Search results for: user comfort
1075 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2431074 Monitoring System for Electronic Procurement Systems
Authors: Abdulah Fajar
Abstract:
Electronic Procurement System has been implemented at government institution in Indonesia. This system has been developed centrally at Institution of National Procurement Policy (LKPP) and implemented autonomously at either local or national government institution. The lack of competency at many institution on Information Technology Management arise several major problems. The main concern of LKPP to local administrator is assured that the system is running normally and always be able to serve the needs of its users. Monitoring system has been identified as the one of solution to prevent the problems appeared. Monitoring system is developed using Simple Network Management Protocol (SNMP) and implemented at LKPP. There are two modules; Main Dashboard and Local Agent. Main Dashboard is intended for LKPP and Local Agent is intended to implement at local autonomous e-procurement system (LPSE). There are several resources that must be monitored such as computation, memory and network traffic. Agile paradigm is applied to this project to assure user and system requirement is met. The length of project is the one of reason why agile paradigm has been chosen. The system has been successfully delivered to LKPP.Keywords: procurement system, SNMP, LKPP, LPSE
Procedia PDF Downloads 4271073 5G Future Hyper-Dense Networks: An Empirical Study and Standardization Challenges
Authors: W. Hashim, H. Burok, N. Ghazaly, H. Ahmad Nasir, N. Mohamad Anas, A. F. Ismail, K. L. Yau
Abstract:
Future communication networks require devices that are able to work on a single platform but support heterogeneous operations which lead to service diversity and functional flexibility. This paper proposes two cognitive mechanisms termed cognitive hybrid function which is applied in multiple broadband user terminals in order to maintain reliable connectivity and preventing unnecessary interferences. By employing such mechanisms especially for future hyper-dense network, we can observe their performances in terms of optimized speed and power saving efficiency. Results were obtained from several empirical laboratory studies. It was found that selecting reliable network had shown a better optimized speed performance up to 37% improvement as compared without such function. In terms of power adjustment, our evaluation of this mechanism can reduce the power to 5dB while maintaining the same level of throughput at higher power performance. We also discuss the issues impacting future telecommunication standards whenever such devices get in place.Keywords: dense network, intelligent network selection, multiple networks, transmit power adjustment
Procedia PDF Downloads 3781072 Bone Fracture Detection with X-Ray Images Using Mobilenet V3 Architecture
Authors: Ashlesha Khanapure, Harsh Kashyap, Abhinav Anand, Sanjana Habib, Anupama Bidargaddi
Abstract:
Technologies that are developing quickly are being developed daily in a variety of disciplines, particularly the medical field. For the purpose of detecting bone fractures in X-ray pictures of different body segments, our work compares the ResNet-50 and MobileNetV3 architectures. It evaluates accuracy and computing efficiency with X-rays of the elbow, hand, and shoulder from the MURA dataset. Through training and validation, the models are evaluated on normal and fractured images. While ResNet-50 showcases superior accuracy in fracture identification, MobileNetV3 showcases superior speed and resource optimization. Despite ResNet-50’s accuracy, MobileNetV3’s swifter inference makes it a viable choice for real-time clinical applications, emphasizing the importance of balancing computational efficiency and accuracy in medical imaging. We created a graphical user interface (GUI) for MobileNet V3 model bone fracture detection. This research underscores MobileNetV3’s potential to streamline bone fracture diagnoses, potentially revolutionizing orthopedic medical procedures and enhancing patient care.Keywords: CNN, MobileNet V3, ResNet-50, healthcare, MURA, X-ray, fracture detection
Procedia PDF Downloads 691071 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology
Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar
Abstract:
Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.Keywords: data privacy, distributed system, federated learning, machine learning
Procedia PDF Downloads 1361070 A Two Level Load Balancing Approach for Cloud Environment
Authors: Anurag Jain, Rajneesh Kumar
Abstract:
Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling
Procedia PDF Downloads 4321069 Investigation of Spatial Changes in the Context of Cultural Sustainability
Authors: Aslı Taş, Şebnem Ertaş
Abstract:
Culture consists of material and spiritual values adopted by the emerging societies during the historical and social processes and continues to exist from past to present by being transferred through generations. Culture and cultural sustainability are interdependent concepts. Cultural sustainability exists when the requirements established cultural expression are added to the social life as lifestyle and habits. However, sustainability renders change inevitable. Changes that take place in the culture of a society also shows the impact in the daily life places. Functional changes occur in the spaces in order to adapt particularly to cultural change that appear in the aftermath of the user change, to modern technology and living standards. In this context, in this study, it was aimed to investigate the effect of the time-dependent functional changes that took place in the housing where non-Muslim population who was subject to population exchange and Muslim population lived after the population exchange in the vacated housing in Sille. Therefore, the changed and newly added venues in the house belonging to Ali Oğuz in Hacı Ali Ağa Street were investigated over the generated graphic in order to clearly perceive the cultural exchange on the housing and settlement and the functional changes were demonstrated.Keywords: culture, house, spatial changes, sustainability
Procedia PDF Downloads 3901068 Development of Thermal Regulating Textile Material Consisted of Macrocapsulated Phase Change Material
Authors: Surini Duthika Fernandopulle, Kalamba Arachchige Pramodya Wijesinghe
Abstract:
Macrocapsules containing phase change material (PCM) PEG4000 as core and Calcium Alginate as the shell was synthesized by in-situ polymerization process, and their suitability for textile applications was studied. PCM macro-capsules were sandwiched between two polyurethane foams at regular intervals, and the sandwiched foams were subsequently covered with 100% cotton woven fabrics. According to the mathematical modelling and calculations 46 capsules were required to provide cooling for a period of 2 hours at 56ºC, so a panel of 10 cm x 10 cm area with 25 parts (having 5 capsules in each for 9 parts are 16 parts spaced for air permeability) were effectively merged into one textile material without changing the textile's original properties. First, the available cooling techniques related to textiles were considered and the best cooling techniques suiting the Sri Lankan climatic conditions were selected using a survey conducted for Sri Lankan Public based on ASHRAE-55-2010 standard and it consisted of 19 questions under 3 sections categorized as general information, thermal comfort sensation and requirement of Personal Cooling Garments (PCG). The results indicated that during daytime, majority of respondents feel warm and during nighttime also majority have responded as slightly warm. The survey also revealed that around 85% of the respondents are willing to accept a PCG. The developed panels were characterized using Fourier-transform infrared spectroscopy (FTIR) and Thermogravimetric Analysis (TGA) tests and the findings from FTIR showed that the macrocapsules consisted of PEG 4000 as the core material and Calcium Alginate as the shell material and findings from TGA showed that the capsules had the average weight percentage for core with 61,9% and shell with 34,7%. After heating both control samples and samples incorporating PCM panels, it was discovered that only the temperature of the control sample increased after 56ºC, whereas the temperature of the sample incorporating PCM panels began to regulate the temperature at 56ºC, preventing a temperature increase beyond 56ºC.Keywords: phase change materials, thermal regulation, textiles, macrocapsules
Procedia PDF Downloads 1291067 Using Analytical Hierarchy Process and TOPSIS Approaches in Designing a Finite Element Analysis Automation Program
Authors: Ming Wen, Nasim Nezamoddini
Abstract:
Sophisticated numerical simulations like finite element analysis (FEA) involve a complicated process from model setup to post-processing tasks that require replication of time-consuming steps. Utilizing FEA automation program simplifies the complexity of the involved steps while minimizing human errors in analysis set up, calculations, and results processing. One of the main challenges in designing FEA automation programs is to identify user requirements and link them to possible design alternatives. This paper presents a decision-making framework to design a Python based FEA automation program for modal analysis, frequency response analysis, and random vibration fatigue (RVF) analysis procedures. Analytical hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are applied to evaluate design alternatives considering the feedback received from experts and program users.Keywords: finite element analysis, FEA, random vibration fatigue, process automation, analytical hierarchy process, AHP, TOPSIS, multiple-criteria decision-making, MCDM
Procedia PDF Downloads 1131066 Risk Management Approach for a Secure and Performant Integration of Automated Drug Dispensing Systems in Hospitals
Authors: Hind Bouami, Patrick Millot
Abstract:
Medication dispensing system is a life-critical system whose failure may result in preventable adverse events leading to longer patient stays in hospitals or patient death. Automation has led to great improvements in life-critical systems as it increased safety, efficiency, and comfort. However, critical risks related to medical organization complexity and automated solutions integration can threaten drug dispensing security and performance. Knowledge about the system’s complexity aspects and human machine parameters to control for automated equipment’s security and performance will help operators to secure their automation process and to optimize their system’s reliability. In this context, this study aims to document the operator’s situation awareness about automation risks and parameters involved in automation security and performance. Our risk management approach has been deployed in the North Luxembourg hospital center’s pharmacy, which is equipped with automated drug dispensing systems since 2009. With more than 4 million euros of gains generated, North Luxembourg hospital center’s success story was enabled by the management commitment, pharmacy’s involvement in the implementation and improvement of the automation project, and the close collaboration between the pharmacy and Sinteco’s firm to implement the necessary innovation and organizational actions for automated solutions integration security and performance. An analysis of the actions implemented by the hospital and the parameters involved in automated equipment’s integration security and performance has been made. The parameters to control for automated equipment’s integration security and performance are human aspects (6.25%), technical aspects (50%), and human-machine interaction (43.75%). The implementation of an anthropocentric analysis system before automation would have prevented and optimized the control of risks related to automation.Keywords: Automated drug delivery systems, Hospitals, Human-centered automated system, Risk management
Procedia PDF Downloads 1381065 Computer-Based Model for Design Selection of Lightning Arrester for 132/33kV Substation
Authors: Uma U. Uma, Uzoechi Laz
Abstract:
Protection of equipment insulation against lightning over voltages and selection of lightning arrester that will discharge at lower voltage level than the voltage required to breakdown the electrical equipment insulation is examined. The objectives of this paper are to design a computer based model using standard equations for the selection of appropriate lightning arrester with the lowest rated surge arrester that will provide adequate protection of equipment insulation and equally have a satisfactory service life when connected to a specified line voltage in power system network. The effectiveness and non-effectiveness of the earthing system of substation determine arrester properties. MATLAB program with GUI (graphic user interphase) its subprogram is used in the development of the model for the determination of required parameters like voltage rating, impulse spark over voltage, power frequency spark over voltage, discharge current, current rating and protection level of lightning arrester of a specified voltage level of a particular line.Keywords: lightning arrester, GUIs, MatLab program, computer based model
Procedia PDF Downloads 4191064 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2821063 The OLOS® Way to Cultural Heritage: User Interface with Anthropomorphic Characteristics
Authors: Daniele Baldacci, Remo Pareschi
Abstract:
Augmented Reality and Augmented Intelligence are radically changing information technology. The path that starts from the keyboard and then, passing through milestones such as Siri, Alexa and other vocal avatars, reaches a more fluid and natural communication with computers, thus converting the dichotomy between man and machine into a harmonious interaction, now heads unequivocally towards a new IT paradigm, where holographic computing will play a key role. The OLOS® platform contributes substantially to this trend in that it infuses computers with human features, by transferring the gestures and expressions of persons of flesh and bones to anthropomorphic holographic interfaces which in turn will use them to interact with real-life humans. In fact, we could say, boldly but with a solid technological background to back the statement, that OLOS® gives reality to an altogether new entity, placed at the exact boundary between nature and technology, namely the holographic human being. Holographic humans qualify as the perfect carriers for the virtual reincarnation of characters handed down from history and tradition. Thus, they provide for an innovative and highly immersive way of experiencing our cultural heritage as something alive and pulsating in the present.Keywords: digital cinematography, human-computer interfaces, holographic simulation, interactive museum exhibits
Procedia PDF Downloads 1181062 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application
Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa
Abstract:
Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.Keywords: bio medical, mental helath care, empower youths & adults, counselling
Procedia PDF Downloads 1561061 Improved Simultaneous Performance in the Time Domain and in the Frequency Domain
Authors: Azeddine Ghodbane, David Bensoussan, Maher Hammami
Abstract:
An innovative approach for controlling unstable and invertible systems has demonstrated superior performance compared to conventional controllers. It has been successfully applied to a levitation system and drone control. Simulations have yielded satisfactory performances when applied to a satellite antenna controller. This design method, based on sensitivity analysis, has also been extended to handle multivariable unstable and invertible systems that exhibit dominant diagonal characteristics at high frequencies, enabling decentralized control. Furthermore, this control method has been expanded to the realm of adaptive control. In this study, we introduce an alternative adaptive architecture that enhances both time and frequency performance, helpfully mitigating the effects of disturbances from the input plant and external disturbances affecting the output. To facilitate superior performance in both the time and frequency domains, we have developed user-friendly interactive design methods using the GeoGebra platform.Keywords: control theory, decentralized control, sensitivity theory, input-output stability theory, robust multivariable feedback control design
Procedia PDF Downloads 1151060 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model
Authors: Abdellahi Cheikh
Abstract:
With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard
Procedia PDF Downloads 941059 ‘Koha ILS Software’ Implementation in Academic Library Management: An Experience from University Libraries of Bangladesh
Authors: Md. Golam Mostafa
Abstract:
This paper describes the use of Koha open source library management software for information management in university libraries of Bangladesh. Manual record keeping is a time-consuming and tedious task, which may lead to errors frequently. To maintain the quality of services, any organization needs to manage with the help of a computerized system. The advent of information technology paved the way for library computerization. This paper has provided a short history as well as the present ongoing development of the library computerization system in Bangladesh, which has developed as a library management software Koha on the basis of research and development. Koha integrated library systems (ILS) software is very user friendly open source software. It refers to software in which the source code is freely available for others to view, amend, and adapt. Koha integrated library systems maintained by and used by libraries all over the world. In this context, this paper will analyze Koha library management software, which proves appropriate for the present necessities of library management in Bangladesh. At last, result from the study has been analyzed using different tables and graphs.Keywords: Koha Open Source Software, integrated library system, RFID facilities, university libraries, Bangladesh
Procedia PDF Downloads 1271058 Leveraging Quality Metrics in Voting Model Based Thread Retrieval
Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim
Abstract:
Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.Keywords: content quality, forum search, thread retrieval, voting techniques
Procedia PDF Downloads 2131057 Architectural Design Strategies and Visual Perception of Contemporary Spatial Design
Authors: Nora Geczy
Abstract:
In today’s architectural practice, during the process of designing public, educational, healthcare and cultural space, human-centered architectural designs helping spatial orientation, safe space usage and the appropriate spatial sequence of actions are gaining increasing importance. Related to the methodology of designing public buildings, several scientific experiments in spatial recognition, spatial analysis and spatial psychology with regard to the components of space producing mental and physiological effects have been going on at the Department of Architectural Design and the Interdisciplinary Student Workshop (IDM) at the Széchenyi István University, Győr since 2013. Defining the creation of preventive, anticipated spatial design and the architectural tools of spatial comfort of public buildings and their practical usability are in the limelight of our research. In the experiments applying eye-tracking cameras, we studied the way public spaces are used, especially concentrating on the characteristics of spatial behaviour, orientation, recognition, the sequence of actions, and space usage. Along with the role of mental maps, human perception, and interaction problems in public spaces (at railway stations, galleries, and educational institutions), we analyzed the spatial situations influencing psychological and ergonomic factors. We also analyzed the eye movements of the experimental subjects in dynamic situations, in spatial procession, using stairs and corridors. We monitored both the consequences and the distorting effects of the ocular dominance of the right eye on spatial orientation; we analyzed the gender-based differences of women and men’s orientation, stress-inducing spaces, spaces affecting concentration and the spatial situation influencing territorial behaviour. Based on these observations, we collected the components of creating public interior spaces, which -according to our theory- contribute to the optimal usability of public spaces. We summed up our research in criteria for design, including 10 points. Our further goals are testing design principles needed for optimizing orientation and space usage, their discussion, refinement, and practical usage.Keywords: architecture, eye-tracking, human-centered spatial design, public interior spaces, visual perception
Procedia PDF Downloads 1121056 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)
Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat
Abstract:
The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring
Procedia PDF Downloads 3991055 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System
Authors: J. K. Adedeji, M. O. Oyekanmi
Abstract:
This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.Keywords: biometric characters, facial recognition, neural network, OpenCV
Procedia PDF Downloads 2581054 A Study on Neighborhood of Dwelling with Historical-Islamic Architectural Elements
Authors: M.J. Seddighi, Moradchelleh, M. Keyvan
Abstract:
The ultimate goal in building a city is to provide pleasant, comfortable and nurturing environment as a context of public life. City environment establishes strong connection with people and their surrounding habitant, acting as relevance in social interactions between citizens itself. Urban environment and appropriate municipal facilities are the only way for proper communication between city and citizens and also citizens themselves.There is a need for complement elements between buildings and constructions to settling city life through which the move, comfort, reactions and anxiety will adjust and reflect the spirit to the city. In the surging development of society, urban’ spaces are encountered evolution, sometimes causing the symbols to fade and waste, and as a result, leading to destroy belongs among humans and their physical liquidate. Houses and living spaces exhibit materialistic reflection of life style. In the other words, way of life makes the symbolic essence of living spaces. In addition, it is of sociocultural factor of lifestyle, consisting the concepts and culture, morality, worldview, and national character. Culture is responsible for some crucial meaningful needs which can be wide because they depend on various causes such as perception and interpretation of believes, philosophy of life, interaction with neighbors and protection against climate and enemies. The bi-lateral relationship between human and nature is the main factor that needs to be properly addressed. It is because of the fact that the approach which is taken against landscape and nature has a pertinent influence on creation and shaping the structure of a house. The first response of human in tackling the environment is to build a “shelter” and place as dwelling. This has been a crucial factor in all time periods. In the proposed study, dwelling in Khorasgan’ Stream, as an area located in one of the important historical city of Iran, has been studied. Khorasgan’ Stream is the basic constituent elements of the present architectural form of Isfahan. The influence of Islamic spiritual culture and neighborhood with the historical elements on the dwelling of the selected location, subsequently on other regions of the town are presented.Keywords: dwelling, neighborhood, historical, Islamic, architectural elements
Procedia PDF Downloads 4121053 A Case Study: Community Forestry in Nepal: Achievements and Challenges
Authors: Bhmika Raiu
Abstract:
The community forestry programme in Nepal officially started in the late 1970s. Since then concerning movement has been evolving to involve local communities in the management and utilization of forests. The policy of the government was originally intended to meet the basic forest products required by the communities through active participation in forest development and management. Later, it was expanded to include the mobilization and empowerment of the members of community forest user groups in the development of their local communities. It was observed that the trend of forest degradation has decreased since the handing over of national forests to local communities, but a number of unintended social anomalies have also cropped up. Such anomalies essentially constitute of the inequity and unfairness in the local and national level and in terms of long-term sustainability of forest resources. This paper provides an overview of various issues of community forestry, especially focusing on the major achievements made in community forestry. It calls for rethinking the community forestry programme in order to face the present day challenges of linking community forestry with livelihood promotion, good governance, and sustainable forest management. It also lays out strategies for reforms in community forestry.Keywords: community forest, livelihood promotion, challenges, achievements
Procedia PDF Downloads 3841052 Motor Controller Implementation Using Model Based Design
Authors: Cau Tran, Tu Nguyen, Tien Pham
Abstract:
Model-based design (MBD) is a mathematical and visual technique for addressing design issues in the fields of communications, signal processing, and complicated control systems. It is utilized in several automotive, aerospace, industrial, and motion control applications. Virtual models are at the center of the software development process with model based design. A method used in the creation of embedded software is model-based design. In this study, the LAT motor is modeled in a simulation environment, and the LAT motor control is designed with a cascade structure, a speed and current control loop, and a controller that is used in the next part. A PID structure serves as this controller. Based on techniques and motor parameters that match the design goals, the PID controller is created for the model using traditional design principles. The MBD approach will be used to build embedded software for motor control. The paper will be divided into three distinct sections. The first section will introduce the design process and the benefits and drawbacks of the MBD technique. The design of control software for LAT motors will be the main topic of the next section. The experiment's results are the subject of the last section.Keywords: model based design, limited angle torque, intellectual property core, hardware description language, controller area network, user datagram protocol
Procedia PDF Downloads 951051 Integrated Grey Rational Analysis-Standard Deviation Method for Handover in Heterogeneous Networks
Authors: Mohanad Alhabo, Naveed Nawaz, Mahmoud Al-Faris
Abstract:
The dense deployment of small cells is a promising solution to enhance the coverage and capacity of the heterogeneous networks (HetNets). However, the unplanned deployment could bring new challenges to the network ranging from interference, unnecessary handovers and handover failures. This will cause a degradation in the quality of service (QoS) delivered to the end user. In this paper, we propose an integrated Grey Rational Analysis Standard Deviation based handover method (GRA-SD) for HetNet. The proposed method integrates the Standard Deviation (SD) technique to acquire the weight of the handover metrics and the GRA method to select the best handover base station. The performance of the GRA-SD method is evaluated and compared with the traditional Multiple Attribute Decision Making (MADM) methods including Simple Additive Weighting (SAW) and VIKOR methods. Results reveal that the proposed method has outperformed the other methods in terms of minimizing the number of frequent unnecessary handovers and handover failures, in addition to improving the energy efficiency.Keywords: energy efficiency, handover, HetNets, MADM, small cells
Procedia PDF Downloads 1171050 A Survey on Requirements and Challenges of Internet Protocol Television Service over Software Defined Networking
Authors: Esmeralda Hysenbelliu
Abstract:
Over the last years, the demand for high bandwidth services, such as live (IPTV Service) and on-demand video streaming, steadily and rapidly increased. It has been predicted that video traffic (IPTV, VoD, and WEB TV) will account more than 90% of global Internet Protocol traffic that will cross the globe in 2016. Consequently, the importance and consideration on requirements and challenges of service providers faced today in supporting user’s requests for entertainment video across the various IPTV services through virtualization over Software Defined Networks (SDN), is tremendous in the highest stage of attention. What is necessarily required, is to deliver optimized live and on-demand services like Internet Protocol Service (IPTV Service) with low cost and good quality by strictly fulfill the essential requirements of Clients and ISP’s (Internet Service Provider’s) in the same time. The aim of this study is to present an overview of the important requirements and challenges of IPTV service with two network trends on solving challenges through virtualization (SDN and Network Function Virtualization). This paper provides an overview of researches published in the last five years.Keywords: challenges, IPTV service, requirements, software defined networking (SDN)
Procedia PDF Downloads 2721049 Like Life Itself: Elemental Affordances in the Creation of Transmedia Storyworlds-The Four Broken Hearts Case Study
Authors: Muhammad Babar Suleman
Abstract:
Transgressing the boundaries of the real and the virtual, the temporal and the spatial and the personal and the political, Four Broken Hearts is a hybrid storyworld encompassing film, live performance, location-based experiences and social media. The project is scheduled for launch early next year and is currently a work-in-progress undergoing initial user testing. The story of Four Broken Hearts is being told by taking each of the classic elements of fiction- character, setting, exposition, climax and denouement - and bringing them ‘to life’ in the medium that conveys them to the highest degree of mimesis: Characters are built and explored through social media, Setting is experienced through location-based storytelling, the Backstory is fleshed out using film and the Climax is performed as an immersive drama. By taking advantage of what each medium does best while complementing the other mediums, Four Broken Hearts is presented in the form of a rich transmedia experience that allows audiences to explore the story world across many different platforms while still tying it all together within a cohesive narrative. This article presents an investigation of the project’s narrative outputs produced so far.Keywords: narratology, storyworld, transmedia, narrative, storytelling
Procedia PDF Downloads 3121048 Diffable’s Aspiration Dreams in Spatial Planning
Authors: Tety Widyaningrum, Sapnah Rahmawati, Abdulmuluk Attim
Abstract:
Space was a container that includes land space, sea space and air space, including space in the earth as a whole region, where humans and other living creatures, operate and maintain its survival. Whereas spatial planning was a form of the structure of space and spatial pattern. At this time, the arrangement of space became a matter of considerable concern because through spatial planning was what will determine how the future city hall, how the welfare of the population that is in it, and how space can be a comfortable space to live. This spatial arrangement became a subject that must be considered not only by the Government as policy makers but also of concern to the entire community in it. As a place to stay, this space should be able to ensure the safety and comfort of the whole community, even people with disabilities, though. For development and spatial planning in Indonesia. It was still very low which was still concerned about the disabled. The spatial arrangement made generalizations. This caused the right for disabled people was less fulfilled. In accordance with the Declaration on the Rights of Persons with Disabilities who explains that people with disabilities had the right to be able to facilitate their efforts to become self-sufficient or not depends on the other party. It was also strengthened by According to the Law of the Republic of Indonesia No. 4 of 1997 on Persons with Disabilities; disabilities were part of the Indonesian people who had the status, rights, obligations and the same role with other Indonesian community in all aspects of life and livelihood. As observed, during the disabled were still used as objects that hadn’t been involved in the formulation of development planning of space in Indonesia, so the infrastructure space was still very far from the concept of friendly to the disabled. As an example of a sidewalk in Indonesia were still in bad condition, potholes, and uneven and don’t meet the eligibility standards. In addition, there were sidewalks that abused become a trade causing run down and chaotic atmosphere. In addition, pedestrians are also disturbed because the sidewalks were often still used as a parking lot or flowers to decorate the layout of the city, so the legroom was becoming increasingly limited. The development of infrastructure for pedestrians was also still concerned with aspects of aesthetic than functional. Therefore, the participation of disabled people must be involved in spatial planning exist. It aims to achieve spatial and environmentally friendly to the disabled. These dream space activities carried out by giving questionnaires and the dream images to the disabled about how the layout of the space they want what they want and what development was also in line with the principle of their convenience. This then will be taken into consideration for government in planning layout that was friendly to the whole community.Keywords: diffable, aspiration, spatial, planning
Procedia PDF Downloads 2951047 Shariah Compliance Space Planning for Hotel Room Design
Authors: Syaza Bt. Saifuddin, Rashidi Bin Othman, Muhammad Hafizuddin Akmal Bin Md Hashim, Ismail Bin Jasmani, Noor Hanita Bt. Abdul Majid
Abstract:
This paper illustrates the background of various concepts, approaches, terminologies used to describe the basic framework of an Islamic Hotel Room design. This paper reviews the theoretical views in establishing a suitable and optimum environment for Muslim as well as non-Muslim guests in hotel rooms while according to shariah. It involves a few research methodologies that requires the researcher to study on a few characteristics needed to create more efficient rooms in terms of social interaction, economic growth and other tolerable elements. This paper intends on revealing the elements that are vital and may contribute for hotels in achieving a more conclusive research on space planning for hotel rooms focusing on the shariah and Muslim guests. Malaysia is an Islamic country and has billion of tourists coming over for business and recreational purposes. Therefore, having a righteous environment that best suit this target user is important in terms of generating the economy as well as providing a better understanding to the community on the benefits of applying these qualities in a conventional resort design.Keywords: design, Islam, room, shariah compliant hotel
Procedia PDF Downloads 3501046 Graph Based Traffic Analysis and Delay Prediction Using a Custom Built Dataset
Authors: Gabriele Borg, Alexei Debono, Charlie Abela
Abstract:
There on a constant rise in the availability of high volumes of data gathered from multiple sources, resulting in an abundance of unprocessed information that can be used to monitor patterns and trends in user behaviour. Similarly, year after year, Malta is also constantly experiencing ongoing population growth and an increase in mobilization demand. This research takes advantage of data which is continuously being sourced and converting it into useful information related to the traffic problem on the Maltese roads. The scope of this paper is to provide a methodology to create a custom dataset (MalTra - Malta Traffic) compiled from multiple participants from various locations across the island to identify the most common routes taken to expose the main areas of activity. This use of big data is seen being used in various technologies and is referred to as ITSs (Intelligent Transportation Systems), which has been concluded that there is significant potential in utilising such sources of data on a nationwide scale. Furthermore, a series of traffic prediction graph neural network models are conducted to compare MalTra to large-scale traffic datasets.Keywords: graph neural networks, traffic management, big data, mobile data patterns
Procedia PDF Downloads 133