Search results for: built-in vehicle technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8748

Search results for: built-in vehicle technology

3648 Advantages of Fuzzy Control Application in Fast and Sensitive Technological Processes

Authors: Radim Farana, Bogdan Walek, Michal Janosek, Jaroslav Zacek

Abstract:

This paper presents the advantages of fuzzy control use in technological processes control. The paper presents a real application of the Linguistic Fuzzy-Logic Control, developed at the University of Ostrava for the control of physical models in the Intelligent Systems Laboratory. The paper presents an example of a sensitive non-linear model, such as a magnetic levitation model and obtained results which show how modern information technologies can help to solve actual technical problems. A special method based on the LFLC controller with partial components is presented in this paper followed by the method of automatic context change, which is very helpful to achieve more accurate control results. The main advantage of the used system is its robustness in changing conditions demonstrated by comparing with conventional PID controller. This technology and real models are also used as a background for problem-oriented teaching, realized at the department for master students and their collaborative as well as individual final projects.

Keywords: control, fuzzy logic, sensitive system, technological proves

Procedia PDF Downloads 452
3647 Working Fluids in Absorption Chillers: Investigation of the Use of Deep Eutectic Solvents

Authors: L. Cesari, D. Alonso, F. Mutelet

Abstract:

The interest in cold production has been on the increase in absorption chillers for many years. In fact, the absorption cycles replace the compressor and thus reduce electrical consumption. The devices also allow waste heat generated through industrial activities to be recovered and cooled to a moderate temperature in accordance with regulatory guidelines. Many working fluids were investigated but could not compete with the commonly used {H2O + LiBr} and {H2O + NH3} to author’s best knowledge. Yet, the corrosion, toxicity and crystallization phenomena of these mixtures prevent the development of the absorption technology. This work investigates the possible use of a glyceline deep eutectic solvent (DES) and CO2 as working fluid in an absorption chiller. To do so, good knowledge of the mixtures is required. Experimental measurements (vapor-liquid equilibria, density, and heat capacity) were performed to complete the data lacking in the literature. The performance of the mixtures was quantified by the calculation of the coefficient of performance (COP). The results show that working fluids containing DES + CO2 are an interesting alternative and lead to different trails of working mixtures for absorption and chiller.

Keywords: absorption devices, deep eutectic solvent, energy valorization, experimental data, simulation

Procedia PDF Downloads 100
3646 Gender Differences in E-Society: The Case of Slovenia

Authors: Mitja Dečman

Abstract:

The ever-increasing presence and use of information and communication technology (ICT) influences the different social relationships of today's society. Gender differences are especially important from the viewpoint of modern society since ICT can either deepen the existing inequalities or diminish them. In a developed Western world, gender equality has been a well-focused area for decades in many parts of society including education, employment or politics and has led to a decrease in the inequality of women and men in these and other areas. The area of digital equality, or inequality for that matter, is one of the areas where gender differences still exist in many countries of the world. The research presented in this paper focuses on Slovenia, one of the smallest EU member states, being an average achiever in the area of e-society according to the many different European benchmarking indexes. On the other hand, Slovenia is working in an alignment with many European gender equality guidelines and showing good results. The results of our research are based on the analysis of survey data from 2014 to 2017 dealing with Slovenian citizens and their households and the use of ICT. Considering gender issues, the synthesis showed that cultural differences influence some measured ICT indicators but on the other hand the differences are low and only sometimes statistically significant.

Keywords: digital divide, gender inequality, Slovenia, e-society

Procedia PDF Downloads 155
3645 Application of Association Rule Using Apriori Algorithm for Analysis of Industrial Accidents in 2013-2014 in Indonesia

Authors: Triano Nurhikmat

Abstract:

Along with the progress of science and technology, the development of the industrialized world in Indonesia took place very rapidly. This leads to a process of industrialization of society Indonesia faster with the establishment of the company and the workplace are diverse. Development of the industry relates to the activity of the worker. Where in these work activities do not cover the possibility of an impending crash on either the workers or on a construction project. The cause of the occurrence of industrial accidents was the fault of electrical damage, work procedures, and error technique. The method of an association rule is one of the main techniques in data mining and is the most common form used in finding the patterns of data collection. In this research would like to know how relations of the association between the incidence of any industrial accidents. Therefore, by using methods of analysis association rule patterns associated with combination obtained two iterations item set (2 large item set) when every factor of industrial accidents with a West Jakarta so industrial accidents caused by the occurrence of an electrical value damage = 0.2 support and confidence value = 1, and the reverse pattern with value = 0.2 support and confidence = 0.75.

Keywords: association rule, data mining, industrial accidents, rules

Procedia PDF Downloads 276
3644 Drivers of Digital Product Innovation in Firms: An Empirical Study of Technological, Organizational, and Environmental Factors

Authors: Anne Theresa Eidhoff, Sarah E. Stief, Markus Voeth, Sarah Gundlach

Abstract:

With digitalization increasingly changing the rules of competition, firms face the need to adapt and assimilate digital technologies in order to remain competitive. Firms can choose from various possibilities to integrate digital technologies including the option to embed digital technologies aiming to innovate products or to develop digital products. However, the question of which specific factors influence a firm’s decision to pursue digital product innovation remains unanswered in research. By adopting the Technology-Organization-Environment (TOE)-framework we have designed a qualitative exploratory study including eleven German practitioners to investigate relevant contingency factors. Our results indicate that the most critical factors for a company’s decision to pursue digital product innovation can be found in the technological and environmental dimensions, namely customers, competitive pressure, technological change, as well as digitalization fit. 

Keywords: digital innovation, digitalization, product innovation, TOE-framework

Procedia PDF Downloads 461
3643 Running the Athena Vortex Lattice Code in JAVA through the Java Native Interface

Authors: Paul Okonkwo, Howard Smith

Abstract:

This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.

Keywords: aerodynamics, automation, optimisation, AVL, JNI

Procedia PDF Downloads 553
3642 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 64
3641 Hybrid Deep Learning and FAST-BRISK 3D Object Detection Technique for Bin-Picking Application

Authors: Thanakrit Taweesoontorn, Sarucha Yanyong, Poom Konghuayrob

Abstract:

Robotic arms have gained popularity in various industries due to their accuracy and efficiency. This research proposes a method for bin-picking tasks using the Cobot, combining the YOLOv5 CNNs model for object detection and pose estimation with traditional feature detection (FAST), feature description (BRISK), and matching algorithms. By integrating these algorithms and utilizing a small-scale depth sensor camera for capturing depth and color images, the system achieves real-time object detection and accurate pose estimation, enabling the robotic arm to pick objects correctly in both position and orientation. Furthermore, the proposed method is implemented within the ROS framework to provide a seamless platform for robotic control and integration. This integration of robotics, cameras, and AI technology contributes to the development of industrial robotics, opening up new possibilities for automating challenging tasks and improving overall operational efficiency.

Keywords: robotic vision, image processing, applications of robotics, artificial intelligent

Procedia PDF Downloads 73
3640 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 408
3639 Profiling of the Cell-Cycle Related Genes in Response to Efavirenz, a Non-Nucleoside Reverse Transcriptase Inhibitor in Human Lung Cancer

Authors: Rahaba Marima, Clement Penny

Abstract:

The Health-related quality of life (HRQoL) for HIV positive patients has improved since the introduction of the highly active antiretroviral treatment (HAART). However, in the present HAART era, HIV co-morbidities such as lung cancer, a non-AIDS (NAIDS) defining cancer have been documented to be on the rise. Under normal physiological conditions, cells grow, repair and proliferate through the cell-cycle as cellular homeostasis is important in the maintenance and proper regulation of tissues and organs. Contrarily, the deregulation of the cell-cycle is a hallmark of cancer, including lung cancer. The association between lung cancer and the use of HAART components such as Efavirenz (EFV) is poorly understood. This study aimed at elucidating the effects of EFV on the cell-cycle genes’ expression in lung cancer. For this purpose, the human cell-cycle gene array composed of 84 genes was evaluated on both normal lung fibroblasts (MRC-5) cells and adenocarcinoma (A549) lung cells, in response to 13µM EFV or 0.01% vehicle. The ±2 up or down fold change was used as a basis of target selection, with p < 0.05. Additionally, RT-qPCR was done to validate the gene array results. Next, In-silico bio-informatics tools, Search Tool for the Retrieval of Interacting Genes/Proteins (STRING), Reactome, Kyoto Encyclopedia of Genes and Genomes (KEGG) pathway and Ingenuity Pathway Analysis (IPA) were used for gene/gene interaction studies as well as to map the molecular and biological pathways influenced by the identified targets. Interestingly, the DNA damage response (DDR) pathway genes such as p53, Ataxia telangiectasia mutated and Rad3 related (ATR), Growth arrest and DNA damage inducible alpha (GADD45A), HUS1 checkpoint homolog (HUS1) and Role of radiation (RAD) genes were shown to be upregulated following EFV treatment, as revealed by STRING analysis. Additionally, functional enrichment analysis by the KEGG pathway revealed that most of the differentially expressed gene targets function at the cell-cycle checkpoint such as p21, Aurora kinase B (AURKB) and Mitotic Arrest Deficient-Like 2 (MAD2L2). Core analysis by IPA revealed that p53 downstream targets such as survivin, Bcl2, and cyclin/cyclin dependent kinases (CDKs) complexes are down-regulated, following exposure to EFV. Furthermore, Reactome analysis showed a significant increase in cellular response to stress genes, DNA repair genes, and apoptosis genes, as observed in both normal and cancerous cells. These findings implicate the genotoxic effects of EFV on lung cells, provoking the DDR pathway. Notably, the constitutive expression of this pathway (DDR) often leads to uncontrolled cell proliferation and eventually tumourigenesis, which could be the attribute of HAART components’ (such as EFV) effect on human cancers. Targeting the cell-cycle and its regulation holds a promising therapeutic intervention to the potential HAART associated carcinogenesis, particularly lung cancer.

Keywords: cell-cycle, DNA damage response, Efavirenz, lung cancer

Procedia PDF Downloads 141
3638 A Framework for Strategy Development in Small Companies: A Case Study of a Telecommunication Firm

Authors: Maryam Goodarzi, Mahdieh Sheikhi, Mehdi Goodarzi

Abstract:

This study intends to offer an appropriate strategy development framework for a telecommunication firm (as a case study) which works on Information and Communication Technology (ICT) projects, development of telecommunication networks, and maintenance of local networks, according to its dominant condition. In this approach, first, the objectives were set and the mission was defined. Then, the capability was assessed by SWOT matrix. Using SPACE matrix, the strategy of the company was determined. The strategic direction is set and an appropriate and superior strategy was developed and offered employing QSPM matrix. The theoretical framework or conceptual model of the present study first involves 4 stages of framework development and then from stage 3 (assessing capability) onward, a strategic management model by Fred R. David. In this respect, the tools and methods offered in the framework are appropriate for all kinds of organizations, particularly small firms, and help strategists identify, evaluate, and select strategies.

Keywords: strategy formulation, firm mission, strategic direction, space diagram, quantitative strategic planning matrix, SWOT matrix

Procedia PDF Downloads 354
3637 3D Remote Sensing Images Parallax Refining Based On HTML5

Authors: Qian Pei, Hengjian Tong, Weitao Chen, Hai Wang, Yanrong Feng

Abstract:

Horizontal parallax is the foundation of stereoscopic viewing. However, the human eye will feel uncomfortable and it will occur diplopia if horizontal parallax is larger than eye separation. Therefore, we need to do parallax refining before conducting stereoscopic observation. Although some scholars have been devoted to online remote sensing refining, the main work of image refining is completed on the server side. There will be a significant delay when multiple users access the server at the same time. The emergence of HTML5 technology in recent years makes it possible to develop rich browser web application. Authors complete the image parallax refining on the browser side based on HTML5, while server side only need to transfer image data and parallax file to browser side according to the browser’s request. In this way, we can greatly reduce the server CPU load and allow a large number of users to access server in parallel and respond the user’s request quickly.

Keywords: 3D remote sensing images, parallax, online refining, rich browser web application, HTML5

Procedia PDF Downloads 451
3636 Methods of Categorizing Architectural Technical Debt

Authors: Blessing Igbadumhe

Abstract:

The continuous long- and short-term delivery of value to customers continues to be the overarching objective of software organizations. Software engineering professionals and organizations face challenges in the maintenance and evolution of software as a result of architectural, technical debt. The issues of architectural, technical debt continue to receive a significant amount of attention because of its important impact on successful system implementation. The cost of doing nothing as far as architectural, technical debt is concerned can be significant both in financial terms and impacts on customers. Different architectural, technical debt issues exist, and this qualitative research design reviewed existing literature on the subject to identify and categorize them. This research intends to contribute to the existing bludgeoning body of knowledge on categorizations and descriptive model of technical debt related issues related to system architecture. The results identify the most common characteristics of architectural and technical debt categories. Raising awareness of the intricacies of architectural and technical debt helps technology stakeholders reduce negative consequences and increase the system success rate.

Keywords: architecture, categorizing TD, system design, technical debt

Procedia PDF Downloads 78
3635 Designing and Evaluating Pedagogic Conversational Agents to Teach Children

Authors: Silvia Tamayo-Moreno, Diana Pérez-Marín

Abstract:

In this paper, the possibility of children studying by using an interactive learning technology called Pedagogic Conversational Agent is presented. The main benefit is that the agent is able to adapt the dialogue to each student and to provide automatic feedback. Moreover, according to Math teachers, in many cases students are unable to solve the problems even knowing the procedure to solve them, because they do not understand what they have to do. The hypothesis is that if students are helped to understand what they have to solve, they will be able to do it. Taken that into account, we have started the development of Dr. Roland, an agent to help students understand Math problems following a User-Centered Design methodology. The use of this methodology is proposed, for the first time, to design pedagogic agents to teach any subject from Secondary down to Pre-Primary education. The reason behind proposing a methodology is that while working on this project, we noticed the lack of literature to design and evaluate agents. To cover this gap, we describe how User-Centered Design can be applied, and which usability techniques can be applied to evaluate the agent.

Keywords: pedagogic conversational agent, human-computer interaction, user-centered design, natural language interface

Procedia PDF Downloads 307
3634 Conceptual and Preliminary Design of Landmine Searching UAS at Extreme Environmental Condition

Authors: Gopalasingam Daisan

Abstract:

Landmines and ammunitions have been creating a significant threat to the people and animals, after the war, the landmines remain in the land and it plays a vital role in civilian’s security. Especially the Children are at the highest risk because they are curious. After all, an unexploded bomb can look like a tempting toy to an inquisitive child. The initial step of designing the UAS (Unmanned Aircraft Systems) for landmine detection is to choose an appropriate and effective sensor to locate the landmines and other unexploded ammunitions. The sensor weight and other components related to the sensor supporting device’s weight are taken as a payload weight. The mission requirement is to find the landmines in a particular area by making a proper path that will cover all the vicinity in the desired area. The weight estimation of the UAV (Unmanned Aerial Vehicle) can be estimated by various techniques discovered previously with good accuracy at the first phase of the design. The next crucial part of the design is to calculate the power requirement and the wing loading calculations. The matching plot techniques are used to determine the thrust-to-weight ratio, and this technique makes this process not only easiest but also precisely. The wing loading can be calculated easily from the stall equation. After these calculations, the wing area is determined from the wing loading equation and the required power is calculated from the thrust to weight ratio calculations. According to the power requirement, an appropriate engine can be selected from the available engine from the market. And the wing geometric parameter is chosen based on the conceptual sketch. The important steps in the wing design to choose proper aerofoil and which will ensure to create sufficient lift coefficient to satisfy the requirements. The next component is the tail; the tail area and other related parameters can be estimated or calculated to counteract the effect of the wing pitching moment. As the vertical tail design depends on many parameters, the initial sizing only can be done in this phase. The fuselage is another major component, which is selected based on the slenderness ratio, and also the shape is determined on the sensor size to fit it under the fuselage. The landing gear is one of the important components which is selected based on the controllability and stability requirements. The minimum and maximum wheel track and wheelbase can be determined based on the crosswind and overturn angle requirements. The minor components of the landing gear design and estimation are not the focus of this project. Another important task is to calculate the weight of the major components and it is going to be estimated using empirical relations and also the mass is added to each such component. The CG and moment of inertia are also determined to each component separately. The sensitivity of the weight calculation is taken into consideration to avoid extra material requirements and also reduce the cost of the design. Finally, the aircraft performance is calculated, especially the V-n (velocity and load factor) diagram for different flight conditions such as not disturbed and with gust velocity.

Keywords: landmine, UAS, matching plot, optimization

Procedia PDF Downloads 157
3633 Characterization of Coastal Solid Waste: Basis for the Development of Waste Collector

Authors: Arnold I. Malag

Abstract:

The study wants to establish the data on the characteristics of coastal solid waste in main Island of Masbate as a model for technology interventions. The research utilized the Google Maps to measure the coastal length and Fishbowl Method for area identification. The solid wastes gathered were classified as residual, non-biodegradable, recyclable wastes, and special wastes, based on the waste analysis and characterization manual of Philippine Environmental Governance Project. The wastes were evaluated by weight in kg., dimension in cm., and characteristics as floating or non-floating. Based on the dimension of coastal solid waste, the biodegradable, recyclable, residual and special waste have the average of 40.95 cm., 16.25 cm., 31.37 cm., and 0.725cm. respectively. The waste in the coastal areas is dominated by biodegradable, followed by residual, then recyclable and special wastes with the data of 0.566 kg/m, 0.533 kg/m, 0.114 kg/m and .0007 kg/m respectively. The 97.15% of solid wastes collected is characterized as “floating”, where in the sources are the nearest rivers and waterways and/or the nearest populated areas adjacent to the island. This accumulation of solid wastes can be minimized and controlled by utilizing a floating equipment.

Keywords: solid waste, coastal waste, waste characterization, waste collector

Procedia PDF Downloads 68
3632 Investigation of Dynamic Heat Transfer in Masonry Walls

Authors: Joelle Al Fakhoury, Emilio Sassine, Yassine Cherif, Joseph Dgheim, Emmanuel Antczak

Abstract:

Hollow block masonry is the most used building technology in the Lebanese context. These blocks are manufactured in an artisanal way and have unknown thermal properties; their overall thermos-physical performance is thus unknown and also poorly investigated scientifically in both single wall and also double wall configurations. In this work, experimental measurements and numerical simulations are performed for a better understanding of the heat transfer in masonry walls. This study was realized using an experimental setup consisting of a masonry hollow block wall (0.1m x 1m x 1m) and two heat boxes, such that each covers one side of the wall. The first is a reference box having a constant interior temperature, and the other is a control box having an adjustable interior temperature. At first, the numerical model is validated using an experimental setup; then 3D numerical analyzes are held in order to investigate the effect of the air gap, the mortar joints, and the plastering on the thermal performance of masonry walls for a better understanding of the heat transfer process and the recommendation of suitable thermal improvements.

Keywords: masonry wall, hollow blocks, heat transfer, wall instrumentation, thermal improvement

Procedia PDF Downloads 215
3631 Banking and Accounting Analysis Researches Effect on Environment

Authors: Marina Magdy Naguib Karas

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 30
3630 Analyzing the Quality of Cloud-Based E-Learning Systems on the Perception of the Learners and the Teachers

Authors: R. W. C. Devindi, S. M. Buddika Harshanath

Abstract:

E-learning is a widely used technology for learning in the modern world. With the pandemic situation the popularity of using e-learning has been increased in a larger capacity. The e-learning educational systems require software resources as well as hardware usually but it is hard for most of the education institutions to afford those resources. Also with the massive user load e-learning has to broaden the server side resources as well. Therefore, in the present cloud computing was implemented in order to make the e – learning systems more efficient. The researcher has analyzed the quality of the e-learning systems on the perception of the learners and the teachers with the aid of hypothesis and has given the analyzed results and the discussion in this report. Therefore, the future research will be able to get some steps to increase the quality of the online learning systems furthermore. In the case of e-learning, quality assurance and cost effectiveness are essential. A complex quality assurance system is used in the stated project. There are no well-defined standard evaluation measures in this field. As a result, accurately assessing the e-learning system's overall quality is challenging. The researcher has done the analysis with the aid of standard methods and software.

Keywords: LMS–learning management system, SPSS–statistical package for social sciences (software), eigen value, hypothesis

Procedia PDF Downloads 93
3629 A User-Side Analysis of the Public-Private Partnership: The Case of the New Bundang Subway Line in South Korea

Authors: Saiful Islam, Deuk Jong Bae

Abstract:

The purpose of this study is to examine citizen satisfaction and competitiveness of a Public Private Partnership project. The study focuses on PPP in the transport sector and investigates the New Bundang Subway Line (NBL) in South Korea as the object of a case study. Most PPP studies are dominated by the study of public and private sector interests, which are classified in to three major areas comprising of policy, finance, and management. This study will explore the user perspective by assessing customer satisfaction upon NBL cost and service quality, also the competitiveness of NBL compared to other alternative transport modes which serve the Jeongja – Gangnam trip or vice versa. The regular Bundang Subway Line, New Bundang Subway Line, bus and private vehicle are selected as the alternative transport modes. The study analysed customer satisfaction of NBL and citizen’s preference of alternative transport modes based on a survey in Bundang district, South Korea. Respondents were residents and employees who live or work in Bundang city, and were divided into the following areas Pangyo, Jeongjae – Sunae, Migeun – Ori – Jukjeon, and Imae – Yatap – Songnam. The survey was conducted in January 2015 for two weeks, and 753 responses were gathered. By applying the Hedonic Utility approach, the factors which affect the frequency of using NBL were found to be overall customer satisfaction, convenience of access, and the socio economic demographic of the individual. In addition, by applying the Analytic Hierarchy Process (AHP) method, criteria factors influencing the decision to select alternative transport modes were identified. Those factors, along with the author judgement of alternative transport modes, and their associated criteria and sub-criteria produced a priority list of user preferences regarding their alternative transport mode options. The study found that overall the regular Bundang Subway Line (BL), which was built and operated under a conventional procurement method was selected as the most preferable transport mode due to its cost competitiveness. However, on the sub-criteria level analysis, the NBL has competitiveness on service quality, particularly on journey time. By conducting a sensitivity analysis, the NBL can become the first choice of transport by increasing the NBL’s degree of weight associated with cost by 0,05. This means the NBL would need to reduce either it’s fare cost or transfer fee, or combine those two cost components to reduce the total of the current cost by 25%. In addition, the competitiveness of NBL also could be obtained by increasing NBL convenience through escalating access convenience such as constructing an additional station or providing more access modes. Although these convenience improvements would require a few extra minutes of journey time, the user found this to be acceptable. The findings and policy suggestions can contribute to the next phase of NBL development, showing that consideration should be given to the citizen’s voice. The case study results also contribute to the literature of PPP projects specifically from a user side perspective.

Keywords: public private partnership, customer satisfaction, public transport, new Bundang subway line

Procedia PDF Downloads 337
3628 Business-to-Business Deals Based on a Co-Utile Collaboration Mechanism: Designing Trust Company of the Future

Authors: Riccardo Bonazzi, Michaël Poli, Abeba Nigussie Turi

Abstract:

This paper presents an applied research of a new module for the financial administration and management industry, Personalizable and Automated Checklists Integrator, Overseeing Legal Investigations (PACIOLI). It aims at designing the business model of the trust company of the future. By identifying the key stakeholders, we draw a general business process design of the industry. The business model focuses on disintermediating the traditional form of business through the new technological solutions of a software company based in Switzerland and hence creating a new interactive platform. The key stakeholders of this interactive platform are identified as IT experts, legal experts, and the New Edge Trust Company (NATC). The mechanism we design and propose has a great importance in improving the efficiency of the financial business administration and management industry, and it also helps to foster the provision of high value added services in the sector.

Keywords: new edge trust company, business model design, automated checklists, financial technology

Procedia PDF Downloads 352
3627 Impact of Hard Limited Clipping Crest Factor Reduction Technique on Bit Error Rate in OFDM Based Systems

Authors: Theodore Grosch, Felipe Koji Godinho Hoshino

Abstract:

In wireless communications, 3GPP LTE is one of the solutions to meet the greater transmission data rate demand. One issue inherent to this technology is the PAPR (Peak-to-Average Power Ratio) of OFDM (Orthogonal Frequency Division Multiplexing) modulation. This high PAPR affects the efficiency of power amplifiers. One approach to mitigate this effect is the Crest Factor Reduction (CFR) technique. In this work, we simulate the impact of Hard Limited Clipping Crest Factor Reduction technique on BER (Bit Error Rate) in OFDM based Systems. In general, the results showed that CFR has more effects on higher digital modulation schemes, as expected. More importantly, we show the worst-case degradation due to CFR on QPSK, 16QAM, and 64QAM signals in a linear system. For example, hard clipping of 9 dB results in a 2 dB increase in signal to noise energy at a 1% BER for 64-QAM modulation.

Keywords: bit error rate, crest factor reduction, OFDM, physical layer simulation

Procedia PDF Downloads 351
3626 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 152
3625 Use of Social Networks and Mobile Technologies in Education

Authors: Václav Maněna, Roman Dostál, Štěpán Hubálovský

Abstract:

Social networks play an important role in the lives of children and young people. Along with the high penetration of mobile technologies such as smartphones and tablets among the younger generation, there is an increasing use of social networks already in elementary school. The paper presents the results of research, which was realized at schools in the Hradec Králové region. In this research, the authors focused on issues related to communications on social networks for children, teenagers and young people in the Czech Republic. This research was conducted at selected elementary, secondary and high schools using anonymous questionnaires. The results are evaluated and compared with the results of the research, which has been realized in 2008. The authors focused on the possibilities of using social networks in education. The paper presents the possibility of using the most popular social networks in education, with emphasis on increasing motivation for learning. The paper presents comparative analysis of social networks, with regard to the possibility of using in education as well.

Keywords: social networks, motivation, e-learning, mobile technology

Procedia PDF Downloads 298
3624 Polymer Spiral Film Gas-Liquid Heat Exchanger for Waste Heat Recovery in Exhaust Gases

Authors: S. R. Parthiban, C. Elajchet Senni

Abstract:

Spiral heat exchangers are known as excellent heat exchanger because of far compact and high heat transfer efficiency. An innovative spiral heat exchanger based on polymer materials is designed for waste heat recovery process. Such a design based on polymer film technology provides better corrosion and chemical resistance compared to conventional metal heat exchangers. Due to the smooth surface of polymer film fouling is reduced. A new arrangement for flow of hot flue gas and cold fluid is employed for design, flue gas flows in axial path while the cold fluid flows in a spiral path. Heat load recovery achieved with the presented heat exchanger is in the range of 1.5 kW thermic but potential heat recovery about 3.5kW might be achievable. To measure the performance of the spiral tube heat exchanger, its model is suitably designed and fabricated so as to perform experimental tests. The paper gives analysis of spiral tube heat exchanger.

Keywords: spiral heat exchanger, polymer based materials, fouling factor, heat load

Procedia PDF Downloads 355
3623 An Anthropological Insight into Farming Practices and Cultural Life of Farmers in Sarawan Village, District Faridkot, Punjab

Authors: Amandeep Kaur

Abstract:

Farming is one of the most influential traditions which started around 10000 BC and has revolutionized human civilization. It is believed that farming originated at a separate location. Thus it has a great impact on local culture, which in turn gave rise to diversified farming practices. Farming activities are influenced by the culture of a particular region or community as local people have their own knowledge and belief system about soil and crops. With the inception of the Green Revolution, 'a high tech machinery model' in Punjab, various traditional farming methods and techniques changed. The present research concentrates on the local knowledge of farmers and local farming systems from an anthropological perspective. In view of the prevailing agrarian crisis in Punjab, this research is focused on farmer’s experiences and their perception regarding farming practices. Thus an attempt has to be made to focus on the local knowledge, perception, and experience of farmers for eco-friendly and sustainable agricultural development. Farmers voices are used to understand the relationship between farming practices and socio-cultural life of farmers in Faridkot district, Punjab. The research aims to comprehend the nature of changes taking place in the socio-cultural life of people with the development of capitalism and agricultural modernization. The study is based on qualitative methods of ethnography in Sarawan village of Faridkot District. Inferences drawn from in-depth case studies collected from 60 agricultural households lead to the concept of the process of diffusion, innovation, and adoption of farming technology, a variety of crops and the dissemination of agricultural skills regarding various cultural farming practices. The data is based on random sampling; the respondents were both males and females above the age of 18 years to attain a holistic understanding across the generations. A Quasi-participant observation related to lifestyle, the standard of living, and various farming practices performed by them were done. Narratives derived from the fieldwork depicts that farmers usually oppose the restrictions imposed by the government on certain farming practices, especially ban on stubble burning. This paper presents the narratives of farmers regarding the dissemination of awareness about the use of new varieties of seeds, technology, fertilizers, pesticides, etc. The study reveals that farming systems have developed in ways reflecting the activities and choices of farmers influenced by environmental, socio-cultural, economic, and political situations. Modern farming practices have forced small farmers into debt as farmers feel pride in buying new machinery. It has also led to the loss of work culture and excessive use of drugs among youngsters. Even laborers did not want to work on the land with cultivating farmers primarily for social and political reasons. Due to lack of proper marketing of crops, there is a continuum of the wheat-rice cycle instead of crop diversification in Punjab. Change in the farming system also affects the social structure of society. Agricultural modernization has commercialized the socio-cultural relations in Punjab and is slowly urbanizing the rural landscape revolutionizing the traditional social relations to capitalistic relations.

Keywords: agricultural modernization, capitalism, farming practices, narratives

Procedia PDF Downloads 133
3622 Seismic Performance of a Framed Structure Retrofitted with Damped Cable Systems

Authors: Asad Naeem, Minsung Kim, Jinkoo Kim

Abstract:

In this work, the effectiveness of damped cable systems (DCS) on the mitigation of earthquake-induced response of a framed structure is investigated. The seismic performance of DCS is investigated using fragility analysis and life cycle cost evaluation of an existing building retrofitted with DCS, and the results are compared with those of the structure retrofitted with viscous dampers. The comparison of the analysis results reveals that, due to the self-centering capability of the DCS, residual displacement becomes nearly zero in the structure retrofitted with the DCS. According to the fragility analysis, the structure retrofitted with the DCS has smaller probability of reaching a limit states compared to the structure with viscous dampers. It is also observed that both the initial and life cycle costs of the DCS method required for the seismic retrofit is smaller than those of the structure retrofitted with viscous dampers. Acknowledgment: This research was supported by a grant (17CTAP-C132889-01) from Technology Advancement Research Program (TARP) funded by Ministry of Land, Infrastructure, and Transport of Korean government.

Keywords: damped cable system, seismic retrofit, self centering, fragility analysis

Procedia PDF Downloads 441
3621 Analyzing Current Transformer’s Transient and Steady State Behavior for Different Burden’s Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, D. Sharma

Abstract:

Current transformers (CTs) are used to transform large primary currents to a small secondary current. Since most standard equipment’s are not designed to handle large primary currents the CTs have an important part in any electrical system for the purpose of Metering and Protection both of which are integral in Power system. Now a days due to advancement in solid state technology, the operation times of the protective relays have come to a few cycles from few seconds. Thus, in such a scenario it becomes important to study the transient response of the current transformers as it will play a vital role in the operating of the protective devices. This paper shows the steady state and transient behavior of current transformers and how it changes with change in connected burden. The transient and steady state response will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer characteristics with changes in burden will be discussed.

Keywords: accuracy, accuracy limiting factor, burden, current transformer, instrument security factor

Procedia PDF Downloads 332
3620 A Vision-Based Early Warning System to Prevent Elephant-Train Collisions

Authors: Shanaka Gunasekara, Maleen Jayasuriya, Nalin Harischandra, Lilantha Samaranayake, Gamini Dissanayake

Abstract:

One serious facet of the worsening Human-Elephant conflict (HEC) in nations such as Sri Lanka involves elephant-train collisions. Endangered Asian elephants are maimed or killed during such accidents, which also often result in orphaned or disabled elephants, contributing to the phenomenon of lone elephants. These lone elephants are found to be more likely to attack villages and showcase aggressive behaviour, which further exacerbates the overall HEC. Furthermore, Railway Services incur significant financial losses and disruptions to services annually due to such accidents. Most elephant-train collisions occur due to a lack of adequate reaction time. This is due to the significant stopping distance requirements of trains, as the full braking force needs to be avoided to minimise the risk of derailment. Thus, poor driver visibility at sharp turns, nighttime operation, and poor weather conditions are often contributing factors to this problem. Initial investigations also indicate that most collisions occur in localised “hotspots” where elephant pathways/corridors intersect with railway tracks that border grazing land and watering holes. Taking these factors into consideration, this work proposes the leveraging of recent developments in Convolutional Neural Network (CNN) technology to detect elephants using an RGB/infrared capable camera around known hotspots along the railway track. The CNN was trained using a curated dataset of elephants collected on field visits to elephant sanctuaries and wildlife parks in Sri Lanka. With this vision-based detection system at its core, a prototype unit of an early warning system was designed and tested. This weatherised and waterproofed unit consists of a Reolink security camera which provides a wide field of view and range, an Nvidia Jetson Xavier computing unit, a rechargeable battery, and a solar panel for self-sufficient functioning. The prototype unit was designed to be a low-cost, low-power and small footprint device that can be mounted on infrastructures such as poles or trees. If an elephant is detected, an early warning message is communicated to the train driver using the GSM network. A mobile app for this purpose was also designed to ensure that the warning is clearly communicated. A centralized control station manages and communicates all information through the train station network to ensure coordination among important stakeholders. Initial results indicate that detection accuracy is sufficient under varying lighting situations, provided comprehensive training datasets that represent a wide range of challenging conditions are available. The overall hardware prototype was shown to be robust and reliable. We envision a network of such units may help contribute to reducing the problem of elephant-train collisions and has the potential to act as an important surveillance mechanism in dealing with the broader issue of human-elephant conflicts.

Keywords: computer vision, deep learning, human-elephant conflict, wildlife early warning technology

Procedia PDF Downloads 211
3619 Collaborative Technology Implementation Success and Knowledge Capacity: Case of Tunisian Banks with Mixed Capital

Authors: Amira Khelil, Habib Affes

Abstract:

Organization resource planning implementation success is important. Today`s competitors in business, in enterprise resource planning and in managing are becoming one of the main tools of achieving competitiveness in business. Resource technologies are considered as an infrastructure to create and maintain business to improve front and back-office efficiency and effectiveness. This study is significant to bring new ideas in determining the key antecedents which are technological resource planning implementation based on knowledge capacity perspectives and help to understand the key success factor in the Tunisian banks. Based on a survey of 150 front office Tunisian agents working in Tunisian banks with mixed capital, using Groupware system, only 51 respondents had given feedback to this survey. By using Warp PLS 3.0, through several tests the relationship between knowledge capability and Groupware implementation success having beta coefficient 0.37 and P-Value <0.01. This result highlights that knowledge capability of bank agent can influence the success of the Groupware implementation.

Keywords: groupware implementation, knowledge capacity, partial least squares method, Tunisian banks

Procedia PDF Downloads 473