Search results for: wireless local area network
16638 Mobile Cloud Computing: How to Improve
Authors: Abdullah Aljumah, Tariq Ahamad
Abstract:
The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.Keywords: Cloud Computing, MCC, SAAS, computer interaction
Procedia PDF Downloads 38116637 Mining News Deserts: Impact of Local Newspaper's Closure on Political Participation and Engagement in Rural Australian Town of Lightning Ridge
Authors: Marco Magasic
Abstract:
This article examines how a local newspaper’s closure impacts the way everyday people in a rural Australian town are informed about and engage with political affairs. It draws on a two-month focused ethnographic study in the outback town of Lighting Ridge, New South Wales and explores people’s media-related practices following the closure of the towns’ only newspaper, The Ridge News, in 2015. While social media is considered to have partly filled the news void, there is an increasingly fragmented and less vibrant local public sphere that has led to growing complacency among individuals about political affairs. Local residents highlight a dearth of reliable, credible information and lament the loss of the newspaper and its role in community advocacy and fostering people’s engagement with political institutions, especially local government.Keywords: public sphere, political participation, local news, democratic deficit
Procedia PDF Downloads 15516636 Network Word Discovery Framework Based on Sentence Semantic Vector Similarity
Authors: Ganfeng Yu, Yuefeng Ma, Shanliang Yang
Abstract:
The word discovery is a key problem in text information retrieval technology. Methods in new word discovery tend to be closely related to words because they generally obtain new word results by analyzing words. With the popularity of social networks, individual netizens and online self-media have generated various network texts for the convenience of online life, including network words that are far from standard Chinese expression. How detect network words is one of the important goals in the field of text information retrieval today. In this paper, we integrate the word embedding model and clustering methods to propose a network word discovery framework based on sentence semantic similarity (S³-NWD) to detect network words effectively from the corpus. This framework constructs sentence semantic vectors through a distributed representation model, uses the similarity of sentence semantic vectors to determine the semantic relationship between sentences, and finally realizes network word discovery by the meaning of semantic replacement between sentences. The experiment verifies that the framework not only completes the rapid discovery of network words but also realizes the standard word meaning of the discovery of network words, which reflects the effectiveness of our work.Keywords: text information retrieval, natural language processing, new word discovery, information extraction
Procedia PDF Downloads 9516635 Factors Affecting Harvested Rain Water Quality and Quantity in Yatta Area, Palestine
Authors: Nibal Al-Batsh, Issam Al-Khatib, Subha Ghannam
Abstract:
Yatta is the study area for this research, located 9 km south of Hebron City in the West Bank in Palestine. It has been connected to a water network since 1974 serving nearly 85% of the households. The water network is old and inadequate to meet the needs of the population. The water supply made available to the area is also very limited, estimated to be around 20 l/c.d. Residents are thus forced to rely on water vendors which supply water with a lower quality compared to municipal water while being 400% more expensive. As a cheaper and more reliable alternative, rainwater harvesting is a common practice in the area, with the majority of the households owning at least one cistern. Rainwater harvesting is of great socio-economic importance in areas where water sources are scarce or polluted. The quality of harvested rainwater used for drinking and domestic purposes in the Yatta area was assessed throughout a year long period. A total of 100 water samples were collected from (50 rainfed cisterns) with an average capacity of 69 m3, adjacent to cement-roof catchment with an average area of 145 m2. Samples were analyzed for a number of parameters including: pH, Alkalinity, Hardness, Turbidity, Total Dissolved Solids (TDS), NO3, NH4, chloride and salinity. Microbiological contents such as Total Coliforms (TC) and Fecal Coliforms (FC) bacteria were also analyzed. Results showed that most of the rainwater samples were within WHO and EPA guidelines set for chemical parameters while revealing biological contamination. The pH values of mixed water ranged from 6.9 to 8.74 with a mean value of 7.6. collected Rainwater had lower pH values than mixed water ranging from 7.00 to 7.57 with a mean of 7.21. Rainwater also had lower average values of conductivity (389.11 µScm-1) compared to that of mixed water (463.74 µScm-1) thus indicating lower values of salinity (0.75%). The largest TDS value measured in rainwater was 316 mg/l with a mean of 199.86 mg /l. As far as microbiological quality is concerned, TC and FC were detected in 99%, 52% of collected rainwater samples, respectively. The research also addressed the impact of different socio-economic attributes on rainwater harvesting using information collected through a survey from the area. Results indicated that the majority of homeowners have the primary knowledge necessary to collect and store water in cisterns. Most of the respondents clean both the cisterns and the catchment areas. However, the research also arrives at a conclusion that cleaning is not done in a proper manner. Results show that cisterns with an operating capacity of 69 m3 would provide sufficient water to get through the dry summer months. However, the catchment area must exceed 146 m2 to produce sufficient water to fill a cistern of this size in a year receiving average precipitation.Keywords: rainwater harvesting, runoff coefficient, water quality, microbiological contamination
Procedia PDF Downloads 28516634 Optimization of Reliability and Communicability of a Random Two-Dimensional Point Patterns Using Delaunay Triangulation
Authors: Sopheak Sorn, Kwok Yip Szeto
Abstract:
Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a complex system will perform satisfactorily. When the system is described by a network of N components (nodes) and their L connection (links), the reliability of the system becomes a network design problem that is an NP-hard combinatorial optimization problem. In this paper, we address the network design problem for a random point set’s pattern in two dimensions. We make use of a Voronoi construction with each cell containing exactly one point in the point pattern and compute the reliability of the Voronoi’s dual, i.e. the Delaunay graph. We further investigate the communicability of the Delaunay network. We find that there is a positive correlation and a negative correlation between the homogeneity of a Delaunay's degree distribution with its reliability and its communicability respectively. Based on the correlations, we alter the communicability and the reliability by performing random edge flips, which preserve the number of links and nodes in the network but can increase the communicability in a Delaunay network at the cost of its reliability. This transformation is later used to optimize a Delaunay network with the optimum geometric mean between communicability and reliability. We also discuss the importance of the edge flips in the evolution of real soap froth in two dimensions.Keywords: Communicability, Delaunay triangulation, Edge Flip, Reliability, Two dimensional network, Voronio
Procedia PDF Downloads 41916633 Neural Network Based Fluctuation Frequency Control in PV-Diesel Hybrid Power System
Authors: Heri Suryoatmojo, Adi Kurniawan, Feby A. Pamuji, Nursalim, Syaffaruddin, Herbert Innah
Abstract:
Photovoltaic (PV) system hybrid with diesel system is utilized widely for electrification in remote area. PV output power fluctuates due to uncertainty condition of temperature and sun irradiance. When the penetration of PV power is large, the reliability of the power utility will be disturbed and seriously impact the unstable frequency of system. Therefore, designing a robust frequency controller in PV-diesel hybrid power system is very important. This paper proposes new method of frequency control application in hybrid PV-diesel system based on artificial neural network (ANN). This method can minimize the frequency deviation without smoothing PV output power that controlled by maximum power point tracking (MPPT) method. The neural network algorithm controller considers average irradiance, change of irradiance and frequency deviation. In order the show the effectiveness of proposed algorithm, the addition of battery as energy storage system is also presented. To validate the proposed method, the results of proposed system are compared with the results of similar system using MPPT only. The simulation results show that the proposed method able to suppress frequency deviation smaller compared to the results of system using MPPT only.Keywords: energy storage system, frequency deviation, hybrid power generation, neural network algorithm
Procedia PDF Downloads 50316632 Investigation of Subsurface Structures within Bosso Local Government for Groundwater Exploration Using Magnetic and Resistivity Data
Authors: Adetona Abbassa, Aliyu Shakirat B.
Abstract:
The study area is part of Bosso local Government, enclosed within Longitude 6.25’ to 6.31’ and Latitude 9.35’ to 9.45’, an area of 16x8 km², within the basement region of central Nigeria. The region is a host to Nigerian Airforce base 12 (NAF 12quick response) and its staff quarters, the headquarters of Bosso local government, the Independent National Electoral Commission’s two offices, four government secondary schools, six primary schools and Minna international airport. The area suffers an acute shortage of water from November when rains stop to June when rains commence within North Central Nigeria. A way of addressing this problem is a reconnaissance method to delineate possible fractures and fault lines that exists within the region by sampling the Aeromagnetic data and using an appropriate analytical algorithm to delineate these fractures. This is followed by an appropriate ground truthing method that will confirm if the fracture is connected to underground water movement. The first vertical derivative for structural analysis, reveals a set of lineaments labeled AA’, BB’, CC’, DD’, EE’ and FF’ all trending in the Northeast – Southwest directions. AA’ is just below latitude 9.45’ above Maikunkele village, cutting off the upper part of the field, it runs through Kangwo, Nini, Lawo and other communities. BB’ is at Latitude 9.43’ it truncated at about 2Km before Maikunkele and Kuyi. CC’ is around 9.40’ sitting below Maikunkele runs down through Nanaum. DD’ is from Latitude 9.38’; interestingly no community within this region where the fault passes through. A result from the three sites where Vertical Electrical Sounding was carried out reveals three layers comprised of topsoil, intermediate Clay formation and weathered/fractured or fresh basement. The depth to basement map was also produced, depth to the basement from the ground surface with VES A₂, B5, D₂ and E₁ to be relatively deeper with depth values range between 25 to 35 m while the shallower region of the area has a depth range value between 10 to 20 m. Hence, VES A₂, A₅, B₄, B₅, C₂, C₄, D₄, D₅, E₁, E₃, and F₄ are high conductivity zone that are prolific for groundwater potential. The depth range of the aquifer potential zones is between 22.7 m to 50.4 m. The result from site C is quite unique though the 3 layers were detected in the majority of the VES points, the maximum depth to the basement in 90% of the VES points is below 8 km, only three VES points shows considerably viability, which are C₆, E₂ and F₂ with depths of 35.2 m and 38 m respectively but lack of connectivity will be a big challenge of chargeability.Keywords: lithology, aeromagnetic, aquifer, geoelectric, iso-resistivity, basement, vertical electrical sounding(VES)
Procedia PDF Downloads 13916631 A Study of the Effects of Zimbabwean Youth Migration on Musina Area, South Africa
Authors: R. Chinyakata, N. R. Raselekoane
Abstract:
Migration has always been part of human history. Migration is spurred by globalisation which connects nations by encouraging the flow of goods, services, ideas and people across borders. Migration does not only involve movement of adults from one country to another. It also affects and involves the youth as they are the most mobile group. Musina area, like many other border areas, experiences a variety of challenges as a result of the influx of people from the neighbouring Zimbabwe and other African countries. Of great concern about this migration is the fact that the host country or area may become unsafe and unstable as a result of huge influx of migrants. There may also be tensions between local people and migrants over the resources. The study sought to investigate the effects of the Zimbabwean youth migration on Musina area. The study was undertaken in Musina area which is situated 18km from the Beit-Bridge border post. A qualitative research approach was used. Semi-structured interviews were used to collect data. Non-probability quota sampling technique was used to select the respondents. The study sample consisted of sixteen female and male respondents. Thematic coding was used to analyse the data. Ethical considerations such as informed consent, confidentiality, anonymity and voluntary participation were taken into account to protect the participants. The study found that the effects of the Zimbabwean youth migration on the Musina area include, among others, tensions between locals and the Zimbabwean youth migrants over resources, job and business opportunities, overcrowding and crime. Multi-pronged strategies which involve different stakeholders should be applied to address tensions over job and business opportunities, overcrowding and crime in the Musina area.Keywords: host country, effects, migrant, migration, Musina, youth, Zimbabwe
Procedia PDF Downloads 24416630 A New Method to Reduce 5G Application Layer Payload Size
Authors: Gui Yang Wu, Bo Wang, Xin Wang
Abstract:
Nowadays, 5G service-based interface architecture uses text-based payload like JSON to transfer business data between network functions, which has obvious advantages as internet services but causes unnecessarily larger traffic. In this paper, a new 5G application payload size reduction method is presented to provides the mechanism to negotiate about new capability between network functions when network communication starts up and how 5G application data are reduced according to negotiated information with peer network function. Without losing the advantages of 5G text-based payload, this method demonstrates an excellent result on application payload size reduction and does not increase the usage quota of computing resource. Implementation of this method does not impact any standards or specifications and not change any encoding or decoding functionality too. In a real 5G network, this method will contribute to network efficiency and eventually save considerable computing resources.Keywords: 5G, JSON, payload size, service-based interface
Procedia PDF Downloads 18416629 Thermal Network Model for a Large Scale AC Induction Motor
Authors: Sushil Kumar, M. Dakshina Murty
Abstract:
Thermal network modelling has proven to be important tool for thermal analysis of electrical machine. This article investigates numerical thermal network model and experimental performance of a large-scale AC motor. Experimental temperatures were measured using RTD in the stator which have been compared with the numerical data. Thermal network modelling fairly predicts the temperature of various components inside the large-scale AC motor. Results of stator winding temperature is compared with experimental results which are in close agreement with accuracy of 6-10%. This method of predicting hot spots within AC motors can be readily used by the motor designers for estimating the thermal hot spots of the machine.Keywords: AC motor, thermal network, heat transfer, modelling
Procedia PDF Downloads 32616628 Analysis of Network Connectivity for Ship-To-Ship Maritime Communication Using IEEE 802.11 on Maritime Environment of Tanjung Perak, Indonesia
Authors: Ahmad Fauzi Makarim, Okkie Puspitorini, Hani'ah Mahmudah, Nur Adi Siswandari, Ari Wijayanti
Abstract:
As a maritime country, Indonesia needs a solution in maritime connectivity which can assist the maritime communication system which including communication from harbor to the ship or ship to ship. The needs of many application services for maritime communication, whether for safety reasons until voyage service to help the process of voyage activity needs connection with a high bandwith. To support the government efforts in handling that kind of problem, a research is conducted in maritime communication issue by applying the new developed technology in Indonesia, namely IEEE 802.11. In this research, 3 outdoor WiFi devices are used in which have a frequency of 5.8 GHz. Maritime of Tanjung Perak harbor in Surabaya until Karang Jamuang Island are used as the location of the research with defining permission of ship node spreading by Navigation District Class 1. That maritime area formed by state 1 and state 2 areas which are the narrow area with average wave height of 0.7 meter based on the data from BMKG S urabaya. After that, wave height used as one of the parameters which are used in analyzing characteristic of signal propagation at sea surface, so it can be determined on the coverage area of transmitter system. In this research has been used three samples of outdoor wifi, there is the coverage of device A can be determined about 2256 meter, device B 4000 meter, and device C 1174 meter. Then to analyze of network connectivity for the ship to ship is used AODV routing algorithm system based on the value of the power transmit was smallest of all nodes within the transmitter coverage.Keywords: maritime of Indonesia, maritime communications, outdoor wifi, coverage, AODV
Procedia PDF Downloads 35116627 Recent Climate Variability and Crop Production in the Central Highlands of Ethiopia
Authors: Arragaw Alemayehu, Woldeamlak Bewket
Abstract:
The aim of this study was to understand the influence of current climate variability on crop production in the central highlands of Ethiopia. We used monthly rainfall and temperature data from 132 points each representing a pixel of 10×10 km. The data are reconstructions based on station records and meteorological satellite observations. Production data of the five major crops in the area were collected from the Central Statistical Agency for the period 2004-2013 and for the main cropping season, locally known as Meher. The production data are at the Enumeration Area (EA ) level and hence the best available dataset on crop production. The results show statistically significant decreasing trends in March–May (Belg) rainfall in the area. However, June – September (Kiremt) rainfall showed increasing trends in Efratana Gidim and Menz Gera Meder which the latter is statistically significant. Annual rainfall also showed positive trends in the area except Basona Werana where significant negative trends were observed. On the other hand, maximum and minimum temperatures showed warming trends in the study area. Correlation results have shown that crop production and area of cultivation have positive correlation with rainfall, and negative with temperature. When the trends in crop production are investigated, most crops showed negative trends and below average production was observed. Regression results have shown that rainfall was the most important determinant of crop production in the area. It is concluded that current climate variability has a significant influence on crop production in the area and any unfavorable change in the local climate in the future will have serious implications for household level food security. Efforts to adapt to the ongoing climate change should begin from tackling the current climate variability and take a climate risk management approach.Keywords: central highlands, climate variability, crop production, Ethiopia, regression, trend
Procedia PDF Downloads 43816626 A Two-Step Framework for Unsupervised Speaker Segmentation Using BIC and Artificial Neural Network
Authors: Ahmad Alwosheel, Ahmed Alqaraawi
Abstract:
This work proposes a new speaker segmentation approach for two speakers. It is an online approach that does not require a prior information about speaker models. It has two phases, a conventional approach such as unsupervised BIC-based is utilized in the first phase to detect speaker changes and train a Neural Network, while in the second phase, the output trained parameters from the Neural Network are used to predict next incoming audio stream. Using this approach, a comparable accuracy to similar BIC-based approaches is achieved with a significant improvement in terms of computation time.Keywords: artificial neural network, diarization, speaker indexing, speaker segmentation
Procedia PDF Downloads 50216625 Identification of Soft Faults in Branched Wire Networks by Distributed Reflectometry and Multi-Objective Genetic Algorithm
Authors: Soumaya Sallem, Marc Olivas
Abstract:
This contribution presents a method for detecting, locating, and characterizing soft faults in a complex wired network. The proposed method is based on multi-carrier reflectometry MCTDR (Multi-Carrier Time Domain Reflectometry) combined with a multi-objective genetic algorithm. In order to ensure complete network coverage and eliminate diagnosis ambiguities, the MCTDR test signal is injected at several points on the network, and the data is merged between different reflectometers (sensors) distributed on the network. An adapted multi-objective genetic algorithm is used to merge data in order to obtain more accurate faults location and characterization. The proposed method performances are evaluated from numerical and experimental results.Keywords: wired network, reflectometry, network distributed diagnosis, multi-objective genetic algorithm
Procedia PDF Downloads 19516624 A Coordinate-Based Heuristic Route Search Algorithm for Delivery Truck Routing Problem
Authors: Ahmed Tarek, Ahmed Alveed
Abstract:
Vehicle routing problem is a well-known re-search avenue in computing. Modern vehicle routing is more focused with the GPS-based coordinate system, as the state-of-the-art vehicle, and trucking systems are equipped with digital navigation. In this paper, a new two dimensional coordinate-based algorithm for addressing the vehicle routing problem for a supply chain network is proposed and explored, and the algorithm is compared with other available, and recently devised heuristics. For the algorithms discussed, which includes the pro-posed coordinate-based search heuristic as well, the advantages and the disadvantages associated with the heuristics are explored. The proposed algorithm is studied from the stand point of a small supermarket chain delivery network that supplies to its stores in four different states around the East Coast area, and is trying to optimize its trucking delivery cost. Minimizing the delivery cost for the supply network of a supermarket chain is important to ensure its business success.Keywords: coordinate-based optimal routing, Hamiltonian Circuit, heuristic algorithm, traveling salesman problem, vehicle routing problem
Procedia PDF Downloads 14816623 Implementation and Demonstration of Software-Defined Traffic Grooming
Authors: Lei Guo, Xu Zhang, Weigang Hou
Abstract:
Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming
Procedia PDF Downloads 25116622 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 15016621 Reliable Multicast Communication in Next Generation Networks
Authors: Muazzam Ali Khan Khattak
Abstract:
Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN
Procedia PDF Downloads 50316620 Towards Security in Virtualization of SDN
Authors: Wanqing You, Kai Qian, Xi He, Ying Qian
Abstract:
In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.Keywords: SDN, network, virtualization, security
Procedia PDF Downloads 42816619 Impact of Radio on Rural Development: A Study of Ipokia Local Government Area, Nigeria
Authors: Haruna Shola Adeosun, Adeoye Odedeji
Abstract:
This paper examines the impact of radio on rural development. The researcher employed survey method to gather primary data. The objectives and questions were used from and hypotheses were formulated were raised from the statement of the problem. Cultivation theory was used as the theoretical study. The populations of the study were the inhabitant of Ipokia Local Government. Questionnaires were administered on the 400 respondents. Data gathered were analyzed, interpreted and hypotheses of the study were tested. The finding revealed that; radio has impacted on the rural dwellers and there is a significant relationship between radio and rural dwellers. Also, radio has brought socio-economic development on rural dwellers. The study recommended that radio messages should be designed in line with the pre-existing attitudes of the rural dwellers. It was also discovered that radio stations should endeavour to use local dialects especially when the radio programme is aimed at the rural dwellers that effective communication that can increase active participation of government and the public. Finally, the study recommends that radio stations should be well funded to produce programmes that would serve the purpose of educating and informing the public on issues relevant to them and there is need to establish community radio stations that will be closer to rural dwellers.Keywords: impact, radio, rural, development
Procedia PDF Downloads 32616618 Earthquake Relocations and Constraints on the Lateral Velocity Variations along the Gulf of Suez, Using the Modified Joint Hypocenter Method Determination
Authors: Abu Bakr Ahmed Shater
Abstract:
Hypocenters of 250 earthquakes recorded by more than 5 stations from the Egyptian seismic network around the Gulf of Suez were relocated and the seismic stations correction for the P-wave is estimated, using the modified joint hypocenter method determination. Five stations TR1, SHR, GRB, ZAF and ZET have minus signs in the station P-wave travel time corrections and their values are -0.235, -0.366, -0.288, -0.366 and -0.058, respectively. It is possible to assume that, the underground model in this area has a particular characteristic of high velocity structure in which the other stations TR2, RDS, SUZ, HRG and ZNM have positive signs and their values are 0.024, 0.187, 0.314, 0.645 and 0.145, respectively. It is possible to assume that, the underground model in this area has particular characteristic of low velocity structure. The hypocenteral location determined by the Modified joint hypocenter method is more precise than those determined by the other routine work program. This method simultaneously solves the earthquake locations and station corrections. The station corrections reflect, not only the different crustal conditions in the vicinity of the stations, but also the difference between the actual and modeled seismic velocities along each of the earthquake - station ray paths. The stations correction obtained is correlated with the major surface geological features in the study area. As a result of the relocation, the low velocity area appears in the northeastern and southwestern sides of the Gulf of Suez, while the southeastern and northwestern parts are of high velocity area.Keywords: gulf of Suez, seismicity, relocation of hypocenter, joint hypocenter determination
Procedia PDF Downloads 35816617 A Review of Literature for Online Social Network Business Continuance Intention and the Hypotheses Thereof
Authors: Akwesi Assensoh-Kodua
Abstract:
Online Social Networks (OSN) has come and gone, yet the explosion of business activities on such platforms continuous to surge high, giving advantage to the bold entrepreneurs. It is therefore a practical requirement that practitioners and researchers understand the key determinants of costumers’ online social network business activities and continuance intention. An exploratory literature research to examine OSN continuous intention of business participants on OSN revealed that the practice of doing business on social network has come to stay and the following factors are the likely drivers for this new business model: perceived trust, perceived ease of use, confirmation, habit, social norm, perceived behavioural control, expected benefit, and satisfaction are the most probable factors that can lead to online social network (OSN) continuance intention.Keywords: online social network, continuance intention, business continuance
Procedia PDF Downloads 49416616 A Multi-agent System Framework for Stakeholder Analysis of Local Energy Systems
Authors: Mengqiu Deng, Xiao Peng, Yang Zhao
Abstract:
The development of local energy systems requires the collective involvement of different actors from various levels of society. However, the stakeholder analysis of local energy systems still has been under-developed. This paper proposes an multi-agent system (MAS) framework to facilitate the development of stakeholder analysis of local energy systems. The framework takes into account the most influencing stakeholders, including prosumers/consumers, system operators, energy companies and government bodies. Different stakeholders are modeled based on agent architectures for example the belief-desire-intention (BDI) to better reflect their motivations and interests in participating in local energy systems. The agent models of different stakeholders are then integrated in one model of the whole energy system. An illustrative case study is provided to elaborate how to develop a quantitative agent model for different stakeholders, as well as to demonstrate the practicability of the proposed framework. The findings from the case study indicate that the suggested framework and agent model can serve as analytical instruments for enhancing the government’s policy-making process by offering a systematic view of stakeholder interconnections in local energy systems.Keywords: multi-agent system, BDI agent, local energy systems, stakeholders
Procedia PDF Downloads 8716615 High Culture or Low Culture: The Propagation and Popularization of the Classic of Poetry in Modern China
Authors: Fang Tang
Abstract:
A major Confucian masterpiece and the earliest-known poetry anthology (composed approximately 1046-771 BCE), The Classic of Poetry, reflects different cultures in ancient China. It is regarded as a Chinese classic and one of the world’s most significant written works, an essential part of our global cultural heritage. This paper explores how the ancient Chinese classic became transformed into part of popular culture, found in folk songs circulated in Fangxian county, a mountainous location in Hubei province in central mainland China. It is the hometown of one of the most well-known authors of The Classic of Poetry, whose name is Yin Jifu. Local villagers process, refine, and recreate these poems into popular folk songs, which have been handed down from generation to generation. The folk songs based on The Classic of Poetry vividly reflect local customs, life styles, and various cultural activities. After thousands of years of singing these traditional songs, the region has become an important area to maintain part of Chinese cultural heritages; here, the original high culture is converted into a popular culture that is absorbed into people’s daily life. Based on a year’s field research and many interviews with local singers, this paper explores the ways in which locals have transformed the contents of The Classic of Poetry. It examines how today these popular folk songs become part of much-treasured culture heritage, illustrating the transformation of traditional high culture into popular culture. The paper argues that the modern adaptations of the traditional poems of The Classic of Poetry combine both oral and written cultural heritage and reflects the interaction between ancient Chinese official literature and folk literature. The paper also explores the reasons why the folk songs of The Classic of Poetry are so popular in the area, including the influences of its author Yin Jifu, the impact of ancient diasporic culture from the political centre to remote rural areas, and the interactions of local cultures (famous as Chu culture) and Chinese mainstream cultural policies.Keywords: high/low culture, The Classic of Poetry, the functions of media, cultural policy
Procedia PDF Downloads 10416614 Optimizing Network Latency with Fast Path Assignment for Incoming Flows
Abstract:
Various flows in the network require to go through different types of middlebox. The improper placement of network middlebox and path assignment for flows could greatly increase the network latency and also decrease the performance of network. Minimizing the total end to end latency of all the ows requires to assign path for the incoming flows. In this paper, the flow path assignment problem in regard to the placement of various kinds of middlebox is studied. The flow path assignment problem is formulated to a linear programming problem, which is very time consuming. On the other hand, a naive greedy algorithm is studied. Which is very fast but causes much more latency than the linear programming algorithm. At last, the paper presents a heuristic algorithm named FPA, which takes bottleneck link information and estimated bandwidth occupancy into consideration, and achieves near optimal latency in much less time. Evaluation results validate the effectiveness of the proposed algorithm.Keywords: flow path, latency, middlebox, network
Procedia PDF Downloads 20716613 Economic Analysis of Cassava Value Chain by Farmers in Ilesa West Local Government Area of Osun State
Authors: Maikasuwa Mohammed Abubakar, Okebiorun Ola, M. H. Sidi, Ala Ahmed Ladan, Ango Aabdullahi Kamba
Abstract:
The study examines the economic analysis of cassava value chain by farmers in Ilesa West Local Government Area of Osun State. Simple random sampling technique was used to collect data from 200 respondents from purposively selected wards in the L.G.A. The data collected were analyzed using budgetary analysis and value addition model. The result shows that an average total cost incurred by the input dealers was ₦9,062,127.74 while the average net profit realized was ₦1,038,102.40. Other actors such as producers, processors and marketers incurred an average total cost of ₦23,324.00, ₦130,177.00 and ₦523,755.00 per production season, respectively and the average net profit realized was ₦102,614.00 for cassava producers, ₦51,131.00 for cassava processors and ₦79,045.00 for cassava marketers during cassava production season. Further analysis shows the rate of investment for cassava input dealers was ₦0.1, for cassava producers was ₦4.4, for cassava processors were ₦0.40 and for cassava marketers was ₦0.20. This indicated that rate of return on cassava was higher in cassava production than in others corridors along the value chain of cassava. However, value added the cassava producers (₦102,536.16/season) was the highest when compared with value added by cassava processors (₦51,853.82/season) and cassava marketers (₦100,885.56/season).Keywords: Cassava, value chain, Ilesa West, Nigeria
Procedia PDF Downloads 33316612 Domain-Specific Deep Neural Network Model for Classification of Abnormalities on Chest Radiographs
Authors: Nkechinyere Joy Olawuyi, Babajide Samuel Afolabi, Bola Ibitoye
Abstract:
This study collected a preprocessed dataset of chest radiographs and formulated a deep neural network model for detecting abnormalities. It also evaluated the performance of the formulated model and implemented a prototype of the formulated model. This was with the view to developing a deep neural network model to automatically classify abnormalities in chest radiographs. In order to achieve the overall purpose of this research, a large set of chest x-ray images were sourced for and collected from the CheXpert dataset, which is an online repository of annotated chest radiographs compiled by the Machine Learning Research Group, Stanford University. The chest radiographs were preprocessed into a format that can be fed into a deep neural network. The preprocessing techniques used were standardization and normalization. The classification problem was formulated as a multi-label binary classification model, which used convolutional neural network architecture to make a decision on whether an abnormality was present or not in the chest radiographs. The classification model was evaluated using specificity, sensitivity, and Area Under Curve (AUC) score as the parameter. A prototype of the classification model was implemented using Keras Open source deep learning framework in Python Programming Language. The AUC ROC curve of the model was able to classify Atelestasis, Support devices, Pleural effusion, Pneumonia, A normal CXR (no finding), Pneumothorax, and Consolidation. However, Lung opacity and Cardiomegaly had a probability of less than 0.5 and thus were classified as absent. Precision, recall, and F1 score values were 0.78; this implies that the number of False Positive and False Negative is the same, revealing some measure of label imbalance in the dataset. The study concluded that the developed model is sufficient to classify abnormalities present in chest radiographs into present or absent.Keywords: transfer learning, convolutional neural network, radiograph, classification, multi-label
Procedia PDF Downloads 12916611 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 43316610 Information Theoretic Approach for Beamforming in Wireless Communications
Authors: Syed Khurram Mahmud, Athar Naveed, Shoaib Arif
Abstract:
Beamforming is a signal processing technique extensively utilized in wireless communications and radars for desired signal intensification and interference signal minimization through spatial selectivity. In this paper, we present a method for calculation of optimal weight vectors for smart antenna array, to achieve a directive pattern during transmission and selective reception in interference prone environment. In proposed scheme, Mutual Information (MI) extrema are evaluated through an energy constrained objective function, which is based on a-priori information of interference source and desired array factor. Signal to Interference plus Noise Ratio (SINR) performance is evaluated for both transmission and reception. In our scheme, MI is presented as an index to identify trade-off between information gain, SINR, illumination time and spatial selectivity in an energy constrained optimization problem. The employed method yields lesser computational complexity, which is presented through comparative analysis with conventional methods in vogue. MI based beamforming offers enhancement of signal integrity in degraded environment while reducing computational intricacy and correlating key performance indicators.Keywords: beamforming, interference, mutual information, wireless communications
Procedia PDF Downloads 28116609 Promoting Authenticity in Employer Brands to Address the Global-Local Problem in Complex Organisations: The Case of a Developing Country
Authors: Saud Al Taj
Abstract:
Employer branding is considered as a useful tool for addressing the global-local problem facing complex organisations that have operations scattered across the globe and face challenges of dealing with the local environment alongside. Despite being an established field of study within the Western developed world, there is little empirical evidence concerning the relevance of employer branding to global companies that operate in the under-developed economies. This paper fills this gap by gaining rich insight into the implementation of employer branding programs in a foreign multinational operating in Pakistan dealing with the global-local problem. The study is qualitative in nature and employs semi-structured and focus group interviews with senior/middle managers and local frontline employees to deeply examine the phenomenon in case organisation. Findings suggest that authenticity is required in employer brands to enable them to respond to the local needs thereby leading to the resolution of the global-local problem. However, the role of signaling theory is key to the development of authentic employer brands as it stresses on the need to establish an efficient and effective signaling environment wherein signals travel in both directions (from signal designers to receivers and backwards) and facilitate firms with the global-local problem. The paper also identifies future avenues of research for the employer branding field.Keywords: authenticity, counter-signals, employer branding, global-local problem, signaling theory
Procedia PDF Downloads 368