Search results for: information system transformation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26148

Search results for: information system transformation

23898 Renewable Integration Algorithm to Compensate Photovoltaic Power Using Battery Energy Storage System

Authors: Hyung Joo Lee, Jin Young Choi, Gun Soo Park, Kyo Sun Oh, Dong Jun Won

Abstract:

The fluctuation of the output of the renewable generator caused by weather conditions must be mitigated because it imposes strain on the system and adversely affects power quality. In this paper, we focus on mitigating the output fluctuation of the photovoltaic (PV) using battery energy storage system (BESS). To satisfy tight conditions of system, proposed algorithm is developed. This algorithm focuses on adjusting the integrated output curve considering state of capacity (SOC) of the battery. In this paper, the simulation model is PSCAD / EMTDC software. SOC of the battery and the overall output curve are shown using the simulation results. We also considered losses and battery efficiency.

Keywords: photovoltaic generation, battery energy storage system, renewable integration, power smoothing

Procedia PDF Downloads 277
23897 Studying the Effects of Conditional Conservatism and Lack of Information Asymmetry on the Cost of Capital of the Accepted Companies in Tehran Stock Exchange

Authors: Fayaz Moosavi, Saeid Moradyfard

Abstract:

One of the methods in avoiding management fraud and increasing the quality of financial information, is the notification of qualitative features of financial information, including conservatism characteristic. Although taking a conservatism approach, while boosting the quality of financial information, is able to reduce the informational risk and the cost of capital stock of commercial department, by presenting an improper image about the situation of the commercial department, raises the risk of failure in returning the main and capital interest, and consequently the cost of capital of the commercial department. In order to know if conservatism finally leads to the increase or decrease of the cost of capital or does not have any influence on it, information regarding accepted companies in Tehran stock exchange is utilized by application of pooling method from 2007 to 2012 and it included 124 companies. The results of the study revealed that there is an opposite and meaningful relationship between conditional conservatism and the cost of capital of the company. In other words, if bad and unsuitable news and signs are reflected sooner than good news in accounting profit, the cost of capital of the company increases. In addition, there is a positive and meaningful relationship between the cost of capital and lack of information asymmetry.

Keywords: conditional conservatism, lack of information asymmetry, the cost of capital, stock exchange

Procedia PDF Downloads 260
23896 Characteristic Matrix Faults for Flight Control System

Authors: Thanh Nga Thai

Abstract:

A major issue in air transportation is in flight safety. Recent developments in control engineering have an attractive potential for resolving new issues related to guidance, navigation, and control of flying vehicles. Many future atmospheric missions will require increased on board autonomy including fault diagnosis and the subsequent control and guidance recovery actions. To improve designing system diagnostic, an efficient FDI- fault detection and identification- methodology is necessary to achieve. Contribute to characteristic of different faults in sensor and actuator in the view of mathematics brings a lot of profit in some condition changes in the system. This research finds some profit to reduce a trade-off to achieve between fault detection and performance of the closed loop system and cost and calculated in simulation.

Keywords: fault detection and identification, sensor faults, actuator faults, flight control system

Procedia PDF Downloads 415
23895 Diversity Indices as a Tool for Evaluating Quality of Water Ways

Authors: Khadra Ahmed, Khaled Kheireldin

Abstract:

In this paper, we present a pedestrian detection descriptor called Fused Structure and Texture (FST) features based on the combination of the local phase information with the texture features. Since the phase of the signal conveys more structural information than the magnitude, the phase congruency concept is used to capture the structural features. On the other hand, the Center-Symmetric Local Binary Pattern (CSLBP) approach is used to capture the texture information of the image. The dimension less quantity of the phase congruency and the robustness of the CSLBP operator on the flat images, as well as the blur and illumination changes, lead the proposed descriptor to be more robust and less sensitive to the light variations. The proposed descriptor can be formed by extracting the phase congruency and the CSLBP values of each pixel of the image with respect to its neighborhood. The histogram of the oriented phase and the histogram of the CSLBP values for the local regions in the image are computed and concatenated to construct the FST descriptor. Several experiments were conducted on INRIA and the low resolution DaimlerChrysler datasets to evaluate the detection performance of the pedestrian detection system that is based on the FST descriptor. A linear Support Vector Machine (SVM) is used to train the pedestrian classifier. These experiments showed that the proposed FST descriptor has better detection performance over a set of state of the art feature extraction methodologies.

Keywords: planktons, diversity indices, water quality index, water ways

Procedia PDF Downloads 511
23894 Georgian Social Security System Compatibility with EU Requirements

Authors: Nino Grigolaia

Abstract:

Introduction: The article discusses the experience of the EU in the social field, analyzes the peculiarities of the functioning of the social system in Georgia, and reveals the priority and importance of social policy. Methodology: Different research methods are applied in the presented paper. There are used induction, deduction, analysis, synthesis, analogy, correlation, and statistical observation methodologies in the work. Main Findings: Based on the analysis of social security reforms in Georgia, the main systematic problems are detected, the recommendations on social security system components, integration of the social security field in the unified insurance system, the formation of the national social system, perfection of the legislative, regulatory framework of social protection, adoption of foreign experience are developed in the article. Conclusion: The article concludes that the social protection system in Georgia is at an early stage of development, with the significant impact of factors such as high level of unemployment, low pensions, a large number of families living under the poverty line, and other ones. Accordingly, it is well-established that the study of the social security problem in Georgia is still actual. Based on the analysis, appropriate suggestions in the field of social security are made, and relevant recommendations are proposed.

Keywords: social security, social system, social policy, social security models

Procedia PDF Downloads 137
23893 Virtualization and Visualization Based Driver Configuration in Operating System

Authors: Pavan Shah

Abstract:

In an Embedded system, Virtualization and visualization technology can provide us an effective response and measurable work in a software development environment. In addition to work of virtualization and virtualization can be easily deserved to provide the best resource sharing between real-time hardware applications and a healthy environment. However, the virtualization is noticeable work to minimize the I/O work and utilize virtualization & virtualization technology for either a software development environment (SDE) or a runtime environment of real-time embedded systems (RTMES) or real-time operating system (RTOS) eras. In this Paper, we particularly focus on virtualization and visualization overheads data of network which generates the I/O and implementation of standardized I/O (i.e., Virto), which can work as front-end network driver in a real-time operating system (RTOS) hardware module. Even there have been several work studies are available based on the virtualization operating system environment, but for the Virto on a general-purpose OS, my implementation is on the open-source Virto for a real-time operating system (RTOS). In this paper, the measurement results show that implementation which can improve the bandwidth and latency of memory management of the real-time operating system environment (RTMES) for getting more accuracy of the trained model.

Keywords: virtualization, visualization, network driver, operating system

Procedia PDF Downloads 125
23892 Enhancing the Stability of Vietnamese Power System - from Theory to Practical

Authors: Edwin Lerch, Dirk Audring, Cuong Nguyen Mau, Duc Ninh Nguyen, The Cuong Nguyen, The Van Nguyen

Abstract:

The National Load Dispatch Centre of Electricity Vietnam (EVNNLDC) and Siemens PTI investigated the stability of the electrical 500/220 kV transportation system of Vietnam. The general scope of the investigations is improving the stability of the Vietnam power system and giving the EVNNLDC staff the capability to decide how to deal with expected stability challenges in the future, which are related to the very fast growth of the system. Rapid system growth leads to a very high demand of power transmission from North to South. This was investigated by stability studies of interconnected power system with neighboring countries. These investigations are performed in close cooperation and coordination with the EVNNLDC project team. This important project includes data collection, measurement, model validation and investigation of relevant stability phenomena as well as training of the EVNNLDC staff. Generally, the power system of Vietnam has good voltage and dynamic stability. The main problems are related to the longitudinal system with more power generation in the North and Center, especially hydro power, and load centers in the South of Vietnam. Faults on the power transmission system from North to South risks the stability of the entire system due to a high power transfer from North to South and high loading of the 500 kV backbone. An additional problem is the weak connection to Cambodia power system which leads to interarea oscillations mode. Therefore, strengthening the power transfer capability by new 500kV lines or HVDC connection and balancing the power generation across the country will solve many challenges. Other countermeasures, such as wide area load shedding, PSS tuning and correct SVC placement will improve and stabilize the power system as well. Primary frequency reserve should be increased.

Keywords: dynamic power transmission system studies, blackout prevention, power system interconnection, stability

Procedia PDF Downloads 349
23891 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 155
23890 High-Resolution ECG Automated Analysis and Diagnosis

Authors: Ayad Dalloo, Sulaf Dalloo

Abstract:

Electrocardiogram (ECG) recording is prone to complications, on analysis by physicians, due to noise and artifacts, thus creating ambiguity leading to possible error of diagnosis. Such drawbacks may be overcome with the advent of high resolution Methods, such as Discrete Wavelet Analysis and Digital Signal Processing (DSP) techniques. This ECG signal analysis is implemented in three stages: ECG preprocessing, features extraction and classification with the aim of realizing high resolution ECG diagnosis and improved detection of abnormal conditions in the heart. The preprocessing stage involves removing spurious artifacts (noise), due to such factors as muscle contraction, motion, respiration, etc. ECG features are extracted by applying DSP and suggested sloping method techniques. These measured features represent peak amplitude values and intervals of P, Q, R, S, R’, and T waves on ECG, and other features such as ST elevation, QRS width, heart rate, electrical axis, QR and QT intervals. The classification is preformed using these extracted features and the criteria for cardiovascular diseases. The ECG diagnostic system is successfully applied to 12-lead ECG recordings for 12 cases. The system is provided with information to enable it diagnoses 15 different diseases. Physician’s and computer’s diagnoses are compared with 90% agreement, with respect to physician diagnosis, and the time taken for diagnosis is 2 seconds. All of these operations are programmed in Matlab environment.

Keywords: ECG diagnostic system, QRS detection, ECG baseline removal, cardiovascular diseases

Procedia PDF Downloads 290
23889 An Improved Photovolatic System Balancer Architecture

Authors: Chih-Chiang Hua, Yi-Hsiung Fang, Cyuan-Jyun Wong

Abstract:

An improved PV balancer for photovoltaic applications is proposed in this paper. The proposed PV balancer senses the voltage and current of PV module and adjusts the output voltage of converter. Thus, the PV system can implement maximum power point tracking (MPPT) independently for each module whether it is under shading, different irradiation or degradation of PV cell. In addition, the cost of PV balancer can be reduced due to the low power rating of converter. To assess the effectiveness of the proposed system, two PV balancers are designed and verified through simulation under different shading conditions. The proposed PV balancers can provide more energy than the traditional PV balancer.

Keywords: MPPT, partial shading, PV System, converter

Procedia PDF Downloads 285
23888 Performance Analysis of LINUX Operating System Connected in LAN Using Gumbel-Hougaard Family Copula Distribution

Authors: V. V. Singh

Abstract:

In this paper we have focused on the study of a Linux operating system connected in a LAN (local area network). We have considered two different topologies STAR topology (subsystem-1) and BUS topology (subsystem-2) which are placed at two different places and connected to a server through a hub. In both topologies BUS topology and STAR topology, we have assumed 'n' clients. The system has two types of failure partial failure and complete failure. Further the partial failure has been categorized as minor partial failure and major partial failure. It is assumed that minor partial failure degrades the subsystem and the major partial failure brings the subsystem to break down mode. The system can completely failed due to failure of server hacking and blocking etc. The system is studied by supplementary variable technique and Laplace transform by taking different types of failure and two types of repairs. The various measures of reliability like availability of system, MTTF, profit function for different parametric values has been discussed.

Keywords: star topology, bus topology, hacking, blocking, linux operating system, Gumbel-Hougaard family copula, supplementary variable

Procedia PDF Downloads 566
23887 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 90
23886 Urgency of Islamic Economic System Implementation in Indonesian Banking

Authors: Muhammad Rifqi Hafizhudin Arif, Mukhamad Zulfal Faradis, Ahmad Hidayatullah

Abstract:

Indonesia is the country that uses conventional financial system adopted from European countries as a form of finance in the national banking system. Many of the derivative products of conventional banks either investment, buy and sell, saving and loan, which is not in accordance with Islamic Ethics. While the majority population in Indonesia are belief in Islam, which Islam has had financial management guide is written in the Quran, the Hadith, as well as the opinions of experts who strongly prohibits the use of interest in each transaction activities. Many different expert opinions on the application of the Islamic financial system in Indonesia. However, as the majority of the population of Indonesia, Islamic community have not been able to get the opportunities to choose the Islamic financial system that has mutual benefit between consumers and banks, particularly fairness in transactions, ethical investment, uphold the values of solidarity and brotherhood in every transaction activities, and avoid speculation. In this paper, we will discuss the reasons for the importance of providing an option for Islamic community as the majority of the population of Indonesia to use the banking system which adopted the Islamic ethical values that have been much discussed by other researchers in various countries. The existence of this research is expected to Government, academia and the general public aware of the urgency of Islamic economic system implementation in Indonesian banking as the solution and justice especially for the Islamic community to use the values which they held.

Keywords: Islamic economic system, conventional system, Islamic value, banking

Procedia PDF Downloads 359
23885 Applying the CA Systems in Education Process

Authors: A. Javorova, M. Matusova, K. Velisek

Abstract:

The article summarizes the experience of laboratory technical subjects teaching methodologies using a number of software products. The main aim is to modernize the teaching process in accordance with the requirements of today - based on information technology. Increasing of the study attractiveness and effectiveness is due to the introduction of CA technologies in the learning process. This paper discussed the areas where individual CA system used. Environment using CA systems are briefly presented in each chapter.

Keywords: education, CA systems, simulation, technology

Procedia PDF Downloads 392
23884 Implementation of Statistical Parameters to Form an Entropic Mathematical Models

Authors: Gurcharan Singh Buttar

Abstract:

It has been discovered that although these two areas, statistics, and information theory, are independent in their nature, they can be combined to create applications in multidisciplinary mathematics. This is due to the fact that where in the field of statistics, statistical parameters (measures) play an essential role in reference to the population (distribution) under investigation. Information measure is crucial in the study of ambiguity, assortment, and unpredictability present in an array of phenomena. The following communication is a link between the two, and it has been demonstrated that the well-known conventional statistical measures can be used as a measure of information.

Keywords: probability distribution, entropy, concavity, symmetry, variance, central tendency

Procedia PDF Downloads 150
23883 Smart Automated Furrow Irrigation: A Preliminary Evaluation

Authors: Jasim Uddin, Rod Smith, Malcolm Gillies

Abstract:

Surface irrigation is the most popular irrigation method all over the world. However, two issues: low efficiency and huge labour involvement concern irrigators due to scarcity in recent years. To address these issues, a smart automated furrow is conceptualised that can be operated using digital devices like smartphone, iPad or computer and a preliminary evaluation was conducted in this study. The smart automated system is the integration of commercially available software and hardware. It includes real-time surface irrigation optimisation software (SISCO) and Rubicon Water’s surface irrigation automation hardware and software. The automated system consists of automatic water delivery system with 300 mm flexible pipes attached to both sides of a remotely controlled valve to operate the irrigation. A water level sensor to obtain the real-time inflow rate from the measured head in the channel, advance sensors to measure the advance time to particular points of an irrigated field, a solar-powered telemetry system including a base station to communicate all the field sensors with the main server. On the basis of field data, the software (SISCO) is optimised the ongoing irrigation and determine the optimum cut-off for particular irrigation and send this information to the control valve to stop the irrigation in a particular (cut-off) time. The preliminary evaluation shows that the automated surface irrigation worked reasonably well without manual intervention. The evaluation of farmers managed irrigation events show the potentials to save a significant amount of water and labour. A substantial amount of economic and social benefits are expected in rural industries by adopting this system. The future outcome of this work would be a fully tested commercial adaptive real-time furrow irrigation system able to compete with the pressurised alternative of centre pivot or lateral move machines on capital cost, water and labour savings but without the massive energy costs.

Keywords: furrow irrigation, smart automation, infiltration, SISCO, real-time irrigation, adoptive control

Procedia PDF Downloads 444
23882 Parametric Study of a Solar-Heating-And-Cooling System with Hybrid Photovoltaic/Thermal Collectors in North China

Authors: Ruobing Liang, Jili Zhang, Chao Zhou

Abstract:

A solar-heating-and-cooling (SHC) system, consisting of a hybrid photovoltaic/ thermal collector array, a hot water storage tank, and an absorption chiller unit is designed and modeled to satisfy thermal loads (space heating, domestic hot water, and space cooling). The system is applied for Dalian, China, a location with cold climate conditions, where cooling demand is moderate, while space heating demand is slightly high. The study investigates the potential of a solar system installed and operated onsite in a detached single-family household to satisfy all necessary thermal loads. The hot water storage tank is also connected to an auxiliary heater (electric boiler) to supplement solar heating, when needed. The main purpose of the study is to model the overall system and contact a parametric study that will determine the optimum economic system performance in terms of design parameters. The system is compared, through a cost analysis, to an electric heat pump (EHP) system. This paper will give the optimum system combination of solar collector area and volumetric capacity of the hot water storage tank, respectively.

Keywords: absorption chiller, solar PVT collector, solar heating and cooling, solar air-conditioning, parametric study, cost analysis

Procedia PDF Downloads 414
23881 Key Success Factors and Enterprise Resource Planning Implementation in Higher Education Institutions: Multiple Case Studies of Jordanian Universities

Authors: Abdallah Abu Madi, Dongmei Cao, Alexeis Garcia-Perez, Qile He

Abstract:

The failure of Enterprise Resource Planning (ERP) implementation in higher education institutions (HEIs) worldwide is much higher in comparison to other sectors, such as banking or manufacturing, to our knowledge limited research has been conducted on this issue. To date, prior literature has identified some key success factors (KSFs) mostly either in the domain of information and system (IS) or in the industrial context. However, evidence of ERP implementation in the higher education sector has had little attention in the extant literature. Hence, this paper identifies and categories KSFs of ERP implementation in HEIs. Semi-structured face-to-face interviews were conducted with technicians and managers from three Jordanian HEIs. From these case studies, three new sector- and context-specific KSFs were identified and categorized according to two dimensions: organizational and technical. The first new KSF is the selection of the ERP system, which is an influential factor in the organizational dimension. Results show that an ERP solution that is suitable to one context may be disastrous in another. The second new KSF, which falls under the technical dimension, is the relationship between vendors and HEIs. This must be fair and impartial to enable successful decision-making and thus the achievement of pre-defined goals. Also within the technical dimension is the third factor: in-house maintenance. Once an appropriate system is selected and a strong relationship is established, the ERP system requires continuous maintenance for effective operation. HEIs should ensure that qualified IT support is in place and in-house to avoid excessive running expenses.

Keywords: Enterprise Resource Planning (ERP)implementation, key success factors, higher education institutions, Jordanian higher education

Procedia PDF Downloads 203
23880 Pension Reform in Georgia: Challenges, International Practice and Opportunities for Development

Authors: Manana Lobzhanidze

Abstract:

Reforming the pension system is urgent in Georgia due to socio-economic problems. Replacing the current pension system with a new one requires, on the one hand, an assessment of the challenges in this field and, on the other hand, a study of the best practices of foreign experience. Objectives: The aim of the research is to identify challenges in the pension reform process in Georgia, to study international experience, and to develop recommendations for the implementation of an effective pension system. Methodologies: A desk study was conducted, and methods of analysis, comparison, grouping, matrix charts, and scenario analysis were used. Findings: The advantages of accumulative pension compared to the current pension system are identified. The main challenge is the non-targeting of the pension contributions and the ineffective investment policy; the public's attitude towards the cumulative pension system is determined.

Keywords: pension reform, challenges, international practice, opportunity for development

Procedia PDF Downloads 60
23879 Simulation of Government Management Model to Increase Financial Productivity System Using Govpilot

Authors: Arezou Javadi

Abstract:

The use of algorithmic models dependent on software calculations and simulation of new government management assays with the help of specialized software had increased the productivity and efficiency of the government management system recently. This has caused the management approach to change from the old bitch & fix model, which has low efficiency and less usefulness, to the capable management model with higher efficiency called the partnership with resident model. By using Govpilot TM software, the relationship between people in a system and the government was examined. The method of two tailed interaction was the outsourcing of a goal in a system, which is formed in the order of goals, qualified executive people, optimal executive model, and finally, summarizing additional activities at the different statistical levels. The results showed that the participation of people in a financial implementation system with a statistical potential of P≥5% caused a significant increase in investment and initial capital in the government system with maximum implement project in a smart government.

Keywords: machine learning, financial income, statistical potential, govpilot

Procedia PDF Downloads 82
23878 Simulation of Government Management Model to Increase Financial Productivity System Using Govpilot

Authors: Arezou Javadi

Abstract:

The use of algorithmic models dependent on software calculations and simulation of new government management assays with the help of specialized software had increased the productivity and efficiency of the government management system recently. This has caused the management approach to change from the old bitch & fix model, which has low efficiency and less usefulness, to the capable management model with higher efficiency called the partnership with resident model. By using Govpilot TM software, the relationship between people in a system and the government was examined. The method of two tailed interaction was the outsourcing of a goal in a system, which is formed in the order of goals, qualified executive people, optimal executive model, and finally, summarizing additional activities at the different statistical levels. The results showed that the participation of people in a financial implementation system with a statistical potential of P≥5% caused a significant increase in investment and initial capital in the government system with maximum implement project in a smart government.

Keywords: machine learning, financial income, statistical potential, govpilot

Procedia PDF Downloads 65
23877 Geographic Information System Applications in Prioritizing Karlahi Forest Reserve Area for Conservation

Authors: Samuel Hyellamada Jerry

Abstract:

This study focused on assessing conservation priorities within the Karlahi Forest Reserve of Fufore Local Government in Adamawa State. The main objective was to identify specific areas within the forest reserve that require immediate conservation attention. The research employed remote sensing and GIS techniques to achieve this goal. By overlaying the IDRIS Silva module results, a spatial distribution map was generated, highlighting the cumulative priority areas within and outside the forest. Among the total vegetated area of 26.38 km² in the Karlahi Forest Reserve, the analysis revealed that 16.16 km² were classified as high-priority conservation zones. Additionally, 4.59 km² and 5.63 km² were identified as medium and low-priority areas, respectively. In light of these findings, it is recommended that conservation efforts incorporate detailed land cover information and regular assessments of species diversity. Furthermore, strict adherence to national and state policies regarding forest reserves and parks is crucial for effective conservation management.

Keywords: priority, Karlahi, forest, reserve, IDRISI Silva, species diversity

Procedia PDF Downloads 140
23876 Energy and Economic Analysis of Heat Recovery from Boiler Exhaust Flue Gas

Authors: Kemal Comakli, Meryem Terhan

Abstract:

In this study, the potential of heat recovery from waste flue gas was examined in 60 MW district heating system of a university, and fuel saving was aimed by using the recovered heat in the system as a source again. Various scenarios are intended to make use of waste heat. For this purpose, actual operation data of the system were taken. Besides, the heat recovery units that consist of heat exchangers such as flue gas condensers, economizers or air pre-heaters were designed theoretically for each scenario. Energy analysis of natural gas-fired boiler’s exhaust flue gas in the system, and economic analysis of heat recovery units to predict payback periods were done. According to calculation results, the waste heat loss ratio from boiler flue gas in the system was obtained as average 16%. Thanks to the heat recovery units, thermal efficiency of the system can be increased, and fuel saving can be provided. At the same time, a huge amount of green gas emission can be decreased by installing the heat recovery units.

Keywords: heat recovery from flue gas, energy analysis of flue gas, economical analysis, payback period

Procedia PDF Downloads 283
23875 An Introduction to Corporate Financial Reporting Practices in India

Authors: Pradip Kumar Das

Abstract:

India is a developing country and is also one of the most industrialized developing countries of the world. In post-independence period, industry has grown rapidly in India and with industrialization corporate sector in the country has been growing day after day. Nowadays, the investment is not limited to be shareholders alone, apart from the shareholders the common people of the society have also started investing in shares of the corporate sectors. Thus, the responsibilities of the corporate sectors have increased much. Corporate financial reporting refers to a system which provides valuable information to different types of users in the society for taking resourceful decisions with regards to investment policy, organization credit worthiness, profitability, liquidity, provision of taxation etc. The quality of information available to different users fosters the efficient allocation of resources which are very urgent for economic development of a country like India. It is the responsibility of the management of the corporate sector to convey reliable and authentic information with the help of generally accepted accounting principles. Corporate sectors which disclose information through annual reports should be sufficient enough for the purpose of bringing out the salient features relating to business performances and other activities. However, the disclosures practices of the corporate sectors though annual reports have undergone several major changes from time to time. Many a time, these vital changes are in the fashion of presenting information in the annual reports and addition of so many non-statutory disclosures of the company. Very often managements of the corporate sectors are blamed for concealing true picture which is not desirable at all. The corporate financial reporting practice which in the current period has gained a place of prime importance suffers from certain limitations and invites question from the public about its reliability. Thus, the wide gap created by management between the exhibited picture and the real picture sometimes attains to such extent that the purpose of the reporting practice loses its importance. The requirement of full and adequate disclosure of information including information relating to human resources in the annual report in free trade economy of India helps the prospective investors to select the best portfolio of their investments. This paper is a reflection of a modest attempt of the author to highlight the corporate reporting practices followed in India. A cursory glance of the conceptual study shows limitations along with reliability of the reporting practices and suggests measures to overcome the shortcomings of the financial reporting practices.

Keywords: corporate enterprise, cursory glance, portfolio, yawning gap

Procedia PDF Downloads 410
23874 The Hidden Characteristics That Tutors Hope Dundee Mmed Graduates Might Have after Graduation

Authors: Afnan Khoja, Ittisak Subrungruang, Kritchaya Ritruechai, Linda Jones, David Wall

Abstract:

Background: Some characteristics might be stated as an objective of the curriculum and some might be hidden. The hidden curriculum is the unwritten and unintended lessons and perspectives that students absorb in school. Though, the hidden characteristics are expected that tutors hope students might have in order to become medical educators. We suspected our faculty hoped we would develop skills, know and develop beyond the written outcomes. Our research question aimed to explore the hidden curriculum; as part of our learning; we had to design and report findings. Summary of Work: We undertook semi-structured interviews with a sample of the centre for medical education faculty at Dundee. Participants answered the question , of what are the hidden characteristics that they hope Dundee MMed graduates might have after graduation. Thematic analysis was carried out on the interview scripts. Summary of Results: A thematic analysis was carried out on the interview transcripts. Three main themes were identified from all respondents' comments. These were lifelong learners, being flexible and problem solvers. In addition individual respondents also described sense of humour, collaboration, humility, role model, inquisitiveness, optimism, and ability to express oneself clearly. Discussion: Tutors put great value on three behaviours lifelong learner, flexible, and problem solver, which are part of professional characteristics in leadership. Therefore, leadership characteristics is incorporated as the outcomes of hidden characteristics that tutors would like to see. Conclusion: Tutors in the Master's program of medical education at the University of Dundee hope that medical education students should present the three main hidden characteristics, which are lifelong learner, flexible, and problem solver after graduation. Take-home Messages: These hidden characteristics are considered as informal unless a change has been made to the formal curriculum. Therefore, to reach the tutors’ expectations, further studies might be held to make this personal characteristics transformation more accessible.

Keywords: characteristics, hidden curriculum, transformation, informal

Procedia PDF Downloads 83
23873 Energy Efficient Alternate Hydraulic System Called TejHydroLift

Authors: Tejinder Singh

Abstract:

This paper describes a new more efficient Hydraulic System which uses lesser work to produce more output. Conventional Hydraulic System like Hydraulic Lifts and Rams use lots of water to be pumped to produce output. TejHydroLift will do the equal amount of force with lesser input of water. The paper will show that force applied can be increased manifold without requiring to move smaller force by more distance which used to be required in Conventional Hydraulic Lifts. The paper describes one of the configurations of TejHydroLift System called “Slim Antenna TejHydroLift Configuration”. The TejHydroLift uses lesser water and hence demands lesser work to be performed to move the same load.

Keywords: alternate, hydraulic system, efficient, TejHydroLift

Procedia PDF Downloads 255
23872 Resume Ranking Using Custom Word2vec and Rule-Based Natural Language Processing Techniques

Authors: Subodh Chandra Shakya, Rajendra Sapkota, Aakash Tamang, Shushant Pudasaini, Sujan Adhikari, Sajjan Adhikari

Abstract:

Lots of efforts have been made in order to measure the semantic similarity between the text corpora in the documents. Techniques have been evolved to measure the similarity of two documents. One such state-of-art technique in the field of Natural Language Processing (NLP) is word to vector models, which converts the words into their word-embedding and measures the similarity between the vectors. We found this to be quite useful for the task of resume ranking. So, this research paper is the implementation of the word2vec model along with other Natural Language Processing techniques in order to rank the resumes for the particular job description so as to automate the process of hiring. The research paper proposes the system and the findings that were made during the process of building the system.

Keywords: chunking, document similarity, information extraction, natural language processing, word2vec, word embedding

Procedia PDF Downloads 150
23871 Chaos Analysis of a 3D Finance System and Generalized Synchronization for N-Dimension

Authors: Muhammad Fiaz

Abstract:

The article in hand is the study of complex features like Zero Hopf Bifurcation, Chaos and Synchronization of integer and fractional order version of a new 3D finance system. Trusted tools of averaging theory and active control method are utilized for investigation of Zero Hopf bifurcation and synchronization for both versions respectively. Inventiveness of the paper is to find the answer of a question that is it possible to find a chaotic system which can be synchronized with any other of the same dimension? Based on different examples we categorically develop a theory that if a couple of master and slave chaotic dynamical system is synchronized by selecting a suitable gain matrix with special conditions then the master system is synchronized with any chaotic dynamical system of the same dimension. With the help of this study we developed generalized theorems for synchronization of n-dimension dynamical systems for integer as well as fractional versions. it proposed that this investigation will contribute a lot to control dynamical systems and only a suitable gain matrix with special conditions is enough to synchronize the system under consideration with any other chaotic system of the same dimension. Chaotic properties of fractional version of the new finance system are also analyzed at fractional order q=0.87. Simulations results, where required, also provided for authenticity of analytical study.

Keywords: complex analysis, chaos, generalized synchronization, control dynamics, fractional order analysis

Procedia PDF Downloads 57
23870 Computational Characterization of Electronic Charge Transfer in Interfacial Phospholipid-Water Layers

Authors: Samira Baghbanbari, A. B. P. Lever, Payam S. Shabestari, Donald Weaver

Abstract:

Existing signal transmission models, although undoubtedly useful, have proven insufficient to explain the full complexity of information transfer within the central nervous system. The development of transformative models will necessitate a more comprehensive understanding of neuronal lipid membrane electrophysiology. Pursuant to this goal, the role of highly organized interfacial phospholipid-water layers emerges as a promising case study. A series of phospholipids in neural-glial gap junction interfaces as well as cholesterol molecules have been computationally modelled using high-performance density functional theory (DFT) calculations. Subsequent 'charge decomposition analysis' calculations have revealed a net transfer of charge from phospholipid orbitals through the organized interfacial water layer before ultimately finding its way to cholesterol acceptor molecules. The specific pathway of charge transfer from phospholipid via water layers towards cholesterol has been mapped in detail. Cholesterol is an essential membrane component that is overrepresented in neuronal membranes as compared to other mammalian cells; given this relative abundance, its apparent role as an electronic acceptor may prove to be a relevant factor in further signal transmission studies of the central nervous system. The timescales over which this electronic charge transfer occurs have also been evaluated by utilizing a system design that systematically increases the number of water molecules separating lipids and cholesterol. Memory loss through hydrogen-bonded networks in water can occur at femtosecond timescales, whereas existing action potential-based models are limited to micro or nanosecond scales. As such, the development of future models that attempt to explain faster timescale signal transmission in the central nervous system may benefit from our work, which provides additional information regarding fast timescale energy transfer mechanisms occurring through interfacial water. The study possesses a dataset that includes six distinct phospholipids and a collection of cholesterol. Ten optimized geometric characteristics (features) were employed to conduct binary classification through an artificial neural network (ANN), differentiating cholesterol from the various phospholipids. This stems from our understanding that all lipids within the first group function as electronic charge donors, while cholesterol serves as an electronic charge acceptor.

Keywords: charge transfer, signal transmission, phospholipids, water layers, ANN

Procedia PDF Downloads 62
23869 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 252