Search results for: user requirement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3200

Search results for: user requirement

1340 Breaking through Barricades to Enhance the University Library Infrastructure to Aid the Visually Challenged - Contemplated Based within the Sri Lankan Context

Authors: Wilfred Jeyatheese Jeyaraj

Abstract:

The Sri Lankan legislative acts dictate several recommendations to improve accessibility of services for the visually challenged. But the main consideration here is the feasibility and extent to which these endorsements have been implemented in actuality within Sri Lankan academic libraries. This paper tends to assess the existent issues that impediment the implementation of accessibility features for the visually challenged in Sri Lankan academic libraries. Visually challenged students continually walk through immense challenges to step forth into their university life. Reaching their undergrad stage of their academic phase, they should be entitled to access information resources with ease and with equality in comparison to the sighted users of a university library. The current university libraries in Sri Lanka, have well improved services that they render to their users. But, what lacks in this scenario is the consideration as to whether these features offered by libraries are user-friendly and easily accessible by the visually challenged users as well. Hence, this paper tends to analyze the inhibitions in delivering services oriented towards the visually challenged and the sighted, and propose feasible alternatives to create a neutral high-end university library environment.

Keywords: accessibility, university library, Sri Lanka, visually-challenged

Procedia PDF Downloads 289
1339 Evaluation of Biological Seed Coating Technology On-Field Performance of Wheat in Regenerative Agriculture and Conventional Systems

Authors: S. Brain, P. J. Storer, H. Strydom, Z. M. Solaiman

Abstract:

Increasing farmer awareness of soil health, the impact of agricultural management practices, and the requirement for high-quality agricultural produce are major factors driving the rapid adoption of biological seed treatments - currently valued globally at USD 1.5 billion. Biological seed coatings with multistrain plant beneficial microbial technology have the capability to affect plant establishment, growth, and development positively. These beneficial plant microbes can potentially increase soil health, plant yield, and nutrition – acting as bio fertilisers, rhizoremediators, phytostimulators, and stress modulators, and can ultimately reduce the overall use of agrichemicals. A field trial was conducted on MACE wheat in the central wheat belt of Western Australia to evaluate a proprietary seed coating technology (Langleys Bio-EnergeticTM Microbe blend (BMB)) on a conventional program (+/- BMB microbes) and a Regenerative Biomineral fertiliser program (+/- BMB microbes). The Conventional (+BMB) and Biomineral (+BMB) treated plants had no fungicide treatments and had no disease issues. Control (No fertiliser, No microbes), Conventional (No Microbes), and Biomineral (No Microbes) were treated with fungicides (seed dressing and foliar). From the research findings, compared to control and no microbe treatments, both the Conventional (+ BMB) and Biomineral (+ BMB) showed significant increases in Soil Carbon (SOC), Seed germination, nutrient use efficiency (NUE) of nitrogen, phosphate and mineral nutrients, grain mineral nutrient uptake, protein %, hectolitre weight, and fewer screenings, yield, and gross margins.

Keywords: biological seed coating, biomineral fertiliser, plant nutrition, regenerative and conventional agriculture

Procedia PDF Downloads 79
1338 Indonesian Food Safety Policy for Local Commodity against ASEAN Economic Community: An Uneven Battle in the Global War

Authors: Wahyu Riawanti

Abstract:

Food safety is the one of a prominent issue for globalization era. The more concern is paid in international food and agriculture trade; the more consumers will consider raising the standard of food safety. For this reason, the role of the issue is not only in term of added value but since then also the main requirement in import export activity, including agriculture products. Unfortunately, Indonesia and other developing countries found it difficult to fulfill some of the technical issues and end it up with the lower export activity. In this case, the technical requirements of food safety become an obstacle rather than challenging. Furthermore for local farmers’ activity, food safety is more or less a threat. The study is aimed to reveal on how Indonesian government had dealt with the certification regulation to face problem on competitiveness of Indonesian products. Local government has conducted the regulation of food certification. The study used the case of Salak Pondoh fruit (Salacca zalacca) certification process on Sleman District- Yogyakarta. Triangulation method was used to analyze the effectiveness of the certification program. The quantitative data series taken from 7 farmer groups during the certification processes were used for the research main data. The supporting qualitative data was obtained from in-depth interview with the members of farmers group. The pre-research result has shown that the impact varied from different groups. Conclusively the certification regulation has partly failed to make a significant change in local farmers’ competitiveness. Even the profit was increased, the highly amount budget of the program did not significantly increase the economic incentives for local farmers.

Keywords: economic incentive, food security, government regulation, international trade, local commodity, Salacca zalacca

Procedia PDF Downloads 276
1337 Wake Effects of Wind Turbines and Its Impacts on Power Curve Measurements

Authors: Sajan Antony Mathew, Bhukya Ramdas

Abstract:

Abstract—The impetus of wind energy deployment over the last few decades has seen potential sites being harvested very actively for wind farm development. Due to the scarce availability of highly potential sites, the turbines are getting more optimized in its location wherein minimum spacing between the turbines are resorted without comprising on the optimization of its energy yield. The optimization of the energy yield from a wind turbine is achieved by effective micrositing techniques. These time-tested techniques which are applied from site to site on terrain conditions that meet the requirements of the International standard for power performance measurements of wind turbines result in the positioning of wind turbines for optimized energy yields. The international standard for Power Curve Measurements has rules of procedure and methodology to evaluate the terrain, obstacles and sector for measurements. There are many challenges at the sites for complying with the requirements for terrain, obstacles and sector for measurements. Studies are being attempted to carry out these measurements within the scope of the international standard as various other procedures specified in alternate standards or the integration of LIDAR for Power Curve Measurements are in the nascent stage. The paper strives to assist in the understanding of the fact that if positioning of a wind turbine at a site is based on an optimized output, then there are no wake effects seen on the power curve of an adjacent wind turbine. The paper also demonstrates that an invalid sector for measurements could be used in the analysis in alteration to the requirement as per the international standard for power performance measurements. Therefore the paper strives firstly to demonstrate that if a wind turbine is optimally positioned, no wake effects are seen and secondly the sector for measurements in such a case could include sectors which otherwise would have to be excluded as per the requirements of International standard for power performance measurements.

Keywords: micrositing, optimization, power performance, wake effects

Procedia PDF Downloads 461
1336 Integrated Design of Froth Flotation Process in Sludge Oil Recovery Using Cavitation Nanobubbles for Increase the Efficiency and High Viscose Compatibility

Authors: Yolla Miranda, Marini Altyra, Karina Kalmapuspita Imas

Abstract:

Oily sludge wastes always fill in upstream and downstream petroleum industry process. Sludge still contains oil that can use for energy storage. Recycling sludge is a method to handling it for reduce the toxicity and very probable to get the remaining oil around 20% from its volume. Froth flotation, a common method based on chemical unit for separate fine solid particles from an aqueous suspension. The basic composition of froth flotation is the capture of oil droplets or small solids by air bubbles in an aqueous slurry, followed by their levitation and collection in a froth layer. This method has been known as no intensive energy requirement and easy to apply. But the low efficiency and unable treat the high viscosity become the biggest problem in froth flotation unit. This study give the design to manage the high viscosity of sludge first and then entering the froth flotation including cavitation tube on it to change the bubbles into nano particles. The recovery in flotation starts with the collision and adhesion of hydrophobic particles to the air bubbles followed by transportation of the hydrophobic particle-bubble aggregate from the collection zone to the froth zone, drainage and enrichment of the froth, and finally by its overflow removal from the cell top. The effective particle separation by froth flotation relies on the efficient capture of hydrophobic particles by air bubbles in three steps. The important step is collision. Decreasing the bubble particles will increasing the collision effect. It cause the process more efficient. The pre-treatment, froth flotation, and cavitation tube integrated each other. The design shows the integrated unit and its process.

Keywords: sludge oil recovery, froth flotation, cavitation tube, nanobubbles, high viscosity

Procedia PDF Downloads 378
1335 Blueprinting of a Normalized Supply Chain Processes: Results in Implementing Normalized Software Systems

Authors: Bassam Istanbouli

Abstract:

With the technology evolving every day and with the increase in global competition, industries are always under the pressure to be the best. They need to provide good quality products at competitive prices, when and how the customer wants them.  In order to achieve this level of service, products and their respective supply chain processes need to be flexible and evolvable; otherwise changes will be extremely expensive, slow and with many combinatorial effects. Those combinatorial effects impact the whole organizational structure, from a management, financial, documentation, logistics and specially the information system Enterprise Requirement Planning (ERP) perspective. By applying the normalized system concept/theory to segments of the supply chain, we believe minimal effects, especially at the time of launching an organization global software project. The purpose of this paper is to point out that if an organization wants to develop a software from scratch or implement an existing ERP software for their business needs and if their business processes are normalized and modular then most probably this will yield to a normalized and modular software system that can be easily modified when the business evolves. Another important goal of this paper is to increase the awareness regarding the design of the business processes in a software implementation project. If the blueprints created are normalized then the software developers and configurators will use those modular blueprints to map them into modular software. This paper only prepares the ground for further studies;  the above concept will be supported by going through the steps of developing, configuring and/or implementing a software system for an organization by using two methods: The Software Development Lifecycle method (SDLC) and the Accelerated SAP implementation method (ASAP). Both methods start with the customer requirements, then blue printing of its business processes and finally mapping those processes into a software system.  Since those requirements and processes are the starting point of the implementation process, then normalizing those processes will end up in a normalizing software.

Keywords: blueprint, ERP, modular, normalized

Procedia PDF Downloads 139
1334 Conceptualizing a Strategic Facilities Management Decision Framework for Heritage Building Maintenance Management

Authors: Adegoriola Mayowa I., Lai Joseph H. K., Yung Esther H. K., Chan Edwin H. K.

Abstract:

Heritage buildings (HBs) as structures with historical and architectural relevance that form an integral part of contemporary society. These buildings deserve to be protected for as long as possible to retain their significance. Therefore, the need to prioritize HB maintenance management is pertinent. However, the decision-making process of HBMM can be relatively daunting. The decision-making challenge may be attributed to the multiple 'stakeholders' expectation and requirement which needs to be met. To this end, professionals in the built environment have identified the need to apply the strategic concept of facilities management (FM) in decision making. Furthermore, the different maintenance dimensions have been applied to maintenance management of residential, commercial, and health facilities. Unfortunately, these different maintenance approaches, such as FM, sustainable FM, urban FM, green FM, and strategic FM, are yet to be fully explored in the decision-making process of HBMM. To bridge this gap, this study focuses on developing a framework for strategic decision-making HBMM, which helps achieve HBMM sustainability. At the study's inception, relevant works of literature in the domains of HBMM and FM were conducted. This review helped in the identification of contemporary maintenance practices and their applicability to HBMM. Afterward, a conceptual framework to aid decision-making in HBMM was developed. This framework integrated the concept of FM scope (people, place, process, and technology) while ensuring that decisions plans were made at strategic, tactical, and operational levels. Also, the different characteristics of HBs and stakeholders' requirements were considered in the framework. The conceptual framework presents a holistic guide for professionals in HBMM to ensure that decision processes and outcomes are practical and efficient. It also contributes to the existing body of knowledge on the integration of FM in HBMM. Furthermore, it will serve as a basis for future studies by applying the conceptualized framework in actual cases.

Keywords: decision-making, facility management, strategy, sustainability, heritage building, maintenance

Procedia PDF Downloads 138
1333 Anthropomorphic Interfaces For User Trust in a Highly Automated Driving

Authors: Clarisse Lawson-Guidigbe, Nicolas Louveton, Kahina Amokrane-Ferka, Jean-Marc Andre

Abstract:

Trust in automated driving systems is receiving growing attention in the research community. Anthropomorphism has been identified by past research as a trust-building factor. In this paper, we consider three anthropomorphic interfaces integrating three versions of a virtual assistant. We attempt to measure the impact of each of these interfaces on trust in the automated driving system. An experiment following a between-subject design was conducted in a driving simulator (N = 36) to evaluate participants’ performance and experience in two handover situations (a simple one and a critical one). Perception of anthropomorphism and trust was measured using scales, while participants’ experience was measured during elicitation interviews. We found no significant difference between the three interfaces regarding the perception of anthropomorphism, trust levels, or experience. However, regarding participants’ performance, we found a significant difference between the three interfaces in the simple handover situations but not the critical one. Learnings from anthropomorphism and trust measurement scales are discussed and suggestions for further research are proposed.

Keywords: highly automated driving, trust, anthropomorphic design, mindful anthropomorphism, mindless anthropomorphism

Procedia PDF Downloads 147
1332 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information

Authors: A. Preetha Priyadharshini, S. B. M. Priya

Abstract:

In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.

Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information

Procedia PDF Downloads 813
1331 Secure Text Steganography for Microsoft Word Document

Authors: Khan Farhan Rafat, M. Junaid Hussain

Abstract:

Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.

Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography

Procedia PDF Downloads 241
1330 Affect of Reservoir Fluctuations on an Active Landslide in the Xiangjiaba Reservoir Area, Southwest China

Authors: Javed Iqbal

Abstract:

Filling of Xiangjiaba Reservoir Lake in Southwest China triggered and re-activated numerous landslides due to water fluctuation. In order to understand the relationship between reservoirs and slope instability, a typical reservoir landslide (Dasha landslide) at right bank of Jinsha River was selected as a case study for in-depth investigations. The detailed field investigations were carried out in order to identify the landslide with respect to its surroundings and to find out the slip-surface. Boreholes were drilled in order to find out the subsurface lithology and the depth of failure of Dasha landslide. The in-situ geotechnical tests were performed, and the soil samples from exposed slip surface were retrieved for geotechnical laboratory analysis. Finally, stability analysis was done using 3D strength reduction method under different conditions of reservoir water level fluctuations and rainfall conditions. The in-depth investigations show that the Dasha landslide is a bedding rockslide which was once activated in 1986. The topography of Dasha landslide is relatively flat, while the back scarp and local terrain are relatively steep. The landslide area is about 29 × 104 m², and the maximum thickness of the landslide deposits revealed by drilling is about 40 m with the average thickness being about 20 m, and the volume is thus estimated being about 580 × 10⁴ m³. Bedrock in the landslide area is composed of Suining Formation of Jurassic age. The main rock type is silty mudstone with sandstone, and bedding orientation is 300~310° ∠ 7~22°. The factor of safety (FOS) of Dasha landslide obtained by 3D strength reduction cannot meet the minimum safety requirement under the working condition of reservoir level fluctuation as designed, with effect of rainfall and rapid drawdown.

Keywords: Dasha landslide, Xiangjiaba reservoir, strength reduction method, bedding rockslide

Procedia PDF Downloads 162
1329 5G Future Hyper-Dense Networks: An Empirical Study and Standardization Challenges

Authors: W. Hashim, H. Burok, N. Ghazaly, H. Ahmad Nasir, N. Mohamad Anas, A. F. Ismail, K. L. Yau

Abstract:

Future communication networks require devices that are able to work on a single platform but support heterogeneous operations which lead to service diversity and functional flexibility. This paper proposes two cognitive mechanisms termed cognitive hybrid function which is applied in multiple broadband user terminals in order to maintain reliable connectivity and preventing unnecessary interferences. By employing such mechanisms especially for future hyper-dense network, we can observe their performances in terms of optimized speed and power saving efficiency. Results were obtained from several empirical laboratory studies. It was found that selecting reliable network had shown a better optimized speed performance up to 37% improvement as compared without such function. In terms of power adjustment, our evaluation of this mechanism can reduce the power to 5dB while maintaining the same level of throughput at higher power performance. We also discuss the issues impacting future telecommunication standards whenever such devices get in place.

Keywords: dense network, intelligent network selection, multiple networks, transmit power adjustment

Procedia PDF Downloads 376
1328 Bone Fracture Detection with X-Ray Images Using Mobilenet V3 Architecture

Authors: Ashlesha Khanapure, Harsh Kashyap, Abhinav Anand, Sanjana Habib, Anupama Bidargaddi

Abstract:

Technologies that are developing quickly are being developed daily in a variety of disciplines, particularly the medical field. For the purpose of detecting bone fractures in X-ray pictures of different body segments, our work compares the ResNet-50 and MobileNetV3 architectures. It evaluates accuracy and computing efficiency with X-rays of the elbow, hand, and shoulder from the MURA dataset. Through training and validation, the models are evaluated on normal and fractured images. While ResNet-50 showcases superior accuracy in fracture identification, MobileNetV3 showcases superior speed and resource optimization. Despite ResNet-50’s accuracy, MobileNetV3’s swifter inference makes it a viable choice for real-time clinical applications, emphasizing the importance of balancing computational efficiency and accuracy in medical imaging. We created a graphical user interface (GUI) for MobileNet V3 model bone fracture detection. This research underscores MobileNetV3’s potential to streamline bone fracture diagnoses, potentially revolutionizing orthopedic medical procedures and enhancing patient care.

Keywords: CNN, MobileNet V3, ResNet-50, healthcare, MURA, X-ray, fracture detection

Procedia PDF Downloads 63
1327 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 133
1326 A Two Level Load Balancing Approach for Cloud Environment

Authors: Anurag Jain, Rajneesh Kumar

Abstract:

Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling

Procedia PDF Downloads 431
1325 Investigation of Spatial Changes in the Context of Cultural Sustainability

Authors: Aslı Taş, Şebnem Ertaş

Abstract:

Culture consists of material and spiritual values adopted by the emerging societies during the historical and social processes and continues to exist from past to present by being transferred through generations. Culture and cultural sustainability are interdependent concepts. Cultural sustainability exists when the requirements established cultural expression are added to the social life as lifestyle and habits. However, sustainability renders change inevitable. Changes that take place in the culture of a society also shows the impact in the daily life places. Functional changes occur in the spaces in order to adapt particularly to cultural change that appear in the aftermath of the user change, to modern technology and living standards. In this context, in this study, it was aimed to investigate the effect of the time-dependent functional changes that took place in the housing where non-Muslim population who was subject to population exchange and Muslim population lived after the population exchange in the vacated housing in Sille. Therefore, the changed and newly added venues in the house belonging to Ali Oğuz in Hacı Ali Ağa Street were investigated over the generated graphic in order to clearly perceive the cultural exchange on the housing and settlement and the functional changes were demonstrated.

Keywords: culture, house, spatial changes, sustainability

Procedia PDF Downloads 389
1324 Using Analytical Hierarchy Process and TOPSIS Approaches in Designing a Finite Element Analysis Automation Program

Authors: Ming Wen, Nasim Nezamoddini

Abstract:

Sophisticated numerical simulations like finite element analysis (FEA) involve a complicated process from model setup to post-processing tasks that require replication of time-consuming steps. Utilizing FEA automation program simplifies the complexity of the involved steps while minimizing human errors in analysis set up, calculations, and results processing. One of the main challenges in designing FEA automation programs is to identify user requirements and link them to possible design alternatives. This paper presents a decision-making framework to design a Python based FEA automation program for modal analysis, frequency response analysis, and random vibration fatigue (RVF) analysis procedures. Analytical hierarchy process (AHP) and technique for order preference by similarity to ideal solution (TOPSIS) are applied to evaluate design alternatives considering the feedback received from experts and program users.

Keywords: finite element analysis, FEA, random vibration fatigue, process automation, analytical hierarchy process, AHP, TOPSIS, multiple-criteria decision-making, MCDM

Procedia PDF Downloads 112
1323 A Decision Making Tool for Selecting the Most Environmental Friendly Wastewater Treatment Plant for Small-Scale Communities

Authors: Mehmet Bulent Topkaya, Mustafa Yildirim

Abstract:

Wastewater treatment systems are designed and used to minimize adverse impacts of the wastewater on the environment before discharging. Various treatment options for wastewater treatment have been developed, and each of them has different performance characteristics and environmental impacts (e.g. material and land usage, energy consumption, greenhouse gas emission, water and soil emission) during construction, operation or maintenance phases. Assessing the environmental impacts during these phases are essential for the overall evaluation of the treatment systems. In this study, wastewater treatment options, such as vegetated land treatment, constructed wetland, rotating biological contactor, conventional activated sludge treatment, membrane bioreactor, extended aeration and stabilization pond are evaluated. The comparison of the environmental impacts is conducted under the assumption that the effluents will be discharged to sensitive and less sensitive areas respectively. The environmental impacts of each alternative are evaluated by life cycle assessment (LCA) approach. For this purpose, data related to energy usage, land requirement, raw material consumption, and released emissions from the life phases were collected with inventory studies based on field studies and literature. The environmental impacts were assessed by using SimaPro 7.1 LCA software. As the scale of the LCA results is global, an MS-Excel based decision support tool that includes the LCA result is developed in order to meet also the local demands. Using this tool, it is possible to assign weight factors on the LCA results according to local conditions by using Analytical Hierarchy Process and finally the most environmentally appropriate treatment option can be selected.

Keywords: analytical hierarchy process, decision support system, life cycle assessment, wastewater treatment

Procedia PDF Downloads 301
1322 Computer-Based Model for Design Selection of Lightning Arrester for 132/33kV Substation

Authors: Uma U. Uma, Uzoechi Laz

Abstract:

Protection of equipment insulation against lightning over voltages and selection of lightning arrester that will discharge at lower voltage level than the voltage required to breakdown the electrical equipment insulation is examined. The objectives of this paper are to design a computer based model using standard equations for the selection of appropriate lightning arrester with the lowest rated surge arrester that will provide adequate protection of equipment insulation and equally have a satisfactory service life when connected to a specified line voltage in power system network. The effectiveness and non-effectiveness of the earthing system of substation determine arrester properties. MATLAB program with GUI (graphic user interphase) its subprogram is used in the development of the model for the determination of required parameters like voltage rating, impulse spark over voltage, power frequency spark over voltage, discharge current, current rating and protection level of lightning arrester of a specified voltage level of a particular line.

Keywords: lightning arrester, GUIs, MatLab program, computer based model

Procedia PDF Downloads 417
1321 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 280
1320 The OLOS® Way to Cultural Heritage: User Interface with Anthropomorphic Characteristics

Authors: Daniele Baldacci, Remo Pareschi

Abstract:

Augmented Reality and Augmented Intelligence are radically changing information technology. The path that starts from the keyboard and then, passing through milestones such as Siri, Alexa and other vocal avatars, reaches a more fluid and natural communication with computers, thus converting the dichotomy between man and machine into a harmonious interaction, now heads unequivocally towards a new IT paradigm, where holographic computing will play a key role. The OLOS® platform contributes substantially to this trend in that it infuses computers with human features, by transferring the gestures and expressions of persons of flesh and bones to anthropomorphic holographic interfaces which in turn will use them to interact with real-life humans. In fact, we could say, boldly but with a solid technological background to back the statement, that OLOS® gives reality to an altogether new entity, placed at the exact boundary between nature and technology, namely the holographic human being. Holographic humans qualify as the perfect carriers for the virtual reincarnation of characters handed down from history and tradition. Thus, they provide for an innovative and highly immersive way of experiencing our cultural heritage as something alive and pulsating in the present.

Keywords: digital cinematography, human-computer interfaces, holographic simulation, interactive museum exhibits

Procedia PDF Downloads 115
1319 Study on Empowering Youth and Adults to Overcome Mental Health Hardships Using a Web Application

Authors: Jennis Delina Giles, Nimesha Liyanage, Damindi Senadheera, Dilan Randima, Kushnara Suriyawansa

Abstract:

Mental health is essential during childhood, adolescence, and adulthood. Mental health issues can influence one's thoughts, disposition, and conduct. A record number of mental health problems are caused by a global pandemic. Prevention of mental disease is vital for both children and adults. We desired to develop a web application for those with mental health difficulties. This web application will provide group chat, discussion, a community feed, and counseling services. The community feed function provides information regarding scheduled conversation space meetings, and the counselor uploads uplifting thoughts and tales of patients who received proper care and overcame mental health issues. Community feed can filter content based on user preferences. The mental health system for adults and adolescents will be updated. The community feed delivers relevant and instructive postings, links, and images so that service recipients can benefit from other platform features and receive encouraging words to assist them in overcoming mental health difficulties.

Keywords: bio medical, mental helath care, empower youths & adults, counselling

Procedia PDF Downloads 155
1318 Development of E-Tendering Models for Nigerian Public Procuring Entities

Authors: Bello Abdullahi, Kabir Bala, Yahaya M. Ibrahim, Ahmed D. Ibrahim

Abstract:

Public sector tendering has traditionally been conducted using manual paper-based processes which are known to be inefficient, less transparent, and more prone to manipulations and errors. However, the advent of the Internet and its associated technologies has led to the development of numerous e-Tendering systems that addressed many of the problems associated with the manual paper-based tendering system. Currently, in Nigeria, the public tendering processes are largely conducted based on manual paper-based system that is bedevilled by a number of problems such as inordinate delays, inefficiencies, manipulation of the tender evaluation process, corruption, lack of transparency and competition, among other problems. These problems can be addressed through the adoption of existing web-based e-Tendering systems which are known to address most of these problems. However, these existing e-Tendering systems that have been developed are not based on the Nigerian legal procurement processes and as such their suitability for local application is very limited. This paper is part of a larger study that attempt to address this problem through the development of an e-Tendering system that is based on the requirements of the Nigerian public procuring entities. In this paper, the identified tendering processes commonly used by Nigerian public procuring entities in the selection of construction sources are presented. A multi-methods research approach was used to identify those tendering processes. Specifically, 19 existing business use cases used by Nigerian public procuring entities were identified and 61 system use cases were prescribed based on the identified business use cases. The use cases were used as the basis for the development of domain and software conceptual models. The models were successfully used to guide the development of an e-Tendering system called NPS-eTender. Ripple and Unified Process were adopted as the software development methodologies.

Keywords: e-tendering, e-procurement, requirement model, conceptual model, public sector tendering, public procurement

Procedia PDF Downloads 195
1317 Improved Simultaneous Performance in the Time Domain and in the Frequency Domain

Authors: Azeddine Ghodbane, David Bensoussan, Maher Hammami

Abstract:

An innovative approach for controlling unstable and invertible systems has demonstrated superior performance compared to conventional controllers. It has been successfully applied to a levitation system and drone control. Simulations have yielded satisfactory performances when applied to a satellite antenna controller. This design method, based on sensitivity analysis, has also been extended to handle multivariable unstable and invertible systems that exhibit dominant diagonal characteristics at high frequencies, enabling decentralized control. Furthermore, this control method has been expanded to the realm of adaptive control. In this study, we introduce an alternative adaptive architecture that enhances both time and frequency performance, helpfully mitigating the effects of disturbances from the input plant and external disturbances affecting the output. To facilitate superior performance in both the time and frequency domains, we have developed user-friendly interactive design methods using the GeoGebra platform.

Keywords: control theory, decentralized control, sensitivity theory, input-output stability theory, robust multivariable feedback control design

Procedia PDF Downloads 113
1316 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 93
1315 ‘Koha ILS Software’ Implementation in Academic Library Management: An Experience from University Libraries of Bangladesh

Authors: Md. Golam Mostafa

Abstract:

This paper describes the use of Koha open source library management software for information management in university libraries of Bangladesh. Manual record keeping is a time-consuming and tedious task, which may lead to errors frequently. To maintain the quality of services, any organization needs to manage with the help of a computerized system. The advent of information technology paved the way for library computerization. This paper has provided a short history as well as the present ongoing development of the library computerization system in Bangladesh, which has developed as a library management software Koha on the basis of research and development. Koha integrated library systems (ILS) software is very user friendly open source software. It refers to software in which the source code is freely available for others to view, amend, and adapt. Koha integrated library systems maintained by and used by libraries all over the world. In this context, this paper will analyze Koha library management software, which proves appropriate for the present necessities of library management in Bangladesh. At last, result from the study has been analyzed using different tables and graphs.

Keywords: Koha Open Source Software, integrated library system, RFID facilities, university libraries, Bangladesh

Procedia PDF Downloads 125
1314 Leveraging Quality Metrics in Voting Model Based Thread Retrieval

Authors: Atefeh Heydari, Mohammadali Tavakoli, Zuriati Ismail, Naomie Salim

Abstract:

Seeking and sharing knowledge on online forums have made them popular in recent years. Although online forums are valuable sources of information, due to variety of sources of messages, retrieving reliable threads with high quality content is an issue. Majority of the existing information retrieval systems ignore the quality of retrieved documents, particularly, in the field of thread retrieval. In this research, we present an approach that employs various quality features in order to investigate the quality of retrieved threads. Different aspects of content quality, including completeness, comprehensiveness, and politeness, are assessed using these features, which lead to finding not only textual, but also conceptual relevant threads for a user query within a forum. To analyse the influence of the features, we used an adopted version of voting model thread search as a retrieval system. We equipped it with each feature solely and also various combinations of features in turn during multiple runs. The results show that incorporating the quality features enhances the effectiveness of the utilised retrieval system significantly.

Keywords: content quality, forum search, thread retrieval, voting techniques

Procedia PDF Downloads 213
1313 Monitoring Cellular Networks Performance Using Crowd Sourced IoT System: My Operator Coverage (MOC)

Authors: Bassem Boshra Thabet, Mohammed Ibrahim Elsabagh, Mohammad Adly Talaat

Abstract:

The number of cellular mobile phone users has increased enormously worldwide over the last two decades. Consequently, the monitoring of the performance of the Mobile Network Operators (MNOs) in terms of network coverage and broadband signal strength has become vital for both of the MNOs and regulators. This monitoring helps telecommunications operators and regulators keeping the market playing fair and most beneficial for users. However, the adopted methodologies to facilitate this continuous monitoring process are still problematic regarding cost, effort, and reliability. This paper introduces My Operator Coverage (MOC) system that is using Internet of Things (IoT) concepts and tools to monitor the MNOs performance using a crowd-sourced real-time methodology. MOC produces robust and reliable geographical maps for the user-perceived quality of the MNOs performance. MOC is also meant to enrich the telecommunications regulators with concrete, and up-to-date information that allows for adequate mobile market management strategies as well as appropriate decision making.

Keywords: mobile performance monitoring, crowd-sourced applications, mobile broadband performance, cellular networks monitoring

Procedia PDF Downloads 396
1312 Optimizing Super Resolution Generative Adversarial Networks for Resource-Efficient Single-Image Super-Resolution via Knowledge Distillation and Weight Pruning

Authors: Hussain Sajid, Jung-Hun Shin, Kum-Won Cho

Abstract:

Image super-resolution is the most common computer vision problem with many important applications. Generative adversarial networks (GANs) have promoted remarkable advances in single-image super-resolution (SR) by recovering photo-realistic images. However, high memory requirements of GAN-based SR (mainly generators) lead to performance degradation and increased energy consumption, making it difficult to implement it onto resource-constricted devices. To relieve such a problem, In this paper, we introduce an optimized and highly efficient architecture for SR-GAN (generator) model by utilizing model compression techniques such as Knowledge Distillation and pruning, which work together to reduce the storage requirement of the model also increase in their performance. Our method begins with distilling the knowledge from a large pre-trained model to a lightweight model using different loss functions. Then, iterative weight pruning is applied to the distilled model to remove less significant weights based on their magnitude, resulting in a sparser network. Knowledge Distillation reduces the model size by 40%; pruning then reduces it further by 18%. To accelerate the learning process, we employ the Horovod framework for distributed training on a cluster of 2 nodes, each with 8 GPUs, resulting in improved training performance and faster convergence. Experimental results on various benchmarks demonstrate that the proposed compressed model significantly outperforms state-of-the-art methods in terms of peak signal-to-noise ratio (PSNR), structural similarity index measure (SSIM), and image quality for x4 super-resolution tasks.

Keywords: single-image super-resolution, generative adversarial networks, knowledge distillation, pruning

Procedia PDF Downloads 96
1311 A Neuron Model of Facial Recognition and Detection of an Authorized Entity Using Machine Learning System

Authors: J. K. Adedeji, M. O. Oyekanmi

Abstract:

This paper has critically examined the use of Machine Learning procedures in curbing unauthorized access into valuable areas of an organization. The use of passwords, pin codes, user’s identification in recent times has been partially successful in curbing crimes involving identities, hence the need for the design of a system which incorporates biometric characteristics such as DNA and pattern recognition of variations in facial expressions. The facial model used is the OpenCV library which is based on the use of certain physiological features, the Raspberry Pi 3 module is used to compile the OpenCV library, which extracts and stores the detected faces into the datasets directory through the use of camera. The model is trained with 50 epoch run in the database and recognized by the Local Binary Pattern Histogram (LBPH) recognizer contained in the OpenCV. The training algorithm used by the neural network is back propagation coded using python algorithmic language with 200 epoch runs to identify specific resemblance in the exclusive OR (XOR) output neurons. The research however confirmed that physiological parameters are better effective measures to curb crimes relating to identities.

Keywords: biometric characters, facial recognition, neural network, OpenCV

Procedia PDF Downloads 256