Search results for: value stream management (VSM) 4.0
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10205

Search results for: value stream management (VSM) 4.0

3395 The Impact of Artificial Intelligence on Construction Projects

Authors: Muller Salah Zaky Toudry

Abstract:

The complexity arises in defining the development great due to its notion, based on inherent market situations and their requirements, the diverse stakeholders itself and their desired output. An quantitative survey based totally approach was adopted in this optimistic examine. A questionnaire-primarily based survey was performed for the assessment of production fine belief and expectations within the context of excellent development technique. The survey feedback of experts of the leading creation corporations/companies of Pakistan production industry have been analyzed. The monetary ability, organizational shape, and production revel in of the construction companies shaped basis for their selection. The great belief become located to be venture-scope-orientated and taken into consideration as an extra cost for a production assignment. Any excellent improvement technique changed into expected to maximize the profit for the employer, via enhancing the productiveness in a creation project. The look at is beneficial for the construction specialists to evaluate the prevailing creation great perception and the expectations from implementation of any pleasant improvement approach in production projects.

Keywords: correlation analysis, lean construction tools, lean construction, logistic regression analysis, risk management, safety construction quality, expectation, improvement, perception client loyalty, NPS, pre-construction, schedule reduction

Procedia PDF Downloads 19
3394 Process Safety Evaluation of a Nuclear Power Plant through Virtual Process Hazard Analysis (PHA) using the What-If Technique

Authors: Lormaine Anne Branzuela, Elysa Largo, Julie Marisol Pagalilauan, Neil Concibido, Monet Concepcion Detras

Abstract:

Energy is a necessity both for the people and the country. The demand for energy is continually increasing, but the supply is not doing the same. The reopening of the Bataan Nuclear Power Plant (BNPP) in the Philippines has been circulating in the media for the current time. The general public has been hesitant in accepting the inclusion of nuclear energy in the Philippine energy mix due to perceived unsafe conditions of the plant. This study evaluated the possible operations of a nuclear power plant, which is of the same type as the BNPP, considering the safety of the workers, the public, and the environment using a Process Hazard Analysis (PHA) method. What-If Technique was utilized to identify the hazards and consequences on the operations of the plant, together with the level of risk it entails. Through the brainstorming sessions of the PHA team, it was found that the most critical system on the plant is the primary system. Possible leakages on pipes and equipment due to weakened seals and welds and blockages on coolant path due to fouling were the most common scenarios identified, which further caused the most critical scenario – radioactive leak through sump contamination, nuclear meltdown, and equipment damage and explosion which could result to multiple injuries and fatalities, and environmental impacts.

Keywords: process safety management, process hazard analysis, what-If technique, nuclear power plant

Procedia PDF Downloads 226
3393 Evaluation of the Hepatitis C Virus and Classical and Modern Immunoassays Used Nowadays to Diagnose It in Tirana

Authors: Stela Papa, Klementina Puto, Migena Pllaha

Abstract:

HCV is a hepatotropic RNA virus, transmitted primarily via the blood route, which causes progressive disease such as chronic hepatitis, liver cirrhosis, or hepatocellular carcinoma. HCV nowadays is a global healthcare problem. A variety of immunoassays including old and new technologies are being applied to detect HCV in our country. These methods include Immunochromatography assays (ICA), Fluorescence immunoassay (FIA), Enzyme linked fluorescent assay (ELFA), and Enzyme linked immunosorbent assay (ELISA) to detect HCV antibodies in blood serum, which lately is being slowly replaced by more sensitive methods such as rapid automated analyzer chemiluminescence immunoassay (CLIA). The aim of this study is to estimate HCV infection in carriers and chronic acute patients and to evaluate the use of new diagnostic methods. This study was realized from September 2016 to May 2018. During this study period, 2913 patients were analyzed for the presence of HCV by taking samples from their blood serum. The immunoassays performed were ICA, FIA, ELFA, ELISA, and CLIA assays. Concluding, 82% of patients taken in this study, resulted infected with HCV. Diagnostic methods in clinical laboratories are crucial in the early stages of infection, in the management of chronic hepatitis and in the treatment of patients during their disease.

Keywords: CLIA, ELISA, Hepatitis C virus, immunoassay

Procedia PDF Downloads 153
3392 Activity-Based Costing of Medical Intensive Care Unit 240

Authors: Suppawan Lertpongpakpoom, Anongnat Boonrat, Kunya BoontummoSuppawan

Abstract:

This descriptive cost analysis aimed to analyze the unit cost of patients in medical intensive care unit. Purposive sampling was used to select 20 nurses, 6 practical nurses, 5 nurses aid and select samples 30 patients. Data were collected from both primary source (activity and average time of nursing care) and secondary source Z bill of payment and patient record). Instruments were cost recording form, activity observation form, and service recording form. Content validity of all instruments were evaluated by three experts (CVI = 0.87). Descriptive statistics was employed for data analysis. The results of the Activity-Based Costing Analysis showed that total activity cost of 4 service types for the patients was 14,776.92 Bath. The highest cost was nursing record was 5,674.78 Bath, followed direct nursing activity was 5,176.18 Bath, medical treatment was 1,976.6 Bath. The lowest cost was management activity was 1,003.64 Bath per visit. The result suggested that Activity-Base Costing Analysis could be applied to give better understanding of cost structure, enabling better consideration wasted expense and non-value-added activity, and improvement of effective utilization.

Keywords: activity-based costing, medical intensive care, nursing care, cost analysis

Procedia PDF Downloads 404
3391 Transformational Justice for Employees' Job Satisfaction

Authors: Hassan Barau Singhry

Abstract:

Purpose: Leadership or the absence of it is an important behaviour affecting employees’ job satisfaction. Although, there are many models of leadership, one that stands out in a period of change is the transformational behaviour. The aim of this study is to investigate the role of an organizational justice on the relationship between transformational leadership and employee job satisfaction. The study is based on the assumption that change begins with leaders and leaders should be fair and just. Methodology: A cross-sectional survey through structured questionnaire was employed to collect the data of this study. The population is selected the three tiers of government such as the local, state, and federal governments in Nigeria. The sampling method used in this research is stratified random sampling. 418 middle managers of public organizations respondents to the questionnaire. Multiple regression aided by structural equation modeling was employed to test 4 hypothesized relationships. Finding: The regression results support for the mediating role of organizational justice such as distributive, procedural, interpersonal and informational justice in the link between transformational leadership and job satisfaction. Originality/value: This study adds to the literature of human resource management by empirically validating and integrating transformational leadership behaviour with the four dimensions of organizational justice theory. The study is expected to be beneficial to the top and middle-level administrators as well as theory building and testing.

Keywords: distributive justice, job satisfaction, organizational justice, procedural justice, transformational leadership

Procedia PDF Downloads 176
3390 Developing Points of Attractions and Destinations: The Case Study of Nakhon Sawan Province, Thailand

Authors: Panisa Panyalert

Abstract:

This research presents the tourism industry at Nakhon Sawan province in an aspect of developing points of attractions and destinations. The author attempts to empirically analyze the tourist destination, Nakhon Sawan, by using components of the tourism inventory include: attraction, accessibility, accommodation and amenity. An understanding of existing tourism product is very important in order to find out strength and weakness by comparing with the nearby well-known tourist destination, Phitsanulok province. Moreover, the hypothetical evolution of a tourist area will be utilized as a framework for indicating stages of the destination in relation to number of tourists. The study uses secondary data of number of tourist arrivals in Nakhon Sawan from 2008 to 2013 receiving from National Statistical Office and Nakhon Sawan Provincial Administration Organization (NPAO) in order to find the stage of destination development, and an in-depth interview with several open-ended questions would be preferred in order to get deep details of necessary data by video recording with ten respondents. The findings are concentrated on potential places and sites, existing tourism product, strength and weakness, and positioning to assist the province to be the destination of tourists’ mind.

Keywords: destination development, destination management, tourism inventory, tourism product

Procedia PDF Downloads 362
3389 Quantitative Evaluation of Diabetic Foot Wound Healing Using Hydrogel Nanosilver Based Dressing vs. Traditional Dressing: A Prospective Randomized Control Study

Authors: Ehsan A. Yahia, Ayman E. El-Sharkawey, Magda M. Bayoumi

Abstract:

Background: Wound dressings perform a crucial role in cutaneous wound management due to their ability to protect wounds and promote dermal and epidermal tissue regeneration. Aim: To evaluate the effectiveness of using hydrogel/nano silver-based dressing vs. traditional dressing on diabetic foot wound healing. Methods: Sixty patients with type-2 diabetes hospitalized for diabetic foot wound treatment were recruited from selected Surgical departments. A prospective randomized control study was carried. Results: The results showed that the percentage of a reduction rate of the ulcer by the third week of the treatment in the hydrogel/nano silver-based dressing group was higher (15.11%) than in the traditional wound dressing group (33.44%). Moreover, the mean ulcer size "sq mm" in the hydrogel/nano silver-based dressing group recognized a faster healing rate (15.11±7.89) and considerably lesser in comparison to the traditional in the third week (21.65±8.4). Conclusion: The hydrogel/nanosilver-based dressing showed better results than traditional dressing in managing diabetic ulcer foot.

Keywords: diabetes, wound care, diabetic foot, wound dressing, hydrogel nanosilver

Procedia PDF Downloads 113
3388 Knowledge Decision of Food Waste and Loss Reduction in Supply Chain System: A Case Study of Kingdom of Saudi Arabia

Authors: Nadia Adnan, Muhammad Mohsin Raza, Latha Ravindran

Abstract:

Based on the principles above, the study presents an economic model of food waste for consumers, intermediaries, and producers. We discriminate between purchasing and selling, purchases versus customers consumption, and gross output versus sales for each intermediary. To compensate for waste at each level of the supply chain, agents must charge higher sales prices. The research model can produce more accurate predictions about how actions (public regulations or private efforts) to reduce food waste impact markets, including indirect (cascading) effects. With a formal model, researchers demonstrate the uniqueness of these interaction effects and simulate an empirical model calibrated to market characteristics and waste rates in Saudi Arabia. Researchers demonstrate that the effects of waste reduction differ per commodity, depending on supply and demand elasticities, degree of openness to international commerce, and the beginning rates of food loss and waste at each level of the value chain. Because of the consequential effects related to the supply chain, initiatives to minimize food waste will be strengthened in some circumstances and partially countered in others.

Keywords: food loss, food waste, supply chain management, Saudi Arabia, food supply

Procedia PDF Downloads 109
3387 Waste Management in a Hot Laboratory of Japan Atomic Energy Agency – 3: Volume Reduction and Stabilization of Solid Waste

Authors: Masaumi Nakahara, Sou Watanabe, Hiromichi Ogi, Atsuhiro Shibata, Kazunori Nomura

Abstract:

In the Japan Atomic Energy Agency, three types of experimental research, advanced reactor fuel reprocessing, radioactive waste disposal, and nuclear fuel cycle technology, have been carried out at the Chemical Processing Facility. The facility has generated high level radioactive liquid and solid wastes in hot cells. The high level radioactive solid waste is divided into three main categories, a flammable waste, a non-flammable waste, and a solid reagent waste. A plastic product is categorized into the flammable waste and molten with a heating mantle. The non-flammable waste is cut with a band saw machine for reducing the volume. Among the solid reagent waste, a used adsorbent after the experiments is heated, and an extractant is decomposed for its stabilization. All high level radioactive solid wastes in the hot cells are packed in a high level radioactive solid waste can. The high level radioactive solid waste can is transported to the 2nd High Active Solid Waste Storage in the Tokai Reprocessing Plant in the Japan Atomic Energy Agency.

Keywords: high level radioactive solid waste, advanced reactor fuel reprocessing, radioactive waste disposal, nuclear fuel cycle technology

Procedia PDF Downloads 159
3386 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 194
3385 Logistics Optimization: A Literature Review of Techniques for Streamlining Land Transportation in Supply Chain Operations

Authors: Danica Terese Valda, Segundo Villa III, Michiko Yasuda, Jomel Tagaro

Abstract:

This study conducts a thorough literature review of logistics optimization techniques that aimed at improving the efficiency of supply chain operations. Logistics optimization encompasses key areas such as transportation management, inventory control, and distribution network design, each of which plays a critical role in streamlining supply chain performance. The review identifies mixed-integer linear programming (MILP) as a dominant method, widely used for its flexibility in handling complex logistics problems. Other methods like heuristic algorithms and combinatorial optimization also prove effective in solving large-scale logistics challenges. Furthermore, real-time data integration and advancements in simulation techniques are transforming the decision-making processes within supply chains, leading to more dynamic and responsive operations. The inclusion of sustainability goals, particularly in minimizing carbon emissions, has emerged as a growing trend in logistics optimization. This research highlights the need for integrated, holistic approaches that consider the interconnectedness of logistical components. The findings provide valuable insights to guide future research and practical applications, fostering more resilient and efficient supply chains.

Keywords: logistics, techniques, supply chain, land transportation

Procedia PDF Downloads 12
3384 A Cohort Study of Early Cardiologist Consultation by Telemedicine on the Critical Non-STEMI Inpatients

Authors: Wisit Wichitkosoom

Abstract:

Objectives: To find out the more effect of early cardiologist consultation using a simple technology on the diagnosis and early proper management of patients with Non-STEMI at emergency department of district hospitals without cardiologist on site before transferred. Methods: A cohort study was performed in Udonthani general hospital at Udonthani province. From 1 October 2012–30 September 2013 with 892 patients diagnosed with Non-STEMI. All patients mean aged 46.8 years of age who had been transferred because of Non-STEMI diagnosed, over a 12 week period of studied. Patients whose transferred, in addition to receiving proper care, were offered a cardiologist consultation with average time to Udonthani hospital 1.5 hour. The main outcome measure was length of hospital stay, mortality at 3 months, inpatient investigation, and transfer rate to the higher facilitated hospital were also studied. Results: Hospital stay was significantly shorter for those didn’t consult cardiologist (hazard ratio 1.19; approximate 95% CI 1.001 to 1.251; p = 0.039). The 136 cases were transferred to higher facilitated hospital. No statistically significant in overall mortality between the groups (p=0.068). Conclusions: Early cardiologist consultant can reduce length of hospital stay for patients with cardiovascular conditions outside of cardiac center. The new basic technology can apply for the safety patient.

Keywords: critical, telemedicine, safety, non STEMI

Procedia PDF Downloads 419
3383 Developing the P1-P7 Management and Analysis Software for Thai Child Evaluation (TCE) of Food and Nutrition Status

Authors: S. Damapong, C. Kingkeow, W. Kongnoo, P. Pattapokin, S. Pruenglamphu

Abstract:

As the presence of Thai children double burden malnutrition, we conducted a project to promote holistic age-appropriate nutrition for Thai children. Researchers developed P1-P7 computer software for managing and analyzing diverse types of collected data. The study objectives were: i) to use software to manage and analyze the collected data, ii) to evaluate the children nutritional status and their caretakers’ nutrition practice to create regulations for improving nutrition. Data were collected by means of questionnaires, called P1-P7. P1, P2 and P5 were for children and caretakers, and others were for institutions. The children nutritional status, height-for-age, weight-for-age, and weight-for-height standards were calculated using Thai child z-score references. Institution evaluations consisted of various standard regulations including the use of our software. The results showed that the software was used in 44 out of 118 communities (37.3%), 57 out of 240 child development centers and nurseries (23.8%), and 105 out of 152 schools (69.1%). No major problems have been reported with the software, although user efficiency can be increased further through additional training. As the result, the P1-P7 software was used to manage and analyze nutritional status, nutrition behavior, and environmental conditions, in order to conduct Thai Child Evaluation (TCE). The software was most widely used in schools. Some aspects of P1-P7’s questionnaires could be modified to increase ease of use and efficiency.

Keywords: P1-P7 software, Thai child evaluation, nutritional status, malnutrition

Procedia PDF Downloads 357
3382 Water Education in the Middle East: Case Study of Iran and Turkey

Authors: Seyedeh Zahra Seyed Sharifi, M. R. M. Tabatabaei

Abstract:

Due to increase of population and healthy food demand, management and conservation of water resources have become one of the main concerns of governments, scientists and economists. In recent years, Iran has exposed to water scarcity as a result of which its rivers, lakes and wetlands have dried up or are in the drying process. Therefore, water crisis has become the most important environmental issue in the country. Under these circumstances, increasing public awareness by promoting their culture as well as public collaboration to protect water resources could only be possible by making courses to reflect water importance. This could be approached by school and high-school students to learn optimum use of water resources. This study initially focuses on the current position of water courses in levels of school and high-school educations in Iran and Turkey and then deals with the challenges to be faced for the promotion of the system. The course titles and number of pages related to water in all primary and secondary textbooks of the education system of Iran and Turkey were determined using content analysis method and the results were presented. The results indicate that primary and secondary textbooks in both countries must focus on water shortage and water protection and teach children the optimum use of water in order to promote water protection.

Keywords: educational system, environmental awareness, Iran, Turkey, water crisis

Procedia PDF Downloads 309
3381 Financing from Customers for SMEs and Managing Financial Risks: The Role of Customer Relationships

Authors: Yongsheng Guo, Mengyu Lu

Abstract:

This study investigates how Chinese SMEs manage financial risks in financing from customers from the perspectives of ethics and national culture. A grounded theory approach is adopted to identify the causal conditions, actions/interactions, and consequences. 32 interviews were conducted, and systematic coding methods were used to identify themes and categories. This study found that Chinese ethical principles, including integrity, friendship, and reciprocity, and cultural traits, including collectivism, acquaintance society, and long-term orientation, provide conditions for financing from customers. The SMEs establish trust-based relationships with customers through personal communications and social networks and reduce financial risk through diversification, frequent operations, and enterprise reputations. Both customers and SMEs can get benefits like financial resources and customer experiences. This study creates a theoretical framework that connects the causal conditions, processes, and outcomes, providing a deeper understanding of financing from customers. A resource and process capability theory of SMEs and a customer capital and customer value model are proposed to connect accounting and finance concepts. Suggestions are proposed for the authorities as more guidance and regulations are needed for this informal finance.

Keywords: CRM, culture, ethics, SME, risk management

Procedia PDF Downloads 45
3380 Effect of Migraine on Functional Performance and Reported Symptoms in Children with Concussion

Authors: Abdulaziz Alkathiry

Abstract:

Concussion is a common brain injury that affect physical and cognitive performance. While several studies indicated that adolescents are more likely to develop concussion, in the last decade concussion has been mainly explored in adults. Migraine has been identified as a common symptom reported after concussion and was tied with worse prognoses. Hence, we aimed to investigate the effect of migraine on functional performance and self-reported symptoms in children with concussion. This cross-sectional study involved 35 symptomatic children aged 9 – 17 years recruited within 1 year from their concussion injury at a tertiary balance center. Participants’ symptoms and functional performance were assessed using the post-concussion symptoms scale (PCSS) and the functional gait assessment (FGA) respectively. Concussed children with migraine showed significantly worse symptoms including fatigue, sleeping impairment, difficulty concentrating, and visual problems (P < 0.05). Functional performance didn’t show differences between concussed children with and without migraine. Although concussed children with and without migraine didn’t show any differences on functional performance, worse cognitive symptoms were found in concussed children with migraine. A customized treatment approach is indicated in the presence of migraine for the management of children with concussion. Keywords: Concussion; Migraine; Balance; Post-Concussion Symptoms Scale; Functional Gait Assessment

Keywords: concussion, migraine, post-concussion symptoms scale, functional gait assessment, balance

Procedia PDF Downloads 345
3379 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques

Authors: Pranjali Avinash Yadav-Deshmukh

Abstract:

Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.

Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction

Procedia PDF Downloads 388
3378 Earthquake Vulnerability and Repair Cost Estimation of Masonry Buildings in the Old City Center of Annaba, Algeria

Authors: Allaeddine Athmani, Abdelhacine Gouasmia, Tiago Ferreira, Romeu Vicente

Abstract:

The seismic risk mitigation from the perspective of the old buildings stock is truly essential in Algerian urban areas, particularly those located in seismic prone regions, such as Annaba city, and which the old buildings present high levels of degradation associated with no seismic strengthening and/or rehabilitation concerns. In this sense, the present paper approaches the issue of the seismic vulnerability assessment of old masonry building stocks through the adaptation of a simplified methodology developed for a European context area similar to that of Annaba city, Algeria. Therefore, this method is used for the first level of seismic vulnerability assessment of the masonry buildings stock of the old city center of Annaba. This methodology is based on a vulnerability index that is suitable for the evaluation of damage and for the creation of large-scale loss scenarios. Over 380 buildings were evaluated in accordance with the referred methodology and the results obtained were then integrated into a Geographical Information System (GIS) tool. Such results can be used by the Annaba city council for supporting management decisions, based on a global view of the site under analysis, which led to more accurate and faster decisions for the risk mitigation strategies and rehabilitation plans.

Keywords: Damage scenarios, masonry buildings, old city center, seismic vulnerability, vulnerability index

Procedia PDF Downloads 451
3377 The Moderation Effect of Smart Phone Addiction in Relationship between Self-Leadership and Innovative Behavior

Authors: Gi-Ryun Park, Gye-Wan Moon, Dong-Hoon Yang

Abstract:

This study aims to explore the positive effects of self-leadership and innovative behavior that'd been proven in the existing researches proactively and understand the regulation effects of smartphone addiction which has recently become an issue in Korea. This study conducted a convenient sampling of college students attending the four colleges located at Daegu. A total of 210 questionnaires in 5-point Likert scale were distributed to college students. Among which, a total of 200 questionnaires were collected for our final analysis data. Both correlation analysis and regression analysis were carried out to verify those questionnaires through SPSS 20.0. As a result, college students' self-leadership had a significantly positive impact on innovative behavior (B= .210, P= .003). In addition, it is found that the relationship between self-leadership and innovative behavior can be adjusted depending on the degree of smartphone addiction in college students (B= .264, P= .000). This study could first understand the negative effects of smartphone addiction and find that if students' self-leadership is improved in terms of self-management and unnecessary use of smartphone is controlled properly, innovative behavior can be improved. In addition, this study is significant in that it attempts to identify a new impact of smartphone addiction with the recent environmental changes, unlike the existing researches that'd been carried out from the perspective of organizational behavior theory.

Keywords: innovative behavior, revolutionary behavior, self-leadership, smartphone addiction

Procedia PDF Downloads 260
3376 Analysis of the Impact of Climate Change on Maize (Zea Mays) Yield in Central Ethiopia

Authors: Takele Nemomsa, Girma Mamo, Tesfaye Balemi

Abstract:

Climate change refers to a change in the state of the climate that can be identified (e.g. using statistical tests) by changes in the mean and/or variance of its properties and that persists for an extended period, typically decades or longer. In Ethiopia; Maize production in relation to climate change at regional and sub- regional scales have not been studied in detail. Thus, this study was aimed to analyse the impact of climate change on maize yield in Ambo Districts, Central Ethiopia. To this effect, weather data, soil data and maize experimental data for Arganne hybrid were used. APSIM software was used to investigate the response of maize (Zea mays) yield to different agronomic management practices using current and future (2020s–2080s) climate data. The climate change projections data which were downscaled using SDSM were used as input of climate data for the impact analysis. Compared to agronomic practices the impact of climate change on Arganne in Central Ethiopia is minute. However, within 2020s-2080s in Ambo area; the yield of Arganne hybrid is projected to reduce by 1.06% to 2.02%, and in 2050s it is projected to reduce by 1.56 While in 2080s; it is projected to increase by 1.03% to 2.07%. Thus, to adapt to the changing climate; farmers should consider increasing plant density and fertilizer rate per hectare.

Keywords: APSIM, downscaling, response, SDSM

Procedia PDF Downloads 384
3375 Explanation Conceptual Model of the Architectural Form Effect on Structures in Building Aesthetics

Authors: Fatemeh Nejati, Farah Habib, Sayeh Goudarzi

Abstract:

Architecture and structure have always been closely interrelated so that they should be integrated into a unified, coherent and beautiful universe, while in the contemporary era, both structures and architecture proceed separately. The purpose of architecture is the art of creating form and space and order for human service, and the goal of the structural engineer is the transfer of loads to the structure, too. This research seeks to achieve the goal by looking at the relationship between the form of architecture and structure from its inception to the present day to the Global Identification and Management Plan. Finally, by identifying the main components of the design of the structure in interaction with the architectural form, an effective step is conducted in the Professional training direction and solutions to professionals. Therefore, after reviewing the evolution of structural and architectural coordination in various historical periods as well as how to reach the form of the structure in different times and places, components are required to test the components and present the final theory that one hundred to be tested in this regard. Finally, this research indicates the fact that the form of architecture and structure has an aesthetic link, which is influenced by a number of components that could be edited and has a regular order throughout history that could be regular. The research methodology is analytic, and it is comparative using analytical and matrix diagrams and diagrams and tools for conducting library research and interviewing.

Keywords: architecture, structural form, structural and architectural coordination, effective components, aesthetics

Procedia PDF Downloads 216
3374 Students’ Level of Knowledge Construction and Pattern of Social Interaction in an Online Forum

Authors: K. Durairaj, I. N. Umar

Abstract:

The asynchronous discussion forum is one of the most widely used activities in learning management system environment. Online forum allows participants to interact, construct knowledge, and can be used to complement face to face sessions in blended learning courses. However, to what extent do the students perceive the benefits or advantages of forum remain to be seen. Through content and social network analyses, instructors will be able to gauge the students’ engagement and knowledge construction level. Thus, this study aims to analyze the students’ level of knowledge construction and their participation level that occur through online discussion. It also attempts to investigate the relationship between the level of knowledge construction and their social interaction patterns. The sample involves 23 students undertaking a master course in one public university in Malaysia. The asynchronous discussion forum was conducted for three weeks as part of the course requirement. The finding indicates that the level of knowledge construction is quite low. Also, the density value of 0.11 indicating that the overall communication among the participants in the forum is low. This study reveals that strong and significant correlations between SNA measures (in-degree centrality, out-degree centrality) and level of knowledge construction. Thus, allocating these active students in a different groups aids the interactive discussion takes place. Finally, based upon the findings, some recommendations to increase students’ level of knowledge construction and also for further research are proposed.

Keywords: asynchronous discussion forums, content analysis, knowledge construction, social network analysis

Procedia PDF Downloads 375
3373 MhAGCN: Multi-Head Attention Graph Convolutional Network for Web Services Classification

Authors: Bing Li, Zhi Li, Yilong Yang

Abstract:

Web classification can promote the quality of service discovery and management in the service repository. It is widely used to locate developers desired services. Although traditional classification methods based on supervised learning models can achieve classification tasks, developers need to manually mark web services, and the quality of these tags may not be enough to establish an accurate classifier for service classification. With the doubling of the number of web services, the manual tagging method has become unrealistic. In recent years, the attention mechanism has made remarkable progress in the field of deep learning, and its huge potential has been fully demonstrated in various fields. This paper designs a multi-head attention graph convolutional network (MHAGCN) service classification method, which can assign different weights to the neighborhood nodes without complicated matrix operations or relying on understanding the entire graph structure. The framework combines the advantages of the attention mechanism and graph convolutional neural network. It can classify web services through automatic feature extraction. The comprehensive experimental results on a real dataset not only show the superior performance of the proposed model over the existing models but also demonstrate its potentially good interpretability for graph analysis.

Keywords: attention mechanism, graph convolutional network, interpretability, service classification, service discovery

Procedia PDF Downloads 137
3372 Spatio-Temporal Data Mining with Association Rules for Lake Van

Authors: Tolga Aydin, M. Fatih Alaeddinoğlu

Abstract:

People, throughout the history, have made estimates and inferences about the future by using their past experiences. Developing information technologies and the improvements in the database management systems make it possible to extract useful information from knowledge in hand for the strategic decisions. Therefore, different methods have been developed. Data mining by association rules learning is one of such methods. Apriori algorithm, one of the well-known association rules learning algorithms, is not commonly used in spatio-temporal data sets. However, it is possible to embed time and space features into the data sets and make Apriori algorithm a suitable data mining technique for learning spatio-temporal association rules. Lake Van, the largest lake of Turkey, is a closed basin. This feature causes the volume of the lake to increase or decrease as a result of change in water amount it holds. In this study, evaporation, humidity, lake altitude, amount of rainfall and temperature parameters recorded in Lake Van region throughout the years are used by the Apriori algorithm and a spatio-temporal data mining application is developed to identify overflows and newly-formed soil regions (underflows) occurring in the coastal parts of Lake Van. Identifying possible reasons of overflows and underflows may be used to alert the experts to take precautions and make the necessary investments.

Keywords: apriori algorithm, association rules, data mining, spatio-temporal data

Procedia PDF Downloads 375
3371 Study of Some Biological Profiles as Limiting Factors of Male Fertility in the Region of Batna, Algeria

Authors: Bousnane Nour El Houda, Chennaf Ali, Yahia Mouloud, Benbia Souhila

Abstract:

Male infertility or the inability of a man to procreate is a major public health problem, where it is a leading cause of marital discord in several countries such Algeria. The objective of this work is to study some biological profiles of infertile men from the city of Batna/Algeria and to identify the causes of infertility in a population of infertile males to improve its management and to establish a good therapeutic strategy through a study that lasted 10 months in the Department of Urology of the University Hospital of Banta and on a population of 140 infertile subjects. For every man, series of assessments was performed to determine the exact causes of infertility. We found 102 cases of primary infertility against 38 cases of secondary infertility; the average age of men was 39.7 years, with a predominance of the age group (46-50 years). 34.29% of subjects had genital infections against 17.14% with varicocele. 132 men presented spermiologiques abnormalities; a asthénospermie (AS) in 27.27% of the cases, astheno-terato spermiea (OATS) 11.36% while Azoospermes showed 5.07%. Genital infections are the main causes of infertility (34.29%) of the cases. The results of spermocytogramme showed a predominance of head abnormalities (41.70%), while the flagellum abnormalities presented 33.83%. The dosage of the seminal plasma carnitine showed no pathological cases, which makes it difficult to know their association with infertility. By against some disturbances Fructose and Zinc have been reported.

Keywords: male infertility, spermogramme, spermocytogramme, biological profils

Procedia PDF Downloads 333
3370 Monitoring Public Transportation in Developing Countries Using Automatic Vehicle Location System: A Case Study

Authors: Ahmed Osama, Hassan A. Mahdy, Khalid A. Kandil, Mohamed Elhabiby

Abstract:

Automatic Vehicle Location systems (AVL) have been used worldwide for more than twenty years and have showed great success in public transportation management and monitoring. Cairo public bus service suffers from several problems such as unscheduled stops, unscheduled route deviations, and inaccurate schedules, which have negative impacts on service reliability. This research aims to study those problems for a selected bus route in Cairo using a prototype AVL system. Experimental trips were run on the selected route; and the locations of unscheduled stops, regions of unscheduled deviations, along with other trip time and speed data were collected. Data was analyzed to demonstrate the reliability of passengers on the unscheduled stops compared to the scheduled ones. Trip time was also modeled to assess the unscheduled stops’ impact on trip time, and to check the accuracy of the applied scheduled trip time. Moreover, frequency and length of the unscheduled route deviations, as well as their impact on the bus stops, were illustrated. Solutions were proposed for the bus service deficiencies using the AVL system. Finally, recommendations were proposed for further research.

Keywords: automatic vehicle location, public transportation, unscheduled stops, unscheduled route deviations, inaccurate schedule

Procedia PDF Downloads 391
3369 Rating the Importance of Customer Requirements for Green Product Using Analytic Hierarchy Process Methodology

Authors: Lara F. Horani, Shurong Tong

Abstract:

Identification of customer requirements and their preferences are the starting points in the process of product design. Most of design methodologies focus on traditional requirements. But in the previous decade, the green products and the environment requirements have increasingly attracted the attention with the constant increase in the level of consumer awareness towards environmental problems (such as green-house effect, global warming, pollution and energy crisis, and waste management). Determining the importance weights for the customer requirements is an essential and crucial process. This paper used the analytic hierarchy process (AHP) approach to evaluate and rate the customer requirements for green products. With respect to the ultimate goal of customer satisfaction, surveys are conducted using a five-point scale analysis. With the help of this scale, one can derive the weight vectors. This approach can improve the imprecise ranking of customer requirements inherited from studies based on the conventional AHP. Furthermore, the AHP with extent analysis is simple and easy to implement to prioritize customer requirements. The research is based on collected data through a questionnaire survey conducted over a sample of 160 people belonging to different age, marital status, education and income groups in order to identify the customer preferences for green product requirements.

Keywords: analytic hierarchy process (AHP), green product, customer requirements for green design, importance weights for the customer requirements

Procedia PDF Downloads 244
3368 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 166
3367 Internet of Things Edge Device Power Modelling and Optimization Simulator

Authors: Cian O'Shea, Ross O'Halloran, Peter Haigh

Abstract:

Wireless Sensor Networks (WSN) are Internet of Things (IoT) edge devices. They are becoming widely adopted in many industries, including health care, building energy management, and conditional monitoring. As the scale of WSN deployments increases, the cost and complexity of battery replacement and disposal become more significant and in time may become a barrier to adoption. Harvesting ambient energies provide a pathway to reducing dependence on batteries and in the future may lead to autonomously powered sensors. This work describes a simulation tool that enables the user to predict the battery life of a wireless sensor that utilizes energy harvesting to supplement the battery power. To create this simulator, all aspects of a typical WSN edge device were modelled including, sensors, transceiver, and microcontroller as well as the energy source components (batteries, solar cells, thermoelectric generators (TEG), supercapacitors and DC/DC converters). The tool allows the user to plug and play different pre characterized devices as well as add user-defined devices. The goal of this simulation tool is to predict the lifetime of a device and scope for extension using ambient energy sources.

Keywords: Wireless Sensor Network, IoT, edge device, simulation, solar cells, TEG, supercapacitor, energy harvesting

Procedia PDF Downloads 133
3366 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 278