Search results for: augmented reality digital technologies
3758 A Review of Geotextile Tube with the Evaluation of Dewatering of High Water Content Sludge
Authors: Rajul Dwivedi, Mahesh Patel
Abstract:
Due to the scarcity of natural resources, common rivers and coastal structures are too expensive to build and maintain. One such method is to use geotextile tube technology to build marine protected structures, such as dams, canals, jetties, free breakwaters, etc. Geotextile tube technology has evolved from other construction technologies and improved into a more efficient solution. The coastal erosion problems have been exacerbated by the development of infrastructure associated with the expansion of urban and industrial activities. Resources and harbours and the removal of sea sand for use in this erosion event will accelerate the erosion of the sea. but in the coastal areas, due to depletion of sand or beach sandKeywords: geotextile tubes, slurry, dewatering, response surface
Procedia PDF Downloads 1393757 Secure Proxy Signature Based on Factoring and Discrete Logarithm
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.Keywords: discrete logarithm, factoring, proxy signature, key agreement
Procedia PDF Downloads 3093756 Performance of LTE Multicast Systems in the Presence of the Colored Noise Jamming
Authors: S. Malisuwan, J. Sivaraks, N. Madan, N. Suriyakrai
Abstract:
The ever going evolution of advanced wireless technologies makes it financially impossible for military operations to completely manufacture their own equipment. Therefore, Commercial-Off-The-Shelf (COTS) and Modified-Off-The-Shelf (MOTS) are being considered in military mission with low-cost modifications. In this paper, we focus on the LTE multicast systems for military communication systems under tactical environments with jamming condition. We examine the influence of the colored noise jamming on the performance of the LTE multicast systems in terms of the average throughput. The simulation results demonstrate the degradation of the average throughput for different dynamic ranges of the colored noise jamming versus average SNR.Keywords: performance, LTE, multicast, jamming, throughput
Procedia PDF Downloads 4183755 Recognition and Enforcement of International Commercial Arbitral Awards in Sri Lanka, A Lesson from Singapore
Authors: Kahandawala Arachchige Thani Chathurika Kahandawala
Abstract:
This research is attempted to analyse, Sri Lanka’s current situation regarding the recognition and enforcement of international commercial arbitration awards. Sri Lanka has been involved with commercial arbitration for a long time period. But there are good and bad legal practices in place in proceedings in Sri Lanka legal system. The common perception and reality of Sri Lanka’s arbitration law and practices regarding recognition and enforcement of international arbitral awards is far behind the international standards. Therefore arbitration as a dispute resolution method has become a time-consuming and costly method in Sri Lanka. This research is employed with the qualitative method based on both primary and secondary resources. This carried out the comparative analysis of recognition and enforcement in international arbitration laws established jurisdiction in Singapore and the United Kingdom, which are known as best counties as a seat of arbitration in Asia and Europe. International conventions, act and all the legal proceedings regarding recognition and enforcement of an international arbitral award in Sri Lanka are going to be discussed in the research. In the Jurisdiction of Sri Lanka, critically need to value an international arbitral award in the domestic legal system. Therefore an award has to be recognised in Sri Lanka. Otherwise, it doesn’t have any value. After recognizing it, court can enforce it. This research intends to provide a comparative analysis to overcome the drawbacks.Keywords: arbitration, alternative dispute method, recognition and enforcement, foreign arbitral awards, Sri Lankan legal system, arbitral award in Singapore
Procedia PDF Downloads 1713754 The Display of Environmental Information to Promote Energy Saving Practices: Evidence from a Massive Behavioral Platform
Authors: T. Lazzarini, M. Imbiki, P. E. Sutter, G. Borragan
Abstract:
While several strategies, such as the development of more efficient appliances, the financing of insulation programs or the rolling out of smart meters represent promising tools to reduce future energy consumption, their implementation relies on people’s decisions-actions. Likewise, engaging with consumers to reshape their behavior has shown to be another important way to reduce energy usage. For these reasons, integrating the human factor in the energy transition has become a major objective for researchers and policymakers. Digital education programs based on tangible and gamified user interfaces have become a new tool with potential effects to reduce energy consumption4. The B2020 program, developed by the firm “Économie d’Énergie SAS”, proposes a digital platform to encourage pro-environmental behavior change among employees and citizens. The platform integrates 160 eco-behaviors to help saving energy and water and reducing waste and CO2 emissions. A total of 13,146 citizens have used the tool so far to declare the range of eco-behaviors they adopt in their daily lives. The present work seeks to build on this database to identify the potential impact of adopted energy-saving behaviors (n=62) to reduce the use of energy in buildings. To this end, behaviors were classified into three categories regarding the nature of its implementation (Eco-habits: e.g., turning-off the light, Eco-actions: e.g., installing low carbon technology such as led light-bulbs and Home-Refurbishments: e.g., such as wall-insulation or double-glazed energy efficient windows). General Linear Models (GLM) disclosed the existence of a significantly higher frequency of Eco-habits when compared to the number of home-refurbishments realized by the platform users. While this might be explained in part by the high financial costs that are associated with home renovation works, it also contrasts with the up to three times larger energy-savings that can be accomplished by these means. Furthermore, multiple regression models failed to disclose the expected relationship between energy-savings and frequency of adopted eco behaviors, suggesting that energy-related practices are not necessarily driven by the correspondent energy-savings. Finally, our results also suggested that people adopting more Eco-habits and Eco-actions were more likely to engage in Home-Refurbishments. Altogether, these results fit well with a growing body of scientific research, showing that energy-related practices do not necessarily maximize utility, as postulated by traditional economic models, and suggest that other variables might be triggering them. Promoting home refurbishments could benefit from the adoption of complementary energy-saving habits and actions.Keywords: energy-saving behavior, human performance, behavioral change, energy efficiency
Procedia PDF Downloads 2003753 Women Presentation and Roles in Arab-Israeli Female Filmmakers Movies
Authors: Mariam Farah
Abstract:
With the beginning of the 21 century, female Arab directors entered the industry of cinema in Israel. Before their entrance, the Palestinian cinema, directed in Israel and in other places in the world, was defined as political-masculine cinema. The recent research wonders if the entrance of female directors to the Arab-Israeli cinema brings a new, feminist and un- common discourse, just like female directors movies in other cultures. The research also examines which gendered, social and political identities or statements do the Arab female directors reveal in their works, and what do they say about their real life? In order to get answers to the previous questions, the paper conducts a narrative comparative research between movies that was directed by female and male Arab-Israeli directors. The narrative research examines specific categories in each movie such as: main topic, women role, women appearance and women characteristics. The findings show that a new discourse replaces the political-masculine traditional discourse in the Palestinian cinema. Female Arab directors in Israel leave aside the main theme in Palestinian movies: the Israeli-Palestinian conflict, and replace it with new themes related to women lives and reality. Women in female directors movies are presented within non-traditional, empowering, and feminist identities: independent, strong, and active women.Keywords: feminism, gender, women presentation, women roles
Procedia PDF Downloads 5003752 A New Microstrip Diplexer Using Coupled Stepped Impedance Resonators
Authors: A. Chinig, J. Zbitou, A. Errkik, L. Elabdellaoui, A. Tajmouati, A. Tribak, M. Latrach
Abstract:
This paper presents a new structure of microstrip band pass filter (BPF) based on coupled stepped impedance resonators. Each filter consists of two coupled stepped impedance resonators connected to microstrip feed lines. The coupled junction is utilized to connect the two BPFs to the antenna. This two band pass filters are designed and simulated to operate for the digital communication system (DCS) and Industrial Scientific and Medical (ISM) bands at 1.8 GHz and 2.45 GHz respectively. The proposed circuit presents good performances with an insertion loss lower than 2.3 dB and isolation between the two channels greater than 21 dB. The prototype of the optimized diplexer have been investigated numerically by using ADS Agilent and verified with CST microwave software.Keywords: band pass filter, coupled junction, coupled stepped impedance resonators, diplexer, insertion loss, isolation
Procedia PDF Downloads 4323751 Assessing Supply Chain Performance through Data Mining Techniques: A Case of Automotive Industry
Authors: Emin Gundogar, Burak Erkayman, Nusret Sazak
Abstract:
Providing effective management performance through the whole supply chain is critical issue and hard to applicate. The proper evaluation of integrated data may conclude with accurate information. Analysing the supply chain data through OLAP (On-Line Analytical Processing) technologies may provide multi-angle view of the work and consolidation. In this study, association rules and classification techniques are applied to measure the supply chain performance metrics of an automotive manufacturer in Turkey. Main criteria and important rules are determined. The comparison of the results of the algorithms is presented.Keywords: supply chain performance, performance measurement, data mining, automotive
Procedia PDF Downloads 5133750 Management Information System to Help Managers for Providing Decision Making in an Organization
Authors: Ajayi Oluwasola Felix
Abstract:
Management information system (MIS) provides information for the managerial activities in an organization. The main purpose of this research is, MIS provides accurate and timely information necessary to facilitate the decision-making process and enable the organizations planning control and operational functions to be carried out effectively. Management information system (MIS) is basically concerned with processing data into information and is then communicated to the various departments in an organization for appropriate decision-making. MIS is a subset of the overall planning and control activities covering the application of humans technologies, and procedures of the organization. The information system is the mechanism to ensure that information is available to the managers in the form they want it and when they need it.Keywords: Management Information Systems (MIS), information technology, decision-making, MIS in Organizations
Procedia PDF Downloads 5573749 Hysterectomy and Symbolic Damage: When the Desire for Motherhood is Reactivated in a Nun
Authors: Ndje Ndje Mireille
Abstract:
The improvement in the physical aspects of hysterectomy has tended to make us forget the psychological burden of this operation for many women. African women closely associate fertility and femininity, and they fear that their desire will diminish, that they will be less desirable after having undergone a hysterectomy. Medicine may be tempted to trivialize this surgical intervention by relying on the evolution of current surgery that leaves little or no marks. It is possible to think that the uterus is useless for a nun who has decided to freely disregard her motherhood. We used the clinical research method for this study. Through a semi-directive interview guide, we collected the verbatims of an hysterectomized catholic nun. The verbatims were transcribed and analyzed with the thematic content analysis. This analysis shows that the medical reality does not always correspond to the subjective experience of women, for whom hysterectomy can imply strong symbolic damage. The uterus is not essential to life, but it is essential to give life, and this lack can reactivate a desire for motherhood. The experience of hysterectomy is unique for each woman in relation to her history. This operation will eliminate all hope of pregnancy; it will be felt as intimate mutilation and an attack on femininity, it will bring up concerns about sexuality. Even if a woman has past the age of having children, has gone through menopause, or has freely decided not to have children, she still find it difficult to accept this procedure. The lack of uterus make a woman feel useless.Keywords: hysterectomy, symbolic damage, desire for motherhood, feminity, nun
Procedia PDF Downloads 1583748 A Systemic Maturity Model
Authors: Emir H. Pernet, Jeimy J. Cano
Abstract:
Maturity models, used descriptively to explain changes in reality or normatively to guide managers to make interventions to make organizations more effective and efficient, are based on the principles of statistical quality control promulgated by Shewhart in the years 30, and on the principles of PDCA continuous improvement (Plan, Do, Check, Act) developed by Deming and Juran. Some frameworks developed over the concept of maturity models includes COBIT, CMM, and ITIL. This paper presents some limitations of traditional maturity models, most of them based on points of reflection and analysis done by some authors. Almost all limitations are related to the mechanistic and reductionist approach of the principles over those models are built. As Systems Theory helps the understanding of the dynamics of organizations and organizational change, the development of a systemic maturity model can help to overcome some of those limitations. This document proposes a systemic maturity model, based on a systemic conceptualization of organizations, focused on the study of the functioning of the parties, the relationships among them, and their behavior as a whole. The concept of maturity from the system theory perspective is conceptually defined as an emergent property of the organization, which arises from as a result of the degree of alignment and integration of their processes. This concept is operationalized through a systemic function that measures the maturity of an organization, and finally validated by the measuring of maturity in organizations. For its operationalization and validation, the model was applied to measure the maturity of organizational Governance, Risk and Compliance (GRC) processes.Keywords: GRC, maturity model, systems theory, viable system model
Procedia PDF Downloads 3123747 Autonomic Sonar Sensor Fault Manager for Mobile Robots
Authors: Martin Doran, Roy Sterritt, George Wilkie
Abstract:
NASA, ESA, and NSSC space agencies have plans to put planetary rovers on Mars in 2020. For these future planetary rovers to succeed, they will heavily depend on sensors to detect obstacles. This will also become of vital importance in the future, if rovers become less dependent on commands received from earth-based control and more dependent on self-configuration and self-decision making. These planetary rovers will face harsh environments and the possibility of hardware failure is high, as seen in missions from the past. In this paper, we focus on using Autonomic principles where self-healing, self-optimization, and self-adaption are explored using the MAPE-K model and expanding this model to encapsulate the attributes such as Awareness, Analysis, and Adjustment (AAA-3). In the experimentation, a Pioneer P3-DX research robot is used to simulate a planetary rover. The sonar sensors on the P3-DX robot are used to simulate the sensors on a planetary rover (even though in reality, sonar sensors cannot operate in a vacuum). Experiments using the P3-DX robot focus on how our software system can be adapted with the loss of sonar sensor functionality. The autonomic manager system is responsible for the decision making on how to make use of remaining ‘enabled’ sonars sensors to compensate for those sonar sensors that are ‘disabled’. The key to this research is that the robot can still detect objects even with reduced sonar sensor capability.Keywords: autonomic, self-adaption, self-healing, self-optimization
Procedia PDF Downloads 3503746 Roller Pump-Induced Tubing Rupture during Cardiopulmonary Bypass
Abstract:
We analyzed the effects of variations in the diameter of silicone rubber and polyvinyl chloride (PVC) tubings on the likelihood of tubing rupture during modeling of accidental arterial line clamping in cardiopulmonary bypass with a roller pump. A closed CPB circuit constructed with a roller pump was tested with both PVC and silicone rubber tubings of 1/2, 3/8, and 1/4 inch internal diameter. Arterial line pressure was monitored, and an occlusive clamp was placed across the tubing distal to the pressure monitor site to model an accidental arterial line occlusion. A CCD camera with 512(H) x 492(V) pixels was installed above the roller pump to measure tubing diameters at pump outlet, where the maximum deformations (distension) of the tubings occurred. Quantitative measurement of the changes of tubing diameters with the change of arterial line pressure was performed using computerized image processing techniques. A visible change of tubing diameter was generally noticeable by around 250 psi of arterial line pressure, which was already very high. By 1500 psi, the PVC tubings showed an increase of diameter of between 5-10 %, while the silicone rubber tubings showed an increase between 20-25 %. Silicone rubber tubings of all sizes showed greater distensibility than PVC tubings of equivalent size. In conclusion, although roller-pump induced tubing rupture remains a theoretical problem during cardiopulmonary bypass in terms of the inherent mechanism of the pump, in reality such an occurrence is impossible in real clinical conditions.Keywords: roller pump, tubing rupture, cardiopulmonary bypass, arterial line
Procedia PDF Downloads 2943745 The Antecedents of Continued Usage on Social-Oriented Virtual Communities Based on Automaticity Mechanism
Authors: Hsiu-Hua Cheng
Abstract:
In recent years, the number of social-oriented virtual communities users has increased significantly. Corporate investment in advertising on social-oriented virtual communities increases quickly. With the gigantic commercial value of the digital market, competitions between virtual communities are keen. In this context, how to retain existing customers to continue using social-oriented virtual communities is an urgent issue for virtual community managers. This study employs the perspective of automaticity mechanism and combines the social embeddedness theory with the literature of involvement and habit in order to explore antecedents of users’ continuous usage on social-oriented virtual communities. The results can be a reference for scholars and managers of social-oriented virtual communities.Keywords: continued usage, habit, social embeddedness, involvement, virtual community
Procedia PDF Downloads 4243744 MONDO Neutron Tracker Characterisation by Means of Proton Therapeutical Beams and MonteCarlo Simulation Studies
Authors: G. Traini, V. Giacometti, R. Mirabelli, V. Patera, D. Pinci, A. Sarti, A. Sciubba, M. Marafini
Abstract:
The MONDO (MOnitor for Neutron Dose in hadrOntherapy) project aims a precise characterisation of the secondary fast and ultrafast neutrons produced in particle therapy treatments. The detector is composed of a matrix of scintillating fibres (250 um) readout by CMOS Digital-SPAD based sensors. Recoil protons from n-p elastic scattering are detected and used to track neutrons. A prototype was tested with proton beams (Trento Proton Therapy Centre): efficiency, light yield, and track-reconstruction capability were studied. The results of a MonteCarlo FLUKA simulation used to evaluated double scattering efficiency and expected backgrounds will be presented.Keywords: secondary neutrons, particle therapy, tracking, elastic scattering
Procedia PDF Downloads 2663743 Collective Behavior of Mice Passing through a Middle-Exit or Corner-Exit under Panic
Authors: Teng Zhang, Xuelin Zhang, Shouxiang Lu, Changhai Li
Abstract:
The existence of animal groups and collective migration are common in nature, and collective behavior is attracting more and more attention of researchers. Previous results have shown that architectural design had an important effect on the process of crowd evacuation. In this paper, collective behavior of mice passing through a middle-exit or corner-exit under panic was investigated. Selfish behavior and herd behavior were easily observed in our video, which caused the congregation with high density near the exit. Triangle structure of congregation formed near the middle-exit while arch structure formed near the corner-exit. It is noteworthy that the exit located at the middle of the wall was more effective for evacuation than at the corner. Meanwhile, the escape sequence of mouse passing through the exit was investigated, and the result showed that the priority depends largely on its location in the congregation. With the level of stimulus increasing, these phenomena still exist. The frequency distributions of time intervals and the burst sizes were also analyzed in this study to explore the secret of collective behavior of mice. These results could provide evidence for the hypothesis or prediction about human behavior in crowd evacuation. However, it is not clear whether the simulated results from different species can correspond to reality or not. Broader comparison among different species about this topic will be eager to be conducted to deepen our understanding of collective behavior in nature.Keywords: collective behavior, mice, evacuation, exit location
Procedia PDF Downloads 3023742 From Research to Practice: Upcycling Cinema Icons
Authors: Mercedes Rodriguez Sanchez, Laura Luceño Casals
Abstract:
With the rise of social media, creative people and brands everywhere are constantly generating content. The students with Bachelor's Degrees in Fashion Design use platforms such as Instagram or TikTok to look for inspiration and entertainment, as well as a way to develop their own ideas and share them with a wide audience. Information and Communications Technologies (ICT) have become a central aspect of higher education, virtually affecting every aspect of the student experience. Following the current trend, during the first semester of the second year, a collaborative project across two subjects –Design Management and History of Fashion Design– was implemented. After an introductory class focused on the relationship between fashion and cinema, as well as a brief history of 20th-century fashion, the students freely chose a work team and an iconic look from a movie costume. They researched the selected movie and its sociocultural context, analyzed the costume and the work of the designer, and studied the style, fashion magazines and most popular films of the time. Students then redesigned and recreated the costume, for which they were compelled to recycle the materials they had available at home as an unavoidable requirement of the activity. Once completed the garment, students delivered in-class, team-based presentations supported by the final design, a project summary poster and a making-of video, which served as a documentation tool of the costume design process. The methodologies used include Challenge-Based Learning (CBL), debates, Internet research, application of Information and Communications Technologies, and viewing clips of classic films, among others. After finishing the projects, students were asked to complete two electronic surveys to measure the acquisition of transversal and specific competencies of each subject. Results reveal that this activity helped the students' knowledge acquisition, a deeper understanding of both subjects and their skills development. The classroom dynamic changed. The multidisciplinary approach encouraged students to collaborate with their peers, while educators were better able to keep students' interest and promote an engaging learning process. As a result, the activity discussed in this paper confirmed the research hypothesis: it is positive to propose innovative teaching projects that combine academic research with playful learning environments.Keywords: cinema, cooperative learning, fashion design, higher education, upcycling
Procedia PDF Downloads 783741 Sunset Tourism for the Rebirth of Shrinking Cities
Authors: Luca Lezzerini
Abstract:
Albania is suffering a continuous shrinking of its population and demographic distribution that faces all the problems connected with age increase. The paper examines the case of Gjirokastër, a city in the south of Albania that, despite having a UNESCO label as a world heritage site, is experimenting with the same shrinking phenomenon. The paper analyses in detail the current situation and propose an interdisciplinary approach based on smart technologies and sunset tourism to restart Gjirokastër’s economy and invert bad demographic trends. The proposed approach needs to review the current urban planning, reshaping and connecting some areas. It also proposes a smart city architecture to support this process.Keywords: smart city, sunset tourism, shrinking city, Gjirokastër
Procedia PDF Downloads 923740 Sound Selection for Gesture Sonification and Manipulation of Virtual Objects
Authors: Benjamin Bressolette, S´ebastien Denjean, Vincent Roussarie, Mitsuko Aramaki, Sølvi Ystad, Richard Kronland-Martinet
Abstract:
New sensors and technologies – such as microphones, touchscreens or infrared sensors – are currently making their appearance in the automotive sector, introducing new kinds of Human-Machine Interfaces (HMIs). The interactions with such tools might be cognitively expensive, thus unsuitable for driving tasks. It could for instance be dangerous to use touchscreens with a visual feedback while driving, as it distracts the driver’s visual attention away from the road. Furthermore, new technologies in car cockpits modify the interactions of the users with the central system. In particular, touchscreens are preferred to arrays of buttons for space improvement and design purposes. However, the buttons’ tactile feedback is no more available to the driver, which makes such interfaces more difficult to manipulate while driving. Gestures combined with an auditory feedback might therefore constitute an interesting alternative to interact with the HMI. Indeed, gestures can be performed without vision, which means that the driver’s visual attention can be totally dedicated to the driving task. In fact, the auditory feedback can both inform the driver with respect to the task performed on the interface and on the performed gesture, which might constitute a possible solution to the lack of tactile information. As audition is a relatively unused sense in automotive contexts, gesture sonification can contribute to reducing the cognitive load thanks to the proposed multisensory exploitation. Our approach consists in using a virtual object (VO) to sonify the consequences of the gesture rather than the gesture itself. This approach is motivated by an ecological point of view: Gestures do not make sound, but their consequences do. In this experiment, the aim was to identify efficient sound strategies, to transmit dynamic information of VOs to users through sound. The swipe gesture was chosen for this purpose, as it is commonly used in current and new interfaces. We chose two VO parameters to sonify, the hand-VO distance and the VO velocity. Two kinds of sound parameters can be chosen to sonify the VO behavior: Spectral or temporal parameters. Pitch and brightness were tested as spectral parameters, and amplitude modulation as a temporal parameter. Performances showed a positive effect of sound compared to a no-sound situation, revealing the usefulness of sounds to accomplish the task.Keywords: auditory feedback, gesture sonification, sound perception, virtual object
Procedia PDF Downloads 3023739 Human Tracking across Heterogeneous Systems Based on Mobile Agent Technologies
Authors: Tappei Yotsumoto, Atsushi Nomura, Kozo Tanigawa, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara
Abstract:
In a human tracking system, expanding a monitoring range of one system is complicating the management of devices and increasing its cost. Therefore, we propose a method to realize a wide-range human tracking by connecting small systems. In this paper, we examined an agent deploy method and information contents across the heterogeneous human tracking systems. By implementing the proposed method, we can construct a human tracking system across heterogeneous systems, and the system can track a target continuously between systems.Keywords: human tracking system, mobile agent, monitoring, heterogeneous systems
Procedia PDF Downloads 5363738 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 3823737 Development of Technologies for Biotransformation of Aquatic Biological Resources for the Production of Functional, Specialized, Therapeutic, Preventive, and Microbiological Products
Authors: Kira Rysakova, Vitaly Novikov
Abstract:
An improved method of obtaining enzymatic collagen hydrolysate from the tissues of marine hydrobionts is proposed, which allows to obtain hydrolysate without pre-isolation of pure collagen. The method can be used to isolate enzymatic collagen hydrolysate from the waste of industrial processing of Red King crab and non-traditional objects - marine holothurias. Comparative analysis of collagen hydrolysates has shown the possibility of their use in a number of nutrient media, but this requires additional optimization of their composition and biological tests on wide sets of test strains of microorganisms.Keywords: collagen hydrolysate, marine hydrobionts, red king crab, marine holothurias, enzymes, exclusive HPLC
Procedia PDF Downloads 1703736 Preventing and Coping Strategies for Cyber Bullying and Cyber Victimization
Authors: Erdinc Ozturk, Gizem Akcan
Abstract:
Although there are several advantages of information and communication technologies, they cause some problems like cyber bullying and cyber victimization. Cyber bullying and cyber victimization have lots of negative effects on people. There are lots of different strategies to prevent cyber bullying and victimization. This study was conducted to provide information about the strategies that are used to prevent cyber bullying and cyber victimization. 120 (60 women, 60 men) university students whose ages are between 18 and 35 participated this study. According to findings of this study, men are more prone to cyber bullying than women. Moreover, men are also more prone to cyber victimization than women.Keywords: cyber bullying, cyber victimization, coping strategies, sex
Procedia PDF Downloads 3683735 Building Knowledge Partnership for Collaborative Learning in Higher Education – An On-Line ‘Eplanete’ Knowledge Mediation Platform
Authors: S. K. Ashiquer Rahman
Abstract:
This paper presents a knowledge mediation platform, “ePLANETe Blue” that addresses the challenge of building knowledge partnerships for higher education. The purpose is to present, as an institutional perception, the ‘ePLANETe' idea and functionalities as a practical and pedagogical innovation program contributing to the collaborative learning goals in higher education. In consequence, the set of functionalities now amalgamated in ‘ePLANETe’ can be seen as an investigation of the challenges of “Collaborative Learning Digital Process.” It can exploit the system to facilitate collaborative education, research and student learning in higher education. Moreover, the platform is projected to support the identification of best practices at explicit levels of action and to inspire knowledge interactions in a “virtual community” and thus to advance in deliberation and learning evaluation of higher education through the engagement of collaborative activities of different sorts.Keywords: mediation, collaboration, deliberation, evaluation
Procedia PDF Downloads 1413734 Words Spotting in the Images Handwritten Historical Documents
Authors: Issam Ben Jami
Abstract:
Information retrieval in digital libraries is very important because most famous historical documents occupy a significant value. The word spotting in historical documents is a very difficult notion, because automatic recognition of such documents is naturally cursive, it represents a wide variability in the level scale and translation words in the same documents. We first present a system for the automatic recognition, based on the extraction of interest points words from the image model. The extraction phase of the key points is chosen from the representation of the image as a synthetic description of the shape recognition in a multidimensional space. As a result, we use advanced methods that can find and describe interesting points invariant to scale, rotation and lighting which are linked to local configurations of pixels. We test this approach on documents of the 15th century. Our experiments give important results.Keywords: feature matching, historical documents, pattern recognition, word spotting
Procedia PDF Downloads 2743733 Single Layer Carbon Nanotubes Array as an Efficient Membrane for Desalination: A Molecular Dynamics Study
Authors: Elisa Y. M. Ang, Teng Yong Ng, Jingjie Yeo, Rongming Lin, Zishun Liu, K. R. Geethalakshmi
Abstract:
By stacking carbon nanotubes (CNT) one on top of another, single layer CNT arrays can perform water-salt separation with ultra-high permeability and selectivity. Such outer-wall CNT slit membrane is named as the transverse flow CNT membrane. By adjusting the slit size between neighboring CNTs, the membrane can be configured to sieve out different solutes, right down to the separation of monovalent salt ions from water. Molecular dynamics (MD) simulation results show that the permeability of transverse flow CNT membrane is more than two times that of conventional axial-flow CNT membranes, and orders of magnitude higher than current reverse osmosis membrane. In addition, by carrying out MD simulations with different CNT size, it was observed that the variance in desalination performance with CNT size is small. This insensitivity of the transverse flow CNT membrane’s performance to CNT size is a distinct advantage over axial flow CNT membrane designs. Not only does the membrane operate well under constant pressure desalination operation, but MD simulations further indicate that oscillatory operation can further enhance the membrane’s desalination performance, making it suitable for operation such as electrodialysis reversal. While there are still challenges that need to be overcome, particularly on the physical fabrication of such membrane, it is hope that this versatile membrane design can bring the idea of using low dimensional structures for desalination closer to reality.Keywords: carbon nanotubes, membrane desalination, transverse flow carbon nanotube membrane, molecular dynamics
Procedia PDF Downloads 1963732 High Capacity Reversible Watermarking through Interpolated Error Shifting
Authors: Hae-Yeoun Lee
Abstract:
Reversible watermarking that not only protects the copyright but also preserve the original quality of the digital content have been intensively studied. In particular, the demand for reversible watermarking has increased. In this paper, we propose a reversible watermarking scheme based on interpolation-error shifting and error precompensation. The intensity of a pixel is interpolated from the intensities of neighbouring pixels, and the difference histogram between the interpolated and the original intensities is obtained and modified to embed the watermark message. By restoring the difference histogram, the embedded watermark is extracted and the original image is recovered by compensating for the interpolation error. The overflow and underflow are prevented by error precompensation. To show the performance of the method, the proposed algorithm is compared with other methods using various test images.Keywords: reversible watermarking, high capacity, high quality, interpolated error shifting, error precompensation
Procedia PDF Downloads 3223731 Optimization of Solar Chimney Power Production
Authors: Olusola Bamisile, Oluwaseun Ayodele, Mustafa Dagbasi
Abstract:
The main objective of this research is to optimize the power produced by a solar chimney wind turbine. The cut out speed and the maximum possible production are considered while performing the optimization. Solar chimney is one of the solar technologies that can be used in rural areas at cheap cost. With over 50% of rural areas still yet to have access to electricity. The OptimTool in MATLAB is used to maximize power produced by the turbine subject to certain constraints. The results show that an optimized turbine produces about ten times the power of the normal turbine which is 111 W/h. The rest of the research discuss in detail solar chimney power plant and the optimization simulation used in this study.Keywords: solar chimney, optimization, wind turbine, renewable energy systems
Procedia PDF Downloads 5873730 Hardware Implementation on Field Programmable Gate Array of Two-Stage Algorithm for Rough Set Reduct Generation
Authors: Tomasz Grzes, Maciej Kopczynski, Jaroslaw Stepaniuk
Abstract:
The rough sets theory developed by Prof. Z. Pawlak is one of the tools that can be used in the intelligent systems for data analysis and processing. Banking, medicine, image recognition and security are among the possible fields of utilization. In all these fields, the amount of the collected data is increasing quickly, but with the increase of the data, the computation speed becomes the critical factor. Data reduction is one of the solutions to this problem. Removing the redundancy in the rough sets can be achieved with the reduct. A lot of algorithms of generating the reduct were developed, but most of them are only software implementations, therefore have many limitations. Microprocessor uses the fixed word length, consumes a lot of time for either fetching as well as processing of the instruction and data; consequently, the software based implementations are relatively slow. Hardware systems don’t have these limitations and can process the data faster than a software. Reduct is the subset of the decision attributes that provides the discernibility of the objects. For the given decision table there can be more than one reduct. Core is the set of all indispensable condition attributes. None of its elements can be removed without affecting the classification power of all condition attributes. Moreover, every reduct consists of all the attributes from the core. In this paper, the hardware implementation of the two-stage greedy algorithm to find the one reduct is presented. The decision table is used as an input. Output of the algorithm is the superreduct which is the reduct with some additional removable attributes. First stage of the algorithm is calculating the core using the discernibility matrix. Second stage is generating the superreduct by enriching the core with the most common attributes, i.e., attributes that are more frequent in the decision table. Described above algorithm has two disadvantages: i) generating the superreduct instead of reduct, ii) additional first stage may be unnecessary if the core is empty. But for the systems focused on the fast computation of the reduct the first disadvantage is not the key problem. The core calculation can be achieved with a combinational logic block, and thus add respectively little time to the whole process. Algorithm presented in this paper was implemented in Field Programmable Gate Array (FPGA) as a digital device consisting of blocks that process the data in a single step. Calculating the core is done by the comparators connected to the block called 'singleton detector', which detects if the input word contains only single 'one'. Calculating the number of occurrences of the attribute is performed in the combinational block made up of the cascade of the adders. The superreduct generation process is iterative and thus needs the sequential circuit for controlling the calculations. For the research purpose, the algorithm was also implemented in C language and run on a PC. The times of execution of the reduct calculation in a hardware and software were considered. Results show increase in the speed of data processing.Keywords: data reduction, digital systems design, field programmable gate array (FPGA), reduct, rough set
Procedia PDF Downloads 2193729 Deployment of Matrix Transpose in Digital Image Encryption
Authors: Okike Benjamin, Garba E J. D.
Abstract:
Encryption is used to conceal information from prying eyes. Presently, information and data encryption are common due to the volume of data and information in transit across the globe on daily basis. Image encryption is yet to receive the attention of the researchers as deserved. In other words, video and multimedia documents are exposed to unauthorized accessors. The authors propose image encryption using matrix transpose. An algorithm that would allow image encryption is developed. In this proposed image encryption technique, the image to be encrypted is split into parts based on the image size. Each part is encrypted separately using matrix transpose. The actual encryption is on the picture elements (pixel) that make up the image. After encrypting each part of the image, the positions of the encrypted images are swapped before transmission of the image can take place. Swapping the positions of the images is carried out to make the encrypted image more robust for any cryptanalyst to decrypt.Keywords: image encryption, matrices, pixel, matrix transpose
Procedia PDF Downloads 421