Search results for: server selection
2051 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology
Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar
Abstract:
Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.Keywords: data privacy, distributed system, federated learning, machine learning
Procedia PDF Downloads 1342050 Opportunities and Challenges in Midwifery Education: A Literature Review
Authors: Abeer M. Orabi
Abstract:
Midwives are being seen as a key factor in returning birth care to a normal physiologic process that is woman-centered. On the other hand, more needs to be done to increase access for every woman to professional midwifery care. Because of the nature of the midwifery specialty, the magnitude of the effect that can result from a lack of knowledge if midwives make a mistake in their care has the potential to affect a large number of the birthing population. So, the development, running, and management of midwifery educational programs should follow international standards and come after a thorough community needs assessment. At the same time, the number of accredited midwifery educational programs needs to be increased so that larger numbers of midwives will be educated and qualified, as well as access to skilled midwifery care will be increased. Indeed, the selection of promising midwives is important for the successful completion of an educational program, achievement of the program goals, and retention of graduates in the field. Further, the number of schooled midwives in midwifery education programs, their background, and their experience constitute some concerns in the higher education industry. Basically, preceptors and clinical sites are major contributors to the midwifery education process, as educational programs rely on them to provide clinical practice opportunities. In this regard, the selection of clinical training sites should be based on certain criteria to ensure their readiness for the intended training experiences. After that, communication, collaboration, and liaison between teaching faculty and field staff should be maintained. However, the shortage of clinical preceptors and the massive reduction in the number of practicing midwives, in addition to unmanageable workloads, act as significant barriers to midwifery education. Moreover, the medicalized approach inherent in the hospital setting makes it difficult to practice the midwifery model of care, such as watchful waiting, non-interference in normal processes, and judicious use of interventions. Furthermore, creating a motivating study environment is crucial for avoiding unnecessary withdrawal and retention in any educational program. It is well understood that research is an essential component of any profession for achieving its optimal goal and providing a foundation and evidence for its practices, and midwifery is no exception. Midwives have been playing an important role in generating their own research. However, the selection of novel, researchable, and sustainable topics considering community health needs is also a challenge. In conclusion, ongoing education and research are the lifeblood of the midwifery profession to offer a highly competent and qualified workforce. However, many challenges are being faced, and barriers are hindering their improvement.Keywords: barriers, challenges, midwifery education, educational programs
Procedia PDF Downloads 1152049 Code Embedding for Software Vulnerability Discovery Based on Semantic Information
Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson
Abstract:
Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.Keywords: code representation, deep learning, source code semantics, vulnerability discovery
Procedia PDF Downloads 1592048 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2802047 Hybrid Model of Strategic and Contextual Leadership in Pluralistic Organizations- A Qualitative Multiple Case Study
Authors: Ergham Al Bachir
Abstract:
This study adopts strategic leadership (Upper Echelons) as the core theory and contextual leadership theory as the research lens. This research asks how the external context impacts strategic leadership effectiveness to achieve the outcomes in pluralistic organizations (PO). The study explores how the context influences the selection of CEOs, top management teams (TMT), and their leadership effectiveness. POs are characterized by the multiple objectives of their top management teams, divergent objectives, multiple strategies, and multiple governing authorities. The research question is explored by means of a qualitative multiple-case study focusing on healthcare, real estate, and financial services organizations. The data sources are semi-structured interviews, documents, and direct observations. The data analysis strategy is inductive and deploys thematic analysis and cross-case synthesis. The findings differentiate between national and international CEOs' delegation of authority and relationship with the Board of Directors. The findings identify the elements of the dynamic context that influence TMT and PO outcomes. The emergent hybrid strategic and contextual leadership framework shows how the different contextual factors influence strategic direction, PO context, selection of CEOs and TMT, and the outcomes in four pluralistic organizations. The study offers seven theoretical contributions to Upper Echelons, strategic leadership, and contextual leadership research. (1) The integration of two theories revealed how CEO’s impact on the organization is complementary to the contextual impact. (2) Conducting this study in the Middle East contributes to strategic leadership and contextual leadership research. (3) The demonstration of the significant contextual effects on the selection of CEOs. (4 and 5) Two contributions revealed new links between the context, the Board role, internal versus external CEOs, and national versus international CEOs. (6 and 7) This study offered two definitions: what accounts for CEO leadership effectiveness and organizational outcomes. Two methodological contributions were also identified: (1) Previous strategic leadership and Upper Echelons research are mainly quantitative, while this study adopts qualitative multiple-case research with face-to-face interviews. (2) The extrication of the CEO from the TMT advanced the data analysis in strategic leadership research. Four contributions are offered to practice: (1) The CEO's leadership effectiveness inside and outside the organization. (2) Rapid turnover of predecessor CEOs signifies the need for a strategic and contextual approach to CEOs' succession. (3) TMT composition and education impact on TMT-CEO and TMT-TMT interface. (4) Multilevel strategic contextual leadership development framework.Keywords: strategic leadership, contextual leadership, upper echelons, pluralistic organizations, cross-cultural leadership
Procedia PDF Downloads 922046 Order Optimization of a Telecommunication Distribution Center through Service Lead Time
Authors: Tamás Hartványi, Ferenc Tóth
Abstract:
European telecommunication distribution center performance is measured by service lead time and quality. Operation model is CTO (customized to order) namely, a high mix customization of telecommunication network equipment and parts. CTO operation contains material receiving, warehousing, network and server assembly to order and configure based on customer specifications. Variety of the product and orders does not support mass production structure. One of the success factors to satisfy customer is to have a proper aggregated planning method for the operation in order to have optimized human resources and highly efficient asset utilization. Research will investigate several methods and find proper way to have an order book simulation where practical optimization problem may contain thousands of variables and the simulation running times of developed algorithms were taken into account with high importance. There are two operation research models that were developed, customer demand is given in orders, no change over time, customer demands are given for product types, and changeover time is constant.Keywords: CTO, aggregated planning, demand simulation, changeover time
Procedia PDF Downloads 2672045 Hybridization and Evaluation of Jatropha to Improve High Yield Varieties in Indonesia
Authors: Rully D. Purwati, Tantri D.A. Anggraeni, Bambang Heliyanto, M. Machfud, Joko Hartono
Abstract:
The availability of fuel in the world will be reduced in next few years, it is necessary to find alternative energy sources. Jatropha curcas L. is one of oil crops producing non-edible oil which is potential for bio-diesel. Jatropha cultivation and development program in Indonesia is facing several problems especially low seed yield resulting in inefficient crop cultivation cost. To cope with the problem, development of high yielding varieties is necessary. Development of new varieties to improve seed yield was conducted by hybridization and selection and resulted in fourteen potential genotypes. The yield potential of the fourteen genotypes were evaluated and compared with two check varieties. The objective of the evaluation was to find Jatropha hybrids with some characters i.e. their productivity was higher than check varieties, oil content > 40% and harvesting age ≤ 110 days. Hybridization and individual plant selection were carried out from 2010 to 2014. Evaluation of high yield was conducted in Asembagus experimental station, Situbondo, East Java in three years (2015-2017). The experimental designed was Randomized Complete Block Design with three replication, and plot size 10 m x 8 m. The characters observed were number of capsules per plant, dry seed yield (kg/ha) and seed oil content (%). The results of this experiment indicated that all the hybrids evaluated have higher productivity than check variety IP-3A. There were two superior hybrids i.e. HS-49xSP-65/32 and HS-49xSP-19/28 with highest seed yield per hectare and number of capsules per plant for three years.Keywords: Jatropha, bio energy, hybrid, high seed yield
Procedia PDF Downloads 1452044 Estimation of the Mean of the Selected Population
Authors: Kalu Ram Meena, Aditi Kar Gangopadhyay, Satrajit Mandal
Abstract:
Two normal populations with different means and same variance are considered, where the variances are known. The population with the smaller sample mean is selected. Various estimators are constructed for the mean of the selected normal population. Finally, they are compared with respect to the bias and MSE risks by the method of Monte-Carlo simulation and their performances are analysed with the help of graphs.Keywords: estimation after selection, Brewster-Zidek technique, estimators, selected populations
Procedia PDF Downloads 5122043 Optimization Technique for the Contractor’s Portfolio in the Bidding Process
Authors: Taha Anjamrooz, Sareh Rajabi, Salwa Bheiry
Abstract:
Selection between the available projects in bidding processes for the contractor is one of the essential areas to concentrate on. It is important for the contractor to choose the right projects within its portfolio during the tendering stage based on certain criteria. It should align the bidding process with its origination strategies and goals as a screening process to have the right portfolio pool to start with. Secondly, it should set the proper framework and use a suitable technique in order to optimize its selection process for concertation purpose and higher efforts during the tender stage with goals of success and winning. In this research paper, a two steps framework proposed to increase the efficiency of the contractor’s bidding process and the winning chance of getting the new projects awarded. In this framework, initially, all the projects pass through the first stage screening process, in which the portfolio basket will be evaluated and adjusted in accordance with the organization strategies to the reduced version of the portfolio pool, which is in line with organization activities. In the second stage, the contractor uses linear programming to optimize the portfolio pool based on available resources such as manpower, light equipment, heavy equipment, financial capability, return on investment, and success rate of winning the bid. Therefore, this optimization model will assist the contractor in utilizing its internal resource to its maximum and increase its winning chance for the new project considering past experience with clients, built-relation between two parties, and complexity in the exertion of the projects. The objective of this research will be to increase the contractor's winning chance in the bidding process based on the success rate and expected return on investment.Keywords: bidding process, internal resources, optimization, contracting portfolio management
Procedia PDF Downloads 1422042 Evaluating the Effects of an Educational Video on Running Shoe Selection and Subjective Perceptions
Authors: Andrew Fife, Jean-Francois Esculier, Codi Ramsey, Kim Hebert-Losier
Abstract:
Objectives: We aimed to identify how an evidence-based educational video influences how runners select shoes, and perceive shoe comfort, satisfaction, and performance over three months in comparison with a control video. Design: Two groups participated in a double-blind randomised controlled trial. Method: Fifty-six runners were randomly assigned to view one of two video presentations prior to purchasing new shoes for road running in speciality stores. Runners completed a survey with regards to their own shoes and one in reference to the new shoes purchased at three timepoints: before first use, onemonth post-purchase, and three-months post-purchase. Perceived shoe comfort, satisfaction, and performance were assessed using 100 mm visual analogue scales. Factors that influenced their shoe purchase were ranked in order of importance. Results: Comfort and satisfaction were not significantly different between groups and timepoints. The perceived performance of new shoes (75.6 mm) was significantly greater than own shoes (mean: 67.6 mm) before first use, but ratings returned to own-shoe levels one month later in both groups. The group receiving the evidence-based presentation reported their purchased shoes as being influenced more by the video (55.4 mm) than the control group (21.8 mm), although both chose the same brand and model as previously worn over half of the time. Runners in both groups prioritised fit, comfort, and choosing similar shoes to the ones they previously used. Conclusions: In contrast to expectations, the evidence-based educational video did not appear to influence running shoe selection, or overall perceived shoe comfort, satisfaction, or performance.Keywords: comfort, consumer behaviour, consciousness, education, running, shoes
Procedia PDF Downloads 312041 Characterization of an Isopropanol-Butanol Clostridium
Authors: Chen Zhang, Fengxue Xin, Jianzhong He
Abstract:
A unique Clostridium beijerinckii species strain BGS1 was obtained from grass land samples, which is capable of producing 8.43g/L butanol and 3.21 isopropanol from 60g/L glucose while generating 4.68g/L volatile fatty acids (VFAs) from 30g/L xylan. The concentration of isopropanol produced by culture BGS1 is ~15% higher than previously reported wild-type Clostridium beijerinckii under similar conditions. Compared to traditional Acetone-Butanol-Ethanol (ABE) fermentation species, culture BGS1 only generates negligible amount of ethanol and acetone, but produces butanol and isopropanol as biosolvent end-products which are pure alcohols and more economical than ABE. More importantly, culture BGS1 can consume acetone to produce isopropanol, e.g., 1.84g/L isopropanol from 0.81g/L acetone in 60g/L glucose medium containing 6.15g/L acetone. The analysis of BGS1 draft genome annotated by RAST server demonstrates that no ethanol production is caused by the lack of pyruvate decarboxylase gene – related to ethanol production. In addition, an alcohol dehydrogenase (adhe gene) was found in BGS1 which could be a potential gene responsible for isopropanol-generation. This is the first report on Isopropanol-Butanol (IB) fermentation by wild-type Clostridium strain and its application for isopropanol and butanol production.Keywords: acetone conversion, butanol, clostridium, isopropanol
Procedia PDF Downloads 2922040 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography
Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou
Abstract:
Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol
Procedia PDF Downloads 2712039 Pre-Transformation Phase Reconstruction for Deformation-Induced Transformation in AISI 304 Austenitic Stainless Steel
Authors: Manendra Singh Parihar, Sandip Ghosh Chowdhury
Abstract:
Austenitic stainless steels are widely used and give a good combination of properties. When this steel is plastically deformed, a phase transformation of the metastable Face Centred Cubic Austenite to the stable Body Centred Cubic (α’) or to the Hexagonal close packed (ԑ) martensite may occur, leading to the enhancement in the mechanical properties like strength. The work was based on variant selection and corresponding texture analysis for the strain induced martensitic transformation during deformation of the parent austenite FCC phase to form the product HCP and the BCC martensite phases separately, obeying their respective orientation relationships. The automated method for reconstruction of the parent phase orientation using the EBSD data of the product phase orientation is done using the MATLAB and TSL-OIM software. The method of triplets was used which involves the formation of a triplet of neighboring product grains having a common variant and linking them using a misorientation-based criterion. This led to the proper reconstruction of the pre-transformation phase orientation data and thus to its microstructure and texture. The computational speed of current method is better compared to the previously used methods of reconstruction. The reconstruction of austenite from ԑ and α’ martensite was carried out for multiple samples and their IPF images, pole figures, inverse pole figures and ODFs were compared. Similar type of results was observed for all samples. The comparison gives the idea for estimating the correct sequence of the transformation i.e. γ → ε → α’ or γ → α’, during deformation of AISI 304 austenitic stainless steel.Keywords: variant selection, reconstruction, EBSD, austenitic stainless steel, martensitic transformation
Procedia PDF Downloads 4972038 UNIX Source Code Leak: Evaluation and Feasible Solutions
Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar
Abstract:
Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.Keywords: data transmission, Linux, source code, operating system
Procedia PDF Downloads 2712037 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 1722036 Object-Based Image Analysis for Gully-Affected Area Detection in the Hilly Loess Plateau Region of China Using Unmanned Aerial Vehicle
Authors: Hu Ding, Kai Liu, Guoan Tang
Abstract:
The Chinese Loess Plateau suffers from serious gully erosion induced by natural and human causes. Gully features detection including gully-affected area and its two dimension parameters (length, width, area et al.), is a significant task not only for researchers but also for policy-makers. This study aims at gully-affected area detection in three catchments of Chinese Loess Plateau, which were selected in Changwu, Ansai, and Suide by using unmanned aerial vehicle (UAV). The methodology includes a sequence of UAV data generation, image segmentation, feature calculation and selection, and random forest classification. Two experiments were conducted to investigate the influences of segmentation strategy and feature selection. Results showed that vertical and horizontal root-mean-square errors were below 0.5 and 0.2 m, respectively, which were ideal for the Loess Plateau region. The segmentation strategy adopted in this paper, which considers the topographic information, and optimal parameter combination can improve the segmentation results. Besides, the overall extraction accuracy in Changwu, Ansai, and Suide achieved was 84.62%, 86.46%, and 93.06%, respectively, which indicated that the proposed method for detecting gully-affected area is more objective and effective than traditional methods. This study demonstrated that UAV can bridge the gap between field measurement and satellite-based remote sensing, obtaining a balance in resolution and efficiency for catchment-scale gully erosion research.Keywords: unmanned aerial vehicle (UAV), object-analysis image analysis, gully erosion, gully-affected area, Loess Plateau, random forest
Procedia PDF Downloads 2182035 Evidence Theory Based Emergency Multi-Attribute Group Decision-Making: Application in Facility Location Problem
Authors: Bidzina Matsaberidze
Abstract:
It is known that, in emergency situations, multi-attribute group decision-making (MAGDM) models are characterized by insufficient objective data and a lack of time to respond to the task. Evidence theory is an effective tool for describing such incomplete information in decision-making models when the expert and his knowledge are involved in the estimations of the MAGDM parameters. We consider an emergency decision-making model, where expert assessments on humanitarian aid from distribution centers (HADC) are represented in q-rung ortho-pair fuzzy numbers, and the data structure is described within the data body theory. Based on focal probability construction and experts’ evaluations, an objective function-distribution centers’ selection ranking index is constructed. Our approach for solving the constructed bicriteria partitioning problem consists of two phases. In the first phase, based on the covering’s matrix, we generate a matrix, the columns of which allow us to find all possible partitionings of the HADCs with the service centers. Some constraints are also taken into consideration while generating the matrix. In the second phase, based on the matrix and using our exact algorithm, we find the partitionings -allocations of the HADCs to the centers- which correspond to the Pareto-optimal solutions. For an illustration of the obtained results, a numerical example is given for the facility location-selection problem.Keywords: emergency MAGDM, q-rung orthopair fuzzy sets, evidence theory, HADC, facility location problem, multi-objective combinatorial optimization problem, Pareto-optimal solutions
Procedia PDF Downloads 922034 The Implementation of the Multi-Agent Classification System (MACS) in Compliance with FIPA Specifications
Authors: Mohamed R. Mhereeg
Abstract:
The paper discusses the implementation of the MultiAgent classification System (MACS) and utilizing it to provide an automated and accurate classification of end users developing applications in the spreadsheet domain. However, different technologies have been brought together to build MACS. The strength of the system is the integration of the agent technology with the FIPA specifications together with other technologies, which are the .NET widows service based agents, the Windows Communication Foundation (WCF) services, the Service Oriented Architecture (SOA), and Oracle Data Mining (ODM). Microsoft's .NET windows service based agents were utilized to develop the monitoring agents of MACS, the .NET WCF services together with SOA approach allowed the distribution and communication between agents over the WWW. The Monitoring Agents (MAs) were configured to execute automatically to monitor excel spreadsheets development activities by content. Data gathered by the Monitoring Agents from various resources over a period of time was collected and filtered by a Database Updater Agent (DUA) residing in the .NET client application of the system. This agent then transfers and stores the data in Oracle server database via Oracle stored procedures for further processing that leads to the classification of the end user developers.Keywords: MACS, implementation, multi-agent, SOA, autonomous, WCF
Procedia PDF Downloads 2742033 Educational Experience, Record Keeping, Genetic Selection and Herd Management Effects on Monthly Milk Yield and Revenues of Dairy Farms in Southern Vietnam
Authors: Ngoc-Hieu Vu
Abstract:
A study was conducted to estimate the record keeping, genetic selection, educational experience, and farm management effect on monthly milk yield per farm, average milk yield per cow, monthly milk revenue per farm, and monthly milk revenue per cow of dairy farms in the Southern region of Vietnam. The dataset contained 5448 monthly record collected from January 2013 to May 2015. Results showed that longer experience increased (P < 0.001) monthly milk yields and revenues. Better educated farmers produced more monthly milk per farm and monthly milk per cow and revenues (P < 0.001) than lower educated farmers. Farm that kept records on individual animals had higher (P < 0.001) for monthly milk yields and revenues than farms that did not. Farms that used hired people produced the highest (p < 0.05) monthly milk yield per farm, milk yield per cow and revenues, followed by farms that used both hire and family members, and lowest values were for farms that used family members only. Farms that used crosses Holstein in herd were higher performance (p < 0.001) for all traits than farms that used purebred Holstein and other breeds. Farms that used genetic information and phenotypes when selecting sires were higher (p < 0.05) for all traits than farms that used only phenotypes and personal option. Farms that received help from Vet, organization staff, or government officials had higher monthly milk yield and revenues than those that decided by owner. These findings suggest that dairy farmers should be training in systematic, must be considered and continuous support to improve farm milk production and revenues, to increase the likelihood of adoption on a sustainable way.Keywords: dairy farming, education, milk yield, Southern Vietnam
Procedia PDF Downloads 3322032 Development of a Geomechanical Risk Assessment Model for Underground Openings
Authors: Ali Mortazavi
Abstract:
The main objective of this research project is to delve into a multitude of geomechanical risks associated with various mining methods employed within the underground mining industry. Controlling geotechnical design parameters and operational factors affecting the selection of suitable mining techniques for a given underground mining condition will be considered from a risk assessment point of view. Important geomechanical challenges will be investigated as appropriate and relevant to the commonly used underground mining methods. Given the complicated nature of rock mass in-situ and complicated boundary conditions and operational complexities associated with various underground mining methods, the selection of a safe and economic mining operation is of paramount significance. Rock failure at varying scales within the underground mining openings is always a threat to mining operations and causes human and capital losses worldwide. Geotechnical design is a major design component of all underground mines and basically dominates the safety of an underground mine. With regard to uncertainties that exist in rock characterization prior to mine development, there are always risks associated with inappropriate design as a function of mining conditions and the selected mining method. Uncertainty often results from the inherent variability of rock masse, which in turn is a function of both geological materials and rock mass in-situ conditions. The focus of this research is on developing a methodology which enables a geomechanical risk assessment of given underground mining conditions. The outcome of this research is a geotechnical risk analysis algorithm, which can be used as an aid in selecting the appropriate mining method as a function of mine design parameters (e.g., rock in-situ properties, design method, governing boundary conditions such as in-situ stress and groundwater, etc.).Keywords: geomechanical risk assessment, rock mechanics, underground mining, rock engineering
Procedia PDF Downloads 1452031 Are There Any Positive Effects of Motivational Interviewing on Motion Sickness?
Authors: Unal Demirtas, Mehmet Ergin Dipcin, Mehmet Cetin
Abstract:
Background: Applied to student candidates prior to entering the air force academy, under the name of Cadet selection flights and executed as 7-8 sorties under the surveillance of flight instructors, this training is mainly towards appraising students’ characteristics of flying ability. All pilot cadets are gone through physical examination before cadet selection flight in a military hospital. Some cadets may show motion sickness symptoms during this flights. The most common symptoms: Nausea, vomiting, vertigo, headache, anxiety, paresthaesia, asthenia, muscle contraction and excitement. These cadets are examined by flight surgeon, after this flight surgeon and psychologist have an motivational interviewing with these cadets. Method: In this study, we have applied a survey that we question the severity of the symptom to the candidates that have motion sickness after the first sortie. We have questioned the candidate who had a motivational interviewing by the psychologist after the treatment of the flight surgeon that whether the candidate relived the complaints that he has at the previous sortie after the second sortie and whether there is decrease or increase in the severity of the complaints compared to the previous flight. Findings: 15 candidates have applied for the flight surgeon with at least one of the motion sickness symptoms. 11 of the 15 candidates showing motion sickness symptoms after the first flight expressed that their complaints are decreased after the motivational interviewing and 4 of the candidates stated that there are no changes in their complaints. The frequently expressed complaints are nausea, vertigo, headache, exhaustion and vomiting respectively. 7 out of 15 candidates expressed that they have same kind of complains in bus, ship etc. Conclusion: It is observed in our study that only conducting motivational interviewing with the candidates without any organic disorders without giving any drugs has a positive effect on the candidates in terms of motion sickness.Keywords: aeromedicine, candidate, motion sickness, motivational interviewing, pilot
Procedia PDF Downloads 4742030 Planning for Sustainability in the Built Environment
Authors: Adedayo Jeremiah Adeyekun, Samuel Oluwagbemiga Ishola
Abstract:
This paper aimed to identify the significance of sustainability in the built environment, the economic and environmental importance to building and construction projects. Sustainability in the built environment has been a key objective of research over the past several decades. Sustainability in the built environment requires reconciliation between economic, environmental and social impacts of design and planning decisions made during the life cycle of a project from inception to termination. Planning for sustainability in the built environment needs us to go beyond our individual disciplines to consider the variety of economic, social and environmental impacts of our decisions in the long term. A decision to build a green residential development in an isolated location may pass some of the test of sustainability through its reduction in stormwater runoff, energy efficiency, and ecological sustainability in the building, but it may fail to be sustainable from a transportation perspective. Sustainability is important to the planning, design, construction, and preservation of the built environment; because it helps these activities reflect multiple values and considerations. In fact, the arts and sciences of the built environment have traditionally integrated values and fostered creative expression, capabilities that can and should lead the sustainability movement as society seeks ways to live in dynamic balance with its own diverse needs and the natural world. This research aimed to capture the state-of-the-art in the development of innovative sustainable design and planning strategies for building and construction projects. Therefore, there is a need for a holistic selection and implication approach for identifying potential sustainable strategies applicable to a particular project and evaluating the overall life cycle impact of each alternative by accounting for different applicable impacts and making the final selection among various viable alternatives.Keywords: sustainability, built environment, planning, design, construction
Procedia PDF Downloads 1772029 Investigating the Effects of Two Functional and Extra-Functional Stretching Methods of the Leg Muscles on a Selection of Kinematical and Kinetic Indicators in Women with Ankle Instability
Authors: Parvin Malhami
Abstract:
The purpose of the present study was to investigate the effects of two functional and functional stretching methods of the leg muscles on a selection of kinematical and kinetic indicators among women with ankle instability. Twenty-four persons were targeted and randomly divided into the functional exercise (8 persons), extra-functional exercise (8 persons) and control (8 persons) groups on the basis of inclusion and exclusion criteria. The experimental groups received stretching for eight weeks, 3 sessions each week, and the control group merely performed its daily activities. Then, in order to measure the pre -test and post -test variables, the dorsi flexion, Plantar flexion and ground reaction force were investigated and measured. Data were analyzed using paired T-test and independent T-tests at a significant level of 0.05. All statistical analyses were conducted using SPSS 25 software. The results of the T-test showed the significant effect of eight weeks of functional and Extra functional exercises on dorsi Flexion, Plantar Flexion and ground reaction force. (P≤ 0/001). The results of this study showed that the implementation of the functional and Extra-functional exercise protocol had an impact on the amount of Ankle dorsi Flexion and the Plantar felxion of women with an ankle instability. It was also found that muscle flexibility following the stretch ability of the gastrocnemius muscles facilitates the walking of the wrist installation by affecting the amount of wrist flexion, so these people are recommended to use the functional and extra-functional exercise protocol.Keywords: functional stretching, extra functional stretching, dorsi flexion, plantar flexion
Procedia PDF Downloads 712028 Mobile Application for Construction Sites Management
Authors: A. Khelifi, M. Al Kaabi, B. Al Rawashdeh
Abstract:
The infrastructure is one of the most important pillars of the UAE, where it spends millions of dollars for investments in the construction sectors. The research done by Kuwait Finance House (KFH) Research showed clearly that the UAE investments in the construction sectors have exceeded 30 billion dollars in 2013. There are many construction companies in the UAE and each one of them is taking the responsibilities to build different infrastructures. The large scale construction projects consist of multi human activities which can affect the efficiency and productivity of the running projects. The Construction Administration System is developed to increase the efficiency and productivity at the construction sites. It runs on two platforms: web server and mobile phone and supports two main users: mobile user and institution employee. With Construction Administration Mobile Application the user can manage and control several projects, create several reports and send these reports in Portable Document Format (PDF) formats through emails, view the physical location of each project, capturing and save photos. An institution employee can use the system to view all existing workers and projects, send emails and view the progress of each project.Keywords: construction sites, management, mobile application, Portable Document Format (PDF)
Procedia PDF Downloads 3752027 Rare-Earth Ions Doped Lithium Niobate Crystals: Luminescence and Raman Spectroscopy
Authors: Ninel Kokanyan, Edvard Kokanyan, Anush Movsesyan, Marc D. Fontana
Abstract:
Lithium Niobate (LN) is one of the widely used ferroelectrics having a wide number of applications such as phase-conjugation, holographic storage, frequency doubling, SAW sensors. Furthermore, the possibility of doping with rare-earth ions leads to new laser applications. Ho and Tm dopants seem interesting due to laser emission obtained at around 2 µm. Raman spectroscopy is a powerful spectroscopic technique providing a possibility to obtain a number of information about physicochemical and also optical properties of a given material. Polarized Raman measurements were carried out on Ho and Tm doped LN crystals with excitation wavelengths of 532nm and 785nm. In obtained Raman anti-Stokes spectra, we detect expected modes according to Raman selection rules. In contrast, Raman Stokes spectra are significantly different compared to what is expected by selection rules. Additional forbidden lines are detected. These lines have quite high intensity and are well defined. Moreover, the intensity of mentioned additional lines increases with an increase of Ho or Tm concentrations in the crystal. These additional lines are attributed to emission lines reflecting the photoluminescence spectra of these crystals. It means that in our case we were able to detect, within a very good resolution, in the same Stokes spectrum, the transitions between the electronic states, and the vibrational states as well. The analysis of these data is reported as a function of Ho and Tm content, for different polarizations and wavelengths, of the incident laser beam. Results also highlight additional information about π and σ polarizations of crystals under study.Keywords: lithium niobate, Raman spectroscopy, luminescence, rare-earth ions doped lithium niobate
Procedia PDF Downloads 2212026 Unhealthy Food Consumption Behavior in Suan Sunandha Rajabhat Universities
Authors: Narumon Piaseu
Abstract:
This survey research was aimed to describe and compare consumption behavior of health risk food among students in Suan Sunandha Rajabhat University. Sample included 400 undergraduate students enrolled in the first semester of 2008 academic year. Data were collected by using self reported questionnaire developed by the researcher. Data were then analyzed by descriptive statistics including frequency, percentage, mean, standard deviation, and inferential statistics including independent t-test, and Oneway ANOVA. Results revealed that most of the sample were women (67%), enrolled in social related programs (74%). Approximately half of them (45.5%) stayed in dormitory. The mean of monthly income was 5,164 Baht and daily food expenditure was 114.55 Baht. Majority of them (83%) had ready-to-eat food. A major factor influencing their food selection was their parents (61%). A main reason for their food selection was food that looks good (70.75%). Almost half of them (46.25%) had heavy exercise less than 3 times per week. Regarding knowledge on health risk food, 43.5% of the sample had good knowledge. The followings were moderate (41%) and poor (41%). Most of the sample (60.75%) had consumption behavior at low risk. The following was at moderate risk (37.25%). Only 2% were at high risk. Among the sample, consumption behavior of health risk food were significantly different in years of study (F = 3.168, p = .024), daily food expenditure (F = 8.950, p <.001), and knowledge on health risk food (F = 37.856, p <.001), while no significant difference in consumption behavior of health risk food was found in those with a difference in gender, program of study, living place, and monthly income. Results indicate the importance of providing knowledge regarding health risk food for students and their parents in order to promote appropriate food consumption behavior among the students.Keywords: food consumption, risky behavior, Suan Sunandha Rajabhat University, health risk
Procedia PDF Downloads 4732025 Survey of Potato Viral Infection Using Das-Elisa Method in Georgia
Authors: Maia Kukhaleishvili, Ekaterine Bulauri, Iveta Megrelishvili, Tamar Shamatava, Tamar Chipashvili
Abstract:
Plant viruses can cause loss of yield and quality in a lot of important crops. Symptoms of pathogens are variable depending on the cultivars and virus strain. Selection of resistant potato varieties would reduce the risk of virus transmission and significant economic impact. Other way to avoid reduced harvest yields is regular potato seed production sampling and testing for viral infection. The aim of this study was to determine the occurrence and distribution of viral diseases according potato cultivars for further selection of virus-free material in Georgia. During the summer 2015- 2016, 5 potato cultivars (Sante, Laura, Jelly, Red Sonia, Anushka) at 5 different farms located in Akhalkalaki were tested for 6 different potato viruses: Potato virus A (PVA), Potato virus M (PVM), Potato virus S (PVS), Potato virus X (PVX), Potato virus Y (PVY) and potato leaf roll virus (PLRV). A serological method, Double Antibody Sandwich-Enzyme linked Immunosorbent Assay (DASELISA) was used at the laboratory to analyze the results. The result showed that PVY (21.4%) and PLRV (19.7%) virus presence in collected samples was relatively high compared to others. Researched potato cultivars except Jelly and Laura were infected by PVY with different concentrations. PLRV was found only in three potato cultivars (Sante, Jelly, Red Sonia) and PVM virus (3.12%) was characterized with low prevalence. PVX, PVA and PVS virus infection was not reported. It would be noted that 7.9% of samples were containing PVY/PLRV mix infection. Based on the results it can be concluded that PVY and PLRV infections are dominant in all research cultivars. Therefore significant yield losses are expected. Systematic, long-term control of potato viral infection, especially seed-potatoes, must be regarded as the most important factor to increase seed productivity.Keywords: virus, potato, infection, diseases
Procedia PDF Downloads 2902024 IoT Based Approach to Healthcare System for a Quadriplegic Patient Using EEG
Authors: R. Gautam, P. Sastha Kanagasabai, G. N. Rathna
Abstract:
The proposed healthcare system enables quadriplegic patients, people with severe motor disabilities to send commands to electronic devices and monitor their vitals. The growth of Brain-Computer-Interface (BCI) has led to rapid development in 'assistive systems' for the disabled called 'assistive domotics'. Brain-Computer-Interface is capable of reading the brainwaves of an individual and analyse it to obtain some meaningful data. This processed data can be used to assist people having speech disorders and sometimes people with limited locomotion to communicate. In this Project, Emotiv EPOC Headset is used to obtain the electroencephalogram (EEG). The obtained data is processed to communicate pre-defined commands over the internet to the desired mobile phone user. Other Vital Information like the heartbeat, blood pressure, ECG and body temperature are monitored and uploaded to the server. Data analytics enables physicians to scan databases for a specific illness. The Data is processed in Intel Edison, system on chip (SoC). Patient metrics are displayed via Intel IoT Analytics cloud service.Keywords: brain computer interface, Intel Edison, Emotiv EPOC, IoT analytics, electroencephalogram
Procedia PDF Downloads 1862023 Application of Fuzzy TOPSIS in Evaluating Green Transportation Options for Dhaka Megacity
Authors: Md. Moniruzzaman, Thirayoot Limanond
Abstract:
Being the most visible indicator, the transport system of a city points out how developed the city is. Dhaka megacity holds a mixed composition of motorized and non-motorized modes of transport and the number of vehicle figure is escalating over times. And this obviously poses associated environmental costs like air pollution, noise etc. which is degrading the quality of life in the city. Eventually sustainable transport or more importantly green transport from environmental point of view has become a prime choice to the transport professionals in order to cope up the crisis. Currently the city authority is planning to execute such sustainable transport systems that could serve the pressing demand of the present and meet the future needs effectively. This study focuses on the selection and evaluation of green transportation systems among potential alternatives on a priority basis. In this paper, Fuzzy TOPSIS - a multi-criteria decision method is presented to find out the most prioritized alternative. In the first step, Twenty-one individual specific criteria for sustainability assessment are selected. In the following step, experts provide linguistic ratings to the potential alternatives with respect to the selected criteria. The approach is used to generate aggregate scores for sustainability assessment and selection of the best alternative. In the third step, a sensitivity analysis is performed to understand the influence of criteria weights on the decision making process. The key strength of fuzzy TOPSIS approach is its practical applicability having a generation of good quality solution even under uncertainty.Keywords: green transport, multi-criteria decision approach, urban transportation system, sustainability assessment, fuzzy theory, uncertainty
Procedia PDF Downloads 2902022 Land Suitability Scaling and Modeling for Assessing Crop Suitability in Some New Reclaimed Areas, Egypt
Authors: W. A. M. Abdel Kawy, Kh. M. Darwish
Abstract:
Adequate land use selection is an essential step towards achieving sustainable development. The main object of this study is to develop a new scale for land suitability system, which can be compatible with the local conditions. Furthermore, it aims to adapt the conventional land suitability systems to match the actual environmental status in term of soil types, climate and other conditions to evaluate land suitability for newly reclaimed areas. The new system suggests calculation of land suitability considering 20 factors affecting crop selection grouping into five categories; crop-agronomic, land management, development, environmental conditions and socio – economic status. Each factor is summed by each other to calculate the total points. The highest rating for each factor indicates the highest preference for the evaluated crop. The highest rated crops for each group are those with the highest points for the actual suitability. This study was conducted to assess the application efficiency of the new land suitability scale in recently reclaimed sites in Egypt. Moreover, 35 representative soil profiles were examined, and soil samples were subjected to some physical and chemical analysis. Actual and potential suitabilities were calculated by using the new land suitability scale. Finally, the obtained results confirmed the applicability of a new land suitability system to recommend the most promising crop rotation that can be applied in the study areas. The outputs of this research revealed that the integration of different aspects for modeling and adapting a proposed model provides an effective and flexible technique, which contribute to improve land suitability assessment for several crops to be more accurate and reliable.Keywords: analytic hierarchy process, land suitability, multi-criteria analysis, new reclaimed areas, soil parameters
Procedia PDF Downloads 138