Search results for: privacy behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 646

Search results for: privacy behaviour

376 On Identity Disclosure Risk Measurement for Shared Microdata

Authors: M. N. Huda, S. Yamada, N. Sonehara

Abstract:

Probability-based identity disclosure risk measurement may give the same overall risk for different anonymization strategy of the same dataset. Some entities in the anonymous dataset may have higher identification risks than the others. Individuals are more concerned about higher risks than the average and are more interested to know if they have a possibility of being under higher risk. A notation of overall risk in the above measurement method doesn-t indicate whether some of the involved entities have higher identity disclosure risk than the others. In this paper, we have introduced an identity disclosure risk measurement method that not only implies overall risk, but also indicates whether some of the members have higher risk than the others. The proposed method quantifies the overall risk based on the individual risk values, the percentage of the records that have a risk value higher than the average and how larger the higher risk values are compared to the average. We have analyzed the disclosure risks for different disclosure control techniques applied to original microdata and present the results.

Keywords: Anonymization, microdata, disclosure risk, privacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1330
375 Abnormality Detection of Persons Living Alone Using Daily Life Patterns Obtained from Sensors

Authors: Ippei Kamihira, Takashi Nakajima, Taiyo Matsumura, Hikaru Miura, Takashi Ono

Abstract:

In this research, the goal was construction of a system by which multiple sensors were used to observe the daily life behavior of persons living alone (while respecting their privacy), using this information to judge such conditions as bad physical condition or falling in the home, etc., so that these abnormal conditions can be made known to relatives and third parties. The daily life patterns of persons living alone are expressed by the number of responses of sensors each time that a set time period has elapsed. By comparing data for the prior two weeks, it was possible to judge a situation as “normal” when the person was in good physical condition or as “abnormal” when the person was in bad physical condition.

Keywords: Sensors, Elderly living alone, Abnormality detection, Lifestyle habit.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1578
374 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: Cloud computing, intrusion detection system, privacy, trust.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1055
373 Synthesis of Polystyrene Grafting Filler Nanoparticles: Effect of Grafting on Mechanical Reinforcement

Authors: M. Khlifa, A. Youssef, A. F. Zaed, A. Kraft, V. Arrighi

Abstract:

A series of polystyrene (PS) nanoparticles were prepared by grafting polystyrene from both aggregated silica and colloidally dispersed silica nanoparticles using atom-transfer radical polymerisation (ATRP). Cross-linking and macroscopic gelation were minimised by using a miniemulsion system. The thermal and mechanical behaviour of the nanocomposites have been examined by differential scanning calorimetry (DSC) and dynamic mechanical thermal analysis (DMTA).

Keywords: ATRP, nanocomposites, polystyrene, reinforcement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2463
372 Analytics Model in a Telehealth Center Based on Cloud Computing and Local Storage

Authors: L. Ramirez, E. Guillén, J. Sánchez

Abstract:

Some of the main goals about telecare such as monitoring, treatment, telediagnostic are deployed with the integration of applications with specific appliances. In order to achieve a coherent model to integrate software, hardware, and healthcare systems, different telehealth models with Internet of Things (IoT), cloud computing, artificial intelligence, etc. have been implemented, and their advantages are still under analysis. In this paper, we propose an integrated model based on IoT architecture and cloud computing telehealth center. Analytics module is presented as a solution to control an ideal diagnostic about some diseases. Specific features are then compared with the recently deployed conventional models in telemedicine. The main advantage of this model is the availability of controlling the security and privacy about patient information and the optimization on processing and acquiring clinical parameters according to technical characteristics.

Keywords: Analytics, telemedicine, internet of things, cloud computing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1510
371 Horizontal Dimension of Constitutional Social Rights

Authors: Monika Florczak-Wątor

Abstract:

The main purpose of this paper is to determine the applicability of the constitutional social rights in the so-called horizontal relations, i.e. the relations between private entities. Nowadays the constitutional rights are more and more often violated by private entities and not only by the state. The private entities interfere with the privacy of individuals, limit their freedom of expression or disturb their peaceful gatherings. International corporations subordinate individuals in a way which may limit their constitutional rights. These new realities determine the new role of the constitution in protecting human rights. The paper will aim at answering two important questions. Firstly, are the private entities obliged to respect the constitutional social rights of other private entities and can they be liable for violation of these rights? Secondly, how the constitutional social rights can receive horizontal effect? Answers to these questions will have a significant meaning for the popularisation of the practice of applying the Constitution among the citizens as well as for the courts which settle disputes between them.

Keywords: Constitution, horizontal application, private relations, social rights.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2141
370 Temperature Effect on the Organic Solar Cells Parameters

Authors: F.Belhocine-Nemmar; MS.Belkaid D. Hatem, O Boughias

Abstract:

In this work, the influence of temperature on the different parameters of solar cells based on organic semiconductors are studied. The short circuit current Isc increases so monotonous with temperature and then saturates to a maximum value before decreasing at high temperatures. The open circuit voltage Vco decreases linearly with temperature. The fill factor FF and efficiency, which are directly related with Isc and Vco follow the variations of the letters. The phenomena are explained by the behaviour of the mobility which is a temperature activated process.

Keywords: cells parameters, organic materials, solar cells, temperature effect

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2602
369 Enhancing Customer Loyalty towards Corporate Social Responsibility of Thai Mobile Service Providers

Authors: Wichai Onlaor, Siriluck Rotchanakitumnuai

Abstract:

The aim of this research is to develop the understanding of corporate social responsibility (CSR) from consumers- perspective toward Thai mobile service providers. Based on the survey from 400 mobile customers, the result shows that four dimensions of CSR of Thai mobile service providers consist of economic, legal, ethical and philanthropic responsibility. These four CSR factors have positive impacts on enhancing customer satisfaction except one item of economic responsibility - profitability to shareholders. Ethical dimension has the strongest impact on customer satisfaction. Economic, legal, ethical, philanthropic responsibility and customer satisfaction have major impact on loyalty, whilst philanthropic component mostly affects loyalty.

Keywords: Corporate Social Responsibility, PriceFairness, Service Quality, Privacy Concern, CustomerSatisfaction, Customer Loyalty

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3364
368 The Functional Magnetic Resonance Imaging and the Consumer Behaviour: Reviewing Recent Research

Authors: Mikel Alonso López

Abstract:

In the first decade of the twenty-first century, advanced imaging techniques began to be applied for neuroscience research. The Functional Magnetic Resonance Imaging (fMRI) is one of the most important and most used research techniques for the investigation of emotions, because of its ease to observe the brain areas that oxygenate when performing certain tasks. In this research, we make a review about the main research carried out on the influence of the emotions in the decision-making process that is exposed by using the fMRI.

Keywords: Decision making, emotions, fMRI.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1409
367 IVE: Virtual Humans’ AI Prototyping Toolkit

Authors: Cyril Brom, Zuzana Vlckova

Abstract:

IVE toolkit has been created for facilitating research,education and development in the field of virtual storytelling and computer games. Primarily, the toolkit is intended for modelling action selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploring joint behaviour and role-passing technique (Sec. V). Additionally, the toolkit can be used as an AI middleware without any changes. The main facility of IVE is that it serves for prototyping both the AI and virtual worlds themselves. The purpose of this paper is to describe IVE's features in general and to present our current work - including an educational game - on this platform.

Keywords: AI middleware, simulation, virtual world.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1673
366 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks which limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1750
365 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it is as easy as clicking a mouse. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency and data traceability.

Keywords: Blockchain, Ethereum, smart contract, commit-reveal scheme.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 389
364 Carbon Nanotubes with Magnetic Particles

Authors: Svitlana Kopyl, Vladimir Bystrov, Mikhail Maiorov, Manuel Valente, Igor Bdikin, Antonio C.M. Sousa

Abstract:

Magnetic carbon nanotubes composites were obtained by filling carbon nanotubes with paramagnetic iron oxide particles. Detailed investigation of magnetic behaviour of resulting composites was done at different temperatures. Measurements indicate that these functionalized nanotubes are superparamagnetic at room temperature; however, no superparamagnetism was observed at 125 K and 80 K. The blocking temperature TB was estimated at 145 K. These magnetic carbon nanotubes have the potential of being used in a wide range of applications, in particular, the production of nanofluids, which can be controlled and steered by appropriate magnetic fields.

Keywords: carbon nanotubes, magnetic nanoparticles, magnetization, nanofluids

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2631
363 User Acceptance of Location-based Services

Authors: Neven Vrček, Goran Bubaš, Neven Bosilj

Abstract:

Location-based services (LBS) exploit the known location of a user to provide services dependent on their geographic context and personalized needs [1]. The development and arrival of broadband mobile data networks supported with mobile terminals equipped with new location technologies like GPS have finally created opportunities for implementation of LBS applications. But, from the other side, collecting location information data in general raises privacy concerns. This paper presents results from two surveys of LBS acceptance in Croatia. The first survey was administered on 181 students, and the second extended survey involved pattern of 180 Croatian citizens. We developed questionnaire which consists of descriptions of 15 different applications with scale which measures perceptions and attitudes of users towards these applications. We report the results to identify potential commercial applications for LBS in B2C segment. Our findings suggest that some types of applications like emergency&safety services and navigation have significantly higher rate of acceptance than other types.

Keywords: Acceptance, location-based services, m-application.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1928
362 Synchronization of Chaos in a Food Web in Ecological Systems

Authors: Anuraj Singh, Sunita Gakkhar

Abstract:

The three-species food web model proposed and investigated by Gakkhar and Naji is known to have chaotic behaviour for a choice of parameters. An attempt has been made to synchronize the chaos in the model using bidirectional coupling. Numerical simulations are presented to demonstrate the effectiveness and feasibility of the analytical results. Numerical results show that for higher value of coupling strength, chaotic synchronization is achieved. Chaos can be controlled to achieve stable synchronization in natural systems.

Keywords: Lyapunov Exponent, Bidirectional Coupling, ChaosSynchronization, Synchronization Manifold

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1275
361 A Discriminatory Rewarding Mechanism for Sybil Detection with Applications to Tor

Authors: Asim Kumar Pal, Debabrata Nath, Sumit Chakraborty

Abstract:

This paper presents an economic game for sybil detection in a distributed computing environment. Cost parameters reflecting impacts of different sybil attacks are introduced in the sybil detection game. The optimal strategies for this game in which both sybil and non-sybil identities are expected to participate are devised. A cost sharing economic mechanism called Discriminatory Rewarding Mechanism for Sybil Detection is proposed based on this game. A detective accepts a security deposit from each active agent, negotiates with the agents and offers rewards to the sybils if the latter disclose their identity. The basic objective of the detective is to determine the optimum reward amount for each sybil which will encourage the maximum possible number of sybils to reveal themselves. Maintaining privacy is an important issue for the mechanism since the participants involved in the negotiation are generally reluctant to share their private information. The mechanism has been applied to Tor by introducing a reputation scoring function.

Keywords: Game theory, Incentive mechanism, Reputation, Sybil Attack

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1674
360 Structural Analysis of Aircraft Wing Using Finite Element Analysis

Authors: Manish Kumar, Pradeep Rout Aditya Kumar Jha, Pankaj Gupta

Abstract:

Wings are structural components of an aeroplane that are used to produce lift while the aircraft is in flight. The initial assault angle of the wing is definite. Due to the pressure difference at the top and bottom surfaces of the wing, lift force is produced when the flow passes over it. This paper explains the fundamental concept of the structural behaviour of a wing threatened by flowing loads during the voyage. The study comprises the use of concepts and analysis with the help of finite element analysis. Wing assembly is the first stage of wing model and design, which are determined by fascinating factual features. The basic gathering wing consists of a thin membrane, two poles, and several ribs. It has two spars, the major spar and the secondary spar. Here, NACA 23015 is selected as the standard model for all types of aerofoil structures since it is more akin to the custom aerofoil utilized in large aircraft, specifically the Airbus A320. Two rods mostly endure the twisting moment and trim strength, which is finished with titanium contamination to ensure enough inflexibility. The covering and wing spars are made of aluminium amalgam to lessen the structural heaviness. Following that, a static underlying examination is performed, and the general contortion, equivalent flexible strain, and comparing Von-Mises pressure are obtained to aid in investigations of the mechanical behaviour of the wing. Moreover, the modular examination is being upheld to decide the normal pace of repetition as well as the modular state of the three orders, which are obtained through the pre-stress modular investigation. The findings of the modular investigation assist engineers in reducing their excitement about regular events and turning away the wing from the whirlwind. Based on the findings of the study, planners can prioritise union and examination of the pressure mindfulness range and tremendous twisting region. All in all, the entertainment outcomes demonstrate that the game plan is feasible and further develop the data grade of the lifting surface.

Keywords: FEM, Airbus, NACA, modulus of elasticity, aircraft wing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 467
359 On a Conjecture Regarding the Adam Optimizer

Authors: Mohamed Akrout, Douglas Tweed

Abstract:

The great success of deep learning relies on efficient optimizers, which are the algorithms that decide how to adjust network weights and biases based on gradient information. One of the most effective and widely used optimizers in recent years has been the method of adaptive moments, or Adam, but the mathematical reasons behind its effectiveness are still unclear. Attempts to analyse its behaviour have remained incomplete, in part because they hinge on a conjecture which has never been proven, regarding ratios of powers of the first and second moments of the gradient. Here we show that this conjecture is in fact false, but that a modified version of it is true, and can take its place in analyses of Adam.

Keywords: Adam optimizer, Bock’s conjecture, stochastic optimization, average regret.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 303
358 Some Factors Affecting the Compressive Behaviour of Structural Masonry at Small Scales

Authors: A. Mohammed, T. G. Hughes

Abstract:

This paper presents part of a research into the small scale modelling of masonry. Small scale testing of masonry has been carried out by many authors, but few have attempted a systematic determination of the parameters that affect masonry at a small scale. The effect of increasing mortar strength and different sand gradings under compression were investigated. The results show masonry strength at small scale is influenced by increasing mortar strength and different sand gradings.

Keywords: Compression, masonry, models, mortar, sand gradings

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2494
357 The Role of Emotions in the Consumer: Theoretical Review and Analysis of Components

Authors: Mikel Alonso López

Abstract:

The early eighties saw the rise of a new research trend in several prestigious journals, mainly articles that related emotions with the decision-making processes of the consumer, and stopped treating them as external elements. That is why we ask questions such as: what are emotions? Are there different types of emotions? What components do they have? Which theories exist about them? In this study, we will review the main theories and components of emotion analysing the cognitive factor and the different emotional states that are generally recognizable with a focus in the classic debate as to whether they occur before the cognitive process or the affective process.

Keywords: Emotion, consumer behaviour, feelings, decision making.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1555
356 Diffusion of Mobile Entertainment in Malaysia: Drivers and Barriers

Authors: C. C. Wong, P. L. Hiew

Abstract:

This research aims to examine the key success factors for the diffusion of mobile entertainment services in Malaysia. The drivers and barriers observed in this research include perceived benefit; concerns pertaining to pricing, product and technological standardization, privacy and security; as well as influences from peers and community. An analysis of a Malaysian survey of 384 respondents between 18 to 25 years shows that subscribers placed greater importance on perceived benefit of mobile entertainment services compared to other factors. Results of the survey also show that there are strong positive correlations between all the factors, with pricing issue–perceived benefit showing the strongest relationship. This paper aims to provide an extensive study on the drivers and barriers that could be used to derive architecture for entertainment service provision to serve as a guide for telcos to outline suitable approaches in order to encourage mass market adoption of mobile entertainment services in Malaysia.

Keywords: Barriers, Correlations, Diffusion, Drivers, Mobile Entertainment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2238
355 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: Cloud storage security, sharing storage, attributes, Hash algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 994
354 IVE: Virtual Humans AI Prototyping Toolkit

Authors: Cyril Brom, Zuzana Vlckova

Abstract:

IVE toolkit has been created for facilitating research,education and development in the ?eld of virtual storytelling andcomputer games. Primarily, the toolkit is intended for modellingaction selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploringjoint behaviour and role-passing technique (Sec. V). Additionally, thetoolkit can be used as an AI middleware without any changes. Themain facility of IVE is that it serves for prototyping both the AI andvirtual worlds themselves. The purpose of this paper is to describeIVE?s features in general and to present our current work - includingan educational game - on this platform.Keywords? AI middleware, simulation, virtual world.

Keywords: AI middleware, simulation, virtual world

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1610
353 Chemical Amelioration of Expansive Soils

Authors: B. R. Phanikumar, Sana Suri

Abstract:

Expansive soils swell when they absorb water and shrink when water evaporates from them. Hence, lightly loaded civil engineering structures founded in these soils are subjected to severe distress. Therefore, there is a need to ameliorate or improve these swelling soils through some innovative methods. This paper discusses chemical stabilisation of expansive soils, a technique in which chemical reagents such as lime and calcium chloride are added to expansive soils to reduce the volumetric changes occurring in expansive soils and to improve their engineering behaviour.

Keywords: Expansive soils, swelling, shrinkage, amelioration, lime, calcium chloride.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2962
352 The Influence of Website Quality on Customer E-Satisfaction in Low Cost Airline

Authors: Zainab bt Khalifah, Wong Chiet Bing, Noor Hazarina Hashim

Abstract:

The evolution of customer behavior in purchasing products or services through the Internet leads to airline companies engaging in the e-ticketing process in order to maintain their business. A well-designed website is vitally significant for the airline companies to provide effective communication, support, and competitive advantage. This study was conducted to identify the dimensions of website quality for low cost airline and to investigate the relationship between the website quality and customer esatisfaction at low cost airline. A total of 381 responses were conveniently collected among local passengers at Low Cost Carrier Terminal, Kuala Lumpur via questionnaire distribution. This study found that the five determinant factors of website quality for AirAsia were Information Content, Navigation, Responsiveness, Personalization, and Security and Privacy. The results of this study revealed that there is a positive relationship between the five dimensions of website quality and customer e-satisfaction, and also information content was the most significant contributor to customer e-satisfaction.

Keywords: Website Quality, Customer E-Satisfaction, Low Cost Airline.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3697
351 A Study on Stochastic Integral Associated with Catastrophes

Authors: M. Reni Sagayaraj, S. Anand Gnana Selvam, R. Reynald Susainathan

Abstract:

We analyze stochastic integrals associated with a mutation process. To be specific, we describe the cell population process and derive the differential equations for the joint generating functions for the number of mutants and their integrals in generating functions and their applications. We obtain first-order moments of the processes of the two-way mutation process in first-order moment structure of X (t) and Y (t) and the second-order moments of a one-way mutation process. In this paper, we obtain the limiting behaviour of the integrals in limiting distributions of X (t) and Y (t).

Keywords: Stochastic integrals, single–server queue model, catastrophes, busy period.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 760
350 A Review on Application of Waste Tire in Concrete

Authors: M. A. Yazdi, J. Yang, L. Yihui, H. Su

Abstract:

The application of recycle waste tires into civil engineering practices, namely asphalt paving mixtures and cementbased materials has been gaining ground across the world. This review summarizes and compares the recent achievements in the area of plain rubberized concrete (PRC), in details. Different treatment methods have been discussed to improve the performance of rubberized Portland cement concrete. The review also includes the effects of size and amount of tire rubbers on mechanical and durability properties of PRC. The microstructure behaviour of the rubberized concrete was detailed.

Keywords: Waste rubber aggregates, Microstructure, Treatment methods, Size and content effects.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4610
349 Students’ Perceptions of the Use of Social Media in Higher Education in Saudi Arabia

Authors: Omar Alshehri, Vic Lally

Abstract:

This paper examined the attitudes of using social media tools to support learning at a university in Saudi Arabia. Moreover, it investigated the students’ current usage of these tools and examined the barriers they could face during the use of social media tools in the education process. Participants in this study were 42 university students. A web-based survey was used to collect data for this study. The results indicate that all of the students were familiar with social media and had used at least one type of social media for learning. It was found out that all students had very positive attitudes towards the use of social media and welcomed using these tools as a supplementary to the curriculum. However, the results indicated that the major barriers to using these tools in learning were distraction, opposing Islamic religious teachings, privacy issues, and cyberbullying. The study recommended that this study could be replicated at other Saudi universities to investigate factors and barriers that might affect Saudi students’ attitudes toward using social media to support learning.

Keywords: Saudi Arabia, social media, benefits of social media use, barriers to social media use, higher education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2215
348 Sexual Perception and Behavior: Gender Differences among Married Ilocanos

Authors: Erwin F. Cadorna

Abstract:

This study attempted to compare the sexual perceptions and behaviors of male and female married Ilocanos. Data were gathered from 1,374 married Ilocanos (687 husbands and 687 wives) from nine municipalities and one city of the First District of Ilocos Sur. Findings showed that the male and female married Ilocanos differ in their psychological and physical sexual perceptions, but they had common social and spiritual sexual perceptions. Moreover, they were consistent in their behaviors towards sex, except for their behaviour after sex without reaching orgasm, wherein the males feel bad after having sex without reaching orgasm, while the females simply sleep it off.

Keywords: Gender Differences, Ilocanos, Sexual Behavior andPerception.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2219
347 Viscoelastic Modeling of Brain MRE Data Using FE Method

Authors: H. Ajabi Naeeni, M. Haghpanahi

Abstract:

Dynamic shear test on simulated phantom can be used to validate magnetic resonance elastography (MRE) measurements. Phantom gel has been usually utilized for the cell culture of cartilage and soft tissue and also been used for mechanical property characterization using imaging systems. The viscoelastic property of the phantom would be important for dynamic experiments and analyses. In this study, An axisymmetric FE model is presented for determining the dynamic shear behaviour of brain simulated phantom using ABAQUS. The main objective of this study was to investigate the effect of excitation frequencies and boundary conditions on shear modulus and shear viscosity in viscoelastic media.

Keywords: Viscoelastic, MR Elastography, Finite Element, Brain.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1713