Search results for: perception control system security strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30883

Search results for: perception control system security strategy

30313 China's New "Pivots" in the Indian Ocean: Towards "String of Pearls" Strategy 2.0

Authors: Mike Chia-Yu Huang

Abstract:

China’s port facility construction projects in the Indian Ocean (IO) region, Gwadar Port and Djibouti Port projects in particular, have led to a heated debate among both Chinese and Western strategists over whether the country has literally been carrying out its “string of pearls” strategy, an alleged Chinese plan to challenge America’s military predominance in South Asia. Even though the Chinese government repeatedly denied the existence of such a strategy and highlighted the civilian/commercial nature of its port projects, it has significantly enhanced its strategic cooperation with littoral countries in the IO region since the “One Belt One Road” initiative was introduced by Chinese President Xi Jinping in 2013. Whether China does have a plan to expand its sphere of military influence westward concerns the balance of power in the IO region. If the answer is positive, the security environment there will be changed drastically. This paper argues that rather than simply copying the U.S. model of developing overseas military bases along the IO periphery, Beijing has been deliberating a more sophisticated plan for its physical presence there: creating a new set of “overseas strategic pivots.” These “pivots,” semi-military and semi-commercial in nature, are designed to help Beijing sustain its anti-piracy operations in the Gulf of Aden and serve as forward stations for the transportation of China’s imported energy and merchandise. They can support the Chinese Navy’s operations overseas but are not supposed to undertake face-to-face combat missions. This upgraded Chinese scheme can be identified as “string of pearls” strategy 2.0. Moreover, it is expected to help China deepen its roots in the IO region, implying that Beijing has to a large extent scratched its old diplomatic philosophy which highlighted the merits of non-interference and nonalignment. While a full-scale maritime confrontation between China and the U.S.-India security alliance is unlikely to be witnessed in the near future, an ambitious Chinese plan to step into the global maritime domain has been evidently shown.

Keywords: Chinese navy, Djibouti, Gwadar, Indian Ocean, string of pearls strategy

Procedia PDF Downloads 331
30312 Fault Tolerant Control System Using a Multiple Time Scale SMC Technique and a Geometric Approach

Authors: Ghodbane Azeddine, Saad Maarouf, Boland Jean-Francois, Thibeault Claude

Abstract:

This paper proposes a new design of an active fault-tolerant flight control system against abrupt actuator faults. This overall system combines a multiple time scale sliding mode controller for fault compensation and a geometric approach for fault detection and diagnosis. The proposed control system is able to accommodate several kinds of partial and total actuator failures, by using available healthy redundancy actuators. The overall system first estimates the correct fault information using the geometric approach. Then, and based on that, a new reconfigurable control law is designed based on the multiple time scale sliding mode technique for on-line compensating the effect of such faults. This approach takes advantages of the fact that there are significant difference between the time scales of aircraft states that have a slow dynamics and those that have a fast dynamics. The closed-loop stability of the overall system is proved using Lyapunov technique. A case study of the non-linear model of the F16 fighter, subject to the rudder total loss of control confirms the effectiveness of the proposed approach.

Keywords: actuator faults, fault detection and diagnosis, fault tolerant flight control, sliding mode control, multiple time scale approximation, geometric approach for fault reconstruction, lyapunov stability

Procedia PDF Downloads 370
30311 Design of Membership Ranges for Fuzzy Logic Control of Refrigeration Cycle Driven by a Variable Speed Compressor

Authors: Changho Han, Jaemin Lee, Li Hua, Seokkwon Jeong

Abstract:

Design of membership function ranges in fuzzy logic control (FLC) is presented for robust control of a variable speed refrigeration system (VSRS). The criterion values of the membership function ranges can be carried out from the static experimental data, and two different values are offered to compare control performance. Some simulations and real experiments for the VSRS were conducted to verify the validity of the designed membership functions. The experimental results showed good agreement with the simulation results, and the error change rate and its sampling time strongly affected the control performance at transient state of the VSRS.

Keywords: variable speed refrigeration system, fuzzy logic control, membership function range, control performance

Procedia PDF Downloads 265
30310 Tourist’s Perception and Identification of Landscape Elements of Traditional Village

Authors: Mengxin Feng, Feng Xu, Zhiyong Lai

Abstract:

As a typical representative of the countryside, traditional Chinese villages are rich in cultural landscape resources and historical information, but they are still in continuous decline. The problems of people's weak protection awareness and low cultural recognition are still serious, and the protection of cultural heritage is imminent. At the same time, with the rapid development of rural tourism, its cultural value has been explored and paid attention to again. From the perspective of tourists, this study aimed to explore people's perception and identity of cultural landscape resources under the current cultural tourism development background. We selected eleven typical landscape elements of Lingshui Village, a traditional village in Beijing, as research objects and conducted a questionnaire survey with two scales of perception and identity to explore the characteristics of people's perception and identification of landscape elements. We found that there was a strong positive correlation between the perception and identity of each element and that geographical location influenced visitors' overall perception. The perception dimensions scored the highest in location, and the lowest in history and culture, and the identity dimensions scored the highest in meaning and lowest in emotion. We analyzed the impact of visitors' backgrounds on people's perception and identity characteristics and found that age and education were two important factors. The elderly had a higher degree of perceived identity, as the familiarity effect increased their attention. Highly educated tourists had more stringent criteria for perception and identification. The above findings suggest strategies for conserving and optimizing landscape elements in the traditional village to improve the acceptance and recognition of cultural information in traditional villages, which will inject new vitality into the development of traditional villages.

Keywords: traditional village, tourist perception, landscape elements, perception and identity

Procedia PDF Downloads 146
30309 Gender Differences in the Perception of Advertising in Postmodern Era

Authors: J. Zavodny Pospisil, L. S. Zavodna, K. Cerna

Abstract:

The goal of this paper is to identify the main differences in the way men and women perceive TV ads. This paper is based on a research project conducted partly as a review of relevant papers, which deals with gender influence on the cognitive process and postmodern perception of advertising. In addition to that, qualitative research was conducted by means of interviews and structured questionnaires. Furthermore, data acquired from the research were used to evaluate our objectives and hypotheses. The goal of this paper is to compare women's and men's perception of advertisement. Although women are able to perceive more details than men, men are more susceptible to sexual appeals in advertising. Significant differences were also found in the perception of sexual appeals in the context of gender.

Keywords: advertising, consumer, emotion, gender, psychology of advertising

Procedia PDF Downloads 437
30308 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 143
30307 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud

Authors: Somayeh Sobati Moghadam

Abstract:

Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.

Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy

Procedia PDF Downloads 269
30306 Impact of Internal Control on Fraud Detection and Prevention: A Survey of Selected Organisations in Nigeria

Authors: Amos Olusola Akinola

Abstract:

The aim of this study is to evaluate the internal control system on fraud prevention in Nigerian business organizations. A survey research was undertaken in five organizations from the banking and manufacturing sectors in Nigeria using the simple random sampling technique and primary data was obtained with the aid structured questionnaire drawn on five likert’s scale. Four Hypotheses were formulated and tested using the T-test Statistics, Correlation and Regression Analysis at 95% confidence interval. It was discovered that internal control has a significant positive relationship with fraud prevention and that a weak internal control system permits fraudulent activities among staff. Based on the findings, it was recommended that organizations should continually and methodically review and evaluate the components of its internal control system whether activities are working as planned or not and that every organization should have pre-determined guidelines for conducting its operations and ensures compliance with these set guidelines while proactive steps should be taken to establish the independence of the internal audit by making the audit reportable to the governing council of an organization and not the chief executive officer.

Keywords: internal control, internal system, internal audit, fraud prevention, fraud detection

Procedia PDF Downloads 385
30305 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 385
30304 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 295
30303 Intelligent Semi-Active Suspension Control of a Electric Model Vehicle System

Authors: Shiuh-Jer Huang, Yun-Han Yeh

Abstract:

A four-wheel drive electric vehicle was built with hub DC motors and FPGA embedded control structure. A 40 steps manual adjusting motorcycle shock absorber was refitted with DC motor driving mechanism to construct as a semi-active suspension system. Accelerometer and potentiometer sensors are installed to measure the sprung mass acceleration and suspension system compression or rebound states for control purpose. An intelligent fuzzy logic controller was proposed to real-time search appropriate damping ratio based on vehicle running condition. Then, a robust fuzzy sliding mode controller (FSMC) is employed to regulate the target damping ratio of each wheel axis semi-active suspension system. Finally, different road surface conditions are chosen to evaluate the control performance of this semi-active suspension and compare with that of passive system based on wheel axis acceleration signal.

Keywords: acceleration, FPGA, Fuzzy sliding mode control, semi-active suspension

Procedia PDF Downloads 418
30302 Perception of Nursing Care of Patients in a University Hospital

Authors: Merve Aydin, Mağfiret Kara Kaşikçi

Abstract:

Aim: To determine the perceptions of inpatients about care at Farabi Hospital in KTU. Material and Method: This research was conducted by using the universe known examples of formulas and probability selected by sampling method with 277 chosen patients in the hospital at least 14 days in other internal and surgical clinics except for pediatric, psychiatry, and intensive care unit services between January-March 2014 in KTU Farabi Hospital. The data was collected through the forms of nursing care perception scale of patients and defining characteristics of patients. In the evaluation of data, percentage, mean, Mann Whitney U, Student t and Kurskall Wallis tests were applied. Results: The average point the patients got in nursing care perception scale is 62.64±10.08’dir. 48.7 % of patients regard nursing care well and 36.8 % of them regard it very well. 19 % of the patients regard nursing care badly. When the age, sex, occupation, marital status, educational background, residential place, income level, hospitalization period, hospitalization clinic and having a hospital attendant were compared with nursing care perception average point, the difference among point averages was not found meaningful statistically (p > 0.05). The average point of nursing care perception was found greater in those having chronic disease (p < 0.05). Conclusion: The perception point of patients about nursing care is above the average according to the average of the lowest and highest points. The great majority of patients regard nursing care well or very well.

Keywords: hospital, patient, perception of nursing care, nursing care

Procedia PDF Downloads 396
30301 Development of Monitoring Blood Bank Center Based PIC Microcontroller Using CAN Communication

Authors: Kaiwan S. Ismael, Ergun Ercelebi, Majeed Nader

Abstract:

This paper describes the design and implementation of a hardware setup for online monitoring of 24 refrigerators inside blood bank center using the microcontroller and CAN bus for communications between each node. Due to the security of locations in the blood bank hall and difficulty of monitoring of each refrigerator separately, this work proposes a solution to monitor all the blood bank refrigerators in one location. CAN-bus system is used because it has many applications and advantages, especially for this system due to easy in use, low cost, providing a reduction in wiring, fast to repair and easily expanding the project without a problem.

Keywords: control area network (CAN), monitoring blood bank center, PIC microcontroller, MPLAB IDE

Procedia PDF Downloads 483
30300 Participants’ Perception and a Student Protest of Peking University in 2014

Authors: Ruanzhenghao Shi

Abstract:

Student movements have persisted in mainland China, especially in elite universities since the Tiananmen Prodemocracy Movement, contrary to the lack of studies on them. However, the participants' repertoire, mobilization and mode of interaction with authorities are vastly different from their predecessors in the 1980s as well as their western counterparts. In most of the cases, agents, cognizant of the high cost of action and their vulnerability to the authorities, consciously curtailed certain repertoire and themes of resistance. Thus these movements, without appreciable organized force, were self-interested, fragmentally mobilized, lowly integrated and limited within the campus. This study documents the 2014 protest against Yanching Academy program at Peking University, a top-tier Chinese university that played the leading role in the 1989 protest. The 2014 case is different from abovementioned trend of submissive resistance in the last twenty years, insofar as it is a value-oriented and emotion-driven collective action with the resurgence of some repertoire. The participants perceived the university's contemporary ineffectiveness and clumsiness in control and administration, higher Party authorities' indifference to less-political themes, and an increasing number of potential advocates, including students, intellectuals and social media. It shows that resisters' perception of their relative strength to their opponents - in this case, the university and its system for controlling students - under specific circumstances, not merely political opportunities or institutional changes, stimulates the participants and thus contributes to the mobilization and organization of a collective action, even under severe social control.

Keywords: collective action, China, university students, resistance

Procedia PDF Downloads 153
30299 Psychological Security and Its Relationship with Self-Esteem among Adolescent with Mild Intellectual Disability

Authors: Muneera Abdul Haleem Bukhari, Maryam I. Alshirawi, Elsayed S. Elkhamisi

Abstract:

This study aimed at understanding the relationship between psychological security and self-esteem among Adolescent with Mild Intellectual Disability, exploring the levels of psychological security and self-esteem, as well as determining the differences between genders in psychological security and self-esteem. The sample of the study contained (60) Adolescent with Mild Intellectual Disability, (34) males and (26) females who are enrolled in the Vocational and Social Rehabilitation Center and Hope Institute in the Kingdom of Bahrain. Their ages are between (15-23) years old. The Psychological Security Scale and self-Esteem Scale (prepared by James Battle) were used by the researcher. Results showed that levels of psychological security and self-esteem among Adolescents with Mild Intellectual Disability was above average; results also showed the order of the psychological security dimensions in the following manner (future outlook – mood - family security – social security) and the order of the dimensions of self-esteem in the following manner (social self-esteem – personal self-esteem – general self-esteem) among Adolescent with Mild Intellectual Disability; as for the differences between genders, the study showed that there was an increased level of psychological security among males. However, there was no difference in self-esteem between both sexes.

Keywords: psychological security, self-esteem, adolescent, intellectual disability, the Kingdom of Bahrain

Procedia PDF Downloads 393
30298 Top-Down Influences to Multistable Perception: Evidence from Temporal Dynamics

Authors: Daria N. Podvigina, Tatiana V. Chernigovskaya

Abstract:

We have studied the temporal characteristics of bistable perception of the stimuli of two types: one involves alterations in a perceived depth and another one has an ambiguous content. We used the Necker lattice and lines of shadowed circles ambiguously perceived either as spheres or holes as stimuli of the first type. The Winson figure (the Eskimo/Indian picture) was a stimulus of the second type. We have analyzed how often the reversals occurred (reversal rate) and for how long each of the two interpretations, or percepts, was observed during one presentation (stability durations). For all three ambiguous images the reversal rate and the stability durations had similar values, which provide another evidence for a significant role of top-down processes in multistable perception.

Keywords: multistable perception, perceived depth, reversal rate, top-down processes

Procedia PDF Downloads 587
30297 Regulating Nanocarrier and Mononuclear Phagocyte System Interactions through Esomeprazole-Based Preconditioning Strategy

Authors: Zakia Belhadj, Bing He, Hua Zhang, Xueqing Wang, Wenbing Dai, Qiang Zhang

Abstract:

Mononuclear phagocyte system (MPS) forms an abominable obstacle hampering the tumor delivery efficiency of nanoparticles. Passively targeted nanocarriers have received clinical approval over the past 20 years. However, none of the actively targeted nanocarriers have entered clinical trials. Thus it is important to endue effective targeting ability to actively targeted approaches by overcoming biological barriers to nanoparticle drug delivery. Here, it presents that an Esomeprazole-based preconditioning strategy for regulating nanocarrier-MPS interaction to substantially prolong circulation time and enhance tumor targeting of nanoparticles. In vitro, the clinically approved proton pump inhibitor Esomeprazole “ESO” was demonstrated to reduce interactions between macrophages and subsequently injected targeted vesicles by interfering with their lysosomal trafficking. Of note, in vivo studies demonstrated that ESO pretreatment greatly decreased the liver and spleen uptake of c(RGDm7)-modified vesicles, highly enhanced their tumor accumulation, thereby provided superior therapeutic efficacy of c(RGDm7)-modified vesicles co-loaded with Doxorubicin (DOX) and Gefitinib (GE). This MPS-preconditioning strategy using ESO provides deeper insights into regulating nanoparticles interaction with the phagocytic system and enhancing their cancer cells' accessibility for anticancer therapy.

Keywords: esomeprazole (ESO), mononuclear phagocyte system (MPS), preconditioning strategy, targeted lipid vesicles

Procedia PDF Downloads 176
30296 Reading Strategy Awareness of English Major Students

Authors: Hsin-Yi Lien

Abstract:

The study explored the role of metacognition in foreign language anxiety on a sample of 411 Taiwanese students of English as a Foreign Language. The reading strategy inventory was employed to evaluate the tertiary learners’ level of metacognitive awareness and a semi-structured background questionnaire was also used to examine the learners’ perceptions of their English proficiency and satisfaction of their current English learning. In addition, gender and academic level differences in employment of reading strategies were investigated. The results showed the frequency of reading strategy use increase slightly along with academic years and males and females actually employ different reading strategies. The EFL tertiary learners in the present study utilized cognitive strategies more frequently than metacognitive strategies or support strategies. Male students use metacognitive strategy more often while female students use cognitive and support strategy more frequently.

Keywords: cognitive strategy, gender differences, metacognitive strategy, support strategy

Procedia PDF Downloads 415
30295 Design of a Thrust Vectoring System for an Underwater ROV

Authors: Isaac Laryea

Abstract:

Underwater remote-operated vehicles (ROVs) are highly useful in aquatic research and underwater operations. Unfortunately, unsteady and unpredictable conditions underwater make it difficult for underwater vehicles to maintain a steady attitude during motion. Existing underwater vehicles make use of multiple thrusters positioned at specific positions on their frame to maintain a certain pose. This study proposes an alternate way of maintaining a steady attitude during horizontal motion at low speeds by making use of a thrust vector-controlled propulsion system. The study began by carrying out some preliminary calculations to get an idea of a suitable shape and form factor. Flow simulations were carried out to ensure that enough thrust could be generated to move the system. Using the Lagrangian approach, a mathematical system was developed for the ROV, and this model was used to design a control system. A PID controller was selected for the control system. However, after tuning, it was realized that a PD controller satisfied the design specifications. The designed control system produced an overshoot of 6.72%, with a settling time of 0.192s. To achieve the effect of thrust vectoring, an inverse kinematics synthesis was carried out to determine what angle the actuators need to move to. After building the system, intermittent angular displacements of 10°, 15°, and 20° were given during bench testing, and the response of the control system as well as the servo motor angle was plotted. The final design was able to move in water but was not able to handle large angular displacements as a result of the small angle approximation used in the mathematical model.

Keywords: PID control, thrust vectoring, parallel manipulators, ROV, underwater, attitude control

Procedia PDF Downloads 69
30294 Standards of Toxicity and Food Security in Brazil

Authors: Ana Luiza Da Gama E Souza

Abstract:

This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.

Keywords: standards, indicators, human rights, food security

Procedia PDF Downloads 333
30293 Development of PSS/E Dynamic Model for Controlling Battery Output to Improve Frequency Stability in Power Systems

Authors: Dae-Hee Son, Soon-Ryul Nam

Abstract:

The power system frequency falls when disturbance such as rapid increase of system load or loss of a generating unit occurs in power systems. Especially, increase in the number of renewable generating units has a bad influence on the power system because of loss of generating unit depending on the circumstance. Conventional technologies use frequency droop control battery output for the frequency regulation and balance between supply and demand. If power is supplied using the fast output characteristic of the battery, power system stability can be further more improved. To improve the power system stability, we propose battery output control using ROCOF (Rate of Change of Frequency) in this paper. The bigger the power difference between the supply and the demand, the bigger the ROCOF drops. Battery output is controlled proportionally to the magnitude of the ROCOF, allowing for faster response to power imbalances. To simulate the control method of battery output system, we develop the user defined model using PSS/E and confirm that power system stability is improved by comparing with frequency droop control.

Keywords: PSS/E user defined model, power deviation, frequency droop control, ROCOF (rate of change of frequency)

Procedia PDF Downloads 412
30292 Modelling Strategy Planning in Multi Business Companies

Authors: Gelareh Changizi, Mahsa Khajavi, Ladan Shahhosseini

Abstract:

Corporate-level strategy, or simply ‘parent strategy’, is a topic that has received much attention since the very early days of the strategic planning field. Since the multi level enterprises have different sub enterprises which deal with different business environments, we cannot define the same strategic perspective for all of them. Therefore, the determination of a perspective to manage and deal with affiliates of such enterprises is the main challenge. The parent strategy in mother enterprises' level has been analyzed in this research. A case study has been carried to comprehensively describe the proposed model.

Keywords: parent strategy, multi-business companies, performance evaluation, lifecycle

Procedia PDF Downloads 367
30291 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: application, environment, insecurity, sensor, wireless sensor network

Procedia PDF Downloads 263
30290 A Multi-Agent System for Accelerating the Delivery Process of Clinical Diagnostic Laboratory Results Using GSM Technology

Authors: Ayman M. Mansour, Bilal Hawashin, Hesham Alsalem

Abstract:

Faster delivery of laboratory test results is one of the most noticeable signs of good laboratory service and is often used as a key performance indicator of laboratory performance. Despite the availability of technology, the delivery time of clinical laboratory test results continues to be a cause of customer dissatisfaction which makes patients feel frustrated and they became careless to get their laboratory test results. The Medical Clinical Laboratory test results are highly sensitive and could harm patients especially with the severe case if they deliver in wrong time. Such results affect the treatment done by physicians if arrived at correct time efforts should, therefore, be made to ensure faster delivery of lab test results by utilizing new trusted, Robust and fast system. In this paper, we proposed a distributed Multi-Agent System to enhance and faster the process of laboratory test results delivery using SMS. The developed system relies on SMS messages because of the wide availability of GSM network comparing to the other network. The software provides the capability of knowledge sharing between different units and different laboratory medical centers. The system was built using java programming. To implement the proposed system we had many possible techniques. One of these is to use the peer-to-peer (P2P) model, where all the peers are treated equally and the service is distributed among all the peers of the network. However, for the pure P2P model, it is difficult to maintain the coherence of the network, discover new peers and ensure security. Also, security is a quite important issue since each node is allowed to join the network without any control mechanism. We thus take the hybrid P2P model, a model between the Client/Server model and the pure P2P model using GSM technology through SMS messages. This model satisfies our need. A GUI has been developed to provide the laboratory staff with the simple and easy way to interact with the system. This system provides quick response rate and the decision is faster than the manual methods. This will save patients life.

Keywords: multi-agent system, delivery process, GSM technology, clinical laboratory results

Procedia PDF Downloads 249
30289 Perception and Participation Quality Assurance in Higher Education: A Case Study of Phranakhon Rajabhat University, Thailand

Authors: O. Vanijajiva, K. Oumaree, N. Ngampak

Abstract:

This research aims to study the level of perception and participation of Phranakhon Rajabhat University staff and to study the relationship between the levels of perception and participation with the score of University evaluation of quality assurance in education. The respondents were composed of 479 staffs. The tool used in this research is perceived and participation questionnaire of quality assurance in education of Phranakhon Rajabhat University. The results found that the most staffs are female with undergraduate education. Most 2 respondents are revealing educational staffs without academic position. The fact of times to gain knowledge of quality assurance in education is 1-3 times. The perception of knowledge about quality assurance in education is moderate (3.74 ± 0.65) with most respondent are more focus on university activity than quality assurance in education activity. The participation of quality assurance in education activities involved in moderate (3.17 ± 0.88), with most respondents more involved in student affair than quality assurance in education motion. For assessment of the relationship of perception and participation of quality assurance in education are average score (4.31 ± 0.16) showed that the level of perception and participation was associated with university evaluation in very low level (r = -0.103 and -0.121, respectively), while perception and participation are correlated with the moderate level (r = 0.691).

Keywords: quality assurance education, awareness, participation, higher education, Thailand

Procedia PDF Downloads 367
30288 The Application of Mapping, Practicing, Using Strategy with Instructional Materials Based on the School Curriculum toward the English Achievement of Indonesian EFL Students

Authors: Eny Syatriana

Abstract:

English proficiency of Indonesian secondary school students is below standard. The low proficiency may come from poor teaching materials that do not meet the students’ need. The main objective for English teachers is to improve the English proficiency of the students. The purpose of this study is to explore the application Mapping, Practicing, Using (MPU) strategy with Instructional Materials Based on the School Curriculum toward the English achievement of Indonesian EFL Students. This paper is part my dissertation entitles 'Designing instructional materials for secondary school students based on the school curriculum' consisting of need analysis, design, development, implementation, and evaluation; this paper discusses need analysis and creates a model of creating instructional materials through deep discussion among teachers of secondary schools. The subject consisted of six English teachers and students of three classes at three different secondary schools in Makassar, South Sulawesi, Indonesia. Pretest and posttest design were administered to see the effectiveness of the MPU strategy. Questionnaires were administered to see the teachers and students’ perception toward the instructional materials. The result indicates that the MPU strategy is effective in improving the English achievement; instructional materials with different strategies improve the English achievement of the students. Both teachers and students argue that the presented instructional materials are effective to be used in the teaching and learning process to increase the English proficiency of the students.

Keywords: proficiency, development, English for secondary school students, instructional materials

Procedia PDF Downloads 332
30287 A Study on the Effect of the Mindfulness and Cultivation of Wisdom as an Intervention Strategy for College Student Internet Addiction

Authors: P. C. Li, R. H. Feng, S. J. Chen, Y. J. Yu, Y. L. Chen, X. Y. Fan

Abstract:

The purpose of this study is to investigate the effect of mindfulness and wisdom comprehensive strategy intervention on addiction to the Internet of college students by engaging fourteen intensive full-day mindfulness-based wisdom retreat curriculum. Wisdom, one of the practice method from the threefold training. Internet addiction, a kind of impulse control disorder, which attract the attentions of society due to its high prevalence and harmfulness in the last decade. Therefore, the study of internet addiction intervention is urgent. Participants with internet addiction were Chinese college students and screened by internet addiction disorder diagnose questionnaire (IAD-DQ). A quasi-experimental pretest and posttest design was used as research design. The finding shows that the mindfulness-based wisdom intervention strategy appeared to be effective in reducing the Internet addiction. Moreover, semi-structure interview method was conducted and outcomes included five themes: the reduction of internet use, the increment of awareness on emotion, self-control, present concentration and better positive lifestyle, indicating that mindfulness could be an effective intervention for this group with internet addiction.

Keywords: mindfulness, internet addiction, wisdom comprehensive intervention, cognitive-behavior therapy

Procedia PDF Downloads 183
30286 Enhancement of MIMO H₂S Gas Sweetening Separator Tower Using Fuzzy Logic Controller Array

Authors: Muhammad M. A. S. Mahmoud

Abstract:

Natural gas sweetening process is a controlled process that must be done at maximum efficiency and with the highest quality. In this work, due to complexity and non-linearity of the process, the H₂S gas separation and the intelligent fuzzy controller, which is used to enhance the process, are simulated in MATLAB – Simulink. The new design of fuzzy control for Gas Separator is discussed in this paper. The design is based on the utilization of linear state-estimation to generate the internal knowledge-base that stores input-output pairs. The obtained input/output pairs are then used to design a feedback fuzzy controller. The proposed closed-loop fuzzy control system maintains the system asymptotically-stability while it enhances the system time response to achieve better control of the concentration of the output gas from the tower. Simulation studies are carried out to illustrate the Gas Separator system performance.

Keywords: gas separator, gas sweetening, intelligent controller, fuzzy control

Procedia PDF Downloads 471
30285 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 362
30284 An Analysis of the Relationship between Consumer Perception and Purchase Behavior towards Green Fashion in India

Authors: Upasna Bhandari, Indranil Saha, Deepak John Mathew

Abstract:

The green fashion market is growing rapidly as eco-friendly consumers are willing to expand their organic lifestyle to include clothing. With an increasing share of fashion consumers globally, Indian consumers are observed to consider the social and environmental ethics while making purchasing decisions. While some research clearly identifies the efforts of responsible consumers towards green fashion, some argue that fashion-orientated consumers who are sensitive towards environment do not actively participate towards supporting green fashion. This study aims to analyze the current perception of green fashion among Indian consumers. A small-scale exploratory study is conducted where consumers’ perception of green fashion is examined followed by an analysis of translation of this perception into purchase decision making. This research paper gives insight into consumer awareness on green fashion and provides scope towards the expansion of ethical fashion consumption within the demography of India.

Keywords: consumer perception, environmental attitudes, fashion retailing, green fashion, sustainability

Procedia PDF Downloads 440