Search results for: access to space
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6746

Search results for: access to space

6476 The English Classroom: Scope and Space for Motivation

Authors: Madhavi Godavarthy

Abstract:

The globalized world has been witnessing the ubiquity of the English language and has made it mandatory that students be equipped with the required Communication and soft skills. For students and especially for students studying in technical streams, gaining command over the English language is only a part of the bigger challenges they will face in the future. Linguistic capabilities if blended with the right attitude and a positive personality would deliver better results in the present environment of the digitalized world. An English classroom has that ‘space’; a space if utilized well by the teacher can pay rich dividends. The prescribed syllabus for English in the process of adapting itself to the challenges of a more and more technical world has meted out an indifferent treatment in including ‘literary’ material in their curriculum. A debate has always existed regarding the same and diversified opinions have been given. When the student is motivated to reach Literature through intrinsic motivation, it may contribute to his/her personality-development. In the present paper, the element of focus is on the scope and space to motivate students by creating a specific space for herself/himself amidst the schedules of the teaching-learning processes by taking into consideration a few literary excerpts for the purpose.

Keywords: English language, teaching and learning process, reader response theory, intrinsic motivation, literary texts

Procedia PDF Downloads 605
6475 A Contribution to the Polynomial Eigen Problem

Authors: Malika Yaici, Kamel Hariche, Tim Clarke

Abstract:

The relationship between eigenstructure (eigenvalues and eigenvectors) and latent structure (latent roots and latent vectors) is established. In control theory eigenstructure is associated with the state space description of a dynamic multi-variable system and a latent structure is associated with its matrix fraction description. Beginning with block controller and block observer state space forms and moving on to any general state space form, we develop the identities that relate eigenvectors and latent vectors in either direction. Numerical examples illustrate this result. A brief discussion of the potential of these identities in linear control system design follows. Additionally, we present a consequent result: a quick and easy method to solve the polynomial eigenvalue problem for regular matrix polynomials.

Keywords: eigenvalues/eigenvectors, latent values/vectors, matrix fraction description, state space description

Procedia PDF Downloads 464
6474 A Performance Analysis of Different Scheduling Schemes in WiMAX

Authors: A. Youseef

Abstract:

One of the most aims of IEEE 802.16 (WiMAX) is to present high-speed wireless access to cover wide range coverage. The base station (BS) and the subscriber station (SS) are the main parts of WiMAX. WiMAX uses either Point-to-Multipoint (PMP) or mesh topologies. In the PMP mode, the SSs connect to the BS to gain access to the network. However, in the mesh mode, the SSs connect to each other to gain access to the BS. The main components of QoS management in the 802.16 standard are the admission control, buffer management, and packet scheduling. There are several researches proposed to create an efficient packet scheduling schemes. Therefore, we use QualNet 5.0.2 to study the performance of different scheduling schemes, such as WFQ, SCFQ, RR, and SP when the numbers of SSs increase. We find that when the number of SSs increases, the average jitter and average end-to-end delay is increased and the throughput is reduced.

Keywords: WiMAX, scheduling scheme, QoS, QualNet

Procedia PDF Downloads 449
6473 The Existential in a Practical Phenomenology Research: A Study on the Political Participation of Young Women

Authors: Amanda Aliende da Matta, Maria del Pilar Fogueiras Bertomeu, Valeria de Ormaechea Otalora, Maria Paz Sandin Esteban, Miriam Comet Donoso

Abstract:

This communication presents proposed questions about the existential in research on the political participation of young women. The study follows a qualitative methodology, in particular, the applied hermeneutic phenomenological (AHP) method, and the general objective of the research is to give an account of the experience of political participation as a young woman. The study participants are women aged 18 to 35 who have experience in political participation. The techniques of data collection are the descriptive story and the phenomenological interview. Hermeneutic phenomenology as a research approach is based on phenomenological philosophy and applied hermeneutics. The ultimate objective of HP is to gain access to the meaning structures of lived experience by appropriating them, clarifying them, and reflectively making them explicit. Human experiences are always lived through existential: fundamental themes that are useful in exploring meaningful aspects of our life worlds. Everyone experiences the world through the existential of lived relationships, the lived body, lived space, lived time, and lived things. The phenomenological research, then, also tacitly asks about the existential. Existentials are universal themes useful for exploring significant aspects of our life world and of the particular phenomena under study. Four main existentials prove especially helpful as guides for reflection in the research process: relationship, body, space, and time. For example, in our case, we may ask ourselves how can the existentials of relationship, body, space, and time guide us in exploring the structures of meaning in the lived experience of political participation as a woman and a young person. The study is still not finished, as we are currently conducting phenomenological thematic analysis on the collected stories of lived experience. Yet, we have already identified some fragments of texts that show the existential in their experiences, which we will transcribe below. 1) Relationality - The experienced I-Other. It regards how relationships are experienced in our narratives about political participation as young women. One example would be: “As we had known each other for a long time, we understood each other with our eyes; we were all a little bit on the same page, thinking the same thing.” 2) Corporeality - The lived body. It regards how the lived body is experienced in activities of political participation as a young woman. One example would be: “My blood was boiling, but it was not the time to throw anything in their face, we had to look for solutions.”; “I had a lump in my throat and I wanted to cry.”. 3) Spatiality - The lived space. It regards how one experiences the lived space in political participation activities as a young woman. One example would be: “And the feeling I got when I saw [it] it's like watching everybody going into a mousetrap.” 4) Temporality - Lived time. It regards how one experiences the lived time in political participation activities as a young woman. One example would be: “Then, there were also meetings that went on forever…”

Keywords: applied hermeneutic phenomenology, existentials, hermeneutics, phenomenology, political participation

Procedia PDF Downloads 74
6472 Understanding Space, Citizenship and Assimilation in the Context of Migration in North-Eastern Region of India

Authors: Mukunda Upadhyay, Rakesh Mishra, Rajni Singh

Abstract:

This paper is an attempt to understand the abstract concept of space, citizenship and migration in the north-eastern region. In the twentieth century, researchers and thinkers related citizenship and migration on national models. The national models of jus sulis and jus sangunis provide scope of space and rights to only those who are either born in the territory or either share the common descent. Space ensures rights and citizenship ensures space and for many migrants, citizenship is the ultimate goal in the host country. Migrants with the intention of settling down in the destination region, begin to adapt and assimilate in their new homes. In many cases, migrants may also retain the culture and values of the place of origin. In such cases the difference in the degree of retention and assimilation may determine the chances of conflict between the host society and migrants. Such conflicts are fueled by political aspirations of few individuals on both the sides. The North-Eastern part of India is a mixed community with many linguistic and religious groups sharing a common Geo-political space. Every community has its own unique history, culture and identity. Since the last half of the nineteenth century, this region has been experiencing both internal migration from other states and immigration from the neighboring countries which has resulted in the interactions of various cultures and ethnicities. With the span of time, migration has taken bitter form with problems concentrated around acquiring rights through space and citizenship. Political tensions resulted by host hostility and migrants resistance has ruined the social order in few areas. In order to resolve these issues in this area proper intervention has to be carried out by the involvement of the National and International community.

Keywords: space, citizenship, assimilation, migration, rights

Procedia PDF Downloads 412
6471 The Effects of Semi-Public Spaces with Distinctive Functions on the Urban Space Quality

Authors: Melike Orhan

Abstract:

Along with impetuous physical change, configuration and increase in the density of cities, urban public spaces have started to become a transition area rather than spaces to inhabit. The insufficiency of public spaces, one of the most significant components of a city, where communal life is maintained and the decrease in the quality of urban spaces have led to an increase in the use of semi-public spaces as urban space. Semi-public spaces are those that ensure transition between private and public spaces and can be seen, observed, reached and used by urban-dwellers. Humans are in a constant relation to their surroundings and care for integration as part of their surroundings. Semi-public spaces providing balance for the individual between private spaces (structures) and urban-public spaces make this integration easier. Spaces with a semi-public characteristic serve for a particular neighboring unit and the user (i.e. common use areas in residential spaces and dwellings, common outdoor areas situated between office buildings, and etc.) These spaces, whose density of usage is increased with distinctive functions and activities, gain different attributions according to the characteristics of the urban space they are located in (commercial, residential, touristic, and etc.) and to the functions of the structures with which they are in relation. At the same time, they begin to serve other neighboring units along with an increase in public usage. As a result, the interaction between environment-space-structure-humans changes, which directly affects the urban space quality. The aim of this study is to determine how and depending on what characteristics the public usage density of semi-public spaces change and to put forth the effects of this change on the urban environment it is located in and to designate its role in terms of 'urban space quality'. In conclusion, within the scope of this study, semi-public spaces located in urban spaces with distinctive functions will be explored through examples, and the effects of these spaces with altered public usage and density on urban space and quality of life will be put forward. Accordingly, applicable criteria will be determined by means of semi-public spaces oriented at increasing and sustaining the quality of urban space.

Keywords: semi-public spaces, urban public spaces, urban space quality, public usage

Procedia PDF Downloads 232
6470 Verification of Space System Dynamics Using the MATLAB Identification Toolbox in Space Qualification Test

Authors: Yuri V. Kim

Abstract:

This article presents a new approach to the Functional Testing of Space Systems (SS). It can be considered as a generic test and used for a wide class of SS that from the point of view of System Dynamics and Control may be described by the ordinary differential equations. Suggested methodology is based on using semi-natural experiment- laboratory stand that doesn’t require complicated, precise and expensive technological control-verification equipment. However, it allows for testing system as a whole totally assembled unit during Assembling, Integration and Testing (AIT) activities, involving system hardware (HW) and software (SW). The test physically activates system input (sensors) and output (actuators) and requires recording their outputs in real time. The data is then inserted in laboratory PC where it is post-experiment processed by Matlab/Simulink Identification Toolbox. It allows for estimating system dynamics in form of estimation of system differential equations by the experimental way and comparing them with expected mathematical model prematurely verified by mathematical simulation during the design process.

Keywords: system dynamics, space system ground tests and space qualification, system dynamics identification, satellite attitude control, assembling, integration and testing

Procedia PDF Downloads 157
6469 A Cloud-Based Spectrum Database Approach for Licensed Shared Spectrum Access

Authors: Hazem Abd El Megeed, Mohamed El-Refaay, Norhan Magdi Osman

Abstract:

Spectrum scarcity is a challenging obstacle in wireless communications systems. It hinders the introduction of innovative wireless services and technologies that require larger bandwidth comparing to legacy technologies. In addition, the current worldwide allocation of radio spectrum bands is already congested and can not afford additional squeezing or optimization to accommodate new wireless technologies. This challenge is a result of accumulative contributions from different factors that will be discussed later in this paper. One of these factors is the radio spectrum allocation policy governed by national regulatory authorities nowadays. The framework for this policy allocates specified portion of radio spectrum to a particular wireless service provider on exclusive utilization basis. This allocation is executed according to technical specification determined by the standard bodies of each Radio Access Technology (RAT). Dynamic access of spectrum is a framework for flexible utilization of radio spectrum resources. In this framework there is no exclusive allocation of radio spectrum and even the public safety agencies can share their spectrum bands according to a governing policy and service level agreements. In this paper, we explore different methods for accessing the spectrum dynamically and its associated implementation challenges.

Keywords: licensed shared access, cognitive radio, spectrum sharing, spectrum congestion, dynamic spectrum access, spectrum database, spectrum trading, reconfigurable radio systems, opportunistic spectrum allocation (OSA)

Procedia PDF Downloads 416
6468 The Acquisition of Case in Biological Domain Based on Text Mining

Authors: Shen Jian, Hu Jie, Qi Jin, Liu Wei Jie, Chen Ji Yi, Peng Ying Hong

Abstract:

In order to settle the problem of acquiring case in biological related to design problems, a biometrics instance acquisition method based on text mining is presented. Through the construction of corpus text vector space and knowledge mining, the feature selection, similarity measure and case retrieval method of text in the field of biology are studied. First, we establish a vector space model of the corpus in the biological field and complete the preprocessing steps. Then, the corpus is retrieved by using the vector space model combined with the functional keywords to obtain the biological domain examples related to the design problems. Finally, we verify the validity of this method by taking the example of text.

Keywords: text mining, vector space model, feature selection, biologically inspired design

Procedia PDF Downloads 256
6467 Farmers’ Access to Agricultural Extension Services Delivery Systems: Evidence from a Field Study in India

Authors: Ankit Nagar, Dinesh Kumar Nauriyal, Sukhpal Singh

Abstract:

This paper examines the key determinants of farmers’ access to agricultural extension services, sources of agricultural extension services preferred and accessed by the farmers. An ordered logistic regression model was used to analyse the data of the 360 sample households based on a primary survey conducted in western Uttar Pradesh, India. The study finds that farmers' decision to engage in the agricultural extension programme is significantly influenced by factors such as education level, gender, farming experience, social group, group membership, farm size, credit access, awareness about the extension scheme, farmers' perception, and distance from extension sources. The most intriguing finding of this study is that the progressive farmers, which have long been regarded as a major source of knowledge diffusion, are the most distrusted sources of information as they are suspected of withholding vital information from potential beneficiaries. The positive relationship between farm size and ‘Access’ underlines that the extension services should revisit their strategies for targeting more marginal and small farmers constituting over 85 percent of the agricultural households by incorporating their priorities in their outreach programs. The study suggests that marginal and small farmers' productive potential could still be greatly augmented by the appropriate technology, advisory services, guidance, and improved market access. Also, the perception of poor quality of the public extension services can be corrected by initiatives aimed at building up extension workers' capacity.

Keywords: agriculture, access, extension services, ordered logistic regression

Procedia PDF Downloads 206
6466 The Construction of the Residential Landscape in the Mountain Environment: Taking the Eling Peak, 'Mirror of the Sky', in Chongqing, China as an Example

Authors: Yuhang Zou, Zhu Wang

Abstract:

Most of the western part of China is mountainous and hilly region, with abundant resources of mountainous space. However, the resources are complex, and the ecological factors are diverse. As urbanization expands rapidly today, the landscape of the mountain residence needs to be changed. This paper, starting with the ecological environment and visual landscape of the mountain living space, analyzes the basic conditions of the Eling Peak, ‘Mirror of the Sky’, in Chongqing, China before its landscape renovation. Then, it analyzes some parts of the project, including the overall planning, ecological coordination, space expansion and local conditions in mountain environment. After that, this paper concludes the intention of designer and 4 methods, appropriate demolition, space reconstruction, landscape modeling and reasonable road system, to transform the master’s mountain residential works. Finally, through the analysis and understanding of the project, it sums up that the most beautiful landscape is not only the outdoor space, but also borrowing scene from the city and the sky, making them a part of the mountainous residential buildings. Only in this way can people, landscape, building, sky, and city become integrated and coexist harmoniously.

Keywords: landscape design, mountainous architecture, renovation, residence

Procedia PDF Downloads 153
6465 English and Information and Communication Technology: Zones of Exclusion in Education in Low-Income Countries

Authors: Ram A. Giri, Amna Bedri, Abdou Niane

Abstract:

Exclusion in education on the basis of language in multilingual contexts operates at multiple levels. Learners of diverse ethnolinguistic backgrounds are often expected to learn through English and are pushed further down the learning ladder if they also have to access education through Information and Communication Technology (ICT). The paper explores marginalized children’s lived experiences in accessing technology and English in four low-income countries in Africa and Asia. Based on the findings of the first phase of a multinational qualitative research study, we report on the factors or barriers that affect children’s access, opportunities and motivation for learning through technology and English. ICT and English - the language of ICT and education - can enhance learning and can even be essential. However, these two important keys to education can also function as barriers to accessing quality education, and therefore as zones of exclusion. This paper looks into how marginalized children (aged 13-15) engage in learning through ICT and English and to what extent the restrictive access and opportunities contribute to the widening of the already existing gap in education. By applying the conceptual frameworks of “access and accessibility of learning” and “zones of exclusion,” the paper elucidates how the barriers prevent children’s effective engagement with learning and addresses such questions as to how marginalized children access technology and English for learning; whether the children value English, and what their motivation and opportunity to learn it are. In addition, the paper will point out policy and pedagogic implications.

Keywords: exclusion, inclusion, inclusive education, marginalization

Procedia PDF Downloads 225
6464 New Security Approach of Confidential Resources in Hybrid Clouds

Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel

Abstract:

Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.

Keywords: cloud, confidentiality, cryptography, security issues, trust issues

Procedia PDF Downloads 371
6463 Generative Design Method for Cooled Additively Manufactured Gas Turbine Parts

Authors: Thomas Wimmer, Bernhard Weigand

Abstract:

The improvement of gas turbine efficiency is one of the main drivers of research and development in the gas turbine market. This has led to elevated gas turbine inlet temperatures beyond the melting point of the utilized materials. The turbine parts need to be actively cooled in order to withstand these harsh environments. However, the usage of compressor air as coolant decreases the overall gas turbine efficiency. Thus, coolant consumption needs to be minimized in order to gain the maximum advantage from higher turbine inlet temperatures. Therefore, sophisticated cooling designs for gas turbine parts aim to minimize coolant mass flow. New design space is accessible as additive manufacturing is maturing to industrial usage for the creation of hot gas flow path parts. By making use of this technology more efficient cooling schemes can be manufacture. In order to find such cooling schemes a generative design method is being developed. It generates cooling schemes randomly which adhere to a set of rules. These assure the sanity of the design. A huge amount of different cooling schemes are generated and implemented in a simulation environment where it is validated. Criteria for the fitness of the cooling schemes are coolant mass flow, maximum temperature and temperature gradients. This way the whole design space is sampled and a Pareto optimum front can be identified. This approach is applied to a flat plate, which resembles a simplified section of a hot gas flow path part. Realistic boundary conditions are applied and thermal barrier coating is accounted for in the simulation environment. The resulting cooling schemes are presented and compared to representative conventional cooling schemes. Further development of this method can give access to cooling schemes with an even better performance having higher complexity, which makes use of the available design space.

Keywords: additive manufacturing, cooling, gas turbine, heat transfer, heat transfer design, optimization

Procedia PDF Downloads 345
6462 Every g-Riesz Basis is a Riesz Basis

Authors: Mehdi Rashidi-Kouchi, Asghar Rahimi

Abstract:

Sun introduced a generalization of frames and showed that this includes more other cases of generalizations of frame concept and proved that many basic properties can be derived within this more general context. Another generalization of frames is frames in Hilbert C*-module. It has been proved that every g-frame in Hilbert space H respect to Hilbert space K is a frame for B(H;K) as Hilbert C*-module. We show that every g-Riesz basis for Hilbert space H respect to K by add a condition is a Riesz basis for Hilbert B(K)-module B(H;K). Also, we investigate similar result for g-orthonormal and orthogonal bases.

Keywords: frame, g-frame, Riesz basis, g-Riesz basis, Hilbert C*-module

Procedia PDF Downloads 464
6461 Research on the Path of Renewal and Activation of Public Space in Guangzhou Historical City under the Guidance of Public Art

Authors: Jingjing Li, Shifu Wang

Abstract:

After the irreversible consequences of the traditional renewal mode of ‘function first and then beautification’, such as the constructive destruction, social differentiation, and cultural, ecological imbalance, the renewal of the historical urban area began to pay attention to the excavation of cultural connotation, and entered a new stage from the pursuit of ‘quantity’ growth to the promotion of ‘quality’, expecting to rejuvenate the old city through the intervention of public art. This paper interprets the cases at home and abroad, summarizes the different forms of expression and application strategies of public art in the renewal of historical urban areas, and combs the limitations of the existing practice in Guangzhou through observation. Finally, it puts forward suggestions from three aspects of the system, implementation strategy, and implementation path, respectively, and explores the path of simultaneous rejuvenation of material space and cultural space in historical urban areas under the intervention of public art.

Keywords: public art, historic city, public space, renewal activation

Procedia PDF Downloads 127
6460 Students’ Perceptions of Communication Design in Media: Case Study of Portuguese and Spanish Communication Students

Authors: Fátima Gonçalves, Joaquim Brigas, Jorge Gonçalves

Abstract:

The proliferation of mobile devices in society enables the media to disseminate information and knowledge more rapidly. Higher education students access these contents and share them with each other, in the most diverse platforms, allowing the ubiquity in access to information. This article presents the results and respective quantitative analysis of a survey applied to communication students of two higher education institutions: one in Portugal and another in Spain. The results show that, in this sample, higher education students regularly access news content believing traditional news sources to be more credible. Regarding online sources, it was verified that the access was mostly to free news contents. This study intends to promote the knowledge about the changes that occur in the relationship of higher education students with the media, characterizing how news consumption is processed by these students, considering the resulting effects of the digital media evolution. It is intended to present not only the news sources they use, but also to know some of their habits and relationship with the news media.

Keywords: students' perceptions, communication design, mass media, higher education, digital media

Procedia PDF Downloads 239
6459 Institutional Repository ePrints at Indian Institute of Science: A Special Reference to JRD Tata Memorial Library, Bangalore, India

Authors: Nagarjuna Pitty

Abstract:

Over the past decade there has been substantial progress in the usage of ePrints resources national and international research community. JRD Tata Memorial Library has hosting for the web based ePrints services and maintenance to online user community. This paper provides an overview how to share JRDTML experiences in using GNU EPrints.org software to create and maintain the open-access institutional repository of IISc, ePrints@IISc. This paper states that the GNU EPrints.org is the first generic software for creating Open Access Initiative (OAI)-compliant repositories, which enables the researchers to self-archive their research publications thus facilitating open access to their publications. IISc has been using this software since early 2002. This paper tells that the GNU EPrints.org software is an excellent tool for creating and maintaining OAI-compliant repositories. It can be setup easily even by those who are not too much experts in computer. In this paper, author is sharing JRDTML experiences in using GNU ePrints.org software.

Keywords: digital library, open access initiative, scholarly publications, institutional repository, ePrints@IISc

Procedia PDF Downloads 554
6458 Utilization of a Telepresence Evaluation Tool for the Implementation of a Distant Education Program

Authors: Theresa Bacon-Baguley, Martina Reinhold

Abstract:

Introduction: Evaluation and analysis are the cornerstones of any successful program in higher education. When developing a program at a distant campus, it is essential that the process of evaluation and analysis be orchestrated in a timely manner with tools that can identify both the positive and negative components of distant education. We describe the utilization of a newly developed tool used to evaluate and analyze the successful expansion to a distant campus using Telepresence Technology. Like interactive television, Telepresence allows live interactive delivery but utilizes broadband cable. The tool developed is adaptable to any distant campus as the framework for the tool was derived from a systematic review of the literature. Methodology: Because Telepresence is a relatively new delivery system, the evaluation tool was developed based on a systematic review of literature in the area of distant education and ITV. The literature review identified four potential areas of concern: 1) technology, 2) confidence in the system, 3) faculty delivery of the content and, 4) resources at each site. Each of the four areas included multiple sub-components. Benchmark values were determined to be 80% or greater positive responses to each of the four areas and the individual sub-components. The tool was administered each semester during the didactic phase of the curriculum. Results: Data obtained identified site-specific issues (i.e., technology access, student engagement, laboratory access, and resources), as well as issues common at both sites (i.e., projection screen size). More specifically, students at the parent location did not have adequate access to printers or laboratory space, and students at the distant campus did not have adequate access to library resources. The evaluation tool identified that both sites requested larger screens for visualization of the faculty. The deficiencies were addressed by replacing printers, including additional orientation for students on library resources and increasing the screen size of the Telepresence system. When analyzed over time, the issues identified in the tool as deficiencies were resolved. Conclusions: Utilizing the tool allowed adjustments of the Telepresence delivery system in a timely manner resulting in successful implementation of an entire curriculum at a distant campus.

Keywords: physician assistant, telepresence technology, distant education, assessment

Procedia PDF Downloads 117
6457 Rural Tourism in Essaouira in Morocco: From the Appropriation of Space to the Sustainability of Exploitation

Authors: Hadach Mohamed

Abstract:

In Essaouira, tourism is the main economic activity, and the destination has a place in the segment of rural and sustainable tourism. The hinterland of the destination has natural and tourist potential of great attractiveness, but the natives still appropriate the territory and are faced with the dilemma of appropriation and tourist exploitation. This article analyzes the determinants of the appropriation of a rural tourist space in light of the massive touristification and the need to set up income-generating activities for the inhabitants. After a review of the literature, a survey was carried out among the main actors of tourism in the destination to evaluate the question of the appropriation of the tourist space and the sustainability of a destination.

Keywords: rural tourism, sustainability, appropriation, tourism destination

Procedia PDF Downloads 102
6456 Performance Improvement of Cooperative Scheme in Wireless OFDM Systems

Authors: Ki-Ro Kim, Seung-Jun Yu, Hyoung-Kyu Song

Abstract:

Recently, the wireless communication systems are required to have high quality and provide high bit rate data services. Researchers have studied various multiple antenna scheme to meet the demand. In practical application, it is difficult to deploy multiple antennas for limited size and cost. Cooperative diversity techniques are proposed to overcome the limitations. Cooperative communications have been widely investigated to improve performance of wireless communication. Among diversity schemes, space-time block code has been widely studied for cooperative communication systems. In this paper, we propose a new cooperative scheme using pre-coding and space-time block code. The proposed cooperative scheme provides improved error performance than a conventional cooperative scheme using space-time block coding scheme.

Keywords: cooperative communication, space-time block coding, pre-coding

Procedia PDF Downloads 355
6455 Monthly River Flow Prediction Using a Nonlinear Prediction Method

Authors: N. H. Adenan, M. S. M. Noorani

Abstract:

River flow prediction is an essential to ensure proper management of water resources can be optimally distribute water to consumers. This study presents an analysis and prediction by using nonlinear prediction method involving monthly river flow data in Tanjung Tualang from 1976 to 2006. Nonlinear prediction method involves the reconstruction of phase space and local linear approximation approach. The phase space reconstruction involves the reconstruction of one-dimensional (the observed 287 months of data) in a multidimensional phase space to reveal the dynamics of the system. Revenue of phase space reconstruction is used to predict the next 72 months. A comparison of prediction performance based on correlation coefficient (CC) and root mean square error (RMSE) have been employed to compare prediction performance for nonlinear prediction method, ARIMA and SVM. Prediction performance comparisons show the prediction results using nonlinear prediction method is better than ARIMA and SVM. Therefore, the result of this study could be used to developed an efficient water management system to optimize the allocation water resources.

Keywords: river flow, nonlinear prediction method, phase space, local linear approximation

Procedia PDF Downloads 403
6454 Research and Design of Functional Mixed Community: A Model Based on the Construction of New Districts in China

Authors: Wu Chao

Abstract:

The urban design of the new district in China is different from other existing cities at the city planning level, including Beijing, Shanghai, Guangzhou, etc. And the urban problems of these super-cities are same as many big cities around the world. The goal of the new district construction plan is to enable people to live comfortably, to improve the well-being of residents, and to create a way of life different from that of other urban communities. To avoid the emergence of the super community, the idea of "decentralization" is taken as the overall planning idea, and the function and form of each community are set up with a homogeneous allocation of resources so that the community can grow naturally. Similar to the growth of vines in nature, each community groups are independent and connected through roads, with clear community boundaries that limit their unlimited expansion. With a community contained 20,000 people as a case, the community is a mixture for living, production, office, entertainment, and other functions. Based on the development of the Internet, to create more space for public use, and can use data to allocate resources in real time. And this kind of shared space is the main part of the activity space in the community. At the same time, the transformation of spatial function can be determined by the usage feedback of all kinds of existing space, and the use of space can be changed by the changing data. Take the residential unit as the basic building function mass, take the lower three to four floors of the building as the main flexible space for use, distribute functions such as entertainment, service, office, etc. For the upper living space, set up a small amount of indoor and outdoor activity space, also used as shared space. The transformable space of the bottom layer is evenly distributed, combined with the walking space connected the community, the service and entertainment network can be formed in the whole community, and can be used in most of the community space. With the basic residential unit as the replicable module, the design of the other residential units runs through the idea of decentralization and the concept of the vine community, and the various units are reasonably combined. At the same time, a small number of office buildings are added to meet the special office needs. The new functional mixed community can change many problems of the present city in the future construction, at the same time, it can keep its vitality through the adjustment function of the Internet.

Keywords: decentralization, mixed functional community, shared space, spatial usage data

Procedia PDF Downloads 115
6453 Design and Application of NFC-Based Identity and Access Management in Cloud Services

Authors: Shin-Jer Yang, Kai-Tai Yang

Abstract:

In response to a changing world and the fast growth of the Internet, more and more enterprises are replacing web-based services with cloud-based ones. Multi-tenancy technology is becoming more important especially with Software as a Service (SaaS). This in turn leads to a greater focus on the application of Identity and Access Management (IAM). Conventional Near-Field Communication (NFC) based verification relies on a computer browser and a card reader to access an NFC tag. This type of verification does not support mobile device login and user-based access management functions. This study designs an NFC-based third-party cloud identity and access management scheme (NFC-IAM) addressing this shortcoming. Data from simulation tests analyzed with Key Performance Indicators (KPIs) suggest that the NFC-IAM not only takes less time in identity identification but also cuts time by 80% in terms of two-factor authentication and improves verification accuracy to 99.9% or better. In functional performance analyses, NFC-IAM performed better in salability and portability. The NFC-IAM App (Application Software) and back-end system to be developed and deployed in mobile device are to support IAM features and also offers users a more user-friendly experience and stronger security protection. In the future, our NFC-IAM can be employed to different environments including identification for mobile payment systems, permission management for remote equipment monitoring, among other applications.

Keywords: cloud service, multi-tenancy, NFC, IAM, mobile device

Procedia PDF Downloads 429
6452 A New Complex Method for Integrated Warehouse Design in Aspect of Dynamic and Static Capacity

Authors: Tamas Hartvanyi, Zoltan Andras Nagy, Miklos Szabo

Abstract:

The dynamic and static capacity are two opposing aspect of warehouse design. Static capacity optimization aims to maximize the space-usage for goods storing, while dynamic capacity needs more free place to handling them. They are opposing by the building structure and the area utilization. According to Pareto principle: the 80% of the goods are the 20% of the variety. From the origin of this statement, it worth to store the big amount of same products by fulfill the space with minimal corridors, meanwhile the rest 20% of goods have the 80% variety of the whole range, so there is more important to be fast-reachable instead of the space utilizing, what makes the space fulfillment numbers worse. The warehouse design decisions made in present practice by intuitive and empiric impressions, the planning method is formed to one selected technology, making this way the structure of the warehouse homogeny. Of course the result can’t be optimal for the inhomogeneous demands. A new innovative model based on our research will be introduced in this paper to describe the technic capacities, what makes possible to define optimal cluster of technology. It is able to optimize the space fulfillment and the dynamic operation together with this cluster application.

Keywords: warehouse, warehouse capacity, warehouse design method, warehouse optimization

Procedia PDF Downloads 129
6451 Space Vector PWM and Model Predictive Control for Voltage Source Inverter Control

Authors: Irtaza M. Syed, Kaamran Raahemifar

Abstract:

In this paper, we present a comparative assessment of Space Vector Pulse Width Modulation (SVPWM) and Model Predictive Control (MPC) for two-level three phase (2L-3P) Voltage Source Inverter (VSI). VSI with associated system is subjected to both control techniques and the results are compared. Matlab/Simulink was used to model, simulate and validate the control schemes. Findings of this study show that MPC is superior to SVPWM in terms of total harmonic distortion (THD) and implementation.

Keywords: voltage source inverter, space vector pulse width modulation, model predictive control, comparison

Procedia PDF Downloads 501
6450 Public Libraries as Social Spaces for Vulnerable Populations

Authors: Natalie Malone

Abstract:

This study explores the role of a public library in the creation of social spaces for vulnerable populations. The data stems from a longitudinal ethnographic study of the Anderson Library community, which included field notes, artifacts, and interview data. Thematic analysis revealed multiple meanings and thematic relationships within and among the data sources -interviews, field notes, and artifacts. Initial analysis suggests the Anderson Library serves as a space for vulnerable populations, with the sub-themes of fostering interpersonal communication to create a social space for children and fostering interpersonal communication to create a social space for parents and adults. These findings are important as they illustrate the potential of public libraries to serve as community empowering institutions.

Keywords: capital, immigrant families, public libraries, space, vulnerable

Procedia PDF Downloads 144
6449 Simulation Study on Spacecraft Surface Charging Induced by Jovian Plasma Environment with Particle in Cell Method

Authors: Meihua Fang, Yipan Guo, Tao Fei, Pengyu Tian

Abstract:

Space plasma caused spacecraft surface charging is the major space environment hazard. Particle in cell (PIC) method can be used to simulate the interaction between space plasma and spacecraft. It was proved that surface charging level of spacecraft in Jupiter’s orbits was high for its’ electron-heavy plasma environment. In this paper, Jovian plasma environment is modeled and surface charging analysis is carried out by PIC based software Spacecraft Plasma Interaction System (SPIS). The results show that the spacecraft charging potentials exceed 1000V at 2Rj, 15Rj and 25Rj polar orbits in the dark side at worst case plasma model. Furthermore, the simulation results indicate that the large Jovian magnetic field increases the surface charging level for secondary electron gyration.

Keywords: Jupiter, PIC, space plasma, surface charging

Procedia PDF Downloads 145
6448 Discretization of Cuckoo Optimization Algorithm for Solving Quadratic Assignment Problems

Authors: Elham Kazemi

Abstract:

Quadratic Assignment Problem (QAP) is one the combinatorial optimization problems about which research has been done in many companies for allocating some facilities to some locations. The issue of particular importance in this process is the costs of this allocation and the attempt in this problem is to minimize this group of costs. Since the QAP’s are from NP-hard problem, they cannot be solved by exact solution methods. Cuckoo Optimization Algorithm is a Meta-heuristicmethod which has higher capability to find the global optimal points. It is an algorithm which is basically raised to search a continuous space. The Quadratic Assignment Problem is the issue which can be solved in the discrete space, thus the standard arithmetic operators of Cuckoo Optimization Algorithm need to be redefined on the discrete space in order to apply the Cuckoo Optimization Algorithm on the discrete searching space. This paper represents the way of discretizing the Cuckoo optimization algorithm for solving the quadratic assignment problem.

Keywords: Quadratic Assignment Problem (QAP), Discrete Cuckoo Optimization Algorithm (DCOA), meta-heuristic algorithms, optimization algorithms

Procedia PDF Downloads 508
6447 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 313