The document discusses how the proposed media product challenges conventions of typical superhero films. Unlike most hero films, the main character is initially portrayed as the villain who caused the apocalyptic event. It starts with a monologue rather than action or logo to establish the character. There is no clear hero at the beginning. It also lacks a strong female presence and the character dresses in normal clothes rather than a distinctive costume. The setting of an abandoned building in a forest diverges from the typical large city location. These elements subvert expectations of the genre.
This document provides casting details for roles in a short film, including the characters of Max Clark and Alice. Gideon Lax is chosen to play Max Clark because he looks older than his age, has some stubble for a rugged look, and studies media. Jasmin Downer is chosen to play Alice because she looks older than 17, has brown and blond hair, is confident, and also studies media. Four friends will play café customers. Gideon will wear a coat and plain clothes to look average, while Alice will wear skinny jeans, scarf and coat. The film will use colors like white, brown, red and blues. Alice will carry shopping bags to look busy after the divorce from Max. The
1) The document discusses the process of creating a music video for a class project, including pre-production research, filming, and editing.
2) Filming locations and using a GoPro camera helped capture needed footage, but the initial editing did not fit the music well so additional filming was done.
3) Advanced editing techniques like reversing clips, changing speeds and opacity, and adjusting brightness helped create a unique video, though better planning of time and following a schedule could have improved the project.
This document discusses media audiences and how they are classified. It explains that classifying audiences helps media companies identify appropriate target demographics. The classifications are based on factors like social class, interests, and media consumption habits. This allows companies to tailor their media products and marketing towards audiences most likely to consume their offerings. Audience research methods like ratings and surveys also help companies evaluate how well their products resonate with targeted demographics and determine if changes or further productions are warranted. Regulations and codes of practice governing content and permissions must also be considered during the media production process.
This shot list details 26 shots for a film scene that takes place in a forest. It includes details about the camera shots, movements, locations, and sounds for each shot. The shots start with wide establishing shots of a character walking in the forest and follow him as he discovers an abandoned building. They then show a confrontation between the character and another man where the second man holds the first at gunpoint before ultimately walking away. The production schedule that follows outlines the pre-production, filming, and post-production periods for the project.
1) Max Clark urgently asks his ex-wife Alice May to meet him at a cafe, but refuses to explain why until they are alone.
2) When Alice presses him to explain, Max reveals that he has developed telekinetic powers that he cannot control.
3) Max uses his telekinesis to force Alice to sit back down and listen, terrifying her. He warns her to be quiet so they can both hear something unknown outside, leaving Alice in a state of confusion and horror.
The document discusses how the proposed media product challenges conventions of typical superhero films. Unlike most hero films, the main character is initially portrayed as the villain who caused the apocalyptic event. It has elements of anti-hero films like Kick-Ass and Watchmen. The beginning features a monologue while scavenging for supplies, similar to I Am Legend, rather than opening with action like Spider-Man. It lacks a distinct logo and the hero's secret identity is known. The film features young criminals rather than older ones typically seen. It lacks a female character in the opening and the villain appears normal rather than powerful. The setting is a forest rather than a city, with a less heroic tone. Properties like
The document discusses how the proposed media product challenges conventions of typical superhero films. Unlike most hero films, the main character is initially portrayed as the villain who caused the apocalyptic event. It starts with a monologue rather than action or logo to establish the character. There is no clear hero at the beginning. It also lacks a strong female presence and the character dresses in normal clothes rather than a distinctive costume. The setting of an abandoned building in a forest diverges from the typical large city location. These elements subvert expectations of the genre.
This document provides casting details for roles in a short film, including the characters of Max Clark and Alice. Gideon Lax is chosen to play Max Clark because he looks older than his age, has some stubble for a rugged look, and studies media. Jasmin Downer is chosen to play Alice because she looks older than 17, has brown and blond hair, is confident, and also studies media. Four friends will play café customers. Gideon will wear a coat and plain clothes to look average, while Alice will wear skinny jeans, scarf and coat. The film will use colors like white, brown, red and blues. Alice will carry shopping bags to look busy after the divorce from Max. The
1) The document discusses the process of creating a music video for a class project, including pre-production research, filming, and editing.
2) Filming locations and using a GoPro camera helped capture needed footage, but the initial editing did not fit the music well so additional filming was done.
3) Advanced editing techniques like reversing clips, changing speeds and opacity, and adjusting brightness helped create a unique video, though better planning of time and following a schedule could have improved the project.
This document discusses media audiences and how they are classified. It explains that classifying audiences helps media companies identify appropriate target demographics. The classifications are based on factors like social class, interests, and media consumption habits. This allows companies to tailor their media products and marketing towards audiences most likely to consume their offerings. Audience research methods like ratings and surveys also help companies evaluate how well their products resonate with targeted demographics and determine if changes or further productions are warranted. Regulations and codes of practice governing content and permissions must also be considered during the media production process.
This shot list details 26 shots for a film scene that takes place in a forest. It includes details about the camera shots, movements, locations, and sounds for each shot. The shots start with wide establishing shots of a character walking in the forest and follow him as he discovers an abandoned building. They then show a confrontation between the character and another man where the second man holds the first at gunpoint before ultimately walking away. The production schedule that follows outlines the pre-production, filming, and post-production periods for the project.
1) Max Clark urgently asks his ex-wife Alice May to meet him at a cafe, but refuses to explain why until they are alone.
2) When Alice presses him to explain, Max reveals that he has developed telekinetic powers that he cannot control.
3) Max uses his telekinesis to force Alice to sit back down and listen, terrifying her. He warns her to be quiet so they can both hear something unknown outside, leaving Alice in a state of confusion and horror.
The document discusses how the proposed media product challenges conventions of typical superhero films. Unlike most hero films, the main character is initially portrayed as the villain who caused the apocalyptic event. It has elements of anti-hero films like Kick-Ass and Watchmen. The beginning features a monologue while scavenging for supplies, similar to I Am Legend, rather than opening with action like Spider-Man. It lacks a distinct logo and the hero's secret identity is known. The film features young criminals rather than older ones typically seen. It lacks a female character in the opening and the villain appears normal rather than powerful. The setting is a forest rather than a city, with a less heroic tone. Properties like
Photographer Annie Leibovitz was born in 1949 in Waterbury, Connecticut. In 1970 she began her career at Rolling Stone magazine, and in 1983 started working for Vanity Fair magazine. This exposure helped grow her photography career. During the late 1980s, Leibovitz began working on high-profile advertising campaigns. From the 1990s to present, she has published and exhibited her work internationally. Some of her most famous photographs are portraits of celebrities and musicians.
Max Clark urgently calls his ex-girlfriend Alice May to a cafe to show her something serious he cannot control. When Alice tries to leave, Max uses his newfound telekinetic powers to stop her and force her to listen. He demonstrates by throwing Alice into a chair and restricting her movement against her will. Max warns Alice of weird things that have happened to him and his lack of control over this new ability. When he hears a strange noise outside, he demands Alice be quiet so he can listen, frightening her with his sudden hostile behavior and unexplained powers.
1) The document describes the process of recreating a magazine cover using various design tools like Photoshop and InDesign.
2) Key tools used included selection tools to move and adjust text and images, text tools to change font styles and size, and color tools to match hues.
3) While most elements were recreated successfully, limitations included the model's positioning not matching the original and background color differences. Overall the process improved the author's design skills.
The document provides a shot list for a film scene set in a cafe. It includes 21 numbered shots detailing the shot type, camera movement, location, sound details, and purpose for each shot. The shot list shows dialogue and actions between two main characters as they discuss something strange happening to one of the characters amid cafe background sounds. It also includes production schedule stages from pre-production through final edits and deadline.
This document provides casting details for a short film about a breakup between superhero characters Max Clark and Alice. Gideon Lax is chosen to play Max due to his older appearance and rugged look fitting the character. Jasmin Downer is chosen to play Alice for her beauty and confident personality matching the character. Friends are cast as café customers for convenience. Costumes, colors, and props are selected to portray the characters and story appropriately. Scenes will be filmed at a local café for its quiet atmosphere and windows, using a Canon camera and tripod for clear, steady shots.
The document discusses how the proposed media product challenges conventions of typical superhero films. Unlike most hero films, the main character is initially portrayed as the villain who caused the apocalyptic event. It has elements of anti-hero films like Kick-Ass and Watchmen. The beginning features a monologue rather than action sequence to provide vital context. It lacks a distinguishing logo and the hero's identity is not concealed. The film is set in a forest rather than a city and features unconventional costumes, weapons, and filming equipment compared to big budget superhero movies.
This document provides casting details for a short film about superheroes. Gideon Lax is chosen to play the character of Max Clark because he looks older than his age, which is important as the characters have been in a serious relationship. Sophie Mason is chosen to play Alice because she looks older than her age and is a confident person like the character. Friends Emma King, Olivia Cornwell, Aaron Cogdell and William Matthews will play café customers. Gideon will wear a coat and normal clothes to look average while hiding his superpowers. Alice will wear skinny jeans, scarf and coat. The film will take place at a continental café in Ringwood for a quiet but public meeting place between the two main
The document summarizes several media sectors: print, film, advertising, photography, and television. The print industry includes magazines and newspapers and is responsible for print media. Key figures include Rupert Murdoch and Rebekah Brooks. The film industry produces films and is regulated by the BBFC. Key figures include Charlie Chaplin and Walt Disney. The advertising industry creates ads to promote products and is regulated by the ASA. The photography industry produces photographs for publications. Key figures include Annie Leibovitz. The television industry broadcasts TV channels and shows and is regulated by Ofcom.
The document outlines a production schedule that includes planning, storyboarding, filming, editing, evaluating, and finishing phases. Filming involves initial filming, extra filming sessions if needed, and potentially redoing any footage. Editing clips is followed by ongoing editing, finishing off editing, and evaluation periods interspersed with breaks. The schedule concludes with finishing off remaining work and study leave.
1) The document discusses the process of creating a music video for a class project, including pre-production research, filming, and editing.
2) Filming was challenging due to needing specific equipment and locations. Working with a partner made some shots easier.
3) Editing took a long time and required re-filming parts that did not match the music well. Advanced editing techniques like reversing clips and changing speeds were used to make the video unique.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Photographer Annie Leibovitz was born in 1949 in Waterbury, Connecticut. In 1970 she began her career at Rolling Stone magazine, and in 1983 started working for Vanity Fair magazine. This exposure helped grow her photography career. During the late 1980s, Leibovitz began working on high-profile advertising campaigns. From the 1990s to present, she has published and exhibited her work internationally. Some of her most famous photographs are portraits of celebrities and musicians.
Max Clark urgently calls his ex-girlfriend Alice May to a cafe to show her something serious he cannot control. When Alice tries to leave, Max uses his newfound telekinetic powers to stop her and force her to listen. He demonstrates by throwing Alice into a chair and restricting her movement against her will. Max warns Alice of weird things that have happened to him and his lack of control over this new ability. When he hears a strange noise outside, he demands Alice be quiet so he can listen, frightening her with his sudden hostile behavior and unexplained powers.
1) The document describes the process of recreating a magazine cover using various design tools like Photoshop and InDesign.
2) Key tools used included selection tools to move and adjust text and images, text tools to change font styles and size, and color tools to match hues.
3) While most elements were recreated successfully, limitations included the model's positioning not matching the original and background color differences. Overall the process improved the author's design skills.
The document provides a shot list for a film scene set in a cafe. It includes 21 numbered shots detailing the shot type, camera movement, location, sound details, and purpose for each shot. The shot list shows dialogue and actions between two main characters as they discuss something strange happening to one of the characters amid cafe background sounds. It also includes production schedule stages from pre-production through final edits and deadline.
This document provides casting details for a short film about a breakup between superhero characters Max Clark and Alice. Gideon Lax is chosen to play Max due to his older appearance and rugged look fitting the character. Jasmin Downer is chosen to play Alice for her beauty and confident personality matching the character. Friends are cast as café customers for convenience. Costumes, colors, and props are selected to portray the characters and story appropriately. Scenes will be filmed at a local café for its quiet atmosphere and windows, using a Canon camera and tripod for clear, steady shots.
The document discusses how the proposed media product challenges conventions of typical superhero films. Unlike most hero films, the main character is initially portrayed as the villain who caused the apocalyptic event. It has elements of anti-hero films like Kick-Ass and Watchmen. The beginning features a monologue rather than action sequence to provide vital context. It lacks a distinguishing logo and the hero's identity is not concealed. The film is set in a forest rather than a city and features unconventional costumes, weapons, and filming equipment compared to big budget superhero movies.
This document provides casting details for a short film about superheroes. Gideon Lax is chosen to play the character of Max Clark because he looks older than his age, which is important as the characters have been in a serious relationship. Sophie Mason is chosen to play Alice because she looks older than her age and is a confident person like the character. Friends Emma King, Olivia Cornwell, Aaron Cogdell and William Matthews will play café customers. Gideon will wear a coat and normal clothes to look average while hiding his superpowers. Alice will wear skinny jeans, scarf and coat. The film will take place at a continental café in Ringwood for a quiet but public meeting place between the two main
The document summarizes several media sectors: print, film, advertising, photography, and television. The print industry includes magazines and newspapers and is responsible for print media. Key figures include Rupert Murdoch and Rebekah Brooks. The film industry produces films and is regulated by the BBFC. Key figures include Charlie Chaplin and Walt Disney. The advertising industry creates ads to promote products and is regulated by the ASA. The photography industry produces photographs for publications. Key figures include Annie Leibovitz. The television industry broadcasts TV channels and shows and is regulated by Ofcom.
The document outlines a production schedule that includes planning, storyboarding, filming, editing, evaluating, and finishing phases. Filming involves initial filming, extra filming sessions if needed, and potentially redoing any footage. Editing clips is followed by ongoing editing, finishing off editing, and evaluation periods interspersed with breaks. The schedule concludes with finishing off remaining work and study leave.
1) The document discusses the process of creating a music video for a class project, including pre-production research, filming, and editing.
2) Filming was challenging due to needing specific equipment and locations. Working with a partner made some shots easier.
3) Editing took a long time and required re-filming parts that did not match the music well. Advanced editing techniques like reversing clips and changing speeds were used to make the video unique.
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.