Search results for: visual management
3309 Knowledge Decision of Food Waste and Loss Reduction in Supply Chain System: A Case Study of Kingdom of Saudi Arabia
Authors: Nadia Adnan, Muhammad Mohsin Raza, Latha Ravindran
Abstract:
Based on the principles above, the study presents an economic model of food waste for consumers, intermediaries, and producers. We discriminate between purchasing and selling, purchases versus customers consumption, and gross output versus sales for each intermediary. To compensate for waste at each level of the supply chain, agents must charge higher sales prices. The research model can produce more accurate predictions about how actions (public regulations or private efforts) to reduce food waste impact markets, including indirect (cascading) effects. With a formal model, researchers demonstrate the uniqueness of these interaction effects and simulate an empirical model calibrated to market characteristics and waste rates in Saudi Arabia. Researchers demonstrate that the effects of waste reduction differ per commodity, depending on supply and demand elasticities, degree of openness to international commerce, and the beginning rates of food loss and waste at each level of the value chain. Because of the consequential effects related to the supply chain, initiatives to minimize food waste will be strengthened in some circumstances and partially countered in others.Keywords: food loss, food waste, supply chain management, Saudi Arabia, food supply
Procedia PDF Downloads 1063308 Waste Management in a Hot Laboratory of Japan Atomic Energy Agency – 3: Volume Reduction and Stabilization of Solid Waste
Authors: Masaumi Nakahara, Sou Watanabe, Hiromichi Ogi, Atsuhiro Shibata, Kazunori Nomura
Abstract:
In the Japan Atomic Energy Agency, three types of experimental research, advanced reactor fuel reprocessing, radioactive waste disposal, and nuclear fuel cycle technology, have been carried out at the Chemical Processing Facility. The facility has generated high level radioactive liquid and solid wastes in hot cells. The high level radioactive solid waste is divided into three main categories, a flammable waste, a non-flammable waste, and a solid reagent waste. A plastic product is categorized into the flammable waste and molten with a heating mantle. The non-flammable waste is cut with a band saw machine for reducing the volume. Among the solid reagent waste, a used adsorbent after the experiments is heated, and an extractant is decomposed for its stabilization. All high level radioactive solid wastes in the hot cells are packed in a high level radioactive solid waste can. The high level radioactive solid waste can is transported to the 2nd High Active Solid Waste Storage in the Tokai Reprocessing Plant in the Japan Atomic Energy Agency.Keywords: high level radioactive solid waste, advanced reactor fuel reprocessing, radioactive waste disposal, nuclear fuel cycle technology
Procedia PDF Downloads 1553307 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1903306 A Cohort Study of Early Cardiologist Consultation by Telemedicine on the Critical Non-STEMI Inpatients
Authors: Wisit Wichitkosoom
Abstract:
Objectives: To find out the more effect of early cardiologist consultation using a simple technology on the diagnosis and early proper management of patients with Non-STEMI at emergency department of district hospitals without cardiologist on site before transferred. Methods: A cohort study was performed in Udonthani general hospital at Udonthani province. From 1 October 2012–30 September 2013 with 892 patients diagnosed with Non-STEMI. All patients mean aged 46.8 years of age who had been transferred because of Non-STEMI diagnosed, over a 12 week period of studied. Patients whose transferred, in addition to receiving proper care, were offered a cardiologist consultation with average time to Udonthani hospital 1.5 hour. The main outcome measure was length of hospital stay, mortality at 3 months, inpatient investigation, and transfer rate to the higher facilitated hospital were also studied. Results: Hospital stay was significantly shorter for those didn’t consult cardiologist (hazard ratio 1.19; approximate 95% CI 1.001 to 1.251; p = 0.039). The 136 cases were transferred to higher facilitated hospital. No statistically significant in overall mortality between the groups (p=0.068). Conclusions: Early cardiologist consultant can reduce length of hospital stay for patients with cardiovascular conditions outside of cardiac center. The new basic technology can apply for the safety patient.Keywords: critical, telemedicine, safety, non STEMI
Procedia PDF Downloads 4173305 Developing the P1-P7 Management and Analysis Software for Thai Child Evaluation (TCE) of Food and Nutrition Status
Authors: S. Damapong, C. Kingkeow, W. Kongnoo, P. Pattapokin, S. Pruenglamphu
Abstract:
As the presence of Thai children double burden malnutrition, we conducted a project to promote holistic age-appropriate nutrition for Thai children. Researchers developed P1-P7 computer software for managing and analyzing diverse types of collected data. The study objectives were: i) to use software to manage and analyze the collected data, ii) to evaluate the children nutritional status and their caretakers’ nutrition practice to create regulations for improving nutrition. Data were collected by means of questionnaires, called P1-P7. P1, P2 and P5 were for children and caretakers, and others were for institutions. The children nutritional status, height-for-age, weight-for-age, and weight-for-height standards were calculated using Thai child z-score references. Institution evaluations consisted of various standard regulations including the use of our software. The results showed that the software was used in 44 out of 118 communities (37.3%), 57 out of 240 child development centers and nurseries (23.8%), and 105 out of 152 schools (69.1%). No major problems have been reported with the software, although user efficiency can be increased further through additional training. As the result, the P1-P7 software was used to manage and analyze nutritional status, nutrition behavior, and environmental conditions, in order to conduct Thai Child Evaluation (TCE). The software was most widely used in schools. Some aspects of P1-P7’s questionnaires could be modified to increase ease of use and efficiency.Keywords: P1-P7 software, Thai child evaluation, nutritional status, malnutrition
Procedia PDF Downloads 3553304 Water Education in the Middle East: Case Study of Iran and Turkey
Authors: Seyedeh Zahra Seyed Sharifi, M. R. M. Tabatabaei
Abstract:
Due to increase of population and healthy food demand, management and conservation of water resources have become one of the main concerns of governments, scientists and economists. In recent years, Iran has exposed to water scarcity as a result of which its rivers, lakes and wetlands have dried up or are in the drying process. Therefore, water crisis has become the most important environmental issue in the country. Under these circumstances, increasing public awareness by promoting their culture as well as public collaboration to protect water resources could only be possible by making courses to reflect water importance. This could be approached by school and high-school students to learn optimum use of water resources. This study initially focuses on the current position of water courses in levels of school and high-school educations in Iran and Turkey and then deals with the challenges to be faced for the promotion of the system. The course titles and number of pages related to water in all primary and secondary textbooks of the education system of Iran and Turkey were determined using content analysis method and the results were presented. The results indicate that primary and secondary textbooks in both countries must focus on water shortage and water protection and teach children the optimum use of water in order to promote water protection.Keywords: educational system, environmental awareness, Iran, Turkey, water crisis
Procedia PDF Downloads 3053303 Financing from Customers for SMEs and Managing Financial Risks: The Role of Customer Relationships
Authors: Yongsheng Guo, Mengyu Lu
Abstract:
This study investigates how Chinese SMEs manage financial risks in financing from customers from the perspectives of ethics and national culture. A grounded theory approach is adopted to identify the causal conditions, actions/interactions, and consequences. 32 interviews were conducted, and systematic coding methods were used to identify themes and categories. This study found that Chinese ethical principles, including integrity, friendship, and reciprocity, and cultural traits, including collectivism, acquaintance society, and long-term orientation, provide conditions for financing from customers. The SMEs establish trust-based relationships with customers through personal communications and social networks and reduce financial risk through diversification, frequent operations, and enterprise reputations. Both customers and SMEs can get benefits like financial resources and customer experiences. This study creates a theoretical framework that connects the causal conditions, processes, and outcomes, providing a deeper understanding of financing from customers. A resource and process capability theory of SMEs and a customer capital and customer value model are proposed to connect accounting and finance concepts. Suggestions are proposed for the authorities as more guidance and regulations are needed for this informal finance.Keywords: CRM, culture, ethics, SME, risk management
Procedia PDF Downloads 433302 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques
Authors: Pranjali Avinash Yadav-Deshmukh
Abstract:
Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction
Procedia PDF Downloads 3843301 Earthquake Vulnerability and Repair Cost Estimation of Masonry Buildings in the Old City Center of Annaba, Algeria
Authors: Allaeddine Athmani, Abdelhacine Gouasmia, Tiago Ferreira, Romeu Vicente
Abstract:
The seismic risk mitigation from the perspective of the old buildings stock is truly essential in Algerian urban areas, particularly those located in seismic prone regions, such as Annaba city, and which the old buildings present high levels of degradation associated with no seismic strengthening and/or rehabilitation concerns. In this sense, the present paper approaches the issue of the seismic vulnerability assessment of old masonry building stocks through the adaptation of a simplified methodology developed for a European context area similar to that of Annaba city, Algeria. Therefore, this method is used for the first level of seismic vulnerability assessment of the masonry buildings stock of the old city center of Annaba. This methodology is based on a vulnerability index that is suitable for the evaluation of damage and for the creation of large-scale loss scenarios. Over 380 buildings were evaluated in accordance with the referred methodology and the results obtained were then integrated into a Geographical Information System (GIS) tool. Such results can be used by the Annaba city council for supporting management decisions, based on a global view of the site under analysis, which led to more accurate and faster decisions for the risk mitigation strategies and rehabilitation plans.Keywords: Damage scenarios, masonry buildings, old city center, seismic vulnerability, vulnerability index
Procedia PDF Downloads 4503300 The Moderation Effect of Smart Phone Addiction in Relationship between Self-Leadership and Innovative Behavior
Authors: Gi-Ryun Park, Gye-Wan Moon, Dong-Hoon Yang
Abstract:
This study aims to explore the positive effects of self-leadership and innovative behavior that'd been proven in the existing researches proactively and understand the regulation effects of smartphone addiction which has recently become an issue in Korea. This study conducted a convenient sampling of college students attending the four colleges located at Daegu. A total of 210 questionnaires in 5-point Likert scale were distributed to college students. Among which, a total of 200 questionnaires were collected for our final analysis data. Both correlation analysis and regression analysis were carried out to verify those questionnaires through SPSS 20.0. As a result, college students' self-leadership had a significantly positive impact on innovative behavior (B= .210, P= .003). In addition, it is found that the relationship between self-leadership and innovative behavior can be adjusted depending on the degree of smartphone addiction in college students (B= .264, P= .000). This study could first understand the negative effects of smartphone addiction and find that if students' self-leadership is improved in terms of self-management and unnecessary use of smartphone is controlled properly, innovative behavior can be improved. In addition, this study is significant in that it attempts to identify a new impact of smartphone addiction with the recent environmental changes, unlike the existing researches that'd been carried out from the perspective of organizational behavior theory.Keywords: innovative behavior, revolutionary behavior, self-leadership, smartphone addiction
Procedia PDF Downloads 2583299 Analysis of the Impact of Climate Change on Maize (Zea Mays) Yield in Central Ethiopia
Authors: Takele Nemomsa, Girma Mamo, Tesfaye Balemi
Abstract:
Climate change refers to a change in the state of the climate that can be identified (e.g. using statistical tests) by changes in the mean and/or variance of its properties and that persists for an extended period, typically decades or longer. In Ethiopia; Maize production in relation to climate change at regional and sub- regional scales have not been studied in detail. Thus, this study was aimed to analyse the impact of climate change on maize yield in Ambo Districts, Central Ethiopia. To this effect, weather data, soil data and maize experimental data for Arganne hybrid were used. APSIM software was used to investigate the response of maize (Zea mays) yield to different agronomic management practices using current and future (2020s–2080s) climate data. The climate change projections data which were downscaled using SDSM were used as input of climate data for the impact analysis. Compared to agronomic practices the impact of climate change on Arganne in Central Ethiopia is minute. However, within 2020s-2080s in Ambo area; the yield of Arganne hybrid is projected to reduce by 1.06% to 2.02%, and in 2050s it is projected to reduce by 1.56 While in 2080s; it is projected to increase by 1.03% to 2.07%. Thus, to adapt to the changing climate; farmers should consider increasing plant density and fertilizer rate per hectare.Keywords: APSIM, downscaling, response, SDSM
Procedia PDF Downloads 3803298 Explanation Conceptual Model of the Architectural Form Effect on Structures in Building Aesthetics
Authors: Fatemeh Nejati, Farah Habib, Sayeh Goudarzi
Abstract:
Architecture and structure have always been closely interrelated so that they should be integrated into a unified, coherent and beautiful universe, while in the contemporary era, both structures and architecture proceed separately. The purpose of architecture is the art of creating form and space and order for human service, and the goal of the structural engineer is the transfer of loads to the structure, too. This research seeks to achieve the goal by looking at the relationship between the form of architecture and structure from its inception to the present day to the Global Identification and Management Plan. Finally, by identifying the main components of the design of the structure in interaction with the architectural form, an effective step is conducted in the Professional training direction and solutions to professionals. Therefore, after reviewing the evolution of structural and architectural coordination in various historical periods as well as how to reach the form of the structure in different times and places, components are required to test the components and present the final theory that one hundred to be tested in this regard. Finally, this research indicates the fact that the form of architecture and structure has an aesthetic link, which is influenced by a number of components that could be edited and has a regular order throughout history that could be regular. The research methodology is analytic, and it is comparative using analytical and matrix diagrams and diagrams and tools for conducting library research and interviewing.Keywords: architecture, structural form, structural and architectural coordination, effective components, aesthetics
Procedia PDF Downloads 2153297 Students’ Level of Knowledge Construction and Pattern of Social Interaction in an Online Forum
Authors: K. Durairaj, I. N. Umar
Abstract:
The asynchronous discussion forum is one of the most widely used activities in learning management system environment. Online forum allows participants to interact, construct knowledge, and can be used to complement face to face sessions in blended learning courses. However, to what extent do the students perceive the benefits or advantages of forum remain to be seen. Through content and social network analyses, instructors will be able to gauge the students’ engagement and knowledge construction level. Thus, this study aims to analyze the students’ level of knowledge construction and their participation level that occur through online discussion. It also attempts to investigate the relationship between the level of knowledge construction and their social interaction patterns. The sample involves 23 students undertaking a master course in one public university in Malaysia. The asynchronous discussion forum was conducted for three weeks as part of the course requirement. The finding indicates that the level of knowledge construction is quite low. Also, the density value of 0.11 indicating that the overall communication among the participants in the forum is low. This study reveals that strong and significant correlations between SNA measures (in-degree centrality, out-degree centrality) and level of knowledge construction. Thus, allocating these active students in a different groups aids the interactive discussion takes place. Finally, based upon the findings, some recommendations to increase students’ level of knowledge construction and also for further research are proposed.Keywords: asynchronous discussion forums, content analysis, knowledge construction, social network analysis
Procedia PDF Downloads 3733296 MhAGCN: Multi-Head Attention Graph Convolutional Network for Web Services Classification
Authors: Bing Li, Zhi Li, Yilong Yang
Abstract:
Web classification can promote the quality of service discovery and management in the service repository. It is widely used to locate developers desired services. Although traditional classification methods based on supervised learning models can achieve classification tasks, developers need to manually mark web services, and the quality of these tags may not be enough to establish an accurate classifier for service classification. With the doubling of the number of web services, the manual tagging method has become unrealistic. In recent years, the attention mechanism has made remarkable progress in the field of deep learning, and its huge potential has been fully demonstrated in various fields. This paper designs a multi-head attention graph convolutional network (MHAGCN) service classification method, which can assign different weights to the neighborhood nodes without complicated matrix operations or relying on understanding the entire graph structure. The framework combines the advantages of the attention mechanism and graph convolutional neural network. It can classify web services through automatic feature extraction. The comprehensive experimental results on a real dataset not only show the superior performance of the proposed model over the existing models but also demonstrate its potentially good interpretability for graph analysis.Keywords: attention mechanism, graph convolutional network, interpretability, service classification, service discovery
Procedia PDF Downloads 1333295 Spatio-Temporal Data Mining with Association Rules for Lake Van
Authors: Tolga Aydin, M. Fatih Alaeddinoğlu
Abstract:
People, throughout the history, have made estimates and inferences about the future by using their past experiences. Developing information technologies and the improvements in the database management systems make it possible to extract useful information from knowledge in hand for the strategic decisions. Therefore, different methods have been developed. Data mining by association rules learning is one of such methods. Apriori algorithm, one of the well-known association rules learning algorithms, is not commonly used in spatio-temporal data sets. However, it is possible to embed time and space features into the data sets and make Apriori algorithm a suitable data mining technique for learning spatio-temporal association rules. Lake Van, the largest lake of Turkey, is a closed basin. This feature causes the volume of the lake to increase or decrease as a result of change in water amount it holds. In this study, evaporation, humidity, lake altitude, amount of rainfall and temperature parameters recorded in Lake Van region throughout the years are used by the Apriori algorithm and a spatio-temporal data mining application is developed to identify overflows and newly-formed soil regions (underflows) occurring in the coastal parts of Lake Van. Identifying possible reasons of overflows and underflows may be used to alert the experts to take precautions and make the necessary investments.Keywords: apriori algorithm, association rules, data mining, spatio-temporal data
Procedia PDF Downloads 3723294 Study of Some Biological Profiles as Limiting Factors of Male Fertility in the Region of Batna, Algeria
Authors: Bousnane Nour El Houda, Chennaf Ali, Yahia Mouloud, Benbia Souhila
Abstract:
Male infertility or the inability of a man to procreate is a major public health problem, where it is a leading cause of marital discord in several countries such Algeria. The objective of this work is to study some biological profiles of infertile men from the city of Batna/Algeria and to identify the causes of infertility in a population of infertile males to improve its management and to establish a good therapeutic strategy through a study that lasted 10 months in the Department of Urology of the University Hospital of Banta and on a population of 140 infertile subjects. For every man, series of assessments was performed to determine the exact causes of infertility. We found 102 cases of primary infertility against 38 cases of secondary infertility; the average age of men was 39.7 years, with a predominance of the age group (46-50 years). 34.29% of subjects had genital infections against 17.14% with varicocele. 132 men presented spermiologiques abnormalities; a asthénospermie (AS) in 27.27% of the cases, astheno-terato spermiea (OATS) 11.36% while Azoospermes showed 5.07%. Genital infections are the main causes of infertility (34.29%) of the cases. The results of spermocytogramme showed a predominance of head abnormalities (41.70%), while the flagellum abnormalities presented 33.83%. The dosage of the seminal plasma carnitine showed no pathological cases, which makes it difficult to know their association with infertility. By against some disturbances Fructose and Zinc have been reported.Keywords: male infertility, spermogramme, spermocytogramme, biological profils
Procedia PDF Downloads 3293293 Monitoring Public Transportation in Developing Countries Using Automatic Vehicle Location System: A Case Study
Authors: Ahmed Osama, Hassan A. Mahdy, Khalid A. Kandil, Mohamed Elhabiby
Abstract:
Automatic Vehicle Location systems (AVL) have been used worldwide for more than twenty years and have showed great success in public transportation management and monitoring. Cairo public bus service suffers from several problems such as unscheduled stops, unscheduled route deviations, and inaccurate schedules, which have negative impacts on service reliability. This research aims to study those problems for a selected bus route in Cairo using a prototype AVL system. Experimental trips were run on the selected route; and the locations of unscheduled stops, regions of unscheduled deviations, along with other trip time and speed data were collected. Data was analyzed to demonstrate the reliability of passengers on the unscheduled stops compared to the scheduled ones. Trip time was also modeled to assess the unscheduled stops’ impact on trip time, and to check the accuracy of the applied scheduled trip time. Moreover, frequency and length of the unscheduled route deviations, as well as their impact on the bus stops, were illustrated. Solutions were proposed for the bus service deficiencies using the AVL system. Finally, recommendations were proposed for further research.Keywords: automatic vehicle location, public transportation, unscheduled stops, unscheduled route deviations, inaccurate schedule
Procedia PDF Downloads 3883292 Rating the Importance of Customer Requirements for Green Product Using Analytic Hierarchy Process Methodology
Authors: Lara F. Horani, Shurong Tong
Abstract:
Identification of customer requirements and their preferences are the starting points in the process of product design. Most of design methodologies focus on traditional requirements. But in the previous decade, the green products and the environment requirements have increasingly attracted the attention with the constant increase in the level of consumer awareness towards environmental problems (such as green-house effect, global warming, pollution and energy crisis, and waste management). Determining the importance weights for the customer requirements is an essential and crucial process. This paper used the analytic hierarchy process (AHP) approach to evaluate and rate the customer requirements for green products. With respect to the ultimate goal of customer satisfaction, surveys are conducted using a five-point scale analysis. With the help of this scale, one can derive the weight vectors. This approach can improve the imprecise ranking of customer requirements inherited from studies based on the conventional AHP. Furthermore, the AHP with extent analysis is simple and easy to implement to prioritize customer requirements. The research is based on collected data through a questionnaire survey conducted over a sample of 160 people belonging to different age, marital status, education and income groups in order to identify the customer preferences for green product requirements.Keywords: analytic hierarchy process (AHP), green product, customer requirements for green design, importance weights for the customer requirements
Procedia PDF Downloads 2413291 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems
Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana
Abstract:
The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.Keywords: mitigations, risk, transport, security, vulnerabilities
Procedia PDF Downloads 1653290 Internet of Things Edge Device Power Modelling and Optimization Simulator
Authors: Cian O'Shea, Ross O'Halloran, Peter Haigh
Abstract:
Wireless Sensor Networks (WSN) are Internet of Things (IoT) edge devices. They are becoming widely adopted in many industries, including health care, building energy management, and conditional monitoring. As the scale of WSN deployments increases, the cost and complexity of battery replacement and disposal become more significant and in time may become a barrier to adoption. Harvesting ambient energies provide a pathway to reducing dependence on batteries and in the future may lead to autonomously powered sensors. This work describes a simulation tool that enables the user to predict the battery life of a wireless sensor that utilizes energy harvesting to supplement the battery power. To create this simulator, all aspects of a typical WSN edge device were modelled including, sensors, transceiver, and microcontroller as well as the energy source components (batteries, solar cells, thermoelectric generators (TEG), supercapacitors and DC/DC converters). The tool allows the user to plug and play different pre characterized devices as well as add user-defined devices. The goal of this simulation tool is to predict the lifetime of a device and scope for extension using ambient energy sources.Keywords: Wireless Sensor Network, IoT, edge device, simulation, solar cells, TEG, supercapacitor, energy harvesting
Procedia PDF Downloads 1303289 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6
Authors: M. Moslehpour, S. Khorsandi
Abstract:
Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing
Procedia PDF Downloads 2773288 Applying of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Estimation of Flood Hydrographs
Authors: Amir Ahmad Dehghani, Morteza Nabizadeh
Abstract:
This paper presents the application of an Adaptive Neuro-Fuzzy Inference System (ANFIS) to flood hydrograph modeling of Shahid Rajaee reservoir dam located in Iran. This was carried out using 11 flood hydrographs recorded in Tajan river gauging station. From this dataset, 9 flood hydrographs were chosen to train the model and 2 flood hydrographs to test the model. The different architectures of neuro-fuzzy model according to the membership function and learning algorithm were designed and trained with different epochs. The results were evaluated in comparison with the observed hydrographs and the best structure of model was chosen according the least RMSE in each performance. To evaluate the efficiency of neuro-fuzzy model, various statistical indices such as Nash-Sutcliff and flood peak discharge error criteria were calculated. In this simulation, the coordinates of a flood hydrograph including peak discharge were estimated using the discharge values occurred in the earlier time steps as input values to the neuro-fuzzy model. These results indicate the satisfactory efficiency of neuro-fuzzy model for flood simulating. This performance of the model demonstrates the suitability of the implemented approach to flood management projects.Keywords: adaptive neuro-fuzzy inference system, flood hydrograph, hybrid learning algorithm, Shahid Rajaee reservoir dam
Procedia PDF Downloads 4773287 Bystanders' Behavior during Emergencies
Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport
Abstract:
The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping
Procedia PDF Downloads 1213286 Current Status of Ir-192 Brachytherapy in Bangladesh
Authors: M. Safiqul Islam, Md Arafat Hossain Sarkar
Abstract:
Brachytherapy is one of the most important cancer treatment management systems in radiotherapy department. Brachytherapy treatment is moved into High Dose Rate (HDR) after loader from Low Dose Rate (LDR) after loader due to radiation protection advantage. HDR Brachytherapy is a highly multipurpose system for enhancing cure and achieving palliation in many common cancers disease of developing countries. High-dose rate (HDR) Brachytherapy is a type of internal radiation therapy that delivers radiation from implants placed close to or inside, the tumor(s) in the body. This procedure is very effective at providing localized radiation to the tumor site while minimizing the patient’s whole body dose. Brachytherapy has proven to be a highly successful treatment for cancers of the prostate, cervix, endometrium, breast, skin, bronchus, esophagus, and head and neck, as well as soft tissue sarcomas and several other types of cancer. For the time being in our country we have 10 new HDR Remote after loading Brachytherapy. Right now 4 HDR Brachytherapy is already installed and running for patient’s treatment out of 10 HDR Brachytherapy. Ir-192 source is more comfortable than Co-60. In that case people or expert personnel prefer Ir-192 source for different kind of cancer patients. Ir-192 are economically, more flexible and familiar in our country.Keywords: Ir-192, brachytherapy, cancer treatment, prostate, cervix, endometrium, breast, skin, bronchus, esophagus, soft tissue sarcomas
Procedia PDF Downloads 4313285 Herbicide Resistant Weeds: Contrasting Perspectives of Actors in the Agricultural Sector
Authors: Bruce Small, Martin Espig, Alyssa Ryan
Abstract:
In the agricultural sector, the rapid expansion of herbicide resistant weeds is a major threat to the global sustainability of food and fibre production. Efforts to avoid herbicide resistance have primarily focused on new technologies and farmer education. Yet, despite decades of advice to growers from agricultural scientists and extension professionals of the need for management strategies for herbicide use, herbicide resistance continues to increase. Technological options are running out and current extension efforts to change farmer behaviour are failing to curb the problem. As part of a five-year, government funded, research programme to address herbicide resistance in New Zealand, social science theory and practice are being utilised to investigate the complexities of managing herbicide use and controlling resistance. As an initial step, we are utilising a transdisciplinary, multi-level systems approach to examine the problem definition, knowledge beliefs, attitudes and values of different important actors in the agri-business sector. In this paper, we report early project results from qualitative research examining the similarities and contrasts in the perceptions of scientists, farmer/growers, and rural professionals.Keywords: behaviour change, herbicide resistant weeds, knowledge beliefs, systems perspective
Procedia PDF Downloads 1243284 Gender Stereotype, Leadership Behavior and Job Performance of Sports Council Personnel in Lagos State
Authors: R. A. Moronfolu, I. M. Ndaks, O. E. Ifekoya
Abstract:
This study investigated Gender Stereotypes in Leadership Behaviour and its consequent effect on Job Performance of Sports Council Personnel in Lagos State. The descriptive research method was adapted in conducting the study, while eighty sports personnel of Lagos State sports council, Lagos, Nigeria were drawn as respondents using the stratified random sampling technique. A self-structured questionnaire titled “ Gender- Leader Performance Questionnaire (GLPQ) ”was used for data collection. The GLPQ was face validated by three experts in sports management and was subjected to a pilot test using the test retest method for reliability. A total of eighty copies of the validated GLPQ were administered on selected respondents and retrieved on the spot. The descriptive statistics of frequency counts and percentages were used in describing the demographic data collected, while the inferential statistics of Chi-square (X2) and Analysis of Variance (ANOVA) were used in drawing inferences at a level of significance of 0.05. It was observed that gender stereotypes and behaviours of leaders in Lagos State Sports Council, significantly differ. In addition, gender stereotypes and leadership behavior were observed to significantly influence the job performance of sports council personnel in Lagos State.Keywords: gender, leadership, stereotype, performance
Procedia PDF Downloads 5443283 Interpersonal Communication Competence and Organizational Trust as Predictors of Psychological Wellbeing of Medical Practitioners in Imo State, Nigeria
Authors: Ethelbert C. Njoku
Abstract:
The primary determination of any individual is the achievement of wholesome health. This is applicable to the government too. This desire becomes a reality with the efforts of medical practitioners who work day and night to ensure that the health of people is not compromised in any form. To achieve this laudable goal, the psychological wellbeing of the practitioners must be unparalleled. They must be psychologically fit in order to deliver as expected. More so, the organization must be able to provide the basic ingredients of trust in the daily management of the organization. Significantly, proper Interpersonal Communication Competence remains a necessity in the overall realization of this goal. 200 participants took part in the study, and they were selected through convenient sampling method from hospitals in Imo State. The current study adopted cross sectional survey design in trying to find out if Interpersonal Communication Competence and Organizational Trust can predict Psychological Wellbeing of medical practitioners in Imo State. Standard Multiple Regression Analysis was used for data analysis. Interestingly, the results indicate that interpersonal communication competence and organizational trust predicted psychological wellbeing among medical practitioners. The implication of this study hinges on the fact that since Interpersonal Communication Competence and Organizational Trust are important for psychological wellbeing of medical practitioners, the government and managers should try to provide opportunities that enhance these variables in the organization for the psychological wellbeing of medical practitioners.Keywords: interpersonal communication competence, medical practitioners, organizational trust, psychological wellbeing
Procedia PDF Downloads 1573282 Aspects of the Reproductive Biology of Brook Trout Neolissochilus stracheyi (Day, 1871) in Northern, Thailand
Authors: Thapanee Pholdee, Apinun Suvarnaraksha
Abstract:
Reproductive biology of Brook trout, Neolissochilus stracheyi (Day, 1871), were sampled in the Northern of Thailand during October 2010 - September 2011 from the fisherman, using gillnet of various mesh sizes. For the study of relationships between total length and body weight, spawning seasons, sex ratio and fecundity. At least 66 fish samples were used every month. The result showed that the total 821 Brook trout had 7.4-61(23.32±5.91 cm). There were 353 males that had fish samples there were 8.5-45.1 cm of TL (22.36±5.91cm) and 468 females that had 7.4±61 cm of TL (24.04±7.09 cm). The relationships equation between total length and weight was W = 0.008TL³.⁰⁶⁴ (r² = 0.940) for total fish, W=0.007TL³.¹⁰⁷ (r² = 0.946) for females and W=0.010TL³.⁰⁰³ (r² = 0.930) for males. The relative condition factor (K) of male and female was 1.090±0.067 and 1.116±0.102 respectively. The max of GSI was in June for male and female. The spawning season was found all year round with three peaks: January, June, and August. Estimated fecundity of mature ovaries ranged from 220 to 3,500 eggs. The estimated average fecundity was 1404.55 ±651.51 eggs. The relationships between fecundity and total length revealed F= 121.1TL-2100 and relationships between fecundity and weight revealed F= 4.535 + 128.78. The results from studies can be further applied to the economic culture, conservation, and management of the Brook trout in Northern, Thailand.Keywords: reproductive biology, Neolissochilus stracheyi, Northern Thailand, Brook trout
Procedia PDF Downloads 3053281 The Development of Shariah-Based Cooperative and Its Governance System: Cases in Thailand, Malaysia, and Indonesia
Authors: Zurina Shafii, Mohamed Obaidullah, Rochania Ayu Yunanda, Nor Farha Zubair
Abstract:
Cooperative members (also known as user-owners) are responsible in running the cooperative businesses in order to improve their socio economic well-being. Cooperatives have always been recognized as a vehicle to elevate the standard of living of the poor and low-income earners by improving their ability to mobilize resources among the people within the urban and rural sectors of the population. To improve its performance and role, the cooperative should ensure the existence of its specific governance. Using narrative analysis and quasi-statistics, this paper describes the state of operation, growth and nature of products and services offered in Sakofah Savings Co-op (the largest Islamic cooperative in Krabi), Koperasi Muslimin Malaysia Berhad (KMMB) in Malaysia and KOSPIN Jasa Keuangan in Indonesia. Furthermore, it identifies and evaluates the current governance system in each cooperatives and proposes governance framework which may enhance the performance of the cooperatives. The paper, in turn discusses the challenges to cooperative growth and investment from the aspects of governance and monitoring, transparency and human capital. The paper will be useful for regulators and governance organs of cooperatives, namely Board of Members, Management and Shariah Committee in order for these parties to strengthen the governance within cooperatives to further grow this economic sector.Keywords: Islamic cooperatives, governance, Shariah governance, case study
Procedia PDF Downloads 3603280 Assessment of the Impacts of Climate Change on Watershed Runoff Using Soil and Water Assessment Tool Model in Southeast Nigeria
Authors: Samuel Emeka Anarah, Kingsley Nnaemeka Ogbu, Obasi Arinze
Abstract:
Quantifying the hydrological response due to changes in climate change is imperative for proper management of water resources within a watershed. The impact of climate change on the hydrology of the Upper Ebony River (UER) watershed, South East Nigeria, was studied using the Soil and Water Assessment Tool (SWAT) hydrological model. A climatological time series analysis from 1985 - 2014 using non-parametric test showed significant negative trends in precipitation and relative humidity trend while minimum and maximum temperature, solar radiation and wind speed showed significant positive trends. Future hypothetical land-use change scenarios (Scenarios 1, 2, 3 and 4) representing urbanization and conversion of forest to agricultural land were combined with future downscaled climate model (CSIRO-Mk3-6-0) and simulated in SWAT model. Relative to the Baseline scenario (2005 - 2014), the results showed a decrease in streamflow by 10.29%, 26.20%, 11.80% and 26.72% for Scenarios 1, 2, 3, and 4 respectively. Model results suggest development of adaptation strategies to cope with the predicted hydrological conditions under future climate change in the watershed.Keywords: climate change, hydrology, runoff, SWAT model
Procedia PDF Downloads 141