Search results for: imprecise number
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9934

Search results for: imprecise number

6124 A Query Optimization Strategy for Autonomous Distributed Database Systems

Authors: Dina K. Badawy, Dina M. Ibrahim, Alsayed A. Sallam

Abstract:

Distributed database is a collection of logically related databases that cooperate in a transparent manner. Query processing uses a communication network for transmitting data between sites. It refers to one of the challenges in the database world. The development of sophisticated query optimization technology is the reason for the commercial success of database systems, which complexity and cost increase with increasing number of relations in the query. Mariposa, query trading and query trading with processing task-trading strategies developed for autonomous distributed database systems, but they cause high optimization cost because of involvement of all nodes in generating an optimal plan. In this paper, we proposed a modification on the autonomous strategy K-QTPT that make the seller’s nodes with the lowest cost have gradually high priorities to reduce the optimization time. We implement our proposed strategy and present the results and analysis based on those results.

Keywords: autonomous strategies, distributed database systems, high priority, query optimization

Procedia PDF Downloads 510
6123 Cooperative Jamming for Implantable Medical Device Security

Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed

Abstract:

Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.

Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing

Procedia PDF Downloads 86
6122 In vitro Environmental Factors Controlling Root Morphological Traits of Pineapple (Ananas comosus L. Merr)

Authors: S. Mohajer , R. M. Taha, M. Adel

Abstract:

Developing our knowledge of when pineapple roots grow can lead to improved water, fertilizer applications, and more precise culture management. This paper presents current understanding of morphological traits in pineapple roots, highlighting studies using incubation periods and various solid MS media treated with different sucrose concentrations and pH, which directly assess in vitro environmental factors. Rooting parameters had different optimal sucrose concentrations and incubation periods. All shoots failed to root in medium supplemented with sucrose at 5 g/L and no roots formed within the first 45 days in medium enriched with sucrose at 10 g/L. After 75 days, all shoots rooted in medium enriched with 10 and 20 g/L sucrose. Moreover, MS medium supplied with 20 g/L sucrose resulted in the longest and the highest number of roots with 27.3 mm and 4.7, respectively. Root function, such as capacity for P and N uptake, declined rapidly with root length. As a result, the longer the incubation period, the better the rooting responses would be.

Keywords: environmental factors, in vitro rooting, pineapple, tissue culture

Procedia PDF Downloads 370
6121 The Use of Mobile Phones by Refugees to Create Social Connectedness: A Literature Review

Authors: Sarah Vuningoma, Maria Rosa Lorini, Wallace Chigona

Abstract:

Mobile phones are one of the main tools for promoting the wellbeing of people and supporting the integration of communities on the margins such as refugees. Information and Communication Technology has the potential to contribute towards reducing isolation, loneliness, and to assist in improving interpersonal relations and fostering acculturation processes. Therefore, the use of mobile phones by refugees might contribute to their social connectedness. This paper aims to demonstrate how existing literature has shown how the use of mobile phones by refugees should engender social connectedness amongst the refugees. Data for the study are drawn from existing literature; we searched a number of electronic databases for papers published between 2010 and 2019. The main findings of the study relate to the use of mobile phones by refugees to (i) create a sense of belonging, (ii) maintain relationships, and (iii) advance the acculturation process. The analysis highlighted a gap in the research over refugees and social connectedness. In particular, further studies should consider evaluating the differences between those who have a refugee permit, those who are waiting for the refugee permit, and those whose request was denied.

Keywords: belonging, mobile phones, refugees, social connectedness

Procedia PDF Downloads 183
6120 Extended Knowledge Exchange with Industrial Partners: A Case Study

Authors: C. Fortin, D. Tokmeninova, O. Ushakova

Abstract:

Among 500 Russian universities Skolkovo Institute of Science and Technology (Skoltech) is one of the youngest (established in 2011), quite small and vastly international, comprising 20 percent of international students and 70 percent of faculty with significant academic experience at top-100 universities (QS, THE). The institute has emerged from close collaboration with MIT and leading Russian universities. Skoltech is an entirely English speaking environment. Skoltech curriculum plans of ten Master programs are based on the CDIO learning outcomes model. However, despite the Institute’s unique focus on industrial innovations and startups, one of the main challenges has become an evident large proportion of nearly half of MSc graduates entering PhD programs at Skoltech or other universities rather than industry or entrepreneurship. In order to increase the share of students joining the industrial sector after graduation, Skoltech started implementing a number of unique practices with a focus on employers’ expectations incorporated into the curriculum redesign. In this sense, extended knowledge exchange with industrial partners via collaboration in learning activities, industrial projects and assessments became essential for students’ headway into industrial and entrepreneurship pathways. Current academic curriculum includes the following types of components based on extended knowledge exchange with industrial partners: innovation workshop, industrial immersion, special industrial tracks, MSc defenses. Innovation workshop is a 4 week full time diving into the Skoltech vibrant ecosystem designed to foster innovators, focuses on teamwork, group projects, and sparks entrepreneurial instincts from the very first days of study. From 2019 the number of mentors from industry and startups significantly increased to guide students across these sectors’ demands. Industrial immersion is an exclusive part of Skoltech curriculum where students after the first year of study spend 8 weeks in an industrial company carrying out an individual or team project and are guided jointly by both Skoltech and company supervisors. The aim of the industrial immersion is to familiarize students with relevant needs of Russian industry and to prepare graduates for job placement. During the immersion a company plays the role of a challenge provider for students. Skoltech has started a special industrial track comprising deep collaboration with IPG Photonics – a leading R&D company and manufacturer of high-performance fiber lasers and amplifiers for diverse applications. The track is aimed to train a new cohort of engineers and includes a variety of activities for students within the “Photonics” MSc program. It is expected to be a successful story and used as an example for similar initiatives with other Russian high-tech companies. One of the pathways of extended knowledge exchange with industrial partners is an active involvement of potential employers in MSc Defense Committees to review and assess MSc thesis projects and to participate in defense procedures. The paper will evaluate the effect and results of the above undertaken measures.

Keywords: Curriculum redesign, knowledge exchange model, learning outcomes framework, stakeholder engagement

Procedia PDF Downloads 67
6119 Key Determinants of Human-Wolf (Canis lupus) Conflict in Shabestar County's Villages of East Azerbaijan Province, Iran

Authors: Nader Habibzadeh

Abstract:

Developing effective and well-targeted conservation strategies is dependent upon fully understanding the complexities of the local situation. We attempted to discern the main likely wolf-human conflict contributing variables in households of Shabestar county’s villages. Data were collected through questions in 53 semi-structured interviews in 36 villages across Shabestar district in summer 2014. The results suggested that people who have reportedly suffered livestock depredation and who have alternative income sources to livestock, are likely to be particularly hostile toward wildlife. With rapid assessment of households using these few key variables we are able to identify likely conflict hotspots and target conflict resolution efforts in those villages. Based on these results, the most important initial strategies for reducing conflict would be reducing the number of livestock killed by wolf, increasing opportunities to generate income only from livestock holdings rather than alternative income sources.

Keywords: human-wildlife conflict, wolf (Canis lupus), Shabestar, Iran

Procedia PDF Downloads 290
6118 Study of Energy Efficient and Quality of Service Based Routing Protocols in Wireless Sensor Networking

Authors: Sachin Sharma

Abstract:

A wireless sensor network (WSN) consists of a large number of sensor nodes which are deployed over an area to perform local computations based on information gathered from the surroundings. With the increasing demand for real-time applications in WSN, real-time critical events anticipate an efficient quality-of-service (QoS) based routing for data delivery from the network infrastructure. Hence, maximizing the lifetime of the network through minimizing the energy is an important challenge in WSN; sensors cannot be easily replaced or recharged due to their ad-hoc deployment in a hazardous environment. Considerable research has been focused on developing robust energy efficient QoS based routing protocols. The main focus of this article is primarily on periodical cycling schemes which represent the most compatible technique for energy saving and we also focus on the data-driven approaches that can be used to improve the energy efficiency. Finally, we will make a review on some communication protocols proposed for sensor networks.

Keywords: energy efficient, quality of service, wireless sensor networks, MAC

Procedia PDF Downloads 329
6117 The Psychological Impact of Acute Occupational Hand Trauma

Authors: Michelle Roesler, Ian Glendon, Francis O'Callaghan

Abstract:

This study expands on recent findings and offers a new perspective on recovery from injury and return to work (RTW) after an acute traumatic occupational hand injury. Recovery is a complex medical and psychosocial process. A number of predictor variables were studied simultaneously to identify the bio-psychosocial variables that impede recovery. An unexpected phenomenon to emerge from this study was the high incidence of complications within the hand-injured patient sample. Twenty six percent (n = 71) of the total sample (N = 263) required a second operation due to complications. This warranted further investigation. Results confirmed that complications not only significantly delayed the RTW outcome but also had a profound psychological impact on the individuals affected. Research has found that surgical complications are usually the result of incorrect early assessment and management. A strategic plan needs to be implemented to ensure the optimal level of surgical care is provided for managing acute traumatic hand injuries to avoid such complications.

Keywords: occupational hand trauma, psychological recovery, return to work, psychology

Procedia PDF Downloads 493
6116 Prediction of the Thermal Parameters of a High-Temperature Metallurgical Reactor Using Inverse Heat Transfer

Authors: Mohamed Hafid, Marcel Lacroix

Abstract:

This study presents an inverse analysis for predicting the thermal conductivities and the heat flux of a high-temperature metallurgical reactor simultaneously. Once these thermal parameters are predicted, the time-varying thickness of the protective phase-change bank that covers the inside surface of the brick walls of a metallurgical reactor can be calculated. The enthalpy method is used to solve the melting/solidification process of the protective bank. The inverse model rests on the Levenberg-Marquardt Method (LMM) combined with the Broyden method (BM). A statistical analysis for the thermal parameter estimation is carried out. The effect of the position of the temperature sensors, total number of measurements and measurement noise on the accuracy of inverse predictions is investigated. Recommendations are made concerning the location of temperature sensors.

Keywords: inverse heat transfer, phase change, metallurgical reactor, Levenberg–Marquardt method, Broyden method, bank thickness

Procedia PDF Downloads 318
6115 Optimization of Flip Bucket Dents in Order to Reduce Scour Hole Depth (Plunge Pool) Using a Comprehensive Physical Model

Authors: Majid Galoie, Khodadad Safavi, Abdolreza Karami Nejad, Reza Roshan

Abstract:

Scour downstream of a flip bucket in a plunge pool is caused by impingement of water jet force. In order to reduce this force and consequently reduce scour hole depth, flip buckets may equip by dents. The minimum scour hole depth might be occurred by optimization of dents (number, shape, placement) on flip buckets. In this study, a comprehensive physical model has been developed and various options for dents have been investigated. The experimental data for each dent option such as scour hole depth, angle of impingement jet, piezometric pressure in tail-water and jet trajectory have been measured for various discharges. Finally, the best option can be found by analysis of the experimental results which has been expressed in this paper.

Keywords: scouring process, plunge pool, scour hole depth, physical model, flip bucket

Procedia PDF Downloads 381
6114 The Effect of Gross Vehicle Weight on the Stability of Heavy Vehicle during Cornering

Authors: Nurzaki Ikhsan, Ahmad Saifizul Abdullah, Rahizar Ramli

Abstract:

One of the functions of the commercial heavy vehicle is to safely and efficiently transport goods and people. Due to its size and carrying capacity, it is important to study the vehicle dynamic stability during cornering. Study has shown that there are a number of overloaded heavy vehicles or permissible gross vehicle weight (GVW) violations recorded at selected areas in Malaysia assigned by its type and category. Thus, the objective of this study is to investigate the correlation and effect of the GVW on heavy vehicle stability during cornering event using simulation. Various selected heavy vehicle types and category are simulated using IPG/Truck Maker® with different GVW and road condition (coefficient of friction of road surface), while the speed, driver characteristic, center of gravity of load and road geometry are constant. Based on the analysis, the relationship between GVW and lateral acceleration were established. As expected, on the same value of coefficient of friction, the maximum lateral acceleration would be increased as the GVW increases.

Keywords: heavy vehicle, road safety, vehicle stability, lateral acceleration, gross vehicle weight

Procedia PDF Downloads 514
6113 The Effects of the Corporate Governance on the Level of Internet Financial Reporting: Evidence from Turkish Companies

Authors: Raif Parlakkaya, Umran Kahraman, Huseyin Cetin

Abstract:

Internet financial reporting and corporate governance issues are in the focus of academic and professional studies due to their attributed importance by stakeholders of corporations. Major aim of this study is to reveal the relationship between internet financial reporting which is held as dependent variable and some indicators of corporate governance such as the ratio of managerial ownership, blockholder ownership, number of independent members in the board of directors, frequency of meetings by audit committee and education level of audit committee members which are held as independent variables. Main purpose is to reveal the effect of corporate governance on the voluntary efforts of Internet Financial reporting. The scope of the research is limited to the Turkish Corporations listed in Borsa Istanbul (Istanbul Stock Exchange) and findings which are generated by means of SPSS software are revealed in results section and interpreted in conclusions.

Keywords: audit committee, corporate governance, internet financial reporting, managerial ownership

Procedia PDF Downloads 504
6112 Acute Toxicity and the Effects of dichromate potassium (K2Cr2O7) in sobaity seabream (Sparidebtex hasta)

Authors: Elnaz Erfani, Elahe Erfni

Abstract:

In this study, 96h LC50 values of dichromate potassium (K2Cr2O7), a highly toxicant heavy metal on sobaity seabream, Sparidebtex hasta of average weight mean weight 3.24 g; mean length 5.35cm was determined. At first, for rang finding test, fish were exposed to K2Cr2O7 at several selected concentrations 5, 10, 20, 30, 40, 50 and 60 mg/L, then fish exposed to five concentrations control, 40, 45, 50 and 55 mg/L of K2Cr2O7 for LC50-96h. The experiment was carried out in triplicate, and 21 fish per each treatment, Physicochemical properties of water were measured continuously throughout the experiment. The temperature, pH, dissolved oxygen and salinity were 26 ◦c, 7.05, 8.84 mgO2 L-1 and 37.5 ppt, respectively. A number of mortality and behavioral responses of fish were recorded after 24, 48, 72 and 96 h. LC50 values were determined with probate analysis. The 96 hour LC50 value of K2Cr2O7 to the fish was found to be 48.82 ppm. In addition, behavioural changes increased with increased concentration. The results obtained in this study clearly revealed the fact that it is necessary to control the use of a heavy metal such as dichromate potassium.

Keywords: marin fish- lc50, dicromat potassium, lc50, mortality

Procedia PDF Downloads 178
6111 Analysis of the Interference from Risk-Determining Factors of Cooperative and Conventional Construction Contracts

Authors: E. Harrer, M. Mauerhofer, T. Werginz

Abstract:

As a result of intensive competition, the building sector is suffering from a high degree of rivalry. Furthermore, there can be observed an unbalanced distribution of project risks. Clients are aimed to shift their own risks into the sphere of the constructors or planners. The consequence of this is that the number of conflicts between the involved parties is inordinately high or even increasing; an alternative approach to counter on that developments are cooperative project forms in the construction sector. This research compares conventional contract models and models with partnering agreements to examine the influence on project risks by an early integration of the involved parties. The goal is to show up deviations in different project stages from the design phase to the project transfer phase. These deviations are evaluated by a survey of experts from the three spheres: clients, contractors and planners. By rating the influence of the participants on specific risk factors it is possible to identify factors which are relevant for a smooth project execution.

Keywords: building projects, contract models, partnering, project risks

Procedia PDF Downloads 258
6110 Elephant Herding Optimization for Service Selection in QoS-Aware Web Service Composition

Authors: Samia Sadouki Chibani, Abdelkamel Tari

Abstract:

Web service composition combines available services to provide new functionality. Given the number of available services with similar functionalities and different non functional aspects (QoS), the problem of finding a QoS-optimal web service composition is considered as an optimization problem belonging to NP-hard class. Thus, an optimal solution cannot be found by exact algorithms within a reasonable time. In this paper, a meta-heuristic bio-inspired is presented to address the QoS aware web service composition; it is based on Elephant Herding Optimization (EHO) algorithm, which is inspired by the herding behavior of elephant group. EHO is characterized by a process of dividing and combining the population to sub populations (clan); this process allows the exchange of information between local searches to move toward a global optimum. However, with Applying others evolutionary algorithms the problem of early stagnancy in a local optimum cannot be avoided. Compared with PSO, the results of experimental evaluation show that our proposition significantly outperforms the existing algorithm with better performance of the fitness value and a fast convergence.

Keywords: bio-inspired algorithms, elephant herding optimization, QoS optimization, web service composition

Procedia PDF Downloads 313
6109 Checklist of Odonata of Shasha Forest Reserve, Ife Southern, Osun State, Nigeria

Authors: Ehikhamele Isaac Erhomosele, Ogbogu Sunday Sylvester

Abstract:

A biodiversity survey was conducted in Shasha Forest Reserve, Ife southern, Osun State, Nigeria between May 2019 to April 2021 with a view to determining the nature of Odonata fauna of the forest. A total number of 1055 individuals of adult dragonflies and damselflies belonging to 8 families (Aeshnidae, Calopterygidae, Chlorocyphidae, Coenagrionidae, Gomphidae, Lestidae, Libellulidae and Platycnemididae) were recorded. Five (5) of these families of which belong to the suborder Zygoptera, and the remaining three (3) to Anisoptera. Libellulidae was the most abundant family while Gomphidae recorded the least representative. No new species of Odonata was recorded. Most of the families reported were previously been documented in the tropical region. Logging activities and human disturbance have been attributed to the nature of Odonata species in the Forest. It is therefore recommended that logging should be restricted to designated areas of the forest and regulated by the Department of Forestry of Osun State Ministry of Agriculture and Natural Resources in conjunction with the Federal Ministry of Environment.

Keywords: checklist, Odonata, Shasha, families

Procedia PDF Downloads 90
6108 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 91
6107 Mathematical Model for Interaction Energy of Toroidal Molecules and Other Nanostructures

Authors: Pakhapoom Sarapat, James M. Hill, Duangkamon Baowan

Abstract:

Carbon nanotori provide several properties such as high tensile strength and heat resistance. They are promised to be ideal structures for encapsulation, and their encapsulation ability can be determined by the interaction energy between the carbon nanotori and the encapsulated nanostructures. Such interaction energy is evaluated using Lennard-Jones potential and continuum approximation. Here, four problems relating to toroidal molecules are determined in order to find the most stable configuration. Firstly, the interaction energy between a carbon nanotorus and an atom is examined. The second problem relates to the energy of a fullerene encapsulated inside a carbon nanotorus. Next, the interaction energy between two symmetrically situated and parallel nanotori is considered. Finally, the classical mechanics is applied to model the interaction energy between the toroidal structure of cyclodextrin and the spherical DNA molecules. These mathematical models might be exploited to study a number of promising devices for future developments in bio and nanotechnology.

Keywords: carbon nanotori, continuum approximation, interaction energy, Lennard-Jones potential, nanotechnology

Procedia PDF Downloads 133
6106 The Impact of Artificial Intelligence on Construction Engineering

Authors: Mina Fawzy Ishak Gad Elsaid

Abstract:

There is a strong link between technology and development. Architecture as a profession is a call to service and society. Maybe next to soldiers, engineers and patriots. However, unlike soldiers, they always remain employees of society under all circumstances. Despite the construction profession's role in society, there appears to be a lack of respect as some projects fail. This paper focuses on the need to improve development engineering performance in developing countries, using engineering education in Nigerian universities as a tool for discussion. A purposeful survey, interviews and focus group discussions were conducted on one hundred and twenty (120) prominent companies in Nigeria. The subject is approached through a large number of projects that companies have been involved in from the planning stage, some of which have been completed and even reached the maintenance and monitoring stage. It has been found that certain factors beyond the control of engineers are hindering the full development and success of the construction sector in developing countries. The main culprit is corruption and its eradication will put the country on a stable path to develop construction and combat poverty.

Keywords: decision analysis, industrial engineering, direct vs. indirect values, engineering management

Procedia PDF Downloads 9
6105 The Impact of Artificial Intelligence on Construction Engineering

Authors: Haneen Joseph Habib Yeldoka

Abstract:

There is a strong link between technology and development. Architecture as a profession is a call to service and society. Maybe next to soldiers, engineers and patriots. However, unlike soldiers, they always remain employees of society under all circumstances. Despite the construction profession's role in society, there appears to be a lack of respect as some projects fail. This paper focuses on the need to improve development engineering performance in developing countries, using engineering education in Nigerian universities as a tool for discussion. A purposeful survey, interviews and focus group discussions were conducted on one hundred and twenty (120) prominent companies in Nigeria. The subject is approached through a large number of projects that companies have been involved in from the planning stage, some of which have been completed and even reached the maintenance and monitoring stage. It has been found that certain factors beyond the control of engineers are hindering the full development and success of the construction sector in developing countries. The main culprit is corruption and its eradication will put the country on a stable path to develop construction and combat poverty.

Keywords: decision analysis, industrial engineering, direct vs. indirect values, engineering management

Procedia PDF Downloads 10
6104 Sparse-View CT Reconstruction Based on Nonconvex L1 − L2 Regularizations

Authors: Ali Pour Yazdanpanah, Farideh Foroozandeh Shahraki, Emma Regentova

Abstract:

The reconstruction from sparse-view projections is one of important problems in computed tomography (CT) limited by the availability or feasibility of obtaining of a large number of projections. Traditionally, convex regularizers have been exploited to improve the reconstruction quality in sparse-view CT, and the convex constraint in those problems leads to an easy optimization process. However, convex regularizers often result in a biased approximation and inaccurate reconstruction in CT problems. Here, we present a nonconvex, Lipschitz continuous and non-smooth regularization model. The CT reconstruction is formulated as a nonconvex constrained L1 − L2 minimization problem and solved through a difference of convex algorithm and alternating direction of multiplier method which generates a better result than L0 or L1 regularizers in the CT reconstruction. We compare our method with previously reported high performance methods which use convex regularizers such as TV, wavelet, curvelet, and curvelet+TV (CTV) on the test phantom images. The results show that there are benefits in using the nonconvex regularizer in the sparse-view CT reconstruction.

Keywords: computed tomography, non-convex, sparse-view reconstruction, L1-L2 minimization, difference of convex functions

Procedia PDF Downloads 298
6103 IT/IS Organisation Design in the Digital Age: A Literature Review

Authors: Dominik Krimpmann

Abstract:

Information technology and information systems are currently at a tipping point. The digital age fundamentally transforms a large number of industries in the ways they work. Lines between business and technology blur. Researchers have acknowledged that this is the time in which the IT/IS organisation needs to re-strategise itself. In this paper, the author provides a structured review of the IS and organisation design literature addressing the question of how the digital age changes the design categories of an IT/IS organisation design. The findings show that most papers just analyse single aspects of either IT/IS relevant information or generic organisation design elements but miss a holistic ‘big-picture’ onto an IT/IS organisation design. This paper creates a holistic IT/IS organisation design framework bringing together the IS research strand, the digital strand and the generic organisation design strand. The research identified four IT/IS organisation design categories (strategy, structure, processes and people) and discusses the importance of two additional categories (sourcing and governance). The authors findings point to a first anchor point from which further research needs to be conducted to develop a holistic IT/IS organisation design framework.

Keywords: IT/IS strategy, IT/IS organisation design, digital age, organisational effectiveness, literature review

Procedia PDF Downloads 388
6102 The Reality of Gender Equality in Universities Libraries: A Case of Pakistan

Authors: Qurat Ul Ain Saleem, Kanwal Ameen

Abstract:

The library and information science discipline is universally known as a feminist profession. It is considered a suitable field for females in Pakistan like a few other fields such as teaching and healthcare. It is also reflected through the uneven enrollment at graduate levels in library schools across the country as there are more females as compared to males. However, that uneven ratio does not really translate in the profession after passing out. There are more males in the professional as compared to females, as well as males can be seen on managerial and administrative posts majorly. A few females who joined the perception remain underrated and are hardly seen at managerial or administrative positions in the academic libraries. Therefore, this study was designed to highlight the perceptions of those females who have joined the profession to identify the issues related to equality faced by them as a professional. A qualitative research design based on a semi-structured interview was selected as an appropriate method to achieve the objectives of this study. Female librarians working in the higher education commission’s recognized public and private sector universities of Punjab, Pakistan, were selected as the population for this study. Female librarians shared that inequalities and discrimination based on face value, experience, communication, and relationship with the manager are common at their workplaces. They added that managers prefer male professionals to deal with delegation or presentations though we both can do that. Female professionals from the private sector believed that library managers make final hiring and selection decisions based on job duties and gender. However, the one with strong references will be preferred for the job. Also, private-sector employees suffered more prejudice due to the non-availability of proper patterns of promotions and increments. The government personnel said there is always a proper board/procedure for hiring and promotions; therefore, it is difficult for them to identify any inequality. Participants were dissatisfied with their managers for not allowing them to attend training and conferences. The majority of participants from the private sector said they wouldn't speak up to prejudice because they are afraid of losing their jobs and their voice is lost in a male-dominated society where males hold numerous authoritative positions and females are considered less competent. Nonetheless, the discrimination and inequalities affected the work motivation and enthusiasm of employees. Therefore, organizations should not discriminate against the staff in terms of facilities and benefits. The sample may not represent the true picture of gender equality in university libraries of Pakistan due to less number of participants and limited geographical boundaries. It is also assumed that some females may refrain from disclosing factual information or some may exaggerate the facts as a large number of participants requested to become part of the study. Equal opportunities should be offered to female library professionals to uplift and involve them to mitigate the perception of gender dominance. The organizations or immediate authorities should allow their staff to participate in training opportunities to learn modern practices to better serve the community.

Keywords: equality-workplace, libraries as workplace, female professionals, librarians-Pakistan

Procedia PDF Downloads 96
6101 Modeling and Analysis of a Cycling Prosthetic

Authors: John Tolentino, Yong Seok Park

Abstract:

There are currently many people living with limb loss in the USA. The main causes for amputation can range from vascular disease, to trauma, or cancer. This number is expected increase over the next decade. Many patients have a single prosthetic for the first year but end up getting a second one to accommodate their changing physique. Afterwards, the prosthesis gets replaced every three to five years depending on how often it is used. This could cost the patient up to $500,000 throughout their lifetime. Complications do not end there, however. Due to the absence of nerves, it becomes more difficult to traverse terrain with a prosthetic. Moving on an incline or decline becomes difficult, thus curbs and stairs can be a challenge. Certain physical activities, such as cycling, could be even more strenuous. It will need to be relearned to accommodate for the change in weight, center of gravity, and transfer of energy from the leg to the pedal. The purpose of this research project is to develop a new, alternate below-knee cycling prosthetic using Dieter & Schmidt’s design process approach. It will be subjected to fatigue analysis under dynamic loading to observe the limitations as well as the strengths and weaknesses of the prosthetic. Benchmark comparisons will be made between existing prosthetics and the proposed one, examining the benefits and disadvantages. The resulting prosthetic will be 3D printed using acrylonitrile butadiene styrene (ABS) or polycarbonate (PC) plastic.

Keywords: 3D Printing, Cycling, Prosthetic design, Synthetic design.

Procedia PDF Downloads 126
6100 Ta-DAH: Task Driven Automated Hardware Design of Free-Flying Space Robots

Authors: Lucy Jackson, Celyn Walters, Steve Eckersley, Mini Rai, Simon Hadfield

Abstract:

Space robots will play an integral part in exploring the universe and beyond. A correctly designed space robot will facilitate OOA, satellite servicing and ADR. However, problems arise when trying to design such a system as it is a highly complex multidimensional problem into which there is little research. Current design techniques are slow and specific to terrestrial manipulators. This paper presents a solution to the slow speed of robotic hardware design, and generalizes the technique to free-flying space robots. It presents Ta-DAH Design, an automated design approach that utilises a multi-objective cost function in an iterative and automated pipeline. The design approach leverages prior knowledge and facilitates the faster output of optimal designs. The result is a system that can optimise the size of the base spacecraft, manipulator and some key subsystems for any given task. Presented in this work is the methodology behind Ta-DAH Design and a number optimal space robot designs.

Keywords: space robots, automated design, on-orbit operations, hardware design

Procedia PDF Downloads 57
6099 Software-Defined Networks in Utility Power Networks

Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian

Abstract:

Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.

Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller

Procedia PDF Downloads 94
6098 Trend Detection Using Community Rank and Hawkes Process

Authors: Shashank Bhatnagar, W. Wilfred Godfrey

Abstract:

We develop in this paper, an approach to find the trendy topic, which not only considers the user-topic interaction but also considers the community, in which user belongs. This method modifies the previous approach of user-topic interaction to user-community-topic interaction with better speed-up in the range of [1.1-3]. We assume that trend detection in a social network is dependent on two things. The one is, broadcast of messages in social network governed by self-exciting point process, namely called Hawkes process and the second is, Community Rank. The influencer node links to others in the community and decides the community rank based on its PageRank and the number of users links to that community. The community rank decides the influence of one community over the other. Hence, the Hawkes process with the kernel of user-community-topic decides the trendy topic disseminated into the social network.

Keywords: community detection, community rank, Hawkes process, influencer node, pagerank, trend detection

Procedia PDF Downloads 365
6097 Predicting Financial Distress in South Africa

Authors: Nikki Berrange, Gizelle Willows

Abstract:

Business rescue has become increasingly popular since its inclusion in the Companies Act of South Africa in May 2011. The Alternate Exchange (AltX) of the Johannesburg Stock Exchange has experienced a marked increase in the number of companies entering business rescue. This study sampled twenty companies listed on the AltX to determine whether Altman’s Z-score model for emerging markets (ZEM) or Taffler’s Z-score model is a more accurate model in predicting financial distress for small to medium size companies in South Africa. The study was performed over three different time horizons; one, two and three years prior to the event of financial distress, in order to determine how many companies each model predicted would be unlikely to succeed as well as the predictive ability and accuracy of the respective models. The study found that Taffler’s Z-score model had a greater ability at predicting financial distress from all three-time horizons.

Keywords: Altman’s ZEM-score, Altman’s Z-score, AltX, business rescue, Taffler’s Z-score

Procedia PDF Downloads 343
6096 Image Compression on Region of Interest Based on SPIHT Algorithm

Authors: Sudeepti Dayal, Neelesh Gupta

Abstract:

Image abbreviation is utilized for reducing the size of a file without demeaning the quality of the image to an objectionable level. The depletion in file size permits more images to be deposited in a given number of spaces. It also minimizes the time necessary for images to be transferred. Storage of medical images is a most researched area in the current scenario. To store a medical image, there are two parameters on which the image is divided, regions of interest and non-regions of interest. The best way to store an image is to compress it in such a way that no important information is lost. Compression can be done in two ways, namely lossy, and lossless compression. Under that, several compression algorithms are applied. In the paper, two algorithms are used which are, discrete cosine transform, applied to non-region of interest (lossy), and discrete wavelet transform, applied to regions of interest (lossless). The paper introduces SPIHT (set partitioning hierarchical tree) algorithm which is applied onto the wavelet transform to obtain good compression ratio from which an image can be stored efficiently.

Keywords: Compression ratio, DWT, SPIHT, DCT

Procedia PDF Downloads 334
6095 Semi-Automatic Method to Assist Expert for Association Rules Validation

Authors: Amdouni Hamida, Gammoudi Mohamed Mohsen

Abstract:

In order to help the expert to validate association rules extracted from data, some quality measures are proposed in the literature. We distinguish two categories: objective and subjective measures. The first one depends on a fixed threshold and on data quality from which the rules are extracted. The second one consists on providing to the expert some tools in the objective to explore and visualize rules during the evaluation step. However, the number of extracted rules to validate remains high. Thus, the manually mining rules task is very hard. To solve this problem, we propose, in this paper, a semi-automatic method to assist the expert during the association rule's validation. Our method uses rule-based classification as follow: (i) We transform association rules into classification rules (classifiers), (ii) We use the generated classifiers for data classification. (iii) We visualize association rules with their quality classification to give an idea to the expert and to assist him during validation process.

Keywords: association rules, rule-based classification, classification quality, validation

Procedia PDF Downloads 421