Search results for: security assessment.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2352

Search results for: security assessment.

642 Fragility Analysis of Weir Structure Subjected to Flooding Water Damage

Authors: Oh Hyeon Jeon, WooYoung Jung

Abstract:

In this study, seepage analysis was performed by the level difference between upstream and downstream of weir structure for safety evaluation of weir structure against flooding. Monte Carlo Simulation method was employed by considering the probability distribution of the adjacent ground parameter, i.e., permeability coefficient of weir structure. Moreover, by using a commercially available finite element program (ABAQUS), modeling of the weir structure is carried out. Based on this model, the characteristic of water seepage during flooding was determined at each water level with consideration of the uncertainty of their corresponding permeability coefficient. Subsequently, fragility function could be constructed based on this response from numerical analysis; this fragility function results could be used to determine the weakness of weir structure subjected to flooding disaster. They can also be used as a reference data that can comprehensively predict the probability of failur,e and the degree of damage of a weir structure.

Keywords: Weir structure, seepage, flood disaster fragility, probabilistic risk assessment, Monte-Carlo Simulation, permeability coefficient.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1140
641 An Efficient Spam Mail Detection by Counter Technique

Authors: Raheleh Kholghi, Soheil Behnam Roudsari, Alireza Nemaney Pour

Abstract:

Spam mails are unwanted mails sent to large number of users. Spam mails not only consume the network resources, but cause security threats as well. This paper proposes an efficient technique to detect, and to prevent spam mail in the sender side rather than the receiver side. This technique is based on a counter set on the sender server. When a mail is transmitted to the server, the mail server checks the number of the recipients based on its counter policy. The counter policy performed by the mail server is based on some pre-defined criteria. When the number of recipients exceeds the counter policy, the mail server discontinues the rest of the process, and sends a failure mail to sender of the mail; otherwise the mail is transmitted through the network. By using this technique, the usage of network resources such as bandwidth, and memory is preserved. The simulation results in real network show that when the counter is set on the sender side, the time required for spam mail detection is 100 times faster than the time the counter is set on the receiver side, and the network resources are preserved largely compared with other anti-spam mail techniques in the receiver side.

Keywords: Anti-spam, Mail server, Sender side, Spam mail

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1756
640 Measuring the Comprehensibility of a UML-B Model and a B Model

Authors: Rozilawati Razali, Paul W. Garratt

Abstract:

Software maintenance, which involves making enhancements, modifications and corrections to existing software systems, consumes more than half of developer time. Specification comprehensibility plays an important role in software maintenance as it permits the understanding of the system properties more easily and quickly. The use of formal notation such as B increases a specification-s precision and consistency. However, the notation is regarded as being difficult to comprehend. Semi-formal notation such as the Unified Modelling Language (UML) is perceived as more accessible but it lacks formality. Perhaps by combining both notations could produce a specification that is not only accurate and consistent but also accessible to users. This paper presents an experiment conducted on a model that integrates the use of both UML and B notations, namely UML-B, versus a B model alone. The objective of the experiment was to evaluate the comprehensibility of a UML-B model compared to a traditional B model. The measurement used in the experiment focused on the efficiency in performing the comprehension tasks. The experiment employed a cross-over design and was conducted on forty-one subjects, including undergraduate and masters students. The results show that the notation used in the UML-B model is more comprehensible than the B model.

Keywords: Model comprehensibility, formal and semi-formal notation, empirical assessment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1583
639 Microbial Assessment of Fenugreek Paste during Storage and Antimicrobial Effect of Greek Clover, Trigonella foenum-graecum

Authors: Zerrin Erginkaya, Gözde Konuray

Abstract:

In this study, antimicrobial effect of Greek clover was determined with usage of MIC (minimum inhibition concentration) and agar diffusion method. Moreover, pH, water activity and microbial change were determined during storage of fenugreek paste. At first part of our study, microbial load of spices was evaluated. Two different fenugreek pastes were produced with mixing of Greek clover, spices, garlic and water. Fenugreek pastes were stored at 4 °C. At the second part, antimicrobial effect of Greek clover was determined on Escherichia coli, Staphylococcus aureus, Bacillus subtilis, Debaryomyces hansenii, Aspergillus parasiticus, Candida rugosa, Mucor spp., when the concentrations of Greek clover were 8%, 12% and 16%. According to the results obtained, mould growth was determined at 15th and 30th days of storage in first and second fenugreek samples, respectively. Greek clover showed only antifungal effect on Aspergillus parasiticus at previously mentioned concentrations.

Keywords: Antimicrobial, fenugreek, Greek clover, minimum inhibition concentration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1294
638 Computer Assisted Learning in a Less Resource Region

Authors: Hamidullah Sokout, Samiullah Paracha, Abdul Rashid Ahmadi

Abstract:

Passing the entrance exam to a university is a major step in one's life. University entrance exam commonly known as Kankor is the nationwide entrance exam in Afghanistan. This examination is prerequisite for all public and private higher education institutions at undergraduate level. It is usually taken by students who are graduated from high schools. In this paper, we reflect the major educational school graduates issues and propose ICT-based test preparation environment, known as ‘Online Kankor Exam Prep System’ to give students the tools to help them pass the university entrance exam on the first try. The system is based on Intelligent Tutoring System (ITS), which introduced an essential package of educational technology for learners that features: (I) exam-focused questions and content; (ii) self-assessment environment; and (iii) test preparation strategies in order to help students to acquire the necessary skills in their carrier and keep them up-to-date with instruction.

Keywords: Web-based test prep systems, Learner-centered design, E-Learning, Intelligent tutoring system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1939
637 Machine Learning Methods for Flood Hazard Mapping

Authors: S. Zappacosta, C. Bove, M. Carmela Marinelli, P. di Lauro, K. Spasenovic, L. Ostano, G. Aiello, M. Pietrosanto

Abstract:

This paper proposes a neural network approach for assessing flood hazard mapping. The core of the model is a machine learning component fed by frequency ratios, namely statistical correlations between flood event occurrences and a selected number of topographic properties. The classification capability was compared with the flood hazard mapping River Basin Plans (Piani Assetto Idrogeologico, acronimed as PAI) designed by the Italian Institute for Environmental Research and Defence, ISPRA (Istituto Superiore per la Protezione e la Ricerca Ambientale), encoding four different increasing flood hazard levels. The study area of Piemonte, an Italian region, has been considered without loss of generality. The frequency ratios may be used as a standalone block to model the flood hazard mapping. Nevertheless, the mixture with a neural network improves the classification power of several percentage points, and may be proposed as a basic tool to model the flood hazard map in a wider scope.

Keywords: flood modeling, hazard map, neural networks, hydrogeological risk, flood risk assessment

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 691
636 Information Technologies in Human Resources Management - Selected Examples

Authors: A. Karasek

Abstract:

Rapid growth of Information Technologies (IT) has had huge influence on enterprises, and it has contributed to its promotion and increasingly extensive use in enterprises. Information Technologies have to a large extent determined the processes taking place in an enterprise; what is more, IT development has brought the need to adopt a brand new approach to human resources management in an enterprise. The use of IT in human resource management (HRM) is of high importance due to the growing role of information and information technologies. The aim of this paper is to evaluate the use of information technologies in human resources management in enterprises. These practices will be presented in the following areas: recruitment and selection, development and training, employee assessment, motivation, talent management, personnel service. Results of conducted survey show diversity of solutions applied in particular areas of human resource management. In the future, further development in this area should be expected, as well as integration of individual HRM areas, growing mobile-enabled HR processes and their transfer into the cloud. Presented IT solutions applied in HRM are highly innovative, which is of great significance due to their possible implementation in other enterprises.

Keywords: E-HR, human resources management, HRM practices, HRMS, information technologies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5505
635 RadMote: A Mobile Framework for Radiation Monitoring in Nuclear Power Plants

Authors: Javier Barbaran, Manuel Dıaz, Inaki Esteve, Bartolome Rubio

Abstract:

Wireless Sensor Networks (WSNs) have attracted the attention of many researchers. This has resulted in their rapid integration in very different areas such as precision agriculture,environmental monitoring, object and event detection and military surveillance. Due to the current WSN characteristics this technology is specifically useful in industrial areas where security, reliability and autonomy are basic, such as nuclear power plants, chemical plants, and others. In this paper we present a system based on WSNs to monitor environmental conditions around and inside a nuclear power plant, specifically, radiation levels. Sensor nodes, equipped with radiation sensors, are deployed in fixed positions throughout the plant. In addition, plant staff are also equipped with mobile devices with higher capabilities than sensors such as for example PDAs able to monitor radiation levels and other conditions around them. The system enables communication between PDAs, which form a Mobile Ad-hoc Wireless Network (MANET), and allows workers to monitor remote conditions in the plant. It is particularly useful during stoppage periods for inspection or in the event of an accident to prevent risk situations.

Keywords: MANETs, Mobile computing, Radiation monitoring, Wireless Sensor Networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1991
634 Determination of Critical Source Areas for Sediment Loss: Sarrath River Basin, Tunisia

Authors: Manel Mosbahi

Abstract:

The risk of water erosion is one of the main environmental concerns in the southern Mediterranean regions. Thus, quantification of soil loss is an important issue for soil and water conservation managers. The objective of this paper is to examine the applicability of the Soil and Water Assessment Tool (SWAT) model in The Sarrath river catchment, North of Tunisia, and to identify the most vulnerable areas in order to help manager implement an effective management program. The spatial analysis of the results shows that 7 % of the catchment experiences very high erosion risk, in need for suitable conservation measures to be adopted on a priority basis. The spatial distribution of erosion risk classes estimated 3% high, 5,4% tolerable, and 84,6% low. Among the 27 delineated subcatchments only 4 sub-catchments are found to be under high and very high soil loss group, two sub-catchments fell under moderate soil loss group, whereas other sub-catchments are under low soil loss group.

Keywords: Critical source areas, Erosion risk, SWAT model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1446
633 Mechanical Structure Design Optimization by Blind Number Theory: Time-dependent Reliability

Authors: Zakari Yaou, Lirong Cui

Abstract:

In a product development process, understanding the functional behavior of the system, the role of components in achieving functions and failure modes if components/subsystem fails its required function will help develop appropriate design validation and verification program for reliability assessment. The integration of these three issues will help design and reliability engineers in identifying weak spots in design and planning future actions and testing program. This case study demonstrate the advantage of unascertained theory described in the subjective cognition uncertainty, and then applies blind number (BN) theory in describing the uncertainty of the mechanical system failure process and the same time used the same theory in bringing out another mechanical reliability system model. The practical calculations shows the BN Model embodied the characters of simply, small account of calculation but betterforecasting capability, which had the value of macroscopic discussion to some extent.

Keywords: Mechanical structure Design, time-dependent stochastic process, unascertained information, blind number theory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1457
632 A Bayesian Network Reliability Modeling for FlexRay Systems

Authors: Kuen-Long Leu, Yung-Yuan Chen, Chin-Long Wey, Jwu-E Chen, Chung-Hsien Hsu

Abstract:

The increasing importance of FlexRay systems in automotive domain inspires unceasingly relative researches. One primary issue among researches is to verify the reliability of FlexRay systems either from protocol aspect or from system design aspect. However, research rarely discusses the effect of network topology on the system reliability. In this paper, we will illustrate how to model the reliability of FlexRay systems with various network topologies by a well-known probabilistic reasoning technology, Bayesian Network. In this illustration, we especially investigate the effectiveness of error containment built in star topology and fault-tolerant midpoint synchronization algorithm adopted in FlexRay communication protocol. Through a FlexRay steer-by-wire case study, the influence of different topologies on the failure probability of the FlexRay steerby- wire system is demonstrated. The notable value of this research is to show that the Bayesian Network inference is a powerful and feasible method for the reliability assessment of FlexRay systems.

Keywords: Bayesian Network, FlexRay, fault tolerance, network topology, reliability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2012
631 An Analysis of Thermal Comfort for Indoor Environment of the New Assiut Housing in Egypt

Authors: Amr Sayed, Y. Hiroshi, T. Goto, N. Enteria, M. M. Radwan, M. Abdelsamei Eid

Abstract:

Climate considerations are essential dimensions in the assessment of thermal comfort and indoor environments inside Egyptian housing. The primary aim of this paper is to analyze the indoor environment of new housing in the new city of Assiut in the Southern Upper Egypt zone, in order to evaluate its thermal environment and determine the acceptable indoor operative temperatures. The psychrometric charts for ASHRAE Standard 55 and ACS used in this study would facilitate an overall representation of the climate in one of the hottest months in the summer season. This study helps to understand and deal with this problem and work on a passive cooling ventilation strategy in these contexts in future studies. The results that demonstrated the indoor temperature is too high, ranges between 31°C to 40°C in different natural ventilation strategies. This causes the indoor environment to be far from the optimum comfort operative temperature of ACS except when using air conditioners. Finally, this study is considered a base for developing a new system using natural ventilation with passive cooling strategies.

Keywords: Adaptive comfort standard (ACS), indoor environment, thermal comfort, ventilation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4216
630 Selection of Intensity Measure in Probabilistic Seismic Risk Assessment of a Turkish Railway Bridge

Authors: M. F. Yilmaz, B. Ö. Çağlayan

Abstract:

Fragility curve is an effective common used tool to determine the earthquake performance of structural and nonstructural components. Also, it is used to determine the nonlinear behavior of bridges. There are many historical bridges in the Turkish railway network; the earthquake performances of these bridges are needed to be investigated. To derive fragility curve Intensity measures (IMs) and Engineering demand parameters (EDP) are needed to be determined. And the relation between IMs and EDP are needed to be derived. In this study, a typical simply supported steel girder riveted railway bridge is studied. Fragility curves of this bridge are derived by two parameters lognormal distribution. Time history analyses are done for selected 60 real earthquake data to determine the relation between IMs and EDP. Moreover, efficiency, practicality, and sufficiency of three different IMs are discussed. PGA, Sa(0.2s) and Sa(1s), the most common used IMs parameters for fragility curve in the literature, are taken into consideration in terms of efficiency, practicality and sufficiency.

Keywords: Railway bridges, earthquake performance, fragility analyses, selection of intensity measures.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 872
629 A Value-Oriented Metamodel for Small and Medium Enterprises’ Decision Making

Authors: Romain Ben Taleb, Aurélie Montarnal, Matthieu Lauras, Mathieu Dahan, Romain Miclo

Abstract:

To be competitive and sustainable, any company has to maximize its value. However, unlike listed companies that can assess their values based on market shares, most Small and Medium Enterprises (SMEs) which are non-listed cannot have direct and live access to this critical information. Traditional accounting reports only give limited insights to SME decision-makers about the real impact of their day-to-day decisions on the company’s performance and value. Most of the time, an SME’s financial valuation is made one time a year as the associated process is time and resource-consuming, requiring several months and external expertise to be completed. To solve this issue, we propose in this paper a value-oriented metamodel that enables real-time and dynamic assessment of the SME’s value based on the large definition of their assets. These assets cover a wider scope of resources of the company and better account for immaterial assets. The proposal, which is illustrated in a case study, discusses the benefits of incorporating assets in the SME valuation.

Keywords: SME, metamodel, decision support system, financial valuation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 391
628 Optimizing Resource Allocation and Indoor Location Using Bluetooth Low Energy

Authors: Néstor Álvarez-Díaz, Pino Caballero-Gil, Héctor Reboso-Morales, Francisco Martín-Fernández

Abstract:

The recent tendency of ”Internet of Things” (IoT) has developed in the last years, causing the emergence of innovative communication methods among multiple devices. The appearance of Bluetooth Low Energy (BLE) has allowed a push to IoT in relation to smartphones. In this moment, a set of new applications related to several topics like entertainment and advertisement has begun to be developed but not much has been done till now to take advantage of the potential that these technologies can offer on many business areas and in everyday tasks. In the present work, the application of BLE technology and smartphones is proposed on some business areas related to the optimization of resource allocation in huge facilities like airports. An indoor location system has been developed through triangulation methods with the use of BLE beacons. The described system can be used to locate all employees inside the building in such a way that any task can be automatically assigned to a group of employees. It should be noted that this system cannot only be used to link needs with employees according to distances, but it also takes into account other factors like occupation level or category. In addition, it has been endowed with a security system to manage business and personnel sensitive data. The efficiency of communications is another essential characteristic that has been taken into account in this work.

Keywords: Bluetooth Low Energy, indoor location, resource assignment, smartphones.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1649
627 Selecting Stealth Aircraft Using Determinate Fuzzy Preference Programming in Multiple Criteria Decision Making

Authors: C. Ardil

Abstract:

This paper investigates the application of the determinate fuzzy preference programming method for a more nuanced and comprehensive evaluation of stealth aircraft. Traditional methods often struggle to incorporate subjective factors and uncertainties inherent in complex systems like stealth aircraft. Determinate fuzzy preference programming addresses this limitation by leveraging the strengths of determinate fuzzy sets. The proposed novel multiple criteria decision-making algorithm integrates these concepts to consider aspects and criteria influencing aircraft performance. This approach aims to provide a more holistic assessment by enabling decision-makers to observe positive and negative outranking flows simultaneously. By demonstrating the validity and effectiveness of this approach through a practical example of selecting a stealth aircraft, this paper aims to establish the determinate fuzzy preference programming method as a valuable tool for informed decision-making in this critical domain.

Keywords: Determinate fuzzy set, stealth aircraft selection, distance function, decision making, uncertainty, preference programming. MCDM

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 105
626 Assessing Basic Computer Applications’ Skills of College-Level Students in Saudi Arabia

Authors: Mohammed A. Gharawi, Majed M. Khoja

Abstract:

This paper is a report on the findings of a study conducted at the Institute of Public Administration (IPA) in Saudi Arabia. The paper applied both qualitative and quantitative approaches to assess the levels of basic computer applications’ skills among students enrolled in the preparatory programs of the institution. Qualitative data have been collected from semi-structured interviews with the instructors who have previously been assigned to teach Introduction to information technology courses. Quantitative data were collected by executing a self-report questionnaire and a written statistical test. Three hundred eighty enrolled students responded to the questionnaire and one hundred forty two accomplished the statistical test. The results indicate the lack of necessary skills to deal with computer applications among most of the students who are enrolled in the IPA’s preparatory programs.

Keywords: Assessment, Computer Applications, Computer Literacy, Institute of Public Administration, Saudi Arabia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2667
625 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis

Authors: R. Rama Kishore, Sunesh

Abstract:

This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.

Keywords: Digital watermarking, discrete cosine transform, chaotic grid map, entropy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 694
624 Principles of Sustainable and Affordable Housing Policy for Afghan Refugees Returning to Afghanistan

Authors: Mohammad Saraj Sharifzai, Keisuke Kitagawa, Mohammad Kamil Halimee, Javid Habib, Daishi Sakaguchi

Abstract:

The overall goal of this paper is to examine the suitability and potential of the policies addressing the sustainability and affordability of housing for returnees, and to determine the impact of this policy on housing delivery for Afghan refugees. Housing is a central component of the settlement experience of refugees. A positive housing situation can facilitate many aspects of integration. Unaffordable, and unsafe housing, however, can cause disruptions in the entire settlement process. This paper aims to identify a suite of built forms for housing that is both affordable and environmentally sustainable for Afghan refugees. The result was the development of a framework that enables the assessment of the overall performance of various types of housing development in all zones of the country. There is very little evidence that the present approach of housing provision to the vagaries of market forces has provided affordable housing, especially for Afghan refugees. There is a need to incorporate social housing into the policy to assist people who cannot afford to have their own houses.

Keywords: Afghan refugees, housing policy, affordability, social housing, housing provision, environmental sustainability principles, resettlement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2225
623 Optimization of Car Seat Considering Whiplash Injury

Authors: Wookyung Baik, Seungchan Lee, Choongmin Jeong, Siwoo Kim, Myungwon Suh

Abstract:

Development of motor car safety devices has reduced fatality rates in car accidents. Yet despite this increase in car safety, neck injuries resulting from rear impact collisions, particularly at low speed, remain a primary concern. In this study, FEA(Finite Element Analysis) of seat was performed to evaluate neck injuries in rear impact. And the FEA result was verified by comparison with the actual test results. The dummy used in FE model and actual test is BioRID II which is regarded suitable for rear impact collision analysis. A threshold of the BioRID II neck injury indicators was also proposed to upgrade seat performance in order to reduce whiplash injury. To optimize the seat for a low-speed rear impact collision, a method was proposed, which is multi-objective optimization idea using DOE (Design of Experiments) results.

Keywords: Whiplash injury, Dynamic assessment, Finite element method, Optimization, DOE (Design of Experiments), WSM (Weighed Sum Method).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1847
622 Developing Student Teachers to Be Professional Teachers

Authors: Suttipong Boonphadung

Abstract:

Practicum placements are an critical factor for student teachers on Education Programs. How can student teachers become professionals? This study was to investigate problems, weakness and obstacles of practicum placements and develop guidelines for partnership in the practicum placements. In response to this issue, a partnership concept was implemented for developing student teachers into professionals. Data were collected through questionnaires on attitude toward problems, weaknesses, and obstacles of practicum placements of student teachers in Rajabhat universities and included focus group interviews. The research revealed that learning management, classroom management, curriculum, assessment and evaluation, classroom action research, and teacher demeanor are the important factors affecting the professional development of Education Program student teachers. Learning management plan and classroom management concerning instructional design, teaching technique, instructional media, and student behavior management are another important aspects influencing the professional development for student teachers.

Keywords: Developing student teacher, Partnership concepts, Professional teachers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2034
621 Theoretical Study on Torsional Strengthening of Multi-cell RC Box Girders

Authors: Abeer A. M., Allawi A. A., Chai H. K.

Abstract:

A new analytical method to predict the torsional capacity and behavior of R.C multi-cell box girders strengthened with carbon fiber reinforced polymer (CFRP) sheets is presented. Modification was done on the Softened Truss Model (STM) in the proposed method; the concrete torsional problem is solved by combining the equilibrium conditions, compatibility conditions and constitutive laws of materials by taking into account the confinement of concrete with CFRP sheets. A specific algorithm is developed to predict the torsional behavior of reinforced concrete multi-cell box girders with or without strengthening by CFRP sheets. Applications of the developed method as an assessment tool to strengthened multicell box girders with CFRP and first analytical example that demonstrate the contribution of the CFRP materials on the torsional response is also included.

Keywords: Carbon fiber reinforced polymer, Concrete torsion, Modified Softened Truss Model, Multi-Cell box girder.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4348
620 A New Method in Short-Term Heart Rate Variability — Five-Class Density Histogram

Authors: Liping Li, Ke Li, Changchun Liu, Chengyu Liu, Yuanyang Li

Abstract:

A five-class density histogram with an index named cumulative density was proposed to analyze the short-term HRV. 150 subjects participated in the test, falling into three groups with equal numbers -- the healthy young group (Young), the healthy old group (Old), and the group of patients with congestive heart failure (CHF). Results of multiple comparisons showed a significant differences of the cumulative density in the three groups, with values 0.0238 for Young, 0.0406 for Old and 0.0732 for CHF (p<0.001). After 7 days and 14 days, 46 subjects from the Young and Old groups were retested twice following the same test protocol. Results showed good-to-excellent interclass correlations (ICC=0.783, 95% confidence interval 0.676-0.864). The Bland-Altman plots were used to reexamine the test-retest reliability. In conclusion, the method proposed could be a valid and reliable method to the short-term HRV assessment.

Keywords: Autonomic nervous system, congestive heart failure, heart rate variability, histogram.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1986
619 The Nature of Origin of New Criminal Occurrences in Gjakova Region: Cultural and Criminological “Intersection” in 1999-2009

Authors: Bekim Avdiaj

Abstract:

The transition period of Kosovo society brought fundamental changes in all the spheres of organizing life. This was the period when also in the cultural tradition the biggest movement and an emerging from ‘isolation’ or from the ‘shell’ occurred. Transformation of the traditional and embracing of the modern began here. The same was experienced and is currently being experienced also by Gjakova and its surrounding which is historically renowned for its great tradition and culture. The population of this region is actually facing a transition from the traditional system into the modern one and quite often with huge leaps. These ‘movements’ or ‘evolutions’ of the society of this region, besides the numerous positive things it ‘harvested’, also brought things that do not at all correspond with their tradition as well as new criminal occurrences which in the past were not present in this area. Furthermore, some of the ‘new’ behaviors that are embraced from other ‘cultures’ and ‘civilizations’, and which are often exceeded, are quite perturbing. The security situation is also worrying, particularly following the appearance of some new criminal occurrences. Therefore, with this research paper we will strive to analyze the new cultural “intersections” as well as the nature of the origin of some new very worrying criminal occurrences. We will present there also some factors inciting into these occurrences, which were confessed by the persons involved in these criminal occurrences and who come from this very region.

Keywords: Crime, culture, Gjakova region, occurrence.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1640
618 Land Use Change Detection Using Remote Sensing and GIS

Authors: Naser Ahmadi Sani, Karim Solaimani, Lida Razaghnia, Jalal Zandi

Abstract:

In recent decades, rapid and incorrect changes in land-use have been associated with consequences such as natural resources degradation and environmental pollution. Detecting changes in land-use is one of the tools for natural resource management and assessment of changes in ecosystems. The target of this research is studying the land-use changes in Haraz basin with an area of 677000 hectares in a 15 years period (1996 to 2011) using LANDSAT data. Therefore, the quality of the images was first evaluated. Various enhancement methods for creating synthetic bonds were used in the analysis. Separate training sites were selected for each image. Then the images of each period were classified in 9 classes using supervised classification method and the maximum likelihood algorithm. Finally, the changes were extracted in GIS environment. The results showed that these changes are an alarm for the HARAZ basin status in future. The reason is that 27% of the area has been changed, which is related to changing the range lands to bare land and dry farming and also changing the dense forest to sparse forest, horticulture, farming land and residential area.

Keywords: HARAZ Basin, Change Detection, Land-use, Satellite Data.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2300
617 Verification Process of Cylindrical Contact Force Models for Internal Contact Modeling

Authors: Cândida M. Pereira, Amílcar L. Ramalho, Jorge A. Ambrósio

Abstract:

In the numerical solution of the forward dynamics of a multibody system, the positions and velocities of the bodies in the system are obtained first. With the information of the system state variables at each time step, the internal and external forces acting on the system are obtained by appropriate contact force models if the continuous contact method is used instead of a discrete contact method. The local deformation of the bodies in contact, represented by penetration, is used to compute the contact force. The ability and suitability with current cylindrical contact force models to describe the contact between bodies with cylindrical geometries with particular focus on internal contacting geometries involving low clearances and high loads simultaneously is discussed in this paper. A comparative assessment of the performance of each model under analysis for different contact conditions, in particular for very different penetration and clearance values, is presented. It is demonstrated that some models represent a rough approximation to describe the conformal contact between cylindrical geometries because contact forces are underestimated.

Keywords: Clearance joints, Contact mechanics, Contact dynamics, Internal cylindrical contact, Multibody dynamics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2309
616 Power Flow Tracing Based Reactive Power Ancillary Service (AS) in Restructured Power Market

Authors: M. Susithra, R. Gnanadass

Abstract:

Ancillary services are support services which are essential for humanizing and enhancing the reliability and security of the electric power system. Reactive power ancillary service is one of the important ancillary services in a restructured electricity market which determines the cost of supplying ancillary services and finding of how this cost would change with respect to operating decisions. This paper presents a new formation that can be used to minimize the Independent System Operator (ISO)’s total payment for reactive power ancillary service. The modified power flow tracing algorithm estimates the availability of reserve reactive power for ancillary service. In order to find optimum reactive power dispatch, Biogeography based optimization method (BPO) is proposed. Market Reactive Clearing Price (MRCP) is then estimated and it encourages generator companies (GENCOs) to participate in an ancillary service. Finally, optimal weighting factor and real time utilization factor of reactive power give the minimum ISO’s total payment. The effectiveness of proposed design is verified using IEEE 30 bus system.

Keywords: Biogeography based optimization method, Power flow tracing method, Reactive generation capability curve and Reactive power ancillary service.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3216
615 Real-time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: Cyber-security, Intrusion Detection Systems, Temporal Graph Network, Anomaly Detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 462
614 Evaluating the Use of Digital Art Tools for Drawing to Enhance Artistic Ability and Improve Digital Skill among Junior School Students

Authors: Aber S. Aboalgasm, Rupert Ward

Abstract:

This study investigated some results of the use of digital art tools by junior school children in order to discover if these tools could promote artistic ability and creativity. The study considers the ease of use and usefulness of the tools as well as how to assess artwork produced by digital means. As the use of these tools is a relatively new development in Art education, this study may help educators in their choice of which tools to use and when to use them. The study also aims to present a model for the assessment of students’ artistic development and creativity by studying their artistic activity. This model can help in determining differences in students’ creative ability and could be useful both for teachers, as a means of assessing digital artwork, and for students, by providing the motivation to use the tools to their fullest extent. Sixteen students aged nine to ten years old were observed and recorded while they used the digital drawing tools. The study found that, according to the students’ own statements, it was not the ease of use but the successful effects the tools provided which motivated the children to use them.

Keywords: Artistic ability, creativity, drawing digital tool, TAM model, psychomotor domain.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2789
613 The Influence of Disturbances Generated by Arc Furnaces on the Power Quality

Authors: Z. Olczykowski

Abstract:

The paper presents the impact of work on the electric arc furnace. Arc equipment is one of the largest receivers powered by the power system. Electric arc disturbances arising during melting process occurring in these furnaces are the cause of an abrupt change of the passive power of furnaces. Currents drawn by these devices undergo an abrupt change, which in turn cause voltage fluctuations and light flicker. The quantitative evaluation of the voltage fluctuations is now the basic criterion of assessment of an influence of unquiet receiver on the supplying net. The paper presents the method of determination of range of voltage fluctuations and light flicker at parallel operation of arc devices. The results of measurements of voltage fluctuations and light flicker indicators recorded in power supply networks of steelworks were presented, with different number of parallel arc devices. Measurements of energy quality parameters were aimed at verifying the proposed method in practice. It was also analyzed changes in other parameters of electricity: the content of higher harmonics, asymmetry, voltage dips.

Keywords: Power quality, arc furnaces, propagation of voltage fluctuations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 705