Search results for: software reliability
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6417

Search results for: software reliability

5517 A Decentralized Application for Secure Data Handling of Wireless Networks Using Ethereum Smart Contracts

Authors: Midhun Xavier

Abstract:

This paper introduces a method to verify multi-agent systems in industrial control systems using blockchain technology. The proposed solution enables to record and verify each process that occurs while generating a customized product using Ethereum-based smart contracts. Node-Red software agents are developed with the help of semantic web technologies, and these software agents interact with IEC 61499 function blocks to execute the processes. The agent associated with each mechatronic component and its controller can communicate with the blockchain to record various events that occur during each process, and the latter smart contract helps to verify these process orders of the customized product.

Keywords: blockchain, Ethereum, node-red, IEC 61499, multi-agent system, MQTT

Procedia PDF Downloads 75
5516 Application of Cube IQ Software to Optimize Heterogeneous Packing Products in Logistics Cargo and Minimize Transportation Cost

Authors: Muhammad Ganda Wiratama

Abstract:

XYZ company is one of the upstream chemical companies that produce chemical products such as NaOH, HCl, NaClO, VCM, EDC, and PVC for downstream companies. The products are shipped by land using trucks and sea lanes using ship mode. Especially for solid products such as flake caustic soda (F-NaOH) and PVC resin, the products are sold in loose bag packing and palletize packing (packed in pallet). The focus of this study is to increase the number of items that can be loaded in pallet packaging on the company's logistics vehicle. This is very difficult because on this packaging, the dimensions or size of the material to be loaded become larger and certainly much heavier than the loose bag packing. This factor causes the arrangement and handling of materials in the mode of transportation more difficult. In this case, it is difficult to load a different type of volume packing pallet dimension in one truck or container. By using the Cube-IQ software, it is hoped that the planning of stuffing activity material by pallet can become easier in optimizing the existing space with various possible combinations of possibilities. In addition, the output of this software can also be used as a reference for operators in the material handling include the order and orientation of materials contained in the truck or container. The more optimal contents of logistics cargo, then transportation costs can also be minimized.

Keywords: loading activity, container loading, palletize product, simulation

Procedia PDF Downloads 288
5515 Self-Efficacy Perceptions of Pre-Service Art and Music Teachers towards the Use of Information and Communication Technologies

Authors: Agah Tugrul Korucu

Abstract:

Information and communication technologies have become an important part of our daily lives with significant investments in technology in the 21st century. Individuals are more willing to design and implement computer-related activities, and they are the main component of computer self-efficacy and self-efficacy related to the fact that the increase in information technology, with operations in parallel with these activities more successful. The Self-efficacy level is a significant factor which determines how individuals act in events, situations and difficult processes. It is observed that individuals with higher self-efficacy perception of computers who encounter problems related to computer use overcome them more easily. Therefore, this study aimed to examine self-efficacy perceptions of pre-service art and music teachers towards the use of information and communication technologies in terms of different variables. Research group consists of 60 pre-service teachers who are studying at Necmettin Erbakan University Ahmet Keleşoğlu Faculty of Education Art and Music department. As data collection tool of the study; “personal information form” developed by the researcher and used to collect demographic data and "the perception scale related to self-efficacy of informational technology" are used. The scale is 5-point Likert-type scale. It consists of 27 items. The Kaiser-Meyer-Olkin (KMO) sample compliance value is found 0.959. The Cronbach alpha reliability coefficient of the scale is found to be 0.97. computer-based statistical software package (SPSS 21.0) is used in order to analyze the data collected by data collection tools; descriptive statistics, t-test, analysis of variance are used as statistical techniques.

Keywords: self-efficacy perceptions, teacher candidate, information and communication technologies, art teacher

Procedia PDF Downloads 314
5514 A Survey on Routh-Hurwitz Stability Criterion

Authors: Mojtaba Hakimi-Moghaddam

Abstract:

Routh-Hurwitz stability criterion is a powerful approach to determine stability of linear time invariant systems. On the other hand, applying this criterion to characteristic equation of a system, whose stability or marginal stability can be determined. Although the command roots (.) of MATLAB software can be easily used to determine the roots of a polynomial, the characteristic equation of closed loop system usually includes parameters, so software cannot handle it; however, Routh-Hurwitz stability criterion results the region of parameter changes where the stability is guaranteed. Moreover, this criterion has been extended to characterize the stability of interval polynomials as well as fractional-order polynomials. Furthermore, it can help us to design stable and minimum-phase controllers. In this paper, theory and application of this criterion will be reviewed. Also, several illustrative examples are given.

Keywords: Hurwitz polynomials, Routh-Hurwitz stability criterion, continued fraction expansion, pure imaginary roots

Procedia PDF Downloads 308
5513 Requirements Definitions of Real-Time System Using the Behavioral Patterns Analysis (BPA) Approach: The Healthcare Multi-Agent System

Authors: Assem El-Ansary

Abstract:

This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach using the Healthcare Multi-Agent System. The Event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are: The Behavioral Pattern Analysis (BPA) modeling methodology. The development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.

Keywords: analysis, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases, Healthcare Multi-Agent System

Procedia PDF Downloads 540
5512 Development of Ultrasounf Probe Holder for Automatic Scanning Asymmetric Reflector

Authors: Nabilah Ibrahim, Hafiz Mohd Zaini, Wan Fatin Liyana Mutalib

Abstract:

Ultrasound equipment or machine is capable to scan in two dimensional (2D) areas. However there are some limitations occur during scanning an object. The problem will occur when scanning process that involving the asymmetric object. In this project, the ultrasound probe holder for asymmetric reflector scanning in 3D image is proposed to make easier for scanning the phantom or object that has asymmetric shape. Initially, the constructed asymmetric phantom that construct will be used in 2D scanning. Next, the asymmetric phantom will be interfaced by the movement of ultrasound probe holder using the Arduino software. After that, the performance of the ultrasound probe holder will be evaluated by using the various asymmetric reflector or phantom in constructing a 3D image

Keywords: ultrasound 3D images, axial and lateral resolution, asymmetric reflector, Arduino software

Procedia PDF Downloads 546
5511 The Examination of Prospective ICT Teachers’ Attitudes towards Application of Computer Assisted Instruction

Authors: Agâh Tuğrul Korucu, Ismail Fatih Yavuzaslan, Lale Toraman

Abstract:

Nowadays, thanks to development of technology, integration of technology into teaching and learning activities is spreading. Increasing technological literacy which is one of the expected competencies for individuals of 21st century is associated with the effective use of technology in education. The most important factor in effective use of technology in education institutions is ICT teachers. The concept of computer assisted instruction (CAI) refers to the utilization of information and communication technology as a tool aided teachers in order to make education more efficient and improve its quality in the process of educational. Teachers can use computers in different places and times according to owned hardware and software facilities and characteristics of the subject and student in CAI. Analyzing teachers’ use of computers in education is significant because teachers are the ones who manage the course and they are the most important element in comprehending the topic by students. To accomplish computer-assisted instruction efficiently is possible through having positive attitude of teachers. Determination the level of knowledge, attitude and behavior of teachers who get the professional knowledge from educational faculties and elimination of deficiencies if any are crucial when teachers are at the faculty. Therefore, the aim of this paper is to identify ICT teachers' attitudes toward computer-assisted instruction in terms of different variables. Research group consists of 200 prospective ICT teachers studying at Necmettin Erbakan University Ahmet Keleşoğlu Faculty of Education CEIT department. As data collection tool of the study; “personal information form” developed by the researchers and used to collect demographic data and "the attitude scale related to computer-assisted instruction" are used. The scale consists of 20 items. 10 of these items show positive feature, while 10 of them show negative feature. The Kaiser-Meyer-Olkin (KMO) coefficient of the scale is found 0.88 and Barlett test significance value is found 0.000. The Cronbach’s alpha reliability coefficient of the scale is found 0.93. In order to analyze the data collected by data collection tools computer-based statistical software package used; statistical techniques such as descriptive statistics, t-test, and analysis of variance are utilized. It is determined that the attitudes of prospective instructors towards computers do not differ according to their educational branches. On the other hand, the attitudes of prospective instructors who own computers towards computer-supported education are determined higher than those of the prospective instructors who do not own computers. It is established that the departments of students who previously received computer lessons do not affect this situation so much. The result is that; the computer experience affects the attitude point regarding the computer-supported education positively.

Keywords: computer based instruction, teacher candidate, attitude, technology based instruction, information and communication technologies

Procedia PDF Downloads 283
5510 Impact of Economic Crisis on Secondary Education in Anambra State

Authors: Stella Nkechi Ezeaku, Ifunanya Nkechi Ohamobi

Abstract:

This study investigated the impact of economic crisis on education in Anambra state. The population of the study comprised of all principals and teachers in Anambra state numbering 5,887 (253 principles and 5,634 teachers). To guide the study, three research questions and one hypothesis were formulated correlational design was adopted. Stratified random sampling technique was used to select 200 principals and 300 teachers as respondents for the study. A researcher-developed instrument tagged Impact of Economic Crisis on Education questionnaire (IECEQ) was used to collect data needed for the study. The instrument was validated by experts in measurement and evaluation. The reliability of the instrument was established using randomly selected members of the population who did not take part in the study. The data obtained was analyzed using Cronbach alpha technique and reliability co-efficient of .801 and .803 was obtained. The data were analyzed using simple and Multiple Regression Analysis. The formulated hypothesis was tested at .05 level of significance. Findings revealed that: there is a significant relationship between economic crisis and realization of goals of secondary education. The result also shows that economic crisis affect students' academic performance, teachers' morale and productivity and principals' administrative capability. This study therefore concludes that certain strategies must be devised to minimize the impact of economic crisis on secondary education. It is recommended that all stakeholders to education should be more resourceful and self-sufficient in order to cushion the effects of economic crisis currently gripping most world economies Nigeria inclusive.

Keywords: impact, economic, crisis, education

Procedia PDF Downloads 228
5509 Intelligent Agent Travel Reservation System Requirements Definitions Using the Behavioral Patterns Analysis (BPA) Approach

Authors: Assem El-Ansary

Abstract:

This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Intelligent Agent Reservation System (IARS). The Event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are developing the Behavioral Pattern Analysis (BPA) modeling methodology, and developing an interactive software tool (DECISION) which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.

Keywords: analysis, intelligent agent, reservation system, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases

Procedia PDF Downloads 469
5508 Access Control System for Big Data Application

Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud

Abstract:

Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.

Keywords: access control, security, Big Data, domain

Procedia PDF Downloads 120
5507 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 352
5506 Locating the Best Place for Earthquake Refugee Camps by OpenSource Software: A Case Study for Tehran, Iran

Authors: Reyhaneh Saeedi

Abstract:

Iran is one of the regions which are most prone for earthquakes annually having a large number of financial and mortality and financial losses. Every year around the world, a large number of people lose their home and life due to natural disasters such as earthquakes. It is necessary to provide and specify some suitable places for settling the homeless people before the occurrence of the earthquake, one of the most important factors in crisis planning and management. Some of the natural disasters can be Modeling and shown by Geospatial Information System (GIS). By using GIS, it would be possible to manage the spatial data and reach several goals by making use of the analyses existing in it. GIS has a determining role in disaster management because it can determine the best places for temporary resettling after such a disaster. In this research QuantumGIS software is used that It is an OpenSource software so that easy to access codes and It is also free. In this system, AHP method is used as decision model and to locate the best places for temporary resettling, is done based on the related organizations criteria with their weights and buffers. Also in this research are made the buffer layers of criteria and change them to the raster layers. Later on, the raster layers are multiplied on desired weights then, the results are added together. Eventually, there are suitable places for resettling of victims by desired criteria by different colors with their optimum rate in QuantumGIS platform.

Keywords: disaster management, temporary resettlement, earthquake, QuantumGIS

Procedia PDF Downloads 387
5505 Strengthening Adult Literacy Programs in Order to End Female Genital Mutilation to Achieve Sustainable Development Goals

Authors: Odenigbo Veronica Ngozi, Lorreta Chika Ukwuaba

Abstract:

This study focuses on how the strengthening adult literacy program can help accelerate transformative strategies to end female genital mutilation (FGM) in Nigeria, specifically in Nsukka Local Government Area. The research delves into the definition of FGM, adult literacy programs, and how to achieve ending FGM to attain Sustainable Development Goals (SDGs) in 2030. It further discusses the practice of FGM in Nigeria and emphasizes the statement of the problem. The main aim of the study is to investigate how strengthening adult literacy programs can help accelerate transformative strategies to end FGM in Nigeria and achieve SDGs in 2030. The researchers utilized a survey research design to conduct the study in Nsukka L.G.A. The population was composed of 26 facilitators and adult learners in five adult learning centers in the area. The entire population was used as a sample, and structured questionnaires were employed to elicit information. The items on the questionnaire were face-validated by three experts, and the reliability of the instrument was verified using Cronbach Alpha Reliability Technique. The research questions were analyzed using means and standard deviation while the hypothesis was tested at 0.05 level of degree of significance using a t-test. The findings show that through adult literacy program acceleration of transformative strategies, the practices of FGM can be ended. Strengthening adult literacy programs is a good channel to end or stop FGM through the knowledge and skill acquired from the learning centers. The theoretical importance of the study lies in the fact that it highlights the role of adult literacy programs in accelerating transformative strategies to combat harmful cultural practices such as FGM. It further supports the importance of education and knowledge in achieving sustainable development goals by 2030. Structured questionnaires were distributed to an entire population of 26 facilitators and adult learners in five adult learning centers in Nsukka L.G.A. The questionnaire items were face–validated by three experts, and the reliability of the instrument was verified using Cronbach Alpha Reliability Technique. The research questions were analyzed using means and standard deviation, while the hypothesis was tested using a t-test at 0.05 level of degree of significance. The study addressed the question of how strengthening adult literacy programs can help accelerate transformative strategies to end FGM in Nigeria and achieve SDGs by 2030. In conclusion, the study found that adult literacy is a good tool to end FGM in Nigeria. The recommendations were that government, non-governmental organizations (NGOs), Community-based organizations (CBOs), and individuals should support the funding and establishment of adult literacy centers in communities so as to reach every illiterate parent or individual and acquire the knowledge and skill needed to understand the negative effect of FGM in the life of a girl child.

Keywords: adult literacy, female genital mutilation, learning centers, SDGs, strengthening

Procedia PDF Downloads 56
5504 The Use of Software and Internet Search Engines to Develop the Encoding and Decoding Skills of a Dyslexic Learner: A Case Study

Authors: Rabih Joseph Nabhan

Abstract:

This case study explores the impact of two major computer software programs Learn to Speak English and Learn English Spelling and Pronunciation, and some Internet search engines such as Google on mending the decoding and spelling deficiency of Simon X, a dyslexic student. The improvement in decoding and spelling may result in better reading comprehension and composition writing. Some computer programs and Internet materials can help regain the missing awareness and consequently restore his self-confidence and self-esteem. In addition, this study provides a systematic plan comprising a set of activities (four computer programs and Internet materials) which address the problem from the lowest to the highest levels of phoneme and phonological awareness. Four methods of data collection (accounts, observations, published tests, and interviews) create the triangulation to validly and reliably collect data before the plan, during the plan, and after the plan. The data collected are analyzed quantitatively and qualitatively. Sometimes the analysis is either quantitative or qualitative, and some other times a combination of both. Tables and figures are utilized to provide a clear and uncomplicated illustration of some data. The improvement in the decoding, spelling, reading comprehension, and composition writing skills that occurred is proved through the use of authentic materials performed by the student under study. Such materials are a comparison between two sample passages written by the learner before and after the plan, a genuine computer chat conversation, and the scores of the academic year that followed the execution of the plan. Based on these results, the researcher recommends further studies on other Lebanese dyslexic learners using the computer to mend their language problem in order to design and make a most reliable software program that can address this disability more efficiently and successfully.

Keywords: analysis, awareness, dyslexic, software

Procedia PDF Downloads 208
5503 A Neural Network Approach for an Automatic Detection and Localization of an Open Phase Circuit of a Five-Phase Induction Machine Used in a Drivetrain of an Electric Vehicle

Authors: Saad Chahba, Rabia Sehab, Ahmad Akrad, Cristina Morel

Abstract:

Nowadays, the electric machines used in urban electric vehicles are, in most cases, three-phase electric machines with or without a magnet in the rotor. Permanent Magnet Synchronous Machine (PMSM) and Induction Machine (IM) are the main components of drive trains of electric and hybrid vehicles. These machines have very good performance in healthy operation mode, but they are not redundant to ensure safety in faulty operation mode. Faced with the continued growth in the demand for electric vehicles in the automotive market, improving the reliability of electric vehicles is necessary over the lifecycle of the electric vehicle. Multiphase electric machines respond well to this constraint because, on the one hand, they have better robustness in the event of a breakdown (opening of a phase, opening of an arm of the power stage, intern-turn short circuit) and, on the other hand, better power density. In this work, a diagnosis approach using a neural network for an open circuit fault or more of a five-phase induction machine is developed. Validation on the simulator of the vehicle drivetrain, at reduced power, is carried out, creating one and more open circuit stator phases showing the efficiency and the reliability of the new approach to detect and to locate on-line one or more open phases of a five-induction machine.

Keywords: electric vehicle drivetrain, multiphase drives, induction machine, control, open circuit (OC) fault diagnosis, artificial neural network

Procedia PDF Downloads 184
5502 The Comparative Study of Binary Artifact Repository Managers

Authors: Evgeny Chugunnyy, Alena Gerasimova, Kirill Chernyavskiy, Alexander Krasnov

Abstract:

One of the primary component of Continuous deployment (CD) is a binary artifact repository — the place where artifacts are stored with metadata in a structured way. The binary artifact repository manager (BARM) is a software, which implements this repository logic and exposes a public application programming interface (API) for managing these artifacts. Almost every programming language ecosystem has its own artifact repository kind. During creating Artipie — BARM constructor and server, we analyzed and implemented a lot of different artifact repositories. In this paper we present criterias for comparing artifact repositories, and analyze the most popular repositories using these metrics. We also describe some of the notable features of different repositories. This paper aimed to help people who are creating, maintaining or optimizing software repository and CI tools.

Keywords: artifact, repository, continuous deployment, build automation, artifacts management

Procedia PDF Downloads 131
5501 Comparative Study of Non-Identical Firearms with Priority to Repair Subject to Inspection

Authors: A. S. Grewal, R. S. Sangwan, Dharambir, Vikas Dhanda

Abstract:

The purpose of this paper is to develop and analyze two reliability models for a system of non-identical firearms – one is standard firearm (called as original unit) and the other is a country-made firearm (called as duplicate /substandard unit). There is a single server who comes immediately to do inspection and repair whenever needed. On the failure of standard firearm, the server inspects the operative country-made firearm to see whether the unit is capable of performing the desired function well or not. If country-made firearm is not capable to do so, the operation of the system is stopped and server starts repair of the standard firearms immediately. However, no inspection is done at the failure of the country-made firearm as the country-made firearm alone is capable of performing the given task well. In model I, priority to repair the standard firearm is given in case system fails completely and country-made firearm is already under repair, whereas in model II there is no such priority. The failure and repair times of each unit are assumed to be independent and uncorrelated random variables. The distributions of failure time of the units are taken as negative exponential while that of repair and inspection times are general. By using semi-Markov process and regenerative point technique some econo-reliability measures are obtained. Graphs are plotted to compare the MTSF (mean time to system failure), availability and profit of the models for a particular case.

Keywords: non-identical firearms, inspection, priority to repair, semi-Markov process, regenerative point

Procedia PDF Downloads 415
5500 Perceived Effect of Physical Exercise on Healthy Well-Being of Pregnant Women in Imo State

Authors: Roseline Chizoba Onuoha, Rose Ngozi Uzoka

Abstract:

This study aimed at investigating perceived effect of physical exercise on healthy well-being of pregnant mothers in Imo state. The study was guided by three research questions and three null hypotheses tested at 0.05 level of significance. The study was a quasi-experimental non-equivalent control group design involving pre and post tests. A sample of 92 pregnant women drawn from a total population of 922 registered pregnant women in ten randomly selected health centers in Imo State through multistage sampling technique was used. A 41 item structured instrument titled Physical Exercise Pregnancy Test (PEPT) was used for the study. The PEPT was validated by three experts from measurement and evaluation, educational psychology and health education. Crombach Alpha method was used to determine the reliability of Physical Exercise Pregnancy Test (PEPT) and reliability index of 0.82 was obtained. Mean and standard deviation were used to answer the research questions; while Analysis of Covariance (ANCOVA) was used in analyzing the hypotheses. Findings of the study revealed that physical exercise affects physical, social and emotional wellbeing scores of pregnant women. The study also indicated that intervention using physical exercise significantly enhanced healthy well-being scores of pregnant mothers who were exposed to physical exercise than those who received conventional health talks; Location has no significant interaction effect on the mean well-being scores of pregnant women via PEPT. Among recommendations made were that pregnant women should participate in physical exercise.

Keywords: educational psychology, Imo state, Physical exercise, pregnant women

Procedia PDF Downloads 124
5499 Automatic Algorithm for Processing and Analysis of Images from the Comet Assay

Authors: Yeimy L. Quintana, Juan G. Zuluaga, Sandra S. Arango

Abstract:

The comet assay is a method based on electrophoresis that is used to measure DNA damage in cells and has shown important results in the identification of substances with a potential risk to the human population as innumerable physical, chemical and biological agents. With this technique is possible to obtain images like a comet, in which the tail of these refers to damaged fragments of the DNA. One of the main problems is that the image has unequal luminosity caused by the fluorescence microscope and requires different processing to condition it as well as to know how many optimal comets there are per sample and finally to perform the measurements and determine the percentage of DNA damage. In this paper, we propose the design and implementation of software using Image Processing Toolbox-MATLAB that allows the automation of image processing. The software chooses the optimum comets and measuring the necessary parameters to detect the damage.

Keywords: artificial vision, comet assay, DNA damage, image processing

Procedia PDF Downloads 292
5498 A Model for Analyzing the Startup Dynamics of a Belt Transmission Driven by a DC Motor

Authors: Giovanni Incerti

Abstract:

In this paper the dynamic behavior of a synchronous belt drive during start-up is analyzed and discussed. Besides considering the belt elasticity, the mathematical model here proposed also takes into consideration the electrical behaviour of the DC motor. The solution of the motion equations is obtained by means of the modal analysis in state space, which allows to obtain the decoupling of all equations of the mathematical model without introducing the hypothesis of proportional damping. The mathematical model of the transmission and the solution algorithms have been implemented within a computing software that allows the user to simulate the dynamics of the system and to evaluate the effects due to the elasticity of the belt branches and to the electromagnetic behavior of the DC motor. In order to show the details of the calculation procedure, the paper presents a case study developed with the aid of the abovementioned software.

Keywords: belt drive, vibrations, startup, DC motor

Procedia PDF Downloads 564
5497 Climate Change Impact on Water Resources Management in Remote Islands Using Hybrid Renewable Energy Systems

Authors: Elissavet Feloni, Ioannis Kourtis, Konstantinos Kotsifakis, Evangelos Baltas

Abstract:

Water inadequacy in small dry islands scattered in the Aegean Sea (Greece) is a major problem regarding Water Resources Management (WRM), especially during the summer period due to tourism. In the present work, various WRM schemes are designed and presented. The WRM schemes take into account current infrastructure and include Rainwater Harvesting tanks and Reverse Osmosis Desalination Units. The energy requirements are covered mainly by wind turbines and/or a seawater pumped storage system. Sizing is based on the available data for population and tourism per island, after taking into account a slight increase in the population (up to 1.5% per year), and it guarantees at least 80% reliability for the energy supply and 99.9% for potable water. Evaluation of scenarios is carried out from a financial perspective, after calculating the Life Cycle Cost (LCC) of each investment for a lifespan of 30 years. The wind-powered desalination plant was found to be the most cost-effective practice, from an economic point of view. Finally, in order to estimate the Climate Change (CC) impact, six different CC scenarios were investigated. The corresponding rate of on-grid versus off-grid energy required for ensuring the targeted reliability for the zero and each climatic scenario was investigated per island. The results revealed that under CC the grid-on energy required would increase and as a result, the reduction in wind turbines and seawater pumped storage systems’ reliability will be in the range of 4 to 44%. However, the range of this percentage change does not exceed 22% per island for all examined CC scenarios. Overall, CC is proposed to be incorporated into the design process for WRM-related projects. Acknowledgements: This research is co-financed by Greece and the European Union (European Social Fund - ESF) through the Operational Program «Human Resources Development, Education and Lifelong Learning 2014-2020» in the context of the project “Development of a combined rain harvesting and renewable energy-based system for covering domestic and agricultural water requirements in small dry Greek Islands” (MIS 5004775).

Keywords: small dry islands, water resources management, climate change, desalination, RES, seawater pumped storage system, rainwater harvesting

Procedia PDF Downloads 107
5496 An Informative Marketing Platform: Methodology and Architecture

Authors: Martina Marinelli, Samanta Vellante, Francesco Pilotti, Daniele Di Valerio, Gaetanino Paolone

Abstract:

Any development in web marketing technology requires changes in information engineering to identify instruments and techniques suitable for the production of software applications for informative marketing. Moreover, for large web solutions, designing an interface that enables human interactions is a complex process that must bridge between informative marketing requirements and the developed solution. A user-friendly interface in web marketing applications is crucial for a successful business. The paper introduces mkInfo - a software platform that implements informative marketing. Informative marketing is a new interpretation of marketing which places the information at the center of every marketing action. The creative team includes software engineering researchers who have recently authored an article on automatic code generation. The authors have created the mkInfo software platform to generate informative marketing web applications. For each web application, it is possible to automatically implement an opt in page, a landing page, a sales page, and a thank you page: one only needs to insert the content. mkInfo implements an autoresponder to send mail according to a predetermined schedule. The mkInfo platform also includes e-commerce for a product or service. The stakeholder can access any opt-in page and get basic information about a product or service. If he wants to know more, he will need to provide an e-mail address to access a landing page that will generate an e-mail sequence. It will provide him with complete information about the product or the service. From this point on, the stakeholder becomes a user and is now able to purchase the product or related services through the mkInfo platform. This paper suggests a possible definition for Informative Marketing, illustrates its basic principles, and finally details the mkInfo platform that implements it. This paper also offers some Informative Marketing models, which are implemented in the mkInfo platform. Informative marketing can be applied to products or services. It is necessary to realize a web application for each product or service. The mkInfo platform enables the product or the service producer to send information concerning a specific product or service to all stakeholders. In conclusion, the technical contributions of this paper are: a different interpretation of marketing based on information; a modular architecture for web applications, particularly for one with standard features such as information storage, exchange, and delivery; multiple models to implement informative marketing; a software platform enabling the implementation of such models in a web application. Future research aims to enable stakeholders to provide information about a product or a service so that the information gathered about a product or a service includes both the producer’s and the stakeholders' point of view. The purpose is to create an all-inclusive management system of the knowledge regarding a specific product or service: a system that includes everything about the product or service and is able to address even unexpected questions.

Keywords: informative marketing, opt in page, software platform, web application

Procedia PDF Downloads 116
5495 Conceptual Model of a Residential Waste Collection System Using ARENA Software

Authors: Bruce G. Wilson

Abstract:

The collection of municipal solid waste at the curbside is a complex operation that is repeated daily under varying circumstances around the world. There have been several attempts to develop Monte Carlo simulation models of the waste collection process dating back almost 50 years. Despite this long history, the use of simulation modeling as a planning or optimization tool for waste collection is still extremely limited in practice. Historically, simulation modeling of waste collection systems has been hampered by the limitations of computer hardware and software and by the availability of representative input data. This paper outlines the development of a Monte Carlo simulation model that overcomes many of the limitations contained in previous models. The model uses a general purpose simulation software program that is easily capable of modeling an entire waste collection network. The model treats the stops on a waste collection route as a queue of work to be processed by a collection vehicle (or server). Input data can be collected from a variety of sources including municipal geographic information systems, global positioning system recorders on collection vehicles, and weigh scales at transfer stations or treatment facilities. The result is a flexible model that is sufficiently robust that it can model the collection activities in a large municipality, while providing the flexibility to adapt to changing conditions on the collection route.

Keywords: modeling, queues, residential waste collection, Monte Carlo simulation

Procedia PDF Downloads 391
5494 Developing a Health Literacy Questionnaire in Breast Cancer

Authors: Lida Moghaddam-Banaem, Mahmood Tavoosi, Soheila Khalili

Abstract:

Objective: The main objective of this study was designing a breast cancer health literacy questionnaire and assess its psychometric properties. Methods: A comprehensive literature review was performed to develop a primary questionnaire consisting of five domains. Qualitative and quantitative content validity were assessed by relevant experts, and after some modifications, the content validity index (CVI) and content validity ratio (CVR) were calculated. Qualitative and quantitative face validity were evaluated by a number of patients, and the impact score for each item was calculated. 225 women with breast cancer were asked to fill out the questionnaire and construct validity was determined by using exploratory factor analysis. The reliability was tested by Cronbach's alpha coefficient. Results: A 36-item questionnaire with five domains of reading, having access, understanding, assessing/judgment, and decision making/behavior was designed. 2 items were omitted in the qualitative content validity process. All items achieved optimum values in CVI, CVR and impact scores. Content and face validity of the questionnaire were confirmed too. According to the exploratory factor analysis, the five-factor solution accounted for 64.98 percent of the observed variance. Conclusion: Due to the obtained satisfactory validity and reliability, this tool can be used to assess health literacy in women with breast cancer. Health policy makers can use these findings for improving health-related behaviors in breast cancer patients.

Keywords: health literacy, breast cancer, questionnaire, psychometric properties

Procedia PDF Downloads 223
5493 The Use of Simulation Programs of Leakage of Harmful Substances for Crisis Management

Authors: Jiří Barta

Abstract:

The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.

Keywords: Computer Simulation, Symos97, Spread, Simulation Software, Harmful Substances

Procedia PDF Downloads 279
5492 Analysis of Solar Thermal Power Plant in Algeria

Authors: M. Laissaoui

Abstract:

The present work has for objective the simulation of a hybrid solar combined cycle power plant, compared with combined cycle conventional (gas turbine and steam turbine), this type of power plants disposed an solar tour (heliostat field and volumetric receiver) insurant a part of the thermal energy necessary for the functioning of the gas turbine. This solar energy serves to feed with heat the combustion air of the gas turbine when he out of the compressor and the front entered the combustion chamber. The simulation of even central and made for three zones deferential to know the zone of Hassi R' mel, Bechare, and the zone of Messaad wilaya of El djelfa. The radiometric and meteorological data arise directly from the software meteonorme 7. The simulation of the energy performances is made by the software TRNSYS 16.1.

Keywords: concentrating solar power, heliostat, thermal, Algeria

Procedia PDF Downloads 458
5491 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 115
5490 An Analysis of the Causes of SMEs Failure in Developing Countries: The Case of South Africa

Authors: Paul Saah, Charles Mbohwa, Nelson Sizwe Madonsela

Abstract:

In the context of developing countries, this study explores a crucial component of economic development by examining the reasons behind the failure of small and medium-sized enterprises (SMEs). SMEs are acknowledged as essential drivers of economic expansion, job creation, and poverty alleviation in emerging countries. This research uses South Africa as a case study to evaluate the reasons why SMEs fail in developing nations. This study explores a quantitative research methodology to investigate the complex causes of SME failures using statistical tools and reliability tests. To ensure the viability of data collection, a sample size of 400 small business owners was chosen using a non-probability selection technique. A closed-ended questionnaire was the primary technique used to obtain detailed information from the participants. Data was analysed and interpreted using computer software packages such as the Statistical Package for the Social Sciences (SPSS). According to the findings, the main reasons why SMEs fail in developing nations are a lack of strategic business planning, a lack of funding, poor management, a lack of innovation, a lack of business research and a low level of education and training. The results of this study show that SMEs can be sustainable and successful as long as they comprehend and use the suggested small business success determining variables into their daily operations. This implies that the more SMEs in developing countries implement the proposed determinant factors of small business success in their business operations the more the businesses are likely to succeed and vice versa.

Keywords: failure, developing countries, SMEs, economic development, South Africa

Procedia PDF Downloads 60
5489 Reliability and Validity of a Portable Inertial Sensor and Pressure Mat System for Measuring Dynamic Balance Parameters during Stepping

Authors: Emily Rowe

Abstract:

Introduction: Balance assessments can be used to help evaluate a person’s risk of falls, determine causes of balance deficits and inform intervention decisions. It is widely accepted that instrumented quantitative analysis can be more reliable and specific than semi-qualitative ordinal scales or itemised scoring methods. However, the uptake of quantitative methods is hindered by expense, lack of portability, and set-up requirements. During stepping, foot placement is actively coordinated with the body centre of mass (COM) kinematics during pre-initiation. Based on this, the potential to use COM velocity just prior to foot off and foot placement error as an outcome measure of dynamic balance is currently being explored using complex 3D motion capture. Inertial sensors and pressure mats might be more practical technologies for measuring these parameters in clinical settings. Objective: The aim of this study was to test the criterion validity and test-retest reliability of a synchronised inertial sensor and pressure mat-based approach to measure foot placement error and COM velocity while stepping. Methods: Trials were held with 15 healthy participants who each attended for two sessions. The trial task was to step onto one of 4 targets (2 for each foot) multiple times in a random, unpredictable order. The stepping target was cued using an auditory prompt and electroluminescent panel illumination. Data was collected using 3D motion capture and a combined inertial sensor-pressure mat system simultaneously in both sessions. To assess the reliability of each system, ICC estimates and their 95% confident intervals were calculated based on a mean-rating (k = 2), absolute-agreement, 2-way mixed-effects model. To test the criterion validity of the combined inertial sensor-pressure mat system against the motion capture system multi-factorial two-way repeated measures ANOVAs were carried out. Results: It was found that foot placement error was not reliably measured between sessions by either system (ICC 95% CIs; motion capture: 0 to >0.87 and pressure mat: <0.53 to >0.90). This could be due to genuine within-subject variability given the nature of the stepping task and brings into question the suitability of average foot placement error as an outcome measure. Additionally, results suggest the pressure mat is not a valid measure of this parameter since it was statistically significantly different from and much less precise than the motion capture system (p=0.003). The inertial sensor was found to be a moderately reliable (ICC 95% CIs >0.46 to >0.95) but not valid measure for anteroposterior and mediolateral COM velocities (AP velocity: p=0.000, ML velocity target 1 to 4: p=0.734, 0.001, 0.000 & 0.376). However, it is thought that with further development, the COM velocity measure validity could be improved. Possible options which could be investigated include whether there is an effect of inertial sensor placement with respect to pelvic marker placement or implementing more complex methods of data processing to manage inherent accelerometer and gyroscope limitations. Conclusion: The pressure mat is not a suitable alternative for measuring foot placement errors. The inertial sensors have the potential for measuring COM velocity; however, further development work is needed.

Keywords: dynamic balance, inertial sensors, portable, pressure mat, reliability, stepping, validity, wearables

Procedia PDF Downloads 137
5488 Requirements Management in Agile

Authors: Ravneet Kaur

Abstract:

The concept of Agile Requirements Engineering and Management is not new. However, the struggle to figure out how traditional Requirements Management Process fits within an Agile framework remains complex. This paper talks about a process that can merge the organization’s traditional Requirements Management Process nicely into the Agile Software Development Process. This process provides Traceability of the Product Backlog to the external documents on one hand and User Stories on the other hand. It also gives sufficient evidence that the system will deliver the right functionality with good quality in the form of various statistics and reports. In the nutshell, by overlaying a process on top of Agile, without disturbing the Agility, we are able to get synergic benefits in terms of productivity, profitability, its reporting, and end to end visibility to all Stakeholders. The framework can be used for just-in-time requirements definition or to build a repository of requirements for future use. The goal is to make sure that the business (specifically, the product owner) can clearly articulate what needs to be built and define what is of high quality. To accomplish this, the requirements cycle follows a Scrum-like process that mirrors the development cycle but stays two to three steps ahead. The goal is to create a process by which requirements can be thoroughly vetted, organized, and communicated in a manner that is iterative, timely, and quality-focused. Agile is quickly becoming the most popular way of developing software because it fosters continuous improvement, time-boxed development cycles, and more quickly delivering value to the end users. That value will be driven to a large extent by the quality and clarity of requirements that feed the software development process. An agile, lean, and timely approach to requirements as the starting point will help to ensure that the process is optimized.

Keywords: requirements management, Agile

Procedia PDF Downloads 358