Search results for: allocated architecture
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2012

Search results for: allocated architecture

962 Data Quality as a Pillar of Data-Driven Organizations: Exploring the Benefits of Data Mesh

Authors: Marc Bachelet, Abhijit Kumar Chatterjee, José Manuel Avila

Abstract:

Data quality is a key component of any data-driven organization. Without data quality, organizations cannot effectively make data-driven decisions, which often leads to poor business performance. Therefore, it is important for an organization to ensure that the data they use is of high quality. This is where the concept of data mesh comes in. Data mesh is an organizational and architectural decentralized approach to data management that can help organizations improve the quality of data. The concept of data mesh was first introduced in 2020. Its purpose is to decentralize data ownership, making it easier for domain experts to manage the data. This can help organizations improve data quality by reducing the reliance on centralized data teams and allowing domain experts to take charge of their data. This paper intends to discuss how a set of elements, including data mesh, are tools capable of increasing data quality. One of the key benefits of data mesh is improved metadata management. In a traditional data architecture, metadata management is typically centralized, which can lead to data silos and poor data quality. With data mesh, metadata is managed in a decentralized manner, ensuring accurate and up-to-date metadata, thereby improving data quality. Another benefit of data mesh is the clarification of roles and responsibilities. In a traditional data architecture, data teams are responsible for managing all aspects of data, which can lead to confusion and ambiguity in responsibilities. With data mesh, domain experts are responsible for managing their own data, which can help provide clarity in roles and responsibilities and improve data quality. Additionally, data mesh can also contribute to a new form of organization that is more agile and adaptable. By decentralizing data ownership, organizations can respond more quickly to changes in their business environment, which in turn can help improve overall performance by allowing better insights into business as an effect of better reports and visualization tools. Monitoring and analytics are also important aspects of data quality. With data mesh, monitoring, and analytics are decentralized, allowing domain experts to monitor and analyze their own data. This will help in identifying and addressing data quality problems in quick time, leading to improved data quality. Data culture is another major aspect of data quality. With data mesh, domain experts are encouraged to take ownership of their data, which can help create a data-driven culture within the organization. This can lead to improved data quality and better business outcomes. Finally, the paper explores the contribution of AI in the coming years. AI can help enhance data quality by automating many data-related tasks, like data cleaning and data validation. By integrating AI into data mesh, organizations can further enhance the quality of their data. The concepts mentioned above are illustrated by AEKIDEN experience feedback. AEKIDEN is an international data-driven consultancy that has successfully implemented a data mesh approach. By sharing their experience, AEKIDEN can help other organizations understand the benefits and challenges of implementing data mesh and improving data quality.

Keywords: data culture, data-driven organization, data mesh, data quality for business success

Procedia PDF Downloads 115
961 Nuances of Urban Ecology in the Present Global Scenario: Scope, Issues, Challenges and Implications

Authors: Meenakshi Pappu

Abstract:

The term, 'urban ecology' has often been misconstrued by the educational practitioners as well as the researchers as a study under a single discipline i.e., the environmental sciences. One who has done research extensively in this study would always argue that urban ecology is not a study under a single discipline, but it is a study across disciplines such as social sciences and other sciences like architecture, engineering, planning, ecology, geography, biology, economics, sociology, anthropology, psychology and health sciences. The aim of this paper is to discuss at length the scope of Urban Ecology as an interdisciplinary study. The paper highlights the nuances of urban ecology as a study across disciplines and the challenges and the implications it holds for future research by conducting a qualitative survey in the particular areas.

Keywords: educational practitioners, interdisciplinary, researchers, urban ecology

Procedia PDF Downloads 401
960 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 69
959 Importance of an E-Learning Program in Stress Field for Postgraduate Courses of Doctors

Authors: Ramona-Niculina Jurcau, Ioana-Marieta Jurcau

Abstract:

Background: Preparing in the stress field (SF) is, increasingly, a concern for doctors of different specialties. Aims: The aim was to evaluate the importance of an e-learning program for doctors postgraduate courses, in SF. Methods: Doctors (n= 40 male, 40 female) of different specialties and ages (31-71 years), who attended postgraduate courses in SF, voluntarily responded to a questionnaire that included the following themes: Importance of SF courses for specialty practiced by each respondent doctor (using visual analogue scale, VAS); What SF themes would be indicated as e-learning (EL); Preferred form of SF information assimilation: Classical lectures (CL), EL or a combination of these methods (CL+EL); Which information on the SF course are facilitated by EL model versus CL; In their view which are the first four advantages and the first four disadvantages of EL compared to CL, for SF. Results: To most respondents, the SF courses are important for the specialty they practiced (VAS by an average of 4). The SF themes suggested to be done as EL were: Stress mechanisms; stress factor models for different medical specialties; stress assessment methods; primary stress management methods for different specialties. Preferred form of information assimilation was CL+EL. Aspects of the course facilitated by EL versus CL model: Active reading of theoretical information, with fast access to keywords details; watching documentaries in everyone's favorite order; practice through tests and the rapid control of results. The first four EL advantages, mentioned for SF were: Autonomy in managing the time allocated to the study; saving time for traveling to the venue; the ability to read information in various contexts of time and space; communication with colleagues, in good times for everyone. The first three EL disadvantages, mentioned for SF were: It decreases capabilities for group discussion and mobilization for active participation; EL information accession may depend on electrical source or/and Internet; learning slowdown can appear, by temptation of postponing the implementation. Answering questions was partially influenced by the respondent's age and genre. Conclusions: 1) Post-graduate courses in SF are of interest to doctors of different specialties. 2) The majority of participating doctors preferred EL, but combined with CL (CL+EL). 3) Preference for EL was manifested mainly by young or middle age men doctors. 4) It is important to balance the proper formula for chosen EL, to be the most efficient, interesting, useful and agreeable.

Keywords: stress field, doctors’ postgraduate courses, classical lectures, e-learning lecture

Procedia PDF Downloads 216
958 Shopping Centers in the Context of a Growing and Changing City: The Case of Konya Kent Plaza

Authors: H. Derya Arslan

Abstract:

Shopping centers have become an important part of urban life. The numbers of shopping centers have rapidly increased for ten years, in Turkey. Malls that have been built with increasing speed in the last two decades meet most social and cultural needs of people. In this study, architectural characteristics of a recent mall built in the city of Konya in Turkey have been discussed. The assessment of the mall in question has been made in the context of a growing and changing city. The study opened up new horizons and discussion areas to entrepreneurs who make significant investments in shopping centers, architects who design shopping centers as efficient commercial and social environments, and social scientists that investigate the effects of increase in these closed urban spaces on urban life.

Keywords: shopping center, architecture, city, social

Procedia PDF Downloads 323
957 Lightweight Synergy IoT Framework for Smart Home Healthcare for the Elderly

Authors: Huawei Ma, Wencai Du, Shengbin Liang

Abstract:

Smart Home Healthcare technologies for the elderly represent a transformative paradigm that leverages emerging technologies to provide the elderly’ health indicators and daily life monitoring, emergency calls, environmental monitoring, behavior perception, and other services to ensure the health and safety of the elderly who are aging in their own home. However, the excessive complexity in the main adopted framework has affected the acceptance and adoption of the elderly. Therefore, this paper proposes a lightweight synergy architecture of IoT data and service for elderly home smart health environment. It includes the modeling of IoT applications and their workflows, data interoperability, interaction, and storage paradigms to meet the growing needs of older people so that they can lead an active, fulfilling, and quality life.

Keywords: smart home healthcare, IoT, independent living, lightweight framework

Procedia PDF Downloads 34
956 Between Kenzo Tange and Fernando Távora: An ‘Affinitarian’ Architectural Regard

Authors: João Cepeda

Abstract:

In crafting their way between theory and practice, authors and artists seem to be always immersed in a never-ending process of relating epochs, objects, and images. Endless ‘affinities’ emerge from a somewhat unexplainable (and intimate) magnetic relation. It is through this ‘warburgian’ assessment that two of the most prominent twentieth-century modern architects from Japan and Portugal are put into perspective, focusing on their paths and thinking-practice, and on the research of their personal and professional archives. Moreover, this research especially aims its focus at essaying specifically on the possible ‘affinities’ between two of their most renowned architectural projects: the Kenzo Tange’s (demolished) Villa Seijo project in Tokyo (Japan) and Fernando Távora’s Tennis Pavilion design in Matosinhos (Portugal), respectively, side-by-side – through in-depth fieldwork in the sites, bibliographical and archival research, (unprecedented) material analysis, and final critical consideration.

Keywords: Tange, Távora, architecture, affinities

Procedia PDF Downloads 42
955 Heterogeneous Artifacts Construction for Software Evolution Control

Authors: Mounir Zekkaoui, Abdelhadi Fennan

Abstract:

The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make changes more or less important to many heterogeneous software artifacts such as source code, analysis and design models, unit testing, XML deployment descriptors, user guides, and others. These changes can be a source of degradation in functional, qualitative or behavioral terms of modified software. Hence the need for a unified approach for extraction and representation of different heterogeneous artifacts in order to ensure a unified and detailed description of heterogeneous software artifacts, exploitable by several software tools and allowing to responsible for the evolution of carry out the reasoning change concerned.

Keywords: heterogeneous software artifacts, software evolution control, unified approach, meta model, software architecture

Procedia PDF Downloads 418
954 Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks

Authors: Manoj Kumar Dutta

Abstract:

Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance.

Keywords: WDM network, contention resolution, optical buffering, non-linearity, throughput

Procedia PDF Downloads 428
953 Art and Culture in the Development Period to Modernization in the Reign of King Rama VI

Authors: Weena Eiamprapai

Abstract:

The growth of Thai society in western style in the middle of Rattanakosin period can be defined as modernization /civilization. These terms had an influence on the development of the country in the reign of King Rama V owing to the governance reform, and cultures influenced by the West. Those were passed on until the reign of King Rama VI. The preference was not only for the renovation of architecture and arts based on Thai customs reflecting the prosperity and beauty of handicrafts but also for the acceptance of westernization. The remain of this acceptance includes the concept of such value as gentlemanly behavior like that in Victorian Era of the United Kingdom, and the support of women’s status. Moreover, the wide spread of modernization leads to the movement to change the country’s governance system from absolute monarchy to democracy by a group of people called Rattanakosin Era (R.E.) 130 party.

Keywords: art, culture, development period, modernization, King Rama VI

Procedia PDF Downloads 276
952 Urban Conservation Methodology for Heritage Areas Case Study "Qabel Street, Old Jeddah"

Authors: Hossam Elborombaly, Nader Y. Azab

Abstract:

The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.

Keywords: conservation, heritage, identity, urban conservation methodology,

Procedia PDF Downloads 365
951 A Practical Approach and Implementation of Digital Library Towards Best Practice in Malaysian Academic Library

Authors: Zainab Ajab Mohideen, Kiran Kaur, A. Basheer Ahamadhu, Noor Azlinda Wan Jan, Sukmawati Muhammad

Abstract:

The corpus in the digital library is to provide an overview and evidence from library automation that can be used to justify the needs of the digital library. This paper disperses the approach and implementation of the digital library as part of best practices by the Automation Division at Hamzah Sendut Library of the University Science Malaysia (USM). The implemented digital library model emphasizes on the entire library collections, technical perspective, and automation solution. This model served as a foundation for digital library services as part of information delivery in the USM digital library. The approach to digital library includes discussion on key factors, design, architecture, and pragmatic model that has been collected, captured, and identified during the implementation stages. At present, the USM digital library has achieved the status of an Institutional Repository (IR).

Keywords: academic digital library, digital information system, digital library best practice, digital library model

Procedia PDF Downloads 534
950 Software Defined Storage: Object Storage over Hadoop Platform

Authors: Amritesh Srivastava, Gaurav Sharma

Abstract:

The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.

Keywords: Hadoop, HBase, object storage, REST

Procedia PDF Downloads 314
949 Nursing Students’ Opinions about Theoretical Lessons and Clinical Area: A Survey in a Nursing Department

Authors: Ergin Toros, Manar Aslan

Abstract:

This study was planned as a descriptive study in order to learn the opinions of the students who are studying in nursing undergraduate program about their theoretical/practical lessons and departments. The education in the undergraduate nursing programs has great importance because it contains the knowledge and skills to prepare student nurses to the clinic in the future. In order to provide quality-nursing services in the future, the quality of nursing education should be measured, and opinions of student nurses about education should be taken. The research population was composed of students educated in a university with 1-4 years of theoretical and clinical education (N=550), and the sample was composed of 460 students that accepted to take part in the study. It was reached to 83.6% of target population. Data collected through a survey developed by the researchers. Survey consists of 48 questions about sociodemographic characteristics (9 questions), theoretical courses (9 questions), laboratory applications (7 questions), clinical education (14 questions) and services provided by the faculty (9 questions). It was determined that 83.3% of the nursing students found the nursing profession to be suitable for them, 53% of them selected nursing because of easy job opportunity, and 48.9% of them stayed in state dormitory. Regarding the theoretical courses, 84.6% of the students were determined to agree that the question ‘Course schedule is prepared before the course and published on the university web page.’ 28.7% of them were determined to do not agree that the question ‘Feedback is given to students about the assignments they prepare.’. It has been determined that 41,5% of the students agreed that ‘The time allocated to laboratory applications is sufficient.’ Students said that physical conditions in laboratory (41,5%), and the materials used are insufficient (44.6%), and ‘The number of students in the group is not appropriate for laboratory applications.’ (45.2%). 71.3% of the students think that the nurses view in the clinics the students as a tool to remove the workload, 40.7% of them reported that nurses in the clinic area did not help through the purposes of the course, 39.6% of them said that nurses' communication with students is not good. 37.8% of students stated that nurses did not provide orientation to students, 37.2% of them think that nurses are not role models for students. 53.7% of the students stated that the incentive and support for the student exchange program were insufficient., %48 of the students think that career planning services, %47.2 security services,%45.4 the advisor spent time with students are not enough. It has been determined that nursing students are most disturbed by the approach of the nurses in the clinical area within the undergraduate education program. The clinical area education which is considered as an integral part of nursing education is important and affect to student satisfaction.

Keywords: nursing education, student, clinical area, opinion

Procedia PDF Downloads 164
948 Simultaneous Optimization of Design and Maintenance through a Hybrid Process Using Genetic Algorithms

Authors: O. Adjoul, A. Feugier, K. Benfriha, A. Aoussat

Abstract:

In general, issues related to design and maintenance are considered in an independent manner. However, the decisions made in these two sets influence each other. The design for maintenance is considered an opportunity to optimize the life cycle cost of a product, particularly in the nuclear or aeronautical field, where maintenance expenses represent more than 60% of life cycle costs. The design of large-scale systems starts with product architecture, a choice of components in terms of cost, reliability, weight and other attributes, corresponding to the specifications. On the other hand, the design must take into account maintenance by improving, in particular, real-time monitoring of equipment through the integration of new technologies such as connected sensors and intelligent actuators. We noticed that different approaches used in the Design For Maintenance (DFM) methods are limited to the simultaneous characterization of the reliability and maintainability of a multi-component system. This article proposes a method of DFM that assists designers to propose dynamic maintenance for multi-component industrial systems. The term "dynamic" refers to the ability to integrate available monitoring data to adapt the maintenance decision in real time. The goal is to maximize the availability of the system at a given life cycle cost. This paper presents an approach for simultaneous optimization of the design and maintenance of multi-component systems. Here the design is characterized by four decision variables for each component (reliability level, maintainability level, redundancy level, and level of monitoring data). The maintenance is characterized by two decision variables (the dates of the maintenance stops and the maintenance operations to be performed on the system during these stops). The DFM model helps the designers choose technical solutions for the large-scale industrial products. Large-scale refers to the complex multi-component industrial systems and long life-cycle, such as trains, aircraft, etc. The method is based on a two-level hybrid algorithm for simultaneous optimization of design and maintenance, using genetic algorithms. The first level is to select a design solution for a given system that considers the life cycle cost and the reliability. The second level consists of determining a dynamic and optimal maintenance plan to be deployed for a design solution. This level is based on the Maintenance Free Operating Period (MFOP) concept, which takes into account the decision criteria such as, total reliability, maintenance cost and maintenance time. Depending on the life cycle duration, the desired availability, and the desired business model (sales or rental), this tool provides visibility of overall costs and optimal product architecture.

Keywords: availability, design for maintenance (DFM), dynamic maintenance, life cycle cost (LCC), maintenance free operating period (MFOP), simultaneous optimization

Procedia PDF Downloads 98
947 Exploring Exposed Political Economy in Disaster Risk Reduction Efforts in Bangladesh

Authors: Shafiqul Islam, Cordia Chu

Abstract:

Bangladesh is one of the most vulnerable countries to climate related disasters such as flood and cyclone. Exploring from the semi-structured in-depth interviews of 38 stakeholders and literature review, this study examined the public spending distribution process in DRR. This paper demonstrates how the processes of political economy-enclosure, exclusion, encroachment, and entrenchment hinder the Disaster Risk Reduction (DRR) efforts of Department of Disaster Management (DDM) such as distribution of flood centres, cyclone centres and 40 days employment generation programs. Enclosure refers to when DRR projects allocated to less vulnerable areas or expand the roles of influencing actors into the public sphere. Exclusion refers to when DRR projects limit affected people’s access to resources or marginalize particular stakeholders in decision-making activities. Encroachment refers to when allocation of DRR projects and selection of location and issues degrade the environmental affect or contribute to other forms of disaster risk. Entrenchment refers to when DRR projects aggravate the disempowerment of common people worsen the concentrations of wealth and income inequality within a community. In line with United Nations (UN) Sustainable Development Goals (SDGs), Hyogo and Sendai Frameworks, in the case of Bangladesh, DRR policies implemented under the country’s national five-year plan, disaster-related acts and rules. These policies and practices have somehow enabled influential-elites to mobilize and distribute resources through bureaucracies. Exclusionary forms of fund distribution of DRR exist at both the national and local scales. DRR related allocations have encroached through the low land areas development project without consulting local needs. Most severely, DRR related unequal allocations have entrenched social class trapping the backward communities vulnerable to climate related disasters. Planners and practitioners of DRR need to take necessary steps to eliminate the potential risks from the processes of enclosure, exclusion, encroachment, and entrenchment happens in project fund allocations.

Keywords: Bangladesh, disaster risk reduction, fund distribution, political economy

Procedia PDF Downloads 116
946 Urban Conservation Methodology for Heritage Areas: A Case Study in Qabel Street, Old Jeddah

Authors: Hossam Hassan Elborombaly, Nader Y. Azab

Abstract:

The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.

Keywords: rehabilitation, socioeconomic, urban conservation, urban strategy

Procedia PDF Downloads 521
945 Effect of Dietary Fortification with Hibiscus Sabdariffa Calyces Meal on Egg Production and Egg Qualiy of Japanese Quail

Authors: Nomagugu Ndlovu, Kennedy H. Erlwanger, Eliton Chivandi

Abstract:

In order to enhance egg production and egg quality from layer poultry, producers use synthetic feed additives that enhance nutrient digestion and absorption in the gut. Synthetic feed additives have negative effects on consumer health hence the need to replace them with natural alternatives which are deemed safer for consumer health. Hibiscus sabdariffa calyces meal has hypolipidemic, probiotic and antioxidant activities; hence we investigated the effect of fortifying Japanese quail pullet diets with its calyces meal on egg production and egg quality. A standard Japanese quail layer diet was supplemented with H. sabdariffa calyces meal at 0%, 5% and 10% in diets 1, 2 and 3, respectively. Ninety, 5-week old Japanese quail hens were randomly allocated to and fed the layer diets for 56 days. Body mass, feed intake and egg mass, width, length, shell mass and thickness, yolk mass, height and diameter, albumen mass, length, width and height, and the proximate content and fatty acid profile of the egg albumen and yolk were determined. Supplemental fortification of the Japanese quail layer diet with H. sabdariffa calyces meal had no effect on growth performance and feed intake and conversion rate of the quail (P>0.05). The meal delayed the onset of laying and reduced (P < 0.0001) the number of eggs laid. It did not affect the external and internal egg quality parameters of Japanese quail (P > 0.05). Dietary fortification with H. sabdariffa calyces meal at 10% significantly increased the dry matter and reduced the fat content of the yolk and albumin of Japanese quail eggs (P < 0.05). Dietary H. sabdariffa calyces meal reduced the total omega 3 fatty acids in the yolk and significantly increased arachidonic acid (P = 0.0019), an omega 6 fatty acid. Inclusion of Hibiscus sabdariffa meal depressed egg production, suppressed omega 3 fatty acids and increased arachidonic acid thus, using it as a dietary supplement may result in losses to producers of Japanese quail eggs and may result in eggs whose fatty acid profile can compromise consumer health.

Keywords: quail, eggs, hibiscus sabdariffa, quality

Procedia PDF Downloads 49
944 Secure Optimized Ingress Filtering in Future Internet Communication

Authors: Bander Alzahrani, Mohammed Alreshoodi

Abstract:

Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.

Keywords: forwarding identifier, filling factor, information centric network, topology manager

Procedia PDF Downloads 134
943 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution

Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang

Abstract:

Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.

Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution

Procedia PDF Downloads 135
942 Treatment of Full-Thickness Rotator Cuff Tendon Tear Using Umbilical Cord Blood-Derived Mesenchymal Stem Cells and Polydeoxyribonucleotides in a Rabbit Model

Authors: Sang Chul Lee, Gi-Young Park, Dong Rak Kwon

Abstract:

Objective: The aim of this study was to investigate regenerative effects of ultrasound (US)-guided injection with human umbilical cord blood-derived mesenchymal stem cells (UCB-MSCs) and/or polydeoxyribonucleotide (PDRN) injection in a chronic traumatic full-thickness rotator cuff tendon tear (FTRCTT) in a rabbit model. Material and Methods: Rabbits (n = 32) were allocated into 4 groups. After a 5-mm sized FTRCTT just proximal to the insertion site on the subscapularis tendon was created by excision, the wound was immediately covered by silicone tube to prevent natural healing. After 6 weeks, 4 injections (0.2 mL normal saline, G1; 0.2 mL PDRN, G2; 0.2 mL UCB-MSCs, G3; and 0.2 mL UCB-MSCs with 0.2ml PDRN, G4) were injected into FTRCTT under US guidance. We evaluated gross morphologic changes on all rabbits after sacrifice. Masson’s trichrome, anti-type 1 collagen antibody, bromodeoxyuridine, proliferating cell nuclear antigen, vascular endothelial growth factor and platelet endothelial cell adhesion molecule stain were performed to evaluate histological changes. Motion analysis was also performed. Results: The gross morphologic mean tendon tear size in G3 and 4 was significantly smaller than that of G1 and 2 (p < .05). However, there were no significant differences in tendon tear size between G3 and 4. In G4, newly regenerated collagen type 1 fibers, proliferating cells activity, angiogenesis, walking distance, fast walking time, and mean walking speed were greater than in the other three groups on histological examination and motion analysis. Conclusion: Co-injection of UCB-MSCs and PDRN was more effective than UCB-MSCs injection alone in histological and motion analysis in a rabbit model of chronic traumatic FTRCTT. However, there was no significant difference in gross morphologic change of tendon tear between UCB-MSCs with/without PDRN injection. The results of this study regarding the combination of UCB-MSCs and PDRN are worth additional investigations.

Keywords: mesenchymal stem cell, umbilical cord, polydeoxyribonucleotides, shoulder, rotator cuff, ultrasonography, injections

Procedia PDF Downloads 174
941 Design of Middleware for Mobile Group Control in Physical Proximity

Authors: Moon-Tak Oh, Kyung-Min Park, Tae-Eun Yoon, Hoon Choi, Chil-Woo Lee

Abstract:

This paper is about middle-ware which enables group-user applications on mobile devices in physical proximity to interact with other devices without intervention of a central server. Requirements of the middle-ware are identified from service usage scenarios, and the functional architecture of the middle-ware is specified. These requirements include group management, synchronization, and resource management. Group Management needs to provide various capabilities to such applications with respect to managing multiple users (e.g., creation of groups, discovery of group or individual users, member join/leave, election of a group manager and service-group association) using D2D communication technology. We designed the middle-ware for the above requirements on the Android platform.

Keywords: group user, middleware, mobile service, physical proximity

Procedia PDF Downloads 493
940 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net

Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie

Abstract:

A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.

Keywords: reliability, colored Petri net, assessment, payment models, m-commerce

Procedia PDF Downloads 523
939 Promotional Mix as a Determinant of Consumer Buying Decision in the Food and Beverages Industry: A Case Study of Nigeria Bottling Company Plc., Asejire Ibadan

Authors: Adedeji S. Adegoke, Olakunle N. Popoola

Abstract:

Promotion is indispensible and inestimable property of marketing through which different organizations persuade their prospective customers. The idea of passing information about a product to the consumer at outside the world is known as promotional activities. A study was determined whether there was relationship between promotional mix and consumer buying decision, that is may be customers were influenced by promotion. It was investigated to determine whether promotion can be used to influence competitors’ activities in the market and also research was conducted to determine if there was any problem encountered by Nigeria bottling company plc, in promoting its beverages products. The various forms of promotional mix available for an organization were examined and recommended the appropriate promotional mix that company can adopt to boost the company sales. The research design was depended on the primary and secondary data. The primary data were information collected from the subjects using methods of data collection, that is through the use of questionnaire, interview, direct observation, etc. The secondary data consist of information that already exists having been collected for another purpose by some researchers. These include internal and external sources. The questionnaire was designed and administered to the staff of production and marketing department of Nigeria bottling company plc., which served as the population of this study, out of which sample was drawn randomly from the population, using sample random technique. It was deduced that 90% of the respondents opined that advertising influenced competition in the market and that there was a good sale after they started advert while 10% of them were not sure. At advertising level, 85% of the respondents chose 81-100% as the increase in the percentage recorded in their sales level, while 10% of them agreed that increase in the percentage recorded in their sales was within 61-80% and 5% of them chose 45-60% as the percentage increase in their sales record. Due to unstable economic condition of the Nigeria, many business organizations adopted the promotional strategies. Apart from advertising, it was discovered through research that sales promotion served as an incentive to consumers of Nigeria bottling company plc at a time offer gifts and prizes to consumers which drastically increased their level of sales. Since advertising and sales promotion increased the level of sales, more money should be allocated for this purpose to maintain market share and thereby increase profit.

Keywords: consumer, marketing, organization, promotional mix

Procedia PDF Downloads 140
938 Structuralism of Architectural Details in the Design of Modern High-Rise Buildings

Authors: Joanna Pietrzak, Anna Stefanska, Wieslaw Rokicki

Abstract:

Contemporary high-rise buildings constructed in recent years are often tremendous examples of original and unique architectural forms, being at the same time the affirmation of technical and technological progress accomplishments. The search for more efficient, sophisticated generations of structures also concerns the shaping of high-quality details. The concept of structural detail designing is connected with the rationalization of engineering solutions as well as through the optimisation and reduction of used material. Contemporary structural detail perceived through the development of building technologies is often a very aesthetic technical and material solution, which significantly influences the visual perception of architecture. Structural details are more often seen in shaping the forms of high-rise buildings, which are erected in many culturally different countries.

Keywords: aesthetic expression, high-rise buildings, structural detail, tall buildings

Procedia PDF Downloads 149
937 Sustainable Traditional Urban Design of the Old City of Ghadames

Authors: Hazem Bunkheila

Abstract:

Ghadames is an oasis on the edge of the Sahara Desert in southwestern Libya at the border with Algeria and Tunisia. It is the oldest oasis in the world that provides a fascinating example of traditional urban in the desert environment. The urban of the small city is considered a genuine adaptation to the harsh desert climate. The historic city of Ghadames remained unaffected by the rapid after oil changes. That makes it a good field to study sustainable, vernacular, earth architecture and urban design. The aim of this paper is to investigate the urban structure, concept, and fabric of the old oasis. The research also surveys the environmental considerations in the city that shades the sustainable features in this traditional residential area. In addition, the paper addresses the modern applications in the new city of Ghadams and sides of success and failure compared to the traditional urban fabric.

Keywords: dessert climate design, Ghadames, sustainable urban design, traditional urban design

Procedia PDF Downloads 346
936 Everyday Life Information Seeking among Female Students: A Survey of University and Private Hostels at Lahore

Authors: Sadaf Rafiq, Muhammad Waqas, Shakeel Ahmad Khan, Nisar Ahmad

Abstract:

Everyday life information seeking (ELIS) is considered as the mastery of life. It plays an important role in daily problem solving activities. Female students living in university hostels need variety of information to fulfil their everyday information needs. To find accurate and timely information is really challenging for females students who move from rural areas for educational purposes. These challenges involve culture differences, stress, financial issues, homesickness, diet needs and change in sleeping and eating habits. These complications create numerous problems for female students to adjust themselves in new and unfamiliar environment. Although the Internet has increased the ease of seeking everyday life information to survive successfully but there is still uncertainty to fully rely on the quality of information available on the web. Pakistan is an underdeveloped country where limited budget is allocated for educational institutions to enable them in developing well established hostels for their students. Female students who pursue for higher education has to stay at hostels for years to obtain education goals. It really becomes very difficult for them to spend life in hostels if they are not properly facilitated with relevant information sources to acquire everyday life information. The proposed study attempts to investigate the everyday life information seeking behavior of female students who are living in university and private hostels of Lahore. It investigates the various sources of information used by female students. It also identifies the problems faced by the female students in accessing everyday life information. The results of this study will be helpful for university management to understand their information need and provide required information sources which are essential for them to spend a comfortable, successful and peaceful life in hostels and achieve their educational goals. To achieve the objectives of the study, we will use quantitative research approach by using questionnaire as a data collection tool. The population of this study will be the university students living in public and private hostels of Lahore, Pakistan. This study will increase the understanding of everyday life information seeking behavior of female students living in hostels. Results of the study will be helpful for hostel administrations to better understand the students’ everyday life information needs and provide high quality of information services and living environment.

Keywords: everyday, information seeking, hostel, female

Procedia PDF Downloads 129
935 Combined Odd Pair Autoregressive Coefficients for Epileptic EEG Signals Classification by Radial Basis Function Neural Network

Authors: Boukari Nassim

Abstract:

This paper describes the use of odd pair autoregressive coefficients (Yule _Walker and Burg) for the feature extraction of electroencephalogram (EEG) signals. In the classification: the radial basis function neural network neural network (RBFNN) is employed. The RBFNN is described by his architecture and his characteristics: as the RBF is defined by the spread which is modified for improving the results of the classification. Five types of EEG signals are defined for this work: Set A, Set B for normal signals, Set C, Set D for interictal signals, set E for ictal signal (we can found that in Bonn university). In outputs, two classes are given (AC, AD, AE, BC, BD, BE, CE, DE), the best accuracy is calculated at 99% for the combined odd pair autoregressive coefficients. Our method is very effective for the diagnosis of epileptic EEG signals.

Keywords: epilepsy, EEG signals classification, combined odd pair autoregressive coefficients, radial basis function neural network

Procedia PDF Downloads 332
934 An Experimental Exploration of the Interaction between Consumer Ethics Perceptions, Legality Evaluations, and Mind-Sets

Authors: Daphne Sobolev, Niklas Voege

Abstract:

During the last three decades, consumer ethics perceptions have attracted the attention of a large number of researchers. Nevertheless, little is known about the effect of the cognitive and situational contexts of the decision on ethics judgments. In this paper, the interrelationship between consumers’ ethics perceptions, legality evaluations and mind-sets are explored. Legality evaluations represent the cognitive context of the ethical judgments, whereas mind-sets represent their situational context. Drawing on moral development theories and priming theories, it is hypothesized that both factors are significantly related to consumer ethics perceptions. To test this hypothesis, 289 participants were allocated to three mind-set experimental conditions and a control group. Participants in the mind-set conditions were primed for aggressiveness, politeness or awareness to the negative legal consequences of breaking the law. Mind-sets were induced using a sentence-unscrambling task, in which target words were included. Ethics and legality judgments were assessed using consumer ethics and internet ethics questionnaires. All participants were asked to rate the ethicality and legality of consumer actions described in the questionnaires. The results showed that consumer ethics and legality perceptions were significantly correlated. Moreover, including legality evaluations as a variable in ethics judgment models increased the predictive power of the models. In addition, inducing aggressiveness in participants reduced their sensitivity to ethical issues; priming awareness to negative legal consequences increased their sensitivity to ethics when uncertainty about the legality of the judged scenario was high. Furthermore, the correlation between ethics and legality judgments was significant overall mind-set conditions. However, the results revealed conflicts between ethics and legality perceptions: consumers considered 10%-14% of the presented behaviors unethical and legal, or ethical and illegal. In 10-23% of the questions, participants indicated that they did not know whether the described action was legal or not. In addition, an asymmetry between the effects of aggressiveness and politeness priming was found. The results show that the legality judgments and mind-sets interact with consumer ethics perceptions. Thus, they portray consumer ethical judgments as dynamical processes which are inseparable from other cognitive processes and situational variables. They highlight that legal and ethical education, as well as adequate situational cues at the service place, could have a positive effect on consumer ethics perceptions. Theoretical contribution is discussed.

Keywords: consumer ethics, legality judgments, mind-set, priming, aggressiveness

Procedia PDF Downloads 276
933 Privacy for the Internet of Things and its Different Dimensions

Authors: Maryam M Esfahani

Abstract:

The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.

Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies

Procedia PDF Downloads 76