586 research outputs found

    Bayesian Networks for the Driver Overtaking Assistance System on Two-lane Roads

    Get PDF
    Unsuccessful overtaking maneuvers on two-lane rural roads are one of the major causes of road accidents in the 21st century. The complexity of this maneuver merits the adoption of a thorough method for developing a proposed assistance system to prevent accidents and consequently reduce the high number of fatalities and the associated economic costs. This study aims to introduce an intelligent Driver Overtaking Assistance System (DOAS) to assist drivers in performing overtaking maneuvers safely. The study also will introduce a method to assess the impact of all the influential variables related to the driver, vehicle, traffic, road, and the surrounding environment. In momentary driving situations, the DOAS uses the communicated information via Hello beacon messages (HBM) and a set of input sensors to measure the possibility of overtaking the preceding vehicle(s) proactively by considering whether the distance gap to the oncoming vehicle is sufficient for overtaking. Besides, the proposed system is a vehicle-based safety system based on the collection of contextual information from the driving vicinity to acquire all relevant information regarding the ambient driving environment and the vehicles involved in the overtaking. To do this, DOAS uses a Bayesian Network (BN) to model overtaking maneuvers. The work presented shows high accuracy and promising results in aiding safe overtaking, with significant improvements to overtaking maneuvers on two-lane rural roads

    Pengantar filsafat umum

    Get PDF
    Kemungkinan besar, Anda baru pertama kali belajar filsafat. Tetapi dapat dipastikan bahwa Anda sudah pernah mendengar kata “fisafat,” baik disebutkan orang lain di depan Anda, membacanya dalam buku, atau barang kali Anda sendiri pernah mempergunakannya untuk memperkuat pernyataan Anda. Nama-nama filosof besar dan ucapan-ucapannya yang laksana ‘kata-kata mutiara’ tentu pernah Anda dengar, walaupun terkadang apa maksud ucapan mereka tersebut sulit dipastikan. Anggapan umum pertama tentang filsafat adalah bahwa yang dibahas sebagai hal yang tinggi, sulit, abstrak dan tidak terkait dengan masalah kehidupan sehari-hari. Filosof sering digambarkan sebagai seorang yang mempunyai IQ dan intuisi yang jauh melebihi tingkat rata-rata manusia. Filosof juga dipandang sebagai seorang yang tidak memperdulikan masalah sehari-hari, tetapi sibuk merenung dan memikirkan persoalan hakikat sesuatu yang sulit dicerna

    Äste, Gras und Esel. Ein neuassyrischer Privatbrief aus Nimrud im Iraq Museum

    Get PDF

    RAISE THE STRENGTH OF CRYPTOSYSTEM USING VARIETY EFFECTS

    Get PDF
    Nowadays, images became one of the most types of transmitted data through Internet. Some of these images carry secret information, therefore having an effective cryptosystem for hiding the information inside these images become an urgent need. Many traditional encryption methods are unable to achieve a high degree of protection for information. This paper presents nontraditional method for image encryption through applying substitution and transposition operations in different ways on both key and data. Series of (Linear and Circular), (Left, Right, Up and Down) rotation operations on (Bits and Bytes) of key and data are applied to make good confusion effects in the data. Moreover, XOR Boolean operations also applied on the key and data to make diffusion effects in the data. These two types of operations will produce a large set of keys. Using this large number of different keys in encrypting image will raise the strength of the encryption system used and achieve a high degree of protection for image. To test the security degree and performance of the encryption system, the system has been applied using different images and analyzing the results key space, key sensitivity, and statistical analysis and other criteria. From these tests, we can conclude that the encryption system can be used effectively to protect digital images

    RAISE THE STRENGTH OF CRYPTOSYSTEM USING VARIETY EFFECTS

    Get PDF
    Nowadays, images became one of the most types of transmitted data through Internet. Some of these images carry secret information, therefore having an effective cryptosystem for hiding the information inside these images become an urgent need. Many traditional encryption methods are unable to achieve a high degree of protection for information. This paper presents nontraditional method for image encryption through applying substitution and transposition operations in different ways on both key and data. Series of (Linear and Circular), (Left, Right, Up and Down) rotation operations on (Bits and Bytes) of key and data are applied to make good confusion effects in the data. Moreover, XOR Boolean operations also applied on the key and data to make diffusion effects in the data. These two types of operations will produce a large set of keys. Using this large number of different keys in encrypting image will raise the strength of the encryption system used and achieve a high degree of protection for image. To test the security degree and performance of the encryption system, the system has been applied using different images and analyzing the results key space, key sensitivity, and statistical analysis and other criteria. From these tests, we can conclude that the encryption system can be used effectively to protect digital images

    Comparison Between Natural and Synthetic Antioxidants in Beef Products: A MetaAnalysis

    Get PDF
    Synthetic antioxidants are created through artificial synthesis, whereas natural antioxidants are created through natural synthesis in plants, animals, and microbes. Although synthetic antioxidants have been used previously, there has been a growing need in recent years for natural antioxidants, largely due to the negative consequences of synthetic antioxidants. Therefore, many current studies have focused on finding natural antioxidants in diverse plants. This study aimed to compare the effectiveness of natural and synthetic antioxidants in beef products using a meta-analysis approach. The method included the stages of identification, selection, and conformity check. The selection process resulted in 12 articles obtained from the electronic database of Harzing’s Publish and Perish software. The metaanalysis model used in this study was random-effect model involving a positive control group (synthetic antioxidants) and an experimental group (natural antioxidants). The effect size and confidence interval were computed using the OpenMEE software, while the summary size and Egger’s test were obtained using JASP software. Results revealed that the addition of natural antioxidants showed comparable quality to synthetic antioxidants, as indicated by similar values between the two groups for the peroxide value, carbonyl content, metmyoglobin content, cooking loss, pH, and hue angle (P>0.05). Natural antioxidants showed a higher value on b (yellowness) and chroma (P<0.05). Parameters indicating lower value (P<0.05) occurred in TBARS, a (redness), and L (lightness). In conclusion, the addition of natural antioxidants in beef products demonstrates comparable results and could be used as alternatives to synthetic antioxidants

    The Doha model of organ donation and transplantation: thinking beyond citizenship

    Full text link
    This paper reviews the policy and practice of organ donation and transplantation in Qatar that has developed since January 2011. The important features of the Doha Model (the ‘Model’) are explored, including: (i) all legal residents of Qatar have an equal right to access deceased donor organs and transplantation regardless of their citizenship status; (ii) no prioritisation in organ allocation is given to Qatari citizens; (iii) a multilingual and multicultural education and promotional program about donation has been implemented to engage the diverse national communities resident within Qatar; (iv) financial incentives or fungible rewards for living or deceased donation are prohibited. The ethical framework of this policy will be examined in the light of the national self-sufficiency paradigm, which advocates reciprocity and solidarity among resident populations seeking to meet all needs for transplantation equitably. We review some preliminary evidence of the impact of the Model with respect to engagement of a highly diverse multinational population in a donation and transplantation program, and argue that the Model may inform policy and practice in other countries, particularly those with non-citizen resident populations

    Cloud Storage Protection Scheme Based on Fully Homomorphic Encryption

    Get PDF
    Cloud computing allows enterprises and individuals to have a less physical infrastructure of software and hardware. Nevertheless, there are some concerns regarding privacy protection which may turn out to be a strong barrier. Traditional encryption schemes have been used to encrypt the data before sending them to the cloud. However, the private key has to be provided to the server before any calculations on the data. To solve this security problem, this paper proposes a fully homomorphic encryption scheme for securing cloud data at rest. The scheme is based on prime modular operation, its security depends on factoring multiple large prime numbers (p1, p2,...pn) up to n, which is formed from very large prime numbers up to hundreds of digits as this is an open problem in mathematics. In addition, the elements of the secret key are derived from a series of mathematical operations and the calculation of an Euler coefficient within the modular of integers. Furthermore, it adds the complexity of noise to the plaintext using the number of users of the Cloud Service Provider. Moreover, its randomness is evaluated by the National Institute of Standards and Technology statistical tests, and the results demonstrating that the best statistical performance was obtained with this algorithm

    PEMANFAATAN BIJI KELOR (Moringa oleifera) SEBAGAI KOAGULAN DALAM MENURUNKAN KADAR FOSFAT (PO4) DAN AMONIAK (NH3) PADA AIR LIMBAH RUMAH SAKIT

    Get PDF
    PEMANFAATAN BIJI KELOR (Moringa oleifera) SEBAGAI KOAGULANDALAM MENURUNKAN KADAR FOSFAT (PO4) DAN AMONIAK (NH3)PADA AIR LIMBAH RUMAH SAKI
    corecore