Search results for: critical information infrastructure
15989 Effects of Climate Change on Hydraulic Design Methods of Railway Infrastructures
Authors: Chiara Cesali
Abstract:
The effects of climate change are increasingly evident: increases in temperature (i.e. global warming), greater frequency of extreme weather events, i.e. storms, floods, which often affect transport infrastructures. Large-scale climatological models with long-term horizons (up to 2100) show the possibility of significant increases in precipitation in the future, according to the greenhouse gas emissions scenarios from IPCC. Consequently, the insufficiency of existing hydraulic works (i.e. bridges, culverts, drainage systems) may be more frequent, or those currently being designed may become insufficient in the future. Thus, the hydraulic design methods of transport infrastructure must begin to take into account the influence of climate change. To this purpose, criteria for applying to the hydraulic design of a railway infrastructure some of the approaches currently available for determining design rainfall intensity and/or peak discharge flow on the basis of possible climate change scenarios are defined and proposed in the paper. Some application cases are also described.Keywords: climate change, hydraulic design, precipitation, railway
Procedia PDF Downloads 17915988 Comparative Analysis of Geographical Routing Protocol in Wireless Sensor Networks
Authors: Rahul Malhotra
Abstract:
The field of wireless sensor networks (WSN) engages a lot of associates in the research community as an interdisciplinary field of interest. This type of network is inexpensive, multifunctionally attributable to advances in micro-electromechanical systems and conjointly the explosion and expansion of wireless communications. A mobile ad hoc network is a wireless network without fastened infrastructure or federal management. Due to the infrastructure-less mode of operation, mobile ad-hoc networks are gaining quality. During this work, we have performed an efficient performance study of the two major routing protocols: Ad hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR) protocols. We have used an accurate simulation model supported NS2 for this purpose. Our simulation results showed that AODV mitigates the drawbacks of the DSDV and provides better performance as compared to DSDV.Keywords: routing protocol, MANET, AODV, On Demand Distance Vector Routing, DSR, Dynamic Source Routing
Procedia PDF Downloads 27515987 Power, Values, Rules and Leader Decision Making: A Discourse Perspective
Authors: Cathryn Robinson, Bernard McKenna, David Rooney
Abstract:
This paper argues that the application of values-based leadership increasingly challenges leaders in rules-based organisations, particularly in bureaucratic organisations such as the military, public service, police, and emergency services. Leaders are grappling to reconcile how to enact values-based leadership and decision-making when they are bound by rules, policies, and procedures. This interpretive study used a multi-faceted vignette (critical incident) as the basis of an interview with air force officers at three levels: executive, senior, and junior. In this way, practice is forced to intersect with discourse. The findings revealed a shared set of discourse themes (legal; rules; safety and risk; operational practice/theatre discourses), but also clear dialectical tensions. These tensions were evident in executive officers and senior leaders emphasizing rules and information themes, whereas junior officers emphasized decision making, collateral, and situation. These findings reveal discourse and practice incommensurability that could have grave implications in the conduct of war.Keywords: critical incident, discourse analysis, rules-based, values-based
Procedia PDF Downloads 18115986 Critical Reading Achievement of Rural Migrant Children in China: The Roles of Educational Expectation
Authors: Liman Zhao, Jianlong Zhang, Mingman Ren, Chuang Wang, Jian Liu
Abstract:
Rural migrant children have become a fast-growing population in China as a consequence of the large-scale population flow from rural to urban areas in the context of urbanization. In China, the socioeconomic status of migrant children is relatively low in comparison to non-migrant children. Parents of migrant children often work in occupations with long working hours, high labor intensity, and low pay due to their poor academic qualifications. Most migrant children's parents have not received higher education and have no time to read with their children. The family of migrant children usually does not have a good collection of books either, which leads to these children’s insufficient reading and low reading levels. Moreover, migrant children frequently relocate with their parents, and their needs for knowledge and reading are often neglected by schools, which puts migrant children at risk of academic failure in China. Therefore, the academic achievement of rural migrant children has become a focus of education in China. This study explores the relationship between the educational expectation of rural migrant children and their critical reading competence in general and the moderating effect of the difference between parental educational expectation to their children and the children’s own educational expectation. The responses to a survey from 5113 seventh-grade children in a district of the capital city in China revealed that children who moved to cities in grades 4-6 of primary school performed the best in critical reading, and children who moved to cities after middle school showed the worst performance in critical reading. In addition, parents’ educational expectations of their children and their own educational expectations were both significant predictors of rural migrant children’s reading competence. The higher a child's expectations of a degree and the smaller the gap between parents' expectations of a child's education and the child's own education expectations, the better the child's performance in critical reading.Keywords: educational expectation, critical reading competence, rural migrant children, moderating effect
Procedia PDF Downloads 20115985 Critical Parameters of a Square-Well Fluid
Authors: Hamza Javar Magnier, Leslie V. Woodcock
Abstract:
We report extensive molecular dynamics (MD) computational investigations into the thermodynamic description of supercritical properties for a model fluid that is the simplest realistic representation of atoms or molecules. The pair potential is a hard-sphere repulsion of diameter σ with a very short attraction of length λσ. When λ = 1.005 the range is so short that the model atoms are referred to as “adhesive spheres”. Molecular dimers, trimers …etc. up to large clusters, or droplets, of many adhesive-sphere atoms are unambiguously defined. This then defines percolation transitions at the molecular level that bound the existence of gas and liquid phases at supercritical temperatures, and which define the existence of a supercritical mesophase. Both liquid and gas phases are seen to terminate at the loci of percolation transitions, and below a second characteristic temperature (Tc2) are separated by the supercritical mesophase. An analysis of the distribution of clusters in gas, meso- and liquid phases confirms the colloidal nature of this mesophase. The general phase behaviour is compared with both experimental properties of the water-steam supercritical region and also with formally exact cluster theory of Mayer and Mayer. Both are found to be consistent with the present findings that in this system the supercritical mesophase narrows in density with increasing T > Tc and terminates at a higher Tc2 at a confluence of the primary percolation loci. The expended plot of the MD data points in the mesophase of 7 critical and supercritical isotherms in highlight this narrowing in density of the linear-slope region of the mesophase as temperature is increased above the critical. This linearity in the mesophase implies the existence of a linear combination rule between gas and liquid which is an extension of the Lever rule in the subcritical region, and can be used to obtain critical parameters without resorting to experimental data in the two-phase region. Using this combination rule, the calculated critical parameters Tc = 0.2007 and Pc = 0.0278 are found be agree with the values found by of Largo and coworkers. The properties of this supercritical mesophase are shown to be consistent with an alternative description of the phenomenon of critical opalescence seen in the supercritical region of both molecular and colloidal-protein supercritical fluids.Keywords: critical opalescence, supercritical, square-well, percolation transition, critical parameters.
Procedia PDF Downloads 52115984 Electronic Government around the World: Key Information and Communication Technology Indicators
Authors: Isaac Kofi Mensah
Abstract:
Governments around the world are adopting Information and Communication Technologies (ICTs) because of the important opportunities it provides through E-government (EG) to modernize government public administration processes and delivery of quality and efficient public services. Almost every country in the world is adopting ICT in its public sector administration (EG) to modernize and change the traditional process of government, increase citizen engagement and participation in governance, as well as the provision of timely information to citizens. This paper, therefore, seeks to present the adoption, development and implementation of EG in regions globally, as well as the ICT indicators around the world, which are making EG initiatives successful. Europe leads the world in its EG adoption and development index, followed by the Americas, Asia, Oceania and Africa. There is a gradual growth in ICT indicators in terms of the increase in Internet access and usage, increase in broadband penetration, an increase of individuals using the Internet at home and a decline in fixed telephone use, while the mobile cellular phone has been on the increase year-on-year. Though the lack of ICT infrastructure is a major challenge to EG adoption and implementation around the world, in Africa it is very pervasive, hampering the expansion of Internet access and provision of broadband, and hence is a barrier to the successful adoption, development, and implementation of EG initiatives in countries on the continent. But with the general improvement and increase in ICT indicators around the world, it provides countries in Europe, Americas, Asia, Arab States, Oceania and Africa with the huge opportunity to enhance public service delivery through the adoption of EG. Countries within these regions cannot fail their citizens who desire to enjoy an enhanced and efficient public service delivery from government and its many state institutions.Keywords: e-government development index, e-government, indicators, information and communication technologies (ICTs)
Procedia PDF Downloads 30215983 Infrastructure Change Monitoring Using Multitemporal Multispectral Satellite Images
Authors: U. Datta
Abstract:
The main objective of this study is to find a suitable approach to monitor the land infrastructure growth over a period of time using multispectral satellite images. Bi-temporal change detection method is unable to indicate the continuous change occurring over a long period of time. To achieve this objective, the approach used here estimates a statistical model from series of multispectral image data over a long period of time, assuming there is no considerable change during that time period and then compare it with the multispectral image data obtained at a later time. The change is estimated pixel-wise. Statistical composite hypothesis technique is used for estimating pixel based change detection in a defined region. The generalized likelihood ratio test (GLRT) is used to detect the changed pixel from probabilistic estimated model of the corresponding pixel. The changed pixel is detected assuming that the images have been co-registered prior to estimation. To minimize error due to co-registration, 8-neighborhood pixels around the pixel under test are also considered. The multispectral images from Sentinel-2 and Landsat-8 from 2015 to 2018 are used for this purpose. There are different challenges in this method. First and foremost challenge is to get quite a large number of datasets for multivariate distribution modelling. A large number of images are always discarded due to cloud coverage. Due to imperfect modelling there will be high probability of false alarm. Overall conclusion that can be drawn from this work is that the probabilistic method described in this paper has given some promising results, which need to be pursued further.Keywords: co-registration, GLRT, infrastructure growth, multispectral, multitemporal, pixel-based change detection
Procedia PDF Downloads 13415982 Perception Study on the Environmental Ramifications of Inadequate Drainage Systems in Jere Local Government Area, Borno State, Nigeria
Authors: Mohammed Bukar Maina, Mohammed Alhaji Bukar
Abstract:
Flooding is a significant threat to human lives, particularly in low- and middle-income nations. This study focuses on the environmental implications of inadequate drainage systems in the Jere Local Government Area of Borno State, Nigeria. By examining community awareness, understanding, and perceived impacts of the absence of drainage systems, as well as exploring potential solutions, this research aims to address the existing knowledge gap. The study focuses on the Fori and 202/303 Quarters, chosen for their lack of drainage infrastructure and environmental challenges. Primary data was collected through questionnaires and observations supplemented by secondary sources. The findings highlight the need for increased awareness of drainage systems and the consequences of inadequate infrastructure. The community faces challenges like flooding, water-logging, contamination of drinking water, waterborne diseases, and property damage, necessitating the implementation of proper drainage systems. Recommendations include prioritizing new drainage systems, awareness campaigns, community participation, involvement of local government and leaders, and regular maintenance. Long-term planning is crucial for integrating drainage infrastructure into future development. Implementing these recommendations will establish sustainable and resilient drainage systems, mitigating environmental hazards. This research provides valuable insights for policymakers, stakeholders, and communities in addressing insufficient drainage systems and safeguarding the community's well-being.Keywords: environment, drainage systems, flooding, lack
Procedia PDF Downloads 2615981 Impacts on Regional Economy by the Upgrade of Railway Infrastructure
Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki
Abstract:
Transport is often the key driver for growth, especially for regions providing key opportunities for connectivity between busy areas and mature markets. Even though the benefits of transports are essential, limited research is published regarding the linkage of inland transport systems and other business sectors, the spillover effects on regional economy and the overall contribution to regional development. This paper deals with the determination of the key socioeconomic benefits on regions caused by the upgrade and the modernization of a railway corridor. The analysis framework is following a four-step analysis, providing key messages to planners, managers and decision makers. The provided case study is the upgrade of the railway corridor in North Greece, which is a very sensitive region suffering long time from economic stress. The application results are essential for comparisons with other destinations and provide key messages regarding the relationship of railway and economic development.Keywords: regional development, economic impact assessment variables, railway infrastructure, strategic planning
Procedia PDF Downloads 30915980 Using Hidden Markov Chain for Improving the Dependability of Safety-Critical Wireless Sensor Networks
Authors: Issam Alnader, Aboubaker Lasebae, Rand Raheem
Abstract:
Wireless sensor networks (WSNs) are distributed network systems used in a wide range of applications, including safety-critical systems. The latter provide critical services, often concerned with human life or assets. Therefore, ensuring the dependability requirements of Safety critical systems is of paramount importance. The purpose of this paper is to utilize the Hidden Markov Model (HMM) to elongate the service availability of WSNs by increasing the time it takes a node to become obsolete via optimal load balancing. We propose an HMM algorithm that, given a WSN, analyses and predicts undesirable situations, notably, nodes dying unexpectedly or prematurely. We apply this technique to improve on C. Lius’ algorithm, a scheduling-based algorithm which has served to improve the lifetime of WSNs. Our experiments show that our HMM technique improves the lifetime of the network, achieved by detecting nodes that die early and rebalancing their load. Our technique can also be used for diagnosis and provide maintenance warnings to WSN system administrators. Finally, our technique can be used to improve algorithms other than C. Liu’s.Keywords: wireless sensor networks, IoT, dependability of safety WSNs, energy conservation, sleep awake schedule
Procedia PDF Downloads 10015979 Microclimate Variations in Rio de Janeiro Related to Massive Public Transportation
Authors: Marco E. O. Jardim, Frederico A. M. Souza, Valeria M. Bastos, Myrian C. A. Costa, Nelson F. F. Ebecken
Abstract:
Urban public transportation in Rio de Janeiro is based on bus lines, powered by diesel, and four limited metro lines that support only some neighborhoods. This work presents an infrastructure built to better understand microclimate variations related to massive urban transportation in some specific areas of the city. The use of sensor nodes with small analytics capacity provides environmental information to population or public services. The analyses of data collected from a few small sensors positioned near some heavy traffic streets show the harmful impact due to poor bus route plan.Keywords: big data, IoT, public transportation, public health system
Procedia PDF Downloads 25315978 Raising High School English Teachers' Awareness of World Englishes
Authors: Julio Cesar Torres Rocha
Abstract:
The present study is a three-stage action research that aims at raising EFL teachers’ awareness of World Englishes (WE) within a critical perspective of inquiry. Through a taught module on English and its varieties, a survey, a reflection paper, and a semi-structured interview were used to collect the data. The results of the study showed that there was a clear change of conception, at the theoretical level, in teachers’ papers. However, WE was regarded as future possibility for action. On the one hand, all of the participants said the module changed their conception of other varieties of English different from British and American ones. They all went from identifying themselves with either American or British variety, a celebratory perspective, to acknowledging and accepting other English varieties, a critical perspective of English as an international language (EIL).Keywords: teachers’ s awareness, English as an international language, introducing world Englishes, critical applied linguistics
Procedia PDF Downloads 52215977 Physical Theory for One-Dimensional Correlated Electron Systems
Authors: Nelson Nenuwe
Abstract:
The behavior of interacting electrons in one dimension was studied by calculating correlation functions and critical exponents at zero and external magnetic fields for arbitrary band filling. The technique employed in this study is based on the conformal field theory (CFT). The charge and spin degrees of freedom are separated, and described by two independent conformal theories. A detailed comparison of the t-J model with the repulsive Hubbard model was then undertaken with emphasis on their Tomonaga-Luttinger (TL) liquid properties. Near half-filling the exponents of the t-J model take the values of the strong-correlation limit of the Hubbard model, and in the low-density limit the exponents are those of a non-interacting system. The critical exponents obtained in this study belong to the repulsive TL liquid (conducting phase) and attractive TL liquid (superconducting phase). The theoretical results from this study find applications in one-dimensional organic conductors (TTF-TCNQ), organic superconductors (Bechgaard salts) and carbon nanotubes (SWCNTs, DWCNTs and MWCNTs). For instance, the critical exponent at from this study is consistent with the experimental result from optical and photoemission evidence of TL liquid in one-dimensional metallic Bechgaard salt- (TMTSF)2PF6.Keywords: critical exponents, conformal field theory, Hubbard model, t-J model
Procedia PDF Downloads 34315976 Logistics Information and Customer Service
Authors: Š. Čemerková, M. Wilczková
Abstract:
The paper deals with the importance of information flow for providing of defined level of customer service in the firms. Setting of the criteria for the selection and implementation of logistics information system is a prerequisite for ensuring of the flow of information in firms. The decision on the selection and implementation of logistics information system is linked to the investment costs and operating costs, which are included in the total logistics costs. The article also deals with the conclusions of the research focused on the logistics information system selection in companies in the Czech Republic.Keywords: customer service, information system, logistics, research
Procedia PDF Downloads 36115975 Analysis of Delamination in Drilling of Composite Materials
Authors: Navid Zarif Karimi, Hossein Heidary, Giangiacomo Minak, Mehdi Ahmadi
Abstract:
In this paper analytical model based on the mechanics of oblique cutting, linear elastic fracture mechanics (LEFM) and bending plate theory has been presented to determine the critical feed rate causing delamination in drilling of composite materials. Most of the models in this area used LEFM and bending plate theory; hence, they can only determine the critical thrust force which is an incorporable parameter. In this model by adding cutting oblique mechanics to previous models, critical feed rate has been determined. Also instead of simplification in loading condition, actual thrust force induced by chisel edge and cutting lips on composite plate is modeled.Keywords: composite material, delamination, drilling, thrust force
Procedia PDF Downloads 51515974 Conceptual Model for Logistics Information System
Authors: Ana María Rojas Chaparro, Cristian Camilo Sarmiento Chaves
Abstract:
Given the growing importance of logistics as a discipline for efficient management of materials flow and information, the adoption of tools that permit to create facilities in making decisions based on a global perspective of the system studied has been essential. The article shows how from a concepts-based model is possible to organize and represent in appropriate way the reality, showing accurate and timely information, features that make this kind of models an ideal component to support an information system, recognizing that information as relevant to establish particularities that allow get a better performance about the evaluated sector.Keywords: system, information, conceptual model, logistics
Procedia PDF Downloads 49615973 The BNCT Project Using the Cf-252 Source: Monte Carlo Simulations
Authors: Marta Błażkiewicz-Mazurek, Adam Konefał
Abstract:
The project can be divided into three main parts: i. modeling the Cf-252 neutron source and conducting an experiment to verify the correctness of the obtained results, ii. design of the BNCT system infrastructure, iii. analysis of the results from the logical detector. Modeling of the Cf-252 source included designing the shape and size of the source as well as the energy and spatial distribution of emitted neutrons. Two options were considered: a point source and a cylindrical spatial source. The energy distribution corresponded to various spectra taken from specialized literature. Directionally isotropic neutron emission was simulated. The simulation results were compared with experimental values determined using the activation detector method using indium foils and cadmium shields. The relative fluence rate of thermal and resonance neutrons was compared in the chosen places in the vicinity of the source. The second part of the project related to the modeling of the BNCT infrastructure consisted of developing a simulation program taking into account all the essential components of this system. Materials with moderating, absorbing, and backscattering properties of neutrons were adopted into the project. Additionally, a gamma radiation filter was introduced into the beam output system. The analysis of the simulation results obtained using a logical detector located at the beam exit from the BNCT infrastructure included neutron energy and their spatial distribution. Optimization of the system involved changing the size and materials of the system to obtain a suitable collimated beam of thermal neutrons.Keywords: BNCT, Monte Carlo, neutrons, simulation, modeling
Procedia PDF Downloads 2915972 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base
Authors: Omid Khodabakhshi, Amir Rozdel
Abstract:
The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.Keywords: code, cloud computing, security, virtual machines
Procedia PDF Downloads 19115971 Geographic Information System Based Development Potentiality Assessment for Rural Villages: Case Study in Fuliang County, Jingdezhen
Authors: Sishen Wang
Abstract:
Chinese rural industry development is the major task currently during rapid urbanization. Development of potentiality assessment, evaluate the overall suitability of each village for further industrial development, could offer reference for policy makers, especially considering the limited data available in Chinese rural regions. The study focuses on 157 official villages in Fuliang County and evaluates their development potentiality by their topography, transportation condition, population, income of villagers, infrastructure and environmental conditions. Land cover changes for Fuliang county and surrounding areas of each village is also investigated for reference. The final development potentiality of each village was calculated by adding different weighted scores of different categories. Besides, inverse distance weighting (IDW) images for both final score of development potentiality and each factor were made and compared to help to understand the final result. The study found that village in the southern and northern regions have higher development potentiality than villages in the eastern and western regions, mainly because of higher income of villagers, good accessibilities and a large amount of population size. In addition, the Fuliang county was divided into five regions based on final result and policy reference for the development of each region were put forward individually. In addition, three suggestions were made for better local development potentiality: Firstly, the transportation accessibility needs to be improved in the northern regions by building more public transit system there. Secondly, the environmental conditions and infrastructure conditions in the eastern region of the county need some improvement. Thirdly, some encouragement and job opportunities should beset up in the western regions to attract labor force to move in and settle down.Keywords: development potentiality, Fuliang GIS-Based, GIS, official village
Procedia PDF Downloads 11015970 Community Based Local Economic Development Strategy Using Strategic Asumption Surfacing and Testing and Expoential Rank Method
Authors: Kholil Kholil, Soecahyadi Soecahyadi
Abstract:
Geographically, Padang Panjang Regency which located in the heart of Western Sumatra has great potentials for the tourism industry. However, these potentials have not been strategically developed for increasing local economic development and people's welfare. The purpose of this research is to design the strategy of sustainable tourism area development using Strategic Assumption Surfacing and Testing (SAST) and Exponential Rank Method (ERM). Result study showed, there are four aspects which importance and certainly for developing tourism area destination in Padang Panjang Regency; (1) tourist information center and promotion, (2) regional cooperation development; (3) minangese center as a center of excellence; and (4) building the center of the public market. To build an attractive tourist area required action plan includes the construction of an information center, center of excellence of minangese, and tourist infrastructure; and public participation is a key success factor for ensuring sustainability of tourism development in Padang Panjang Regency.Keywords: local economic development, tourism attraction, SAST, ERM
Procedia PDF Downloads 34015969 Intelligent Irrigation Control System Using Wireless Sensors and Android Application
Authors: Rajeshwari Madli, Santhosh Hebbar, Vishwanath Heddoori, G. V. Prasad
Abstract:
Agriculture is the major occupation in India and forms the backbone of Indian economy in which irrigation plays a crucial role for increasing the quality and quantity of crop yield. In spite of many revolutionary advancements in agriculture, there has not been a dramatic increase in agricultural performance. Lack of irrigation infrastructure and agricultural knowledge are the critical factors influencing agricultural performance. However, by using advanced agricultural equipment, the effect of these factors can be curtailed. The presented system aims at increasing the yield of crops by using an intelligent irrigation controller that makes use of wireless sensors. Sensors are used to monitor primary parameters such as soil moisture, soil pH, temperature and humidity. Irrigation decisions are taken based on the sensed data and the type of crop being grown. The system provides a mobile application in which farmers can remotely monitor and control the irrigation system. Also, the water pump is protected against damages due to voltage variations and dry running.Keywords: android application, Bluetooth, wireless sensors, irrigation, temperature, soil pH
Procedia PDF Downloads 38215968 Avoiding Packet Drop for Improved through Put in the Multi-Hop Wireless N/W
Authors: Manish Kumar Rajak, Sanjay Gupta
Abstract:
Mobile ad hoc networks (MANETs) are infrastructure less and intercommunicate using single-hop and multi-hop paths. Network based congestion avoidance which involves managing the queues in the network devices is an integral part of any network. QoS: A set of service requirements that are met by the network while transferring a packet stream from a source to a destination. Especially in MANETs, packet loss results in increased overheads. This paper presents a new algorithm to avoid congestion using one or more queue on nodes and corresponding flow rate decided in advance for each node. When any node attains an initial value of queue then it sends this status to its downstream nodes which in turn uses the pre-decided flow rate of packet transfer to its upstream nodes. The flow rate on each node is adjusted according to the status received from its upstream nodes. This proposed algorithm uses the existing infrastructure to inform to other nodes about its current queue status.Keywords: mesh networks, MANET, packet count, threshold, throughput
Procedia PDF Downloads 47415967 Impact Assessment of Information Communication, Network Providers, Teledensity, and Consumer Complaints on Gross Domestic Products
Authors: Essang Anwana Onuntuei, Chinyere Blessing Azunwoke
Abstract:
The study used secondary data from foreign and local organizations to explore major challenges and opportunities abound in Information Communication. The study aimed at exploring the tie between tele density (network coverage area) and the number of network subscriptions, probing if the degree of consumer complaints varies significantly among network providers, and assessing if network subscriptions do significantly influence the sector’s GDP contribution. Methods used for data analysis include Pearson product-moment correlation and regression analysis, and the Analysis of Variance (ANOVA) as well. At a two-tailed test of 0.05 confidence level, the results of findings established about 85.6% of network subscriptions were explained by tele density (network coverage area), and the number of network subscriptions; Consumer Complaints’ degree varied significantly among network providers as 80.158291 (F calculated) > 3.490295 (F critical) with very high confidence associated p-value = 0.000000 which is < 0.05; and finally, 65% of the nation’s GDP was explained by network subscription to show a high association.Keywords: tele density, subscription, network coverage, information communication, consumer
Procedia PDF Downloads 4315966 Towards Empowerment and Autonomy of Differently Abled People: Need for Professional Community of Exercise Physiologists in India
Authors: Yesoda Bhargava
Abstract:
This work is an ongoing research on understanding the existence or the non-existence of infrastructure for fitness for physically challenged people in India. Through the extensive field visits, interviews with differently abled people and observation of the schools for differently abled children, there have been some common observations in the realm of paucity of appropriate machinery, exercise physiologists and infrastructure catering to the fitness needs of physically challenged people in India both for adults and children. Amidst the more tangibly seen health issues, this crucial change which can better the life of physically challenged people is not given the due consideration at the national scale. The results of this study can be used to influence the policy making and program making related to inclusive health in India. Health and fitness are inextricably linked to each other, and one cannot be served at the cost of other. One of the other objectives of this paper is to create a traction for the importance of exercise promotion for the physically challenged people.Keywords: fitness, health, inclusive health, exercise physiologists
Procedia PDF Downloads 34315965 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)
Authors: Essam Mansour
Abstract:
The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait
Procedia PDF Downloads 30715964 Application of the Critical Decision Method for Monitoring and Improving Safety in the Construction Industry
Authors: Juan Carlos Rubio Romero, Francico Salguero Caparros, Virginia Herrera-Pérez
Abstract:
No one is in the slightest doubt about the high levels of risk involved in work in the construction industry. They are even higher in structural construction work. The Critical Decision Method (CDM) is a semi-structured interview technique that uses cognitive tests to identify the different disturbances that workers have to deal with in their work activity. At present, the vision of safety focused on daily performance and things that go well for safety and health management is facing the new paradigm known as Resilience Engineering. The aim of this study has been to describe the variability in formwork labour on concrete structures in the construction industry and, from there, to find out the resilient attitude of workers to unexpected events that they have experienced during their working lives. For this purpose, a series of semi-structured interviews were carried out with construction employees with extensive experience in formwork labour in Spain by applying the Critical Decision Method. This work has been the first application of the Critical Decision Method in the field of construction and, more specifically, in the execution of structures. The results obtained show that situations categorised as unthought-of are identified to a greater extent than potentially unexpected situations. The identification during these interviews of both expected and unexpected events provides insight into the critical decisions made and actions taken to improve resilience in daily practice in this construction work. From this study, it is clear that it is essential to gain more knowledge about the nature of the human cognitive process in work situations within complex socio-technical systems such as construction sites. This could lead to a more effective design of workplaces in the search for improved human performance.Keywords: resilience engineering, construction industry, unthought-of situations, critical decision method
Procedia PDF Downloads 14815963 Conceptual and Funnel Methods Contribution to Critical Literature Review: PhD construction Management
Authors: Samuel Quashie
Abstract:
This study is aimed at demonstrating the applicability and contribution of ‘Conceptual and Funnelling Methods’ during the literature review stages, for PhD in Construction Management, which focused on the ‘Development of an Integrated Management for Post-Disaster Reconstruction’, the viability of this approach using conceptual and funnel methods are demonstrated. The ‘conceptual review method’ builds upon the strengths of relevant material, detailing major points and areas covered and evaluates lesser relevant literature. Publications are reviewed in an integrated style, challenging the scientific theory and seeking to develop new insights. The funnel method grouped reviews by commonality, regardless of the topic or thesis statement. It shows that the literature review is acquired using different kinds of information to increase the variety and diversity of the investigation. Results demonstrated conceptual and funnel methods ability to reviewed and appraised the relevant literature. It puts them into an integrated style, allows an evaluation of credentials, originality, theory base, context and significance of the quality work to emerge. Objectives of the review are met and gaps in knowledge are identified and direct further studies to answer the research questions.Keywords: Ph.D, construction management, critical literature review, conceptual and funnel methods
Procedia PDF Downloads 41515962 The Culex Pipiens Niche: Assessment with Climatic and Physiographic Variables via a Geographic Information System
Authors: Maria C. Proença, Maria T. Rebelo, Marília Antunes, Maria J. Alves, Hugo Osório, Sofia Cunha, João Casaca
Abstract:
Using a geographic information system (GIS), the relations between a georeferenced data set of Culex pipiens sl. mosquitoes collected in Portugal mainland during seven years (2006-2012) and meteorological and physiographic parameters such as: air relative humidity, air temperature (minima, maxima and mean daily temperatures), daily total rainfall, altitude, land use/land cover and proximity to water bodies are evaluated. Focus is on the mosquito females; the characterization of its habitat is the key for the planning of chirurgical non-aggressive prophylactic countermeasures to avoid ambient degradation. The GIS allow for the spatial determination of the zones were the mosquito mean captures has been above average; using the meteorological values at these coordinates, the limits of each parameter are identified/computed. The meteorological parameters measured at the net of weather stations all over the country are averaged by month and interpolated to produce raster maps that can be segmented according to the thresholds obtained for each parameter. The intersection of the maps obtained for each month show the evolution of the area favorable to the species through the mosquito season, which is from May to October at these latitudes. In parallel, mean and above average captures were related to the physiographic parameters. Three levels of risk could be identified for each parameter, using above average captures as an index. The results were applied to the suitability meteorological maps of each month. The Culex pipiens critical niche is delimited, reflecting the critical areas and the level of risk for transmission of the pathogens to which they are competent vectors (West Nile virus, iridoviruses, rheoviruses and parvoviruses).Keywords: Culex pipiens, ecological niche, risk assessment, risk management
Procedia PDF Downloads 54315961 A Study on How to Develop the Usage Metering Functions of BIM (Building Information Modeling) Software under Cloud Computing Environment
Authors: Kim Byung-Kon, Kim Young-Jin
Abstract:
As project opportunities for the Architecture, Engineering and Construction (AEC) industry have grown more complex and larger, the utilization of BIM (Building Information Modeling) technologies for 3D design and simulation practices has been increasing significantly; the typical applications of the BIM technologies include clash detection and design alternative based on 3D planning, which have been expanded over to the technology of construction management in the AEC industry for virtual design and construction. As for now, commercial BIM software has been operated under a single-user environment, which is why initial costs for its introduction are very high. Cloud computing, one of the most promising next-generation Internet technologies, enables simple Internet devices to use services and resources provided with BIM software. Recently in Korea, studies to link between BIM and cloud computing technologies have been directed toward saving costs to build BIM-related infrastructure, and providing various BIM services for small- and medium-sized enterprises (SMEs). This study addressed how to develop the usage metering functions of BIM software under cloud computing architecture in order to archive and use BIM data and create an optimal revenue structure so that the BIM services may grow spontaneously, considering a demand for cloud resources. To this end, the author surveyed relevant cases, and then analyzed needs and requirements from AEC industry. Based on the results & findings of the foregoing survey & analysis, the author proposed herein how to optimally develop the usage metering functions of cloud BIM software.Keywords: construction IT, BIM (Building Information Modeling), cloud computing, BIM-based cloud computing, 3D design, cloud BIM
Procedia PDF Downloads 50615960 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014
Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini
Abstract:
Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-value