Search results for: software defined networking (SDN)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7669

Search results for: software defined networking (SDN)

6949 An AI-Based Dynamical Resource Allocation Calculation Algorithm for Unmanned Aerial Vehicle

Authors: Zhou Luchen, Wu Yubing, Burra Venkata Durga Kumar

Abstract:

As the scale of the network becomes larger and more complex than before, the density of user devices is also increasing. The development of Unmanned Aerial Vehicle (UAV) networks is able to collect and transform data in an efficient way by using software-defined networks (SDN) technology. This paper proposed a three-layer distributed and dynamic cluster architecture to manage UAVs by using an AI-based resource allocation calculation algorithm to address the overloading network problem. Through separating services of each UAV, the UAV hierarchical cluster system performs the main function of reducing the network load and transferring user requests, with three sub-tasks including data collection, communication channel organization, and data relaying. In this cluster, a head node and a vice head node UAV are selected considering the Central Processing Unit (CPU), operational (RAM), and permanent (ROM) memory of devices, battery charge, and capacity. The vice head node acts as a backup that stores all the data in the head node. The k-means clustering algorithm is used in order to detect high load regions and form the UAV layered clusters. The whole process of detecting high load areas, forming and selecting UAV clusters, and moving the selected UAV cluster to that area is proposed as offloading traffic algorithm.

Keywords: k-means, resource allocation, SDN, UAV network, unmanned aerial vehicles

Procedia PDF Downloads 98
6948 Co-Authorship Networks of Scientific Collaboration

Authors: Juha Kettunen

Abstract:

This study analyzes collaborative and networked academic authorship in higher education. The literature review shows evidence that single authorship has made a gradual paradigm shift to joint authorship. The empirical evidence from the Turku University of Applied Sciences indicates that collaborative authorship has notably increased in the last few years. Co-authorship has extended outside the institution to other domestic and international academic organizations. Co-authorship not only increase the merits of academic scholars but builds and maintains networks of research and development. The results of this study help the authors, editors and partners of research and development projects to have a more concrete understanding of how co-authorship has developed and spread beyond higher education institutions.

Keywords: co-authorship, social networking, higher education, research and development

Procedia PDF Downloads 228
6947 Internet Media and Public: A Report of a Mutual Deception

Authors: Safet Zejnullahu

Abstract:

The relationship between the public and media is more than meaningful. It has been a topic of discussion as early as the birth of the media. The 'magic box' called radio adapted and transformed by following the tastes and interests of the public. Television went a step further by complementing the magic sound of the magic box with photos/images. Newspapers informed the reader, but from time to time, they also provided them the room to express their opinions. The media-public report in the traditional media is a report of a mutual respect. Today, the report between media and public should be well defined. The goal of this paper is to analyze the history of the media-public relationship, with a special emphasis on the analysis of this relationship in media of the internet time. This paper seeks to prove that the internet media has created a completely new and thus far unknown relationship between the media and public. Through research, which includes an analysis of the media in Kosovo and Albania, it will be proven that the media of the internet time has elevated this relationship to a new level, with many unknowns in terms of the functioning and role of the media. The results and findings of the paper are related to the conclusion that from the relationship in which the roles of the media and the public are known, nowadays, this relationship goes beyond the known principle and rules and is more defined as a relationship of mutual deception. The media goes beyond the line of the humility of the public, and the public seeks to direct the content of the media. The media-public report in the internet-media is a report based on mutual attempt for fraud.

Keywords: media, public, report, humility, direction

Procedia PDF Downloads 157
6946 Access Control System for Big Data Application

Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud

Abstract:

Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.

Keywords: access control, security, Big Data, domain

Procedia PDF Downloads 121
6945 A Critical Discourse Study of Gender Identity Issues in Daniyal Mueenuddin’s Short Story “Saleema”

Authors: Zafar Ali

Abstract:

The aim of this research is to highlight problems that are faced by women at the hands of men. Males in Pakistani society have power and use this power for the exploitation of women. Further, the purpose of the study is to make societies like Pakistan and especially the young generation, aware and enable them to resist such issues, and the role of discourse in this regard is to minimize its political and social repercussions. The study finds out different discursive techniques and manipulative language used in the short story to construct gender identity. The study also investigates socio-economic roles in the construction of gender identity. This study has been completed with the help of Critical Discourse Analysis (CDA) principles. CDA principles have been applied to the text of the selected short story Saleema from Daniyal Mueenuddin’s collection In Other Rooms, Other Wonders. Related passages, structures, expressions, and text are analyzed from the point of view of CDA, especially Norman Fairclough’s CDA approach. It was found from the analysis that women have no identity of their own in patriarchal societies like Pakistan. Further, it was found women are mistreated, and they have a very limited and defined role in Pakistan. They cannot go beyond the limit defined to them by men.

Keywords: gender issues, resourceful groups, CDA, exploitation

Procedia PDF Downloads 126
6944 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 354
6943 Locating the Best Place for Earthquake Refugee Camps by OpenSource Software: A Case Study for Tehran, Iran

Authors: Reyhaneh Saeedi

Abstract:

Iran is one of the regions which are most prone for earthquakes annually having a large number of financial and mortality and financial losses. Every year around the world, a large number of people lose their home and life due to natural disasters such as earthquakes. It is necessary to provide and specify some suitable places for settling the homeless people before the occurrence of the earthquake, one of the most important factors in crisis planning and management. Some of the natural disasters can be Modeling and shown by Geospatial Information System (GIS). By using GIS, it would be possible to manage the spatial data and reach several goals by making use of the analyses existing in it. GIS has a determining role in disaster management because it can determine the best places for temporary resettling after such a disaster. In this research QuantumGIS software is used that It is an OpenSource software so that easy to access codes and It is also free. In this system, AHP method is used as decision model and to locate the best places for temporary resettling, is done based on the related organizations criteria with their weights and buffers. Also in this research are made the buffer layers of criteria and change them to the raster layers. Later on, the raster layers are multiplied on desired weights then, the results are added together. Eventually, there are suitable places for resettling of victims by desired criteria by different colors with their optimum rate in QuantumGIS platform.

Keywords: disaster management, temporary resettlement, earthquake, QuantumGIS

Procedia PDF Downloads 388
6942 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 212
6941 The Comparative Study of Binary Artifact Repository Managers

Authors: Evgeny Chugunnyy, Alena Gerasimova, Kirill Chernyavskiy, Alexander Krasnov

Abstract:

One of the primary component of Continuous deployment (CD) is a binary artifact repository — the place where artifacts are stored with metadata in a structured way. The binary artifact repository manager (BARM) is a software, which implements this repository logic and exposes a public application programming interface (API) for managing these artifacts. Almost every programming language ecosystem has its own artifact repository kind. During creating Artipie — BARM constructor and server, we analyzed and implemented a lot of different artifact repositories. In this paper we present criterias for comparing artifact repositories, and analyze the most popular repositories using these metrics. We also describe some of the notable features of different repositories. This paper aimed to help people who are creating, maintaining or optimizing software repository and CI tools.

Keywords: artifact, repository, continuous deployment, build automation, artifacts management

Procedia PDF Downloads 134
6940 Fears of Strangers: Causes of Anonymity Rejection on Virtual World

Authors: Proud Arunrangsiwed

Abstract:

This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.

Keywords: anonymous, anonymity, online identity, trust message, reliability

Procedia PDF Downloads 351
6939 Automatic Algorithm for Processing and Analysis of Images from the Comet Assay

Authors: Yeimy L. Quintana, Juan G. Zuluaga, Sandra S. Arango

Abstract:

The comet assay is a method based on electrophoresis that is used to measure DNA damage in cells and has shown important results in the identification of substances with a potential risk to the human population as innumerable physical, chemical and biological agents. With this technique is possible to obtain images like a comet, in which the tail of these refers to damaged fragments of the DNA. One of the main problems is that the image has unequal luminosity caused by the fluorescence microscope and requires different processing to condition it as well as to know how many optimal comets there are per sample and finally to perform the measurements and determine the percentage of DNA damage. In this paper, we propose the design and implementation of software using Image Processing Toolbox-MATLAB that allows the automation of image processing. The software chooses the optimum comets and measuring the necessary parameters to detect the damage.

Keywords: artificial vision, comet assay, DNA damage, image processing

Procedia PDF Downloads 295
6938 Effect of Communication Pattern on Agricultural Employees' Job Performance

Authors: B. G. Abiona, E. O. Fakoya, S. O. Adeogun, J. O. Blessed

Abstract:

This study assessed the influence of communication pattern on agricultural employees’ job performance. Data were collected from 61 randomly selected respondents using a structured questionnaire. Perceived communication pattern that influence job performance include: the attitude of the administrators (x̅ = 3.41, physical barriers to communication flow among employees (x̅ = 3.21). Major challenges to respondents’ job performance were different language among employees (x̅ = 3.12), employees perception on organizational issues (x̅ = 3.09), networking (x̅ = 2.88), and unclear definition of work (x̅ = 2.74). A significant relationship was found between employees’ perceived communication pattern (r = 0.423, p < 0.00) and job performance. Information must be well designed in such a way that would positively influence employees’ job performance as this is essential in any agricultural organizations.

Keywords: communication pattern, job performance, agricultural employees, constraint, administrators, attitude

Procedia PDF Downloads 341
6937 A Model for Analyzing the Startup Dynamics of a Belt Transmission Driven by a DC Motor

Authors: Giovanni Incerti

Abstract:

In this paper the dynamic behavior of a synchronous belt drive during start-up is analyzed and discussed. Besides considering the belt elasticity, the mathematical model here proposed also takes into consideration the electrical behaviour of the DC motor. The solution of the motion equations is obtained by means of the modal analysis in state space, which allows to obtain the decoupling of all equations of the mathematical model without introducing the hypothesis of proportional damping. The mathematical model of the transmission and the solution algorithms have been implemented within a computing software that allows the user to simulate the dynamics of the system and to evaluate the effects due to the elasticity of the belt branches and to the electromagnetic behavior of the DC motor. In order to show the details of the calculation procedure, the paper presents a case study developed with the aid of the abovementioned software.

Keywords: belt drive, vibrations, startup, DC motor

Procedia PDF Downloads 566
6936 An Informative Marketing Platform: Methodology and Architecture

Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone

Abstract:

Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.

Keywords: informative marketing, opt in page, software platform, web application

Procedia PDF Downloads 120
6935 Aerodynamic Modelling of Unmanned Aerial System through Computational Fluid Dynamics: Application to the UAS-S45 Balaam

Authors: Maxime A. J. Kuitche, Ruxandra M. Botez, Arthur Guillemin

Abstract:

As the Unmanned Aerial Systems have found diverse utilities in both military and civil aviation, the necessity to obtain an accurate aerodynamic model has shown an enormous growth of interest. Recent modeling techniques are procedures using optimization algorithms and statistics that require many flight tests and are therefore extremely demanding in terms of costs. This paper presents a procedure to estimate the aerodynamic behavior of an unmanned aerial system from a numerical approach using computational fluid dynamic analysis. The study was performed using an unstructured mesh obtained from a grid convergence analysis at a Mach number of 0.14, and at an angle of attack of 0°. The flow around the aircraft was described using a standard k-ω turbulence model. Thus, the Reynold Averaged Navier-Stokes (RANS) equations were solved using ANSYS FLUENT software. The method was applied on the UAS-S45 designed and manufactured by Hydra Technologies in Mexico. The lift, the drag, and the pitching moment coefficients were obtained at different angles of attack for several flight conditions defined in terms of altitudes and Mach numbers. The results obtained from the Computational Fluid Dynamics analysis were compared with the results obtained by using the DATCOM semi-empirical procedure. This comparison has indicated that our approach is highly accurate and that the aerodynamic model obtained could be useful to estimate the flight dynamics of the UAS-S45.

Keywords: aerodynamic modelling, CFD Analysis, ANSYS FLUENT, UAS-S45

Procedia PDF Downloads 364
6934 Resilience in the Face of Environmental Extremes through Networking and Resource Mobilization

Authors: Abdullah Al Mohiuddin

Abstract:

Bangladesh is one of the poorest countries in the world, and ranks low on almost all measures of economic development, thus leaving the population extremely vulnerable to natural disasters and climate events. 20% of GDP come from agriculture but more than 60% of the population relies on agriculture as their main source of income making the entire economy vulnerable to climate change and natural disasters. High population density exacerbates the exposure to and effect of climate events, and increases the levels of vulnerability, as does the poor institutional development of the country. The most vulnerable sectors to climate change impacts in Bangladesh are agriculture, coastal zones, water resources, forestry, fishery, health, biomass, and energy. High temperatures, heavy rainfall, high humidity and fairly marked seasonal variations characterize the climate in Bangladesh: Mild winter, hot humid summer and humid, warm rainy monsoon. Much of the country is flooded during the summer monsoon. The Department of Environment (DOE) under the Ministry of Environment and Forestry (MoEF) is the focal point for the United Nations Framework Convention on Climate Change (UNFCCC) and coordinates climate related activities in the country. Recently, a Climate Change Cell (CCC) has been established to address several issues including adaptation to climate change. The climate change focus started with The National Environmental Management Action Plan (NEMAP) which was prepared in 1995 in order to initiate the process to address environmental and climate change issues as long-term environmental problems for Bangladesh. Bangladesh was one of the first countries to finalise a NAPA (Preparation of a National Adaptation Plan of Action) which addresses climate change issues. The NAPA was completed in 2005, and is the first official initiative for mainstreaming adaptation to national policies and actions to cope with climate change and vulnerability. The NAPA suggests a number of adaptation strategies, for example: - Providing drinking water to coastal communities to fight the enhanced salinity caused by sea level rise, - Integrating climate change in planning and design of infrastructure, - Including climate change issues in education, - Supporting adaptation of agricultural systems to new weather extremes, - Mainstreaming CCA into policies and programmes in different sectors, e.g. disaster management, water and health, - Dissemination of CCA information and awareness raising on enhanced climate disasters, especially in vulnerable communities. Bangladesh has geared up its environment conservation steps to save the world’s poorest countries from the adverse effects of global warming. Now it is turning towards green economy policies to save the degrading ecosystem. Bangladesh is a developing country and always fights against Natural Disaster. At the same time we also fight for establishing ecological environment through promoting Green Economy/Energy by Youth Networking. ANTAR is coordinating a big Youth Network in the southern part of Bangladesh where 30 Youth group involved. It can be explained as the economic development based on sustainable development which generates growth and improvement in human’s lives while significantly reducing environmental risks and ecological scarcities. Green economy in Bangladesh promotes three bottom lines – sustaining economic, environment and social well-being.

Keywords: resilience, networking, mobilizing, resource

Procedia PDF Downloads 302
6933 Conceptual Model of a Residential Waste Collection System Using ARENA Software

Authors: Bruce G. Wilson

Abstract:

The collection of municipal solid waste at the curbside is a complex operation that is repeated daily under varying circumstances around the world. There have been several attempts to develop Monte Carlo simulation models of the waste collection process dating back almost 50 years. Despite this long history, the use of simulation modeling as a planning or optimization tool for waste collection is still extremely limited in practice. Historically, simulation modeling of waste collection systems has been hampered by the limitations of computer hardware and software and by the availability of representative input data. This paper outlines the development of a Monte Carlo simulation model that overcomes many of the limitations contained in previous models. The model uses a general purpose simulation software program that is easily capable of modeling an entire waste collection network. The model treats the stops on a waste collection route as a queue of work to be processed by a collection vehicle (or server). Input data can be collected from a variety of sources including municipal geographic information systems, global positioning system recorders on collection vehicles, and weigh scales at transfer stations or treatment facilities. The result is a flexible model that is sufficiently robust that it can model the collection activities in a large municipality, while providing the flexibility to adapt to changing conditions on the collection route.

Keywords: modeling, queues, residential waste collection, Monte Carlo simulation

Procedia PDF Downloads 392
6932 Prevalence and Determinants of Iron Deficiency Anaemia in Pregnant Xhosa Women

Authors: A. Abiodun, G. George, B. Longo-Mbenza, E. Blanco-Blanco

Abstract:

Objective: To determine the prevalence and determinants of iron-deficiency anaemia in pregnant Xhosa women practising geophagia. Methods: This cross-sectional study was conducted among pregnant Xhosa women from rural areas of Mthatha, South Africa, according to socio-demographic, geophagia, haematologic and iron metabolism profiles using univariate and multivariate analyses. Anaemia was defined by haemoglobin <11 g/dL and iron deficiency was defined by serum ferritin < 12 ug/L. Results: Out of 210 pregnant women (mean age =23±5.3 for geophagic and 25.6±5.3 for non-geophagic), 51.4% (n = 108) had iron deficiency anaemia (50.9% geophagic and 49.1% non-geophagic). After adjusting for confounders, only geophagia (OR=2.1 95% CI 1.1-4.2; P=0.029) and mean corpuscular haemoglobin concentration categories (< 30.5 g/dL with OR=16.6 95% CI 6.8-40.2; P < 0.0001; 30.5-31.5 g/dL with OR=2.9 95% CI 1.4-6.1; P=0.006; and ≥ 31.5 g/dL with OR=1) were identified as the most important significant and independent determinants of iron deficiency anaemia. Conclusion: The study results point to the potential harm geophagia can cause in pregnant women. The prevalence of iron deficiency anaemia is unacceptably high. Geophagic behaviour, low MCHC presented as particular risk factors of iron deficiency anaemia in this study. Education and counselling about appropriate diet during pregnancy and prevention of geophagic behaviour (and health consequences) are needed among pregnant Xhosa women.

Keywords: geophagia, pregnancy, iron deficiency anaemia, Xhosa

Procedia PDF Downloads 367
6931 A Novel Microcontroller Based Islanding Protection of Distributed Generation Systems

Authors: Saeid Jalilzadeh, Majid Pakdel

Abstract:

The customer demand for better power quality and higher reliability has forced the power industry to use distributed generations (DGs) such as wind power and photo voltaic arrays. Islanding is a phenomenon occurs when a power grid becomes electrically isolated from the power system and the distribution system is energized by distributed generators. It is necessary to disconnect all distributed generators immediately after islanding occurrence. Therefore a DG system should have the capability to detect islanding phenomena. In this paper, a novel micro controller based relay for anti-islanding protection of a typical DG system is proposed. The simulation results using Proteus software verify the proper operation and effectiveness of the proposed protective relay.

Keywords: islanding, distributed generation (DG), protective relay, micro controller, proteus software

Procedia PDF Downloads 563
6930 Calculating Collision Risk Exposures and Risk Probabilities at Container Terminals

Authors: Mohammad Ali Hasanzadeh, Thierry Vanelslander, Eddy Van De Voorde

Abstract:

Nowadays maritime transport is a key element in international trade and global supply chain. Economies of scale in transporting goods are one of the most attractive elements of using ships. Without maritime transport, almost no globalization of economics can be imagined. Within maritime transport, ports are the interface between lands and see. Even though using ships help cargo owners to have a competitive margin but an accident in port during loading or unloading or even moving cargoes within the terminal can diminish such margin. Statistics shows that due to the high-speed notion of activities within ports, collision accidents are the most common type of accidents. To mitigate such accidents, the appropriate risk exposures have to be defined and calculate, later on risk probabilities can be determined for each type of accident, i.e. fatal, severe, moderate and minor ones. Having such risk probabilities help managers to define the effectiveness of each collision risk control option. This research defined travelled distance as main collision risk exposure in container terminals, taking all the related items into consideration, it was calculated for Shahid Rajae container terminals. Following this finding, collision risk probabilities were computed.

Keywords: collision accident, container terminal, maritime transport, risk exposure

Procedia PDF Downloads 379
6929 [Keynote] Implementation of Quality Control Procedures in Radiotherapy CT Simulator

Authors: B. Petrović, L. Rutonjski, M. Baucal, M. Teodorović, O. Čudić, B. Basarić

Abstract:

Purpose/Objective: Radiotherapy treatment planning requires use of CT simulator, in order to acquire CT images. The overall performance of CT simulator determines the quality of radiotherapy treatment plan, and at the end, the outcome of treatment for every single patient. Therefore, it is strongly advised by international recommendations, to set up a quality control procedures for every machine involved in radiotherapy treatment planning process, including the CT scanner/ simulator. The overall process requires number of tests, which are used on daily, weekly, monthly or yearly basis, depending on the feature tested. Materials/Methods: Two phantoms were used: a dedicated phantom CIRS 062QA, and a QA phantom obtained with the CT simulator. The examined CT simulator was Siemens Somatom Definition as Open, dedicated for radiation therapy treatment planning. The CT simulator has a built in software, which enables fast and simple evaluation of CT QA parameters, using the phantom provided with the CT simulator. On the other hand, recommendations contain additional test, which were done with the CIRS phantom. Also, legislation on ionizing radiation protection requires CT testing in defined periods of time. Taking into account the requirements of law, built in tests of a CT simulator, and international recommendations, the intitutional QC programme for CT imulator is defined, and implemented. Results: The CT simulator parameters evaluated through the study were following: CT number accuracy, field uniformity, complete CT to ED conversion curve, spatial and contrast resolution, image noise, slice thickness, and patient table stability.The following limits are established and implemented: CT number accuracy limits are +/- 5 HU of the value at the comissioning. Field uniformity: +/- 10 HU in selected ROIs. Complete CT to ED curve for each tube voltage must comply with the curve obtained at comissioning, with deviations of not more than 5%. Spatial and contrast resultion tests must comply with the tests obtained at comissioning, otherwise machine requires service. Result of image noise test must fall within the limit of 20% difference of the base value. Slice thickness must meet manufacturer specifications, and patient stability with longitudinal transfer of loaded table must not differ of more than 2mm vertical deviation. Conclusion: The implemented QA tests gave overall basic understanding of CT simulator functionality and its clinical effectiveness in radiation treatment planning. The legal requirement to the clinic is to set up it’s own QA programme, with minimum testing, but it remains user’s decision whether additional testing, as recommended by international organizations, will be implemented, so to improve the overall quality of radiation treatment planning procedure, as the CT image quality used for radiation treatment planning, influences the delineation of a tumor and calculation accuracy of treatment planning system, and finally delivery of radiation treatment to a patient.

Keywords: CT simulator, radiotherapy, quality control, QA programme

Procedia PDF Downloads 519
6928 Presenting an Integrated Framework for the Introduction and Evaluation of Social Media in Enterprises

Authors: Gerhard Peter

Abstract:

In this paper, we present an integrated framework that governs the introduction of social media into enterprises and its evaluation. It is argued that the framework should address the following issues: (1) the contribution of social media for increasing efficiency and improving the quality of working life; (2) the level on which this contribution happens (i.e., individual, team, or organisation); (3) a description of the processes for implementing and evaluating social media; and the role of (4) organisational culture and (5) management. We also report the results of a case study where the framework has been employed to introduce a social networking platform at a German enterprise. This paper only considers the internal use of social media.

Keywords: case study, enterprise 2.0, framework, introducing and evaluating social media, social media

Procedia PDF Downloads 351
6927 The Assessment of the Comparative Efficiency of Reforms through the Integral Index of Transformation

Authors: Samson Davoyan, Ashot Davoyan, Ani Khachatryan

Abstract:

The indexes (Global Competitiveness Index, Economic Freedom Index, Human Development Index, etc.) developed by different international and non-government organizations in time and space express the quantitative and qualitative features of different fields of various reforms implemented in different countries. The main objective of our research is to develop new methodology that we will use to create integral index based on many indexes and that will include many areas of reforms. To achieve our aim we have used econometric methods (regression model for panel data method). The basis of our methodology is the development of the new integral index based on quantitative assessment of the change of two main parameters: the score of the countries by different indexes and the change of the ranks of countries for following two periods of time. As a result of the usage of methods for analyzes we have defined the indexes that are used to create the new integral index and the scales for each of them. Analyzing quantitatively and qualitatively analysis through the integral index for more than 100 countries for 2009-2014, we have defined comparative efficiency that helps to conclude in which directions countries have implemented reforms more effectively compared to others and in which direction reforms have implemented less efficiently.

Keywords: development, rank, reforms, comparative, index, economic, corruption, social, program

Procedia PDF Downloads 320
6926 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management

Authors: Jiří Barta

Abstract:

The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.

Keywords: Computer Simulation, Symos97, Spread, Simulation Software, Harmful Substances

Procedia PDF Downloads 280
6925 Religious Tourism the Core Strategy of Shaping Life Style: Evidences from Iran

Authors: Mostafa Jafari

Abstract:

Religious tourism is the core strategy of shaping Iranian's life-style. Why and How? This paper answers to this question. Theoretical base: From strategic marketing point of view, Life style is pattern of believes values, interests and acts. Strategy can be defined as a set of continuous important decisions. Here, strategy is making decisions about the target place and vehicle of touristic travel due to reform and redefine the self-identity and shaping life style. Methodology: Target society of this research is the selected residents of three provinces at northwest of Iran. The data collection instrument is interview and questionnaire and the collected data analysis by SEM (structural Equation Modeling) and LISREL software. Results: The primary results show that variety of touristic travels play an important role on shaping new life style of Iranian people. The target places of touristic travel (Europe, USA. Japan and etc.) are at the second priority. The number of foreign friends is at the third position. The fourth criteria are the number of travels. Among all kind of touristic travels the religious tourism from competitive point of view plays the main role. Findings: The geometry of Iranian life style are shaping and reshaping through some domestic and international tourism strategies particular religious strategy. During the dynamic trend of identity redefine, so many Iranians put the quantity and quality of their touristic travel on the first priority.

Keywords: religious tourism, core strategy, shaping life style

Procedia PDF Downloads 406
6924 Analysis of Solar Thermal Power Plant in Algeria

Authors: M. Laissaoui

Abstract:

The present work has for objective the simulation of a hybrid solar combined cycle power plant, compared with combined cycle conventional (gas turbine and steam turbine), this type of power plants disposed an solar tour (heliostat field and volumetric receiver) insurant a part of the thermal energy necessary for the functioning of the gas turbine. This solar energy serves to feed with heat the combustion air of the gas turbine when he out of the compressor and the front entered the combustion chamber. The simulation of even central and made for three zones deferential to know the zone of Hassi R' mel, Bechare, and the zone of Messaad wilaya of El djelfa. The radiometric and meteorological data arise directly from the software meteonorme 7. The simulation of the energy performances is made by the software TRNSYS 16.1.

Keywords: concentrating solar power, heliostat, thermal, Algeria

Procedia PDF Downloads 462
6923 Constitutive Model for Analysis of Long-Term Municipal Solid Waste Landfill Settlement

Authors: Irena Basaric Ikodinovic, Dragoslav Rakic, Mirjana Vukicevic, Sanja Jockovic, Jovana Jankovic Pantic

Abstract:

Large long-term settlement occurs at the municipal solid waste landfills over an extended period of time which may lead to breakage of the geomembrane, damage of the cover systems, other protective systems or facilities constructed on top of a landfill. Also, municipal solid waste is an extremely heterogeneous material and its properties vary over location and time within a landfill. These material characteristics require the formulation of a new constitutive model to predict the long-term settlement of municipal solid waste. The paper presents a new constitutive model which is formulated to describe the mechanical behavior of municipal solid waste. Model is based on Modified Cam Clay model and the critical state soil mechanics framework incorporating time-dependent components: mechanical creep and biodegradation of municipal solid waste. The formulated constitutive model is optimized and defined with eight input parameters: five Modified Cam Clay parameters, one parameter for mechanical creep and two parameters for biodegradation of municipal solid waste. Thereafter, the constitutive model is implemented in the software suite for finite element analysis (ABAQUS) and numerical analysis of the experimental landfill settlement is performed. The proposed model predicts the total settlement which is in good agreement with field measured settlement at the experimental landfill.

Keywords: constitutive model, finite element analysis, municipal solid waste, settlement

Procedia PDF Downloads 218
6922 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 119
6921 Ventilator Associated Pneumonia in a Medical Intensive Care Unit, Incidence and Risk Factors: A Case Control Study

Authors: Ammar Asma, Bouafia Nabiha, Ben Cheikh Asma, Ezzi Olfa, Mahjoub Mohamed, Sma Nesrine, Chouchène Imed, Boussarsar Hamadi, Njah Mansour

Abstract:

Background: Ventilator-associated pneumonia (VAP) is currently recognized as one of the most relevant causes of morbidity and mortality among intensive care unit (ICU) patients worldwide. Identifying modifiable risk factors for VAP could be helpful for future controlled interventional studies aiming at improving prevention of VAP. The purposes of this study were to determine the incidence and risk factors for VAP in in a Tunisian medical ICU. Materials / Methods: A retrospective case-control study design based on the prospective database collected over a 14-month period from September 15th, 2015 through November 15th, 2016 in an 8-bed medical ICU. Patients under ventilation for over 48 h were included. The number of cases was estimated by Epi-info Software with the power of statistical test equal to 90 %. Each case patient was successfully matched to two controls according to the length of mechanical ventilation (MV) before VAP for cases and the total length of MV in controls. VAP in the ICU was defined according to American Thoracic Society; Infectious Diseases Society of America guidelines. Early onset or late-onset VAP were defined whether the infectious process occurred within or after 96 h of ICU admission. Patients’ risk factors, causes of admission, comorbidities and respiratory specimens collected were reviewed. Univariate and multivariate analyses were performed to determine variables associated with VAP with a p-value < 0.05. Results: During the period study, a total of 169 patients under mechanical ventilation were considered, 34 patients (20.11%) developed at least one episode of VAP in the ICU. The incidence rate for VAP was 14.88/1000 ventilation days. Among these cases, 9 (26.5 %) were early-onset VAP and 25 (73.5 %) were late-onset VAP. It was a certain diagnosis in 66.7% of cases. Tracheal aspiration was positive in 80% of cases. Multi-drug resistant Acinerobacter baumanii was the most common species detected in cases; 67.64% (n=23). The rate of mortality out of cases was 88.23% (n= 30). In univariate analysis, the patients with VAP were statistically more likely to suffer from cardiovascular diseases (p=0.035) and prolonged duration of sedation (p=0.009) and tracheostomy (p=0.001), they also had a higher number of re-intubation (p=0.017) and a longer total time of intubation (p=0.012). Multivariate analysis showed that cardiovascular diseases (OR= 4.44; 95% IC= [1.3 - 14]; p=0.016), tracheostomy (OR= 4.2; 95% IC= [1.16 -15.12]; p= 0.028) and prolonged duration of sedation (OR=1.21; 95% IC= [1.07, 1.36]; p=0.002) were independent risk factors for the development of VAP. Conclusion: VAP constitutes a therapeutic challenge in an ICU setting, therefore; strategies that effectively prevent VAP are needed. An infection control-training program intended to all professional heath care in this unit insisting on bundles and elaboration of procedures are planned to reduce effectively incidence rate of VAP.

Keywords: case control study, intensive care unit, risk factors, ventilator associated pneumonia

Procedia PDF Downloads 387
6920 Requirements Management in Agile

Authors: Ravneet Kaur

Abstract:

The concept of Agile Requirements Engineering and Management is not new. However, the struggle to figure out how traditional Requirements Management Process fits within an Agile framework remains complex. This paper talks about a process that can merge the organization’s traditional Requirements Management Process nicely into the Agile Software Development Process. This process provides Traceability of the Product Backlog to the external documents on one hand and User Stories on the other hand. It also gives sufficient evidence that the system will deliver the right functionality with good quality in the form of various statistics and reports. In the nutshell, by overlaying a process on top of Agile, without disturbing the Agility, we are able to get synergic benefits in terms of productivity, profitability, its reporting, and end to end visibility to all Stakeholders. The framework can be used for just-in-time requirements definition or to build a repository of requirements for future use. The goal is to make sure that the business (specifically, the product owner) can clearly articulate what needs to be built and define what is of high quality. To accomplish this, the requirements cycle follows a Scrum-like process that mirrors the development cycle but stays two to three steps ahead. The goal is to create a process by which requirements can be thoroughly vetted, organized, and communicated in a manner that is iterative, timely, and quality-focused. Agile is quickly becoming the most popular way of developing software because it fosters continuous improvement, time-boxed development cycles, and more quickly delivering value to the end users. That value will be driven to a large extent by the quality and clarity of requirements that feed the software development process. An agile, lean, and timely approach to requirements as the starting point will help to ensure that the process is optimized.

Keywords: requirements management, Agile

Procedia PDF Downloads 360