Search results for: fashion and architecture
1031 Energy Planning Analysis of an Agritourism Complex Based on Energy Demand Simulation: A Case Study of Wuxi Yangshan Agritourism Complex
Authors: Li Zhu, Binghua Wang, Yong Sun
Abstract:
China is experiencing the rural development process, with the agritourism complex becoming one of the significant modes. Therefore, it is imperative to understand the energy performance of agritourism complex. This study focuses on a typical case of the agritourism complex and simulates the energy consumption performance on condition of the regular energy system. It was found that HVAC took 90% of the whole energy demand range. In order to optimize the energy supply structure, the hierarchical analysis was carried out on the level of architecture with three main factors such as construction situation, building types and energy demand types. Finally, the energy planning suggestion of the agritourism complex was put forward and the relevant results were obtained.Keywords: agritourism complex, energy planning, energy demand simulation, hierarchical structure model
Procedia PDF Downloads 1941030 Femtocell Stationed Flawless Handover in High Agility Trains
Authors: S. Dhivya, M. Abirami, M. Farjana Parveen, M. Keerthiga
Abstract:
The development of high-speed railway makes people’s lives more and more convenient; meanwhile, handover is the major problem on high-speed railway communication services. In order to overcome that drawback the architecture of Long-Term Evolution (LTE) femtocell networks is used to improve network performance, and the deployment of a femtocell is a key for bandwidth limitation and coverage issues in conventional mobile network system. To increase the handover performance this paper proposed a multiple input multiple output (MIMO) assisted handoff (MAHO) algorithm. It is a technique used in mobile telecom to transfer a mobile phone to a new radio channel with stronger signal strength and improved channel quality.Keywords: flawless handover, high-speed train, home evolved Node B, LTE, mobile femtocell, RSS
Procedia PDF Downloads 4741029 Data Quality as a Pillar of Data-Driven Organizations: Exploring the Benefits of Data Mesh
Authors: Marc Bachelet, Abhijit Kumar Chatterjee, José Manuel Avila
Abstract:
Data quality is a key component of any data-driven organization. Without data quality, organizations cannot effectively make data-driven decisions, which often leads to poor business performance. Therefore, it is important for an organization to ensure that the data they use is of high quality. This is where the concept of data mesh comes in. Data mesh is an organizational and architectural decentralized approach to data management that can help organizations improve the quality of data. The concept of data mesh was first introduced in 2020. Its purpose is to decentralize data ownership, making it easier for domain experts to manage the data. This can help organizations improve data quality by reducing the reliance on centralized data teams and allowing domain experts to take charge of their data. This paper intends to discuss how a set of elements, including data mesh, are tools capable of increasing data quality. One of the key benefits of data mesh is improved metadata management. In a traditional data architecture, metadata management is typically centralized, which can lead to data silos and poor data quality. With data mesh, metadata is managed in a decentralized manner, ensuring accurate and up-to-date metadata, thereby improving data quality. Another benefit of data mesh is the clarification of roles and responsibilities. In a traditional data architecture, data teams are responsible for managing all aspects of data, which can lead to confusion and ambiguity in responsibilities. With data mesh, domain experts are responsible for managing their own data, which can help provide clarity in roles and responsibilities and improve data quality. Additionally, data mesh can also contribute to a new form of organization that is more agile and adaptable. By decentralizing data ownership, organizations can respond more quickly to changes in their business environment, which in turn can help improve overall performance by allowing better insights into business as an effect of better reports and visualization tools. Monitoring and analytics are also important aspects of data quality. With data mesh, monitoring, and analytics are decentralized, allowing domain experts to monitor and analyze their own data. This will help in identifying and addressing data quality problems in quick time, leading to improved data quality. Data culture is another major aspect of data quality. With data mesh, domain experts are encouraged to take ownership of their data, which can help create a data-driven culture within the organization. This can lead to improved data quality and better business outcomes. Finally, the paper explores the contribution of AI in the coming years. AI can help enhance data quality by automating many data-related tasks, like data cleaning and data validation. By integrating AI into data mesh, organizations can further enhance the quality of their data. The concepts mentioned above are illustrated by AEKIDEN experience feedback. AEKIDEN is an international data-driven consultancy that has successfully implemented a data mesh approach. By sharing their experience, AEKIDEN can help other organizations understand the benefits and challenges of implementing data mesh and improving data quality.Keywords: data culture, data-driven organization, data mesh, data quality for business success
Procedia PDF Downloads 1371028 Nuances of Urban Ecology in the Present Global Scenario: Scope, Issues, Challenges and Implications
Authors: Meenakshi Pappu
Abstract:
The term, 'urban ecology' has often been misconstrued by the educational practitioners as well as the researchers as a study under a single discipline i.e., the environmental sciences. One who has done research extensively in this study would always argue that urban ecology is not a study under a single discipline, but it is a study across disciplines such as social sciences and other sciences like architecture, engineering, planning, ecology, geography, biology, economics, sociology, anthropology, psychology and health sciences. The aim of this paper is to discuss at length the scope of Urban Ecology as an interdisciplinary study. The paper highlights the nuances of urban ecology as a study across disciplines and the challenges and the implications it holds for future research by conducting a qualitative survey in the particular areas.Keywords: educational practitioners, interdisciplinary, researchers, urban ecology
Procedia PDF Downloads 4221027 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 921026 Understanding John H. Johnson and Ebony Magazine Financial Responsiveness to Rise of Black Power in the U.S, 1966
Authors: Sid Ahmed Ziane
Abstract:
This paper argues for Johnson's financial responsiveness to the rise of Black Power and its advocate, 'Stokely Carmichael' in 1966. John H. Johnson was a Black businessman and the owner of Ebony magazine, one of the widely read Black magazines in the U.S. His magazine, however, was designed only to promoting Black fashion, aesthetic, marketing, and consumerism. In mid-1966, the mainstream of the Civil Rights movement was heading into two distinct camps when some of its advocates, led by Stokely Carmichael, began to question the slow pace of the Civil Rights and sought to pursue a more radical approach to bring about upheaval to the Black community. Their new approach, however, propelled the national media into paying close attention to their activities, their new methods, and their radical orientations. In fact, the major White-oriented media discredited Carmichael and distorted his public image via sensational stories and race-mongering reports. However, the Black owned outlets such as The Liberator advocated his agendas, whereas other magazines such as The Crisis rejected them. Based on such oral sources and Ebony’s online issues, this paper adds and argues that Johnson had also responded to the rise of Black Power and Carmichael. This reaction had, in fact, aimed at scooping and selling Carmichael and his new orientation as well as advertising him in his magazine to attract the readers who showed a strong tendency to hear and read about the heyday and even the ferment of Black Power. This paper is part of an ongoing project which aims at framing our understanding of how the Black print media and the modern Black liberation struggle were correlated and could shape each other by appraising their agendas, milestones, and their pivotal figures.Keywords: Black power, Ebony magazine, John Johson, Stokely Carmichael
Procedia PDF Downloads 1791025 A Study Problem and Needs Compare the Held of the Garment Industries in Nonthaburi and Bangkok Area
Authors: Thepnarintra Praphanphat
Abstract:
The purposes of this study were to investigate garment industry’s condition, problems, and need for assistance. The population of the study was 504 managers or managing directors of garment establishments finished apparel industrial manager and permission of the Department of Industrial Works 28, Ministry of Industry until January 1, 2012. In determining the sample size with the opening of the Taro Yamane finished at 95% confidence level is ± 5% deviation was 224 managers. Questionnaires were used to collect the data. Percentage, frequency, arithmetic mean, standard deviation, t-test, ANOVA, and LSD were used to analyze the data. It was found that most establishments were of a large size, operated in a form of limited company for more than 15 years most of which produced garments for working women. All investment was made by Thai people. The products were made to order and distributed domestically and internationally. The total sale of the year 2010, 2011, and 2012 was almost the same. With respect to the problems of operating the business, the study indicated, as a whole, by- aspects, and by-items, that they were at a high level. The comparison of the level of problems of operating garment business as classified by general condition showed that problems occurring in business of different sizes were, as a whole, not different. In taking aspects into consideration, it was found that the level of problem in relation to production was different; medium establishments had more problems in production than those of small and large sizes. According to the by-items analysis, five problems were found different; namely, problems concerning employees, machine maintenance, number of designers, and price competition. Such problems in the medium establishments were at a higher level than those in the small and large establishments. Regarding business age, the examination yielded no differences as a whole, by-aspects, and by-items. The statistical significance level of this study was set at .05.Keywords: garment industry, garment, fashion, competitive enhancement project
Procedia PDF Downloads 1881024 A Sentence-to-Sentence Relation Network for Recognizing Textual Entailment
Authors: Isaac K. E. Ampomah, Seong-Bae Park, Sang-Jo Lee
Abstract:
Over the past decade, there have been promising developments in Natural Language Processing (NLP) with several investigations of approaches focusing on Recognizing Textual Entailment (RTE). These models include models based on lexical similarities, models based on formal reasoning, and most recently deep neural models. In this paper, we present a sentence encoding model that exploits the sentence-to-sentence relation information for RTE. In terms of sentence modeling, Convolutional neural network (CNN) and recurrent neural networks (RNNs) adopt different approaches. RNNs are known to be well suited for sequence modeling, whilst CNN is suited for the extraction of n-gram features through the filters and can learn ranges of relations via the pooling mechanism. We combine the strength of RNN and CNN as stated above to present a unified model for the RTE task. Our model basically combines relation vectors computed from the phrasal representation of each sentence and final encoded sentence representations. Firstly, we pass each sentence through a convolutional layer to extract a sequence of higher-level phrase representation for each sentence from which the first relation vector is computed. Secondly, the phrasal representation of each sentence from the convolutional layer is fed into a Bidirectional Long Short Term Memory (Bi-LSTM) to obtain the final sentence representations from which a second relation vector is computed. The relations vectors are combined and then used in then used in the same fashion as attention mechanism over the Bi-LSTM outputs to yield the final sentence representations for the classification. Experiment on the Stanford Natural Language Inference (SNLI) corpus suggests that this is a promising technique for RTE.Keywords: deep neural models, natural language inference, recognizing textual entailment (RTE), sentence-to-sentence relation
Procedia PDF Downloads 3491023 Exploring the Discrepancy: The Influence of Instagram in Shaping Idealized Lifestyles and Self-Perceptions Among Indian University Students
Authors: Dhriti Kirpalani
Abstract:
The survey aims to explore the impact of Instagram on the perception of lifestyle aspirations (such as social life, fitness, trends followed in fashion, etc.) and perception of self in relation to an idealized lifestyle: Amidst today's media-saturated environment, university students are constantly exposed to idealized portrayals of lifestyles, often leading to unrealistic expectations and dissatisfaction with their own lives. This study investigates the impact of media on university students' perceptions of their own lifestyle, the discrepancy between their self-perception and idealized lifestyle, and their mental health. Employing a mixed-methods approach, the study combines quantitative and qualitative data collection methods to understand the issue comprehensively. A literature review was conducted in order to determine the effects of idealized lifestyle portrayal on Instagram; however, less attention has been received in the Indian setting. The researchers wish to employ a convenience sampling method among undergraduate students from India. The surveys that would be employed for quantitative analysis are Negative Social Media Comparison (NSMCS), Lifestyle Satisfaction Scale (LSS), Psychological Well-being Scale (PWB), and Self-Perception Profile for Adolescents (SPPA). The qualitative aspect would include in-depth interviews to provide deeper insights into participants' experiences and the mechanisms by which media influences their lifestyle aspirations and mental health. With the aim of being an exploratory study, the basis of the idea is found in the social comparison theory described by Leon Festinger. The findings aim to inform interventions to promote realistic expectations about lifestyle, reduce the negative effects of media on university students, and improve their mental health and well-being.Keywords: declined self-perception, idealized lifestyle, Instagram, Indian university students, social comparison
Procedia PDF Downloads 401022 Shopping Centers in the Context of a Growing and Changing City: The Case of Konya Kent Plaza
Authors: H. Derya Arslan
Abstract:
Shopping centers have become an important part of urban life. The numbers of shopping centers have rapidly increased for ten years, in Turkey. Malls that have been built with increasing speed in the last two decades meet most social and cultural needs of people. In this study, architectural characteristics of a recent mall built in the city of Konya in Turkey have been discussed. The assessment of the mall in question has been made in the context of a growing and changing city. The study opened up new horizons and discussion areas to entrepreneurs who make significant investments in shopping centers, architects who design shopping centers as efficient commercial and social environments, and social scientists that investigate the effects of increase in these closed urban spaces on urban life.Keywords: shopping center, architecture, city, social
Procedia PDF Downloads 3361021 Lightweight Synergy IoT Framework for Smart Home Healthcare for the Elderly
Authors: Huawei Ma, Wencai Du, Shengbin Liang
Abstract:
Smart Home Healthcare technologies for the elderly represent a transformative paradigm that leverages emerging technologies to provide the elderly’ health indicators and daily life monitoring, emergency calls, environmental monitoring, behavior perception, and other services to ensure the health and safety of the elderly who are aging in their own home. However, the excessive complexity in the main adopted framework has affected the acceptance and adoption of the elderly. Therefore, this paper proposes a lightweight synergy architecture of IoT data and service for elderly home smart health environment. It includes the modeling of IoT applications and their workflows, data interoperability, interaction, and storage paradigms to meet the growing needs of older people so that they can lead an active, fulfilling, and quality life.Keywords: smart home healthcare, IoT, independent living, lightweight framework
Procedia PDF Downloads 551020 Between Kenzo Tange and Fernando Távora: An ‘Affinitarian’ Architectural Regard
Authors: João Cepeda
Abstract:
In crafting their way between theory and practice, authors and artists seem to be always immersed in a never-ending process of relating epochs, objects, and images. Endless ‘affinities’ emerge from a somewhat unexplainable (and intimate) magnetic relation. It is through this ‘warburgian’ assessment that two of the most prominent twentieth-century modern architects from Japan and Portugal are put into perspective, focusing on their paths and thinking-practice, and on the research of their personal and professional archives. Moreover, this research especially aims its focus at essaying specifically on the possible ‘affinities’ between two of their most renowned architectural projects: the Kenzo Tange’s (demolished) Villa Seijo project in Tokyo (Japan) and Fernando Távora’s Tennis Pavilion design in Matosinhos (Portugal), respectively, side-by-side – through in-depth fieldwork in the sites, bibliographical and archival research, (unprecedented) material analysis, and final critical consideration.Keywords: Tange, Távora, architecture, affinities
Procedia PDF Downloads 681019 Defect Correlation of Computed Tomography and Serial Sectioning in Additively Manufactured Ti-6Al-4V
Authors: Bryce R. Jolley, Michael Uchic
Abstract:
This study presents initial results toward the correlative characterization of inherent defects of Ti-6Al-4V additive manufacture (AM). X-Ray Computed Tomography (CT) defect data are compared and correlated with microscopic photographs obtained via automated serial sectioning. The metal AM specimen was manufactured out of Ti-6Al-4V virgin powder to specified dimensions. A post-contour was applied during the fabrication process with a speed of 1050 mm/s, power of 260 W, and a width of 140 µm. The specimen was stress relief heat-treated at 16°F for 3 hours. Microfocus CT imaging was accomplished on the specimen within a predetermined region of the build. Microfocus CT imaging was conducted with parameters optimized for Ti-6Al-4V additive manufacture. After CT imaging, a modified RoboMet. 3D version 2 was employed for serial sectioning and optical microscopy characterization of the same predetermined region. Automated montage capture with sub-micron resolution, bright-field reflection, 12-bit monochrome optical images were performed in an automated fashion. These optical images were post-processed to produce 2D and 3D data sets. This processing included thresholding and segmentation to improve visualization of defect features. The defects observed from optical imaging were compared and correlated with the defects observed from CT imaging over the same predetermined region of the specimen. Quantitative results of area fraction and equivalent pore diameters obtained via each method are presented for this correlation. It is shown that Microfocus CT imaging does not capture all inherent defects within this Ti-6Al-4V AM sample. Best practices for this correlative effort are also presented as well as the future direction of research resultant from this current study.Keywords: additive manufacture, automated serial sectioning, computed tomography, nondestructive evaluation
Procedia PDF Downloads 1411018 Protective Effect of Celosia Argentea Leaf Extract on Cadmium Induced Toxicity and Oxidative Stress in Rats
Authors: Sulyman Abdulhakeem Olarewaju, S. O. Malomo, M. T. Yakubu, J. O. Akolade
Abstract:
The ameliorative effect of Celosia argentea var. cristata leaf extract against cadmium (Cd) induced oxidative stress and toxicity in selected tissues of rats was investigated. Toxicity coupled with oxidative stress was induced in rats by oral administration of Cd (8 mg/kg b. wt). Preliminary quantitative phytochemical and in vitro antioxidant analyses showed that the methanolic extract of C. argentea leaves was constituted by polyphenols (5.72%), saponins (3.20%), tannins (0.65%) and cadenolides (0.006%). IC50 of 9800, 7406, and 45.04 μg/ml were recorded for inhibition of linoleic acid oxidation, 2, 2-diphenyl-1-picrylhydrazyl and hydrogen peroxide radicals respectively. Simultaneous administration of C. argentea leaf extract with Cd significantly attenuated Cd-induced elevation of serum enzyme markers such as aspartate and alanine transaminase, alkaline and acid phosphatase as well as γ-glutaryltransferase in a dose-dependent fashion, while their reduced level in the liver were significantly increased. Higher levels of enzymatic antioxidants; superoxide dismutase and catalase activities were observed in the liver, brain, kidney and testes of the Cd-induced rats treated with C. argentea extract, while lipid peroxidation expressed in malondialdehyde concentrations were lower when compared to values in rats administered Cd only. Other Cd-induced toxicity and stress markers in the serum viz. reduced uric acid and albumin levels as well as elevated total and unconjugated bilirubin were attenuated by the extract and their values compared favorably with those animals co-administered cadmium with ascorbic acid. Data from the study showed that oral administration of extract from the leaf C. argentea may ameliorate Cd-induced oxidative stress and toxicity in rats.Keywords: toxicity, cadmium, celosia, antioxidants, oxidative stress
Procedia PDF Downloads 3471017 Heterogeneous Artifacts Construction for Software Evolution Control
Authors: Mounir Zekkaoui, Abdelhadi Fennan
Abstract:
The software evolution control requires a deep understanding of the changes and their impact on different system heterogeneous artifacts. And an understanding of descriptive knowledge of the developed software artifacts is a prerequisite condition for the success of the evolutionary process. The implementation of an evolutionary process is to make changes more or less important to many heterogeneous software artifacts such as source code, analysis and design models, unit testing, XML deployment descriptors, user guides, and others. These changes can be a source of degradation in functional, qualitative or behavioral terms of modified software. Hence the need for a unified approach for extraction and representation of different heterogeneous artifacts in order to ensure a unified and detailed description of heterogeneous software artifacts, exploitable by several software tools and allowing to responsible for the evolution of carry out the reasoning change concerned.Keywords: heterogeneous software artifacts, software evolution control, unified approach, meta model, software architecture
Procedia PDF Downloads 4471016 Comparative Performance Analysis of Fiber Delay Line Based Buffer Architectures for Contention Resolution in Optical WDM Networks
Authors: Manoj Kumar Dutta
Abstract:
Wavelength division multiplexing (WDM) technology is the most promising technology for the proper utilization of huge raw bandwidth provided by an optical fiber. One of the key problems in implementing the all-optical WDM network is the packet contention. This problem can be solved by several different techniques. In time domain approach the packet contention can be reduced by incorporating fiber delay lines (FDLs) as optical buffer in the switch architecture. Different types of buffering architectures are reported in literatures. In the present paper a comparative performance analysis of three most popular FDL architectures are presented in order to obtain the best contention resolution performance. The analysis is further extended to consider the effect of different fiber non-linearities on the network performance.Keywords: WDM network, contention resolution, optical buffering, non-linearity, throughput
Procedia PDF Downloads 4521015 Art and Culture in the Development Period to Modernization in the Reign of King Rama VI
Authors: Weena Eiamprapai
Abstract:
The growth of Thai society in western style in the middle of Rattanakosin period can be defined as modernization /civilization. These terms had an influence on the development of the country in the reign of King Rama V owing to the governance reform, and cultures influenced by the West. Those were passed on until the reign of King Rama VI. The preference was not only for the renovation of architecture and arts based on Thai customs reflecting the prosperity and beauty of handicrafts but also for the acceptance of westernization. The remain of this acceptance includes the concept of such value as gentlemanly behavior like that in Victorian Era of the United Kingdom, and the support of women’s status. Moreover, the wide spread of modernization leads to the movement to change the country’s governance system from absolute monarchy to democracy by a group of people called Rattanakosin Era (R.E.) 130 party.Keywords: art, culture, development period, modernization, King Rama VI
Procedia PDF Downloads 2941014 Father Involvement in Delaying Sexual Debut among Adolescents in Nigeria Schools
Authors: Ofole Ndidi
Abstract:
Context: Empirical studies show that through dual primary attachment mothers and fathers contribute to children’s development and behaviours. While the contribution of mothers is well documented in past researches, fathers’ involvement in Nigeria has received much less attention. As such, exploring fathers’ involvement in sexual behaviours will provide insight for policy implementation and programming designed to delay sexual debut among sexually inexperienced young people in Nigeria. Objective of study: This study examined the extent to which father involvement (father’s parenting style, attitude, father-child communication, father’s marital status, and father’s socio-economic status) could predict delay in sexual debut of a representative sample of Nigeria adolescents in lower secondary. Materials and Methods: Multistage sampling technique was adopted to draw a cross section of 1023 adolescents with the age range of 10-23 years and mean years of 12±2.1 who reported sexually inexperience from six geographical zones in Nigeria. Multiple Regressions was used to analyze the data collected with four standardized self-report measures at 0.05 level of significance. Results: Findings of this study revealed that the independent variables (father’s parenting style, paternal attitudes, paternal–child communication, paternal marital status and paternal socio–economic status) contributed significantly to the delay of sexual debut. However, fathers’ attitude made the most potent contribution (β = 0.255, P < 0.05). Conclusions: The outcomes of this study have implications for programs that are designed to reduce high-risk behaviors among adolescents. It concluded that sexuality education and interventions should involve the fathers in a more integrated and collaborative fashion.Keywords: father, sexual debut, adolescents, Nigeria
Procedia PDF Downloads 3111013 Urban Conservation Methodology for Heritage Areas Case Study "Qabel Street, Old Jeddah"
Authors: Hossam Elborombaly, Nader Y. Azab
Abstract:
The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.Keywords: conservation, heritage, identity, urban conservation methodology,
Procedia PDF Downloads 3961012 Structural Design and Environmental Analysis of Oyster Mushroom Cultivation House in Korea
Authors: Lee Sunghyoun, Yu Byeongkee, Kim Hyuckjoo, Yun Namkyu, Jung Jongcheon
Abstract:
Most of the recent on-sale oyster mushrooms are raised in a oyster mushroom house, in which the necessary adjustment of growing condition is feasible. The rationale for such artificial growing is the impossibility of successive cultivation in the case of a natural cultivation due to external weather conditions. A oyster mushroom house adopts an equipment called growing bed, laying one growing bed upon another in a multi-column fashion, growing and developing the mushrooms on the respective equipments. The indispensable environment management factors of mushroom cultivation are temperature, humidity, and CO2; on which an appropriate regulation of the three requisites is a necessitated condition for the sake of the total output’s increase. However, due to the multiple layers of growing bed’s disturbance on air circulation, a oyster mushroom house’s internal environmental uniformity meets with considerable instability. This research presents a technology which assures the facilitation of environment regulation over all the internal space of a oyster mushroom house, irrespective of its location. The research staff reinforced the oyster mushroom house’s insulation in order to minimize the external environment’s influence on the oyster mushroom house’s internal environment and installed circulation fan to improve the oyster mushroom house’s interior environmental uniformity. Also, the humidifier nozzle’s position was set to prevent dew condensation when humidifying. As a result, a highly sophisticated management over all the oyster mushroom house‘s internal space was realized with the temperature of 0.2~1.3℃, and the relative humidity of 2~7% at the cultivating stage of mushroom’s growth. Therefore, to maximize oyster mushroom house‘s internal environmental uniformity, it can be concluded that consideration of various factors such as insulation reinforcement, decision on the humidifier nozzle’s location, disposition of circulation fan’s installation and the direction of wind discharge is needed.Keywords: mushroom growing facility, environmental uniformity, temperature, relative humidity, CO2 concentration
Procedia PDF Downloads 5311011 A Practical Approach and Implementation of Digital Library Towards Best Practice in Malaysian Academic Library
Authors: Zainab Ajab Mohideen, Kiran Kaur, A. Basheer Ahamadhu, Noor Azlinda Wan Jan, Sukmawati Muhammad
Abstract:
The corpus in the digital library is to provide an overview and evidence from library automation that can be used to justify the needs of the digital library. This paper disperses the approach and implementation of the digital library as part of best practices by the Automation Division at Hamzah Sendut Library of the University Science Malaysia (USM). The implemented digital library model emphasizes on the entire library collections, technical perspective, and automation solution. This model served as a foundation for digital library services as part of information delivery in the USM digital library. The approach to digital library includes discussion on key factors, design, architecture, and pragmatic model that has been collected, captured, and identified during the implementation stages. At present, the USM digital library has achieved the status of an Institutional Repository (IR).Keywords: academic digital library, digital information system, digital library best practice, digital library model
Procedia PDF Downloads 5571010 Software Defined Storage: Object Storage over Hadoop Platform
Authors: Amritesh Srivastava, Gaurav Sharma
Abstract:
The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.Keywords: Hadoop, HBase, object storage, REST
Procedia PDF Downloads 3391009 Simultaneous Optimization of Design and Maintenance through a Hybrid Process Using Genetic Algorithms
Authors: O. Adjoul, A. Feugier, K. Benfriha, A. Aoussat
Abstract:
In general, issues related to design and maintenance are considered in an independent manner. However, the decisions made in these two sets influence each other. The design for maintenance is considered an opportunity to optimize the life cycle cost of a product, particularly in the nuclear or aeronautical field, where maintenance expenses represent more than 60% of life cycle costs. The design of large-scale systems starts with product architecture, a choice of components in terms of cost, reliability, weight and other attributes, corresponding to the specifications. On the other hand, the design must take into account maintenance by improving, in particular, real-time monitoring of equipment through the integration of new technologies such as connected sensors and intelligent actuators. We noticed that different approaches used in the Design For Maintenance (DFM) methods are limited to the simultaneous characterization of the reliability and maintainability of a multi-component system. This article proposes a method of DFM that assists designers to propose dynamic maintenance for multi-component industrial systems. The term "dynamic" refers to the ability to integrate available monitoring data to adapt the maintenance decision in real time. The goal is to maximize the availability of the system at a given life cycle cost. This paper presents an approach for simultaneous optimization of the design and maintenance of multi-component systems. Here the design is characterized by four decision variables for each component (reliability level, maintainability level, redundancy level, and level of monitoring data). The maintenance is characterized by two decision variables (the dates of the maintenance stops and the maintenance operations to be performed on the system during these stops). The DFM model helps the designers choose technical solutions for the large-scale industrial products. Large-scale refers to the complex multi-component industrial systems and long life-cycle, such as trains, aircraft, etc. The method is based on a two-level hybrid algorithm for simultaneous optimization of design and maintenance, using genetic algorithms. The first level is to select a design solution for a given system that considers the life cycle cost and the reliability. The second level consists of determining a dynamic and optimal maintenance plan to be deployed for a design solution. This level is based on the Maintenance Free Operating Period (MFOP) concept, which takes into account the decision criteria such as, total reliability, maintenance cost and maintenance time. Depending on the life cycle duration, the desired availability, and the desired business model (sales or rental), this tool provides visibility of overall costs and optimal product architecture.Keywords: availability, design for maintenance (DFM), dynamic maintenance, life cycle cost (LCC), maintenance free operating period (MFOP), simultaneous optimization
Procedia PDF Downloads 1191008 Investigation of Learning Challenges in Building Measurement Unit
Authors: Argaw T. Gurmu, Muhammad N. Mahmood
Abstract:
The objective of this research is to identify the architecture and construction management students’ learning challenges of the building measurement. This research used the survey data obtained collected from the students who completed the building measurement unit. NVivo qualitative data analysis software was used to identify relevant themes. The analysis of the qualitative data revealed the major learning difficulties such as inadequacy of practice questions for the examination, inability to work as a team, lack of detailed understanding of the prerequisite units, insufficiency of the time allocated for tutorials and incompatibility of lecture and tutorial schedules. The output of this research can be used as a basis for improving the teaching and learning activities in construction measurement units.Keywords: building measurement, construction management, learning challenges, evaluate survey
Procedia PDF Downloads 1401007 Urban Conservation Methodology for Heritage Areas: A Case Study in Qabel Street, Old Jeddah
Authors: Hossam Hassan Elborombaly, Nader Y. Azab
Abstract:
The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.Keywords: rehabilitation, socioeconomic, urban conservation, urban strategy
Procedia PDF Downloads 5451006 Secure Optimized Ingress Filtering in Future Internet Communication
Authors: Bander Alzahrani, Mohammed Alreshoodi
Abstract:
Information-centric networking (ICN) using architectures such as the Publish-Subscribe Internet Technology (PURSUIT) has been proposed as a new networking model that aims at replacing the current used end-centric networking model of the Internet. This emerged model focuses on what is being exchanged rather than which network entities are exchanging information, which gives the control plane functions such as routing and host location the ability to be specified according to the content items. The forwarding plane of the PURSUIT ICN architecture uses a simple and light mechanism based on Bloom filter technologies to forward the packets. Although this forwarding scheme solve many problems of the today’s Internet such as the growth of the routing table and the scalability issues, it is vulnerable to brute force attacks which are starting point to distributed- denial-of-service (DDoS) attacks. In this work, we design and analyze a novel source-routing and information delivery technique that keeps the simplicity of using Bloom filter-based forwarding while being able to deter different attacks such as denial of service attacks at the ingress of the network. To achieve this, special forwarding nodes called Edge-FW are directly attached to end user nodes and used to perform a security test for malicious injected random packets at the ingress of the path to prevent any possible attack brute force attacks at early stage. In this technique, a core entity of the PURSUIT ICN architecture called topology manager, that is responsible for finding shortest path and creating a forwarding identifiers (FId), uses a cryptographically secure hash function to create a 64-bit hash, h, over the formed FId for authentication purpose to be included in the packet. Our proposal restricts the attacker from injecting packets carrying random FIds with a high amount of filling factor ρ, by optimizing and reducing the maximum allowed filling factor ρm in the network. We optimize the FId to the minimum possible filling factor where ρ ≤ ρm, while it supports longer delivery trees, so the network scalability is not affected by the chosen ρm. With this scheme, the filling factor of any legitimate FId never exceeds the ρm while the filling factor of illegitimate FIds cannot exceed the chosen small value of ρm. Therefore, injecting a packet containing an FId with a large value of filling factor, to achieve higher attack probability, is not possible anymore. The preliminary analysis of this proposal indicates that with the designed scheme, the forwarding function can detect and prevent malicious activities such DDoS attacks at early stage and with very high probability.Keywords: forwarding identifier, filling factor, information centric network, topology manager
Procedia PDF Downloads 1541005 MULTI-FLGANs: Multi-Distributed Adversarial Networks for Non-Independent and Identically Distributed Distribution
Authors: Akash Amalan, Rui Wang, Yanqi Qiao, Emmanouil Panaousis, Kaitai Liang
Abstract:
Federated learning is an emerging concept in the domain of distributed machine learning. This concept has enabled General Adversarial Networks (GANs) to benefit from the rich distributed training data while preserving privacy. However, in a non-IID setting, current federated GAN architectures are unstable, struggling to learn the distinct features, and vulnerable to mode collapse. In this paper, we propose an architecture MULTI-FLGAN to solve the problem of low-quality images, mode collapse, and instability for non-IID datasets. Our results show that MULTI-FLGAN is four times as stable and performant (i.e., high inception score) on average over 20 clients compared to baseline FLGAN.Keywords: federated learning, generative adversarial network, inference attack, non-IID data distribution
Procedia PDF Downloads 1611004 Design of Middleware for Mobile Group Control in Physical Proximity
Authors: Moon-Tak Oh, Kyung-Min Park, Tae-Eun Yoon, Hoon Choi, Chil-Woo Lee
Abstract:
This paper is about middle-ware which enables group-user applications on mobile devices in physical proximity to interact with other devices without intervention of a central server. Requirements of the middle-ware are identified from service usage scenarios, and the functional architecture of the middle-ware is specified. These requirements include group management, synchronization, and resource management. Group Management needs to provide various capabilities to such applications with respect to managing multiple users (e.g., creation of groups, discovery of group or individual users, member join/leave, election of a group manager and service-group association) using D2D communication technology. We designed the middle-ware for the above requirements on the Android platform.Keywords: group user, middleware, mobile service, physical proximity
Procedia PDF Downloads 5071003 Reliability Evaluation of a Payment Model in Mobile E-Commerce Using Colored Petri Net
Authors: Abdolghader Pourali, Mohammad V. Malakooti, Muhammad Hussein Yektaie
Abstract:
A mobile payment system in mobile e-commerce generally have high security so that the user can trust it for doing business deals, sales, paying financial transactions, etc. in the mobile payment system. Since an architecture or payment model in e-commerce only shows the way of interaction and collaboration among users and mortgagers and does not present any evaluation of effectiveness and confidence about financial transactions to stakeholders. In this paper, we try to present a detailed assessment of the reliability of a mobile payment model in the mobile e-commerce using formal models and colored Petri nets. Finally, we demonstrate that the reliability of this system has high value (case study: a secure payment model in mobile commerce.Keywords: reliability, colored Petri net, assessment, payment models, m-commerce
Procedia PDF Downloads 5381002 Clothing as Cure: Dress as Moral Treatment in Psychiatry
Authors: Dorothy Chyung
Abstract:
In the psychiatric interview, the mental status exam begins with an assessment of the patient's appearance, noting aspects such as grooming and hygiene. However, it is not well established whether further examination of a patient's attire can provide further useful information. The popular assumption is that those who are mentally unwell will manifest this in unusual clothing. In the moral treatment of the 19th century, proper clothing was also seen as a pivotal therapeutic concern. This project examines assumptions about clothing, both as a reflection of and treatment for psychopathology. The methodology considers the opinions expressed in 19th century art and journals, as well as asylum rules, in comparison to contemporary psychiatric practice and research evidence. Per moral treatment in the 19th century, self-discipline and a proper environment would cure insanity. Madness was evident in the opposite of these ideals—such as ragged or ‘improper’ clothing—and rules about attire delineated the most correct (i.e. sane) ways to dress. These rules applied not only for the patients but also for staff. Despite these ideals, accusations were made that asylums, in fact, dressed patients to look more mentally unwell and further removed patients’ agency. Current practice in psychiatric hospitals retains remnants of moral treatment. Patients are expected to dress ‘appropriately’ while retaining some choice to build self-esteem, with arguments about safety being used to justify the removal of choice. Meanwhile, staff is expected to dress professionally and as role models, based on the assumption that conservative dress is least pathological. Research on this subject is limited, and there is little evidence that discrete psychiatric diagnoses manifest in the particular dress, nor that conservative dress would result in a reduction in pathology. Dressing unusually has become a privilege granted only to those without association with mental illness.Keywords: fashion, history of psychiatry, medical humanities, mental health treatment
Procedia PDF Downloads 219