Search results for: laboratory information system
25268 Assessment of Biochemical Marker Profiles and Their Impact on Morbidity and Mortality of COVID-19 Patients in Tigray, Ethiopia
Authors: Teklay Gebrecherkos, Mahmud Abdulkadir
Abstract:
Abstract: The emergence and subsequent rapid worldwide spread of the COVID-19 pandemic have posed a global crisis, with a tremendously increasing burden of infection, morbidity, and mortality risks. Recent studies have suggested that severe cases of COVID-19 are characterized by massive biochemical, hematological, and inflammatory alterations whose synergistic effect is estimated to progress to multiple organ damage and failure. In this regard, biochemical monitoring of COVID-19 patients, based on comprehensive laboratory assessments and findings, is expected to play a crucial role in effective clinical management and improving the survival rates of patients. However, biochemical markers that can be informative of COVID-19 patient risk stratification and predictor of clinical outcomes are currently scarcely available. The study aims to investigate the profiles of common biochemical markers and their influence on the severity of the COVID-19 infection in Tigray, Ethiopia. Methods: A laboratory-based cross-sectional study was conducted from July to August 2020 at Quiha College of Engineering, Mekelle University COVID-19 isolation and treatment center. Sociodemographic and clinical data were collected using a structured questionnaire. Whole blood was collected from each study participant, and serum samples were separated after being delivered to the laboratory. Hematological biomarkers were analyzed using FACS count, while organ tests and serum electrolytes were analyzed using ion-selective electrode methods using a Cobas-6000 series machine. Data was analyzed using SPSS Vs 20. Results: A total of 120 SARS-CoV-2 patients were enrolled during the study. The participants ranged between 18 and 91 years, with a mean age of 52 (±108.8). The majority (40%) of participants were between the ages of 60 and above. Patients with multiple comorbidities developed severe COVID-19, though not statistically significant (p=0.34). Mann-Whitney U test analysis showed that biochemical tests such as neuropile count (p=0.003), AST levels (p=0.050), serum creatinine (p=0.000), and serum sodium (p=0.015) were significantly correlated with severe COVID-19 disease as compared to non-severe disease. Conclusion: The severity of COVID-19 was associated with higher age, organ tests AST and creatinine, serum Na+, and elevated total neutrophile count. Thus, further study needs to be conducted to evaluate the alterations of biochemical biomarkers and their impact on COVID-19.Keywords: COVID-19, biomarkers, mortality, Tigray, Ethiopia
Procedia PDF Downloads 4225267 Queueing Modeling of M/G/1 Fault Tolerant System with Threshold Recovery and Imperfect Coverage
Authors: Madhu Jain, Rakesh Kumar Meena
Abstract:
This paper investigates a finite M/G/1 fault tolerant multi-component machining system. The system incorporates the features such as standby support, threshold recovery and imperfect coverage make the study closer to real time systems. The performance prediction of M/G/1 fault tolerant system is carried out using recursive approach by treating remaining service time as a supplementary variable. The numerical results are presented to illustrate the computational tractability of analytical results by taking three different service time distributions viz. exponential, 3-stage Erlang and deterministic. Moreover, the cost function is constructed to determine the optimal choice of system descriptors to upgrading the system.Keywords: fault tolerant, machine repair, threshold recovery policy, imperfect coverage, supplementary variable technique
Procedia PDF Downloads 29225266 Assessing the Current State of Software Engineering and Information Technology in Ghana
Authors: David Yartel
Abstract:
Drawing on the current state of software engineering and information technology in Ghana, the study documents its significant contribution to the development of Ghanaian industries. The study focuses on the application of modern trends in technology and the barriers faced in the area of software engineering and information technology. A thorough analysis of a dozen of interviews with stakeholders in software engineering and information technology via interviews reveals how modern trends in software engineering pose challenges to the industry in Ghana. Results show that to meet the expectation of modern software engineering and information technology trends, stakeholders must have skilled professionals, adequate infrastructure, and enhanced support for technology startups. Again, individuals should be encouraged to pursue a career in software engineering and information technology, as it has the propensity to increase the efficiency and effectiveness of work-related activities. This study recommends that stakeholders in software engineering and technology industries should invest enough in training more professionals by collaborating with international institutions well-versed in the area by organizing frequent training and seminars. The government should also provide funding opportunities for small businesses in the technology sector to drive creativity and development in order to bring about growth and development.Keywords: software engineering, information technology, Ghana, development
Procedia PDF Downloads 9425265 Component Lifecycle and Concurrency Model in Usage Control (UCON) System
Authors: P. Ghann, J. Shiguang, C. Zhou
Abstract:
Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: Authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.Keywords: access control, concurrency, digital container, usage control
Procedia PDF Downloads 32025264 Software Quality Measurement System for Telecommunication Industry in Malaysia
Authors: Nor Fazlina Iryani Abdul Hamid, Mohamad Khatim Hasan
Abstract:
Evolution of software quality measurement has been started since McCall introduced his quality model in year 1977. Starting from there, several software quality models and software quality measurement methods had emerged but none of them focused on telecommunication industry. In this paper, the implementation of software quality measurement system for telecommunication industry was compulsory to accommodate the rapid growth of telecommunication industry. The quality value of the telecommunication related software could be calculated using this system by entering the required parameters. The system would calculate the quality value of the measured system based on predefined quality metrics and aggregated by referring to the quality model. It would classify the quality level of the software based on Net Satisfaction Index (NSI). Thus, software quality measurement system was important to both developers and users in order to produce high quality software product for telecommunication industry.Keywords: software quality, quality measurement, quality model, quality metric, net satisfaction index
Procedia PDF Downloads 59225263 Transport of Reactive Carbo-Iron Composite Particles for in situ Groundwater Remediation Investigated at Laboratory and Field Scale
Authors: Sascha E. Oswald, Jan Busch
Abstract:
The in-situ dechlorination of contamination by chlorinated solvents in groundwater via zero-valent iron (nZVI) is potentially an efficient and prompt remediation method. A key requirement is that nZVI has to be introduced in the subsurface in a way that substantial quantities of the contaminants are actually brought into direct contact with the nZVI in the aquifer. Thus it could be a more flexible and precise alternative to permeable reactive barrier techniques using granular iron. However, nZVI are often limited by fast agglomeration and sedimentation in colloidal suspensions, even more so in the aquifer sediments, which is a handicap for the application to treat source zones or contaminant plumes. Colloid-supported nZVI show promising characteristics to overcome these limitations and Carbo-Iron Colloids is a newly developed composite material aiming for that. The nZVI is built onto finely ground activated carbon of about a micrometer diameter acting as a carrier for it. The Carbo-Iron Colloids are often suspended with a polyanionic stabilizer, and carboxymethyl cellulose is one with good properties for that. We have investigated the transport behavior of Carbo-Iron Colloids (CIC) on different scales and for different conditions to assess its mobility in aquifer sediments as a key property for making its application feasible. The transport properties were tested in one-dimensional laboratory columns, a two-dimensional model aquifer and also an injection experiment in the field. Those experiments were accompanied by non-invasive tomographic investigations of the transport and filtration processes of CIC suspensions. The laboratory experiments showed that a larger part of the CIC can travel at least scales of meters for favorable but realistic conditions. Partly this is even similar to a dissolved tracer. For less favorable conditions this can be much smaller and in all cases a particular fraction of the CIC injected is retained mainly shortly after entering the porous medium. As field experiment a horizontal flow field was established, between two wells with a distance of 5 meters, in a confined, shallow aquifer at a contaminated site in North German lowlands. First a tracer test was performed and a basic model was set up to define the design of the CIC injection experiment. Then CIC suspension was introduced into the aquifer at the injection well while the second well was pumped and samples taken there to observe the breakthrough of CIC. This was based on direct visual inspection and total particle and iron concentrations of water samples analyzed in the laboratory later. It could be concluded that at least 12% of the CIC amount injected reached the extraction well in due course, some of it traveling distances larger than 10 meters in the non-uniform dipole flow field. This demonstrated that these CIC particles have a substantial mobility for reaching larger volumes of a contaminated aquifer and for interacting there by their reactivity with dissolved contaminants in the pore space. Therefore they seem suited well for groundwater remediation by in-situ formation of reactive barriers for chlorinated solvent plumes or even source removal.Keywords: carbo-iron colloids, chlorinated solvents, in-situ remediation, particle transport, plume treatment
Procedia PDF Downloads 24625262 Smart Trash Can Interface between Origin and Destination Waste Management
Authors: Fatemeh Ghorbani
Abstract:
The increase in population in the cities has also led to the increase and accumulation of urban waste. Managing and organizing waste is an action that must be taken to prevent environmental pollution. Separation of waste from the source is the first step that must be taken to determine whether the waste should be buried, burned, recycled, or used in the industry according to its type. Separation of trash is a cultural work that the general public must learn the necessity of doing; then, it is necessary to provide suitable conditions for collecting this waste. It is necessary to put segregated garbage cans in the city so that people can put the garbage in the right place. In this research, a smart trash can has been designed, which is connected to the central system of the municipality and has information on the units of each neighborhood separately. By entering the postal code on the page connected to each bin and entering the type of waste, the section related to the waste in the existing bin is opened and the person places the waste in the desired section. In addition, all the bins are connected to the municipal system, and the sensors in it warn each relevant body about the fullness and emptiness of the bins. Also, people can know how full and empty the bins around their building are through the designed application connected to the system. In this way, each organization collects its desired waste, wet and dry waste are separated from the beginning, and city pollution and unpleasant odors are also prevented.Keywords: connector, smart trash can, waste management
Procedia PDF Downloads 6625261 Guidance for Strengthening Ethics of Entrepreneurs in Information and Communication Technology Professional
Authors: Routsukol Sunalai
Abstract:
The objectives of this paper were to study current problem of ethics of entrepreneurs in information and communication technology professional, and to build their awareness of ethics, which would be useful as guidance for strengthening professional ethics among them. The study employed quantitative research method in order to analyze relationships or differences found in each ethics factor and report in statistics. The sample of this paper was 300 information technology users of Rajabhat Universities in Bangkok. The findings revealed that the ethics factors which gained the highest and high level of opinion included possessing principles of righteousness, having trust in themselves and others, and respecting different opinions of others and accepting the fact that people of different opinions.Keywords: communication, ethics, information, entrepreneurs
Procedia PDF Downloads 41125260 Assessment of the Adoption and Distribution Pattern of Agroforestry in Faisalabad District Using GIS
Authors: Irfan Ahmad, Raza Ghafoor, Hammad Raza Ahmad, Muhammad Asif, Farrakh Nawaz, M. Tahir Siddiqui
Abstract:
Due to the exploding population of Pakistan the pressure on natural forests is increasing to meet the demands of wood and wood based products. Agroforestry is being practiced throughout the world on scientific basis but unfortunately the farmers of Pakistan are reluctant in its adoption. The presents study was designed to assess the adoption of agroforestry practices in Faisalabad with respect to land holdings of farmers and future suitability by using Geographic information system (GIS). Faisalabad is the third largest city of the country and is famous due to the textile industry. A comprehensive survey from target villages of the Lyallpur town of Faisalabad district was carried out. Out of total 65 villages, 40 were selected for study. From each selected village, one farmer who was actively engaged in farming activities was selected. It was observed that medium sized farmers having 10-20 acre were more in number as compared to small and large farmers. Number of trees was found maximum in large farm lands, ratio of diseased trees was almost similar in all categories with maximum in small farmlands (24.1%). Regarding the future prospects 35% farmer were interested in agroforestry practices 65% were not interested in the promotion of trees due to the non-availability of technical guidance and proper markets. Geographic images of the study site can further help the researchers and policy makers in the promotion of agroforestry.Keywords: agroforestry trends, adoption, Faisalabad, geographic information system (GIS)
Procedia PDF Downloads 50425259 Automatic Teller Machine System Security by Using Mobile SMS Code
Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem
Abstract:
The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition
Procedia PDF Downloads 36525258 Does Stock Markets Asymmetric Information Affect Foreign Capital Flows?
Authors: Farid Habibi Tanha, Mojtaba Jahanbazi, Morteza Foroutan, Rasidah Mohd Rashid
Abstract:
This paper depicts the effects of asymmetric information in determining capital inflows to be captured through stock market microstructure. The model can explain several stylized facts regarding the capital immobility. The first phase of the research involves in collecting and refining 150,000,000 daily data of 11 stock markets over a period of one decade in an effort to minimize the impact of survivorship bias. Three micro techniques were used to measure information asymmetries. The final phase analyzes the model through panel data approach. As a unique contribution, this research will provide valuable information regarding negative effects of information asymmetries in stock markets on attracting foreign investments. The results of this study can be directly considered by policy makers to monitor and control changes of capital flow in order to keep market conditions in a healthy manner, by preventing and managing possible shocks to avoid sudden reversals and market failures.Keywords: asymmetric information, capital inflow, market microstructure, investment
Procedia PDF Downloads 32125257 The Service Appraisal of Soldiers of the Army of the Czech Republic in the Context of Personal Expenses
Authors: Tereza Dolečková
Abstract:
Following article provides the comparison of international norms and standards formulating personal expenses, and then it illustrates the national concept of personal expenses of the Ministry of Defence. Then a new salary system of soldiers and the importance of the service appraisal in the context of personal expenses of the Ministry of Defence are explained. The first part of the article includes formulation of the approach to the definition of personal expenses within the international norms and standards and also within the Ministry of Defence of the Czech Republic. The structure of employees of the Ministry of Defence of the Czech Republic in years 2012 – 2014 and the amount of military expenses and the share of salary expenses of the Ministry of total expenses of the Ministry are clarified there, also the comparison of the amount of military expenses in chosen member states of the North Atlantic Treaty Organization is done. The salary system of professional soldiers in connection with the amendment of the Act No. 221/1999 Coll. on Professional Soldiers is clarified in the second part of this article. The amendment significantly regulates the salary items of soldiers but changes are also in the service appraisal of soldiers which reflects one of seven salary items of soldiers – the performance bonus. The aim of this article is to clarify different approach to define personal expenses with emphasis on the Ministry of Defence of the Czech Republic which overlaps to the service appraisal of soldiers of the Army of the Czech Republic and their salary system in connection with personal expenses of the Ministry of Defence of the Czech Republic. The efficient and objective system of the service appraisal and the use of its results are connected to the principles of the career advancement; only the best soldiers can advance in the system of the service careers to higher positions. That is why it is necessary to improve the service appraisal so it would provide the maximum information about the performance of a soldier and it would also motivate the soldier in his development. The attention should be paid to the service appraisal of the soldiers of the Army of the Czech Republic to achieve as much objectivity as possible.Keywords: career, human resource management and development, personal expenses, salary system of soldiers, service appraisal of soldiers, the Army of the Czech Republic
Procedia PDF Downloads 25025256 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 38425255 Visualizing the Commercial Activity of a City by Analyzing the Data Information in Layers
Authors: Taras Agryzkov, Jose L. Oliver, Leandro Tortosa, Jose Vicent
Abstract:
This paper aims to demonstrate how network models can be used to understand and to deal with some aspects of urban complexity. As it is well known, the Theory of Architecture and Urbanism has been using for decades’ intellectual tools based on the ‘sciences of complexity’ as a strategy to propose theoretical approaches about cities and about architecture. In this sense, it is possible to find a vast literature in which for instance network theory is used as an instrument to understand very diverse questions about cities: from their commercial activity to their heritage condition. The contribution of this research consists in adding one step of complexity to this process: instead of working with one single primal graph as it is usually done, we will show how new network models arise from the consideration of two different primal graphs interacting in two layers. When we model an urban network through a mathematical structure like a graph, the city is usually represented by a set of nodes and edges that reproduce its topology, with the data generated or extracted from the city embedded in it. All this information is normally displayed in a single layer. Here, we propose to separate the information in two layers so that we can evaluate the interaction between them. Besides, both layers may be composed of structures that do not have to coincide: from this bi-layer system, groups of interactions emerge, suggesting reflections and in consequence, possible actions.Keywords: graphs, mathematics, networks, urban studies
Procedia PDF Downloads 18025254 Applying Augmented Reality Technology for an E-Learning System
Authors: Fetoon K. Algarawi, Wejdan A. Alslamah, Ahlam A. Alhabib, Afnan S. Alfehaid, Dina M. Ibrahim
Abstract:
Over the past 20 years, technology was rapidly developed and no one expected what will come next. Advancements in technology open new opportunities for immersive learning environments. There is a need to transmit education to a level that makes it more effective for the student. Augmented reality is one of the most popular technologies these days. This paper is an experience of applying Augmented Reality (AR) technology using a marker-based approach in E-learning system to transmitting virtual objects into the real-world scenes. We present a marker-based approach for transmitting virtual objects into real-world scenes to explain information in a better way after we developed a mobile phone application. The mobile phone application was then tested on students to determine the extent to which it encouraged them to learn and understand the subjects. In this paper, we talk about how the beginnings of AR, the fields using AR, how AR is effective in education, the spread of AR these days and the architecture of our work. Therefore, the aim of this paper is to prove how creating an interactive e-learning system using AR technology will encourage students to learn more.Keywords: augmented reality, e-learning, marker-based, monitor-based
Procedia PDF Downloads 22325253 The Effect of Grading Characteristics on the Shear Strength and Mechanical Behavior of Granular Classes of Sand-Silt
Authors: Youssouf Benmeriem
Abstract:
Shear strength of sandy soils has been considered as the important parameter to study the stability of different civil engineering structures when subjected to monotonic, cyclic and earthquake loading conditions. The proposed research investigated the effect of grading characteristics on the shear strength and mechanical behavior of granular classes of sands mixed with silt in loose and dense states (Dr = 15% and 90%). The laboratory investigation aimed at understanding the extent or degree at which shear strength of sand-silt mixture soil is affected by its gradation under static loading conditions. For the purpose of clarifying and evaluating the shear strength characteristics of sandy soils, a series of Casagrande shear box tests were carried out on different reconstituted samples of sand-silt mixtures with various gradations. The soil samples were tested under different normal stresses (100, 200 and 300 kPa). The results from this laboratory investigation were used to develop insight into the shear strength response of sand and sand-silt mixtures under monotonic loading conditions. The analysis of the obtained data revealed that the grading characteristics (D10, D50, Cu, ESR, and MGSR) have significant influence on the shear strength response. It was found that shear strength can be correlated to the grading characteristics for the sand-silt mixture. The effective size ratio (ESR) and mean grain size ratio (MGSR) appear as pertinent parameters to predict the shear strength response of the sand-silt mixtures for soil gradation under study.Keywords: grading characteristics, granular classes of sands, mechanical behavior, sand-silt, shear strength
Procedia PDF Downloads 38525252 Proximal Method of Solving Split System of Minimization Problem
Authors: Anteneh Getachew Gebrie, Rabian Wangkeeree
Abstract:
The purpose of this paper is to introduce iterative algorithm solving split system of minimization problem given as a task of finding a common minimizer point of finite family of proper, lower semicontinuous convex functions and whose image under a bounded linear operator is also common minimizer point of another finite family of proper, lower semicontinuous convex functions. We obtain strong convergence of the sequence generated by our algorithm under some suitable conditions on the parameters. The iterative schemes are developed with a way of selecting the step sizes such that the information of operator norm is not necessary. Some applications and numerical experiment is given to analyse the efficiency of our algorithm.Keywords: Hilbert Space, minimization problems, Moreau-Yosida approximate, split feasibility problem
Procedia PDF Downloads 14425251 Evaluation of Raw Diatomaceous Earth and Plant Powders in the Control of Callosobruchus subinnotatus (Pic.) on Stored Bambara Groundnut (Vigna subterranea (L.) (Verdc.) Seeds
Authors: Ibrahim Nasiru Dole, Audu Abdullahi, Dike Michiel Chidozie, Lawal Mansur
Abstract:
Bambara groundnut is an important grain legume and the seeds in storage suffer infestation by Callosobruchus subinnotatus. Laboratory study was conducted to evaluate the efficacy of raw diatomaceous earth (RDE) and plant powders (Jatropha curcas (L.), Eucalyptus camaldulensis (Dehnh.) and Melia azedarach (L.) against C. subinnotatus infesting stored bambara groundnut seeds. Rearing of the insects and the experiments were conducted in Agricultural Biology Laboratory of the Usmanu Danfodiyo University, Sokoto - Nigeria under ambient conditions (29-33oC and a relative humidity of 44-56%). Four treatments at three levels: RDE at 0.5, 1.0 and 1.5 g while plant powders at 0.5, 1.0 and 2.0 g, standard/check (2.0 g of Actellic dust), and a control. These were separately admixed with 100 g of sterilized seeds in glass jars. Each jar was later infested with thirty, 1-2-days old C. subinnotatus of mixed sexes. Adult mortality was assessed 24, 48, 72 and 96 hours, F1 and F2 progenies, seed damage, weight loss and viability were also assessed after 90 days. Eighty-nine (89%) percent adult mortality was recorded in the highest dose of RDE after 96 hours of exposure. These treatments significantly (P < 0.05) suppressed F1 and F2 progenies emergence in relation to the control. The control suffered significantly (P < 0.05) higher seed damage (51.0 %) and weight loss (40.8%) thereby recording lower seed germination. Therefore, RDE and plant powders could be used against C. subinnotatus on stored bambara groundnut seeds.Keywords: bambara, callosobruchus subinnotatus, plant powders, raw diatomaceous earth,
Procedia PDF Downloads 42625250 Stable Tending Control of Complex Power Systems: An Example of Localized Design of Power System Stabilizers
Authors: Wenjuan Du
Abstract:
The phase compensation method was proposed based on the concept of the damping torque analysis (DTA). It is a method for the design of a PSS (power system stabilizer) to suppress local-mode power oscillations in a single-machine infinite-bus power system. This paper presents the application of the phase compensation method for the design of a PSS in a multi-machine power system. The application is achieved by examining the direct damping contribution of the stabilizer to the power oscillations. By using linearized equal area criterion, a theoretical proof to the application for the PSS design is presented. Hence PSS design in the paper is an example of stable tending control by localized method.Keywords: phase compensation method, power system small-signal stability, power system stabilizer
Procedia PDF Downloads 64125249 Plantation Forests Height Mapping Using Unmanned Aerial System
Authors: Shiming Li, Qingwang Liu, Honggan Wu, Jianbing Zhang
Abstract:
Plantation forests are useful for timber production, recreation, environmental protection and social development. Stands height is an important parameter for the estimation of forest volume and carbon stocks. Although lidar is suitable technology for the vertical parameters extraction of forests, but high costs make it not suitable for operational inventory. With the development of computer vision and photogrammetry, aerial photos from unmanned aerial system can be used as an alternative solution for height mapping. Structure-from-motion (SfM) photogrammetry technique can be used to extract DSM and DEM information. Canopy height model (CHM) can be achieved by subtraction DEM from DSM. Our result shows that overlapping aerial photos is a potential solution for plantation forests height mapping.Keywords: forest height mapping, plantation forests, structure-from-motion photogrammetry, UAS
Procedia PDF Downloads 27825248 Eye Diagram for a System of Highly Mode Coupled PMD/PDL Fiber
Authors: Suad M. Abuzariba, Liang Chen, Saeed Hadjifaradji
Abstract:
To evaluate the optical eye diagram due to polarization-mode dispersion (PMD), polarization-dependent loss (PDL), and chromatic dispersion (CD) for a system of highly mode coupled fiber with lumped section at any given optical pulse sequence we present an analytical modle. We found that with considering PDL and the polarization direction correlation between PMD and PDL, a system with highly mode coupled fiber with lumped section can have either higher or lower Q-factor than a highly mode coupled system with same root mean square PDL/PMD values. Also we noticed that a system of two highly mode coupled fibers connected together is not equivalent to a system of highly mode coupled fiber when fluctuation is consideredKeywords: polarization mode dispersion, polarization dependent loss, chromatic dispersion, optical eye diagram
Procedia PDF Downloads 86525247 Perceptions toward Adopting Virtual Reality as a Learning Aid in Information Technology
Authors: S. Alfalah, J. Falah, T. Alfalah, M. Elfalah, O. Falah
Abstract:
The field of education is an ever-evolving area constantly enriched by newly discovered techniques provided by active research in all areas of technologies. The recent years have witnessed the introduction of a number of promising technologies and applications to enhance the teaching and learning experience. Virtual Reality (VR) applications are considered one of the evolving methods that have contributed to enhancing education in many fields. VR creates an artificial environment, using computer hardware and software, which is similar to the real world. This simulation provides a solution to improve the delivery of materials, which facilitates the teaching process by providing a useful aid to instructors, and enhances the learning experience by providing a beneficial learning aid. In order to assure future utilization of such systems, students’ perceptions were examined toward utilizing VR as an educational tool in the Faculty of Information Technology (IT) in The University of Jordan. A questionnaire was administered to IT undergraduates investigating students’ opinions about the potential opportunities that VR technology could offer and its implications as learning and teaching aid. The results confirmed the end users’ willingness to adopt VR systems as a learning aid. The result of this research forms a solid base for investing in a VR system for IT education.Keywords: information, technology, virtual reality, education
Procedia PDF Downloads 29025246 Augmented Reality Using Cuboid Tracking as a Support for Early Stages of Architectural Design
Authors: Larissa Negris de Souza, Ana Regina Mizrahy Cuperschmid, Daniel de Carvalho Moreira
Abstract:
Augmented Reality (AR) alters the elaboration of the architectural project, which relates to project cognition: representation, visualization, and perception of information. Understanding these features from the earliest stages of the design can facilitate the study of relationships, zoning, and overall dimensions of the forms. This paper’s goal was to explore a new approach for information visualization during the early stages of architectural design using Augmented Reality (AR). A three-dimensional marker inspired by the Rubik’s Cube was developed, and its performance, evaluated. This investigation interwovens the acquired knowledge of traditional briefing methods and contemporary technology. We considered the concept of patterns (Alexander et al. 1977) to outline geometric forms and associations using visual programming. The Design Science Research was applied to develop the study. An SDK was used in a game engine to generate the AR app. The tool's functionality was assessed by verifying the readability and precision of the reconfigurable 3D marker. The results indicated an inconsistent response. To use AR in the early stages of architectural design the system must provide consistent information and appropriate feedback. Nevertheless, we conclude that our framework sets the ground for looking deep into AR tools for briefing design.Keywords: augmented reality, cuboid marker, early design stages, graphic representation, patterns
Procedia PDF Downloads 9825245 Acid Attack on Cement Mortars Modified with Rubber Aggregates and EVA Polymer Binder
Authors: Konstantinos Sotiriadis, Michael Tupý, Nikol Žižková, Vít Petránek
Abstract:
The acid attack on cement mortars modified with rubber aggregates and EVA polymer binder was studied. Mortar specimens were prepared using a type CEM I 42.5 Portland cement and siliceous sand, as well as by substituting 25% of sand with shredded used automobile tires, and by adding EVA polymer in two percentages (5% and 10% of cement mass). Some specimens were only air cured, at laboratory conditions, and their compressive strength and water absorption were determined. The rest specimens were stored in acid solutions (HCl, H2SO4, HNO3) after 28 days of initial curing, and stored at laboratory temperature. Compressive strength tests, mass measurements and visual inspection took place for 28 days. Compressive strength and water absorption of the air-cured specimens were significantly decreased when rubber aggregates are used. The addition of EVA polymer further reduced water absorption, while had no important impact on strength. Compressive strength values were affected in a greater extent by hydrochloric acid solution, followed by sulfate and nitric acid solutions. The addition of EVA polymer decreased compressive strength loss for the specimens with rubber aggregates stored in hydrochloric and nitric acid solutions. The specimens without polymer binder showed similar mass loss, which was higher in sulfate acid solution followed by hydrochloric and nitric acid solutions. The use of EVA polymer delayed mass loss, while its content did not affect it significantly.Keywords: acid attack, mortar, EVA polymer, rubber aggregates
Procedia PDF Downloads 28825244 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 40025243 Fair Value Implementation of Financial Asset: Evidence in Indonesia’s Banking Sector
Authors: Alhamdi Alfi Fajri
Abstract:
The purpose of this study is to analyze and to give empirical proof about the effect of fair value implementation on financial asset against information asymmetry in Indonesia’s banking sector. This research tested the effect of fair value implementation on financial asset based on Statement of Financial Accounting Standard (PSAK) No. 55 and the fair value reliability measurement based on PSAK No. 60 against level of information asymmetry. The scope of research is Indonesia’s banking sector. The test’s result shows that the use of fair value based on PSAK No. 55 is significantly associated with information asymmetry. This positive relation is higher than the amortized cost implementation on financial asset. In addition, the fair value hierarchy based on PSAK No. 60 is significantly associated with information asymmetry. This research proves that the more reliable measurement of fair value on financial asset, the more observable fair value measurement and reduces level of information asymmetry.Keywords: fair value, PSAK No. 55, PSAK No. 60, information asymmetry, bank
Procedia PDF Downloads 35425242 The Impact of Board Director Characteristics on the Quality of Information Disclosure
Authors: Guo Jinhong
Abstract:
The purpose of this study is to explore the association between board member functions and information disclosure levels. Based on the literature variables, such as the characteristics of the board of directors in the past, a single comprehensive indicator is established as a substitute variable for board functions, and the information disclosure evaluation results published by the Securities and Foundation are used to measure the information disclosure level of the company. This study focuses on companies listed on the Taiwan Stock Exchange from 2006 to 2010 and uses descriptive statistical analysis, univariate analysis, correlation analysis and ordered normal probability (Ordered Probit) regression for empirical analysis. The empirical results show that there is a significant positive correlation between the function of board members and the level of information disclosure. This study also conducts a sensitivity test and draws similar conclusions, showing that boards with better board member functions have higher levels of information disclosure. In addition, this study also found that higher board independence, lower director shareholding pledge ratio, higher director shareholding ratio, and directors with rich professional knowledge and practical experience can help improve the level of information disclosure. The empirical results of this study provide strong support for the "relative regulations to improve the level of information disclosure" formulated by the competent authorities in recent years.Keywords: function of board members, information disclosure, securities, foundation
Procedia PDF Downloads 9725241 Development of GIS-Based Geotechnical Guidance Maps for Prediction of Soil Bearing Capacity
Authors: Q. Toufeeq, R. Kauser, U. R. Jamil, N. Sohaib
Abstract:
Foundation design of a structure needs soil investigation to avoid failures due to settlements. This soil investigation is expensive and time-consuming. Developments of new residential societies involve huge leveling of large sites that is accompanied by heavy land filling. Poor practices of land fill for deep depths cause differential settlements and consolidations of underneath soil that sometimes result in the collapse of structures. The extent of filling remains unknown to the individual developer unless soil investigation is carried out. Soil investigation cannot be performed on each available site due to involved costs. However, fair estimate of bearing capacity can be made if such tests are already done in the surrounding areas. The geotechnical guidance maps can provide a fair assessment of soil properties. Previously, GIS-based approaches have been used to develop maps using extrapolation and interpolations techniques for bearing capacities, underground recharge, soil classification, geological hazards, landslide hazards, socio-economic, and soil liquefaction mapping. Standard penetration test (SPT) data of surrounding sites were already available. Google Earth is used for digitization of collected data. Few points were considered for data calibration and validation. Resultant Geographic information system (GIS)-based guidance maps are helpful to anticipate the bearing capacity in the real estate industry.Keywords: bearing capacity, soil classification, geographical information system, inverse distance weighted, radial basis function
Procedia PDF Downloads 13525240 Design of Jumping Structure of Spherical Robot Based on Archimedes' Helix
Authors: Zhang Zijian
Abstract:
Nowadays, spherical robots have played an important role in many fields, but the insufficient ability of obstacle surmounting limits their wider application fields. To solve this problem, a jumping system of a spherical robot is designed based on Archimedes helix. The jumping system of the robot utilizes the characteristics of Archimedes helix and isovelocity helix to achieve constant speed and stable contraction, which ensures the stability of the system. Also, the jumping action of the robot is realized by instantaneous release of elastic potential energy. In order to verify the effectiveness of the jumping system, we designed a spherical robot and its jumping system. The experimental results show that the jumping system has the advantages of light weight, small size, high energy conversion efficiency, and can realize the spherical jumping function.Keywords: hopping mechanism, Archimedes' Helix, hopping robot, spherical robot
Procedia PDF Downloads 13525239 A Novel Image Steganography Scheme Based on Mandelbrot Fractal
Authors: Adnan H. M. Al-Helali, Hamza A. Ali
Abstract:
Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography
Procedia PDF Downloads 541