Search results for: implement complex
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6681

Search results for: implement complex

4821 Residual Life Estimation of K-out-of-N Cold Standby System

Authors: Qian Zhao, Shi-Qi Liu, Bo Guo, Zhi-Jun Cheng, Xiao-Yue Wu

Abstract:

Cold standby redundancy is considered to be an effective mechanism for improving system reliability and is widely used in industrial engineering. However, because of the complexity of the reliability structure, there is little literature studying on the residual life of cold standby system consisting of complex components. In this paper, a simulation method is presented to predict the residual life of k-out-of-n cold standby system. In practical cases, failure information of a system is either unknown, partly unknown or completely known. Our proposed method is designed to deal with the three scenarios, respectively. Differences between the procedures are analyzed. Finally, numerical examples are used to validate the proposed simulation method.

Keywords: cold standby system, k-out-of-n, residual life, simulation sampling

Procedia PDF Downloads 399
4820 Gender Inequality in the Workplace: A Literature Review on the Discrimination of Women by Human Resources Instruments

Authors: Katja Wiedemann, Melinda Gainschnigg

Abstract:

This paper deals with gender inequality in companies. In the context of this paper, it is analyzed how women are discriminated by means of Human Resources instruments. The existing gender inequality is made apparent by the ‘Equal Pay Day. Women in Austria work without payment from 20 October onwards, which represents inequality of 21.7 percent points. This gender pay gap is due to the unequal distribution of paid and unpaid work between men and women. Since the majority of activities related to the family and care are carried out by women, there are human capital deficits on women’s side. In addition to the discrimination of women in compensation, there are also discrimination cases caused by other Human Resources instruments. The aim of this paper is to analyze the use of Human Resources instruments with regard to the discrimination of women and to identify measures to counteract this discrimination. Within the scope of this paper, possible instructions for companies on how to design and implement Human Resources instruments will be elaborated. Therefore personnel planning, recruiting, workforce management, compensation, and leadership are used as the basis for that analysis. The data were collected by a literature review and evaluated by means of a summary content analysis. The literature analysis includes papers of scientific journals from various business fields. On the basis of the results of the literature review, it is clear that women are discriminated by all analyzed Human Resources instruments. As a result, existing potentials are not optimally used. In order to limit or even prevent this loss of potential, companies must take specific measures to counteract the discrimination of women.

Keywords: employment issues, gender inequality , women's studies, workplace

Procedia PDF Downloads 248
4819 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program

Authors: Chrysanthi Nega, Fotini-Sonia Apergi

Abstract:

Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.

Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling

Procedia PDF Downloads 317
4818 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 280
4817 Research on the Application of Flexible and Programmable Systems in Electronic Systems

Authors: Yang Xiaodong

Abstract:

This article explores the application and structural characteristics of flexible and programmable systems in electronic systems, with a focus on analyzing their advantages and architectural differences in dealing with complex environments. By introducing mathematical models and simulation experiments, the performance of dynamic module combination in flexible systems and fixed path selection in programmable systems in resource utilization and performance optimization was demonstrated. This article also discusses the mutual transformation between the two in practical applications and proposes a solution to improve system flexibility and performance through dynamic reconfiguration technology. This study provides theoretical reference for the design and optimization of flexible and programmable systems.

Keywords: flexibility, programmable, electronic systems, system architecture

Procedia PDF Downloads 6
4816 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 340
4815 Human Insecurity and Migration in the Horn of Africa: Causes and Decision Processes

Authors: Belachew Gebrewold

Abstract:

The Horn of Africa is marred by complex and systematic internal and external political, economic and social-cultural causes of conflict that result in internal displacement and migration. This paper engages with them and shows how such a study can help us to understand migration, both in this region and more generally. The conflict has occurred within states, between states, among proxies, between armies. Human insecurities as a result of the state collapse of Somalia, the rise of Islamic fundamentalism in the whole region, recurrent drought affecting the livelihoods of subsistence farmers as well as nomads, exposure to hunger, environmental degradation, youth unemployment, rapid growth of slums around big cities, and political repression (especially in Eritrea) have been driving various segments of the regional population into regional and international migration. Eritrea has been going through a brutal dictatorship which pushes many Eritreans to flee their country and be exposed to human trafficking, torture, detention, and agony on their way to Europe mainly through Egypt, Libya and Israel. Similarly, Somalia has been devastated since 1991 by unending civil war, state collapse, and radical Islamists. There are some important aspects to highlight in the conflict-migration nexus in the Horn of Africa: first, the main push factor for the Somalis and Eritreans to leave their countries and risk their lives is the physical insecurity they have been facing in their countries. Secondly, as a result of the conflict the economic infrastructure is massively destroyed. Investment is rare; job opportunities are out of sight. Thirdly, in such a grim situation the politically and economically induced decision to migrate is a household decision, not only an individual decision. Based on this third point this research study took place in the Horn of Africa between 2014 and 2016 during different occasions. The main objective of the research was to understanding how the increasing migration is affecting the socio-economic and socio-political environment, and conversely how the socio-economic and socio-political environments are increasing migration decisions; and whether and how these decisions are individual or family decisions. The main finding is the higher the human insecurity, the higher the family decision; the lower the human insecurity, the higher the individual decision. These findings apply not only to the Eritrean, Somali migrants but also to Ethiopian migrants. But the general impacts of migration on sending countries’ human security is quite mixed and complex.

Keywords: Eritrea, Ethiopia, Horn of Africa, insecurity, migration, Somalia

Procedia PDF Downloads 275
4814 Heat: A Healthy Eating Programme

Authors: Osagbai Joshua Eriki, Ngozi Agunwamba, Alice Hill, Lorna Almond, Maniya Duffy, Devashini Naidoo, David Ho, Raman Deo

Abstract:

Aims: To evaluate the baseline eating pattern in a psychiatric hospital through quantifying purchases of food and drink items at the hospital shop and to implement a traffic light healthy eating labeling system. Method: A electronic till with reporting capabilities was purchased. A two-week period of baseline data collection was conducted. Thereafter, a system for labeling items based on the nutritional value of the food items at the hospital shop was implemented. Green labeling represented the items with the lowest calories and red the most. Further data was collated on the number and types of items purchased by patients according to the category, and the initial effectiveness of the system was evaluated. Result: Despite the implementation of the traffic light system, the red category had the highest number of items purchased by patients, highlighting the importance of promoting healthy eating choices. However, the study also showed that the system was effective in promoting healthy options, as the number of items purchased from the green category increased during the study period. Conclusion: The implementation of a traffic light labeling system for items sold at the hospital shop offers a promising approach to promoting healthy eating habits and choices. This is likely to contribute to a toolkit of measures when considering the multifactorial challenges that obesity and weight issues pose for long-stay psychiatric inpatients

Keywords: mental health, nutrition, food, healthy

Procedia PDF Downloads 97
4813 Site Suitability of Offshore Wind Energy: A Combination of Geographic Referenced Information and Analytic Hierarchy Process

Authors: Ayat-Allah Bouramdane

Abstract:

Power generation from offshore wind energy does not emit carbon dioxide or other air pollutants and therefore play a role in reducing greenhouse gas emissions from the energy sector. In addition, these systems are considered more efficient than onshore wind farms, as they generate electricity from the wind blowing across the sea, thanks to the higher wind speed and greater consistency in direction due to the lack of physical interference that the land or human-made objects can present. This means offshore installations require fewer turbines to produce the same amount of energy as onshore wind farms. However, offshore wind farms require more complex infrastructure to support them and, as a result, are more expensive to construct. In addition, higher wind speeds, strong seas, and accessibility issues makes offshore wind farms more challenging to maintain. This study uses a combination of Geographic Referenced Information (GRI) and Analytic Hierarchy Process (AHP) to identify the most suitable sites for offshore wind farm development in Morocco, with a particular focus on the Dakhla city. A range of environmental, socio-economic, and technical criteria are taken into account to solve this complex Multi-Criteria Decision-Making (MCDM) problem. Based on experts' knowledge, a pairwise comparison matrix at each level of the hierarchy is performed, and fourteen sub-criteria belong to the main criteria have been weighted to generate the site suitability of offshore wind plants and obtain an in-depth knowledge on unsuitable areas, and areas with low-, moderate-, high- and very high suitability. We find that wind speed is the most decisive criteria in offshore wind farm development, followed by bathymetry, while proximity to facilities, the sediment thickness, and the remaining parameters show much lower weightings rendering technical parameters most decisive in offshore wind farm development projects. We also discuss the potential of other marine renewable energy potential, in Morocco, such as wave and tidal energy. The proposed approach and analysis can help decision-makers and can be applied to other countries in order to support the site selection process of offshore wind farms.

Keywords: analytic hierarchy process, dakhla, geographic referenced information, morocco, multi-criteria decision-making, offshore wind, site suitability

Procedia PDF Downloads 154
4812 Temporal Case-Based Reasoning System for Automatic Parking Complex

Authors: Alexander P. Eremeev, Ivan E. Kurilenko, Pavel R. Varshavskiy

Abstract:

In this paper, the problem of the application of temporal reasoning and case-based reasoning in intelligent decision support systems is considered. The method of case-based reasoning with temporal dependences for the solution of problems of real-time diagnostics and forecasting in intelligent decision support systems is described. This paper demonstrates how the temporal case-based reasoning system can be used in intelligent decision support systems of the car access control. This work was supported by RFBR.

Keywords: analogous reasoning, case-based reasoning, intelligent decision support systems, temporal reasoning

Procedia PDF Downloads 527
4811 Resource Management Framework in Cloud Computing

Authors: Gagandeep Kaur, Sonal Chawla

Abstract:

In a Cloud Computing environment, resource provisioning, resource allocation and resource scheduling is the most complex issues these days. Cloud User expects the best resource utilization and Cloud Provider expects revenue maximization by considering budget and time constraints. In this research paper, Resource Management Framework has been proposed to allocate the resources to Cloud Users and Cloud Providers in Cloud environment. The main aim of the proposed work is to provide the resources and services to Cloud Providers and Cloud Users in an efficient and effective manner. The proposed framework has been simulated and tested using the CloudSim simulator tool.

Keywords: cloud computing, resource allocation, auction, provisioning

Procedia PDF Downloads 148
4810 The Contract for Educational Services: Civil and Administrative Aspects

Authors: Yuliya Leonidovna Kiva-Khamzina

Abstract:

The legal nature of the contract for educational services causes a lot of controversies. In particular, it raises the question about industry sector relationships, which require making a contract for educational services. The article describes the different types of contracts classifications for services provision from the perspective of civil law, deals with the specifics of the contract on rendering educational services; the author makes the conclusion that the contract for the provision of educational services is a complex institution that includes elements of the civil and administrative law. The following methods were used to conduct the study: dialectical method of cognition, the historical method, systemic analysis, classification.

Keywords: administrative aspect, civil aspect, educational service, industry, legal nature, services provision

Procedia PDF Downloads 323
4809 Variability of the Snowline Altitude at Different Region in the Eastern Tibetan Plateau in Recent 20 Years

Authors: Zhen Li, Chang Liu, Ping Zhang

Abstract:

These Glaciers are thought of as natural water reservoirs and are of vital importance to hydrological models and industrial production, and glacial changes act as significant indicators of climate change. The glacier snowline can be used as an indicator of the equilibrium line, which may be a key parameter to study the effect of climate change on glaciers. Using Google Earth Engine, we select optical satellite imageries and implement the Otsu thresholding method on a near-infrared band to detect snowline altitudes (SLAs) of 26 glaciers in three regions of the eastern Tibetan Plateau. Three different study regions in the eastern Tibetan Plateau have different climate regimes, which are Sepu Kangri (SK, maritime glacier), Bu’Gyai Kangri (BK, continental glacier) and west of Qiajajima (WQ, continental glacier), along a latitudinal transect from south to north. We analyzed the effects of climatic factors on the SLA changes from 1995 to 2016. SLAs are fluctuating upward, and the rising values are 100 m, 60 m, and 34 m from south to north during the 22 years. We also observed that the climatic factor that affects the variability of SLA gradually changes from precipitation to temperature from south to north. The northern continental glaciers are mainly affected by temperature, and the southern maritime glaciers affected by precipitation. Owing to the influence of primary climatic factors, continental glaciers are found to have higher SLAs on the south slope, while maritime glaciers have higher SLAs on the north slope.

Keywords: climate change, glacier, snowline altitude, tibetan plateau

Procedia PDF Downloads 149
4808 Digestion Optimization Algorithm: A Novel Bio-Inspired Intelligence for Global Optimization Problems

Authors: Akintayo E. Akinsunmade

Abstract:

The digestion optimization algorithm is a novel biological-inspired metaheuristic method for solving complex optimization problems. The algorithm development was inspired by studying the human digestive system. The algorithm mimics the process of food ingestion, breakdown, absorption, and elimination to effectively and efficiently search for optimal solutions. This algorithm was tested for optimal solutions on seven different types of optimization benchmark functions. The algorithm produced optimal solutions with standard errors, which were compared with the exact solution of the test functions.

Keywords: bio-inspired algorithm, benchmark optimization functions, digestive system in human, algorithm development

Procedia PDF Downloads 6
4807 Application of Neural Network on the Loading of Copper onto Clinoptilolite

Authors: John Kabuba

Abstract:

The study investigated the implementation of the Neural Network (NN) techniques for prediction of the loading of Cu ions onto clinoptilolite. The experimental design using analysis of variance (ANOVA) was chosen for testing the adequacy of the Neural Network and for optimizing of the effective input parameters (pH, temperature and initial concentration). Feed forward, multi-layer perceptron (MLP) NN successfully tracked the non-linear behavior of the adsorption process versus the input parameters with mean squared error (MSE), correlation coefficient (R) and minimum squared error (MSRE) of 0.102, 0.998 and 0.004 respectively. The results showed that NN modeling techniques could effectively predict and simulate the highly complex system and non-linear process such as ion-exchange.

Keywords: clinoptilolite, loading, modeling, neural network

Procedia PDF Downloads 414
4806 Modeling of Landslide-Generated Tsunamis in Georgia Strait, Southern British Columbia

Authors: Fatemeh Nemati, Lucinda Leonard, Gwyn Lintern, Richard Thomson

Abstract:

In this study, we will use modern numerical modeling approaches to estimate tsunami risks to the southern coast of British Columbia from landslides. Wave generation is to be simulated using the NHWAVE model, which solves the Navier-Stokes equations due to the more complex behavior of flow near the landslide source; far-field wave propagation will be simulated using the simpler model FUNWAVE_TVD with high-order Boussinesq-type wave equations, with a focus on the accurate simulation of wave propagation and regional- or coastal-scale inundation predictions.

Keywords: FUNWAVE-TVD, landslide-generated tsunami, NHWAVE, tsunami risk

Procedia PDF Downloads 151
4805 Numerical Modeling of Large Scale Dam Break Flows

Authors: Amanbek Jainakov, Abdikerim Kurbanaliev

Abstract:

The work presents the results of mathematical modeling of large-scale flows in areas with a complex topographic relief. The Reynolds-averaged Navier—Stokes equations constitute the basis of the three-dimensional unsteady modeling. The well-known Volume of Fluid method implemented in the solver interFoam of the open package OpenFOAM 2.3 is used to track the free-boundary location. The mathematical model adequacy is checked by comparing with experimental data. The efficiency of the applied technology is illustrated by the example of modeling the breakthrough of the dams of the Andijan (Uzbekistan) and Papan (near the Osh town, Kyrgyzstan) reservoir.

Keywords: three-dimensional modeling, free boundary, the volume-of-fluid method, dam break, flood, OpenFOAM

Procedia PDF Downloads 403
4804 Using Structured Analysis and Design Technique Method for Unmanned Aerial Vehicle Components

Authors: Najeh Lakhoua

Abstract:

Introduction: Scientific developments and techniques for the systemic approach generate several names to the systemic approach: systems analysis, systems analysis, structural analysis. The main purpose of these reflections is to find a multi-disciplinary approach which organizes knowledge, creates universal language design and controls complex sets. In fact, system analysis is structured sequentially by steps: the observation of the system by various observers in various aspects, the analysis of interactions and regulatory chains, the modeling that takes into account the evolution of the system, the simulation and the real tests in order to obtain the consensus. Thus the system approach allows two types of analysis according to the structure and the function of the system. The purpose of this paper is to present an application of system analysis of Unmanned Aerial Vehicle (UAV) components in order to represent the architecture of this system. Method: There are various analysis methods which are proposed, in the literature, in to carry out actions of global analysis and different points of view as SADT method (Structured Analysis and Design Technique), Petri Network. The methodology adopted in order to contribute to the system analysis of an Unmanned Aerial Vehicle has been proposed in this paper and it is based on the use of SADT. In fact, we present a functional analysis based on the SADT method of UAV components Body, power supply and platform, computing, sensors, actuators, software, loop principles, flight controls and communications). Results: In this part, we present the application of SADT method for the functional analysis of the UAV components. This SADT model will be composed exclusively of actigrams. It starts with the main function ‘To analysis of the UAV components’. Then, this function is broken into sub-functions and this process is developed until the last decomposition level has been reached (levels A1, A2, A3 and A4). Recall that SADT techniques are semi-formal; however, for the same subject, different correct models can be built without having to know with certitude which model is the good or, at least, the best. In fact, this kind of model allows users a sufficient freedom in its construction and so the subjective factor introduces a supplementary dimension for its validation. That is why the validation step on the whole necessitates the confrontation of different points of views. Conclusion: In this paper, we presented an application of system analysis of Unmanned Aerial Vehicle components. In fact, this application of system analysis is based on SADT method (Structured Analysis Design Technique). This functional analysis proved the useful use of SADT method and its ability of describing complex dynamic systems.

Keywords: system analysis, unmanned aerial vehicle, functional analysis, architecture

Procedia PDF Downloads 202
4803 Consensus-Oriented Analysis Model for Knowledge Management Failure Evaluation in Uncertain Environment

Authors: Amir Ghasem Norouzi, Mahdi Zowghi

Abstract:

This study propose a framework based on the fuzzy T-Norms, T-conorm, a novel operator, and multi-expert approach to help organizations build awareness of the critical influential factors on the success of knowledge management (KM) implementation, analysis the failure of knowledge management. This study considers the complex uncertainty concept that is in knowledge management implementing capability (KMIC) and it is used by fuzzy logic for this reason. The contribution of our paper is shown with an empirical study in a nonprofit educational organization evaluation.

Keywords: fuzzy logic, knowledge management, multi expert analysis, consensus oriented average operator

Procedia PDF Downloads 626
4802 Efficacy of Remote Sensing Application in Monitoring the Effectiveness of Afforestation Project in Northern Nigeria

Authors: T. Garba, Y. Y. Babanyara, K. G. Ilellah, M. A. Modibbo, T. O. Quddus, M. J. Sani

Abstract:

After the United Nation Convention on Desertification (UNCD) in 1977 which was preceded by extensive, regional, and local studies, and consultations with numerous scientists, decision-makers, and relevant institutions. Global Plan of Action to Combat Desertification (PACD) was formulated, endorsed by member Countries. The role of implementing PACD was vested with Governments of countries affected by desertification. The Federal Government of Nigeria as a signatory and World Bank funded and implement afforestation project aimed at combating desertification between 1988 and 1999. This research, therefore, applied remote sensing techniques to assess the effectiveness of the project. To achieve that a small portion of about 143,609 hectares was curved out from the project area. Normalized Difference of the Vegetative Index (NDVI) and Land Use Land Cover were derived from Landsat TM 1986, Landsat ETM 1999 and Nigeria Sat 1, 2007 of the project area. The findings show that there was an increase in cultivated area due to the project from 1986 through 1999 and 2007. This is further buttressed by the three NDVI imageries due to their high positive pixel value from 0.04 in 1986 to 0.22 in 1999 and to 0.32 in 2007 These signifies the gradual physical development of Afforestation project in the area. In addition, it was also verified by histograms of changes in vegetation which indicated an increased vegetative cover from 60,192 in 1986, to 102,476 in 1999 and then to 88,343 in 2007. The study concluded that Remote Sensing approach has actually confirmed that the project was indeed successful and effective.

Keywords: afforestation, desertification, landsat, vegetative index, remote sensing

Procedia PDF Downloads 314
4801 Reducing the Impact of Pathogenic Fungi on Barley Using Bacteria: Bacterial Biocontrol in the Barley-Malt-Beer Industry

Authors: Eusèbe Gnonlonfoun, Xavier Framboisier, Michel Fick, Emmanuel Rondags

Abstract:

Pathogenic fungi represent a generic problem for cereals, including barley, as they can produce a number of thermostable toxic metabolites such as mycotoxins that contaminate plants and food products, leading to serious health issues for humans and animals and causing significant losses in global food production. In addition, mycotoxins represent a significant technological concern for the malting and brewing industries, as they may affect the quality and safety of raw materials (barley and malt) and final products (beer). Moreover, this situation is worsening due to the highly variable climatic conditions that favor microbial development and the societal desire to reduce the use of phytosanitary products, including fungicides. In this complex environmental, regulatory and economic context for the French barley-malt-beer industry, this project aims to develop an innovative biocontrol process by using technological bacteria, isolated from infection-resistant barley cultures, that are able to reduce the development of spoilage fungi and the associated mycotoxin production. The experimental approach consists of i) coculturing bacterial and pathogenic fungal strains in solid and liquid media to access the growth kinetics of these microorganisms and to evaluate the impact of these bacteria on fungal growth and mycotoxin production; then ii) the results will be used to carry out a micro-malting process in order to develop the aforementioned process, and iii) the technological and sanitary properties of the generated barley malts will finally be evaluated in order to validate the biocontrol process developed. The process is expected to make it possible to guarantee, with controlled costs, an irreproachable hygienic and technological quality of the malt, despite the increasingly complex and variable conditions for barley production. Thus, the results will not only make it possible to maintain the dominant world position of the French barley-malt chain but will also allow it to conquer emerging markets, mainly in Africa and Asia. The use of this process will also contribute to the reduction of the use of phytosanitary products in the field for barley production while reducing the level of contamination of malting plant effluents. Its environmental impact would therefore be significant, especially considering that barley is the fourth most-produced cereal in the world.

Keywords: barley, pathogenic fungi, mycotoxins, malting, bacterial biocontrol

Procedia PDF Downloads 175
4800 Human Resource Development and Social Entrepreneurship: A Pan-African Perspective

Authors: Leon C. Prieto, Simone T. A. Phipps

Abstract:

There is a need to promote social entrepreneurship in order to solve some of the complex problems facing various countries in Africa (poverty, unemployment, crime, HIV, etc.). For example, one possible consequence of the HIV/AIDS crisis in Zimbabwe and elsewhere is a deterioration in the educational opportunities for orphans and other vulnerable children. Given that high returns are associated with education, the loss of education for a large segment of the population would likely worsen the already dire economic consequences of the HIV/AIDS crisis. Using a systems approach, this paper argues that social entrepreneurship can be used as a vehicle to promote national human resource development, which will assist in the alleviation of societal ills on the national level as well as throughout Africa.

Keywords: human resource development, pan-african, social entrepreneurship, social enterprise

Procedia PDF Downloads 383
4799 A Survey of Semantic Integration Approaches in Bioinformatics

Authors: Chaimaa Messaoudi, Rachida Fissoune, Hassan Badir

Abstract:

Technological advances of computer science and data analysis are helping to provide continuously huge volumes of biological data, which are available on the web. Such advances involve and require powerful techniques for data integration to extract pertinent knowledge and information for a specific question. Biomedical exploration of these big data often requires the use of complex queries across multiple autonomous, heterogeneous and distributed data sources. Semantic integration is an active area of research in several disciplines, such as databases, information-integration, and ontology. We provide a survey of some approaches and techniques for integrating biological data, we focus on those developed in the ontology community.

Keywords: biological ontology, linked data, semantic data integration, semantic web

Procedia PDF Downloads 447
4798 Stress Variation around a Circular Hole in Functionally Graded Plate under Bending

Authors: Parveen K. Saini, Mayank Kushwaha

Abstract:

The influence of material property variation on stress concentration factor (SCF) due to the presence of a circular hole in a functionally graded material (FGM) plate is studied in this paper. A numerical method based on complex variable theory of elasticity is used to investigate the problem. To achieve the material property, variation plate is decomposed into a number of rings. In this research work, Young's modulus is assumed to be varying exponentially and it is found that stress concentration factor can be reduced by increasing Young’s modulus progressively away from the hole.

Keywords: stress concentration, circular hole, FGM plate, bending

Procedia PDF Downloads 305
4797 Robust Control of a Dynamic Model of an F-16 Aircraft with Improved Damping through Linear Matrix Inequalities

Authors: J. P. P. Andrade, V. A. F. Campos

Abstract:

This work presents an application of Linear Matrix Inequalities (LMI) for the robust control of an F-16 aircraft through an algorithm ensuring the damping factor to the closed loop system. The results show that the zero and gain settings are sufficient to ensure robust performance and stability with respect to various operating points. The technique used is the pole placement, which aims to put the system in closed loop poles in a specific region of the complex plane. Test results using a dynamic model of the F-16 aircraft are presented and discussed.

Keywords: F-16 aircraft, linear matrix inequalities, pole placement, robust control

Procedia PDF Downloads 304
4796 Work in the Industry of the Future-Investigations of Human-Machine Interactions

Authors: S. Schröder, P. Ennen, T. Langer, S. Müller, M. Shehadeh, M. Haberstroh, F. Hees

Abstract:

Since a bit over a year ago, Festo AG and Co. KG, Festo Didactic SE, robomotion GmbH, the researchers of the Cybernetics-Lab IMA/ZLW and IfU, as well as the Human-Computer Interaction Center at the RWTH Aachen University, have been working together in the focal point of assembly competences to realize different scenarios in the field of human-machine interaction (HMI). In the framework of project ARIZ, questions concerning the future of production within the fourth industrial revolution are dealt with. There are many perspectives of human-robot collaboration that consist Industry 4.0 on an individual, organization and enterprise level, and these will be addressed in ARIZ. The aim of the ARIZ projects is to link AI-Approaches to assembly problems and to implement them as prototypes in demonstrators. To do so, island and flow based production scenarios will be simulated and realized as prototypes. These prototypes will serve as applications of flexible robotics as well as AI-based planning and control of production process. Using the demonstrators, human interaction strategies will be examined with an information system on one hand, and a robotic system on the other. During the tests, prototypes of workspaces that illustrate prospective production work forms will be represented. The human being will remain a central element in future productions and will increasingly be in charge of managerial tasks. Questions thus arise within the overall perspective, primarily concerning the role of humans within these technological revolutions, as well as their ability to act and design respectively to the acceptance of such systems. Roles, such as the 'Trainer' of intelligent systems may become a possibility in such assembly scenarios.

Keywords: human-machine interaction, information technology, island based production, assembly competences

Procedia PDF Downloads 204
4795 Learning with Music: The Effects of Musical Tension on Long-Term Declarative Memory Formation

Authors: Nawras Kurzom, Avi Mendelsohn

Abstract:

The effects of background music on learning and memory are inconsistent, partly due to the intrinsic complexity and variety of music and partly to individual differences in music perception and preference. A prominent musical feature that is known to elicit strong emotional responses is musical tension. Musical tension can be brought about by building anticipation of rhythm, harmony, melody, and dynamics. Delaying the resolution of dominant-to-tonic chord progressions, as well as using dissonant harmonics, can elicit feelings of tension, which can, in turn, affect memory formation of concomitant information. The aim of the presented studies was to explore how forming declarative memory is influenced by musical tension, brought about within continuous music as well as in the form of isolated chords with varying degrees of dissonance/consonance. The effects of musical tension on long-term memory of declarative information were studied in two ways: 1) by evoking tension within continuous music pieces by delaying the release of harmonic progressions from dominant to tonic chords, and 2) by using isolated single complex chords with various degrees of dissonance/roughness. Musical tension was validated through subjective reports of tension, as well as physiological measurements of skin conductance response (SCR) and pupil dilation responses to the chords. In addition, music information retrieval (MIR) was used to quantify musical properties associated with tension and its release. Each experiment included an encoding phase, wherein individuals studied stimuli (words or images) with different musical conditions. Memory for the studied stimuli was tested 24 hours later via recognition tasks. In three separate experiments, we found positive relationships between tension perception and physiological measurements of SCR and pupil dilation. As for memory performance, we found that background music, in general, led to superior memory performance as compared to silence. We detected a trade-off effect between tension perception and memory, such that individuals who perceived musical tension as such displayed reduced memory performance for images encoded during musical tension, whereas tense music benefited memory for those who were less sensitive to the perception of musical tension. Musical tension exerts complex interactions with perception, emotional responses, and cognitive performance on individuals with and without musical training. Delineating the conditions and mechanisms that underlie the interactions between musical tension and memory can benefit our understanding of musical perception at large and the diverse effects that music has on ongoing processing of declarative information.

Keywords: musical tension, declarative memory, learning and memory, musical perception

Procedia PDF Downloads 97
4794 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 296
4793 A Prediction Model Using the Price Cyclicality Function Optimized for Algorithmic Trading in Financial Market

Authors: Cristian Păuna

Abstract:

After the widespread release of electronic trading, automated trading systems have become a significant part of the business intelligence system of any modern financial investment company. An important part of the trades is made completely automatically today by computers using mathematical algorithms. The trading decisions are taken almost instantly by logical models and the orders are sent by low-latency automatic systems. This paper will present a real-time price prediction methodology designed especially for algorithmic trading. Based on the price cyclicality function, the methodology revealed will generate price cyclicality bands to predict the optimal levels for the entries and exits. In order to automate the trading decisions, the cyclicality bands will generate automated trading signals. We have found that the model can be used with good results to predict the changes in market behavior. Using these predictions, the model can automatically adapt the trading signals in real-time to maximize the trading results. The paper will reveal the methodology to optimize and implement this model in automated trading systems. After tests, it is proved that this methodology can be applied with good efficiency in different timeframes. Real trading results will be also displayed and analyzed in order to qualify the methodology and to compare it with other models. As a conclusion, it was found that the price prediction model using the price cyclicality function is a reliable trading methodology for algorithmic trading in the financial market.

Keywords: algorithmic trading, automated trading systems, financial markets, high-frequency trading, price prediction

Procedia PDF Downloads 182
4792 Continuity Through Best Practice. A Case Series of Complex Wounds Manage by Dedicated Orthopedic Nursing Team

Authors: Siti Rahayu, Khairulniza Mohd Puat, Kesavan R., Mohammad Harris A., Jalila, Kunalan G., Fazir Mohamad

Abstract:

The greatest challenge has been in establishing and maintaining the dedicated nursing team. Continuity is served when nurses are assigned exclusively for managing wound, where they can continue to build expertise and skills. In addition, there is a growing incidence of chronic wounds and recognition of the complexity involved in caring for these patients. We would like to share 4 cases with different techniques of wound management. 1st case, 39 years old gentleman with underlying rheumatoid arthritis with chronic periprosthetic joint infection of right total knee replacement presented with persistent drainage over right knee. Patient was consulted for two stage revision total knee replacement. However, patient only agreed for debridement and retention of implant. After debridement, large medial and lateral wound was treated with Instillation Negative Pressure Wound Therapy Dressings. After several cycle, the wound size reduced, and conventional dressing was applied. 2nd case, 58 years old gentleman with underlying diabetes presented with right foot necrotizing fasciitis with gangrene of 5th toe. He underwent extensive debridement of foot with rays’ amputation of 5th toe. Post debridement patient was started on Instillation Negative Pressure Wound Therapy Dressings. After several cycle of VAC, the wound bed was prepared, and he underwent split skin graft over right foot. 3 rd case, 60 years old gentleman with underlying diabetes mellitus presented with right foot necrotizing soft tissue infection. He underwent rays’ amputation and extensive wound debridement. Upon stabilization of general condition, patient was discharge with regular wound dressing by same nurse and doctor during each visit to clinic follow up. After 6 months of follow up, the wound healed well. 4th case, 38-year-old gentleman had alleged motor vehicle accident and sustained closed fracture right tibial plateau. Open reduction and proximal tibial locking plate were done. At 2 weeks post-surgery, the patient presented with warm, erythematous leg and pus discharge from the surgical site. Empirical antibiotic was started, and wound debridement was done. Intraoperatively, 50cc pus was evacuated, unhealthy muscle and tissue debrided. No loosening of the implant. Patient underwent multiple wound debridement. At 2 weeks post debridement wound healed well, but the proximal aspect was unable to close immediately. This left the proximal part of the implant to be exposed. Patient was then put on VAC dressing for 3 weeks until healthy granulation tissue closes the implant. Meanwhile, antibiotic was change according to culture and sensitivity. At 6 weeks post the first debridement, the wound was completely close, and patient was discharge home well. At 3 months post operatively, patient wound and fracture healed uneventfully and able to ambulate independently. Complex wounds are too serious to be dealt with. Team managing complex wound need continuous support through the provision of educational tools to support their professional development, engagement with local and international expert, as well as highquality products that increase efficiencies in services

Keywords: VAC (Vacuum Assisted Closure), empirical- initial antibiotics, NPWT- negative pressure wound therapy, NF- necrotizing fasciitis, gangrene- blackish discoloration due to poor blood supply

Procedia PDF Downloads 104