Search results for: case based library
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 35456

Search results for: case based library

35126 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 204
35125 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 124
35124 Optimized Road Lane Detection Through a Combined Canny Edge Detection, Hough Transform, and Scaleable Region Masking Toward Autonomous Driving

Authors: Samane Sharifi Monfared, Lavdie Rada

Abstract:

Nowadays, autonomous vehicles are developing rapidly toward facilitating human car driving. One of the main issues is road lane detection for a suitable guidance direction and car accident prevention. This paper aims to improve and optimize road line detection based on a combination of camera calibration, the Hough transform, and Canny edge detection. The video processing is implemented using the Open CV library with the novelty of having a scale able region masking. The aim of the study is to introduce automatic road lane detection techniques with the user’s minimum manual intervention.

Keywords: hough transform, canny edge detection, optimisation, scaleable masking, camera calibration, improving the quality of image, image processing, video processing

Procedia PDF Downloads 86
35123 Civil Liability for Digital Crimes

Authors: Pál Mészáros

Abstract:

The aim of this research topic is to examine civil law consequences caused by crimes committed in the digital space. During the commission of certain crimes, not only the rights of one person are violated, but also the rights of an entire institution, for example, if the information system of a university is attacked. The consequences of these crimes committed in the digital space may also be that the victim himself is liable to other third parties, for example, in the event that health data comes into the possession of unauthorized persons, and it can be proved that the service provider's IT system was inadequate. An interesting question may also be the civil liability of credit institutions if someone becomes a victim of fraud but is not expected from him/her to notice the fraud. In such a case, the liability of the credit institution may arise if they do not respond in time in the case of unauthorized bank transactions. Based on the above, the main topic of the research is the civil liability of the victim, or another person or company related to the victim in the case of damages caused by crimes.

Keywords: civil liability, digital crimes, transfer of responsibility, civil law

Procedia PDF Downloads 56
35122 A Case Study of Kinesthetic Intelligence Development Intervention on One Asperger Child

Authors: Chingwen Yeh, I. Chen Huang

Abstract:

This paper aims to conduct a case study on kinesthetic intelligence development intervention with a child who has Asperger symptom identified by physician. First, the characteristics of Asperger were defined based on the related literature. Some Asperger's people are born with outstanding insight and are good at solving complex and difficult problems. In contrast to high-functioning autistic, Asperger children do not lose their ability to express themselves verbally. However in the cognitive function, they focus mainly on the things they are interested in instead of paying attention to the whole surrounding situation. Thus it is difficult for them not only to focus on things that they are not interesting in, but also to interact with people. Secondly, 8-weeks of kinesthetic intelligence development courses were designed within a series of physical action that including the following sections: limbs coordination, various parts of body rhythm changes, strength and space awareness and breathing practice. In classroom observations were recorded both on words and with video as the qualitative research data. Finally, in-depth interview with the case child’s teachers, parents and other in class observers were documented on a weekly base in order to examine the effectiveness of before and after the kinesthetic intelligence development course and to testify the usefulness of the lesson plan. This research found that the case child has improved significantly in terms of attention span and body movement creativity. In the beginning of intervention, the case child made less eyes contact with others. The instructor needed to face the case child to confirm the eyes contact. And the instructor also used various adjective words as guiding language for all kinds of movement sequence practice. The result can cause the case child’s attention and learning motivation. And the case child understand what to do to enhance kinesthetic intelligence. These authors hope findings of this study can contribute as reference for the further research on the related topic.

Keywords: asperger symptom, body rhythm, kinesthetic intelligence, space awareness

Procedia PDF Downloads 233
35121 AI-Based Techniques for Online Social Media Network Sentiment Analysis: A Methodical Review

Authors: A. M. John-Otumu, M. M. Rahman, O. C. Nwokonkwo, M. C. Onuoha

Abstract:

Online social media networks have long served as a primary arena for group conversations, gossip, text-based information sharing and distribution. The use of natural language processing techniques for text classification and unbiased decision-making has not been far-fetched. Proper classification of this textual information in a given context has also been very difficult. As a result, we decided to conduct a systematic review of previous literature on sentiment classification and AI-based techniques that have been used in order to gain a better understanding of the process of designing and developing a robust and more accurate sentiment classifier that can correctly classify social media textual information of a given context between hate speech and inverted compliments with a high level of accuracy by assessing different artificial intelligence techniques. We evaluated over 250 articles from digital sources like ScienceDirect, ACM, Google Scholar, and IEEE Xplore and whittled down the number of research to 31. Findings revealed that Deep learning approaches such as CNN, RNN, BERT, and LSTM outperformed various machine learning techniques in terms of performance accuracy. A large dataset is also necessary for developing a robust sentiment classifier and can be obtained from places like Twitter, movie reviews, Kaggle, SST, and SemEval Task4. Hybrid Deep Learning techniques like CNN+LSTM, CNN+GRU, CNN+BERT outperformed single Deep Learning techniques and machine learning techniques. Python programming language outperformed Java programming language in terms of sentiment analyzer development due to its simplicity and AI-based library functionalities. Based on some of the important findings from this study, we made a recommendation for future research.

Keywords: artificial intelligence, natural language processing, sentiment analysis, social network, text

Procedia PDF Downloads 111
35120 Patient-Specific Modeling Algorithm for Medical Data Based on AUC

Authors: Guilherme Ribeiro, Alexandre Oliveira, Antonio Ferreira, Shyam Visweswaran, Gregory Cooper

Abstract:

Patient-specific models are instance-based learning algorithms that take advantage of the particular features of the patient case at hand to predict an outcome. We introduce two patient-specific algorithms based on decision tree paradigm that use AUC as a metric to select an attribute. We apply the patient specific algorithms to predict outcomes in several datasets, including medical datasets. Compared to the patient-specific decision path (PSDP) entropy-based and CART methods, the AUC-based patient-specific decision path models performed equivalently on area under the ROC curve (AUC). Our results provide support for patient-specific methods being a promising approach for making clinical predictions.

Keywords: approach instance-based, area under the ROC curve, patient-specific decision path, clinical predictions

Procedia PDF Downloads 474
35119 The Role of Pulmonary Resection in Complicated Primary Pediatric Pulmonary Tuberculosis: An Evidence-Based Case Report

Authors: Hendra Wibowo, Suprayitno Wardoyo, Dhama Shinta

Abstract:

Introduction: Pediatric pulmonary tuberculosis (TB) incidence was increasing, with many undetected cases. In complicated TB, treatment should consist of returning pulmonary function, preventing further complications, and eliminating bacteria. Complicated TB management was still controversial, and surgery was one of the treatments that should be evaluated in accordance with its role in the treatment of complicated TB. Method: This study was an evidence-based case report. The database used for the literature search were Cochrane, Medline, Proquest, and ScienceDirect. Keywords for the search were ‘primary pulmonary tuberculosis’, ‘surgery’, ‘lung resection’, and ‘children’. Inclusion criteria were studies in English or Indonesian, with children under 18 years old as subject, and full-text articles available. The assessment was done according to Oxford Centre for evidence-based medicine 2011. Results: Six cohort studies were analyzed. Surgery was indicated for patients with complicated TB that were unresponsive towards treatment. It should be noted that the experiments were done before the standard WHO antituberculosis therapy was applied; thus, the result may be different from the current application. Conclusion: Currently, there was no guideline on pulmonary resection. However, surgery yielded better mortality and morbidity in children with complicated pulmonary TB.

Keywords: pediatric, pulmonary, surgery, therapy, tuberculosis

Procedia PDF Downloads 102
35118 A Case Study in Using Gamification in the Mobile Computing Course

Authors: Rula Al Azawi, Abobaker Shafi

Abstract:

The purpose of this paper is to use gamification technology in the mobile computing course to increase students motivation and engagement. The game applied to be designed by students focusing also to design educational game for children with age six years. This game will teach the students how to learn in a fun way. Our case study is implemented at Gulf College which is affiliated with Staffordshire University-UK. Our game design was applied to teach students Android Studio software by designing an educational game. Our goal with gamification is to improve student attendance, increase student engagement, problem solving and user stratification. Finally, we describe the findings and results of our case study. The data analysis and evaluation are based on students feedback, staff feedback and the final marking grades for the students.

Keywords: gamification, educational game, android studio software, students motivation and engagement

Procedia PDF Downloads 450
35117 Jejunostomy and Protective Ileostomy in a Patient with Massive Necrotizing Enterocolitis: A Case Report

Authors: Rafael Ricieri, Rogerio Barros

Abstract:

Objective: This study is to report a case of massive necrotizing enterocolitis in a six-month-old patient, requiring ileostomy and protective jejunostomy as a damage control measure in the first exploratory laparotomy surgery in massive enterocolitis without a previous diagnosis. Methods: This study is a case report of success in making and closing a protective jejunostomy. However, the low number of publications on this staged and risky measure of surgical resolution encouraged the team to study the indication and especially the correct time for closing the patient's protective jejunostomy. The main study instrument will be the six-month-old patient's medical record. Results: Based on the observation of the case described, it was observed that the time for the closure of the described procedure (protective jejunostomy) varies according to the level of compromise of the health status of your patient and of an individual of each person. Early closure, or failure to close, can lead to a favorable problem for the patient since several problems can result from this closure, such as new intestinal perforations, hydroelectrolyte disturbances. Despite the risk of new perforations, we suggest closing the protective jejunostomy around the 14th day of the procedure, thus keeping the patient on broad-spectrum antibiotic therapy and absolute fasting, thus reducing the chances of new intestinal perforations. Associated with the closure of the jejunostomy, a gastric tube for decompression is necessary, and care in an intensive care unit and electrolyte replacement is necessary to maintain the stability of the case.

Keywords: jejunostomy, ileostomy, enterocolitis, pediatric surgery, gastric surgery

Procedia PDF Downloads 78
35116 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 256
35115 A Framework Factors Influencing Accounting Information Systems Adoption Success

Authors: Manirath Wongsim

Abstract:

AIS plays an important role in business management, strategic and can provide assistance in all phases of decision making. Thus, many organisations needs to be seen as well adopting AIS, which is critical to a company in order to organise, manage and operate process in all sections. In order to implement AIS successfully, it is important to understand the underlying factors that influence the AIS adoption. Therefore, this research intends to study this perspective of factors influence and impact on AIS adoption’s success. The model has been designed to illustrate factors influences in AIS adoption. It also attempts to identify the critical success factors that organisations should focus on, to ensure the adoption on accounting process. This framework will be developed from case studies by collecting qualitative and quantitative data. Case study and survey methodology were adopted for this research. Case studies in two Thai- organisations were carried out. The results of the two main case studies suggested 9 factors that may have impact on in AIS adoption. Survey instrument was developed based on the findings from case studies. Two large-scale surveys were sent to selected members of Thailand Accountant, and Thailand Computer Society to further develop and test the research framework. The top three critical factors for ensuring AIS adoption were: top management commitment, steering committees, and Technical capability of AIS personnel. That is, it is now clear which factors impact in AIS adoption, and which of those factors are critical success factors for ensuring AIS adoption successes

Keywords: accounting information system, accounting information systems adoption, and inflecting AIS adoption

Procedia PDF Downloads 391
35114 Approximation of Geodesics on Meshes with Implementation in Rhinoceros Software

Authors: Marian Sagat, Mariana Remesikova

Abstract:

In civil engineering, there is a problem how to industrially produce tensile membrane structures that are non-developable surfaces. Nondevelopable surfaces can only be developed with a certain error and we want to minimize this error. To that goal, the non-developable surfaces are cut into plates along to the geodesic curves. We propose a numerical algorithm for finding approximations of open geodesics on meshes and surfaces based on geodesic curvature flow. For practical reasons, it is important to automatize the choice of the time step. We propose a method for automatic setting of the time step based on the diagonal dominance criterion for the matrix of the linear system obtained by discretization of our partial differential equation model. Practical experiments show reliability of this method. Because approximation of the model is made by numerical method based on classic derivatives, it is necessary to solve obstacles which occur for meshes with sharp corners. We solve this problem for big family of meshes with sharp corners via special rotations which can be seen as partial unfolding of the mesh. In practical applications, it is required that the approximation of geodesic has its vertices only on the edges of the mesh. This problem is solved by a specially designed pointing tracking algorithm. We also partially solve the problem of finding geodesics on meshes with holes. We implemented the whole algorithm in Rhinoceros (commercial 3D computer graphics and computer-aided design software ). It is done by using C# language as C# assembly library for Grasshopper, which is plugin in Rhinoceros.

Keywords: geodesic, geodesic curvature flow, mesh, Rhinoceros software

Procedia PDF Downloads 141
35113 Solving the Set Covering Problem Using the Binary Cat Swarm Optimization Metaheuristic

Authors: Broderick Crawford, Ricardo Soto, Natalia Berrios, Eduardo Olguin

Abstract:

In this paper, we present a binary cat swarm optimization for solving the Set covering problem. The set covering problem is a well-known NP-hard problem with many practical applications, including those involving scheduling, production planning and location problems. Binary cat swarm optimization is a recent swarm metaheuristic technique based on the behavior of discrete cats. Domestic cats show the ability to hunt and are curious about moving objects. The cats have two modes of behavior: seeking mode and tracing mode. We illustrate this approach with 65 instances of the problem from the OR-Library. Moreover, we solve this problem with 40 new binarization techniques and we select the technical with the best results obtained. Finally, we make a comparison between results obtained in previous studies and the new binarization technique, that is, with roulette wheel as transfer function and V3 as discretization technique.

Keywords: binary cat swarm optimization, binarization methods, metaheuristic, set covering problem

Procedia PDF Downloads 389
35112 Muhammad Bin Abi Al-Surūr Al-Bakriyy Al-Ṣiddīqiyy and His Approach to Interpretation: Sūrat Al-Fatḥ as an Example

Authors: Saleem Abu Jaber

Abstract:

Born into a Sufi family, in which his father and other relatives, as well as additional community members, were particularly rooted in scholarly and cultural inquiry, Muḥammad ʾAbū al-Surūr al-Bikriyy al-Ṣidīqiyy (1562–1598 CE) was a prominent scholar of his time. Despite his relative youth, he became influential in his writings, which included Quranic exegeses and works on Hadith, Arabic grammar, jurisprudence, and Sufism. He was also a practicing physician and was the first person to be named Mufti of the Sultanate in Egypt. He was active in the political arena, having been close to the Ottoman sultans, providing them his support and counsel. He strived for their empowerment and victory and often influenced their political convictions and actions. Al-Ṣidīqiyy enjoyed the patronage of his contemporary Ottoman Caliphate sultans. In general, these sultans always promoted studies in the Islamic sciences and were keen to support scholars and gain their trust. This paper addresses al-Ṣidīqiyy’s legacy as a Quranic commentator, focusing on his exegesis (tafsīr) of Sūrat al-Fatḥ (48), written in 1589. It appears in a manuscript found at the Süleymaniye Library in Istanbul, consisting of one volume of 144 pages. It is believed that no other manuscript containing the text of this exegesis is to be found in any other library or institute for Arabic manuscripts. According to al-Ṣabbāġ (1995), al-Ṣidīqiyy had written a complete commentary of the Quran, but efforts to recover it have only unearthed the current commentary, as well as that of Sūrat al-Kahf (18), Sūrat al-ʾAnʿām (6), and ʾĀyat al-Kursī (2:255). The only critical edition published to date is that of Sūrat al-Kahf. The other two are currently being prepared for publication as well. The paucity of scholarly studies on the works of al-Ṣidīqiyy renders the current study particularly significant, as it provides introduction to al-Ṣidīqiyy’s exegesis, a synopsis of the biographical and cultural background of its author and his family, and a critical evaluation of his scholarly contribution. It will introduce the manuscript on which this study is based and elaborate on the structure and rationale of the exegesis, on its very attribution to al-Ṣidīqiyy, and subsequently evaluate its overall significance to the understanding of Sufi approaches to Quranic interpretation in 16th century Ottoman Egypt. An analysis of al-Ṣidīqiyy’s approach to interpreting the Quran leads to the definitive conclusion that it indeed reflects Sufi principles. For instance, when citing other Sufi commentators, including his own ancestors, he uses the epithets mawlāna ‘our elder, our patron,’ al-ʾustāḏ ‘the master,’ unique to Sufi parlance. Crucially, his interpretation, is written in a realistic, uncomplicated, fetching style, as was customary among Sufi scholars of his time, whose leaning was one of clarity, based on their perception of themselves as being closest to Muḥammad and his family, and by extension to the sunna, as reflected in the traditional narrative of the Prophet’s biography and teachings.

Keywords: Quran’ sufiism, manuscript, exegesis, surah, Al-fath, sultanate, sunna

Procedia PDF Downloads 46
35111 Electronic Health Record System: A Perspective to Improve the Value of Services Rendered to Patients in Healthcare Organization in Rwanda, Case of CHUB and Hopital De Nemba

Authors: Mugabe Nzarama Gabriel

Abstract:

In Rwanda, many healthcare organizations are still using a paper based patients’ data record system although it still present weaknesses to share health patients’ information across different services when necessary. In developed countries, the EHR has been put in place to revolutionize the paper based record system but still the EHR has some challenges related to privacy, security, or interoperability. The purpose of this research was to assess the existing patients’ data record system in healthcare sector in Rwanda, see what an EHR can improve to the system in place and assess the acceptance of EHR as system which is interoperable, very secure and interoperable and see whether stakeholders are ready to adopt the system. The case based methodology was used and TAM theoretical framework to design the questionnaire for the survey. A judgmental sample across two cases, CHUB and Hopital de Nemba, has been selected and SPSS has been used for descriptive statistics. After a qualitative analysis, the findings showed that the paper based record is useful, gives complete information about the patient, protects the privacy of patients but it is still less secure and less interoperable. The respondents shown that they are ready to use the proposed EHR System and want it secure, capable of enforcing the privacy but still they are not all ready for the interoperability. A conclusion has been formulated; recommendations and further research have been proposed.

Keywords: EHR system, healthcare service, TAM, privacy, interoperability

Procedia PDF Downloads 262
35110 Aero-Hydrodynamic Model for a Floating Offshore Wind Turbine

Authors: Beatrice Fenu, Francesco Niosi, Giovanni Bracco, Giuliana Mattiazzo

Abstract:

In recent years, Europe has seen a great development of renewable energy, in a perspective of reducing polluting emissions and transitioning to cleaner forms of energy, as established by the European Green New Deal. Wind energy has come to cover almost 15% of European electricity needs andis constantly growing. In particular, far-offshore wind turbines are attractive from the point of view of exploiting high-speed winds and high wind availability. Considering offshore wind turbine siting that combines the resources analysis, the bathymetry, environmental regulations, and maritime traffic and considering the waves influence in the stability of the platform, the hydrodynamic characteristics of the platform become fundamental for the evaluation of the performances of the turbine, especially for the pitch motion. Many platform's geometries have been studied and used in the last few years. Their concept is based upon different considerations as hydrostatic stability, material, cost and mooring system. A new method to reach a high-performances substructure for different kinds of wind turbines is proposed. The system that considers substructure, mooring, and wind turbine is implemented in Orcaflex, and the simulations are performed considering several sea states and wind speeds. An external dynamic library is implemented for the turbine control system. The study shows the comparison among different substructures and the new concepts developed. In order to validate the model, CFD simulations will be performed by mean of STAR CCM+, and a comparison between rigid and elastic body for what concerns blades and tower will be carried out. A global model will be built to predict the productivity of the floating turbine according to siting, resources, substructure, and mooring. The Levelized Cost of Electricity (LCOE) of the system is estimated, giving a complete overview about the advantages of floating offshore wind turbine plants. Different case studies will be presented.

Keywords: aero-hydrodynamic model, computational fluid dynamics, floating offshore wind, siting, verification, and validation

Procedia PDF Downloads 207
35109 Dimensions of Guest Experience in Themed Hotels

Authors: Katalin Juhasz-Dora

Abstract:

Several studies have shown that physical environments, milieu, atmosphere and service space play a significant role in the consumer experience. In the case of themed servicescapes, different tangible assets (design, decoration, facilities, amenities), intangible assets (service, activities) contribute to the luxury guest experience. This current study summarizes the literature related to the guest experience in the case of luxury hotels. Based on the results of a case study, additional dimensions of guest experience are explored. The research findings contribute to the extension of literature by providing a conceptual framework in specific themed luxury hotels. Understanding the elements of themed servicescape and dimensions of guest experience play a significant role in consumer behavior. Implications for management and future research directions are presented.

Keywords: atmosphere, guest experience, luxury service, themed hotel

Procedia PDF Downloads 159
35108 Discourses in Mother Tongue-Based Classes: The Case of Hiligaynon Language

Authors: Kayla Marie Sarte

Abstract:

This study sought to describe mother tongue-based classes in the light of classroom interactional discourse using the Sinclair and Coulthard model. It specifically identified the exchanges, grouped into Teaching and Boundary types; moves, coded as Opening, Answering and Feedback; and the occurrence of the 13 acts (Bid, Cue, Nominate, Reply, React, Acknowledge, Clue, Accept, Evaluate, Loop, Comment, Starter, Conclusion, Aside and Silent Stress) in the classroom, and determined what these reveal about the teaching and learning processes in the MTB classroom. Being a qualitative study, using the Single Collective Case Within-Site (embedded) design, varied data collection procedures such as non-participant observations, audio-recordings and transcription of MTB classes, and semi-structured interviews were utilized. The results revealed the presence of all the codes in the model (except for the silent stress) which also implied that the Hiligaynon mother tongue-based class was eclectic, cultural and communicative, and had a healthy, analytical and focused environment which aligned with the aims of MTB-MLE, and affirmed the purported benefits of mother tongue teaching. Through the study, gaps in the mother tongue teaching and learning were also identified which involved the difficulty of children in memorizing Hiligaynon terms expressed in English in their homes and in the communities.

Keywords: discourse analysis, language teaching and learning, mother tongue-based education, multilingualism

Procedia PDF Downloads 255
35107 A Case Study in Using the Can-Sized Satellite Platforms for Interdisciplinary Problem-Based Learning in Aeronautical and Electronic Engineering

Authors: Michael Johnson, Vincenzo Oliveri

Abstract:

This work considers an interdisciplinary Problem-Based Learning (PBL) project developed by lecturers from the Aeronautical and Electronic and Computer Engineering departments at the University of Limerick. This “CANSAT” project utilises the CanSat can-sized satellite platform in order to allow students from aeronautical and electronic engineering to engage in a mixed format (online/face-to-face), interdisciplinary PBL assignment using a real-world platform and application. The project introduces students to the design, development, and construction of the CanSat system over the course of a single semester, enabling student(s) to apply their aeronautical and technical skills/capabilities to the realisation of a working CanSat system. In this case study, the CanSat kits are used to pivot the real-world, discipline-relevant PBL goal of designing, building, and testing the CanSat system with payload(s) from a traditional module-based setting to an online PBL setting. Feedback, impressions, benefits, and challenges identified through the semester are presented. Students found the project to be interesting and rewarding, with the interdisciplinary nature of the project appealing to them. Challenges and difficulties encountered are also addressed, with solutions developed between the students and facilitators to overcoming these discussed.

Keywords: problem-based learning, interdisciplinary, engineering, CanSATs

Procedia PDF Downloads 127
35106 Flood Planning Based on Risk Optimization: A Case Study in Phan-Calo River Basin in Vinh Phuc Province, Vietnam

Authors: Nguyen Quang Kim, Nguyen Thu Hien, Nguyen Thien Dung

Abstract:

Flood disasters are increasing worldwide in both frequency and magnitude. Every year in Vietnam, flood causes great damage to people, property, and environmental degradation. The flood risk management policy in Vietnam is currently updated. The planning of flood mitigation strategies is reviewed to make a decision how to reach sustainable flood risk reduction. This paper discusses the basic approach where the measures of flood protection are chosen based on minimizing the present value of expected monetary expenses, total residual risk and costs of flood control measures. This approach will be proposed and demonstrated in a case study for flood risk management in Vinh Phuc province of Vietnam. Research also proposed the framework to find a solution of optimal protection level and optimal measures of the flood. It provides an explicit economic basis for flood risk management plans and interactive effects of options for flood damage reduction. The results of the case study are demonstrated and discussed which would provide the processing of actions helped decision makers to choose flood risk reduction investment options.

Keywords: drainage plan, flood planning, flood risk, residual risk, risk optimization

Procedia PDF Downloads 229
35105 Gender and Political Participation in Africa

Authors: Ibrahim Baba

Abstract:

The work examines the nature and causes of differential politics in Africa with particular reference to the sub-Saharan region of the continent. It also among other objectives provides alternative panacea to gender discrimination in African politics and offers solutions on how to promote political inclusion of all citizens in respect of gender differences in Africa. The work is conducted using library base documentation analysis.

Keywords: gender, political, participation, differential politics, sub-Saharan Africa

Procedia PDF Downloads 416
35104 Block Based Imperial Competitive Algorithm with Greedy Search for Traveling Salesman Problem

Authors: Meng-Hui Chen, Chiao-Wei Yu, Pei-Chann Chang

Abstract:

Imperial competitive algorithm (ICA) simulates a multi-agent algorithm. Each agent is like a kingdom has its country, and the strongest country in each agent is called imperialist, others are colony. Countries are competitive with imperialist which in the same kingdom by evolving. So this country will move in the search space to find better solutions with higher fitness to be a new imperialist. The main idea in this paper is using the peculiarity of ICA to explore the search space to solve the kinds of combinational problems. Otherwise, we also study to use the greed search to increase the local search ability. To verify the proposed algorithm in this paper, the experimental results of traveling salesman problem (TSP) is according to the traveling salesman problem library (TSPLIB). The results show that the proposed algorithm has higher performance than the other known methods.

Keywords: traveling salesman problem, artificial chromosomes, greedy search, imperial competitive algorithm

Procedia PDF Downloads 454
35103 Wavelet-Based Classification of Myocardial Ischemia, Arrhythmia, Congestive Heart Failure and Sleep Apnea

Authors: Santanu Chattopadhyay, Gautam Sarkar, Arabinda Das

Abstract:

This paper presents wavelet based classification of various heart diseases. Electrocardiogram signals of different heart patients have been studied. Statistical natures of electrocardiogram signals for different heart diseases have been compared with the statistical nature of electrocardiograms for normal persons. Under this study four different heart diseases have been considered as follows: Myocardial Ischemia (MI), Congestive Heart Failure (CHF), Arrhythmia and Sleep Apnea. Statistical nature of electrocardiograms for each case has been considered in terms of kurtosis values of two types of wavelet coefficients: approximate and detail. Nine wavelet decomposition levels have been considered in each case. Kurtosis corresponding to both approximate and detail coefficients has been considered for decomposition level one to decomposition level nine. Based on significant difference, few decomposition levels have been chosen and then used for classification.

Keywords: arrhythmia, congestive heart failure, discrete wavelet transform, electrocardiogram, myocardial ischemia, sleep apnea

Procedia PDF Downloads 128
35102 Applying Knowledge Management and Attitude Based on Holistic Approach in Learning Andragogy, as an Effort to Solve Environmental Problems after Mining Activities

Authors: Aloysius Hardoko, Susilo

Abstract:

The root cause of environmental damage post coal mining activities as determined by the province of East Kalimantan as a corridor of economic activity masterplan acceleration of economic development expansion (MP3EI) is the behavior of adults. Adult behavior can be changed through knowledge management and attitude. Based on the root of the problem, the objective of the research is to apply knowledge management and attitude based on holistic approach in learning andragogy as an effort to solve environmental problems after coal mining activities. Research methods to achieve the objective of using quantitative research with pretest posttest group design. Knowledge management and attitudes based on a holistic approach in adult learning are applied through initial learning activities, core and case-based cover of environmental damage. The research instrument is a description of the case of environmental damage. The data analysis uses t-test to see the effect of knowledge management attitude based on holistic approach before and after adult learning. Location and sample of representative research of adults as many as 20 people in Kutai Kertanegara District, one of the districts in East Kalimantan province, which suffered the worst environmental damage. The conclusion of the research result is the application of knowledge management and attitude in adult learning influence to adult knowledge and attitude to overcome environmental problem post coal mining activity.

Keywords: knowledge management and attitude, holistic approach, andragogy learning, environmental damage

Procedia PDF Downloads 236
35101 Comparison with Mechanical Behaviors of Mastication in Teeth Movement Cases

Authors: Jae-Yong Park, Yeo-Kyeong Lee, Hee-Sun Kim

Abstract:

Purpose: This study aims at investigating the mechanical behaviors of mastication, according to various teeth movement. There are three masticatory cases which are general case and 2 cases of teeth movement. General case includes the common arrange of all teeth and 2 cases of teeth movement are that one is the half movement location case of molar teeth in no. 14 tooth seat after extraction of no. 14 tooth and the other is no. 14 tooth seat location case of molar teeth after extraction in the same case before. Materials and Methods: In order to analyze these cases, 3 dimensional finite element (FE) model of the skull were generated based on computed tomography images, 964 dicom files of 38 year old male having normal occlusion status. An FE model in general occlusal case was used to develop CAE procedure. This procedure was applied to FE models in other occlusal cases. The displacement controls according to loading condition were applied effectively to simulate occlusal behaviors in all cases. From the FE analyses, von Mises stress distribution of skull and teeth was observed. The von Mises stress, effective stress, had been widely used to determine the absolute stress value, regardless of stress direction and yield characteristics of materials. Results: High stress was distributed over the periodontal area of mandible under molar teeth when the mandible was transmitted to the coronal-apical direction in the general occlusal case. According to the stress propagation from teeth to cranium, stress distribution decreased as the distribution propagated from molar teeth to infratemporal crest of the greater wing of the sphenoid bone and lateral pterygoid plate in general case. In 2 cases of teeth movement, there were observed that high stresses were distributed over the periodontal area of mandible under teeth where they are located under the moved molar teeth in cranium. Conclusion: The predictions of the mechanical behaviors of general case and 2 cases of teeth movement during the masticatory process were investigated including qualitative validation. The displacement controls as the loading condition were applied effectively to simulate occlusal behaviors in 2 cases of teeth movement of molar teeth.

Keywords: cranium, finite element analysis, mandible, masticatory action, occlusal force

Procedia PDF Downloads 386
35100 CO₂ Capture by Membrane Applied to Steel Production Process

Authors: Alexandra-Veronica Luca, Letitia Petrescu

Abstract:

Steel production is a major contributor to global warming potential. An average value of 1.83 tons of CO₂ is emitted for every ton of steel produced, resulting in over 3.3 Mt of CO₂ emissions each year. The present paper is focused on the investigation and comparison of two O₂ separation methods and two CO₂ capture technologies applicable to iron and steel industry. The O₂ used in steel production comes from an Air Separation Unit (ASU) using distillation or from air separation using membranes. The CO₂ capture technologies are represented by a two-stage membrane separation process and the gas-liquid absorption using methyl di-ethanol amine (MDEA). Process modelling and simulation tools, as well as environmental tools, are used in the present study. The production capacity of the steel mill is 4,000,000 tones/year. In order to compare the two CO₂ capture technologies in terms of efficiency, performance, and sustainability, the following cases have been investigated: Case 1: steel production using O₂ from ASU and no CO₂ capture; Case 2: steel production using O₂ from ASU and gas-liquid absorption for CO₂ capture; Case 3: steel production using O₂ from ASU and membranes for CO₂ capture; Case 4: steel production using O₂ from membrane separation method and gas-liquid absorption for CO₂ capture and Case-5: steel production using membranes for air separation and CO₂ capture. The O₂ separation rate obtained in the distillation technology was about 96%, and about 33% in the membrane technology. Similarly, the O₂ purity resulting in the conventional process (i.e. distillation) is higher compared to the O₂ purity obtained in the membrane unit (e.g., 99.50% vs. 73.66%). The air flow-rate required for membrane separation is about three times higher compared to the air flow-rate for cryogenic distillation (e.g., 549,096.93 kg/h vs. 189,743.82 kg/h). A CO₂ capture rate of 93.97% was obtained in the membrane case, while the CO₂ capture rate for the gas-liquid absorption was 89.97%. A quantity of 6,626.49 kg/h CO₂ with a purity of 95.45% is separated from the total 23,352.83 kg/h flue-gas in the membrane process, while with absorption of 6,173.94 kg/h CO₂ with a purity of 98.79% is obtained from 21,902.04 kg/h flue-gas and 156,041.80 kg/h MDEA is recycled. The simulation results, performed using ChemCAD process simulator software, lead to the conclusion that membrane-based technology can be a suitable alternative for CO₂ removal for steel production. An environmental evaluation using Life Cycle Assessment (LCA) methodology was also performed. Considering the electricity consumption, the performance, and environmental indicators, Case 3 can be considered the most effective. The environmental evaluation, performed using GaBi software, shows that membrane technology can lead to lower environmental emissions if membrane production is based on benzene derived from toluene hydrodealkilation and chlorine and sodium hydroxide are produced using mixed technologies.

Keywords: CO₂ capture, gas-liquid absorption, Life Cycle Assessment, membrane separation, steel production

Procedia PDF Downloads 286
35099 The Significance of Organizational Failure Based on the Instance of Samsung Lions Case

Authors: Jae Soo Do, Kyoung Seok Kim

Abstract:

Korea baseball experts reckoned Samsung Lions as the best baseball team. It has the unparalleled records of winning first place in the pennant race for five straight years from 2011 to 2015 and winning the Korean series for four years in a row from 2011 to 2014. However, the team made an unbelievably miserable record of ninth place in the pennant race in 2016 and 2017. How come the strong competitive superiority has gone and what kind of slump made the team how it is now. This study investigates this organizational failure case of Samsung Lions, the professional baseball team in Korea. What factors have brought the organizational failure to Samsung Lions? Based on an in-depth examination on how a league-fore-runner drastically lost its competitive superiority, this verifies the necessity of risk management to which common corporations as well as sport teams can be subject at any time in these days.

Keywords: Samsung Lions, organizational failure, baseball, slump

Procedia PDF Downloads 312
35098 The Micro-Activated Organic Regeneration in Rural Construction: A Case Study of Yangdun Village in Deqing County, Zhejiang Province

Authors: Chengyuan Zhu, Zhu Wang

Abstract:

With the strategy of Rural Rejuvenation proposed in China, the rural has become the focus of all works today. In addition to the support of industry and policy, the rural planning and construction which is the space dependence of Rural Rejuvenation are also very crucial. Based on an analysis of the case of Yangdun Village in Deqing County, this paper summarizes village existing resources and construction status quo. It tries to illuminate the micro-activated organic renewal strategies and methods, based on ecological landscape, history context, industry development and living life requirements. It takes advantage of industrial linkage and then asks for the coordination of both spatial and industrial planning, the revival and remodeling of the rural image can be achieved through shaping the of architectural and landscape nodes as well as the activation of street space.

Keywords: rural construction, rural human settlements, micro-activation, organic renewal

Procedia PDF Downloads 223
35097 Production of Pour Point Depressant for Paraffinic Crude Oils

Authors: Mosaad Attia Elkasaby

Abstract:

The crude oil contains paraffines, aromatics, and asphaltenes in addition to some organic impurities, with increasing demands to reduce the cost of crude oil production, the uses of a pour point depressant is mandatory to maintain good flow rate. The wax materials cause many problems during production, storage, and transport, especially at low temperature, as these waxes tend, at low temperatures, to precipitate on the wall lines, thus leads to the high viscosity of crude oil and impede the flow rate, which represents an additional burden for crude oil pumping system from the place of production to the refinery. There are many ways to solve this problem, including, but not limited to, heat the crude and the use of organic solvents. But one of the most important disadvantages of these methods is the high economic cost. The aim of this innovation is to manufacture some polymeric materials (polymers based on aniline) that are processed locally that can be used as a pour point depressant of crude oil. For the first time, polymer based on aniline is modified and used with a number of organic solvents and tested with solvent (Styrene). It was found that the polymer based on aniline, when modified, had full solubility in styrene, unlike other organic solvent that was used in the past, such as chloroform and toluene. We also used a new solvent (PONA) that is obtained from the process of hydrotreating and separation of straight run naphtha to dissolve polymer based on aniline as a pour point depressant of crude oil. This innovative include studies conducted on highly paraffinic crude oil (C.O.1 and C.O.2). On using concentration (2500 ppm) of polymer based on aniline, the pour point of crude oil has decreased from +33 to - 9°C in case of crude oil (C.O.1) and from + 42 to – 6°C in case crude oil (C.O.2) at the same concentration.

Keywords: PPD, aniline, paraffinic crude oils, polymers

Procedia PDF Downloads 86