Search results for: edge application framework
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12974

Search results for: edge application framework

12764 Characteization and Optimization of S-Parameters of Microwave Circuits

Authors: N. Ourabia, M. Boubaker Ourabia

Abstract:

An approach for modeling and numerical simulation of passive planar structures using the edge line concept is developed. With this method, we develop an efficient modeling technique for microstrip discontinuities. The technique obtains closed form expressions for the equivalent circuits which are used to model these discontinuities. Then, it would be easy to handle and to characterize complicated structures like T and Y junctions, truncated junctions, arbitrarily shaped junctions, cascading junctions and more generally planar multiport junctions. Another advantage of this method is that the edge line concept for arbitrary shape junctions operates with real parameters circuits. The validity of the method was further confirmed by comparing our results for various discontinuities (bend, filters) with those from HFSS as well as from other published sources.

Keywords: optimization, CAD analysis, microwave circuits, S-parameters

Procedia PDF Downloads 437
12763 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4

Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono

Abstract:

Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.

Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations

Procedia PDF Downloads 126
12762 Technological Advancement of Socratic Supported by Artificial Intelligence

Authors: Amad Nasseef, Layan Zugail, Joud Musalli, Layan Shaikan

Abstract:

Technology has become an essential part of our lives. We have also witnessed the significant emergence of artificial intelligence in so many areas. Throughout this research paper, the following will be discussed: an introduction on AI and Socratic application, we also did an overview on the application’s background and other similar applications, as for the methodology, we conducted a survey to collect results on users experience in using the Socratic application. The results of the survey strongly supported the usefulness and interest of users in the Socratic application. Finally, we concluded that Socratic is a meaningful tool for learning purposes due to it being supported by artificial intelligence, which made the application easy to use and familiar to users to deal with through a click of a button.

Keywords: Socratic, artificial intelligence, application, features

Procedia PDF Downloads 188
12761 A Framework for Rating Synchronous Video E-Learning Applications

Authors: Alex Vakaloudis, Juan Manuel Escano-Gonzalez

Abstract:

Setting up a system to broadcast live lectures on the web is a procedure which on the surface does not require any serious technical skills mainly due to the facilities provided by popular learning management systems and their plugins. Nevertheless, producing a system of outstanding quality is a multidisciplinary and by no means a straightforward task. This complicatedness may be responsible for the delivery of an overall poor experience to the learners, and it calls for a formal rating framework that takes into account the diverse aspects of an architecture for synchronous video e-learning systems. We discuss the specifications of such a framework which at its final stage employs fuzzy logic technique to transform from qualitative to quantitative results.

Keywords: synchronous video, fuzzy logic, rating framework, e-learning

Procedia PDF Downloads 533
12760 Intelligent Crowd Management Systems in Trains

Authors: Sai S. Hari, Shriram Ramanujam, Unnati Trivedi

Abstract:

The advent of mass transit systems like rail, metro, maglev, and various other rail based transport has pacified the requirement of public transport for the masses to a great extent. However, the abatement of the demand does not necessarily mean it is managed efficiently, eloquently or in an encapsulating manner. The primary problem identified that the one this paper seeks to solve is the dipsomaniac like manner in which the compartments are occupied. This problem is solved by using a comparison of an empty train and an occupied one. The pixel data of an occupied train is compared to the pixel data of an empty train. This is done using canny edge detection technique. After the comparison it intimates the passengers at the consecutive stops which compartments are not occupied or have low occupancy. Thus, redirecting them and preventing overcrowding.

Keywords: canny edge detection, comparison, encapsulation, redirection

Procedia PDF Downloads 307
12759 User Experience Measurement of User Interfaces

Authors: Mohammad Hashemi, John Herbert

Abstract:

Quantifying and measuring Quality of Experience (QoE) are important and difficult concerns in Human Computer Interaction (HCI). Quality of Service (QoS) and the actual User Interface (UI) of the application are both important contributors to the QoE of a user. This paper describes a framework that measures accurately the way a user uses the UI in order to model users' behaviours and profiles. It monitors the use of the mouse and use of UI elements with accurate time measurement. It does this in real-time and does so unobtrusively and efficiently allowing the user to work as normal with the application. This real-time accurate measurement of the user's interaction provides valuable data and insight into the use of the UI, and is also the basis for analysis of the user's QoE.

Keywords: user modelling, user interface experience, quality of experience, user experience, human and computer interaction

Procedia PDF Downloads 477
12758 Developing a Model for the Lexical Analysis of Key Works of Children's Literature

Authors: Leigha Inman

Abstract:

One of the most cutting-edge interdisciplinary topics in the social sciences is the application of understandings from the humanities to traditionally social scientific disciplines such as education studies. This paper proposes such a topic. It has often been observed that children enjoy literature. The role of reading in the development of reading ability is an important area of research. However, the role of vocabulary in reading development has long been neglected. This paper reports an investigation into the number of words found in key works of children's literature and attempts to correlate that figure with years elapsed since publication of the work. Pedagogical implications will be discussed.

Keywords: educational pedagogy, young learners, vocabulary teaching, reading development

Procedia PDF Downloads 100
12757 Adaptive Cooperative Scheme Considering the User Location

Authors: Bit-Na Kwon, Hyun-Jee Yang, Dong-Hyun Ha, Hyoung-Kyu Song

Abstract:

In this paper, an adaptive cooperative scheme in the cell edge is proposed. The proposed scheme considers the location of a user and applies the suitable cooperative scheme. In cellular systems, the performance of communication is degraded if the user is located in the cell edge. In conventional scheme, two base stations are used in order to obtain diversity gain. However, the performance of communication is not sufficiently improved since the distance between each base station and a user is still distant. Therefore, we propose a scheme that the relays are used and the cooperative scheme is adaptively applied according to the user location. Through simulation results, it is confirmed that the proposed scheme has better performance than the conventional scheme.

Keywords: adaptive transmission, cooperative communication, diversity gain, OFDM

Procedia PDF Downloads 545
12756 Trash Dash: An Educational Android Game Application for Proper Waste Segregation

Authors: Marylene S. Eder, Dorothy M. Jao, Paolo Marc Nicolas S. Laspiñas, Pukilan A. Malim, Sarah Jean D. Raterta

Abstract:

Trash Dash is an android game application developed to serve as an alternative tool to practice proper waste segregation for children ages 3 years old and above. The researchers designed the application using Unity 3D and developed the text file that served as the database of the game application. An observation of a pre-school teacher shows that children know how to throw their garbage but they do not know yet how to segregate wastes. After launching the mobile application to K-2 pupils 4 – 5 years of age, the researchers have noticed that children within this age are active and motivated to learn the difference between biodegradable and non-biodegradable. Based on the result of usability test conducted, it was concluded that the game is easy to use and children will most likely use this application frequently. Furthermore, the children may need assistance from their parents and teachers when playing the game. An actual testing of the application has been conducted to different devices as well as functionality test by Thwack Application and it can be concluded that the mobile application can be launched and installed on a device with a minimum API requirement of Gingerbread (2.3.1).

Keywords: waste segregation, android application, biodegradable, non-biodegradable

Procedia PDF Downloads 411
12755 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 66
12754 Radical Technological Innovation - Comparison of a Critical Success Factors Framework with Existing Literature

Authors: Florian Wohlfeil, Orestis Terzidis, Louisa Hellmann

Abstract:

Radical technological innovations enable companies to reach strong market positions and are thus desirable. On the other hand, the innovation process is related to significant costs and risks. Hence, the knowledge of the factors that influence success is crucial for technology driven companies. In a previous study, we have developed a conceptual framework of 25 Critical Success Factors for radical technological innovations and mapped them to four main categories: Technology, Organization, Market, and Process. We refer to it as the Technology-Organization-Market-Process (TOMP) framework. Taking the TOMP framework as a reference model, we conducted a structured and focused literature review of eleven standard books on the topic of radical technological innovation. With this approach, we aim to evaluate, expand, and clarify the set of Critical Success Factors detailed in the TOMP framework. Overall, the set of factors and their allocation to the main categories of the TOMP framework could be confirmed. However, the factor organizational home is not emphasized and discussed in most of the reviewed literature. On the other hand, an additional factor that has not been part of the TOMP framework is described to be important – strategy fit. Furthermore, the factors strategic alliances and platform strategy appear in the literature but in a different context compared to the reference model.

Keywords: Critical Success Factors, radical technological innovation, TOMP framework, innovation process

Procedia PDF Downloads 633
12753 A Modular Framework for Enabling Analysis for Educators with Different Levels of Data Mining Skills

Authors: Kyle De Freitas, Margaret Bernard

Abstract:

Enabling data mining analysis among a wider audience of educators is an active area of research within the educational data mining (EDM) community. The paper proposes a framework for developing an environment that caters for educators who have little technical data mining skills as well as for more advanced users with some data mining expertise. This framework architecture was developed through the review of the strengths and weaknesses of existing models in the literature. The proposed framework provides a modular architecture for future researchers to focus on the development of specific areas within the EDM process. Finally, the paper also highlights a strategy of enabling analysis through either the use of predefined questions or a guided data mining process and highlights how the developed questions and analysis conducted can be reused and extended over time.

Keywords: educational data mining, learning management system, learning analytics, EDM framework

Procedia PDF Downloads 299
12752 A Framework for Green Use and Disposal of Information Communication Technology Devices

Authors: Frezer Alem Kebede

Abstract:

The notion of viewing ICT as merely support for the business process has shifted towards viewing ICT as a critical business enabler. As such, the need for ICT devices has increased, contributing to high electronic equipment acquisition and disposal. Hence, its use and disposal must be seen in light of environmental sustainability, i.e., in terms of green use and disposal. However, there are limited studies on green Use and Disposal framework to be used as guiding lens by organizations in developing countries. And this study endeavors to address that need taking one of the largest multinational ICT intensive company in the country. The design and development of this framework passed through several stages, initially factors affecting green use and disposal were identified after quantitative and qualitative data analysis then there were multiple brainstorming sessions for the design enhancement as participative modelling was employed. Given the difference in scope and magnitude of the challenges identified, the proposed framework approaches green use and disposal in four imperatives; strategically, tactically, operationally and through continuous improvement.

Keywords: energy efficiency, green disposal, green ICT, green use, green use and disposal framework, sustainability

Procedia PDF Downloads 169
12751 Research on Malware Application Patterns of Using Permission Monitoring System

Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim

Abstract:

This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.

Keywords: malware patterns, application permission, application analysis, security

Procedia PDF Downloads 490
12750 Agile Software Development Implementation in Developing a Diet Tracker Mobile Application

Authors: Dwi Puspita Sari, Gulnur Baltabayeva, Nadia Salman, Maxut Toleuov, Vijay Kanabar

Abstract:

Technology era drives people to use mobile phone to support their daily life activities. Technology development has a rapid phase which pushes the IT company to adjust any technology changes in order to fulfill customer’s satisfaction. As a result of that, many companies in the USA emerged from systematics software development approach to agile software development approach in developing systems and applications to develop many mobile phone applications in a short phase to fulfill user’s needs. As a systematic approach is considered as time consuming, costly, and too risky, agile software development has become a more popular approach to use for developing software including mobile applications. This paper reflects a short-term project to develop a diet tracker mobile application using agile software development that focused on applying scrum framework in the development process.

Keywords: agile software development, scrum, diet tracker, mobile application

Procedia PDF Downloads 228
12749 Quality Analysis of Vegetables Through Image Processing

Authors: Abdul Khalique Baloch, Ali Okatan

Abstract:

The quality analysis of food and vegetable from image is hot topic now a day, where researchers make them better then pervious findings through different technique and methods. In this research we have review the literature, and find gape from them, and suggest better proposed approach, design the algorithm, developed a software to measure the quality from images, where accuracy of image show better results, and compare the results with Perouse work done so for. The Application we uses an open-source dataset and python language with tensor flow lite framework. In this research we focus to sort food and vegetable from image, in the images, the application can sorts and make them grading after process the images, it could create less errors them human base sorting errors by manual grading. Digital pictures datasets were created. The collected images arranged by classes. The classification accuracy of the system was about 94%. As fruits and vegetables play main role in day-to-day life, the quality of fruits and vegetables is necessary in evaluating agricultural produce, the customer always buy good quality fruits and vegetables. This document is about quality detection of fruit and vegetables using images. Most of customers suffering due to unhealthy foods and vegetables by suppliers, so there is no proper quality measurement level followed by hotel managements. it have developed software to measure the quality of the fruits and vegetables by using images, it will tell you how is your fruits and vegetables are fresh or rotten. Some algorithms reviewed in this thesis including digital images, ResNet, VGG16, CNN and Transfer Learning grading feature extraction. This application used an open source dataset of images and language used python, and designs a framework of system.

Keywords: deep learning, computer vision, image processing, rotten fruit detection, fruits quality criteria, vegetables quality criteria

Procedia PDF Downloads 47
12748 Linear Evolution of Compressible Görtler Vortices Subject to Free-Stream Vortical Disturbances

Authors: Samuele Viaro, Pierre Ricco

Abstract:

Görtler instabilities generate in boundary layers from an unbalance between pressure and centrifugal forces caused by concave surfaces. Their spatial streamwise evolution influences transition to turbulence. It is therefore important to understand even the early stages where perturbations, still small, grow linearly and could be controlled more easily. This work presents a rigorous theoretical framework for compressible flows using the linearized unsteady boundary region equations, where only the streamwise pressure gradient and streamwise diffusion terms are neglected from the full governing equations of fluid motion. Boundary and initial conditions are imposed through an asymptotic analysis in order to account for the interaction of the boundary layer with free-stream turbulence. The resulting parabolic system is discretize with a second-order finite difference scheme. Realistic flow parameters are chosen from wind tunnel studies performed at supersonic and subsonic conditions. The Mach number ranges from 0.5 to 8, with two different radii of curvature, 5 m and 10 m, frequencies up to 2000 Hz, and vortex spanwise wavelengths from 5 mm to 20 mm. The evolution of the perturbation flow is shown through velocity, temperature, pressure profiles relatively close to the leading edge, where non-linear effects can still be neglected, and growth rate. Results show that a global stabilizing effect exists with the increase of Mach number, frequency, spanwise wavenumber and radius of curvature. In particular, at high Mach numbers curvature effects are less pronounced and thermal streaks become stronger than velocity streaks. This increase of temperature perturbations saturates at approximately Mach 4 flows, and is limited in the early stage of growth, near the leading edge. In general, Görtler vortices evolve closer to the surface with respect to a flat plate scenario but their location shifts toward the edge of the boundary layer as the Mach number increases. In fact, a jet-like behavior appears for steady vortices having small spanwise wavelengths (less than 10 mm) at Mach 8, creating a region of unperturbed flow close to the wall. A similar response is also found at the highest frequency considered for a Mach 3 flow. Larger vortices are found to have a higher growth rate but are less influenced by the Mach number. An eigenvalue approach is also employed to study the amplification of the perturbations sufficiently downstream from the leading edge. These eigenvalue results are compared with the ones obtained through the initial value approach with inhomogeneous free-stream boundary conditions. All of the parameters here studied have a significant influence on the evolution of the instabilities for the Görtler problem which is indeed highly dependent on initial conditions.

Keywords: compressible boundary layers, Görtler instabilities, receptivity, turbulence transition

Procedia PDF Downloads 233
12747 DocPro: A Framework for Processing Semantic and Layout Information in Business Documents

Authors: Ming-Jen Huang, Chun-Fang Huang, Chiching Wei

Abstract:

With the recent advance of the deep neural network, we observe new applications of NLP (natural language processing) and CV (computer vision) powered by deep neural networks for processing business documents. However, creating a real-world document processing system needs to integrate several NLP and CV tasks, rather than treating them separately. There is a need to have a unified approach for processing documents containing textual and graphical elements with rich formats, diverse layout arrangement, and distinct semantics. In this paper, a framework that fulfills this unified approach is presented. The framework includes a representation model definition for holding the information generated by various tasks and specifications defining the coordination between these tasks. The framework is a blueprint for building a system that can process documents with rich formats, styles, and multiple types of elements. The flexible and lightweight design of the framework can help build a system for diverse business scenarios, such as contract monitoring and reviewing.

Keywords: document processing, framework, formal definition, machine learning

Procedia PDF Downloads 189
12746 Audio-Visual Recognition Based on Effective Model and Distillation

Authors: Heng Yang, Tao Luo, Yakun Zhang, Kai Wang, Wei Qin, Liang Xie, Ye Yan, Erwei Yin

Abstract:

Recent years have seen that audio-visual recognition has shown great potential in a strong noise environment. The existing method of audio-visual recognition has explored methods with ResNet and feature fusion. However, on the one hand, ResNet always occupies a large amount of memory resources, restricting the application in engineering. On the other hand, the feature merging also brings some interferences in a high noise environment. In order to solve the problems, we proposed an effective framework with bidirectional distillation. At first, in consideration of the good performance in extracting of features, we chose the light model, Efficientnet as our extractor of spatial features. Secondly, self-distillation was applied to learn more information from raw data. Finally, we proposed a bidirectional distillation in decision-level fusion. In more detail, our experimental results are based on a multi-model dataset from 24 volunteers. Eventually, the lipreading accuracy of our framework was increased by 2.3% compared with existing systems, and our framework made progress in audio-visual fusion in a high noise environment compared with the system of audio recognition without visual.

Keywords: lipreading, audio-visual, Efficientnet, distillation

Procedia PDF Downloads 108
12745 Curvelet Features with Mouth and Face Edge Ratios for Facial Expression Identification

Authors: S. Kherchaoui, A. Houacine

Abstract:

This paper presents a facial expression recognition system. It performs identification and classification of the seven basic expressions; happy, surprise, fear, disgust, sadness, anger, and neutral states. It consists of three main parts. The first one is the detection of a face and the corresponding facial features to extract the most expressive portion of the face, followed by a normalization of the region of interest. Then calculus of curvelet coefficients is performed with dimensionality reduction through principal component analysis. The resulting coefficients are combined with two ratios; mouth ratio and face edge ratio to constitute the whole feature vector. The third step is the classification of the emotional state using the SVM method in the feature space.

Keywords: facial expression identification, curvelet coefficient, support vector machine (SVM), recognition system

Procedia PDF Downloads 213
12744 Investigating the Viability of Ultra-Low Parameter Count Networks for Real-Time Football Detection

Authors: Tim Farrelly

Abstract:

In recent years, AI-powered object detection systems have opened the doors for innovative new applications and products, especially those operating in the real world or ‘on edge’ – namely, in sport. This paper investigates the viability of an ultra-low parameter convolutional neural network specially designed for the detection of footballs on ‘on the edge’ devices. The main contribution of this paper is the exploration of integrating new design features (depth-wise separable convolutional blocks and squeezed and excitation modules) into an ultra-low parameter network and demonstrating subsequent improvements in performance. The results show that tracking the ball from Full HD images with negligibly high accu-racy is possible in real-time.

Keywords: deep learning, object detection, machine vision applications, sport, network design

Procedia PDF Downloads 122
12743 Design of an Improved Distributed Framework for Intrusion Detection System Based on Artificial Immune System and Neural Network

Authors: Yulin Rao, Zhixuan Li, Burra Venkata Durga Kumar

Abstract:

Intrusion detection refers to monitoring the actions of internal and external intruders on the system and detecting the behaviours that violate security policies in real-time. In intrusion detection, there has been much discussion about the application of neural network technology and artificial immune system (AIS). However, many solutions use static methods (signature-based and stateful protocol analysis) or centralized intrusion detection systems (CIDS), which are unsuitable for real-time intrusion detection systems that need to process large amounts of data and detect unknown intrusions. This article proposes a framework for a distributed intrusion detection system (DIDS) with multi-agents based on the concept of AIS and neural network technology to detect anomalies and intrusions. In this framework, multiple agents are assigned to each host and work together, improving the system's detection efficiency and robustness. The trainer agent in the central server of the framework uses the artificial neural network (ANN) rather than the negative selection algorithm of AIS to generate mature detectors. Mature detectors can distinguish between self-files and non-self-files after learning. Our analyzer agents use genetic algorithms to generate memory cell detectors. This kind of detector will effectively reduce false positive and false negative errors and act quickly on known intrusions.

Keywords: artificial immune system, distributed artificial intelligence, multi-agent, intrusion detection system, neural network

Procedia PDF Downloads 84
12742 Contemporary Visual Art and Shariah: A Conceptual Framework

Authors: Ishak Ramli, Mohamad Noorman Masrek, Muhamad Abdul Aziz Ab Gani

Abstract:

Islam places restrictions and limitation to the creation and ownership of visual art. Not all forms of visual arts are permissible in Islam. However, guidance on the creation and ownership of visual arts is not made plain and clear not only to the Islamic followers but also to the art community. Given this gap, this study attempts to develop a conceptual framework that will guide artist and art collectors on what constitute to valid and acceptable through the Islamic perspective. Based on this framework, several research checklist are proposed. It is highly useful especially for the researchers who are interested to study the topic. Qualitative research is the best choice to test run the paper work to attempt all the checklist which are formed.

Keywords: contemporary visual art, Shariah, conceptual framework, Islam

Procedia PDF Downloads 343
12741 Development of Risk-Based Dam Safety Framework in Climate Change Condition for Batu Dam, Malaysia

Authors: Wan Noorul Hafilah Binti Wan Ariffin

Abstract:

Dam safety management is the crucial infrastructure as dam failure has a catastrophic effect on the community. Dam safety management is the effective framework of key actions and activities for the dam owner to manage the safety of the dam for its entire life cycle. However, maintaining dam safety is a challenging task as there are changes in current dam states. These changes introduce new risks to the dam's safety, which had not been considered when the dam was designed. A new framework has to be developed to adapt to the changes in the dam risk and make the dams resilient. This study proposes a risk-based decision-making adaptation framework for dam safety management. The research focuses on climate change's impact on hydrological situations as it causes floods and damages the dam structure. The risk analysis framework is adopted to improve the dam management strategies. The proposed study encompasses four phases. To start with, measuring the effect by assessing the impact of climate change on embankment dam, the second phase is to analyze the potential embankment dam failures. The third is analyzing the different components of risks related to the dam and, finally, developing a robust decision-making framework.

Keywords: climate change, embankment dam, failure, risk-informed decision making

Procedia PDF Downloads 120
12740 Resource Framework Descriptors for Interestingness in Data

Authors: C. B. Abhilash, Kavi Mahesh

Abstract:

Human beings are the most advanced species on earth; it's all because of the ability to communicate and share information via human language. In today's world, a huge amount of data is available on the web in text format. This has also resulted in the generation of big data in structured and unstructured formats. In general, the data is in the textual form, which is highly unstructured. To get insights and actionable content from this data, we need to incorporate the concepts of text mining and natural language processing. In our study, we mainly focus on Interesting data through which interesting facts are generated for the knowledge base. The approach is to derive the analytics from the text via the application of natural language processing. Using semantic web Resource framework descriptors (RDF), we generate the triple from the given data and derive the interesting patterns. The methodology also illustrates data integration using the RDF for reliable, interesting patterns.

Keywords: RDF, interestingness, knowledge base, semantic data

Procedia PDF Downloads 130
12739 A Measuring Industrial Resiliency by Using Data Envelopment Analysis Approach

Authors: Ida Bagus Made Putra Jandhana, Teuku Yuri M. Zagloel, Rahmat Nurchayo

Abstract:

Having several crises that affect industrial sector performance in the past decades, decision makers should utilize measurement application that enables them to measure industrial resiliency more precisely. It provides not only a framework for the development of resilience measurement application, but also several theories for the concept building blocks, such as performance measurement management, and resilience engineering in real world environment. This research is a continuation of previously published paper on performance measurement in the industrial sector. Finally, this paper contributes an alternative performance measurement method in industrial sector based on resilience concept. Moreover, this research demonstrates how applicable the concept of resilience engineering is and its method of measurement.

Keywords: industrial, measurement, resilience, sector

Procedia PDF Downloads 248
12738 Experimental Studies of Dragonfly Flight Aerodynamics

Authors: Mohd Izmir Bin Yamin, Thomas Arthur Ward

Abstract:

Past aerodynamic studies of flapping wing flight have shown that it has increased aerodynamic performances compared to fixed wing steady flight. One of the dominant mechanisms that is responsible for causing this phenomenon is a leading edge vortex, generated by the flapping motion of a flexible wing. Wind tunnel experiments were conducted to observe the aerodynamic profile of a flapping wing, by measuring the lift, drag and thrust. Analysis was done to explain how unsteady aerodynamics leads towards better power performances than a fixed wing flight. The information from this study can be used as a base line for designing future Bio-mimetic Micro Air Vehicles that are based on flying insect aerodynamic mechanisms.

Keywords: flapping wing flight, leading edge vortex, aerodynamics performances, wind tunnel test

Procedia PDF Downloads 359
12737 Corporate Philanthropy as a Source of Competitive Advantage

Authors: Mateusz Rak

Abstract:

Objective: The paper aims to present various sources of competitive advantage which may occur when an enterprise strategically applies its concept of corporate philanthropy. Methodology: The review of the literature and available reports on the research regarding corporate philanthropy. Results: Strategic philanthropy is a positive phenomenon. Unfortunately, enterprises in Poland do not see all positive sides of such activities yet. Three kinds of corporate philanthropy may be described. They are to fulfil a social duty, improve the company reputation and gain a competitive edge. Practical implications: Showing enterprises the advantages of taking philanthropic actions, in particular, a large role of strategic philanthropy in gaining a competitive edge in the market as well as how to avoid negative consequences of corporate philanthropy. The paper presents corporate philanthropy on a few layers: as a CSR element, actions generating values in products, actions improving a corporate image in the market, altruist actions of employees.

Keywords: corporate philanthropy, corporate social responsibility, corporate foundations, CSR

Procedia PDF Downloads 225
12736 Development of a Hamster Knowledge System Based on Android Application

Authors: Satien Janpla, Thanawan Boonpuck, Pattarapan Roonrakwit

Abstract:

In this paper, we present a hamster knowledge system based on android application. The objective of this system is to advice user to upkeep and feed hamsters based on mobile application. We describe the design approaches and functional components of this system. The system was developed based on knowledge based of hamster experts. The results were divided by the research purposes into 2 parts: developing the mobile application for advice users and testing and evaluating the system. Black box technique was used to evaluate application performances and questionnaires were applied to measure user satisfaction with system usability by specialists and users.

Keywords: hamster knowledge, Android application, black box, questionnaires

Procedia PDF Downloads 314
12735 Domain Driven Design vs Soft Domain Driven Design Frameworks

Authors: Mohammed Salahat, Steve Wade

Abstract:

This paper presents and compares the SSDDD “Systematic Soft Domain Driven Design Framework” to DDD “Domain Driven Design Framework” as a soft system approach of information systems development. The framework use SSM as a guiding methodology within which we have embedded a sequence of design tasks based on the UML leading to the implementation of a software system using the Naked Objects framework. This framework has been used in action research projects that have involved the investigation and modelling of business processes using object-oriented domain models and the implementation of software systems based on those domain models. Within this framework, Soft Systems Methodology (SSM) is used as a guiding methodology to explore the problem situation and to develop the domain model using UML for the given business domain. The framework is proposed and evaluated in our previous works, a comparison between SSDDD and DDD is presented in this paper, to show how SSDDD improved DDD as an approach to modelling and implementing business domain perspectives for Information Systems Development. The comparison process, the results, and the improvements are presented in the following sections of this paper.

Keywords: domain-driven design, soft domain-driven design, naked objects, soft language

Procedia PDF Downloads 271