Search results for: implementation persons with disability
2636 The Use of Modern Technologies and Computers in the Archaeological Surveys of Sistan in Eastern Iran
Authors: Mahyar MehrAfarin
Abstract:
The Sistan region in eastern Iran is a significant archaeological area in Iran and the Middle East, encompassing 10,000 square kilometers. Previous archeological field surveys have identified 1662 ancient sites dating from prehistoric periods to the Islamic period. Research Aim: This article aims to explore the utilization of modern technologies and computers in archaeological field surveys in Sistan, Iran, and the benefits derived from their implementation. Methodology: The research employs a descriptive-analytical approach combined with field methods. New technologies and software, such as GPS, drones, magnetometers, equipped cameras, satellite images, and software programs like GIS, Map source, and Excel, were utilized to collect information and analyze data. Findings: The use of modern technologies and computers in archaeological field surveys proved to be essential. Traditional archaeological activities, such as excavation and field surveys, are time-consuming and costly. Employing modern technologies helps in preserving ancient sites, accurately recording archaeological data, reducing errors and mistakes, and facilitating correct and accurate analysis. Creating a comprehensive and accessible database, generating statistics, and producing graphic designs and diagrams are additional advantages derived from the use of efficient technologies in archaeology. Theoretical Importance: The integration of computers and modern technologies in archaeology contributes to interdisciplinary collaborations and facilitates the involvement of specialists from various fields, such as geography, history, art history, anthropology, laboratory sciences, and computer engineering. The utilization of computers in archaeology spanned across diverse areas, including database creation, statistical analysis, graphics implementation, laboratory and engineering applications, and even artificial intelligence, which remains an unexplored area in Iranian archaeology. Data Collection and Analysis Procedures: Information was collected using modern technologies and software, capturing geographic coordinates, aerial images, archeogeophysical data, and satellite images. This data was then inputted into various software programs for analysis, including GIS, Map source, and Excel. The research employed both descriptive and analytical methods to present findings effectively. Question Addressed: The primary question addressed in this research is how the use of modern technologies and computers in archeological field surveys in Sistan, Iran, can enhance archaeological data collection, preservation, analysis, and accessibility. Conclusion: The utilization of modern technologies and computers in archaeological field surveys in Sistan, Iran, has proven to be necessary and beneficial. These technologies aid in preserving ancient sites, accurately recording archaeological data, reducing errors, and facilitating comprehensive analysis. The creation of accessible databases, statistics generation, graphic designs, and interdisciplinary collaborations are further advantages observed. It is recommended to explore the potential of artificial intelligence in Iranian archaeology as an unexplored area. The research has implications for cultural heritage organizations, archaeology students, and universities involved in archaeological field surveys in Sistan and Baluchistan province. Additionally, it contributes to enhancing the understanding and preservation of Iran's archaeological heritage.Keywords: Iran, sistan, archaeological surveys, computer use, modern technologies
Procedia PDF Downloads 822635 Identify and Prioritize the Sustainable Development of Sports Venues Using New and Degradable Energies with a Hierarchical Analysis Approach
Authors: Mahsaossadat Pourrahmati Khelejan
Abstract:
The purpose of this research was to identify and prioritize the sustainable development of sports venues using new and degradable energies with using the AHP Hierarchical Analysis approach. The research method is a descriptive strategy with regard to the direction of implementation and is a hierarchical research with a practical purpose. In this study, 30 experts (physical education faculty members, geography professors, accredited sports venues managers, and renewable energy engineers) were selected using purposeful sampling method as the research population. The research tool was a researcher-made questionnaire on the factors affecting the sustainable development of sports venues by using new technologies and degradable energy. Finally, the research questionnaire was designed with four components and 21 items. All steps were performed by using Expert Choice software. The importance of indicators that influence the sustainable development of sports venues is highlighted by the use of clean and degradable energy, for example: 1. Economic factor, weighing 0.420 2. Environmental index, weighing 0. 320 3. Physical index, weighing 0.148 4. Social index, weighing 0.122.Keywords: Sports Venues, Sustainable Development, Degradable Energies, Prioritize
Procedia PDF Downloads 1372634 Distributed Energy Storage as a Potential Solution to Electrical Network Variance
Authors: V. Rao, A. Bedford
Abstract:
As the efficient performance of national grid becomes increasingly important to maintain the electrical network stability, the balance between the generation and the demand must be effectively maintained. To do this, any losses that occur in the power network must be reduced by compensating for it. In this paper, one of the main cause for the losses in the network is identified as the variance, which hinders the grid’s power carrying capacity. The reason for the variance in the grid is investigated and identified as the rise in the integration of renewable energy sources (RES) such as wind and solar power. The intermittent nature of these RES along with fluctuating demands gives rise to variance in the electrical network. The losses that occur during this process is estimated by analyzing the network’s power profiles. Whilst researchers have identified different ways to tackle this problem, little consideration is given to energy storage. This paper seeks to redress this by considering the role of energy storage systems as potential solutions to reduce variance in the network. The implementation of suitable energy storage systems based on different applications is presented in this paper as part of variance reduction method and thus contribute towards maintaining a stable and efficient grid operation.Keywords: energy storage, electrical losses, national grid, renewable energy, variance
Procedia PDF Downloads 3192633 Modelling Operational Risk Using Extreme Value Theory and Skew t-Copulas via Bayesian Inference
Authors: Betty Johanna Garzon Rozo, Jonathan Crook, Fernando Moreira
Abstract:
Operational risk losses are heavy tailed and are likely to be asymmetric and extremely dependent among business lines/event types. We propose a new methodology to assess, in a multivariate way, the asymmetry and extreme dependence between severity distributions, and to calculate the capital for Operational Risk. This methodology simultaneously uses (i) several parametric distributions and an alternative mix distribution (the Lognormal for the body of losses and the Generalized Pareto Distribution for the tail) via extreme value theory using SAS®, (ii) the multivariate skew t-copula applied for the first time for operational losses and (iii) Bayesian theory to estimate new n-dimensional skew t-copula models via Markov chain Monte Carlo (MCMC) simulation. This paper analyses a newly operational loss data set, SAS Global Operational Risk Data [SAS OpRisk], to model operational risk at international financial institutions. All the severity models are constructed in SAS® 9.2. We implement the procedure PROC SEVERITY and PROC NLMIXED. This paper focuses in describing this implementation.Keywords: operational risk, loss distribution approach, extreme value theory, copulas
Procedia PDF Downloads 6042632 Experimental Implementation of Model Predictive Control for Permanent Magnet Synchronous Motor
Authors: Abdelsalam A. Ahmed
Abstract:
Fast speed drives for Permanent Magnet Synchronous Motor (PMSM) is a crucial performance for the electric traction systems. In this paper, PMSM is drived with a Model-based Predictive Control (MPC) technique. Fast speed tracking is achieved through optimization of the DC source utilization using MPC. The technique is based on predicting the optimum voltage vector applied to the driver. Control technique is investigated by comparing to the cascaded PI control based on Space Vector Pulse Width Modulation (SVPWM). MPC and SVPWM-based FOC are implemented with the TMS320F2812 DSP and its power driver circuits. The designed MPC for a PMSM drive is experimentally validated on a laboratory test bench. The performances are compared with those obtained by a conventional PI-based system in order to highlight the improvements, especially regarding speed tracking response.Keywords: permanent magnet synchronous motor, model-based predictive control, DC source utilization, cascaded PI control, space vector pulse width modulation, TMS320F2812 DSP
Procedia PDF Downloads 6452631 Design of Control Systems for Grid Interconnection and Power Control of a Grid Tie Inverter for Micro-Grid Application
Authors: Deepak Choudhary
Abstract:
COEP-Microgrid, a project by the students of College of Engineering Pune aims at establishing a micro grid in the college campus serving as a living laboratory for research and development of novel grid technologies. Proposed micro grid has an AC-bus and DC-bus, interconnected together with a tie line DC-AC converter. In grid-connected mode AC bus of microgrid is synchronized with utility grid. Synchronization with utility grid requires grid and AC bus to have synchronism in frequency, phase sequence and voltage. Power flow requires phase difference between grid and AC bus. Control System is required to effectively regulate power flow between the grid and AC bus. The grid synchronizing control system is composed of frequency and phase control for regulated power flow and voltage control system for reduction of reactive power flow. The control system involves automatic active power flow control. It takes the feedback of DC link Capacitor and changes the power angle accordingly. Control system incorporating voltage, phase and power control was developed for grid-tie inverter. This paper discusses the design, simulation and practical implementation of control system described in various micro grid scenarios.Keywords: microgrid, Grid-tie inverter, voltage control, automatic power control
Procedia PDF Downloads 6662630 The Use of Rotigotine to Improve Hemispatial Neglect in Stroke Patients at the Charing Cross Neurorehabilitation Unit
Authors: Malab Sana Balouch, Meenakshi Nayar
Abstract:
Hemispatial Neglect is a common disorder primarily associated with right hemispheric stroke, in the acute phase of which it can occur up to 82% of the time. Such individuals fail to acknowledge or respond to people and objects in their left field of vision due to deficits in attention and awareness. Persistent hemispatial neglect significantly impedes post-stroke recovery, leading to longer hospital stays post-stroke, increased functional dependency, longer-term disability in ADLs and increased risk of falls. Recently, evidence has emerged for the use of dopamine agonist Rotigotine in neglect. The aim of our Quality Improvement Project (QIP) is to evaluate and better the current protocols and practice in assessment, documentation and management of neglect and rotigotine use at the Neurorehabilitation unit at Charing Cross Hospital (CNRU). In addition, it brings light to rotigotine use in the management of hemispatial neglect and paves the way for future research in the field. Our QIP was based in the CNRU. All patients admitted to the CNRU suffering from a right-sided stroke from 2nd of February 2018 to the 2nd of February 2021 were included in the project. Each patient’s multidisciplinary team report and hospital notes were searched for information, including bio-data, fulfilment of the inclusion criteria (having hemispatial neglect) and data related to rotigotine use. This includes whether or not the drug was administered, any contraindications to drug in patients that did not receive it, and any therapeutic benefits(subjective or objective improvement in neglect) in those that did receive the rotigotine. Data was simultaneously entered into excel sheet and further statistical analysis was done on SPSS 20.0. Out of 80 patients suffering from right sided strokes, 72.5% were infarcts and 27.5% were hemorrhagic strokes, with vast majority of both types of strokes were in the middle cerebral artery territory (MCA). A total of 31 (38.8%) of our patients were noted to have hemispatial neglect, with the highest number of cases being associated with MCA strokes. Almost half of our patients with MCA strokes suffered from neglect. Neglect was more common in male patients. Out of the 31 patients suffering from visuospatial neglect, only 16% actually received rotigotine and 80% of them were noted to have an objective improvement in their neglect tests and 20% revealed subjective improvement. After thoroughly going through neglect-associated documentation, the following recommendations/plans were put in place for the future. We plan to liaise with the occupational therapy team at our rehab unit to set a battery of tests that would be done on all patients presenting with neglect and recommend clear documentation of outcomes of each neglect screen under it. Also to create two proformas; one for the therapy team to aid in systematic documentation of neglect screens done prior to and after rotigotine administration and a second proforma for the medical team with clear documentation of rotigotine use, its benefits and any contraindications if not administered.Keywords: hemispatial Neglect, right hemispheric stroke, rotigotine, neglect, dopamine agonist
Procedia PDF Downloads 772629 Effects of Education Equity Policy on Housing Prices: Evidence from Simultaneous Admission to Public and Private Schools Policy in Shanghai
Authors: Tianyu Chen
Abstract:
China's school district education policy has encouraged parents to purchase properties in school districts with high-quality education resources. Shanghai has implemented "Simultaneous Admission to Public and Private Schools" (SAPPS) since 2018, which has covered all nine-year compulsory education by 2020. This study examines the impact of SAPPS on the housing market, specifically the premium effect of houses located in dual-school districts. Based on the Hedonic Pricing Model and the Signaling Theory, data is collected from 585 second-hand house transactions in Pudong New Area, Shanghai, and it is analyzed with the Difference-in-Differences (DID) model. The results indicate that the implementation of SAPPS has exacerbated the premium of dual school district housing and weakened the effect of the policy to a certain degree. To ensure equal access to education for all students, the government should work both on the supply and demand sides of the education resource equation.Keywords: simultaneous admission to public and private schools, housing prices, education policy, education equity
Procedia PDF Downloads 792628 Sectoral Energy Consumption in South Africa and Its Implication for Economic Growth
Authors: Kehinde Damilola Ilesanmi, Dev Datt Tewari
Abstract:
South Africa is in its post-industrial era moving from the primary and secondary sector to the tertiary sector. The study investigated the impact of the disaggregated energy consumption (coal, oil, and electricity) on the primary, secondary and tertiary sectors of the economy between 1980 and 2012 in South Africa. Using vector error correction model, it was established that South Africa is an energy dependent economy, and that energy (especially electricity and oil) is a limiting factor of growth. This implies that implementation of energy conservation policies may hamper economic growth. Output growth is significantly outpacing energy supply, which has necessitated load shedding. To meet up the excess energy demand, there is a need to increase the generating capacity which will necessitate increased investment in the electricity sector as well as strategic steps to increase oil production. There is also need to explore more renewable energy sources, in order to meet the growing energy demand without compromising growth and environmental sustainability. Policy makers should also pursue energy efficiency policies especially at sectoral level of the economy.Keywords: causality, economic growth, energy consumption, hypothesis, sectoral output
Procedia PDF Downloads 4712627 Minimization Entropic Applied to Rotary Dryers to Reduce the Energy Consumption
Authors: I. O. Nascimento, J. T. Manzi
Abstract:
The drying process is an important operation in the chemical industry and it is widely used in the food, grain industry and fertilizer industry. However, for demanding a considerable consumption of energy, such a process requires a deep energetic analysis in order to reduce operating costs. This paper deals with thermodynamic optimization applied to rotary dryers based on the entropy production minimization, aiming at to reduce the energy consumption. To do this, the mass, energy and entropy balance was used for developing a relationship that represents the rate of entropy production. The use of the Second Law of Thermodynamics is essential because it takes into account constraints of nature. Since the entropy production rate is minimized, optimals conditions of operations can be established and the process can obtain a substantial gain in energy saving. The minimization strategy had been led using classical methods such as Lagrange multipliers and implemented in the MATLAB platform. As expected, the preliminary results reveal a significant energy saving by the application of the optimal parameters found by the procedure of the entropy minimization It is important to say that this method has shown easy implementation and low cost.Keywords: thermodynamic optimization, drying, entropy minimization, modeling dryers
Procedia PDF Downloads 2632626 Assessment of Sustainability in the Wulo Abiye Watershed, Central Highlands of Ethiopia
Authors: Getabalew Derib, Arragaw Alemayehu
Abstract:
Assessing the sustainability of watersheds holds significant importance for regional natural resource management and to achieve sustainable development. This study investigated the sustainability of the Wulo Abiye watershed, central highlands of Ethiopia. The sustainability status of the watershed was evaluated by using 17 indicators representing the economic, social, and environmental dimensions of sustainable development goals (SDGs) based on the local and existing conditions of the watershed. The results indicated that environmental sustainability was at a ’ high’ level, while social and economic sustainability and the aggregate index were at ‘moderate’ levels. The overall level of community participation in the planning and evaluation phases of watershed management was at ’low’ levels. The implementation phase was at ’high’ level. Overall , the sustainability status of watershed management and level of community participation were at ‘moderate’ levels. The study concluded that integrated support is needed to overcome the identified challenges to achieve sustainable development in watersheds.Keywords: Wulo Abiye watershed, community participation, watershed management, sustainable development
Procedia PDF Downloads 492625 Adoption of Proactive and Reactive Supply Chain Resilience Strategies: A Comparison between Apparel and Construction Industries in Sri Lanka
Authors: Anuradha Ranawakage, Chathurani Silva
Abstract:
With the growing expansion of global businesses, supply chains are increasingly exposed to numerous disruptions. Organizations adopt various strategies to mitigate the impact of these disruptions. Depending on the variations in the conditions and characteristics of supply chains, the adoption of resilience strategies may vary across industries. However, these differences are largely unexplored in the existing literature. Hence, this study aims to evaluate the adoption of three proactive strategies: proactive collaboration, digital connectivity, integrated SC risk management, and three reactive strategies: reactive collaboration, inventory and reserve capacity, and lifeline maintenance in the apparel and construction industries in Sri Lanka. An online questionnaire was used to collect data on the implementation of resilience strategies from a sample of 162 apparel and 185 construction companies operating in Sri Lanka. This research makes a significant contribution to the field of supply chain management by assessing the extent to which different resilience strategies are functioned within the apparel and construction industries in Sri Lanka, particularly in an era after a global pandemic that significantly disrupted supply chains all around the world.Keywords: apparel, construction, proactive strategies, reactive strategies, supply chain resilience
Procedia PDF Downloads 602624 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2822623 An Innovative Interaction Approach on Agricultural Community Revitalization: A Case Study of Wufeng Living Lab for Creative Agricultural
Authors: Shih-Jen Feng, Nai-Chia Chao, Meng-Chi Shih, Chien-Chi Chang
Abstract:
Today, Taiwan agriculture operates under small business scale with economic insufficiency, due to aging population, unproductiveness, inadequate systematic management, insufficient agro-economic scale, and cultivation on agro-education. Moreover, because of farming special working method (physical tiring, shackled weather condition), environment (asymmetric distribution information), hours devoted (unbalance wealth), the willingness for younger generation to delicate into agriculture farming is rare. Although government had provided policies to harmonize the existing problem, significant result is unseen. Living lab (LL) is a methodology approach to sense, prototype and validate complex solutions in real life context. This paper contributes an innovative interaction methodology by probing under implementation of diverse LL sector merging big data analysis utilizing rural redevelopment and revitalization plan of Wufeng.Keywords: living lab approach, historic rural redevelopment, innovation model, innovation approach
Procedia PDF Downloads 2722622 Factors Related to Protective Behavior on Indoor Pollution among Pregnant Women in Nakhon Pathom Province, Thailand
Authors: Yuri Teraoka, Cheerawit Rattanapan, Aroonsri Mongkolchati
Abstract:
This cross sectional analytic study was carried out to determine factors related to protective behavior on indoor pollution among pregnant women in Nakhon Pathom province, Thailand. A total of 319 pregnant women were enrolled at three antenatal care clinics in community hospital. Data were collected using simple random sampling from April 2015 to May 2015 using a structured self-administration questionnaire by well-trained research assistants. The result showed that around 73% pregnant women showed low level of low protective behavior on indoor pollution. Chi-square and multiple logistic regression were used to examine the factors and protective behavior on indoor pollution. After adjusting for confounding factors, this study found that tobacco smoking before pregnancy (AOR=2.15, 95% CI: 0.78-5.95) and low environmental health hazard (AOR=1.94, 95% CI: 1.09-3.49) were significant factors related to protective behavior on indoor pollution among pregnant women (p-value < 0.05). In conclusion, this study suggested that environmental health education campaign and environmental implementation program among pregnant woman are needed.Keywords: Thailand, environmental health, protective behavior, pregnant women
Procedia PDF Downloads 3672621 The Effectiveness of Extracurricular Activities for Teaching Biology in the Modern World
Authors: Mukhtarkhanova Ainagul Madievna, Imanbek Karakoz
Abstract:
The development and implementation of active forms and methods of extracurricular work in biology are carried out, assistance to people in determining sustainable interests in a particular field of science, expanding pupil's knowledge and horizons during in–depth study of program issues that go beyond the curriculum where considered, but accessible to the understanding of people; the development of interest in the subject, independence, creative activity. The purpose of this study is to open interest through extracurricular activities for teaching biology. The purpose of the presented work is to arouse people's interest in biology lessons in the modern world through extracurricular activities. First, the level of people was determined in the traditional style of teaching lessons, for which special tests and evaluation criteria were compiled. The level of pupils' knowledge of biology was determined by a questionnaire. Samples of extracurricular work were presented, and practices were conducted in the educational process. At the next stage, the level of pupils after the experiment was compared. The results of the work were discussed, and recommendations were developed.Keywords: extracurricular activities, modern world, teaching, method, excursions, laboratory experiments, science fairs
Procedia PDF Downloads 1062620 Honour Killing in Iraqi Statutory Law
Authors: Hersh Azeez
Abstract:
Honour killing, also known as "honor killing," is a deeply rooted and complex social issue that persists in many parts of the world, including Iraq. This paper seeks to examine the legal framework surrounding honour killing in Iraqi statutory law. The paper begins with an introduction to honour killing as a phenomenon and its cultural and societal context in Iraq. It then delves into the methodology used in this research, including a comprehensive review of relevant legal texts, case studies, and scholarly articles. The paper analyzes the existing legal framework in Iraq, including relevant penal code provisions and other relevant legislation, as well as the challenges and shortcomings in addressing honour killing in the country. The research findings reveal that despite some legal provisions aimed at addressing honour killing, the practice continues to persist due to a lack of effective implementation, societal norms, and cultural attitudes. The paper concludes with recommendations for improving the legal framework to combat honour killing in Iraq, including legal reforms, education and awareness campaigns, and cultural change initiatives.Keywords: honour killing, Iraq, statutory law, legal framework, penal code, cultural norms
Procedia PDF Downloads 692619 The Challenges of Scaling Agile to Large-Scale Distributed Development: An Overview of the Agile Factory Model
Authors: Bernard Doherty, Andrew Jelfs, Aveek Dasgupta, Patrick Holden
Abstract:
Many companies have moved to agile and hybrid agile methodologies where portions of the Software Design Life-cycle (SDLC) and Software Test Life-cycle (STLC) can be time boxed in order to enhance delivery speed, quality and to increase flexibility to changes in software requirements. Despite widespread proliferation of agile practices, implementation often fails due to lack of adequate project management support, decreased motivation or fear of increased interaction. Consequently, few organizations effectively adopt agile processes with tailoring often required to integrate agile methodology in large scale environments. This paper provides an overview of the challenges in implementing an innovative large-scale tailored realization of the agile methodology termed the Agile Factory Model (AFM), with the aim of comparing and contrasting issues of specific importance to organizations undertaking large scale agile development. The conclusions demonstrate that agile practices can be effectively translated to a globally distributed development environment.Keywords: agile, agile factory model, globally distributed development, large-scale agile
Procedia PDF Downloads 2942618 ‘Koha ILS Software’ Implementation in Academic Library Management: An Experience from University Libraries of Bangladesh
Authors: Md. Golam Mostafa
Abstract:
This paper describes the use of Koha open source library management software for information management in university libraries of Bangladesh. Manual record keeping is a time-consuming and tedious task, which may lead to errors frequently. To maintain the quality of services, any organization needs to manage with the help of a computerized system. The advent of information technology paved the way for library computerization. This paper has provided a short history as well as the present ongoing development of the library computerization system in Bangladesh, which has developed as a library management software Koha on the basis of research and development. Koha integrated library systems (ILS) software is very user friendly open source software. It refers to software in which the source code is freely available for others to view, amend, and adapt. Koha integrated library systems maintained by and used by libraries all over the world. In this context, this paper will analyze Koha library management software, which proves appropriate for the present necessities of library management in Bangladesh. At last, result from the study has been analyzed using different tables and graphs.Keywords: Koha Open Source Software, integrated library system, RFID facilities, university libraries, Bangladesh
Procedia PDF Downloads 1272617 A Digital Pulse-Width Modulation Controller for High-Temperature DC-DC Power Conversion Application
Authors: Jingjing Lan, Jun Yu, Muthukumaraswamy Annamalai Arasu
Abstract:
This paper presents a digital non-linear pulse-width modulation (PWM) controller in a high-voltage (HV) buck-boost DC-DC converter for the piezoelectric transducer of the down-hole acoustic telemetry system. The proposed design controls the generation of output signal with voltage higher than the supply voltage and is targeted to work under high temperature. To minimize the power consumption and silicon area, a simple and efficient design scheme is employed to develop the PWM controller. The proposed PWM controller consists of serial to parallel (S2P) converter, data assign block, a mode and duty cycle controller (MDC), linearly PWM (LPWM) and noise shaper, pulse generator and clock generator. To improve the reliability of circuit operation at higher temperature, this design is fabricated with the 1.0-μm silicon-on-insulator (SOI) CMOS process. The implementation results validated that the proposed design has the advantages of smaller size, lower power consumption and robust thermal stability.Keywords: DC-DC power conversion, digital control, high temperatures, pulse-width modulation
Procedia PDF Downloads 3972616 An Estimation Process for Progress Rate Based on Labor-Quantity in Republic of Korea
Authors: Dong-Ho Kim, Zheng-Xun Jin, Yong-Woon Cha, Su-Sang Lim, Sang-Won Han, Chang-Taek Hyun
Abstract:
As construction is a labor-intensive industry, it is important to identify and manage labor quantities for accurate progress management of the construction project. However, the progress management that focuses on construction cost calculated based on materials rather than labor quantities has led to a difference in the implementation of cost and progress of the actual construction. In addition, since it is not easy to predict accurate labor quantities in the estimation of labor quantity-based progress rate, there have been limited researches into the progress rate estimation based on labor quantity. Accordingly, this study proposed a process for labor quantity-based progress rate estimation using a standard of estimate to predict accurate progress rate of the construction project in Republic Korea. It is expected that the utilization of the proposed process will help to identify the progress rate closer to that of the actual site management and adjust the workforce in each construction type, thereby contributing to improving construction efficiency.Keywords: labor based, labor cost, progress management, progress rate, progress payment
Procedia PDF Downloads 3462615 Relationship between Quality Improvement Strategies on the Basis of Different Management Activities
Authors: Manjinder Singh, Anish Sachdeva
Abstract:
Research on total quality management (TQM), total productive maintenance (TPM), international organization for standardization (ISO) and six sigma generally investigate the implementation and impact of these programs in isolation. However, none of these quality improvement programs is self-sufficient and they may not be powerful enough to deliver the improvements and innovations that are required nowadays to ensure the survival and growth of a firm. They are not mutually exclusive and inconsistent. On the contrary, they need complementary support and may reinforce mutually to make use of their complementarity, inducement of side-effects in favor of other quality improvement program, mutual simulation and exploitation of shared values. In this paper, first of all, the various management activities were identified which are normally under focus when any quality improvement program is implemented in any organization. Then TOPSIS methodology was applied to establish the ranking of various quality improvement programs (total quality management, total productive maintenance, ISO and six sigma which were brought to the corporate boardroom to improve the quality) with respect to different management activities (operations related activities, quality related activities, maintenance related activities, organizational related activities, human related activities and finance related activities).Keywords: total productive maintenance (TPM), total quality management (TQM), TOPSIS, international organization for standardization (ISO)
Procedia PDF Downloads 4412614 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 4872613 Practice of Supply Chain Management in Local SMEs
Authors: Oualid Kherbach, Marian Liviu Mocan, Amine Ghoumrassi, Cristian Dumitrache
Abstract:
The Globalization system and the development of economy, e-business, and introduction of new technologies formation create new challenges to all organizations particularly for small and medium enterprises (SMEs). Many studies on supply chain management (SCM) focus on large companies with universal operations employing high-stage information technology. These make a gap in the knowing of how SMEs use and practice supply chain management. In this screenplay, successful practices of supply chain management (SCM) can give SMEs an edge over their competitors. However, SMEs in Romania and Balkan countries face problems in SCM implementation and practices due to lack of resources and direction. The objectives of this research highlight the supply chain management practices of the small and medium enterprise strip in Romania and understand how SMEs manage and use SCM. This study Checks the potential existence of systematic differences between small businesses and medium-sized businesses with regard to supply chain management practices and the application of supply management has contributed to the improvement performance and increase the profitability of companies such as increasing the market share and improving the level of clients.Keywords: globalization, small and medium enterprises, supply chain management, practices
Procedia PDF Downloads 3702612 Cultural Heritage, War and Heritage Legislations: An Empirical Review
Authors: Gebrekiros Welegebriel Asfaw
Abstract:
The conservation of cultural heritage during times of war is a topic of significant importance and concern in the field of heritage studies. The destruction, looting, and illicit acts against cultural heritages have devastating consequences. International and national legislations have been put in place to address these issues and provide a legal framework for protecting cultural heritage during armed conflicts. Thus, the aim of this review is to examine the existing heritage legislations and evaluate their effectiveness in protecting cultural heritage during times of war with a special insight of the Tigray war. The review is based on a comprehensive empirical analysis of existing heritage legislations related to the protection of cultural heritage during war, with a special focus on the Tigray war. The review reveals that there are several international and national legislations in place to protect cultural heritage during times of war. However, the implementation of these legislations has been insufficient and ineffective in the case of the Tigray war. The priceless cultural heritages in Tigray, which were once the centers of investment and world pride were, have been subjected to destruction, looting, and other illicit acts, in violation of both international conventions such as the UNESCO Convention and national legislations. Therefore, there is a need for consistent intervention and enforcement of different legislations from the international community and organizations to rehabilitate, repatriate, and reinstitute the irreplaceable heritages of Tigray.Keywords: cultural heritage, heritage legislations, tigray, war
Procedia PDF Downloads 1602611 Mapping of Urban Green Spaces Towards a Balanced Planning in a Coastal Landscape
Authors: Rania Ajmi, Faiza Allouche Khebour, Aude Nuscia Taibi, Sirine Essasi
Abstract:
Urban green spaces (UGS) as an important contributor can be a significant part of sustainable development. A spatial method was employed to assess and map the spatial distribution of UGS in five districts in Sousse, Tunisia. Ecological management of UGS is an essential factor for the sustainable development of the city; hence the municipality of Sousse has decided to support the districts according to different green spaces characters. And to implement this policy, (1) a new GIS web application was developed, (2) then the implementation of the various green spaces was carried out, (3) a spatial mapping of UGS using Quantum GIS was realized, and (4) finally a data processing and statistical analysis with RStudio programming language was executed. The intersection of the results of the spatial and statistical analyzes highlighted the presence of an imbalance in terms of the spatial UGS distribution in the study area. The discontinuity between the coast and the city's green spaces was not designed in a spirit of network and connection, hence the lack of a greenway that connects these spaces to the city. Finally, this GIS support will be used to assess and monitor green spaces in the city of Sousse by decision-makers and will contribute to improve the well-being of the local population.Keywords: distributions, GIS, green space, imbalance, spatial analysis
Procedia PDF Downloads 2082610 Safety of Ports, Harbours, Marine Terminals: Application of Quantitative Risk Assessment
Authors: Dipak Sonawane, Sudarshan Daga, Somesh Gupta
Abstract:
Quantitative risk assessment (QRA) is a very precise and consistent approach to defining the likelihood, consequence and severity of a major incident/accident. A variety of hazardous cargoes in bulk, such as hydrocarbons and flammable/toxic chemicals, are handled at various ports. It is well known that most of the operations are hazardous, having the potential of damaging property, causing injury/loss of life and, in some cases, the threat of environmental damage. In order to ensure adequate safety towards life, environment and property, the application of scientific methods such as QRA is inevitable. By means of these methods, comprehensive hazard identification, risk assessment and appropriate implementation of Risk Control measures can be carried out. In this paper, the authors, based on their extensive experience in Risk Analysis for ports and harbors, have exhibited how QRA can be used in practice to minimize and contain risk to tolerable levels. A specific case involving the operation for unloading of hydrocarbon at a port is presented. The exercise provides confidence that the method of QRA, as proposed by the authors, can be used appropriately for the identification of hazards and risk assessment of Ports and Terminals.Keywords: quantitative risk assessment, hazard assessment, consequence analysis, individual risk, societal risk
Procedia PDF Downloads 812609 Design and Field Programmable Gate Array Implementation of Radio Frequency Identification for Boosting up Tag Data Processing
Authors: G. Rajeshwari, V. D. M. Jabez Daniel
Abstract:
Radio Frequency Identification systems are used for automated identification in various applications such as automobiles, health care and security. It is also called as the automated data collection technology. RFID readers are placed in any area to scan large number of tags to cover a wide distance. The placement of the RFID elements may result in several types of collisions. A major challenge in RFID system is collision avoidance. In the previous works the collision was avoided by using algorithms such as ALOHA and tree algorithm. This work proposes collision reduction and increased throughput through reading enhancement method with tree algorithm. The reading enhancement is done by improving interrogation procedure and increasing the data handling capacity of RFID reader with parallel processing. The work is simulated using Xilinx ISE 14.5 verilog language. By implementing this in the RFID system, we can able to achieve high throughput and avoid collision in the reader at a same instant of time. The overall system efficiency will be increased by implementing this.Keywords: antenna, anti-collision protocols, data management system, reader, reading enhancement, tag
Procedia PDF Downloads 3062608 Motor Controller Implementation Using Model Based Design
Authors: Cau Tran, Tu Nguyen, Tien Pham
Abstract:
Model-based design (MBD) is a mathematical and visual technique for addressing design issues in the fields of communications, signal processing, and complicated control systems. It is utilized in several automotive, aerospace, industrial, and motion control applications. Virtual models are at the center of the software development process with model based design. A method used in the creation of embedded software is model-based design. In this study, the LAT motor is modeled in a simulation environment, and the LAT motor control is designed with a cascade structure, a speed and current control loop, and a controller that is used in the next part. A PID structure serves as this controller. Based on techniques and motor parameters that match the design goals, the PID controller is created for the model using traditional design principles. The MBD approach will be used to build embedded software for motor control. The paper will be divided into three distinct sections. The first section will introduce the design process and the benefits and drawbacks of the MBD technique. The design of control software for LAT motors will be the main topic of the next section. The experiment's results are the subject of the last section.Keywords: model based design, limited angle torque, intellectual property core, hardware description language, controller area network, user datagram protocol
Procedia PDF Downloads 962607 The Use of Artificial Intelligence to Curb Corruption in Brazil
Authors: Camila Penido Gomes
Abstract:
Over the past decade, an emerging body of research has been pointing to artificial intelligence´s great potential to improve the use of open data, increase transparency and curb corruption in the public sector. Nonetheless, studies on this subject are scant and usually lack evidence to validate AI-based technologies´ effectiveness in addressing corruption, especially in developing countries. Aiming to fill this void in the literature, this paper sets out to examine how AI has been deployed by civil society to improve the use of open data and prevent congresspeople from misusing public resources in Brazil. Building on the current debates and carrying out a systematic literature review and extensive document analyses, this research reveals that AI should not be deployed as one silver bullet to fight corruption. Instead, this technology is more powerful when adopted by a multidisciplinary team as a civic tool in conjunction with other strategies. This study makes considerable contributions, bringing to the forefront discussion a more accurate understanding of the factors that play a decisive role in the successful implementation of AI-based technologies in anti-corruption efforts.Keywords: artificial intelligence, civil society organization, corruption, open data, transparency
Procedia PDF Downloads 206