Search results for: information coefficient
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12809

Search results for: information coefficient

11009 Airplane Stability during Climb/Descend Phase Using a Flight Dynamics Simulation

Authors: Niloufar Ghoreishi, Ali Nekouzadeh

Abstract:

The stability of the flight during maneuvering and in response to probable perturbations is one of the most essential features of an aircraft that should be analyzed and designed for. In this study, we derived the non-linear governing equations of aircraft dynamics during the climb/descend phase and simulated a model aircraft. The corresponding force and moment dimensionless coefficients of the model and their variations with elevator angle and other relevant aerodynamic parameters were measured experimentally. The short-period mode and phugoid mode response were simulated by solving the governing equations numerically and then compared with the desired stability parameters for the particular level, category, and class of the aircraft model. To meet the target stability, a controller was designed and used. This resulted in significant improvement in the stability parameters of the flight.

Keywords: flight stability, phugoid mode, short period mode, climb phase, damping coefficient

Procedia PDF Downloads 177
11008 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 307
11007 Kinetic and Thermodynamic Study of Nitrates Removal by Sorption on Biochar

Authors: Amira Touil, Achouak Arfaoui, Ibtissem Mannaii

Abstract:

The aim of this work is to monitor the process adsorption of nitrates by the biochar via studying the influence of various parameters on the adsorption of this pollutant by biochar in a synthetic aqueous solution. The results which obtained indicate that the 4g/L biochar dose is the most efficient in terms of nitrates removal in aqueous solution. The biochar exhibited a good affinity for nitrates after 1hour of contact. The yield of removal of nitrate by the biochar decreases with the increase of pH of the solution and increases with increasing temperature (60°C>40°C>20°C). The best removal yield is about 80% of the initial concentration introduced (25mg/L) obtained at pH=2, T=60°C, and dose of biochar=4g/L. The second order model fit the nitrate adsorption kinetics of biochar with a high coefficient of determination (R2≥0.997); and a new equation correlating the rate constant of the reaction with temperature and pH was been built. Freundlich isotherms performed well to fit the nitrate adsorption data by biochar (R2>0.96) compared to Langmuir isotherms. The thermodynamic parameters (ΔH°, ΔG°, ΔS°) have been calculated for predicting the nature of adsorption.

Keywords: pollution, biochar, nitrate, adsorption

Procedia PDF Downloads 97
11006 The Consumer Behavior and the Customer Loyalty of CP Fresh Mart Consumers in Bangkok

Authors: Kanmanas Muensak, Somphoom Saweangkun

Abstract:

The objectives of this research were to study the consumer behavior that affects the customer loyalty of CP Fresh Mart in Bangkok province. The sample of the study comprised 400 consumers over 15 years old who made the purchase through CP Fresh Mart in Bangkok. The questionnaires were used as the data gathering instrument, and the data were analyzed applying Percentage, Mean, Standard Deviation, Independent Sample t-test, Two- Way ANOVA, and Least Significant Difference, and Pearson’s Correlation Coefficient also. The result of hypothesis testing showed that the respondents of different gender, age, level of education, income, marital status and occupation had differences in consumer behavior through customer loyalty of CP Fresh Mart and the factors on customer loyalty in the aspects of re-purchase, word of mouth and price sensitive, promotion, process, and personnel had positive relationship with the consumer behavior through of CP Fresh Mart in Bangkok as well as.

Keywords: consumers in Bangkok, consumer behavior, customer loyalty, CP Fresh Mart, operating budget

Procedia PDF Downloads 332
11005 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 374
11004 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 302
11003 A Comparative Study of the Athlete Health Records' Minimum Data Set in Selected Countries and Presenting a Model for Iran

Authors: Robab Abdolkhani, Farzin Halabchi, Reza Safdari, Goli Arji

Abstract:

Background and purpose: The quality of health record depends on the quality of its content and proper documentation. Minimum data set makes a standard method for collecting key data elements that make them easy to understand and enable comparison. The aim of this study was to determine the minimum data set for Iranian athletes’ health records. Methods: This study is an applied research of a descriptive comparative type which was carried out in 2013. By using internal and external forms of documentation, a checklist was created that included data elements of athletes health record and was subjected to debate in Delphi method by experts in the field of sports medicine and health information management. Results: From 97 elements which were subjected to discussion, 85 elements by more than 75 percent of the participants (as the main elements) and 12 elements by 50 to 75 percent of the participants (as the proposed elements) were agreed upon. In about 97 elements of the case, there was no significant difference between responses of alumni groups of sport pathology and sports medicine specialists with medical record, medical informatics and information management professionals. Conclusion: Minimum data set of Iranian athletes’ health record with four information categories including demographic information, health history, assessment and treatment plan was presented. The proposed model is available for manual and electronic medical records.

Keywords: Documentation, Health record, Minimum data set, Sports medicine

Procedia PDF Downloads 484
11002 Transparency Obligations under the AI Act Proposal: A Critical Legal Analysis

Authors: Michael Lognoul

Abstract:

In April 2021, the European Commission released its AI Act Proposal, which is the first policy proposal at the European Union level to target AI systems comprehensively, in a horizontal manner. This Proposal notably aims to achieve an ecosystem of trust in the European Union, based on the respect of fundamental rights, regarding AI. Among many other requirements, the AI Act Proposal aims to impose several generic transparency obligationson all AI systems to the benefit of natural persons facing those systems (e.g. information on the AI nature of systems, in case of an interaction with a human). The Proposal also provides for more stringent transparency obligations, specific to AI systems that qualify as high-risk, to the benefit of their users, notably on the characteristics, capabilities, and limitations of the AI systems they use. Against that background, this research firstly presents all such transparency requirements in turn, as well as related obligations, such asthe proposed obligations on record keeping. Secondly, it focuses on a legal analysis of their scope of application, of the content of the obligations, and on their practical implications. On the scope of transparency obligations tailored for high-risk AI systems, the research notably notes that it seems relatively narrow, given the proposed legal definition of the notion of users of AI systems. Hence, where end-users do not qualify as users, they may only receive very limited information. This element might potentially raise concern regarding the objective of the Proposal. On the content of the transparency obligations, the research highlights that the information that should benefit users of high-risk AI systems is both very broad and specific, from a technical perspective. Therefore, the information required under those obligations seems to create, prima facie, an adequate framework to ensure trust for users of high-risk AI systems. However, on the practical implications of these transparency obligations, the research notes that concern arises due to potential illiteracy of high-risk AI systems users. They might not benefit from sufficient technical expertise to fully understand the information provided to them, despite the wording of the Proposal, which requires that information should be comprehensible to its recipients (i.e. users).On this matter, the research points that there could be, more broadly, an important divergence between the level of detail of the information required by the Proposal and the level of expertise of users of high-risk AI systems. As a conclusion, the research provides policy recommendations to tackle (part of) the issues highlighted. It notably recommends to broaden the scope of transparency requirements for high-risk AI systems to encompass end-users. It also suggests that principles of explanation, as they were put forward in the Guidelines for Trustworthy AI of the High Level Expert Group, should be included in the Proposal in addition to transparency obligations.

Keywords: aI act proposal, explainability of aI, high-risk aI systems, transparency requirements

Procedia PDF Downloads 331
11001 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning

Authors: Kuliya Muhammed

Abstract:

This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.

Keywords: electronic, ICT, institution, internet, learning, technology

Procedia PDF Downloads 390
11000 The Effect of Choke on the Efficiency of Coaxial Antenna for Percutaneous Microwave Coagulation Therapy for Hepatic Tumor

Authors: Surita Maini

Abstract:

There are many perceived advantages of microwave ablation have driven researchers to develop innovative antennas to effectively treat deep-seated, non-resectable hepatic tumors. In this paper a coaxial antenna with a miniaturized sleeve choke has been discussed for microwave interstitial ablation therapy, in order to reduce backward heating effects irrespective of the insertion depth into the tissue. Two dimensional Finite Element Method (FEM) is used to simulate and measure the results of miniaturized sleeve choke antenna. This paper emphasizes the importance of factors that can affect simulation accuracy, which include mesh resolution, surface heating and reflection coefficient. Quarter wavelength choke effectiveness has been discussed by comparing it with the unchoked antenna with same dimensions.

Keywords: microwave ablation, tumor, finite element method, coaxial slot antenna, coaxial dipole antenna

Procedia PDF Downloads 360
10999 Rumour Containment Using Monitor Placement and Truth Propagation

Authors: Amrah Maryam

Abstract:

The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.

Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation

Procedia PDF Downloads 164
10998 Auditing of Building Information Modeling Application in Decoration Engineering Projects in China

Authors: Lan Luo

Abstract:

In China’s construction industry, it is a normal practice to separately subcontract the decoration engineering part from construction engineering, and Building Information Modeling (BIM) is also done separately. Application of BIM in decoration engineering should be integrated with other disciplines, but Chinese current practice makes this very difficult and complicated. Currently, there are three barriers in the auditing of BIM application in decoration engineering in China: heavy workload; scarcity of qualified professionals; and lack of literature concerning audit contents, standards, and methods. Therefore, it is significant to perform research on what (contents) should be evaluated, in which phase, and by whom (professional qualifications) in BIM application in decoration construction so that the application of BIM can be promoted in a better manner. Based on this consideration, four principles of BIM auditing are proposed: Comprehensiveness of information, accuracy of data, aesthetic attractiveness of appearance, and scheme optimization. In the model audit, three methods should be used: Collision, observation, and contrast. In addition, BIM auditing at six stages is discussed and a checklist for work items and results to be submitted is proposed. This checklist can be used for reference by decoration project participants.

Keywords: audit, evaluation, dimensions, methods, standards, BIM application in decoration engineering projects

Procedia PDF Downloads 344
10997 Drying Characteristics of Shrimp by Using the Traditional Method of Oven

Authors: I. A. Simsek, S. N. Dogan, A. S. Kipcak, E. Morodor Derun, N. Tugrul

Abstract:

In this study, the drying characteristics of shrimp are studied by using the traditional drying method of oven. Drying temperatures are selected between 60-80°C. Obtained experimental drying results are applied to eleven mathematical models of Alibas, Aghbashlo et al., Henderson and Pabis, Jena and Das, Lewis, Logaritmic, Midilli and Kucuk, Page, Parabolic, Wang and Singh and Weibull. The best model was selected as parabolic based on the highest coefficient of determination (R²) (0.999990 at 80°C) and the lowest χ² (0.000002 at 80°C), and the lowest root mean square error (RMSE) (0.000976 at 80°C) values are compared to other models. The effective moisture diffusivity (Deff) values were calculated using the Fick’s second law’s cylindrical coordinate approximation and are found between 6.61×10⁻⁸ and 6.66×10⁻⁷ m²/s. The activation energy (Ea) was calculated using modified form of Arrhenius equation and is found as 18.315 kW/kg.

Keywords: activation energy, drying, effective moisture diffusivity, modelling, oven, shrimp

Procedia PDF Downloads 193
10996 Data Collection in Protected Agriculture for Subsequent Big Data Analysis: Methodological Evaluation in Venezuela

Authors: Maria Antonieta Erna Castillo Holly

Abstract:

During the last decade, data analysis, strategic decision making, and the use of artificial intelligence (AI) tools in Latin American agriculture have been a challenge. In some countries, the availability, quality, and reliability of historical data, in addition to the current data recording methodology in the field, makes it difficult to use information systems, complete data analysis, and their support for making the right strategic decisions. This is something essential in Agriculture 4.0. where the increase in the global demand for fresh agricultural products of tropical origin, during all the seasons of the year requires a change in the production model and greater agility in the responses to the consumer market demands of quality, quantity, traceability, and sustainability –that means extensive data-. Having quality information available and updated in real-time on what, how much, how, when, where, at what cost, and the compliance with production quality standards represents the greatest challenge for sustainable and profitable agriculture in the region. The objective of this work is to present a methodological proposal for the collection of georeferenced data from the protected agriculture sector, specifically in production units (UP) with tall structures (Greenhouses), initially for Venezuela, taking the state of Mérida as the geographical framework, and horticultural products as target crops. The document presents some background information and explains the methodology and tools used in the 3 phases of the work: diagnosis, data collection, and analysis. As a result, an evaluation of the process is carried out, relevant data and dashboards are displayed, and the first satellite maps integrated with layers of information in a geographic information system are presented. Finally, some improvement proposals and tentatively recommended applications are added to the process, understanding that their objective is to provide better qualified and traceable georeferenced data for subsequent analysis of the information and more agile and accurate strategic decision making. One of the main points of this study is the lack of quality data treatment in the Latin America area and especially in the Caribbean basin, being one of the most important points how to manage the lack of complete official data. The methodology has been tested with horticultural products, but it can be extended to other tropical crops.

Keywords: greenhouses, protected agriculture, data analysis, geographic information systems, Venezuela

Procedia PDF Downloads 133
10995 Contribution Spending on Intellectual Capital in the Performance of Industrial Enterprise Case study: Sonatrach

Authors: Dahmani Aziz, Mekdad Yousra

Abstract:

The intellectual capital is an important source of profitability and the main supporter of the competitive where this study examines the contribution of expenditure on intellectual capital in the performance of industrial enterprises Algerian, and through a case study Sonatrach as the most important industrial enterprises in Algeria and the driving force of the Algerian economy. It has been the use of value-added intellectual coefficient (VAIC) in measuring the contribution of intellectual capital and analyzing data Sonatrach during the period from the year 2001 until the year 2012, and test the validity of hypotheses using Stepwise Regression model through the SPSS statistical software, and the study has proved the existence of a positive relationship between spending on human capital and financial performance and a stronger degree relationship between the structural capital and economic performance.

Keywords: industrial enterprise, intellectual capital, performance, economy of Algeria, spending

Procedia PDF Downloads 385
10994 Vibration Analysis of Functionally Graded Engesser-Timoshenko Beams Subjected to Axial Load Located on a Continuous Elastic Foundation

Authors: M. Karami Khorramabadi, A. R. Nezamabadi

Abstract:

This paper studies free vibration of functionally graded beams Subjected to Axial Load that is simply supported at both ends lies on a continuous elastic foundation. The displacement field of beam is assumed based on Engesser-Timoshenko beam theory. The Young's modulus of beam is assumed to be graded continuously across the beam thickness. Applying the Hamilton's principle, the governing equation is established. Resulting equation is solved using the Euler's Equation. The effects of the constituent volume fractions and foundation coefficient on the vibration frequency are presented. To investigate the accuracy of the present analysis, a compression study is carried out with a known data.

Keywords: functionally graded beam, free vibration, elastic foundation, Engesser-Timoshenko beam theory

Procedia PDF Downloads 424
10993 Parametric Analysis of Water Lily Shaped Split Ring Resonator Loaded Fractal Monopole Antenna for Multiband Applications

Authors: C. Elavarasi, T. Shanmuganantham

Abstract:

A coplanar waveguide (CPW) feed is presented, and comprising a split ring resonator (SRR) loaded fractal with water lily shape is used for multi band applications. The impedance matching of the antenna is determined by the number of Koch curve fractal unit cells. The antenna is designed on a FR4 substrate with a permittivity of εr = 4.4 and size of 14 x 16 x 1.6 mm3 to generate multi resonant mode at 3.8 GHz covering S band, 8.68 GHz at X band, 13.96 GHz at Ku band, and 19.74 GHz at K band with reflection coefficient better than -10 dB. Simulation results show that the antenna exhibits the desired voltage standing wave ratio (VSWR) level and radiation patterns across the wide frequency range. The fundamental parameters of the antenna such as return loss, VSWR, good radiation pattern with reasonable gain across the operating bands are obtained.

Keywords: fractal, metamaterial, split ring resonator, waterlily shape

Procedia PDF Downloads 277
10992 Solar Radiation Studies and Performance of Solar Panels for Three Cities of Sindh, Pakistan

Authors: M. A. Ahmed, Sidra A. Shaikh, M. W. Akhtar

Abstract:

Solar radiation on horizontal surface over three southern cities of Sindh, namely Karachi, Hyderabad and Nawabshah has been investigated to asses the feasibility of solar energy application for power generation. In the present work, measured data of bright sunshine hour of the region have been used to estimate the global and diffuse solar radiation. The regression coefficient 'a' and 'b' have been calculated using first order Angstrom type co-relation. The result obtained shows that the contribution of direct solar radiation is low and diffuse radiation is high during the monsoon months July and August for Karachi and Hyderabad. The sky remains clear from September to June, whereas for Nawabshah the global radiation remains high throughout the year. The potential of grid quality solar photovoltaic power in Karachi is estimated for 10 square meter area of solar panel.

Keywords: solar potential over Sindh, global and diffuse solar radiation, radiation over three cities of Sindh, solar panels

Procedia PDF Downloads 449
10991 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 98
10990 Impact of Workers’ Remittances on Poverty in Pakistan: A Time Series Analysis by Ardl

Authors: Syed Aziz Rasool, Ayesha Zaman

Abstract:

Poverty is one of the most important problems for any developing nation. Workers’ remittances and investment plays a crucial role in development of any country by reducing the poverty level in Pakistan. This research studies the relationship between workers’ remittances and poverty alleviation. It also focused the significant effect on poverty reduction. This study uses time series data for the period of 1972-2013. Autoregressive Distributed Lag (ARDL)Model and Error Correction (ECM)Model has been used in order to find out the long run and short run relationship between the worker’s remittances and poverty level respectively. Thus, inflow of remittances showed the significant and negative impact on poverty level. Moreover, coefficient of error correction model explains the adjustment towards convergence and it has highly significant and negative value. According to this research, Policy makers should strongly focus on positive and effective policies to attract more remittances. JELCODE: JEL: J61

Keywords: ECM, ARDL, AIC, SC

Procedia PDF Downloads 291
10989 Annual Water Level Simulation Using Support Vector Machine

Authors: Maryam Khalilzadeh Poshtegal, Seyed Ahmad Mirbagheri, Mojtaba Noury

Abstract:

In this paper, by application of the input yearly data of rainfall, temperature and flow to the Urmia Lake, the simulation of water level fluctuation were applied by means of three models. According to the climate change investigation the fluctuation of lakes water level are of high interest. This study investigate data-driven models, support vector machines (SVM), SVM method which is a new regression procedure in water resources are applied to the yearly level data of Lake Urmia that is the biggest and the hyper saline lake in Iran. The evaluated lake levels are found to be in good correlation with the observed values. The results of SVM simulation show better accuracy and implementation. The mean square errors, mean absolute relative errors and determination coefficient statistics are used as comparison criteria.

Keywords: simulation, water level fluctuation, urmia lake, support vector machine

Procedia PDF Downloads 370
10988 Effect of the Structural Parameters on Subbands of Fibonacci AlxGa1-xAs/GaAs Superlattices

Authors: Y. Sefir, Z. Aziz, S. Cherid, Z. F. Meghoufel, F. Bendahama, S. Terkhi, B. Bouadjemi. A. Zitouni S. Bentata

Abstract:

This work is to study the effect of the variation of structural parameters on the band structure in the quasiperiodic Fibonacci superlattices AlxGa1-xAs/GaAs using the formalism of the transfer matrix and Airy function. Our results show that increasing the width of Fibonacci’s wells of allows to the confinement of subminibands with a widening of minigaps, this causes a consistent and coherent fragmentation. The barrier thickness of Fibonacci bf acts on the width of subminibands by controlling the interaction force between neighboring eigenstates. Its increase gives rise to singularly extended states. The barrier height Fibonacci Vf permit to control the degree of structural disorder in these structures. The variation of these parameters permits the design of laser with modulated wavelength.

Keywords: transmission coefficient – Quasiperiodic superlattices- singularly localized and extended states- structural parameters- Laser with modulated wavelength

Procedia PDF Downloads 376
10987 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 223
10986 Nanofluid based on Zinc Oxide/Ferric Oxide Nanocomposite as Additive for Geothermal Drilling Fluids

Authors: Anwaar O. Ali, Mahmoud Fathy Mubarak, Mahmoud Ibrahim Abdou, Hector Cano Esteban, Amany A. Aboulrous

Abstract:

Corrosion resistance and lubrication are crucial characteristics required for geothermal drilling fluids. In this study, a ZnO/Fe₂O₃ nanocomposite was fabricated and incorporated into the structure of Cetyltrimethylammonium bromide (CTAB). Several physicochemical techniques were utilized to analyze and describe the synthesized nanomaterials. The surface morphology of the composite was assessed through scanning electron microscopy (SEM) and energy-dispersive X-ray spectroscopy (EDAX). The corrosion inhibition capabilities of these materials were explored across various corrosive environments. The weight loss and electrochemical methods were utilized to determine the corrosion inhibition activity of the prepared nanomaterials. The results demonstrate a high level of protection achieved by the composite. Additionally, the lubricant coefficient and extreme pressure properties were evaluated.

Keywords: nanofluid, corrosion, geothermal drilling fluids, ZnO/Fe2O3

Procedia PDF Downloads 72
10985 Internet as a Marketing Tool for Tourism Promotion

Authors: Emeka Okonkwo

Abstract:

The Information Technology (IT) has prevailed over all functions of strategic and operational management. The Internet (a product of information technology) has increasingly become a popular medium for marketing. This paper examines the potentials of Internet for tourism marketing. To achieve this, the paper x-rays the characteristics of tourism marketing and examines the application of the Internet in tourism marketing. It is argued that the use of Internet for tourism marketing will not only reach a broad audience and reduce the cost of transaction (by conventional methods used by travel agents in times past), but, will also alleviate the problems of identification, authentication and confirmation of travels/package tours by tourists as well as promotion of tourism industry.

Keywords: internet, marketing, tourism, tourism management

Procedia PDF Downloads 420
10984 The Developmental of Ethical Behavior of Nursing Students in Borommarajonani College of Nursing, Suratthani, Thailand

Authors: Ubonrattan Phophatanachai, Phensri Thongphet, Weerawan Kerdtong

Abstract:

The purposes of this study were to compare the ethical behavior regarding responsibility and polite manners of nursing students of Boromarajonani College of Nursing, Suratthani, Thailand before and after providing the activity session of ethical behavior development. The samples consisted of 103 sophomores in the academic year 2006. The tools were tested for reliability and content validity. The reliability of the Ethical Behavior Questionnaire measured by Cronbach’s alpha coefficient was 0.94. Data were analyzed using means, standard deviations, and dependent t-test. The findings were as follows: a) after the activity session, the mean scores of ethical behavior regarding responsibility and polite manners of nursing students increased from middle level to high level; b) mean scores of responsibilities and polite manners after the activity session were significantly higher than those before the session (t =28.36, p < .001; t =23.9, p < .001, respectively).

Keywords: development of ethical behavior, nursing students, health, nursing informatics

Procedia PDF Downloads 299
10983 Information Technology Impacts on the Supply Chain Performance: Case Study Approach

Authors: Kajal Zarei

Abstract:

Supply chain management is becoming an increasingly important issue in many businesses today. In such circumstances, a number of reasons such as management deficiency in different segments of the supply chain, lack of streamlined processes, resistance to change the current systems and technologies, and lack of advanced information system have paved the ground to ask for innovative research studies. To this end, information technology (IT) is becoming a major driver to overcome the supply chain limitations and deficiencies. The emergence of IT has provided an excellent opportunity for redefining the supply chain to be more effective and competitive. This paper has investigated the IT impact on two-digit industry codes in the International Standard Industrial Classification (ISIC) that are operating in four groups of the supply chains. Firstly, the primary fields of the supply chain were investigated, and then paired comparisons of different industry parts were accomplished. Using experts' ideas and Analytical Hierarchy Process (AHP), the status of industrial activities in Kurdistan Province in Iran was determined. The results revealed that manufacturing and inventory fields have been more important compared to other fields of the supply chain. In addition, IT has had greater impact on food and beverage industry, chemical industry, wood industry, wood products, and production of basic metals. The results indicated the need to IT awareness in supply chain management; in other words, IT applications needed to be developed for the identified industries.

Keywords: supply chain, information technology, analytical hierarchy process, two-digit codes, international standard industrial classification

Procedia PDF Downloads 284
10982 Using Machine Learning Techniques to Extract Useful Information from Dark Data

Authors: Nigar Hussain

Abstract:

It is a subset of big data. Dark data means those data in which we fail to use for future decisions. There are many issues in existing work, but some need powerful tools for utilizing dark data. It needs sufficient techniques to deal with dark data. That enables users to exploit their excellence, adaptability, speed, less time utilization, execution, and accessibility. Another issue is the way to utilize dark data to extract helpful information to settle on better choices. In this paper, we proposed upgrade strategies to remove the dark side from dark data. Using a supervised model and machine learning techniques, we utilized dark data and achieved an F1 score of 89.48%.

Keywords: big data, dark data, machine learning, heatmap, random forest

Procedia PDF Downloads 33
10981 Temperature Coefficients of the Refractive Index for Ge Film

Authors: Lingmao Xu, Hui Zhou

Abstract:

Ge film is widely used in infrared optical systems. Because of the special requirements of space application, it is usually used in low temperature. The refractive index of Ge film is always changed with the temperature which has a great effect on the manufacture of high precision infrared optical film. Specimens of Ge single film were deposited at ZnSe substrates by EB-PVD method. During temperature range 80K ~ 300K, the transmittance of Ge single film within 2 ~ 15 μm were measured every 20K by PerkinElmer FTIR cryogenic testing system. By the full spectrum inversion method fitting, the relationship between refractive index and wavelength within 2 ~ 12μm at different temperatures was received. It can be seen the relationship consistent with the formula Cauchy, which can be fitted. Then the relationship between refractive index of the Ge film and temperature/wavelength was obtained by fitting method based on formula Cauchy. Finally, the designed value obtained by the formula and the measured spectrum were compared to verify the accuracy of the formula.

Keywords: infrared optical film, low temperature, thermal refractive coefficient, Ge film

Procedia PDF Downloads 300
10980 Optical and Dielectric Properties of Self-Assembled 0D Hybrid Organic-Inorganic Insulator

Authors: S. Kassou, R. El Mrabet, A. Belaaraj, P. Guionneau, N. Hadi, T. Lamcharfi

Abstract:

The organic–inorganic hybrid perovskite-like [C6H5C2H4NH3]2ZnCl4 (PEA-ZnCl4) was synthesized by saturated solutions method. X-ray powder diffraction, Raman spectroscopy, UV-visible transmittance, and capacitance meter measurements have been used to characterize the structure, the functional groups, the optical parameters, and the dielectric constants of the material. The material has a layered structure. The optical transmittance (T %) was recorded and applied to deduce the absorption coefficient (α) and optical band gap (Eg). The hybrid shows an insulator character with a direct band gap about 4.46 eV, and presents high dielectric constants up to a frequency of about 105 Hz, which suggests a ferroelectric behavior. The reported optical and dielectric properties can help to understand the fundamental properties of perovskite materials and also to be used for optimizing or designing new devices.

Keywords: dielectric constants, optical band gap (eg), optical parameters, Raman spectroscopy, self-assembly organic inorganic hybrid

Procedia PDF Downloads 405