Search results for: user comfort
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2905

Search results for: user comfort

865 Design and Evaluation of Oven Type Furnace Using Earth Materials for Roasting Foods

Authors: Jeffrey Cacho, Sherwin Reyes

Abstract:

The research targeted enhancing energy utilization and reducing waste in roasting processes, particularly in Camarines Norte, where Bounty Agro Ventures Incorporated dominates through brands such as Chooks-to-Go, Uling Roaster, and Reyal. Competitors like Andok’s and Baliwag Lechon Manok also share the market. A staggering 90% of these businesses use traditional glass-type roasting furnaces fueled by wood charcoal, leading to significant energy loss and inefficiency due to suboptimal heat conservation. Only a mere 10% employ electric ovens. Many available furnaces, typically constructed from industrial materials through welding and other metal joining techniques, are not energy-efficient. Cost-prohibitive commercial options compel some micro-enterprises to fabricate their furnaces. The study proposed developing an eco-friendly, cost-effective roasting furnace with excellent heat retention. The distinct design aimed to reduce cooks' heat exposure and overall fuel consumption. The furnace features an angle bar frame, a combustion chute for fuel burning, a heat-retaining clay-walled chamber, and a top cover, all contributing to improved energy savings and user safety.

Keywords: biomass roasting furnace, heat storage, combustion chute, start-up roasting business

Procedia PDF Downloads 53
864 Predicting Destination Station Based on Public Transit Passenger Profiling

Authors: Xuyang Song, Jun Yin

Abstract:

The smart card has been an extremely universal tool in public transit. It collects a large amount of data on buses, urban railway transit, and ferries and provides possibilities for passenger profiling. This paper combines offline analysis of passenger profiling and real-time prediction to propose a method that can accurately predict the destination station in real-time when passengers tag on. Firstly, this article constructs a static database of user travel characteristics after identifying passenger travel patterns based on the Density-Based Spatial Clustering of Applications with Noise (DBSCAN). The dual travel passenger habits are identified: OD travel habits and D station travel habits. Then a rapid real-time prediction algorithm based on Transit Passenger Profiling is proposed, which can predict the destination of in-board passengers. This article combines offline learning with online prediction, providing a technical foundation for real-time passenger flow prediction, monitoring and simulation, and short-term passenger behavior and demand prediction. This technology facilitates the efficient and real-time acquisition of passengers' travel destinations and demand. The last, an actual case was simulated and demonstrated feasibility and efficiency.

Keywords: travel behavior, destination prediction, public transit, passenger profiling

Procedia PDF Downloads 21
863 Factory Virtual Environment Development for Augmented and Virtual Reality

Authors: Michal Gregor, Jiri Polcar, Petr Horejsi, Michal Simon

Abstract:

Machine visualization is an area of interest with fast and progressive development. We present a method of machine visualization which will be applicable in real industrial conditions according to current needs and demands. Real factory data were obtained in a newly built research plant. Methods described in this paper were validated on a case study. Input data were processed and the virtual environment was created. The environment contains information about dimensions, structure, disposition, and function. Hardware was enhanced by modular machines, prototypes, and accessories. We added new functionalities and machines into the virtual environment. The user is able to interact with objects such as testing and cutting machines, he/she can operate and move them. Proposed design consists of an environment with two degrees of freedom of movement. Users are in touch with items in the virtual world which are embedded into the real surroundings. This paper describes the development of the virtual environment. We compared and tested various options of factory layout virtualization and visualization. We analyzed possibilities of using a 3D scanner in the layout obtaining process and we also analyzed various virtual reality hardware visualization methods such as Stereoscopic (CAVE) projection, Head Mounted Display (HMD), and augmented reality (AR) projection provided by see-through glasses.

Keywords: augmented reality, spatial scanner, virtual environment, virtual reality

Procedia PDF Downloads 410
862 Travel Behavior Simulation of Bike-Sharing System Users in Kaoshiung City

Authors: Hong-Yi Lin, Feng-Tyan Lin

Abstract:

In a Bike-sharing system (BSS), users can easily rent bikes from any station in the city for mid-range or short-range trips. BSS can also be integrated with other types of transport system, especially Green Transportation system, such as rail transport, bus etc. Since BSS records time and place of each pickup and return, the operational data can reflect more authentic and dynamic state of user behaviors. Furthermore, land uses around docking stations are highly associated with origins and destinations for the BSS users. As urban researchers, what concerns us more is to take BSS into consideration during the urban planning process and enhance the quality of urban life. This research focuses on the simulation of travel behavior of BSS users in Kaohsiung. First, rules of users’ behavior were derived by analyzing operational data and land use patterns nearby docking stations. Then, integrating with Monte Carlo method, these rules were embedded into a travel behavior simulation model, which was implemented by NetLogo, an agent-based modeling tool. The simulation model allows us to foresee the rent-return behaviour of BSS in order to choose potential locations of the docking stations. Also, it can provide insights and recommendations about planning and policies for the future BSS.

Keywords: agent-based model, bike-sharing system, BSS operational data, simulation

Procedia PDF Downloads 334
861 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians

Authors: Sultan Aldaihani, Eiman Al-Fadhli

Abstract:

Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.

Keywords: academic libraries, internet of things, information resources, information services

Procedia PDF Downloads 153
860 Comparative Study on Manet Using Soft Computing Techniques

Authors: Amarjit Singh, Tripatdeep Singh Dua, Vikas Attri

Abstract:

Mobile Ad-hoc Network is a combination of several nodes that create dynamically a specific network without using any base infrastructure. In this study all the mobile nodes can depended upon each other to send any data. Mobile host can pick up data and forwarding to their destination path. Basically MANET depend upon their Quality of Service which is highly constraints to the user. To give better services we need to improve the QOS. In these days MANET QOS requirement to use soft computing techniques. These techniques depend upon their specific requirement and which exists using MANET concepts. Using a soft computing techniques various protocol and algorithms may be considered. In this paper, we provide comparative study review of existing work done in MANET using various kind of soft computing techniques. Our review research is based on their specific protocol or algorithm which provide concern solution of QOS need. We discuss about various protocol through which routing in MANET. In Second section we clear the concepts of Soft Computing and their types. In third section we review the MANET using different kind of soft computing techniques work done before. In forth section we need to understand the concept of QoS requirement which exists in MANET and we done comparative study on different protocol used before and last we conclude the purpose of using MANET with soft computing techniques metrics.

Keywords: mobile ad-hoc network, fuzzy improved genetic approach, neural network, routing protocol, wireless mesh network

Procedia PDF Downloads 351
859 Intrusion Detection in Computer Networks Using a Hybrid Model of Firefly and Differential Evolution Algorithms

Authors: Mohammad Besharatloo

Abstract:

Intrusion detection is an important research topic in network security because of increasing growth in the use of computer network services. Intrusion detection is done with the aim of detecting the unauthorized use or abuse in the networks and systems by the intruders. Therefore, the intrusion detection system is an efficient tool to control the user's access through some predefined regulations. Since, the data used in intrusion detection system has high dimension, a proper representation is required to show the basis structure of this data. Therefore, it is necessary to eliminate the redundant features to create the best representation subset. In the proposed method, a hybrid model of differential evolution and firefly algorithms was employed to choose the best subset of properties. In addition, decision tree and support vector machine (SVM) are adopted to determine the quality of the selected properties. In the first, the sorted population is divided into two sub-populations. These optimization algorithms were implemented on these sub-populations, respectively. Then, these sub-populations are merged to create next repetition population. The performance evaluation of the proposed method is done based on KDD Cup99. The simulation results show that the proposed method has better performance than the other methods in this context.

Keywords: intrusion detection system, differential evolution, firefly algorithm, support vector machine, decision tree

Procedia PDF Downloads 94
858 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm

Authors: Sukhleen Kaur

Abstract:

In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.

Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper

Procedia PDF Downloads 414
857 Scrum Challenges and Mitigation Practices in Global Software Development of an Integrated Learning Environment: Case Study of Science, Technology, Innovation, Mathematics, Engineering for the Young

Authors: Evgeniia Surkova, Manal Assaad, Hleb Makeyeu, Juho Makio

Abstract:

The main objective of STIMEY (Science, Technology, Innovation, Mathematics, Engineering for the Young) project is the delivery of a hybrid learning environment that combines multi-level components such as social media concepts, robotic artefacts, and radio, among others. It is based on a well-researched pedagogical framework to attract European youths to STEM (science, technology, engineering, and mathematics) education and careers. To develop and integrate these various components, STIMEY is executed in iterative research cycles leading to progressive improvements. Scrum was the development methodology of choice in the project, as studies indicated its benefits as an agile methodology in global software development, especially of e-learning and integrated learning projects. This paper describes the project partners’ experience with the Scrum framework, discussing the challenges faced in its implementation and the mitigation practices employed. The authors conclude with exploring user experience tools and principles for future research, as a novel direction in supporting the Scrum development team.

Keywords: e-learning, global software development, scrum, STEM education

Procedia PDF Downloads 179
856 An Analysis of Insulation Defects in TRNC: The Case of Toros Dormitory of Eastern Mediterranean University

Authors: Arash Imani Fooladi

Abstract:

In recent years, with the growing population and decrease in the amount of non-renewable energy supplies, which is caused by the uncontrolled energy use, the world witnesses air pollution and destruction of the natural resources. Most of the buildings which are constructed in order to inhabit this great amount of population have minimum facilities. With the passing time researchers began to feel anxious about increase in the amount of energy which people are continuously using and they tried to find some ways to solve it. One of the methods, which human being has used all during the history, was considering the orientation, size, form and shape of the building during design process and trying to take advantage of the methods which his ancestors used in order to make buildings thermally comfortable. In the last forty years with the development of building materials a new way of conserving energy, called insulation, was invented. In North Cyprus, with its adverse weather condition (hot and dry summers and rainy winters) no method was used to make buildings thermally comfortable. This fact leads to wasting a noticeable amount of energy for heating and cooling the buildings. The main aim of this article is to evaluate the defects of insulation in North Cyprus and to introduce some suggestions to improve the current defects of insulation. Therefore, this paper focuses on the Toros dormitory and the construction firms in TRNC. Toros Dormitory is situated in North Cyprus and it is one of the dormitories of Eastern Mediterranean University. Lots of problems are observed with its insulation. Forty students who inhabit in this dormitory are selected randomly in order to study these defects. Close ended questionnaires are used to find out the level of satisfaction of these students on the subject. Furthermore, eight constructors in North Cyprus are selected to study their level of satisfaction, the most important factors for choosing an insulation type and the material they often use as insulation. The results demonstrated that most of the students in the dormitory are not satisfied with the thermal conditions. Constructors are also unsatisfied with the insulating conditions in TRNC. They claimed that polystyrene which is commonly used is not the proper material for insulation in this area. Finally ICF system is evaluated, it is a new system of construction which also works as an insulation and recently it is being used all over the world. The material is suggested as a proper insulation type for North Cyprus.

Keywords: thermal comfort, insulation, building envelop, hot and humid climate, ICF system

Procedia PDF Downloads 343
855 Comparative Study of Various Wall Finishes in Buildings in Ondo State, Nigeria

Authors: Ayodele Oluwole Alejo

Abstract:

Wall finishes are the term to describe an application over a wall surface to provide a suitable surface. Wall finishes are smelt, touched and seen by building occupiers even colour and design affects the user psychology and the atmosphere of our building. Building users/owners seem not to recognize the function of various wall finishes in building and factors to be considered in selecting them suitable for the type and purpose of proposed buildings. Therefore, defects such as deterioration, dampness, and stain may occur when comparisons of wall finishes are not made before the selection of appropriate materials at the design stage with knowledge of the various factors that may hinder the performance or maintenance culture of proposed building of a particular location. This research work investigates and compares various wall finishes in building. Buildings in Ondo state, Nigeria were used as the target area to conduct the research works. The factors bearing on various wall finishes were analyzed to find out their individual and collective impact using suitable analytical tools. The findings revealed that paint with high percentage score was the most preferred wall finishes, whereas wall paper was ranked the least by the respondent findings, Factors considered most in the selection of wall finishes was durability with the highest ranking percentage and least was the cost. The study recommends that skilled worker should carry out operations, quality product should be used and all of wall finishes and materials should be considered before selection.

Keywords: building, construction, design, finishes, wall

Procedia PDF Downloads 139
854 Online Handwritten Character Recognition for South Indian Scripts Using Support Vector Machines

Authors: Steffy Maria Joseph, Abdu Rahiman V, Abdul Hameed K. M.

Abstract:

Online handwritten character recognition is a challenging field in Artificial Intelligence. The classification success rate of current techniques decreases when the dataset involves similarity and complexity in stroke styles, number of strokes and stroke characteristics variations. Malayalam is a complex south indian language spoken by about 35 million people especially in Kerala and Lakshadweep islands. In this paper, we consider the significant feature extraction for the similar stroke styles of Malayalam. This extracted feature set are suitable for the recognition of other handwritten south indian languages like Tamil, Telugu and Kannada. A classification scheme based on support vector machines (SVM) is proposed to improve the accuracy in classification and recognition of online malayalam handwritten characters. SVM Classifiers are the best for real world applications. The contribution of various features towards the accuracy in recognition is analysed. Performance for different kernels of SVM are also studied. A graphical user interface has developed for reading and displaying the character. Different writing styles are taken for each of the 44 alphabets. Various features are extracted and used for classification after the preprocessing of input data samples. Highest recognition accuracy of 97% is obtained experimentally at the best feature combination with polynomial kernel in SVM.

Keywords: SVM, matlab, malayalam, South Indian scripts, onlinehandwritten character recognition

Procedia PDF Downloads 576
853 Information Technology Pattern for Traceability to Increase the Exporting Efficiency of Thailand’s Orchid

Authors: Pimploi Tirastittam, Phutthiwat Waiyawuththanapoom, Manop Tirastittam

Abstract:

Traceability system is one of the tools which can ensure the product’s confident of the consumer as it can trace the product back to its origin and can reduce the operation cost of recall. Nowadays, there are so many technologies which can be applied to the traceability system and also able to increase the efficiency of the system such as QR Code, barcode, GS1 and GTIN. As the result, this research is aimed to study and design the information technology pattern that suits for the traceability of Thailand’s orchid because Thailand’s orchid is the popular export product for Japan, USA, China, Netherlands and Italy. This study will enhance the value of Thailand’s orchid and able to prevent the unexpected event of the defects or damaged product. The traceability pattern was received IOC test from 12 experts from 4 fields of study which are traceability field, information technology field, information communication technology field and orchid export field. The result of the in-depth interview and questionnaire showed that the technology which most compatibility with the traceability system is the QR code. The mean of the score was 4.25 and the standard deviation was 0.5 as the QR code is the new technology and user-friendly. The traceability system should start from the farm to the consumer in the consuming country as the traceability system will enhance the quality level of the product and increase the value of its as well. The other outcome from this research is the supply chain model of Thailand’s Orchid along with the system architecture and working system diagram.

Keywords: exporting, information technology pattern, orchid, traceability

Procedia PDF Downloads 225
852 Na Doped ZnO UV Filters with Reduced Photocatalytic Activity for Sunscreen Application

Authors: Rafid Mueen, Konstantin Konstantinov, Micheal Lerch, Zhenxiang Cheng

Abstract:

In the past two decades, the concern for skin protection from ultraviolet (UV) radiation has attracted considerable attention due to the increased intensity of UV rays that can reach the Earth’s surface as a result of the breakdown of ozone layer. Recently, UVA has also attracted attention, since, in comparison to UVB, it can penetrate deeply into the skin, which can result in significant health concerns. Sunscreen agents are one of the significant tools to protect the skin from UV irradiation, and it is either organic or in organic. Developing of inorganic UV blockers is essential, which provide efficient UV protection over a wide spectrum rather than organic filters. Furthermore inorganic UV blockers are good comfort, and high safety when applied on human skin. Inorganic materials can absorb, reflect, or scatter the ultraviolet radiation, depending on their particle size, unlike the organic blockers, which absorb the UV irradiation. Nowadays, most inorganic UV-blocking filters are based on (TiO2) and ZnO). ZnO can provide protection in the UVA range. Indeed, ZnO is attractive for in sunscreen formulization, and this relates to many advantages, such as its modest refractive index (2.0), absorption of a small fraction of solar radiation in the UV range which is equal to or less than 385 nm, its high probable recombination of photogenerated carriers (electrons and holes), large direct band gap, high exciton binding energy, non-risky nature, and high tendency towards chemical and physical stability which make it transparent in the visible region with UV protective activity. A significant issue for ZnO use in sunscreens is that it can generate ROS in the presence of UV light because of its photocatalytic activity. Therefore it is essential to make a non-photocatalytic material through modification by other metals. Several efforts have been made to deactivate the photocatalytic activity of ZnO by using inorganic surface modifiers. The doping of ZnO by different metals is another way to modify its photocatalytic activity. Recently, successful doping of ZnO with different metals such as Ce, La, Co, Mn, Al, Li, Na, K, and Cr by various procedures, such as a simple and facile one pot water bath, co-precipitation, hydrothermal, solvothermal, combustion, and sol gel methods has been reported. These materials exhibit greater performance than undoped ZnO towards increasing the photocatalytic activity of ZnO in visible light. Therefore, metal doping can be an effective technique to modify the ZnO photocatalytic activity. However, in the current work, we successfully reduce the photocatalytic activity of ZnO through Na doped ZnO fabricated via sol-gel and hydrothermal methods.

Keywords: photocatalytic, ROS, UVA, ZnO

Procedia PDF Downloads 144
851 Finite Element Method for Modal Analysis of FGM

Authors: S. J. Shahidzadeh Tabatabaei, A. M. Fattahi

Abstract:

Modal analysis of a FGM plate containing the ceramic phase of Al2O3 and metal phase of stainless steel 304 was performed using ABAQUS, with the assumptions that the material has an elastic mechanical behavior and its Young modulus and density are varying in thickness direction. For this purpose, a subroutine was written in FOTRAN and linked with ABAQUS. First, a simulation was performed in accordance to other researcher’s model, and then after comparing the obtained results, the accuracy of the present study was verified. The obtained results for natural frequency and mode shapes indicate good performance of user-written subroutine as well as FEM model used in present study. After verification of obtained results, the effect of clamping condition and the material type (i.e. the parameter n) was investigated. In this respect, finite element analysis was carried out in fully clamped condition for different values of n. The results indicate that the natural frequency decreases with increase of n, since with increase of n, the amount of ceramic phase in FGM plate decreases, while the amount of metal phase increases, leading to decrease of the plate stiffness and hence, natural frequency, as the Young modulus of Al2O3 is equal to 380 GPa and the Young modulus of stainless steel 304 is equal to 207 GPa.

Keywords: FGM plates, modal analysis, natural frequency, finite element method

Procedia PDF Downloads 317
850 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 120
849 A Method for Identifying Unusual Transactions in E-commerce Through Extended Data Flow Conformance Checking

Authors: Handie Pramana Putra, Ani Dijah Rahajoe

Abstract:

The proliferation of smart devices and advancements in mobile communication technologies have permeated various facets of life with the widespread influence of e-commerce. Detecting abnormal transactions holds paramount significance in this realm due to the potential for substantial financial losses. Moreover, the fusion of data flow and control flow assumes a critical role in the exploration of process modeling and data analysis, contributing significantly to the accuracy and security of business processes. This paper introduces an alternative approach to identify abnormal transactions through a model that integrates both data and control flows. Referred to as the Extended Data Petri net (DPNE), our model encapsulates the entire process, encompassing user login to the e-commerce platform and concluding with the payment stage, including the mobile transaction process. We scrutinize the model's structure, formulate an algorithm for detecting anomalies in pertinent data, and elucidate the rationale and efficacy of the comprehensive system model. A case study validates the responsive performance of each system component, demonstrating the system's adeptness in evaluating every activity within mobile transactions. Ultimately, the results of anomaly detection are derived through a thorough and comprehensive analysis.

Keywords: database, data analysis, DPNE, extended data flow, e-commerce

Procedia PDF Downloads 57
848 Study the Impact of Welding Poles Type on the Tensile Strength Steel of Low Alloys and High Resistance

Authors: Abdulmagid A. Khattabi, Abdul Fatah M. Emhamed

Abstract:

The steel alloy Introduced after becoming carbon-steel does not meet the requirements of engineering industry; and it cannot be obtained tensile strength from carbon-steel higher than (700MPa), the low alloy steel enters in a lot of heavy engineering equipment parts, molds, agricultural equipment and other industry. In addition, that may be exposed to in-service failure, which may require returned to work, to do the repairs or maintenance by one of the welding methods available. The ability of steel weld determined through palpation of the cracks, which can reduce by many ways. These ways are often expensive and difficult to implement, perhaps the control to choose the type of electrode welding user is one of the easiest and least expensive applications. It has been welding the steel low alloys high resistance by manual metal arc (MMA), and by using a set of welding electrodes which varying in chemical composition and in their prices as well and test their effect on tensile strength. Results showed that using the poles of welding, which have a high proportion of iron powder and low hydrogen. The Tensile resistance is (484MPa) and the weld joint efficiency was (56.9%), but when (OK 47.04) electrode was used the tensile strength increased to (720MPa) and the weld joint efficiency to (84.7%). Using the cheapest electrode (OK 45.00) the weld joint efficiency did not exceed (24.2%), but when using the most expensive electrode (OK 91.28) the weld joint efficiency is (38.1%).

Keywords: steel low alloys high resistance, electrodes welding, tensile test

Procedia PDF Downloads 319
847 Integrating Knowledge into Health Care Systems: A Case Study Investigation on UAE Health Care

Authors: Alya Al Ghufli, Kelaithim Al Tunaiji, Sara Al Ali, Khalid Samara

Abstract:

It is well known that health care systems encompass a variety of key knowledge sources that need to be integrated and shared amongst all types of users to attain higher-levels of motivation and productivity. The development of Health Integrated Systems (HIS) is often seen as a crucial step in strengthening the integration of knowledge to help serve the information needs of health care users. As an emergent economy, the United Arab Emirates (UAE) is regarded as a new arrival in the area of health information systems. As a new nation, there may be several challenges in terms of organisational climate and the sufficient skills and knowledge activities for effective use of HIS. In this regard, the lack of coordination, attitudes and practice of health-related systems can eventually result in unnecessary data and generally poor use of the system. This paper includes results from a qualitative preliminary study carried out from a case study investigation in a single large primary health care organisation in the United Arab Emirates (UAE) comprising various health care users. The study explored health care user’s perceptions about health integration and the impact it has on their practice. The main sources of information were semi-structured interviews and non-obtrusive observations. The authors conclude by presenting various recommendations for the development of HIS and knowledge activities and areas for further study.

Keywords: health integrated systems, knowledge sharing, knowledge activities, health information systems

Procedia PDF Downloads 437
846 Improving Decision-Making in Multi-Project Environments within Organizational Information Systems Using Blockchain Technology

Authors: Seyed Hossein Iranmanesh, Hassan Nouri, Seyed Reza Iranmanesh

Abstract:

In the dynamic and complex landscape of today’s business, organizations often face challenges in impactful decision-making across multi-project settings. To efficiently allocate resources, coordinate tasks, and optimize project outcomes, establishing robust decision-making processes is essential. Furthermore, the increasing importance of information systems and their integration within organizational workflows introduces an additional layer of complexity. This research proposes the use of blockchain technology as a suitable solution to enhance decision-making in multi-project environments, particularly within the realm of information systems. The conceptual framework in this study comprises four independent variables and one dependent variable. The identified independent variables for the targeted research include: Blockchain Layer in Integrated Systems, Quality of Generated Information ,User Satisfaction with Integrated Systems and Utilization of Integrated Systems. The project’s performance, considered as the dependent variable and moderated by organizational policies and procedures, reflects the impact of blockchain technology adoption on organizational effectiveness1. The results highlight the significant influence of blockchain implementation on organizational performance.

Keywords: multi-project environments, decision support systems, information systems, blockchain technology, decentralized systems.

Procedia PDF Downloads 60
845 Advanced Technologies for Detector Readout in Particle Physics

Authors: Y. Venturini, C. Tintori

Abstract:

Given the continuous demand for improved readout performances in particle and dark matter physics, CAEN SpA is pushing on the development of advanced technologies for detector readout. We present the Digitizers 2.0, the result of the success of the previous Digitizers generation, combined with expanded capabilities and a renovation of the user experience introducing the open FPGA. The first product of the family is the VX2740 (64 ch, 125 MS/s, 16 bit) for advanced waveform recording and Digital Pulse Processing, fitting with the special requirements of Dark Matter and Neutrino experiments. In parallel, CAEN is developing the FERS-5200 platform, a Front-End Readout System designed to read out large multi-detector arrays, such as SiPMs, multi-anode PMTs, silicon strip detectors, wire chambers, GEM, gas tubes, and others. This is a highly-scalable distributed platform, based on small Front-End cards synchronized and read out by a concentrator board, allowing to build extremely large experimental setup. We plan to develop a complete family of cost-effective Front-End cards tailored to specific detectors and applications. The first one available is the A5202, a 64-channel unit for SiPM readout based on CITIROC ASIC by Weeroc.

Keywords: dark matter, digitizers, front-end electronics, open FPGA, SiPM

Procedia PDF Downloads 129
844 Comprehensive Review of Adversarial Machine Learning in PDF Malware

Authors: Preston Nabors, Nasseh Tabrizi

Abstract:

Portable Document Format (PDF) files have gained significant popularity for sharing and distributing documents due to their universal compatibility. However, the widespread use of PDF files has made them attractive targets for cybercriminals, who exploit vulnerabilities to deliver malware and compromise the security of end-user systems. This paper reviews notable contributions in PDF malware detection, including static, dynamic, signature-based, and hybrid analysis. It presents a comprehensive examination of PDF malware detection techniques, focusing on the emerging threat of adversarial sampling and the need for robust defense mechanisms. The paper highlights the vulnerability of machine learning classifiers to evasion attacks. It explores adversarial sampling techniques in PDF malware detection to produce mimicry and reverse mimicry evasion attacks, which aim to bypass detection systems. Improvements for future research are identified, including accessible methods, applying adversarial sampling techniques to malicious payloads, evaluating other models, evaluating the importance of features to malware, implementing adversarial defense techniques, and conducting comprehensive examination across various scenarios. By addressing these opportunities, researchers can enhance PDF malware detection and develop more resilient defense mechanisms against adversarial attacks.

Keywords: adversarial attacks, adversarial defense, adversarial machine learning, intrusion detection, PDF malware, malware detection, malware detection evasion

Procedia PDF Downloads 40
843 Other End of the Leash: The Volunteer Handlers Perspective of Animal-Assisted Interventions

Authors: Julie A. Carberry, Victor Maddalena

Abstract:

Animal-Assisted Interventions (AAIs) have existed in various forms for centuries. In the past 30 years, there has been a dramatic increase in popularity. AAIs are now part of the lives of persons of all ages in many types of institutions. Anecdotal evidence of the benefits of AAIs have led to widespread adoption, yet there remains a lack of solid research base for support. The research question was, what are the lived experiences of AAI volunteer handlers are? An interpretive phenomenological methodology was used for this qualitative study. Data were collected from 1 - 2 hour-long semi-structured interviews and 1 observational field visit. All interviews were conducted, transcribed, and coded for themes by the principal investigator. Participants must have been an active St. John Ambulance Therapy Dog Program volunteer for a least one year. In total, 14 volunteer handlers, along with some of their dogs, were included. The St. John Ambulance is a not for profit organization that provides training and community services to Canadians. The Therapy Dog Program is 1 of the 4 nationally recognized core community service programs. The program incorporates dogs in the otherwise traditional therapeutic intervention of friendly visitation with clients. The lack of formal objectives and goals, and a trained therapist defines the program as an Animal-Assisted Activity (AAA), which is a type of AAI. Since the animals incorporated are dogs, the program is specifically a Canine-Assisted Activity (CAA), which is a type of Canine-Assisted Intervention (CAI). Six themes emerged from the analysis of the data: (a) a win-win-win situation for all parties involved – volunteer handlers, clients, and the dogs, (b) being on the other end of the leash: functions of the role of volunteer handler, (c) the importance of socialization: from spreading smiles to creating meaningful connections, (d) the role of the dog: initiating interaction and providing comfort, (e) an opportunity to feel good and destress, and (f) altruism versus personal rewards. Other insights were found regarding the program, clients, and staff. Possible implications from this research include increased organizational recruitment and retention of volunteer handlers and as well as increased support for CAAs and other CAIs that incorporate teams of volunteer handlers and their dogs. This support could, in turn, add overall support for the acceptance and broad implementation of AAIs as an alternative and or complementary non-pharmaceutical therapeutic intervention.

Keywords: animal-assisted activity, animal-assisted intervention, canine-assisted activity, canine-assisted intervention, perspective, qualitative, volunteer handler

Procedia PDF Downloads 139
842 Field-Programmable Gate Array Based Tester for Protective Relay

Authors: H. Bentarzi, A. Zitouni

Abstract:

The reliability of the power grid depends on the successful operation of thousands of protective relays. The failure of one relay to operate as intended may lead the entire power grid to blackout. In fact, major power system failures during transient disturbances may be caused by unnecessary protective relay tripping rather than by the failure of a relay to operate. Adequate relay testing provides a first defense against false trips of the relay and hence improves power grid stability and prevents catastrophic bulk power system failures. The goal of this research project is to design and enhance the relay tester using a technology such as Field Programmable Gate Array (FPGA) card NI 7851. A PC based tester framework has been developed using Simulink power system model for generating signals under different conditions (faults or transient disturbances) and LabVIEW for developing the graphical user interface and configuring the FPGA. Besides, the interface system has been developed for outputting and amplifying the signals without distortion. These signals should be like the generated ones by the real power system and large enough for testing the relay’s functionality. The signals generated that have been displayed on the scope are satisfactory. Furthermore, the proposed testing system can be used for improving the performance of protective relay.

Keywords: amplifier class D, field-programmable gate array (FPGA), protective relay, tester

Procedia PDF Downloads 217
841 Using IoT on Single Input Multiple Outputs (SIMO) DC–DC Converter to Control Smart-home

Authors: Auwal Mustapha Imam

Abstract:

The aim of the energy management system is to monitor and control utilization, access, optimize and manage energy availability. This can be realized through real-time analyses and energy sources and loads data control in a predictive way. Smart-home monitoring and control provide convenience and cost savings by controlling appliances, lights, thermostats and other loads. There may be different categories of loads in the various homes, and the homeowner may wish to control access to solar-generated energy to protect the storage from draining completely. Controlling the power system operation by managing the converter output power and controlling how it feeds the appliances will satisfy the residential load demand. The Internet of Things (IoT) provides an attractive technological platform to connect the two and make home automation and domestic energy utilization easier and more attractive. This paper presents the use of IoT-based control topology to monitor and control power distribution and consumption by DC loads connected to single-input multiple outputs (SIMO) DC-DC converter, thereby reducing leakages, enhancing performance and reducing human efforts. A SIMO converter was first developed and integrated with the IoT/Raspberry Pi control topology, which enables the user to monitor and control power scheduling and load forecasting via an Android app.

Keywords: flyback, converter, DC-DC, photovoltaic, SIMO

Procedia PDF Downloads 49
840 The Use of Rule-Based Cellular Automata to Track and Forecast the Dispersal of Classical Biocontrol Agents at Scale, with an Application to the Fopius arisanus Fruit Fly Parasitoid

Authors: Agboka Komi Mensah, John Odindi, Elfatih M. Abdel-Rahman, Onisimo Mutanga, Henri Ez Tonnang

Abstract:

Ecosystems are networks of organisms and populations that form a community of various species interacting within their habitats. Such habitats are defined by abiotic and biotic conditions that establish the initial limits to a population's growth, development, and reproduction. The habitat’s conditions explain the context in which species interact to access resources such as food, water, space, shelter, and mates, allowing for feeding, dispersal, and reproduction. Dispersal is an essential life-history strategy that affects gene flow, resource competition, population dynamics, and species distributions. Despite the importance of dispersal in population dynamics and survival, understanding the mechanism underpinning the dispersal of organisms remains challenging. For instance, when an organism moves into an ecosystem for survival and resource competition, its progression is highly influenced by extrinsic factors such as its physiological state, climatic variables and ability to evade predation. Therefore, greater spatial detail is necessary to understand organism dispersal dynamics. Understanding organisms dispersal can be addressed using empirical and mechanistic modelling approaches, with the adopted approach depending on the study's purpose Cellular automata (CA) is an example of these approaches that have been successfully used in biological studies to analyze the dispersal of living organisms. Cellular automata can be briefly described as occupied cells by an individual that evolves based on proper decisions based on a set of neighbours' rules. However, in the ambit of modelling individual organisms dispersal at the landscape scale, we lack user friendly tools that do not require expertise in mathematical models and computing ability; such as a visual analytics framework for tracking and forecasting the dispersal behaviour of organisms. The term "visual analytics" (VA) describes a semiautomated approach to electronic data processing that is guided by users who can interact with data via an interface. Essentially, VA converts large amounts of quantitative or qualitative data into graphical formats that can be customized based on the operator's needs. Additionally, this approach can be used to enhance the ability of users from various backgrounds to understand data, communicate results, and disseminate information across a wide range of disciplines. To support effective analysis of the dispersal of organisms at the landscape scale, we therefore designed Pydisp which is a free visual data analytics tool for spatiotemporal dispersal modeling built in Python. Its user interface allows users to perform a quick and interactive spatiotemporal analysis of species dispersal using bioecological and climatic data. Pydisp enables reuse and upgrade through the use of simple principles such as Fuzzy cellular automata algorithms. The potential of dispersal modeling is demonstrated in a case study by predicting the dispersal of Fopius arisanus (Sonan), endoparasitoids to control Bactrocera dorsalis (Hendel) (Diptera: Tephritidae) in Kenya. The results obtained from our example clearly illustrate the parasitoid's dispersal process at the landscape level and confirm that dynamic processes in an agroecosystem are better understood when designed using mechanistic modelling approaches. Furthermore, as demonstrated in the example, the built software is highly effective in portraying the dispersal of organisms despite the unavailability of detailed data on the species dispersal mechanisms.

Keywords: cellular automata, fuzzy logic, landscape, spatiotemporal

Procedia PDF Downloads 79
839 Application of the Global Optimization Techniques to the Optical Thin Film Design

Authors: D. Li

Abstract:

Optical thin films are used in a wide variety of optical components and there are many software tools programmed for advancing multilayer thin film design. The available software packages for designing the thin film structure may not provide optimum designs. Normally, almost all current software programs obtain their final designs either from optimizing a starting guess or by technique, which may or may not involve a pseudorandom process, that give different answers every time, depending upon the initial conditions. With the increasing power of personal computers, functional methods in optimization and synthesis of optical multilayer systems have been developed such as DGL Optimization, Simulated Annealing, Genetic Algorithms, Needle Optimization, Inductive Optimization and Flip-Flop Optimization. Among these, DGL Optimization has proved its efficiency in optical thin film designs. The application of the DGL optimization technique to the design of optical coating is presented. A DGL optimization technique is provided, and its main features are discussed. Guidelines on the application of the DGL optimization technique to various types of design problems are given. The innovative global optimization strategies used in a software tool, OnlyFilm, to optimize multilayer thin film designs through different filter designs are outlined. OnlyFilm is a powerful, versatile, and user-friendly thin film software on the market, which combines optimization and synthesis design capabilities with powerful analytical tools for optical thin film designers. It is also the only thin film design software that offers a true global optimization function.

Keywords: optical coatings, optimization, design software, thin film design

Procedia PDF Downloads 316
838 A Mathematical Analysis of Behavioural Epidemiology: Drugs Users Transmission Dynamics Based on Level Education for Susceptible Population

Authors: Firman Riyudha, Endrik Mifta Shaiful

Abstract:

The spread of drug users is one kind of behavioral epidemiology that becomes a threat to every country in the world. This problem caused various crisis simultaneously, including financial or economic crisis, social, health, until human crisis. Most drug users are teenagers at school age. A new deterministic model would be constructed to determine the dynamics of the spread of drug users by considering level of education in a susceptible population. Based on the analytical model, two equilibria points were obtained; there were E₀ (zero user) and E₁ (endemic equilibrium). Existence of equilibrium and local stability of equilibria depended on the Basic Reproduction Ratio (R₀). This parameter was defined as the expected rate of secondary prevalence and primary prevalence in virgin population along spreading primary prevalence. The zero-victim equilibrium would be locally asymptotically stable if R₀ < 1 while if R₀ > 1 the endemic equilibrium would be locally asymptotically stable. The result showed that R₀ was proportional to the rate of interaction of each susceptible population based on educational level with the users' population. It is concluded that there was a need to be given a control in interaction, so that drug users population could be minimized. Numerical simulations were also provided to support analytical results.

Keywords: drugs users, level education, mathematical model, stability

Procedia PDF Downloads 476
837 The Study of Self-Management of Stress (SMS) of Yoga Program for Pregnant Women in Early Pregnancy in Taiwan

Authors: Shau-Ping Shiu, Shu-Ling Lin

Abstract:

Pregnancy lead a process of changing in the endocrine system. Either pregnancy itself or the surrounding affect such as the attitude of family to the pregnant lady can bring lots of stress. Sever stress may lead pregnant women display serious mental problem such as mood swings, impulsivity, and abnormal behavior. A method of self management of stress(SMS) has been proved that help patient of cancer in release their stress. This study were going to use SMS to help pregnant women. Methods: In this study, 42 ladies in the first to third months of pregnancy process applied to join SMS of program have divided into 21 participants in both control and experimental group by draw. 24 sessions of Yoga program were conducted once a week for 6 months for experimental group. Verbatim used to gather more feedbacks from the interview followed by each Yoga sessions. Brief symptom Rating scale also conducted pre and post experiment for 42 participations. Results: Overall score of Brief Symptom Rating Scale reduced 17.82 points and suicide drop 9 points in experimental group, compared to the control group increasing 10.24 point of overall score and suicide add 7 points. Feedback from interviews showed participations improved in emotion, physical health and stress management. They indicated having more positive emotion daily, having better gastrointestinal peristalsis movement, releasing back tention, well weight control, reducing stress and changing the quality of interpersonal relationships. Conclusion: SMS of Yoga program in this study included four key training directions which were stimulation, relaxation, awareness and pranayama lead a great improvment of stress management for pregnant lady. Throughout this Yoga program, women learned to ignite eustress, remove distress, create calmness and breath slows down. As the result, Yoga program has helped women in experiment group lower their tension, and bring the extra benifits in emotion and relationships. It support women to overcome their pregnancy. Suggestion: An unexpected result of this study showed all participants had no morning sickness since they engaged in SMS program, and no one absent from course due to the benefits of it. We strongly suggest that SMS of Yoga program can be a add of medication for women in pregnancy, however, the position of Forward in the SMS sequence has been point out pressing participant’s stomach, which can be replace to Bridge position to comfort participants.

Keywords: self-management of stress(SMS), yoga program, pregnant women, early pregnancy

Procedia PDF Downloads 330
836 Application of Natural Dyes on Polyester and Polyester-Cellulosic Blended Fabrics

Authors: Deepali Rastogi, Akanksha Rastogi

Abstract:

Comfort and safety are two essential factors in a newborn’s clothing. Natural dyes are considered safe for infant clothes because they are non-toxic and have medicinal properties. Natural dyes are sensitive to pH and may show changes in hue under different pH conditions. Infant garments face treatments different than adult clothing, for instance, exposure to infant’s saliva, milk, and urine. The present study was designed to study the suitability of natural dyes for infant clothes. Cotton fabric was dyed using fifteen natural dyes and two mordants, alum, and ferrous sulphate. The dyed samples were assessed for colour fastness to washing, rubbing, perspiration and light. In addition, fastness to milk, saliva, and urine was also tested. Simulated solutions of saliva and urine were prepared for the study. For milk, one of the commercial formulations for infants was taken and used as per the directions. A wide gamut of colours was obtained after dyeing the cotton with different natural dyes and mordants. The colour strength of all the dyed samples was determined in terms of K/S values. Most of the ferrous sulphate mordanted dyes gave higher K/S values than alum mordanted samples. The wash fastness of dyed cotton fabrics ranged from 3/4 -5. Perspiration fastness test for the samples was done in both acidic and alkaline mediums. The ratings ranged from 3-5, with most of the dyes falling in the range of 4-5. The rubbing fastness of the dyed samples was tested in dry and wet conditions. The results showed excellent rub fastness ranging between 4-5. Light fastness was found to be good to moderate. The main food for infants is milk, and this becomes one of the main agents to spot infants' garments. All dyes showed excellent fastness properties against milk with a grey scale rating of 4-5. Fastness against saliva is recommended by various eco-labels, standards, and organizations for fabrics of infants or babies. The fastness of most of the dyes was found to be satisfactory against saliva. Infant garments get frequently soiled with urine. Most of the natural dyes on cotton fabric had good to excellent fastness to simulated urine. The grey scale ratings ranged from 3/4 – 5. Thus, it can be concluded that most of the natural dyes can be successfully used for infant wear and accessories and are fast to various liquids to which infant wear are exposed. Therefore, we can surround little ones with beautiful hues from nature's garden and clothe them in natural fibres dyed with natural dyes.

Keywords: fastness properties, infant wear, mordants, natural dyes

Procedia PDF Downloads 143