Search results for: user compliance
1215 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information
Authors: A. Preetha Priyadharshini, S. B. M. Priya
Abstract:
In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information
Procedia PDF Downloads 8141214 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2411213 Monitoring System for Electronic Procurement Systems
Authors: Abdulah Fajar
Abstract:
Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.Keywords: procurement system, SNMP, LKPP, LPSE
Procedia PDF Downloads 4271212 5G Future Hyper-Dense Networks: An Empirical Study and Standardization Challenges
Authors: W. Hashim, H. Burok, N. Ghazaly, H. Ahmad Nasir, N. Mohamad Anas, A. F. Ismail, K. L. Yau
Abstract:
Future communication networks require devices that are able to work on a single platform but support heterogeneous operations which lead to service diversity and functional flexibility. This paper proposes two cognitive mechanisms termed cognitive hybrid function which is applied in multiple broadband user terminals in order to maintain reliable connectivity and preventing unnecessary interferences. By employing such mechanisms especially for future hyper-dense network, we can observe their performances in terms of optimized speed and power saving efficiency. Results were obtained from several empirical laboratory studies. It was found that selecting reliable network had shown a better optimized speed performance up to 37% improvement as compared without such function. In terms of power adjustment, our evaluation of this mechanism can reduce the power to 5dB while maintaining the same level of throughput at higher power performance. We also discuss the issues impacting future telecommunication standards whenever such devices get in place.Keywords: dense network, intelligent network selection, multiple networks, transmit power adjustment
Procedia PDF Downloads 3761211 Bone Fracture Detection with X-Ray Images Using Mobilenet V3 Architecture
Authors: Ashlesha Khanapure, Harsh Kashyap, Abhinav Anand, Sanjana Habib, Anupama Bidargaddi
Abstract:
Technologies that are developing quickly are being developed daily in a variety of disciplines, particularly the medical field. For the purpose of detecting bone fractures in X-ray pictures of different body segments, our work compares the ResNet-50 and MobileNetV3 architectures. It evaluates accuracy and computing efficiency with X-rays of the elbow, hand, and shoulder from the MURA dataset. Through training and validation, the models are evaluated on normal and fractured images. While ResNet-50 showcases superior accuracy in fracture identification, MobileNetV3 showcases superior speed and resource optimization. Despite ResNet-50’s accuracy, MobileNetV3’s swifter inference makes it a viable choice for real-time clinical applications, emphasizing the importance of balancing computational efficiency and accuracy in medical imaging. We created a graphical user interface (GUI) for MobileNet V3 model bone fracture detection. This research underscores MobileNetV3’s potential to streamline bone fracture diagnoses, potentially revolutionizing orthopedic medical procedures and enhancing patient care.Keywords: CNN, MobileNet V3, ResNet-50, healthcare, MURA, X-ray, fracture detection
Procedia PDF Downloads 651210 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology
Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar
Abstract:
Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.Keywords: data privacy, distributed system, federated learning, machine learning
Procedia PDF Downloads 1341209 A Two Level Load Balancing Approach for Cloud Environment
Authors: Anurag Jain, Rajneesh Kumar
Abstract:
Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling
Procedia PDF Downloads 4311208 Investigation of Spatial Changes in the Context of Cultural Sustainability
Authors: Aslı Taş, Şebnem Ertaş
Abstract:
Culture consists of material and spiritual values adopted by the emerging societies during the historical and social processes and continues to exist from past to present by being transferred through generations. Culture and cultural sustainability are interdependent concepts. Cultural sustainability exists when the requirements established cultural expression are added to the social life as lifestyle and habits. However, sustainability renders change inevitable. Changes that take place in the culture of a society also shows the impact in the daily life places. Functional changes occur in the spaces in order to adapt particularly to cultural change that appear in the aftermath of the user change, to modern technology and living standards. In this context, in this study, it was aimed to investigate the effect of the time-dependent functional changes that took place in the housing where non-Muslim population who was subject to population exchange and Muslim population lived after the population exchange in the vacated housing in Sille. Therefore, the changed and newly added venues in the house belonging to Ali Oğuz in Hacı Ali Ağa Street were investigated over the generated graphic in order to clearly perceive the cultural exchange on the housing and settlement and the functional changes were demonstrated.Keywords: culture, house, spatial changes, sustainability
Procedia PDF Downloads 3891207 Using Analytical Hierarchy Process and TOPSIS Approaches in Designing a Finite Element Analysis Automation Program
Authors: Ming Wen, Nasim Nezamoddini
Abstract:
Sophisticated numerical simulations like finite element analysis (FEA) involve a complicated process from model setup to post-processing tasks that require replication of time-consuming steps. Utilizing FEA automation program simplifies the complexity of the involved steps while minimizing human errors in analysis set up, calculations, and results processing. One of the main challenges in designing FEA automation programs is to identify user requirements and link them to possible design alternatives. This paper presents a decision-making framework to design a Python based FEA automation program for modal analysis, frequency response analysis, and random vibration fatigue (RVF) analysis procedures. Analytical hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are applied to evaluate design alternatives considering the feedback received from experts and program users.Keywords: finite element analysis, FEA, random vibration fatigue, process automation, analytical hierarchy process, AHP, TOPSIS, multiple-criteria decision-making, MCDM
Procedia PDF Downloads 1131206 The Main Characteristics of Destructive Motivation
Authors: Elen Gasparyan, Naira Hakobyan
Abstract:
One of the leading factors determining the effectiveness of work in a modern organization is the motivation of its employees. In the scientific psychological literature, this phenomenon is understood mainly as constructive forms of motivation and the search for ways to increase it. At the same time, the motivation of employees can sometimes lead to a decrease in the productivity of the organization, i.e., destructive motivation is usually not considered from the point of view of various motivational theories. This article provides an analysis of various forms of destructive motivation of employees. These forms include formalism in labor behavior, inadequate assessment of the work done, and an imbalance of personal and organizational interests. The destructive motivation of personnel has certain negative consequences both for the employees themselves and for the entire organization - it leads to a decrease in the rate of production and the quality of products or services, increased conflict in the behavior of employees, etc. Currently, there is an increase in scientific interest in the study of destructive motivation. The subject of psychological research is not only modern socio-psychological processes but also the achievements of scientific thought in the field of theories of motivation and management. This article examines the theoretical approaches of J. S. Adams and Porter-Lawler, provides an analysis of theoretical concepts, and emphasizes the main characteristics of the destructiveness of motivation. Destructive work motivation is presented at the macro, meso, and micro levels. These levels express various directions of development of motivation stimuli, such as social, organizational, and personal ones. At the macro level, the most important characteristics of destructive motivation are the high-income gap between employers and employees, а high degree of unemployment, weak social protection of workers, non-compliance by employers with labor legislation, and emergencies. At the organizational level, the main characteristics are decreasing the diversity of work and insufficient work conditions. At the personal level, the main characteristic of destructive motivation is a discrepancy between personal and organizational interests. A comparative analysis of the theoretical and methodological foundations of the study of motivation makes it possible to identify not only the main characteristics of destructive motivation but also to determine the contours of psychological counseling to reduce destructiveness in the behavior of employees.Keywords: destructive, motivation, organization, behavior
Procedia PDF Downloads 441205 Microstructure Dependent Fatigue Crack Growth in Aluminum Alloy
Authors: M. S. Nandana, K. Udaya Bhat, C. M. Manjunatha
Abstract:
In this study aluminum alloy 7010 was subjected to three different ageing treatments i.e., peak ageing (T6), over-ageing (T7451) and retrogression and re ageing (RRA) to study the influence of precipitate microstructure on the fatigue crack growth rate behavior. The microstructural modification was studied by using transmission electron microscope (TEM) to examine the change in the size and morphology of precipitates in the matrix and on the grain boundaries. The standard compact tension (CT) specimens were fabricated and tested under constant amplitude fatigue crack growth tests to evaluate the influence of heat treatment on the fatigue crack growth rate properties. The tests were performed in a computer-controlled servo-hydraulic test machine applying a load ratio, R = 0.1 at a loading frequency of 10 Hz as per ASTM E647. The fatigue crack growth was measured by adopting compliance technique using a CMOD gauge attached to the CT specimen. The average size of the matrix precipitates were found to be of 16-20 nm in T7451, 5-6 nm in RRA and 2-3 nm in T6 conditions respectively. The grain boundary precipitate which was continuous in T6, was disintegrated in RRA and T7451 condition. The PFZ width was lower in RRA compared to T7451 condition. The crack growth rate was higher in T7451 and lowest in RRA treated alloy. The RRA treated alloy also exhibits an increase in threshold stress intensity factor range (∆Kₜₕ). The ∆Kₜₕ measured was 11.1, 10.3 and 5.7 MPam¹/² in RRA, T6 and T7451 alloys respectively. The fatigue crack growth rate in RRA treated alloy was nearly 2-3 times lower than that in T6 and was one order lower than that observed in T7451 condition. The surface roughness of RRA treated alloy was more pronounced when compared to the other conditions. The reduction in fatigue crack growth rate in RRA alloy was majorly due to the increase in roughness and partially due to increase in spacing between the matrix precipitates. The reduction in crack growth rate and increase in threshold stress intensity range is expected to benefit the damage tolerant capability of aircraft structural components under service loads.Keywords: damage tolerance, fatigue, heat treatment, PFZ, RRA
Procedia PDF Downloads 1541204 Computer-Based Model for Design Selection of Lightning Arrester for 132/33kV Substation
Authors: Uma U. Uma, Uzoechi Laz
Abstract:
Protection of equipment insulation against lightning over voltages and selection of lightning arrester that will discharge at lower voltage level than the voltage required to breakdown the electrical equipment insulation is examined. The objectives of this paper are to design a computer based model using standard equations for the selection of appropriate lightning arrester with the lowest rated surge arrester that will provide adequate protection of equipment insulation and equally have a satisfactory service life when connected to a specified line voltage in power system network. The effectiveness and non-effectiveness of the earthing system of substation determine arrester properties. MATLAB program with GUI (graphic user interphase) its subprogram is used in the development of the model for the determination of required parameters like voltage rating, impulse spark over voltage, power frequency spark over voltage, discharge current, current rating and protection level of lightning arrester of a specified voltage level of a particular line.Keywords: lightning arrester, GUIs, MatLab program, computer based model
Procedia PDF Downloads 4181203 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2801202 The OLOS® Way to Cultural Heritage: User Interface with Anthropomorphic Characteristics
Authors: Daniele Baldacci, Remo Pareschi
Abstract:
Augmented Reality and Augmented Intelligence are radically changing information technology. The path that starts from the keyboard and then, passing through milestones such as Siri, Alexa and other vocal avatars, reaches a more fluid and natural communication with computers, thus converting the dichotomy between man and machine into a harmonious interaction, now heads unequivocally towards a new IT paradigm, where holographic computing will play a key role. The OLOS® platform contributes substantially to this trend in that it infuses computers with human features, by transferring the gestures and expressions of persons of flesh and bones to anthropomorphic holographic interfaces which in turn will use them to interact with real-life humans. In fact, we could say, boldly but with a solid technological background to back the statement, that OLOS® gives reality to an altogether new entity, placed at the exact boundary between nature and technology, namely the holographic human being. Holographic humans qualify as the perfect carriers for the virtual reincarnation of characters handed down from history and tradition. Thus, they provide for an innovative and highly immersive way of experiencing our cultural heritage as something alive and pulsating in the present.Keywords: digital cinematography, human-computer interfaces, holographic simulation, interactive museum exhibits
Procedia PDF Downloads 1161201 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application
Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa
Abstract:
Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.Keywords: bio medical, mental helath care, empower youths & adults, counselling
Procedia PDF Downloads 1551200 Improved Simultaneous Performance in the Time Domain and in the Frequency Domain
Authors: Azeddine Ghodbane, David Bensoussan, Maher Hammami
Abstract:
An innovative approach for controlling unstable and invertible systems has demonstrated superior performance compared to conventional controllers. It has been successfully applied to a levitation system and drone control. Simulations have yielded satisfactory performances when applied to a satellite antenna controller. This design method, based on sensitivity analysis, has also been extended to handle multivariable unstable and invertible systems that exhibit dominant diagonal characteristics at high frequencies, enabling decentralized control. Furthermore, this control method has been expanded to the realm of adaptive control. In this study, we introduce an alternative adaptive architecture that enhances both time and frequency performance, helpfully mitigating the effects of disturbances from the input plant and external disturbances affecting the output. To facilitate superior performance in both the time and frequency domains, we have developed user-friendly interactive design methods using the GeoGebra platform.Keywords: control theory, decentralized control, sensitivity theory, input-output stability theory, robust multivariable feedback control design
Procedia PDF Downloads 1131199 A Step Towards Circular Economy: Assessing the Efficacy of Ion Exchange Resins in the Recycling of Automotive Engine Coolants
Authors: George Madalin Danila, Mihaiella Cretu, Cristian Puscasu
Abstract:
The recycling of used antifreeze/coolant is a widely discussed and intricate issue. Complying with government regulations for the proper disposal of hazardous waste poses a significant challenge for today's automotive and industrial industries. In recent years, global focus has shifted toward Earth's fragile ecology, emphasizing the need to restore and preserve the natural environment. The business and industrial sectors have undergone substantial changes to adapt and offer products tailored to these evolving markets. The global antifreeze market size was evaluated at US 5.4 billion in 2020 to reach USD 5,9 billion by 2025 due to the increased number of vehicles worldwide, but also to the growth of HVAC systems. This study presents the evaluation of an ion exchange resin-based installation designed for the recycling of engine coolants, specifically ethylene glycol (EG) and propylene glycol (PG). The recycling process aims to restore the coolant to meet the stringent ASTM standards for both new and recycled coolants. A combination of physical-chemical methods, gas chromatography-mass spectrometry (GC-MS), and inductively coupled plasma mass spectrometry (ICP-MS) was employed to analyze and validate the purity and performance of the recycled product. The experimental setup included performance tests, namely corrosion to glassware and the tendency to foaming of coolant, to assess the efficacy of the recycled coolants in comparison to new coolant standards. The results demonstrate that the recycled EG coolants exhibit comparable quality to new coolants, with all critical parameters falling within the acceptable ASTM limits. This indicates that the ion exchange resin method is a viable and efficient solution for the recycling of engine coolants, offering an environmentally friendly alternative to the disposal of used coolants while ensuring compliance with industry standards.Keywords: engine coolant, glycols, recycling, ion exchange resin, circular economy
Procedia PDF Downloads 451198 Management of Blood Exposure Risk: Knowledge and Attitudes of Caregivers in Pediatric Dapartments
Authors: Hela Ghali, Oumayma Ben Amor, Salwa Khefacha, Mohamed Ben Rejeb, Sirine Frigui, Meriam Tourki Dhidah, Lamine Dhidah, Houyem Said Laatiri
Abstract:
Background: Blood exposure accidents are the most common problem in hospitals that threaten healthcare professionals with a high risk of infectious complications which weighs heavily on health systems worldwide. Paramedics are the highest risk group due to the nature of their daily activities. We aimed to determine knowledge and attitudes about the management of blood-exposure accidents among nurses and technicians in two pediatric departments. Materials/Methods: This is a cross-sectional descriptive study conducted on March 2017, carried out with the care staff of the pediatric ward of the Farhat Hached Teaching Hospital of Sousse and pediatric surgery of the Fattouma Bourguiba University Hospital in Monastir, using a pre- tested and self-administered questionnaire. Data entry and analysis were performed using Excel software. Results: The response rate was 85.1%. A female predominance (82.5%) was reported among respondents with a sex ratio of 0.21. 80% of the participants were under 35 years old. Seniority of less than 10 years was found in 77.5% of respondents. Only 22.5% knew the definition of a blood- exposure accident. 100% and 95% of participants reported the relative risk, respectively, to hepatitis and AIDS viruses. However, only 15% recognized the severity factors of a blood-exposure accident. Hygiene compliance was the most important dimension for almost the entire population for the prevention. On the other hand, only 12.5% knew the meaning of 'standard precautions' and ¼ considered them necessary for at-risk patients only. 40% reported being exposed at least once, among them, 87.5% used betadine, and 77.5% said that anti-infectious chemoprophylaxis is necessary regardless of the patient's serological status. However, 52.5% did not know the official reporting circuit of management of blood-exposure accident in their institutions. Conclusion: For better management of risks in hospitals and an improvement of the safety of the care, a reinforcement of the sensibilization of the caregivers with regard to the risks of blood exposure accident is necessary, while developing their knowledge to act in security.Keywords: attitudes, blood-exposure accident, knowledge, pediatric department
Procedia PDF Downloads 1961197 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model
Authors: Abdellahi Cheikh
Abstract:
With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard
Procedia PDF Downloads 931196 ‘Koha ILS Software’ Implementation in Academic Library Management: An Experience from University Libraries of Bangladesh
Authors: Md. Golam Mostafa
Abstract:
This paper describes the use of Koha open source library management software for information management in university libraries of Bangladesh. Manual record keeping is a time-consuming and tedious task, which may lead to errors frequently. To maintain the quality of services, any organization needs to manage with the help of a computerized system. The advent of information technology paved the way for library computerization. This paper has provided a short history as well as the present ongoing development of the library computerization system in Bangladesh, which has developed as a library management software Koha on the basis of research and development. Koha integrated library systems (ILS) software is very user friendly open source software. It refers to software in which the source code is freely available for others to view, amend, and adapt. Koha integrated library systems maintained by and used by libraries all over the world. In this context, this paper will analyze Koha library management software, which proves appropriate for the present necessities of library management in Bangladesh. At last, result from the study has been analyzed using different tables and graphs.Keywords: Koha Open Source Software, integrated library system, RFID facilities, university libraries, Bangladesh
Procedia PDF Downloads 1251195 Leveraging Quality Metrics in Voting Model Based Thread Retrieval
Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim
Abstract:
Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.Keywords: content quality, forum search, thread retrieval, voting techniques
Procedia PDF Downloads 2131194 Energy Efficiency Approach to Reduce Costs of Ownership of Air Jet Weaving
Authors: Corrado Grassi, Achim Schröter, Yves Gloy, Thomas Gries
Abstract:
Air jet weaving is the most productive, but also the most energy consuming weaving method. Increasing energy costs and environmental impact are constantly a challenge for the manufacturers of weaving machines. Current technological developments concern with low energy costs, low environmental impact, high productivity, and constant product quality. The high degree of energy consumption of the method can be ascribed to the high need of compressed air. An energy efficiency method is applied to the air jet weaving technology. Such method identifies and classifies the main relevant energy consumers and processes from the exergy point of view and it leads to the identification of energy efficiency potentials during the weft insertion process. Starting from the design phase, energy efficiency is considered as the central requirement to be satisfied. The initial phase of the method consists of an analysis of the state of the art of the main weft insertion components in order to point out a prioritization of the high demanding energy components and processes. The identified major components are investigated to reduce the high demand of energy of the weft insertion process. During the interaction of the flow field coming from the relay nozzles within the profiled reed, only a minor part of the stream is really accelerating the weft yarn, hence resulting in large energy inefficiency. Different tools such as FEM analysis, CFD simulation models and experimental analysis are used in order to design a more energy efficient design of the involved components in the filling insertion. A different concept for the metal strip of the profiled reed is developed. The developed metal strip allows a reduction of the machine energy consumption. Based on a parametric and aerodynamic study, the designed reed transmits higher values of the flow power to the filling yarn. The innovative reed fulfills both the requirement of raising energy efficiency and the compliance with the weaving constraints.Keywords: air jet weaving, aerodynamic simulation, energy efficiency, experimental validation, weft insertion
Procedia PDF Downloads 1971193 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)
Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat
Abstract:
The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring
Procedia PDF Downloads 3961192 Women's Challenges in Access to Urban Spaces and Infrastructures: A Comparative Study of the Urban Infrastructures Conforming to Women's Needs in Tehran and Istanbul
Authors: Parastoo Kazemiyan
Abstract:
Over the past 80 years, in compliance with the advent of modernity in Iran and Turkey, the presence of women in economic and social arenas has creates serious challenges in the capacity of urban spaces to respond to their presence and transport because urban spaces up until then were based on masculine criteria and therefore, women could use such spaces in the company of their fathers or husbands. However, as modernity expanded by Reza Shah and Ataturk, women found the opportunity to work and be present in urban spaces alongside men and their presence in economic and social domains resulted in their presence in these spaces in the early and late hours of the day. Therefore, the city had to be transformed in structural, social, and environmental terms to accommodate women's activities and presence in various urban arenas, which was a huge step in transition from a masculine man-based culture to an all-inclusive human-based culture in these two countries. However, the optimization of urban space was subject to political changes in the two countries, leading to significant differences in designing urban spaces in Tehran and Istanbul. What shows the importance and novelty of the present study lie in the differences in urban planning and optimization in the two capital cities, which gave rise to different outcomes in desirability and quality of living in these two capital cities. Due to the importance of the topic, one of the most significant factors in desirability and acceptability of urban space for women was examined using a descriptive-analytic method based on qualitative methodology in Tehran and Istanbul. The results showed that the infrastructural factors in Istanbul, including safety of access, variety, and number of public transport modes, transparency, and supervision over public spaces have provided women with a safer and more constant presence compared to Tehran. It seems that challenges involved in providing access to urban spaces in Tehran in terms of infrastructure and function have made Tehran unable to respond to the most basic needs of its female citizens.Keywords: gender differences, urban space security, access to transportation systems, women's challenges
Procedia PDF Downloads 1251191 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System
Authors: J. K. Adedeji, M. O. Oyekanmi
Abstract:
This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.Keywords: biometric characters, facial recognition, neural network, OpenCV
Procedia PDF Downloads 2561190 Between Buddha and Tsar: Kalmyk Buddhist Sangha in Late Russian Empire
Authors: Elzyata Kuberlinova
Abstract:
This study explores how the Kalmyk Buddhist sangha responded to the Russian empire’s administrative integration and how the Buddhist clerical institutions were shaped in the process of interaction with representatives of the predominantly Orthodox state. The eighteenth-nineteenth century Russian imperial regime adhered to a religion-centred framework to govern its diverse subjects. Within this framework, any form of religious authority was considered a useful tool in the imperial quest for legibility. As such, rather than imposing religious homogeneity, the Russian administration engineered a framework of religious toleration and integrated the non-Orthodox clerical institutions in the empire’s administration. In its attempt to govern the large body of Kalmyk Buddhist sangha, the Russian government had to incorporate the sangha into the imperial institutional establishment. To this end, the Russian government founded the Lamaist Spiritual Governing Board in 1834, which became a part of the civil administration, where the Kalmyk Buddhist affairs were managed under the supervision of the Russian secular authorities. In 1847 the Lamaist Spiritual Board was abolished and Buddhist religious authority was transferred to the Lama of the Kalmyk people. From 1847 until the end of the empire in 1917 the Lama was the manager and intermediary figure between the Russian authorities and the Kalmyks where religious affairs were concerned. Substantial evidence collected in archives in Elista, Astrakhan, Stavropol and St.Petersburg show that despite being on the government’s payroll, first the Lamaist Spiritual Governing Board and later on the Lama did not always serve the interests of the state, and did not always comply with the Russian authorities’ orders. Although being incorporated into the state administrative system the Lama often found ways to manoeuvre the web of the Russian imperial bureaucracy in order to achieve his own goals. The Lama often used ‘every-day forms of resistance’ such as feigned misinterpretation, evasion, false compliance, feigned ignorance, and sabotage in order to resist without directly confronting or challenging the state orders.Keywords: Buddhist Sangha, intermediary, Kalmyks, Lama, legibility, resistance, reform, Russian empire
Procedia PDF Downloads 2221189 Risk Management in Islamic Micro Finance Credit System for Poverty Alleviation from Qualitative Perspective
Authors: Liyu Adhi Kasari Sulung
Abstract:
Poverty has been a major problem in Indonesia. Islamic micro finance (IMF) named Baitul Maal Wat Tamwil (Bmt) plays a prominent role to eradicate this. Indonesia as the biggest muslim country has many successful applied products such as worldwide adopt group-based lending approach, flexible financing for farmers, and gold pawning. The Problems related to these models are operation risk management and internal control system (ICS). A proper ICS will help an organization in preventing the occurrence of bad financing through detecting error and irregularities in its operation. This study aims to seek a proper risk management scheme of credit system in Bmt and internal control system’s rank for every stage. Risk management variables are obtained at the first In-Depth Interview (IDI) and Focus Group Discussion (FGD) with Shariah supervisory boards, boards of directors, and operational managers. Survey was conducted covering nationwide data; West Java, South Sulawesi, and West Nusa Tenggara. Moreover, Content analysis is employed to build the relationship among these variables. Research Findings shows that risk management Characteristics in Indonesia involves ex ante, credit process, and ex post strategies to deal with risk in credit system. Ex-ante control consists of Shariah compliance, survey, group leader reference, and islamic forming orientation. Then, credit process involves saving, collateral, joint liability, loan repayment, and credit installment controlling. Finally, ex-post control includes shariah evaluation, credit evaluation, grace period and low installment provisions. In addition, internal control order sort three stages by its priority; Credit process as first rank, then ex-post control as second, and ex ante control as the last rank.Keywords: internal control system, islamic micro finance, poverty, risk management
Procedia PDF Downloads 4091188 The Impact of the Urban Planning and Environmental Problems over the Quality of Life Case Study: Median Zone of Bucharest's Sector 1, Romania
Authors: Cristian Cazacu, Bela Kobulniczky
Abstract:
Even though nowadays the median area of the Bucharest’s Sector 1 owns one of the best reputations in terms of quality of life level, the problems in urban planning from the last twenty years, as well as those related to the urban environment, became more and more obvious and shrill. And all this happened as long as non-compliance with urban and spatial planning laws, corroborated with uncontrolled territorial expansion on certain areas and faulty management of public and private spaces were more acute. The action of all these factors has been felt more and more strongly in the territory in the last twenty years, generating the degradation of the quality of the urban environment and affecting in parallel the general level of the inhabitants¬’ quality of life. Our methodology is based on analyzing a wide range of environmental parameters and it is also based on using advanced resources and skills for mapping planning and environmental dysfunctions as well as the possibility of integrating information into GIS programs, all data sets corroborated with problems related to spatial planning management and inaccuracies of the urbanistic sector. In the end, we managed to obtain a calculated and realistic image of the dysfunctions and a quantitative view of their magnitude in the territory. We also succeeded to create a full general map of the degree of degradation of the urban environment by typologies of urban tissues. Moreover, the methods applied by us can also be used globally to calculate and create realistic images and intelligent maps over the quality of the environment in areas larger than this one. Our study shows that environmental degradation occurred differently in the urban tissues from our study area, depending on several factors, reviewing the faulty way in which the processes of recovery / urban regeneration of the gap in recent years have led to the creation of new territorial dysfunctions. The general, centralized results show that the analyzed space has a much wider range of problems than initially thought, although notoriety and social etiquette place them far above other spaces from the same city of study.Keywords: environment, GIS, planning, urban tissues
Procedia PDF Downloads 1481187 A Case Study: Community Forestry in Nepal: Achievements and Challenges
Authors: Bhmika Raiu
Abstract:
The community forestry programme in Nepal officially started in the late 1970s. Since then concerning movement has been evolving to involve local communities in the management and utilization of forests. The policy of the government was originally intended to meet the basic forest products required by the communities through active participation in forest development and management. Later, it was expanded to include the mobilization and empowerment of the members of community forest user groups in the development of their local communities. It was observed that the trend of forest degradation has decreased since the handing over of national forests to local communities, but a number of unintended social anomalies have also cropped up. Such anomalies essentially constitute of the inequity and unfairness in the local and national level and in terms of long-term sustainability of forest resources. This paper provides an overview of various issues of community forestry, especially focusing on the major achievements made in community forestry. It calls for rethinking the community forestry programme in order to face the present day challenges of linking community forestry with livelihood promotion, good governance, and sustainable forest management. It also lays out strategies for reforms in community forestry.Keywords: community forest, livelihood promotion, challenges, achievements
Procedia PDF Downloads 3781186 Motor Controller Implementation Using Model Based Design
Authors: Cau Tran, Tu Nguyen, Tien Pham
Abstract:
Model-based design (MBD) is a mathematical and visual technique for addressing design issues in the fields of communications, signal processing, and complicated control systems. It is utilized in several automotive, aerospace, industrial, and motion control applications. Virtual models are at the center of the software development process with model based design. A method used in the creation of embedded software is model-based design. In this study, the LAT motor is modeled in a simulation environment, and the LAT motor control is designed with a cascade structure, a speed and current control loop, and a controller that is used in the next part. A PID structure serves as this controller. Based on techniques and motor parameters that match the design goals, the PID controller is created for the model using traditional design principles. The MBD approach will be used to build embedded software for motor control. The paper will be divided into three distinct sections. The first section will introduce the design process and the benefits and drawbacks of the MBD technique. The design of control software for LAT motors will be the main topic of the next section. The experiment's results are the subject of the last section.Keywords: model based design, limited angle torque, intellectual property core, hardware description language, controller area network, user datagram protocol
Procedia PDF Downloads 94