Search results for: NAND flash based SSD
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 28317

Search results for: NAND flash based SSD

26547 Adaptive Process Monitoring for Time-Varying Situations Using Statistical Learning Algorithms

Authors: Seulki Lee, Seoung Bum Kim

Abstract:

Statistical process control (SPC) is a practical and effective method for quality control. The most important and widely used technique in SPC is a control chart. The main goal of a control chart is to detect any assignable changes that affect the quality output. Most conventional control charts, such as Hotelling’s T2 charts, are commonly based on the assumption that the quality characteristics follow a multivariate normal distribution. However, in modern complicated manufacturing systems, appropriate control chart techniques that can efficiently handle the nonnormal processes are required. To overcome the shortcomings of conventional control charts for nonnormal processes, several methods have been proposed to combine statistical learning algorithms and multivariate control charts. Statistical learning-based control charts, such as support vector data description (SVDD)-based charts, k-nearest neighbors-based charts, have proven their improved performance in nonnormal situations compared to that of the T2 chart. Beside the nonnormal property, time-varying operations are also quite common in real manufacturing fields because of various factors such as product and set-point changes, seasonal variations, catalyst degradation, and sensor drifting. However, traditional control charts cannot accommodate future condition changes of the process because they are formulated based on the data information recorded in the early stage of the process. In the present paper, we propose a SVDD algorithm-based control chart, which is capable of adaptively monitoring time-varying and nonnormal processes. We reformulated the SVDD algorithm into a time-adaptive SVDD algorithm by adding a weighting factor that reflects time-varying situations. Moreover, we defined the updating region for the efficient model-updating structure of the control chart. The proposed control chart simultaneously allows efficient model updates and timely detection of out-of-control signals. The effectiveness and applicability of the proposed chart were demonstrated through experiments with the simulated data and the real data from the metal frame process in mobile device manufacturing.

Keywords: multivariate control chart, nonparametric method, support vector data description, time-varying process

Procedia PDF Downloads 299
26546 Dynamics of Soil Fertility Management in India: An Empirical Analysis

Authors: B. Suresh Reddy

Abstract:

The over dependence on chemical fertilizers for nutrient management in crop production for the last few decades has led to several problems affecting soil health, environment and farmers themselves. Based on the field work done in 2012-13 with 1080 farmers of different size-classes in semi-arid regions of Uttar Pradesh, Jharkhand and Madhya Pradesh states of India, this paper reveals that the farmers in semi-arid regions of India are actively managing soil fertility and other soil properties through a wide range of practices that are based on local resources and knowledge. It also highlights the socio-economic web woven around these soil fertility management practices. This study highlights the contribution of organic matter by traditional soil fertility management practices in maintaining the soil health. Livestock has profound influence on the soil fertility enhancement through supply of organic manure. Empirical data of this study has clearly revealed how farmers’ soil fertility management options are being undermined by government policies that give more priority to chemical fertiliser-based strategies. Based on the findings it is argued that there should be a 'level playing field' for both organic and inorganic soil fertility management methods by promoting and supporting farmers in using organic methods. There is a need to provide credit to farmers for adopting his choice of soil fertility management methods which suits his socio-economic conditions and that best suits the long term productivity of soils. The study suggests that the government policies related to soil fertility management must be enabling, creating the conditions for development based more on locally available resources and local skills and knowledge. This will not only keep Indian soils in healthy condition but also support the livelihoods of millions of people, especially the small and marginal farmers.

Keywords: livestock, organic matter, small farmers, soil fertility

Procedia PDF Downloads 174
26545 The Methodology of System Modeling of Mechatronic Systems

Authors: Lakhoua Najeh

Abstract:

Aims of the work: After a presentation of the functionality of an example of a mechatronic system which is a paint mixer system, we present the concepts of modeling and safe operation. This paper briefly discusses how to model and protect the functioning of a mechatronic system relying mainly on functional analysis and safe operation techniques. Methods: For the study of an example of a mechatronic system, we use methods for external functional analysis that illustrate the relationships between a mechatronic system and its external environment. Thus, we present the Safe-Structured Analysis Design Technique method (Safe-SADT) which allows the representation of a mechatronic system. A model of operating safety and automation is proposed. This model enables us to use a functional analysis technique of the mechatronic system based on the GRAFCET (Graphe Fonctionnel de Commande des Etapes et Transitions: Step Transition Function Chart) method; study of the safe operation of the mechatronic system based on the Safe-SADT method; automation of the mechatronic system based on a software tool. Results: The expected results are to propose a model and safe operation of a mechatronic system. This methodology enables us to analyze the relevance of the different models based on Safe-SADT and GRAFCET in relation to the control and monitoring functions and to study the means allowing exploiting their synergy. Conclusion: In order to propose a general model of a mechatronic system, a model of analysis, safety operation and automation of a mechatronic system has been developed. This is how we propose to validate this methodology through a case study of a paint mixer system.

Keywords: mechatronic systems, system modeling, safe operation, Safe-SADT

Procedia PDF Downloads 245
26544 Forensic Detection of Errors Permitted by the Witnesses in Their Testimony

Authors: Lev Bertovsky

Abstract:

The purpose of this study was to determine the reasons for the formation of false testimony from witnesses and make recommendations on the recognition of such cases. During the studies, which were based on the achievements of professionals in the field of psychology, as well as personal investigative practice, the stages of perception of the information were studied, as well as the process of its reclaim from the memory and transmission to the communicator upon request. Based on the principles of the human brain, kinds of conscientious witness mistakes were systematized. Proposals were formulated for the optimization of investigative actions in cases where the witnesses make an honest mistake with respect to the effects previously observed by them.

Keywords: criminology, eyewitness testimony, honest mistake, information, investigator, investigation, questioning

Procedia PDF Downloads 185
26543 Study on Shape Coefficient of Large Statue Building Based on CFD

Authors: Wang Guangda, Ma Jun, Zhao Caiqi, Pan Rui

Abstract:

Wind load is the main control load of large statue structures. Due to the irregular plane and elevation and uneven outer contour, statues’ shape coefficient can not pick up from the current code. Currently a common practice is based on wind tunnel test. But this method is time-consuming and high cost. In this paper, based on the fundamental theory of CFD, using fluid dynamics software of Fluent 15.0, a few large statue structure of 40 to 70m high, which are located in china , including large fairy statues and large Buddha statues, are analyzed by numerical wind tunnel. The results are contrasted with the recommended values in load code and the wind tunnel test results respectively. Results show that the shape coefficient has a good reliability by the numerical wind tunnel method of this kind of building. This will has a certain reference value of wind load values for large statues’ structure.

Keywords: large statue structure, shape coefficient, irregular structure, wind tunnel test, numerical wind tunnel simulation

Procedia PDF Downloads 375
26542 Importance of Infrastucture Delivery and Management in South Africa

Authors: Onyeka Nkwonta, Theo Haupt, Karana Padayachee

Abstract:

This study aims primarily to identify potential causes of the bottlenecks in the public sector that affect delivery and formulate evidence-based interventions to improve delivery and management of infrastructure projects. An initial literature review was carried out on infrastructural development and delivery in South Africa, with the aim to formulate evidence-based interventions to improve delivery within the sector. The infrastructure delivery management model was developed to map out best practice delivery processes. These will become the backbone on which improvement initiatives that will be developed within participating stakeholders. The model will, in turn, support a range of methodologies, including the risk system and a knowledge management framework. It will also look at key challenges facing departments with the ability to ensure knowledge and skills transfer at various sectors. The research is limited because the findings were based on existing literature. This study adopted an indirect approach for infrastructure management by focussing on the challenges faced and approaches adopted to overcome these challenges. This may narrow the consideration of some of the viewpoints, thereby limiting the richness of experience available to this research.

Keywords: infrastructure, management, challenges, South Africa

Procedia PDF Downloads 138
26541 Poverty Versus Interest-Based Loans in East Africa: Can Interest-Free Loans Rescue the Situation?

Authors: Maulana Ayoub Ali

Abstract:

“Both Socialist as well as the capitalist in the economic systems have proven their failure to ensure economic justice that serves to benefit all in the society, both the rich and the poor. In particular, capitalism is currently causing a terrifying scenario by making the rich richer and the poor poorer” . In this paper, the author looks at the level of exploitation which is taking place to small and middle entrepreneurs (SME’s), government and private employees as well as large investors in East African countries who depends on interest-based loans which undermines their lives every day due to heavy monthly returns. Numbers of families have been evicted from their family premises and SME’s properties have been attached in the courts due to failure to return their loans timely. In fact, there are a lot of issues which have taken place on the ground which badly affected number of families socially and most importantly economically due to engagement in interest-based loans offered by commercial banks in East Africa. This paper looks on the alternative ways of eliminating interest-based loans to better lives of devastated Africans who are almost “dying” of heavy debts generated through higher interest loans. Reaching to that particular root the author has visited various literatures in a bid to deeply investigate and find out the best alternative mode of enabling African SME’s, businessmen and employees to benefit from the interest-free loans. The question is whether interest-free loans can be a long term solution towards poverty alleviation in East Africa generally and Tanzania in particular.

Keywords: interest-free loans, SME’s, financial institutions, poverty, east Africa

Procedia PDF Downloads 329
26540 Hybrid Control Mode Based on Multi-Sensor Information by Fuzzy Approach for Navigation Task of Autonomous Mobile Robot

Authors: Jonqlan Lin, C. Y. Tasi, K. H. Lin

Abstract:

This paper addresses the issue of the autonomous mobile robot (AMR) navigation task based on the hybrid control modes. The novel hybrid control mode, based on multi-sensors information by using the fuzzy approach, has been presented in this research. The system operates in real time, is robust, enables the robot to operate with imprecise knowledge, and takes into account the physical limitations of the environment in which the robot moves, obtaining satisfactory responses for a large number of different situations. An experiment is simulated and carried out with a pioneer mobile robot. From the experimental results, the effectiveness and usefulness of the proposed AMR obstacle avoidance and navigation scheme are confirmed. The experimental results show the feasibility, and the control system has improved the navigation accuracy. The implementation of the controller is robust, has a low execution time, and allows an easy design and tuning of the fuzzy knowledge base.

Keywords: autonomous mobile robot, obstacle avoidance, MEMS, hybrid control mode, navigation control

Procedia PDF Downloads 466
26539 The Study on Life of Valves Evaluation Based on Tests Data

Authors: Binjuan Xu, Qian Zhao, Ping Jiang, Bo Guo, Zhijun Cheng, Xiaoyue Wu

Abstract:

Astronautical valves are key units in engine systems of astronautical products; their reliability will influence results of rocket or missile launching, even lead to damage to staff and devices on the ground. Besides failure in engine system may influence the hitting accuracy and flight shot of missiles. Therefore high reliability is quite essential to astronautical products. There are quite a few literature doing research based on few failure test data to estimate valves’ reliability, thus this paper proposed a new method to estimate valves’ reliability, according to the corresponding tests of different failure modes, this paper takes advantage of tests data which acquired from temperature, vibration, and action tests to estimate reliability in every failure modes, then this paper has regarded these three kinds of tests as three stages in products’ process to integrate these results to acquire valves’ reliability. Through the comparison of results achieving from tests data and simulated data, the results have illustrated how to obtain valves’ reliability based on the few failure data with failure modes and prove that the results are effective and rational.

Keywords: censored data, temperature tests, valves, vibration tests

Procedia PDF Downloads 345
26538 Switched System Diagnosis Based on Intelligent State Filtering with Unknown Models

Authors: Nada Slimane, Foued Theljani, Faouzi Bouani

Abstract:

The paper addresses the problem of fault diagnosis for systems operating in several modes (normal or faulty) based on states assessment. We use, for this purpose, a methodology consisting of three main processes: 1) sequential data clustering, 2) linear model regression and 3) state filtering. Typically, Kalman Filter (KF) is an algorithm that provides estimation of unknown states using a sequence of I/O measurements. Inevitably, although it is an efficient technique for state estimation, it presents two main weaknesses. First, it merely predicts states without being able to isolate/classify them according to their different operating modes, whether normal or faulty modes. To deal with this dilemma, the KF is endowed with an extra clustering step based fully on sequential version of the k-means algorithm. Second, to provide state estimation, KF requires state space models, which can be unknown. A linear regularized regression is used to identify the required models. To prove its effectiveness, the proposed approach is assessed on a simulated benchmark.

Keywords: clustering, diagnosis, Kalman Filtering, k-means, regularized regression

Procedia PDF Downloads 182
26537 Axial Load Capacity of Drilled Shafts from In-Situ Test Data at Semani Site, in Albania

Authors: Neritan Shkodrani, Klearta Rrushi, Anxhela Shaha

Abstract:

Generally, the design of axial load capacity of deep foundations is based on the data provided from field tests, such as SPT (Standard Penetration Test) and CPT (Cone Penetration Test) tests. This paper reports the results of axial load capacity analysis of drilled shafts at a construction site at Semani, in Fier county, Fier prefecture in Albania. In this case, the axial load capacity analyses are based on the data of 416 SPT tests and 12 CPTU tests, which are carried out in this site construction using 12 boreholes (10 borings of a depth 30.0 m and 2 borings of a depth of 80.0m). The considered foundation widths range from 0.5m to 2.5 m and foundation embedment lengths is fixed at a value of 25m. SPT – based analytical methods from the Japanese practice of design (Building Standard Law of Japan) and CPT – based analytical Eslami and Fellenius methods are used for obtaining axial ultimate load capacity of drilled shafts. The considered drilled shaft (25m long and 0.5m - 2.5m in diameter) is analyzed for the soil conditions of each borehole. The values obtained from sets of calculations are shown in different charts. Then the reported axial load capacity values acquired from SPT and CPTU data are compared and some conclusions are found related to the mentioned methods of calculations.

Keywords: deep foundations, drilled shafts, axial load capacity, ultimate load capacity, allowable load capacity, SPT test, CPTU test

Procedia PDF Downloads 104
26536 Using Photo-Elicitation to Explore the Cosmology of Personal Training

Authors: John Gray, Andy Smith, Hazel James

Abstract:

With the introduction of projects such as GP referral and other medical exercise schemes, there has been a shift in the cosmology underpinning exercise leadership. That is, the knowledge base of exercise leaders, specifically personal trainers, has moved from a cosmology based on aesthetic and physical fitness demands to one requiring interaction with the dominant biomedical model underpinning contemporary medicine. In line with this shift research has demonstrated that personal trainer education has aligned itself to a biotechnological model. However, whilst there is a need to examine exercise as medicine, and consider the role of personal trainers as prescribers of these interventions, the possible issues surrounding the growing medicalization of the exercise cosmology have not been explored. Using a phenomenological methodology, and the novel approach of photo-elicitation, this research examined the practices of successful personal trainers. The findings highlight that a growing focus on an iatro-biological based scientific process of exercise prescription may prove problematical. Through the development of a model of practitioner-based knowledge, it is argued there is a possible growing disconnection between the theoretical basis of exercise science and the working cosmology of exercise practitioners.

Keywords: biomedicine, cosmology, personal training, photo-elicitation

Procedia PDF Downloads 380
26535 Non-Contact Human Movement Monitoring Technique for Security Control System Based 2n Electrostatic Induction

Authors: Koichi Kurita

Abstract:

In this study, an effective non-contact technique for the detection of human physical activity is proposed. The technique is based on detecting the electrostatic induction current generated by the walking motion under non-contact and non-attached conditions. A theoretical model for the electrostatic induction current generated because of a change in the electric potential of the human body is proposed. By comparing the obtained electrostatic induction current with the theoretical model, it becomes obvious that this model effectively explains the behavior of the waveform of the electrostatic induction current. The normal walking motions are recorded using a portable sensor measurement located in a passageway of office building. The obtained results show that detailed information regarding physical activity such as a walking cycle can be estimated using our proposed technique. This suggests that the proposed technique which is based on the detection of the walking signal, can be successfully applied to the detection of human walking motion in a secured building.

Keywords: human walking motion, access control, electrostatic induction, alarm monitoring

Procedia PDF Downloads 357
26534 Efficient Variable Modulation Scheme Based on Codebook in the MIMO-OFDM System

Authors: Yong-Jun Kim, Jae-Hyun Ro, Chang-Bin Ha, Hyoung-Kyu Song

Abstract:

Because current wireless communication requires high reliability in a limited bandwidth environment, this paper proposes the variable modulation scheme based on the codebook. The variable modulation scheme adjusts transmission power using the codebook in accordance with hannel state. Also, if the codebook is composed of many bits, the reliability is more improved by the proposed scheme. The simulation results show that the performance of proposed scheme has better reliability than the the performance of conventional scheme.

Keywords: MIMO-OFDM, variable modulation, codebook, channel state

Procedia PDF Downloads 587
26533 Linear Complementary Based Approach for Unilateral Frictional Contact between Wheel and Beam

Authors: Muskaan Sethi, Arnab Banerjee, Bappaditya Manna

Abstract:

The present paper aims to investigate a suitable contact between a wheel rolling over a flexible beam. A Linear Complementary (LCP) based approach has been adopted to simulate the contact dynamics for a rigid wheel traversing over a flexible Euler Bernoulli simply supported beam. The adopted methodology is suitable to incorporate the effect of frictional force acting at the wheel-beam interface. Moreover, the possibility of the generation of a gap between the two bodies has also been considered. The present method is based on a unilateral contact assumption which assumes that no penetration would occur when the two bodies come in contact. This assumption helps to predict the contact between wheels and beams in a more practical sense. The proposed methodology is validated with the previously published results and is found to be in good agreement. Further, this method is applied to simulate the contact between wheels and beams for various railway configurations. Moreover, different parametric studies are conducted to study the contact dynamics between the wheel and beam more thoroughly.

Keywords: contact dynamics, linear complementary problem, railway dynamics, unilateral contact

Procedia PDF Downloads 101
26532 The Development of Ability in Reading Comprehension Based on Metacognitive Strategies for Mattayom 3 Students

Authors: Kanlaya Ratanasuphakarn, Suttipong Boonphadung

Abstract:

The research on the development of ability in reading comprehension based on metacognitive strategies aimed to (1) improve the students’development of ability in reading comprehension based on metacognitive strategies, (2) evaluate the students’ satisfaction on using metacognitive strategies in learning as a tool developing the ability in reading comprehension. Forty-eight of Mattayom 3 students who have enrolled in the subject of research for learning development of semester 2 in 2013 were purposively selected as the research cohort. The research tools were lesson plans for reading comprehension, pre-posttest and satisfaction questionnaire that were approved as content validity and reliability (IOC=.66-1.00,0.967). The research found that the development of ability in reading comprehension of the research samples before using metacognitive strategies in learning activities was in the normal high level. Additionally, the research discovered that the students’ satisfaction of the research cohort after applying model in learning activities appeared to be high level of satisfaction on using metacognitive strategies in learning as a tool for the development of ability in reading comprehension.

Keywords: development of ability, metacognitive strategies, satisfaction, reading comprehension

Procedia PDF Downloads 309
26531 Resilience Perspective on Response Strategies for Super-Standard Rain and Flood Disasters: A Case Study of the “Zhengzhou 7.20 Heavy Rain” Event

Authors: Luojie Tang

Abstract:

The article takes the "7.20 Heavy Rainstorm in Zhengzhou" as a starting point, collects relevant disaster data, reproduces the entire process of the disaster, and identifies the main problems exposed by the city in responding to super-standard rain and flood disasters. Based on the review of resilience theory, the article proposes a shift in thinking about the response to super-standard rain and flood disasters from the perspective of resilience, clarifies the differences in the emphasis on resilience at different stages of disasters, and preliminarily constructs a response system for super-standard rain and flood disasters based on the guidance of resilience theory. Finally, combined with the highlighted problems in the 7.20 Heavy Rainstorm in Zhengzhou, the article proposes targeted response strategies from three perspectives: institutional management, technological support, and infrastructure, under the perspective of resilience.

Keywords: resilient city, exceedance-based stormwater management, disaster risk reduction, megalopolis

Procedia PDF Downloads 114
26530 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 278
26529 Reliability Assessment and Failure Detection in a Complex Human-Machine System Using Agent-Based and Human Decision-Making Modeling

Authors: Sanjal Gavande, Thomas Mazzuchi, Shahram Sarkani

Abstract:

In a complex aerospace operational environment, identifying failures in a procedure involving multiple human-machine interactions are difficult. These failures could lead to accidents causing loss of hardware or human life. The likelihood of failure further increases if operational procedures are tested for a novel system with multiple human-machine interfaces and with no prior performance data. The existing approach in the literature of reviewing complex operational tasks in a flowchart or tabular form doesn’t provide any insight into potential system failures due to human decision-making ability. To address these challenges, this research explores an agent-based simulation approach for reliability assessment and fault detection in complex human-machine systems while utilizing a human decision-making model. The simulation will predict the emergent behavior of the system due to the interaction between humans and their decision-making capability with the varying states of the machine and vice-versa. Overall system reliability will be evaluated based on a defined set of success-criteria conditions and the number of recorded failures over an assigned limit of Monte Carlo runs. The study also aims at identifying high-likelihood failure locations for the system. The research concludes that system reliability and failures can be effectively calculated when individual human and machine agent states are clearly defined. This research is limited to the operations phase of a system lifecycle process in an aerospace environment only. Further exploration of the proposed agent-based and human decision-making model will be required to allow for a greater understanding of this topic for application outside of the operations domain.

Keywords: agent-based model, complex human-machine system, human decision-making model, system reliability assessment

Procedia PDF Downloads 168
26528 Mobile Games Applications Android-Based Physics Education to Improve Student Motivation and Interest in Learning Physics

Authors: Rizky Dwi A, Mikha Herlina Pi

Abstract:

Physics lessons for high school students, especially in Indonesia is less desirable because many people believe that physics is very difficult, especially the development of increasingly sophisticated era make online gaming more attractive many people especially school children with a variety of increasingly sophisticated gadgets. Therefore, if those two things combined to attract students in physics, the physics-based educational game android can motivate students' interest and understanding of the physics because while playing, they can also learn physics.

Keywords: education, game physics, interest, student's motivation

Procedia PDF Downloads 281
26527 The Contribution of Buddhist-Based Mindfulness Practices on Ethical Leadership: A Qualitative Study of Organizational Leaders in Thailand

Authors: Kunkanit Sutamchai, Kate E. Rowlands

Abstract:

Recent public ethical scandals in many organizations around the world have raised concern about organizational ethics, which have, in turn, made ethical behaviors and conducts on the part of leaders become more critical topics in organizational studies. However, current research on the benefits of mindfulness within the workplace contexts has predominantly focused on stress reduction and work performance enhancement, while the aspects of ethical behavior development have been far less investigated in mindfulness research in the organizational and management fields. Only recently has there been an emerging call for organizational researchers and practitioners to study mindfulness concepts and practices from the original Buddhist perspectives given that ethics is regarded as a foundation for Buddhist mindfulness. Yet little, if any, empirical research on the contributions of mindfulness practices to ethical leadership has been done in Eastern Buddhist contexts. Therefore, this study aims to explore the extent to which and how Buddhist-based mindfulness practices can influence organizational leaders’ ethical values and practices. On this basis, Thailand was selected as a context of study due to a predominantly Buddhist society and culture. Qualitative data were gathered through in-depth semi-structured interviews with twenty executive leaders from various private organizations in Thailand, who practice Buddhist-based mindfulness meditation regularly. The findings from this study shed light on the role Buddhist-based mindfulness practices can play in promoting ethical behavior among executive leaders in Thailand. The results also suggest that ethical values and practices influenced by Buddhist-based mindfulness practices are well aligned with the elements appeared in the inter-disciplinary and cross-cultural ethical leadership framework, namely: humane, justice, sustainability and responsibility, and moderation. This study concludes that the integration of ethical dimensions to mindfulness practices may provide promising opportunities for ethical leadership development, particularly in the context of Thailand. This could contribute significantly to the future development of both organizations and society at large. The study also suggests that mindfulness interventions in organizational contexts should place more explicit emphasis on ethics. This may be done by relating the ethical principles underlying Buddhist-based mindfulness to other ethical systems in different contexts and cultures where they can be aligned.

Keywords: Buddhism, ethical leadership, leadership development, mindfulness, Thailand, training

Procedia PDF Downloads 171
26526 Community Structure Detection in Networks Based on Bee Colony

Authors: Bilal Saoud

Abstract:

In this paper, we propose a new method to find the community structure in networks. Our method is based on bee colony and the maximization of modularity to find the community structure. We use a bee colony algorithm to find the first community structure that has a good value of modularity. To improve the community structure, that was found, we merge communities until we get a community structure that has a high value of modularity. We provide a general framework for implementing our approach. We tested our method on computer-generated and real-world networks with a comparison to very known community detection methods. The obtained results show the effectiveness of our proposition.

Keywords: bee colony, networks, modularity, normalized mutual information

Procedia PDF Downloads 406
26525 Decentralised Edge Authentication in the Industrial Enterprise IoT Space

Authors: C. P. Autry, A.W. Roscoe

Abstract:

Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication.

Keywords: authentication, enterprise IoT cybersecurity, PKI/TTP, IoT space

Procedia PDF Downloads 169
26524 A Strategic Partner Evaluation Model for the Project Based Enterprises

Authors: Woosik Jang, Seung H. Han

Abstract:

The optimal partner selection is one of the most important factors to pursue the project’s success. However, in practice, there is a gaps in perception of success depending on the role of the enterprises for the projects. This frequently makes a relations between the partner evaluation results and the project’s final performances, insufficiently. To meet this challenges, this study proposes a strategic partner evaluation model considering the perception gaps between enterprises. A total 3 times of survey was performed; factor selection, perception gap analysis, and case application. After then total 8 factors are extracted from independent sample t-test and Borich model to set-up the evaluation model. Finally, through the case applications, only 16 enterprises are re-evaluated to “Good” grade among the 22 “Good” grade from existing model. On the contrary, 12 enterprises are re-evaluated to “Good” grade among the 19 “Bad” grade from existing model. Consequently, the perception gaps based evaluation model is expected to improve the decision making quality and also enhance the probability of project’s success.

Keywords: partner evaluation model, project based enterprise, decision making, perception gap, project performance

Procedia PDF Downloads 157
26523 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 476
26522 Voice Liveness Detection Using Kolmogorov Arnold Networks

Authors: Arth J. Shah, Madhu R. Kamble

Abstract:

Voice biometric liveness detection is customized to certify an authentication process of the voice data presented is genuine and not a recording or synthetic voice. With the rise of deepfakes and other equivalently sophisticated spoofing generation techniques, it’s becoming challenging to ensure that the person on the other end is a live speaker or not. Voice Liveness Detection (VLD) system is a group of security measures which detect and prevent voice spoofing attacks. Motivated by the recent development of the Kolmogorov-Arnold Network (KAN) based on the Kolmogorov-Arnold theorem, we proposed KAN for the VLD task. To date, multilayer perceptron (MLP) based classifiers have been used for the classification tasks. We aim to capture not only the compositional structure of the model but also to optimize the values of univariate functions. This study explains the mathematical as well as experimental analysis of KAN for VLD tasks, thereby opening a new perspective for scientists to work on speech and signal processing-based tasks. This study emerges as a combination of traditional signal processing tasks and new deep learning models, which further proved to be a better combination for VLD tasks. The experiments are performed on the POCO and ASVSpoof 2017 V2 database. We used Constant Q-transform, Mel, and short-time Fourier transform (STFT) based front-end features and used CNN, BiLSTM, and KAN as back-end classifiers. The best accuracy is 91.26 % on the POCO database using STFT features with the KAN classifier. In the ASVSpoof 2017 V2 database, the lowest EER we obtained was 26.42 %, using CQT features and KAN as a classifier.

Keywords: Kolmogorov Arnold networks, multilayer perceptron, pop noise, voice liveness detection

Procedia PDF Downloads 39
26521 Preventive Maintenance of Rotating Machinery Based on Vibration Diagnosis of Rolling Bearing

Authors: T. Bensana, S. Mekhilef

Abstract:

The methodology of vibration based condition monitoring technology has been developing at a rapid stage in the recent years suiting to the maintenance of sophisticated and complicated machines. The ability of wavelet analysis to efficiently detect non-stationary, non-periodic, transient features of the vibration signal makes it a demanding tool for condition monitoring. This paper presents a methodology for fault diagnosis of rolling element bearings based on wavelet envelope power spectrum technique is analysed in both the time and frequency domains. In the time domain the auto-correlation of the wavelet de-noised signal is applied to evaluate the period of the fault pulses. However, in the frequency domain the wavelet envelope power spectrum has been used to identify the fault frequencies with the single sided complex Laplace wavelet as the mother wavelet function. Results show the superiority of the proposed method and its effectiveness in extracting fault features from the raw vibration signal.

Keywords: preventive maintenance, fault diagnostics, rolling element bearings, wavelet de-noising

Procedia PDF Downloads 379
26520 An Analysis of Discourse Markers Awareness in Writing Undergraduate Thesis of English Education Student in Sebelas Maret University

Authors: Oktanika Wahyu Nurjanah, Anggun Fitriana Dewi

Abstract:

An undergraduate thesis is one of the academic writings which should fulfill some characteristics, one of them is coherency. Moreover, a coherence of a text depends on the usage of discourse markers. In other word, discourse markers take an essential role in writing. Therefore, the researchers aim to know the awareness of the discourse markers usage in writing the under-graduate thesis of an English Education student at Sebelas Maret University. This research uses a qualitative case study in order to obtain a deep analysis. The sample of this research is an under-graduate thesis of English Education student in Sebelas Maret University which chosen based on some criteria. Additionally, the researchers were guided by some literature attempted to group the discourse markers based on their functions. Afterward, the analysis was held based on it. From the analysis, it found that the awareness of discourse markers usage is moderate. The last point, the researcher suggest undergraduate students to familiarize themselves with discourse markers, especially for those who want to write thesis.

Keywords: discourse markers, English education, thesis writing, undergraduate student

Procedia PDF Downloads 357
26519 Market Acceptance of a Murabaha-Based Finance Structure within a Social Network of Non-Islamic Small and Medium Enterprise Owners in African Procurement

Authors: Craig M. Allen

Abstract:

Twenty two African entrepreneurs with Small and Medium Enterprises (SMEs) in a single social network centered around a non-Muslim population in a smaller African country, selected an Islamic financing structure, a form of Murabaha, based solely on market rationale. These entrepreneurs had all won procurement contracts from major purchasers of goods within their country and faced difficulty arranging traditional bank financing to support their supply-chain needs. The Murabaha-based structure satisfied their market-driven demand and provided an attractive alternative to the traditional bank-offered lending products. The Murabaha-styled trade-financing structure was not promoted with any religious implications, but solely as a market solution to the existing problems associated with bank-related financing. This indicates the strong market forces that draw SMEs to financing structures that are traditionally considered within the framework of Islamic finance.

Keywords: Africa, entrepreneurs, Islamic finance, market acceptance, Murabaha, SMEs

Procedia PDF Downloads 181
26518 Factors Associated with Injuries and Trauma Among the Survivors of Gender-Based Violence in Afghanistan

Authors: Mohammad Akbar Paiman, Yasmin Nadeem Parpio, Naureen Akbarali, Khwaja Mir Islam Saeed, Murad Moosa Khan

Abstract:

Background: Gender-based violence (GBV) is widely considered a significant public health problem that is associated with acute morbidity and mortality. GBV is commonly understood as a physical, sexual, and mental assault from intimate partners, sexual violence by non-partners, sexual assault of girls, and acts like trafficking women for sex. Objective: This study aimed to determine the factors associated with injuries and trauma among victims of GBV in Afghanistan. Method: We conducted a record-based analysis of the data collected by the Gender Department of the Family Protection Centre nationally between November 2013 and October 2019. Cross-tabulation between different variables such as age, sex, marital status, and type of violence and associations between different types of violence, age, gender, and geographical location was determined using the logistic regression model. Results: During the study period, there were a total of 58,160 GBV in Afghanistan. Most of the victims were women 98% with over three-quarters being adults 78%. Most of the victims were married 76%, followed by single 14%, widowed 5%, and engaged 5%. Over three-quarters of the violence, 73% was observed in the victim’s house while nearly one-quarter of the violence 24 % occurred in the perpetrator’s house. Conclusions: GBV is a significant public health problem in Afghanistan that needs to be addressed at multiple levels including policy, state, and community as well as by raising public awareness and education and a strong code of conduct against GBV by all stakeholders.

Keywords: gender-based violence, physical and psychological violence, injuries, Afghanistan

Procedia PDF Downloads 54