Search results for: excessive internet use
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2371

Search results for: excessive internet use

1111 Identification of Risks Associated with Process Automation Systems

Authors: J. K. Visser, H. T. Malan

Abstract:

A need exists to identify the sources of risks associated with the process automation systems within petrochemical companies or similar energy related industries. These companies use many different process automation technologies in its value chain. A crucial part of the process automation system is the information technology component featuring in the supervisory control layer. The ever-changing technology within the process automation layers and the rate at which it advances pose a risk to safe and predictable automation system performance. The age of the automation equipment also provides challenges to the operations and maintenance managers of the plant due to obsolescence and unavailability of spare parts. The main objective of this research was to determine the risk sources associated with the equipment that is part of the process automation systems. A secondary objective was to establish whether technology managers and technicians were aware of the risks and share the same viewpoint on the importance of the risks associated with automation systems. A conceptual model for risk sources of automation systems was formulated from models and frameworks in literature. This model comprised six categories of risk which forms the basis for identifying specific risks. This model was used to develop a questionnaire that was sent to 172 instrument technicians and technology managers in the company to obtain primary data. 75 completed and useful responses were received. These responses were analyzed statistically to determine the highest risk sources and to determine whether there was difference in opinion between technology managers and technicians. The most important risks that were revealed in this study are: 1) the lack of skilled technicians, 2) integration capability of third-party system software, 3) reliability of the process automation hardware, 4) excessive costs pertaining to performing maintenance and migrations on process automation systems, and 5) requirements of having third-party communication interfacing compatibility as well as real-time communication networks.

Keywords: distributed control system, identification of risks, information technology, process automation system

Procedia PDF Downloads 140
1110 Definition, Structure, and Core Functions of the State Image

Authors: Rosa Nurtazina, Yerkebulan Zhumashov, Maral Tomanova

Abstract:

Humanity is entering an era when 'virtual reality' as the image of the world created by the media with the help of the Internet does not match the reality in many respects, when new communication technologies create a fundamentally different and previously unknown 'global space'. According to these technologies, the state begins to change the basic technology of political communication of the state and society, the state and the state. Nowadays, image of the state becomes the most important tool and technology. Image is a purposefully created image granting political object (person, organization, country, etc.) certain social and political values and promoting more emotional perception. Political image of the state plays an important role in international relations. The success of the country's foreign policy, development of trade and economic relations with other countries depends on whether it is positive or negative. Foreign policy image has an impact on political processes taking place in the state: the negative image of the countries can be used by opposition forces as one of the arguments to criticize the government and its policies.

Keywords: image of the country, country's image classification, function of the country image, country's image components

Procedia PDF Downloads 436
1109 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 551
1108 Investigating the Behaviour of Composite Floors (Steel Beams and Concrete Slabs) under Mans Rhythmical Movement

Authors: M. Ali Lotfollahi Yaghin, M. Reza Bagerzadeh Karimi, Ali Rahmani, V. Sadeghi Balkanlou

Abstract:

Structural engineers have long been trying to develop solutions using the full potential of its composing materials. Therefore, there is no doubt that the structural solution progress is directly related to an increase in materials science knowledge. These efforts in conjunction with up-to-date modern construction techniques have led to an extensive use of composite floors in large span structures. On the other hand, the competitive trends of the world market have long been forcing structural engineers to develop minimum weight and labour cost solutions. A direct consequence of this new design trend is a considerable increase in problems related to unwanted floor vibrations. For this reason, the structural floors systems become vulnerable to excessive vibrations produced by impacts such as human rhythmic activities. The main objective of this paper is to present an analysis methodology for the evaluation of the composite floors human comfort. This procedure takes into account a more realistic loading model developed to incorporate the dynamic effects induced by human walking. The investigated structural models were based on various composite floors, with main spans varying from 5 to 10 m. based on an extensive parametric study the composite floors dynamic response, in terms of peak accelerations, was obtained and compared to the limiting values proposed by several authors and design standards. This strategy was adopted to provide a more realistic evaluation for this type of structure when subjected to vibration due to human walking.

Keywords: vibration, resonance, composite floors, people’s rhythmic movement, dynamic analysis, Abaqus software

Procedia PDF Downloads 305
1107 Studies of Carbohydrate, Antioxidant, Nutrient and Genomic DNA Characterization of Fresh Olive Treated with Alkaline and Acidic Solvent: An Innovation

Authors: A. B. M. S. Hossain, A. Abdelgadir, N. A. Ibrahim

Abstract:

Fresh ripen olive cannot be consumed immediately after harvest due to the excessive bitterness having polyphenol as antioxidant. Industrial processing needs to be edible the fruit. The laboratory processing technique has been used to make it edible by using acid (vinegar, 5% acetic acid) and alkaline solvent (NaOH). Based on the treatment and consequence, innovative data have been found in this regard. The experiment was conducted to investigate biochemical content, nutritional and DNA characterization of olive fruit treated with alkaline (Sodium chloride anhydrous) and acidic solvent (5% acetic acid, vinegar). The treatments were used as control (no water), water control, 10% sodium chloride anhydrous (NaOH), vinegar (5% acetic acid), vinegar + NaOH and vinegar + NaOH + hot water treatment. Our results showed that inverted sugar and glucose content were higher in the vinegar and NaOH treated olive than in other treatments. Fructose content was the highest in vinegar + NaOH treated fruit. Nutrient contents NO3 K, Ca and Na were found higher in the treated fruit than the control fruit. Moreover, maximum K content was observed in the case of all treatments compared to the other nutrient content. The highest acidic (lower pH) condition (sour) was found in treated fruit. DNA yield was found higher in water control than acid and alkaline treated olives. DNA band was wider in the olive treated water control compared to the NaOH, vinegar, vinegar + NaOH and vinegar + NaOH + Hot water treatment. Finally, results suggest that vinegar + NaOH treated olive fruit was the best for fresh olive homemade processing after harvesting for edible purpose.

Keywords: olive, vinegar, sugars, DNA band, bioprocess biotechnology

Procedia PDF Downloads 187
1106 Analysis of Critical Success Factors for Implementing Industry 4.0 and Circular Economy to Enhance Food Traceability

Authors: Mahsa Pishdar

Abstract:

Food traceability through the supply chain is facing increased demand. IoT and blockchain are among the tools under consideration in the Industry 4.0 era that could be integrated to help implementation of the Circular Economy (CE) principles while enhancing food traceability solutions. However, such tools need intellectual system, and infrastructureto be settled as guidance through the way, helping overcoming obstacles. That is why the critical success factors for implementing Industry 4.0 and circular economy principles in food traceability concept are analyzed in this paper by combination of interval type 2 fuzzy Worst Best Method and Measurement Alternatives and Ranking according to Compromise Solution (Interval Type 2 fuzzy WBM-MARCOS). Results indicate that “Knowledge of Industry 4.0 obligations and CE principle” is the most important factor that is the basis of success following by “Management commitment and support”. This will assist decision makers to seize success in gaining a competitive advantage while reducing costs through the supply chain.

Keywords: food traceability, industry 4.0, internet of things, block chain, best worst method, marcos

Procedia PDF Downloads 208
1105 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik

Abstract:

Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 358
1104 A NoSQL Based Approach for Real-Time Managing of Robotics's Data

Authors: Gueidi Afef, Gharsellaoui Hamza, Ben Ahmed Samir

Abstract:

This paper deals with the secret of the continual progression data that new data management solutions have been emerged: The NoSQL databases. They crossed several areas like personalization, profile management, big data in real-time, content management, catalog, view of customers, mobile applications, internet of things, digital communication and fraud detection. Nowadays, these database management systems are increasing. These systems store data very well and with the trend of big data, a new challenge’s store demands new structures and methods for managing enterprise data. The new intelligent machine in the e-learning sector, thrives on more data, so smart machines can learn more and faster. The robotics are our use case to focus on our test. The implementation of NoSQL for Robotics wrestle all the data they acquire into usable form because with the ordinary type of robotics; we are facing very big limits to manage and find the exact information in real-time. Our original proposed approach was demonstrated by experimental studies and running example used as a use case.

Keywords: NoSQL databases, database management systems, robotics, big data

Procedia PDF Downloads 356
1103 The Quality Assessment of Seismic Reflection Survey Data Using Statistical Analysis: A Case Study of Fort Abbas Area, Cholistan Desert, Pakistan

Authors: U. Waqas, M. F. Ahmed, A. Mehmood, M. A. Rashid

Abstract:

In geophysical exploration surveys, the quality of acquired data holds significant importance before executing the data processing and interpretation phases. In this study, 2D seismic reflection survey data of Fort Abbas area, Cholistan Desert, Pakistan was taken as test case in order to assess its quality on statistical bases by using normalized root mean square error (NRMSE), Cronbach’s alpha test (α) and null hypothesis tests (t-test and F-test). The analysis challenged the quality of the acquired data and highlighted the significant errors in the acquired database. It is proven that the study area is plain, tectonically least affected and rich in oil and gas reserves. However, subsurface 3D modeling and contouring by using acquired database revealed high degrees of structural complexities and intense folding. The NRMSE had highest percentage of residuals between the estimated and predicted cases. The outcomes of hypothesis testing also proved the biasness and erraticness of the acquired database. Low estimated value of alpha (α) in Cronbach’s alpha test confirmed poor reliability of acquired database. A very low quality of acquired database needs excessive static correction or in some cases, reacquisition of data is also suggested which is most of the time not feasible on economic grounds. The outcomes of this study could be used to assess the quality of large databases and to further utilize as a guideline to establish database quality assessment models to make much more informed decisions in hydrocarbon exploration field.

Keywords: Data quality, Null hypothesis, Seismic lines, Seismic reflection survey

Procedia PDF Downloads 166
1102 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network

Authors: M. Hilani, B. Nassih

Abstract:

Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.

Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering

Procedia PDF Downloads 128
1101 An Analysis of How Students Perceive Their Self-Efficacy in Online Speaking Classes

Authors: Heny Hartono, Cecilia Titiek Murniati

Abstract:

The pandemic has given teachers and students no other choice but having full online learning. In such an emergency situation as the time of the covid-19 pandemic, the application of LMS (Learner Management System) in higher education is the most reasonable solution for students and teachers. In fact, the online learning requires all elements of a higher education systems, including the human resources, infrastructure, and supporting systems such as the application, server, and stable internet connection. The readiness of the higher education institution in preparing the online system may secure those who are involved in the online learning process. It may also result in students’ self-efficacy in online learning. This research aimed to investigate how students perceive their self-efficacy in online English learning, especially in speaking classes which is considered as a productive language skill. This research collects qualitative data with narrative inquiry involving 25 students of speaking classes as the respondents. The results of this study show that students perceive their self-efficacy in speaking online classes as not very high.

Keywords: self-efficacy, online learning, speaking class, college students, e-learning

Procedia PDF Downloads 100
1100 Research on the Teaching Quality Evaluation of China’s Network Music Education APP

Authors: Guangzhuang Yu, Chun-Chu Liu

Abstract:

With the advent of the Internet era in recent years, social music education has gradually shifted from the original entity education mode to the mode of entity plus network teaching. No matter for school music education, professional music education or social music education, the teaching quality is the most important evaluation index. Regarding the research on teaching quality evaluation, scholars at home and abroad have contributed a lot of research results on the basis of multiple methods and evaluation subjects. However, to our best knowledge the complete evaluation model for the virtual teaching interaction mode of the emerging network music education Application (APP) has not been established. This research firstly found out the basic dimensions that accord with the teaching quality required by the three parties, constructing the quality evaluation index system; and then, on the basis of expounding the connotation of each index, it determined the weight of each index by using method of fuzzy analytic hierarchy process, providing ideas and methods for scientific, objective and comprehensive evaluation of the teaching quality of network education APP.

Keywords: network music education APP, teaching quality evaluation, index and connotation

Procedia PDF Downloads 130
1099 Nickel Oxide-Nitrogen-Doped Carbon (Ni/NiOx/NC) Derived from Pyrolysis of 2-Aminoterephthalic Acid for Electrocatalytic Oxidation of Ammonia

Authors: Yu-Jen Shih, Juan-Zhang Lou

Abstract:

Nitrogenous compounds, such as NH4+/NH3 and NO3-, have become important contaminants in water resources. Excessive concentration of NH3 leads to eutrophication, which poses a threat to aquatic organisms in the environment. Electrochemical oxidation emerged as a promising water treatment technology, offering advantages such as simplicity, small-scale operation, and minimal reliance on additional chemicals. In this study, a nickel-based metal-organic framework (Ni-MOF) was synthesized using 2-amino terephthalic acid (BDC-NH2) and nickel nitrate. The Ni-MOF was further carbonized as derived nickel oxide and nitrogen-carbon composite, Ni/NiOx/NC. The nickel oxide within the 2D porous carbon texture served as active sites for ammonia oxidation. Results of characterization showed that the Ni-MOF was a hexagonal and flaky nanoparticle. With increasing carbonization temperature, the nickel ions in the organic framework re-crystallized as NiO clusters on the surfaces of the 2D carbon. The electrochemical surface area of Ni/NiOx/NC significantly increased as to improve the efficiency of ammonia oxidation. The phase transition of Ni(OH)2⇌NiOOH at around +0.8 V was the primary mediator of electron transfer. Batch electrolysis was conducted under constant current and constant potential modes. The electrolysis parameters included pyrolysis temperatures, pH, current density, initial feed concentration, and electrode potential. The constant current batch experiments indicated that via carbonization at 800 °C, Ni/NiOx/NC(800) was able to decrease the ammonium nitrogen of 50 mg-N/L to below 1 ppm within 4 hours at a current density of 3 mA/cm2 and pH 11 with negligible oxygenated nitrogen formation. The constant potential experiments confirmed that N2 nitrogen selectivity was enhanced up to 90% at +0.8 V.

Keywords: electrochemical oxidation, nickel oxyhydroxide, metal-organic framework, ammonium, nitrate

Procedia PDF Downloads 67
1098 Influence of Environment-Friendly Organic Wastes on the Properties of Sandy Soil under Growing Zea mays L. in Arid Regions

Authors: Mohamed Rashad, Mohamed Hafez, Mohamed Emran, Emad Aboukila, Ibrahim Nassar

Abstract:

Environment-friendly organic wastes of Brewers' spent grain, a byproduct of the brewing process, have recently used as soil amendment to improve soil fertility and plant production. In this work, treatments of 1% (T1) and 2% (T2) of spent grains, 1% (C1) and 2% (C2) of compost and mix of both sources (C1T1) were used and compared to the control for growing Zea mays L. on sandy soil under arid Mediterranean climate. Soils were previously incubated at 65% saturation capacity for a month. The most relevant soil physical and chemical parameters were analysed. Water holding capacity and soil organic matter (OM) increased significantly along the treatments with the highest values in T2. Soil pH decreased along the treatments and the lowest pH was in C1T1. Bicarbonate decreased by 69% in C1T1 comparing to control. Total nitrogen (TN) and available P varied significantly among all treatments and T2, C1T1 and C2 treatments increased 25, 17 and 11 folds in TN and 1.2, 0.6 and 0.3 folds in P, respectively related to control. Available K showed the highest values in C1T1. Soil micronutrients increased significantly along all treatments with the highest values in T2. After corn germination, significant variation was observed in the velocity of germination coefficients (VGC) among all treatments in the order of C1T1>T2>T1>C2>C1>control. The highest records of final germination and germination index were in C1T1 and T2. The spent grains may compensate deficiencies of macro and micronutrients in newly reclaimed sandy soils without adverse effects to sustain crop production with a rider that excessive or continuous use need to be circumvented.

Keywords: corn and squash germination, environmentally friendly organic wastes, soil carbon sequestration, spent grains as soil amendment, water holding capacity

Procedia PDF Downloads 510
1097 The Use of Videoconferencing in a Task-Based Beginners' Chinese Class

Authors: Sijia Guo

Abstract:

The development of new technologies and the falling cost of high-speed Internet access have made it easier for institutes and language teachers to opt different ways to communicate with students at distance. The emergence of web-conferencing applications, which integrate text, chat, audio / video and graphic facilities, offers great opportunities for language learning to through the multimodal environment. This paper reports on data elicited from a Ph.D. study of using web-conferencing in the teaching of first-year Chinese class in order to promote learners’ collaborative learning. Firstly, a comparison of four desktop videoconferencing (DVC) tools was conducted to determine the pedagogical value of the videoconferencing tool-Blackboard Collaborate. Secondly, the evaluation of 14 campus-based Chinese learners who conducted five one-hour online sessions via the multimodal environment reveals the users’ choice of modes and their learning preference. The findings show that the tasks designed for the web-conferencing environment contributed to the learners’ collaborative learning and second language acquisition.

Keywords: computer-mediated communication (CMC), CALL evaluation, TBLT, web-conferencing, online Chinese teaching

Procedia PDF Downloads 311
1096 Considerations in Pregnancy Followed by Obesity Surgery

Authors: Maryam Nazari, Atefeh Ghanbari, Saghar Noorinia

Abstract:

Obesity, as an abnormal or excessive accumulation of fat, is caused by genetic, behavioral and environmental factors. Recently, obesity surgeries, such as bariatric surgery, as the last measure to control obesity, have attracted experts and society, especially women, attention, so knowing the possible complications of this major surgery and their control in reproductive age is of particular importance due to its effects on pregnancy outcomes. Bariatric surgery reduces the risk of diabetes and high blood pressure associated with pregnancy, premature birth, macrosomia, stillbirth and dumping syndrome. Although in the first months after surgery, nausea and vomiting caused by changes in intra-abdominal pressure are associated with an increased risk of malabsorption of micronutrients such as folic acid, iron, vitamin B1, D, calcium, selenium and phosphorus and finally, fetal growth disorder. Moreover, serum levels of micronutrients such as vitamin D, calcium, and iron in mothers who used to have bariatric surgery and their babies have been shown to be lower than in mothers without a history of bariatric surgery. Moreover, vitamin A deficiency is shown to be more widespread in pregnancies after bariatric surgery, which leads to visual problems in newborns and premature delivery. However, complications such as the duration of hospitalization of newborns in the NICU, disease rate in the first 28 days of life and congenital anomalies are not significantly different in babies born to mothers undergoing bariatric surgery compared to the control group. In spite of the vast advantages following obesity surgeries, due to the catabolic conditions and severe weight loss followed by such major intervention and the probability of nutrients malnutrition in a pregnant woman and her baby, after having surgery, at least 12 to 18 months should be considered to get pregnant as a recovery period. In addition, taking essential supplements before and at least 6 months after this approach is recommended.

Keywords: bariatric surgery, pregnancy, malnutrition, vitamin and mineral deficiency

Procedia PDF Downloads 94
1095 Design and Development of a Platform for Analyzing Spatio-Temporal Data from Wireless Sensor Networks

Authors: Walid Fantazi

Abstract:

The development of sensor technology (such as microelectromechanical systems (MEMS), wireless communications, embedded systems, distributed processing and wireless sensor applications) has contributed to a broad range of WSN applications which are capable of collecting a large amount of spatiotemporal data in real time. These systems require real-time data processing to manage storage in real time and query the data they process. In order to cover these needs, we propose in this paper a Snapshot spatiotemporal data model based on object-oriented concepts. This model allows saving storing and reducing data redundancy which makes it easier to execute spatiotemporal queries and save analyzes time. Further, to ensure the robustness of the system as well as the elimination of congestion from the main access memory we propose a spatiotemporal indexing technique in RAM called Captree *. As a result, we offer an RIA (Rich Internet Application) -based SOA application architecture which allows the remote monitoring and control.

Keywords: WSN, indexing data, SOA, RIA, geographic information system

Procedia PDF Downloads 257
1094 Optimizing Bridge Deck Construction: A Deep Neural Network Approach for Limiting Exterior Grider Rotation

Authors: Li Hui, Riyadh Hindi

Abstract:

In the United States, bridge construction often employs overhang brackets to support the deck overhang, the weight of fresh concrete, and loads from construction equipment. This approach, however, can lead to significant torsional moments on the exterior girders, potentially causing excessive girder rotation. Such rotations can result in various safety and maintenance issues, including thinning of the deck, reduced concrete cover, and cracking during service. Traditionally, these issues are addressed by installing temporary lateral bracing systems and conducting comprehensive torsional analysis through detailed finite element analysis for the construction of bridge deck overhang. However, this process is often intricate and time-intensive, with the spacing between temporary lateral bracing systems usually relying on the field engineers’ expertise. In this study, a deep neural network model is introduced to limit exterior girder rotation during bridge deck construction. The model predicts the optimal spacing between temporary bracing systems. To train this model, over 10,000 finite element models were generated in SAP2000, incorporating varying parameters such as girder dimensions, span length, and types and spacing of lateral bracing systems. The findings demonstrate that the deep neural network provides an effective and efficient alternative for limiting the exterior girder rotation for bridge deck construction. By reducing dependence on extensive finite element analyses, this approach stands out as a significant advancement in improving safety and maintenance effectiveness in the construction of bridge decks.

Keywords: bridge deck construction, exterior girder rotation, deep learning, finite element analysis

Procedia PDF Downloads 64
1093 Improving Communication System through Router Configuration: The Nigerian Navy Experience

Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale

Abstract:

The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.

Keywords: C-band, communication, router, VSAT

Procedia PDF Downloads 366
1092 Performance Analysis of Arithmetic Units for IoT Applications

Authors: Nithiya C., Komathi B. J., Praveena N. G., Samuda Prathima

Abstract:

At present, the ultimate aim in digital system designs, especially at the gate level and lower levels of design abstraction, is power optimization. Adders are a nearly universal component of today's integrated circuits. Most of the research was on the design of high-speed adders to execute addition based on various adder structures. This paper discusses the ideal path for selecting an arithmetic unit for IoT applications. Based on the analysis of eight types of 16-bit adders, we found out Carry Look-ahead (CLA) produces low power. Additionally, multiplier and accumulator (MAC) unit is implemented with the Booth multiplier by using the low power adders in the order of preference. The design is synthesized and verified using Synopsys Design Compiler and VCS. Then it is implemented by using Cadence Encounter. The total power consumed by the CLA based booth multiplier is 0.03527mW, the total area occupied is 11260 um², and the speed is 2034 ps.

Keywords: carry look-ahead, carry select adder, CSA, internet of things, ripple carry adder, design rule check, power delay product, multiplier and accumulator

Procedia PDF Downloads 119
1091 Assessment of E-Portfolio on Teacher Reflections on English Language Education

Authors: Hsiaoping Wu

Abstract:

With the wide use of Internet, learners are exposed to the wider world. This exposure permits learners to discover new information and combine a variety of media in order to reach in-depth and broader understanding of their literacy and the world. Many paper-based teaching, learning and assessment modalities can be transferred to a digital platform. This study examines the use of e-portfolios for ESL (English as a second language) pre-service teacher. The data were collected by reviewing 100 E-portfolio from 2013 to 2015 in order to synthesize meaningful information about e-portfolios for ESL pre-service teachers. Participants were generalists, bilingual and ESL pre-service teachers. The studies were coded into two main categories: learning gains, including assessment, and technical skills. The findings showed that using e-portfolios enhanced and developed ESL pre-service teachers’ teaching and assessment skills. Also, the E-portfolio also developed the pre-service teachers’ technical stills to prepare a comprehensible portfolio to present who they are. Finally, the study and presentation suggested e-portfolios for ecological issues and educational purposes.

Keywords: assessment, e-portfolio, pre-service teacher, reflection

Procedia PDF Downloads 318
1090 Monitoring of Cannabis Cultivation with High-Resolution Images

Authors: Levent Basayigit, Sinan Demir, Burhan Kara, Yusuf Ucar

Abstract:

Cannabis is mostly used for drug production. In some countries, an excessive amount of illegal cannabis is cultivated and sold. Most of the illegal cannabis cultivation occurs on the lands far from settlements. In farmlands, it is cultivated with other crops. In this method, cannabis is surrounded by tall plants like corn and sunflower. It is also cultivated with tall crops as the mixed culture. The common method of the determination of the illegal cultivation areas is to investigate the information obtained from people. This method is not sufficient for the determination of illegal cultivation in remote areas. For this reason, more effective methods are needed for the determination of illegal cultivation. Remote Sensing is one of the most important technologies to monitor the plant growth on the land. The aim of this study is to monitor cannabis cultivation area using satellite imagery. The main purpose of this study was to develop an applicable method for monitoring the cannabis cultivation. For this purpose, cannabis was grown as single or surrounded by the corn and sunflower in plots. The morphological characteristics of cannabis were recorded two times per month during the vegetation period. The spectral signature library was created with the spectroradiometer. The parcels were monitored with high-resolution satellite imagery. With the processing of satellite imagery, the cultivation areas of cannabis were classified. To separate the Cannabis plots from the other plants, the multiresolution segmentation algorithm was found to be the most successful for classification. WorldView Improved Vegetative Index (WV-VI) classification was the most accurate method for monitoring the plant density. As a result, an object-based classification method and vegetation indices were sufficient for monitoring the cannabis cultivation in multi-temporal Earthwiev images.

Keywords: Cannabis, drug, remote sensing, object-based classification

Procedia PDF Downloads 274
1089 Bioprospecting for Indigenous Ruderal Plants with Potentials for Phytoremediation of Soil Heavy Metals in the Southern Guinea Savanna of North Western Nigeria

Authors: Sunday Paul Bako, Augustine Uwanekwu Ezealor, Yahuza Tanimu

Abstract:

In a study to evaluate the response of indigenous ruderal plants to the metal deposition regime imposed by anthropogenic modification in the Southern Guinea Savanna of north Western Nigeria during the dry and wet seasons, herbaceous plants and samples of soils were collected in three 5m by 5m quadrats laid around the environs of the Kaduna Refinery and Petrochemical Company and the banks of River Kaduna. Heavy metal concentration (Cd, Ni, Cr, Cu, Fe, Mn and Zn) in soil and plant samples was determined using Energy Dispersive X-ray Fluorescence. Concentrations of heavy metals in soils were generally observed to be higher during the wet season in both locations although the differences were not statistically significant (P > 0.05). Concentrations of Cd, Zn, Cr, Cu and Ni in all the plants observed were found to be below levels described as phytotoxic to plants. However, above ‘normal’ concentrations of Cr was observed in most of the plant species sampled. The concentrations of Cr, Cu, Ni and Zn in soils around the KRPC and RKB were found to be above the acceptable limits. Although no hyper accumulator plant species was encountered in this study, twenty (20) plant species were identified to have high bioconcentration (BCF > 1.0) of Cd and Cu, which indicated tolerance of these plants to excessive or phytotoxic concentrations of these metals. In addition, they generally produce high above ground biomass, due to rapid vegetative growth. These are likely species for phytoextraction. Elevated concentration of metals in both soil and plant materials may cause a decrease in biodiversity due to direct toxicity. There are also risks to humans and other animals due to bioaccumulation across the food chain. There are further possibilities of further evaluating and genetically improving metal tolerance traits in some of these plant species in relation to their potential use in phytoremediation programmes in metal polluted sites.

Keywords: bioprospecting, phytoremediation, heavy metals, Nigeria

Procedia PDF Downloads 287
1088 Installing Cloud Computing Model for E-Businesses in Small Organizations

Authors: Khader Titi

Abstract:

Information technology developments have changed the way how businesses are working. Organizations are required to become visible online and stay connected to take advantages of costs reduction and improved operation of existing resources. The approval and the application areas of the cloud computing has significantly increased since it was presented by Google in 2007. Internet Cloud computing has attracted the IT enterprise attention especially the e-business enterprise. At this time, there is a great issue of environmental costs during the enterprises apply the e- business, but with the coming of cloud computing, most of the problem will be solved. Organizations around the world are facing with the continued budget challenges and increasing in the size of their computational data so, they need to find a way to deliver their services to clients as economically as possible without negotiating the achievement of anticipated outcomes. E- business companies need to provide better services to satisfy their clients. In this research, the researcher proposed a paradigm that use and deploy cloud computing technology environment to be used for e-business in small enterprises. Cloud computing might be a suitable model for implementing e-business and e-commerce architecture to improve efficiency and user satisfaction.

Keywords: E-commerce, cloud computing, B2C, SaaS

Procedia PDF Downloads 319
1087 Deltamethrin-Induces Oxidative Stress to the Freshwater Ciliate Model: Paramecium tetraurelia

Authors: Amamra Ryma, Djebar Mohamed Reda, Moumeni Ouissem, Otmani Hadjer, Berrebbah Houria

Abstract:

The problem of environmental contamination by the excessive use of organics cannot be neglected. Extensive application is usually companied with serious problems and health risk. It is established that many chemicals, in common use, can produce some toxic effects on biological systems through their mode of action or by production of free radicals that damage all cell compounds. Deltamethrin, a widely used type II pyrethroid pesticide, is one of the most common contaminants in freshwater aquatic system. In this study, we investigate the effects of deltamethrin exposure on the induction of oxidative stress to the freshwater ciliate Paramecium tetraurelia. After the treatment of paramecium cells with increasing concentrations of insecticide, we followed up the growth kinetics, generation time and the percentage response. Also, we studied the variation in biomarkers of stress such as: GSH content, GST, GPX and CAT activities. Our results showed a significant decrease in the proliferation of cells correlated by the decrease in generation number and the increase in generation time. Also, we noted an inhibition in the percentage response. The monitoring of biomarkers revealed depletion in GSH content in a proportional and dose dependent manner accompanied by an increase in the GST activity. In parallel, a strong induction in the CAT and GPX activities was noted specially for the highest dose. In summary, under the current experimental conditions, deltamethrin is highly toxic to the freshwater ciliate Paramecium tetraurelia. Exposure to low concentrations showed significant adverse on growth accompanied with the induction of oxidative damage supported by the decrease in GSH content and the intensification of the antioxidant enzymes.

Keywords: deltamethrin, Paramecium tetraurelia, growth, oxidative stress, biomarkers, antioxidant

Procedia PDF Downloads 469
1086 Banking Innovation and Customers' Satisfaction in Nigeria: A Case Study of Some Selected Banks

Authors: Jameelah O. Yaqub

Abstract:

The financial industry all over the world has undergone and still undergoing great transformation especially with the introduction of e-products which involves the use of computers and telecommunications to enable banking transactions to be done by telephone or computer rather than by humans. The adoption of e-banking in Nigeria is becoming more popular with customers now being able to use the ATM cards for different transactions. The internet banking, POS machines, telephone banking as well as mobile banking are some other e-products being used in Nigeria. This study examines how satisfied bank customers are with the e-products. The study found that the ATM is the most popular e-products among bank customers in Nigeria; followed by the POS. The least use of the e-products is telephone banking. The study also found that visits to banks for transactions declined with the use of e-products. The chi-square analysis shows that there is significant relationship between the use of banks’ e-products and customers’ satisfaction. One of the major reason adduced by respondents for low usage of e-products is insecurity or fear of cyber fraud, it is therefore recommended that banks should provide adequate. Security for transactions and ensure the proper backing up of critical data files. In addition, government should ensure stable electricity supply to reduce banks’ running costs and consequently, customers’ cost of transactions.

Keywords: banks, e-products, innovation, Nigeria

Procedia PDF Downloads 337
1085 Defining Affecting Factors on Rate of Car E-Customers' Satisfaction – a Case Study of Iran Khodro Co.

Authors: Majid Mohammadi, Mohammad Yosef Zadeh, Vahid Naderi Darshori

Abstract:

The main purpose of this research is concreting of satisfaction literature for obtain index with online content in carmaker industry. The study measures customer satisfaction of online and collect from similar studies with reference to a model of online satisfaction, they are attempting to complete. Statistical communities of research are online customers' carmaker Iran Khodro has been buying the company's products in the last six months. One of the innovative measures in this study is that, customer reviews are obtained through an Internet site. Reliability of the data collected in this study, the Cronbach's alpha coefficient was approved. The coefficient of 0.828 was calculated for the questionnaire. To test the hypothesis, the Pearson correlation coefficient was used. To ensure the correctness of initial theoretical model, we used regression analyzes and structural equation weight and finally, the results obtained with little change to the basic model of research, are improved and completed. At last obtain the perceived value has most direct effect on online car customers satisfaction.

Keywords: customer satisfaction, online satisfaction, online customer, car

Procedia PDF Downloads 406
1084 Health and Nutrition-Related Stress in Working Women: Faisalabad Perspective

Authors: Sabah Yasin, Anum Obaid

Abstract:

Abstract—Working women in Pakistan should not be neglected, as women make up to half of the population, and are highly educated and diversified in their skills and capabilities. With a shift in global economic and social demands the obligations of a women have altered significantly, impacted by the dual pressures of career and personal life. Despite global efforts to improve economic empowerment and health of women, through Sustainable Development Goals, they suffer from social, economic, psychological and physiological challenges. A sound understanding of working women’s nutrition and health-related stress is a prompt necessity, in areas like Faisalabad, thus leading to a public health issue. The current qualitative study is grounded under the paradigm of in-depth interviews with working women, currently working full time in Faisalabad. Participants collected through snowball sampling were women ages 30-40. This study explores the perceptions and experiences as well as barriers and factors effecting the overall wellbeing of working women, regarding nutrition and health-related stress. Findings of the current study disclosed that the nutritional and health well-being of working women in Faisalabad suffers from the impact of various stressors, like long working hours, excessive workload, low income, poor work place culture, unavailability of healthy food choices at work, lack of time, lack of self-care, unattended nutritional deficiencies and overburdened share of responsibilities. Hence, these findings highlight the need for effective strategies and support systems that will address the unique stressors faced by working women and also by educating them in changing their attitudes and understanding psychosocial barriers that impede their ability to maintain nutrition and overall well-being.

Keywords: health triangle, lifestyle behaviors, nutrition-related, professional life, stress, working women

Procedia PDF Downloads 23
1083 Distributed Perceptually Important Point Identification for Time Series Data Mining

Authors: Tak-Chung Fu, Ying-Kit Hung, Fu-Lai Chung

Abstract:

In the field of time series data mining, the concept of the Perceptually Important Point (PIP) identification process is first introduced in 2001. This process originally works for financial time series pattern matching and it is then found suitable for time series dimensionality reduction and representation. Its strength is on preserving the overall shape of the time series by identifying the salient points in it. With the rise of Big Data, time series data contributes a major proportion, especially on the data which generates by sensors in the Internet of Things (IoT) environment. According to the nature of PIP identification and the successful cases, it is worth to further explore the opportunity to apply PIP in time series ‘Big Data’. However, the performance of PIP identification is always considered as the limitation when dealing with ‘Big’ time series data. In this paper, two distributed versions of PIP identification based on the Specialized Binary (SB) Tree are proposed. The proposed approaches solve the bottleneck when running the PIP identification process in a standalone computer. Improvement in term of speed is obtained by the distributed versions.

Keywords: distributed computing, performance analysis, Perceptually Important Point identification, time series data mining

Procedia PDF Downloads 435
1082 Anonymous Editing Prevention Technique Using Gradient Method for High-Quality Video

Authors: Jiwon Lee, Chanho Jung, Si-Hwan Jang, Kyung-Ill Kim, Sanghyun Joo, Wook-Ho Son

Abstract:

Since the advances in digital imaging technologies have led to development of high quality digital devices, there are a lot of illegal copies of copyrighted video content on the internet. Thus, we propose a high-quality (HQ) video watermarking scheme that can prevent these illegal copies from spreading out. The proposed scheme is applied spatial and temporal gradient methods to improve the fidelity and detection performance. Also, the scheme duplicates the watermark signal temporally to alleviate the signal reduction caused by geometric and signal-processing distortions. Experimental results show that the proposed scheme achieves better performance than previously proposed schemes and it has high fidelity. The proposed scheme can be used in broadcast monitoring or traitor tracking applications which need fast detection process to prevent illegally recorded video content from spreading out.

Keywords: editing prevention technique, gradient method, luminance change, video watermarking

Procedia PDF Downloads 458