Search results for: participatory air quality network siting
13338 Complex Decision Rules in Quality Assurance Processes for Quick Service Restaurant Industry: Human Factors Determining Acceptability
Authors: Brandon Takahashi, Marielle Hanley, Gerry Hanley
Abstract:
The large-scale quick-service restaurant industry is a complex business to manage optimally. With over 40 suppliers providing different ingredients for food preparation and thousands of restaurants serving over 50 unique food offerings across a wide range of regions, the company must implement a quality assurance process. Businesses want to deliver quality food efficiently, reliably, and successfully at a low cost that the public wants to buy. They also want to make sure that their food offerings are never unsafe to eat or of poor quality. A good reputation (and profitable business) developed over the years can be gone in an instant if customers fall ill eating your food. Poor quality also results in food waste, and the cost of corrective actions is compounded by the reduction in revenue. Product compliance evaluation assesses if the supplier’s ingredients are within compliance with the specifications of several attributes (physical, chemical, organoleptic) that a company will test to ensure that a quality, safe to eat food is given to the consumer and will deliver the same eating experience in all parts of the country. The technical component of the evaluation includes the chemical and physical tests that produce numerical results that relate to shelf-life, food safety, and organoleptic qualities. The psychological component of the evaluation includes organoleptic, which is acting on or involving the use of the sense organs. The rubric for product compliance evaluation has four levels: (1) Ideal: Meeting or exceeding all technical (physical and chemical), organoleptic, & psychological specifications. (2) Deviation from ideal but no impact on quality: Not meeting or exceeding some technical and organoleptic/psychological specifications without impact on consumer quality and meeting all food safety requirements (3) Acceptable: Not meeting or exceeding some technical and organoleptic/psychological specifications resulting in reduction of consumer quality but not enough to lessen demand and meeting all food safety requirements (4) Unacceptable: Not meeting food safety requirements, independent of meeting technical and organoleptic specifications or meeting all food safety requirements but product quality results in consumer rejection of food offering. Sampling of products and consumer tastings within the distribution network is a second critical element of the quality assurance process and are the data sources for the statistical analyses. Each finding is not independently assessed with the rubric. For example, the chemical data will be used to back up/support any inferences on the sensory profiles of the ingredients. Certain flavor profiles may not be as apparent when mixed with other ingredients, which leads to weighing specifications differentially in the acceptability decision. Quality assurance processes are essential to achieve that balance of quality and profitability by making sure the food is safe and tastes good but identifying and remediating product quality issues before they hit the stores. Comprehensive quality assurance procedures implement human factors methodologies, and this report provides recommendations for systemic application of quality assurance processes for quick service restaurant services. This case study will review the complex decision rubric and evaluate processes to ensure the right balance of cost, quality, and safety is achieved.Keywords: decision making, food safety, organoleptics, product compliance, quality assurance
Procedia PDF Downloads 18813337 Developing an Edutainment Game for Children with ADHD Based on SAwD and VCIA Model
Authors: Bruno Gontijo Batista
Abstract:
This paper analyzes how the Socially Aware Design (SAwD) and the Value-oriented and Culturally Informed Approach (VCIA) design model can be used to develop an edutainment game for children with Attention Deficit Hyperactivity Disorder (ADHD). The SAwD approach seeks a design that considers new dimensions in human-computer interaction, such as culture, aesthetics, emotional and social aspects of the user's everyday experience. From this perspective, the game development was VCIA model-based, including the users in the design process through participatory methodologies, considering their behavioral patterns, culture, and values. This is because values, beliefs, and behavioral patterns influence how technology is understood and used and the way it impacts people's lives. This model can be applied at different stages of design, which goes from explaining the problem and organizing the requirements to the evaluation of the prototype and the final solution. Thus, this paper aims to understand how this model can be used in the development of an edutainment game for children with ADHD. In the area of education and learning, children with ADHD have difficulties both in behavior and in school performance, as they are easily distracted, which is reflected both in classes and on tests. Therefore, they must perform tasks that are exciting or interesting for them, once the pleasure center in the brain is activated, it reinforces the center of attention, leaving the child more relaxed and focused. In this context, serious games have been used as part of the treatment of ADHD in children aiming to improve focus and attention, stimulate concentration, as well as be a tool for improving learning in areas such as math and reading, combining education and entertainment (edutainment). Thereby, as a result of the research, it was developed, in a participatory way, applying the VCIA model, an edutainment game prototype, for a mobile platform, for children between 8 and 12 years old.Keywords: ADHD, edutainment, SAwD, VCIA
Procedia PDF Downloads 19013336 The Convolution Recurrent Network of Using Residual LSTM to Process the Output of the Downsampling for Monaural Speech Enhancement
Authors: Shibo Wei, Ting Jiang
Abstract:
Convolutional-recurrent neural networks (CRN) have achieved much success recently in the speech enhancement field. The common processing method is to use the convolution layer to compress the feature space by multiple upsampling and then model the compressed features with the LSTM layer. At last, the enhanced speech is obtained by deconvolution operation to integrate the global information of the speech sequence. However, the feature space compression process may cause the loss of information, so we propose to model the upsampling result of each step with the residual LSTM layer, then join it with the output of the deconvolution layer and input them to the next deconvolution layer, by this way, we want to integrate the global information of speech sequence better. The experimental results show the network model (RES-CRN) we introduce can achieve better performance than LSTM without residual and overlaying LSTM simply in the original CRN in terms of scale-invariant signal-to-distortion ratio (SI-SNR), speech quality (PESQ), and intelligibility (STOI).Keywords: convolutional-recurrent neural networks, speech enhancement, residual LSTM, SI-SNR
Procedia PDF Downloads 20013335 Packet Fragmentation Caused by Encryption and Using It as a Security Method
Authors: Said Rabah Azzam, Andrew Graham
Abstract:
Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.Keywords: fragmentation, encryption, security, switch
Procedia PDF Downloads 33513334 Analysis on the Copyright Protection Dilemma of Webcast in 'Internet Plus' Era
Authors: Yi Yang
Abstract:
In the era of 'Internet plus', the rapid development of webcast has posed new challenges to the intellectual property law. Meanwhile, traditional copyright protection has also exposed the existing theoretical imbalance in webcast. Through the analysis of the outstanding problems in the copyright protection of the network live broadcast, this paper points out that the main causes of the problems are the unclear nature of the copyright of the network live broadcast, the copyright protection system of the game network live broadcast has not yet been constructed, and the copyright infringement of the pan entertainment live broadcast is mostly, and so on. Based on the current practice, this paper puts forward the specific thinking of the protection path of online live broadcast copyright. First of all, to provide a reasonable judicial solution for a large number of online live copyright cases, we need to integrate the right scope and regulatory behavior of broadcasting right and information network communication right. Secondly, in order to protect the rights of network anchors, the webcast should be regarded as works. Thirdly, in order to protect the copyright of webcast and prevent the infringement of copyright by webcast, the webcast platform will be used as an intermediary to provide solutions for solving the judicial dilemma. In the era of 'Internet plus', it is a theoretical attempt to explore the protection and method of copyright protection on webcast, which has positive guiding significance for judicial practice.Keywords: 'Internet Plus' era, webcast, copyright, protection dilemma
Procedia PDF Downloads 11313333 Introduction of Electronic Health Records to Improve Data Quality in Emergency Department Operations
Authors: Anuruddha Jagoda, Samiddhi Samarakoon, Anil Jasinghe
Abstract:
In its simplest form, data quality can be defined as 'fitness for use' and it is a concept with multi-dimensions. Emergency Departments(ED) require information to treat patients and on the other hand it is the primary source of information regarding accidents, injuries, emergencies etc. Also, it is the starting point of various patient registries, databases and surveillance systems. This interventional study was carried out to improve data quality at the ED of the National Hospital of Sri Lanka (NHSL) by introducing an e health solution to improve data quality. The NHSL is the premier trauma care centre in Sri Lanka. The study consisted of three components. A research study was conducted to assess the quality of data in relation to selected five dimensions of data quality namely accuracy, completeness, timeliness, legibility and reliability. The intervention was to develop and deploy an electronic emergency department information system (eEDIS). Post assessment of the intervention confirmed that all five dimensions of data quality had improved. The most significant improvements are noticed in accuracy and timeliness dimensions.Keywords: electronic health records, electronic emergency department information system, emergency department, data quality
Procedia PDF Downloads 27413332 Learning Dynamic Representations of Nodes in Temporally Variant Graphs
Authors: Sandra Mitrovic, Gaurav Singh
Abstract:
In many industries, including telecommunications, churn prediction has been a topic of active research. A lot of attention has been drawn on devising the most informative features, and this area of research has gained even more focus with spread of (social) network analytics. The call detail records (CDRs) have been used to construct customer networks and extract potentially useful features. However, to the best of our knowledge, no studies including network features have yet proposed a generic way of representing network information. Instead, ad-hoc and dataset dependent solutions have been suggested. In this work, we build upon a recently presented method (node2vec) to obtain representations for nodes in observed network. The proposed approach is generic and applicable to any network and domain. Unlike node2vec, which assumes a static network, we consider a dynamic and time-evolving network. To account for this, we propose an approach that constructs the feature representation of each node by generating its node2vec representations at different timestamps, concatenating them and finally compressing using an auto-encoder-like method in order to retain reasonably long and informative feature vectors. We test the proposed method on churn prediction task in telco domain. To predict churners at timestamp ts+1, we construct training and testing datasets consisting of feature vectors from time intervals [t1, ts-1] and [t2, ts] respectively, and use traditional supervised classification models like SVM and Logistic Regression. Observed results show the effectiveness of proposed approach as compared to ad-hoc feature selection based approaches and static node2vec.Keywords: churn prediction, dynamic networks, node2vec, auto-encoders
Procedia PDF Downloads 31413331 Modelling Enablers of Service Using ISM: Implications for Quality Improvements in Healthcare Sector of UAE
Authors: Flevy Lasrado
Abstract:
Purpose: The purpose of this paper is to show the relationship between the service quality dimensions and model them to propose quality improvements using interpretive structural modelling (ISM). Methodology: This paper used an interpretive structural modelling (ISM). The data was collected from the expert opinions that included a questionnaire. The detailed method of using ISM is discussed in the paper. Findings: The present research work provides an ISM based model to understand the relationships among the service quality dimensions. Practical implications or Original Value: An ISM based model has been developed for healthcare facility for improving customer satisfaction and increasing market share. Although there is lot of research on SERVQUAL model adapted to healthcare sector, no study has been done to understand the interactions among these dimensions. So the major contribution of this research work is the development of contextual relationships among identified variables through a systematic framework. The present research work provides an ISM based model to understand the relationships among the service quality dimensions.Keywords: SERQUAL, healthcare, quality, service quality
Procedia PDF Downloads 40513330 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 19813329 Organizational Ideologies and Their Embeddedness in Fashion Show Productions in Shanghai and London Fashion Week: International-Based-Chinese Independent Designers' Participatory Behaviors in Different Fashion Cities
Authors: Zhe Wang
Abstract:
The fashion week, as a critical international fashion event in shaping world fashion cities, is one of the most significant world events that serves as the core medium for designers to stage new collections. However, its role in bringing about and shaping design ideologies of major fashion cities have long been neglected from a fashion ecosystem perspective. With the expanding scale of international fashion weeks in terms of culture and commerce, the organizational structures of these fashion weeks are becoming more complex. In the emerging fashion city, typified by Shanghai, a newly-formed 'hodgepodge' transforming the current global fashion ecosystem. A city’s legitimate fashion institutions, typically the organizers of international fashion weeks, have cultivated various cultural characteristics via rules and regulations pertaining to international fashion weeks. Under these circumstances, designers’ participatory behaviors, specifically show design and production, are influenced by the cultural ideologies of official organizers and institutions. This research compares international based Chinese (IBC) independent designers’ participatory behavior in London and Shanghai Fashion Weeks: specifically, the way designers present their clothing and show production. both of which are found to be profoundly influenced by cultural and design ideologies of fashion weeks. They are, to a large degree, manipulated by domestic institutions and organizers. Shanghai fashion week has given rise to a multiple, mass-ended entertainment carnival design and cultural ideology in Shanghai, thereby impacting the explicit cultural codes or intangible rules that IBC designers must adhere to when designing and producing fashion shows. Therefore, influenced by various cultural characteristics in the two cities, IBC designers’ show design and productions, in turn, play an increasingly vital role in shaping the design characteristic of an international fashion week. Through researching the organizational systems and design preferences of organizers of London and Shanghai fashion weeks, this paper demonstrates the embeddedness of design systems in the forming of design ideologies under various cultural and institutional contexts. The core methodology utilized in this research is ethnography. As a crucial part of a Ph.D. project on innovations in fashion shows under a cross-cultural context run by Edinburgh College of Art, School of Design, the fashion week’s organizational culture in various cultural contexts is investigated in London and Shanghai for approximately six months respectively. Two IBC designers, Angel Chen and Xuzhi Chen were followed during their participation of London and Shanghai Fashion Weeks from September 2016 to June 2017, during which two consecutive seasons were researched in order to verify the consistency of design ideologies’ associations with organizational system and culture.Keywords: institutional ideologies, international fashion weeks, IBC independent designers; fashion show
Procedia PDF Downloads 11813328 An Exploratory Study of E-Learning Stakeholders’ Experiences of Developing, Implementing and Enhancing E-Courses in One Saudi University
Authors: Zahra Alqahtani
Abstract:
The use of e-learning technologies is gaining momentum in all educational institutions of the world, including Saudi universities. In the e-learning context, there is a growing need and concern among Saudi universities to improve and enhance quality assurance for e-learning systems. Practicing quality assurance activities and applying quality standards in e-learning in Saudi universities is thought to reduce the negative viewpoints of some stakeholders and ensure stakeholders’ satisfaction and needs. As a contribution to improving the quality of e-learning method in Saudi universities, the main purpose of this study is to explore and investigate strategies for the development of quality assurance in e-learning in one university in Saudi Arabia, which is considered a good reference university using the best and ongoing practices in e-learning systems among Saudi universities. In order to ensure the quality of its e-learning methods, Saudi university has adopted Quality Matters Standards as a controlling guide for the quality of its blended and full e-course electronic courses. Furthermore, quality assurance can be further improved if a variety of perspectives are taken into consideration from the comprehensive viewpoints of faculty members, administrative staff, and students.This qualitative research involved the use of different types of interviews, as well as documents that contain data related to e-learning methods in the Saudi university environment. This exploratory case study was undertaken, from the perspectives of various participants, to understand the phenomenon of quality assurance using an inductive technique.The results revealed six main supportive factors that assist in ensuring the quality of e-learning in the Saudi university environment. Essentially, these factors are institutional support, faculty member support, evaluation of faculty, quality of e-course design, technology support, and student support, which together have a remarkable positive effect on quality, forming intrinsic columns connected by bricks leading to quality e-learning. Quality Matters standards are considered to have a strong impact on improving faculty members' skills and on the development of high-quality blended and full e-courses.Keywords: E-learning, quality assurance, quality matters standards, KKU-supportive factors
Procedia PDF Downloads 12213327 Fast Adjustable Threshold for Uniform Neural Network Quantization
Authors: Alexander Goncharenko, Andrey Denisov, Sergey Alyamkin, Evgeny Terentev
Abstract:
The neural network quantization is highly desired procedure to perform before running neural networks on mobile devices. Quantization without fine-tuning leads to accuracy drop of the model, whereas commonly used training with quantization is done on the full set of the labeled data and therefore is both time- and resource-consuming. Real life applications require simplification and acceleration of quantization procedure that will maintain accuracy of full-precision neural network, especially for modern mobile neural network architectures like Mobilenet-v1, MobileNet-v2 and MNAS. Here we present a method to significantly optimize training with quantization procedure by introducing the trained scale factors for discretization thresholds that are separate for each filter. Using the proposed technique, we quantize the modern mobile architectures of neural networks with the set of train data of only ∼ 10% of the total ImageNet 2012 sample. Such reduction of train dataset size and small number of trainable parameters allow to fine-tune the network for several hours while maintaining the high accuracy of quantized model (accuracy drop was less than 0.5%). Ready-for-use models and code are available in the GitHub repository.Keywords: distillation, machine learning, neural networks, quantization
Procedia PDF Downloads 32513326 Influence of Dairy Cows Food on Uncooked Pressed Dough Cheese "Edam" Quality
Authors: Nougha Meriem, Sadouki Mohammed
Abstract:
Cheese quality is an important manufacturing requirement. It deals with traceability, from the dairy cows feed to the storage location. In this study, we have seen the impact of distributing two different types of green feed (purple clover VS alfalfa), in a ration composed of oat hay, silage of corn and concentrated feed, in equal quantities, on resulting milk destined for an Edam manufacturing. It reveals that alfalfa allows a high production of milk, comparatively to purple clover. However, this latter allows a high quality of milk, in point of view physico-chemical properties, especially regarding proteins and fat yields, two essential factors affecting Edam quality. The obtained results indicated that milk allowed by purple clover shows a best physico-chemical quality beside alfalfa, for it use in Edam manufacturing according to the values recommended by standardized dairies.Keywords: dairy cows, Edam, food, quality
Procedia PDF Downloads 32113325 Management of Quality Assessment of Teaching and Methodological Activities of a Teacher of a Military, Special Educational Institution
Authors: Maxutova I. O., Bulatbayeva A. A.
Abstract:
In modern conditions, the competitiveness of the military, a special educational institution in the educational market, is determined by the quality of the provision of educational services and the economic efficiency of activities. Improving the quality of educational services of the military, the special educational institution is an urgent socially and economically significant problem. The article shows a possible system for the formation of the competitiveness of military, the special educational institution through an assessment of the quality of the educational process, the problem of the transition of the military, special educational institution to digital support of indicative monitoring of the quality of services provided is raised. Quality monitoring is presented in the form of a program or information system, the work of which is carried out in a military, the special educational institution through highlighted interrelated elements. A result-oriented model of management and assessment of the quality of work of the military, the special educational institution is proposed. The indicative indicators for assessing the quality of the teaching and methodological activity of the teacher are considered and described. The publication was prepared as part of an applied grant study for 2020-2022 commissioned by the Ministry of Education and Science of the Republic of Kazakhstan on the topic "Development of a comprehensive methodology for assessing the quality of education of graduates of military special educational institutions" IRN 00029/GF-20.Keywords: quality assessment, indicative indicators, monitoring program, educational and methodological activities, professional activities, result
Procedia PDF Downloads 15113324 Sustainable Design of Coastal Bridge Networks in the Presence of Multiple Flood and Earthquake Risks
Authors: Riyadh Alsultani, Ali Majdi
Abstract:
It is necessary to develop a design methodology that includes the possibility of seismic events occurring in a region, the vulnerability of the civil hydraulic structure, and the effects of the occurrence hazard on society, environment, and economy in order to evaluate the flood and earthquake risks of coastal bridge networks. This paper presents a design approach for the assessment of the risk and sustainability of coastal bridge networks under time-variant flood-earthquake conditions. The social, environmental, and economic indicators of the network are used to measure its sustainability. These consist of anticipated loss, downtime, energy waste, and carbon dioxide emissions. The design process takes into account the possibility of happening in a set of flood and earthquake scenarios that represent the local seismic activity. Based on the performance of each bridge as determined by fragility assessments, network linkages are measured. The network's connections and bridges' damage statuses after an earthquake scenario determine the network's sustainability and danger. The sustainability measures' temporal volatility and the danger of structural degradation are both highlighted. The method is shown using a transportation network in Baghdad, Iraq.Keywords: sustainability, Coastal bridge networks, flood-earthquake risk, structural design
Procedia PDF Downloads 9413323 Prioritizing Quality Dimensions in ‘Servitised’ Business through AHP
Authors: Mohita Gangwar Sharma
Abstract:
Different factors are compelling manufacturers to move towards the phenomenon of servitization i.e. when firms go beyond giving support to the customers in operating the equipment. The challenges that are being faced in this transition by the manufacturing firms from being a product provider to a product- service provider are multipronged. Product-Service Systems (PSS) lies in between the pure-product and pure-service continuum. Through this study, we wish to understand the dimensions of ‘PSS-quality’. We draw upon the quality literature for both the product and services and through an expert survey for a specific transportation sector using analytical hierarchical process (AHP) derive a conceptual model that can be used as a comprehensive measurement tool for PSS offerings.Keywords: servitisation, quality, product-service system, AHP
Procedia PDF Downloads 30813322 A Comparative and Critical Analysis of Some Routing Protocols in Wireless Sensor Networks
Authors: Ishtiaq Wahid, Masood Ahmad, Nighat Ayub, Sajad Ali
Abstract:
Lifetime of a wireless sensor network (WSN) is directly proportional to the energy consumption of its constituent nodes. Routing in wireless sensor network is very challenging due its inherit characteristics. In hierarchal routing the sensor filed is divided into clusters. The cluster-heads are selected from each cluster, which forms a hierarchy of nodes. The cluster-heads are used to transmit the data to the base station while other nodes perform the sensing task. In this way the lifetime of the network is increased. In this paper a comparative study of hierarchal routing protocols are conducted. The simulation is done in NS-2 for validation.Keywords: WSN, cluster, routing, sensor networks
Procedia PDF Downloads 47913321 A Reinforcement Learning Approach for Evaluation of Real-Time Disaster Relief Demand and Network Condition
Authors: Ali Nadi, Ali Edrissi
Abstract:
Relief demand and transportation links availability is the essential information that is needed for every natural disaster operation. This information is not in hand once a disaster strikes. Relief demand and network condition has been evaluated based on prediction method in related works. Nevertheless, prediction seems to be over or under estimated due to uncertainties and may lead to a failure operation. Therefore, in this paper a stochastic programming model is proposed to evaluate real-time relief demand and network condition at the onset of a natural disaster. To address the time sensitivity of the emergency response, the proposed model uses reinforcement learning for optimization of the total relief assessment time. The proposed model is tested on a real size network problem. The simulation results indicate that the proposed model performs well in the case of collecting real-time information.Keywords: disaster management, real-time demand, reinforcement learning, relief demand
Procedia PDF Downloads 31613320 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 45513319 Analyzing the Impact of Global Financial Crisis on Interconnectedness of Asian Stock Markets Using Network Science
Authors: Jitendra Aswani
Abstract:
In the first section of this study, impact of Global Financial Crisis (GFC) on the synchronization of fourteen Asian Stock Markets (ASM’s) of countries like Hong Kong, India, Thailand, Singapore, Taiwan, Pakistan, Bangladesh, South Korea, Malaysia, Indonesia, Japan, China, Philippines and Sri Lanka, has been analysed using the network science and its metrics like degree of node, clustering coefficient and network density. Then in the second section of this study by introducing the US stock market in existing network and developing a Minimum Spanning Tree (MST) spread of crisis from the US stock market to Asian Stock Markets (ASM) has been explained. Data used for this study is adjusted the closing price of these indices from 6th January, 2000 to 15th September, 2013 which further divided into three sub-periods: Pre, during and post-crisis. Using network analysis, it is found that Asian stock markets become more interdependent during the crisis than pre and post crisis, and also Hong Kong, India, South Korea and Japan are systemic important stock markets in the Asian region. Therefore, failure or shock to any of these systemic important stock markets can cause contagion to another stock market of this region. This study is useful for global investors’ in portfolio management especially during the crisis period and also for policy makers in formulating the financial regulation norms by knowing the connections between the stock markets and how the system of these stock markets changes in crisis period and after that.Keywords: global financial crisis, Asian stock markets, network science, Kruskal algorithm
Procedia PDF Downloads 42413318 A High Quality Factor Filter Based on Quasi- Periodic Photonic Structure
Authors: Hamed Alipour-Banaei, Farhad Mehdizadeh
Abstract:
We report the design and characterization of ultra high quality factor filter based on one-dimensional photonic-crystal Thue-Morse sequence structure. The behavior of aperiodic array of photonic crystal structure is numerically investigated and we show that by changing the angle of incident wave, desired wavelengths could be tuned and a tunable filter is realized. Also it is shown that high quality factor filter be achieved in the telecommunication window around 1550 nm, with a device based on Thue-Morse structure. Simulation results show that the proposed structure has a quality factor more than 100000 and it is suitable for DWDM communication applications.Keywords: Thue-Morse, filter, quality factor, photonic
Procedia PDF Downloads 57213317 A t-SNE and UMAP Based Neural Network Image Classification Algorithm
Authors: Shelby Simpson, William Stanley, Namir Naba, Xiaodi Wang
Abstract:
Both t-SNE and UMAP are brand new state of art tools to predominantly preserve the local structure that is to group neighboring data points together, which indeed provides a very informative visualization of heterogeneity in our data. In this research, we develop a t-SNE and UMAP base neural network image classification algorithm to embed the original dataset to a corresponding low dimensional dataset as a preprocessing step, then use this embedded database as input to our specially designed neural network classifier for image classification. We use the fashion MNIST data set, which is a labeled data set of images of clothing objects in our experiments. t-SNE and UMAP are used for dimensionality reduction of the data set and thus produce low dimensional embeddings. Furthermore, we use the embeddings from t-SNE and UMAP to feed into two neural networks. The accuracy of the models from the two neural networks is then compared to a dense neural network that does not use embedding as an input to show which model can classify the images of clothing objects more accurately.Keywords: t-SNE, UMAP, fashion MNIST, neural networks
Procedia PDF Downloads 19813316 Effectiveness of New Digital Tools on Implementing Quality Management System: An Exploratory Study of French Companies
Authors: Takwa Belwakess
Abstract:
With the wave of the digitization that invades the modern world, communication tools took their place in the world of business. As for organizations, being part of the digital era necessarily involves an evolution of the management style, mainly in processes management, knowing also as quality management system (QMS). For more than 50 years quality management standards have been adopted by organizations to prove their operational and financial performances. We believe that achieving a high-level of communication can lead to better quality management and greater customer satisfaction, which is essential to make sure long-term competitiveness. In this paper, a questionnaire survey was developed to investigate the use of collaboration tools such as Content Management System and Social Networks. Data from more than 100 companies based in France was analyzed, the results show that adopting new digital communication tools while applying quality management practices over a reasonable period, contributed to delivering a better implementation of the QMS for a better business performance.Keywords: communication tools, content management system, digital, effectiveness, French companies, quality management system, quality management practices, social networks
Procedia PDF Downloads 26613315 Promoting 'One Health' Surveillance and Response Approach Implementation Capabilities against Emerging Threats and Epidemics Crisis Impact in African Countries
Authors: Ernest Tambo, Ghislaine Madjou, Jeanne Y. Ngogang, Shenglan Tang, Zhou XiaoNong
Abstract:
Implementing national to community-based 'One Health' surveillance approach for human, animal and environmental consequences mitigation offers great opportunities and value-added in sustainable development and wellbeing. 'One Health' surveillance approach global partnerships, policy commitment and financial investment are much needed in addressing the evolving threats and epidemics crises mitigation in African countries. The paper provides insights onto how China-Africa health development cooperation in promoting “One Health” surveillance approach in response advocacy and mitigation. China-Africa health development initiatives provide new prospects in guiding and moving forward appropriate and evidence-based advocacy and mitigation management approaches and strategies in attaining Universal Health Coverage (UHC) and Sustainable Development Goals (SDGs). Early and continuous quality and timely surveillance data collection and coordinated information sharing practices in malaria and other diseases are demonstrated in Comoros, Zanzibar, Ghana and Cameroon. Improvements of variety of access to contextual sources and network of data sharing platforms are needed in guiding evidence-based and tailored detection and response to unusual hazardous events. Moreover, understanding threats and diseases trends, frontline or point of care response delivery is crucial to promote integrated and sustainable targeted local, national “One Health” surveillance and response approach needs implementation. Importantly, operational guidelines are vital in increasing coherent financing and national workforce capacity development mechanisms. Strengthening participatory partnerships, collaboration and monitoring strategies in achieving global health agenda effectiveness in Africa. At the same enhancing surveillance data information streams reporting and dissemination usefulness in informing policies decisions, health systems programming and financial mobilization and prioritized allocation pre, during and post threats and epidemics crises programs strengths and weaknesses. Thus, capitalizing on “One Health” surveillance and response approach advocacy and mitigation implementation is timely in consolidating Africa Union 2063 agenda and Africa renaissance capabilities and expectations.Keywords: Africa, one health approach, surveillance, response
Procedia PDF Downloads 42113314 Defect Management Life Cycle Process for Software Quality Improvement
Authors: Aedah Abd Rahman, Nurdatillah Hasim
Abstract:
Software quality issues require special attention especially in view of the demands of quality software product to meet customer satisfaction. Software development projects in most organisations need proper defect management process in order to produce high quality software product and reduce the number of defects. The research question of this study is how to produce high quality software and reducing the number of defects. Therefore, the objective of this paper is to provide a framework for managing software defects by following defined life cycle processes. The methodology starts by reviewing defects, defect models, best practices and standards. A framework for defect management life cycle is proposed. The major contribution of this study is to define a defect management road map in software development. The adoption of an effective defect management process helps to achieve the ultimate goal of producing high quality software products and contributes towards continuous software process improvement.Keywords: defects, defect management, life cycle process, software quality
Procedia PDF Downloads 30613313 Development of Quality Assessment Tool to Gauge Fire Response Activities of Emergency Personnel in Denmark
Authors: Jennifer E. Lynette
Abstract:
The purpose of this study is to develop a nation-wide assessment tool to gauge the quality and efficiency of response activities by emergency personnel to fires in Denmark. Current fire incident reports lack detailed information that can lead to breakthroughs in research and improve emergency response efforts. Information generated from the report database is analyzed and assessed for efficiency and quality. By utilizing information collection gaps in the incident reports, an improved, indepth, and streamlined quality gauging system is developed for use by fire brigades. This study pinpoints previously unrecorded factors involved in the response phases of a fire. Variables are recorded and ranked based on their influence to event outcome. By assessing and measuring these data points, quality standards are developed. These quality standards include details of the response phase previously overlooked which individually and cumulatively impact the overall success of a fire response effort. Through the application of this tool and implementation of associated quality standards at Denmark’s fire brigades, there is potential to increase efficiency and quality in the preparedness and response phases, thereby saving additional lives, property, and resources.Keywords: emergency management, fire, preparedness, quality standards, response
Procedia PDF Downloads 32613312 Hydrochemical Assessment and Quality Classification of Water in Torogh and Kardeh Dam Reservoirs, North-East Iran
Authors: Mojtaba Heydarizad
Abstract:
Khorasan Razavi is the second most important province in north-east of Iran, which faces a water shortage crisis due to recent droughts and huge water consummation. Kardeh and Torogh dam reservoirs in this province provide a notable part of Mashhad metropolitan (with more than 4.5 million inhabitants) potable water needs. Hydrochemical analyses on these dam reservoirs samples demonstrate that MgHCO3 in Kardeh and CaHCO3 and to lower extent MgHCO3 water types in Torogh dam reservoir are dominant. On the other hand, Gibbs binary diagram demonstrates that rock weathering is the main factor controlling water quality in dam reservoirs. Plotting dam reservoir samples on Mg2+/Na+ and HCO3-/Na+ vs. Ca2+/ Na+ diagrams demonstrate evaporative and carbonate mineral dissolution is the dominant rock weathering ion sources in these dam reservoirs. Cluster Analyses (CA) also demonstrate intense role of rock weathering mainly (carbonate and evaporative minerals dissolution) in water quality of these dam reservoirs. Studying water quality by the U.S. National Sanitation Foundation (NSF) WQI index NSF-WQI, Oregon Water Quality Index (OWQI) and Canadian Water Quality Index DWQI index show moderate and good quality.Keywords: hydrochemistry, water quality classification, water quality indexes, Torogh and Kardeh dam reservoir
Procedia PDF Downloads 25513311 Optimization of Vertical Axis Wind Turbine Based on Artificial Neural Network
Authors: Mohammed Affanuddin H. Siddique, Jayesh S. Shukla, Chetan B. Meshram
Abstract:
The neural networks are one of the power tools of machine learning. After the invention of perceptron in early 1980's, the neural networks and its application have grown rapidly. Neural networks are a technique originally developed for pattern investigation. The structure of a neural network consists of neurons connected through synapse. Here, we have investigated the different algorithms and cost function reduction techniques for optimization of vertical axis wind turbine (VAWT) rotor blades. The aerodynamic force coefficients corresponding to the airfoils are stored in a database along with the airfoil coordinates. A forward propagation neural network is created with the input as aerodynamic coefficients and output as the airfoil co-ordinates. In the proposed algorithm, the hidden layer is incorporated into cost function having linear and non-linear error terms. In this article, it is observed that the ANNs (Artificial Neural Network) can be used for the VAWT’s optimization.Keywords: VAWT, ANN, optimization, inverse design
Procedia PDF Downloads 32413310 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique
Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis
Abstract:
Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.Keywords: children malnutrition, food security, Local community, participatory approach
Procedia PDF Downloads 27613309 Designing a Low Power Consumption Mote in Wireless Sensor Network
Authors: Saidi Nabiha, Khaled Zaatouri, Walid Fajraoui, Tahar Ezzeddine
Abstract:
The market of Wireless Sensor Network WSN has a great potential and development opportunities. Researchers are focusing on optimization in many fields like efficient deployment and routing protocols. In this article, we will concentrate on energy efficiency for WSN because WSN nodes are habitually deployed in severe No Man’s Land with batteries are not rechargeable, so reducing energy consumption represents an important challenge to extend the life of the network. We will present the design of new WSN mote based on ultra low power STM32L microcontrollers and the ZIGBEE transceiver CC2520. We will compare it to existent motes and we will conclude that our mote is promising in energy consumption.Keywords: component, WSN mote, power consumption, STM32L, sensors, CC2520
Procedia PDF Downloads 573