algorithm and operational characteristics, the EV interface to the source is modelled as a battery state equation during the charging operation. The researched methods allow for the priority scheduling of EV charging in a multi-vehicle regime and when subject to limited source power availability. Priority attribution for each connected EV is described. The validity of the developed methodology is shown through the simulation of different scenarios of charging operation of multiple connected EVs including non-scheduled and scheduled operation with various numbers of vehicles. Performance of the developed algorithms is also reported with the recommendation of the choice of suitable parameters.

Keywords: Model predictive control, non-scheduled, power limited sources, scheduled and stop-start battery charging.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 509
503 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

Authors: Michaela Vašková

Abstract:

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using of the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.

Keywords: Crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1628
502 Recovery of Post-Consumer PET Bottles in a Composite Material Preparation

Authors: Rafenomananjara Tsinjo Nirina, Tomoo Sekito, Andrianaivoravelona Jaconnet Oliva

Abstract:

Manufacturing a composite material from post-consumer bottles is an interesting outlet since Madagascar is still facing the challenges of managing plastic waste on the one hand and appropriate waste treatment facilities are not yet developed on the other hand. New waste management options are needed to divert End-Of-Life (EOL) soft plastic wastes from landfills and incineration. Waste polyethylene terephthalate (PET) bottles might be considered as a valuable resource and recovered into polymer concrete. The methodology is easy to implement and appropriate to the local context in Madagascar. This approach will contribute to the production of ecological building materials that might be profitable for the environment and the construction sector. This work aims to study the feasibility of using the post-consumer PET bottles as an alternative binding agent instead of the conventional Portland cement and water. Then, the mechanical and physical properties of the materials were evaluated.

Keywords: PET recycling, polymer concrete, ecological building materials, pollution mitigation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 952
501 The Thermochemical Conversion of Lactic Acid in Subcritical and Supercritical Water

Authors: Shyh-Ming Chern, Hung-Chi Tu

Abstract:

One way to utilize biomass is to thermochemically convert it into gases and chemicals. For conversion of biomass, glucose is a particularly popular model compound for cellulose, or more generally for biomass. The present study takes a different approach by employing lactic acid as the model compound for cellulose. Since lactic acid and glucose have identical elemental composition, they are expected to produce similar results as they go through the conversion process. In the current study, lactic acid was thermochemically converted to assess its reactivity and reaction mechanism in subcritical and supercritical water, by using a 16-ml autoclave reactor. The major operating parameters investigated include: The reaction temperature, from 673 to 873 K, the reaction pressure, 10 and 25 MPa, the dosage of oxidizing agent, 0 and 0.5 chemical oxygen demand, and the concentration of lactic acid in the feed, 0.5 and 1.0 M. Gaseous products from the conversion were generally found to be comparable to those derived from the conversion of glucose.

Keywords: Lactic acid, subcritical water, supercritical water, thermochemical conversion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1086
500 Extensions to Some AOSE Methodologies

Authors: Louay M. Jeroudaih, Mohamed S. Hajji

Abstract:

This paper looks into areas not covered by prominent Agent-Oriented Software Engineering (AOSE) methodologies. Extensive paper review led to the identification of two issues, first most of these methodologies almost neglect semantic web and ontology. Second, as expected, each one has its strength and weakness and may focus on some phases of the development lifecycle but not all of the phases. The work presented here builds extensions to a highly regarded AOSE methodology (MaSE) in order to cover the areas that this methodology does not concentrate on. The extensions include introducing an ontology stage for semantic representation and integrating early requirement specification from a methodology which mainly focuses on that. The integration involved developing transformation rules (with the necessary handling of nonmatching notions) between the two sets of representations and building the software which automates the transformation. The application of this integration on a case study is also presented in the paper. The main flow of MaSE stages was changed to smoothly accommodate the new additions.

Keywords: Agents, Intelligent Agents, Software Engineering(SE), UML, AUML, and Design Patterns.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1885
499 Study of the Behavior of an Organic Coating Applied on Algerian Oil Tanker in Seawater

Authors: N. Hammouda, K. Belmokre

Abstract:

Paints are the most widely used methods of protection against atmospheric corrosion of metals. The aim of this work was to determine the protective performance of epoxy coating against sea water before and after damage. Investigations are conducted using stationary and non-stationary electrochemical tools such as electrochemical impedance spectroscopy has allowed us to characterize the protective qualities of these films. The application of the EIS on our damaged in-situ painting shows the existence of several capacitive loops which is an indicator of the failure of our tested paint. Microscopic analysis (micrograph) helped bring essential elements in understanding the degradation of our paint condition and immersion training corrosion products.

Keywords: Epoxy Paints, Electrochemical Impedance Spectroscopy, Corrosion Mechanisms, sea water.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1874
498 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data

Authors: A. Starczewska, A. Nawrat, K. Daniec, J. Homa, K. Hołda

Abstract:

Border Gateway Protocol (BGP) is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.

Keywords: Border Gateway Protocol, BGP, BGP hijacking, cybersecurity, detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 90
497 Stop Forced Child Marriage: A Comparative Global Law Analysis

Authors: Michelle J. Miller

Abstract:

Millions of girls are forcibly married during the transitional period between puberty and adulthood. At a stage of vulnerability cultural practices, religious rights and social standards place her in a position where she is catapult into womanhood. An advocate against forced child marriage could argue that child rights, cultural rights, religious rights, right to marry, right to life, right to health, right to education, right to be free from slavery, right to be free from torture, right to consent to marriage are all violated by the practice of child marriage. The author is this advocate and this paper will present how some of these rights are violated and establish the need for change.

Keywords: Child marriage, forced child marriage, child rights, protection, religious rights, cultural rights, right to life, human rights.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3254
496 Application of Natural Clay to Formulate Nontraditional Completion Fluid that Triples Oil Productivity

Authors: Munawar Khalil, Badrul Mohamed Jan, Abdul Aziz Abdul Raman

Abstract:

In the last decades, the problem of perforation damage has been considered as the major factor for the reduction of oil productivity. Underbalance perforation is considered as one of the best means to minimize or overcome this problem. By maintaining wellbore pressure lower than formation pressure, perforation damage could be minimize or eliminated. This can be achieved by the use of nontraditional lightweight completion fluid. This paper presents the effect of natural clay in formulating nontraditional completion fluid to ensure successful perforation job and increase of production rate. Natural clay is used as homogenizing agent to create a stable and non-damaging low-density completion fluid. Results indicate that the addition of natural clay dramatically increase the stability of the final fluids. In addition, field test has shown that the application of nontraditional completion fluid increases oil production by three folds.

Keywords: Completion fluid, underbalance, clay, oil production.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1391
495 miR-200c as a Biomarker for 5-FU Chemosensitivity in Colorectal Cancer

Authors: Rezvan Najafi, Korosh Heydari, Massoud Saidijam

Abstract:

5-FU is a chemotherapeutic agent that has been used in colorectal cancer (CRC) treatment. However, it is usually associated with the acquired resistance, which decreases the therapeutic effects of 5-FU. miR-200c is involved in chemotherapeutic drug resistance, but its mechanism is not fully understood. In this study, the effect of inhibition of miR-200c in sensitivity of HCT-116 CRC cells to 5-FU was evaluated. HCT-116 cells were transfected with LNA-anti- miR-200c for 48 h. mRNA expression of miR-200c was evaluated using quantitative real- time PCR. The protein expression of phosphatase and tensin homolog (PTEN) and E-cadherin were analyzed by western blotting. Annexin V and propidium iodide staining assay were applied for apoptosis detection. The caspase-3 activation was evaluated by an enzymatic assay. The results showed LNA-anti-miR-200c inhibited the expression of PTEN and E-cadherin protein, apoptosis and activation of caspase 3 compared with control cells. In conclusion, these results suggest that miR-200c as a prognostic marker can overcome to 5-FU chemoresistance in CRC.

Keywords: Colorectal cancer, miR-200c, 5-FU resistance, E-cadherin, PTEN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 914
494 A Dynamic Filter for Removal DC - Offset In Current and Voltage Waveforms

Authors: Khaled M.EL-Naggar

Abstract:

In power systems, protective relays must filter their inputs to remove undesirable quantities and retain signal quantities of interest. This job must be performed accurate and fast. A new method for filtering the undesirable components such as DC and harmonic components associated with the fundamental system signals. The method is s based on a dynamic filtering algorithm. The filtering algorithm has many advantages over some other classical methods. It can be used as dynamic on-line filter without the need of parameters readjusting as in the case of classic filters. The proposed filter is tested using different signals. Effects of number of samples and sampling window size are discussed. Results obtained are presented and discussed to show the algorithm capabilities.

Keywords: Protection, DC-offset, Dynamic Filter, Estimation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3759
493 A Novel Dual-Purpose Image Watermarking Technique

Authors: Maha Sharkas, Dahlia R. ElShafie, Nadder Hamdy

Abstract:

Image watermarking has proven to be quite an efficient tool for the purpose of copyright protection and authentication over the last few years. In this paper, a novel image watermarking technique in the wavelet domain is suggested and tested. To achieve more security and robustness, the proposed techniques relies on using two nested watermarks that are embedded into the image to be watermarked. A primary watermark in form of a PN sequence is first embedded into an image (the secondary watermark) before being embedded into the host image. The technique is implemented using Daubechies mother wavelets where an arbitrary embedding factor α is introduced to improve the invisibility and robustness. The proposed technique has been applied on several gray scale images where a PSNR of about 60 dB was achieved.

Keywords: Image watermarking, Multimedia Security, Wavelets, Image Processing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1697
492 The Effect of Air Entraining Agents on Compressive Strength

Authors: Demet Yavuz

Abstract:

Freeze-thaw cycles are one of the greatest threats to concrete durability. Lately, protection against this threat excites scientists’ attention. Air-entraining admixtures have been widely used to produce freeze-thaw resistant at concretes. The use of air-entraining agents (AEAs) enhances not only freeze-thaw endurance but also the properties of fresh concrete such as segregation, bleeding and flow ability. This paper examines the effects of air-entraining on compressive strength of concrete. Air-entraining is used between 0.05% and 0.4% by weight of cement. One control and four fiber reinforced concrete mixes are prepared and three specimens are tested for each mix. It is concluded from the test results that when air entraining is increased the compressive strength of concrete reduces for all mixes with AEAs.

Keywords: Concrete, air-entraining, compressive strength, mechanical properties.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1753
491 Flocking Behaviors for Multiple Groups with Heterogeneous Agents

Authors: Jae Moon Lee

Abstract:

Most of researches for conventional simulations were studied focusing on flocks with a single species. While there exist the flocking behaviors with a single species in nature, the flocking behaviors are frequently observed with multi-species. This paper studies on the flocking simulation for heterogeneous agents. In order to simulate the flocks for heterogeneous agents, the conventional method uses the identifier of flock, while the proposed method defines the feature vector of agent and uses the similarity between agents by comparing with those feature vectors. Based on the similarity, the paper proposed the attractive force and repulsive force and then executed the simulation by applying two forces. The results of simulation showed that flock formation with heterogeneous agents is very natural in both cases. In addition, it showed that unlike the existing method, the proposed method can not only control the density of the flocks, but also be possible for two different groups of agents to flock close to each other if they have a high similarity.

Keywords: Flocking behavior, heterogeneous agents, similarity, simulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1598
490 Improvement of Antibacterial Activity for Ceftazidime by Partially Purified Tannase from Penicillium expansum

Authors: Sahira N. Muslim, Alaa N. Mohammed, Saba Saadoon Khazaal, Batool Kadham Salman, Israa M. S. AL-Kadmy, Sraa N. Muslim, Ahmed S. Dwaish, Sawsan Mohammed Kareem, Sarah N. Aziz, Ruaa A. Jasim

Abstract:

Tannase has wide applications in food, beverage, brewing, cosmetics and chemical industries and one of the major applications of tannase is the production of gallic acid. Gallic acid is used for manufacturing of trimethoprim. In the present study, a local fungal strain of Penicillium expansum A4 isolated from spoilt apple samples gave the highest production level of tannase. Tannase was partially purified with a recovery yield of 92.52% and 6.32 fold of purification by precipitation using ammonium sulfate at 50% saturation. Tannase led to increased antimicrobial activity of ceftazidime against Pseudomonas aeruginosa and S. aureus and had a synergism effect at low concentrations of ceftazidime, and thus, tannase may be a useful adjuvant agent for the treatment of many bacterial infections in combination with ceftazidime.

Keywords: Ceftazidime, Penicillium expansum, tannase, antimicrobial activity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1024
489 Zinc Borate Synthesis Using Hydrozincite and Boric Acid with Ultrasonic Method

Authors: D. S. Vardar, A. S. Kipcak, F. T. Senberber, E. M. Derun, N. Tugrul, S. Piskin

Abstract:

Zinc borate is an important inorganic hydrate borate material, which can be used as a flame retardant agent and corrosion resistance material. This compound can loss its structural water content at higher than 290°C. Due to thermal stability; Zinc Borate can be used as flame retardant at high temperature process of plastic and gum. In this study, the ultrasonic reaction of zinc borates were studied using hydrozincite (Zn5(CO3)2·(OH)6) and boric acid (H3BO3) raw materials. Before the synthesis raw materials were characterized by X-Ray Diffraction (XRD) and Fourier Transform Infrared Spectroscopy (FT-IR). Ultrasonic method is a new application on the zinc borate synthesis. The synthesis parameters were set to 90°C reaction temperature and 55 minutes of reaction time, with 1:1, 1:2, 1:3, 1:4 and 1:5 molar ratio of starting materials (Zn5(CO3)2·(OH)6 : H3BO3). After the zinc borate synthesis, the products were analyzed by XRD and FT-IR. As a result, optimum molar ratio of 1:5 is determined for the synthesis of zinc borates with ultrasonic method.

Keywords: Borate, ultrasonic method, zinc borate, zinc borate synthesis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2062
488 Privacy of RFID Systems: Security of Personal Data for End-Users

Authors: Firoz Khan

Abstract:

Privacy of RFID systems is receiving increasing attention in the RFID community. RFID privacy is important as the RFID tags will be attached to all kinds of products and physical objects including people. The possible abuse or excessive use of RFID tracking capability by malicious users can lead to potential privacy violations. In this paper, we will discuss how the different industries use RFID and the potential privacy and security issues while RFID is implemented in these industries. Although RFID technology offers interesting services to customer and retailers, it could also endanger the privacy of end-users. Personal data can be leaked if a protection mechanism is not deployed in the RFID systems. The paper summarizes many different solutions for implementing privacy and security while deploying RFID systems.

Keywords: RFID, privacy, security, encryption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 974
487 Biodegradable Surfactants for Advanced Drug Delivery Strategies

Authors: C. Hönnscheidt, R. Krull

Abstract:

Oxidative stress makes up common incidents in eukaryotic metabolism. The presence of diverse components disturbing the equilibrium during oxygen metabolism increases oxidative damage unspecifically in living cells. Body´s own ubiquinone (Q10) seems to be a promising drug in defending the heightened appearance of reactive oxygen species (ROS). Though, its lipophilic properties require a new strategy in drug formulation to overcome their low bioavailability. Consequently, the manufacture of heterogeneous nanodispersions is in focus for medical applications. The composition of conventional nanodispersions is made up of a drug-consisting core and a surfactive agent, also named as surfactant. Long-termed encapsulation of the surfactive components into tissues might be the consequence of the use during medical therapeutics. The potential of provoking side-effects is given by their nonbiodegradable properties. Further improvements during fabrication process use the incorporation of biodegradable components such as modified γ-polyglutamic acid which decreases the potential of prospective side-effects.

Keywords: Biopolymers, γ-Polyglutamic acid, Oxidative stress, Ubiquinone.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2237
486 Ficus deltoidea Extract Protects HaCaT Keratinocytes from UVB Irradiation-Induced Inflammation

Authors: Rosnani Hasham, Hyun Kyung Choi, Chang Seo Park

Abstract:

Ficus deltoidea from the Moraceae family is a popular medicinal herb in Malaysia. It possesses strong antioxidant and antiinflammatory properties. In the present study, the anti-inflammatory effects of F. deltoidea extract on UVB-irradiated HaCaT Keratinocytes were investigated. HaCaT Keratinocytes were UVBirradiated (12.5 mJ/cm3) and were treated with 0.05, 0.08 or 0.1% of F. deltoidea extract. Cell viability following UVB irradiation was significantly higher in the groups treated with the F. deltoidea extract at doses of 0.05, 0.08 or 0.1% than in control group with UVB irradiation only. Tumor necrosis factor-α (TNF-α), interleukin-1α (IL-1α), interleukin-6 (IL-6) and cyclooxygenase (COX-2) play primary roles in the inflammation process upon UV irradiation and are known to be stimulated by UVB irradiation. Treatment with the F. deltoidea extract dramatically inhibited the UV-induced TNF-α, IL-1α, IL-6, and COX-2 expression. These results suggest that the F. deltoidea extract inhibits the production of pro-inflammatory cytokines and may be an effective protective agent for the treatment of skin diseases.

Keywords: Ficus deltoidea, anti-inflammatory activity, cytokines, COX-2.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2834
485 Quality of Life: Expectations and Achievements of Middle Class in Kazakhstan

Authors: Nazym Shedenova, Aigul Beimisheva

Abstract:

The improvement of quality of life is the main visible integrated indicator of state well-being. More and more states pay attention to define and to achieve social standards of quality of life as social-economic strategy of development. These standards are determinate by state features, complex of needs and interests of individual, family and society. It still remains in open question: “What is middle class" in contemporary Kazakhstan. Appearance of new social standards of quality of life is important indicator of its successful establishment. The middle class as agent of social, politic and economic reforms promotes to improve the quality of life of the country. But if consider a low and a middle stratums of middle class, we can see that high social expectations and real achievements are still significantly different. The article relies on the sociological data, collected during of search of household-s standards of living in Almaty city and Almaty region, and case-study of cottage city “Jana Kuat".

Keywords: the quality of life, the social standards of life, the middle class of Kazakhstan, the economic behavior of households.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2734
484 A Utilitarian Approach to Modeling Information Flows in Social Networks

Authors: Usha Sridhar, Sridhar Mandyam

Abstract:

We propose a multi-agent based utilitarian approach to model and understand information flows in social networks that lead to Pareto optimal informational exchanges. We model the individual expected utility function of the agents to reflect the net value of information received. We show how this model, adapted from a theorem by Karl Borch dealing with an actuarial Risk Exchange concept in the Insurance industry, can be used for social network analysis. We develop a utilitarian framework that allows us to interpret Pareto optimal exchanges of value as potential information flows, while achieving a maximization of a sum of expected utilities of information of the group of agents. We examine some interesting conditions on the utility function under which the flows are optimal. We illustrate the promise of this new approach to attach economic value to information in networks with a synthetic example.

Keywords: Borch's Theorem , Economic value of information, Information Exchange, Pareto Optimal Solution, Social Networks, Utility Functions

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1504
483 Access Control System: Monitoring Tool for Fiber to the Home Passive Optical Network

Authors: Aswir Premadi, Mohammad Syuhaimi Ab. Rahman, Mohamad Najib Moh. Saupe, KasmiranJumari

Abstract:

An optical fault monitoring in FTTH-PON using ACS is demonstrated. This device can achieve real-time fault monitoring for protection feeder fiber. In addition, the ACS can distinguish optical fiber fault from the transmission services to other customers in the FTTH-PON. It is essential to use a wavelength different from the triple-play services operating wavelengths for failure detection. ACS is using the operating wavelength 1625 nm for monitoring and failure detection control. Our solution works on a standard local area network (LAN) using a specially designed hardware interfaced with a microcontroller integrated Ethernet.

Keywords: ACS, monitoring tool, FTTH-PON.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2698
482 Efficient and Extensible Data Processing Framework in Ubiquitious Sensor Networks

Authors: Junghoon Lee, Gyung-Leen Park, Ho-Young Kwak, Cheol Min Kim

Abstract:

This paper presents the design and implements the prototype of an intelligent data processing framework in ubiquitous sensor networks. Much focus is put on how to handle the sensor data stream as well as the interoperability between the low-level sensor data and application clients. Our framework first addresses systematic middleware which mitigates the interaction between the application layer and low-level sensors, for the sake of analyzing a great volume of sensor data by filtering and integrating to create value-added context information. Then, an agent-based architecture is proposed for real-time data distribution to efficiently forward a specific event to the appropriate application registered in the directory service via the open interface. The prototype implementation demonstrates that our framework can host a sophisticated application on the ubiquitous sensor network and it can autonomously evolve to new middleware, taking advantages of promising technologies such as software agents, XML, cloud computing, and the like.

Keywords: sensor network, intelligent farm, middleware, event detection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1356
481 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper presents an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: Cloud, enhancing security, Fog, IoT, telehealth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 59
480 High Efficiency, Selectivity against Cancer Cell Line of Purified L-Asparaginase from Pathogenic Escherichia coli

Authors: Hazim Saadoon Aljewari, Mohammed Ibraheem Nader, Abdul Hussain M. Alfaisal, NatthidaWeerapreeyakul, Sahapat

Abstract:

L-asparaginase was extracted from pathogenic Escherichia coli which was isolated from urinary tract infection patients. L-asparaginase was purified 96-fold by ultrafiltration, ion exchange and gel filtration giving 39.19% yield with final specific activity of 178.57 IU/mg. L-asparaginase showed 138,356±1,000 Dalton molecular weight with 31024±100 Dalton molecular mass. Kinetic properties of enzyme resulting 1.25×10-5 mM Km and 2.5×10-3 M/min Vmax. L-asparaginase showed a maximum activity at pH 7.5 when incubated at 37 ºC for 30 min and illustrated its full activity (100%) after 15 min incubation at 20-37 ºC, while 70% of its activity was lost when incubated at 60 ºC. L-asparaginase showed cytotoxicity to U937 cell line with IC50 0.5±0.19 IU/ml, and selectivity index (SI=7.6) about 8 time higher selectivity over the lymphocyte cells. Therefore, the local pathogenic E. coli strains may be used as a source of high yield of L-asparaginase to produce anti cancer agent with high selectivity.

Keywords: L-asparaginase, Purification, Cytotoxicity, selectivity index

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2825
479 Effects of Formic Acid on the Chemical State and Morphology of As-synthesized and Annealed ZnO Films

Authors: Chueh-Jung Huang, Chia-Hung Li, Hsueh-Lung Wang, Tsun-Nan Lin

Abstract:

Zinc oxide thin films with various microstructures were grown on substrates by using HCOOH-sols. The reaction mechanism of the sol system was investigated by performing an XPS analysis of as-synthesized films, due to the products of hydrolysis and condensation in the sol system contributing to the chemical state of the as-synthesized films. The chemical structures of the assynthesized films related to the microstructures of the final annealed films were also studied. The results of the Zn 2p3/2, C 1s and O1s XPS patterns indicate that the hydrolysis reaction in the sol system is strongly influenced by the HCOOH agent. The results of XRD and FE-SEM demonstrated the microstructures of the annealed films are related to the content of hydrolyzed zinc hydrate (Zn-OH) species present, and that content of the Zn-OH species in the sol system increases the HCOOH adding, and these Zn-OH species existing in the sol phase are responsible for large ZnO crystallites in the final annealed films.

Keywords: zinc oxide, hydrolysis catalyst, zinc acetate source, formic acid.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1658
478 Effect of Different Types of Nano/Micro Fillers on the Interfacial Shear Properties of Polyamide 6 with De-Sized Carbon Fiber

Authors: Mohamed H. Gabr, Kiyoshi Uzawa

Abstract:

The current study aims to investigate the effect of fillers with different geometries and sizes on the interfacial shear properties of PA6 composites with de-sized carbon fiber. The fillers which have been investigated are namely; nano-layer silicates (nanoclay), sub-micro aluminum titanium (ALTi) particles, and multiwall carbon nanotube (MWCNT). By means of X-ray photoelectron spectroscopy (XPS), epoxide group which defined as a sizing agent, has been removed. Sizing removal can reduce the acid parameter of carbon fibers surface promoting bonding strength at the fiber/matrix interface which is a desirable property for the carbon fiber composites. Microdroplet test showed that the interfacial shear strength (IFSS) has been enhanced with the addition of 10wt% ALTi by about 23% comparing with neat PA6. However, with including other types of fillers into PA6, the results did not show enhancement of IFSS.

Keywords: Sub-micro-filler, nano-composites, interfacial shear strength, polyamide.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1371