Search results for: proxy server
254 An Empirical Study of the Impacts of Big Data on Firm Performance
Authors: Thuan Nguyen
Abstract:
In the present time, data to a data-driven knowledge-based economy is the same as oil to the industrial age hundreds of years ago. Data is everywhere in vast volumes! Big data analytics is expected to help firms not only efficiently improve performance but also completely transform how they should run their business. However, employing the emergent technology successfully is not easy, and assessing the roles of big data in improving firm performance is even much harder. There was a lack of studies that have examined the impacts of big data analytics on organizational performance. This study aimed to fill the gap. The present study suggested using firms’ intellectual capital as a proxy for big data in evaluating its impact on organizational performance. The present study employed the Value Added Intellectual Coefficient method to measure firm intellectual capital, via its three main components: human capital efficiency, structural capital efficiency, and capital employed efficiency, and then used the structural equation modeling technique to model the data and test the models. The financial fundamental and market data of 100 randomly selected publicly listed firms were collected. The results of the tests showed that only human capital efficiency had a significant positive impact on firm profitability, which highlighted the prominent human role in the impact of big data technology.Keywords: big data, big data analytics, intellectual capital, organizational performance, value added intellectual coefficient
Procedia PDF Downloads 246253 An E-Assessment Website to Implement Hierarchical Aggregate Assessment
Authors: M. Lesage, G. Raîche, M. Riopel, F. Fortin, D. Sebkhi
Abstract:
This paper describes a Web server implementation of the hierarchical aggregate assessment process in the field of education. This process describes itself as a field of teamwork assessment where teams can have multiple levels of hierarchy and supervision. This process is applied everywhere and is part of the management, education, assessment and computer science fields. The E-Assessment website named “Cluster” records in its database the students, the course material, the teams and the hierarchical relationships between the students. For the present research, the hierarchical relationships are team member, team leader and group administrator appointments. The group administrators have the responsibility to supervise team leaders. The experimentation of the application has been performed by high school students in geology courses and Canadian army cadets for navigation patrols in teams. This research extends the work of Nance that uses a hierarchical aggregation process similar as the one implemented in the “Cluster” application.Keywords: e-learning, e-assessment, teamwork assessment, hierarchical aggregate assessment
Procedia PDF Downloads 369252 An Association between Stock Index and Macro Economic Variables in Bangladesh
Authors: Shamil Mardi Al Islam, Zaima Ahmed
Abstract:
The aim of this article is to explore whether certain macroeconomic variables such as industrial index, inflation, broad money, exchange rate and deposit rate as a proxy for interest rate are interlinked with Dhaka stock price index (DSEX index) precisely after the introduction of new index by Dhaka Stock Exchange (DSE) since January 2013. Bangladesh stock market has experienced rapid growth since its inception. It might not be a very well-developed capital market as compared to its neighboring counterparts but has been a strong avenue for investment and resource mobilization. The data set considered consists of monthly observations, for a period of four years from January 2013 to June 2018. Findings from cointegration analysis suggest that DSEX and macroeconomic variables have a significant long-run relationship. VAR decomposition based on VAR estimated indicates that money supply explains a significant portion of variation of stock index whereas, inflation is found to have the least impact. Impact of industrial index is found to have a low impact compared to the exchange rate and deposit rate. Policies should there aim to increase industrial production in order to enhance stock market performance. Further reasonable money supply should be ensured by authorities to stimulate stock market performance.Keywords: deposit rate, DSEX, industrial index, VAR
Procedia PDF Downloads 163251 The Impact of Bequest Taxation on Human Capital Accumulation
Authors: Maciej Dudek, Robert Kruszewski, Janusz Kudla, Konrad Walczyk
Abstract:
In this paper, we study how taxation of bequests affects human capital formation in the long term and short term horizon. Our underlying model is an overlapping generation model (OLG) with some degree of altruism on the part of the ancestors' generation towards their descendants. We ask the question in three separate frameworks. First, we study a simple one-sector model where a proxy of human capital is wage income. It the steady-state -for CRRA utility function and human capital produced with non-decreasing returns -the taxation of bequests is neutral to the accumulation of human capital. In the second framework, neutrality applies to the growth rates of human capital, physical capital, and consumption. In this case, taxation increases the level of bequests, leading to a lower value of current consumption. Finally in we consider two periods model instead of infinite horizon model as long as the tax revenue is at least partially rebated back to the public, the fraction of human capital engaged in the process of formation of human capital increases with the tax rate on bequests. In other words, taxation of bequests is partially offset by an increase in human capital formation. Higher human capital allows the future generation to earn higher wages, and today's generation can find it optimal to endow the future generation with more human capital when taxation is imposed on physical capital transferred to the next generation.Keywords: taxation, bequests, policy, human capital
Procedia PDF Downloads 171250 Family Homicide: A Comparison of Rural and Urban Communities in California
Authors: Bohsiu Wu
Abstract:
This study compares the differences in social dynamics between rural and urban areas in California to explain homicides involving family members. It is hypothesized that rural homicides are better explained by social isolation and lack of intervention resources, whereas urban homicides are attributed to social disadvantage factors. Several critical social dynamics including social isolation, social disadvantages, acculturation, and intervention resources were entered in a hierarchical linear model (HLM) to examine whether county-level factors affect how each specific dynamic performs at the ZIP code level, a proxy measure for communities. Homicide data are from the Supplementary Homicide Report for all 58 counties in California from 1997 to 1999. Predictors at both the county and ZIP code levels are derived from the 2000 US census. Preliminary results from a HLM analysis show that social isolation is a significant but moderate predictor to explain rural family homicide and various social disadvantage factors are significant factors accounting for urban family homicide. Acculturation has little impact. Rurality and urbanity appear to interact with various social dynamics in explaining family homicide. The implications for prevention at both the county and community level as well as directions for future study on the differences between rural and urban locales are explored in the paper.Keywords: communities, family, HLM, homicide, rural, urban
Procedia PDF Downloads 326249 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 234248 Bystanders' Behavior during Emergencies
Authors: Alan (Avi) Kirschenbaum, Carmit Rapaport
Abstract:
The behavior of bystanders in emergencies and disasters have been examined for over 50 years. Such acts have been cited as contributing to saving lives in terms of providing first responder help until official emergency units can arrive. Several reasons have been suggested for this type of behavior but most focused on a broad segment of individual psychological decision-making processes. Recent theoretical evidence suggests that the external factors for such bystander decisions, mainly disaster community based social contexts factors, are also important. We aim to test these competing arguments. Specifically, we examine alternative explanatory perspectives by focusing on self-efficacy as a proxy for the accepted individual psychological case and contrast it with potential bystander characteristics of the individual as well factors as embedded in the social context of the disaster community. To do so, we will utilize a random sampling of the population from a field study of an urban community in Israel that experienced five years of continuous terror attacks. The results strongly suggest that self-efficacy, as well as external factors: preparedness and having skills for intervention during emergencies along with gender best, predict potential helping behaviors. These results broaden our view of bystander behavior and open a window for enhancing this phenomenon as another element in disaster and crisis management.Keywords: bystander behavior, disasters emergencies, psychological motivation to help, social context for helping
Procedia PDF Downloads 123247 Adopting Cloud-Based Techniques to Reduce Energy Consumption: Toward a Greener Cloud
Authors: Sandesh Achar
Abstract:
The cloud computing industry has set new goals for better service delivery and deployment, so anyone can access services such as computation, application, and storage anytime. Cloud computing promises new possibilities for approaching sustainable solutions to deploy and advance their services in this distributed environment. This work explores energy-efficient approaches and how cloud-based architecture can reduce energy consumption levels amongst enterprises leveraging cloud computing services. Adopting cloud-based networking, database, and server machines provide a comprehensive means of achieving the potential gains in energy efficiency that cloud computing offers. In energy-efficient cloud computing, virtualization is one aspect that can integrate several technologies to achieve consolidation and better resource utilization. Moreover, the Green Cloud Architecture for cloud data centers is discussed in terms of cost, performance, and energy consumption, and appropriate solutions for various application areas are provided.Keywords: greener cloud, cloud computing, energy efficiency, energy consumption, metadata tags, green cloud advisor
Procedia PDF Downloads 89246 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises
Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh
Abstract:
As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan
Procedia PDF Downloads 42245 The Impact of Information and Communication Technology in Knowledge Fraternization
Authors: Muhammad Aliyu
Abstract:
Significant improvement in Information and Communication Technology (ICT) and the enforced global competition are revolutionizing the way knowledge is managed and the way organizations compete. The emergence of new organizations calls for a new way to fraternize knowledge, which is known as 'knowledge fraternization.' In this modern economy, it is the knowledge if properly managed that can harness the organization's competitive advantage. This competitive advantage is realized through the full utilization of information and data coupled with the harnessing of people’s skills and ideas as well as their commitment and motivations, which can be accomplished through socializing the knowledge management processes. A fraternize network for knowledge management is a web-based system designed using PHP that is Dreamweaver web development tool, with the help of CS4 Adobe Dreamweaver as the PHP code Editor that supports the use of Cascadian Style Sheet (CSS), MySQL with Xamp, Php My Admin (Version 3.4.7) localhost server via TCP/IP for containing the databases of the system to support this in a distributed way, spreading the workload over the whole organization. This paper reviews the technologies and the technology tools to be used in the development of social networks in an organization.Keywords: Information and Communication Technology (ICT), knowledge, fraternization, social network
Procedia PDF Downloads 395244 A Novel Algorithm for Parsing IFC Models
Authors: Raninder Kaur Dhillon, Mayur Jethwa, Hardeep Singh Rai
Abstract:
Information technology has made a pivotal progress across disparate disciplines, one of which is AEC (Architecture, Engineering and Construction) industry. CAD is a form of computer-aided building modulation that architects, engineers and contractors use to create and view two- and three-dimensional models. The AEC industry also uses building information modeling (BIM), a newer computerized modeling system that can create four-dimensional models; this software can greatly increase productivity in the AEC industry. BIM models generate open source IFC (Industry Foundation Classes) files which aim for interoperability for exchanging information throughout the project lifecycle among various disciplines. The methods developed in previous studies require either an IFC schema or MVD and software applications, such as an IFC model server or a Building Information Modeling (BIM) authoring tool, to extract a partial or complete IFC instance model. This paper proposes an efficient algorithm for extracting a partial and total model from an Industry Foundation Classes (IFC) instance model without an IFC schema or a complete IFC model view definition (MVD). Procedia PDF Downloads 300243 Broadcast Routing in Vehicular Ad hoc Networks (VANETs)
Authors: Muazzam A. Khan, Muhammad Wasim
Abstract:
Vehicular adhoc network (VANET) Cars for network (VANET) allowing vehicles to talk to each other, which is committed to building a strong network of mobile vehicles is technical. In VANETs vehicles are equipped with special devices that can get and share info with the atmosphere and other vehicles in the network. Depending on this data security and safety of the vehicles can be enhanced. Broadcast routing is dispersion of any audio or visual medium of mass communication scattered audience distribute audio and video content, but usually using electromagnetic radiation (waves). The lack of server or fixed infrastructure media messages in VANETs plays an important role for every individual application. Broadcast Message VANETs still open research challenge and requires some effort to come to good solutions. This paper starts with a brief introduction of VANET, its applications, and the law of the message-trends in this network starts. This work provides an important and comprehensive study of reliable broadcast routing in VANET scenario.Keywords: vehicular ad-hoc network , broadcasting, networking protocols, traffic pattern, low intensity conflict
Procedia PDF Downloads 535242 Development of a Data Security Model Using Steganography
Authors: Terungwa Simon Yange, Agana Moses A.
Abstract:
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.Keywords: steganography, cryptography, encryption, decryption, secrecy
Procedia PDF Downloads 267241 Animal Welfare Assessment Method through Stockmanship Competence: The Context of Backyard Goat Production in the Philippines
Authors: M. J. Alcedo, K. Ito, K. Maeda
Abstract:
Measuring animal welfare is a newly emerging area of research and it needs multi-disciplinary way to do it. Due to the diversity of what constitutes the definition of animal welfare, different methods and models were developed and mostly conducted in semi and commercial farms in developed countries. Few studies have been conducted in developing countries and in backyard livestock operation. Recognizing that majority of livestock operations are categorized as backyard in developing countries, it is crucial to come up with parameters that can assess the welfare of the animal in the backyard level. This research had made use of stockmanship competence as the proxy indicator to assess animal welfare. Stockmanship competence in this study refers to the capacity of the animal owner to ensure the welfare of their animal by providing their needs for growth and reproduction. The Philippine recommend on goat production, tips on goat raising and goat scientific literatures were used as references to come up with indicators that are known to be important in meeting the needs of the animal and ensuring its welfare. Scores from -1 to +2 were assigned depending on how close it is of satisfying the animal’s need. It is hoped that this assessment method could contribute to the growing body of knowledge on animal welfare and can be utilized as logical and scientific framework in assessing welfare in backyard goat operation. It is suggested that further study needs to be conducted to refine and standardize indicators and identify other indicators for goat welfare assessment.Keywords: backyard goat production, stockmanship competence, animal welfare, Philippines
Procedia PDF Downloads 440240 Patterns and Effects of International Trade in Technology: Firm-Level Evidence
Authors: Heeyong Noh, Seongryong Kang, Sungjoo Lee
Abstract:
As the world becomes increasingly interconnected, firms have tried to explore market opportunities not only in the domestic market but also abroad. In particular, transactions of intangible assets in the global market now take on great importance. Accordingly, technology transfer activities such as patent licensing, copyright transfer, or workforce trainings which are considered significant to leverage an organization’s internal capabilities, are occurring more frequently and briskly across the world than ever before. Though a number of studies have addressed the issues regarding technology transfer, most of them have focused on university-industry technology transfer. Of course, some have investigated international technology transfer phenomenon but used patent citations data as a proxy. In order to understand the phenomena more clearly, it would be necessary to collect and analyze data that can measure technology transfer activities between firms more directly. Therefore, this study aims to examine the patterns of international trade in technology by employing data about international technology in-licensing activities in Korean firms. We also investigate the effect of international technology in-licensing strategy on a firm’s innovation performance. The research findings are expected to help R&D managers understand how firms have absorbed technological knowledge from foreign firms in the form of licensing and further develop effective international collaboration strategies. In addition, significant implications can be offered for political decision-making regarding technology trade within increasing international interconnections.Keywords: international technology trade, technology trade effect, technology transfer, R&D managers
Procedia PDF Downloads 379239 A Relational Data Base for Radiation Therapy
Authors: Raffaele Danilo Esposito, Domingo Planes Meseguer, Maria Del Pilar Dorado Rodriguez
Abstract:
As far as we know, it is still unavailable a commercial solution which would allow to manage, openly and configurable up to user needs, the huge amount of data generated in a modern Radiation Oncology Department. Currently, available information management systems are mainly focused on Record & Verify and clinical data, and only to a small extent on physical data. Thus, results in a partial and limited use of the actually available information. In the present work we describe the implementation at our department of a centralized information management system based on a web server. Our system manages both information generated during patient planning and treatment, and information of general interest for the whole department (i.e. treatment protocols, quality assurance protocols etc.). Our objective it to be able to analyze in a simple and efficient way all the available data and thus to obtain quantitative evaluations of our treatments. This would allow us to improve our work flow and protocols. To this end we have implemented a relational data base which would allow us to use in a practical and efficient way all the available information. As always we only use license free software.Keywords: information management system, radiation oncology, medical physics, free software
Procedia PDF Downloads 242238 Methods for Restricting Unwanted Access on the Networks Using Firewall
Authors: Bhagwant Singh, Sikander Singh Cheema
Abstract:
This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing.Keywords: firewall strategies, firewall potential, packet filtering, NAT, VPN, proxy services, firewall techniques
Procedia PDF Downloads 103237 Object Oriented Software Engineering Approach to Industrial Information System Design and Implementation
Authors: Issa Hussein Manita
Abstract:
This paper presents an example of industrial information system design and implementation (IIDC), the most common software engineering design steps that are applied to the different design stages. We are going through the life cycle of software system development. We start by a study of system requirement and end with testing and delivering system, going by system design and coding, program integration and system integration step. The most modern software design tools available used in the design this includes, but not limited to, Unified Modeling Language (UML), system modeling, SQL server side application, uses case analysis, design and testing as applied to information processing systems. The system is designed to perform tasks specified by the client with real data. By the end of the implementation of the system, default or user defined acceptance policy to provide an overall score as an indication of the system performance is used. To test the reliability of he designed system, it is tested in different environment and different work burden such as multi-user environment.Keywords: software engineering, design, system requirement, integration, unified modeling language
Procedia PDF Downloads 570236 Risk Tolerance and Individual Worthiness Based on Simultaneous Analysis of the Cognitive Performance and Emotional Response to a Multivariate Situational Risk Assessment
Authors: Frederic Jumelle, Kelvin So, Didan Deng
Abstract:
A method and system for neuropsychological performance test, comprising a mobile terminal, used to interact with a cloud server which stores user information and is logged into by the user through the terminal device; the user information is directly accessed through the terminal device and is processed by artificial neural network, and the user information comprises user facial emotions information, performance test answers information and user chronometrics. This assessment is used to evaluate the cognitive performance and emotional response of the subject to a series of dichotomous questions describing various situations of daily life and challenging the users' knowledge, values, ethics, and principles. In industrial applications, the timing of this assessment will depend on the users' need to obtain a service from a provider, such as opening a bank account, getting a mortgage or an insurance policy, authenticating clearance at work, or securing online payments.Keywords: artificial intelligence, neurofinance, neuropsychology, risk management
Procedia PDF Downloads 138235 An Industrial Scada System Remote Control Using Mobile Phones
Authors: Ahmidah Elgali
Abstract:
SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.Keywords: control, industrial, mobile, network, remote, SCADA
Procedia PDF Downloads 79234 The Impact of Major Accounting Events on Managerial Ability and the Accuracy of Environmental Capital Expenditure Projections of the Environmentally Sensitive Industries
Authors: Jason Chen, Jennifer Chen, Shiyu Li
Abstract:
We examine whether managerial ability (MA), the passing of Sarbanes-Oxley in 2002 (SOX), and corporate operational complexity affect the accuracy of environmental capital expenditure projections of the environmentally sensitive industries (ESI). Prior studies found that firms in the ESI manipulated their projected environmental capital expenditures as a tool to achieve corporate legitimation and suggested that human factors must be examined to determine whether they are part of the determinants. We use MA to proxy for the latent human factors to examine whether MA affects the accuracy of financial disclosures in the ESI. To expand Chen and Chen (2020), we further investigate whether (1) SOX and (2) firms with complex operations and financial reporting in conjunction with MA affect firms’ projection accuracy. We find, overall, that MA is positively correlated with firm’s projection accuracy in the annual 10-Ks. Furthermore, results suggest that SOX has a positive, yet temporary, effect on MA, and that leads to better accuracy. Finally, MA matters for firms with more complex operations and financial reporting to make less projection errors than their less-complex counterparts. These results suggest that MA is a determinant that affects the accuracy of environmental capital expenditure projections for the firms in the ESI.Keywords: managerial ability, environmentally sensitive industries, sox, corporate operational complexity
Procedia PDF Downloads 148233 Iterative Design Process for Development and Virtual Commissioning of Plant Control Software
Authors: Thorsten Prante, Robert Schöch, Ruth Fleisch, Vaheh Khachatouri, Alexander Walch
Abstract:
The development of industrial plant control software is a complex and often very expensive task. One of the core problems is that a lot of the implementation and adaptation work can only be done after the plant hardware has been installed. In this paper, we present our approach to virtually developing and validating plant-level control software of production plants. This way, plant control software can be virtually commissioned before actual ramp-up of a plant, reducing actual commissioning costs and time. Technically, this is achieved by linking the actual plant-wide process control software (often called plant server) and an elaborate virtual plant model together to form an emulation system. Method-wise, we are suggesting a four-step iterative process with well-defined increments and time frame. Our work is based on practical experiences from planning to commissioning and start-up of several cut-to-size plants.Keywords: iterative system design, virtual plant engineering, plant control software, simulation and emulation, virtual commissioning
Procedia PDF Downloads 490232 Preparation vADL.net: A Software Architecture Tool with Support to All of Architectural Concepts Title
Authors: Adel Smeda, Badr Najep
Abstract:
Software architecture is a method of describing the architecture of a software system at a high level of abstraction. It represents a common abstraction of a system that stakeholders can use as a basis for mutual understanding, negotiation, consensus, and communication. It also manifests the earliest design decisions about a system, and these early bindings carry weight far out of proportion to their individual gravity with respect to the system's remaining development, its deployment, and its maintenance life, therefore it is the earliest point at which design decisions governing the system to be built can be analyzed. In this paper, we present a tool to model the architecture of software systems. It represents the first method by which system defects can be detected, and provide a clear representation of a system’s components and interactions at a high level of abstraction. It can be distinguished from other tools by its support to all software architecture elements. The tool is built using VB.net 2010. We used this tool to describe two well know systems, i.e. Capitalize and Client/Server, and the descriptions we obtained support all architectural elements of the two systems.Keywords: software architecture, architecture description languages, modeling
Procedia PDF Downloads 467231 An Analysis of How Students Perceive Their Self-Efficacy in Online Speaking Classes
Authors: Heny Hartono, Cecilia Titiek Murniati
Abstract:
The pandemic has given teachers and students no other choice but having full online learning. In such an emergency situation as the time of the covid-19 pandemic, the application of LMS (Learner Management System) in higher education is the most reasonable solution for students and teachers. In fact, the online learning requires all elements of a higher education systems, including the human resources, infrastructure, and supporting systems such as the application, server, and stable internet connection. The readiness of the higher education institution in preparing the online system may secure those who are involved in the online learning process. It may also result in students’ self-efficacy in online learning. This research aimed to investigate how students perceive their self-efficacy in online English learning, especially in speaking classes which is considered as a productive language skill. This research collects qualitative data with narrative inquiry involving 25 students of speaking classes as the respondents. The results of this study show that students perceive their self-efficacy in speaking online classes as not very high.Keywords: self-efficacy, online learning, speaking class, college students, e-learning
Procedia PDF Downloads 99230 An Integrated Lightweight Naïve Bayes Based Webpage Classification Service for Smartphone Browsers
Authors: Mayank Gupta, Siba Prasad Samal, Vasu Kakkirala
Abstract:
The internet world and its priorities have changed considerably in the last decade. Browsing on smart phones has increased manifold and is set to explode much more. Users spent considerable time browsing different websites, that gives a great deal of insight into user’s preferences. Instead of plain information classifying different aspects of browsing like Bookmarks, History, and Download Manager into useful categories would improve and enhance the user’s experience. Most of the classification solutions are server side that involves maintaining server and other heavy resources. It has security constraints and maybe misses on contextual data during classification. On device, classification solves many such problems, but the challenge is to achieve accuracy on classification with resource constraints. This on device classification can be much more useful in personalization, reducing dependency on cloud connectivity and better privacy/security. This approach provides more relevant results as compared to current standalone solutions because it uses content rendered by browser which is customized by the content provider based on user’s profile. This paper proposes a Naive Bayes based lightweight classification engine targeted for a resource constraint devices. Our solution integrates with Web Browser that in turn triggers classification algorithm. Whenever a user browses a webpage, this solution extracts DOM Tree data from the browser’s rendering engine. This DOM data is a dynamic, contextual and secure data that can’t be replicated. This proposal extracts different features of the webpage that runs on an algorithm to classify into multiple categories. Naive Bayes based engine is chosen in this solution for its inherent advantages in using limited resources compared to other classification algorithms like Support Vector Machine, Neural Networks, etc. Naive Bayes classification requires small memory footprint and less computation suitable for smartphone environment. This solution has a feature to partition the model into multiple chunks that in turn will facilitate less usage of memory instead of loading a complete model. Classification of the webpages done through integrated engine is faster, more relevant and energy efficient than other standalone on device solution. This classification engine has been tested on Samsung Z3 Tizen hardware. The Engine is integrated into Tizen Browser that uses Chromium Rendering Engine. For this solution, extensive dataset is sourced from dmoztools.net and cleaned. This cleaned dataset has 227.5K webpages which are divided into 8 generic categories ('education', 'games', 'health', 'entertainment', 'news', 'shopping', 'sports', 'travel'). Our browser integrated solution has resulted in 15% less memory usage (due to partition method) and 24% less power consumption in comparison with standalone solution. This solution considered 70% of the dataset for training the data model and the rest 30% dataset for testing. An average accuracy of ~96.3% is achieved across the above mentioned 8 categories. This engine can be further extended for suggesting Dynamic tags and using the classification for differential uses cases to enhance browsing experience.Keywords: chromium, lightweight engine, mobile computing, Naive Bayes, Tizen, web browser, webpage classification
Procedia PDF Downloads 165229 Test and Evaluation of Patient Tracking Platform in an Earthquake Simulation
Authors: Nahid Tavakoli, Mohammad H. Yarmohammadian, Ali Samimi
Abstract:
In earthquake situation, medical response communities such as field and referral hospitals are challenged with injured victims’ identification and tracking. In our project, it was developed a patient tracking platform (PTP) where first responders triage the patients with an electronic tag which report the location and some information of each patient during his/her movement. This platform includes: 1) near field communication (NFC) tags (ISO 14443), 2) smart mobile phones (Android-base version 4.2.2), 3) Base station laptops (Windows), 4) server software, 5) Android software to use by first responders, 5) disaster command software, and 6) system architecture. Our model has been completed through literature review, Delphi technique, focus group, design the platform, and implement in an earthquake exercise. This paper presents consideration for content, function, and technologies that must apply for patient tracking in medical emergencies situations. It is demonstrated the robustness of the patient tracking platform (PTP) in tracking 6 patients in a simulated earthquake situation in the yard of the relief and rescue department of Isfahan’s Red Crescent.Keywords: test and evaluation, patient tracking platform, earthquake, simulation
Procedia PDF Downloads 141228 Board Composition and Performance of Listed Deposit Money Banks in Nigeria
Authors: Mary David, Denis Basila
Abstract:
This study assessed the Impact of Board Composition on the Performance of Listed Deposit Money Banks in Nigeria. A sample of ten (10) deposit money banks formed the sample of this study. Board size, gender diversity, and board independence were used as the independent variables, and firm size as a control variable, whiles the bank performance was proxy with Tobin’s Q (TQ) as the dependent variable. Secondary data was collected from secondary source through the annual report and account of the banks and was analyzed through the support of STATA 14 versions. Descriptive statistics, correlation matrix, and OLS multiple regression model were adopted for the study. Breusch and pagan lagrangian multiplier test for random effect was conducted. The findings of the study reveal that board size has positive and significant impact on Tobin’s Q, gender diversity has positive and significant impact on Tobin’s Q, while board independent had a negative and nonsignificant influence on the Tobin’s Q, Similarly, firm size was found to have a negative and nonsignificant impact on Tobin’s Q of the study banks. This study recommended that policy makers, stakeholders, and corporate managers of deposit money banks of Nigeria and related industries are encouraged to adopt board sizes and gender diversity that impact positively on bank performance.Keywords: board composition, performance, deposit money banks, nigeria
Procedia PDF Downloads 75227 Analyzing the Quality of Cloud-Based E-Learning Systems on the Perception of the Learners and the Teachers
Authors: R. W. C. Devindi, S. M. Buddika Harshanath
Abstract:
E-learning is a widely used technology for learning in the modern world. With the pandemic situation the popularity of using e-learning has been increased in a larger capacity. The e-learning educational systems require software resources as well as hardware usually but it is hard for most of the education institutions to afford those resources. Also with the massive user load e-learning has to broaden the server side resources as well. Therefore, in the present cloud computing was implemented in order to make the e – learning systems more efficient. The researcher has analyzed the quality of the e-learning systems on the perception of the learners and the teachers with the aid of hypothesis and has given the analyzed results and the discussion in this report. Therefore, the future research will be able to get some steps to increase the quality of the online learning systems furthermore. In the case of e-learning, quality assurance and cost effectiveness are essential. A complex quality assurance system is used in the stated project. There are no well-defined standard evaluation measures in this field. As a result, accurately assessing the e-learning system's overall quality is challenging. The researcher has done the analysis with the aid of standard methods and software.Keywords: LMS–learning management system, SPSS–statistical package for social sciences (software), eigen value, hypothesis
Procedia PDF Downloads 108226 RFID Laptop Monitoring and Management System
Authors: Francis E. Idachaba, Sarah Uyimeh Tommy
Abstract:
This paper describes the design of an RFID laptop monitoring and management system. Laptops embedded with RFID chips are monitored and tracked to provide a monitoring system for the purpose of tracking as well as monitoring movement of the laptops in and out of a building. The proposed system is implemented with both hardware and software components. The hardware architecture consists of RFID passive tag, RFID module (reader), and a server hosting the application and database. The RFID readers are distributed at major exits of a building or premises. The tags are programmed with owner laptop details are concealed in the laptops. The software architecture consists of application software that has the APIs (Applications Programming Interface) necessary to interface the RFID system with the PC, to achieve automated laptop monitoring system. A friendly graphic user interface (GUI) and a database that saves all readings and owners details. The system is capable of reducing laptop theft especially in students’ hostels as laptops can be monitored as they are taken either in or out of the building.Keywords: asset tracking, GUI, laptop monitoring, radio frequency identification, passive tags
Procedia PDF Downloads 390225 A Resource Optimization Strategy for CPU (Central Processing Unit) Intensive Applications
Authors: Junjie Peng, Jinbao Chen, Shuai Kong, Danxu Liu
Abstract:
On the basis of traditional resource allocation strategies, the usage of resources on physical servers in cloud data center is great uncertain. It will cause waste of resources if the assignment of tasks is not enough. On the contrary, it will cause overload if the assignment of tasks is too much. This is especially obvious when the applications are the same type because of its resource preferences. Considering CPU intensive application is one of the most common types of application in the cloud, we studied the optimization strategy for CPU intensive applications on the same server. We used resource preferences to analyze the case that multiple CPU intensive applications run simultaneously, and put forward a model which can predict the execution time for CPU intensive applications which run simultaneously. Based on the prediction model, we proposed the method to select the appropriate number of applications for a machine. Experiments show that the model can predict the execution time accurately for CPU intensive applications. To improve the execution efficiency of applications, we propose a scheduling model based on priority for CPU intensive applications. Extensive experiments verify the validity of the scheduling model.Keywords: cloud computing, CPU intensive applications, resource optimization, strategy
Procedia PDF Downloads 280