Search results for: computer terms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8702

Search results for: computer terms

6272 Use of Benin Laterites for the Mix Design of Structural Concrete

Authors: Yemalin D. Agossou, Andre Lecomte, Remi Boissiere, Edmond C. Adjovi, Abdelouahab Khelil

Abstract:

This paper presents a mixed design trial of structural concretes with laterites from Benin. These materials are often the only granular resources readily available in many tropical regions. In the first step, concretes were designed with raw laterites, but the performances obtained were rather disappointing in spite of high cement dosages. A detailed physical characterization of these materials then showed that they contained a significant proportion of fine clays and that the coarsest fraction (gravel) contained a variety of facies, some of which were not very dense or indurated. Washing these laterites, and even the elimination of the most friable grains of the gravel fraction, made it possible to obtain concretes with satisfactory properties in terms of workability, density and mechanical strength. However, they were found to be slightly less stiff than concretes made with more traditional aggregates. It is, therefore, possible to obtain structural concretes with only laterites and cement but at the cost of eliminating some of their granular constituents.

Keywords: laterites, aggregates, concretes, mix design, mechanical properties

Procedia PDF Downloads 160
6271 Ensuring Uniform Energy Consumption in Non-Deterministic Wireless Sensor Network to Protract Networks Lifetime

Authors: Vrince Vimal, Madhav J. Nigam

Abstract:

Wireless sensor networks have enticed much of the spotlight from researchers all around the world, owing to its extensive applicability in agricultural, industrial and military fields. Energy conservation node deployment stratagems play a notable role for active implementation of Wireless Sensor Networks. Clustering is the approach in wireless sensor networks which improves energy efficiency in the network. The clustering algorithm needs to have an optimum size and number of clusters, as clustering, if not implemented properly, cannot effectively increase the life of the network. In this paper, an algorithm has been proposed to address connectivity issues with the aim of ensuring the uniform energy consumption of nodes in every part of the network. The results obtained after simulation showed that the proposed algorithm has an edge over existing algorithms in terms of throughput and networks lifetime.

Keywords: Wireless Sensor network (WSN), Random Deployment, Clustering, Isolated Nodes, Networks Lifetime

Procedia PDF Downloads 336
6270 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 404
6269 Design and Analysis of Wireless Charging Lane for Light Rail Transit

Authors: Watcharet Kongwarakom, Tosaphol Ratniyomchai, Thanatchai Kulworawanichpong

Abstract:

This paper presents a design and analysis of wireless charging lane system (WCLS) for light rail transit (LRT) by considering the performance of wireless charging, traffic conditions and energy consumption drawn by the LRT system. The dynamic of the vehicle movement in terms of the vehicle speed profile during running on the WCLS, a dwell time during stopping at the station for taking the WCLS and the capacity of the WCLS in each section are taken into account to alignment design of the WCLS. This paper proposes a case study of the design of the WCLS into 2 sub-cases including continuous and discontinuous WCLS with the same distance of WCLS in total. The energy consumption by the LRT through the WCLS with the different designs of the WCLS is compared to find out the better configuration of those two cases by considering the best performance of the power transfer between the LRT and the WCLS.

Keywords: Light rail transit, Wireless charging lane, Energy consumption, Power transfer

Procedia PDF Downloads 154
6268 Analysis of the Temperature Dependence of Local Avalanche Compact Model for Bipolar Transistors

Authors: Robert Setekera, Ramses van der Toorn

Abstract:

We present an extensive analysis of the temperature dependence of the local avalanche model used in most of the modern compact models for bipolar transistors. This local avalanche model uses the Chynoweth's empirical law for ionization coefficient to define the generation of the avalanche current in terms of the local electric field. We carry out the model analysis using DC-measurements taken on both Si and advanced SiGe bipolar transistors. For the advanced industrial SiGe-HBTs, we consider both high-speed and high-power devices (both NPN and PNP transistors). The limitations of the local avalanche model in modeling the temperature dependence of the avalanche current mostly in the weak avalanche region are demonstrated. In addition, the model avalanche parameters are analyzed to see if they are in agreement with semiconductor device physics.

Keywords: avalanche multiplication, avalanche current, bipolar transistors, compact modeling, electric field, impact ionization, local avalanche

Procedia PDF Downloads 622
6267 Design and Implementation of Testable Reversible Sequential Circuits Optimized Power

Authors: B. Manikandan, A. Vijayaprabhu

Abstract:

The conservative reversible gates are used to designed reversible sequential circuits. The sequential circuits are flip-flops and latches. The conservative logic gates are Feynman, Toffoli, and Fredkin. The design of two vectors testable sequential circuits based on conservative logic gates. All sequential circuit based on conservative logic gates can be tested for classical unidirectional stuck-at faults using only two test vectors. The two test vectors are all 1s, and all 0s. The designs of two vectors testable latches, master-slave flip-flops and double edge triggered (DET) flip-flops are presented. We also showed the application of the proposed approach toward 100% fault coverage for single missing/additional cell defect in the quantum- dot cellular automata (QCA) layout of the Fredkin gate. The conservative logic gates are in terms of complexity, speed, and area.

Keywords: DET, QCA, reversible logic gates, POS, SOP, latches, flip flops

Procedia PDF Downloads 304
6266 Solution of Insurance Pricing Model Giving Optimum Premium Level for Both Insured and Insurer by Game Theory

Authors: Betul Zehra Karagul

Abstract:

A game consists of strategies that each actor has in his/her own choice strategies, and a game regulates the certain rules in the strategies that the actors choose, express how they evaluate their knowledge and the utility of output results. Game theory examines the human behaviors (preferences) of strategic situations in which each actor of a game regards the action that others will make in spite of his own moves. There is a balance between each player playing a game with the final number of players and the player with a certain probability of choosing the players, and this is called Nash equilibrium. The insurance is a two-person game where the insurer and insured are the actors. Both sides have the right to act in favor of utility functions. The insured has to pay a premium to buy the insurance cover. The insured will want to pay a low premium while the insurer is willing to get a high premium. In this study, the state of equilibrium for insurance pricing was examined in terms of the insurer and insured with game theory.

Keywords: game theory, insurance pricing, Nash equilibrium, utility function

Procedia PDF Downloads 363
6265 Motivation and Livelihood of Undergraduate Students Based On Sufficiency Economy Philosophy in Suan Sunandha Rajabhat University

Authors: Luedech Girdwichai, Suwaree Yordchim, Phusit Phukamchanoad

Abstract:

This research is aimed to study about motivation that students of Suan Sunandha Rajabhat University follow and happily live according to Sufficiency Economy Philosophy. Having collected 394 questionnaires, the result showed that most students had great motivation to follow this philosophy in high level, especially in terms of righteousness in profession; besides, students’determination and intention to apply this philosophy in everyday lives were so impressive though students’ families were not ready enough. Each of students, in fact, consulted families for plans of any activities without tiredness and discouragement based on the saying” Where there is a will, there is a way.” On the part of universities lives, students interacted with society and created projects that supported income to the community including exercises, sports, recreational activities, and community services.

Keywords: motivation, livelihood, sufficiency economy philosophy, undergraduate students of Suan Sunandha Rajabhat University

Procedia PDF Downloads 448
6264 Peristaltic Transport of a Jeffrey Fluid with Double-Diffusive Convection in Nanofluids in the Presence of Inclined Magnetic Field

Authors: Safia Akram

Abstract:

In this article, the effects of peristaltic transport with double-diffusive convection in nanofluids through an asymmetric channel with different waveforms is presented. Mathematical modelling for two-dimensional and two directional flows of a Jeffrey fluid model along with double-diffusive convection in nanofluids are given. Exact solutions are obtained for nanoparticle fraction field, concentration field, temperature field, stream functions, pressure gradient and pressure rise in terms of axial and transverse coordinates under the restrictions of long wavelength and low Reynolds number. With the help of computational and graphical results the effects of Brownian motion, thermophoresis, Dufour, Soret, and Grashof numbers (thermal, concentration, nanoparticles) on peristaltic flow patterns with double-diffusive convection are discussed.

Keywords: nanofluid particles, peristaltic flow, Jeffrey fluid, magnetic field, asymmetric channel, different waveforms

Procedia PDF Downloads 381
6263 Tourism Climate Index Environmental Assessment of Piranshahr

Authors: Parvaneh Ziviar Pardehei, Esmaeil Hossinnejad

Abstract:

In this research, the tourism climate index Miczcofski (TCI) and to assess climate Trjvng Piranshahr city tourism is discussed. The index is a systematic way to evaluate the climatic conditions for tourism. To calculate the parameters of mean monthly maximum temperature, minimum relative humidity, average daily relative humidity, rainfall, sunshine and the wind speed are used. In the months of April, July, August and September of comfort there in December, January, February and March, the nerve is cold comfort factor. Baker calculation method showed that during spring and summer cooling environment, mild, pleasant, and comfortable Byvklymay there. TCI results suggest that the months of April to July are top rated and best climatic conditions in terms of comfort to the tourists. In general, indices used in this paper show that the months of April to October is the best time for tourism in the city Piranshahr.

Keywords: tourism, climate, Piranshahr city, TCI indicators and trjvng

Procedia PDF Downloads 260
6262 Development of a Risk Governance Index and Examination of Its Determinants: An Empirical Study in Indian Context

Authors: M. V. Shivaani, P. K. Jain, Surendra S. Yadav

Abstract:

Risk management has been gaining extensive focus from international organizations like Committee of Sponsoring Organizations and Financial Stability Board, and, the foundation of such an effective and efficient risk management system lies in a strong risk governance structure. In view of this, an attempt (perhaps a first of its kind) has been made to develop a risk governance index, which could be used as proxy for quality of risk governance structures. The index (normative framework) is based on eleven variables, namely, size of board, board diversity in terms of gender, proportion of executive directors, executive/non-executive status of chairperson, proportion of independent directors, CEO duality, chief risk officer (CRO), risk management committee, mandatory committees, voluntary committees and existence/non-existence of whistle blower policy. These variables are scored on a scale of 1 to 5 with the exception of the variables, namely, status of chairperson and CEO duality (which have been scored on a dichotomous scale with the score of 3 or 5). In case there is a legal/statutory requirement in respect of above-mentioned variables and there is a non-compliance with such requirement a score of one has been envisaged. Though there is no legal requirement, for the larger part of study, in context of CRO, risk management committee and whistle blower policy, still a score of 1 has been assigned in the event of their non-existence. Recognizing the importance of these variables in context of risk governance structure and the fact that the study basically focuses on risk governance, the absence of these variables has been equated to non-compliance with a legal/statutory requirement. Therefore, based on this the minimum score is 15 and the maximum possible is 55. In addition, an attempt has been made to explore the determinants of this index. For this purpose, the sample consists of non-financial companies (429) that constitute S&P CNX500 index. The study covers a 10 years period from April 1, 2005 to March 31, 2015. Given the panel nature of data, Hausman test was applied, and it suggested that fixed effects regression would be appropriate. The results indicate that age and size of firms have significant positive impact on its risk governance structures. Further, post-recession period (2009-2015) has witnessed significant improvement in quality of governance structures. In contrast, profitability (positive relationship), leverage (negative relationship) and growth (negative relationship) do not have significant impact on quality of risk governance structures. The value of rho indicates that about 77.74% variation in risk governance structures is due to firm specific factors. Given the fact that each firm is unique in terms of its risk exposure, risk culture, risk appetite, and risk tolerance levels, it appears reasonable to assume that the specific conditions and circumstances that a company is beset with, could be the biggest determinants of its risk governance structures. Given the recommendations put forth in the paper (particularly for regulators and companies), the study is expected to be of immense utility in an important yet neglected aspect of risk management.

Keywords: corporate governance, ERM, risk governance, risk management

Procedia PDF Downloads 252
6261 Replication of Meaningful Gesture Study for N400 Detection Using a Commercial Brain-Computer Interface

Authors: Thomas Ousterhout

Abstract:

In an effort to test the ability of a commercial grade EEG headset to effectively measure the N400 ERP, a replication study was conducted to see if similar results could be produced as that which used a medical grade EEG. Pictures of meaningful and meaningless hand postures were borrowed from the original author and subjects were required to perform a semantic discrimination task. The N400 was detected indicating semantic processing of the meaningfulness of the hand postures. The results corroborate those of the original author and support the use of some commercial grade EEG headsets for non-critical research applications.

Keywords: EEG, ERP, N400, semantics, congruency, gestures, emotiv

Procedia PDF Downloads 263
6260 Modeling Driving Distraction Considering Psychological-Physical Constraints

Authors: Yixin Zhu, Lishengsa Yue, Jian Sun, Lanyue Tang

Abstract:

Modeling driving distraction in microscopic traffic simulation is crucial for enhancing simulation accuracy. Current driving distraction models are mainly derived from physical motion constraints under distracted states, in which distraction-related error terms are added to existing microscopic driver models. However, the model accuracy is not very satisfying, due to a lack of modeling the cognitive mechanism underlying the distraction. This study models driving distraction based on the Queueing Network Human Processor model (QN-MHP). This study utilizes the queuing structure of the model to perform task invocation and switching for distracted operation and control of the vehicle under driver distraction. Based on the assumption of the QN-MHP model about the cognitive sub-network, server F is a structural bottleneck. The latter information must wait for the previous information to leave server F before it can be processed in server F. Therefore, the waiting time for task switching needs to be calculated. Since the QN-MHP model has different information processing paths for auditory information and visual information, this study divides driving distraction into two types: auditory distraction and visual distraction. For visual distraction, both the visual distraction task and the driving task need to go through the visual perception sub-network, and the stimuli of the two are asynchronous, which is called stimulus on asynchrony (SOA), so when calculating the waiting time for switching tasks, it is necessary to consider it. In the case of auditory distraction, the auditory distraction task and the driving task do not need to compete for the server resources of the perceptual sub-network, and their stimuli can be synchronized without considering the time difference in receiving the stimuli. According to the Theory of Planned Behavior for drivers (TPB), this study uses risk entropy as the decision criterion for driver task switching. A logistic regression model is used with risk entropy as the independent variable to determine whether the driver performs a distraction task, to explain the relationship between perceived risk and distraction. Furthermore, to model a driver’s perception characteristics, a neurophysiological model of visual distraction tasks is incorporated into the QN-MHP, and executes the classical Intelligent Driver Model. The proposed driving distraction model integrates the psychological cognitive process of a driver with the physical motion characteristics, resulting in both high accuracy and interpretability. This paper uses 773 segments of distracted car-following in Shanghai Naturalistic Driving Study data (SH-NDS) to classify the patterns of distracted behavior on different road facilities and obtains three types of distraction patterns: numbness, delay, and aggressiveness. The model was calibrated and verified by simulation. The results indicate that the model can effectively simulate the distracted car-following behavior of different patterns on various roadway facilities, and its performance is better than the traditional IDM model with distraction-related error terms. The proposed model overcomes the limitations of physical-constraints-based models in replicating dangerous driving behaviors, and internal characteristics of an individual. Moreover, the model is demonstrated to effectively generate more dangerous distracted driving scenarios, which can be used to construct high-value automated driving test scenarios.

Keywords: computational cognitive model, driving distraction, microscopic traffic simulation, psychological-physical constraints

Procedia PDF Downloads 91
6259 On Virtual Coordination Protocol towards 5G Interference Mitigation: Modelling and Performance Analysis

Authors: Bohli Afef

Abstract:

The fifth-generation (5G) wireless systems is featured by extreme densities of cell stations to overcome the higher future demand. Hence, interference management is a crucial challenge in 5G ultra-dense cellular networks. In contrast to the classical inter-cell interference coordination approach, which is no longer fit for the high density of cell-tiers, this paper proposes a novel virtual coordination based on the dynamic common cognitive monitor channel protocol to deal with the inter-cell interference issue. A tractable and flexible model for the coverage probability of a typical user is developed through the use of the stochastic geometry model. The analyses of the performance of the suggested protocol are illustrated both analytically and numerically in terms of coverage probability.

Keywords: ultra dense heterogeneous networks, dynamic common channel protocol, cognitive radio, stochastic geometry, coverage probability

Procedia PDF Downloads 325
6258 Recognition of Noisy Words Using the Time Delay Neural Networks Approach

Authors: Khenfer-Koummich Fatima, Mesbahi Larbi, Hendel Fatiha

Abstract:

This paper presents a recognition system for isolated words like robot commands. It’s carried out by Time Delay Neural Networks; TDNN. To teleoperate a robot for specific tasks as turn, close, etc… In industrial environment and taking into account the noise coming from the machine. The choice of TDNN is based on its generalization in terms of accuracy, in more it acts as a filter that allows the passage of certain desirable frequency characteristics of speech; the goal is to determine the parameters of this filter for making an adaptable system to the variability of speech signal and to noise especially, for this the back propagation technique was used in learning phase. The approach was applied on commands pronounced in two languages separately: The French and Arabic. The results for two test bases of 300 spoken words for each one are 87%, 97.6% in neutral environment and 77.67%, 92.67% when the white Gaussian noisy was added with a SNR of 35 dB.

Keywords: TDNN, neural networks, noise, speech recognition

Procedia PDF Downloads 289
6257 Alive Cemeteries with Augmented Reality and Semantic Web Technologies

Authors: Tamás Matuszka, Attila Kiss

Abstract:

Due the proliferation of smartphones in everyday use, several different outdoor navigation systems have become available. Since these smartphones are able to connect to the Internet, the users can obtain location-based information during the navigation as well. The users could interactively get to know the specifics of a particular area (for instance, ancient cultural area, Statue Park, cemetery) with the help of thus obtained information. In this paper, we present an Augmented Reality system which uses Semantic Web technologies and is based on the interaction between the user and the smartphone. The system allows navigating through a specific area and provides information and details about the sight an interactive manner.

Keywords: augmented reality, semantic web, human computer interaction, mobile application

Procedia PDF Downloads 340
6256 Parallel Asynchronous Multi-Splitting Methods for Differential Algebraic Systems

Authors: Malika Elkyal

Abstract:

We consider an iterative parallel multi-splitting method for differential algebraic equations. The main feature of the proposed idea is to use the asynchronous form. We prove that the multi-splitting technique can effectively accelerate the convergent performance of the iterative process. The main characteristic of an asynchronous mode is that the local algorithm does not have to wait at predetermined messages to become available. We allow some processors to communicate more frequently than others, and we allow the communication delays to be substantial and unpredictable. Accordingly, we note that synchronous algorithms in the computer science sense are particular cases of our formulation of asynchronous one.

Keywords: parallel methods, asynchronous mode, multisplitting, differential algebraic equations

Procedia PDF Downloads 559
6255 Analysis of Long-Term Response of Seawater to Change in CO₂, Heavy Metals and Nutrients Concentrations

Authors: Igor Povar, Catherine Goyet

Abstract:

The seawater is subject to multiple external stressors (ES) including rising atmospheric CO2 and ocean acidification, global warming, atmospheric deposition of pollutants and eutrophication, which deeply alter its chemistry, often on a global scale and, in some cases, at the degree significantly exceeding that in the historical and recent geological verification. In ocean systems the micro- and macronutrients, heavy metals, phosphor- and nitrogen-containing components exist in different forms depending on the concentrations of various other species, organic matter, the types of minerals, the pH etc. The major limitation to assessing more strictly the ES to oceans, such as pollutants (atmospheric greenhouse gas, heavy metals, nutrients as nitrates and phosphates) is the lack of theoretical approach which could predict the ocean resistance to multiple external stressors. In order to assess the abovementioned ES, the research has applied and developed the buffer theory approach and theoretical expressions of the formal chemical thermodynamics to ocean systems, as heterogeneous aqueous systems. The thermodynamic expressions of complex chemical equilibria, involving acid-base, complex formation and mineral ones have been deduced. This thermodynamic approach utilizes thermodynamic relationships coupled with original mass balance constraints, where the solid phases are explicitly expressed. The ocean sensitivity to different external stressors and changes in driving factors are considered in terms of derived buffering capacities or buffer factors for heterogeneous systems. Our investigations have proved that the heterogeneous aqueous systems, as ocean and seas are, manifest their buffer properties towards all their components, not only to pH, as it has been known so far, for example in respect to carbon dioxide, carbonates, phosphates, Ca2+, Mg2+, heavy metal ions etc. The derived expressions make possible to attribute changes in chemical ocean composition to different pollutants. These expressions are also useful for improving the current atmosphere-ocean-marine biogeochemistry models. The major research questions, to which the research responds, are: (i.) What kind of contamination is the most harmful for Future Ocean? (ii.) What are chemical heterogeneous processes of the heavy metal release from sediments and minerals and its impact to the ocean buffer action? (iii.) What will be the long-term response of the coastal ocean to the oceanic uptake of anthropogenic pollutants? (iv.) How will change the ocean resistance in terms of future chemical complex processes and buffer capacities and its response to external (anthropogenic) perturbations? The ocean buffer capacities towards its main components are recommended as parameters that should be included in determining the most important ocean factors which define the response of ocean environment at the technogenic loads increasing. The deduced thermodynamic expressions are valid for any combination of chemical composition, or any of the species contributing to the total concentration, as independent state variable.

Keywords: atmospheric greenhouse gas, chemical thermodynamics, external stressors, pollutants, seawater

Procedia PDF Downloads 143
6254 Artificial Neural Networks Based Calibration Approach for Six-Port Receiver

Authors: Nadia Chagtmi, Nejla Rejab, Noureddine Boulejfen

Abstract:

This paper presents a calibration approach based on artificial neural networks (ANN) to determine the envelop signal (I+jQ) of a six-port based receiver (SPR). The memory effects called also dynamic behavior and the nonlinearity brought by diode based power detector have been taken into consideration by the ANN. Experimental set-up has been performed to validate the efficiency of this method. The efficiency of this approach has been confirmed by the obtained results in terms of waveforms. Moreover, the obtained error vector magnitude (EVM) and the mean absolute error (MAE) have been calculated in order to confirm and to test the ANN’s performance to achieve I/Q recovery using the output voltage detected by the power based detector. The baseband signal has been recovered using ANN with EVMs no higher than 1 % and an MAE no higher than 17, 26 for the SPR excited different type of signals such QAM (quadrature amplitude modulation) and LTE (Long Term Evolution).

Keywords: six-port based receiver; calibration, nonlinearity, memory effect, artificial neural network

Procedia PDF Downloads 77
6253 National Defense and Armed Forces Development in the Member States of the Visegrad Group

Authors: E. Hronyecz

Abstract:

Guaranteeing the independence of the V4 Member States, the protection of their national values and their citizens, and the security of the Central and Eastern European region requires the development of military capabilities in terms of the capabilities of nations. As a result, European countries have begun developing capabilities and forces, within which nations are seeking to strengthen the capabilities of their armies and make their interoperability more effective. One aspect of this is the upgrading of military equipment, personnel equipment, and other human resources. Based on the author's preliminary researches - analyzing the scientific literature, the relevant statistical data and conducting of professional consultations with the experts of the research field – it can clearly claimed for all four states of Visegrad Group that a change of direction in the field of defense has been noticeable since the second half of the last decade. Collective defense came to the forefront again; the military training, professionalism, and radical modernization of technical equipment becoming crucial.

Keywords: armed forces, cooperation, development, Visegrad Group

Procedia PDF Downloads 133
6252 Performance, Need and Discriminatory Allegiance of Employees as Awarding Criteria of Distributive Justice

Authors: B. Gangloff, L. Mayoral, A. Rezrazi

Abstract:

Three types of salary distribution are usually proposed by the theorists of distributive justice: Equality, equity and need. Their influence has been studied, taking into consideration (in terms of equity) the performance of the employees and their degree of allegiance/rebellion in what regards discriminatory hierarchical orders, by taking into account the reasons of such allegiance/rebellion (allegiance out of conviction, legalism or opportunism/ethical rebellion). Conducted in Argentina, the study has confronted 480 students (240 male and 240 female) with a practical case in which they had to advise a manager of a real estate agency on the allocation of a bonus amongst his employees. The latter were characterized according to their respective performance, one of them being further defined as being (or not) in a financial need and as having complied (or not) with a discriminatory hierarchical order regarding foreigners. The results show that the distribution of the bonus only follows the rules of equity and need: The employees more efficient, allegiant or in need, are rewarded more than the others. It is also noteworthy that the allegiant employees are rewarded in the same way, regardless of the reason for their allegiance, and that the employee who refuses to adopt a discriminatory conduct is penalized.

Keywords: distributive justice, equity, performance, allegiance, ethics

Procedia PDF Downloads 296
6251 A Tool for Rational Assessment of Dynamic Trust in Networked Organizations

Authors: Simon Samwel Msanjila

Abstract:

Networked environments which provides platforms and environments for business organizations are configured in different forms depending on many factors including life time, member characteristics, communication structure, and business objectives, among others. With continuing advances in digital technologies the distance has become a less barrier for business minded collaboration among organizations. With the need and ease to make business collaborate nowadays organizations are sometimes forced to co-work with others that are either unknown or less known to them in terms of history and performance. A promising approach for sustaining established collaboration has been establishment of trust relationship among organizations based on assessed trustworthiness for each participating organization. It has been stated in research that trust in organization is dynamic and thus assessment of trust level must address such dynamic nature. This paper assess relevant aspects of trust and applies the concepts to propose a semi-automated system for assessing the Sustainability and Evolution of trust in organizations participating in specific objective in a networked organizations environment.

Keywords: trust evolution, trust sustainability, networked organizations, dynamic trust

Procedia PDF Downloads 431
6250 Survival Chances and Costs after Heart Attacks: An Instrumental Variable Approach

Authors: Alice Sanwald, Thomas Schober

Abstract:

We analyze mortality and follow-up costs of heart attack patients using administrative data from Austria (2002-2011). As treatment intensity in a hospital largely depends on whether it has a catheterization laboratory, we focus on the effects of patients' initial admission to these specialized hospitals. To account for the nonrandom selection of patients into hospitals, we exploit individuals' place of residence as a source of exogenous variation in an instrumental variable framework. We find that the initial admission to specialized hospitals increases patients' survival chances substantially. The effect on 3-year mortality is -9.5 percentage points. A separation of the sample into subgroups shows the strongest effects in relative terms for patients below the age of 65. We do not find significant effects on longterm inpatient costs and find only marginal increases in outpatient costs.

Keywords: acute myocardial infarction, mortality, costs, instrumental variables, heart attack

Procedia PDF Downloads 436
6249 Community Forest Management Practice in Nepal: Public Understanding of Forest Benefit

Authors: Chandralal Shrestha

Abstract:

In the developing countries like Nepal, the community based forest management approach has often been glorified as one of the best forest management alternatives to maximize the forest benefits. Though the approach has succeeded to construct a local level institution and conserve the forest biodiversity, how the local communities perceived about the forest benefits, the question always remains silent among the researchers and policy makers. The paper aims to explore the understanding of forest benefits from the perspective of local communities who used the forests in terms of institutional stability, equity and livelihood opportunity, and ecological stability. The paper revealed that the local communities have mixed understanding over the forest benefits. The institutional and ecological activities carried out by the local communities indicated that they have better understanding over the forest benefits. However, inequality while sharing the forest benefits, low pricing strategy and its negative consequences in valuation of forest products and limited livelihood opportunities indicated the poor understanding.

Keywords: community based forest management, forest benefits, lowland, Nepal

Procedia PDF Downloads 312
6248 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe

Authors: Ejd Garba, Okike Benjamin

Abstract:

Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.

Keywords: arithmetic, cyber space, modulo-2, information security

Procedia PDF Downloads 320
6247 Management in Health Education Process among Spa Resorts in Poland

Authors: J. Wozniak-Holecka, T. Holecki, P. Romaniuk

Abstract:

Spa facilities are being perceived as the ways of healing treatment in Poland and are guaranteed within the public financing. The universal health insurance (National Health Fund, NFZ), and the disability prevention programme held by Social Insurance Institution (ZUS) are the main sources of financing spa facilities. The dominant public payer of spa services is the NFZ. The Social Insurance Institution covers the cost of health treatment realized in spa facilities as medical rehabilitation, in the field of disability prevention. Health services delivered in the spa resorts are characterized by complexity, and the combination of various methods, typical for health prevention, education, balneotherapy, and physiotherapy. Healing with natural methods, believed to enhance the therapeutic effect, is also involved in health spa treatment. Regardless of the type of facility, each form of spa treatment includes health promotion, health education, prevention at all levels, including rehabilitation. The aim of the study was to determine the optimal organization of health education process. Its efficiency strongly depends on the type of service provider and the funding institution (NFZ vs ZUS). It results from the use of different measures of the effectiveness, the quality and the evaluation of the process being assessed by funding institutions. The methods of the study include a comparative and descriptive quantitative and qualitative analysis. In the empirical part, a questionnaire had been developed. It was then distributed among spa personnel, responsible directly for the health promotion, and among patients who are beneficiaries of health services in spa centers. The quantitative part of the study was based on interviews carried with the use of the online survey (CAWI: Computer-Assisted Web Interview), telephone survey (CATI: Computer-Assisted Telephone Interview) and a conventional questionnaire (PAPI: Paper over Pencil Interview). As a result of the conducted research, it was found that the effectiveness of health education activities in spa resort facilities in Poland is higher when the services are organized using structured tools for managerial control. This applies to formalized procedures implemented by one of the dominant payers covering costs of services (ZUS) and involves the application of health education as one of the mandatory elements of treatment, subjected to the process of control during the course of spa therapy and evaluation after it is completed.

Keywords: effectiveness, health education, public health system, spa treatment

Procedia PDF Downloads 142
6246 Importance of Determining the Water Needs of Crops in the Management of Water Resources in the Province of Djelfa

Authors: Imessaoudene Y., Mouhouche B., Sengouga A., Kadir M.

Abstract:

The objective of this work is to determine the virtual water of main crops grown in the province of Djelfa and water use efficiency (W.U.E.), Which is essential to approach the application and better integration with the offer in the region. In the case of agricultural production, virtual water is the volume of water evapo-transpired by crops. It depends on particular on the expertise of its producers and its global production area, warm and dry climates induce higher consumption. At the scale of the province, the determination of the quantities of virtual water is done by calculating the unit water requirements related to water irrigated hectare and total rainfall over the crop using the Cropwat 8.0 F.A.O. software. Quantifying the volume of agricultural virtual water of crops practiced in the study area demonstrates the quantitative importance of these volumes of water in terms of available water resources in the province, so the advantages which can be the concept of virtual water as an analysis tool and decision support for the management and distribution of water in scarcity situation.

Keywords: virtual water, water use efficiency, water requirements, Djelfa

Procedia PDF Downloads 430
6245 Hypermarkets Product Awareness of Halal Branding in the Kingdom of Bahrain

Authors: Imelda Atengco Milan

Abstract:

This research is aimed to assess the effectiveness and status of Islamic branding amongst hypermarkets from respondents perspective in the Kingdom of Bahrain such as Lulu, Geant and Carrefour and It was identified in terms of pure advertisement, religious norms and culture, certified halal product/ brand, consumption barriers and attitude towards other products/ brand. Included here are also the essentials in modern marketing including problems encountered and recommendations which will be revealed through the findings of the study. The methods used are descriptive and quantitative with sample analysis through quite a number of populations. Formulation of Sample questionnaire is done according to the variables and items used to measure reliability of statistics. The measurement of validity on the conduct of the surveys has been done according to Chronbach’s value (greater than 0.7). Pearson correlation was used as part of statistical analysis as well. It must show continuously that the model used is aligned towards factors indicated.

Keywords: pure advertisement, religious norms & culture, certified halal product, attitude towards other brand and consumption barriers

Procedia PDF Downloads 218
6244 The Contribution of Edgeworth, Bootstrap and Monte Carlo Methods in Financial Data

Authors: Edlira Donefski, Tina Donefski, Lorenc Ekonomi

Abstract:

Edgeworth Approximation, Bootstrap, and Monte Carlo Simulations have considerable impacts on achieving certain results related to different problems taken into study. In our paper, we have treated a financial case related to the effect that has the components of a cash-flow of one of the most successful businesses in the world, as the financial activity, operational activity, and investment activity to the cash and cash equivalents at the end of the three-months period. To have a better view of this case, we have created a vector autoregression model, and after that, we have generated the impulse responses in the terms of asymptotic analysis (Edgeworth Approximation), Monte Carlo Simulations, and residual bootstrap based on the standard errors of every series created. The generated results consisted of the common tendencies for the three methods applied that consequently verified the advantage of the three methods in the optimization of the model that contains many variants.

Keywords: autoregression, bootstrap, edgeworth expansion, Monte Carlo method

Procedia PDF Downloads 154
6243 Graph Planning Based Composition for Adaptable Semantic Web Services

Authors: Rihab Ben Lamine, Raoudha Ben Jemaa, Ikram Amous Ben Amor

Abstract:

This paper proposes a graph planning technique for semantic adaptable Web Services composition. First, we use an ontology based context model for extending Web Services descriptions with information about the most suitable context for its use. Then, we transform the composition problem into a semantic context aware graph planning problem to build the optimal service composition based on user's context. The construction of the planning graph is based on semantic context aware Web Service discovery that allows for each step to add most suitable Web Services in terms of semantic compatibility between the services parameters and their context similarity with the user's context. In the backward search step, semantic and contextual similarity scores are used to find best composed Web Services list. Finally, in the ranking step, a score is calculated for each best solution and a set of ranked solutions is returned to the user.

Keywords: semantic web service, web service composition, adaptation, context, graph planning

Procedia PDF Downloads 521