Search results for: information systems failure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19760

Search results for: information systems failure

16580 The Concentration Analysis of CO2 Using ALOHA Code for Kuosheng Nuclear Power Plant

Authors: W. S. Hsu, Y. Chiang, H. C. Chen, J. R. Wang, S. W. Chen, J. H. Yang, C. Shih

Abstract:

Not only radiation materials, but also the normal chemical material stored in the power plant can cause a risk to the residents. In this research, the ALOHA code was used to perform the concentration analysis under the CO2 storage burst or leakage conditions for Kuosheng nuclear power plant (NPP). The Final Safety Analysis Report (FSAR) and data were used in this study. Additionally, the analysis results of ALOHA code were compared with the R.G. 1.78 failure criteria in order to confirm the control room habitability. The comparison results show that the ALOHA result for burst case was 0.923 g/m3 which was below the criteria. However, the ALOHA results for leakage case was 11.3 g/m3.

Keywords: BWR, ALOHA, habitability, Kuosheng

Procedia PDF Downloads 339
16579 Implementation of ISO 26262: Issues and Challenges

Authors: Won Jung, Azianti Ismail

Abstract:

Functional safety is about electrical, electronics, and programmable electronic safety-related system focuses on the potential risk of malfunction which may have a significant impact on the safety of humans and/or the environment based on IEC 61508. In November 2011, the automotive industry has been introduced to automotive functional safety ISO 26262 which addresses the complete safety installation from sensor to actuator with its technical as well as management issues. Nowadays, most of the modern automobiles are equipped with embedded electronic systems which include many Electronic Controller Units (ECUs), electronic sensors, signals, bus systems and coding. Due to upcoming more sophisticated systems installed in automobiles, the need to carry out detailed safety is very crucial. Assimilation of existing practices with this new standard is a major challenge for the automotive industry in reducing redundancy, time and resources. Therefore, this paper will analyze the research trends on pre and post introduction of ISO 26262 through publications as well as to take a glimpse in the activities for implementing this standard by the automotive manufacturers around the world. It is going to highlight issues and challenges which have been discussed among the experts in this field. Even though it will take some time for this standard to be fully implemented, the benefits from this implementation will raise the competitiveness in the global automotive market.

Keywords: ISO 26262, automotive, functional safety, implementation, standard, challenges

Procedia PDF Downloads 383
16578 Design Improvement of Aircraft Turbofan Engine Following Bird Ingestion Testing

Authors: Ahmed H. Elkholy

Abstract:

Aircraft gas turbine engines are subject to damage by airborne foreign objects such as birds and garbage dumps. In order to assess their effect on engine performance, a complete foreign object damage (FOD) test was carried out and a component failure analysis was used to verify airworthiness standards (AWS) requirements for engine certification as set by international regulations. Ingestion damage due to 1.8 Kg (4 lb.) bird strike on an engine is presented in some detail. Based on the observed damage, improvements to the engine design were suggested in two different locations: the front bearing housing and the low compressor shaft. When these improvements were implemented, the engine showed an acceptable containment capability that meets AWS requirements.

Keywords: aircraft engine, airworthiness standards, bird ingestion, foreign object damage

Procedia PDF Downloads 402
16577 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 469
16576 A Method for Multimedia User Interface Design for Mobile Learning

Authors: Shimaa Nagro, Russell Campion

Abstract:

Mobile devices are becoming ever more widely available, with growing functionality, and are increasingly used as an enabling technology to give students access to educational material anytime and anywhere. However, the design of educational material user interfaces for mobile devices is beset by many unresolved research issues such as those arising from emphasising the information concepts then mapping this information to appropriate media (modelling information then mapping media effectively). This report describes a multimedia user interface design method for mobile learning. The method covers specification of user requirements and information architecture, media selection to represent the information content, design for directing attention to important information, and interaction design to enhance user engagement based on Human-Computer Interaction design strategies (HCI). The method will be evaluated by three different case studies to prove the method is suitable for application to different areas / applications, these are; an application to teach about major computer networking concepts, an application to deliver a history-based topic; (after these case studies have been completed, the method will be revised to remove deficiencies and then used to develop a third case study), an application to teach mathematical principles. At this point, the method will again be revised into its final format. A usability evaluation will be carried out to measure the usefulness and effectiveness of the method. The investigation will combine qualitative and quantitative methods, including interviews and questionnaires for data collection and three case studies for validating the MDMLM method. The researcher has successfully produced the method at this point which is now under validation and testing procedures. From this point forward in the report, the researcher will refer to the method using the MDMLM abbreviation which means Multimedia Design Mobile Learning Method.

Keywords: human-computer interaction, interface design, mobile learning, education

Procedia PDF Downloads 230
16575 Teaching 'Sustainable Architecture' to Pre-School Children by School Building for a Clean Future

Authors: Cimen Ozburak

Abstract:

Pollution and the consumption of natural resources are significant global concerns. These problems have to be resolved in order to create a cleaner environment for the world. It is believed that sustainable building designs may reduce environmental problems throughout the world. It is known that if children receive environmental education in early childhood, they will be more likely to construct sustainable living systems and environment when they are older. School buildings can be used as educational material for teaching the natural and artificial environment in environmental education. In this study, the effect of school buildings on environmental education is examined by using the literature review method along with various examples. The selected examples in the study were analyzed according to 4 main criteria of LEED green building certification systems. These are the use of sustainable utilization of land, efficient utilization of water, efficient utilization of energy and efficient utilization of materials. According to the literature review, children who are educated in buildings designed according to these criteria, they will be environmentally sensitive individuals when they are older.

Keywords: clean future, educational sustainable pre-schools, environmental education, sustainable systems

Procedia PDF Downloads 237
16574 Moving Oman’s Economy to Knowledge-Based Economy: A Study on the Role of SMEs from the Perspective of Experts

Authors: Hanin Suleiman Alqam

Abstract:

The knowledge-based economy, as its name implies relies on knowledge, information and high levels of skills made available for all economic agents. Delving a bit more deeply, the concept of a knowledge-based economy is showcasing four main pillars, which are: Education and Training, Information and Communication Technology, Economic incentives and Institutional regimes, and Research and Development (R&D) and Innovation system. A good number of researches are showing its positive contribution to economic diversification underpinning sustainable development and growth. The present paper aimed at assessing the role of SMEs in moving Oman’s economy from a traditional economy to a knowledge-based economy. To lay down a groundwork that should lead to future studies, the methodology selected is based on exploratory research. Hence, the interview was conducted as a data collection tool. Based on a purposive sampling technique, seven handpicked experts have partaken in the study as they are working in different key organizations considered to be directly or indirectly the backbone of the Omani national economy. A thematic approach is employed for the purpose of data analysis. Results of the study showed that SMEs are not really contributing in the knowledge-based economy due to a lack of awareness about its importance to the country and to the enterprise within SMEs in Oman. However, it was shown that SMEs owners are interested in innovation and are trying to support innovative individuals by attracting them to their enterprises. On the other hand, the results revealed that SMEs' performance in e-solution is still not up to the level as 32% of SMEs only are using e-solutions in their internal processes and procedures like accounting systems. It is recommended to SMEs owners to use new and modern technologies in marketing and customer relation, encourage creativity, research and development, and allow the youth to have opportunities and facilitate the procedure in terms of innovation so that their role in contributing to the knowledge-based economy could be improved.

Keywords: knowledge-based economy, SMEs, ICT pillars, research and innovation

Procedia PDF Downloads 134
16573 Embolism: How Changes in Xylem Sap Surface Tension Affect the Resistance against Hydraulic Failure

Authors: Adriano Losso, Birgit Dämon, Stefan Mayr

Abstract:

In vascular plants, water flows from roots to leaves in a metastable state, and even a small perturbation of the system can lead a sudden transition from the liquid to the vapor phase, resulting in xylem embolism (cavitation). Xylem embolism, induced by drought stress and/or freezing stress is caused by the aspiration of gaseous bubbles into xylem conduits from adjacent gas-filled compartments through pit membrane pores (‘air seeding’). At water potentials less negative than the threshold for air seeding, the surface tension (γ) stabilizes the air-water interface and thus prevents air from passing the pit pores. This hold is probably also true for conifers, where this effect occurs at the edge of the sealed torus. Accordingly, it was experimentally demonstrated that γ influences air seeding, but information on the relevance of this effect under field conditions is missing. In this study, we analyzed seasonal changes in γ of the xylem sap in two conifers growing at the alpine timberline (Picea abies and Pinus mugo). In addition, cut branches were perfused (40 min perfusion at 0.004 MPa) with different γ solutions (i.e. distilled and degassed water, 2, 5 and 15% (v/v) ethanol-water solution corresponding to a γ of 74, 65, 55 and 45 mN m-1, respectively) and their vulnerability to drought-induced embolism analyzed via the centrifuge technique (Cavitron). In both species, xylem sap γ changed considerably (ca. 53-67 and ca. 50-68 mN m-1 in P. abies and P. cembra, respectively) over the season. Branches perfused with low γ solutions showed reduced resistance against drought-induced embolism in both species. A significant linear relationship (P < 0.001) between P12, P50 and P88 (i.e. water potential at 12, 50 and 88% of the loss of conductivity) and xylem sap γ was found. Based on this correlation, a variation in P50 between -3.10 and -3.83 MPa (P. abies) and between -3.21 and -4.11 MPa (P. mugo) over the season could be estimated. Results demonstrate that changes in γ of the xylem sap can considerably influence a tree´s resistance to drought-induced embolism. They indicate that vulnerability analyses, normally conducted at a γ near that of pure water, might often underestimate vulnerabilities under field conditions. For studied timberline conifers, seasonal changes in γ might be especially relevant in winter, when frost drought and freezing stress can lead to an excessive embolism.

Keywords: conifers, Picea abies, Pinus mugo, timberline

Procedia PDF Downloads 277
16572 Effect of Green Manuring Jantar (Sesbania acculata. L.) on the Growth and Yield of Crops Grown in Wheat-Based Cropping Systems

Authors: Javed Kamal

Abstract:

A proposed field study of wheat-based cropping systems was conducted at Faisalabad (Post-Graduate Research Station). We used 7 treatments and Jantar as a green manuring crop to increase the fertility status of soil; after the vegetative phases of wheat, rice, sorghum, and mungbean, the agronomic parameters of these crops were recorded. Hopefully, all increased with jantar treatment when compared with controls. The benefit: cost ratio and physicochemical characteristics of the soil before and after the crop harvest were also calculated.

Keywords: benifit cost ratio, jantar, sunflower, rice, wheat

Procedia PDF Downloads 381
16571 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 455
16570 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts

Authors: Reza Shakoori

Abstract:

This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.

Keywords: Arabic, chain code normalization, OCR systems, image processing

Procedia PDF Downloads 385
16569 Information Pollution: Exploratory Analysis of Subs-Saharan African Media’s Capabilities to Combat Misinformation and Disinformation

Authors: Muhammed Jamiu Mustapha, Jamiu Folarin, Stephen Obiri Agyei, Rasheed Ademola Adebiyi, Mutiu Iyanda Lasisi

Abstract:

The role of information in societal development and growth cannot be over-emphasized. It has remained an age-long strategy to adopt the information flow to make an egalitarian society. The same has become a tool for throwing society into chaos and anarchy. It has been adopted as a weapon of war and a veritable instrument of psychological warfare with a variety of uses. That is why some scholars posit that information could be deployed as a weapon to wreak “Mass Destruction" or promote “Mass Development". When used as a tool for destruction, the effect on society is like an atomic bomb which when it is released, pollutes the air and suffocates the people. Technological advancement has further exposed the latent power of information and many societies seem to be overwhelmed by its negative effect. While information remains one of the bedrock of democracy, the information ecosystem across the world is currently facing a more difficult battle than ever before due to information pluralism and technological advancement. The more the agents involved try to combat its menace, the difficult and complex it is proving to be curbed. In a region like Africa with dangling democracy enfolds with complexities of multi-religion, multi-cultures, inter-tribes, ongoing issues that are yet to be resolved, it is important to pay critical attention to the case of information disorder and find appropriate ways to curb or mitigate its effects. The media, being the middleman in the distribution of information, needs to build capacities and capabilities to separate the whiff of misinformation and disinformation from the grains of truthful data. From quasi-statistical senses, it has been observed that the efforts aimed at fighting information pollution have not considered the built resilience of media organisations against this disorder. Apparently, the efforts, resources and technologies adopted for the conception, production and spread of information pollution are much more sophisticated than approaches to suppress and even reduce its effects on society. Thus, this study seeks to interrogate the phenomenon of information pollution and the capabilities of select media organisations in Sub-Saharan Africa. In doing this, the following questions are probed; what are the media actions to curb the menace of information pollution? Which of these actions are working and how effective are they? And which of the actions are not working and why they are not working? Adopting quantitative and qualitative approaches and anchored on the Dynamic Capability Theory, the study aims at digging up insights to further understand the complexities of information pollution, media capabilities and strategic resources for managing misinformation and disinformation in the region. The quantitative approach involves surveys and the use of questionnaires to get data from journalists on their understanding of misinformation/disinformation and their capabilities to gate-keep. Case Analysis of select media and content analysis of their strategic resources to manage misinformation and disinformation is adopted in the study while the qualitative approach will involve an In-depth Interview to have a more robust analysis is also considered. The study is critical in the fight against information pollution for a number of reasons. One, it is a novel attempt to document the level of media capabilities to fight the phenomenon of information disorder. Two, the study will enable the region to have a clear understanding of the capabilities of existing media organizations to combat misinformation and disinformation in the countries that make up the region. Recommendations emanating from the study could be used to initiate, intensify or review existing approaches to combat the menace of information pollution in the region.

Keywords: disinformation, information pollution, misinformation, media capabilities, sub-Saharan Africa

Procedia PDF Downloads 150
16568 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 429
16567 SMEs Access to Finance in Croatia – Model Approach

Authors: Vinko Vidučić, Ljiljana Vidučić, Damir Boras

Abstract:

The goals of the research include the determination of the characteristics of SMEs finance in Croatia, as well as the determination of indirect growth rates of the information model of the entrepreneurs` perception of business environment. The research results show that cost of finance and access to finance are most important constraining factor in setting up and running the business of small entrepreneurs in Croatia. Furthermore, small entrepreneurs in Croatia are significantly dissatisfied with the administrative barriers although relatively to a lesser extent than was the case in the pre-crisis time. High collateral requirement represents the main characteristic of bank lending concerning SMEs followed by long credit elaboration process. Formulated information model has defined the individual impact of indirect growth rates of the remaining variables on the model’s specific variable.

Keywords: business environment, information model, indirect growth rates, SME finance

Procedia PDF Downloads 349
16566 A Study on Knowledge, Attitude and Behavior on Emergency Contraception among Higher Secondary and Bachelor Level Youth Students of Lekhnath Municipality, Nepal

Authors: Gokul Pathak, Dilip Kumar Yadav

Abstract:

Background: Unsafe/unprotected and early sexual relations are highly responsible for the problems of unwanted pregnancy, child birth and other adverse consequences. Emergency contraception (EC) refers to methods that women can use to prevent pregnancy after unprotected sexual intercourse, method failure or incorrect use. Aim and Objective: The objective of this research study was to assess the level of knowledge, attitude and behavior on emergency contraception among youth students of Lekhnath Municipality. Methodology: This institution based descriptive study was carried out in August-October 2012 on Lekhnath Municipality, Nepal. Multistage simple random sampling procedure with pretested semi structured questionnaire following self administered technique was used to collect information. Collected data was coded and entered in the EpiData 3.1 ® and exported to Statistical Package for Social Science (SPSS®) version 20.0 for analysis. Chi-square test and Spearman correlation was applied wherever required. Results: A total of 641 students (87.6 %), youth students participated in this study which incorporates 354 male and 287 female youth students, of them 54.3% were from Higher Secondary level and 45.7% were from Undergraduate level. The awareness of EC among respondents was found only 64.7%. 25.8% respondents were found to have fair knowledge level where as 74.2% had poor knowledge level. Level of knowledge was significantly associated with age, educational level, faculty and educational status of mother. The study showed 82.4% respondent’s favorable attitude towards use of EC. 21.1% respondents were found to be sexually active (29.7% male and 10.5% female) and only 28.1% of sexually active respondents had ever used any method of EC. Conclusion: Knowledge about EC was found quiet low among youth. There was significant lack of knowledge about exact time limit of using devices of EC. Similarly several misconceptions regarding EC were found very high among youth. Health education initiatives should target students as they are more likely to be sexually active.

Keywords: emergency contraception, youth, unsafe/unprotected sexual intercourse, knowledge, attitude and behavior

Procedia PDF Downloads 430
16565 The Democratization of 3D Capturing: An Application Investigating Google Tango Potentials

Authors: Carlo Bianchini, Lorenzo Catena

Abstract:

The appearance of 3D scanners and then, more recently, of image-based systems that generate point clouds directly from common digital images have deeply affected the survey process in terms of both capturing and 2D/3D modelling. In this context, low cost and mobile systems are increasingly playing a key role and actually paving the way to the democratization of what in the past was the realm of few specialized technicians and expensive equipment. The application of Google Tango on the ancient church of Santa Maria delle Vigne in Pratica di Mare – Rome presented in this paper is one of these examples.

Keywords: the architectural survey, augmented/mixed/virtual reality, Google Tango project, image-based 3D capturing

Procedia PDF Downloads 134
16564 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 459
16563 Broadcasting Stabilization for Dynamical Multi-Agent Systems

Authors: Myung-Gon Yoon, Jung-Ho Moon, Tae Kwon Ha

Abstract:

This paper deals with a stabilization problem for multi-agent systems, when all agents in a multi-agent system receive the same broadcasting control signal and the controller can measure not each agent output but the sum of all agent outputs. It is analytically shown that when the sum of all agent outputs is bounded with a certain broadcasting controller for a given reference, each agent output is separately bounded:stabilization of the sum of agent outputs always results in the stability of every agent output. A numerical example is presented to illustrate our theoretic findings in this paper.

Keywords: broadcasting control, multi-agent system, transfer function, stabilization

Procedia PDF Downloads 364
16562 Rationalized Haar Transforms Approach to Design of Observer for Control Systems with Unknown Inputs

Authors: Joon-Hoon Park

Abstract:

The fundamental concept of observability is important in both theoretical and practical points of modern control systems. In modern control theory, a control system has criteria for determining the design solution exists for the system parameters and design objectives. The idea of observability relates to the condition of observing or estimating the state variables from the output variables that is generally measurable. To design closed-loop control system, the practical problems of implementing the feedback of the state variables must be considered and implementing state feedback control problem has been existed in this case. All the state variables are not available, so it is requisite to design and implement an observer that will estimate the state variables form the output parameters. However sometimes unknown inputs are presented in control systems as practical cases. This paper presents a design method and algorithm for observer of control system with unknown input parameters based on Rationalized Haar transform. The proposed method is more advantageous than the other numerical method.

Keywords: orthogonal functions, rationalized Haar transforms, control system observer, algebraic method

Procedia PDF Downloads 354
16561 Evolution of the Environmental Justice Concept

Authors: Zahra Bakhtiari

Abstract:

This article explores the development and evolution of the concept of environmental justice, which has shifted from being dominated by white and middle-class individuals to a civil struggle by marginalized communities against environmental injustices. Environmental justice aims to achieve equity in decision-making and policy-making related to the environment. The concept of justice in this context includes four fundamental aspects: distribution, procedure, recognition, and capabilities. Recent scholars have attempted to broaden the concept of justice to include dimensions of participation, recognition, and capabilities. Focusing on all four dimensions of environmental justice is crucial for effective planning and policy-making to address environmental issues. Ignoring any of these aspects can lead to the failure of efforts and the waste of resources.

Keywords: environmental justice, distribution, procedure, recognition, capabilities

Procedia PDF Downloads 72
16560 Designing of Tooling Solution for Material Handling in Highly Automated Manufacturing System

Authors: Muhammad Umair, Yuri Nikolaev, Denis Artemov, Ighor Uzhinsky

Abstract:

A flexible manufacturing system is an integral part of a smart factory of industry 4.0 in which every machine is interconnected and works autonomously. Robots are in the process of replacing humans in every industrial sector. As the cyber-physical-system (CPS) and artificial intelligence (AI) are advancing, the manufacturing industry is getting more dependent on computers than human brains. This modernization has boosted the production with high quality and accuracy and shifted from classic production to smart manufacturing systems. However, material handling for such automated productions is a challenge and needs to be addressed with the best possible solution. Conventional clamping systems are designed for manual work and not suitable for highly automated production systems. Researchers and engineers are trying to find the most economical solution for loading/unloading and transportation workpieces from a warehouse to a machine shop for machining operations and back to the warehouse without human involvement. This work aims to propose an advanced multi-shape tooling solution for highly automated manufacturing systems. The currently obtained result shows that it could function well with automated guided vehicles (AGVs) and modern conveyor belts. The proposed solution is following requirements to be automation-friendly, universal for different part geometry and production operations. We used a bottom-up approach in this work, starting with studying different case scenarios and their limitations and finishing with the general solution.

Keywords: artificial intelligence, cyber physics system, Industry 4.0, material handling, smart factory, flexible manufacturing system

Procedia PDF Downloads 121
16559 A New Method to Winner Determination for Economic Resource Allocation in Cloud Computing Systems

Authors: Ebrahim Behrouzian Nejad, Rezvan Alipoor Sabzevari

Abstract:

Cloud computing systems are large-scale distributed systems, so that they focus more on large scale resource sharing, cooperation of several organizations and their use in new applications. One of the main challenges in this realm is resource allocation. There are many different ways to resource allocation in cloud computing. One of the common methods to resource allocation are economic methods. Among these methods, the auction-based method has greater prominence compared with Fixed-Price method. The double combinatorial auction is one of the proper ways of resource allocation in cloud computing. This method includes two phases: winner determination and resource allocation. In this paper a new method has been presented to determine winner in double combinatorial auction-based resource allocation using Imperialist Competitive Algorithm (ICA). The experimental results show that in our new proposed the number of winner users is higher than genetic algorithm. On other hand, in proposed algorithm, the number of winner providers is higher in genetic algorithm.

Keywords: cloud computing, resource allocation, double auction, winner determination

Procedia PDF Downloads 350
16558 Summary of Technical Approaches to Improve Energy Efficiency in Electric Motor Drive Systems

Authors: Manuel Valencia Alejaandro Paz, Luz Nidia Quintero Jairo Palacios

Abstract:

In present paper a set of technical approaches to improve the energy efficiency in processes controlled by electric motor drive systems EMDS are listed and analyzed. Energy saving becomes fundamental to improve the sustainability and competitiveness of organizations all around the world; increasing costs of electricity had impulse the use of different strategies to reduce the electric power condition. A summary of these techniques is presented and evaluated in the potential for energy saving policies.

Keywords: energy saving, EMDS, induction motor, energy efficiency, sustainability

Procedia PDF Downloads 358
16557 Implementing a Screening Tool to Assist with Palliative Care Consultation in Adult Non-ICU Patients

Authors: Cassey Younghans

Abstract:

Background: Current health care trends demonstrate that there is an increasing number of patients being hospitalized with complex comorbidities. These complex needs require advanced therapies, and treatment goals often focus on doing everything possible to prolong life rather than focusing on the individual patient’s quality of life which is the goal of palliative care efforts. Patients benefit from palliative care in the early stages of the illness rather than after the disease progressed or the state of acuity has advanced. The clinical problem identified was that palliative care was not being implemented early enough in the disease process with patients who had complex medical conditions and who would benefit from the philosophy and skills of palliative care professionals. Purpose: The purpose of this quality improvement study was to increase the number of palliative care screenings and consults completed on adults after being admitted to one Non-ICU and Non-COVID hospital unit. Methods: A retrospective chart review assessing for possible missed opportunities to introduce palliation was performed for patients with six primary diagnoses, including heart failure, liver failure, end stage renal disease, chronic obstructive pulmonary disease, cerebrovascular accident, and cancer in a population of adults over the ago of 19 on one medical-surgical unit over a three-month period prior to the intervention. An educational session with the nurses on the benefits of palliative care was conducted by the researcher, and a screening tool was implemented. The expected outcome was to have an increase in early palliative care consultation with patients with complex comorbid conditions and a decrease in missed opportunities for the implementation of palliative care. Another retrospective chart review was completed following completion of the three month piloting of the tool. Results: During the retrospective chart review, 46 patients were admitted to the medical-surgical floor with the primary diagnoses identified in the inclusion criteria. Six patients had palliative care consults completed during that time. Twenty-two palliative care screening tools were completed during the intervention period. Of those, 15 of the patients scored a 7 or higher, suggesting that a palliative care consultation was warranted. The final retrospective chart review identified that 4 palliative consults were implemented during that time of the 31 patients who were admitted over the three month time frame. Conclusion: Educating nurses and implementing a palliative care screening upon admission can be of great value in providing early identification of patients who might benefit from palliative care. Recommendations – It is recommended that this screening tool should be used to help identify the patents of whom would benefit from a palliative care consult, and nurses would be able to initiated a palliative care consultation themselves.

Keywords: palliative care, screening, early, palliative care consult

Procedia PDF Downloads 139
16556 Label Survey in Romania: A Study on How Consumers Use Food Labeling

Authors: Gabriela Iordachescu, Mariana Cretu Stuparu, Mirela Praisler, Camelia Busila, Doina Voinescu, Camelia Vizireanu

Abstract:

The aim of the study was to evaluate the consumers’ degree of confidence in food labeling, how they use and understand the label and respectively food labeling elements. The label is a bridge between producers, suppliers, and consumers. It has to offer enough information in terms of public health and food safety, statement of ingredients, nutritional information, warnings and advisory statements, producing date and shelf-life, instructions for storage and preparation (if required). The survey was conducted on 500 consumers group in Romania, aged 15+, males and females, from urban and rural areas and with different graduation levels. The questionnaire was distributed face to face and online. It had single or multiple choices questions and label images for the efficiency and best understanding of the question. The law 1169/2011 applied to food products from 13 of December 2016 improved and adapted the requirements for labeling in a clear manner. The questions were divided on following topics: interest and general trust in labeling, use and understanding of label elements, understanding of the ingredient list and safety information, nutrition information, advisory statements, serving sizes, best before/use by meanings, intelligent labeling, and demographic data. Three choice selection exercises were also included. In this case, the consumers had to choose between two similar products and evaluate which label element is most important in product choice. The data were analysed using MINITAB 17 and PCA analysis. Most of the respondents trust the food label, taking into account some elements especially when they buy the first time the product. They usually check the sugar content and type of sugar, saturated fat and use the mandatory label elements and nutrition information panel. Also, the consumers pay attention to advisory statements, especially if one of the items is relevant to them or the family. Intelligent labeling is a challenging option. In addition, the paper underlines that the consumer is more careful and selective with the food consumption and the label is the main helper for these.

Keywords: consumers, food safety information, labeling, labeling nutritional information

Procedia PDF Downloads 196
16555 Effective Governance through Mobile Phones: Cases Supporting the Introduction and Implementation

Authors: Mohd Mudasir Shafi, Zafrul Hasan, Talat Saleem

Abstract:

Information and communication Technology (ICT) services have been defined as a route to good governance. Introduction of ICT into Governance has given rise to the idea of e-governance which helps in enhancing transparency, generating accountability and responsiveness in the system in order to provide faster and quality service to the citizen. Advancement in ICT has provided governments all over the world to speed up the delivery of information and services to citizens and businesses and increase their participation in governance. There has been varying degree of success over the past decade into providing services to the citizens using internet and different web services. These e-government initiatives have been extensively researched. Our research is aimed at the transition from electronic government to mobile government (m-government) initiatives implementing the mobile services and concerned to understand the major factors which will aid to adoption and distribution of these services. There must be some amount of research done in the integration process between e-government and m-government. There must also be enough amount of investigation done all the factors that could affect the transition process. Such factors differ between different places and the advancement in information and technology available there. In this paper, we have discussed why mobile communication system can be used for effective e-governance and the areas where m-governance can be implemented. The paper will examine some of the reasons as well as the main opportunities for improving effective governance through mobile phones.

Keywords: e-governance, mobile phones, information technology, m-government

Procedia PDF Downloads 430
16554 Sliding Mode Control of Variable Speed Wind Energy Conversion Systems

Authors: Zine Souhila Rached, Mazari Benyounes Bouzid, Mohamed Amine, Allaoui Tayeb

Abstract:

Wind energy has many advantages, it does not pollute and it is an inexhaustible source. However, its high cost is a major constraint, especially on the less windy sites. The purpose of wind energy systems is to maximize energy efficiency, and extract maximum power from the wind speed. In other words, having a power coefficient is maximum and therefore the maximum power point tracking. In this case, the MPPT control becomes important.To realize this control, strategy conventional proportional and integral (PI) controller is usually used. However, this strategy cannot achieve better performance. This paper proposes a robust control of a turbine which optimizes its production, that is improve the quality and energy efficiency, namely, a strategy of sliding mode control. The proposed sliding mode control strategy presents attractive features such as robustness to parametric uncertainties of the turbine; the proposed sliding mode control approach has been simulated on three-blade wind turbine. The simulation result under Matlab\Simulink has validated the performance of the proposed MPPT strategy.

Keywords: wind turbine, maximum power point tracking, sliding mode, energy conversion systems

Procedia PDF Downloads 595
16553 Study of Mobile Game Addiction Using Electroencephalography Data Analysis

Authors: Arsalan Ansari, Muhammad Dawood Idrees, Maria Hafeez

Abstract:

Use of mobile phones has been increasing considerably over the past decade. Currently, it is one of the main sources of communication and information. Initially, mobile phones were limited to calls and messages, but with the advent of new technology smart phones were being used for many other purposes including video games. Despite of positive outcomes, addiction to video games on mobile phone has become a leading cause of psychological and physiological problems among many people. Several researchers examined the different aspects of behavior addiction with the use of different scales. Objective of this study is to examine any distinction between mobile game addicted and non-addicted players with the use of electroencephalography (EEG), based upon psycho-physiological indicators. The mobile players were asked to play a mobile game and EEG signals were recorded by BIOPAC equipment with AcqKnowledge as data acquisition software. Electrodes were places, following the 10-20 system. EEG was recorded at sampling rate of 200 samples/sec (12,000samples/min). EEG recordings were obtained from the frontal (Fp1, Fp2), parietal (P3, P4), and occipital (O1, O2) lobes of the brain. The frontal lobe is associated with behavioral control, personality, and emotions. The parietal lobe is involved in perception, understanding logic, and arithmetic. The occipital lobe plays a role in visual tasks. For this study, a 60 second time window was chosen for analysis. Preliminary analysis of the signals was carried out with Acqknowledge software of BIOPAC Systems. From the survey based on CGS manual study 2010, it was concluded that five participants out of fifteen were in addictive category. This was used as prior information to group the addicted and non-addicted by physiological analysis. Statistical analysis showed that by applying clustering analysis technique authors were able to categorize the addicted and non-addicted players specifically on theta frequency range of occipital area.

Keywords: mobile game, addiction, psycho-physiology, EEG analysis

Procedia PDF Downloads 149
16552 Bridging the Gaping Levels of Information Entree for Visually Impaired Students in the Sri Lankan University Libraries

Authors: Wilfred Jeyatheese Jeyaraj

Abstract:

Education is a key determinant of future success, and every person deserves non-discriminant access to information for educational inevitabilities in any case. Analysing and understanding complex information is a crucial learning tool, especially for students. In order to compete equally with sighted students, visually impaired students require the unhinged access to access to all the available information resources. When the education of visually impaired students comes to a focal point, it can be stated that visually impaired students encounter several obstacles and barriers before they enter the university and during their time there as students. These obstacles and barriers are spread across technical, organizational and social arenas. This study reveals the possible approaches to absorb and benefit from the information provided by the Sri Lankan University Libraries for visually impaired students. Purposive sampling technique was used to select sample visually impaired students attached to the Sri Lankan National universities. There are 07 National universities which accommodate the visually impaired students and with the identified data, they were selected for this study and 80 visually impaired students were selected as the sample group. Descriptive type survey method was used to collect data. Structured questionnaires, interviews and direct observation were used as research instruments. As far as the Sri Lankan context spread is concerned, visually impaired students are able to finish their courses through their own determination to overcome the barriers they encounter on their way to graduation, through moral and practical support from their own friends and very often through a high level of creativity. According to the findings there are no specially trained university librarians to serve visually impaired users and less number of assistive technology equipment are available at present. This paper enables all university libraries in Sri Lanka to be informed about the social isolation of visually compromised students at the Sri Lankan universities and focuses on the rectification issues by considering their distinct case for interaction.

Keywords: information access, Sri Lanka, university libraries, visual impairment

Procedia PDF Downloads 222
16551 Potential of Visualization and Information Modeling on Productivity Improvement and Cost Saving: A Case Study of a Multi-Residential Construction Project

Authors: Sara Rankohi, Lloyd Waugh

Abstract:

Construction sites are information saturated. Digitalization is hitting construction sites to meet the incredible demand of knowledge sharing and information documentations. From flying drones, 3D Lasers scanners, pocket mobile applications, to augmented reality glasses and smart helmet, visualization technologies help real-time information imposed straight onto construction professional’s field of vision. Although these technologies are very applicable and can have the direct impact on project cost and productivity, experience shows that only a minority of construction professionals quickly adapt themselves to benefit from them in practice. The majority of construction managers still tend to apply traditional construction management methods. This paper investigates a) current applications of visualization technologies in construction projects management, b) the direct effect of these technologies on productivity improvement and cost saving of a multi-residential building project via a case study on Mac Taggart Senior Care project located in Edmonton, Alberta. The research shows the imaged based technologies have a direct impact on improving project productivity and cost savings.

Keywords: image-based technologies, project management, cost, productivity improvement

Procedia PDF Downloads 340