Search results for: information value method
24604 The Architecture, Engineering and Construction(AEC)New Paradigm Shift: Building Information Modelling Trend in the United Arab Emirates
Authors: Salem B. Abdalla
Abstract:
This study investigated the current Building Information Modelling (BIM) trends and practices in the UAE, particularly to shed light on a recently circulated Dubai BIM mandate. Two sets of surveys were mailed to the AEC industry and the corresponding academic sector within the UAE to collect up-to-date data on BIM awareness and utilization. The surveys showed startling results concerning the academic sector in the UAE where almost 70% of respondents were not aware of the BIM mandate. Among the rest, even when aware, the majority of mechanical and electrical engineering schools felt that BIM is not pertinent to their discipline. Therefore, the response to offering BIM in their curriculum was substantially low (35%). On the other hand, the industrial survey identified a large majority (76.5%) of the AEC industry in the UAE are using BIM. The results clearly indicate that the academia should include BIM in their curriculum to produce qualified graduates to support the market. However, the academia is also faced with several obstacles to implement BIM in their curriculum, where the main pretext is that there is “no room for new courses in existing curriculum”.Keywords: building information modeling, BIM adoption, UAE BIM industry survey, UAE BIM academia survey, Dubai BIM mandate, UK BIM mandate, BIM education, architecture education, engineering schools, BIM implementation, BIM curriculum
Procedia PDF Downloads 41524603 An Authentication Protocol for Quantum Enabled Mobile Devices
Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel
Abstract:
The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party
Procedia PDF Downloads 17424602 Influence of Drying Method in Parts of Alumina Obtained for Rapid Prototyping and Uniaxial Dry Pressing
Authors: N. O. Muniz, F. A. Vechietti, L. Treccani, K. Rezwan, Luis Alberto dos Santos
Abstract:
Developing new technologies in the manufacture of biomaterials is a major challenge for researchers in the tissue engineering area. Many in vitro and in vivo studies have revealed the significance of the porous structure of the biomaterials on the promotion of bone ingrowth. The use of Rapid Prototyping in the manufacture of ceramics in the biomedical area has increased in recent years and few studies are conducted on obtaining alumina pieces. The aim of this work was the study of alumina pieces obtained by 3D printing and uniaxial dry pressing (DP) in order to evaluate porosity achieved by this two different techniques. Also, the influence of the powder drying process was determined. The row alumina powders were drying by freeze drying and oven. Apparent porosity, apparent density, retraction after thermal treatment were evaluated. The porosity values obtained by DP, regardless of method of drying powders, were much lower than those obtained by RP as expected. And for the prototyped samples, the method of powder drying significantly influenced porosities, reached 48% for drying oven versus 65% for freeze-drying. Therefore, the method of 3D printing, using different powder drying, allows a better control over the porosity.Keywords: rapid prototyping, freeze-drying, porosity, alumina
Procedia PDF Downloads 47224601 Information Technology Governance Implementation and Its Determinants in the Egyptian Market
Authors: Nariman O. Kandil, Ehab K. Abou-Elkheir, Amr M. Kotb
Abstract:
Effective IT governance guarantees the strategic alignment of IT and business goals, risk mitigation control, and better IT and business performance. This study seeks to examine empirically the extent of IT governance implementation within the firms listed on the Egyptian stock exchange (EGX30) and its determinants. Accordingly, 18 semi-structured interviews face to face, phone, and video-conferencing interviews using various tools (e.g., WebEx, Zoom, and Microsoft Teams) were undertaken at the interviewees’ offices in Egypt between the end of November 2019 and the end of August 2020. Results suggest that there are variances in the extent of IT Governance (ITG) implementation within the firms listed on the Egyptian stock exchange (EGX30), mainly caused by the industry type and internal and external triggers. The results also suggest that the organization size, the type of auditor, the criticality of the industry, the effective processes & KPIs, and the information intensity expertise of the CIO have a significant impact on IT governance implementation within the firms.Keywords: effective IT governance, Egyptian market, information security, risk controls
Procedia PDF Downloads 16724600 The Relationship between Market Orientation, Human Resource Management, Adoption of Information Communication Technology, Performance of Small and Medium Enterprises and Mediating Cash Management
Authors: Azizah Hashim, Rohana Ngah
Abstract:
Transformation of Economic Development is aimed to transform Malaysia to become a high-income developed nation with a knowledge-based economy by 2020. To achieve this national agenda, the country needs to further strengthen its economic development, growth and well-being. Therefore, this study aspires to examine the relationship between market orientation, human resource management and adoption of information communication technology and SMEs performance and cash management as a mediator. This study will employ quantitative approaches. Questionnaires will be distributed to managers and owners in service sectors. The data collected will be analyzed using SPSS and Structural Equation Modelling. Resource Based Theory (RBT) adopts as an integral part of management literature that explains the performance of organizations through building resources and implement of their strategies.Keywords: small medium enterprises (SMEs), market orientation, human resource management, adoption of information communication technology
Procedia PDF Downloads 27724599 Modification of Newton Method in Two Point Block Backward Differentiation Formulas
Authors: Khairil I. Othman, Nur N. Kamal, Zarina B. Ibrahim
Abstract:
In this paper, we present modified Newton method as a new strategy for improving the efficiency of Two Point Block Backward Differentiation Formulas (BBDF) when solving stiff systems of ordinary differential equations (ODEs). These methods are constructed to produce two approximate solutions simultaneously at each iteration The detailed implementation of the predictor corrector BBDF with PE(CE)2 with modified Newton are discussed. The proposed modification of BBDF is validated through numerical results on some standard problems found in the literature and comparisons are made with the existing Block Backward Differentiation Formula. Numerical results show the advantage of using the new strategy for solving stiff ODEs in improving the accuracy of the solution.Keywords: newton method, two point, block, accuracy
Procedia PDF Downloads 35724598 Construction Project Planning Using Fuzzy Critical Path Approach
Authors: Omar M. Aldenali
Abstract:
Planning is one of the most important phases of the management science and network planning, which represents the project activities relationship. Critical path is one of the project management techniques used to plan and control the execution of a project activities. The objective of this paper is to implement a fuzzy logic approach to arrange network planning on construction projects. This method is used to finding out critical path in the fuzzy construction project network. The trapezoidal fuzzy numbers are used to represent the activity construction project times. A numerical example that represents a house construction project is introduced. The critical path method is implemented on the fuzzy construction network activities, and the results showed that this method significantly affects the completion time of the construction projects.Keywords: construction project, critical path, fuzzy network project, planning
Procedia PDF Downloads 14324597 Annular Hyperbolic Profile Fins with Variable Thermal Conductivity Using Laplace Adomian Transform and Double Decomposition Methods
Authors: Yinwei Lin, Cha'o-Kuang Chen
Abstract:
In this article, the Laplace Adomian transform method (LADM) and double decomposition method (DDM) are used to solve the annular hyperbolic profile fins with variable thermal conductivity. As the thermal conductivity parameter ε is relatively large, the numerical solution using DDM become incorrect. Moreover, when the terms of DDM are more than seven, the numerical solution using DDM is very complicated. However, the present method can be easily calculated as terms are over seven and has more precisely numerical solutions. As the thermal conductivity parameter ε is relatively large, LADM also has better accuracy than DDM.Keywords: fins, thermal conductivity, Laplace transform, Adomian, nonlinear
Procedia PDF Downloads 33424596 Finite Element Model to Investigate the Dynamic Behavior of Ring-Stiffened Conical Shell Fully and Partially Filled with Fluid
Authors: Mohammadamin Esmaeilzadehazimi, Morteza Shayan Arani, Mohammad Toorani, Aouni Lakis
Abstract:
This study uses a hybrid finite element method to predict the dynamic behavior of both fully and partially-filled truncated conical shells stiffened with ring stiffeners. The method combines classical shell theory and the finite element method, and employs displacement functions derived from exact solutions of Sanders' shell equilibrium equations for conical shells. The shell-fluid interface is analyzed by utilizing the velocity potential, Bernoulli's equation, and impermeability conditions to determine an explicit expression for fluid pressure. The equations of motion presented in this study apply to both conical and cylindrical shells. This study presents the first comparison of the method applied to ring-stiffened shells with other numerical and experimental findings. Vibration frequencies for conical shells with various boundary conditions and geometries in a vacuum and filled with water are compared with experimental and numerical investigations, achieving good agreement. The study thoroughly investigates the influence of geometric parameters, stiffener quantity, semi-vertex cone angle, level of water filled in the cone, and applied boundary conditions on the natural frequency of fluid-loaded ring-stiffened conical shells, and draws some useful conclusions. The primary advantage of the current method is its use of a minimal number of finite elements while achieving highly accurate results.Keywords: finite element method, fluid–structure interaction, conical shell, natural frequency, ring-stiffener
Procedia PDF Downloads 7824595 High Efficiency ZPS-PWM Dual-Output Converters with EMI Reduction Method
Authors: Yasunori Kobori, Nobukazu Tsukiji, Nobukazu Takai, Haruo Kobayashi
Abstract:
In this paper, we study a Pulse-WidthModulation (PWM) controlled Zero-Voltage-Switching (ZVS) for single-inductor dual-output (SIDO) converters. This method can meet the industry demands for high efficiency due to ZVS and small size and low cost, thanks to single-inductor per multiple voltages. We show the single inductor single-output (SISO) ZVS buck converter with its operation and simulation and then the experimental results. Next proposed ZVS-PWM controlled SIDO converters are explained in the simulation. Finally we have proposed EMI reduction method with spread spectrum.Keywords: DC-DC switching converter, zero-oltage switching control, single-inductor dual-output converter, EMI reduction, spread spectrum
Procedia PDF Downloads 49724594 Research on Contract's Explicit Incentive and Reputation's Implicit Incentive Mechanism towards Construction Contractors
Authors: Li Ma, Meishuang Ma, Mengying Huang
Abstract:
The quality of construction projects reflects the credit and responsibilities of construction contractors for the owners and the whole society. Because the construction contractors master more relevant information about the entrusted engineering project under construction while the owners are in unfavorable position of gaining information, asymmetric information may lead the contractors act against the owners in order to pursue their own interests. Building a powerful motivation mechanism is the key to guarantee investor economic interests and the life and property of users in construction projects. Based on principal-agent theory and game theory, the authors develop relevant mathematical models to analyze and compare the contractor’s utility functions under different combinations of contracts’ explicit incentive mechanism and reputation’s implicit incentive mechanism aiming at finding out the conditions for incentive validity. The research concludes that the most rational motivation way is to combine the explicit and implicit incentive effects of both contracts and reputation mechanism, and puts forth some measures for problems on account of China’s current situation.Keywords: construction contractors, contract, reputation, incentive mechanism
Procedia PDF Downloads 50924593 A Multi Sensor Monochrome Video Fusion Using Image Quality Assessment
Authors: M. Prema Kumar, P. Rajesh Kumar
Abstract:
The increasing interest in image fusion (combining images of two or more modalities such as infrared and visible light radiation) has led to a need for accurate and reliable image assessment methods. This paper gives a novel approach of merging the information content from several videos taken from the same scene in order to rack up a combined video that contains the finest information coming from different source videos. This process is known as video fusion which helps in providing superior quality (The term quality, connote measurement on the particular application.) image than the source images. In this technique different sensors (whose redundant information can be reduced) are used for various cameras that are imperative for capturing the required images and also help in reducing. In this paper Image fusion technique based on multi-resolution singular value decomposition (MSVD) has been used. The image fusion by MSVD is almost similar to that of wavelets. The idea behind MSVD is to replace the FIR filters in wavelet transform with singular value decomposition (SVD). It is computationally very simple and is well suited for real time applications like in remote sensing and in astronomy.Keywords: multi sensor image fusion, MSVD, image processing, monochrome video
Procedia PDF Downloads 57224592 Utilization of Aluminium Dross as a Main Raw Material for Synthesize the Geopolymers via Mechanochemistry Method
Authors: Pimchanok Puksisuwan, Pitak Laorattanakul, Benya Cherdhirunkorn
Abstract:
The use of aluminium dross as a raw material for geopolymer synthesis via mechanochemistry method was studied. The geopolymers were prepared using aluminium dross from secondary aluminium industry, fly ash from a biomass power plant and liquid alkaline activators, which is a mixture of sodium silicate solution (Na2SiO3) and sodium hydroxide solution (NaOH) (Na2SiO3/NaOH ratio 4:1, 3:1 and 2:1). Aluminium dross consists mostly of alumina (Al2O3), silicon oxide (SiO2) and aluminium nitride (AlN). The raw materials were mixed and milled using the high energy ball milling method for 5, 10 and 15 minutes in order to reduce the particle size. The milled powders were uniaxially pressed into a cylinder die with the pressure of 2200 psi. The cylinder samples were cured in the sealed plastic bags for 3, 7 and 14 days at the room temperature and 60°C for 24 hour. The mechanical property of geopolymers was investigated. In addition, scanning electron microscopy (SEM) and X-ray diffraction (XRD) analysis were carried out in order to study the microstructure and phase structures of the geopolymers, respectively. The results showed that aluminium dross could enhance the mechanical property of geopolymers product by mechanochemistry method and meet the TISI requirements.Keywords: aluminium dross, fly ash, geopolymer, mechanochemistry
Procedia PDF Downloads 25324591 Selection of New Business in Brazilian Companies Incubators through Hierarchical Methodology
Authors: Izabel Cristina Zattar, Gilberto Passos Lima, Guilherme Schünemann de Oliveira
Abstract:
In Brazil, there are several institutions committed to the development of new businesses based on product innovation. Among them are business incubators, universities and science institutes. Business incubators can be defined as nurseries for new companies, which may be in the technology segment, discussed in this article. Business incubators provide services related to infrastructure, such as physical space and meeting rooms. Besides these services, incubators also offer assistance in the form of information and communication, access to finance, relationship networks and business monitoring and mentoring processes. Business incubators support not all technology companies. One of the business incubators tasks is to assess the nature and feasibility of new business proposals. To assist this goal, this paper proposes a methodology for evaluating new business using the Analytic Hierarchy Process (AHP). This paper presents the concepts used in the assessing methodology application for new business, concepts that have been tested with positive results in practice. This study counts on three main steps: first, a hierarchy was built, based on new business manuals used by the business incubators. These books and manuals relate business selection requirements, such as the innovation status and other technological aspects. Then, a questionnaire was generated, in order to guide incubator experts in the parity comparisons at all hierarchy levels. The weights of each requirement are calculated from information obtained from the questionnaire responses. Finally, the proposed method was applied to evaluate five new business proposals, which were applying to be part of a company incubator. The main result is the classification of these new businesses, which helped the incubator experts to decide what companies were more eligible to work with. This classification may also be helpful to the decision-making process of business incubators in future selection processes.Keywords: Analytic Hierarchy Process (AHP), Brazilian companies incubators, technology companies, incubator
Procedia PDF Downloads 37424590 Drivers and Barriers of Asphalt Rubber in Sweden
Authors: Raheb Mirzanamadi, João Patrício
Abstract:
Asphalt rubber (AR) was initially developed in Sweden in the 1960s by replacing crumb rubber (CR) as aggregates in asphalt pavement. The AR produced by this method had better mechanical properties than conventional asphalt pavement but was very expensive. Since then, different technologies and methods have been developed to use CR in asphalt pavements, including blending CR with bitumen at a high temperature in the mixture, called the wet method, and blending CR with bitumen in the refinery, called the terminal blending method. In 2006, the wet method was imported from the USA to Sweden to evaluate the potential of using AR on Swedish roads. 154 km AR roads were constructed by the wet method in Sweden. The evaluation showed that the AR had, in most cases, better mechanical performance than conventional asphalt pavements. However, the terrible smoke and smell led the Swedish Transport Administration (STA) to stop using AR in Sweden. Today, there are few focuses on AR, despite its good mechanical properties and environmental aspects. Hence, there is a need to study the drives and barriers of using AR mixture in Sweden. The aims of this paper are: (i) to study drivers and barriers of using AR pavements in Sweden and (ii) to discover knowledge gaps for further research in this area. The study was done using a literature review and completed by interviews with experts, including three researchers from Swedish National Road and Transport Research Institute (VTI) and two experts from STA. The results showed that AR can be an alternative not only for conventional asphalt pavement but also for polymer modified asphalt (PMA) due to the same mechanical properties but the lower cost for production. New technologies such as terminal blending and using warm mix asphalt (WMA) methods can lead to reducing the energy and temperature during production processes. From this study, it is found that there is not enough experience and knowledge about AR in Sweden, and more research is needed, including the lifespan of AR, mechanical properties of AR using new technologies, and the impact of AR on spreading and leaching substances into nature. More studies can lead to standardization of using AR in Sweden, a potential solution for the use of end-of-life tyres, with better mechanical properties and lower costs, in comparison with conventional asphalt pavements and PMA.Keywords: asphalt rubber, crumb rubber, terminal blending method, wet method
Procedia PDF Downloads 8224589 General Awareness of Teenagers in Information Security
Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system
Procedia PDF Downloads 39024588 Parents’ Perceptions of the Consent Arrangements for Dental Public Health Programmes in North London: A Qualitative Exploration
Authors: Charlotte Jeavons, Charitini Stavropoulous, Nicolas Drey
Abstract:
Background: Over one-third of five-year-olds and almost half of all eight-year-olds in the UK have obvious caries experience that can be detected by visual screening techniques. School-based caries preventions programs to apply fluoride varnish to young children’s teeth operate in many areas in the UK. Their aim is to reduce dental caries in children. The Department of Health guidance (2009) on consent states information must be provided to parents to enable informed autonomous decision-making prior to any treatment involving their young children. Fluoride varnish schemes delivered in primary schools use letters for this purpose. Parents are expected to return these indicating their consent or refusal. A large proportion of parents do not respond. In the absence of positive consent, these children are excluded from the program. Non-response is more common in deprived areas creating inequality. The reason for this is unknown. The consent process used is underpinned by the ethical theory of deontology that is prevalent in clinical dentistry and widely accepted in bio-ethics. Objective: To investigate parents’ views, understanding and experience of the fluoride varnish program taking place in their child’s school, including their views about the practical consent arrangements. Method: Schools participating in the fluoride varnish scheme operating in Enfield, North London, were asked to take part. Parents with children in nursery, reception, or year one were invited to participate via semi-structured interviews and focus groups. Thematic analysis was conducted. Findings: 40 parents were recruited from eight schools. The global theme of ‘trust’ was identified as the strongest influence on parental responses. Six themes were identified; protecting children from harm is viewed by parents as their role, parents have the capability to decide but lack confidence, sharing responsibility for their child’s oral health with the State is welcomed by a parent, existing relationships within parents’ social networks strongly influences consent decisions, official dental information is not communicated effectively, sending a letter to parents’ and excluding them from meeting dental practitioners is ineffective. The information delivered via a letter was not strongly identified by parents as influencing their response. Conclusions: Personal contact with the person(s) providing information and requesting consent has a greater impact on parental consent responses than written information provided alone. This demonstrates that traditional bio-ethical ideas about rational decision-making where emotions are transcended and interference is not justified unless preventing harm to an unaware person are outdated. Parental decision-making is relational and the consent process should be adapted to reflect this. The current system that has a deontology view of decision making at its core impoverishes parental autonomy and may, ultimately, increase dental inequalities as a result.Keywords: consent, decision, ethics, fluoride, parents
Procedia PDF Downloads 17124587 Multi-Criteria Decision Approach to Performance Measurement Techniques Data Envelopment Analysis: Case Study of Kerman City’s Parks
Authors: Ali A. Abdollahi
Abstract:
During the last several decades, scientists have consistently applied Multiple Criteria Decision-Making methods in making decisions about multi-faceted, complicated subjects. While making such decisions and in order to achieve more accurate evaluations, they have regularly used a variety of criteria instead of applying just one Optimum Evaluation Criterion. The method presented here utilizes both ‘quantity’ and ‘quality’ to assess the function of the Multiple-Criteria method. Applying Data envelopment analysis (DEA), weighted aggregated sum product assessment (WASPAS), Weighted Sum Approach (WSA), Analytic Network Process (ANP), and Charnes, Cooper, Rhodes (CCR) methods, we have analyzed thirteen parks in Kerman city. It further indicates that the functions of WASPAS and WSA are compatible with each other, but also that their deviation from DEA is extensive. Finally, the results for the CCR technique do not match the results of the DEA technique. Our study indicates that the ANP method, with the average rate of 1/51, ranks closest to the DEA method, which has an average rate of 1/49.Keywords: multiple criteria decision making, Data envelopment analysis (DEA), Charnes Cooper Rhodes (CCR), Weighted Sum Approach (WSA)
Procedia PDF Downloads 21824586 Healthcare Providers’ Perception Towards Utilization of Health Information Applications and Its Associated Factors in Healthcare Delivery in Health Facilities in Cape Coast Metropolis, Ghana
Authors: Richard Okyere Boadu, Godwin Adzakpah, Nathan Kumasenu Mensah, Kwame Adu Okyere Boadu, Jonathan Kissi, Christiana Dziyaba, Rosemary Bermaa Abrefa
Abstract:
Information and communication technology (ICT) has significantly advanced global healthcare, with electronic health (e-Health) applications improving health records and delivery. These innovations, including electronic health records, strengthen healthcare systems. The study investigates healthcare professionals' perceptions of health information applications and their associated factors in the Cape Coast Metropolis of Ghana's health facilities. Methods: We used a descriptive cross-sectional study design to collect data from 632 healthcare professionals (HCPs), in the three purposively selected health facilities in the Cape Coast municipality of Ghana in July 2022. Shapiro-Wilk test was used to check the normality of dependent variables. Descriptive statistics were used to report means with corresponding standard deviations for continuous variables. Proportions were also reported for categorical variables. Bivariate regression analysis was conducted to determine the factors influencing the Benefits of Information Technology (BoIT); Barriers to Information Technology Use (BITU); and Motives of Information Technology Use (MoITU) in healthcare delivery. Stata SE version 15 was used for the analysis. A p-value of less than 0.05 served as the basis for considering a statistically significant accepting hypothesis. Results: Healthcare professionals (HCPs) generally perceived moderate benefits (Mean score (M)=5.67) from information technology (IT) in healthcare. However, they slightly agreed that barriers like insufficient computers (M=5.11), frequent system downtime (M=5.09), low system performance (M=5.04), and inadequate staff training (M=4.88) hindered IT utilization. Respondents slightly agreed that training (M=5.56), technical support (M=5.46), and changes in work procedures (M=5.10) motivated their IT use. Bivariate regression analysis revealed significant influences of education, working experience, healthcare profession, and IT training on attitudes towards IT utilization in healthcare delivery (BoIT, BITU, and MoITU). Additionally, the age of healthcare providers, education, and working experience significantly influenced BITU. Ultimately, age, education, working experience, healthcare profession, and IT training significantly influenced MoITU in healthcare delivery. Conclusions: Healthcare professionals acknowledge moderate benefits of IT in healthcare but encounter barriers like inadequate resources and training. Motives for IT use include staff training and support. Bivariate regression analysis shows education, working experience, profession, and IT training significantly influence attitudes toward IT adoption. Targeted interventions and policies can enhance IT utilization in the Cape Coast Metropolis, Ghana.Keywords: health information application, utilization of information application, information technology use, healthcare
Procedia PDF Downloads 6524585 Traffic Density Measurement by Automatic Detection of the Vehicles Using Gradient Vectors from Aerial Images
Authors: Saman Ghaffarian, Ilgin Gökaşar
Abstract:
This paper presents a new automatic vehicle detection method from very high resolution aerial images to measure traffic density. The proposed method starts by extracting road regions from image using road vector data. Then, the road image is divided into equal sections considering resolution of the images. Gradient vectors of the road image are computed from edge map of the corresponding image. Gradient vectors on the each boundary of the sections are divided where the gradient vectors significantly change their directions. Finally, number of vehicles in each section is carried out by calculating the standard deviation of the gradient vectors in each group and accepting the group as vehicle that has standard deviation above predefined threshold value. The proposed method was tested in four very high resolution aerial images acquired from Istanbul, Turkey which illustrate roads and vehicles with diverse characteristics. The results show the reliability of the proposed method in detecting vehicles by producing 86% overall F1 accuracy value.Keywords: aerial images, intelligent transportation systems, traffic density measurement, vehicle detection
Procedia PDF Downloads 37924584 Comparative Study of Computer Assisted Instruction and Conventional Method in Attaining and Retaining Mathematical Concepts
Authors: Nirupma Bhatti
Abstract:
This empirical study was aimed to compare the effectiveness of Computer Assisted Instruction (CAI) and Conventional Method (CM) in attaining and retaining mathematical concepts. Instructional and measuring tools were developed for five units of Matrix Algebra, two of Calculus and five of Numerical Analysis. Reliability and validity of these tools were also examined in pilot study. Ninety undergraduates participated in this study. Pre-test – post-test equivalent – groups research design was used. SPSS v.16 was used for data analysis. Findings supported CAI as better mode of instruction for attainment and retention of basic mathematical concepts. Administrators should motivate faculty members to develop Computer Assisted Instructional Material (CAIM) in mathematics for higher education.Keywords: attainment, CAI, CAIM, conventional method, retention
Procedia PDF Downloads 18824583 Overhead Lines Induced Transient Overvoltage Analysis Using Finite Difference Time Domain Method
Authors: Abdi Ammar, Ouazir Youcef, Laissaoui Abdelmalek
Abstract:
In this work, an approach based on transmission lines theory is presented. It is exploited for the calculation of overvoltage created by direct impacts of lightning waves on a guard cable of an overhead high-voltage line. First, we show the theoretical developments leading to the propagation equation, its discretization by finite difference time domain method (FDTD), and the resulting linear algebraic equations, followed by the calculation of the linear parameters of the line. The second step consists of solving the transmission lines system of equations by the FDTD method. This enabled us to determine the spatio-temporal evolution of the induced overvoltage.Keywords: lightning surge, transient overvoltage, eddy current, FDTD, electromagnetic compatibility, ground wire
Procedia PDF Downloads 8324582 Real-Time Pedestrian Detection Method Based on Improved YOLOv3
Authors: Jingting Luo, Yong Wang, Ying Wang
Abstract:
Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3
Procedia PDF Downloads 14224581 Towards a Framework for Embedded Weight Comparison Algorithm with Business Intelligence in the Plantation Domain
Authors: M. Pushparani, A. Sagaya
Abstract:
Embedded systems have emerged as important elements in various domains with extensive applications in automotive, commercial, consumer, healthcare and transportation markets, as there is emphasis on intelligent devices. On the other hand, Business Intelligence (BI) has also been extensively used in a range of applications, especially in the agriculture domain which is the area of this research. The aim of this research is to create a framework for Embedded Weight Comparison Algorithm with Business Intelligence (EWCA-BI). The weight comparison algorithm will be embedded within the plantation management system and the weighbridge system. This algorithm will be used to estimate the weight at the site and will be compared with the actual weight at the plantation. The algorithm will be used to build the necessary alerts when there is a discrepancy in the weight, thus enabling better decision making. In the current practice, data are collected from various locations in various forms. It is a challenge to consolidate data to obtain timely and accurate information for effective decision making. Adding to this, the unstable network connection leads to difficulty in getting timely accurate information. To overcome the challenges embedding is done on a portable device that will have the embedded weight comparison algorithm to also assist in data capture and synchronize data at various locations overcoming the network short comings at collection points. The EWCA-BI will provide real-time information at any given point of time, thus enabling non-latent BI reports that will provide crucial information to enable efficient operational decision making. This research has a high potential in bringing embedded system into the agriculture industry. EWCA-BI will provide BI reports with accurate information with uncompromised data using an embedded system and provide alerts, therefore, enabling effective operation management decision-making at the site.Keywords: embedded business intelligence, weight comparison algorithm, oil palm plantation, embedded systems
Procedia PDF Downloads 28524580 Research on Urban Thermal Environment Climate Map Based on GIS: Taking Shapingba District, Chongqing as an Example
Authors: Zhao Haoyue
Abstract:
Due to the combined effects of climate change, urban expansion, and population growth, various environmental issues, such as urban heat islands and pollution, arise. Therefore, reliable information on urban environmental climate is needed to address and mitigate the negative effects. The emergence of urban climate maps provides a practical basis for urban climate regulation and improvement. This article takes Shapingba District, Chongqing City, as an example to study the construction method of urban thermal environment climate maps based on GIS spatial analysis technology. The thermal load, ventilation potential analysis map, and thermal environment comprehensive analysis map were obtained. Based on the classification criteria obtained from the climate map, corresponding protection and planning mitigation measures have been proposed.Keywords: urban climate, GIS, heat island analysis, urban thermal environment
Procedia PDF Downloads 11324579 The Influence of Polysaccharide Isolated from Morinda citrifolia Fruit to the Growth of Vero, He-La and T47D Cell Lines against Doxorubicin in vitro
Authors: Ediati Budi Cahyono, Triana Hertiani, Nauval Arrazy Asawimanda, Wahyu Puji Pratomo
Abstract:
Background: Doxorubicin is widely used as a chemotherapeutic drug despite having many side effects. It may cause macrophage dysfunction and decreasing proliferation of lymphocyte. Noni (Morinda citrifolia) fruit which has rich of polysaccharide content has potential as antitumor and immunostimulant effect. The isolation of polysaccharide from Noni fruit has been optimized according to four different methods based on macrophage and lymphocyte activities. We found the highest polysaccharide content from one of the four methods isolation. A method of polysaccharide isolation which has the highest immunostimulant effect was used for further observation as co-chemotherapy. The aim of the study: was to evaluate the isolated polysaccharide from the method of choice as co-chemotherapy of doxorubicin for the growth of Vero, He-La, and T47D cell lines in vitro. The method: in vitro growth assay of Vero, He-La, and T47D cell lines was done using MTT-reduction method, and apoptosis test was done by double staining method to evaluate the induction apoptotic effect of the combination. Every group was treated with doxorubicin and isolated polysaccharide from method of choice with 4 variances of concentrations (25 µg/ml, 50 µg/ml, 100 µg/ml and 200 µg/ml) a long with negative control (doxorubicin only) and normal control (without doxorubicin or polysaccharide administration). Results: The combination of polysaccharide fraction in the concentration of 100μg/ml with 2μmol of doxorubicin against He-La and T47D cell lines influenced the highest cytotoxic effect by suppressing cell viability comparing with doxorubicin only. The combination of polysaccharide fraction in the concentration of 100μg/ml with 2μmol of doxorubicin-induced apoptotic effect the He-La cell line comparing with doxorubicin only. The result of the study: it can be concluded that the combination of polysaccharide fraction and doxorubicin effect more selective toward He-La and T47D cell lines than to Vero cell line. It can be suggested isolated polysaccharide from the method of choice has co-chemotherapy activity against doxorubicin.Keywords: polysaccharide, noni fruit, doxorubicin, cancer cell lines, vero cell line
Procedia PDF Downloads 25124578 Numerical Simulation of Rayleigh Benard Convection and Radiation Heat Transfer in Two-Dimensional Enclosure
Authors: Raoudha Chaabane, Faouzi Askri, Sassi Ben Nasrallah
Abstract:
A new numerical algorithm is developed to solve coupled convection-radiation heat transfer in a two dimensional enclosure. Radiative heat transfer in participating medium has been carried out using the control volume finite element method (CVFEM). The radiative transfer equations (RTE) are formulated for absorbing, emitting and scattering medium. The density, velocity and temperature fields are calculated using the two double population lattice Boltzmann equation (LBE). In order to test the efficiency of the developed method the Rayleigh Benard convection with and without radiative heat transfer is analyzed. The obtained results are validated against available works in literature and the proposed method is found to be efficient, accurate and numerically stable.Keywords: participating media, LBM, CVFEM- radiation coupled with convection
Procedia PDF Downloads 40724577 A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites
Authors: Che-Wei Lee, Bay-Erl Lai
Abstract:
A new steganographic method via the use of numeric data on public websites with self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the selected numeric items in a website as if they are part of the website’s numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego-numeric-content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.Keywords: steganography, data hiding, secret authentication, secret sharing
Procedia PDF Downloads 24324576 Research of the Activation Energy of Conductivity in P-I-N SiC Structures Fabricated by Doping with Aluminum Using the Low-Temperature Diffusion Method
Authors: Ilkham Gafurovich Atabaev, Khimmatali Nomozovich Juraev
Abstract:
The activation energy of conductivity in p-i-n SiC structures fabricated by doping with Aluminum using the new low-temperature diffusion method is investigated. In this method, diffusion is stimulated by the flux of carbon and silicon vacancies created by surface oxidation. The activation energy of conductivity in the p - layer is 0.25 eV and it is close to the ionization energy of Aluminum in 4H-SiC from 0.21 to 0.27 eV for the hexagonal and cubic positions of aluminum in the silicon sublattice for weakly doped crystals. The conductivity of the i-layer (measured in the reverse biased diode) shows 2 activation energies: 0.02 eV and 0.62 eV. Apparently, the 0.62 eV level is a deep trap level and it is a complex of Aluminum with a vacancy. According to the published data, an analogous level system (with activation energies of 0.05, 0.07, 0.09 and 0.67 eV) was observed in the ion Aluminum doped 4H-SiC samples.Keywords: activation energy, aluminum, low temperature diffusion, SiC
Procedia PDF Downloads 27924575 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 306