Search results for: road networks
1771 A Case from China on the Situation of Knowledge Management in Government
Authors: Qiaoyun Yang
Abstract:
Organizational scholars have paid enormous attention on how local governments manage their knowledge during the past two decades. Government knowledge management (KM) research recognizes that the management of knowledge flows and networks is critical to reforms on government service efficiency and the effect of administration. When dealing with complex affairs, all the limitations resulting from a lack of KM concept, processes and technologies among all the involved organizations begin to be exposed and further compound the processing difficulty of the affair. As a result, the challenges for individual or group knowledge sharing, knowledge digging and organizations’ collaboration in government's activities are diverse and immense. This analysis presents recent situation of government KM in China drawing from a total of more than 300 questionnaires and highlights important challenges that remain. The causes of the lapses in KM processes within and across the government agencies are discussed.Keywords: KM processes, KM technologies, government, KM situation
Procedia PDF Downloads 3621770 Fast Authentication Using User Path Prediction in Wireless Broadband Networks
Authors: Gunasekaran Raja, Rajakumar Arul, Kottilingam Kottursamy, Ramkumar Jayaraman, Sathya Pavithra, Swaminathan Venkatraman
Abstract:
Wireless Interoperability for Microwave Access (WiMAX) utilizes the IEEE 802.1X mechanism for authentication. However, this mechanism incurs considerable delay during handoffs. This delay during handoffs results in service disruption which becomes a severe bottleneck. To overcome this delay, our article proposes a key caching mechanism based on user path prediction. If the user mobility follows that path, the user bypasses the normal IEEE 802.1X mechanism and establishes the necessary authentication keys directly. Through analytical and simulation modeling, we have proved that our mechanism effectively decreases the handoff delay thereby achieving fast authentication.Keywords: authentication, authorization, and accounting (AAA), handoff, mobile, user path prediction (UPP) and user pattern
Procedia PDF Downloads 4051769 Integrated Gesture and Voice-Activated Mouse Control System
Authors: Dev Pratap Singh, Harshika Hasija, Ashwini S.
Abstract:
The project aims to provide a touchless, intuitive interface for human-computer interaction, enabling users to control their computers using hand gestures and voice commands. The system leverages advanced computer vision techniques using the Media Pipe framework and OpenCV to detect and interpret real-time hand gestures, transforming them into mouse actions such as clicking, dragging, and scrolling. Additionally, the integration of a voice assistant powered by the speech recognition library allows for seamless execution of tasks like web searches, location navigation, and gesture control in the system through voice commands.Keywords: gesture recognition, hand tracking, machine learning, convolutional neural networks, natural language processing, voice assistant
Procedia PDF Downloads 101768 Application of Neural Petri Net to Electric Control System Fault Diagnosis
Authors: Sadiq J. Abou-Loukh
Abstract:
The present work deals with implementation of Petri nets, which own the perfect ability of modeling, are used to establish a fault diagnosis model. Fault diagnosis of a control system received considerable attention in the last decades. The formalism of representing neural networks based on Petri nets has been presented. Neural Petri Net (NPN) reasoning model is investigated and developed for the fault diagnosis process of electric control system. The proposed NPN has the characteristics of easy establishment and high efficiency, and fault status within the system can be described clearly when compared with traditional testing methods. The proposed system is tested and the simulation results are given. The implementation explains the advantages of using NPN method and can be used as a guide for different online applications.Keywords: petri net, neural petri net, electric control system, fault diagnosis
Procedia PDF Downloads 4761767 Design and Development of an Algorithm to Predict Fluctuations of Currency Rates
Authors: Nuwan Kuruwitaarachchi, M. K. M. Peiris, C. N. Madawala, K. M. A. R. Perera, V. U. N Perera
Abstract:
Dealing with businesses with the foreign market always took a special place in a country’s economy. Political and social factors came into play making currency rate changes fluctuate rapidly. Currency rate prediction has become an important factor for larger international businesses since large amounts of money exchanged between countries. This research focuses on comparing the accuracy of mainly three models; Autoregressive Integrated Moving Average (ARIMA), Artificial Neural Networks(ANN) and Support Vector Machines(SVM). series of data import, export, USD currency exchange rate respect to LKR has been selected for training using above mentioned algorithms. After training the data set and comparing each algorithm, it was able to see that prediction in SVM performed better than other models. It was improved more by combining SVM and SVR models together.Keywords: ARIMA, ANN, FFNN, RMSE, SVM, SVR
Procedia PDF Downloads 2121766 Community Singing, a Pathway to Social Capital: A Cross-Cultural Comparative Assessment of the Benefits of Singing Communities in South Tyrol and South Africa
Authors: Johannes Van Der Sandt
Abstract:
This quantitative study investigates different approaches of community singing, in building social capital in South Tyrol, Italy, and South Africa. The impact of the various approaches of community singing is examined by investigating the main components of social capital, namely, social norms and obligations, social networks and associations and trust, and how these components are manifested in two different societies. The research is based on the premise that community singing is an important agent for the development of social capital. It seeks to establish in what form community singing can best enhance the social capital of communities in South Tyrol that are undergoing significant changes in the ways in which social capital is generally being generated on account of demographic, economic, technological and cultural changes. South Tyrol and South Africa share some similarities in the management of their multi-cultural composition. By comparing the different approaches to community singing in two multi-cultural societies, it is hoped to gain insight, and an understanding of the connections between culture, social cohesion, identity and therefore to be able to add to the understanding of the building of social capital through community singing. Participation in music contributes to the growth of social capital in communities, this is amongst others the finding of an ever increasing amount of research. In sociological discourses on social capital generation, the dimension of community music making is recognized as an important factor. Trust and mutual cooperation are products when people listen to each other, when they work or play together, and when they care about each other. This is how social capital develops as an important shared resource. Scholars of Community Music still do not agree on a short and concise definition for Community Music. For the purpose of this research, the author concurs with the definition of Community Music of the Community Music Activity commission of the International Society of Music Education as having the following characteristics: decentralization, accessibility, equal opportunity, and active participation in music-making. These principles are social and political ones, and there can be no doubt that community music activity is more than a purely musical one. Trust, shared norms and values civic and community involvement, networks, knowledge resources, contact with families and friends, and fellowship are key components in fostering group cohesion and social capital development in a community. The research will show that there is no better place for these factors to flourish than in a community singing group. Through this comparative study, it is the aim to identify, analyze and explain similarities and differences in approaches to community across societies that find themselves in a rapid transition from traditional cultural to global cultural habits characterized by a plurality of orientation points, with the aim to gain a better understanding of the various directions South Tyrolean singing culture can take.Keywords: community music, multicultural, singing, social capital
Procedia PDF Downloads 2831765 Path Planning for Collision Detection between two Polyhedra
Authors: M. Khouil, N. Saber, M. Mestari
Abstract:
This study aimed to propose, a different architecture of a Path Planning using the NECMOP. where several nonlinear objective functions must be optimized in a conflicting situation. The ability to detect and avoid collision is very important for mobile intelligent machines. However, many artificial vision systems are not yet able to quickly and cheaply extract the wealth information. This network, which has been particularly reviewed, has enabled us to solve with a new approach the problem of collision detection between two convex polyhedra in a fixed time (O (1) time). We used two types of neurons linear and threshold logic, which simplified the actual implementation of all the networks proposed. This article represents a comprehensive algorithm that determine through the AMAXNET network a measure (a mini-maximum point) in a fixed time, which allows us to detect the presence of a potential collision.Keywords: path planning, collision detection, convex polyhedron, neural network
Procedia PDF Downloads 4381764 Proposed Terminal Device for End-to-End Secure SMS in Cellular Networks
Authors: Neetesh Saxena, Narendra S. Chaudhari
Abstract:
Nowadays, SMS is a very popular mobile service and even the poor, illiterate people and those living in rural areas use SMS service very efficiently. Although many mobile operators have already started 3G and 4G services, 2G services are still being used by the people in many countries. In 2G (GSM), only encryption provided is between the MS and the BTS, there is no end-to-end encryption available. Sometimes we all need to send some confidential message to other person containing bank account number, some password, financial details, etc. Normally, a message is sent in plain text only to the recipient and it is not an acceptable standard for transmitting such important and confidential information. Authors propose an end-to-end encryption approach by proposing a terminal for sending/receiving a secure message. An asymmetric key exchange algorithm is used in order to transmit secret shared key securely to the recipient. The proposed approach with terminal device provides authentication, confidentiality, integrity and non-repudiation.Keywords: AES, DES, Diffie-Hellman, ECDH, A5, SMS
Procedia PDF Downloads 4171763 Improvement in Plasticity Index and Group Index of Black Cotton Soil Using Palm Kernel Shell Ash
Authors: Patel Darshan Shaileshkumar, M. G. Vanza
Abstract:
Black cotton soil is problematic soil for any construction work. Black cotton soil contains montmorillonite in its structure. Due to this mineral, black cotton soil will attain maximum swelling and shrinkage. Due to these volume changes, it is necessary to stabilize black cotton soil before the construction of the road. For soil stabilization use of pozzolanic waste is found to be a good solution by some researchers. The palm kernel shell ash (PKSA) is a pozzolanic material that can be used for soil stabilization. Basically, PKSA is a waste material, and it is available at a cheap cost. Palm kernel shell is a waste material generated in palm oil mills. Then palm kernel shell is used in industries instead of coal for power generation. After the burning of a palm kernel shell, ash is formed; the ash is called palm kernel shell ash (PKSA). The PKSA contains a free lime content that will react chemically with the silicate and aluminate of black cotton soil and forms a C-S-H and C-A-H gel which will bines soil particles together and reduce the plasticity of the soil. In this study, the PKSA is added to the soil. It was found that with the addition of PKSA content in the soil, the liquid limit of the soil is decreased, the plastic limit of the soil is increased, and the plasticity of the soil is decreased. The group index value of the soil is evaluated, and it was found that with the addition of PKSA GI value of the soil is decreased, which indicates the strength of the soil is improved.Keywords: palm kernel shell ash, black cotton soil, liquid limit, group index, plastic limit, plasticity index
Procedia PDF Downloads 1101762 Identification of Rice Quality Using Gas Sensors and Neural Networks
Authors: Moh Hanif Mubarok, Muhammad Rivai
Abstract:
The public's response to quality rice is very high. So it is necessary to set minimum standards in checking the quality of rice. Most rice quality measurements still use manual methods, which are prone to errors due to limited human vision and the subjectivity of testers. So, a gas detection system can be a solution that has high effectiveness and subjectivity for solving current problems. The use of gas sensors in testing rice quality must pay attention to several parameters. The parameters measured in this research are the percentage of rice water content, gas concentration, output voltage, and measurement time. Therefore, this research was carried out to identify carbon dioxide (CO₂), nitrous oxide (N₂O) and methane (CH₄) gases in rice quality using a series of gas sensors using the Neural Network method.Keywords: carbon dioxide, dinitrogen oxide, methane, semiconductor gas sensor, neural network
Procedia PDF Downloads 491761 Strategic Planning in South African Higher Education
Authors: Noxolo Mafu
Abstract:
This study presents an overview of strategic planning in South African higher education institutions by tracing its trends and mystique in order to identify its impact. Over the democratic decades, strategic planning has become integral to institutional survival. It has been used as a potent tool by several institutions to catch up and surpass counterparts. While planning has always been part of higher education, strategic planning should be considered different. Strategic planning is primarily about development and maintenance of a strategic fitting between an institution and its dynamic opportunities. This presupposes existence of sets of stages that institutions pursue of which, can be regarded for assessment of the impact of strategic planning in an institution. The network theory serves guides the study in demystifying apparent organisational networks in strategic planning processes.Keywords: network theory, strategy, planning, strategic planning, assessment, impact
Procedia PDF Downloads 5621760 Predicting Football Player Performance: Integrating Data Visualization and Machine Learning
Authors: Saahith M. S., Sivakami R.
Abstract:
In the realm of football analytics, particularly focusing on predicting football player performance, the ability to forecast player success accurately is of paramount importance for teams, managers, and fans. This study introduces an elaborate examination of predicting football player performance through the integration of data visualization methods and machine learning algorithms. The research entails the compilation of an extensive dataset comprising player attributes, conducting data preprocessing, feature selection, model selection, and model training to construct predictive models. The analysis within this study will involve delving into feature significance using methodologies like Select Best and Recursive Feature Elimination (RFE) to pinpoint pertinent attributes for predicting player performance. Various machine learning algorithms, including Random Forest, Decision Tree, Linear Regression, Support Vector Regression (SVR), and Artificial Neural Networks (ANN), will be explored to develop predictive models. The evaluation of each model's performance utilizing metrics such as Mean Squared Error (MSE) and R-squared will be executed to gauge their efficacy in predicting player performance. Furthermore, this investigation will encompass a top player analysis to recognize the top-performing players based on the anticipated overall performance scores. Nationality analysis will entail scrutinizing the player distribution based on nationality and investigating potential correlations between nationality and player performance. Positional analysis will concentrate on examining the player distribution across various positions and assessing the average performance of players in each position. Age analysis will evaluate the influence of age on player performance and identify any discernible trends or patterns associated with player age groups. The primary objective is to predict a football player's overall performance accurately based on their individual attributes, leveraging data-driven insights to enrich the comprehension of player success on the field. By amalgamating data visualization and machine learning methodologies, the aim is to furnish valuable tools for teams, managers, and fans to effectively analyze and forecast player performance. This research contributes to the progression of sports analytics by showcasing the potential of machine learning in predicting football player performance and offering actionable insights for diverse stakeholders in the football industry.Keywords: football analytics, player performance prediction, data visualization, machine learning algorithms, random forest, decision tree, linear regression, support vector regression, artificial neural networks, model evaluation, top player analysis, nationality analysis, positional analysis
Procedia PDF Downloads 381759 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 2891758 Floating Populations, Rooted Networks Tracing the Evolution of Russeifa City in Relation to Marka Refugee Camp
Authors: Dina Dahood Dabash
Abstract:
Refugee camps are habitually defined as receptive sites, transient spaces of exile and nondescript depoliticized places of exception. However, such arguments form partial sides of reality, especially in countries that are geopolitically challenged and rely immensely on international aid. In Jordan, the dynamics brought with the floating population of refugees (Palestinian amongst others) have resulted in spatial after-effects that cannot be easily overlooked. For instance, Palestine refugee camps have turned by time into socioeconomic centers of gravity and cores of spatial evolution. Yet, such a position is not instantaneous. Amongst various reasons, it can be related, according to this paper, to a distinctive institutional climate that has been co-produced by the refugees, host community and the state. This paper aims to investigate the evolution of urban and spatial regulations in Jordan between 1948 and 1995, more specifically, state regulations, community regulations and refugee-self-regulation that all dynamically interacted that period. The paper aims to unpack the relations between refugee camps and their environs to further explore the agency of such floating populations in establishing rooted networks that extended the time and place boundaries. The paper’s argument stems from the fact that the spatial configuration of urban systems is not only an outcome of a historical evolutionary process but is also a result of interactions between the actors. The research operationalizes Marka camp in Jordan as a case study. Marka Camp is one of the six "emergency" camps erected in 1968 to shelter 15,000 Palestine refugees and displaced persons who left the West Bank and Gaza Strip. Nowadays, camp shelters more than 50,000 refugees in the same area of land. The camp is located in Russeifa, a city in Zarqa Governorate in Jordan. Together with Amman and Zarqa, Russeifa is part of a larger metropolitan area that acts as a home to more than half of Jordan’s businesses. The paper aspires to further understand the post-conflict strategies which were historically applied in Jordan and can be employed to handle more recent geopolitical challenges such as the Syrian refugee crisis. Methodological framework: The paper traces the evolution of the refugee-camp regulating norms in Jordan, parallel with the horizontal and vertical evolution of the Marka camp and its surroundings. Consequently, the main methods employed are historical and mental tracing, Interviews, in addition to using available Aerial and archival photos of the Marka camp and its surrounding.Keywords: forced migration, Palestine refugee camps, spatial agency, urban regulations
Procedia PDF Downloads 1861757 Study of Pressure and Air Mass Flow Effect on Output Power of PEM Fuel Cell Powertrains in Vehicles and Airplanes- A Simulation-based Approach
Authors: Mahdiye Khorasani, Arjun Vijay, Ali Mashayekh, Christian Trapp
Abstract:
The performance of Proton Exchange Membrane Fuel Cell (PEMFC) is highly dependent on the pressure and mass flow of media (Hydrogen and air) throughout the cells and the stack. Higher pressure, on the one hand, results in higher output power of the stack but, on the other hand, increases the electrical power demand of the compressor. In this work, a simulation model of a PEMFC system for vehicle and airplane applications is developed. With this new model, the effect of different pressures and air mass flow rates are investigated to discover the optimum operating point in a PEMFC system, and innovative operation strategies are implemented to optimize reactants flow while minimizing electrical power demand of the compressor for optimum performance. Additionally, a fuel cell system test bench is set up, which contains not only all the auxiliary components for conditioning the gases, reactants, and flows but also a dynamic titling table for testing different orientations of the stack to simulate the flight conditions during take-off and landing and off-road-vehicle scenarios. The results of simulation will be tested and validated on the test bench for future works.Keywords: air mass flow effect, optimization of operation, pressure effect, PEMFC system, PEMFC system simulation
Procedia PDF Downloads 1751756 Two Day Ahead Short Term Load Forecasting Neural Network Based
Authors: Firas M. Tuaimah
Abstract:
This paper presents an Artificial Neural Network based approach for short-term load forecasting and exactly for two days ahead. Two seasons have been discussed for Iraqi power system, namely summer and winter; the hourly load demand is the most important input variables for ANN based load forecasting. The recorded daily load profile with a lead time of 1-48 hours for July and December of the year 2012 was obtained from the operation and control center that belongs to the Ministry of Iraqi electricity. The results of the comparison show that the neural network gives a good prediction for the load forecasting and for two days ahead.Keywords: short-term load forecasting, artificial neural networks, back propagation learning, hourly load demand
Procedia PDF Downloads 4641755 A Review of Ultralightweight Mutual Authentication Protocols
Authors: Umar Mujahid, Greatzel Unabia, Hongsik Choi, Binh Tran
Abstract:
Radio Frequency Identification (RFID) is one of the most commonly used technologies in IoTs and Wireless Sensor Networks which makes the devices identification and tracking extremely easy to manage. Since RFID uses wireless channel for communication, which is open for all types of adversaries, researchers have proposed many Ultralightweight Mutual Authentication Protocols (UMAPs) to ensure security and privacy in a cost-effective manner. These UMAPs involve simple bitwise logical operators such as XOR, AND, OR & Rot, etc., to design the protocol messages. However, most of these UMAPs were later reported to be vulnerable against many malicious attacks. In this paper, we have presented a detailed overview of some eminent UMAPs and also discussed the many security attacks on them. Finally, some recommendations and suggestions have been discussed, which can improve the design of the UMAPs.Keywords: RFID, Ultralightweight, UMAP, SASI
Procedia PDF Downloads 1531754 Load Forecasting in Short-Term Including Meteorological Variables for Balearic Islands Paper
Authors: Carolina Senabre, Sergio Valero, Miguel Lopez, Antonio Gabaldon
Abstract:
This paper presents a comprehensive survey of the short-term load forecasting (STLF). Since the behavior of consumers and producers continue changing as new technologies, it is an ongoing process, and moreover, new policies become available. The results of a research study for the Spanish Transport System Operator (REE) is presented in this paper. It is presented the improvement of the forecasting accuracy in the Balearic Islands considering the introduction of meteorological variables, such as temperature to reduce forecasting error. Variables analyzed for the forecasting in terms of overall accuracy are cloudiness, solar radiation, and wind velocity. It has also been analyzed the type of days to be considered in the research.Keywords: short-term load forecasting, power demand, neural networks, load forecasting
Procedia PDF Downloads 1901753 Nutraceuticals of Chemical Synthesis: Special Glycans as Prebiotics for the Holobiont
Authors: M. Menapace
Abstract:
Introduction: Herbal remedies express the idea of natural products used as pharmacotherapy or supplementation in case of need. Whether they are obtained directly by plants or synthesised chemically, prebiotics are considered nutraceuticals of natural origin, i.e., products made available for health reasons and self-medication. Methods: A literature review has been performed by screening manuscripts with prebiotics as herbal nutraceuticals (including chemically synthesized compounds, such as human milk oligosaccharides [HMO]) and evaluating the chemical structure of fibers in diverse food sources (principally herbals). Results: An examination of recent literature led to the fundamental concept of the holobiont as key in understanding the importance of prebiotics for the nonhost part of the metaorganism (microbiota) called a human being. This multispecies entity requires prebiotic fibers to avoid a state of disequilibrium (dysbiosis) that fosters diseases. Conclusions: Numerous human-derived glycans (special oligosaccharides that mimic in structure and function not only blood type antigens but also herbal fibers) have been identified as essential for the maintenance of the equilibrium (eubiosis) within the human holobiont in the modern age. These products are planned to be used not just as additions to baby milk formulas but as food supplements for the health of adults. In the context of alternative medicine, human-derived glycan-based supplements may represent the next step on the road to complete well-being.Keywords: glycans, herbal remedy, prebiotics, food supplement
Procedia PDF Downloads 1331752 A Hybrid Traffic Model for Smoothing Traffic Near Merges
Authors: Shiri Elisheva Decktor, Sharon Hornstein
Abstract:
Highway merges and unmarked junctions are key components in any urban road network, which can act as bottlenecks and create traffic disruption. Inefficient highway merges may trigger traffic instabilities such as stop-and-go waves, pose safety conditions and lead to longer journey times. These phenomena occur spontaneously if the average vehicle density exceeds a certain critical value. This study focuses on modeling the traffic using a microscopic traffic flow model. A hybrid traffic model, which combines human-driven and controlled vehicles is assumed. The controlled vehicles obey different driving policies when approaching the merge, or in the vicinity of other vehicles. We developed a co-simulation model in SUMO (Simulation of Urban Mobility), in which the human-driven cars are modeled using the IDM model, and the controlled cars are modeled using a dedicated controller. The scenario chosen for this study is a closed track with one merge and one exit, which could be later implemented using a scaled infrastructure on our lab setup. This will enable us to benchmark the results of this study obtained in simulation, to comparable results in similar conditions in the lab. The metrics chosen for the comparison of the performance of our algorithm on the overall traffic conditions include the average speed, wait time near the merge, and throughput after the merge, measured under different travel demand conditions (low, medium, and heavy traffic).Keywords: highway merges, traffic modeling, SUMO, driving policy
Procedia PDF Downloads 1061751 Electrical Cardiac Remodeling in Elite Athletes: A Comparative Study between Triathletes and Cyclists
Authors: Lingxia Li, Frédéric Schnell, Thibault Lachard, Anne-Charlotte Dupont, Shuzhe Ding, Solène Le Douairon Lahaye
Abstract:
Background: Repetitive participation in triathlon training results in significant myocardial changes. However, whether the cardiac remodeling in triathletes is related to the specificities of the sport (consisting of three sports) raises questions. Methods: Elite triathletes and cyclists registered on the French ministerial lists of high-level athletes were involved. The basic information and routine electrocardiogram records were obtained. Electrocardiograms were evaluated according to clinical criteria. Results: Of the 105 athletes included in the study, 42 were from the short-distance triathlon (40%), and 63 were from the road cycling (60%). The average age was 22.1±4.2 years. The P wave amplitude was significantly lower in triathletes than in cyclists (p=0.005), and no significant statistical difference was found in heart rate, RR interval, PR or PQ interval, QRS complex, QRS axe, QT interval, and QTc (p>0.05). All the measured parameters were within normal ranges. The most common electrical manifestations were early repolarization (60.95%) and incomplete right bundle branch block (43.81%); there was no statistical difference between the groups (p>0.05). Conclusions: Prolonged intensive endurance exercise training induces physiological cardiac remodeling in both triathletes and cyclists. The most common electrocardiogram manifestations were early repolarization and incomplete right bundle branch block.Keywords: cardiac screening, electrocardiogram, triathlon, cycling, elite athletes
Procedia PDF Downloads 71750 Entrepreneurship and the Discovery and Exploitation of Business Opportunities: Empirical Evidence from the Malawian Tourism Sector
Authors: Aravind Mohan Krishnan
Abstract:
This paper identifies a research gap in the literature on tourism entrepreneurship in Malawi, Africa, and investigates how entrepreneurs from the Malawian tourism sector discover and exploit business opportunities. In particular, the importance of prior experience and business networks in the opportunity development process is debated. Another area of empirical research examined here is the opportunity recognition-venture creation sequence. While Malawi presents fruitful business opportunities, exploiting these opportunities into fully realized business ideas is a real challenge due to the country’s difficult business environment and poor promotional and marketing efforts. The study concludes by calling for further research in Sub-Saharan Africa in order to develop our understanding of entrepreneurship in this (African) context.Keywords: entrepreneurship, Malawi, opportunities, tourism
Procedia PDF Downloads 3361749 Measurement of the Neutron Spectrum of 241AmLi and 241AmF Sources Using the Bonner Sphere Spectrometers
Authors: Victor Rocha Carvalho
Abstract:
The Bonner Sphere Spectrometry was used to obtain the average energy, the fluence rate, and radioprotection quantities such as the personal and ambient dose equivalent of the ²⁴¹AmLi and ²⁴¹AmF isotopic neutron sources used in the Neutron Metrology Laboratory - LN. The counts of the sources were performed with six different spherical moderators around the detector. Through this, the neutron spectrum was obtained by means of the software named NeuraLN, developed by the LN, that uses the neural networks technique. The 241AmLi achieved a result close to the literature, and 241AmF, which contains few published references, acquired a result with a slight variation from the literature. Therefore, besides fulfilling its objective, the work raises questions about a possible standard of the ²⁴¹AmLi and about the lack of work with the ²⁴¹AmF.Keywords: nuclear physics, neutron metrology, neutron spectrometry, bonner sphere spectrometers
Procedia PDF Downloads 1021748 Hosoya Polynomials of Mycielskian Graphs
Authors: Sanju Vaidya, Aihua Li
Abstract:
Vulnerability measures and topological indices are crucial in solving various problems such as the stability of the communication networks and development of mathematical models for chemical compounds. In 1947, Harry Wiener introduced a topological index related to molecular branching. Now there are more than 100 topological indices for graphs. For example, Hosoya polynomials (also called Wiener polynomials) were introduced to derive formulas for certain vulnerability measures and topological indices for various graphs. In this paper, we will find a relation between the Hosoya polynomials of any graph and its Mycielskian graph. Additionally, using this we will compute vulnerability measures, closeness and betweenness centrality, and extended Wiener indices. It is fascinating to see how Hosoya polynomials are useful in the two diverse fields, cybersecurity and chemistry.Keywords: hosoya polynomial, mycielskian graph, graph vulnerability measure, topological index
Procedia PDF Downloads 701747 Estimation of Sediment Transport into a Reservoir Dam
Authors: Kiyoumars Roushangar, Saeid Sadaghian
Abstract:
Although accurate sediment load prediction is very important in planning, designing, operating and maintenance of water resources structures, the transport mechanism is complex, and the deterministic transport models are based on simplifying assumptions often lead to large prediction errors. In this research, firstly, two intelligent ANN methods, Radial Basis and General Regression Neural Networks, are adopted to model of total sediment load transport into Madani Dam reservoir (north of Iran) using the measured data and then applicability of the sediment transport methods developed by Engelund and Hansen, Ackers and White, Yang, and Toffaleti for predicting of sediment load discharge are evaluated. Based on comparison of the results, it is found that the GRNN model gives better estimates than the sediment rating curve and mentioned classic methods.Keywords: sediment transport, dam reservoir, RBF, GRNN, prediction
Procedia PDF Downloads 4961746 A Decentralized Application for Secure Data Handling of Wireless Networks Using Ethereum Smart Contracts
Authors: Midhun Xavier
Abstract:
This paper introduces a method to verify multi-agent systems in industrial control systems using blockchain technology. The proposed solution enables to record and verify each process that occurs while generating a customized product using Ethereum-based smart contracts. Node-Red software agents are developed with the help of semantic web technologies, and these software agents interact with IEC 61499 function blocks to execute the processes. The agent associated with each mechatronic component and its controller can communicate with the blockchain to record various events that occur during each process, and the latter smart contract helps to verify these process orders of the customized product.Keywords: blockchain, Ethereum, node-red, IEC 61499, multi-agent system, MQTT
Procedia PDF Downloads 941745 Dynamic Performance Analysis of Distribution/ Sub-Transmission Networks with High Penetration of PV Generation
Authors: Cristian F.T. Montenegro, Luís F. N. Lourenço, Maurício B. C. Salles, Renato M. Monaro
Abstract:
More PV systems have been connected to the electrical network each year. As the number of PV systems increases, some issues affecting grid operations have been identified. This paper studied the impacts related to changes in solar irradiance on a distribution/sub-transmission network, considering variations due to moving clouds and daily cycles. Using MATLAB/Simulink software, a solar farm of 30 MWp was built and then implemented to a test network. From simulations, it has been determined that irradiance changes can have a significant impact on the grid by causing voltage fluctuations outside the allowable thresholds. This work discussed some local control strategies and grid reinforcements to mitigate the negative effects of the irradiance changes on the grid.Keywords: reactive power control, solar irradiance, utility-scale PV systems, voltage fluctuations
Procedia PDF Downloads 4601744 Geological Structure as the Main Factor in Landslide Deployment in Purworejo District Central Java Province Indonesia
Authors: Hilman Agil Satria, Rezky Naufan Hendrawan
Abstract:
Indonesia is vulnerable to geological hazard because of its location in subduction zone and have tropical climate. Landslide is one of the most happened geological hazard in Indonesia, based on Indonesia Geospasial data, at least 194 landslides recorded in 2013. In fact, research location is placed as the third city that most happened landslide in Indonesia. Landslide caused damage of many houses and wrecked the road. The purpose of this research is to make a landslide zone therefore can be used as one of mitigation consideration. The location is in Bruno, Porworejo district Central Java Province Indonesia at 109.903 – 109.99 and -7.59 – -7.50 with 10 Km x 10 Km wide. Based on geological mapping result, the research location consist of Late Miocene sandstone and claystone, and Pleistocene volcanic breccia and tuff. Those landslide happened in the lithology that close with fault zone. This location has so many geological structures: joints, faults and folds. There are 3 thrust faults, 1 normal faults, 4 strike slip faults and 6 folds. This geological structure movement is interpreted as the main factor that has triggered landslide in this location. This research use field data as well as samples of rock, joint, slicken side and landslide location which is combined with DEM SRTM to analyze geomorphology. As the final result of combined data will be presented as geological map, geological structure map and landslide zone map. From this research we can assume that there is correlation between geological structure and landslide locations.Keywords: geological structure, landslide, Porworejo, Indonesia
Procedia PDF Downloads 2861743 China and the Middle East in the 21st Century: From Political Mediation to Economic Expansionism
Authors: Ali Asghar Sotoudeh
Abstract:
Mediation Diplomacy has emerged as one of the main pillars of China's foreign policy goals and practices, and Beijing has established itself as a peacekeeping force in regional conflicts and crises such as Afghanistan, Syria, Sudan, Yemen, and the Arab-Israeli peace process. China is deepening and intensifying its diplomatic interventions in the Middle East and trying to shape the security and political developments in the Middle East. On the other hand, economically, China has become one of the most important trading partners with Middle Eastern governments. China is also seeking to expand its foreign policy and economic interests in the Middle East through the New Silk Road initiative and has signed cooperation agreements with 17 Arab countries. In this regard, due to the importance of the subject, this research focuses on answering this question; what is the basis of China's political mediation and economic expansionism in the Middle East? In parallel with this question, this study follows the hypothesis that the mediating role of peace is a legitimate way for China to intervene in Middle East political crises, Without causing China to deviate from its traditional guiding principles based on non-interference in the internal affairs of other actors in the international system. This policy also promotes the security of economic interests and increases the country's political influence in the Middle East. The research method is descriptive-analytical based on the qualitative method, and the data collection method is library and internet resources.Keywords: China, middle east, political mediation, economic expansionism
Procedia PDF Downloads 1441742 Designing a Cyclic Redundancy Checker-8 for 32 Bit Input Using VHDL
Authors: Ankit Shai
Abstract:
CRC or Cyclic Redundancy Check is one of the most common, and one of the most powerful error-detecting codes implemented on modern computers. Most of the modern communication protocols use some error detection algorithms in digital networks and storage devices to detect accidental changes to raw data between transmission and reception. Cyclic Redundancy Check, or CRC, is the most popular one among these error detection codes. CRC properties are defined by the generator polynomial length and coefficients. The aim of this project is to implement an efficient FPGA based CRC-8 that accepts a 32 bit input, taking into consideration optimal chip area and high performance, using VHDL. The proposed architecture is implemented on Xilinx ISE Simulator. It is designed while keeping in mind the hardware design, complexity and cost factor.Keywords: cyclic redundancy checker, CRC-8, 32-bit input, FPGA, VHDL, ModelSim, Xilinx
Procedia PDF Downloads 292