Search results for: employer information requirements
11554 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications
Authors: Chieh-Fu Chang, Wan-Hsin Hsieh
Abstract:
We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.Keywords: security, IWE, cliff effect, space communications
Procedia PDF Downloads 43011553 Input Energy Requirements and Performance of Different Soil Tillage Systems on Yield of Maize Crop
Authors: Shafique Qadir Memon, Muhammad Safar Mirjat, Abdul Quadir Mughal, Nadeem Amjad
Abstract:
The aims of this study were to determine direct input energy and indirect energy in maize production, to evaluate the inputs energy consumption and outputs energy gained for maize production in Islamabad, Pakistan for spring 2013. Results showed that grain yield was maximum under deep tillage as compared to conventional and zero tillage. Total energy input/output were maximum in deep tillage as compared to conventional tillage while lowest in zero tillage, net energy gain were found maximum under deep tillage.Keywords: tillage, energy, grain yield, net energy gain
Procedia PDF Downloads 46711552 Integration of Technology into Nursing Education: A Collaboration between College of Nursing and University Research Center
Authors: Lori Lioce, Gary Maddux, Norven Goddard, Ishella Fogle, Bernard Schroer
Abstract:
This paper presents the integration of technologies into nursing education. The collaborative effort includes the College of Nursing (CoN) at the University of Alabama in Huntsville (UAH) and the UAH Systems Management and Production Center (SMAP). The faculty at the CoN conducts needs assessments to identify education and training requirements. A team of CoN faculty and SMAP engineers then prioritize these requirements and establish improvement/development teams. The development teams consist of nurses to evaluate the models and to provide feedback and of undergraduate engineering students and their senior staff mentors from SMAP. The SMAP engineering staff develops and creates the physical models using 3D printing, silicone molds and specialized molding mixtures and techniques. The collaboration has focused on developing teaching and training, or clinical, simulators. In addition, the onset of the Covid-19 pandemic has intensified this relationship, as 3D modeling shifted to supplied personal protection equipment (PPE) to local health care providers. A secondary collaboration has been introducing students to clinical benchmarking through the UAH Center for Management and Economic Research. As a result of these successful collaborations the Model Exchange & Development of Nursing & Engineering Technology (MEDNET) has been established. MEDNET seeks to extend and expand the linkage between engineering and nursing to K-12 schools, technical schools and medical facilities in the region to the resources available from the CoN and SMAP. As an example, stereolithography (STL) files of the 3D printed models, along with the specifications to fabricate models, are available on the MEDNET website. Ten 3D printed models have been developed and are currently in use by the CoN. The following additional training simulators are currently under development:1) suture pads, 2) gelatin wound models and 3) printed wound tattoos. Specification sheets have been written for these simulations that describe the use, fabrication procedures and parts list. These specifications are available for viewing and download on MEDNET. Included in this paper are 1) descriptions of CoN, SMAP and MEDNET, 2) collaborative process used in product improvement/development, 3) 3D printed models of training and teaching simulators, 4) training simulators under development with specification sheets, 5) family care practice benchmarking, 6) integrating the simulators into the nursing curriculum, 7) utilizing MEDNET as a pandemic response, and 8) conclusions and lessons learned.Keywords: 3D printing, nursing education, simulation, trainers
Procedia PDF Downloads 12411551 Ensuring Sustainable Urban Mobility in Indian Cities: Need for Creating People Friendly Roadside Public Spaces
Authors: Pushplata Garg
Abstract:
Mobility, is an integral part of living and sustainability of urban mobility, is essential not only for, but also for addressing global warming and climate change. However, very little is understood about the obstacles/hurdles and likely challenges in the success of plans for sustainable urban mobility in Indian cities from the public perspective. Whereas some of the problems and issues are common to all cities, others vary considerably with financial status, function, the size of cities and culture of a place. Problems and issues similar in all cities relate to availability, efficiency and safety of public transport, last mile connectivity, universal accessibility, and essential planning and design requirements of pedestrians and cyclists are same. However, certain aspects like the type of means of public transportation, priority for cycling and walking, type of roadside activities, are influenced by the size of the town, average educational and income level of public, financial status of the local authorities, and culture of a place. The extent of public awareness, civic sense, maintenance of public spaces and law enforcement vary significantly from large metropolitan cities to small and medium towns in countries like India. Besides, design requirements for shading, location of public open spaces and sitting areas, street furniture, landscaping also vary depending on the climate of the place. Last mile connectivity plays a major role in success/ effectiveness of public transport system in a city. In addition to the provision of pedestrian footpaths connecting important destinations, sitting spaces and necessary amenities/facilities along footpaths; pedestrian movement to public transit stations is encouraged by the presence of quality roadside public spaces. It is not only the visual attractiveness of streetscape or landscape or the public open spaces along pedestrian movement channels but the activities along that make a street vibrant and attractive. These along with adequate spaces to rest and relax encourage people to walk as is observed in cities with successful public transportation systems. The paper discusses problems and issues of pedestrians for last mile connectivity in the context of Delhi, Chandigarh, Gurgaon, and Roorkee- four Indian cities representing varying urban contexts, that is, of metropolitan, large and small cities.Keywords: pedestrianisation, roadside public spaces, last mile connectivity, sustainable urban mobility
Procedia PDF Downloads 25611550 Building Information Modelling Implementation in the Lifecycle of Sustainable Buildings
Authors: Scarlet Alejandra Romano, Joni Kareco
Abstract:
The three pillars of sustainability (social, economic and environmental) are relevant concepts to the Architecture, Engineering, and Construction (AEC) industry because of the increase of international agreements and guidelines related to this topic during the last years. Considering these three pillars, the AEC industry faces important challenges, for instance, to decrease the carbon emissions (environmental challenge), design sustainable spaces for people (social challenge), and improve the technology of this field to reduce costs and environmental problems (economic and environmental challenge). One alternative to overcome these challenges is Building Information Modelling program (BIM) because according to several authors, this technology improves the performance of the sustainable buildings in all their lifecycle phases. The main objective of this paper is to explore and analyse the current advantages and disadvantages of the BIM implementation in the life-cycle of sustainable buildings considering the three pillars of sustainability as analysis parameters. The methodology established to achieve this objective is exploratory-descriptive with the literature review technique. The partial results illustrate that despite the BIM disadvantages and the lack of information about its social sustainability advantages, this software represents a significant opportunity to improve the three sustainable pillars of the sustainable buildings.Keywords: building information modelling, building lifecycle analysis, sustainability, sustainable buildings
Procedia PDF Downloads 19011549 A Comparative Study between Different Techniques of Off-Page and On-Page Search Engine Optimization
Authors: Ahmed Ishtiaq, Maeeda Khalid, Umair Sajjad
Abstract:
In the fast-moving world, information is the key to success. If information is easily available, then it makes work easy. The Internet is the biggest collection and source of information nowadays, and with every single day, the data on internet increases, and it becomes difficult to find required data. Everyone wants to make his/her website at the top of search results. This can be possible when you have applied some techniques of SEO inside your application or outside your application, which are two types of SEO, onsite and offsite SEO. SEO is an abbreviation of Search Engine Optimization, and it is a set of techniques, methods to increase users of a website on World Wide Web or to rank up your website in search engine indexing. In this paper, we have compared different techniques of Onpage and Offpage SEO, and we have suggested many things that should be changed inside webpage, outside web page and mentioned some most powerful and search engine considerable elements and techniques in both types of SEO in order to gain high ranking on Search Engine.Keywords: auto-suggestion, search engine optimization, SEO, query, web mining, web crawler
Procedia PDF Downloads 15511548 User Selections on Social Network Applications
Authors: C. C. Liang
Abstract:
MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.Keywords: consumer behavior, social media, technology acceptance model, flow experience
Procedia PDF Downloads 35911547 Unsupervised Assistive and Adaptative Intelligent Agent in Smart Enviroment
Authors: Sebastião Pais, João Casal, Ricardo Ponciano, Sérgio Lorenço
Abstract:
The adaptation paradigm is a basic defining feature for pervasive computing systems. Adaptation systems must work efficiently in a smart environment while providing suitable information relevant to the user system interaction. The key objective is to deduce the information needed information changes. Therefore relying on fixed operational models would be inappropriate. This paper presents a study on developing an Intelligent Personal Assistant to assist the user in interacting with their Smart Environment. We propose an Unsupervised and Language-Independent Adaptation through Intelligent Speech Interface and a set of methods of Acquiring Knowledge, namely Semantic Similarity and Unsupervised Learning.Keywords: intelligent personal assistants, intelligent speech interface, unsupervised learning, language-independent, knowledge acquisition, association measures, symmetric word similarities, attributional word similarities
Procedia PDF Downloads 56611546 Zeros Elimination from the National Currency
Authors: Zahra Karimi
Abstract:
The purpose of this paper is to investigate the role and importance of accounting for the implementation of the VAT system in the country. For this purpose, after the evaluation of specifications and important advantages of the VAT and the experience of other countries, important role of accounting in the precise determination of taxes, strategies to prevent escape of tax and realization of tax revenues of government, necessary control to increase the efficiency and accuracy of the calculations discussed. High-dependence of government to borrowing from the banking system and inflation tax and a low general ratio of tax revenues to GDP, indicating the inadequacy of the country's tax system. It can be said that being of a proper accounting system consider as a prerequisite for successful implementation of VAT in the country. So it's crucial for accountants with responsibility announce its full fitness to meet the requirements. For successful implementation of VAT as such a multi-stage sales tax and the tax on the price.Keywords: accounting, tax reform in Iran, Value Added Tax (VAT), economic
Procedia PDF Downloads 38811545 Hardware Implementation for the Contact Force Reconstruction in Tactile Sensor Arrays
Authors: María-Luisa Pinto-Salamanca, Wilson-Javier Pérez-Holguín
Abstract:
Reconstruction of contact forces is a fundamental technique for analyzing the properties of a touched object and is essential for regulating the grip force in slip control loops. This is based on the processing of the distribution, intensity, and direction of the forces during the capture of the sensors. Currently, efficient hardware alternatives have been used more frequently in different fields of application, allowing the implementation of computationally complex algorithms, as is the case with tactile signal processing. The use of hardware for smart tactile sensing systems is a research area that promises to improve the processing time and portability requirements of applications such as artificial skin and robotics, among others. The literature review shows that hardware implementations are present today in almost all stages of smart tactile detection systems except in the force reconstruction process, a stage in which they have been less applied. This work presents a hardware implementation of a model-driven reported in the literature for the contact force reconstruction of flat and rigid tactile sensor arrays from normal stress data. From the analysis of a software implementation of such a model, this implementation proposes the parallelization of tasks that facilitate the execution of matrix operations and a two-dimensional optimization function to obtain a vector force by each taxel in the array. This work seeks to take advantage of the parallel hardware characteristics of Field Programmable Gate Arrays, FPGAs, and the possibility of applying appropriate techniques for algorithms parallelization using as a guide the rules of generalization, efficiency, and scalability in the tactile decoding process and considering the low latency, low power consumption, and real-time execution as the main parameters of design. The results show a maximum estimation error of 32% in the tangential forces and 22% in the normal forces with respect to the simulation by the Finite Element Modeling (FEM) technique of Hertzian and non-Hertzian contact events, over sensor arrays of 10×10 taxels of different sizes. The hardware implementation was carried out on an MPSoC XCZU9EG-2FFVB1156 platform of Xilinx® that allows the reconstruction of force vectors following a scalable approach, from the information captured by means of tactile sensor arrays composed of up to 48 × 48 taxels that use various transduction technologies. The proposed implementation demonstrates a reduction in estimation time of x / 180 compared to software implementations. Despite the relatively high values of the estimation errors, the information provided by this implementation on the tangential and normal tractions and the triaxial reconstruction of forces allows to adequately reconstruct the tactile properties of the touched object, which are similar to those obtained in the software implementation and in the two FEM simulations taken as reference. Although errors could be reduced, the proposed implementation is useful for decoding contact forces for portable tactile sensing systems, thus helping to expand electronic skin applications in robotic and biomedical contexts.Keywords: contact forces reconstruction, forces estimation, tactile sensor array, hardware implementation
Procedia PDF Downloads 20111544 A Framework for Secure Information Flow Analysis in Web Applications
Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa
Abstract:
Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.Keywords: web applications security, secure information flow, program dependence graph, database annotation
Procedia PDF Downloads 47311543 Information Pollution: Exploratory Analysis of Subs-Saharan African Media’s Capabilities to Combat Misinformation and Disinformation
Authors: Muhammed Jamiu Mustapha, Jamiu Folarin, Stephen Obiri Agyei, Rasheed Ademola Adebiyi, Mutiu Iyanda Lasisi
Abstract:
The role of information in societal development and growth cannot be over-emphasized. It has remained an age-long strategy to adopt the information flow to make an egalitarian society. The same has become a tool for throwing society into chaos and anarchy. It has been adopted as a weapon of war and a veritable instrument of psychological warfare with a variety of uses. That is why some scholars posit that information could be deployed as a weapon to wreak “Mass Destruction" or promote “Mass Development". When used as a tool for destruction, the effect on society is like an atomic bomb which when it is released, pollutes the air and suffocates the people. Technological advancement has further exposed the latent power of information and many societies seem to be overwhelmed by its negative effect. While information remains one of the bedrock of democracy, the information ecosystem across the world is currently facing a more difficult battle than ever before due to information pluralism and technological advancement. The more the agents involved try to combat its menace, the difficult and complex it is proving to be curbed. In a region like Africa with dangling democracy enfolds with complexities of multi-religion, multi-cultures, inter-tribes, ongoing issues that are yet to be resolved, it is important to pay critical attention to the case of information disorder and find appropriate ways to curb or mitigate its effects. The media, being the middleman in the distribution of information, needs to build capacities and capabilities to separate the whiff of misinformation and disinformation from the grains of truthful data. From quasi-statistical senses, it has been observed that the efforts aimed at fighting information pollution have not considered the built resilience of media organisations against this disorder. Apparently, the efforts, resources and technologies adopted for the conception, production and spread of information pollution are much more sophisticated than approaches to suppress and even reduce its effects on society. Thus, this study seeks to interrogate the phenomenon of information pollution and the capabilities of select media organisations in Sub-Saharan Africa. In doing this, the following questions are probed; what are the media actions to curb the menace of information pollution? Which of these actions are working and how effective are they? And which of the actions are not working and why they are not working? Adopting quantitative and qualitative approaches and anchored on the Dynamic Capability Theory, the study aims at digging up insights to further understand the complexities of information pollution, media capabilities and strategic resources for managing misinformation and disinformation in the region. The quantitative approach involves surveys and the use of questionnaires to get data from journalists on their understanding of misinformation/disinformation and their capabilities to gate-keep. Case Analysis of select media and content analysis of their strategic resources to manage misinformation and disinformation is adopted in the study while the qualitative approach will involve an In-depth Interview to have a more robust analysis is also considered. The study is critical in the fight against information pollution for a number of reasons. One, it is a novel attempt to document the level of media capabilities to fight the phenomenon of information disorder. Two, the study will enable the region to have a clear understanding of the capabilities of existing media organizations to combat misinformation and disinformation in the countries that make up the region. Recommendations emanating from the study could be used to initiate, intensify or review existing approaches to combat the menace of information pollution in the region.Keywords: disinformation, information pollution, misinformation, media capabilities, sub-Saharan Africa
Procedia PDF Downloads 16711542 Unsupervised Assistive and Adaptive Intelligent Agent in Smart Environment
Authors: Sebastião Pais, João Casal, Ricardo Ponciano, Sérgio Lourenço
Abstract:
The adaptation paradigm is a basic defining feature for pervasive computing systems. Adaptation systems must work efficiently in smart environment while providing suitable information relevant to the user system interaction. The key objective is to deduce the information needed information changes. Therefore, relying on fixed operational models would be inappropriate. This paper presents a study on developing a Intelligent Personal Assistant to assist the user in interacting with their Smart Environment. We propose a Unsupervised and Language-Independent Adaptation through Intelligent Speech Interface and a set of methods of Acquiring Knowledge, namely Semantic Similarity and Unsupervised Learning.Keywords: intelligent personal assistants, intelligent speech interface, unsupervised learning, language-independent, knowledge acquisition, association measures, symmetric word similarities, attributional word similarities
Procedia PDF Downloads 64911541 SMEs Access to Finance in Croatia – Model Approach
Authors: Vinko Vidučić, Ljiljana Vidučić, Damir Boras
Abstract:
The goals of the research include the determination of the characteristics of SMEs finance in Croatia, as well as the determination of indirect growth rates of the information model of the entrepreneurs` perception of business environment. The research results show that cost of finance and access to finance are most important constraining factor in setting up and running the business of small entrepreneurs in Croatia. Furthermore, small entrepreneurs in Croatia are significantly dissatisfied with the administrative barriers although relatively to a lesser extent than was the case in the pre-crisis time. High collateral requirement represents the main characteristic of bank lending concerning SMEs followed by long credit elaboration process. Formulated information model has defined the individual impact of indirect growth rates of the remaining variables on the model’s specific variable.Keywords: business environment, information model, indirect growth rates, SME finance
Procedia PDF Downloads 37511540 Integrated Model for Enhancing Data Security Performance in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 48211539 Current Environmental Accounting Disclosure Requirements and Compliance by Nigerian Oil Companies
Authors: Amina Jibrin Ahmed
Abstract:
The environment is mankind's natural habitat. Industrial activities over time have taken their toll on it in the form of deterioration and degradation. The petroleum industry is particularly notorious for its negative impact on its host environments. The realization that this poses a threat to sustainability led to the increased awareness and subsequent recognition of the importance of environmental disclosure in financial statements. This paper examines the laws and regulations put in place by the Nigerian Government to mitigate this impact, and the level of compliance by Shell Nigeria, the pioneer and largest oil company in the country. Based on the disclosure made, this paper finds there is indeed a high level of compliance by that company, and voluntary disclosure moreover.Keywords: environmental accounting, legitimacy theory, environmental impact assessment, environmental disclosure, host communities
Procedia PDF Downloads 52111538 Solar Power Forecasting for the Bidding Zones of the Italian Electricity Market with an Analog Ensemble Approach
Authors: Elena Collino, Dario A. Ronzio, Goffredo Decimi, Maurizio Riva
Abstract:
The rapid increase of renewable energy in Italy is led by wind and solar installations. The 2017 Italian energy strategy foresees a further development of these sustainable technologies, especially solar. This fact has resulted in new opportunities, challenges, and different problems to deal with. The growth of renewables allows to meet the European requirements regarding energy and environmental policy, but these types of sources are difficult to manage because they are intermittent and non-programmable. Operationally, these characteristics can lead to instability on the voltage profile and increasing uncertainty on energy reserve scheduling. The increasing renewable production must be considered with more and more attention especially by the Transmission System Operator (TSO). The TSO, in fact, every day provides orders on energy dispatch, once the market outcome has been determined, on extended areas, defined mainly on the basis of power transmission limitations. In Italy, six market zone are defined: Northern-Italy, Central-Northern Italy, Central-Southern Italy, Southern Italy, Sardinia, and Sicily. An accurate hourly renewable power forecasting for the day-ahead on these extended areas brings an improvement both in terms of dispatching and reserve management. In this study, an operational forecasting tool of the hourly solar output for the six Italian market zones is presented, and the performance is analysed. The implementation is carried out by means of a numerical weather prediction model, coupled with a statistical post-processing in order to derive the power forecast on the basis of the meteorological projection. The weather forecast is obtained from the limited area model RAMS on the Italian territory, initialized with IFS-ECMWF boundary conditions. The post-processing calculates the solar power production with the Analog Ensemble technique (AN). This statistical approach forecasts the production using a probability distribution of the measured production registered in the past when the weather scenario looked very similar to the forecasted one. The similarity is evaluated for the components of the solar radiation: global (GHI), diffuse (DIF) and direct normal (DNI) irradiation, together with the corresponding azimuth and zenith solar angles. These are, in fact, the main factors that affect the solar production. Considering that the AN performance is strictly related to the length and quality of the historical data a training period of more than one year has been used. The training set is made by historical Numerical Weather Prediction (NWP) forecasts at 12 UTC for the GHI, DIF and DNI variables over the Italian territory together with corresponding hourly measured production for each of the six zones. The AN technique makes it possible to estimate the aggregate solar production in the area, without information about the technologic characteristics of the all solar parks present in each area. Besides, this information is often only partially available. Every day, the hourly solar power forecast for the six Italian market zones is made publicly available through a website.Keywords: analog ensemble, electricity market, PV forecast, solar energy
Procedia PDF Downloads 16211537 Automated Building Internal Layout Design Incorporating Post-Earthquake Evacuation Considerations
Authors: Sajjad Hassanpour, Vicente A. González, Yang Zou, Jiamou Liu
Abstract:
Earthquakes pose a significant threat to both structural and non-structural elements in buildings, putting human lives at risk. Effective post-earthquake evacuation is critical for ensuring the safety of building occupants. However, current design practices often neglect the integration of post-earthquake evacuation considerations into the early-stage architectural design process. To address this gap, this paper presents a novel automated internal architectural layout generation tool that optimizes post-earthquake evacuation performance. The tool takes an initial plain floor plan as input, along with specific requirements from the user/architect, such as minimum room dimensions, corridor width, and exit lengths. Based on these inputs, firstly, the tool randomly generates different architectural layouts. Secondly, the human post-earthquake evacuation behaviour will be thoroughly assessed for each generated layout using the advanced Agent-Based Building Earthquake Evacuation Simulation (AB2E2S) model. The AB2E2S prototype is a post-earthquake evacuation simulation tool that incorporates variables related to earthquake intensity, architectural layout, and human factors. It leverages a hierarchical agent-based simulation approach, incorporating reinforcement learning to mimic human behaviour during evacuation. The model evaluates different layout options and provides feedback on evacuation flow, time, and possible casualties due to earthquake non-structural damage. By integrating the AB2E2S model into the automated layout generation tool, architects and designers can obtain optimized architectural layouts that prioritize post-earthquake evacuation performance. Through the use of the tool, architects and designers can explore various design alternatives, considering different minimum room requirements, corridor widths, and exit lengths. This approach ensures that evacuation considerations are embedded in the early stages of the design process. In conclusion, this research presents an innovative automated internal architectural layout generation tool that integrates post-earthquake evacuation simulation. By incorporating evacuation considerations into the early-stage design process, architects and designers can optimize building layouts for improved post-earthquake evacuation performance. This tool empowers professionals to create resilient designs that prioritize the safety of building occupants in the face of seismic events.Keywords: agent-based simulation, automation in design, architectural layout, post-earthquake evacuation behavior
Procedia PDF Downloads 10911536 Leadership and Whether It Stems from Innate Abilities or from Situation
Authors: Salwa Abdelbaki
Abstract:
This research investigated how leaders develop, asking whether they have been leaders due to their innate abilities or they gain leadership characteristics through interactions based on requirements of a situation. If the first is true, then a leader should be successful in any situation. Otherwise, a leader may succeed only in a specific situation. A series of experiments were carried out on three groups including of males and females. First; a group of 148 students with different specializations had to select a leader. Another group of 51 students had to recall their previous experiences and their knowledge of each other to identify who were leaders in different situations. Then a series of analytic tools were applied to the identified leaders and to the whole groups to find out how leaders were developed. A group of 40 young children was also experimented with to find young leaders among them and to analyze their characteristics.Keywords: leadership, innate characteristics, situation, leadership theories
Procedia PDF Downloads 29011535 Simulation of Surge Protection for a Direct Current Circuit
Authors: Pedro Luis Ferrer Penalver, Edmundo da Silva Braga
Abstract:
In this paper, the performance of a simple surge protection for a direct current circuit was simulated. The protection circuit was developed from modified electric macro models of a gas discharge tube and a transient voltage suppressor diode. Moreover, a combination wave generator circuit was used as source of energy surges. The simulations showed that the circuit presented ensures immunity corresponding with test level IV of the IEC 61000-4-5:2014 international standard. The developed circuit can be modified to meet the requirements of any other equipment to be protected. Similarly, the parameters of the combination wave generator can be changed to provide different surge amplitudes.Keywords: combination wave generator, IEC 61000-4-5, Pspice simulation, surge protection
Procedia PDF Downloads 33311534 Computer Simulation Studies of Aircraft Wing Architectures on Vibration Responses
Authors: Shengyong Zhang, Mike Mikulich
Abstract:
Vibration is a crucial limiting consideration in the analysis and design of airplane wing structures to avoid disastrous failures due to the propagation of existing cracks in the material. In this paper, we build CAD models of aircraft wings to capture the design intent with configurations. Subsequent FEA vibration analysis is performed to study the natural vibration properties and impulsive responses of the resulting user-defined wing models. This study reveals the variations of the wing’s vibration characteristics with respect to changes in its structural configurations. Integrating CAD modelling and FEA vibration analysis enables designers to improve wing architectures for implementing design requirements in the preliminary design stage.Keywords: aircraft wing, CAD modelling, FEA, vibration analysis
Procedia PDF Downloads 16811533 Effective Governance through Mobile Phones: Cases Supporting the Introduction and Implementation
Authors: Mohd Mudasir Shafi, Zafrul Hasan, Talat Saleem
Abstract:
Information and communication Technology (ICT) services have been defined as a route to good governance. Introduction of ICT into Governance has given rise to the idea of e-governance which helps in enhancing transparency, generating accountability and responsiveness in the system in order to provide faster and quality service to the citizen. Advancement in ICT has provided governments all over the world to speed up the delivery of information and services to citizens and businesses and increase their participation in governance. There has been varying degree of success over the past decade into providing services to the citizens using internet and different web services. These e-government initiatives have been extensively researched. Our research is aimed at the transition from electronic government to mobile government (m-government) initiatives implementing the mobile services and concerned to understand the major factors which will aid to adoption and distribution of these services. There must be some amount of research done in the integration process between e-government and m-government. There must also be enough amount of investigation done all the factors that could affect the transition process. Such factors differ between different places and the advancement in information and technology available there. In this paper, we have discussed why mobile communication system can be used for effective e-governance and the areas where m-governance can be implemented. The paper will examine some of the reasons as well as the main opportunities for improving effective governance through mobile phones.Keywords: e-governance, mobile phones, information technology, m-government
Procedia PDF Downloads 44611532 Bridging the Gaping Levels of Information Entree for Visually Impaired Students in the Sri Lankan University Libraries
Authors: Wilfred Jeyatheese Jeyaraj
Abstract:
Education is a key determinant of future success, and every person deserves non-discriminant access to information for educational inevitabilities in any case. Analysing and understanding complex information is a crucial learning tool, especially for students. In order to compete equally with sighted students, visually impaired students require the unhinged access to access to all the available information resources. When the education of visually impaired students comes to a focal point, it can be stated that visually impaired students encounter several obstacles and barriers before they enter the university and during their time there as students. These obstacles and barriers are spread across technical, organizational and social arenas. This study reveals the possible approaches to absorb and benefit from the information provided by the Sri Lankan University Libraries for visually impaired students. Purposive sampling technique was used to select sample visually impaired students attached to the Sri Lankan National universities. There are 07 National universities which accommodate the visually impaired students and with the identified data, they were selected for this study and 80 visually impaired students were selected as the sample group. Descriptive type survey method was used to collect data. Structured questionnaires, interviews and direct observation were used as research instruments. As far as the Sri Lankan context spread is concerned, visually impaired students are able to finish their courses through their own determination to overcome the barriers they encounter on their way to graduation, through moral and practical support from their own friends and very often through a high level of creativity. According to the findings there are no specially trained university librarians to serve visually impaired users and less number of assistive technology equipment are available at present. This paper enables all university libraries in Sri Lanka to be informed about the social isolation of visually compromised students at the Sri Lankan universities and focuses on the rectification issues by considering their distinct case for interaction.Keywords: information access, Sri Lanka, university libraries, visual impairment
Procedia PDF Downloads 24011531 Potential of Visualization and Information Modeling on Productivity Improvement and Cost Saving: A Case Study of a Multi-Residential Construction Project
Authors: Sara Rankohi, Lloyd Waugh
Abstract:
Construction sites are information saturated. Digitalization is hitting construction sites to meet the incredible demand of knowledge sharing and information documentations. From flying drones, 3D Lasers scanners, pocket mobile applications, to augmented reality glasses and smart helmet, visualization technologies help real-time information imposed straight onto construction professional’s field of vision. Although these technologies are very applicable and can have the direct impact on project cost and productivity, experience shows that only a minority of construction professionals quickly adapt themselves to benefit from them in practice. The majority of construction managers still tend to apply traditional construction management methods. This paper investigates a) current applications of visualization technologies in construction projects management, b) the direct effect of these technologies on productivity improvement and cost saving of a multi-residential building project via a case study on Mac Taggart Senior Care project located in Edmonton, Alberta. The research shows the imaged based technologies have a direct impact on improving project productivity and cost savings.Keywords: image-based technologies, project management, cost, productivity improvement
Procedia PDF Downloads 36611530 Opto-Mechanical Characterization of Aspheric Lenses from the Hybrid Method
Authors: Aliouane Toufik, Hamdi Amine, Bouzid Djamel
Abstract:
Aspheric optical components are an alternative to the use of conventional lenses in the implementation of imaging systems for the visible range. Spherical lenses are capable of producing aberrations. Therefore, they are not able to focus all the light into a single point. Instead, aspherical lenses correct aberrations and provide better resolution even with compact lenses incorporating a small number of lenses. Metrology of these components is very difficult especially when the resolution requirements increase and insufficient or complexity of conventional tools requires the development of specific approaches to characterization. This work is part of the problem existed because the objectives are the study and comparison of different methods used to measure surface rays hybrid aspherical lenses.Keywords: manufacture of lenses, aspherical surface, precision molding, radius of curvature, roughness
Procedia PDF Downloads 47211529 Intestacy and Business Continuity among Entrepreneurs in Ondo State, Nigeria
Authors: Igbekoyi Olusola Esther, Olurankinse Felix
Abstract:
This paper examined the factors that militate against Will writing among entrepreneurs in Ondo State Nigeria and the effect of intestate death on business continuity after the exit of the entrepreneurs. The paper was written with a view to providing information on the reasons why intestate death is common among entrepreneurs in Ondo State and the effects on continuity of business after death of the initial owners. Data were obtained from primary source through the administration of questionnaires to entrepreneurs drawn from 50 registered manufacturing companies. These companies have been in existence for a minimum of 10 years with minimum staff strength of 20 workers each. These companies were selected using the purposive random sampling technique in order to capture firms that meet the requirements of this paper. Data obtained were analyzed using descriptive statistics, chi-square and regression analysis. The findings of the paper revealed that administration of Will, traditional beliefs, Will execution procedures, age and non- admissibility of Wills in court are the major factors that militates against Will writing among entrepreneurs in Ondo State. It was also discovered that chaos and instability in business, reduction in sales and productivity, poor succession planning, polygamous nature of marriages, difficulty in sourcing for funds and gender preference are joint predictors of business continuity in event intestate death which is evident in the result where R2 =.954;(F 6, 26)= 89.644; (P < 0.01). The individual beta co-efficient, t- statistics and significance of each variable revealed that gender preference (.735; 7.031; .000) and poor succession plan (.402; 2.840; .009) have significant positive effect on business continuity; while reduction in sales and productivity (-.059; -.335; .740) and difficulty in sourcing for funds (-.217; -1.367; .188) have negative effect; other variables also have positive relationship but they are not significant. It is therefore concluded that business continuity after the exit of the entrepreneur is highly dependent on the rebuilding of confidence on Wills administration in ondo state Nigeria, proper succession planning and elimination of gender preferences.Keywords: intestacy, business continuity, entrepreneurs, will, succession planning
Procedia PDF Downloads 33411528 Intelligent and Optimized Placement for CPLD Devices
Authors: Abdelkader Hadjoudja, Hajar Bouazza
Abstract:
The PLD/CPLD devices are widely used for logic synthesis since several decades. Based on sum of product terms (PTs) architecture, the PLD/CPLD offer a high degree of flexibility to support various application requirements. They are suitable for large combinational logic, finite state machines as well as intensive I/O designs. CPLDs offer very predictable timing characteristics and are therefore ideal for critical control applications. This paper describes how the logic synthesis techniques, such as 1) XOR detection, 2) logic doubling, 3) complement of a Boolean function are combined, applied and used to optimize the CPLDs devices architecture that is based on PAL-like macrocells. Our goal is to use these techniques for minimizing the number of macrocells required to implement a circuit and minimize the delay of mapped circuit.Keywords: CPLD, doubling, optimization, XOR
Procedia PDF Downloads 28611527 Study on Adding Story and Seismic Strengthening of Old Masonry Buildings
Authors: Youlu Huang, Huanjun Jiang
Abstract:
A large number of old masonry buildings built in the last century still remain in the city. It generates the problems of unsafety, obsolescence, and non-habitability. In recent years, many old buildings have been reconstructed through renovating façade, strengthening, and adding floors. However, most projects only provide a solution for a single problem. It is difficult to comprehensively solve problems of poor safety and lack of building functions. Therefore, a comprehensive functional renovation program of adding reinforced concrete frame story at the bottom via integrally lifting the building and then strengthening the building was put forward. Based on field measurement and YJK calculation software, the seismic performance of an actual three-story masonry structure in Shanghai was identified. The results show that the material strength of masonry is low, and the bearing capacity of some masonry walls could not meet the code requirements. The elastoplastic time history analysis of the structure was carried out by using SAP2000 software. The results show that under the 7 degrees rare earthquake, the seismic performance of the structure reaches 'serious damage' performance level. Based on the code requirements of the stiffness ration of the bottom frame (lateral stiffness ration of the transition masonry story and frame story), the bottom frame story was designed. The integral lifting process of the masonry building was introduced based on many engineering examples. The reinforced methods for the bottom frame structure strengthened by the steel-reinforced mesh mortar surface layer (SRMM) and base isolators, respectively, were proposed. The time history analysis of the two kinds of structures, under the frequent earthquake, the fortification earthquake, and the rare earthquake, was conducted by SAP2000 software. For the bottom frame structure, the results show that the seismic response of the masonry floor is significantly reduced after reinforced by the two methods compared to the masonry structure. The previous earthquake disaster indicated that the bottom frame is vulnerable to serious damage under a strong earthquake. The analysis results showed that under the rare earthquake, the inter-story displacement angle of the bottom frame floor meets the 1/100 limit value of the seismic code. The inter-story drift of the masonry floor for the base isolated structure under different levels of earthquakes is similar to that of structure with SRMM, while the base-isolated program is better to protect the bottom frame. Both reinforced methods could significantly improve the seismic performance of the bottom frame structure.Keywords: old buildings, adding story, seismic strengthening, seismic performance
Procedia PDF Downloads 12411526 Sukuk Issuance and Its Regulatory Framework in Saudi Arabia
Authors: Ali Alshamrani
Abstract:
This article aims to give a comprehensive and critical review of sukuk issuance in Saudi Arabia, and the extent to which the issuance of sukuk in Saudi Arabia is consistent with Shariah requirements. The article is divided into two sections. Accordingly, the first section of this article begins with an examination of sukuk in general, and includes the concept of sukuk, the basic principles of sukuk, common types of sukuk, and a critical analysis of the most important differences between sukuk and conventional bonds. The second section gives a critical analysis of how sukuk work in Saudi Arabia, offering the regulatory framework of the issuance of sukuk in the KSA, and the legal challenges from Shariah point of view, and provide recommendations to overcome these challenges.Keywords: sukuk issuance, Shariah, Saudi Arabia, capital market authority
Procedia PDF Downloads 47511525 The Secrecy Capacity of the Semi-Deterministic Wiretap Channel with Three State Information
Authors: Mustafa El-Halabi
Abstract:
A general model of wiretap channel with states is considered, where the legitimate receiver and the wiretapper’s observations depend on three states S1, S2 and S3. State S1 is non-causally known to the encoder, S2 is known to the receiver, and S3 remains unknown. A secure coding scheme, based using structured-binning, is proposed, and it is shown to achieve the secrecy capacity when the signal at legitimate receiver is a deterministic function of the input.Keywords: physical layer security, interference, side information, secrecy capacity
Procedia PDF Downloads 392