Search results for: sharing bike usage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2896

Search results for: sharing bike usage

1636 An Energy Efficient Clustering Approach for Underwater ‎Wireless Sensor Networks

Authors: Mohammad Reza Taherkhani‎

Abstract:

Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make a connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.

Keywords: underwater sensor networks, clustering, learning automata, energy consumption

Procedia PDF Downloads 344
1635 Applying Personel Resilence and Emotional Agitation in Occupational, Health and Safety Education and Training

Authors: M. Jayandran

Abstract:

Continual professional development is an important concept for safety professionals to strengthen the knowledge base and to achieve the required qualifications or international memberships in a given time. But the main problems which have observed among most of the safety aspirants are as follows: lack of focus, inferiority complex, superiority complex, lack of interest and lethargy, family and off job stress, health issues, usage of drugs and alcohol, and absenteeism. A HSE trainer should be an expert in soft skills and other stress, emotional handling techniques, so as to manage the above aspirants during training. To do this practice, a trainer has to brainstorm himself of few of the soft skills like personnel resilience, mnemonic techniques, mind healing, and subconscious suggestion techniques by integrating with an emotional intelligence quotient of the aspirants. By adopting these techniques, a trainer can successfully deliver the course and influence the different types of audience to achieve success in training.

Keywords: personnel resilience, mnemonic techniques, mind healing, sub conscious suggestion techniques

Procedia PDF Downloads 287
1634 Leveraging Hyperledger Iroha for the Issuance and Verification of Higher-Education Certificates

Authors: Vasiliki Vlachou, Christos Kontzinos, Ourania Markaki, Panagiotis Kokkinakos, Vagelis Karakolis, John Psarras

Abstract:

Higher Education is resisting the pull of technology, especially as this concerns the issuance and verification of degrees and certificates. It is widely known that education certificates are largely produced in paper form making them vulnerable to damage while holders of such certificates are dependent on the universities and other issuing organisations. QualiChain is an EU Horizon 2020 (H2020) research project aiming to transform and revolutionise the domain of public education and its ties with the job market by leveraging blockchain, analytics and decision support to develop a platform for the verification and sharing of education certificates. Blockchain plays an integral part in the QualiChain solution in providing a trustworthy environment to store, share and manage such accreditations. Under the context of this paper, three prominent blockchain platforms (Ethereum, Hyperledger Fabric, Hyperledger Iroha) were considered as a means of experimentation for creating a system with the basic functionalities that will be needed for trustworthy degree verification. The methodology and respective system developed and presented in this paper used Hyperledger Iroha and proved that this specific platform can be used to easily develop decentralize applications. Future papers will attempt to further experiment with other blockchain platforms and assess which has the best potential.

Keywords: blockchain, degree verification, higher education certificates, Hyperledger Iroha

Procedia PDF Downloads 118
1633 Explaining the Changes in Contentious Politics of China: A Comparative Study of Falun Gong and 'Diaosi'

Authors: Larry Lai, Evans Leung

Abstract:

Falun gong is a self-proclaimed religious group that has been under crackdown by Beijing for more than two decades. Diaosi, on the other hand, is an emerging community with members loosely connected on the internet through different online social platforms, centering around the sharing of different hobbies and interests. Diaosi community has been transformed from a potential threat to the Chinese authority for different causes to a pro-government force. This paper seeks to explain the different strategies adopted by the People's Republic of China (PRC) regime in handling these two potential threatening communities. Both communities share some obvious similarities: (1) both have massive nation-wide participation; (2) both have attempted to challenge the PRC's authority through contentious means; (3) both have high level of mobility, online or offline; and (4) both have at first been unnoticed until the threat against the PRC have taken form. But the strategies the PRC endorsed against the communities were, in many ways, different. The question is: if the strategy against Falun Gong has been an effective one, why used other strategies against Diaosi? The authors argue that the main reason for using different strategies lies in the differences between the two communities in terms of (i) the nature of the groups, and (ii) the group dynamics. Lastly, based on this analysis, the authors attempt to explore the possible strategies that the PRC would adopt against the Hong Kong cyber-world political community in light of the latest national security law in Hong Kong.

Keywords: contentious politics, Diaosi, Falun Gong, Hong Kong, People's Republic of China

Procedia PDF Downloads 132
1632 Evaluation of Minimization of Moment Ratio Method by Physical Modeling

Authors: Amin Eslami, Jafar Bolouri Bazaz

Abstract:

Under active stress conditions, a rigid cantilever retaining wall tends to rotate about a pivot point located within the embedded depth of the wall. For purely granular and cohesive soils, a methodology was previously reported called minimization of moment ratio to determine the location of the pivot point of rotation. The usage of this new methodology is to estimate the rotational stability safety factor. Moreover, the degree of improvement required in a backfill to get a desired safety factor can be estimated by the concept of the shear strength demand. In this article, the accuracy of this method for another type of cantilever walls called Contiguous Bored Pile (CBP) retaining wall is evaluated by using physical modeling technique. Based on observations, the results of moment ratio minimization method are in good agreement with the results of the carried out physical modeling.

Keywords: cantilever retaining wall, physical modeling, minimization of moment ratio method, pivot point

Procedia PDF Downloads 316
1631 Comparative Study of Dynamic Effect on Analysis Approaches for Circular Tanks Using Codal Provisions

Authors: P. Deepak Kumar, Aishwarya Alok, P. R. Maiti

Abstract:

Liquid storage tanks have become widespread during the recent decades due to their extensive usage. Analysis of liquid containing tanks is known to be complex due to hydrodynamic force exerted on tank which makes the analysis a complex one. The objective of this research is to carry out analysis of liquid domain along with structural interaction for various geometries of circular tanks considering seismic effects. An attempt has been made to determine hydrodynamic pressure distribution on the tank wall considering impulsive and convective components of liquid mass. To get a better picture, a comparative study of Draft IS 1893 Part 2, ACI 350.3 and Eurocode 8 for Circular Shaped Tank has been performed. Further, the differences in the magnitude of shear and moment at base as obtained from static (IS 3370 IV) and dynamic (Draft IS 1892 Part 2) analysis of ground supported circular tank highlight the need for us to mature from the old code to a newer code, which is more accurate and reliable.

Keywords: liquid filled containers, circular tanks, IS 1893 (part 2), seismic analysis, sloshing

Procedia PDF Downloads 333
1630 A Cloud-Based Spectrum Database Approach for Licensed Shared Spectrum Access

Authors: Hazem Abd El Megeed, Mohamed El-Refaay, Norhan Magdi Osman

Abstract:

Spectrum scarcity is a challenging obstacle in wireless communications systems. It hinders the introduction of innovative wireless services and technologies that require larger bandwidth comparing to legacy technologies. In addition, the current worldwide allocation of radio spectrum bands is already congested and can not afford additional squeezing or optimization to accommodate new wireless technologies. This challenge is a result of accumulative contributions from different factors that will be discussed later in this paper. One of these factors is the radio spectrum allocation policy governed by national regulatory authorities nowadays. The framework for this policy allocates specified portion of radio spectrum to a particular wireless service provider on exclusive utilization basis. This allocation is executed according to technical specification determined by the standard bodies of each Radio Access Technology (RAT). Dynamic access of spectrum is a framework for flexible utilization of radio spectrum resources. In this framework there is no exclusive allocation of radio spectrum and even the public safety agencies can share their spectrum bands according to a governing policy and service level agreements. In this paper, we explore different methods for accessing the spectrum dynamically and its associated implementation challenges.

Keywords: licensed shared access, cognitive radio, spectrum sharing, spectrum congestion, dynamic spectrum access, spectrum database, spectrum trading, reconfigurable radio systems, opportunistic spectrum allocation (OSA)

Procedia PDF Downloads 408
1629 Social Media Usage in 'No Man's Land': A Populist Paradise

Authors: Nilufer Turksoy

Abstract:

Social media tools successfully connect people from different milieu to each other. This easy access allows politicians with populist attitude to circulate any kind of political opinion or message, which will hardly appear in conventional media. Populism is a relevant concept, especially, in political communication research. In the last decade, populism in social media has been researched extensively. The present study focuses on how social media is used as a playground by Turkish Cypriot politicians to perform populism in Northern Cyprus. It aims to determine and understand the relationship between politicians and social media, and how they employ social media in their political lives. Northern Cyprus’s multi-faced character provides politicians with many possible frames and topics they can make demagogy about ongoing political deadlock, international isolation, economic instability or social and cultural life in the north part of the island. Thus, Northern Cyprus, bizarrely branded as a 'no man's land', is a case par excellence to show how politically and economically unstable geographies are inclined to perform populism. Northern Cyprus is legally invalid territory recognized by no member of the international community other than Turkey and a phantom state, just like Abkhazia and South Ossetia or Nagorno-Karabakh. Five ideological key elements of populism are employed in the theoretical framework of this study: (1) highlighting the sovereignty of the people, (2) attacking the elites, (3) advocacy for the people, (4) excluding others, and (5) invoking the heartland. A qualitative text analysis of typical Facebook posts was conducted. Profiles of popular political leaders who occupy top positions (e.g. member of parliament, minister, chairman, party secretary), who have different political views, and who use their profiles for political expression on daily bases are selected. All official Facebook pages of the selected politicians are examined during a period of five months (1 September 2017-31 January 2018). This period is selected since it was prior to the parliamentary elections. Finding revealed that majority of the Turkish Cypriot politicians use their social media profile to propagate their political ideology in a populist fashion. Populist statements are found across parties. Facebook give especially the left-wing political actors the freedom to spread their messages in manipulative ways, mostly by using a satiric, ironic and slandering jargon that refers to the pseudo-state, the phantom state, the unrecognized Turkish Republic of Northern Cyprus state. While most of the political leaders advocate for the people, invoking the heartland are preferred by right-wing politicians. A broad range of left-wing politicians predominantly conducted attack on the economic elites and ostracism of others. The finding concluded that different politicians use social media differently according to their political standpoint. Overall, the study offers a thorough analysis of populism on social media. Considering the large role social media plays in the daily life today, the finding will shed some light on the political influence of social media and the social media usage among politicians.

Keywords: Northern Cyprus, populism, politics, qualitative text analysis, social media

Procedia PDF Downloads 125
1628 Study on Resource Allocation of Cloud Operating System Based on Multi-Tenant Data Resource Sharing Technology

Authors: Lin Yunuo, Seow Xing Quan, Burra Venkata Durga Kumar

Abstract:

In this modern era, the cloud operating system is the world trend applied in various industries such as business, healthy, etc. In order to deal with the large capacity of requirements in cloud computing, research come up with multi-tenant cloud computing to maximize the benefits of server providers and clients. However, there are still issues in multi-tenant cloud computing especially regarding resource allocation. Issues such as inefficient resource utilization, large latency, lack of scalability and elasticity and poor data isolation had caused inefficient resource allocation in multi-tenant cloud computing. Without a doubt, these issues prevent multitenancy reaches its best condition. In fact, there are multiple studies conducted to determine the optimal resource allocation to solve these problems these days. This article will briefly introduce the cloud operating system, Multi-tenant cloud computing and resource allocation in cloud computing. It then discusses resource allocation in multi-tenant cloud computing and the current challenges it faces. According to the issue ‘ineffective resource utilization’, we will discuss an efficient dynamic scheduling technique for multitenancy, namely Multi-tenant Dynamic Resource Scheduling Model (MTDRSM). Moreover, there also have some recommendations to improve the shortcoming of this model in this paper’s final section.

Keywords: cloud computing, cloud operation system, multitenancy, resource allocation, utilization of cloud resources

Procedia PDF Downloads 72
1627 Optimized and Secured Digital Watermarking Using Fuzzy Entropy, Bezier Curve and Visual Cryptography

Authors: R. Rama Kishore, Sunesh

Abstract:

Recent development in the usage of internet for different purposes creates a great threat for the copyright protection of the digital images. Digital watermarking can be used to address the problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field of secured, robust and imperceptible watermarking. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (2, 2) share visual cryptography and Bezier curve based algorithm to improve the security of the watermark. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method. The algorithm is optimized using fuzzy entropy for better results.

Keywords: digital watermarking, fractional transform, visual cryptography, Bezier curve, fuzzy entropy

Procedia PDF Downloads 346
1626 Internet of Things Based Battery Management System

Authors: Pakhil Singh, Rahul Singh, Mohammad Saad Alam, Yasser Rafat

Abstract:

The battery management system is an essential package/system which ensures optimum performance and safety of a battery by monitoring the key essential parameters of the battery like the voltage, current, temperature, state of charge, state of health during charging and discharging. This can be accomplished using outputs of various sensors employed to serve the purpose. The increasing demand for electricity generation from renewable energy sources requires proper storage and hence a proper monitoring system as well. A battery management system is required in wide applications ranging from renewable energy storage systems, off-grid solar PV applications to electric vehicles. The aim of this paper is to study the parameters used in monitoring various battery operating conditions and proposes the usage of the internet of things (IoT) to implement a reliable battery management system.

Keywords: electric vehicles, internet of things, sensors, state of charge, state of health

Procedia PDF Downloads 174
1625 Ice Breakers: A Tool for Esl Learners

Authors: Nazia Shehzad

Abstract:

An icebreaker is a facilitation exercise intended to help a group to begin the process of forming themselves into a team. Icebreakers are commonly presented as a game to ‘warm up’ the group by helping the members to get to know each other. They often focus on sharing personal information such as names, hobbies, etc. Challenging icebreakers also have the ability to allow a group to be better prepared to complete its assigned tasks. For example, if the team's objective is to redesign a business process such as Accounts Payable, the icebreaker activity might take the team through a process analysis. The analysis could include the identification of failure points, challenging assumptions, and development of new solutions — all in a simpler and ‘safer’ setting where the team can practice the group dynamics which they will use to solve the assigned problem. Icebreakers help establish a positive environment and provide an opportunity for students to get to know one another and the instructor. Both are critical to the retention and success of students. There are a number of benefits of using ice-breakers activities in the classroom. It reduces both student and instructor anxiety prior to introducing the course, fosters in a powerful way both student-student and faculty-student interactions. It creates an environment where the learner is expected to participate and the instructor is willing to listen, actively engage students from the onset. It conveys the message that the instructor cares about getting to know the students and makes it easier for students to form relationships early in the semester so they can work together both in and out of class.

Keywords: actively engages students, facilitation exercise, faculty- student interactions, group dynamics, warm up

Procedia PDF Downloads 328
1624 Numerical Simulation of Magnetohydrodynamic (MHD) Blood Flow in a Stenosed Artery

Authors: Sreeparna Majee, G. C. Shit

Abstract:

Unsteady blood flow has been numerically investigated through stenosed arteries to achieve an idea about the physiological blood flow pattern in diseased arteries. The blood is treated as Newtonian fluid and the arterial wall is considered to be rigid having deposition of plaque in its lumen. For direct numerical simulation, vorticity-stream function formulation has been adopted to solve the problem using implicit finite difference method by developing well known Peaceman-Rachford Alternating Direction Implicit (ADI) scheme. The effects of magnetic parameter and Reynolds number on velocity and wall shear stress are being studied and presented quantitatively over the entire arterial segment. The streamlines have been plotted to understand the flow pattern in the stenosed artery, which has significant alterations in the downstream of the stenosis in the presence of magnetic field. The results show that there are nominal changes in the flow pattern when magnetic field strength is enhanced upto 8T which can have remarkable usage to MRI machines.

Keywords: magnetohydrodynamics, blood flow, stenosis, energy dissipation

Procedia PDF Downloads 259
1623 Distributed Control Strategy for Dispersed Energy Storage Units in the DC Microgrid Based on Discrete Consensus

Authors: Hanqing Yang, Xiang Meng, Qi Li, Weirong Chen

Abstract:

The SOC (state of charge) based droop control has limitations on the load power sharing among different energy storage units, due to the line impedance. In this paper, a distributed control strategy for dispersed energy storage units in the DC microgrid based on discrete consensus is proposed. Firstly, a sparse information communication network is built. Thus, local controllers can communicate with its neighbors using voltage, current and SOC information. An average voltage of grid can be evaluated to compensate voltage offset by droop control, and an objective virtual resistance fulfilling above requirement can be dynamically calculated to distribute load power according to the SOC of the energy storage units. Then, the stability of the whole system and influence of communication delay are analyzed. It can be concluded that this control strategy can improve the robustness and flexibility, because of having no center controller. Finally, a model of DC microgrid with dispersed energy storage units and loads is built, the discrete distributed algorithm is established and communication protocol is developed. The co-simulation between Matlab/Simulink and JADE (Java agent development framework) has verified the effectiveness of proposed control strategy.

Keywords: dispersed energy storage units, discrete consensus algorithm, state of charge, communication delay

Procedia PDF Downloads 256
1622 An Analysis on Fibre-Reinforced Composite Material Usage on Urban Furniture

Authors: Nilgun Becenen

Abstract:

In this study, the structural properties of composite materials with the plastic matrix, which are used in body parts of urban furniture were investigated. Surfaces of the specimens were observed by scanning electron microscopy (SEM: JSM-5200, JEOL) and Climatic environmental test analyses in laboratory conditions were used to analyze the performance of the composite samples. Climate conditions were determined as follow; 3 hour working under the conditions of -10 ºC heat and 20 % moisture, Heating until 45 ºC for 4 hours, 3 hour work at 45 ºC, 3 hour work under the conditions of 45 ºC heat and 80 % moisture, Cooling at -10 ºC for 4 hours. In this cycle, the atmospheric conditions that urban furniture would be exposed to in the open air were taken into consideration. Particularly, sudden heat changes and humidity effect were investigated. The climate conditions show that performance in Low Temperatures: The endurance isn’t affected, hardness does not change, tensile, bending and impact resistance does not change, the view isn’t affected. It has a high environmental performance.

Keywords: fibre-reinforced material, glass fiber, textile science, polymer composites

Procedia PDF Downloads 232
1621 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 160
1620 Challenging in Public Acceptability of Islamic Banking

Authors: Muhammad Ali Khan

Abstract:

Although most Muslims are aware that Riba is a great sin in Islamic Shariah, they still do not find themselves inclined toward Islamic banking for their financial needs/activities/requirements. The main purpose of this research work is to analyse the general trend of people's views and miss conceptions among them regarding Islamic Banking and therefore suggest promoting Islamic banking. Scholars believe that Islamic finance is more stable than conventional banking because of the nature of its banking practices, which are based on real assets or partnerships. This is why Islamic banking is growing fastly worldwide, particularly in the wake of global financial crisis. Even though the scope of Islamic banking is expanding on a daily basis yet, it is not gaining the popularity it deserves. Islam declares war against Allah and his last messenger Hazrat Muhammad (PBUM) as it is a great sin and strictly forbids all interest-based transactions. Holy Quran revealed, O you who believe, do not eat up the amounts acquired through Riba (interest), doubled and multiplied. Fear Allah, so that you may be successful. Therefore a, true Muslim who believe in Judgement day always make all efforts in their life to avoid gambling and other speculative activities like Riba for themselves and their loved ones. If a Muslim does not fight against Riba to protect himself and his family, then his faith is meaningless. Allah issues warnings at numerous places in the holy Quran regarding Riba and its sin. Thus, Islamic banking is an alternative banking system where banking transactions are based on Islamic principles. The major component of Islamic Banking is Profit and loss sharing (PLS), as well as ensuring economic justice and equity.

Keywords: Islamic banking, Riba, interest, financial crises

Procedia PDF Downloads 48
1619 Multi-Source Data Fusion for Urban Comprehensive Management

Authors: Bolin Hua

Abstract:

In city governance, various data are involved, including city component data, demographic data, housing data and all kinds of business data. These data reflects different aspects of people, events and activities. Data generated from various systems are different in form and data source are different because they may come from different sectors. In order to reflect one or several facets of an event or rule, data from multiple sources need fusion together. Data from different sources using different ways of collection raised several issues which need to be resolved. Problem of data fusion include data update and synchronization, data exchange and sharing, file parsing and entry, duplicate data and its comparison, resource catalogue construction. Governments adopt statistical analysis, time series analysis, extrapolation, monitoring analysis, value mining, scenario prediction in order to achieve pattern discovery, law verification, root cause analysis and public opinion monitoring. The result of Multi-source data fusion is to form a uniform central database, which includes people data, location data, object data, and institution data, business data and space data. We need to use meta data to be referred to and read when application needs to access, manipulate and display the data. A uniform meta data management ensures effectiveness and consistency of data in the process of data exchange, data modeling, data cleansing, data loading, data storing, data analysis, data search and data delivery.

Keywords: multi-source data fusion, urban comprehensive management, information fusion, government data

Procedia PDF Downloads 367
1618 The Influence of Social Media on the Body Image of First Year Female Medical Students of University of Khartoum, 2022

Authors: Razan Farah, Siham Ballah

Abstract:

Facebook, Instagram, TikTok and other social media applications have become an integral component of everyone’s social life, particularly among younger generations and adolescences. These social apps have been changing a lot of conceptions and believes in the population by representing public figures and celebrities as role models. The social comparison theory, which says that people self-evaluate based on comparisons with similar others, is commonly used to explore the impact of social media on body image. There is a need to study the influence of those social platforms on the body image as there have been an increase in body dissatisfaction in the recent years. This cross sectional study used a self administered questionnaire on a simple random sample of 133 female medical students of the first year. Finding shows that the response rate was 75%. There was an association between social media usage and noticing how the person look(p value = .022), but no significant association between social media use and body image influence or dissatisfaction was found. This study implies more research under this topic in Sudan as the literature are scarce.

Keywords: body image, body dissatisfaction, social media, adolescences

Procedia PDF Downloads 50
1617 Anti-Inflammatory Activity of Lavandula antineae Maire from Algeria

Authors: Soumeya Krimat, Tahar Dob, Aicha Kesouri, Ahmed Nouasri, Hafidha Metidji

Abstract:

Lavandula antineae Maire is an endemic medicinal plant of Algeria which is traditionally used for the treatment of chills, bruises, oedema and rheumatism. The objective of this study is to evaluate the anti-inflammatory of hydromethanolic aerial parts extract of Lavandula antineae for the first time using carrageenan-paw edema and croton oil-ear odema models. The plant extract, at the dose of 200 mg/kg, showed a significant anti-inflammatory activity (P˂0.05) in the carrageenan induced edema test in mice, showing 80.74% reduction in the paw thikness comparable to that produced by the standard drug aspirin 83.44% at 4h. When it was applied topically at a dosage of 1 and 2 mg per ear, the percent edema reduction in treated mice was 29.45% and 74.76%, respectively. These results demonstrate that Lavandula antineae Maire extract possess remarkable anti-inflammatory activity, supporting the folkloric usage of the plant to treat various inflammatory and pain diseases.

Keywords: lavandula antineae maire, medicinal plant, anti-inflammatory activity, carrageenan-paw edema, croton oil-ear edema

Procedia PDF Downloads 370
1616 A Multi-Population DE with Adaptive Mutation and Local Search for Global Optimization

Authors: Zhoucheng Bao, Haiyan Zhu, Tingting Pang, Zuling Wang

Abstract:

This paper proposes a multi-population DE with adaptive mutation and local search for global optimization, named AMMADE. In order to better coordinate the cooperation between the populations and the rational use of resources. In AMMADE, the population is divided based on the Euclidean distance sorting method at each generation to appropriately coordinate the cooperation between subpopulations and the usage of resources, such that the best-performed subpopulation will get more computing resources in the next generation. Further, an adaptive local search strategy is employed on the best-performed subpopulation to achieve a balanced search. The proposed algorithm has been tested by solving optimization problems taken from CEC2014 benchmark problems. Experimental results show that our algorithm can achieve a competitive or better than related methods. The results also confirm the significance of devised strategies in the proposed algorithm.

Keywords: differential evolution, multi-mutation strategies, memetic algorithm, adaptive local search

Procedia PDF Downloads 134
1615 Quantification of the Variables of the Information Model for the Use of School Terminology from 1884 to 2014 in Dalmatia

Authors: Vinko Vidučić, Tanja Brešan Ančić, Marijana Tomelić Ćurlin

Abstract:

Prior to quantifying the variables of the information model for using school terminology in Croatia's region of Dalmatia from 1884 to 2014, the most relevant model variables had to be determined: historical circumstances, standard of living, education system, linguistic situation, and media. The research findings show that there was no significant transfer of the 1884 school terms into 1949 usage; likewise, the 1949 school terms were not widely used in 2014. On the other hand, the research revealed that the meaning of school terms changed over the decades. The quantification of the variables will serve as the groundwork for creating an information model for using school terminology in Dalmatia from 1884 to 2014 and for defining direct growth rates in further research.

Keywords: education system, historical circumstances, linguistic situation, media, school terminology, standard of living

Procedia PDF Downloads 200
1614 Evolution of Leather in Fashion Industry

Authors: Utkarsh Goley

Abstract:

Leather has been a valued material for clothing and accessories for centuries, and its use has evolved along with fashion trends and technological advancements. From ancient times when leather was used for practical purposes, to the modern fashion industry, where it is used for both functional and decorative purposes, leather has undergone significant changes in its production and usage. In recent years, there has been a growing awareness of ethical and sustainable fashion, leading to a shift towards alternative materials and production methods. The leather industry has responded to this by exploring new techniques and materials, such as vegetable-tanned leather and leather substitutes made from plant-based materials. The evolution of leather in the fashion industry is also closely tied to cultural and social trends. The use of leather has been associated with rebellion and counterculture in the past, and today it is often used to evoke a sense of luxury and sophistication. Despite the challenges and controversies surrounding its production, leather continues to be a popular material in the fashion industry, with designers and consumers alike valuing its durability, versatility, and aesthetic appeal. As fashion continues to evolve, so will the role and use of leather in the industry. This research paper provides a detailed overview of the evolution of leather in the fashion industry throughout the different decades and centuries.

Keywords: evolution, fashion, leather, sustainable

Procedia PDF Downloads 73
1613 Rail Degradation Modelling Using ARMAX: A Case Study Applied to Melbourne Tram System

Authors: M. Karimpour, N. Elkhoury, L. Hitihamillage, S. Moridpour, R. Hesami

Abstract:

There is a necessity among rail transportation authorities for a superior understanding of the rail track degradation overtime and the factors influencing rail degradation. They need an accurate technique to identify the time when rail tracks fail or need maintenance. In turn, this will help to increase the level of safety and comfort of the passengers and the vehicles as well as improve the cost effectiveness of maintenance activities. An accurate model can play a key role in prediction of the long-term behaviour of railroad tracks. An accurate model can decrease the cost of maintenance. In this research, the rail track degradation is predicted using an autoregressive moving average with exogenous input (ARMAX). An ARMAX has been implemented on Melbourne tram data to estimate the values for the tram track degradation. Gauge values and rail usage in Million Gross Tone (MGT) are the main parameters used in the model. The developed model can accurately predict the future status of the tram tracks.

Keywords: ARMAX, dynamic systems, MGT, prediction, rail degradation

Procedia PDF Downloads 233
1612 Intrusion Detection Using Dual Artificial Techniques

Authors: Rana I. Abdulghani, Amera I. Melhum

Abstract:

With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.

Keywords: IDS, SI, BP, NSL_KDD, PSO

Procedia PDF Downloads 367
1611 Comparative Study on Different Type of Shear Connectors in Composite Slabs

Authors: S. Subrmanian, A. Siva, R. Raghul

Abstract:

In modern construction industry, usage of cold form composite slab has its scope widely due to its light weight, high structural properties and economic factor. To enhance the structural integrity, mechanical interlocking or frictional interlocking was introduced. The role of mechanical interlocking or frictional interlocking is to increase the longitudinal shear between the profiled sheet and concrete. This paper deals with the experimental evaluation of three types of mechanical interlocking devices namely normal stud shear connector, J-Type shear connector, U-Type shear connector. An attempt was made to evolve the shear connector which can be suitable for the composite slab as an interlocking device. Totally six number of composite slabs have been experimented with three types of shear connectors and comparison study is made. The outcome was compared with numerical model was created by ABAQUS software and analyzed for comparative purpose. The result was U-Type shear connector provided better performance and resistance.

Keywords: composite slabs, shear connector, end slip, longitudinal shear

Procedia PDF Downloads 306
1610 A Proposed Plan for the Viral Marketing of Sporting Products and Services to Social Media Users in the Arab World

Authors: Ahmed F. Abdel Qader

Abstract:

Viral marketing has resulted in a lot of excitement recently as a novel technology in the field of marketing. The need of porting institutions to attract new customers for sporting products and services has increased, especially as many international and Arab clubs rely on them for most of their funding. These organizations, especially clubs, have outlets for selling their products and services; therefore, they are in need for new approaches that are related to modern communication and innovative distribution methods that can depend on the present audience in conveying e-ads to other users in light of the increase in social media users in the Arab world. This study aims at developing a marketing plan for sporting products and services through viral marketing of social media users. The researcher used the descriptive method. The sample consisted of 1991 social media users in 13 Arab countries. The questionnaire consisted of five themes and 42 items. Allan Dib 'one-page marketing plan' was used to develop the sporting products and services marketing plan. The study found that participants reported watching e-ads of sporting products and services that appeared during browsing social media pages; Facebook was the most used means for receiving ads about sporting products and services; sharing the product’s ad depends on the availability of incentives; purchasing sporting products and services takes place after a recommendation by a relative or a friend; and their evaluation of sporting products and services depends on the experiences of other people. The study recommends that the proposed plan should be used in marketing sporting products and services.

Keywords: viral marketing, sporting products, social media, Arab world

Procedia PDF Downloads 155
1609 Machine Learning Automatic Detection on Twitter Cyberbullying

Authors: Raghad A. Altowairgi

Abstract:

With the wide spread of social media platforms, young people tend to use them extensively as the first means of communication due to their ease and modernity. But these platforms often create a fertile ground for bullies to practice their aggressive behavior against their victims. Platform usage cannot be reduced, but intelligent mechanisms can be implemented to reduce the abuse. This is where machine learning comes in. Understanding and classifying text can be helpful in order to minimize the act of cyberbullying. Artificial intelligence techniques have expanded to formulate an applied tool to address the phenomenon of cyberbullying. In this research, machine learning models are built to classify text into two classes; cyberbullying and non-cyberbullying. After preprocessing the data in 4 stages; removing characters that do not provide meaningful information to the models, tokenization, removing stop words, and lowering text. BoW and TF-IDF are used as the main features for the five classifiers, which are; logistic regression, Naïve Bayes, Random Forest, XGboost, and Catboost classifiers. Each of them scores 92%, 90%, 92%, 91%, 86% respectively.

Keywords: cyberbullying, machine learning, Bag-of-Words, term frequency-inverse document frequency, natural language processing, Catboost

Procedia PDF Downloads 111
1608 The Relationship between HR Disclosure and Employee’s Turnover: Study on the Telecommunication Sector in Jordan

Authors: Dina Ahmed Alkhodary

Abstract:

Human Resources are the individual skills, knowledge, attitude, capabilities and experience collected to produce wealth to the company. Human Resource disclosure is the process of involving, reporting, and sharing the Investments made in the Human Resources of an Organization that such as organizations short goals and objectives, employees creation value, training and development plan are presently not accounted for in the conventional accounting practices which is importance nowadays to reduce the employee`s turnover. For the purpose of the study 3 telecommunications companies in Jordan have been selected. Telecommunication industry has been chosen for this study since it is a successful sector in Jordan and Human resource disclosure practices were adopted in all the selected companies and companies was aware to the HR practices. The objective of the study is to find out the HR disclosures practices of the telecommunication Companies in Jordan and to find the relationship between the HR Disclosures practices and employees’ turnover which has been measured by leaver proficiencies, remaining member proficiencies and the new comers proficiencies. The researcher has used the questioner to collect data for the research purpose. Results reveal that There are human resource disclosure practices in telecommunication companies in Jordan but in some areas only and has found There that there is a significant relationship between the human resource disclosure practices of the telecommunication companies in Jordan and Employees turnover. It is important to the companies to disclose more information and it’s important to the researchers to study the HR disclosure in the other industries in Jordan to increase the awareness about it.

Keywords: HR, disclosure, employee, turnover

Procedia PDF Downloads 294
1607 Sustainable Approach in Textile and Apparel Industry: Case Study Applied to a Medium Enterprise

Authors: Maged Kamal

Abstract:

Previous research papers have suggested that enhancing the environmental performance in textiles and apparel industry would affect positively on the overall enterprise competitiveness. However, there is a gap in the literature regarding simplifying the available theory to get it practically implemented with more confidence of the expected results, especially for small and medium enterprises. The aim of this paper is to simplify and best use of the concerned international norms to produce a systematic approach that could be used as a guideline for practical application of the main sustainable principles in medium size textile business. The increasing in efficiency which has been resulted from the implementation of the suggested approach/model originated from reduction in raw materials usage, energy, and water savings, in addition to the risk reduction for the people and the environment. The practical case study has been implemented in a textile factory producing knitted fabrics, readymade garments, dyed and printed fabrics. The results were analyzed to examine the effect of the suggested change on the enterprise profitability.

Keywords: apparel industry, environmental management, sustainability, textiles

Procedia PDF Downloads 270