Search results for: conceptual paper
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25203

Search results for: conceptual paper

4863 Critically Analyzing the Application of Big Data for Smart Transportation: A Case Study of Mumbai

Authors: Tanuj Joshi

Abstract:

Smart transportation is fast emerging as a solution to modern cities’ approach mobility issues, delayed emergency response rate and high congestion on streets. Present day scenario with Google Maps, Waze, Yelp etc. demonstrates how information and communications technologies controls the intelligent transportation system. This intangible and invisible infrastructure is largely guided by the big data analytics. On the other side, the exponential increase in Indian urban population has intensified the demand for better services and infrastructure to satisfy the transportation needs of its citizens. No doubt, India’s huge internet usage is looked as an important resource to guide to achieve this. However, with a projected number of over 40 billion objects connected to the Internet by 2025, the need for systems to handle massive volume of data (big data) also arises. This research paper attempts to identify the ways of exploiting the big data variables which will aid commuters on Indian tracks. This study explores real life inputs by conducting survey and interviews to identify which gaps need to be targeted to better satisfy the customers. Several experts at Mumbai Metropolitan Region Development Authority (MMRDA), Mumbai Metro and Brihanmumbai Electric Supply and Transport (BEST) were interviewed regarding the Information Technology (IT) systems currently in use. The interviews give relevant insights and requirements into the workings of public transportation systems whereas the survey investigates the macro situation.

Keywords: smart transportation, mobility issue, Mumbai transportation, big data, data analysis

Procedia PDF Downloads 165
4862 Current Status and Future Trends of Mechanized Fruit Thinning Devices and Sensor Technology

Authors: Marco Lopes, Pedro D. Gaspar, Maria P. Simões

Abstract:

This paper reviews the different concepts that have been investigated concerning the mechanization of fruit thinning as well as multiple working principles and solutions that have been developed for feature extraction of horticultural products, both in the field and industrial environments. The research should be committed towards selective methods, which inevitably need to incorporate some kinds of sensor technology. Computer vision often comes out as an obvious solution for unstructured detection problems, although leaves despite the chosen point of view frequently occlude fruits. Further research on non-traditional sensors that are capable of object differentiation is needed. Ultrasonic and Near Infrared (NIR) technologies have been investigated for applications related to horticultural produce and show a potential to satisfy this need while simultaneously providing spatial information as time of flight sensors. Light Detection and Ranging (LIDAR) technology also shows a huge potential but it implies much greater costs and the related equipment is usually much larger, making it less suitable for portable devices, which may serve a purpose on smaller unstructured orchards. Portable devices may serve a purpose on these types of orchards. In what concerns sensor methods, on-tree fruit detection, major challenge is to overcome the problem of fruits’ occlusion by leaves and branches. Hence, nontraditional sensors capable of providing some type of differentiation should be investigated.

Keywords: fruit thinning, horticultural field, portable devices, sensor technologies

Procedia PDF Downloads 124
4861 An Intelligent Scheme Switching for MIMO Systems Using Fuzzy Logic Technique

Authors: Robert O. Abolade, Olumide O. Ajayi, Zacheaus K. Adeyemo, Solomon A. Adeniran

Abstract:

Link adaptation is an important strategy for achieving robust wireless multimedia communications based on quality of service (QoS) demand. Scheme switching in multiple-input multiple-output (MIMO) systems is an aspect of link adaptation, and it involves selecting among different MIMO transmission schemes or modes so as to adapt to the varying radio channel conditions for the purpose of achieving QoS delivery. However, finding the most appropriate switching method in MIMO links is still a challenge as existing methods are either computationally complex or not always accurate. This paper presents an intelligent switching method for the MIMO system consisting of two schemes - transmit diversity (TD) and spatial multiplexing (SM) - using fuzzy logic technique. In this method, two channel quality indicators (CQI) namely average received signal-to-noise ratio (RSNR) and received signal strength indicator (RSSI) are measured and are passed as inputs to the fuzzy logic system which then gives a decision – an inference. The switching decision of the fuzzy logic system is fed back to the transmitter to switch between the TD and SM schemes. Simulation results show that the proposed fuzzy logic – based switching technique outperforms conventional static switching technique in terms of bit error rate and spectral efficiency.

Keywords: channel quality indicator, fuzzy logic, link adaptation, MIMO, spatial multiplexing, transmit diversity

Procedia PDF Downloads 133
4860 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics

Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky

Abstract:

With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.

Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities

Procedia PDF Downloads 145
4859 A Comparative Analysis of the Factors Determining Improvement and Effectiveness of Mediation in Family Matters Regarding Child Protection in Australia and Poland

Authors: Beata Anna Bronowicka

Abstract:

Purpose The purpose of this paper is to improve effectiveness of mediation in family matters regarding child protection in Australia and Poland. Design/methodology/approach the methodological approach is phenomenology. Two phenomenological methods of data collection were used in this research 1/ a doctrinal research 2/an interview. The doctrinal research forms the basis for obtaining information on mediation, the date of introduction of this alternative dispute resolution method to the Australian and Polish legal systems. No less important were the analysis of the legislation and legal doctrine in the field of mediation in family matters, especially child protection. In the second method, the data was collected by semi-structured interview. The collected data was translated from Polish to English and analysed using software program. Findings- The rights of children in the context of mediation in Australia and Poland differ from the recommendations of the UN Committee on the Rights of the Child, which require that children be included in all matters that concern them. It is the room for improvement in the mediation process by increasing child rights in mediation between parents in matters related to children. Children should have the right to express their opinion similarly to the case in the court process. The challenge with mediation is also better understanding the role of professionals in mediation as lawyers, mediators. Originality/value-The research is anticipated to be of particular benefit to parents, society as whole, and professionals working in mediation. These results may also be helpful during further legislative initiatives in this area.

Keywords: mediation, family law, children's rights, australian and polish family law

Procedia PDF Downloads 60
4858 The Impact of Bitcoin and Cryptocurrency on the Development of Community

Authors: Felib Ayman Shawky Salem

Abstract:

Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics

Procedia PDF Downloads 18
4857 Brief Review of the Self-Tightening, Left-Handed Thread

Authors: Robert S. Giachetti, Emanuele Grossi

Abstract:

Loosening of bolted joints in rotating machines can adversely affect their performance, cause mechanical damage, and lead to injuries. In this paper, two potential loosening phenomena in rotating applications are discussed. First, ‘precession,’ is governed by thread/nut contact forces, while the second is based on inertial effects of the fastened assembly. These mechanisms are reviewed within the context of historical usage of left-handed fasteners in rotating machines which appears absent in the literature and common machine design texts. Historically, to prevent loosening of wheel nuts, vehicle manufacturers have used right-handed and left-handed threads on different sides of the vehicle, but most modern vehicles have abandoned this custom and only use right-handed, tapered lug nuts on all sides of the vehicle. Other classical machines such as the bicycle continue to use different handed threads on each side while other machines such as, bench grinders, circular saws and brush cutters still use left-handed threads to fasten rotating components. Despite the continued use of left-handed fasteners, the rationale and analysis of left-handed threads to mitigate self-loosening of fasteners in rotating applications is not commonly, if at all, discussed in the literature or design textbooks. Without scientific literature to support these design selections, these implementations may be the result of experimental findings or aged institutional knowledge. Based on a review of rotating applications, historical documents and mechanical design references, a formal study of the paradoxical nature of left-handed threads in various applications is merited.

Keywords: rotating machinery, self-loosening fasteners, wheel fastening, vibration loosening

Procedia PDF Downloads 126
4856 Computer Countenanced Diagnosis of Skin Nodule Detection and Histogram Augmentation: Extracting System for Skin Cancer

Authors: S. Zith Dey Babu, S. Kour, S. Verma, C. Verma, V. Pathania, A. Agrawal, V. Chaudhary, A. Manoj Puthur, R. Goyal, A. Pal, T. Danti Dey, A. Kumar, K. Wadhwa, O. Ved

Abstract:

Background: Skin cancer is now is the buzzing button in the field of medical science. The cyst's pandemic is drastically calibrating the body and well-being of the global village. Methods: The extracted image of the skin tumor cannot be used in one way for diagnosis. The stored image contains anarchies like the center. This approach will locate the forepart of an extracted appearance of skin. Partitioning image models has been presented to sort out the disturbance in the picture. Results: After completing partitioning, feature extraction has been formed by using genetic algorithm and finally, classification can be performed between the trained and test data to evaluate a large scale of an image that helps the doctors for the right prediction. To bring the improvisation of the existing system, we have set our objectives with an analysis. The efficiency of the natural selection process and the enriching histogram is essential in that respect. To reduce the false-positive rate or output, GA is performed with its accuracy. Conclusions: The objective of this task is to bring improvisation of effectiveness. GA is accomplishing its task with perfection to bring down the invalid-positive rate or outcome. The paper's mergeable portion conflicts with the composition of deep learning and medical image processing, which provides superior accuracy. Proportional types of handling create the reusability without any errors.

Keywords: computer-aided system, detection, image segmentation, morphology

Procedia PDF Downloads 133
4855 Exploring the Energy Model of Cumulative Grief

Authors: Masica Jordan Alston, Angela N. Bullock, Angela S. Henderson, Stephanie Strianse, Sade Dunn, Joseph Hackett, Alaysia Black Hackett, Marcus Mason

Abstract:

The Energy Model of Cumulative Grief was created in 2018. The Energy Model of Cumulative Grief utilizes historic models of grief stage theories. The innovative model is additionally unique due to its focus on cultural responsiveness. The Energy Model of Cumulative Grief helps to train practitioners who work with clients dealing with grief and loss. This paper assists in introducing the world to this innovative model and exploring how this model positively impacted a convenience sample of 140 practitioners and individuals experiencing grief and loss. Respondents participated in Webinars provided by the National Grief and Loss Center of America (NGLCA). Participants in this cross-sectional research design study completed one of three Grief and Loss Surveys created by the Grief and Loss Centers of America. Data analysis for this study was conducted via SPSS and Survey Hero to examine survey results for respondents. Results indicate that the Energy Model of Cumulative Grief was an effective resource for participants in addressing grief and loss. The majority of participants found the Webinars to be helpful and a conduit to providing them with higher levels of hope. The findings suggest that using The Energy Model of Cumulative Grief is effective in providing culturally responsive grief and loss resources to practitioners and clients. There are far reaching implications with the use of technology to provide hope to those suffering from grief and loss worldwide through The Energy Model of Cumulative Grief.

Keywords: grief, loss, grief energy, grieving brain

Procedia PDF Downloads 67
4854 To Cloudify or Not to Cloudify

Authors: Laila Yasir Al-Harthy, Ali H. Al-Badi

Abstract:

As an emerging business model, cloud computing has been initiated to satisfy the need of organizations and to push Information Technology as a utility. The shift to the cloud has changed the way Information Technology departments are managed traditionally and has raised many concerns for both, public and private sectors. The purpose of this study is to investigate the possibility of cloud computing services replacing services provided traditionally by IT departments. Therefore, it aims to 1) explore whether organizations in Oman are ready to move to the cloud; 2) identify the deciding factors leading to the adoption or rejection of cloud computing services in Oman; and 3) provide two case studies, one for a successful Cloud provider and another for a successful adopter. This paper is based on multiple research methods including conducting a set of interviews with cloud service providers and current cloud users in Oman; and collecting data using questionnaires from experts in the field and potential users of cloud services. Despite the limitation of bandwidth capacity and Internet coverage offered in Oman that create a challenge in adopting the cloud, it was found that many information technology professionals are encouraged to move to the cloud while few are resistant to change. The recent launch of a new Omani cloud service provider and the entrance of other international cloud service providers in the Omani market make this research extremely valuable as it aims to provide real-life experience as well as two case studies on the successful provision of cloud services and the successful adoption of these services.

Keywords: cloud computing, cloud deployment models, cloud service models, deciding factors

Procedia PDF Downloads 278
4853 Text Localization in Fixed-Layout Documents Using Convolutional Networks in a Coarse-to-Fine Manner

Authors: Beier Zhu, Rui Zhang, Qi Song

Abstract:

Text contained within fixed-layout documents can be of great semantic value and so requires a high localization accuracy, such as ID cards, invoices, cheques, and passports. Recently, algorithms based on deep convolutional networks achieve high performance on text detection tasks. However, for text localization in fixed-layout documents, such algorithms detect word bounding boxes individually, which ignores the layout information. This paper presents a novel architecture built on convolutional neural networks (CNNs). A global text localization network and a regional bounding-box regression network are introduced to tackle the problem in a coarse-to-fine manner. The text localization network simultaneously locates word bounding points, which takes the layout information into account. The bounding-box regression network inputs the features pooled from arbitrarily sized RoIs and refine the localizations. These two networks share their convolutional features and are trained jointly. A typical type of fixed-layout documents: ID cards, is selected to evaluate the effectiveness of the proposed system. These networks are trained on data cropped from nature scene images, and synthetic data produced by a synthetic text generation engine. Experiments show that our approach locates high accuracy word bounding boxes and achieves state-of-the-art performance.

Keywords: bounding box regression, convolutional networks, fixed-layout documents, text localization

Procedia PDF Downloads 180
4852 Control of Base Isolated Benchmark using Combined Control Strategy with Fuzzy Algorithm Subjected to Near-Field Earthquakes

Authors: Hashem Shariatmadar, Mozhgansadat Momtazdargahi

Abstract:

The purpose of control structure against earthquake is to dissipate earthquake input energy to the structure and reduce the plastic deformation of structural members. There are different methods for control structure against earthquake to reduce the structure response that they are active, semi-active, inactive and hybrid. In this paper two different combined control systems are used first system comprises base isolator and multi tuned mass dampers (BI & MTMD) and another combination is hybrid base isolator and multi tuned mass dampers (HBI & MTMD) for controlling an eight story isolated benchmark steel structure. Active control force of hybrid isolator is estimated by fuzzy logic algorithms. The influences of the combined systems on the responses of the benchmark structure under the two near-field earthquake (Newhall & Elcentro) are evaluated by nonlinear dynamic time history analysis. Applications of combined control systems consisting of passive or active systems installed in parallel to base-isolation bearings have the capability of reducing response quantities of base-isolated (relative and absolute displacement) structures significantly. Therefore in design and control of irregular isolated structures using the proposed control systems, structural demands (relative and absolute displacement and etc.) in each direction must be considered separately.

Keywords: base-isolated benchmark structure, multi-tuned mass dampers, hybrid isolators, near-field earthquake, fuzzy algorithm

Procedia PDF Downloads 283
4851 An Investigation into Mechanical Properties of Laser Fabricated 308LSi Stainless Steel Walls by Wire Feedstock

Authors: Taiwo Ebenezer Abioye, Alexis Medrano-Tellez, Peter Kayode Farayibi, Peter Kayode Oke,

Abstract:

Laser metal deposition by wire feedstock has been established as a process which can provide a high material deposition rate with good quality. Sound mechanical properties of the deposited parts are the pre-requisites for the real applications of this process. This paper investigates the laser metal deposition of 308LSi stainless steel wire within a process window. Single tracks and multiple layer thin-walls of 308LSi stainless steel wire were deposited on 304 stainless steel substrate. The grain structures of the built walls were examined using optical microscopy. The mechanical properties of the built walls including the micro-hardness and tensile properties along the transverse and longitudinal directions were investigated using Vickers hardness tester and tensile test machine. Long columnar grains were found growing in the wall building direction (transverse) and nucleation were observed at the boundary between two deposited layers due to remelting of the previously deposited layers. The results showed that the hardness values of the deposited walls (ranging between 194 HV and 167 HV) decreased from the track-substrate interface to the top of the wall. The ultimate tensile strength (UTS) of the wall (518 ± 7 MPa) showed dependence on wall building directions.

Keywords: laser metal deposition, ultimate tensile strength, hardness, wall, microstructure

Procedia PDF Downloads 388
4850 Intelligence Failures and Infiltration: The Case of the Ethiopian Army 1977-1991

Authors: Fantahun Ibrahim

Abstract:

The Ethiopian army was one of the largest and most heavily armed ground forces in Africa between 1974 and 1991. It scored a decisive victory over Somalia’s armed forces in March 1978. It, however, failed to withstand the combined onslaught of the northern insurgents from Tigray and Eritrea and finally collapsed in 1991. At the heart of the problem was the army’s huge intelligence failure. The northern insurgents, on the other hand, had a cutting edge in intelligence gathering. Among other things they infiltrated the army high command and managed to get top secrets about the army. Commanders who had fallen into the hands of the insurgents in several battles were told to send letters to their colleagues in the command structure and persuade them to work secretly for the insurgents. Some commanders did work for the insurgents and played a great role in the undoing of military operations. Insurgent commanders were able to warn their fighters about air strikes before jet fighters took off from airfields in the northern theatre. It was not uncommon for leaders of insurgents to get the full details of military operations days before their implementation. Such intelligence failures led to major military disasters like the fall of Afabet (March, 1988), Enda Sellase (February, 1989), Massawa and Debre Tabor (February, 1990), Karra Mishig, Meragna and Alem Ketema (June, 1990). This paper, therefore, seeks to investigate the army’s intelligence failures using untapped archival documents kept at the Ministry of National Defence in Addis Ababa and interviewing key former commanders of the army and ex-leaders of the insurgents.

Keywords: Ethiopian army, intelligence, infiltration, insurgents

Procedia PDF Downloads 289
4849 E-Marketing Strategy: A Competitive Advantage among Commercial Banks Branches in Bauchi State

Authors: Sagir Abubakar

Abstract:

The electronic means of transaction has provided an opportunity especially for commercial banks to entice more customers that will subsequently boost their return on investment. It moves them from traditional marketing into digital marketing and gives them a competitive advantage over others in the same industry.The paper, therefore, examined the competitive advantage of the electronic marketing strategy among commercial banks branches in Bauchi state. The main objective of the study was to determine the impact of e-marketing strategy as a competitive advantage among commercial banks branches in Bauchi state and to evaluate the level of enlightenment campaign offered by the commercial banks branches to their customers on e-marketing. The study obtained data from the staff of the five (s) selected banks branches as the respondents to answer the questionnaire. The research is a quantitative research, where the data where obtained using questionnaire. 100 questionnaires were distributed and analyzed using SPSS’s regression analysis. The research among other findings discovered that, the e-marketing has led to a significant improvement in the banking industry and is expected to continue because of the improvement in the ICT sector. It was also found out that most customers are not aware of the electronic products offered by commercial banks branches in Bauchi state. Some of factors affecting the adoption of e-marketing by banks as indicated from the findings include: top management commitment, government policy on ICT and availability of ICT personnel. The study recommended that commercial banks branches should engage in enlightenment campaign about the existing of their e- products/services, management should place an incentives in order to raise the interest of customers to patronize the products/services online.

Keywords: e-marketing strategy, competitive advantage, banks, Bauchi State

Procedia PDF Downloads 305
4848 A Mathematical Study of Magnetic Field, Heat Transfer and Brownian Motion of Nanofluid over a Nonlinear Stretching Sheet

Authors: Madhu Aneja, Sapna Sharma

Abstract:

Thermal conductivity of ordinary heat transfer fluids is not adequate to meet today’s cooling rate requirements. Nanoparticles have been shown to increase the thermal conductivity and convective heat transfer to the base fluids. One of the possible mechanisms for anomalous increase in the thermal conductivity of nanofluids is the Brownian motions of the nanoparticles in the basefluid. In this paper, the natural convection of incompressible nanofluid over a nonlinear stretching sheet in the presence of magnetic field is studied. The flow and heat transfer induced by stretching sheets is important in the study of extrusion processes and is a subject of considerable interest in the contemporary literature. Appropriate similarity variables are used to transform the governing nonlinear partial differential equations to a system of nonlinear ordinary (similarity) differential equations. For computational purpose, Finite Element Method is used. The effective thermal conductivity and viscosity of nanofluid are calculated by KKL (Koo – Klienstreuer – Li) correlation. In this model effect of Brownian motion on thermal conductivity is considered. The effect of important parameter i.e. nonlinear parameter, volume fraction, Hartmann number, heat source parameter is studied on velocity and temperature. Skin friction and heat transfer coefficients are also calculated for concerned parameters.

Keywords: Brownian motion, convection, finite element method, magnetic field, nanofluid, stretching sheet

Procedia PDF Downloads 201
4847 Petrophysical Interpretation of Unconventional Shale Reservoir Naokelekan in Ajeel Oil-Gas Field

Authors: Abeer Tariq, Mohammed S. Aljawad, Khaldoun S. Alfarisi

Abstract:

This paper aimed to estimate the petrophysical properties (porosity, permeability, and fluid saturation) of the Ajeel well (Aj-1) Shale reservoir. Petrophysical properties of the Naokelekan Formation at Ajeel field are determined from the interpretation of open hole log data of one well which penetrated the source rock reservoir. However, depending on these properties, it is possible to divide the Formation which has a thickness of approximately 28-34 m, into three lithological units: A is the upper unit (thickness about 9 to 13 m) consisting of dolomitized limestones; B is a middle unit (thickness about 13 to 20 m) which is composed of dolomitic limestone, and C is a lower unit (>22 m thick) which consists of shale-rich and dolomitic limestones. The results showed that the average formation water resistivity for the formation (Rw = 0.024), the average resistivity of the mud filtration (Rmf = 0.46), and the Archie parameters were determined by the picket plot method, where (m) value equal to 1.86, (n) value equal to 2 and (a) value equal to 1. Also, this reservoir proved to be economical for future developments to increase the production rate of the field by dealing with challenging reservoirs. In addition, Porosity values and water saturation Sw were calculated along with the depth of the composition using Interactive Petrophysics (IP) V4.5 software. The interpretation of the computer process (CPI) showed that the better porous zone holds the highest amount of hydrocarbons in the second and third zone. From the flow zone indicator FZI method, there are two rock types in the studied reservoir.

Keywords: petrophysical properties, porosity, permeability, ajeel field, Naokelekan formation, Jurassic sequences, carbonate reservoir, source rock

Procedia PDF Downloads 82
4846 Factors Influencing Bank Profitability of Czech Banks and Their International Parent Companies

Authors: Libena Cernohorska

Abstract:

The goal of this paper is to specify factors influencing the profitability of selected banks. Next, a model will be created to help establish variables that have a demonstrable influence on the development of the selected banks' profitability ratios. Czech banks and their international parent companies were selected for analyzing profitability. Banks categorized as large banks (according to the Czech National Bank's system, which ranks banks according to balance sheet total) were selected to represent the Czech banks. Two ratios, the return on assets ratio (ROA) and the return on equity ratio (ROE) are used to assess bank profitability. Six endogenous and four external indicators were selected from among other factors that influence bank profitability. The data analyzed were for the years 2001 – 2013. First, correlation analysis, which was supposed to eliminate correlated values, was conducted. A large number of correlated values were established on the basis of this analysis. The strongly correlated values were omitted. Despite this, the subsequent regression analysis of profitability for the individual banks that were selected did not confirm that the selected variables influenced their profitability. The studied factors' influence on bank profitability was demonstrated only for Československá Obchodní Banka and Société Générale using regression analysis. For Československá Obchodní Banka, it was demonstrated that inflation level and the amount of the central bank's interest rate influenced the return on assets ratio and that capital adequacy and market concentration influenced the return on equity ratio for Société Générale.

Keywords: banks, profitability, regression analysis, ROA, ROE

Procedia PDF Downloads 240
4845 Context Detection in Spreadsheets Based on Automatically Inferred Table Schema

Authors: Alexander Wachtel, Michael T. Franzen, Walter F. Tichy

Abstract:

Programming requires years of training. With natural language and end user development methods, programming could become available to everyone. It enables end users to program their own devices and extend the functionality of the existing system without any knowledge of programming languages. In this paper, we describe an Interactive Spreadsheet Processing Module (ISPM), a natural language interface to spreadsheets that allows users to address ranges within the spreadsheet based on inferred table schema. Using the ISPM, end users are able to search for values in the schema of the table and to address the data in spreadsheets implicitly. Furthermore, it enables them to select and sort the spreadsheet data by using natural language. ISPM uses a machine learning technique to automatically infer areas within a spreadsheet, including different kinds of headers and data ranges. Since ranges can be identified from natural language queries, the end users can query the data using natural language. During the evaluation 12 undergraduate students were asked to perform operations (sum, sort, group and select) using the system and also Excel without ISPM interface, and the time taken for task completion was compared across the two systems. Only for the selection task did users take less time in Excel (since they directly selected the cells using the mouse) than in ISPM, by using natural language for end user software engineering, to overcome the present bottleneck of professional developers.

Keywords: natural language processing, natural language interfaces, human computer interaction, end user development, dialog systems, data recognition, spreadsheet

Procedia PDF Downloads 290
4844 Importance of Women Education: Mother To Be Education in Order to Brighten Future Generation’s Foredoom

Authors: Ummi Sholihah Pertiwi Abidin, Eva Fadhilah

Abstract:

Social changes are more and more growing and having many different forms as the time passed and thought methods in the society. One of many forms of that social changes is the emancipation of women that is flourishing by the inception of gender equality perception between men and women in all aspects including education. It’s not anymore found the distinction between genders in learning and the education achieving right at this globalized era. But, it is still many perceptions which are against that equality of education achieving right, either come from the women’s selves or many external factors. They assumed that they are going to be a mother in the future, and a wife, someone with responsible for taking care of the household and everything inside, while the husband is the one who has the responsible for looking for the living. So comes from this kind of assumption, the perception against the education equality between genders, which means there is no need for them –women- to achieve the high education because they will still end up as housewives. Except those working or career women that need high education to support their works. These women are not aware that even a mother needs the high and capable education. Because, as the 'mother to be,' they surely need broad knowledge from the education to educate their children in the future. It is such a big fault to say the kind of thing, 'It is no matter that I am not educated, in case I’m just a housewife. The important thing is my children get a great education'. Unfortunately, it is still often found, saying 'A housewife job is not a big deal to do with high education.' This qualitative method paper raises a theme about the importance of education for women, no matter what will they be in the future. Because however, and whatever is the woman’s career outside the house, or even not working outside, she’s still a mother for her children, and 'educational provision' is a great need. And so forth, this educational provision is a big deal to do with future generation’s foredoom, regarding the first source of children’s knowledge and the first school for them is their mother.

Keywords: women education, mother to be, educational provision, first school, future generation’s foredoom

Procedia PDF Downloads 254
4843 Bottom-up Quantification of Mega Inter-Basin Water Transfer Vulnerability to Climate Change

Authors: Enze Zhang

Abstract:

Large numbers of inter-basin water transfer (IBWT) projects are constructed or proposed all around the world as solutions to water distribution and supply problems. Nowadays, as climate change warms the atmosphere, alters the hydrologic cycle, and perturbs water availability, large scale IBWTs which are sensitive to these water-related changes may carry significant risk. Given this reality, IBWTs have elicited great controversy and assessments of vulnerability to climate change are urgently needed worldwide. In this paper, we consider the South-to-North Water Transfer Project (SNWTP) in China as a case study, and introduce a bottom-up vulnerability assessment framework. Key hazards and risks related to climate change that threaten future water availability for the SNWTP are firstly identified. Then a performance indicator is presented to quantify the vulnerability of IBWT by taking three main elements (i.e., sensitivity, adaptive capacity, and exposure degree) into account. A probabilistic Budyko model is adapted to estimate water availability responses to a wide range of possibilities for future climate conditions in each region of the study area. After bottom-up quantifying the vulnerability based on the estimated water availability, our findings confirm that SNWTP would greatly alleviate geographical imbalances in water availability under some moderate climate change scenarios but raises questions about whether it is a long-term solution because the donor basin has a high level of vulnerability due to extreme climate change.

Keywords: vulnerability, climate change, inter-basin water transfer, bottom-up

Procedia PDF Downloads 386
4842 Hanna Arendt and Al-Farabi’s Non-Naturalistic Political Philosophy

Authors: Mohammad Hossein Badamchi

Abstract:

As Leo Strauss demonstrates in his works, Political Philosophy in the western tradition is an epistemic-naturalistic tradition insofar Hanna Arendt mentioning the deep conflict between philosophy and politics, opposed to be named “political philosopher” prefer the title “political thinker” for herself. In fact, the Western political philosophy’s tendency to derive politics from natural law and epistemic argumentations makes a paradox between the actual “the political” and the theoretical “natural politics” in the western tradition. In this paper, we want to show that Hanna Arendt, in her exploration to find a new realm of the non-naturalistic way of thinking about the political is walking on a completely different tradition of political philosophy which was first established by Al-Farabi, the founder of Islamic political philosophy around thousand years after Greek Philosophy. Despite Aristotelian Polis which is a Natural community based on true natural rationality to reach the natural purposes of mankind, Al-Farabi’s Madine (his reconstructed concept of Aristotelian Polis) is completely constructed against natural cities, which are formulated by necessity logic of natural arguments and natural deception of humanity. In fact, Farabi considers the natural understanding of politics as Ignorant ideologies used by governments to suppress people. Madine in Farabi’s work is not a natural institution but is a collaborative constitution founded by citizens. So despite Aristotelian thinking, here we don’t have just A Polis that is the one true polis, but we have various multiple Madines among one, is virtuous not by definition but by real action of citizens and civil relations. Al-Farabi’s political philosophy is not a Naturalistic-epistemic Political Philosophy but is a Phronetic Political Philosophy which Hanna Arendt wants to establish outside of western contemplative anti-active political philosophy tradition.

Keywords: al-farabi, hanna arendt, natural politics, the political, political philosophy

Procedia PDF Downloads 277
4841 A Case Study on Post-Occupancy Evaluation of User Satisfaction in Higher Educational Buildings

Authors: Yuanhong Zhao, Qingping Yang, Andrew Fox, Tao Zhang

Abstract:

Post-occupancy evaluation (POE) is a systematic approach to assess the actual building performance after the building has been occupied for some time. In this paper, a structured POE assessment was conducted using the building use survey (BUS) methodology in two higher educational buildings in the United Kingdom. This study aims to help close the building performance gap, provide optimized building operation suggestions, and to improve occupants’ satisfaction level. In this research, the questionnaire survey investigated the influences of environmental factors on user satisfaction from the main aspects of building overall design, thermal comfort, perceived control, indoor environment quality for noise, lighting, ventilation, and other non-environmental factors, such as the background information about age, sex, time in buildings, workgroup size, and so on. The results indicate that the occupant satisfaction level with the main aspects of building overall design, indoor environment quality, and thermal comfort in summer and winter on both two buildings, which is lower than the benchmark data. The feedback of this POE assessment has been reported to the building management team to allow managers to develop high-performance building operation plans. Finally, this research provided improvement suggestions to the building operation system to narrow down the performance gap and improve the user work experience satisfaction and productivity level.

Keywords: building performance assessment systems, higher educational buildings, post-occupancy evaluation, user satisfaction

Procedia PDF Downloads 138
4840 Clinical Pharmacology Throughout the World: A View from Global Health

Authors: Ragy Raafat Gaber Attaalla

Abstract:

Despite having the greatest rates of mortality and morbidity in the world, low- and middle-income (LMIC) nations trail high-income nations in terms of the number of clinical trials, the number of qualified researchers, and the amount of research information specific to their people. Health inequities and the use of precision medicine may be hampered by a lack of local genomic data, clinical pharmacology and pharmacometrics competence, and training opportunities. These issues can be solved by carrying out health care infrastructure development, which includes data gathering and well-designed clinical pharmacology training in LMICs. It will be advantageous if there is international cooperation focused at enhancing education and infrastructure and promoting locally motivated clinical trials and research. This paper outlines various instances where clinical pharmacology knowledge could be put to use, including pharmacogenomic opportunities that could lead to better clinical guideline recommendations. Examples of how clinical pharmacology training can be successfully implemented in LMICs are also provided, including clinical pharmacology and pharmacometrics training programmes in Africa and a Tanzanian researcher's personal experience while on a training sabbatical in the United States. These training initiatives will profit from advocacy for clinical pharmacologists' employment prospects and career development pathways, which are gradually becoming acknowledged and established in LMICs. The advancement of training and research infrastructure to increase clinical pharmacologists' knowledge in LMICs would be extremely beneficial because they have a significant role to play in global health.

Keywords: low- and middle-income, clinical pharmacology, pharmacometrics, career development pathways

Procedia PDF Downloads 59
4839 Estimation of Asphalt Pavement Surfaces Using Image Analysis Technique

Authors: Mohammad A. Khasawneh

Abstract:

Asphalt concrete pavements gradually lose their skid resistance causing safety problems especially under wet conditions and high driving speeds. In order to enact the actual field polishing and wearing process of asphalt pavement surfaces in a laboratory setting, several laboratory-scale accelerated polishing devices were developed by different agencies. To mimic the actual process, friction and texture measuring devices are needed to quantify surface deterioration at different polishing intervals that reflect different stages of the pavement life. The test could still be considered lengthy and to some extent labor-intensive. Therefore, there is a need to come up with another method that can assist in investigating the bituminous pavement surface characteristics in a practical and time-efficient test procedure. The purpose of this paper is to utilize a well-developed image analysis technique to characterize asphalt pavement surfaces without the need to use conventional friction and texture measuring devices in an attempt to shorten and simplify the polishing procedure in the lab. Promising findings showed the possibility of using image analysis in lieu of the labor-sensitive-variable-in-nature friction and texture measurements. It was found that the exposed aggregate surface area of asphalt specimens made from limestone and gravel aggregates produced solid evidence of the validity of this method in describing asphalt pavement surfaces. Image analysis results correlated well with the British Pendulum Numbers (BPN), Polish Values (PV) and Mean Texture Depth (MTD) values.

Keywords: friction, image analysis, polishing, statistical analysis, texture

Procedia PDF Downloads 293
4838 Construction Unit Rate Factor Modelling Using Neural Networks

Authors: Balimu Mwiya, Mundia Muya, Chabota Kaliba, Peter Mukalula

Abstract:

Factors affecting construction unit cost vary depending on a country’s political, economic, social and technological inclinations. Factors affecting construction costs have been studied from various perspectives. Analysis of cost factors requires an appreciation of a country’s practices. Identified cost factors provide an indication of a country’s construction economic strata. The purpose of this paper is to identify the essential factors that affect unit cost estimation and their breakdown using artificial neural networks. Twenty-five (25) identified cost factors in road construction were subjected to a questionnaire survey and employing SPSS factor analysis the factors were reduced to eight. The 8 factors were analysed using the neural network (NN) to determine the proportionate breakdown of the cost factors in a given construction unit rate. NN predicted that political environment accounted 44% of the unit rate followed by contractor capacity at 22% and financial delays, project feasibility, overhead and profit each at 11%. Project location, material availability and corruption perception index had minimal impact on the unit cost from the training data provided. Quantified cost factors can be incorporated in unit cost estimation models (UCEM) to produce more accurate estimates. This can create improvements in the cost estimation of infrastructure projects and establish a benchmark standard to assist the process of alignment of work practises and training of new staff, permitting the on-going development of best practises in cost estimation to become more effective.

Keywords: construction cost factors, neural networks, roadworks, Zambian construction industry

Procedia PDF Downloads 345
4837 DWT-SATS Based Detection of Image Region Cloning

Authors: Michael Zimba

Abstract:

A duplicated image region may be subjected to a number of attacks such as noise addition, compression, reflection, rotation, and scaling with the intention of either merely mating it to its targeted neighborhood or preventing its detection. In this paper, we present an effective and robust method of detecting duplicated regions inclusive of those affected by the various attacks. In order to reduce the dimension of the image, the proposed algorithm firstly performs discrete wavelet transform, DWT, of a suspicious image. However, unlike most existing copy move image forgery (CMIF) detection algorithms operating in the DWT domain which extract only the low frequency sub-band of the DWT of the suspicious image thereby leaving valuable information in the other three sub-bands, the proposed algorithm simultaneously extracts features from all the four sub-bands. The extracted features are not only more accurate representation of image regions but also robust to additive noise, JPEG compression, and affine transformation. Furthermore, principal component analysis-eigenvalue decomposition, PCA-EVD, is applied to reduce the dimension of the features. The extracted features are then sorted using the more computationally efficient Radix Sort algorithm. Finally, same affine transformation selection, SATS, a duplication verification method, is applied to detect duplicated regions. The proposed algorithm is not only fast but also more robust to attacks compared to the related CMIF detection algorithms. The experimental results show high detection rates.

Keywords: affine transformation, discrete wavelet transform, radix sort, SATS

Procedia PDF Downloads 216
4836 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 174
4835 An Application of Integrated Multi-Objective Particles Swarm Optimization and Genetic Algorithm Metaheuristic through Fuzzy Logic for Optimization of Vehicle Routing Problems in Sugar Industry

Authors: Mukhtiar Singh, Sumeet Nagar

Abstract:

Vehicle routing problem (VRP) is a combinatorial optimization and nonlinear programming problem aiming to optimize decisions regarding given set of routes for a fleet of vehicles in order to provide cost-effective and efficient delivery of both services and goods to the intended customers. This paper proposes the application of integrated particle swarm optimization (PSO) and genetic optimization algorithm (GA) to address the Vehicle routing problem in sugarcane industry in India. Suger industry is very prominent agro-based industry in India due to its impacts on rural livelihood and estimated to be employing around 5 lakhs workers directly in sugar mills. Due to various inadequacies, inefficiencies and inappropriateness associated with the current vehicle routing model it costs huge money loss to the industry which needs to be addressed in proper context. The proposed algorithm utilizes the crossover operation that originally appears in genetic algorithm (GA) to improve its flexibility and manipulation more readily and avoid being trapped in local optimum, and simultaneously for improving the convergence speed of the algorithm, level set theory is also added to it. We employ the hybrid approach to an example of VRP and compare its result with those generated by PSO, GA, and parallel PSO algorithms. The experimental comparison results indicate that the performance of hybrid algorithm is superior to others, and it will become an effective approach for solving discrete combinatory problems.

Keywords: fuzzy logic, genetic algorithm, particle swarm optimization, vehicle routing problem

Procedia PDF Downloads 380
4834 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 281