Search results for: establishment of information system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26060

Search results for: establishment of information system

25670 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 361
25669 The Establishment of Probabilistic Risk Assessment Analysis Methodology for Dry Storage Concrete Casks Using SAPHIRE 8

Authors: J. R. Wang, W. Y. Cheng, J. S. Yeh, S. W. Chen, Y. M. Ferng, J. H. Yang, W. S. Hsu, C. Shih

Abstract:

To understand the risk for dry storage concrete casks in the cask loading, transfer, and storage phase, the purpose of this research is to establish the probabilistic risk assessment (PRA) analysis methodology for dry storage concrete casks by using SAPHIRE 8 code. This analysis methodology is used to perform the study of Taiwan nuclear power plants (NPPs) dry storage system. The process of research has three steps. First, the data of the concrete casks and Taiwan NPPs are collected. Second, the PRA analysis methodology is developed by using SAPHIRE 8. Third, the PRA analysis is performed by using this methodology. According to the analysis results, the maximum risk is the multipurpose canister (MPC) drop case.

Keywords: PRA, dry storage, concrete cask, SAPHIRE

Procedia PDF Downloads 219
25668 A Location-Based Search Approach According to Users’ Application Scenario

Authors: Shih-Ting Yang, Chih-Yun Lin, Ming-Yu Li, Jhong-Ting Syue, Wei-Ming Huang

Abstract:

Global positioning system (GPS) has become increasing precise in recent years, and the location-based service (LBS) has developed rapidly. Take the example of finding a parking lot (such as Parking apps). The location-based service can offer immediate information about a nearby parking lot, including the information about remaining parking spaces. However, it cannot provide expected search results according to the requirement situations of users. For that reason, this paper develops a “Location-based Search Approach according to Users’ Application Scenario” according to the location-based search and demand determination to help users obtain the information consistent with their requirements. The “Location-based Search Approach based on Users’ Application Scenario” of this paper consists of one mechanism and three kernel modules. First, in the Information Pre-processing Mechanism (IPM), this paper uses the cosine theorem to categorize the locations of users. Then, in the Information Category Evaluation Module (ICEM), the kNN (k-Nearest Neighbor) is employed to classify the browsing records of users. After that, in the Information Volume Level Determination Module (IVLDM), this paper makes a comparison between the number of users’ clicking the information at different locations and the average number of users’ clicking the information at a specific location, so as to evaluate the urgency of demand; then, the two-dimensional space is used to estimate the application situations of users. For the last step, in the Location-based Search Module (LBSM), this paper compares all search results and the average number of characters of the search results, categorizes the search results with the Manhattan Distance, and selects the results according to the application scenario of users. Additionally, this paper develops a Web-based system according to the methodology to demonstrate practical application of this paper. The application scenario-based estimate and the location-based search are used to evaluate the type and abundance of the information expected by the public at specific location, so that information demanders can obtain the information consistent with their application situations at specific location.

Keywords: data mining, knowledge management, location-based service, user application scenario

Procedia PDF Downloads 129
25667 Performance Improvement of Information System of a Banking System Based on Integrated Resilience Engineering Design

Authors: S. H. Iranmanesh, L. Aliabadi, A. Mollajan

Abstract:

Integrated resilience engineering (IRE) is capable of returning banking systems to the normal state in extensive economic circumstances. In this study, information system of a large bank (with several branches) is assessed and optimized under severe economic conditions. Data envelopment analysis (DEA) models are employed to achieve the objective of this study. Nine IRE factors are considered to be the outputs, and a dummy variable is defined as the input of the DEA models. A standard questionnaire is designed and distributed among executive managers to be considered as the decision-making units (DMUs). Reliability and validity of the questionnaire is examined based on Cronbach's alpha and t-test. The most appropriate DEA model is determined based on average efficiency and normality test. It is shown that the proposed integrated design provides higher efficiency than the conventional RE design. Results of sensitivity and perturbation analysis indicate that self-organization, fault tolerance, and reporting culture respectively compose about 50 percent of total weight.

Keywords: banking system, Data Envelopment Analysis (DEA), Integrated Resilience Engineering (IRE), performance evaluation, perturbation analysis

Procedia PDF Downloads 192
25666 Cartagena Protocol and Beyond: Issues and Challenges in the Nigeria's Response to Biosafety

Authors: Dalhat Binta Dan - Ali

Abstract:

The reality of the new world economic order and the ever increasing importance of biotechnology in the global economy have necessitated the ratification of the Cartagena Protocol on Biosafety and the recent promulgation of Biosafety Act in Nigeria 2015. The legal regimes are anchored on the need to create an enabling environment for the flourishing of bio-trade and also to ensure the safety of the environment and human health. This paper critically examines the legal framework on biosafety by taking a cursory look at its philosophical foundation, key issues and milestones. The paper argues that the extant laws, though a giant leap in the establishment of a legal framework on biosafety, it posits that the legal framework raises debate and controversy on the difficulties of risk assessment on biodiversity and human health, other challenges includes lack of sound institutional capacity and the regimes direction of a hybrid approach between environmental conservation and trade issues. The paper recommend the need for the country to do more in the area of stimulating awareness and establishment of a sound institutional capacity to enable the law ensure adequate level of protection in the field of safe transfer, handling, and use of genetically modified organisms (GMOs) in Nigeria.

Keywords: Cartagena protocol, biosafety, issues, challenges, biotrade, genetically modified organism (GMOs), environment

Procedia PDF Downloads 328
25665 Flood Disaster Prevention and Mitigation in Nigeria Using Geographic Information System

Authors: Dinebari Akpee, Friday Aabe Gaage, Florence Fred Nwaigwu

Abstract:

Natural disasters like flood affect many parts of the world including developing countries like Nigeria. As a result, many human lives are lost, properties damaged and so much money is lost in infrastructure damages. These hazards and losses can be mitigated and reduced by providing reliable spatial information to the generality of the people through about flood risks through flood inundation maps. Flood inundation maps are very crucial for emergency action plans, urban planning, ecological studies and insurance rates. Nigeria experience her worst flood in her entire history this year. Many cities were submerged and completely under water due to torrential rainfall. Poor city planning, lack of effective development control among others contributes to the problem too. Geographic information system (GIS) can be used to visualize the extent of flooding, analyze flood maps to produce flood damaged estimation maps and flood risk maps. In this research, the under listed steps were taken in preparation of flood risk maps for the study area: (1) Digitization of topographic data and preparation of digital elevation model using ArcGIS (2) Flood simulation using hydraulic model and integration and (3) Integration of the first two steps to produce flood risk maps. The results shows that GIS can play crucial role in Flood disaster control and mitigation.

Keywords: flood disaster, risk maps, geographic information system, hazards

Procedia PDF Downloads 233
25664 Detection of Fuel Theft and Vehicle Position Using Third Party Monitoring Software

Authors: P. Senthilraja, C. Rukumani Khandhan, M. Palaniappan, S. L. Rama, P. Sai Sushimitha, R. Madhan, J. Vinumathi, N. Vijayarangan

Abstract:

Nowadays, the logistics achieve a vast improvement in efficient delivery of goods. The technology improvement also helps to improve its development, but still the owners of transport vehicles face problems, i.e., fuel theft in vehicles by the drivers or by an unknown person. There is no proper solution to overcome the problems. This scheme is to determine the amount of fuel that has been stolen and also to determine the position of the vehicle at a particular time using the technologies like GPS, GSM, ultrasonic fuel level sensor and numeric lock system. The ultrasonic sensor uses the ultrasonic waves to calculate the height of the tank up to which the fuel is available. Based on height it is possible to calculate the amount of fuel. The Global Positioning System (GPS) is a satellite-based navigation system. The scientific community uses GPS for its precision timing capability and position information. The GSM provides the periodic information about the fuel level. A numeric lock system has been provided for fuel tank opening lever. A password is provided to access the fuel tank lever and this is authenticated only by the driver and the owner. Once the fuel tank is opened an alert is sent to owner through a SMS including the timing details. Third party monitoring software is a user interface that updates the information automatically into the database which helps to retrieve the data as and when required. Third party monitoring software provides vehicle’s information to the owner and also shows the status of the vehicle. The techniques that are to be proposed will provide an efficient output. This project helps to overcome the theft and hence to put forth fuel economy.

Keywords: fuel theft, third party monitoring software, bioinformatics, biomedicine

Procedia PDF Downloads 396
25663 Integrated Performance Management System a Conceptual Design for PT. XYZ

Authors: Henrie Yunianto, Dermawan Wibisono

Abstract:

PT. XYZ is a family business (private company) in Indonesia that provide an educational program and consultation services. Since its establishment in 2011, the company has run without any strategic management system implemented. Though the company could survive until now. The management of PT. XYZ sees the business opportunity for such product is huge, even though the targeted market is very specific (niche), the volume is large (due to large population of Indonesia) and numbers of competitors are low (now). It can be said if the product life cycle is in between ‘Introduction stage’ and ‘growth’ stage. It is observed that nowadays the new entrants (competitors) are increasing, thus PT. XYZ consider reacting in facing the intense business rivalry by conducting the business in an appropriate manner. A Performance Management System is important to be implemented in accordance with the business sustainability and growth. The framework of Performance Management System chosen is Integrated Performance Management System (IPMS). IPMS framework has the advantages of its simplicity, linkage between its business variables and indicators where the company can see the connections between all factors measured. IPMS framework consists of perspectives: (1) Business Result, (2) Internal Processes, (3) Resource Availability. Variables and indicators were examined through deep analysis of the business external and internal environments, Strength-Weakness-Opportunity-Threat (SWOT) analysis, Porter’s five forces analysis. Analytical Hierarchy Process (AHP) analysis was then used to quantify the weight of each variable/indicators. AHP is needed since in this study, PT. XYZ, the data of existing performance indicator was not available. Later, where the IPMS is implemented, the real data measured can be examined to determine the weight factor of each indicators using correlation analysis (or other methods). In this study of IPMS design for PT. XYZ, the analysis shows that with current company goals, along with the AHP methodology, the critical indicators for each perspective are: (1) Business results: Customer satisfaction and Employee satisfaction, (2) Internal process: Marketing performance, Supplier quality, Production quality, Continues improvement; (3) Resources Availability: Leadership and company culture & value, Personal Competences, Productivity. Company and/or organization require performance management system to help them in achieving their vision and mission. Company strategy will be effectively defined and addressed by using performance management system. Integrated Performance Management System (IPMS) framework and AHP analysis help us in quantifying the factors which influence the business output expected.

Keywords: analytical hierarchy process, business strategy, differentiation strategy, integrated performance management system

Procedia PDF Downloads 311
25662 The Impact of System Cascading Collapse and Transmission Line Outages to the Transfer Capability Assessment

Authors: Nur Ashida Salim, Muhammad Murtadha Othman, Ismail Musirin, Mohd Salleh Serwan

Abstract:

Uncertainty of system operating conditions is one of the causative reasons which may render to the instability of a transmission system. This will encumber the performance of transmission system to efficiently transmit the electrical power between areas. For that reason, accurate assessment of Transmission Reliability Margin (TRM) is essential in order to ensure effective power transfer between areas during the occurrence of system uncertainties. The power transfer is also called as the Available Transfer Capability (ATC) in which it is the information required by the utilities and marketers to instigate selling and buying the electric energy. This paper proposes a computationally effective approach to estimate TRM and ATC by considering the uncertainties of system cascading collapse and transmission line outages which is identified as the main reasons in power system instability. In accordance to the results that have been obtained, the proposed method is essential for the transmission providers which could help the power marketers and planning sectors in the operation and reserving transmission services based on the ATC calculated.

Keywords: system cascading collapse, transmission line outages, transmission reliability margin, available transfer capability

Procedia PDF Downloads 430
25661 Seismic Response Mitigation of Structures Using Base Isolation System Considering Uncertain Parameters

Authors: Rama Debbarma

Abstract:

The present study deals with the performance of Linear base isolation system to mitigate seismic response of structures characterized by random system parameters. This involves optimization of the tuning ratio and damping properties of the base isolation system considering uncertain system parameters. However, the efficiency of base isolator may reduce if it is not tuned to the vibrating mode it is designed to suppress due to unavoidable presence of system parameters uncertainty. With the aid of matrix perturbation theory and first order Taylor series expansion, the total probability concept is used to evaluate the unconditional response of the primary structures considering random system parameters. For this, the conditional second order information of the response quantities are obtained in random vibration framework using state space formulation. Subsequently, the maximum unconditional root mean square displacement of the primary structures is used as the objective function to obtain optimum damping parameters Numerical study is performed to elucidate the effect of parameters uncertainties on the optimization of parameters of linear base isolator and system performance.

Keywords: linear base isolator, earthquake, optimization, uncertain parameters

Procedia PDF Downloads 438
25660 Toward Cloud E-learning System Based on Smart Tools

Authors: Mohsen Maraoui

Abstract:

In the face of the growth in the quantity of data produced, several methods and techniques appear to remedy the problems of processing and analyzing large amounts of information mainly in the field of teaching. In this paper, we propose an intelligent cloud-based teaching system for E-learning content services. This system makes easy the manipulation of various educational content forms, including text, images, videos, 3 dimensions objects and scenes of virtual reality and augmented reality. We discuss the integration of institutional and external services to provide personalized assistance to university members in their daily activities. The proposed system provides an intelligent solution for media services that can be accessed from smart devices cloud-based intelligent service environment with a fully integrated system.

Keywords: cloud computing, e-learning, indexation, IoT, learning in Arabic language, smart tools

Procedia PDF Downloads 138
25659 A Visual Inspection System for Automotive Sheet Metal Chasis Parts Produced with Cold-Forming Method

Authors: İmren Öztürk Yılmaz, Abdullah Yasin Bilici, Yasin Atalay Candemir

Abstract:

The system consists of 4 main elements: motion system, image acquisition system, image processing software, and control interface. The parts coming out of the production line to enter the image processing system with the conveyor belt at the end of the line. The 3D scanning of the produced part is performed with the laser scanning system integrated into the system entry side. With the 3D scanning method, it is determined at what position and angle the parts enter the system, and according to the data obtained, parameters such as part origin and conveyor speed are calculated with the designed software, and the robot is informed about the position where it will take part. The robot, which receives the information, takes the produced part on the belt conveyor and shows it to high-resolution cameras for quality control. Measurement processes are carried out with a maximum error of 20 microns determined by the experiments.

Keywords: quality control, industry 4.0, image processing, automated fault detection, digital visual inspection

Procedia PDF Downloads 117
25658 ICT in Education – A Quest for Quality Learning in the 21st Century

Authors: Adam Johnbull

Abstract:

The paper discusses ICT in Education as a quest for quality learning in the 21st century. Education is the key that unlock the door to development, without adequate education of the citizenry, the development of a nation becomes a sham. Information Communication Technologies (ICTs) has revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICT’s to win global recognition and attention and thus ensure desire quality in our school system. Thus, the purpose of the paper is to discuss amongst others, what is ICT. The roles of ICT’s in education, limitation and key challenges of integrating ICT to education in the enhancement of student learning and experiences in other to encourage policy makers, school administrators and teachers pay the required attention to integrate this technology in the education system. The paper concludes that regardless of all the limitation characterizing it. ICT benefit education system to provide quality education in the 21st century.

Keywords: ICTs, quest, information, global, sham, century

Procedia PDF Downloads 431
25657 Social Data Aggregator and Locator of Knowledge (STALK)

Authors: Rashmi Raghunandan, Sanjana Shankar, Rakshitha K. Bhat

Abstract:

Social media contributes a vast amount of data and information about individuals to the internet. This project will greatly reduce the need for unnecessary manual analysis of large and diverse social media profiles by filtering out and combining the useful information from various social media profiles, eliminating irrelevant data. It differs from the existing social media aggregators in that it does not provide a consolidated view of various profiles. Instead, it provides consolidated INFORMATION derived from the subject’s posts and other activities. It also allows analysis over multiple profiles and analytics based on several profiles. We strive to provide a query system to provide a natural language answer to questions when a user does not wish to go through the entire profile. The information provided can be filtered according to the different use cases it is used for.

Keywords: social network, analysis, Facebook, Linkedin, git, big data

Procedia PDF Downloads 446
25656 Upward Millennium: Enterprise Resource Planning (ERP) Development and Implementation in Pakistani Organizations

Authors: Sara Aziz, Madiha Arooj, Hira Rizwani, Wasim Irshad

Abstract:

Enterprise Resource Planning (ER) as component of Information Resource System has turned up as one of the most demanding software in market for the new millennium. ERP system automates the core activities of any organization such as finance, manufacturing and supply chain management, human resource etc. to generate an access to the information in real time environment. Despite this fact many of the organizations globally particularly in developing country Pakistan are unaware and avoid adopting it. The development and implementation of ERP system is a complex and challenging process. This research was aimed to explore the benefits and coping strategies (with reference to end user reaction) of organizations those have implemented ERP. The problems addressed in this study focused the challenges and key success factors regarding implementing ERP Pakistani Organizations. Secondly, it has explored the stumbling blocks and business integration of those organizations that are not implementing ERP. The public and corporate sector organizations in Pakistan were selected to collect the data. The research finding shows that the organizational culture, openness towards adoption and learning, deployment and development, top management commitment and change systems, business processes and compatibility and user acceptance and reaction are contributing factors for successful implementation and development of ERP system. This research is thus an addition to enhance knowledge and understanding of implementation of ERP system in Pakistan.

Keywords: ERP system, user acceptance and involvement, change management, organizational culture

Procedia PDF Downloads 287
25655 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 476
25654 Study on Safety Management of Deep Foundation Pit Construction Site Based on Building Information Modeling

Authors: Xuewei Li, Jingfeng Yuan, Jianliang Zhou

Abstract:

The 21st century has been called the century of human exploitation of underground space. Due to the characteristics of large quantity, tight schedule, low safety reserve and high uncertainty of deep foundation pit engineering, accidents frequently occur in deep foundation pit engineering, causing huge economic losses and casualties. With the successful application of information technology in the construction industry, building information modeling has become a research hotspot in the field of architectural engineering. Therefore, the application of building information modeling (BIM) and other information communication technologies (ICTs) in construction safety management is of great significance to improve the level of safety management. This research summed up the mechanism of the deep foundation pit engineering accident through the fault tree analysis to find the control factors of deep foundation pit engineering safety management, the deficiency existing in the traditional deep foundation pit construction site safety management. According to the accident cause mechanism and the specific process of deep foundation pit construction, the hazard information of deep foundation pit engineering construction site was identified, and the hazard list was obtained, including early warning information. After that, the system framework was constructed by analyzing the early warning information demand and early warning function demand of the safety management system of deep foundation pit. Finally, the safety management system of deep foundation pit construction site based on BIM through combing the database and Web-BIM technology was developed, so as to realize the three functions of real-time positioning of construction site personnel, automatic warning of entering a dangerous area, real-time monitoring of deep foundation pit structure deformation and automatic warning. This study can initially improve the current situation of safety management in the construction site of deep foundation pit. Additionally, the active control before the occurrence of deep foundation pit accidents and the whole process dynamic control in the construction process can be realized so as to prevent and control the occurrence of safety accidents in the construction of deep foundation pit engineering.

Keywords: Web-BIM, safety management, deep foundation pit, construction

Procedia PDF Downloads 157
25653 Intelligent Wireless Patient Monitoring and Tracking System

Authors: Ch. Sandeep Kumar Subudhi, S. Sivanandam

Abstract:

Our system is to monitor the human body temperature, blood pressure (BP), Pulse Rate and ECG and tracking the patient location. In our system the body temperature is detected by using LM35 temperature sensor, blood pressure is detected by the BP sensor, pulse rate is detected by the ear plug pulse sensor and the ECG is detected by the three lead ECG sensor in the working environment of the patient. The sensed information is sent to the PIC16F877 microcontroller through signal conditioning circuit. A desired amount of sensor value is set and if it is exceeded preliminary steps should be taken by indication by buzzer. The sensor information will be transmitted from the patient unit to the main controller unit with the help of Zigbee communication medium which is connected with the microcontrollers in the both units. The main controller unit will send those sensor data as well as the location of that patient by the help of GPS module to the observer/doctor. The observer/doctor can receive the SMS sent by GSM module and further decision can be taken. The message is sent to a cell phone using global system mobile (GSM) Modem. MAX232 acts as a driver between microcontroller and modem.

Keywords: LM35, heart beat sensor, ECG Sensor, BP Sensor, Zigbee module, GSM module, GPS module, PIC16F877A microcontroller

Procedia PDF Downloads 386
25652 Design and Implementation of Automated Car Anti-Collision System Device Using Distance Sensor

Authors: Mehrab Masayeed Habib, Tasneem Sanjana, Ahmed Amin Rumel

Abstract:

Automated car anti-collision system is a trending technology of science. A car anti-collision system is an automobile safety system. The aim of this paper was to describe designing a car anti-collision system device to reduce the severity of an accident. The purpose of this device is to prevent collision among cars and objects to reduce the accidental death of human. This project gives an overview of secure & smooth journey of car as well as the certainty of human life. This system is controlled by microcontroller PIC. Sharp distance sensor is used to detect any object within the danger range. A crystal oscillator is used to produce the oscillation and generates the clock pulse of the microcontroller. An LCD is used to give information about the safe distance and a buzzer is used as alarm. An actuator is used as automatic break and inside the actuator; there is a motor driver that runs the actuator. For coding ‘microC PRO for PIC’ was used and ’Proteus Design Suite version 8 Software’ was used for simulation.

Keywords: sharp distance sensor, microcontroller, MicroC PRO for PIC, proteus, actuator, automobile anti-collision system

Procedia PDF Downloads 477
25651 Country Experience on Regulation of Traditional Medicine in Eritrea

Authors: Liya Abraham

Abstract:

Eritrea is located along the Red Sea, north of the Horn of Africa, between Djibouti and Sudan and has a population of about 3.2 million as of 2010. It has six administrative regions; Anseba, Debub, Debubawi K’eyih Bahri, Gash-Barka, Ma'akel, and Semenawi K’eyih Bahri. Eritrea has got its independence in 1991 after 30 years war of liberation. The country is blessed with various medicinal flora and fauna, and marine and terrestrial biodiversity. Traditional Medicine (TM) has been an integral part of the Eritrean culture for centuries. So far, more than 19 TM modalities have been recognized, and are broadly categorized as; herbal, procedure-based and spiritual. Despite the availability of modern medicine to the majority of the population, TM is still widely practiced. The rationale behind widespread use is accessibility, affordability and cultural acceptability. Hence, TM is of great contribution to the Eritrean health care system. As a matter of fact, harnessing the potential contribution of effective and safe TM in order to attain Universal Health Coverage (UHC) has been emphasized in the WHO TM strategy 2014-2023. The Eritrean TM, however, was operating without regulation and reliable scientific justification behind its safety and efficacy. Thus, the Ministry of Health (MoH), in recognition of the role of TM in primary healthcare and safeguard public health, established a regulatory body for TM so-called as Traditional Medicine Unit (TMU) in 2012. The mission of the unit is to ensure rational TM use through an integrated health service delivery system and contribute to the country’s economic and social development. The unit has established its national TM policy in 2017. The activities of the unit are guided by the National TM Advisory Committee (TMAC), responsible for the provision of technical assistance and advisory role. Moreover, the Legal Framework and Code of Ethics and Practice which provide a legal basis for the regulation of TM have also been drafted. In recognition of the importance of TM research and development, the unit launched a nationwide TM survey in 2017 and had surveyed two zones (Gash-Barka and Debub). The findings of the survey were subjected to a research dissemination workshop and publication in international journals. Furthermore, TM-related adverse events reporting tool (Green Form) aiming to guide regulatory interventions and researches have been established by the unit, and ever since reports are flowing. The unit has also been offering training to THPs, pharmacy students and health care professionals regarding TM and its regulatory activities. In addition, as part of the establishment of the national medicinal plants' database and herbal monograph, more than 329 and 30 medicinal plants, have been compiled respectively. In conclusion, TM is still widely accepted and practiced in Eritrea. The TMU ever since its establishment is endeavoring to ensure the safety and efficacy of the TM, and its integration in the mainstream health service delivery system.

Keywords: efficacy, regulation, safety, traditional medicine, traditional medicine unit, universal health coverage

Procedia PDF Downloads 189
25650 The Jury System in the Courts in Nineteenth Century Assam: Power Negotiations and Politics in an Institutional Rubric of a Colonial Regime

Authors: Jahnu Bharadwaj

Abstract:

In the third decade of the 19th century, the political landscape of the Brahmaputra valley changed at many levels. The establishment of East India Company’s authority in ‘Assam’ was complete with the Treaty of Yandaboo. The whole phenomenon of the annexation of Assam into the British Indian Empire led to several administrative reorganizations and reforms under the new regime. British colonial rule was distinguished by new systems and institutions of governance. This paper broadly looks at the historical proceedings of the introduction of the Rule of Law and a new legal structure in the region of ‘Assam’. With numerous archival data, this paper seeks to chiefly examine the trajectory of an important element in the new legal apparatus, i.e. the jury in the British criminal courts introduced in the newly annexed region. Right from the beginning of colonial legal innovations with the establishment of the panchayats and the parallel courts in Assam, the jury became an important element in the structure of the judicial system. In both civil and criminal courts, the jury was to be formed from the learned members of the ‘native’ society. In the working of the criminal court, the jury became significantly powerful and influential. The structure meant that the judge or the British authority eventually had no compulsion to obey the verdict of the jury. However, the structure also provided that the jury had a considerable say in matters of the court proceedings, and their verdict had significant weight. This study seeks to look at certain important criminal cases pertaining to the nineteenth century and the functioning of the jury in those cases. The power play at display between the British officials, judges and the members of the jury would be helpful in highlighting the important deliberations and politics that were in place in the functioning of the British criminal legal apparatus in colonial Assam. The working and the politics of the members of the jury in many cases exerted considerable influence in the court proceedings. The interesting negotiations of the British officials or judges also present us with vital insights. By reflecting on the difficulty that the British officials and judges felt with the considerable space for opinion and difference that was provided to important members of the local society, this paper seeks to locate, with evidence, the racial politics at play within the official formulations of the legal apparatus in the colonial rule in Assam. This study seeks to argue that despite the rhetorical claims of legal equality within the Empire, racial consideration and racial politics was a reality even in the making of the structure itself. This in a way helps to enrich our ideas about the racial elements at work in numerous layers sustaining the colonial regime.

Keywords: criminal courts, colonial regime, jury, race

Procedia PDF Downloads 179
25649 An End-to-end Piping and Instrumentation Diagram Information Recognition System

Authors: Taekyong Lee, Joon-Young Kim, Jae-Min Cha

Abstract:

Piping and instrumentation diagram (P&ID) is an essential design drawing describing the interconnection of process equipment and the instrumentation installed to control the process. P&IDs are modified and managed throughout a whole life cycle of a process plant. For the ease of data transfer, P&IDs are generally handed over from a design company to an engineering company as portable document format (PDF) which is hard to be modified. Therefore, engineering companies have to deploy a great deal of time and human resources only for manually converting P&ID images into a computer aided design (CAD) file format. To reduce the inefficiency of the P&ID conversion, various symbols and texts in P&ID images should be automatically recognized. However, recognizing information in P&ID images is not an easy task. A P&ID image usually contains hundreds of symbol and text objects. Most objects are pretty small compared to the size of a whole image and are densely packed together. Traditional recognition methods based on geometrical features are not capable enough to recognize every elements of a P&ID image. To overcome these difficulties, state-of-the-art deep learning models, RetinaNet and connectionist text proposal network (CTPN) were used to build a system for recognizing symbols and texts in a P&ID image. Using the RetinaNet and the CTPN model carefully modified and tuned for P&ID image dataset, the developed system recognizes texts, equipment symbols, piping symbols and instrumentation symbols from an input P&ID image and save the recognition results as the pre-defined extensible markup language format. In the test using a commercial P&ID image, the P&ID information recognition system correctly recognized 97% of the symbols and 81.4% of the texts.

Keywords: object recognition system, P&ID, symbol recognition, text recognition

Procedia PDF Downloads 157
25648 Context-Aware Recommender System Using Collaborative Filtering, Content-Based Algorithm and Fuzzy Rules

Authors: Xochilt Ramirez-Garcia, Mario Garcia-Valdez

Abstract:

Contextual recommendations are implemented in Recommender Systems to improve user satisfaction, recommender system makes accurate and suitable recommendations for a particular situation reaching personalized recommendations. The context provides information relevant to the Recommender System and is used as a filter for selection of relevant items for the user. This paper presents a Context-aware Recommender System, which uses techniques based on Collaborative Filtering and Content-Based, as well as fuzzy rules, to recommend items inside the context. The dataset used to test the system is Trip Advisor. The accuracy in the recommendations was evaluated with the Mean Absolute Error.

Keywords: algorithms, collaborative filtering, intelligent systems, fuzzy logic, recommender systems

Procedia PDF Downloads 427
25647 Personalization of Context Information Retrieval Model via User Search Behaviours for Ranking Document Relevance

Authors: Kehinde Agbele, Longe Olumide, Daniel Ekong, Dele Seluwa, Akintoye Onamade

Abstract:

One major problem of most existing information retrieval systems (IRS) is that they provide even access and retrieval results to individual users specially based on the query terms user issued to the system. When using IRS, users often present search queries made of ad-hoc keywords. It is then up to IRS to obtain a precise representation of user’s information need, and the context of the information. In effect, the volume and range of the Internet documents is growing exponentially and consequently causes difficulties for a user to obtain information that precisely matches the user interest. Diverse combination techniques are used to achieve the specific goal. This is due, firstly, to the fact that users often do not present queries to IRS that optimally represent the information they want, and secondly, the measure of a document's relevance is highly subjective between diverse users. In this paper, we address the problem by investigating the optimization of IRS to individual information needs in order of relevance. The paper addressed the development of algorithms that optimize the ranking of documents retrieved from IRS. This paper addresses this problem with a two-fold approach in order to retrieve domain-specific documents. Firstly, the design of context of information. The context of a query determines retrieved information relevance using personalization and context-awareness. Thus, executing the same query in diverse contexts often leads to diverse result rankings based on the user preferences. Secondly, the relevant context aspects should be incorporated in a way that supports the knowledge domain representing users’ interests. In this paper, the use of evolutionary algorithms is incorporated to improve the effectiveness of IRS. A context-based information retrieval system that learns individual needs from user-provided relevance feedback is developed whose retrieval effectiveness is evaluated using precision and recall metrics. The results demonstrate how to use attributes from user interaction behavior to improve the IR effectiveness.

Keywords: context, document relevance, information retrieval, personalization, user search behaviors

Procedia PDF Downloads 465
25646 Biodiversity Conservation Practices Among Indigenous Peoples in Caraga Region, Mindanao, Philippines

Authors: Milagros S. Salibad, Levita B. Grana

Abstract:

The presence and role of Indigenous Peoples residing in key biodiversity, protected, and watershed areas within the ancestral domain in the Caraga Region hold immense significance. This study aimed to determine the level of biodiversity conservation practices among the Mamanwas, Manobos, and Higaonons, and identify facilitating or hindering factors. Employing a mixed-method research design, 421 respondents participated through a researcher-made questionnaire. Focus group discussions, key informant interviews, researcher field notes, community immersions, and secondary sources were done. The three groups have demonstrated a high level of biodiversity conservation practices manifesting their commitment to conserving their natural resources and ecosystems. Evidently, selecting and cutting only mature trees for shelter and tribal usage, and preservation of large trees that harbor ancestors’ spirits and worship through rituals (Mambabaja). Each group exhibited unique environmental practices shaped by their distinct cultures, traditions, customary knowledge, and access to information. The Mamanwa practiced traditional hunting and gathering by using traps while Manobo practiced shifting cultivation to maintain soil fertility and biodiversity, and Higaonon managed forest resources through traditional forest management (establishment of sacred forests and conservation areas). Various facilitating and hindering factors influenced their conservation efforts. Their traditional knowledge and practices, partnership and collaboration, legal recognition and support, access to information, and biodiversity monitoring system facilitate practices. Insufficient government assistance, political and social issues, scarce financial support, inadequate policy enforcement, lack of livelihood opportunities, and land use conflicts hinder them. Monitoring the sustainability of IPs' local biodiversity conservation practices is essential as they contribute to conservation endeavors.

Keywords: biodiversity, conservation, indigenous peoples, traditional knowledge

Procedia PDF Downloads 81
25645 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 112
25644 Analyzing the Politico-Religious Order of The 'Islamic State'

Authors: Galit Truman Zinman

Abstract:

The 'Islamic State' (IS) is one of the most successful jihadist groups in the modern history. The 'Islamic State' strives to realize the idea of erasing the borders between Muslim countries and establishing a wide Islamic caliphate. The 'Islamic State' is based on religious unity and opposition to existing political order. In this paper, the main argument is that the 'Islamic State' is characterized by two significant tendencies of state-building: preservation and change. The methodology of this study is based on the process tracing method and the analysis of primary sources: decisions, announcements and speeches of religious leaders of the Islamic State, slogans, rituals and symbols, audio and video clips produced by the Al-Hayat Media Center, films distributed on YouTube, as well as the content analysis of Dabiq`s articles (IS official Journal) and nasheeds (jihadi songs). The major findings of this study indicate that in practice the 'Islamic State' uses the same socio-political functions typical to the modern state (preservation), but introduces a different religious-ideological content (change). On the one hand, there is a preservation of the principles of existing modern state. Even with the rejection of secularization, globalization, and nationalism, there is an establishment of typical modern nation-state patterns. It is still a state entity, which has an ideological infrastructure, territory, population, governance and a monopoly on the use of violence, security services, justice system, tax collection, etc. All these functions characterize the modern state, and despite the desire of the 'Islamic State' to create a new kind of state, it reminds patterns of the typical modern nation-state. As for the religious-ideological content of the new state, here we can see a tendency of great change. The 'Islamic State' aims to create an Islamic caliphate which would allow the establishment of religious law and order, under a big commitment to return civilization to a seventh-century environment. The 'Islamic State' favors the fight against Western culture and its liberal ideology. It supports the struggle for global jihad against the unbelievers. Today, despite the territorial 'contraction' and the undermining of the organization's governance in Iraq and Syria, the 'Islamic State' continues to maintain its brand among jihadist activists around the world.

Keywords: Islamic State, Islamic caliphate, modern nation-state, religious law and order

Procedia PDF Downloads 186
25643 Evaluation of a Hybrid System for Renewable Energy in a Small Island in Greece

Authors: M. Bertsiou, E. Feloni, E. Baltas

Abstract:

The proper management of the water supply and electricity is the key issue, especially in small islands, where sustainability has been combined with the autonomy and covering of water needs and the fast development in potential sectors of economy. In this research work a hybrid system in Fournoi island (Icaria), a small island of Aegean, has been evaluated in order to produce hydropower and cover water demands, as it can provide solutions to acute problems, such as the water scarcity or the instability of local power grids. The meaning and the utility of hybrid system and the cooperation with a desalination plant has also been considered. This kind of project has not yet been widely applied, so the consideration will give us valuable information about the storage of water and the controlled distribution of the generated clean energy. This process leads to the conclusions about the functioning of the system and the profitability of this project, covering the demand for water and electricity.

Keywords: hybrid system, water, electricity, island

Procedia PDF Downloads 325
25642 Adoption of Electronic Logistics Management Information System for Life-Saving Maternal, Neonatal and Child Health Medicines: A Bangladesh Perspective

Authors: Mohammad Julhas Sujan, Md. Ferdous Alam

Abstract:

Maternal, neonatal, and child health (MNCH) holds one of the prime focuses in Bangladesh’s national healthcare system. To save the lives of mothers and children, knowing the stock of MNCH medicines in different healthcare facilities and when to replenish them are essential. A robust information system not only facilitates efficient management of the essential MNCH medicines but also helps effective allocation of scarce resources. In Bangladesh, Supply chain management of the 25-essential life-saving medicines are currently tracked and monitored via an electronic logistics management information system (eLMIS). Our aim was to conduct a cross-sectional study with a year (2020) worth of data from 24 districts of Bangladesh to evaluate how eLMIS is helping the Government and other stakeholders in efficient supply chain management. Data were collected from 4711 healthcare facilities ranging from primary to secondary levels within a district. About 90% (4143) are community clinics which are considered primary health care facilities in Bangladesh. After eLMIS implementation, the average reporting rate across the districts has been increased (> 97%). The month of stock (MOS) of zinc is an average 6 months compared to Inj. Magnesium Sulphate which will take 2.5 years to consume according to the current average monthly consumption (AMC). Due to first approaching expiry, Tab. Misoprostol, 7.1% Chlorhexidine and Inj. Oxytocin may become unusable. Moreover, Inj. Oxytocin is temperature sensitive and may reduce its efficacy if it is stocked for a longer period. In contrast, Zinc should be sufficiently stocked to prevent sporadic stockouts. To understand how data are collected, transmitted, processed, and aggregated for MNCH medicines in a faster and timely manner, an electronic logistics management information system (eLMIS) is necessary. We recommend the use of such a system in developing countries like Bangladesh for efficient supply chain management of essential MNCH medicines.

Keywords: adaption, eLMIS, MNCH, live-saving medicines

Procedia PDF Downloads 164
25641 Segmentation of Korean Words on Korean Road Signs

Authors: Lae-Jeong Park, Kyusoo Chung, Jungho Moon

Abstract:

This paper introduces an effective method of segmenting Korean text (place names in Korean) from a Korean road sign image. A Korean advanced directional road sign is composed of several types of visual information such as arrows, place names in Korean and English, and route numbers. Automatic classification of the visual information and extraction of Korean place names from the road sign images make it possible to avoid a lot of manual inputs to a database system for management of road signs nationwide. We propose a series of problem-specific heuristics that correctly segments Korean place names, which is the most crucial information, from the other information by leaving out non-text information effectively. The experimental results with a dataset of 368 road sign images show 96% of the detection rate per Korean place name and 84% per road sign image.

Keywords: segmentation, road signs, characters, classification

Procedia PDF Downloads 446