Search results for: settlement architecture cluster
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3023

Search results for: settlement architecture cluster

1343 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 476
1342 The Effect of Intimate Partner Violence on Child Abuse in South Korea: Focused on the Moderating Effects of Patriarchal Attitude and Informal Social Control

Authors: Hye Lin Yang, Clifton R. Emery

Abstract:

Purpose: The purpose of this study is to examine the effects of intimate partner violence on child abuse, whether patriarchal attitude and informal social control moderate the relationship between intimate partner violence and child abuse. This study was conducted with data from The Seoul Families and Neighborhoods Study (SFNS). The SFNS is a representative random probability 3-stage cluster sample of 541 cohabiting couples in Seoul, South Korea collected in 2012. To verify research models, Random effect analysis were used. All analyses were performed using the Stata program. Results: Crucial findings are the following. First, intimate partner violence showed a significantly positive relationship with Child abuse. Second, there are significant moderating effects of informal social control on intimate partner violence - child abuse. Third, there are significant moderating effects of patriarchal attitude on intimate partner violence - child abuse. In other words, Patriarchal attitude is a significant risk factor of child abuse and informal social control is a significant Protection factor of child abuse. Based on results, the policy and practical implications for preventing child abuse, promoting informal social control were discussed.

Keywords: Intimate partner violence, child abuse, informal social control, patriarchal attitude

Procedia PDF Downloads 267
1341 Dissimilarity Measure for General Histogram Data and Its Application to Hierarchical Clustering

Authors: K. Umbleja, M. Ichino

Abstract:

Symbolic data mining has been developed to analyze data in very large datasets. It is also useful in cases when entry specific details should remain hidden. Symbolic data mining is quickly gaining popularity as datasets in need of analyzing are becoming ever larger. One type of such symbolic data is a histogram, which enables to save huge amounts of information into a single variable with high-level of granularity. Other types of symbolic data can also be described in histograms, therefore making histogram a very important and general symbolic data type - a method developed for histograms - can also be applied to other types of symbolic data. Due to its complex structure, analyzing histograms is complicated. This paper proposes a method, which allows to compare two histogram-valued variables and therefore find a dissimilarity between two histograms. Proposed method uses the Ichino-Yaguchi dissimilarity measure for mixed feature-type data analysis as a base and develops a dissimilarity measure specifically for histogram data, which allows to compare histograms with different number of bins and bin widths (so called general histogram). Proposed dissimilarity measure is then used as a measure for clustering. Furthermore, linkage method based on weighted averages is proposed with the concept of cluster compactness to measure the quality of clustering. The method is then validated with application on real datasets. As a result, the proposed dissimilarity measure is found producing adequate and comparable results with general histograms without the loss of detail or need to transform the data.

Keywords: dissimilarity measure, hierarchical clustering, histograms, symbolic data analysis

Procedia PDF Downloads 135
1340 Hydrogen: Contention-Aware Hybrid Memory Management for Heterogeneous CPU-GPU Architectures

Authors: Yiwei Li, Mingyu Gao

Abstract:

Integrating hybrid memories with heterogeneous processors could leverage heterogeneity in both compute and memory domains for better system efficiency. To ensure performance isolation, we introduce Hydrogen, a hardware architecture to optimize the allocation of hybrid memory resources to heterogeneous CPU-GPU systems. Hydrogen supports efficient capacity and bandwidth partitioning between CPUs and GPUs in both memory tiers. We propose decoupled memory channel mapping and token-based data migration throttling to enable flexible partitioning. We also support epoch-based online search for optimized configurations and lightweight reconfiguration with reduced data movements. Hydrogen significantly outperforms existing designs by 1.21x on average and up to 1.31x.

Keywords: hybrid memory, heterogeneous systems, dram cache, graphics processing units

Procedia PDF Downloads 33
1339 On-Chip Aging Sensor Circuit Based on Phase Locked Loop Circuit

Authors: Ararat Khachatryan, Davit Mirzoyan

Abstract:

In sub micrometer technology, the aging phenomenon starts to have a significant impact on the reliability of integrated circuits by bringing performance degradation. For that reason, it is important to have a capability to evaluate the aging effects accurately. This paper presents an accurate aging measurement approach based on phase-locked loop (PLL) and voltage-controlled oscillator (VCO) circuit. The architecture is rejecting the circuit self-aging effect from the characteristics of PLL, which is generating the frequency without any aging phenomena affects. The aging monitor is implemented in low power 32 nm CMOS technology, and occupies a pretty small area. Aging simulation results show that the proposed aging measurement circuit improves accuracy by about 2.8% at high temperature and 19.6% at high voltage.

Keywords: aging effect, HCI, NBTI, nanoscale

Procedia PDF Downloads 336
1338 Identifying Neighborhoods at Potential Risk of Food Insecurity in Rural British Columbia

Authors: Amirmohsen Behjat, Aleck Ostry, Christina Miewald, Bernie Pauly

Abstract:

Substantial research has indicated that socioeconomic and demographic characteristics’ of neighborhoods are strong determinants of food security. The aim of this study was to develop a Food Insecurity Neighborhood Index (FINI) based on the associated socioeconomic and demographic variables to identify the areas at potential risk of food insecurity in rural British Columbia (BC). Principle Component Analysis (PCA) technique was used to calculate the FINI for each rural Dissemination Area (DA) using the food security determinant variables from Canadian Census data. Using ArcGIS, the neighborhoods with the top quartile FINI values were classified as food insecure. The results of this study indicated that the most food insecure neighborhood with the highest FINI value of 99.1 was in the Bulkley-Nechako (central BC) area whereas the lowest FINI with the value of 2.97 was for a rural neighborhood in the Cowichan Valley area. In total, 98.049 (19%) of the rural population of British Columbians reside in high food insecure areas. Moreover, the distribution of food insecure neighborhoods was found to be strongly dependent on the degree of rurality in BC. In conclusion, the cluster of food insecure neighbourhoods was more pronounced in Central Coast, Mount Wadington, Peace River, Kootenay Boundary, and the Alberni-Clayoqout Regional Districts.

Keywords: neighborhood food insecurity index, socioeconomic and demographic determinants, principal component analysis, Canada census, ArcGIS

Procedia PDF Downloads 146
1337 The Employees' Classification Method in the Space of Their Job Satisfaction, Loyalty and Involvement

Authors: Svetlana Ignatjeva, Jelena Slesareva

Abstract:

The aim of the study is development and adaptation of the method to analyze and quantify the indicators characterizing the relationship between a company and its employees. Diagnostics of such indicators is one of the most complex and actual issues in psychology of labour. The offered method is based on the questionnaire; its indicators reflect cognitive, affective and connotative components of socio-psychological attitude of employees to be as efficient as possible in their professional activities. This approach allows measure not only the selected factors but also such parameters as cognitive and behavioural dissonances. Adaptation of the questionnaire includes factor structure analysis and suitability analysis of phenomena indicators measured in terms of internal consistency of individual factors. Structural validity of the questionnaire was tested by exploratory factor analysis. Extraction Method: Principal Component Analysis. Rotation Method: Varimax with Kaiser Normalization. Factor analysis allows reduce dimension of the phenomena moving from the indicators to aggregative indexes and latent variables. Aggregative indexes are obtained as the sum of relevant indicators followed by standardization. The coefficient Cronbach's Alpha was used to assess the reliability-consistency of the questionnaire items. The two-step cluster analysis in the space of allocated factors allows classify employees according to their attitude to work in the company. The results of psychometric testing indicate possibility of using the developed technique for the analysis of employees’ attitude towards their work in companies and development of recommendations on their optimization.

Keywords: involved in the organization, loyalty, organizations, method

Procedia PDF Downloads 333
1336 The Contribution of the Lomé Charter to Combating Trafficking in Arms at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

Many illegal activities take place on the sea, including trafficking in arms, which constitutes one of the major threats to maritime security. Indeed, the dissemination of arms has hampered the peaceful settlement of many States in Africa, fuelled disputes into armed conflicts, and contributed to the prolongation of armed conflicts in many African States. The absence of international standards on the importation, exportation, and transfer of conventional arms is a contributory factor to conflict, displacement of people, crime, and terrorism on the continent of Africa, which in turn undermines peace, safety, security, stability, and sustainable development. South Africa and Nigeria have taken steps to address the illicit arms, but, despite those steps, arms trafficking at sea continues. To suppress the illicit arms and to combat a number of other threats to maritime security around the continent of Africa, the majority of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Lomé Charter”). However, the Lomé Charter is yet to come into force. This paper set out the pre-existing international legal instruments on arms to ascertain the domestic laws of South Africa and Nigeria relating to arms with the relevant provisions of the Charter in order to establish whether any legal steps are required to ensure that South Africa and Nigeria comply with its obligations under the Lomé Charter should it decide to ratify it. The legal steps include cooperating in establishing policies, as well as a regional and continental institution, and ensuring the implementation of such policies. The paper concludes ratifying the Lomé Charter is a step in the right direction in suppressing arms trafficking at sea, in addition to filling those gaps or limitations in their relevant legislation.

Keywords: cooperation against arms trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on arms

Procedia PDF Downloads 67
1335 The Voyage of Adolfo Caminha to the USA: The Discourse about Americanism in Brazil in the Late Nineteenth Century

Authors: Maxwel F. Silva, José Geraldo Pedrosa

Abstract:

This paper is a study about the voyage of Adolfo Caminha to the USA in the late nineteenth century described in “No país dos ianques”. The hypothesis is that the USA constitutes a civilizing reference that moves away from Europe. The Americanism expression it means that the Yankees have invented a new repertoire through which built a new idea of civilization. The base is European, but your architecture is new. This paper is not concerned with the meanings and uses of the Americanism expression among the Yankees, but with the ways in which the America were understood by otherness, especially in the late nineteenth and early twentieth century. In this way, this study discusses the concept of Americanism in the thought of Adolfo Caminha and it is relation with the Brazil in the late nineteenth century, especially in questions about democracy, liberty and progress.

Keywords: Adolfo Caminha, Americanism, discourse, voyage

Procedia PDF Downloads 523
1334 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 203
1333 Data Analysis Tool for Predicting Water Scarcity in Industry

Authors: Tassadit Issaadi Hamitouche, Nicolas Gillard, Jean Petit, Valerie Lavaste, Celine Mayousse

Abstract:

Water is a fundamental resource for the industry. It is taken from the environment either from municipal distribution networks or from various natural water sources such as the sea, ocean, rivers, aquifers, etc. Once used, water is discharged into the environment, reprocessed at the plant or treatment plants. These withdrawals and discharges have a direct impact on natural water resources. These impacts can apply to the quantity of water available, the quality of the water used, or to impacts that are more complex to measure and less direct, such as the health of the population downstream from the watercourse, for example. Based on the analysis of data (meteorological, river characteristics, physicochemical substances), we wish to predict water stress episodes and anticipate prefectoral decrees, which can impact the performance of plants and propose improvement solutions, help industrialists in their choice of location for a new plant, visualize possible interactions between companies to optimize exchanges and encourage the pooling of water treatment solutions, and set up circular economies around the issue of water. The development of a system for the collection, processing, and use of data related to water resources requires the functional constraints specific to the latter to be made explicit. Thus the system will have to be able to store a large amount of data from sensors (which is the main type of data in plants and their environment). In addition, manufacturers need to have 'near-real-time' processing of information in order to be able to make the best decisions (to be rapidly notified of an event that would have a significant impact on water resources). Finally, the visualization of data must be adapted to its temporal and geographical dimensions. In this study, we set up an infrastructure centered on the TICK application stack (for Telegraf, InfluxDB, Chronograf, and Kapacitor), which is a set of loosely coupled but tightly integrated open source projects designed to manage huge amounts of time-stamped information. The software architecture is coupled with the cross-industry standard process for data mining (CRISP-DM) data mining methodology. The robust architecture and the methodology used have demonstrated their effectiveness on the study case of learning the level of a river with a 7-day horizon. The management of water and the activities within the plants -which depend on this resource- should be considerably improved thanks, on the one hand, to the learning that allows the anticipation of periods of water stress, and on the other hand, to the information system that is able to warn decision-makers with alerts created from the formalization of prefectoral decrees.

Keywords: data mining, industry, machine Learning, shortage, water resources

Procedia PDF Downloads 96
1332 Automatic Aggregation and Embedding of Microservices for Optimized Deployments

Authors: Pablo Chico De Guzman, Cesar Sanchez

Abstract:

Microservices are a software development methodology in which applications are built by composing a set of independently deploy-able, small, modular services. Each service runs a unique process and it gets instantiated and deployed in one or more machines (we assume that different microservices are deployed into different machines). Microservices are becoming the de facto standard for developing distributed cloud applications due to their reduced release cycles. In principle, the responsibility of a microservice can be as simple as implementing a single function, which can lead to the following issues: - Resource fragmentation due to the virtual machine boundary. - Poor communication performance between microservices. Two composition techniques can be used to optimize resource fragmentation and communication performance: aggregation and embedding of microservices. Aggregation allows the deployment of a set of microservices on the same machine using a proxy server. Aggregation helps to reduce resource fragmentation, and is particularly useful when the aggregated services have a similar scalability behavior. Embedding deals with communication performance by deploying on the same virtual machine those microservices that require a communication channel (localhost bandwidth is reported to be about 40 times faster than cloud vendor local networks and it offers better reliability). Embedding can also reduce dependencies on load balancer services since the communication takes place on a single virtual machine. For example, assume that microservice A has two instances, a1 and a2, and it communicates with microservice B, which also has two instances, b1 and b2. One embedding can deploy a1 and b1 on machine m1, and a2 and b2 are deployed on a different machine m2. This deployment configuration allows each pair (a1-b1), (a2-b2) to communicate using the localhost interface without the need of a load balancer between microservices A and B. Aggregation and embedding techniques are complex since different microservices might have incompatible runtime dependencies which forbid them from being installed on the same machine. There is also a security concern since the attack surface between microservices can be larger. Luckily, container technology allows to run several processes on the same machine in an isolated manner, solving the incompatibility of running dependencies and the previous security concern, thus greatly simplifying aggregation/embedding implementations by just deploying a microservice container on the same machine as the aggregated/embedded microservice container. Therefore, a wide variety of deployment configurations can be described by combining aggregation and embedding to create an efficient and robust microservice architecture. This paper presents a formal method that receives a declarative definition of a microservice architecture and proposes different optimized deployment configurations by aggregating/embedding microservices. The first prototype is based on i2kit, a deployment tool also submitted to ICWS 2018. The proposed prototype optimizes the following parameters: network/system performance, resource usage, resource costs and failure tolerance.

Keywords: aggregation, deployment, embedding, resource allocation

Procedia PDF Downloads 176
1331 The Relationship between the Use of Social Networks with Executive Functions and Academic Performance in High School Students in Tehran

Authors: Esmail Sadipour

Abstract:

The use of social networks is increasing day by day in all societies. The purpose of this research was to know the relationship between the use of social networks (Instagram, WhatsApp, and Telegram) with executive functions and academic performance in first-year female high school students. This research was applied in terms of purpose, quantitative in terms of data type, and correlational in terms of technique. The population of this research consisted of all female high school students in the first year of district 2 of Tehran. Using Green's formula, the sample size of 150 people was determined and selected by cluster random method. In this way, from all 17 high schools in district 2 of Tehran, 5 high schools were selected by a simple random method and then one class was selected from each high school, and a total of 155 students were selected. To measure the use of social networks, a researcher-made questionnaire was used, the Barclay test (2012) was used for executive functions, and last semester's GPA was used for academic performance. Pearson's correlation coefficient and multivariate regression were used to analyze the data. The results showed that there is a negative relationship between the amount of use of social networks and self-control, self-motivation and time self-management. In other words, the more the use of social networks, the fewer executive functions of students, self-control, self-motivation, and self-management of their time. Also, with the increase in the use of social networks, the academic performance of students has decreased.

Keywords: social networks, executive function, academic performance, working memory

Procedia PDF Downloads 61
1330 Enhancing Athlete Training using Real Time Pose Estimation with Neural Networks

Authors: Jeh Patel, Chandrahas Paidi, Ahmed Hambaba

Abstract:

Traditional methods for analyzing athlete movement often lack the detail and immediacy required for optimal training. This project aims to address this limitation by developing a Real-time human pose estimation system specifically designed to enhance athlete training across various sports. This system leverages the power of convolutional neural networks (CNNs) to provide a comprehensive and immediate analysis of an athlete’s movement patterns during training sessions. The core architecture utilizes dilated convolutions to capture crucial long-range dependencies within video frames. Combining this with the robust encoder-decoder architecture to further refine pose estimation accuracy. This capability is essential for precise joint localization across the diverse range of athletic poses encountered in different sports. Furthermore, by quantifying movement efficiency, power output, and range of motion, the system provides data-driven insights that can be used to optimize training programs. Pose estimation data analysis can also be used to develop personalized training plans that target specific weaknesses identified in an athlete’s movement patterns. To overcome the limitations posed by outdoor environments, the project employs strategies such as multi-camera configurations or depth sensing techniques. These approaches can enhance pose estimation accuracy in challenging lighting and occlusion scenarios, where pose estimation accuracy in challenging lighting and occlusion scenarios. A dataset is collected From the labs of Martin Luther King at San Jose State University. The system is evaluated through a series of tests that measure its efficiency and accuracy in real-world scenarios. Results indicate a high level of precision in recognizing different poses, substantiating the potential of this technology in practical applications. Challenges such as enhancing the system’s ability to operate in varied environmental conditions and further expanding the dataset for training were identified and discussed. Future work will refine the model’s adaptability and incorporate haptic feedback to enhance the interactivity and richness of the user experience. This project demonstrates the feasibility of an advanced pose detection model and lays the groundwork for future innovations in assistive enhancement technologies.

Keywords: computer vision, deep learning, human pose estimation, U-NET, CNN

Procedia PDF Downloads 2
1329 Gan Nanowire-Based Sensor Array for the Detection of Cross-Sensitive Gases Using Principal Component Analysis

Authors: Ashfaque Hossain Khan, Brian Thomson, Ratan Debnath, Abhishek Motayed, Mulpuri V. Rao

Abstract:

Though the efforts had been made, the problem of cross-sensitivity for a single metal oxide-based sensor can’t be fully eliminated. In this work, a sensor array has been designed and fabricated comprising of platinum (Pt), copper (Cu), and silver (Ag) decorated TiO2 and ZnO functionalized GaN nanowires using industry-standard top-down fabrication approach. The metal/metal-oxide combinations within the array have been determined from prior molecular simulation study using first principle calculations based on density functional theory (DFT). The gas responses were obtained for both single and mixture of NO2, SO2, ethanol, and H2 in the presence of H2O and O2 gases under UV light at room temperature. Each gas leaves a unique response footprint across the array sensors by which precise discrimination of cross-sensitive gases has been achieved. An unsupervised principal component analysis (PCA) technique has been implemented on the array response. Results indicate that each gas forms a distinct cluster in the score plot for all the target gases and their mixtures, indicating a clear separation among them. In addition, the developed array device consumes very low power because of ultra-violet (UV) assisted sensing as compared to commercially available metal-oxide sensors. The nanowire sensor array, in combination with PCA, is a potential approach for precise real-time gas monitoring applications.

Keywords: cross-sensitivity, gas sensor, principle component analysis (PCA), sensor array

Procedia PDF Downloads 84
1328 Deep Learning for Image Correction in Sparse-View Computed Tomography

Authors: Shubham Gogri, Lucia Florescu

Abstract:

Medical diagnosis and radiotherapy treatment planning using Computed Tomography (CT) rely on the quantitative accuracy and quality of the CT images. At the same time, requirements for CT imaging include reducing the radiation dose exposure to patients and minimizing scanning time. A solution to this is the sparse-view CT technique, based on a reduced number of projection views. This, however, introduces a new problem— the incomplete projection data results in lower quality of the reconstructed images. To tackle this issue, deep learning methods have been applied to enhance the quality of the sparse-view CT images. A first approach involved employing Mir-Net, a dedicated deep neural network designed for image enhancement. This showed promise, utilizing an intricate architecture comprising encoder and decoder networks, along with the incorporation of the Charbonnier Loss. However, this approach was computationally demanding. Subsequently, a specialized Generative Adversarial Network (GAN) architecture, rooted in the Pix2Pix framework, was implemented. This GAN framework involves a U-Net-based Generator and a Discriminator based on Convolutional Neural Networks. To bolster the GAN's performance, both Charbonnier and Wasserstein loss functions were introduced, collectively focusing on capturing minute details while ensuring training stability. The integration of the perceptual loss, calculated based on feature vectors extracted from the VGG16 network pretrained on the ImageNet dataset, further enhanced the network's ability to synthesize relevant images. A series of comprehensive experiments with clinical CT data were conducted, exploring various GAN loss functions, including Wasserstein, Charbonnier, and perceptual loss. The outcomes demonstrated significant image quality improvements, confirmed through pertinent metrics such as Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) between the corrected images and the ground truth. Furthermore, learning curves and qualitative comparisons added evidence of the enhanced image quality and the network's increased stability, while preserving pixel value intensity. The experiments underscored the potential of deep learning frameworks in enhancing the visual interpretation of CT scans, achieving outcomes with SSIM values close to one and PSNR values reaching up to 76.

Keywords: generative adversarial networks, sparse view computed tomography, CT image correction, Mir-Net

Procedia PDF Downloads 122
1327 Authenticity of Lipid and Soluble Sugar Profiles of Various Oat Cultivars (Avena sativa)

Authors: Marijana M. Ačanski, Kristian A. Pastor, Djura N. Vujić

Abstract:

The identification of lipid and soluble sugar components in flour samples of different cultivars belonging to common oat species (Avena sativa L.) was performed: spring oat, winter oat and hulless oat. Fatty acids were extracted from flour samples with n-hexane, and derivatized into volatile methyl esters, using TMSH (trimethylsulfonium hydroxide in methanol). Soluble sugars were then extracted from defatted and dried samples of oat flour with 96% ethanol, and further derivatized into corresponding TMS-oximes, using hydroxylamine hydrochloride solution and BSTFA (N,O-bis-(trimethylsilyl)-trifluoroacetamide). The hexane and ethanol extracts of each oat cultivar were analyzed using GC-MS system. Lipid and simple sugar compositions are very similar in all samples of investigated cultivars. Chemometric tool was applied to numeric values of automatically integrated surface areas of detected lipid and simple sugar components in their corresponding derivatized forms. Hierarchical cluster analysis shows a very high similarity between the investigated flour samples of oat cultivars, according to the fatty acid content (0.9955). Moderate similarity was observed according to the content of soluble sugars (0.50). These preliminary results support the idea of establishing methods for oat flour authentication, and provide the means for distinguishing oat flour samples, regardless of the variety, from flour samples made of other cereal species, just by lipid and simple sugar profile analysis.

Keywords: oat cultivars, lipid composition, soluble sugar composition, GC-MS, chemometrics, authentication

Procedia PDF Downloads 274
1326 NSBS: Design of a Network Storage Backup System

Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan

Abstract:

The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and we realize the snapshot and hierarchical index in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving the efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.

Keywords: agent, network backup system, three architecture model, NSBS

Procedia PDF Downloads 430
1325 Typology of Customers in Fitness Centres

Authors: Josef Voracek, Jan Sima

Abstract:

The main purpose of our study is to state the basic types of fitness customers. This paper aims to create a specific customer typology in today’s fitness centres in the region of Prague. Our suggested typology of Prague fitness centres customers is based on answers to the questions: What are the customers like, what are their preferences, and what kinds of services do they use more often in Prague fitness centres? These are the main aspects of the presented typology. A survey was conducted on a sample of 1004 respondents from 48 fitness centres, which ran during May 2012. We used questionnaires and latent class analysis for the assessment and interpretation of data. Gender was especially the main filter criterion. In the population, there were 522 males and 482 females. Data were analysed using the LCA method. We identified 6 segments of typical customers, of which three are male and three are female. Each segment is influenced primarily by the age of customers, from which we can develop further characteristics, such as education, income, marital status, etc. Male segments use the main workout area above all, whilst female segments use a much wider range of services offered, for example, group exercises, personal training, and cardio theatres. LCA method was found to be the most suitable tool, because cluster analysis is very limited in the forms and numbers of variables and indicators. Models of 3 latent classes for each gender are optimal, as it is demonstrated by entropy indices and matrices of the likelihood of the membership to the classes. A probable weak point of the survey is the selection of fitness centres, because of the market in Prague is really specific.

Keywords: customer, fitness, latent class analysis, typology

Procedia PDF Downloads 195
1324 The Status and Role of Women in Indian IT Industry and Relevant Role and Scope of HRM

Authors: Shivani Kolarkar

Abstract:

Splendid growth in Indian IT has generated women employment on a large scale in India and continues to do it. Indian IT industry has achieved this in spite of total masculine dominance in other Indian engineering industries, where the ratio of women employment is almost negligible as compared to men. Indian IT today proudly enjoys a strong pool of technically educated, intellectual, and skillful women employees. IT industry has encouraged technical education for women in India, to a great extent. The software industry has definitely contributed to developing a positive and dignified role and status of women employees in Indian IT industry. It has promoted women’s social and economic role and status. In spite of all, gender discrimination still persists in Indian IT, also, which is low as compared to other industries, but it is a matter of concern. An Indian woman is bound to carry dual roles which are equally over-stressed for IT women employees. Long working hours, night shifts, work pressures and insufficient safety majors and necessary facilities for women contributes to making her physical-mental life, family and married life troublesome. Which forces her either to cluster at low-end jobs in IT/elsewhere or to sacrifice her career. Nature, role and status of HRM needs to be broadened, deepened and shaped into research-oriented multidimensional perspective in the context of really enhancing role and status of Indian IT women with high appreciation of women employees’ dignity and entity.

Keywords: attrition, gender discrimination, HRM, Indian IT, software industry, job satisfaction, safety, technical education, women employment

Procedia PDF Downloads 626
1323 Discussing the Values of Collective Memory and Cultural / Rural Landscape Based on the Concept of Eco-Village; Case of Turkey, Gölpazarı, Kurşunlu Village

Authors: Parisa Göker, Hilal Kahveci, Özlem Candan Hergül

Abstract:

Humans are generating culture while being in touch with nature. Along with skills, local knowledge based on experience, and many other subjects developed within this process, 'culture' offers humans a chance to survive. For this reason, culture forms the equipment for humans, which facilitates their survival in all ecosystems. Together with technology, quick consumption of natural sources and overuse culture of humans have brought up the eco-village concept. Ecovillages are ecologically, economically, socio-culturally, and spiritually sustainable settlement models. It is known that the eco-village approach is applying a proper methodology on behalf of integrative and versatile solution generation. Today, the eco-village approach, introducing a radical criticism to the understanding of civilization and consumption culture and deeming urban solutions inadequate as a spatial reflection to civilization and consumption culture, while making a difference about integrative solution offering with multidimensional features, along with the goal of creating self-sufficient communities, is creating solutions on the subject of both reducing the ecological footprint of humans and to provide social order and also to solve the injustice seen in terms of income and life standards. In this study, environmental issues, sustainable development, and environmental sustainability topics are examined within the context of eco-tourism and eco-village. Alongside this, the natural and cultural landscape values of Kurşunlu village which are located in Bilecik province’s Gölpazarı county, and a contextual frame is created for the facilitation of sustainability in the event of dynamizing the Kurşunlu village in terms of tourism-oriented activities.

Keywords: eco village, sustainability, rural landscape, cultural landscape

Procedia PDF Downloads 119
1322 Modeling and Experimental Verification of Crystal Growth Kinetics in Glass Forming Alloys

Authors: Peter K. Galenko, Stefanie Koch, Markus Rettenmayr, Robert Wonneberger, Evgeny V. Kharanzhevskiy, Maria Zamoryanskaya, Vladimir Ankudinov

Abstract:

We analyze the structure of undercooled melts, crystal growth kinetics and amorphous/crystalline microstructure of rapidly solidifying glass-forming Pd-based and CuZr-based alloys. A dendrite growth model is developed using a combination of the kinetic phase-field model and mesoscopic sharp interface model. The model predicts features of crystallization kinetics in alloys from thermodynamically controlled growth (governed by the Gibbs free energy change on solidification) to the kinetically limited regime (governed by atomic attachment-detachment processes at the solid/liquid interface). Comparing critical undercoolings observed in the crystallization kinetics with experimental data on melt viscosity, atomistic simulation's data on liquid microstructure and theoretically predicted dendrite growth velocity allows us to conclude that the dendrite growth kinetics strongly depends on the cluster structure changes of the melt. The obtained data of theoretical and experimental investigations are used for interpretation of microstructure of samples processed in electro-magnetic levitator on board International Space Station in the frame of the project "MULTIPHAS" (European Space Agency and German Aerospace Center, 50WM1941) and "KINETIKA" (ROSKOSMOS).

Keywords: dendrite, kinetics, model, solidification

Procedia PDF Downloads 96
1321 Determinants of Breastfeeding in Thailand

Authors: Patarapan Odton

Abstract:

This study investigates demographic and socio-economic factors of breastfeeding practice, including exclusively breastfeeding among children in Thailand using the Multiple Indicator Cluster Survey (MICS3 and MICS4). Logistic regression models were used to examine the determinants of initial breastfeeding, exclusively breastfeeding, and predominant breastfeeding, using data from women and children section of the survey. For initial breastfeeding, women live in rural area were more likely to start breastfeeding within one day of birth rather than who live in urban area in both round of the surveys. In year 2012, there were significantly higher probabilities of women in rural area started breastfeeding within one hour of birth compare to urban area. Women in southern Thailand have higher probabilities of start breastfeeding within one hour and one day than women in Bangkok and central region. During the year 2005-2006, children aged less than 5 years old lived in rural area have been breastfed higher than children in urban area. Children live in the northeast region were more likely to have been breastfed than the other regions. Only the second wealth quintile group was significant higher probability of ever been breastfed than the poorest group. The findings in the second round of the survey are different from the year 2005-06. In 2012, there was no difference in probability of ever been breastfed among children live in urban and rural area, children in Bangkok and central region were less probability of ever been breastfed than the others.

Keywords: Breastfeeding, Exclusive Breastfeeding, Predominant Breastfeeding, Urban-Rural Difference

Procedia PDF Downloads 246
1320 Digital Storytelling for Community Culture

Authors: Sariyapa Kantawan, Muanfun Kongsomsawaeng

Abstract:

Chanthaburi River community is an old mixed-culture village established in the 16th century. The town advanced more rapidly than others due to the ease of transportation at the time, which used the river as a road. Therefore, the province's first road begins here, propelling it to become an important commercial and trading center for almost a century. As a result of diverse culture, the architecture has been affected by Western, Thai, Chinese, and Vietnamese, resulting in a new and distinctive style. To share the realm of memory, digital media enable the city to communicate its history and culture. This article describes a project that combines the concepts of digital storytelling and augmented reality and connects them to Chanthaburi River Community Culture by using QR codes as makers to display 3D models on mobile screens.

Keywords: digital storytelling, community culture, river community, cultural heritage, augmented reality

Procedia PDF Downloads 27
1319 The Roman Fora in North Africa Towards a Supportive Protocol to the Decision for the Morphological Restitution

Authors: Dhouha Laribi Galalou, Najla Allani Bouhoula, Atef Hammouda

Abstract:

This research delves into the fundamental question of the morphological restitution of built archaeology in order to place it in its paradigmatic context and to seek answers to it. Indeed, the understanding of the object of the study, its analysis, and the methodology of solving the morphological problem posed, are manageable aspects only by means of a thoughtful strategy that draws on well-defined epistemological scaffolding. In this stream, the crisis of natural reasoning in archaeology has generated multiple changes in this field, ranging from the use of new tools to the integration of an archaeological information system where urbanization involves the interplay of several disciplines. The built archaeological topic is also an architectural and morphological object. It is also a set of articulated elementary data, the understanding of which is about to be approached from a logicist point of view. Morphological restitution is no exception to the rule, and the inter-exchange between the different disciplines uses the capacity of each to frame the reflection on the incomplete elements of a given architecture or on its different phases and multiple states of existence. The logicist sequence is furnished by the set of scattered or destroyed elements found, but also by what can be called a rule base which contains the set of rules for the architectural construction of the object. The knowledge base built from the archaeological literature also provides a reference that enters into the game of searching for forms and articulations. The choice of the Roman Forum in North Africa is justified by the great urban and architectural characteristics of this entity. The research on the forum involves both a fairly large knowledge base but also provides the researcher with material to study - from a morphological and architectural point of view - starting from the scale of the city down to the architectural detail. The experimentation of the knowledge deduced on the paradigmatic level, as well as the deduction of an analysis model, is then carried out on the basis of a well-defined context which contextualises the experimentation from the elaboration of the morphological information container attached to the rule base and the knowledge base. The use of logicist analysis and artificial intelligence has allowed us to first question the aspects already known in order to measure the credibility of our system, which remains above all a decision support tool for the morphological restitution of Roman Fora in North Africa. This paper presents a first experimentation of the model elaborated during this research, a model framed by a paradigmatic discussion and thus trying to position the research in relation to the existing paradigmatic and experimental knowledge on the issue.

Keywords: classical reasoning, logicist reasoning, archaeology, architecture, roman forum, morphology, calculation

Procedia PDF Downloads 119
1318 Supplier Relationship Management Model for Sme’s E-Commerce Transaction Broker Case Study: Hotel Rooms Provider

Authors: Veronica S. Moertini, Niko Ibrahim, Verliyantina

Abstract:

As market intermediary firms, e-commerce transaction broker firms need to strongly collaborate with suppliers in order to develop brands seek by customers. Developing suitable electronic Supplier Relationship Management (e-SRM) system is the solution to the need. In this paper, we propose our concept of e-SRM for transaction brokers owned by small medium enterprises (SMEs), which includes the integrated e-SRM and e-CRM architecture, the e-SRM applications with their functions. We then discuss the customization and implementation of the proposed e-SRM model in a specific transaction broker selling hotel rooms, which owned by an SME, KlikHotel.com. The implementation of the e-SRM in KlikHotel.com has been successfully boosting the number of suppliers (hotel members) and hotel room sales.

Keywords: e-CRM, e-SRM, SME, transaction broker

Procedia PDF Downloads 472
1317 Optimization of Topology-Aware Job Allocation on a High-Performance Computing Cluster by Neural Simulated Annealing

Authors: Zekang Lan, Yan Xu, Yingkun Huang, Dian Huang, Shengzhong Feng

Abstract:

Jobs on high-performance computing (HPC) clusters can suffer significant performance degradation due to inter-job network interference. Topology-aware job allocation problem (TJAP) is such a problem that decides how to dedicate nodes to specific applications to mitigate inter-job network interference. In this paper, we study the window-based TJAP on a fat-tree network aiming at minimizing the cost of communication hop, a defined inter-job interference metric. The window-based approach for scheduling repeats periodically, taking the jobs in the queue and solving an assignment problem that maps jobs to the available nodes. Two special allocation strategies are considered, i.e., static continuity assignment strategy (SCAS) and dynamic continuity assignment strategy (DCAS). For the SCAS, a 0-1 integer programming is developed. For the DCAS, an approach called neural simulated algorithm (NSA), which is an extension to simulated algorithm (SA) that learns a repair operator and employs them in a guided heuristic search, is proposed. The efficacy of NSA is demonstrated with a computational study against SA and SCIP. The results of numerical experiments indicate that both the model and algorithm proposed in this paper are effective.

Keywords: high-performance computing, job allocation, neural simulated annealing, topology-aware

Procedia PDF Downloads 76
1316 The Relationship between Ruins and Vegetation: Different Approaches during the Centuries and within the Various Disciplinary Fields, Investigation of Writings and Projects

Authors: Rossana Mancini

Abstract:

The charm of a ruin colonised by wild plants and flowers is part of Western culture. The relationship between ruins and vegetation involves a wide range of different fields of research. During the first phase of the research the most important writings and projects about this argument were investigated, to understand how the perception of the co-existence of ruins and vegetation has changed over time and to investigate the various different approaches that these different fields have adopted when tackling this issue. The paper presents some practical examples of projects carried out from the early 1900s on. The major result is that specifically regards conservation, the best attitude is the management of change, an inevitable process when it comes to the co-existence of ruins and nature and, particularly, ruins and vegetation. Limiting ourselves to adopting measures designed to stop, or rather slow down, the increasing level of entropy (and therefore disorder) may not be enough.

Keywords: ruins, vegetation, conservation, archaeology, architecture

Procedia PDF Downloads 303
1315 Cultural Heritage Management and Tourism in Kosovo

Authors: Valon Shkodra

Abstract:

In our paper, we will give an overview of the cultural heritage and tourism in Kosovo. Kosovo has a history, culture, tradition and architecture that are different from those of other countries in the region, and each country has its own characteristics and peculiarities. In this paper, we will mainly present the situation of cultural heritage and its interpretation. The research is based on fieldwork and the aim of the research is to live the situation of cultural heritage and tourism. The reason why we chose this topic is that cultural heritage and tourism are now the most important industry developing many countries in the world. Besides the benefits that tourism brings, it also has an impact on the preservation, protection and promotion of culture in general. Kosovo, with its cultural diversity and very good geographical location, is also very well suited to develop these two areas as a bridge to each other. The cultural heritage holds traces from the earliest eras and shows a diversity of different civilizations that have just begun to be explored and presented.

Keywords: cultural heritage, economy, tourism, development, institutions, protection

Procedia PDF Downloads 187
1314 Advancing Spatial Mapping and Monitoring of Illegal Landfills for Deprived Urban Areas in Romania

Authors: ȘercăIanu Mihai, Aldea Mihaela, Iacoboaea Cristina, Luca Oana, Nenciu Ioana

Abstract:

The emergence and neutralization of illegal waste dumps represent a global concern for waste management ecosystems with a particularly pronounced impact on disadvantaged communities. All over the world, and in this particular case in Romania, a relevant number of people resided in houses lacking any legal forms such as land ownership documents or building permits. These areas are referred to as “informal settlements”. An increasing number of regions and cities in Romania are struggling to manage their waste dumps, especially in the context of increasing poverty and lack of regulation related to informal settlements. An example of such informal settlement can be found at the terminus of Bistra Street in Câlnic, which falls under the jurisdiction of the Municipality of Reșița in Caras Severin County. The article presents a case study that focuses on employing remote sensing techniques and spatial data to monitor and map illegal waste practices, with subsequent integration into a geographic information system tailored for the Reșița community. In addition, the paper outlines the steps involved in devising strategies aimed at enhancing waste management practices in disadvantaged areas, aligning with the shift toward a circular economy. Results presented in the paper contain a spatial mapping and visualization methodology calibrated with in situ data collection applicable for identifying illegal landfills. The emergence and neutralization of illegal dumps pose a challenge in the field of waste management. These approaches, which prove effective where conventional solutions have failed, need to be replicated and adopted more wisely.

Keywords: waste dumps, waste management, monitoring, GIS, informal settlements

Procedia PDF Downloads 44