Search results for: security assessment.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2352

Search results for: security assessment.

972 Monotonic and Cyclic J-integral Estimation for Through-Wall Cracked Straight Pipes

Authors: Rohit, S. Vishnuvardhan, P. Gandhi, Nagesh R. Iyer

Abstract:

The evaluation of energy release rate and centre Crack Opening Displacement (COD) for circumferential Through-Wall Cracked (TWC) pipes is an important issue in the assessment of critical crack length for unstable fracture. The ability to predict crack growth continues to be an important component of research for several structural materials. Crack growth predictions can aid the understanding of the useful life of a structural component and the determination of inspection intervals and criteria. In this context, studies were carried out at CSIR-SERC on Nuclear Power Plant (NPP) piping components subjected to monotonic as well as cyclic loading to assess the damage for crack growth due to low-cycle fatigue in circumferentially TWC pipes.

Keywords: 304LN stainless steel, cyclic J-integral, Elastic- Plastic Fracture Mechanics, J-integral, Through-wall crack

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2573
971 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models

Authors: Y. Bhatt, N. Ghosh, N. Tiwari

Abstract:

Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.

Keywords: Acreage response function, biofuel, food security, sustainable development.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1398
970 The Art of Leadership: Skills to Inspire the Team to Overcome Project Challenges and Achieve Their Goals

Authors: Maitham Al-Safwani

Abstract:

This paper highlights skills that a leader needs to acquire to lead a team successfully. With an appropriate vision and strategy, a team can be inspired, influenced and easily led. The importance of setting codes of conduct and establishing mutual agreements between the team members can help in minimizing issues and improving overall productivity. Leadership skills include the power of questioning (PoQ), effective communication, identification of team member responsibilities, and assessment of self and the team. This paper will highlight the impact of good leadership on work progress and overall team performance. The paper explains how leaders make correct decisions by avoiding hasty actions that could generate new errors, mistakes, and issues. The importance of positive expectations for the team is addressed in this paper that could result in efficient control of the work with better outcomes.

Keywords: Leadership, inspire, confidence, power of questioning, leader impacts.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1087
969 Implementing an Adaptive Behavior for Spread Spectrum Watermarking Procedures

Authors: Franco Frattolillo

Abstract:

The advances in multimedia and networking technologies have created opportunities for Internet pirates, who can easily copy multimedia contents and illegally distribute them on the Internet, thus violating the legal rights of content owners. This paper describes how a simple and well-known watermarking procedure based on a spread spectrum method and a watermark recovery by correlation can be improved to effectively and adaptively protect MPEG-2 videos distributed on the Internet. In fact, the procedure, in its simplest form, is vulnerable to a variety of attacks. However, its security and robustness have been increased, and its behavior has been made adaptive with respect to the video terminals used to open the videos and the network transactions carried out to deliver them to buyers. In fact, such an adaptive behavior enables the proposed procedure to efficiently embed watermarks, and this characteristic makes the procedure well suited to be exploited in web contexts, where watermarks usually generated from fingerprinting codes have to be inserted into the distributed videos “on the fly", i.e. during the purchase web transactions.

Keywords: Copyright protection, digital watermarking, intellectualproperty protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1366
968 Phishing Attacks Facilitated by Open-Source Intelligence

Authors: Urva Maryam

Abstract:

Private data are more often breached by clever social engineering rather than exploiting technical vulnerabilities in the systems. Complete information security requires good data safety practices to go along with technical solutions. Hackers often begin their operation by simply sending spoofed emails or fraudulent URLs to their targets and trick them into providing sensitive information such as passwords or bank account details. This technique is called phishing. Phishing attacks can be launched on email addresses, open ports and unsecured web browsers. This study uses quantitative method of research to execute phishing experiments on the participants to test their response to the phishing emails. These experiments were run on Kali Linux distribution which came bundled with multiple open-source intelligence (OSINT) tools that were used in the study. The aim of this research is to see how successful phishing attacks can be launched using OSINT and to test the response of people to spoofed emails.

Keywords: OSINT, phishing, spear phishing, email spoofing, theHarvester, Maltego.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 159
967 Free Fatty Acid Assessment of Crude Palm Oil Using a Non-Destructive Approach

Authors: Siti Nurhidayah Naqiah Abdull Rani, Herlina Abdul Rahim, Rashidah Ghazali, Noramli Abdul Razak

Abstract:

Near infrared (NIR) spectroscopy has always been of great interest in the food and agriculture industries. The development of prediction models has facilitated the estimation process in recent years. In this study, 110 crude palm oil (CPO) samples were used to build a free fatty acid (FFA) prediction model. 60% of the collected data were used for training purposes and the remaining 40% used for testing. The visible peaks on the NIR spectrum were at 1725 nm and 1760 nm, indicating the existence of the first overtone of C-H bands. Principal component regression (PCR) was applied to the data in order to build this mathematical prediction model. The optimal number of principal components was 10. The results showed R2=0.7147 for the training set and R2=0.6404 for the testing set.

Keywords: Palm oil, fatty acid, NIRS, regression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4349
966 SEM and AFM Investigations of Surface Defects and Tool Wear of Multilayers Coated Carbide Inserts

Authors: Ayman M. Alaskari, Samy E. Oraby, Abdulla I. Almazrouee

Abstract:

Coated tool inserts can be considered as the backbone of machining processes due to their wear and heat resistance. However, defects of coating can degrade the integrity of these inserts and the number of these defects should be minimized or eliminated if possible. Recently, the advancement of coating processes and analytical tools open a new era for optimizing the coating tools. First, an overview is given regarding coating technology for cutting tool inserts. Testing techniques for coating layers properties, as well as the various coating defects and their assessment are also surveyed. Second, it is introduced an experimental approach to examine the possible coating defects and flaws of worn multicoated carbide inserts using two important techniques namely scanning electron microscopy and atomic force microscopy. Finally, it is recommended a simple procedure for investigating manufacturing defects and flaws of worn inserts.

Keywords: AFM, Coated inserts, Defects, SEM.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3032
965 Measurement of Greenhouse Gas Emissions from Sugarcane Plantation Soil in Thailand

Authors: Wilaiwan Sornpoon, Sébastien Bonnet, Savitri Garivait

Abstract:

Continuous measurements of greenhouse gases (GHGs) emitted from soils are required to understand diurnal and seasonal variations in soil emissions and related mechanism. This understanding plays an important role in appropriate quantification and assessment of the overall change in soil carbon flow and budget. This study proposes to monitor GHGs emissions from soil under sugarcane cultivation in Thailand. The measurements were conducted over 379 days. The results showed that the total net amount of GHGs emitted from sugarcane plantation soil amounts to 36 Mg CO2eq ha-1. Carbon dioxide (CO2) and nitrous oxide (N2O) were found to be the main contributors to the emissions. For methane (CH4), the net emission was found to be almost zero. The measurement results also confirmed that soil moisture content and GHGs emissions are positively correlated.

Keywords: Soil, GHG emission, Sugarcane, Agriculture, Thailand.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2420
964 Development of Low-cost OCDMA Encoder Based On Arrayed Waveguide Gratings(AWGs) and Optical Switches

Authors: Mohammad Syuhaimi Ab-Rahman, Boon Chuan Ng, Norshilawati Mohamad Ibrahim, Sahbudin Shaari

Abstract:

This paper describes the development of a 16-ports optical code division multiple access (OCDMA) encoder prototype based on Arrayed Waveguide Grating (AWG) and optical switches. It is potentially to provide a high security for data transmission due to all data will be transmitted in binary code form. The output signals from AWG are coded with a binary code that given to an optical switch before it signal modulate with the carrier and transmitted to the receiver. The 16-ports encoder used 16 double pole double throw (DPDT) toggle switches to control the polarization of voltage source from +5 V to -5 V for 16 optical switches. When +5 V is given, the optical switch will give code '1' and vice versa. The experimental results showed the insertion loss, crosstalk, uniformity, and optical signal-noise-ratio (OSNR) for the developed prototype are <12 dB, 9.77 dB, <1.63dB, and ≥20dB.

Keywords: AWG, encoder, OCDMA, optical switch.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1563
963 Role of Non-Renewable and Renewable Energy for Sustainable Electricity Generation in Malaysia

Authors: Hussain Ali Bekhet, Nor Hamisham Harun

Abstract:

The main objective of this paper is to give a comprehensive review of non-renewable energy and renewable energy utilization in Malaysia, including hydropower, solar photovoltaic, biomass and biogas technologies. Malaysia mainly depends on non-renewable energy (natural gas, coal and crude oil) for electricity generation. Therefore, this paper provides a comprehensive review of the energy sector and discusses diversification of electricity generation as a strategy for providing sustainable energy in Malaysia. Energy policies and strategies to protect the non-renewable energy utilization also are highlighted, focusing in the different sources of energy available for high and sustained economic growth. Emphasis is also placed on a discussion of the role of renewable energy as an alternative source for the increase of electricity supply security. It is now evident that to achieve sustainable development through renewable energy, energy policies and strategies have to be well designed and supported by the government, industries (firms), and individual or community participation. The hope is to create a positive impact on sustainable development through renewable sources for current and future generations.

Keywords: Malaysia, non-renewable energy, renewable energy, sustainable energy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3581
962 A Conceptual Framework on Review of E-Service Quality in Banking Industry

Authors: Vivek Agrawal, Vikas Tripathi, Nitin Seth

Abstract:

E-service quality plays a significant role to achieve success or failure in any organization, offering services online. It will increase the competition among the organizations, to attract the customers on the basis of the quality of service provided by the organization. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Indian Banking Industry. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and fulfillment had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Indian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.

Keywords: Banking, Service Quality, e-service quality, Dimensions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5469
961 A Model for the Characterization and Selection of Beeswaxes for use as base Substitute Tissue in Photon Teletherapy

Authors: R.M.V. Silva, D.N. Souza

Abstract:

This paper presents a model for the characterization and selection of beeswaxes for use as base substitute tissue for the manufacture of objects suitable for external radiotherapy using megavoltage photon beams. The model of characterization was divided into three distinct stages: 1) verification of aspects related to the origin of the beeswax, the bee species, the flora in the vicinity of the beehives and procedures to detect adulterations; 2) evaluation of physical and chemical properties; and 3) evaluation of beam attenuation capacity. The chemical composition of the beeswax evaluated in this study was similar to other simulators commonly used in radiotherapy. The behavior of the mass attenuation coefficient in the radiotherapy energy range was comparable to other simulators. The proposed model is efficient and enables convenient assessment of the use of any particular beeswax as a base substitute tissue for radiotherapy.

Keywords: Beeswaxes, characterization, model, radiotherapy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1506
960 Thermodynamic Performance Assessment of Steam-Injection Gas-Turbine Systems

Authors: Kyoung Hoon Kim, Giman Kim

Abstract:

The cycles of the steam-injection gas-turbine systems are studied. The analyses of the parametric effects and the optimal operating conditions for the steam-injection gas-turbine (STIG) system and the regenerative steam-injection gas-turbine (RSTIG) system are investigated to ensure the maximum performance. Using the analytic model, the performance parameters of the system such as thermal efficiency, fuel consumption and specific power, and also the optimal operating conditions are evaluated in terms of pressure ratio, steam injection ratio, ambient temperature and turbine inlet temperature (TIT). It is shown that the computational results are presented to have a notable enhancement of thermal efficiency and specific power.

Keywords: gas turbine, RSTIG, steam injection, STIG, thermal efficiency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2528
959 Between Kenzo Tange and Fernando Távora: An ‘Affinitarian’ Architectural Regard

Authors: João Cepeda

Abstract:

In crafting their way between theory and practice, authors and artists seem to be always immersed in a never-ending process of relating epochs, objects and images. Endless ‘affinities’ emerge, from a somewhat unexplainable (and intimate) magnetic relation. It is through this ‘warburgian’ assessment that two of the most prominent twentieth century modern architects from Japan and Portugal are put into perspective in this paper, focusing on their paths and thinking-practice, and on the research of their personal and professional archives. Moreover, this research especially aims its focus at essaying specifically on the possible ‘affinities’ between two of their most renowned architectural projects: the Kenzo Tange’s (demolished) Villa Seijo project in Tokyo (Japan), and Fernando Távora’s Tennis Pavilion design in Matosinhos (Portugal), respectively, side-by-side – through in-depth fieldwork in the sites, bibliographical and archival research, (unprecedented) material analysis, and a final critical consideration.

Keywords: Tange, Távora, architecture, affinities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40
958 Examining How Constraints Influence NCAA Division II Athlete’s Physical Performance

Authors: Timothy Hinchman, Carrie Taylor

Abstract:

This quantitative quasi-experimental research investigated disparities in mean and median performance among millennial soccer players. According to research, the fear of failure causes millennials to struggle with difficult jobs. The application of specified limitations has been found to increase individual productivity. The study utilized the constraint-based model of novelty (C-BMN) framework and the game performance assessment instrument (GPAI) to assess data concerning constraint-type and its impact on the productivity of 18 soccer players. Individual components cooperation and trapping had statistical significance throughout the intervention, while positioning, passing, and dribbling did not. The GPAI was statistically significant between the control and both restriction types. A two-way mixed ANOVA revealed no significant interaction between limitations and temperaments, however only 72% of individuals completed the temperament exam.

Keywords: Constraints, temperament, physical performance, GPAI.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 294
957 Performance Assessment in a Voice Coil Motor for Maximizing the Energy Harvesting with Gait Motions

Authors: Hector A. Tinoco, Cesar Garcia-Diaz, Olga L. Ocampo-Lopez

Abstract:

In this study, an experimental approach is established to assess the performance of different beams coupled to a Voice Coil Motor (VCM) with the aim to maximize mechanically the energy harvesting in the inductive transducer that is included on it. The VCM is extracted from a recycled hard disk drive (HDD) and it is adapted for carrying out experimental tests of energy harvesting. Two individuals were selected for walking with the VCM-beam device as well as to evaluate the performance varying two parameters in the beam; length of the beams and a mass addition. Results show that the energy harvesting is maximized with specific beams; however, the harvesting efficiency is improved when a mass is added to the end of the beams.

Keywords: Hard disk drive, HDD, energy harvesting, voice coil motor, VCM, energy harvester, gait motions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1467
956 UPPAAL-Based Design and Analysis of Intelligent Parking System

Authors: Abobaker M. Q. Farhan, Olof M. A. Saif

Abstract:

The demand for parking spaces in urban areas, particularly in developing countries, has led to a significant issue in the absence of sufficient parking spaces in crowded areas, which results in daily traffic congestion as drivers search for parking. This not only affects the appearance of the city but also has indirect impacts on the economy, society, and environment. In response to these challenges, researchers from various countries have sought technical and intelligent solutions to mitigate the problem through the development of smart parking systems. This paper aims to analyze and design three models of parking lots, with a focus on parking time and security. The study used computer software and Uppaal tools to simulate the models and determine the best among them. The results and suggestions provided in the paper aim to reduce the parking problems and improve the overall efficiency and safety of the parking process. The conclusion of the study highlights the importance of utilizing advanced technology to address the pressing issue of insufficient parking spaces in urban areas.

Keywords: Preliminaries, system requirements, timed automata, uppaal.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 107
955 Life Cycle Datasets for the Ornamental Stone Sector

Authors: Isabella Bianco, Gian Andrea Blengini

Abstract:

The environmental impact related to ornamental stones (such as marbles and granites) is largely debated. Starting from the industrial revolution, continuous improvements of machineries led to a higher exploitation of this natural resource and to a more international interaction between markets. As a consequence, the environmental impact of the extraction and processing of stones has increased. Nevertheless, if compared with other building materials, ornamental stones are generally more durable, natural, and recyclable. From the scientific point of view, studies on stone life cycle sustainability have been carried out, but these are often partial or not very significant because of the high percentage of approximations and assumptions in calculations. This is due to the lack, in life cycle databases (e.g. Ecoinvent, Thinkstep, and ELCD), of datasets about the specific technologies employed in the stone production chain. For example, databases do not contain information about diamond wires, chains or explosives, materials commonly used in quarries and transformation plants. The project presented in this paper aims to populate the life cycle databases with specific data of specific stone processes. To this goal, the methodology follows the standardized approach of Life Cycle Assessment (LCA), according to the requirements of UNI 14040-14044 and to the International Reference Life Cycle Data System (ILCD) Handbook guidelines of the European Commission. The study analyses the processes of the entire production chain (from-cradle-to-gate system boundaries), including the extraction of benches, the cutting of blocks into slabs/tiles and the surface finishing. Primary data have been collected in Italian quarries and transformation plants which use technologies representative of the current state-of-the-art. Since the technologies vary according to the hardness of the stone, the case studies comprehend both soft stones (marbles) and hard stones (gneiss). In particular, data about energy, materials and emissions were collected in marble basins of Carrara and in Beola and Serizzo basins located in the province of Verbano Cusio Ossola. Data were then elaborated through an appropriate software to build a life cycle model. The model was realized setting free parameters that allow an easy adaptation to specific productions. Through this model, the study aims to boost the direct participation of stone companies and encourage the use of LCA tool to assess and improve the stone sector environmental sustainability. At the same time, the realization of accurate Life Cycle Inventory data aims at making available, to researchers and stone experts, ILCD compliant datasets of the most significant processes and technologies related to the ornamental stone sector.

Keywords: LCA datasets, life cycle assessment, ornamental stone, stone environmental impact.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1135
954 Learning Based On Computer Science Unplugged in Computer Science Education: Design, Development, and Assessment

Authors: Eiko Takaoka, Yoshiyuki Fukushima, Koichiro Hirose, Tadashi Hasegawa

Abstract:

Although, all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms.

Keywords: Computer Science Unplugged, computer science outreach, high school curriculum, experimental evaluation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2098
953 Video Quality Assessment using Visual Attention Approach for Sign Language

Authors: Julia Kucerova, Jaroslav Polec, Darina Tarcsiova

Abstract:

Visual information is very important in human perception of surrounding world. Video is one of the most common ways to capture visual information. The video capability has many benefits and can be used in various applications. For the most part, the video information is used to bring entertainment and help to relax, moreover, it can improve the quality of life of deaf people. Visual information is crucial for hearing impaired people, it allows them to communicate personally, using the sign language; some parts of the person being spoken to, are more important than others (e.g. hands, face). Therefore, the information about visually relevant parts of the image, allows us to design objective metric for this specific case. In this paper, we present an example of an objective metric based on human visual attention and detection of salient object in the observed scene.

Keywords: sign language, objective video quality, visual attention, saliency

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1558
952 Designing Social Media into Higher Education Courses

Authors: Thapanee Seechaliao

Abstract:

This research paper presents guiding on how to design social media into higher education courses. The research methodology used a survey approach. The research instrument was a questionnaire about guiding on how to design social media into higher education courses. Thirty-one lecturers completed the questionnaire. The data were scored by frequency and percentage. The research results were the lecturers’ opinions concerning the designing social media into higher education courses as follows: 1) Lecturers deem that the most suitable learning theory is Collaborative Learning. 2) Lecturers consider that the most important learning and innovation Skill in the 21st century is communication and collaboration skills. 3) Lecturers think that the most suitable evaluation technique is authentic assessment. 4) Lecturers consider that the most appropriate portion used as blended learning should be 70% in the classroom setting and 30% online.

Keywords: Instructional design, social media, courses, higher education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2032
951 An Examination of Backing Effects on Ratings for Masonry Arch Bridges

Authors: Muhammad E. Rahman, Paul J. Fanning

Abstract:

Many single or multispan arch bridges are strengthened with the addition of some kind of structural support between adjacent arches of multispan or beside the arch barrel of a single span to increase the strength of the overall structure. It was traditionally formed by either placing loose rubble masonry blocks between the arches and beside the arches or using mortar or concrete to construct a more substantial structural bond between the spans. On the other hand backing materials are present in some existing bridges. Existing arch assessment procedures generally ignore the effects of backing materials. In this paper an investigation of the effects of backing on ratings for masonry arch bridges is carried out. It is observed that increasing the overall lateral stability of the arch system through the inclusion of structural backing results in an enhanced failure load by reducing the likelihood of any tension occurring at the top of the arch.

Keywords: Arch, Backing, Bridge, Masonry

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2220
950 5iD Viewer - Observation of Fish School Behaviour in Labyrinths and Use of Semantic and Syntactic Entropy for School Structure Definition

Authors: Dalibor Štys, Dalibor Štys Jr., Jana Pečenková, Kryštof M. Štys, Maryia Chkalova, Petr Kouba, Aliaksandr Pautsina, Denis Durniev, Tomáš Náhlík, Petr Císař

Abstract:

In this article is reported a construction and some properties of the 5iD viewer, the system recording simultaneously 5 views of a given experimental object. Properties of the system are demonstrated on the analysis of fish schooling behaviour. It is demonstrated the method of instrument calibration which allows inclusion of image distortion and it is proposed and partly tested also the method of distance assessment in the case that only two opposite cameras are available. Finally, we demonstrate how the state trajectory of the behaviour of the fish school may be constructed from the entropy of the system.

Keywords: 3D positioning, school behavior, distance calibration, space vision, space distortion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1920
949 Proactive Detection of DDoS Attacks Utilizing k-NN Classifier in an Anti-DDos Framework

Authors: Hoai-Vu Nguyen, Yongsun Choi

Abstract:

Distributed denial-of-service (DDoS) attacks pose a serious threat to network security. There have been a lot of methodologies and tools devised to detect DDoS attacks and reduce the damage they cause. Still, most of the methods cannot simultaneously achieve (1) efficient detection with a small number of false alarms and (2) real-time transfer of packets. Here, we introduce a method for proactive detection of DDoS attacks, by classifying the network status, to be utilized in the detection stage of the proposed anti-DDoS framework. Initially, we analyse the DDoS architecture and obtain details of its phases. Then, we investigate the procedures of DDoS attacks and select variables based on these features. Finally, we apply the k-nearest neighbour (k-NN) method to classify the network status into each phase of DDoS attack. The simulation result showed that each phase of the attack scenario is classified well and we could detect DDoS attack in the early stage.

Keywords: distributed denial-of-service (DDoS), k-nearestneighbor classifier (k-NN), anti-DDoS framework, DDoS detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3324
948 An Ontology for Smart Learning Environments in Music Education

Authors: Konstantinos Sofianos, Michail Stefanidakis

Abstract:

Nowadays, despite the great advances in technology, most educational frameworks lack a strong educational design basis. E-learning has become prevalent, but it faces various challenges such as student isolation and lack of quality in the learning process. An intelligent learning system provides a student with educational material according to their learning background and learning preferences. It records full information about the student, such as demographic information, learning styles, and academic performance. This information allows the system to be fully adapted to the student’s needs. In this paper, we propose a framework and an ontology for music education, consisting of the learner model and all elements of the learning process (learning objects, teaching methods, learning activities, assessment). This framework can be integrated into an intelligent learning system and used for music education in schools for the development of professional skills and beyond.

Keywords: Intelligent learning systems, e-learning, music education, ontology, semantic web.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 423
947 Comparative Analysis of the Public Funding for Greek Universities: An Ordinal DEA/MCDM Approach

Authors: Yiannis Smirlis, Dimitris K. Despotis

Abstract:

This study performs a comparative analysis of the 21 Greek Universities in terms of their public funding, awarded for covering their operating expenditure. First it introduces a DEA/MCDM model that allocates the fund into four expenditure factors in the most favorable way for each university. Then, it presents a common, consensual assessment model to reallocate the amounts, remaining in the same level of total public budget. From the analysis it derives that a number of universities cannot justify the public funding in terms of their size and operational workload. For them, the sufficient reduction of their public funding amount is estimated as a future target. Due to the lack of precise data for a number of expenditure criteria, the analysis is based on a mixed crisp-ordinal data set.

Keywords: Data envelopment analysis, Greek universities, operating expenditures, ordinal data.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1742
946 Fatigue Life of an Anti-Roll Bar of a Passenger Vehicle

Authors: J. Marzbanrad, A. Yadollahi

Abstract:

In the present paper, Fatigue life assessment of an anti-roll bar component of a passenger vehicle, is investigated by ANSYS 11 software. A stress analysis is also carried out by the finite element technique for the determination of highly stressed regions on the bar. Anti-roll bar is a suspension element used at the front, rear, or at both ends of a car that reduces body roll by resisting any unequal vertical motion between the pair of wheels to which it is connected. As a first stage, fatigue damage models proposed by some well-known references and the corresponding assumptions are discussed and some enhancements are proposed. Then, fracture analysis of an anti-roll bar of an automobile is carried out. The analysed type of the anti-roll bar is especially important as many cases are reported about the fracture after a 100,000 km of travel fatigue and fracture conditions. This paper demonstrates fatigue life of an anti-roll bar and then evaluated by experimental analytically results from other researcher.

Keywords: Anti-roll bar, Fracture, Fatigue life, Random loading

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3537
945 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media

Authors: Jinghui Peng, Shanyu Tang, Jia Li

Abstract:

Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.

Keywords: Steganalysis, security, fast Fourier transform, streaming media.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 755
944 Inspection of Geometrical Integrity of Work Piece and Measurement of Tool Wear by the Use of Photo Digitizing Method

Authors: R. Alipour, F. Nadjarian, A. Alinaghizade

Abstract:

Considering complexity of products, new geometrical design and investment tolerances that are necessary, measuring and dimensional controlling involve modern and more precise methods. Photo digitizing method using two cameras to record pictures and utilization of conventional method named “cloud points" and data analysis by the use of ATOUS software, is known as modern and efficient in mentioned context. In this paper, benefits of photo digitizing method in evaluating sampling of machining processes have been put forward. For example, assessment of geometrical integrity surface in 5-axis milling process and measurement of carbide tool wear in turning process, can be can be brought forward. Advantages of this method comparing to conventional methods have been expressed.

Keywords: photo digitizing, tool wear, geometrical integrity, cloud points

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1342
943 The Role of State in Combating Religious Extremism and Terrorism

Authors: Kadyrzhan Smagulov, Mukhtar Senggirbay, Sholpan Zhandossova, Lyaila Ivatova, Gulnar Nassimova

Abstract:

terrorism and extremism are among the most dangerous and difficult to forecast the phenomena of our time, which are becoming more diverse forms and rampant. Terrorist attacks often produce mass casualties, involve the destruction of material and spiritual values, beyond the recovery times, sow hatred among nations, provoke war, mistrust and hatred between the social and national groups, which sometimes can not be overcome within a generation. Currently, the countries of Central Asia are a topical issue – the threat of terrorism and religious extremism, which grow not only in our area, but throughout the world. Of course, in each of the terrorist threat is assessed differently. In our country the problem of terrorism should not be acutely. Thus, after independence and sovereignty of Kazakhstan has chosen the path of democracy, progress and free economy. With the policy of the President of Kazakhstan Nursultan Nazarbayev and well-organized political and economic reforms, there has been economic growth and rising living standards, socio-political stability, ensured civil peace and accord in society [1].

Keywords: Kazakhstan, national security, religious extremism and terrorism, ethnic conflict

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2762