Search results for: coding complexity metric mccabe
1414 A Review on Water Models of Surface Water Environment
Authors: Shahbaz G. Hassan
Abstract:
Water quality models are very important to predict the changes in surface water quality for environmental management. The aim of this paper is to give an overview of the water qualities, and to provide directions for selecting models in specific situation. Water quality models include one kind of model based on a mechanistic approach, while other models simulate water quality without considering a mechanism. Mechanistic models can be widely applied and have capabilities for long-time simulation, with highly complexity. Therefore, more spaces are provided to explain the principle and application experience of mechanistic models. Mechanism models have certain assumptions on rivers, lakes and estuaries, which limits the application range of the model, this paper introduces the principles and applications of water quality model based on the above three scenarios. On the other hand, mechanistic models are more easily to compute, and with no limit to the geographical conditions, but they cannot be used with confidence to simulate long term changes. This paper divides the empirical models into two broad categories according to the difference of mathematical algorithm, models based on artificial intelligence and models based on statistical methods.Keywords: empirical models, mathematical, statistical, water quality
Procedia PDF Downloads 2651413 Sustainable Building Design for Energy Efficiency and Healthier Electromagnetic Environment
Authors: Riadh Habash, Kristina Djukic, Gandhi Habash
Abstract:
Sustainable design is one of the emerging milestones in building construction. This concept is defined as buildings that on a yearly average consume as much energy as they generate using renewable energy sources. Realization of sustainable buildings requires a wide range of technologies, systems and solutions with varying degrees of complexity and sophistication, depending upon the location and surrounding environmental conditions. This paper will address not only the role of the above technologies and solutions but will provide solutions to reduce the electromagnetic fields (EMFs) in the building as much as possible so that the occupiers can recover from electro-hyper-sensitivity, if any. The objective is to maximize energy efficiency, optimize occupant comfort, reduce dependency on the grid and provide safer and healthier EMF environment especially for hypersensitive people. Creative architectural and engineering solutions that capitalize on the design of energy efficient technologies; combined cooling, heating and power (CCHP) microgrid (MG); and EMF mitigation will be presented.Keywords: sustainable buildings, energy efficiency, thermal simulation, electromagnetic environment
Procedia PDF Downloads 3021412 Using of Particle Swarm Optimization for Loss Minimization of Vector-Controlled Induction Motors
Authors: V. Rashtchi, H. Bizhani, F. R. Tatari
Abstract:
This paper presents a new online loss minimization for an induction motor drive. Among the many loss minimization algorithms (LMAs) for an induction motor, a particle swarm optimization (PSO) has the advantages of fast response and high accuracy. However, the performance of the PSO and other optimization algorithms depend on the accuracy of the modeling of the motor drive and losses. In the development of the loss model, there is always a trade off between accuracy and complexity. This paper presents a new online optimization to determine an optimum flux level for the efficiency optimization of the vector-controlled induction motor drive. An induction motor (IM) model in d-q coordinates is referenced to the rotor magnetizing current. This transformation results in no leakage inductance on the rotor side, thus the decomposition into d-q components in the steady-state motor model can be utilized in deriving the motor loss model. The suggested algorithm is simple for implementation.Keywords: induction machine, loss minimization, magnetizing current, particle swarm optimization
Procedia PDF Downloads 6341411 A Query Optimization Strategy for Autonomous Distributed Database Systems
Authors: Dina K. Badawy, Dina M. Ibrahim, Alsayed A. Sallam
Abstract:
Distributed database is a collection of logically related databases that cooperate in a transparent manner. Query processing uses a communication network for transmitting data between sites. It refers to one of the challenges in the database world. The development of sophisticated query optimization technology is the reason for the commercial success of database systems, which complexity and cost increase with increasing number of relations in the query. Mariposa, query trading and query trading with processing task-trading strategies developed for autonomous distributed database systems, but they cause high optimization cost because of involvement of all nodes in generating an optimal plan. In this paper, we proposed a modification on the autonomous strategy K-QTPT that make the seller’s nodes with the lowest cost have gradually high priorities to reduce the optimization time. We implement our proposed strategy and present the results and analysis based on those results.Keywords: autonomous strategies, distributed database systems, high priority, query optimization
Procedia PDF Downloads 5241410 Generic Hybrid Models for Two-Dimensional Ultrasonic Guided Wave Problems
Authors: Manoj Reghu, Prabhu Rajagopal, C. V. Krishnamurthy, Krishnan Balasubramaniam
Abstract:
A thorough understanding of guided ultrasonic wave behavior in structures is essential for the application of existing Non Destructive Evaluation (NDE) technologies, as well as for the development of new methods. However, the analysis of guided wave phenomena is challenging because of their complex dispersive and multimodal nature. Although numerical solution procedures have proven to be very useful in this regard, the increasing complexity of features and defects to be considered, as well as the desire to improve the accuracy of inspection often imposes a large computational cost. Hybrid models that combine numerical solutions for wave scattering with faster alternative methods for wave propagation have long been considered as a solution to this problem. However usually such models require modification of the base code of the solution procedure. Here we aim to develop Generic Hybrid models that can be directly applied to any two different solution procedures. With this goal in mind, a Numerical Hybrid model and an Analytical-Numerical Hybrid model has been developed. The concept and implementation of these Hybrid models are discussed in this paper.Keywords: guided ultrasonic waves, Finite Element Method (FEM), Hybrid model
Procedia PDF Downloads 4671409 Improved Processing Speed for Text Watermarking Algorithm in Color Images
Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari
Abstract:
Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.Keywords: steganography, watermarking, time complexity measurements, private keys
Procedia PDF Downloads 1441408 Knowledge Engineering Based Smart Healthcare Solution
Authors: Rhaed Khiati, Muhammad Hanif
Abstract:
In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.Keywords: big data, smart healthcare, distributed systems, bioinformatics
Procedia PDF Downloads 1981407 Menstruating Bodies and Social Control – Insights From Dignity Without Danger: Collaboratively Analysing Menstrual Stigma and Taboos in Nepal
Authors: Sara Parker, Kay Standing
Abstract:
This paper will share insights into how menstruators bodies in Nepal are viewed and controlled in Nepal due to the deeply held stigmas and taboos that exist that frame menstrual blood as impure and polluting. It draws on a British Academy Global Challenges Research (BA/GCRF) funded project, ‘Dignity Without Danger,’ that ran from December 2019 to 2022. In Nepal, beliefs and myths around menstrual related practices prevail and vary in accordance to time, generation, caste and class. Physical seclusion and/or restrictions include the consumption of certain foods, the ability to touch certain people and objects, and restricted access to water sources. These restrictions not only put women at risk of poor health outcomes, but they also promote discrimination and challenge fundamental human rights. Despite the pandemic, a wealth of field research and creative outputs have been generated to help break the silence that surrounds menstruation and also highlights the complexity of addressing the harms associated with the exclusion from sacred and profane spaces that menstruators face. Working with locally recruited female research assistants, NGOS and brining together academics from the UK and Nepal, we explore the intersecting factors that impact on menstrual experiences and how they vary throughout Nepal. WE concur with Tamang that there is no such thing as a ‘Nepali Woman’, and there is no one narrative that captures the experiences of menstruators in Nepal. These deeply held beliefs and practices mean that menstruators are denied their right to a dignified menstruation. By being excluded from public and private spaces, such as temples and religious sites, as well as from kitchens and your own bedroom in your own home, these beliefs impact on individuals in complex and interesting ways. Existing research in Nepal by academics and activists demonstrates current programmes and initiatives do not fully address the misconceptions that underpin the exclusionary practices impacting on sexual and reproductive health, a sense of well being and highlight more work is needed in this area. Research has been conducted in all 7 provinces and through exploring and connecting disparate stories, artefacts and narratives, we will deepen understanding of the complexity of menstrual practices enabling local stakeholders to challenge exclusionary practices. By using creative methods to engage with stakeholders and share our research findings as well as highlighting the wealth of activism in Nepal. We highlight the importance of working with local communities, leaders and cutting across disciplines and agencies to promote menstrual justice and dignity. Our research findings and creative outputs that we share on social media channels such as Dignity Without Danger Facebook, Instagram and you tube stress the value of employing a collaborative action research approach to generate material which helps local people take control of their own narrative and change social relations that lead to harmful practices.Keywords: menstruation, Nepal, stigma, social norms
Procedia PDF Downloads 671406 The Role of Stakeholders in the Development of Sustainable Supply Chain Policy Framework in the Upstream Pharmaceutical Industry in Ghana
Authors: Gifty Kumadey, Albert Tchey Agbenyegah
Abstract:
This study explores the role of stakeholders in developing a sustainable supply chain policy framework in Ghana's pharmaceutical industry. It employs a qualitative research design to analyze policy documents, academic articles, and reports, shedding light on stakeholder involvement. The findings highlight the contributions of government agencies, regulatory bodies, pharmaceutical companies, suppliers, and civil society organizations. Key policies such as green procurement, waste management, and recycling initiatives are identified. However, challenges such as limited transparency, supplier engagement, and regulatory complexity impede implementation. The study recommends strengthening collaboration and promoting transparency to overcome these challenges. The findings provide valuable insights for policymakers, industry stakeholders, and researchers seeking to advance sustainable supply chain practices in Ghana's pharmaceutical industry.Keywords: stakeholders, sustainable supply chain, policy framework, pharmaceutical industry
Procedia PDF Downloads 941405 Architectural Design Studio (ADS) as an Operational Synthesis in Architectural Education
Authors: Francisco A. Ribeiro Da Costa
Abstract:
Who is responsible for teaching architecture; consider various ways to participate in learning, manipulating various pedagogical tools to streamline the creative process. The Architectural Design Studio (ADS) should become a holistic, systemic process responding to the complexity of our world. This essay corresponds to a deep reflection developed by the author on the teaching of architecture. The outcomes achieved are the corollary of experimentation; discussion and application of pedagogical methods that allowed consolidate the creativity applied by students. The purpose is to show the conjectures that have been considered effective in creating an intellectual environment that nurtures the subject of Architectural Design Studio (ADS), as an operational synthesis in the final stage of the degree. These assumptions, which are part of the proposed model, displaying theories and teaching methodologies that try to respect the learning process based on student learning styles Kolb, ensuring their latent specificities and formulating the structure of the ASD discipline. In addition, the assessing methods are proposed, which consider the architectural Design Studio as an operational synthesis in the teaching of architecture.Keywords: teaching-learning, architectural design studio, architecture, education
Procedia PDF Downloads 3911404 An Evaluation Model for Enhancing Flexibility in Production Systems through Additive Manufacturing
Authors: Angela Luft, Sebastian Bremen, Nicolae Balc
Abstract:
Additive manufacturing processes have entered large parts of the industry and their range of application have progressed and grown significantly in the course of time. A major advantage of additive manufacturing is the innate flexibility of the machines. This corelates with the ongoing demand of creating highly flexible production environments. However, the potential of additive manufacturing technologies to enhance the flexibility of production systems has not yet been truly considered and quantified in a systematic way. In order to determine the potential of additive manufacturing technologies with regards to the strategic flexibility design in production systems, an integrated evaluation model has been developed, that allows for the simultaneous consideration of both conventional as well as additive production resources. With the described model, an operational scope of action can be identified and quantified in terms of mix and volume flexibility, process complexity, and machine capacity that goes beyond the current cost-oriented approaches and offers a much broader and more holistic view on the potential of additive manufacturing. A respective evaluation model is presented this paper.Keywords: additive manufacturing, capacity planning, production systems, strategic production planning, flexibility enhancement
Procedia PDF Downloads 1581403 Development of a Conceptual Framework for Supply Chain Management Strategies Maximizing Resilience in Volatile Business Environments: A Case of Ventilator Challenge UK
Authors: Elena Selezneva
Abstract:
Over the last two decades, an unprecedented growth in uncertainty and volatility in all aspects of the business environment has caused major global supply chain disruptions and malfunctions. The effects of one failed company in a supply chain can ripple up and down the chain, causing a number of entities or an entire supply chain to collapse. The complicating factor is that an increasingly unstable and unpredictable business environment fuels the growing complexity of global supply chain networks. That makes supply chain operations extremely unpredictable and hard to manage with the established methods and strategies. It has caused the premature demise of many companies around the globe as they could not withstand or adapt to the storm of change. Solutions to this problem are not easy to come by. There is a lack of new empirically tested theories and practically viable supply chain resilience strategies. The mainstream organizational approach to managing supply chain resilience is rooted in well-established theories developed in the 1960-1980s. However, their effectiveness is questionable in currently extremely volatile business environments. The systems thinking approach offers an alternative view of supply chain resilience. Still, it is very much in the development stage. The aim of this explorative research is to investigate supply chain management strategies that are successful in taming complexity in volatile business environments and creating resilience in supply chains. The design of this research methodology was guided by an interpretivist paradigm. A literature review informed the selection of the systems thinking approach to supply chain resilience. Therefore, an explorative single case study of Ventilator Challenge UK was selected as a case study for its extremely resilient performance of its supply chain during a period of national crisis. Ventilator Challenge UK is intensive care ventilators supply project for the NHS. It ran for 3.5 months and finished in 2020. The participants moved on with their lives, and most of them are not employed by the same organizations anymore. Therefore, the study data includes documents, historical interviews, live interviews with participants, and social media postings. The data analysis was accomplished in two stages. First, data were thematically analyzed. In the second stage, pattern matching and pattern identification were used to identify themes that formed the findings of the research. The findings from the Ventilator Challenge UK case study supply management practices demonstrated all the features of an adaptive dynamic system. They cover all the elements of supply chain and employ an entire arsenal of adaptive dynamic system strategies enabling supply chain resilience. Also, it is not a simple sum of parts and strategies. Bonding elements and connections between the components of a supply chain and its environment enabled the amplification of resilience in the form of systemic emergence. Enablers are categorized into three subsystems: supply chain central strategy, supply chain operations, and supply chain communications. Together, these subsystems and their interconnections form the resilient supply chain system framework conceptualized by the author.Keywords: enablers of supply chain resilience, supply chain resilience strategies, systemic approach in supply chain management, resilient supply chain system framework, ventilator challenge UK
Procedia PDF Downloads 821402 Reshoring Strategies for Enhanced Supply Chain Resilience: A Comprehensive Analysis of Procurement Challenges and Solutions in the United States
Authors: Emilia Segun-Ajao
Abstract:
The strategy of relocation aimed at strengthening supply chain resilience in the United States is examined, taking into account recent global disturbances and vulnerabilities in offshore manufacturing. It explains the procurement challenges faced by enterprises and offers solutions to mitigate risks and improve resilience. Through the analysis of innovative approaches, including technological advances, policy considerations, and strategic frameworks, this study provides insights to decision-makers about the complexity of supply chain management. Reshoring has gained attention as a strategy to improve supply chain resilience in the face of global disruptions. This analysis focuses on the importance of relocating as a multifaceted approach to strengthening supply chains, advocating economic benefits, technological advances, and policy frameworks to create a more robust supply landscape in the United States.Keywords: collaborative partnerships, supply chain resilience, procurement challenges, technology adoption
Procedia PDF Downloads 631401 Rendering Religious References in English: Naguib Mahfouz in the Arabic as a Foreign Language Classroom
Authors: Shereen Yehia El Ezabi
Abstract:
The transition from the advanced to the superior level of Arabic proficiency is widely known to pose considerable challenges for English speaking students of Arabic as a Foreign Language (AFL). Apart from the increasing complexity of the grammar at this juncture, together with the sprawling vocabulary, to name but two of those challenges, there is also the somewhat less studied hurdle along the way to superior level proficiency, namely, the seeming opacity of many aspects of Arab/ic culture to such learners. This presentation tackles one specific dimension of such issues: religious references in literary texts. It illustrates how carefully constructed translation activities may be used to expand and deepen students’ understanding and use of them. This is shown to be vital for making the leap to the desired competency, given that such elements, as reflected in customs, traditions, institutions, worldviews, and formulaic expressions lie at the very core of Arabic culture and, as such, pervade all modes and levels of Arabic discourse. A short story from the collection “Stories from Our Alley”, by preeminent novelist Naguib Mahfouz is selected for use in this context, being particularly replete with such religious references, of which religious expressions will form the focus of the presentation. As a miniature literary work, it provides an organic whole, so to speak, within which to explore with the class the most precise denotation, as well as the subtlest connotation of each expression in an effort to reach the ‘best’ English rendering. The term ‘best’ refers to approximating the meaning in its full complexity from the source text, in this case Arabic, to the target text, English, according to the concept of equivalence in translation theory. The presentation will show how such a process generates the sort of thorough discussion and close text analysis which allows students to gain valuable insight into this central idiom of Arabic. A variety of translation methods will be highlighted, gleaned from the presenter’s extensive work with advanced/superior students in the Center for Arabic Study Abroad (CASA) program at the American University in Cairo. These begin with the literal rendering of expressions, with the purpose of reinforcing vocabulary learning and practicing the rules of derivational morphology as they form each word, since the larger context remains that of an AFL class, as opposed to a translation skills program. However, departures from the literal approach are subsequently explored by degrees, moving along the spectrum of functional and pragmatic freer translations in order to transmit the ‘real’ meaning in readable English to the target audience- no matter how culture/religion specific the expression- while remaining faithful to the original. Samples from students’ work pre and post discussion will be shared, demonstrating how class consensus is formed as to the final English rendering, proposed as the closest match to the Arabic, and shown to be the result of the above activities. Finally, a few examples of translation work which students have gone on to publish will be shared to corroborate the effectiveness of this teaching practice.Keywords: superior level proficiency in Arabic as a foreign language, teaching Arabic as a foreign language, teaching idiomatic expressions, translation in foreign language teaching
Procedia PDF Downloads 2001400 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment
Authors: Wenqing Fan, Yixuan Cheng, Wei Huang
Abstract:
The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence
Procedia PDF Downloads 1211399 Business-Intelligence Mining of Large Decentralized Multimedia Datasets with a Distributed Multi-Agent System
Authors: Karima Qayumi, Alex Norta
Abstract:
The rapid generation of high volume and a broad variety of data from the application of new technologies pose challenges for the generation of business-intelligence. Most organizations and business owners need to extract data from multiple sources and apply analytical methods for the purposes of developing their business. Therefore, the recently decentralized data management environment is relying on a distributed computing paradigm. While data are stored in highly distributed systems, the implementation of distributed data-mining techniques is a challenge. The aim of this technique is to gather knowledge from every domain and all the datasets stemming from distributed resources. As agent technologies offer significant contributions for managing the complexity of distributed systems, we consider this for next-generation data-mining processes. To demonstrate agent-based business intelligence operations, we use agent-oriented modeling techniques to develop a new artifact for mining massive datasets.Keywords: agent-oriented modeling (AOM), business intelligence model (BIM), distributed data mining (DDM), multi-agent system (MAS)
Procedia PDF Downloads 4321398 A New Block Cipher for Resource-Constrained Internet of Things Devices
Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam
Abstract:
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.Keywords: internet of things, cryptography block cipher, S-box, key management, security, network
Procedia PDF Downloads 1141397 Planning and Implementing Large-Scale Ecological Connectivity: A Review of Past and Ongoing Practices in Turkey
Authors: Tutku Ak, A. Esra Cengiz, Çiğdem Ayhan Kaptan
Abstract:
The conservation community has been increasingly promoting the concept of ecological connectivity towards the prevention and mitigation of landscape fragmentation. Many tools have been proposed for this purpose in not only Europe, but also around the world. Spatial planning for building connectivity, however, has many problems associated with the complexity of ecological processes at spatial and temporal scales. Furthermore, on the ground implementation could be very difficult potentially leading to ecologically disastrous results and waste of resources. These problems, on the other hand, can be avoided or rectified as more experience is gained with implementation. Therefore, it is the objective of this study to document the experiences gained with connectivity planning in Turkish landscapes. This paper is a preliminary review of the conservation initiatives and projects aimed at protecting and building ecological connectivity in and around Turkey. The objective is to scope existing conservation plans, tools and implementation approaches in Turkey and the ultimate goal is to understand to what degree they have been implemented and what are the constraints and opportunities that are being faced.Keywords: ecological connectivity, large-scale landscapes, planning and implementation, Turkey
Procedia PDF Downloads 5031396 Review of the Software Used for 3D Volumetric Reconstruction of the Liver
Authors: P. Strakos, M. Jaros, T. Karasek, T. Kozubek, P. Vavra, T. Jonszta
Abstract:
In medical imaging, segmentation of different areas of human body like bones, organs, tissues, etc. is an important issue. Image segmentation allows isolating the object of interest for further processing that can lead for example to 3D model reconstruction of whole organs. Difficulty of this procedure varies from trivial for bones to quite difficult for organs like liver. The liver is being considered as one of the most difficult human body organ to segment. It is mainly for its complexity, shape versatility and proximity of other organs and tissues. Due to this facts usually substantial user effort has to be applied to obtain satisfactory results of the image segmentation. Process of image segmentation then deteriorates from automatic or semi-automatic to fairly manual one. In this paper, overview of selected available software applications that can handle semi-automatic image segmentation with further 3D volume reconstruction of human liver is presented. The applications are being evaluated based on the segmentation results of several consecutive DICOM images covering the abdominal area of the human body.Keywords: image segmentation, semi-automatic, software, 3D volumetric reconstruction
Procedia PDF Downloads 2911395 Software-Defined Networks in Utility Power Networks
Authors: Ava Salmanpour, Hanieh Saeedi, Payam Rouhi, Elahe Hamzeil, Shima Alimohammadi, Siamak Hossein Khalaj, Mohammad Asadian
Abstract:
Software-defined network (SDN) is a network architecture designed to control network using software application in a central manner. This ability enables remote control of the whole network regardless of the network technology. In fact, in this architecture network intelligence is separated from physical infrastructure, it means that required network components can be implemented virtually using software applications. Today, power networks are characterized by a high range of complexity with a large number of intelligent devices, processing both huge amounts of data and important information. Therefore, reliable and secure communication networks are required. SDNs are the best choice to meet this issue. In this paper, SDN networks capabilities and characteristics will be reviewed and different basic controllers will be compared. The importance of using SDNs to escalate efficiency and reliability in utility power networks is going to be discussed and the comparison between the SDN-based power networks and traditional networks will be explained.Keywords: software-defined network, SDNs, utility network, open flow, communication, gas and electricity, controller
Procedia PDF Downloads 1141394 Rethinking Sustainability: Towards an Open System Approach
Authors: Fatemeh Yazdandoust
Abstract:
Sustainability is a growing concern in architecture and urban planning due to the environmental impact of the built environment. Ecological challenges persist despite the proliferation of sustainable design strategies, prompting a critical reevaluation of existing approaches. This study examines sustainable design practices, focusing on the origins and processes of production, environmental impact, and socioeconomic dimensions. It also discusses ‘cleantech’ initiatives, which often prioritize profitability over ecological stewardship. The study advocates for a paradigm shift in urban design towards greater adaptability, complexity, and inclusivity, embracing porosity, incompleteness, and seed planning. This holistic approach emphasizes citizen participation and bottom-up interventions, reimagining urban spaces as evolving ecosystems. The study calls for a reimagining of sustainability that transcends conventional green design concepts, promoting a more resilient and inclusive built environment through an open system approach grounded in adaptability, diversity, and equity principles.Keywords: sustainability, clean-tech, open system design, sustainable design
Procedia PDF Downloads 631393 A Deletion-Cost Based Fast Compression Algorithm for Linear Vector Data
Authors: Qiuxiao Chen, Yan Hou, Ning Wu
Abstract:
As there are deficiencies of the classic Douglas-Peucker Algorithm (DPA), such as high risks of deleting key nodes by mistake, high complexity, time consumption and relatively slow execution speed, a new Deletion-Cost Based Compression Algorithm (DCA) for linear vector data was proposed. For each curve — the basic element of linear vector data, all the deletion costs of its middle nodes were calculated, and the minimum deletion cost was compared with the pre-defined threshold. If the former was greater than or equal to the latter, all remaining nodes were reserved and the curve’s compression process was finished. Otherwise, the node with the minimal deletion cost was deleted, its two neighbors' deletion costs were updated, and the same loop on the compressed curve was repeated till the termination. By several comparative experiments using different types of linear vector data, the comparison between DPA and DCA was performed from the aspects of compression quality and computing efficiency. Experiment results showed that DCA outperformed DPA in compression accuracy and execution efficiency as well.Keywords: Douglas-Peucker algorithm, linear vector data, compression, deletion cost
Procedia PDF Downloads 2521392 Improving the Security of Internet of Things Using Encryption Algorithms
Authors: Amirhossein Safi
Abstract:
Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.Keywords: internet of things, security, hybrid algorithm, privacy
Procedia PDF Downloads 4691391 On Supporting a Meta-Design Approach in Socio-Technical Ontology Engineering
Authors: Mesnan Silalahi, Dana Indra Sensuse, Indra Budi
Abstract:
Many research have revealed the fact of the complexity of ontology building process that there is a need to have a new approach which addresses the socio-technical aspects in the collaboration to reach a consensus. Meta-design approach is considered applicable as a method in the methodological model in a socio-technical ontology engineering. Principles in the meta-design framework is applied in the construction phases on the ontology. A portal is developed to support the meta-design principles requirements. To validate the methodological model semantic web applications were developed and integrated in the portal and also used as a way to show the usefulness of the ontology. The knowledge based system will be filled with data of Indonesian medicinal plants. By showing the usefulness of the developed ontology in a web semantic application, we motivate all stakeholders to participate in the development of knowledge based system of medicinal plants in Indonesia.Keywords: socio-technical, metadesign, ontology engineering methodology, semantic web application
Procedia PDF Downloads 4391390 A Neurosymbolic Learning Method for Uplink LTE-A Channel Estimation
Authors: Lassaad Smirani
Abstract:
In this paper we propose a Neurosymbolic Learning System (NLS) as a channel estimator for Long Term Evolution Advanced (LTE-A) uplink. The proposed system main idea based on Neural Network has modules capable of performing bidirectional information transfer between symbolic module and connectionist module. We demonstrate various strengths of the NLS especially the ability to integrate theoretical knowledge (rules) and experiential knowledge (examples), and to make an initial knowledge base (rules) converted into a connectionist network. Also to use empirical knowledge witch by learning will have the ability to revise the theoretical knowledge and acquire new one and explain it, and finally the ability to improve the performance of symbolic or connectionist systems. Compared with conventional SC-FDMA channel estimation systems, The performance of NLS in terms of complexity and quality is confirmed by theoretical analysis and simulation and shows that this system can make the channel estimation accuracy improved and bit error rate decreased.Keywords: channel estimation, SC-FDMA, neural network, hybrid system, BER, LTE-A
Procedia PDF Downloads 3941389 Preliminary Experience in Multiple Green Health Hospital Construction
Authors: Ming-Jyh Chen, Wen-Ming Huang, Yi-Chu Liu, Li-Hui Yang
Abstract:
Introduction: Social responsibility is the key to sustainable organizational development. Under the ground Green Health Hospital Declaration signed by our superintendent, we have launched comprehensive energy conservation management in medical services, the community, and the staff’s life. To execute environment-friendly promotion with robust strategies, we build up a low-carbon medical system and community with smart green public construction promotion as well as intensifying energy conservation education and communication. Purpose/Methods: With the support of the board and the superintendent, we construct an energy management team, commencing with an environment-friendly system, management, education, and ISO 50001 energy management system; we have ameliorated energy performance and energy efficiency and continuing. Results: In the year 2021, we have achieved multiple goals. The energy management system efficiently controls diesel, natural gas, and electricity usage. About 5% of the consumption is saved when compared to the numbers from 2018 and 2021. Our company develops intelligent services and promotes various paperless electronic operations to provide people with a vibrant and environmentally friendly lifestyle. The goal is to save 68.6% on printing and photocopying by reducing 35.15 million sheets of paper yearly. We strengthen the concept of environmental protection classification among colleagues. In the past two years, the amount of resource recycling has reached more than 650 tons, and the resource recycling rate has reached 70%. The annual growth rate of waste recycling is about 28 metric tons. Conclusions: To build a green medical system with “high efficacy, high value, low carbon, low reliance,” energy stewardship, economic prosperity, and social responsibility are our principles when it comes to formulation of energy conservation management strategies, converting limited sources to efficient usage, developing clean energy, and continuing with sustainable energy.Keywords: energy efficiency, environmental education, green hospital, sustainable development
Procedia PDF Downloads 801388 Mutational and Evolutionary Analysis of Interleukin-2 Gene in Four Pakistani Goat Breeds
Authors: Tanveer Hussain, Misbah Hussain, Masroor Ellahi Babar, Muhammad Traiq Pervez, Fiaz Hussain, Sana Zahoor, Rashid Saif
Abstract:
Interleukin 2 (IL-2) is a cytokine which is produced by activated T cells, play important role in immune response against antigen. It act in both autocrine and paracrine manner. It can stimulate B cells and various other phagocytic cells like monocytes, lymphokine-activated killer cells and natural killer cells. Acting in autocrine fashion, IL-2 protein plays a crucial role in proliferation of T cells. IL-2 triggers the release of pro and anti- inflammatory cytokines by activating several pathways. In present study, exon 1 of IL-2 gene of four local Pakistani breeds (Dera Din Panah, Beetal, Nachi and Kamori) from two provinces was amplified by using reported Ovine IL-2 primers, yielding PCR product of 501 bp. The sequencing of all samples was done to identify the polymorphisms in amplified region of IL-2 gene. Analysis of sequencing data resulted in identification of one novel nucleotide substitution (T→A) in amplified non-coding region of IL-2 gene. Comparison of IL-2 gene sequence of all four breeds with other goat breeds showed high similarity in sequence. While phylogenetic analysis of our local breeds with other mammals showed that IL-2 is a variable gene which has undergone many substitutions. This high substitution rate can be due to the decreased or increased changed selective pressure. These rapid changes can also lead to the change in function of immune system. This pioneering study of Pakistani goat breeds urge for further studies on immune system of each targeted breed for fully understanding the functional role of IL-2 in goat immunity.Keywords: interleukin 2, mutational analysis, phylogeny, goat breeds, Pakistan
Procedia PDF Downloads 6131387 Alternate Dispute Resolution: Expeditious Justice
Authors: Uzma Fakhar, Osama Fakhar, Aamir Shafiq Ch
Abstract:
Methods of alternate dispute resolution (ADR) like conciliation, arbitration, mediation are the supplement to ensure inexpensive and expeditious justice in a country. Justice delayed has not only created chaos, but an element of rebellious behavior towards judiciary is being floated among people. Complexity of traditional judicial system and its diversity has created an overall coherence. Admittedly, In Pakistan the traditional judicial system has failed to achieve its goals which resulted in the backlog of cases pending in courts, resultantly even the critics of alternate dispute resolution agree to restore the spirit of expeditious justice by reforming the old Panchayat system. The Government is keen to enact certain laws and make amendments to facilitate the resolution of a dispute through a simple and faster ADR framework instead of a lengthy and exhausting complex trial in order to create proliferation and faith in alternate dispute resolution. This research highlights the value of ADR in a country like Pakistan for revival of the confidence of the people upon the judicial process and a useful judicial tool to reduce the pressure on the judiciary.Keywords: alternate dispute resolution, development of law, expeditious justice, Pakistan
Procedia PDF Downloads 2231386 A Study of the Effects of Zimbabwean Youth Migration on Musina Area, South Africa
Authors: R. Chinyakata, N. R. Raselekoane
Abstract:
Migration has always been part of human history. Migration is spurred by globalisation which connects nations by encouraging the flow of goods, services, ideas and people across borders. Migration does not only involve movement of adults from one country to another. It also affects and involves the youth as they are the most mobile group. Musina area, like many other border areas, experiences a variety of challenges as a result of the influx of people from the neighbouring Zimbabwe and other African countries. Of great concern about this migration is the fact that the host country or area may become unsafe and unstable as a result of huge influx of migrants. There may also be tensions between local people and migrants over the resources. The study sought to investigate the effects of the Zimbabwean youth migration on Musina area. The study was undertaken in Musina area which is situated 18km from the Beit-Bridge border post. A qualitative research approach was used. Semi-structured interviews were used to collect data. Non-probability quota sampling technique was used to select the respondents. The study sample consisted of sixteen female and male respondents. Thematic coding was used to analyse the data. Ethical considerations such as informed consent, confidentiality, anonymity and voluntary participation were taken into account to protect the participants. The study found that the effects of the Zimbabwean youth migration on the Musina area include, among others, tensions between locals and the Zimbabwean youth migrants over resources, job and business opportunities, overcrowding and crime. Multi-pronged strategies which involve different stakeholders should be applied to address tensions over job and business opportunities, overcrowding and crime in the Musina area.Keywords: host country, effects, migrant, migration, Musina, youth, Zimbabwe
Procedia PDF Downloads 2451385 Normally Closed Thermoplastic Microfluidic Valves with Microstructured Valve Seats: A Strategy to Avoid Permanently Bonded Valves during Channel Sealing
Authors: Kebin Li, Keith Morton, Matthew Shiu, Karine Turcotte, Luke Lukic, Teodor Veres
Abstract:
We present a normally closed thermoplastic microfluidic valve design that uses microstructured valve seats to locally prevent the membrane from bonding to the valve seat during microfluidic channel sealing. The microstructured valve seat reduces the adhesion force between the contact surfaces of the valve seat and the membrane locally, allowing valve open and close operations while simultaneously providing a permanent and robust bond elsewhere to cover and seal the microfluidic channel network. Dynamic valve operation including opening and closing times can be tuned by changing the valve seat diameter as well as the density of the microstructures on the valve seats. The influence of the microstructured valve seat on the general flow behavior through the microfluidic devices was also studied. A design window for the fabrication of valve structure is identified and discussed to minimize the fabrication complexity.Keywords: hot-embossing, injection molding, microfabrication, microfluidics, microvalves, thermoplastic elastomer
Procedia PDF Downloads 294