Search results for: Product Characteristics
2079 SCR-Based Advanced ESD Protection Device for Low Voltage Application
Authors: Bo Bae Song, Byung Seok Lee, Hyun Young Kim, Chung Kwang Lee, Yong Seo Koo
Abstract:
This paper proposed a silicon controller rectifier (SCR) based ESD protection device to protect low voltage ESD for integrated circuit. The proposed ESD protection device has low trigger voltage and high holding voltage compared with conventional SCR-based ESD protection devices. The proposed ESD protection circuit is verified and compared by TCAD simulation. This paper verified effective low voltage ESD characteristics with low trigger voltage of 5.79V and high holding voltage of 3.5V through optimization depending on design variables (D1, D2, D3 and D4).
Keywords: ESD, SCR, Holding voltage, Latch-up.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28892078 Biplot Analysis for Evaluation of Tolerance in Some Bean (Phaseolus vulgaris L.) Genotypes to Bean Common Mosaic Virus (BCMV)
Authors: S. Ghasemi, M. M. Kamelmanesh, A. Namayandeh, R. Biabanikhankahdani
Abstract:
The common bean is the most important grain legume for direct human consumption in the world and BCMV is one of the world's most serious bean diseases that can reduce yield and quality of harvested product. To determine the best tolerance index to BCMV and recognize tolerant genotypes, 2 experiments were conducted in field conditions. Twenty five common bean genotypes were sown in 2 separate RCB design with 3 replications under contamination and non-contamination conditions. On the basis of the results of indices correlations GMP, MP and HARM were determined as the most suitable tolerance indices. The results of principle components analysis indicated 2 first components totally explained 98.52% of variations among data. The first and second components were named potential yield and stress susceptible respectively. Based on the results of BCMV tolerance indices assessment and biplot analysis WA8563-4, WA8563-2 and Cardinal were the genotypes that exhibited potential seed yield under contamination and noncontamination conditions.
Keywords: Phaseolus vulgaris, BCMV, principle components analysis, bi-plot analysis, tolerance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13572077 Determination of Regimes of the Equivalent Generator Based On Projective Geometry: The Generalized Equivalent Generator
Authors: A. A. Penin
Abstract:
Requirements that should be met when determining the regimes of circuits with variable elements are formulated. The interpretation of the variations in the regimes, based on projective geometry, enables adequate expressions for determining and comparing the regimes to be derived. It is proposed to use as the parameters of a generalized equivalent generator of an active two-pole with changeable resistor such load current and voltage which provide the current through this resistor equal to zero.
Keywords: Equivalent generator, geometric circuits theory, circuits regimes, load characteristics, variable elements.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13932076 Travel Time Model for Cylinder Type Parking System
Authors: Jing Zhang, Jie Chen
Abstract:
In this paper, we mainly analyze an automated parking system where the storage and retrieval requests are performed by a tower crane. In this parking system, the S/R crane which is located at the middle of the bottom of the cylinder parking area can rotate in both clockwise and counterclockwise and three kinds of movements can be done simultaneously. We develop some mathematical travel time models for the single command cycle under the random storage assignment using the characteristics of this system. Finally, we compare these travel models with discrete case and it is shown that these travel models display a good satisfactory performance.Keywords: Parking system, travel time model, tower crane.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7922075 Investigation of Multiple Material Gate Impact on Short Channel Effects and Reliability of Nanoscale SOI MOSFETs
Authors: Paniz Tafakori, Ali A. Orouji
Abstract:
In this paper the features of multiple material gate silicon-on-insulator MOSFETs are presented and compared with single material gate silicon-on-insulator MOSFET structures. The results indicate that the multiple material gate structures reduce short channel effects such as drain induce barrier lowering, hot electron effect and better current characteristics in comparison with single material structuresKeywords: Short-channel effects (SCEs), Dual material gate (DMG), Triple material gate (TMG), Pentamerous material gate (PMG).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20042074 Descriptive Study of Libyan Steles of Grande Kabylia, Algeria
Authors: Samia Ait Ali Yahia
Abstract:
The Libyan steles contain a good number of inscriptions. We find them on blocks of sandstone in the northern part of Grande Kabylia, Algeria. Three Libyan steles recently discovered are added to the currently known and published documents which enrich the Libyan heritage of this region. The aim of this article is to make a descriptive study of the Libyan inscriptions of these steles in order to better understand the characteristics of each stele by comparing them to the different stele already known in the region. It is certain that if other similar specimens were to be added to those we already possess, knowledge of the Libyan would gradually become clearer. The Kabylia region is certainly full of these remains that have not yet been brought to light.
Keywords: Libyan stele, Libyan inscriptions, Paintings, Engraving, Kaylie.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3382073 A Survey of Attacks and Security Requirements in Wireless Sensor Networks
Authors: Vishnu Pratap Singh Kirar
Abstract:
Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Keywords: Wireless Sensor Network (WSN), Wireless Network Attacks, Wireless Network Security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29942072 Modeling of Knowledge-Intensive Business Processes
Authors: Eckhard M. Ammann
Abstract:
Knowledge development in companies relies on knowledge-intensive business processes, which are characterized by a high complexity in their execution, weak structuring, communication-oriented tasks and high decision autonomy, and often the need for creativity and innovation. A foundation of knowledge development is provided, which is based on a new conception of knowledge and knowledge dynamics. This conception consists of a three-dimensional model of knowledge with types, kinds and qualities. Built on this knowledge conception, knowledge dynamics is modeled with the help of general knowledge conversions between knowledge assets. Here knowledge dynamics is understood to cover all of acquisition, conversion, transfer, development and usage of knowledge. Through this conception we gain a sound basis for knowledge management and development in an enterprise. Especially the type dimension of knowledge, which categorizes it according to its internality and externality with respect to the human being, is crucial for enterprise knowledge management and development, because knowledge should be made available by converting it to more external types. Built on this conception, a modeling approach for knowledgeintensive business processes is introduced, be it human-driven,e-driven or task-driven processes. As an example for this approach, a model of the creative activity for the renewal planning of a product is given.Keywords: Conception of knowledge, knowledge dynamics, modeling notation, knowledge-intensive business processes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18332071 Lowering Error Floors by Concatenation of Low-Density Parity-Check and Array Code
Authors: Cinna Soltanpur, Mohammad Ghamari, Behzad Momahed Heravi, Fatemeh Zare
Abstract:
Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.Keywords: Concatenated coding, low–density parity–check codes, array code, error floors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9922070 Combined Hashing/Watermarking Method for Image Authentication
Authors: Vlado Kitanovski, Dimitar Taskovski, Sofija Bogdanova
Abstract:
In this paper we present a combined hashing/watermarking method for image authentication. A robust image hash, invariant to legitimate modifications, but fragile to illegitimate modifications is generated from the local image characteristics. To increase security of the system the watermark is generated using the image hash as a key. Quantized Index Modulation of DCT coefficients is used for watermark embedding. Watermark detection is performed without use of the original image. Experimental results demonstrate the effectiveness of the presented method in terms of robustness and fragility.Keywords: authentication, blind watermarking, image hash, semi-fragile watermarking
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19992069 Research of Concentratibility of Low Quality Bauxite Raw Materials
Authors: Nadezhda Nikolaeva, Tatyana Alexandrova, Alexandr Alexandrov
Abstract:
Processing of high-silicon bauxite on the base of the traditional clinkering method is related to high power consumption and capital investments, which makes production of alumina from those ores non-competitive in terms of basic economic showings. For these reasons, development of technological solutions enabling to process bauxites with various chemical and mineralogical structures efficiently with low level of thermal power consumption is important. Flow sheet of the studies on washability of ores from the Timanskoe and the Severo-Onezhskoe deposits is on the base of the flotation method.Keywords: Low-quality bauxite, resource-saving technology, optimization, aluminum, conditioning of composition, separation characteristics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19442068 A Comparative Study of Main Memory Databases and Disk-Resident Databases
Authors: F. Raja, M.Rahgozar, N. Razavi, M. Siadaty
Abstract:
Main Memory Database systems (MMDB) store their data in main physical memory and provide very high-speed access. Conventional database systems are optimized for the particular characteristics of disk storage mechanisms. Memory resident systems, on the other hand, use different optimizations to structure and organize data, as well as to make it reliable. This paper provides a brief overview on MMDBs and one of the memory resident systems named FastDB and compares the processing time of this system with a typical disc resident database based on the results of the implementation of TPC benchmarks environment on both.Keywords: Disk-Resident Database, FastDB, Main MemoryDatabase.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30632067 A Unique Solution for Designing Low-Cost, Heterogeneous Sensor Networks Using a Middleware Integration Platform
Authors: Jarrod Trevathan, Trina Myers
Abstract:
Proprietary sensor network systems are typically expensive, rigid and difficult to incorporate technologies from other vendors. When using competing and incompatible technologies, a non-proprietary system is complex to create because it requires significant technical expertise and effort, which can be more expensive than a proprietary product. This paper presents the Sensor Abstraction Layer (SAL) that provides middleware architectures with a consistent and uniform view of heterogeneous sensor networks, regardless of the technologies involved. SAL abstracts and hides the hardware disparities and specificities related to accessing, controlling, probing and piloting heterogeneous sensors. SAL is a single software library containing a stable hardware-independent interface with consistent access and control functions to remotely manage the network. The end-user has near-real-time access to the collected data via the network, which results in a cost-effective, flexible and simplified system suitable for novice users. SAL has been used for successfully implementing several low-cost sensor network systems.
Keywords: Sensor networks, hardware abstraction, middleware integration platform, sensor web enablement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20752066 FPGA Implementation of the BB84 Protocol
Authors: Jaouadi Ikram, Machhout Mohsen
Abstract:
The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.
Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8582065 Trispectral Analysis of Voiced Sounds Defective Audition and Tracheotomisian Cases
Abstract:
This paper presents the cepstral and trispectral analysis of a speech signal produced by normal men, men with defective audition (deaf, deep deaf) and others affected by tracheotomy, the trispectral analysis based on parametric methods (Autoregressive AR) using the fourth order cumulant. These analyses are used to detect and compare the pitches and the formants of corresponding voiced sounds (vowel \a\, \i\ and \u\). The first results appear promising, since- it seems after several experimentsthere is no deformation of the spectrum as one could have supposed it at the beginning, however these pathologies influenced the two characteristics: The defective audition influences to the formants contrary to the tracheotomy, which influences the fundamental frequency (pitch).Keywords: Cepstrum, cumulant, defective audition, tracheotomisy, trispectrum.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14062064 An Innovative Green Cooling Approach Using Peltier Chip in Milling Operation for Surface Roughness Improvement
Authors: Md. Anayet U. Patwari, Mohammad Ahsan Habib, Md. Tanzib Ehsan, Md Golam Ahnaf, Md. S. I. Chowdhury
Abstract:
Surface roughness is one of the key quality parameters of the finished product. During any machining operation, high temperatures are generated at the tool-chip interface impairing surface quality and dimensional accuracy of products. Cutting fluids are generally applied during machining to reduce temperature at the tool-chip interface. However, usages of cutting fluids give rise to problems such as waste disposal, pollution, high cost, and human health hazard. Researchers, now-a-days, are opting towards dry machining and other cooling techniques to minimize use of coolants during machining while keeping surface roughness of products within desirable limits. In this paper, a concept of using peltier cooling effects during aluminium milling operation has been presented and adopted with an aim to improve surface roughness of the machined surface. Experimental evidence shows that peltier cooling effect provides better surface roughness of the machined surface compared to dry machining.
Keywords: Aluminium, surface roughness, Peltier cooling effect, milling operation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9502063 Mobility Analysis of the Population of Rabat-Salé-Zemmour-Zaer
Authors: F. Ghaiti
Abstract:
In this paper, we present the 2006 survey study origin destination and price that we carried out during 2006 fall in the area in the Moroccan region of Rabat-Salé-Zemmour-Zaer. The survey concerns the people-s characteristics, their displacements behavior and the price that they will be able to pay for a tramway ticket. The main objective is to study a set of relative features to the households and to their displacement's habits and to their choices among public and privet transport modes. A comparison between this survey results and that of the 1996's is made. A pricing scheme is also given according to the tram capacity. (The Rabat-Salé tramway is under construction right now and it will be operational beginning 2010).
Keywords: Matrix O/D, Theory of pricing, Urban transport survey.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26402062 Water Soluble Chitosan Derivatives via the Freeze Concentration Technique
Authors: Senem Avaz, Alpay Taralp
Abstract:
Chitosan has been an attractive biopolymer for decades, but its processability is lowered by its poor solubility, especially in physiological pH values. Freeze concentrated reactions of chitosan with several organic acids including acrylic, citraconic, itaconic, and maleic acid revealed improved solubility and morphological properties. Solubility traits were assessed with a modified ninhydrin test. Chitosan derivatives were characterized by ATR-FTIR and morphological characteristics were determined by SEM. This study is a unique approach to chemically modify chitosan to enhance water solubility.
Keywords: Chitosan, Freeze Concentration, Frozen Reactions, Ninhydrin Test, Water Soluble Chitosan.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24152061 Synthesis of Peptide Amides using Sol-Gel Immobilized Alcalase in Batch and Continuous Reaction System
Authors: L. N. Corîci, A. E. Frissen, D -J. Van Zoelen, I. F. Eggen, F. Peter, C. M. Davidescu, C. G. Boeriu
Abstract:
Two commercial proteases from Bacillus licheniformis (Alcalase 2.4 L FG and Alcalase 2.5 L, Type DX) were screened for the production of Z-Ala-Phe-NH2 in batch reaction. Alcalase 2.4 L FG was the most efficient enzyme for the C-terminal amidation of Z-Ala-Phe-OMe using ammonium carbamate as ammonium source. Immobilization of protease has been achieved by the sol-gel method, using dimethyldimethoxysilane (DMDMOS) and tetramethoxysilane (TMOS) as precursors (unpublished results). In batch production, about 95% of Z-Ala-Phe-NH2 was obtained at 30°C after 24 hours of incubation. Reproducibility of different batches of commercial Alcalase 2.4 L FG preparations was also investigated by evaluating the amidation activity and the entrapment yields in the case of immobilization. A packed-bed reactor (0.68 cm ID, 15.0 cm long) was operated successfully for the continuous synthesis of peptide amides. The immobilized enzyme retained the initial activity over 10 cycles of repeated use in continuous reactor at ambient temperature. At 0.75 mL/min flow rate of the substrate mixture, the total conversion of Z-Ala-Phe-OMe was achieved after 5 hours of substrate recycling. The product contained about 90% peptide amide and 10% hydrolysis byproduct.Keywords: packed-bed reactor, peptide amide, protease, sol-gel immobilization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26892060 Integral Methods in the Determination of Temperature Fields of Cooled Blades of Gas Turbines
Authors: C. Ardil
Abstract:
A mathematical model and an effective numerical method for calculating the temperature field of the profile part of convection cooled blades have been developed. The theoretical substantiation of the method is proved by corresponding theorems. To this end, convergent quadrature processes were developed and error estimates were obtained in terms of the Zygmund continuity moduli.The boundary conditions for heat exchange are determined from the solution of the corresponding integral equations and empirical relations.The reliability of the developed methods is confirmed by the calculation-experimental studies of the thermohydraulic characteristics of the nozzle apparatus of the first stage of a gas turbine.Keywords: Integral methods, determination of temperature fields, cooled blades, gas turbines.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7562059 Object Localization in Medical Images Using Genetic Algorithms
Authors: George Karkavitsas, Maria Rangoussi
Abstract:
We present a genetic algorithm application to the problem of object registration (i.e., object detection, localization and recognition) in a class of medical images containing various types of blood cells. The genetic algorithm approach taken here is seen to be most appropriate for this type of image, due to the characteristics of the objects. Successful cell registration results on real life microscope images of blood cells show the potential of the proposed approach.
Keywords: Genetic algorithms, object registration, pattern recognition, blood cell microscope images.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19682058 The Problem of Now in Special Relativity Theory
Authors: Mogens Frank Mikkelsen
Abstract:
Special Relativity Theory (SRT) includes only one characteristic of light, the speed is equal to all observers, and by excluding other relevant characteristics of light, the common interpretation of SRT should be regarded as merely an approximative theory. By rethinking the iconic double light cones, a revised version of SRT can be developed. The revised concept of light cones acknowledges an asymmetry of past and future light cones and introduced a concept of the extended past to explain the predictions as something other than the future. Combining this with the concept of photon-paired events, led to the inference that SRT can support the existence of Now. The paper takes a critical approach to the mathematical assumption behind current interpretation of SRT.
Keywords: Relativity, light cone, Minkowski, time.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 292057 Influence of Propeller Blade Lift Distribution on Whirl Flutter Stability Characteristics
Authors: J. Cecrdle
Abstract:
This paper deals with the whirl flutter of the turboprop aircraft structures. It is focused on the influence of the blade lift span-wise distribution on the whirl flutter stability. Firstly it gives the overall theoretical background of the whirl flutter phenomenon. After that the propeller blade forces solution and the options of the blade lift modeling are described. The problem is demonstrated on the example of a twin turboprop aircraft structure. There are evaluated the influences with respect to the propeller aerodynamic derivatives and finally the influences to the whirl flutter speed and the whirl flutter margin respectively.
Keywords: Aeroelasticity, flutter, propeller blade force, whirl flutter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23302056 Numerical Modeling of Temperature Fields in Aviation Gas Turbine Elements
Authors: A. M. Pashaev, R. A. Sadihov, A. S. Samedov, C. Ardil
Abstract:
A mathematical model and a numerical method for computing the temperature field of the profile part of convectionally cooled blades are developed. The theoretical substantiation of the method is proved by corresponding theorems. To this end, convergent quadrature processes were developed and error estimates were obtained in terms of the Zygmund continuity moduli. The boundary conditions for heat exchange are determined from the solution of the corresponding integral equations and empirical relations. The reliability of the developed methods is confirmed by calculation and experimental studies of the thermohydraulic characteristics of the nozzle apparatus of the first stage of the gas turbine.
Keywords: Aviation gas turbine, temperature field, cooled blades, numerical modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7492055 Structure and Activity Research of Hydrocarbons Refining Catalysts Based on Wastes of Ferroalloy Production
Authors: Zhanat Shomanova, Ruslan Safarov, Yuri Nosenko, Zheneta Tashmuchambetova, Alima Zharmagambetova
Abstract:
An effective way of utilization of ferroalloy production wastes is preparing hydrocarbon refining catalysts from them. It is possible due to accordable transition metals containing in the wastes. In the work, we are presenting the results on elemental analysis of sludge samples from Aksu ferroalloy plant (Aksu, Kazakhstan), method of catalysts preparing, results of physical-chemical analysis of obtained catalysts (X-ray analysis, electron microscopy, the BET method etc.), results of using the catalysts in some hydrocarbons refining processes such as hydrocracking of rubber waste, cracking of gasoil, oxidation of cyclohexane. The main results of catalytic activity research are: a) In hydrocracking of rubber waste 64.9% of liquid products were fuel fractions; b) In cracking of gasoil conversion was 51% and selectivity by liquid products was 99%; c) In oxidation of cyclohexane the maximal product yield 87.9% and selectivity by cyclohexanol 93.0% were achieved.Keywords: Catalyst, cyclohexane oxidation, ferroalloy production waste, gasoil cracking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8872054 Combining Variable Ordering Heuristics for Improving Search Algorithms Performance
Authors: Abdolreza Hatamlou, Yusef Farhang, Mohammad Reza Meybodi
Abstract:
Variable ordering heuristics are used in constraint satisfaction algorithms. Different characteristics of various variable ordering heuristics are complementary. Therefore we have tried to get the advantages of all heuristics to improve search algorithms performance for solving constraint satisfaction problems. This paper considers combinations based on products and quotients, and then a newer form of combination based on weighted sums of ratings from a set of base heuristics, some of which result in definite improvements in performance.
Keywords: Constraint Satisfaction Problems, Variable Ordering Heuristics, Combination, Search Algorithms
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13672053 Facilitating a Cyber-Enabled Fraud Using the O.MG Cable to Incriminate the Victim
Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt
Abstract:
This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger is used in an unauthorised way, to alter the content of a file (an accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behaviour during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorised changes made by a programmable device.
Keywords: O.MG Cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6662052 Flow Properties of Wood Pulp Suspensions in Pipes
Authors: M. Sumida
Abstract:
The flow of suspensions of wood pulp fibers in circular pipes has been investigated experimentally. The flow characteristics of pulp suspensions are discussed with regard to five flow regimes designated by the author. In particular, the effects of the shear stress at the pipe wall on the disruption and dispersion of networks of pulp fibers are examined. The values of the disruptive and dispersive shear stresses are formulated as simple expressions depending on only the fiber concentration. Furthermore, the flow properties of the suspensions are described using the yield shear stress.
Keywords: Fiber Concentration, Flow Properties, Pulp Suspension, Yield Shear Stress.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32852051 Designing Software Quality Measurement System for Telecommunication Industry Using Object-Oriented Technique
Authors: Nor Fazlina Iryani Abdul Hamid, Mohamad Khatim Hasan
Abstract:
Numbers of software quality measurement system have been implemented over the past few years, but none of them focuses on telecommunication industry. Software quality measurement system for telecommunication industry was a system that could calculate the quality value of the measured software that totally focused in telecommunication industry. Before designing a system, quality factors, quality attributes and quality metrics were identified based on literature review and survey. Then, using the identified quality factors, quality attributes and quality metrics, quality model for telecommunication industry was constructed. Each identified quality metrics had its own formula. Quality value for the system was measured based on the quality metrics and aggregated by referring to the quality model. It would classify the quality level of the software based on Net Satisfaction Index (NSI). The system was designed using object-oriented approach in web-based environment. Thus, existing of software quality measurement system was important to both developers and users in order to produce high quality software product for telecommunication industry.
Keywords: Software Quality, Quality Measurement, Object-oriented Approach, Net satisfaction Index.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24502050 Rural Women’s Skill Acquisition in the Processing of Locust Bean in Ipokia Local Government Area of Ogun State, Nigeria
Authors: A. A. Adekunle, A. M. Omoare, W. O. Oyediran
Abstract:
This study was carried out to assess rural women’s skill acquisition in the processing of locust bean in Ipokia Local Government Area of Ogun State, Nigeria. Simple random sampling technique was used to select 90 women locust bean processors for this study. Data were analyzed with descriptive statistics and Pearson Product Moment Correlation. The result showed that the mean age of respondents was 40.72 years. Most (70.00%) of the respondents were married. The mean processing experience was 8.63 years. 93.30% of the respondents relied on information from fellow locust beans processors and friends. All (100%) the respondents did not acquire improved processing skill through trainings and workshops. It can be concluded that the rural women’s skill acquisition on modernized processing techniques was generally low. It is hereby recommend that the rural women processors should be trained by extension service providers through series of workshops and seminars on improved processing techniques.
Keywords: Locust bean, processing, skill acquisition, rural women.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2816