Search results for: software defined networking (SDN)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7637

Search results for: software defined networking (SDN)

6977 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 103
6976 Winning Consumers and Influencing Them Using Social Media: A Cross Generational Impact Case Study

Authors: J. Garfield, B. O'Hare, V. Bell

Abstract:

The use of social media is continuing to grow and is now widely used for product and service advertising. This research investigated the social media usage across all age ranges in the United Kingdom to determine the impact on purchasing habits. A questionnaire was distributed to people of different ages and with different experiences of social media usage. The results showed that Facebook continues to be the most popular social media network. Respondents in the younger age group were more likely to be influenced by brand marketing and advertising, but the study concluded that celebrity endorsements had little or no influence.

Keywords: social media advertising, social networking sites, electronic word of mouth, celebrity endorsements

Procedia PDF Downloads 116
6975 A Robust Optimization Method for Service Quality Improvement in Health Care Systems under Budget Uncertainty

Authors: H. Ashrafi, S. Ebrahimi, H. Kamalzadeh

Abstract:

With the development of business competition, it is important for healthcare providers to improve their service qualities. In order to improve service quality of a clinic, four important dimensions are defined: tangibles, responsiveness, empathy, and reliability. Moreover, there are several service stages in hospitals such as financial screening and examination. One of the most challenging limitations for improving service quality is budget which impressively affects the service quality. In this paper, we present an approach to address budget uncertainty and provide guidelines for service resource allocation. In this paper, a service quality improvement approach is proposed which can be adopted to multistage service processes to improve service quality, while controlling the costs. A multi-objective function based on the importance of each area and dimension is defined to link operational variables to service quality dimensions. The results demonstrate that our approach is not ultra-conservative and it shows the actual condition very well. Moreover, it is shown that different strategies can affect the number of employees in different stages.

Keywords: allocation, budget uncertainty, healthcare resource, service quality assessment, robust optimization

Procedia PDF Downloads 165
6974 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 313
6973 The Trigger-DAQ System in the Mu2e Experiment

Authors: Antonio Gioiosa, Simone Doanti, Eric Flumerfelt, Luca Morescalchi, Elena Pedreschi, Gianantonio Pezzullo, Ryan A. Rivera, Franco Spinella

Abstract:

The Mu2e experiment at Fermilab aims to measure the charged-lepton flavour violating neutrino-less conversion of a negative muon into an electron in the field of an aluminum nucleus. With the expected experimental sensitivity, Mu2e will improve the previous limit of four orders of magnitude. The Mu2e data acquisition (DAQ) system provides hardware and software to collect digitized data from the tracker, calorimeter, cosmic ray veto, and beam monitoring systems. Mu2e’s trigger and data acquisition system (TDAQ) uses otsdaq as its solution. developed at Fermilab, otsdaq uses the artdaq DAQ framework and art analysis framework, under-the-hood, for event transfer, filtering, and processing. Otsdaq is an online DAQ software suite with a focus on flexibility and scalability while providing a multi-user, web-based interface accessible through the Chrome or Firefox web browser. The detector read out controller (ROC) from the tracker and calorimeter stream out zero-suppressed data continuously to the data transfer controller (DTC). Data is then read over the PCIe bus to a software filter algorithm that selects events which are finally combined with the data flux that comes from a cosmic ray veto system (CRV).

Keywords: trigger, daq, mu2e, Fermilab

Procedia PDF Downloads 135
6972 A Predictive Analytics Approach to Project Management: Reducing Project Failures in Web and Software Development Projects

Authors: Tazeen Fatima

Abstract:

Use of project management in web & software development projects is very significant. It has been observed that even with the application of effective project management, projects usually do not complete their lifecycle and fail. To minimize these failures, key performance indicators have been introduced in previous studies to counter project failures. However, there are always gaps and problems in the KPIs identified. Despite of incessant efforts at technical and managerial levels, projects still fail. There is no substantial approach to identify and avoid these failures in the very beginning of the project lifecycle. In this study, we aim to answer these research problems by analyzing the concept of predictive analytics which is a specialized technology and is very easy to use in this era of computation. Project organizations can use data gathering, compute power, and modern tools to render efficient Predictions. The research aims to identify such a predictive analytics approach. The core objective of the study was to reduce failures and introduce effective implementation of project management principles. Existing predictive analytics methodologies, tools and solution providers were also analyzed. Relevant data was gathered from projects and was analyzed via predictive techniques to make predictions well advance in time to render effective project management in web & software development industry.

Keywords: project management, predictive analytics, predictive analytics methodology, project failures

Procedia PDF Downloads 321
6971 Efficacy of Umbilical Cord Lining Stem Cells For Wound Healing in Diabetic Murine Model

Authors: Fui Ping Lim, Wen Choong Chua, Toan Thang Phan

Abstract:

Aim: This study investigates the roles of Cord Lining Stem Cells (CLSCs) as potential therapeutic agents for diabetic wounds. Method: 20 genetically diabetic db/db mice were randomly assigned to two arms; (i) control group received placebo treatment (sham media or cells delivery material), and (ii) active comparator received CLSCs. Two full-thickness wounds, each sized 10mm X 10mm were created, one on each side of the midline on the back of the mice. Digital pictures were taken on day 1, 3, 7, 10, 14, 17, 21, 24, 28. Wound areas were analyzed with ImageJ TM software and calculated as percentage of the original wound. Time to closure was defined as the day the wound bed was completely epithelized and filled with new tissues. Results: The CLSCs-treated wounds, showed a significant increase in the percentage of wound closure and achieved 100% closure of the wound sooner than the control group by an average of 3.7 days. The mice treated with CLSCs have a shorter wound closure time (mean closure day: 19.8 days) as compared to the control group (mean closure day: 23.5 days). Conclusion: Our preliminary findings inferred that CLSCs treated wound achieved higher percentage of wound closure within a shorter duration of time.

Keywords: cord lining stem cell, diabetic wound, stem cell, wound

Procedia PDF Downloads 264
6970 Monitoring of Sustainability of Decorated Confectionary Product 'Moskva Cake' in Order to Define the Expiration Date

Authors: Radovan Cobanovic, Milica Rankov-Sicar

Abstract:

The fresh cake is in the group of perishable food which cannot be kept a long period of time. The study of sustainability has been done in order to extend the shelf-life of the product which was 10 days. According to the plan of sustainability, it was defined that 5 samples had to be stored for 20 days at max +8°C and analyzed every 5th day from the day of reception until the 20th day. The shelf life of cake has expired during the study of sustainability in the period between 10th and 20th day of analyses. Cake samples were subjected to sensory analysis (appearance, odor, taste, color, aroma) and bacteriological analysis (Listeria monocytogenes, Salmonella spp. and Enterobacteriaceae) according to Serbian state regulation. All analysis were tested according to ISO methodology: sensory analysis ISO 6658, Listeria monocytogenes ISO 11290-1, Salmonella spp ISO 6579, and Enterobacteriaceae ISO 21258-2. Analyses showed that after ten days of storage at a temperature defined by the manufacturers and within the product's shelf life, the cake did not have any noticeable changes in sensory characteristics. Smell and taste are unaffected there was no presence of strange smell or taste. As far as microbiological analyses are concerned, neither one pathogen was detected and number of Enterobacteriaceae was at level less than 102 cfu/g. After expiry of shelf life in a period of 15th and 20th day of storage, the sensory analysis showed the presence of strange sour-milky smell and rancid taste. Concerning microbiological analyses, there still were not positive results for pathogen microorganisms but the number of Enterobacteriaceae was at level more than 103cfu/g. Reviewing the results of sensory analysis indicates that it is not recommended to extend the shelf-life of the product comparing to the already defined shelf-life because occurred changes may adversely affect the consumer desire for the choice of this product.

Keywords: confectionary product, extension of shelf life, sensory and microbiological analyses, sustainability

Procedia PDF Downloads 227
6969 A Drawing Software for Designers: AutoCAD

Authors: Mayar Almasri, Rosa Helmi, Rayana Enany

Abstract:

This report describes the features of AutoCAD software released by Adobe. It explains how the program makes it easier for engineers and designers and reduces their time and effort spent using AutoCAD. Moreover, it highlights how AutoCAD works, how some of the commands used in it, such as Shortcut, make it easy to use, and features that make it accurate in measurements. The results of the report show that most users of this program are designers and engineers, but few people know about it and find it easy to use. They prefer to use it because it is easy to use, and the shortcut commands shorten a lot of time for them. The feature got a high rate and some suggestions for improving AutoCAD in Aperture, but it was a small percentage, and the highest percentage was that they didn't need to improve the program, and it was good.

Keywords: artificial intelligence, design, planning, commands, autodesk, dimensions

Procedia PDF Downloads 113
6968 Interaction of Low-Impact Development Techniques and Urban River Flooding on the Zoning – Case Study Qomroud

Authors: Mohammad Reza Kavianpour, Arsalan Behzadifard Pour, Ali Aghazadeh Cloudy, Abolfazl Moqimi

Abstract:

In recent decades, and with increasing of urban population and development of the city, the amount of impermeable surfaces has been increased. This cause urban runoff enhancement. This enhancement, especially in cities with urban river, increases the possibility of urban flooding caused by the river flooding interaction and urban runoff. In this research, we tried SWMM utilizes software development methods and practices that seek to reduce the impact of runoff to the river flows to reduce Qomroud and Effects using Arc GIS and HEC-RAS software on how we see the flood zone.

Keywords: flood management, SWMM, runoff, flood zone

Procedia PDF Downloads 589
6967 Embedded Hardware and Software Design of Omnidirectional Autonomous Robotic Platform Suitable for Advanced Driver Assistance Systems Testing with Focus on Modularity and Safety

Authors: Ondrej Lufinka, Jan Kaderabek, Juraj Prstek, Jiri Skala, Kamil Kosturik

Abstract:

This paper deals with the problem of using Autonomous Robotic Platforms (ARP) for the ADAS (Advanced Driver Assistance Systems) testing in automotive. There are different possibilities of the testing already in development, and lately, the autonomous robotic platforms are beginning to be used more and more widely. Autonomous Robotic Platform discussed in this paper explores the hardware and software design possibilities related to the field of embedded systems. The paper focuses on its chapters on the introduction of the problem in general; then, it describes the proposed prototype concept and its principles from the embedded HW and SW point of view. It talks about the key features that can be used for the innovation of these platforms (e.g., modularity, omnidirectional movement, common and non-traditional sensors used for localization, synchronization of more platforms and cars together, or safety mechanisms). In the end, the future possible development of the project is discussed as well.

Keywords: advanced driver assistance systems, ADAS, autonomous robotic platform, embedded systems, hardware, localization, modularity, multiple robots synchronization, omnidirectional movement, safety mechanisms, software

Procedia PDF Downloads 122
6966 Goal-Setting in a Peer Leader HIV Prevention Intervention to Improve Preexposure Prophylaxis Access among Black Men Who Have Sex with Men

Authors: Tim J. Walsh, Lindsay E. Young, John A. Schneider

Abstract:

Background: The disproportionate rate of HIV infection among Black men who have sex with men (BMSM) in the United States suggest the importance of Preexposure Prophylaxis (PrEP) interventions for this population. As such, there is an urgent need for innovative outreach strategies that extend beyond the traditional patient-provider relationship to reach at-risk populations. Training members of the BMSM community as peer change agents (PCAs) is one such strategy. An important piece of this training is goal-setting. Goal-setting not only encourages PCAs to define the parameters of the intervention according to their lived experience, it also helps them plan courses of action. Therefore, the aims of this mixed methods study are: (1) Characterize the goals that BMSM set at the end of their PrEP training and (2) Assess the relationship between goal types and PCA engagement. Methods: Between March 2016 and July 2016, preliminary data were collected from 68 BMSM, ages 18-33, in Chicago as part of an ongoing PrEP intervention. Once enrolled, PCAs participate in a half-day training in which they learn about PrEP, practice initiating conversations about PrEP, and identify strategies for supporting at-risk peers through the PrEP adoption process. Training culminates with a goal-setting exercise, whereby participants establish a goal related to their role as a PCA. Goals were coded for features that either emerged from the data itself or existed in extant goal-setting literature. The main outcomes were (1) number of PrEP conversations PCAs self-report during booster conversations two weeks following the intervention and (2) number of peers PCAs recruit into the study that completed the PrEP workshop. Results: PCA goals (N=68) were characterized in terms of four features: Specificity, target population, personalization, and purpose defined. To date, PCAs report a collective 52 PrEP conversations. 56, 25, and 6% of PrEP conversations occurred with friends, family, and sexual partners, respectively. PCAs with specific goals had more PrEP conversations with at-risk peers compared to those with vague goals (58% vs. 42%); PCAs with personalized goals had more PrEP conversations compared to those with de-personalized goals (60% vs. 53%); and PCAs with goals that defined a purpose had more PrEP conversations compared to those who did not define a purpose (75% vs. 52%). 100% of PCAs with goals that defined a purpose recruited peers into the study compared to 45 percent of PCAs with goals that did not define a purpose. Conclusion: Our preliminary analysis demonstrates that BMSM are motivated to set and work toward a diverse set of goals to support peers in PrEP adoption. PCAs with goals involving a clearly defined purpose had more PrEP conversations and greater peer recruitment than those with goals lacking a defined purpose. This may indicate that PCAs who define their purpose at the outset of their participation will be more engaged in the study than those who do not. Goal-setting may be considered as a component of future HIV prevention interventions to advance intervention goals and as an indicator of PCAs understanding of the intervention.

Keywords: HIV prevention, MSM, peer change agent, preexposure prophylaxis

Procedia PDF Downloads 181
6965 Sentiment Analysis: An Enhancement of Ontological-Based Features Extraction Techniques and Word Equations

Authors: Mohd Ridzwan Yaakub, Muhammad Iqbal Abu Latiffi

Abstract:

Online business has become popular recently due to the massive amount of information and medium available on the Internet. This has resulted in the huge number of reviews where the consumers share their opinion, criticisms, and satisfaction on the products they have purchased on the websites or the social media such as Facebook and Twitter. However, to analyze customer’s behavior has become very important for organizations to find new market trends and insights. The reviews from the websites or the social media are in structured and unstructured data that need a sentiment analysis approach in analyzing customer’s review. In this article, techniques used in will be defined. Definition of the ontology and description of its possible usage in sentiment analysis will be defined. It will lead to empirical research that related to mobile phones used in research and the ontology used in the experiment. The researcher also will explore the role of preprocessing data and feature selection methodology. As the result, ontology-based approach in sentiment analysis can help in achieving high accuracy for the classification task.

Keywords: feature selection, ontology, opinion, preprocessing data, sentiment analysis

Procedia PDF Downloads 183
6964 Fundamental Research Dissension between Hot and Cold Chamber High Pressure Die Casting

Authors: Sahil Kumar, Surinder Pal, Rahul Kapoor

Abstract:

This paper is focused on to define the basic difference between hot and cold chamber high pressure die casting process which is not fully defined in a research before paper which we have studied. The pressure die casting is basically defined into two types (1) Hot chamber Die Casting (2) Cold chamber Die Casting. Cold chamber die casting is used for casting alloys that require high pressure and have a high melting temperature, such as brass, aluminum, magnesium, copper based alloys and other high melting point nonferrous alloys. Hot chamber die casting is suitable for casting zinc, tin, lead, and low melting point alloys. In hot chamber die casting machine, the molten metal is an integral pan of the machine. It mainly consists of hot chamber and gooseneck type metal container made of cast iron. This machine is mainly used for low melting alloys and alloys of metals like zinc, lead etc. Metals and alloys having a high melting point and those which are having an affinity for iron cannot be cast by this machine, which could otherwise attack the shot sleeve and damage the machine.

Keywords: hot chamber die casting, cold chamber die casting, metals and alloys, casting technology

Procedia PDF Downloads 599
6963 The Impact of Facebook Brand Pages Engagement on Consumers Purchase Behaviour

Authors: Sudarsan Jayasingh, R. Venkatesh

Abstract:

Increasing number of customers gets connected to social networking sites, such as Facebook and Twitter to details about the brand communications. This survey, based on a convenience sample, aimed to find the reason for the participants to like Facebook fan pages, how often they visit and interact with the pages that they like, and how is it related with their purchase behaviour. 104 respondents completed the online survey. Overall, the study aimed at determining whether or not creating and maintaining a Facebook fan page is a beneficial tool for brands to communicate with their consumer base.

Keywords: facebook brand pages, social media, consumer engagement, digital engagement, purchase behaviour

Procedia PDF Downloads 297
6962 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 420
6961 Impact of Protean Career Attitude on Career Success with the Mediating Effect of Career Insight

Authors: Prabhashini Wijewantha

Abstract:

This study looks at the impact of protean career attitude of employees on their career success and next it looks at the mediation effect of career insights on the above relationship. Career success is defined as the accomplishment of desirable work related outcomes at any point in person’s work experiences over time and it comprises of two sub variables, namely, career satisfaction and perceived employability. Protean career attitude was measured using the eight items from the Self Directedness subscale of the Protean Career Attitude scale developed by Briscoe and Hall, where as career satisfaction was measured by the three item scale developed by Martine, Eddleston, and Veiga. Perceived employability was also evaluated using three items and career insight was measured using fourteen items that were adapted and used by De Vos and Soens. Data were collected from a sample of 300 mid career executives in Sri Lanka deploying the survey strategy and data were analyzed using the SPSS and AMOS software version 20.0. A preliminary analysis of data was initially performed where data were screened and reliability and validity were ensured. Next a simple regression analysis was performed to test the direct impact of protean career attitude on career success and the hypothesis was supported. The Baron and Kenney’s four steps, three regressions approach for mediator testing was used to calculate the mediation effect of career insight on the above relationship and a partial mediation was supported by the data. Finally theoretical and practical implications are discussed.

Keywords: career success, career insight, mid career MBAs, protean career attitude

Procedia PDF Downloads 344
6960 Estimation of Adult Patient Doses for Chest X-Ray Diagnostic Examinations in a Tertiary Institution Health Centre

Authors: G. E. Okungbowa, H. O. Adams, S. E. Eze

Abstract:

This study is on the estimation of adult patient doses for Chest X-ray diagnostic examinations of new admitted undergraduate students attending a tertiary institution health centre as part of their routine clearance and check up on admitted into the institution. A total of 531 newly admitted undergraduate students were recruited for this survey in the first quarter of 2016 (January to March, 2016). CALDOSE_X 5.0 software was used to compute the Entrance Surface Dose (ESD) and Effective Dose (ED); while the Statistical Package for Social Sciences (SPSS) version 21.0 was used to carry out the statistical analyses. The basic patients' data and exposure parameters required for the software are age, sex, examination type, projection posture, tube potential and current-time product. The mean Entrance Surface Dose and Effective Doses of the undergraduate students were calculated using the software, and the values were compared with existing literature and internationally established diagnostic reference levels. The mean ESD calculated is 0.29 mGy, and the mean effective dose is 0.04 mSv. The values of ESD and ED obtained are below the internationally established diagnostic reference levels, which could be attributed to good radiographic techniques employed during the chest X-ray procedure for these students.

Keywords: x-ray, dose, examination, chest

Procedia PDF Downloads 164
6959 Land Suitability Approach as an Effort to Design a Sustainable Tourism Area in Pacet Mojokerto

Authors: Erina Wulansari, Bambang Soemardiono, Ispurwono Soemarno

Abstract:

Designing sustainable tourism area is defined as an attempt to design an area, that brings the natural environmental conditions as components are available with a wealth of social conditions and the conservation of natural and cultural heritage. To understanding tourism area in this study is not only focus on the location of the tourist object, but rather to a tourist attraction around the area, tourism objects such as the existence of residential area (settlement), a commercial area, public service area, and the natural environmental area. The principle of success in designing a sustainable tourism area is able to integrate and balance between the limited space and the variety of activities that’s always continuously to growth up. The limited space in this area of tourism needs to be managed properly to minimize the damage of environmental as a result of tourism activities hue. This research aims to identify space in this area of tourism through land suitability approach as an effort to create a sustainable design, especially in terms of ecological. This study will be used several analytical techniques to achieve the research objectives as superimposing analysis with GIS 9.3 software and Analysis Hierarchy Process. Expected outcomes are in the form of classification and criteria of usable space in designing embodiment tourism area. In addition, this study can provide input to the order of settlement patterns as part of the environment in the area of sustainable tourism.

Keywords: sustainable tourism area, land suitability, limited space, environment, criteria

Procedia PDF Downloads 477
6958 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 484
6957 Critical Success Factors of Information Technology Projects

Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim

Abstract:

Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.

Keywords: critical success factors, CSF, IT projects, IS projects, software development projects

Procedia PDF Downloads 372
6956 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 275
6955 Determining Moment-Curvature Relationship of Reinforced Concrete Rectangular Shear Walls

Authors: Gokhan Dok, Hakan Ozturk, Aydin Demir

Abstract:

The behavior of reinforced concrete (RC) members is quite important in RC structures. When evaluating the performance of structures, the nonlinear properties are defined according to the cross sectional behavior of RC members. To be able to determine the behavior of RC members, its cross sectional behavior should be known well. The moment-curvature (MC) relationship is used to represent cross sectional behavior. The MC relationship of RC cross section can be best determined both experimentally and numerically. But, experimental study on RC members is very difficult. The aim of the study is to obtain the MC relationship of RC shear walls. Additionally, it is aimed to determine the parameters which affect MC relationship. While obtaining MC relationship of RC members, XTRACT which can represent robustly the MC relationship is used. Concrete quality, longitudinal and transverse reinforcing ratios, are selected as parameters which affect MC relationship. As a result of the study, curvature ductility and effective flexural stiffness are determined using this parameter. Effective flexural stiffness is compared with the values defined in design codes.

Keywords: moment-curvature, reinforced concrete, shear wall, numerical

Procedia PDF Downloads 265
6954 A New Intelligent, Dynamic and Real Time Management System of Sewerage

Authors: R. Tlili Yaakoubi, H.Nakouri, O. Blanpain, S. Lallahem

Abstract:

The current tools for real time management of sewer systems are based on two software tools: the software of weather forecast and the software of hydraulic simulation. The use of the first ones is an important cause of imprecision and uncertainty, the use of the second requires temporal important steps of decision because of their need in times of calculation. This way of proceeding fact that the obtained results are generally different from those waited. The major idea of this project is to change the basic paradigm by approaching the problem by the "automatic" face rather than by that "hydrology". The objective is to make possible the realization of a large number of simulations at very short times (a few seconds) allowing to take place weather forecasts by using directly the real time meditative pluviometric data. The aim is to reach a system where the decision-making is realized from reliable data and where the correction of the error is permanent. A first model of control laws was realized and tested with different return-period rainfalls. The gains obtained in rejecting volume vary from 19 to 100 %. The development of a new algorithm was then used to optimize calculation time and thus to overcome the subsequent combinatorial problem in our first approach. Finally, this new algorithm was tested with 16- year-rainfall series. The obtained gains are 40 % of total volume rejected to the natural environment and of 65 % in the number of discharges.

Keywords: automation, optimization, paradigm, RTC

Procedia PDF Downloads 283
6953 Feasibility of Simulating External Vehicle Aerodynamics Using Spalart-Allmaras Turbulence Model with Adjoint Method in OpenFOAM and Fluent

Authors: Arpit Panwar, Arvind Deshpande

Abstract:

The study of external vehicle aerodynamics using Spalart-Allmaras turbulence model with adjoint method was conducted. The accessibility and ease of working with the Fluent module of ANSYS and OpenFOAM were considered. The objective of the study was to understand and analyze the possibility of bringing high-level aerodynamic simulation to the average consumer vehicle. A form-factor of BMW M6 vehicle was designed in Solidworks, which was analyzed in OpenFOAM and Fluent. The turbulence model being a single equation provides much faster convergence rate when clubbed with the adjoint method. Fluent being commercial software still does not allow us to solve Spalart-Allmaras turbulence model using the adjoint method. Hence, the turbulence model was solved using the SIMPLE method in Fluent. OpenFOAM being an open source provide flexibility in simulation but is not user-friendly. It supports solving the defined turbulence model with the adjoint method. The result generated from the simulation gives us acceptable values of drag, when validated with the result of percentage error in drag values for a notch-back vehicle model on an extensive simulation produced at 6th ANSA and μETA conference, Greece. The success of this approach will allow us to bring more aerodynamic vehicle body design to all segments of the automobile and not limiting it to just the high-end sports cars.

Keywords: Spalart-Allmaras turbulence model, OpenFOAM, adjoint method, SIMPLE method, vehicle aerodynamic design

Procedia PDF Downloads 190
6952 Feasibility of an Extreme Wind Risk Assessment Software for Industrial Applications

Authors: Francesco Pandolfi, Georgios Baltzopoulos, Iunio Iervolino

Abstract:

The impact of extreme winds on industrial assets and the built environment is gaining increasing attention from stakeholders, including the corporate insurance industry. This has led to a progressively more in-depth study of building vulnerability and fragility to wind. Wind vulnerability models are used in probabilistic risk assessment to relate a loss metric to an intensity measure of the natural event, usually a gust or a mean wind speed. In fact, vulnerability models can be integrated with the wind hazard, which consists of associating a probability to each intensity level in a time interval (e.g., by means of return periods) to provide an assessment of future losses due to extreme wind. This has also given impulse to the world- and regional-scale wind hazard studies.Another approach often adopted for the probabilistic description of building vulnerability to the wind is the use of fragility functions, which provide the conditional probability that selected building components will exceed certain damage states, given wind intensity. In fact, in wind engineering literature, it is more common to find structural system- or component-level fragility functions rather than wind vulnerability models for an entire building. Loss assessment based on component fragilities requires some logical combination rules that define the building’s damage state given the damage state of each component and the availability of a consequence model that provides the losses associated with each damage state. When risk calculations are based on numerical simulation of a structure’s behavior during extreme wind scenarios, the interaction of component fragilities is intertwined with the computational procedure. However, simulation-based approaches are usually computationally demanding and case-specific. In this context, the present work introduces the ExtReMe wind risk assESsment prototype Software, ERMESS, which is being developed at the University of Naples Federico II. ERMESS is a wind risk assessment tool for insurance applications to industrial facilities, collecting a wide assortment of available wind vulnerability models and fragility functions to facilitate their incorporation into risk calculations based on in-built or user-defined wind hazard data. This software implements an alternative method for building-specific risk assessment based on existing component-level fragility functions and on a number of simplifying assumptions for their interactions. The applicability of this alternative procedure is explored by means of an illustrative proof-of-concept example, which considers four main building components, namely: the roof covering, roof structure, envelope wall and envelope openings. The application shows that, despite the simplifying assumptions, the procedure can yield risk evaluations that are comparable to those obtained via more rigorous building-level simulation-based methods, at least in the considered example. The advantage of this approach is shown to lie in the fact that a database of building component fragility curves can be put to use for the development of new wind vulnerability models to cover building typologies not yet adequately covered by existing works and whose rigorous development is usually beyond the budget of portfolio-related industrial applications.

Keywords: component wind fragility, probabilistic risk assessment, vulnerability model, wind-induced losses

Procedia PDF Downloads 171
6951 On Performance of Cache Replacement Schemes in NDN-IoT

Authors: Rasool Sadeghi, Sayed Mahdi Faghih Imani, Negar Najafi

Abstract:

The inherent features of Named Data Networking (NDN) provides a robust solution for Internet of Thing (IoT). Therefore, NDN-IoT has emerged as a combined architecture which exploits the benefits of NDN for interconnecting of the heterogeneous objects in IoT. In NDN-IoT, caching schemes are a key role to improve the network performance. In this paper, we consider the effectiveness of cache replacement schemes in NDN-IoT scenarios. We investigate the impact of replacement schemes on average delay, average hop count, and average interest retransmission when replacement schemes are Least Frequently Used (LFU), Least Recently Used (LRU), First-In-First-Out (FIFO) and Random. The simulation results demonstrate that LFU and LRU present a stable performance when the cache size changes. Moreover, the network performance improves when the number of consumers increases.

Keywords: NDN-IoT, cache replacement, performance, ndnSIM

Procedia PDF Downloads 347
6950 Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells

Authors: Andrea Tundis, Carlos García Cordero, Rolf Egert, Alfredo Garro, Max Mühlhäuser

Abstract:

Resilience is an important system property that relies on the ability of a system to automatically recover from a degraded state so as to continue providing its services. Resilient systems have the means of detecting faults and failures with the added capability of automatically restoring their normal operations. Mastering resilience in the domain of Cyber-Physical Systems is challenging due to the interdependence of hybrid hardware and software components, along with physical limitations, laws, regulations and standards, among others. In order to overcome these challenges, this paper presents a modeling approach, based on the concept of Dynamic Cells, tailored to the management of Smart Grids. Additionally, a heuristic algorithm that works on top of the proposed modeling approach, to find resilient configurations, has been defined and implemented. More specifically, the model supports a flexible representation of Smart Grids and the algorithm is able to manage, at different abstraction levels, the resource consumption of individual grid elements on the presence of failures and faults. Finally, the proposal is evaluated in a test scenario where the effectiveness of such approach, when dealing with complex scenarios where adequate solutions are difficult to find, is shown.

Keywords: cyber-physical systems, energy management, optimization, smart grids, self-healing, resilience, security

Procedia PDF Downloads 313
6949 Development of the Integrated Quality Management System of Cooked Sausage Products

Authors: Liubov Lutsyshyn, Yaroslava Zhukova

Abstract:

Over the past twenty years, there has been a drastic change in the mode of nutrition in many countries which has been reflected in the development of new products, production techniques, and has also led to the expansion of sales markets for food products. Studies have shown that solution of the food safety problems is almost impossible without the active and systematic activity of organizations directly involved in the production, storage and sale of food products, as well as without management of end-to-end traceability and exchange of information. The aim of this research is development of the integrated system of the quality management and safety assurance based on the principles of HACCP, traceability and system approach with creation of an algorithm for the identification and monitoring of parameters of technological process of manufacture of cooked sausage products. Methodology of implementation of the integrated system based on the principles of HACCP, traceability and system approach during the manufacturing of cooked sausage products for effective provision for the defined properties of the finished product has been developed. As a result of the research evaluation technique and criteria of performance of the implementation and operation of the system of the quality management and safety assurance based on the principles of HACCP have been developed and substantiated. In the paper regularities of influence of the application of HACCP principles, traceability and system approach on parameters of quality and safety of the finished product have been revealed. In the study regularities in identification of critical control points have been determined. The algorithm of functioning of the integrated system of the quality management and safety assurance has also been described and key requirements for the development of software allowing the prediction of properties of finished product, as well as the timely correction of the technological process and traceability of manufacturing flows have been defined. Based on the obtained results typical scheme of the integrated system of the quality management and safety assurance based on HACCP principles with the elements of end-to-end traceability and system approach for manufacture of cooked sausage products has been developed. As a result of the studies quantitative criteria for evaluation of performance of the system of the quality management and safety assurance have been developed. A set of guidance documents for the implementation and evaluation of the integrated system based on the HACCP principles in meat processing plants have also been developed. On the basis of the research the effectiveness of application of continuous monitoring of the manufacturing process during the control on the identified critical control points have been revealed. The optimal number of critical control points in relation to the manufacture of cooked sausage products has been substantiated. The main results of the research have been appraised during 2013-2014 under the conditions of seven enterprises of the meat processing industry and have been implemented at JSC «Kyiv meat processing plant».

Keywords: cooked sausage products, HACCP, quality management, safety assurance

Procedia PDF Downloads 232
6948 The Use of Social Media in the Recruitment Process as HR Strategy

Authors: Seema Sant

Abstract:

In the 21st century were four generation workforces are working, it’s crucial for organizations to build talent management strategy, as tech-savvy Gen Y has entered the work force. They are more connected to each other than ever – through the internet enabled Social media networks Social media has become important in today’s world. The users of such Social media sites have increased in multiple. From sharing their opinion for a brand/product to researching a company before going for an interview, making a conception about a company’s culture or following a Company’s updates due to sheer interest or for job vacancy, Work force today is constantly in touch with social networks. Thus corporate world has rightly realized its potential uses for business purpose. Companies now use social media for marketing, advertising, consumer survey, etc. For HR professionals, it is used for networking and connecting to the Talent pool- through Talent Community. Social recruiting is the process of sourcing or hiring candidates through the use of social sites such as LinkedIn, Facebook Twitter which provide them with an array of information about potential employee; this study represents an exploratory investigation on the role of social networking sites in recruitment. The primarily aim is to analyze the factors that can enhance the channel of recruitment used by of the recruiter with specific reference to the IT organizations in Mumbai, India. Particularly, the aim is to identify how and why companies use social media to attract and screen applicants during their recruitment processes. It also examines the advantages and limitations of recruitment through social media for employers. This is done by literature review. Further, the papers examine the recruiter impact and understand the various opportunities which have created due to technology, thus, to analyze and examine these factors, both primary, as well as secondary data, are collected for the study. The primary data are gathered from five HR manager working in five top IT organizations in Mumbai and 100 HR consultants’ i.e., recruiter. The data was collected by conducting a survey and supplying a closed-ended questionnaire. A comprehension analysis of the study is depicted through graphs and figures. From the analysis, it was observed that there exists a positive relationship between the level of employee recruited through social media and their organizational commitment. Finally the findings show that company’s i.e. recruiters are currently using social media in recruitment, but perhaps not as effective as they could be. The paper gives recommendations and conditions for success that can help employers to make the most out of social media in recruitment.

Keywords: recruitment, social media, social sites, workforce

Procedia PDF Downloads 165