Search results for: handle value
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 524

Search results for: handle value

494 Reliable Multicast Communication in Next Generation Networks

Authors: Muazzam Ali Khan Khattak

Abstract:

Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.

Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN

Procedia PDF Downloads 471
493 An Approach on the Design of a Solar Cell Characterization Device

Authors: Christoph Mayer, Dominik Holzmann

Abstract:

This paper presents the development of a compact, portable and easy to handle solar cell characterization device. The presented device reduces the effort and cost of single solar cell characterization to a minimum. It enables realistic characterization of cells under sunlight within minutes. In the field of photovoltaic research the common way to characterize a single solar cell or a module is, to measure the current voltage curve. With this characteristic the performance and the degradation rate can be defined which are important for the consumer or developer. The paper consists of the system design description, a summary of the measurement results and an outline for further developments.

Keywords: solar cell, photovoltaics, PV, characterization

Procedia PDF Downloads 390
492 A Word-to-Vector Formulation for Word Representation

Authors: Sandra Rizkallah, Amir F. Atiya

Abstract:

This work presents a novel word to vector representation that is based on embedding the words into a sphere, whereby the dot product of the corresponding vectors represents the similarity between any two words. Embedding the vectors into a sphere enabled us to take into consideration the antonymity between words, not only the synonymity, because of the suitability to handle the polarity nature of words. For example, a word and its antonym can be represented as a vector and its negative. Moreover, we have managed to extract an adequate vocabulary. The obtained results show that the proposed approach can capture the essence of the language, and can be generalized to estimate a correct similarity of any new pair of words.

Keywords: natural language processing, word to vector, text similarity, text mining

Procedia PDF Downloads 242
491 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 373
490 Habits for Teenagers to Remain Unruffled by Stress When They Enter the Workforce

Authors: Sandeep Nath

Abstract:

There are good stresses and bad stresses. To tell the difference, recognize early signs of stress, and label stress conditions correctly, we need to understand stress triggers and the mechanism of stress as it arises. By understanding this in our teenage years, we can be prepared to prevent harmful stress from escalating and ruining health, physical, mental, and emotional. We can also prepare others/peers to be stress-free. The understanding of this is available in a form closest to our natural being, in ancient oriental wisdom, and is brought together as actionable habits in the movement called RENEWALism. The constructs of RENEWALism Habits are detailed in this paper, and case studies are presented of teenagers who have been equipped with both capability and capacity to handle their situations and environments independently.

Keywords: habits, renewalism, stress, teenagers

Procedia PDF Downloads 45
489 Approximation of Intersection Curves of Two Parametric Surfaces

Authors: Misbah Irshad, Faiza Sarfraz

Abstract:

The problem of approximating surface to surface intersection is considered to be very important in computer aided geometric design and computer aided manufacturing. Although it is a complex problem to handle, its continuous need in the industry makes it an active topic in research. A technique for approximating intersection curves of two parametric surfaces is proposed, which extracts boundary points and turning points from a sequence of intersection points and interpolate them with the help of rational cubic spline functions. The proposed approach is demonstrated with the help of examples and analyzed by calculating error.

Keywords: approximation, parametric surface, spline function, surface intersection

Procedia PDF Downloads 238
488 Working Improvement of Modern Finance in Millennium World

Authors: Saeed Mohammadirad

Abstract:

Financing activities involve long-term liabilities, stockholders' equity (or owner's equity), and changes to short-term borrowings. Finance is very important for every business activities. To perform the finance we have to follow the accounting languages bases on the nature of the business. If all are one package in the software, it is easy to handle, monitor, control, plan, organize, direct and budget the finance. Let us make a challenge in the computer software for the whole finance packages of every business related activities. In this article, it mentioned about the finance functions in the various levels of the business activities and how it should be maintained properly to avoid the unethical events.

Keywords: financing activities, business activities, computer software, unethical events

Procedia PDF Downloads 331
487 Mindful Habits to Remain Unruffled by Stress in the Workplace

Authors: Sandeep Nath

Abstract:

There are good stresses and bad stresses. To tell the difference, recognize early signs of stress, and label stress conditions correctly, we need to understand stress triggers and the mechanism of stress as it arises. By understanding this through mindfulness of body, mind, and spirit, we can be prepared to prevent harmful stress from escalating and ruining health; physical, mental, and emotional. We can also prepare others/peers to be stress-free. The understanding of this is available in a form closest to our natural being, in ancient oriental wisdom, and is brought together as actionable habits in the movement called RENEWALism. The constructs of RENEWALism Habits are detailed in this paper, and case studies presented of how mindfulness has equipped individuals with both capability and capacity to handle their situations and environments despite the odds.

Keywords: habits, mindfulness, renewalism, stress

Procedia PDF Downloads 135
486 Efficient Modeling Technique for Microstrip Discontinuities

Authors: Nassim Ourabia, Malika Ourabia

Abstract:

A new and efficient method is presented for the analysis of arbitrarily shaped discontinuities. The technique obtains closed form expressions for the equivalent circuits which are used to model these discontinuities. Then it would be easy to handle and to characterize complicated structures like T and Y junctions, truncated junctions, arbitrarily shaped junctions, cascading junctions, and more generally planar multiport junctions. Another advantage of this method is that the edge line concept for arbitrary shape junctions operates with real parameters circuits. The validity of the method was further confirmed by comparing our results for various discontinuities (bend, filters) with those from HFSS as well as from other published sources.

Keywords: CAD analysis, contour integral approach, microwave circuits, s-parameters

Procedia PDF Downloads 481
485 Mobile Cloud Computing: How to Improve

Authors: Abdullah Aljumah, Tariq Ahamad

Abstract:

The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.

Keywords: Cloud Computing, MCC, SAAS, computer interaction

Procedia PDF Downloads 347
484 Problems Encountered in Teaching English as a Second Language in Asia

Authors: Geraldine Agbor Ojong

Abstract:

This paper conveys some of the problems teachers of ESL face in classroom settings in Thailand. The results of this paper is achieved through close and open ended questionaires administered to a group of English language teachers of three prominent schools in Kaengkhoi, saraburi Province, Thailand.(Saengvithaya school, kaengkhoi school and Pytoon withaya school). Face to face interview of some foreign teachers and students selected randomly And general observation. The data was analysed by frequency distribution and percentage: The result of the study may be generalized so that the conference committee can suggest possible solutions or give contributing ideas on how to handle some of these problems.

Keywords: Asian, colonize, ESL, foreign country

Procedia PDF Downloads 418
483 General Network with Four Nodes and Four Activities with Triangular Fuzzy Number as Activity Times

Authors: Rashmi Tamhankar, Madhav Bapat

Abstract:

In many projects, we have to use human judgment for determining the duration of the activities which may vary from person to person. Hence, there is vagueness about the time duration for activities in network planning. Fuzzy sets can handle such vague or imprecise concepts and has an application to such network. The vague activity times can be represented by triangular fuzzy numbers. In this paper, a general network with fuzzy activity times is considered and conditions for the critical path are obtained also we compute total float time of each activity. Several numerical examples are discussed.

Keywords: PERT, CPM, triangular fuzzy numbers, fuzzy activity times

Procedia PDF Downloads 436
482 HKIE Accreditation: A Comparative Study on the Old and New Criteria

Authors: Peter P. K. Chiu

Abstract:

This paper reports a comparative study of new and old criteria for the professional accreditation of programme by the Hong Kong Institution of Engineers (HKIE). The major change in the criteria is the adoption of the outcome-based accreditation criteria and the use of measurement of attainment of outcomes which is very different from what academic did in the past. This has imposed a lot of difficulty for people in preparation for such exercise. Through this comparative study, the major difference between the two criteria is identified and a methodology is devised to help the academic to handle the issues due to the adoption of the new criteria. Thus it saves a lot of efforts.

Keywords: Hong Kong institution of engineers, outcome-based accreditation, Sydney accord, Washington accord

Procedia PDF Downloads 265
481 The Tiv Oral Poet and Taraba Crisis: Anger, Frustration and Uncotrollable Emotionalism in Obadia Kehemen Orkor's Ballads

Authors: Peter Nave Shirga

Abstract:

Obadia Kehemen Orkor’s songs that focus on the predicament of the Tiv man in Taraba in North Central Nigeria handle themes such as poverty, social inequality, discrimination and tyranny perpetrated by Jukun against the Tiv. The major thrust of his focus in the songs is the overriding longing for mutual understanding between the Jukun and Tiv that would usher in love, equality, peace and harmonious co-existence for the two antagonistic ethnic groups. This paper examines Obadia’s hard-hitting lyrics that reveal the anger, frustration and boiling emotionalism of Tiv people in Taraba state of Nigeria.

Keywords: poet, crisis, emotionalism, frustration

Procedia PDF Downloads 276
480 Artificial Intelligence: Mathway and Its Features

Authors: Aroob Binhimd, Lyan Sayoti, Rana Almansour

Abstract:

In recent years, artificial intelligence has grown drastically. This has led to the growth of educational programs to help students in solving educational problems and assist them in understanding certain topics. The purpose of this report is to investigate the Mathway application. Mathway is a mathematics software that teaches students how to solve and handle mathematical issues. The app allows students to insert questions manually on the platform or take a picture of the question, and then they get an answer to this mathematical question. It helps students enhance their performance in mathematics. This app can also be used to verify or check if their answers are correct. The report will include a questionnaire to collect data and analyze the users of this application.

Keywords: artificial intelligence, Mathway, mathematics, mathematical problems

Procedia PDF Downloads 235
479 Softening Finishing: Teaching and Learning Materials

Authors: C.W. Kan

Abstract:

Softening applied on textile products based on several reasons. First, the synthetic detergent removes natural oils and waxes, thus lose the softness. Second, compensate the harsh handle of resin finishing. Also, imitate natural fibres and improve the comfort of fabric are the reasons to apply softening. There are different types of softeners for softening finishing of textiles, nonionic softener, anionic softener, cationic softener and silicone softener. The aim of this study is to illustrate the proper application of different softeners and their final softening effect in textiles. The results could also provide guidance note to the students in learning this topic. Acknowledgment: Authors would like to thank the financial support from the Hong Kong Polytechnic University for this work.

Keywords: learning materials, softening, textiles, effect

Procedia PDF Downloads 198
478 A Universal Hybrid Adsorbent Based on Chitosan for Water Treatment

Authors: Sandrine Delpeux-Ouldriane, Min Cai, Laurent Duclaux, Laurence Reinert, Fabrice Muller

Abstract:

A novel hybrid adsorbent, based on chitosan biopolymer, clays and activated carbon was prepared. Hybrid chitosan beads containing dispersed clays and activated carbons were prepared by precipitation in basic medium. Such a composite material is still very porous and presents a wide adsorption spectrum. The obtained composite adsorbent is able to handle all the pollution types including heavy metals, polar and hydrophobic organic molecules and nitrates. It could find a place of choice in tertiary water treatment processes or for an ‘at source’ treatment concerning chemical or pharmaceutical industries.

Keywords: adsorption, chitosan, clay mineral, activated carbon

Procedia PDF Downloads 371
477 A Survey of Crowdsourcing Technology

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency and high quality, make crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker and Amazon Mechanical Turk(Mturk) tend to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on the workflow, quality control, cost control and delay control, introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research direction in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 46
476 Element-Independent Implementation for Method of Lagrange Multipliers

Authors: Gil-Eon Jeong, Sung-Kie Youn, K. C. Park

Abstract:

Treatment for the non-matching interface is an important computational issue. To handle this problem, the method of Lagrange multipliers including classical and localized versions are the most popular technique. It essentially imposes the interface compatibility conditions by introducing Lagrange multipliers. However, the numerical system becomes unstable and inefficient due to the Lagrange multipliers. The interface element-independent formulation that does not include the Lagrange multipliers can be obtained by modifying the independent variables mathematically. Through this modification, more efficient and stable system can be achieved while involving equivalent accuracy comparing with the conventional method. A numerical example is conducted to verify the validity of the presented method.

Keywords: element-independent formulation, interface coupling, methods of Lagrange multipliers, non-matching interface

Procedia PDF Downloads 386
475 Development of Fem Code for 2-D Elasticity Problems Using Quadrilateral and Triangular Elements

Authors: Muhammad Umar Kiani, Waseem Sakawat

Abstract:

This study presents the development of FEM code using Quadrilateral 4-Node (Q4) and Triangular 3-Node (T3) elements. Code is formulated using MATLAB language. Instead of using both elements in the same code, two separate codes are written. Quadrilateral element is difficult to handle directly, that is why natural coordinates (eta, ksi) are used. Due to this, Q4 code includes numerical integration (Gauss quadrature). In this case, complete numerical integration is performed using 2 points. On the other hand, T3 element can be modeled directly, by using direct stiffness approach. Axially loaded element, cantilever (special constraints) and Patch test cases were analyzed using both codes and the results were verified by using Ansys.

Keywords: FEM code, MATLAB, numerical integration, ANSYS

Procedia PDF Downloads 393
474 A Survey of Crowdsourcing Technology and Application

Authors: Qianjia Cheng, Hongquan Jiang

Abstract:

Crowdsourcing solves the problems that computers can't handle by integrating computers and the Internet. Its extensive knowledge sources, high efficiency, and high quality have made crowdsourcing attract wide attention in industry and academia in recent years. The development of online crowdsourcing platforms such as Clickworker, Amazon Mechanical Turk(Mturk) tends to mature gradually. This paper sorts out the concept of crowdsourcing, sorts out the workflow of competitive crowdsourcing, summarizes the related technologies of crowdsourcing based on workflow, quality control, cost control, and delay control, and introduces the typical crowdsourcing platform. Finally, we highlight some open problems of the current crowdsourcing and present some future research directions in this area.

Keywords: application, crowdsourcing, crowdsourcing platform, system architecture

Procedia PDF Downloads 55
473 Disturbance Observer-Based Predictive Functional Critical Control of a Table Drive System

Authors: Toshiyuki Satoh, Hiroki Hara, Naoki Saito, Jun-ya Nagase, Norihiko Saga

Abstract:

This paper addresses a control system design for a table drive system based on the disturbance observer (DOB)-based predictive functional critical control (PFCC). To empower the previously developed DOB-based PFC to handle constraints on controlled outputs, we propose to take a critical control approach. To this end, we derive the transfer function representation of the PFC controller, and yield a detailed design procedure. The effectiveness of the proposed method is confirmed through an experimental evaluation.

Keywords: critical control, disturbance observer, mechatronics, motion control, predictive functional control, table drive systems

Procedia PDF Downloads 462
472 Association Rules Mining and NOSQL Oriented Document in Big Data

Authors: Sarra Senhadji, Imene Benzeguimi, Zohra Yagoub

Abstract:

Big Data represents the recent technology of manipulating voluminous and unstructured data sets over multiple sources. Therefore, NOSQL appears to handle the problem of unstructured data. Association rules mining is one of the popular techniques of data mining to extract hidden relationship from transactional databases. The algorithm for finding association dependencies is well-solved with Map Reduce. The goal of our work is to reduce the time of generating of frequent itemsets by using Map Reduce and NOSQL database oriented document. A comparative study is given to evaluate the performances of our algorithm with the classical algorithm Apriori.

Keywords: Apriori, Association rules mining, Big Data, Data Mining, Hadoop, MapReduce, MongoDB, NoSQL

Procedia PDF Downloads 135
471 Identification of the Relationship Between Signals in Continuous Monitoring of Production Systems

Authors: Maciej Zaręba, Sławomir Lasota

Abstract:

Understanding the dependencies between the input signal, that controls the production system and signals, that capture its output, is of a great importance in intelligent systems. The method for identification of the relationship between signals in continuous monitoring of production systems is described in the paper. The method discovers the correlation between changes in the states derived from input signals and resulting changes in the states of output signals of the production system. The method is able to handle system inertia, which determines the time shift of the relationship between the input and output.

Keywords: manufacturing operation management, signal relationship, continuous monitoring, production systems

Procedia PDF Downloads 66
470 Classification of Red, Green and Blue Values from Face Images Using k-NN Classifier to Predict the Skin or Non-Skin

Authors: Kemal Polat

Abstract:

In this study, it has been estimated whether there is skin by using RBG values obtained from the camera and k-nearest neighbor (k-NN) classifier. The dataset used in this study has an unbalanced distribution and a linearly non-separable structure. This problem can also be called a big data problem. The Skin dataset was taken from UCI machine learning repository. As the classifier, we have used the k-NN method to handle this big data problem. For k value of k-NN classifier, we have used as 1. To train and test the k-NN classifier, 50-50% training-testing partition has been used. As the performance metrics, TP rate, FP Rate, Precision, recall, f-measure and AUC values have been used to evaluate the performance of k-NN classifier. These obtained results are as follows: 0.999, 0.001, 0.999, 0.999, 0.999, and 1,00. As can be seen from the obtained results, this proposed method could be used to predict whether the image is skin or not.

Keywords: k-NN classifier, skin or non-skin classification, RGB values, classification

Procedia PDF Downloads 223
469 Evaluation of SDS (Software Defined Storage) Controller (CorpHD) for Various Storage Demands

Authors: Shreya Bokare, Sanjay Pawar, Shika Nema

Abstract:

Growth in cloud applications is generating the tremendous amount of data, building load on traditional storage management systems. Software Defined Storage (SDS) is a new storage management concept becoming popular to handle this large amount of data. CoprHD is one of the open source SDS controller, available for experimentation and development in the storage industry. In this paper, the storage management techniques provided by CoprHD to manage heterogeneous storage platforms are experimented and analyzed. Various storage management parameters such as time to provision, storage capacity measurement, and heterogeneity are experimentally evaluated along with the theoretical expression to prove the completeness of CoprHD controller for storage management.

Keywords: software defined storage, SDS, CoprHD, open source, SMI-S simulator, clarion, Symmetrix

Procedia PDF Downloads 280
468 Mini Coal Gasifier for Fulfilling Small-Scale Industries Energy Consumption in Indonesia

Authors: Muhammad Ade Andriansyah Efendi, Ika Monika

Abstract:

Mini coal gasifier (GasMin) is a small reactor that could convert coal into combustible gas or producer gas which is designed to fulfill energy needs of small-scale industries. The producer gas can be utilized for both external and internal combustion. The design of coal gasifier is suitable for community require because it is easy to handle, affordable and environmentally friendly. The feasibility study shows that the substitution of 12 kg LPG or specially 50 kg LPG into GasMin of 20 kg coal capacity per hour is very attractive. The estimation price of 20 kg coal per hour capacity GasMin is 40 million rupiahs. In the year 2016, the implementation of GasMin conducted at alumunium industry and batik industry at Yogyakarta, Indonesia.

Keywords: biomass, coal, energy, gasification

Procedia PDF Downloads 303
467 Application of Data Mining for Aquifer Environmental Assessment

Authors: Saman Javadi, Mehdi Hashemy, Mohahammad Mahmoodi

Abstract:

Vulnerability maps are employed as an important solution in order to handle entrance of pollution into the aquifers. The common way to provide vulnerability map is DRASTIC. Meanwhile, application of the method is not easy to apply for any aquifer due to choosing appropriate constant values of weights and ranks. In this study, a new approach using k-means clustering is applied to make vulnerability maps. Four features of depth to groundwater, hydraulic conductivity, recharge value and vadose zone were considered at the same time as features of clustering. Five regions are recognized out of the case study represent zones with different level of vulnerability. The finding results show that clustering provides a realistic vulnerability map so that, Pearson’s correlation coefficients between nitrate concentrations and clustering vulnerability is obtained 61%.

Keywords: clustering, data mining, groundwater, vulnerability assessment

Procedia PDF Downloads 572
466 Congestion Control in Mobile Network by Prioritizing Handoff Calls

Authors: O. A. Lawal, O. A Ojesanmi

Abstract:

The demand for wireless cellular services continues to increase while the radio resources remain limited. Thus, network operators have to continuously manage the scarce radio resources in order to have an improved quality of service for mobile users. This paper proposes how to handle the problem of congestion in the mobile network by prioritizing handoff call, using the guard channel allocation scheme. The research uses specific threshold value for the time of allocation of the channel in the algorithm. The scheme would be simulated by generating various data for different traffics in the network as it would be in the real life. The result would be used to determine the probability of handoff call dropping and the probability of the new call blocking as a way of measuring the network performance.

Keywords: call block, channel, handoff, mobile cellular network

Procedia PDF Downloads 372
465 Strategies for E-Waste Management: A Literature Review

Authors: Linh Thi Truc Doan, Yousef Amer, Sang-Heon Lee, Phan Nguyen Ky Phuc

Abstract:

During the last few decades, with the high-speed upgrade of electronic products, electronic waste (e-waste) has become one of the fastest growing wastes of the waste stream. In this context, more efforts and concerns have already been placed on the treatment and management of this waste. To mitigate their negative influences on the environment and society, it is necessary to establish appropriate strategies for e-waste management. Hence, this paper aims to review and analysis some useful strategies which have been applied in several countries to handle e-waste. Future perspectives on e-waste management are also suggested. The key findings found that, to manage e-waste successfully, it is necessary to establish effective reverse supply chains for e-waste, and raise public awareness towards the detrimental impacts of e-waste. The result of the research provides valuable insights to governments, policymakers in establishing e-waste management in a safe and sustainable manner.

Keywords: e-waste, e-waste management, life cycle assessment, recycling regulations

Procedia PDF Downloads 242