Search results for: make appropriate requests in German
4035 iCCS: Development of a Mobile Web-Based Student Integrated Information System using Hill Climbing Algorithm
Authors: Maria Cecilia G. Cantos, Lorena W. Rabago, Bartolome T. Tanguilig III
Abstract:
This paper describes a conducive and structured information exchange environment for the students of the College of Computer Studies in Manuel S. Enverga University Foundation in. The system was developed to help the students to check their academic result, manage profile, make self-enlistment and assist the students to manage their academic status that can be viewed also in mobile phones. Developing class schedules in a traditional way is a long process that involves making many numbers of choices. With Hill Climbing Algorithm, however, the process of class scheduling, particularly with regards to courses to be taken by the student aligned with the curriculum, can perform these processes and end up with an optimum solution. The proponent used Rapid Application Development (RAD) for the system development method. The proponent also used the PHP as the programming language and MySQL as the database.Keywords: hill climbing algorithm, integrated system, mobile web-based, student information system
Procedia PDF Downloads 3854034 Optimal Power Exchange of Multi-Microgrids with Hierarchical Coordination
Authors: Beom-Ryeol Choi, Won-Poong Lee, Jin-Young Choi, Young-Hak Shin, Dong-Jun Won
Abstract:
A Microgrid (MG) has a major role in power system. There are numerous benefits, such as ability to reduce environmental impact and enhance the reliability of a power system. Hence, Multi-MG (MMG) consisted of multiple MGs is being studied intensively. This paper proposes the optimal power exchange of MMG with hierarchical coordination. The whole system architecture consists of two layers: 1) upper layer including MG of MG Center (MoMC) which is in charge of the overall management and coordination and 2) lower layer comprised of several Microgrid-Energy Management Systems (MG-EMSs) which make a decision for own schedule. In order to accomplish the optimal power exchange, the proposed coordination algorithm is applied to MMG system. The objective of this process is to achieve optimal operation for improving economics under the grid-connected operation. The simulation results show how the output of each MG can be changed through coordination algorithm.Keywords: microgrids, multi-microgrids, power exchange, hierarchical coordination
Procedia PDF Downloads 3724033 Integrated Mass Rapid Transit (MRT) and Bus System in Singapore: MRT Ridership and the Provision of Feeder Bus Services
Authors: Devansh Jain, Shu Ting Goh
Abstract:
With the aim of improving the quality of life of people of Singapore with provision of better transport services, Land and Transport Authority Singapore recently published its Master Plan 2013. The major objectives mentioned in the plan were to make a comprehensive public transport network with better quality Mass Rapid Transit, bus services along with cycling and walking. MRT is the backbone of the transport system in Singapore, and to promote and increase the MRT ridership, good accessibility to access the MRT stations is a necessity. The aim of this paper is to investigate the relationship between MRT ridership and the provision of feeder bus services in Singapore planning areas and also to understand the hub and spoke model adopted by Singapore for provision of transport services. The findings of the study will lead to conclusions made from the Regression model developed by the various factors affecting MRT ridership, and hence will benefit to enhance the services provided by the system.Keywords: quality of life, public transport, mass rapid transit, ridership
Procedia PDF Downloads 2504032 Optimizing Availability of Marine Knowledge Repository with Cloud-Based Framework
Authors: Ahmad S. Mohd Noor, Emma A. Sirajudin, Nur F. Mat Zain
Abstract:
Reliability is an important property for knowledge repository system. National Marine Bioinformatics System or NABTICS is a marine knowledge repository portal aimed to provide a baseline for marine biodiversity and a tool for researchers and developers. It is intended to be a large and growing online database and also a metadata system for inputs of research analysis. The trends of present large distributed systems such as Cloud computing are the delivery of computing as a service rather than a product. The goal of this research is to make NABTICS a system of greater availability by integrating it with Cloud based Neighbor Replication and Failure Recovery (NRFR). This can be achieved by implementation of NABTICS into distributed environment. As a result, the user can experience minimum downtime while using the system should the server is having a failure. Consequently the online database application is said to be highly available.Keywords: cloud, availability, distributed system, marine repository, database replication
Procedia PDF Downloads 4724031 A Decision Support Framework for Introducing Business Intelligence to Midlands Based SMEs
Authors: Amritpal Slaich, Mark Elshaw
Abstract:
This paper explores the development of a decision support framework for the introduction of business intelligence (BI) through operational research techniques for application by SMEs. Aligned with the goals of the new Midlands Enterprise Initiative of improving the skill levels of the Midlands workforce and addressing high levels of regional unemployment, we have developed a framework to increase the level of business intelligence used by SMEs to improve business decision-making. Many SMEs in the Midlands fail due to the lack of high quality decision making. Our framework outlines how universities can: engage with SMEs in the use of BI through operational research techniques; develop appropriate and easy to use Excel spreadsheet models; and make use of a process to allow SMEs to feedback their findings of the models. Future work will determine how well the framework performs in getting SMEs to apply BI to improve their decision-making performance.Keywords: SMEs, decision support framework, business intelligence, operational research techniques
Procedia PDF Downloads 4744030 Comparison of Parallel CUDA and OpenMP Implementations of Memetic Algorithms for Solving Optimization Problems
Authors: Jason Digalakis, John Cotronis
Abstract:
Memetic algorithms (MAs) are useful for solving optimization problems. It is quite difficult to search the search space of the optimization problem with large dimensions. There is a challenge to use all the cores of the system. In this study, a sequential implementation of the memetic algorithm is converted into a concurrent version, which is executed on the cores of both CPU and GPU. For this reason, CUDA and OpenMP libraries are operated on the parallel algorithm to make a concurrent execution on CPU and GPU, respectively. The aim of this study is to compare CPU and GPU implementation of the memetic algorithm. For this purpose, fourteen benchmark functions are selected as test problems. The obtained results indicate that our approach leads to speedups up to five thousand times higher compared to one CPU thread while maintaining a reasonable results quality. This clearly shows that GPUs have the potential to acceleration of MAs and allow them to solve much more complex tasks.Keywords: memetic algorithm, CUDA, GPU-based memetic algorithm, open multi processing, multimodal functions, unimodal functions, non-linear optimization problems
Procedia PDF Downloads 1044029 A Research About to Determination the Quality of Feed Oils Used as Mixedfeed Raw Material from Some Feed Factories in Konya-Turkey
Authors: Gülşah Kanbur, Veysel Ayhan
Abstract:
Feed oil samples which are used as mixed feed raw material were taken from six different feed factories in March, May and July. All factories make production in Konya, Turkey and all of the samples were which taken are crude soybean oil. Some physical and chemical analysis, free radical scavenger effect and total phenol content were determined on these oil samples. Moisture content was found between 0.10-22.23 %, saponification number was determined 143.13 to 167.93 KOH/kg, free fatty acidity was varied 0.73 to 35.00 % , peroxide value was found between 1.53 and 28.43 meq/kg , unsaponifiable matter was determined from 0.40 to 17.10 % , viscosity was found between 34.30 and 625.67 mPas, sediment amount was determined between 0.60-18.16 % , free radical scavenger effect was varied 20.7 to 43.04 % inhibition of the extract and total phenol content was found between 1.20 and 2.69 mg/L extract. Different results were found between months and factories.Keywords: crude soybean oil, feed oils, mixed feed, Konya
Procedia PDF Downloads 3134028 Framework Development of Carbon Management Software Tool in Sustainable Supply Chain Management of Indian Industry
Authors: Sarbjit Singh
Abstract:
This framework development explored the status of GSCM in manufacturing SMEs and concluded that there was a significant gap w.r.t carbon emissions measurement in the supply chain activities. The measurement of carbon emissions within supply chains is important green initiative toward its reduction. The majority of the SMEs were facing the problem to quantify the green house gas emissions in its supply chain & to make it a low carbon supply chain or GSCM. Thus, the carbon management initiatives were amalgamated with the supply chain activities in order to measure and reduce the carbon emissions, confirming the GHG protocol scopes. Henceforth, it covers the development of carbon management software (CMS) tool to quantify carbon emissions for effective carbon management. This tool is cheap and easy to use for the industries for the management of their carbon emissions within the supply chain.Keywords: w.r.t carbon emissions, carbon management software, supply chain management, Indian Industry
Procedia PDF Downloads 4694027 Modular Data and Calculation Framework for a Technology-based Mapping of the Manufacturing Process According to the Value Stream Management Approach
Authors: Tim Wollert, Fabian Behrendt
Abstract:
Value Stream Management (VSM) is a widely used methodology in the context of Lean Management for improving end-to-end material and information flows from a supplier to a customer from a company’s perspective. Whereas the design principles, e.g. Pull, value-adding, customer-orientation and further ones are still valid against the background of an increasing digitalized and dynamic environment, the methodology itself for mapping a value stream is characterized as time- and resource-intensive due to the high degree of manual activities. The digitalization of processes in the context of Industry 4.0 enables new opportunities to reduce these manual efforts and make the VSM approach more agile. The paper at hand aims at providing a modular data and calculation framework, utilizing the available business data, provided by information and communication technologies for automizing the value stream mapping process with focus on the manufacturing process.Keywords: lean management 4.0, value stream management (VSM) 4.0, dynamic value stream mapping, enterprise resource planning (ERP)
Procedia PDF Downloads 1514026 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 4864025 Exploring the Interplay Between Emotions, Employee’s Social Cognition and Decision Making Among Employees
Abstract:
The study aims to investigate the relationship between emotions and employee's social cognition and decision-making among employees. The sample of the study was the total number of participants, which included employees from various industries and job positions. Research papers in the same area were reviewed, providing a comprehensive review of existing literature and theoretical frameworks and shedding light on the interpersonal effects of emotions in the workplace. It emphasizes how one worker's emotions can significantly impact the overall work environment and productivity as well as the work of a common phenomenon known as Emotional contagion at the workplace, affecting social interactions and group dynamics. Therefore, this study concludes that Emotional contagion can lead to a ripple effect within the workplace, influencing the overall atmosphere and productivity. Emotions can shape how employees process information and make choices, ultimately impacting organizational outcomes.Keywords: employee decision making, social cognition, emotions, industry, emotional contagion, workplace dynamics
Procedia PDF Downloads 614024 Facility Detection from Image Using Mathematical Morphology
Authors: In-Geun Lim, Sung-Woong Ra
Abstract:
As high resolution satellite images can be used, lots of studies are carried out for exploiting these images in various fields. This paper proposes the method based on mathematical morphology for extracting the ‘horse's hoof shaped object’. This proposed method can make an automatic object detection system to track the meaningful object in a large satellite image rapidly. Mathematical morphology process can apply in binary image, so this method is very simple. Therefore this method can easily extract the ‘horse's hoof shaped object’ from any images which have indistinct edges of the tracking object and have different image qualities depending on filming location, filming time, and filming environment. Using the proposed method by which ‘horse's hoof shaped object’ can be rapidly extracted, the performance of the automatic object detection system can be improved dramatically.Keywords: facility detection, satellite image, object, mathematical morphology
Procedia PDF Downloads 3824023 Analysis of the Fair Distribution of Urban Facilities in Kabul City by Population Modeling
Authors: Ansari Mohammad Reza, Hiroko Ono
Abstract:
In this study, we investigated how much of the urban facilities are fairly distributing in the city of Kabul based on the factor of population. To find the answer to this question we simulated a fair model for the distribution of investigated facilities in the city which is proposed based on the consideration of two factors; the number of users for each facility and the average distance of reach of each facility. Then the model was evaluated to make sure about its efficiency. And finally, the two—the existing pattern and the simulation model—were compared to find the degree of bias in the existing pattern of distribution of facilities in the city. The result of the study clearly clarified that the facilities are not fairly distributed in Kabul city based on the factor of population. Our analysis also revealed that the education services and the parks are the most and the worst fair distributed facilities in this regard.Keywords: Afghanistan, ArcGIS Software, Kabul City, fair distribution, urban facilities
Procedia PDF Downloads 1824022 A Method for Allocation of Smart Intersections Using Traffic Information
Authors: Sang-Tae Ji, Jeong-Woo Park, Jun-Ho Park, Kwang-Woo Nam
Abstract:
This study aims is to suggest the basic factors by considering the priority of intersection in the diffusion project of Smart intersection. Busan Metropolitan City is conducting a smart intersection project for efficient traffic management. The smart intersection project aims to make breakthrough improvement of the intersection congestion by optimizing the signal system using CCTV (closed-circuit television camera) image analysis technology. This study investigated trends of existing researches and analyzed by setting three things of traffic volume, characteristics of intersection road, and whether or not to conduct the main arterial road as factors for selecting new intersection when spreading smart intersection. Using this, we presented the priority of the newly installed intersection through the present situation and analysis for the Busan Metropolitan City which is the main destination of the spreading project of the smart intersection. The results of this study can be used as a consideration in the implementation of smart intersection business.Keywords: CCTV, GIS, ICT, Smart City, smart intersection
Procedia PDF Downloads 3874021 Modeling Nanomechanical Behavior of ZnO Nanowires as a Function of Nano-Diameter
Authors: L. Achou, A. Doghmane
Abstract:
Elastic performances, as an essential property of nanowires (NWs), play a significant role in the design and fabrication of modern nanodevices. In this paper, our interest is focused on ZnO NWs to investigate wire diameter (Dwire ≤ 400 nm) effects on elastic properties. The plotted data reveal that a strong size dependence of the elastic constants exists when the wire diameter is smaller than ~ 100 nm. For larger diameters (Dwire > 100 nm), these ones approach their corresponding bulk values. To enrich this study, we make use of the scanning acoustic microscopy simulation technique. The calculation methodology consists of several steps: determination of longitudinal and transverse wave velocities, calculation of refection coefficients, calculation of acoustic signatures and Rayleigh velocity determination. Quantitatively, it was found that changes in ZnO diameters over the ranges 1 nm ≤ Dwire ≤ 100 nm lead to similar exponential variations, for all elastic parameters, of the from: A = a + b exp(-Dwire/c) where a, b, and c are characteristic constants of a given parameter. The developed relation can be used to predict elastic properties of such NW by just knowing its diameter and vice versa.Keywords: elastic properties, nanowires, semiconductors, theoretical model, ZnO
Procedia PDF Downloads 1694020 Applying Spanning Tree Graph Theory for Automatic Database Normalization
Authors: Chetneti Srisa-an
Abstract:
In Knowledge and Data Engineering field, relational database is the best repository to store data in a real world. It has been using around the world more than eight decades. Normalization is the most important process for the analysis and design of relational databases. It aims at creating a set of relational tables with minimum data redundancy that preserve consistency and facilitate correct insertion, deletion, and modification. Normalization is a major task in the design of relational databases. Despite its importance, very few algorithms have been developed to be used in the design of commercial automatic normalization tools. It is also rare technique to do it automatically rather manually. Moreover, for a large and complex database as of now, it make even harder to do it manually. This paper presents a new complete automated relational database normalization method. It produces the directed graph and spanning tree, first. It then proceeds with generating the 2NF, 3NF and also BCNF normal forms. The benefit of this new algorithm is that it can cope with a large set of complex function dependencies.Keywords: relational database, functional dependency, automatic normalization, primary key, spanning tree
Procedia PDF Downloads 3534019 Studying the Intercalation of Low Density Polyethylene/Clay Nanocomposites after Different UV Exposures
Authors: Samir Al-Zobaidi
Abstract:
This study attempts to understand the effect of different UV irradiation methods on the intercalation of LDPE/MMT nanocomposites, and its molecular behavior at certain isothermal crystallization temperature. Three different methods of UV exposure were employed using single composition of LDPE/MMT nanocomposites. All samples were annealed for 5 hours at a crystallization temperature of 100°C. The crystallization temperature was chosen to be at large supercooling temperature to ensure quick and complete crystallization. The raw material of LDPE consisted of two stable monoclinic and orthorhombic phases according to XRD results. The thermal behavior of both phases acted differently when UV exposure method was changed. The monoclinic phase was more dependent on the method used compared to the orthorhombic phase. The intercalation of clay, as well as, the non-isothermal crystallization temperature, has also shown a clear dependency on the type of UV exposure. A third phase that is thermally less stable was also observed. Its respond to UV irradiation was greater since it contains low molecular weight entities which make it more vulnerable to any UV exposure.Keywords: LDPE/MMt nanocomposites, crystallization, UV irradiation, intercalation
Procedia PDF Downloads 3804018 The Time for the World to Go Back to Forgotten "Values Pedagogy"
Authors: Sakineh Tashakori, Terrence Lovat
Abstract:
With the start of war in every part of the world, from the war between Russia and Ukraine to the unbelievable start of the war between Israel and Palestine, the number of war refugees is increasing day by day. They are all homeless dads, moms, and kids looking for a safe place to go back to their ordinary lives without the fear of being mistreated and misunderstood by others. The significance of this study is to help the education system make life easier for refugees by going to values pedagogy inspired by Habermasian epistemology. The study employs a literature review methodology, which involves gathering relevant sources from academic journals and books to answer how values pedagogy is going to help the education system in this regard. The collected literature will be critically analyzed and synthesized to draw meaningful conclusions and support the argument for the implementation of values pedagogy. The findings of the study illustrate that values pedagogy can have a role in peace education and softening discourse to give students a better sense of mutual cultural and religious understanding and respect.Keywords: war, refugee, values pedagogy, Habermasian epistemology, peace education
Procedia PDF Downloads 564017 Development of Hit Marks on Clothes Using Amino Acid Reagents
Authors: Hyo-Su Lim, Ye-Eun Song, Eun-Bi Lee, Sang-Yoon Lee, Young-Il Seo, Jin-Pyo Kim, Nam-Kyu Park
Abstract:
If we analogize any physical external force given to victims in many crimes including violence, it would be possible not only to presume mutual action between victims and suspects, but to make a deduction of more various facts in cases. Therefore, the aim of this study is to identify criminal tools through secretion on clothes by using amino acid reagents such as Ninhydrin, DFO(1,8-dizafluoren-9-one), 1,2 – IND (1,2-indanedione) which are reacting to skin secretion. For more effective collecting condition, porcine skin which is physiologically similar to human was used. Although there were little differences of shape identification according to sensitivity, amino acid reagents were able to identify the fist, foot, and baseball bat. Furthermore, we conducted the experiments for developmental variations through change over time setting up 5-weeks period including first damage as variation factor, and developing materials in each action through certain reagents. Specimen level of development depending on change over time was identified. As a result, each of initial level of development was seen no changes.Keywords: hit marks, amino acid reagents, porcine skin, criminal tool
Procedia PDF Downloads 2634016 An excessive Screen Time of High School Students in Their Free Time Promotes Our Young People’s Risk of Obesity
Authors: Susana Aldaba Yaben, Marga Echauri Ozcoidi, Rosario Osinaga Cenoz
Abstract:
It was decided to make a diagnosis with students of Berriozar High School between 12 and 15 years (both included) for their lifestyles in relation to eating habits, BMI (Body Mass Index), physical activity, drugs, interpersonal relationships and screen time. The aim of this survey is identifying needs of this population and depending on the results, we could program socio-educational activities. This action is part of the Community Health Promotion Programme and healthy lifestyles in childhood and youth of Berriozar. The eating habits, a lack of physical activity and an excessive screen time are causes of 26,75% of obese or overweight young people. First of all, many of them have got a diet enriched in saturated fats and sugars. Secondly, most of them do not practise physical exercise daily and finally, their screen time are higher than the recommendation (until 2 hours a day).Keywords: lifestyle, diet, BMI, physical activity, screen time, education, youth
Procedia PDF Downloads 5754015 Research on the Transformation of Bottom Space in the Teaching Area of Zijingang Campus, Zhejiang University
Authors: Jia Xu
Abstract:
There is a lot of bottom space in the teaching area of Zijingang Campus of Zhejiang University, which benefits to the ventilation, heat dissipation, circulation, partition of quiet and noisy areas and diversification of spaces. Hangzhou is hot in summer but cold in winter, so teachers and students spend much less time in the bottom space of buildings in winter than in summer. Recently, depending on the teachers and students’ proposals, the school transformed the bottom space in the teaching area to provide space for relaxing, chatting and staying in winter. Surveying and analyzing the existing ways to transform, the paper researches deeply on the transformation projects of bottom space in the teaching buildings. It is believed that this paper can be a salutary lesson to make the bottom space in the teaching areas of universities richer and bring more diverse activities for teachers and students.Keywords: bottom space, teaching area, transformation, Zijingang Campus of Zhejiang University
Procedia PDF Downloads 3984014 Creating Inclusive Educational Environments for Women Faculty of Color Harnessing Ubuntu Perspectives
Authors: Gonzaga Mukasa, Faith Maina, Amani Zaier
Abstract:
This study investigated whether harnessing Ubuntu perspectives can aid in healing wounds Hierarchical Microaggressive intersectionalities inflict on African immigrant women faculty in predominantly white institutions. The study interviewed 8 African immigrant faculty from different higher education institutions in the United States selected using the snowball sampling technique. The Ubuntu Theory anchored the study. Findings indicated that women faculty of color experience Hierarchical Microaggressive intersectionalities leading them to lose job satisfaction and feel deprofessionalized and isolated. The recommendations were that institutions make their recruitment more inclusive of women of color to avoid isolation. And should embrace Ubuntu perspectives such as survival, solidarity, compassion, dignity, and mutual respect to architect educational environments that foster diversity and inclusion.Keywords: ubuntu, women faculty, African immigrants, hierarchical microaggressive intersectionalities
Procedia PDF Downloads 684013 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario
Authors: Shuqi Zhang
Abstract:
Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning
Procedia PDF Downloads 964012 Systems and Procedures in Indonesian Administrative Law
Authors: Andhika Danesjvara
Abstract:
Governance of the Republic of Indonesia should be based on the principle of sovereignty and the rule of law. Based on these principles, all forms of decisions and/or actions of government administration should be based on the sovereignty of the people and the law. Decisions and/or actions for citizens should be based on the provisions of the legislation and the general principles of good governance. Control of the decisions and/or actions is a part of administrative review and also judicial control. The control is part of the administrative justice system, which is intended for people affected by the decisions or administrative actions. This control is the duty and authority of the government or independent administrative court. Therefore, systems and procedures for the implementation of the task of governance and development must be regulated by law. Systems and procedures of governance is a subject studied in administrative law, therefore, the research also includes a review of the principles of law in administrative law. The administrative law procedure is important for the government to make decisions, the question is whether the procedures are part of the justice system itself.Keywords: administrative court, administrative justice, administrative law, administrative procedures
Procedia PDF Downloads 2864011 Estimating Lost Digital Video Frames Using Unidirectional and Bidirectional Estimation Based on Autoregressive Time Model
Authors: Navid Daryasafar, Nima Farshidfar
Abstract:
In this article, we make attempt to hide error in video with an emphasis on the time-wise use of autoregressive (AR) models. To resolve this problem, we assume that all information in one or more video frames is lost. Then, lost frames are estimated using analogous Pixels time information in successive frames. Accordingly, after presenting autoregressive models and how they are applied to estimate lost frames, two general methods are presented for using these models. The first method which is the same standard method of autoregressive models estimates lost frame in unidirectional form. Usually, in such condition, previous frames information is used for estimating lost frame. Yet, in the second method, information from the previous and next frames is used for estimating the lost frame. As a result, this method is known as bidirectional estimation. Then, carrying out a series of tests, performance of each method is assessed in different modes. And, results are compared.Keywords: error steganography, unidirectional estimation, bidirectional estimation, AR linear estimation
Procedia PDF Downloads 5414010 Area Efficient Carry Select Adder Using XOR Gate Design
Authors: Mahendrapal Singh Pachlaniya, Laxmi Kumre
Abstract:
The AOI (AND – OR- INVERTER) based design of XOR gate is proposed in this paper with less number of gates. This new XOR gate required four basic gates and basic gate include only AND, OR, Inverter (AOI). Conventional XOR gate required five basic gates. Ripple Carry Adder (RCA) used in parallel addition but propagation delay time is large. RCA replaced with Carry Select Adder (CSLA) to reduce propagation delay time. CSLA design with dual RCA considering carry = ‘0’ and carry = ‘1’, so it is not an area efficient adder. To make area efficient, modified CSLA is designed with single RCA considering carry = ‘0’ and another RCA considering carry = ‘1’ replaced with Binary to Excess 1 Converter (BEC). Now replacement of conventional XOR gate by new design of XOR gate in modified CSLA reduces much area compared to regular CSLA and modified CSLA.Keywords: CSLA, BEC, XOR gate, area efficient
Procedia PDF Downloads 3624009 Effect of Irradiation on Nano-Indentation Properties and Microstructure of X-750 Ni-Based Superalloy
Authors: Pooyan Changizian, Zhongwen Yao
Abstract:
The purpose of current study is to make an excellent correlation between mechanical properties and microstructures of ion irradiated X-750 Ni-based superalloy. Towards this end, two different irradiation procedures were carried out, including single Ni ion irradiation and pre-helium implantation with subsequent Ni ion irradiation. Nano-indentation technique was employed to evaluate the mechanical properties of irradiated material. The nano-hardness measurements depict highly different results for two irradiation procedures. Single ion irradiated X-750 shows softening behavior; however, pre-helium implanted specimens present significant hardening compared to the un-irradiated material. Cross-section TEM examination demonstrates that softening is attributed to the γ׳-precipitate instability (disordering/dissolution) which overcomes the hardening effect of irradiation-induced defects. In contrast, the presence of cavities or helium bubbles is probably the main cause for irradiation-induced hardening of helium implanted samples.Keywords: Inconel X-750, nanoindentation, helium bubbles, defects
Procedia PDF Downloads 2244008 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 6854007 Attitudes, Knowledge and Perceptions towards Cervical Cancer Messages among Female University Students
Authors: Anne Nattembo
Abstract:
Cervical cancer remains a major public health problem in developing countries, especially in Africa. Effective cervical cancer prevention communication requires identification of behaviors, attitudes and increasing awareness of a given population; thus this study focused on investigating awareness, attitudes, and behavior among female university students towards cervical cancer messages. The study objectives sought to investigate the communication behavior of young adults towards cervical cancer, to understand female students recognition of cervical cancer as a problem, to identify the frames related to cervical cancer and their impact towards audience communication and participation behaviors, to identify the factors that influence behavioral intentions and level of involvement towards cervical cancer services and to make recommendations on how to improve cervical cancer communication towards female university students. The researcher obtained data using semi-structured interviews and focus group discussions targeting 90 respondents. The semi-structured in-depth interviews were carried out through one-on-one discussions basis using a set of prepared questions among 53 respondents. All interviews were audio-tape recorded. Each interview was directly typed into Microsoft Word. 4 focus group discussions were conducted with a total of 37 respondents; 2 female only groups with 10 respondents in one and 9 respondents in another, 1 mixed with 12 participants 5 of whom were male, and 1 male only group with 6 participants. The key findings show that the participants preferred to receive and access cervical cancer information from doctors although they were mainly receiving information from the radio. In regards to the type of public the respondents represent, majority of the respondents were non-publics in the sense that they did not have knowledge about cervical cancer, had low levels of involvement and had high constraint recognition their cervical cancer knowledge levels. The researcher identified the most salient audience frames among female university students towards cervical cancer and these included; death, loss, and fear. These frames did not necessarily make cervical cancer an issue of concern among the female university students but rather an issue they distanced themselves from as they did not perceive it as a risk. The study also identified the constraints respondents face in responding to cervical cancer campaign calls-to-action which included; stigma, lack of knowledge and access to services as well as lack of recommendation from doctors. In regards to sex differences, females had more knowledge about cervical cancer than the males. In conclusion the study highlights the importance of interpersonal communication in risk or health communication with a focus on health providers proactively sharing cervical cancer prevention information with their patients. Health provider’s involvement in cervical cancer is very important in influencing behavior and compliance of cervical cancer calls-to-action. The study also provides recommendations for designing effective cervical cancer campaigns that will positively impact on the audience such as packaging cervical cancer messages that also target the males as a way of increasing their involvement and more campaigns to increase awareness of cervical cancer as well as designing positive framed messages to counter the negative audience frames towards cervical cancer.Keywords: cervical cancer communication, health communication, university students, risk communication
Procedia PDF Downloads 2344006 A Review Article on Physical Therapy Methods for Children with Cerebral Palsy Rehabilitation
Authors: Andrew Anis Fakhrey Mosaad
Abstract:
Introduction: Children with cerebral palsy (CP) can be rehabilitated using a variety of methods and strategies, from traditional and conservative methods to more intricate motor learning-based theories such as sensory-motor integration and neurodevelopmental treatment. Method: Since sensory, cognitive, communication, perceptual, and/or behavioral abnormalities are often present alongside motor impairments in children with cerebral palsy, therapy approaches are tailored to each child's specific needs. Using evidence-based practices guarantees that kids make the most progress possible. Task-specific exercises and active engagement are the cornerstones of effective physical therapy regimens, which enhance motor recovery by potentially plasticizing the central nervous system (CNS). Conclusion: The goal of CP rehabilitation for kids is to improve their functional ability, gait, balance, and motor development. Presenting various methods frequently employed in the rehabilitation of children with cerebral palsy was the aim of this review.Keywords: children, cerebral palsy, rehabilitation, physical therapy
Procedia PDF Downloads 12