Search results for: conceptual paper
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25330

Search results for: conceptual paper

18460 The Labor Market in Western Balcans

Authors: Lavdosh Lazemetaj

Abstract:

The labor market in W.B. Countries presents problems and challenges, this is dictated by different risk factors. The levels of unemployment in the region are high and the rates of its reduction are a challenge. This paper presents these challenges and problems that the countries face. of the BP region. The region as a whole and the countries in their particularity are analyzed, according to the specifics, the development trends related to the labor market are looked at. Conclusions are also given that emerge from the analysis of the labor markets prior to the monitoring done by the EU and the World Bank.

Keywords: Economic Development, European Union, Economic Growth, Labor Market

Procedia PDF Downloads 90
18459 Implementation of the Collaborative Learning Approach in Learning of Second Language English

Authors: Ashwini Mahesh Jagatap

Abstract:

This paper presents the language learning strategy with respect to speaking skill with collaborative learning approach. Collaborative learning has been proven to be efficient learning methodology for all kinds of students. Students are working in groups of two or more, reciprocally searching for understanding, Solutions, or meanings, or creating a product. The presentation highlights the different stages which can be implemented during actual implementation of the methodology in the class room teaching learning process.

Keywords: collaborative classroom, collaborative learning approach, language skills, traditional teaching

Procedia PDF Downloads 568
18458 The Role of Knowledge Management in Innovation: Spanish Evidence

Authors: María Jesús Luengo-Valderrey, Mónica Moso-Díez

Abstract:

In the knowledge-based economy, innovation is considered essential in order to achieve survival and growth in organizations. On the other hand, knowledge management is currently understood as one of the keys to innovation process. Both factors are generally admitted as generators of competitive advantage in organizations. Specifically, activities on R&D&I and those that generate internal knowledge have a positive influence in innovation results. This paper examines this effect and if it is similar or not is what we aimed to quantify in this paper. We focus on the impact that proportion of knowledge workers, the R&D&I investment, the amounts destined for ICTs and training for innovation have on the variation of tangible and intangibles returns for the sector of high and medium technology in Spain. To do this, we have performed an empirical analysis on the results of questionnaires about innovation in enterprises in Spain, collected by the National Statistics Institute. First, using clusters methodology, the behavior of these enterprises regarding knowledge management is identified. Then, using SEM methodology, we performed, for each cluster, the study about cause-effect relationships among constructs defined through variables, setting its type and quantification. The cluster analysis results in four groups in which cluster number 1 and 3 presents the best performance in innovation with differentiating nuances among them, while clusters 2 and 4 obtained divergent results to a similar innovative effort. However, the results of SEM analysis for each cluster show that, in all cases, knowledge workers are those that affect innovation performance most, regardless of the level of investment, and that there is a strong correlation between knowledge workers and investment in knowledge generation. The main findings reached is that Spanish high and medium technology companies improve their innovation performance investing in internal knowledge generation measures, specially, in terms of R&D activities, and underinvest in external ones. This, and the strong correlation between knowledge workers and the set of activities that promote the knowledge generation, should be taken into account by managers of companies, when making decisions about their investments for innovation, since they are key for improving their opportunities in the global market.

Keywords: high and medium technology sector, innovation, knowledge management, Spanish companies

Procedia PDF Downloads 232
18457 Two Brazilian Medeas: The Cases of Mata Teu Pai and Medeia Negra

Authors: Jaqueline Bohn Donada

Abstract:

The significance of Euripides’ Medea for contemporary literature is noticeable. Even if the bulk of Classical Reception studies does not tend to look carefully and consistently to the literature produced outside the Anglophone world, Brazilian literature offers abundant materials for such studies. Indeed, a certain Classical background can be observed in Brazilian literature at least since 1975 when Gota d’Água [The Final Straw, in English], a play that recreates the story of Medea and sets it in a favela in Rio de Janeiro. Also worthy of notice is Ivo Bender’s Trilogia Perversa [Perverse Trilogy, in English], a series of three historical plays set in Southern Brazil and based on Aeschylus’ Oresteia and on Euripides’ Iphigenia in Aulis published in the 1980s. Since then, a number of works directly inspired by the plays of Aeschylus, Sophocles and Euripides have been published, not to mention several adaptations of Homer’s two epic poems. This paper proposes a comparative analysis of two such works: Grace Passô’s 2017 play Mata teu Pai [Kill your father, in English] and Marcia Lima’s 2019 play Medeia Negra [Black Medea, in English] from the perspective of Classical Reception Studies in an intersection with feminist literary criticism. The paper intends to look at the endurance of Euripides’ character in contemporary Brazilian literature with a focus on how the character seems to have acquired special relevance to the treatment of pressing issues of the twenty-first century. Whereas Grace Passô’s play sets Medea at the center of a group of immigrant women, Marcia Limma has the character enact the dilemmas of incarcerated women in Brazil. The hypothesis that this research aims at testing is that both artists preserve the pathos of Euripides’s original character at the same time that they recreate his Medea in concrete circumstances of Brazilian contemporary social reality. At the end, the research aims at stating the significance of the Medea theme to contemporary Brazilian literature.

Keywords: Euripides, Medea, Grace Passô, Marcia Limma, Brazilian literature

Procedia PDF Downloads 119
18456 Particle Swarm Optimization Based Vibration Suppression of a Piezoelectric Actuator Using Adaptive Fuzzy Sliding Mode Controller

Authors: Jin-Siang Shaw, Patricia Moya Caceres, Sheng-Xiang Xu

Abstract:

This paper aims to integrate the particle swarm optimization (PSO) method with the adaptive fuzzy sliding mode controller (AFSMC) to achieve vibration attenuation in a piezoelectric actuator subject to base excitation. The piezoelectric actuator is a complicated system made of ferroelectric materials and its performance can be affected by nonlinear hysteresis loop and unknown system parameters and external disturbances. In this study, an adaptive fuzzy sliding mode controller is proposed for the vibration control of the system, because the fuzzy sliding mode controller is designed to tackle the unknown parameters and external disturbance of the system, and the adaptive algorithm is aimed for fine-tuning this controller for error converging purpose. Particle swarm optimization method is used in order to find the optimal controller parameters for the piezoelectric actuator. PSO starts with a population of random possible solutions, called particles. The particles move through the search space with dynamically adjusted speed and direction that change according to their historical behavior, allowing the values of the particles to quickly converge towards the best solutions for the proposed problem. In this paper, an initial set of controller parameters is applied to the piezoelectric actuator which is subject to resonant base excitation with large amplitude vibration. The resulting vibration suppression is about 50%. Then PSO is applied to search for an optimal controller in the neighborhood of this initial controller. The performance of the optimal fuzzy sliding mode controller found by PSO indeed improves up to 97.8% vibration attenuation. Finally, adaptive version of fuzzy sliding mode controller is adopted for further improving vibration suppression. Simulation result verifies the performance of the adaptive controller with 99.98% vibration reduction. Namely the vibration of the piezoelectric actuator subject to resonant base excitation can be completely annihilated using this PSO based adaptive fuzzy sliding mode controller.

Keywords: adaptive fuzzy sliding mode controller, particle swarm optimization, piezoelectric actuator, vibration suppression

Procedia PDF Downloads 139
18455 A Simple User Administration View of Computing Clusters

Authors: Valeria M. Bastos, Myrian A. Costa, Matheus Ambrozio, Nelson F. F. Ebecken

Abstract:

In this paper a very simple and effective user administration view of computing clusters systems is implemented in order of friendly provide the configuration and monitoring of distributed application executions. The user view, the administrator view, and an internal control module create an illusionary management environment for better system usability. The architecture, properties, performance, and the comparison with others software for cluster management are briefly commented.

Keywords: big data, computing clusters, administration view, user view

Procedia PDF Downloads 324
18454 Radar Fault Diagnosis Strategy Based on Deep Learning

Authors: Bin Feng, Zhulin Zong

Abstract:

Radar systems are critical in the modern military, aviation, and maritime operations, and their proper functioning is essential for the success of these operations. However, due to the complexity and sensitivity of radar systems, they are susceptible to various faults that can significantly affect their performance. Traditional radar fault diagnosis strategies rely on expert knowledge and rule-based approaches, which are often limited in effectiveness and require a lot of time and resources. Deep learning has recently emerged as a promising approach for fault diagnosis due to its ability to learn features and patterns from large amounts of data automatically. In this paper, we propose a radar fault diagnosis strategy based on deep learning that can accurately identify and classify faults in radar systems. Our approach uses convolutional neural networks (CNN) to extract features from radar signals and fault classify the features. The proposed strategy is trained and validated on a dataset of measured radar signals with various types of faults. The results show that it achieves high accuracy in fault diagnosis. To further evaluate the effectiveness of the proposed strategy, we compare it with traditional rule-based approaches and other machine learning-based methods, including decision trees, support vector machines (SVMs), and random forests. The results demonstrate that our deep learning-based approach outperforms the traditional approaches in terms of accuracy and efficiency. Finally, we discuss the potential applications and limitations of the proposed strategy, as well as future research directions. Our study highlights the importance and potential of deep learning for radar fault diagnosis. It suggests that it can be a valuable tool for improving the performance and reliability of radar systems. In summary, this paper presents a radar fault diagnosis strategy based on deep learning that achieves high accuracy and efficiency in identifying and classifying faults in radar systems. The proposed strategy has significant potential for practical applications and can pave the way for further research.

Keywords: radar system, fault diagnosis, deep learning, radar fault

Procedia PDF Downloads 80
18453 Epistemological and Ethical Dimensions of Current Concepts of Human Resilience in the Neurosciences

Authors: Norbert W. Paul

Abstract:

Since a number of years, scientific interest in human resilience is rapidly increasing especially in psychology and more recently and highly visible in neurobiological research. Concepts of resilience are regularly discussed in the light of liminal experiences and existential challenges in human life. Resilience research is providing both, explanatory models and strategies to promote or foster human resilience. Surprisingly, these approaches attracted little attention so far in philosophy in general and in ethics in particular. This is even more astonishing given the fact that the neurosciences as such have been and still are of major interest to philosophy and ethics and even brought about the specialized field of neuroethics, which, however, is not concerned with concepts of resilience, so far. As a result of the little attention given to the topic of resilience, the whole concept has to date been a philosophically under-theorized. This abstinence of ethics and philosophy in resilience research is lamentable because resilience as a concept as well as resilience interventions based on neurobiological findings do undoubtedly pose philosophical, social and ethical questions. In this paper, we will argue that particular notions of resilience are crossing the sometimes fine line between maintaining a person’s mental health despite the impact of severe psychological or physical adverse events and ethically more debatable discourses of enhancement. While we neither argue for or against enhancement nor re-interpret resilience research and interventions by subsuming them strategies of psychological and/or neuro-enhancement, we encourage those who see social or ethical problems with enhancement technologies should also take a closer look on resilience and the related neurobiological concepts. We will proceed in three steps. In our first step, we will describe the concept of resilience in general and its neurobiological study in particular. Here, we will point out some important differences in the way ‘resilience’ is conceptualized and how neurobiological research understands resilience. In what follows we will try to show that a one-sided concept of resilience – as it is often presented in neurobiological research on resilience – does pose social and ethical problems. Secondly, we will identify and explore the social and ethical challenges of (neurobiological) enhancement. In the last and final step of this paper, we will argue that a one-sided reading of resilience can be understood as latent form of enhancement in transition and poses ethical questions similar to those discussed in relation to other approaches to the biomedical enhancement of humans.

Keywords: resilience, neurosciences, epistemology, bioethics

Procedia PDF Downloads 155
18452 Role of Consultancy in Engineering Education

Authors: V. Nalina, P. Jayarekha

Abstract:

Consultancy by an engineering faculty member of an institution undertakes consulting assignments to provide professional or technical solutions to specific fields. Consulting is providing an opportunity for the engineering faculty to share their insights for the real world problems. It is a dynamic learning process with respect to students and faculty as it increases the teaching and research activities. In this paper, we discuss the need for consultancy in engineering education with faculty contribution towards consultancy and advantages of consultancy to institutions. Balance the workload of the faculty consulting with the responsibilities of academics defined by the universities.

Keywords: consultancy, academic consulting, engineering consultancy, faculty consulting

Procedia PDF Downloads 436
18451 Female Entrepreneurship in Transitional Economies: An In-Depth Comparative Study about Challenges Facing Female Entrepreneurs in Nigeria and Egypt

Authors: Dina Mohamed Ayman, Rafieu Akin

Abstract:

In an attempt to increase the female total entrepreneurial activities (TEA) within Egypt and Nigeria, this paper aims to investigate the challenges facing female entrepreneurs operating in Egypt, in relative to Nigeria. In this regard, both researchers undertook a qualitative approach due to the scarcity of the literature reviewed on the topic; in those particular countries, and as an in-depth comparative mode. Therefore, ten Egyptian entrepreneurs in relative to ten Nigerian entrepreneurs were in-depth investigated. The research findings prove that female entrepreneurs face complex problems for being both gender and country-specific. Regarding the gender-specific obstacles, the work/life imbalance due to the scarcity of child-care nurseries and the prevalence of the gender-role division while performing the house chores rather than the concept of co-operation, acted as a main source of cultural challenge because women are considered mostly as 'housewives'. However, interestingly, this specific gender-discrimination challenge is proven to have no grounded effect in terms of the business-establishment and daily dealings neither in Egypt nor Nigeria, as one of the sample exclaimed 'as long as you pay, then no gender difference is set on the table'. Other country-specific challenges facing female entrepreneurs, lied in, the aggregate weak entrepreneurial framework governing both countries, also, women faced the difficulty of access to financial institutions with collateral requirements that are usually "hardly to be met", besides, the absence of the "micro-credit-Grameen-banks" concept. As well, the scarcity of incubators and business training centers providing network, consultancy and well-trained workforce to female entrepreneurs constitute a major hurdle for women entrepreneurs operating in both countries. Finally, this paper will conclude the research by offering a set of public-policy recommendations to pave the way for females to choose self-employment as a career path.

Keywords: entrepreneurship, female entrepreneurship, obstacles, framework conditions, culture, micro-credit

Procedia PDF Downloads 365
18450 Electrical Properties of CVD-Graphene on SiC

Authors: Bilal Jabakhanji, Dimitris Kazazis, Adrien Michon, Christophe Consejo, Wilfried Desrat, Benoit Jouault

Abstract:

In this paper, we investigate the electrical properties of graphene grown by Chemical Vapor Deposition (CVD) on the Si face of SiC substrates. Depending on the growth condition, hole or electron doping can be achieved, down to a few 1011cm−2. The high homogeneity of the graphene and the low intrinsic carrier concentration, allow the remarkable observation of the Half Integer Quantum Hall Effect, typical of graphene, at the centimeter scale.

Keywords: graphene, quantum hall effect, chemical vapor, deposition, silicon carbide

Procedia PDF Downloads 661
18449 Geometric Properties of Some q-Bessel Functions

Authors: İbrahim Aktaş, Árpád Baricz

Abstract:

In this paper, the radii of star likeness of the Jackson and Hahn-Exton q-Bessel functions are considered, and for each of them three different normalizations is applied. By applying Euler-Rayleigh inequalities for the first positive zeros of these functions tight lower, and upper bounds for the radii of starlikeness of these functions are obtained. The Laguerre-Pólya class of real entire functions plays an important role in this study. In particular, we obtain some new bounds for the first positive zero of the derivative of the classical Bessel function of the first kind.

Keywords: bessel function, lommel function, radius of starlikeness and convexity, Struve function

Procedia PDF Downloads 271
18448 Computational Fluid Dynamicsfd Simulations of Air Pollutant Dispersion: Validation of Fire Dynamic Simulator Against the Cute Experiments of the Cost ES1006 Action

Authors: Virginie Hergault, Siham Chebbah, Bertrand Frere

Abstract:

Following in-house objectives, Central laboratory of Paris police Prefecture conducted a general review on models and Computational Fluid Dynamics (CFD) codes used to simulate pollutant dispersion in the atmosphere. Starting from that review and considering main features of Large Eddy Simulation, Central Laboratory Of Paris Police Prefecture (LCPP) postulates that the Fire Dynamics Simulator (FDS) model, from National Institute of Standards and Technology (NIST), should be well suited for air pollutant dispersion modeling. This paper focuses on the implementation and the evaluation of FDS in the frame of the European COST ES1006 Action. This action aimed at quantifying the performance of modeling approaches. In this paper, the CUTE dataset carried out in the city of Hamburg, and its mock-up has been used. We have performed a comparison of FDS results with wind tunnel measurements from CUTE trials on the one hand, and, on the other, with the models results involved in the COST Action. The most time-consuming part of creating input data for simulations is the transfer of obstacle geometry information to the format required by SDS. Thus, we have developed Python codes to convert automatically building and topographic data to the FDS input file. In order to evaluate the predictions of FDS with observations, statistical performance measures have been used. These metrics include the fractional bias (FB), the normalized mean square error (NMSE) and the fraction of predictions within a factor of two of observations (FAC2). As well as the CFD models tested in the COST Action, FDS results demonstrate a good agreement with measured concentrations. Furthermore, the metrics assessment indicate that FB and NMSE meet the tolerance acceptable.

Keywords: numerical simulations, atmospheric dispersion, cost ES1006 action, CFD model, cute experiments, wind tunnel data, numerical results

Procedia PDF Downloads 127
18447 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 462
18446 The Youth Employment Peculiarities in Post-Soviet Georgia

Authors: M. Lobzhanidze, N. Damenia

Abstract:

The article analyzes the current structural changes in the economy of Georgia, liberalization and integration processes of the economy. In accordance with this analysis, the peculiarities and the problems of youth employment are revealed. In the paper, the Georgian labor market and its contradictions are studied. Based on the analysis of materials, the socio-economic losses caused by the long-term and mass unemployment of young people are revealed, the objective and subjective circumstances of getting higher education are studied. The youth employment and unemployment rates are analyzed. Based on the research, the factors that increase unemployment are identified. According to the analysis of the youth employment, it has appeared that the unemployment share in the number of economically active population has increased in the younger age group. It demonstrates the high requirements of the labour market in terms of the quality of the workforce. Also, it is highlighted that young people are exposed to a highly paid job. The following research methods are applied in the presented paper: statistical (selection, grouping, observation, trend, etc.) and qualitative research (in-depth interview), as well as analysis, induction and comparison methods. The article presents the data by the National Statistics Office of Georgia and the Ministry of Agriculture of Georgia, policy documents of the Parliament of Georgia, scientific papers by Georgian and foreign scientists, analytical reports, publications and EU research materials on similar issues. The work estimates the students and graduates employment problems existing in the state development strategy and priorities. The measures to overcome the challenges are defined. The article describes the mechanisms of state regulation of youth employment and the ways of improving this regulatory base. As for major findings, it should be highlighted that the main problems are: lack of experience and incompatibility of youth qualification with the requirements of the labor market. Accordingly, it is concluded that the unemployment rate of young people in Georgia is increasing.

Keywords: migration of youth, youth employment, migration management, youth employment and unemployment

Procedia PDF Downloads 141
18445 Italian Colonial Strategy in Libya and the Conflict of Super Powers

Authors: Mohamed Basheer Abdul Atti Hassan

Abstract:

This research paper will follow the main outlines of the Italian colonization in Libya in a historical geopolitical approach; before we reach the contemporary map. In this study, we are also concerned with following the chain's links, not as drama in time, but as a strategy in place, so that it draws to us a map of power and the distribution of political formations throughout this period within and around Libya. From the sum of these variable distributions and successive balances, we can come up with the basic principles that determined the Italian history in Libya and formed its political entity, which is a compass of guidance and an indication of the future.

Keywords: conflict, Mediterranean, colonization, political history

Procedia PDF Downloads 154
18444 A Survey on the Sun Tracking Systems and Its Principle for Getting Maximum Sun Radiation

Authors: Talha Ali Khan

Abstract:

Discovering different energy resources to fulfill the world's growing demand is now one of the society’s bigger challenges for the next half-century. The main task is to convert the sun radiation into electricity via photovoltaic solar cells which is suddenly decreasing $/watt of delivered solar electricity. Therefore, in this context the sun trackers are those devices that can be used to ameliorate efficiency. In this paper, a variety of the sun tracking systems are evaluated and their merits and demerits are highlighted. The most adept and proficient sun-tracking devices are polar axis and azimuth-elevation types.

Keywords: dual axis, fixed axis, sun tracker, sun radiation

Procedia PDF Downloads 449
18443 Maximum Power Point Tracking Using FLC Tuned with GA

Authors: Mohamed Amine Haraoubia, Abdelaziz Hamzaoui, Najib Essounbouli

Abstract:

The pursuit of the MPPT has led to the development of many kinds of controllers, one of which is the Fuzzy Logic Controller, which has proven its worth. To further tune this controller this paper will discuss and analyze the use of Genetic Algorithms to tune the Fuzzy Logic Controller. It will provide an introduction to both systems, and test their compatibility and performance.

Keywords: fuzzy logic controller, fuzzy logic, genetic algorithm, maximum power point, maximum power point tracking

Procedia PDF Downloads 368
18442 Influence of Temperature and Precipitation Changes on Desertification

Authors: Kukuri Tavartkiladze, Nana Bolashvili

Abstract:

The purpose of this paper was separation and study of the part of structure regime, which directly affects the process of desertification. A simple scheme was prepared for the assessment of desertification process; surface air temperature and precipitation for the years of 1936-2009 were analyzed.  The map of distribution of the Desertification Contributing Coefficient in the territory of Georgia was compiled. The simple scheme for identification of the intensity of the desertification contributing process has been developed and the illustrative example of its practical application for the territory of Georgia has been conducted.

Keywords: aridity, climate change, desertification, precipitation

Procedia PDF Downloads 332
18441 Knowledge Sharing Behavior and Cognitive Dissonance: The Influence of Assertive Conflict Management Strategy and Team Psychological Safety

Authors: Matthew P. Mancini, Vincent Ribiere

Abstract:

Today’s workers face more numerous and complex challenges and are required to be increasingly interdependent and faster learners. Knowledge sharing activities between people have been understood as a significant element affecting organizational innovation performance. While they do have the potential to spark cognitive conflict, disagreement is important from an organizational perspective because it can stimulate the development of new ideas and perhaps pave the way for creativity, innovation, and competitive advantage. How teams cope with the cognitive conflict dimension of knowledge sharing and the associated interpersonal risk is what captures our attention. Specifically, assertive conflict management strategies have a positive influence on knowledge sharing behaviors, and team psychological safety has a positive influence on knowledge sharing intention. This paper focuses on explaining the impact that these factors have on the shaping of an individual’s decision to engage or not in knowledge sharing activities. To accomplish this, we performed an empirical analysis on the results of our questionnaire about knowledge-sharing related conflict management and team psychological safety in pharmaceutical enterprises located in North America, Europe, and Asia. First, univariate analysis is used to characterize behavior regarding conflict management strategy into two groups. Group 1 presents assertive conflict management strategies and group 2 shows unassertive ones. Then, by using SEM methodology, we evaluated the relationships between them and the team psychological safety construct with the knowledge sharing process. The results of the SEM analysis show that assertive conflict management strategies affect the knowledge sharing process the most with a small, but significant effect from team psychological safety. The findings suggest that assertive conflict management strategies are just as important as knowledge sharing intentions for encouraging knowledge sharing behavior. This paper provides clear insights into how employees manage the sharing of their knowledge in the face of conflict and interpersonal risk and the relative importance of these factors in sustaining productive knowledge sharing activities.

Keywords: cognitive dissonance, conflict management, knowledge sharing, organizational behavior, psychological safety

Procedia PDF Downloads 312
18440 3D Printing: Rebounding from Global Supply Chain Disruption Due to Natural Disaster

Authors: Gurjinder Singh, Jasmeen Kaur, Mukul Dhiman

Abstract:

This paper mainly describes the significance of 3D printing in the supply chain management in a scenario when there is disruption in global supply chain. Furthermore, the development and implementation of supply chain strategies in context of 3D printing technology is framed to make supply chain of an organization resilient to disruption caused by natural disasters.

Keywords: 3D printing, global supply chain, supply chain management, supply chain strategies

Procedia PDF Downloads 470
18439 Synchronization of a Perturbed Satellite Attitude Motion using Active Sliding Mode Controller

Authors: Djaouida Sadaoui

Abstract:

In this paper, the design procedure of the active sliding mode controller which is a combination of the active controller and the sliding mode controller is given first and then the problem of synchronization of two satellites systems is discussed for the proposed method. Finally, numerical results are presented to evaluate the robustness and effectiveness of the proposed control strategy.

Keywords: active control, sliding mode control, synchronization, satellite attitude

Procedia PDF Downloads 487
18438 Determining the Policy Space of the Partido Socialista Obrero Español Government in Managing Spain's Economic and Financial Crisis

Authors: A. Pascual Ramsay

Abstract:

Accounts of the management of the economic and euro crisis in Spain have been dominated by an emphasis on external constraints. However, this approach leaves unanswered important questions about the role of domestic political factors. Using systematic qualitative primary research and employing elite interviewing and process tracing, this paper aims to fill this gap for the period of the Partido Socialista Obrero Español (PSOE) administration. The paper shows that domestic politics played a crucial role in the management of the crisis, most importantly by determining the shape of the measures undertaken. In its three distinct stages – downplaying/inaction, reaction/stimulus, and austerity/reform – the PSOE's response was certainly constrained by external factors, most notably EMU membership and the actions of sovereign-bond investors, the ECB and Germany. Yet while these external constraints forced the government to act, domestic political factors fundamentally shaped the content of key measures: the fiscal stimulus, the labour, financial and pension reforms, the refusal to accept a bailout or the reform of the Constitution. Seven factors were particularly influential: i) electoral and political cost, ii) party and partisanship, iii) organised interests, iv) domestic institutions, v) ideological preferences, vi) ineffective decision-making, and vii) judgement and personal characteristics of decision-makers. In conclusion, domestic politics played an important role in the management of the crisis, a role that has been underestimated by dominant approaches focusing on external constraints and weak domestic policy autonomy. The findings provide empirical evidence to support research agendas that identify significant state discretion in the face of international economic integration and an important role for domestic political factors such as institutions, material interests, partisanship and ideology in shaping economic outcomes.

Keywords: economic crisis, Euro, PSOE, Spain

Procedia PDF Downloads 111
18437 The Need to Enhance Online Consumer Protection in KSA

Authors: Abdulrahman Aloufi

Abstract:

E-commerce has evolved to become a functional and mainstream tool of global trading, including in the Kingdom of Saudi Arabia. Consequently, online consumers need protection just as much as consumers in the offline world. In 2019, the Ministry of Commerce in Saudi Arabia established a so-called ‘e-commerce law’; however, this law does not cover the court enforcement of contracts entered into by international vendors, so it is not applicable in cross-border situations. The purpose of this paper is to identify the gaps present in this new e-commerce law in Saudi Arabia.

Keywords: consumer protection, e-commerce law, Saudi consumer, international vendor

Procedia PDF Downloads 165
18436 H.263 Based Video Transceiver for Wireless Camera System

Authors: Won-Ho Kim

Abstract:

In this paper, a design of H.263 based wireless video transceiver is presented for wireless camera system. It uses standard WIFI transceiver and the covering area is up to 100m. Furthermore the standard H.263 video encoding technique is used for video compression since wireless video transmitter is unable to transmit high capacity raw data in real time and the implemented system is capable of streaming at speed of less than 1Mbps using NTSC 720x480 video.

Keywords: wireless video transceiver, video surveillance camera, H.263 video encoding digital signal processing

Procedia PDF Downloads 359
18435 New Approach for Constructing a Secure Biometric Database

Authors: A. Kebbeb, M. Mostefai, F. Benmerzoug, Y. Chahir

Abstract:

The multimodal biometric identification is the combination of several biometric systems. The challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification.

Keywords: biometric databases, multimodal biometrics, security authentication, digital watermarking

Procedia PDF Downloads 385
18434 The Discriminate Analysis and Relevant Model for Mapping Export Potential

Authors: Jana Gutierez Chvalkovska, Michal Mejstrik, Matej Urban

Abstract:

There are pending discussions over the mapping of country export potential in order to refocus export strategy of firms and its evidence-based promotion by the Export Credit Agencies (ECAs) and other permitted vehicles of governments. In this paper we develop our version of an applied model that offers “stepwise” elimination of unattractive markets. We modify and calibrate the model for the particular features of the Czech Republic and specific pilot cases where we apply an individual approach to each sector.

Keywords: export strategy, modeling export, calibration, export promotion

Procedia PDF Downloads 494
18433 Portfolio Risk Management Using Quantum Annealing

Authors: Thomas Doutre, Emmanuel De Meric De Bellefon

Abstract:

This paper describes the application of local-search metaheuristic quantum annealing to portfolio opti- mization. Heuristic technics are particularly handy when Markowitz’ classical Mean-Variance problem is enriched with additional realistic constraints. Once tailored to the problem, computational experiments on real collected data have shown the superiority of quantum annealing over simulated annealing for this constrained optimization problem, taking advantages of quantum effects such as tunnelling.

Keywords: optimization, portfolio risk management, quantum annealing, metaheuristic

Procedia PDF Downloads 374
18432 Medical Images Enhancement Using New Dynamic Band Pass Filter

Authors: Abdellatif Baba

Abstract:

In order to facilitate medical images analysis by improving their quality and readability, we present in this paper a new dynamic band pass filter as a general and suitable operator for different types of medical images. Our objective is to enrich the details of any treated medical image to make it sufficiently clear enough to give an understood and simplified meaning even for unspecialized people in the medical domain.

Keywords: medical image enhancement, dynamic band pass filter, analysis improvement

Procedia PDF Downloads 286
18431 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm

Authors: R. Kiruthika, A. Kannan

Abstract:

Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.

Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm

Procedia PDF Downloads 358