Search results for: software maintenance
5360 Scrum Challenges and Mitigation Practices in Global Software Development of an Integrated Learning Environment: Case Study of Science, Technology, Innovation, Mathematics, Engineering for the Young
Authors: Evgeniia Surkova, Manal Assaad, Hleb Makeyeu, Juho Makio
Abstract:
The main objective of STIMEY (Science, Technology, Innovation, Mathematics, Engineering for the Young) project is the delivery of a hybrid learning environment that combines multi-level components such as social media concepts, robotic artefacts, and radio, among others. It is based on a well-researched pedagogical framework to attract European youths to STEM (science, technology, engineering, and mathematics) education and careers. To develop and integrate these various components, STIMEY is executed in iterative research cycles leading to progressive improvements. Scrum was the development methodology of choice in the project, as studies indicated its benefits as an agile methodology in global software development, especially of e-learning and integrated learning projects. This paper describes the project partners’ experience with the Scrum framework, discussing the challenges faced in its implementation and the mitigation practices employed. The authors conclude with exploring user experience tools and principles for future research, as a novel direction in supporting the Scrum development team.Keywords: e-learning, global software development, scrum, STEM education
Procedia PDF Downloads 1795359 Extreme Value Theory Applied in Reliability Analysis: Case Study of Diesel Generator Fans
Authors: Jelena Vucicevic
Abstract:
Reliability analysis represents a very important task in different areas of work. In any industry, this is crucial for maintenance, efficiency, safety and monetary costs. There are ways to calculate reliability, unreliability, failure density and failure rate. In this paper, the results for the reliability of diesel generator fans were calculated through Extreme Value Theory. The Extreme Value Theory is not widely used in the engineering field. Its usage is well known in other areas such as hydrology, meteorology, finance. The significance of this theory is in the fact that unlike the other statistical methods it is focused on rare and extreme values, and not on average. It should be noted that this theory is not designed exclusively for extreme events, but for extreme values in any event. Therefore, this is a great opportunity to apply the theory and test if it could be applied in this situation. The significance of the work is the calculation of time to failure or reliability in a new way, using statistic. Another advantage of this calculation is that there is no need for technical details and it can be implemented in any part for which we need to know the time to fail in order to have appropriate maintenance, but also to maximize usage and minimize costs. In this case, calculations have been made on diesel generator fans but the same principle can be applied to any other part. The data for this paper came from a field engineering study of the time to failure of diesel generator fans. The ultimate goal was to decide whether or not to replace the working fans with a higher quality fan to prevent future failures. The results achieved in this method will show the approximation of time for which the fans will work as they should, and the percentage of probability of fans working more than certain estimated time. Extreme Value Theory can be applied not only for rare and extreme events, but for any event that has values which we can consider as extreme.Keywords: extreme value theory, lifetime, reliability analysis, statistic, time to failure
Procedia PDF Downloads 3275358 Comparative Analysis of Real and Virtual Garment Fit
Authors: Kristina Ancutiene
Abstract:
The goal of this research is to perform comparative analysis between the virtual fit of the woman's dress and the fit on a real person. The dress fitting was done using mechanical and structural parameters of the 100 % linen fabric and using Modaris_3D_Fit software (CAD Lectra). The dress was also sawn after which garment fit differences of real and virtual dress was researched. Four respondents whose figures were similar were used to evaluate the ease and strain deformations of the real and virtual dress. The scores that were given by the respondents wearing the real dress were compared to the ease and strain results that were given by the software. The main result was that respondents feel similar to the virtual stretch deformations but their ease feeling is not always matching the virtual ones. The results may be influenced by psychological factors and different understanding about purpose of garment.Keywords: virtual garment, 3D CAD, garment fit, mechanical properties
Procedia PDF Downloads 3435357 Intelligent Cooperative Integrated System for Road Safety and Road Infrastructure Maintenance
Authors: Panagiotis Gkekas, Christos Sougles, Dionysios Kehagias, Dimitrios Tzovaras
Abstract:
This paper presents the architecture of the “Intelligent cooperative integrated system for road safety and road infrastructure maintenance towards 2020” (ODOS2020) advanced infrastructure, which implements a number of cooperative ITS applications based on Internet of Things and Infrastructure-to-Vehicle (V2I) technologies with the purpose to enhance the active road safety level of vehicles through the provision of a fully automated V2I environment. The primary objective of the ODOS2020 project is to contribute to increased road safety but also to the optimization of time for maintenance of road infrastructure. The integrated technological solution presented in this paper addresses all types of vehicles and requires minimum vehicle equipment. Thus, the ODOS2020 comprises a low-cost solution, which is one of its main benefits. The system architecture includes an integrated notification system to transmit personalized information on road, traffic, and environmental conditions, in order for the drivers to receive real-time and reliable alerts concerning upcoming critical situations. The latter include potential dangers on the road, such as obstacles or road works ahead, extreme environmental conditions, etc., but also informative messages, such as information on upcoming tolls and their charging policies. At the core of the system architecture lies an integrated sensorial network embedded in special road infrastructures (strips) that constantly collect and transmit wirelessly information about passing vehicles’ identification, type, speed, moving direction and other traffic information in combination with environmental conditions and road wear monitoring and predictive maintenance data. Data collected from sensors is transmitted by roadside infrastructure, which supports a variety of communication technologies such as ITS-G5 (IEEE-802.11p) wireless network and Internet connectivity through cellular networks (3G, LTE). All information could be forwarded to both vehicles and Traffic Management Centers (TMC) operators, either directly through the ITS-G5 network, or to smart devices with Internet connectivity, through cloud-based services. Therefore, through its functionality, the system could send personalized notifications/information/warnings and recommendations for upcoming events to both road users and TMC operators. In the course of the ODOS2020 project pilot operation has been conducted to allow drivers of both C-ITS equipped and non-equipped vehicles to experience the provided added value services. For non-equipped vehicles, the provided information is transmitted to a smartphone application. Finally, the ODOS2020 system and infrastructure is appropriate for installation on both urban, rural, and highway environments. The paper presents the various parts of the system architecture and concludes by outlining the various challenges that had to be overcome during its design, development, and deployment in a real operational environment. Acknowledgments: Work presented in this paper was co-financed by the European Regional Development Fund of the European Union and Greek national funds through the Operational Program Competitiveness, Entrepreneurship and Innovation (call RESEARCH–CREATE–INNOVATE) under contract no. Τ1EDK-03081 (project ODOS2020).Keywords: infrastructure to vehicle, intelligent transportation systems, internet of things, road safety
Procedia PDF Downloads 1235356 Socio-Technical Systems: Transforming Theory into Practice
Authors: L. Ngowi, N. H. Mvungi
Abstract:
This paper critically examines the evolution of socio-technical systems theory, its practices, and challenges in system design and development. It examines concepts put forward by researchers focusing on the application of the theory in software engineering. There are various methods developed that use socio-technical concepts based on systems engineering without remarkable success. The main constraint is the large amount of data and inefficient techniques used in the application of the concepts in system engineering for developing time-bound systems and within a limited/controlled budget. This paper critically examines each of the methods, highlight bottlenecks and suggest the way forward. Since socio-technical systems theory only explains what to do, but not how doing it, hence engineers are not using the concept to save time, costs and reduce risks associated with new frameworks. Hence, a new framework, which can be considered as a practical approach is proposed that borrows concepts from soft systems method, agile systems development and object-oriented analysis and design to bridge the gap between theory and practice. The approach will enable the development of systems using socio-technical systems theory to attract/enable the system engineers/software developers to use socio-technical systems theory in building worthwhile information systems to avoid fragilities and hostilities in the work environment.Keywords: socio-technical systems, human centered design, software engineering, cognitive engineering, soft systems, systems engineering
Procedia PDF Downloads 2865355 A Decision Making Tool for Selecting the Most Environmental Friendly Wastewater Treatment Plant for Small-Scale Communities
Authors: Mehmet Bulent Topkaya, Mustafa Yildirim
Abstract:
Wastewater treatment systems are designed and used to minimize adverse impacts of the wastewater on the environment before discharging. Various treatment options for wastewater treatment have been developed, and each of them has different performance characteristics and environmental impacts (e.g. material and land usage, energy consumption, greenhouse gas emission, water and soil emission) during construction, operation or maintenance phases. Assessing the environmental impacts during these phases are essential for the overall evaluation of the treatment systems. In this study, wastewater treatment options, such as vegetated land treatment, constructed wetland, rotating biological contactor, conventional activated sludge treatment, membrane bioreactor, extended aeration and stabilization pond are evaluated. The comparison of the environmental impacts is conducted under the assumption that the effluents will be discharged to sensitive and less sensitive areas respectively. The environmental impacts of each alternative are evaluated by life cycle assessment (LCA) approach. For this purpose, data related to energy usage, land requirement, raw material consumption, and released emissions from the life phases were collected with inventory studies based on field studies and literature. The environmental impacts were assessed by using SimaPro 7.1 LCA software. As the scale of the LCA results is global, an MS-Excel based decision support tool that includes the LCA result is developed in order to meet also the local demands. Using this tool, it is possible to assign weight factors on the LCA results according to local conditions by using Analytical Hierarchy Process and finally the most environmentally appropriate treatment option can be selected.Keywords: analytical hierarchy process, decision support system, life cycle assessment, wastewater treatment
Procedia PDF Downloads 3015354 Development of Open Source Geospatial Certification Model Based on Geospatial Technology Competency Model
Authors: Tanzeel Ur Rehman Khan, Franz Josef Behr, Phillip Davis
Abstract:
Open source geospatial certifications are needed in geospatial technology education and industry sector. In parallel with proprietary software, free and open source software solutions become important in geospatial technology research and play an important role for the growth of the geospatial industry. ESRI, GISCI (GIS Certification Institute), ASPRS (American Society of Photogrammetry and remote sensing), and Meta spatial are offering certifications on proprietary and open source software. These are portfolio and competency based certifications depending on GIS Body of Knowledge (Bok). The analysis of these certification approaches might lead to the discovery of some gaps in them and will open a new way to develop certifications related to the geospatial open source (OS). This new certification will investigate the different geospatial competencies according to open source tools that help to identify geospatial professionals and strengthen the geospatial academic content. The goal of this research is to introduce a geospatial certification model based on geospatial technology competency model (GTCM).The developed certification will not only incorporate the importance of geospatial education and production of the geospatial competency-based workforce in universities and companies (private or public) as well as describe open source solutions with tools and technology. Job analysis, market analysis, survey analysis of this certification opens a new horizon for business as well.Keywords: geospatial certification, open source, geospatial technology competency model, geoscience
Procedia PDF Downloads 5665353 Craving Intensity Measurements in Opiate Addicts to Objectify the Opioid Substitution Therapy Dose and Reduce the Relapse Risk
Authors: Igna Brajevic-Gizdic, Magda Pletikosa Pavić
Abstract:
Introduction: Research in opiate addiction is increasingly indicating the importance of substitution therapy in opiate addicts. Opiate addiction is a chronic relapsing disease that includes craving as a criterion. Craving has been considered a predictor of a relapse, which is defined as a strong desire with an excessive need to take a substance. The study aimed to measure the intensity of craving using the VAS (visual analog scale) in opioid addicts taking Opioid Substitution Therapy (OST). Method: The total sample compromised of 30 participants in outpatient treatment. Two groups of opiate addicts were considered: Methadone-maintenance and buprenorphine-maintenance addicts. The participants completed the survey questionnaire during the outpatient treatment. Results: The results indicated high levels of cravings in patients during the treatment of OST, which is considered an important destabilization factor in abstinence. Thus, the use of methadone/buprenorphine dose should be considered. Conclusion: These findings provided an objective measurement of methadone /buprenorphine dosage and therapy options. The underdoes of OST can put patients at high risk of relapse, resulting in high levels of craving. Thus, when determining the therapeutic dose of OST, it is crucial to consider patients' cravings. This would achieve stabilization more quickly and avoid relapse in abstinence. Subjective physician assessment and patients' statement are the main criteria to determine OST dosage. Future studies should use larger sample sizes and focus on the importance of intensity craving measurement on OST to objectify methadone /buprenorphine dosage.Keywords: buprenorphine, craving, heroin addicts, methadone, OST
Procedia PDF Downloads 885352 Network Automation in Lab Deployment Using Ansible and Python
Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath
Abstract:
Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab
Procedia PDF Downloads 1645351 Railway Ballast Volumes Automated Estimation Based on LiDAR Data
Authors: Bahar Salavati Vie Le Sage, Ismaïl Ben Hariz, Flavien Viguier, Sirine Noura Kahil, Audrey Jacquin, Maxime Convert
Abstract:
The ballast layer plays a key role in railroad maintenance and the geometry of the track structure. Ballast also holds the track in place as the trains roll over it. Track ballast is packed between the sleepers and on the sides of railway tracks. An imbalance in ballast volume on the tracks can lead to safety issues as well as a quick degradation of the overall quality of the railway segment. If there is a lack of ballast in the track bed during the summer, there is a risk that the rails will expand and buckle slightly due to the high temperatures. Furthermore, the knowledge of the ballast quantities that will be excavated during renewal works is important for efficient ballast management. The volume of excavated ballast per meter of track can be calculated based on excavation depth, excavation width, volume of track skeleton (sleeper and rail) and sleeper spacing. Since 2012, SNCF has been collecting 3D points cloud data covering its entire railway network by using 3D laser scanning technology (LiDAR). This vast amount of data represents a modelization of the entire railway infrastructure, allowing to conduct various simulations for maintenance purposes. This paper aims to present an automated method for ballast volume estimation based on the processing of LiDAR data. The estimation of abnormal volumes in ballast on the tracks is performed by analyzing the cross-section of the track. Further, since the amount of ballast required varies depending on the track configuration, the knowledge of the ballast profile is required. Prior to track rehabilitation, excess ballast is often present in the ballast shoulders. Based on 3D laser scans, a Digital Terrain Model (DTM) was generated and automatic extraction of the ballast profiles from this data is carried out. The surplus in ballast is then estimated by performing a comparison between this ballast profile obtained empirically, and a geometric modelization of the theoretical ballast profile thresholds as dictated by maintenance standards. Ideally, this excess should be removed prior to renewal works and recycled to optimize the output of the ballast renewal machine. Based on these parameters, an application has been developed to allow the automatic measurement of ballast profiles. We evaluated the method on a 108 kilometers segment of railroad LiDAR scans, and the results show that the proposed algorithm detects ballast surplus that amounts to values close to the total quantities of spoil ballast excavated.Keywords: ballast, railroad, LiDAR , cloud point, track ballast, 3D point
Procedia PDF Downloads 1095350 Comparative Study of R.C.C. Steel and Concrete Building
Authors: Mahesh Suresh Kumawat
Abstract:
Steel concrete composite construction means the concrete slab is connected to the steel beam with the help of shear connectors so that they act as a single unit. In the present work, steel concrete composite with RCC options are considered for comparative study of G+9 story commercial building which is situated in earthquake zone-III and for earthquake loading, the provisions of IS: 1893(Part1)-2002 is considered. A three dimensional modeling and analysis of the structure are carried out with the help of SAP 2000 software. Equivalent Static Method of Analysis and Response spectrum analysis method are used for the analysis of both Composite & R.C.C. structures. The results are compared and it was found that composite structure is more economical.Keywords: composite beam, column, RCC column, RCC beam, shear connector, SAP 2000 software
Procedia PDF Downloads 4525349 Two Spherical Three Degrees of Freedom Parallel Robots 3-RCC and 3-RRS Static Analysis
Authors: Alireza Abbasi Moshaii, Shaghayegh Nasiri, Mehdi Tale Masouleh
Abstract:
The main purpose of this study is static analysis of two three-degree of freedom parallel mechanisms: 3-RCC and 3-RRS. Geometry of these mechanisms is expressed and static equilibrium equations are derived for the whole chains. For these mechanisms due to the equal number of equations and unknowns, the solution is as same as 3-RCC mechanism. Mathematical software is used to solve the equations. In order to prove the results obtained from solving the equations of mechanisms, their CAD model has been simulated and their static is analysed in ADAMS software. Due to symmetrical geometry of the mechanisms, the force and external torque acting on the end-effecter have been considered asymmetric to prove the generality of the solution method. Finally, the results of both softwares, for both mechanisms are extracted and compared as graphs. The good achieved comparison between the results indicates the accuracy of the analysis.Keywords: robotic, static analysis, 3-RCC, 3-RRS
Procedia PDF Downloads 3845348 Non-Contact Digital Music Instrument Using Light Sensing Technology
Authors: Aishwarya Ravichandra, Kirtana Kirtivasan, Adithi Mahesh, Ashwini S.Savanth
Abstract:
A Non-Contact Digital Music System has been conceptualized and implemented to create a new era of digital music. This system replaces the strings of a traditional stringed instrument with laser beams to avoid bruising of the user’s hand. The system consists of seven laser modules, detector modules and distance sensors that form the basic hardware blocks of this instrument. Arduino ATmega2560 microcontroller is used as the primary interface between the hardware and the software. MIDI (Musical Instrument Digital Interface) is used as the protocol to establish communication between the instrument and the virtual synthesizer software.Keywords: Arduino, detector, laser, MIDI, note on, note off, pitch bend, Sharp IR distance sensor
Procedia PDF Downloads 4075347 A Decentralized Application for Secure Data Handling of Wireless Networks Using Ethereum Smart Contracts
Authors: Midhun Xavier
Abstract:
This paper introduces a method to verify multi-agent systems in industrial control systems using blockchain technology. The proposed solution enables to record and verify each process that occurs while generating a customized product using Ethereum-based smart contracts. Node-Red software agents are developed with the help of semantic web technologies, and these software agents interact with IEC 61499 function blocks to execute the processes. The agent associated with each mechatronic component and its controller can communicate with the blockchain to record various events that occur during each process, and the latter smart contract helps to verify these process orders of the customized product.Keywords: blockchain, Ethereum, node-red, IEC 61499, multi-agent system, MQTT
Procedia PDF Downloads 945346 Application of Cube IQ Software to Optimize Heterogeneous Packing Products in Logistics Cargo and Minimize Transportation Cost
Authors: Muhammad Ganda Wiratama
Abstract:
XYZ company is one of the upstream chemical companies that produce chemical products such as NaOH, HCl, NaClO, VCM, EDC, and PVC for downstream companies. The products are shipped by land using trucks and sea lanes using ship mode. Especially for solid products such as flake caustic soda (F-NaOH) and PVC resin, the products are sold in loose bag packing and palletize packing (packed in pallet). The focus of this study is to increase the number of items that can be loaded in pallet packaging on the company's logistics vehicle. This is very difficult because on this packaging, the dimensions or size of the material to be loaded become larger and certainly much heavier than the loose bag packing. This factor causes the arrangement and handling of materials in the mode of transportation more difficult. In this case, it is difficult to load a different type of volume packing pallet dimension in one truck or container. By using the Cube-IQ software, it is hoped that the planning of stuffing activity material by pallet can become easier in optimizing the existing space with various possible combinations of possibilities. In addition, the output of this software can also be used as a reference for operators in the material handling include the order and orientation of materials contained in the truck or container. The more optimal contents of logistics cargo, then transportation costs can also be minimized.Keywords: loading activity, container loading, palletize product, simulation
Procedia PDF Downloads 2985345 A Survey on Routh-Hurwitz Stability Criterion
Authors: Mojtaba Hakimi-Moghaddam
Abstract:
Routh-Hurwitz stability criterion is a powerful approach to determine stability of linear time invariant systems. On the other hand, applying this criterion to characteristic equation of a system, whose stability or marginal stability can be determined. Although the command roots (.) of MATLAB software can be easily used to determine the roots of a polynomial, the characteristic equation of closed loop system usually includes parameters, so software cannot handle it; however, Routh-Hurwitz stability criterion results the region of parameter changes where the stability is guaranteed. Moreover, this criterion has been extended to characterize the stability of interval polynomials as well as fractional-order polynomials. Furthermore, it can help us to design stable and minimum-phase controllers. In this paper, theory and application of this criterion will be reviewed. Also, several illustrative examples are given.Keywords: Hurwitz polynomials, Routh-Hurwitz stability criterion, continued fraction expansion, pure imaginary roots
Procedia PDF Downloads 3285344 First Documented Anesthesia with Use of Low Doses of Tiletamine-Zolazepam Combination in Ovoviparous Amazon Tree Boa Undergoing Emergency Coeliotomy-Case Report
Authors: Krzysztof Buczak, Sonia Lachowska, Pawel Kucharski, Agnieszka Antonczyk
Abstract:
Tiletamine - zolazepam combination is increasingly used in veterinary anaesthesiology in wild animals, including snakes. The available literature shows a lack of information about anesthesia in this mixture in ovoviviparous snakes. The studies show the possibility of using the combination at a dose of 20 mg/kg or more for snake immobilization. This paper presents an anesthetic protocol with the use of a combination of tiletamine - zolazepam at the dose of 10 mg/kg intramuscularly and maintenance with inhalant anesthesia with isoflurane in pure oxygen. The objective of this study was to evaluate the usefulness of the anesthetic protocol to proceed with coeliotomy in Amazon Tree Boa. The patient was a five years old bicolor female Amazon Tree Boa (Corallus hortulanus) with dystocia. The clinical examination reveals significant emaciation (bodyweight 520g), high degree of dehydration, heart rate (HR = 60 / min), pale mucous membranes and poor reactivity. Meloxicam (1 mg/kg) and tramadol (10 mg/kg) were administered subcutaneously and the patient was placed in an incubator with access to fresh oxygen. Four hours later, the combination of tiletamine - zolazepam (10 mg/kg) was administered intramuscularly for induction of anesthesia. The snake was intubated and connected to inhalant anesthesia equipment. For maintenance, the anesthesia isoflurane in pure oxygen was used due to apnea, which occurs 30 minutes after the induction semi-closed system was attached and the ventilator was turned on (PCV system, four breaths per minute, 8 cm of H2O). Cardiopulmonary parameters (HR, RR, SPO2, ETCO2, ETISO) were assessed throughout the procedure. During the entire procedure, the operating room was heated to a temperature of 26 degrees Celsius. Additionally, the hose was placed on a heating mat, which maintained a temperature of 30 degrees Celsius. For 15 minutes after induction, the loss of muscle tone was observed from the head to the tail. Induction of general anesthesia was scored as good because of the possibility of intubation. During the whole procedure, the heart rate was at the rate of 58 beats per minute (bpm). Ventilation parameters were stable throughout the procedure. The recovery period lasts for about 4 hours after the end of general anesthesia. The muscle tension returned from tail to head. The snake started to breathe spontaneously within 1,5 hours after the end of general anesthesia. The protocol of general anesthesia with the combination of tiletamine- zolazepam with a dose of 10 mg/kg is useful for proceeding with the emergency coeliotomy in maintenance with isoflurane in oxygen. Further study about the impact of the combination of tiletamine- zolazepam for the recovery period is needed.Keywords: anesthesia, corallus hortulanus, ovoviparous, snake, tiletamine, zolazepam
Procedia PDF Downloads 2465343 The Environmental Effects of the Flood Disaster in Anambra State
Authors: U. V. Okpala
Abstract:
Flood is an overflow of water that submerges or ‘drowns’ land. In developing countries it occurs as a result of blocking of natural and man-made drainages and poor maintenance of water dams/reservoirs which seldom give way after persistent heavy down pours. In coastal lowlands and swamp lands, flooding is aided mainly by blocked channels and indiscriminate sand fling of coastal swamp areas and natural drainage channel for urban development/constructions. In this paper, the causes of flood and possible scientific, technological, political, economic and social impacts of flood disaster on the environment a case study of Anambra State have been studied. Often times flooding is caused by climate change, especially in the developed economy where scientific mitigating options are highly employed. Researchers have identified Green Houses Gases (GHG) as the cause of global climate change. The recent flood disaster in Anambra State which caused physical damage to structures, social dislocation, contamination of clean drinking water, spread of water-borne diseases, shortage of crops and food supplies, death of non-tolerant tree species, disruption in transportation system, serious economic loss and psychological trauma is a function of climate change. There is need to encourage generation of renewable energy sources, use of less carbon intensive fuels and other energy efficient sources. Carbon capture/sequestration, proper management of our drainage systems and good maintenance of our dams are good option towards saving the environment.Keywords: flooding, climate change, carbon capture, energy systems
Procedia PDF Downloads 3755342 Requirements Definitions of Real-Time System Using the Behavioral Patterns Analysis (BPA) Approach: The Healthcare Multi-Agent System
Authors: Assem El-Ansary
Abstract:
This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach using the Healthcare Multi-Agent System. The Event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are: The Behavioral Pattern Analysis (BPA) modeling methodology. The development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.Keywords: analysis, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases, Healthcare Multi-Agent System
Procedia PDF Downloads 5505341 Development of Ultrasounf Probe Holder for Automatic Scanning Asymmetric Reflector
Authors: Nabilah Ibrahim, Hafiz Mohd Zaini, Wan Fatin Liyana Mutalib
Abstract:
Ultrasound equipment or machine is capable to scan in two dimensional (2D) areas. However there are some limitations occur during scanning an object. The problem will occur when scanning process that involving the asymmetric object. In this project, the ultrasound probe holder for asymmetric reflector scanning in 3D image is proposed to make easier for scanning the phantom or object that has asymmetric shape. Initially, the constructed asymmetric phantom that construct will be used in 2D scanning. Next, the asymmetric phantom will be interfaced by the movement of ultrasound probe holder using the Arduino software. After that, the performance of the ultrasound probe holder will be evaluated by using the various asymmetric reflector or phantom in constructing a 3D imageKeywords: ultrasound 3D images, axial and lateral resolution, asymmetric reflector, Arduino software
Procedia PDF Downloads 5605340 Intelligent Agent Travel Reservation System Requirements Definitions Using the Behavioral Patterns Analysis (BPA) Approach
Authors: Assem El-Ansary
Abstract:
This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Intelligent Agent Reservation System (IARS). The Event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are developing the Behavioral Pattern Analysis (BPA) modeling methodology, and developing an interactive software tool (DECISION) which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.Keywords: analysis, intelligent agent, reservation system, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases
Procedia PDF Downloads 4845339 The Influence of Migration on Migrants' Culture: A Study on Egyptian Nubians' Migration to Investigate Culture Changes
Authors: Tarek Hassan, Sanaa Abouras
Abstract:
Some factors such as interaction of migration process, cultural identity have an impact in a way that may lead to cultural disinheritance. Even if migrants' culture would not be lost, it may be affected by the new society culture. Therefore, it is anticipated that migration of an ethnic group would impact the culture of that group. Nubians; an ethnic group originated in South Egypt, have experienced migration that took place in the sixties of the past century. Nubians were forced to leave their origin land and relocate to Kom Ombo; an Egyptian town to the north of Aswan. The effect of migration on national culture, social homogeneity or the interest of social contact influences the attitudes of natives towards migration. Hence, it is very important for societies to help migrants to adapt to the new culture and at the same time not to impede migrants' effort to maintain their own culture. This study aims to investigate the effect of internal migration on the culture of Egyptian Nubians in order to predict if Nubian can maintain their own culture after the migration. Research question: what is the cultural influence of Nubians' migration from Egyptian Nubia to their new destinations? The researchers' hypothesis: there is mutual influence between the two cultures of Nubians and non-Nubians in Egypt. Results supported researchers' hypothesis as they observed that the Nubians managed to reserve balance between the maintenance of their own culture and the adoption of some cultural features of the community of their new destination(s). Also, the study examined why Nubians adhere to their culture although they left their land forever. Questionnaire and interviews were used to collect data from 80 informants; 40 Nubians and 40 non-Nubians in Kom-Ombo and the two cities of Cairo and Alexandria. Results suggested that there is obvious mutual cultural impact between Nubians and non-Nubians. The findings of this study would trigger the researchers to conduct further research on minorities for the deeper understanding of the impact of/on the culture of minorities.Keywords: culture change, culture influence, culture maintenance, minority migration
Procedia PDF Downloads 2275338 Predictors for Success in Methadone Maintenance Treatment Clinic: 24 Years of Experience
Authors: Einat E. Peles, Shaul Schreiber, Miriam Adelson
Abstract:
Background: Since established more than 50 years ago, methadone maintenance treatment (MMT) is the most effective treatment for opioid addiction, a chronic relapsing brain disorder that became an epidemic in western societies. Treatment includes daily individual optimal medication methadone dose (a long acting mu opioid receptor full agonist), accompanied with psychosocial therapy. It is well established that the longer retention in treatment the better outcome and survival occur. It reduces the likelihood to infectious diseases and overdose death that associated with drug injecting, enhanced social rehabilitation and eliminate criminal activity, and lead to healthy productive life. Aim: To evaluate predictors for long term retention in treatment we analyzed our prospective follow up of a major MMT clinic affiliated to a big tertiary medical center. Population Methods: Between June 25, 1993, and June 24, 2016, all 889 patients ( ≥ 18y) who ever admitted to the clinic were prospectively followed-up until May 2017. Duration in treatment from the first admission until the patient quit treatment or until the end of follow-up (24 years) was taken for calculating cumulative retention in treatment using survival analyses (Kaplan Meier) with log-rank and Cox regression for multivariate analyses. Results: Of the 889 patients, 25.2% were females who admitted to treatment at younger age (35.0 ± 7.9 vs. 40.6 ± 9.8, p < .0005), but started opioid usage at same age (22.3 ± 6.9). In addition to opioid use, on admission to MMT 58.5% had positive urine for benzodiazepines, 25% to cocaine, 12.4% to cannabis and 6.9% to amphetamines. Hepatitis C antibody tested positive in 55%, and HIV in 7.8% of the patients and 40%. Of all patients, 75.7% stayed at least one year in treatment, and of them, 67.7% stopped opioid usage (based on urine tests), and a net reduction observed in all other substance abuse (proportion of those who stopped minus proportion of those who have started). Long term retention up to 24 years was 8.0 years (95% Confidence Interval (CI) 7.4-8.6). Predictors for longer retention in treatment (Cox regression) were being older on admission ( ≥ 30y) Odds Ratio (OR) =1.4 (CI 1.1-1.8), not abusing opioids after one year OR=1.8 (CI 1.5-2.1), not abusing benzodiazepine after one year OR=1.7 (CI 1.4-2.1) and treating with methadone dose ≥ 100mg/day OR =1.8 (CI 1.5-2.3). Conclusions: Treating and following patients over 24 years indicate success of two main outcomes, high rate of retention after one year (75.7%) and high proportion of opiate abuse cessation (67.7%). As expected, longer cumulative retention was associated with patients treated with high adequate methadone dose that successfully result in opioid cessation. Based on these findings, in order to reduce morbidity and mortality, we find the establishment of more MMT clinics within a general hospital, a most urgent necessity.Keywords: methadone maintenance treatment, epidemic, opioids, retention
Procedia PDF Downloads 1925337 Access Control System for Big Data Application
Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud
Abstract:
Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.Keywords: access control, security, Big Data, domain
Procedia PDF Downloads 1345336 Hyperchaos-Based Video Encryption for Device-To-Device Communications
Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou
Abstract:
In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#
Procedia PDF Downloads 3715335 Locating the Best Place for Earthquake Refugee Camps by OpenSource Software: A Case Study for Tehran, Iran
Authors: Reyhaneh Saeedi
Abstract:
Iran is one of the regions which are most prone for earthquakes annually having a large number of financial and mortality and financial losses. Every year around the world, a large number of people lose their home and life due to natural disasters such as earthquakes. It is necessary to provide and specify some suitable places for settling the homeless people before the occurrence of the earthquake, one of the most important factors in crisis planning and management. Some of the natural disasters can be Modeling and shown by Geospatial Information System (GIS). By using GIS, it would be possible to manage the spatial data and reach several goals by making use of the analyses existing in it. GIS has a determining role in disaster management because it can determine the best places for temporary resettling after such a disaster. In this research QuantumGIS software is used that It is an OpenSource software so that easy to access codes and It is also free. In this system, AHP method is used as decision model and to locate the best places for temporary resettling, is done based on the related organizations criteria with their weights and buffers. Also in this research are made the buffer layers of criteria and change them to the raster layers. Later on, the raster layers are multiplied on desired weights then, the results are added together. Eventually, there are suitable places for resettling of victims by desired criteria by different colors with their optimum rate in QuantumGIS platform.Keywords: disaster management, temporary resettlement, earthquake, QuantumGIS
Procedia PDF Downloads 3965334 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study
Authors: Rabih Joseph Nabhan
Abstract:
This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.Keywords: analysis, awareness, dyslexic, software
Procedia PDF Downloads 2245333 Agroecological and Socioeconomic Determinants of Conserving Diversity On-Farm: The Case of Wheat Genetic Resources in Ethiopia
Authors: Bedilu Tafesse
Abstract:
Conservation of crop genetic resources presents a challenge of identifying specific determinants driving maintenance of diversity at farm and agroecosystems. The objectives of this study were to identify socioeconomic, market and agroecological determinants of farmers’ maintenance of wheat diversity at the household level and derive implications for policies in designing on-farm conservation programs. We assess wheat diversity at farm level using household survey data. A household decision making model is conceptualized using microeconomic theory to assess and identify factors influencing on-farm rice diversity. The model is then tested econometrically by using various factors affecting farmers’ variety choice and diversity decisions. The findings show that household-specific socioeconomic, agroecological and market factors are important in determining on-farm wheat diversity. The significant variables in explaining richness and evenness of wheat diversity include distance to the nearest market, subsistence ratio, modern variety sold, land types and adult labour working in agriculture. The statistical signs of the factors determining wheat diversity are consistent in explaining the richness, dominance and evenness among rice varieties. Finally, the study implies that the cost-effective means of promoting and sustaining on-farm conservation programmes is to target them in market isolated geographic locations of high crop diversity where farm households have more heterogeneity of agroecological conditions and more active family adult labour working on-farm.Keywords: diversity indices, dominance, evenness, on-farm conservation, wheat diversity, richness
Procedia PDF Downloads 3085332 The Comparative Study of Binary Artifact Repository Managers
Authors: Evgeny Chugunnyy, Alena Gerasimova, Kirill Chernyavskiy, Alexander Krasnov
Abstract:
One of the primary component of Continuous deployment (CD) is a binary artifact repository — the place where artifacts are stored with metadata in a structured way. The binary artifact repository manager (BARM) is a software, which implements this repository logic and exposes a public application programming interface (API) for managing these artifacts. Almost every programming language ecosystem has its own artifact repository kind. During creating Artipie — BARM constructor and server, we analyzed and implemented a lot of different artifact repositories. In this paper we present criterias for comparing artifact repositories, and analyze the most popular repositories using these metrics. We also describe some of the notable features of different repositories. This paper aimed to help people who are creating, maintaining or optimizing software repository and CI tools.Keywords: artifact, repository, continuous deployment, build automation, artifacts management
Procedia PDF Downloads 1505331 Molecular Modeling of Structurally Diverse Compounds as Potential Therapeutics for Transmissible Spongiform Encephalopathy
Authors: Sanja O. Podunavac-Kuzmanović, Strahinja Z. Kovačević, Lidija R. Jevrić
Abstract:
Prion is a protein substance whose certain form is considered as infectious agent. It is presumed to be the cause of the transmissible spongiform encephalopathies (TSEs). The protein it is composed of, called PrP, can fold in structurally distinct ways. At least one of those 3D structures is transmissible to other prion proteins. Prions can be found in brain tissue of healthy people and have certain biological role. The structure of prions naturally occurring in healthy organisms is marked as PrPc, and the structure of infectious prion is labeled as PrPSc. PrPc may play a role in synaptic plasticity and neuronal development. Also, it may be required for neuronal myelin sheath maintenance, including a role in iron uptake and iron homeostasis. PrPSc can be considered as an environmental pollutant. The main aim of this study was to carry out the molecular modeling and calculation of molecular descriptors (lipophilicity, physico-chemical and topological descriptors) of structurally diverse compounds which can be considered as anti-prion agents. Molecular modeling was conducted applying ChemBio3D Ultra version 12.0 software. The obtained 3D models were subjected to energy minimization using molecular mechanics force field method (MM2). The cutoff for structure optimization was set at a gradient of 0.1 kcal/Åmol. The Austin Model 1 (AM-1) was used for full geometry optimization of all structures. The obtained set of molecular descriptors is applied in analysis of similarities and dissimilarities among the tested compounds. This study is an important step in further development of quantitative structure-activity relationship (QSAR) models, which can be used for prediction of anti-prion activity of newly synthesized compounds.Keywords: chemometrics, molecular modeling, molecular descriptors, prions, QSAR
Procedia PDF Downloads 322