Search results for: almost alternating links
371 Diagnosis of the Hydrological and Hydrogeological Potential in the Mancomojan Basin for Estimations of Offer and Demand
Authors: J. M. Alzate, J. Baena
Abstract:
This work presents the final results of the ‘Diagnosis of the hydrological and hydrogeological potential in the Mancomojan basin for estimations of offer and demand’ with the purpose of obtaining solutions of domestic supply for the communities of the zone of study. There was realized the projection of population of the paths by three different scenes. The highest water total demand appears with the considerations of the scene 3, with a total demand for the year 2050 of 59.275 m3/year (1,88 l/s), being the path San Francisco the one that exercises a major pressure on the resource with a demand for the same year of the order of 31.189 m3/year (0,99 l/s). As for the hydrogeological potential of the zone and as alternative of supply of the studied communities, the stratigraphic columns obtained of the geophysical polls do not show strata saturated with water that could be considered to be a potential source of supply for the communities. The water registered in the geophysics tests presents very low resistances what indicates that he presents ions, this water meets in the rock interstices very thin granulometries which indicates that it is a water of constitution, and the flow of this one towards more permeable granulometries is void or limited. The underground resource that is registered so much in electrical vertical polls (SEV) as in tomography and that is saturating rocks of thin granulometry (clays and slimes), was demonstrated by content of ions, which is consistent with the abundant presence of plaster and the genesis marinades with transition to continental of the geological units in the zone. Predominant rocks are sedimentary, sandy rocks of grain I die principally, in minor proportion were observed also sandstones of thick grain to conglomerate with clastic rock of quartz, chert and siltstone of the Formation Mess and sandstones (of thin, average and thick grain) alternating with caps conglomerate whose thickness is, in general, between 5 and 15 cm, the nodules of sandstones are frequent with the same composition of the sandstones that contain them, in some cases with calcareous and crossed stratification of the formation Sincelejo Miembro Morroa.Keywords: hydrological, hydrogeological potential, geotomography, vertical electrical sounding (VES)
Procedia PDF Downloads 260370 The Role of Self-Regulation and Assessment Feedback on Creative Performance
Authors: Sylvie Studente, Filia J. Garivaldis
Abstract:
The emotions and cognitions that underpin creative performance have been of interest for decades if not centuries, however, research evidence has still not conclusively offered reliable predictors of creativity. It is unclear whether stressors are detrimental to creative thinking, or whether some stress imposes necessary constraints to facilitate the creative process. The present research aims to examine the role of individual differences in self-regulation in influencing the links between emotions, cognitions, and creativity. Self-regulation is the capacity to disengage from moods that inhibit goal progress, and cope with failure, focus on impending intentions, and enhance the intrinsic appeal of tasks. Therefore, it is anticipated that individuals with an intuitive ability in self-regulation are able to harness their emotions and cognitions, to perform well on a creative task. In contrast, individuals with a deficiency in self-regulation will experience difficulty in such a task. Furthermore, stress in the form of positive and negative assessment feedback in the context of education will be manipulated to explore the interactive effects of environmental and individual difference factors on creative performance. The results will provide insight into the underlying factors associated with emotions and creativity, and inform future research in individual differences in cognition and emotion, and environmental triggers of creativity.Keywords: creativity, feedback, self-regulation, stress
Procedia PDF Downloads 474369 Using GIS and Map Data for the Analysis of the Relationship between Soil and Groundwater Quality at Saline Soil Area of Kham Sakaesaeng District, Nakhon Ratchasima, Thailand
Authors: W. Thongwat, B. Terakulsatit
Abstract:
The study area is Kham Sakaesaeng District in Nakhon Ratchasima Province, the south section of Northeastern Thailand, located in the Lower Khorat-Ubol Basin. This region is the one of saline soil area, located in a dry plateau and regularly experience standing with periods of floods and alternating with periods of drought. Especially, the drought in the summer season causes the major saline soil and saline water problems of this region. The general cause of dry land salting resulted from salting on irrigated land, and an excess of water leading to the rising water table in the aquifer. The purpose of this study is to determine the relationship of physical and chemical properties between the soil and groundwater. The soil and groundwater samples were collected in both rainy and summer seasons. The content of pH, electrical conductivity (EC), total dissolved solids (TDS), chloride and salinity were investigated. The experimental result of soil and groundwater samples show the slightly pH less than 7, EC (186 to 8,156 us/cm and 960 to 10,712 us/cm), TDS (93 to 3,940 ppm and 480 to 5,356 ppm), chloride content (45.58 to 4,177,015 mg/l and 227.90 to 9,216,736 mg/l), and salinity (0.07 to 4.82 ppt and 0.24 to 14.46 ppt) in the rainy and summer seasons, respectively. The distribution of chloride content and salinity content were interpolated and displayed as a map by using ArcMap 10.3 program, according to the season. The result of saline soil and brined groundwater in the study area were related to the low-lying topography, drought area, and salt-source exposure. Especially, the Rock Salt Member of Maha Sarakham Formation was exposed or lies near the ground surface in this study area. During the rainy season, salt was eroded or weathered from the salt-source rock formation and transported by surface flow or leached into the groundwater. In the dry season, the ground surface is dry enough resulting salt precipitates from the brined surface water or rises from the brined groundwater influencing the increasing content of chloride and salinity in the ground surface and groundwater.Keywords: environmental geology, soil salinity, geochemistry, groundwater hydrology
Procedia PDF Downloads 120368 Packet Fragmentation Caused by Encryption and Using It as a Security Method
Authors: Said Rabah Azzam, Andrew Graham
Abstract:
Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.Keywords: fragmentation, encryption, security, switch
Procedia PDF Downloads 335367 Risk Management and Security Practice in Customs Supply Chain: Application of Cross ABC Method to the Moroccan Customs
Authors: Lamia Hammadi, Abdellah Ait Ouhman, Aomar Ibourk
Abstract:
It is widely assumed that the case of Customs Supply Chain is classified as a complex system, due to not only the variety and large number of actors, but also their complex structural links, and the interactions between these actors, that’s why this system is subject to various types of Risks. The economic, political and social impacts of those risks are highly detrimental to countries, businesses and the public, for this reason, Risk management in the customs supply chain is becoming a crucial issue to ensure the sustainability, security and safety. The main characteristic of customs risk management approach is determining which goods and means of transport should be examined? To what extend? And where future compliance resources should be directed? The purposes of this article are, firstly to deal with the concept of customs supply chain, secondly present our risk management approach based on Cross Activity Based Costing (ABC) Method as an interactive tool to support decision making in customs risk management. Finally, analysis of case study of Moroccan customs to putting theory into practice and will thus draw together the various elements of a structured and efficient risk management approach.Keywords: cross ABC method, customs supply chain, risk, risk management
Procedia PDF Downloads 379366 Lightweight Cryptographically Generated Address for IPv6 Neighbor Discovery
Authors: Amjed Sid Ahmed, Rosilah Hassan, Nor Effendy Othman
Abstract:
Limited functioning of the Internet Protocol version 4 (IPv4) has necessitated the development of the Internetworking Protocol next generation (IPng) to curb the challenges. Indeed, the IPng is also referred to as the Internet Protocol version 6 (IPv6) and includes the Neighbor Discovery Protocol (NDP). The latter performs the role of Address Auto-configuration, Router Discovery (RD), and Neighbor Discovery (ND). Furthermore, the role of the NDP entails redirecting the service, detecting the duplicate address, and detecting the unreachable services. Despite the fact that there is an NDP’s assumption regarding the existence of trust the links’ nodes, several crucial attacks may affect the Protocol. Internet Engineering Task Force (IETF) therefore has recommended implementation of Secure Neighbor Discovery Protocol (SEND) to tackle safety issues in NDP. The SEND protocol is mainly used for validation of address rights, malicious response inhibiting techniques and finally router certification procedures. For routine running of these tasks, SEND utilizes on the following options, Cryptographically Generated Address (CGA), RSA Signature, Nonce and Timestamp option. CGA is produced at extra high costs making it the most notable disadvantage of SEND. In this paper a clear description of the constituents of CGA, its operation and also recommendations for improvements in its generation are given.Keywords: CGA, IPv6, NDP, SEND
Procedia PDF Downloads 385365 Problems of Translating Technical Terms from English into Arabic
Authors: Nisreen Naji Al-Khawaldeh, Lara Ahmad Mansour El-Awar
Abstract:
The present study investigated the strategies MA translation students used for translating technical terms, the most common obstacles they encountered in translating such terms, and the motives behind using such terms as they are in their original form despite their translatability into Arabic. To achieve these objectives, a translation test was administered to 100 MA students specialising in translation at both Hashemite University and The University of Jordan. It consisted of two parts: (a) 50 English technical terms to be translated (b) two questions to be answered concerning the challenges or problems encountered while translating the previous technical terms and the motives that drive them to use most of the English technical terms as they are despite their translatability into Arabic. The analysis of the results revealed that MA translation students faced problems in translating technical terms, namely the inability to find the equivalent form for the given technical terms, the use of literal translation, and the wider use of loan-words type. Besides, the students used different strategies to translate the technical terms, namely borrowing (i.e., loan- words), paraphrasing, synonymy, naturalization, equivalence, and literal translation. Moreover, it was also revealed that most technical terms were used as they are in the source language despite their translatability into Arabic because these technical terms are easier to use in English rather than in Arabic. Also, when these terms were introduced to the Arab world, they were introduced in English, not in Arabic. So, the brain links these objects to their English terms.Keywords: arabic, english, technical terms, translation strategies, translation problems
Procedia PDF Downloads 280364 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 455363 Etymological Studies and their Role in Consolidating the Identity of the Cultural Heritage; Terminology Related to the Traditional Dagger Making in the Sultanate of Oman as a Model
Authors: Muhammed Muvaffak Alhasan, Ali Alriyami, Ali Almanei
Abstract:
Despite the extreme importance of etymological studies in documenting the linguistic heritage, and showing its roots and connections in the classical language; However, etymological dictionaries are still rare in the Arab library in general. Etymology is the science of etymology that investigates how vocabulary is reproduced and reproduced, by exploring the origin of words and the phonetic and semantic changes that occurred in them over time, trying to reconfigure an identity card for the word showing its origin and the path it took through time until it reached its current state. This research seeks to make an etymological study on the terminology used in the traditional dagger making in the Sultanate of Oman through the following steps: 1. Collecting the terms relating to traditional dagger making and recording them in order to document and preserve them. 2. Arranging them alphabetically in order to facilitate searching and dealing with them. 3. Setting up a historical identification card for each word by applying an etymological study that shows its source from which they descended its links with standard and the phonological and semantic changes it underwent until it reached its current form.Keywords: cultural heritage, etymology, Omani dagger, Oman
Procedia PDF Downloads 81362 Media Representation of China: A Content Analysis of Coverage of China-Related Energy in the New York Times
Authors: Lian Liu
Abstract:
By analyzing the content of the New York Times' China-related energy reports, this study aims to explore the construction of China's national image by the mainstream media in the United States. The study analyzes three aspects of the coverage: topics, reporting tendencies, and countries involved. The results of the study show that economic issues are the main focus of the New York Times’ China-related energy coverage, followed by political issues and environmental issues. Overall, the coverage tendency was mainly negative, but positive coverage was dominated by science and technology issues. In addition, the study found that U.S.-China relations and Sino-Russian relations were important contexts for the construction of China's national image in the NYT's China-related energy coverage. These stories highlight China's interstate interactions with the United States, Japan, and Russia, which serve as important links in the coverage. The findings of this study reveal some characteristics and trends of the U.S. mainstream media's country image of China, which are important for a deeper understanding of the U.S.-China relationship and the media's influence on the construction of the country's image.Keywords: media coverage, China, content analysis, visualization technology
Procedia PDF Downloads 87361 Microstructural Evidences for Exhaustion Theory of Low Temperature Creep in Martensitic Steels
Authors: Nagarjuna Remalli, Robert Brandt
Abstract:
Down-sizing of combustion engines in automobiles are prevailed owing to required increase in efficiency. This leads to a stress increment on valve springs, which affects their intended function due to an increase in relaxation. High strength martensitic steels are used for valve spring applications. Recent investigations unveiled that low temperature creep (LTC) in martensitic steels obey a logarithmic creep law. The exhaustion theory links the logarithmic creep behavior to an activation energy which is characteristic for any given time during creep. This activation energy increases with creep strain due to barriers of low activation energies exhausted during creep. The assumption of the exhaustion theory is that the material is inhomogeneous in microscopic scale. According to these assumptions it is anticipated that small obstacles (e. g. ε–carbides) having a wide range of size distribution are non-uniformly distributed in the materials. X-ray diffraction studies revealed the presence of ε–carbides in high strength martensitic steels. In this study, high strength martensitic steels that are crept in the temperature range of 75 – 150 °C were investigated with the aid of a transmission electron microscope for the evidence of an inhomogeneous distribution of obstacles having different size to examine the validation of exhaustion theory.Keywords: creep mechanisms, exhaustion theory, low temperature creep, martensitic steels
Procedia PDF Downloads 263360 Worldbuilding as Critical Architectural Pedagogy
Authors: Jesse Rafeiro
Abstract:
This paper discusses worldbuilding as a pedagogical approach to the first-year architectural design studio. The studio ran for three consecutive terms between 2016-2018. Taking its departure from the fifty-five city narratives in Italo Calvino’s Invisible Cities, students collectively designed in a “nowhere” space where intersecting and diverging narratives could be played out. Along with Calvino, students navigated between three main exercises and their imposed limits to develop architectural insight at three scales simulating the considerations of architectural practice: detail, building, and city. The first exercise asked each student to design and model a ruin based on randomly assigned incongruent fragments. Each student was given one plan fragment and two section fragments from different Renaissance Treatises. The students were asked to translate these in alternating axonometric projection and model-making explorations. Although the fragments themselves were imposed, students were free to interpret how the drawings fit together by imagining new details and atypical placements. An undulating terrain model was introduced in the second exercise to ground the worldbuilding exercises. Here, students were required to negotiate with one another to design a city of ruins. Free to place their models anywhere on the site, the students were restricted by the negotiation of territories marked by other students and the requirement to provide thresholds, open spaces, and corridors. The third exercise introduced new life into the ruined city through a series of design interventions. Each student was assigned an atypical building program suggesting a place for an activity, human or nonhuman. The atypical nature of the programs challenged the triviality of functional planning through explorations in spatial narratives free from preconceived assumptions. By contesting, playing out, or dreaming responses to realities taught in other coursework, this third exercise actualized learnings that are too often self-contained in the silos of differing course agendas. As such, the studio fostered an initial worldbuilding space within which to sharpen sensibility and criticality for subsequent years of education.Keywords: architectural pedagogy, critical pedagogy, Italo Calvino, worldbuilding
Procedia PDF Downloads 132359 A Machine Learning Approach for Intelligent Transportation System Management on Urban Roads
Authors: Ashish Dhamaniya, Vineet Jain, Rajesh Chouhan
Abstract:
Traffic management is one of the gigantic issue in most of the urban roads in al-most all metropolitan cities in India. Speed is one of the critical traffic parameters for effective Intelligent Transportation System (ITS) implementation as it decides the arrival rate of vehicles on an intersection which are majorly the point of con-gestions. The study aimed to leverage Machine Learning (ML) models to produce precise predictions of speed on urban roadway links. The research objective was to assess how categorized traffic volume and road width, serving as variables, in-fluence speed prediction. Four tree-based regression models namely: Decision Tree (DT), Random Forest (RF), Extra Tree (ET), and Extreme Gradient Boost (XGB)are employed for this purpose. The models' performances were validated using test data, and the results demonstrate that Random Forest surpasses other machine learning techniques and a conventional utility theory-based model in speed prediction. The study is useful for managing the urban roadway network performance under mixed traffic conditions and effective implementation of ITS.Keywords: stream speed, urban roads, machine learning, traffic flow
Procedia PDF Downloads 70358 Artificial Neural Network and Statistical Method
Authors: Tomas Berhanu Bekele
Abstract:
Traffic congestion is one of the main problems related to transportation in developed as well as developing countries. Traffic control systems are based on the idea of avoiding traffic instabilities and homogenizing traffic flow in such a way that the risk of accidents is minimized and traffic flow is maximized. Lately, Intelligent Transport Systems (ITS) has become an important area of research to solve such road traffic-related issues for making smart decisions. It links people, roads and vehicles together using communication technologies to increase safety and mobility. Moreover, accurate prediction of road traffic is important to manage traffic congestion. The aim of this study is to develop an ANN model for the prediction of traffic flow and to compare the ANN model with the linear regression model of traffic flow predictions. Data extraction was carried out in intervals of 15 minutes from the video player. Video of mixed traffic flow was taken and then counted during office work in order to determine the traffic volume. Vehicles were classified into six categories, namely Car, Motorcycle, Minibus, mid-bus, Bus, and Truck vehicles. The average time taken by each vehicle type to travel the trap length was measured by time displayed on a video screen.Keywords: intelligent transport system (ITS), traffic flow prediction, artificial neural network (ANN), linear regression
Procedia PDF Downloads 67357 Biodiversity Conservation: A Path to a Healthy Afghanistan
Authors: Nadir Sidiqi
Abstract:
Biodiversity conservation is humanity’s building block to sustain lives - ultimately allowing all living and nonliving creatures to interact in a balanced proportion. Humanity’s challenge in the 21st century is to maintain biodiversity without harming the natural habitat of plants, animals and beneficial microorganisms. There are many good reasons to consider why biodiversity is important to every nation around the world, especially for a nation like Afghanistan. One of the major values of biodiversity is its economic value: biodiversity provides goods and services to the Afghan nation directly through links and components such as the maintenance of traditional crops, medicine, fruits, animals, grazing, fuel, timber, harvesting, fishing, hunting and related supplies. Biodiversity is the variety of the living components, such as humans, plants, animals, and microorganisms, and nonliving components interaction, including air, water, sunlight, soil, humidity and environmental factors in an area. There are many ways of gauging the value of biodiversity. As an ecosystem, biodiversity includes such benefits as soil fertility, erosion control, crop pollination, crop rotation, and pest control. The conservation of biodiversity is crucial for these benefits, which would be impossible to replace. Biodiversity conservation also has heritage values; this wealth of genetic diversity provides backup to rural people living close together.Keywords: Afghanistan, biodiversity, conservation, economy, environment
Procedia PDF Downloads 528356 Long Term Evolution Multiple-Input Multiple-Output Network in Unmanned Air Vehicles Platform
Authors: Ashagrie Getnet Flattie
Abstract:
Line-of-sight (LOS) information, data rates, good quality, and flexible network service are limited by the fact that, for the duration of any given connection, they experience severe variation in signal strength due to fading and path loss. Wireless system faces major challenges in achieving wide coverage and capacity without affecting the system performance and to access data everywhere, all the time. In this paper, the cell coverage and edge rate of different Multiple-input multiple-output (MIMO) schemes in 20 MHz Long Term Evolution (LTE) system under Unmanned Air Vehicles (UAV) platform are investigated. After some background on the enormous potential of UAV, MIMO, and LTE in wireless links, the paper highlights the presented system model which attempts to realize the various benefits of MIMO being incorporated into UAV platform. The performances of the three MIMO LTE schemes are compared with the performance of 4x4 MIMO LTE in UAV scheme carried out to evaluate the improvement in cell radius, BER, and data throughput of the system in different morphology. The results show that significant performance gains such as bit error rate (BER), data rate, and coverage can be achieved by using the presented scenario.Keywords: LTE, MIMO, path loss, UAV
Procedia PDF Downloads 279355 Transcranial Electric Field Treatments on Redox-Toxic Iron Deposits in Transgenic Alzheimer’s Disease Mouse Models: The Electroceutical Targeting of Alzheimer’s Disease
Authors: Choi Younshick, Lee Wonseok, Lee Jaemeun, Park Sun-Hyun, Kim Sunwoung, Park Sua, Kim Eun Ho, Kim Jong-Ki
Abstract:
Iron accumulation in the brain accelerates Alzheimer’s disease progression. To cure iron toxicity, we assessed the therapeutic effects of noncontact transcranial electric field stimulation to the brain on toxic iron deposits in either the Aβ-fibril structure or the Aβ plaque in a mouse model of Alzheimer’s disease (AD). A capacitive electrode-based alternating electric field (AEF) was applied to a suspension of magnetite (Fe₃O₄) to measure the field-sensitized electro-Fenton effect and resultant reactive oxygen species (ROS) generation. The increase in ROS generation compared to the untreated control was both exposure-time and AEF-frequency dependent. The frequency-specific exposure of AEF to 0.7–1.4 V/cm on a magnetite-bound Aβ-fibril or a transgenic Alzheimer’s disease (AD) mouse model revealed the removal of intraplaque ferrous magnetite iron deposit and Aβ-plaque burden together at the same time compared to the untreated control. The results of the behavioral tests show an improvement in impaired cognitive function following AEF treatment on the AD mouse model. Western blot assay found some disease-modifying biological responses, including down-regulating ferroptosis, neuroinflammation and reactive astrocytes that eventually made cognitive improvement feasible. Tissue clearing and 3D-imaging analysis revealed no induced damage to the neuronal structures of normal brain tissue following AEF treatment. In conclusion, our results suggest that the effective degradation of magnetite-bound amyloid fibrils or plaques in the AD brain by the electro-Fenton effect from electric field-sensitized magnetite offers a potential electroceutical treatment option for AD.Keywords: electroceutical, intraplaque magnetite, alzheimer’s disease, transcranial electric field, electro-fenton effect
Procedia PDF Downloads 71354 The Role of Human Resource Flexibility and Agility in Achieving Sustainable Competitiveness
Authors: Agnieszka Leszczynska
Abstract:
Flexibility and agility constitute the most dominant features of modern human resource management systems. The former pertains to procedures, practices and competences of human resources, and the latter to the procedures and practices’ effectiveness in dealing with changing conditions in the surrounding environment. The purpose of the paper is to present the relations between the flexibility and agility of human resources and achieving sustainable competitiveness. Based upon hitherto research, we develop a conceptual model that links the constructs together. The conducted study is of theoretical and conceptual nature. Critical literature analysis and the synthesis method were applied. A premise was made that the three dimensions of HR (Human Resources) flexibility (employee skill flexibility, employee behaviour flexibility, and HR practice flexibility) and HR agility affect competitiveness, by increasing the flexibility, creativity of human resources, and improving quality performance, and exert an impact upon the quality of life of employees and social relations. In particular, the agility and flexibility of human resources contribute to the growth of adaptability and strategic orientation, which directly affects the organization's competitiveness. The research results will help to better understand the impact of flexibility and agility related to the HRM (Human Resources Management) system upon the implementation of the concept of sustainable development in the organization.Keywords: agility, human resource, sustainable competitiveness, sustainable development
Procedia PDF Downloads 222353 The Role of Organizational Identity in Disaster Response, Recovery and Prevention: A Case Study of an Italian Multi-Utility Company
Authors: Shanshan Zhou, Massimo Battaglia
Abstract:
Identity plays a critical role when an organization faces disasters. Individuals reflect on their working identities and identify themselves with the group and the organization, which facilitate collective sensemaking under crisis situations and enable coordinated actions to respond to and recover from disasters. In addition, an organization’s identity links it to its regional community, which fosters the mobilization of resources and contributes to rapid recovery. However, identity is also problematic for disaster prevention because of its persistence. An organization’s ego-defenses system prohibits the rethink of its identity and a rigid identity obstructs disaster prevention. This research aims to tackle the ‘problem’ of identity by study in-depth a case of an Italian multi–utility which experienced the 2012 Northern Italy earthquakes. Collecting data from 11 interviews with top managers and key players in the local community and archived materials, we find that the earthquakes triggered the rethink of the organization’s identity, which got reinforced afterward. This research highlighted the importance of identity in disaster response and recovery. More importantly, it explored the solution of overcoming the barrier of ego-defense that is to transform the organization into a learning organization which constantly rethinks its identity.Keywords: community identity, disaster, identity, organizational learning
Procedia PDF Downloads 731352 Linking Excellence in Biomedical Knowledge and Computational Intelligence Research for Personalized Management of Cardiovascular Diseases within Personal Health Care
Authors: T. Rocha, P. Carvalho, S. Paredes, J. Henriques, A. Bianchi, V. Traver, A. Martinez
Abstract:
The main goal of LINK project is to join competences in intelligent processing in order to create a research ecosystem to address two central scientific and technical challenges for personal health care (PHC) deployment: i) how to merge clinical evidence knowledge in computational decision support systems for PHC management and ii) how to provide achieve personalized services, i.e., solutions adapted to the specific user needs and characteristics. The final goal of one of the work packages (WP2), designated Sustainable Linking and Synergies for Excellence, is the definition, implementation and coordination of the necessary activities to create and to strengthen durable links between the LiNK partners. This work focuses on the strategy that has been followed to achieve the definition of the Research Tracks (RT), which will support a set of actions to be pursued along the LiNK project. These include common research activities, knowledge transfer among the researchers of the consortium, and PhD student and post-doc co-advisement. Moreover, the RTs will establish the basis for the definition of concepts and their evolution to project proposals.Keywords: LiNK Twin European Project, personal health care, cardiovascular diseases, research tracks
Procedia PDF Downloads 216351 Signal Strength Based Multipath Routing for Mobile Ad Hoc Networks
Authors: Chothmal
Abstract:
In this paper, we present a route discovery process which uses the signal strength on a link as a parameter of its inclusion in the route discovery method. The proposed signal-to-interference and noise ratio (SINR) based multipath reactive routing protocol is named as SINR-MP protocol. The proposed SINR-MP routing protocols has two following two features: a) SINR-MP protocol selects routes based on the SINR of the links during the route discovery process therefore it select the routes which has long lifetime and low frame error rate for data transmission, and b) SINR-MP protocols route discovery process is multipath which discovers more than one SINR based route between a given source destination pair. The multiple routes selected by our SINR-MP protocol are node-disjoint in nature which increases their robustness against link failures, as failure of one route will not affect the other route. The secondary route is very useful in situations where the primary route is broken because we can now use the secondary route without causing a new route discovery process. Due to this, the network overhead caused by a route discovery process is avoided. This increases the network performance greatly. The proposed SINR-MP routing protocol is implemented in the trail version of network simulator called Qualnet.Keywords: ad hoc networks, quality of service, video streaming, H.264/SVC, multiple routes, video traces
Procedia PDF Downloads 249350 Gender Effects in EEG-Based Functional Brain Networks
Authors: Mahdi Jalili
Abstract:
Functional connectivity in the human brain can be represented as a network using electroencephalography (EEG) signals. Network representation of EEG time series can be an efficient vehicle to understand the underlying mechanisms of brain function. Brain functional networks – whose nodes are brain regions and edges correspond to functional links between them – are characterized by neurobiologically meaningful graph theory metrics. This study investigates the degree to which graph theory metrics are sex dependent. To this end, EEGs from 24 healthy female subjects and 21 healthy male subjects were recorded in eyes-closed resting state conditions. The connectivity matrices were extracted using correlation analysis and were further binarized to obtain binary functional networks. Global and local efficiency measures – as graph theory metrics– were computed for the extracted networks. We found that male brains have a significantly greater global efficiency (i.e., global communicability of the network) across all frequency bands for a wide range of cost values in both hemispheres. Furthermore, for a range of cost values, female brains showed significantly greater right-hemispheric local efficiency (i.e., local connectivity) than male brains.Keywords: EEG, brain, functional networks, network science, graph theory
Procedia PDF Downloads 443349 Real Time Traffic Performance Study over MPLS VPNs with DiffServ
Authors: Naveed Ghani
Abstract:
With the arrival of higher speed communication links and mature application running over the internet, the requirement for reliable, efficient and robust network designs rising day by day. Multi-Protocol Label Switching technology (MPLS) Virtual Private Networks (VPNs) have committed to provide optimal network services. They are gaining popularity in industry day by day. Enterprise customers are moving to service providers that offer MPLS VPNs. The main reason for this shifting is the capability of MPLS VPN to provide built in security features and any-to-any connectivity. MPLS VPNs improved the network performance due to fast label switching as compare to traditional IP Forwarding but traffic classification and policing was still required on per hop basis to enhance the performance of real time traffic which is delay sensitive (particularly voice and video). QoS (Quality of service) is the most important factor to prioritize enterprise networks’ real time traffic such as voice and video. This thesis is focused on the study of QoS parameters (e.g. delay, jitter and MOS (Mean Opinion Score)) for the real time traffic over MPLS VPNs. DiffServ (Differentiated Services) QoS model will be used over MPLS VPN network to get end-to-end service quality.Keywords: network, MPLS, VPN, DiffServ, MPLS VPN, DiffServ QoS, QoS Model, GNS2
Procedia PDF Downloads 426348 Moderators of the Relationship between Entrepreneurial Self-Efficacy and Expected Firm Growth
Authors: Laszlo Szerb, Zsofia Voros
Abstract:
In this article, we seek to answer why many attempts to empirically link entrepreneurial self-efficacy to growth expectations have failed. While doing so, we reconcile the literature on entrepreneurial self-efficacy and overconfidence. By analyzing GEM APS (Global Entrepreneurship Monitor Adult Population Survey) data, we show that early-stage entrepreneurs’ self-efficacy statements are systematically inflated. Our results also indicate that entrepreneurial overconfidence is fading and its form changes as business owners learn and gather experience. In addition, by using Ajzen’s Theory of Planned Behavior (2006) as a modeling framework, we illustrate that early stage business owners’ overconfidence results in overly high firm growth expectations. However, the changes in the form of overconfidence and the adjustments of expectations on market conditions as a venture ages alter the relationship between overconfidence and growth expectations across the business life-cycle stages. Overall, our study empirically links young entrepreneurs’ overconfidence to their growth expectations at the firm level. This link is important to establish as expected growth was linked to realized growth both on micro and macro levels. Moreover, we detected several moderators of this relationship providing a potential answer to why many studies failed to link entrepreneurial self-efficacy to growth expectations.Keywords: self-efficacy, overconfidence, entrepreneurship, expected growth
Procedia PDF Downloads 272347 Vine Growers' Climate Change Adaptation Strategies in Hungary
Authors: Gabor Kiraly
Abstract:
Wine regions are based on equilibria between climate, soil, grape varieties, and farming expertise that define the special character and quality of local vine farming and wine production. Changes in climate conditions may increase risk of destabilizing this equilibrium. Adaptation decisions, including adjusting practices, processes and capitals in response to climate change stresses – may reduce this risk. However, farmers’ adaptive behavior are subject to a wide range of factors and forces such as links between climate change implications and production, farm - scale adaptive capacity and other external forces that might hinder them to make efficient response to climate change challenges. This paper will aim to study climate change adaptation practices and strategies of grape growers in a way of applying a complex and holistic approach involving theories, methods and tools both from environmental and social sciences. It will introduce the field of adaptation studies as an evidence - based discourse by presenting an overview of examples from wine regions where adaptation studies have already reached an advanced stage. This will serve as a theoretical background for a preliminary research with the aim to examine the feasibility and applicability of such a research approach in the Hungarian context.Keywords: climate change, adaptation, viticulture, Hungary
Procedia PDF Downloads 237346 Enhancing Throughput for Wireless Multihop Networks
Authors: K. Kalaiarasan, B. Pandeeswari, A. Arockia John Francis
Abstract:
Wireless, Multi-hop networks consist of one or more intermediate nodes along the path that receive and forward packets via wireless links. The backpressure algorithm provides throughput optimal routing and scheduling decisions for multi-hop networks with dynamic traffic. Xpress, a cross-layer backpressure architecture was designed to reach the capacity of wireless multi-hop networks and it provides well coordination between layers of network by turning a mesh network into a wireless switch. Transmission over the network is scheduled using a throughput-optimal backpressure algorithm. But this architecture operates much below their capacity due to out-of-order packet delivery and variable packet size. In this paper, we present Xpress-T, a throughput optimal backpressure architecture with TCP support designed to reach maximum throughput of wireless multi-hop networks. Xpress-T operates at the IP layer, and therefore any transport protocol, including TCP, can run on top of Xpress-T. The proposed design not only avoids bottlenecks but also handles out-of-order packet delivery and variable packet size, optimally load-balances traffic across them when needed, improving fairness among competing flows. Our simulation results shows that Xpress-T gives 65% more throughput than Xpress.Keywords: backpressure scheduling and routing, TCP, congestion control, wireless multihop network
Procedia PDF Downloads 518345 Effect of Atmospheric Turbulence on Hybrid FSO/RF Link Availability under Qatar's Harsh Climate
Authors: Abir Touati, Syed Jawad Hussain, Farid Touati, Ammar Bouallegue
Abstract:
Although there has been a growing interest in the hybrid free-space optical link and radio frequency FSO/RF communication system, the current literature is limited to results obtained in moderate or cold environment. In this paper, using a soft switching approach, we investigate the effect of weather inhomogeneities on the strength of turbulence hence the channel refractive index under Qatar harsh environment and their influence on the hybrid FSO/RF availability. In this approach, either FSO/RF or simultaneous or none of them can be active. Based on soft switching approach and a finite state Markov Chain (FSMC) process, we model the channel fading for the two links and derive a mathematical expression for the outage probability of the hybrid system. Then, we evaluate the behavior of the hybrid FSO/RF under hazy and harsh weather. Results show that the FSO/RF soft switching renders the system outage probability less than that of each link individually. A soft switching algorithm is being implemented on FPGAs using Raptor code interfaced to the two terminals of a 1Gbps/100 Mbps FSO/RF hybrid system, the first being implemented in the region. Experimental results are compared to the above simulation results.Keywords: atmospheric turbulence, haze, hybrid FSO/RF, outage probability, refractive index
Procedia PDF Downloads 419344 Prediction of Embankment Fires at Railway Infrastructure Using Machine Learning, Geospatial Data and VIIRS Remote Sensing Imagery
Authors: Jan-Peter Mund, Christian Kind
Abstract:
In view of the ongoing climate change and global warming, fires along railways in Germany are occurring more frequently, with sometimes massive consequences for railway operations and affected railroad infrastructure. In the absence of systematic studies within the infrastructure network of German Rail, little is known about the causes of such embankment fires. Since a further increase in these hazards is to be expected in the near future, there is a need for a sound knowledge of triggers and drivers for embankment fires as well as methodical knowledge of prediction tools. Two predictable future trends speak for the increasing relevance of the topic: through the intensification of the use of rail for passenger and freight transport (e.g..: doubling of annual passenger numbers by 2030, compared to 2019), there will be more rail traffic and also more maintenance and construction work on the railways. This research project approach uses satellite data to identify historical embankment fires along rail network infrastructure. The team links data from these fires with infrastructure and weather data and trains a machine-learning model with the aim of predicting fire hazards on sections of the track. Companies reflect on the results and use them on a pilot basis in precautionary measures.Keywords: embankment fires, railway maintenance, machine learning, remote sensing, VIIRS data
Procedia PDF Downloads 89343 Language Development and Growing Spanning Trees in Children Semantic Network
Authors: Somayeh Sadat Hashemi Kamangar, Fatemeh Bakouie, Shahriar Gharibzadeh
Abstract:
In this study, we target to exploit Maximum Spanning Trees (MST) of children's semantic networks to investigate their language development. To do so, we examine the graph-theoretic properties of word-embedding networks. The networks are made of words children learn prior to the age of 30 months as the nodes and the links which are built from the cosine vector similarity of words normatively acquired by children prior to two and a half years of age. These networks are weighted graphs and the strength of each link is determined by the numerical similarities of the two words (nodes) on the sides of the link. To avoid changing the weighted networks to the binaries by setting a threshold, constructing MSTs might present a solution. MST is a unique sub-graph that connects all the nodes in such a way that the sum of all the link weights is maximized without forming cycles. MSTs as the backbone of the semantic networks are suitable to examine developmental changes in semantic network topology in children. From these trees, several parameters were calculated to characterize the developmental change in network organization. We showed that MSTs provides an elegant method sensitive to capture subtle developmental changes in semantic network organization.Keywords: maximum spanning trees, word-embedding, semantic networks, language development
Procedia PDF Downloads 145342 The Other Dreamers: A Study of the Relationship between Returned Migration and Entrepreneurship
Authors: Pascual García, Francisco Ochoa, Jessica Ordoñez
Abstract:
The links between migration and development have been widely written and analyzed from different perspectives. However, the nexus between entrepreneurship and migration is of recent interest. The different studies related to this have focused on the ventures of ethnic enclaves, or on transnational businesses, which link the community of origin and destination. Beyond this perspective, this work analyzes the return migration, (a few studies until now, but forming part of a theoretical body of migration). As a result of the European crisis started between 2007-2008. Many Ecuadorians who lived in Europe, decided to return to their place of origin. The rise of the price of the oil and commodities presented a better panorama in Ecuador than in Europe. Faced with the magnitude of returnees, the opportunities for entrepreneurship in Ecuador increased (Accumulation of human capital, social capital, learned skills and capital). Thus there is an interest in the possibility of returned migrants in the country to start a business in their place of origin. The following study is the result of this. A survey of 110 returned migrants was carried out in the south of Ecuador and, using a Probit econometric model, we determined that the variables specified as geographic area, sex, education level are not significant, so they are not determinant when undertaking. However, time abroad and skills learned, if they were significant at the time of the decision to start a business.Keywords: entrepreneurship, development, migration, returned migration
Procedia PDF Downloads 210