Search results for: tire store patronage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 525

Search results for: tire store patronage

285 Geo-Spatial Methods to Better Understand Urban Food Deserts

Authors: Brian Ceh, Alison Jackson-Holland

Abstract:

Food deserts are a reality in some cities. These deserts can be described as a shortage of healthy food options within close proximity of consumers. The shortage in this case is typically facilitated by a lack of stores in an urban area that provide adequate fruit and vegetable choices. This study explores new avenues to better understand food deserts by examining modes of transportation that are available to shoppers or consumers, e.g. walking, automobile, or public transit. Further, this study is unique in that it not only explores the location of large grocery stores, but small grocery and convenience stores too. In this study, the relationship between some socio-economic indicators, such as personal income, are also explored to determine any possible association with food deserts. In addition, to help facilitate our understanding of food deserts, complex network spatial models that are built on adequate algorithms are used to investigate the possibility of food deserts in the city of Hamilton, Canada. It is found that Hamilton, Canada is adequate serviced by retailers who provide healthy food choices and that the food desert phenomena is almost absent.

Keywords: Canada, desert, food, Hamilton, store

Procedia PDF Downloads 219
284 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 284
283 Model Order Reduction of Continuous LTI Large Descriptor System Using LRCF-ADI and Square Root Balanced Truncation

Authors: Mohammad Sahadet Hossain, Shamsil Arifeen, Mehrab Hossian Likhon

Abstract:

In this paper, we analyze a linear time invariant (LTI) descriptor system of large dimension. Since these systems are difficult to simulate, compute and store, we attempt to reduce this large system using Low Rank Cholesky Factorized Alternating Directions Implicit (LRCF-ADI) iteration followed by Square Root Balanced Truncation. LRCF-ADI solves the dual Lyapunov equations of the large system and gives low-rank Cholesky factors of the gramians as the solution. Using these cholesky factors, we compute the Hankel singular values via singular value decomposition. Later, implementing square root balanced truncation, the reduced system is obtained. The bode plots of original and lower order systems are used to show that the magnitude and phase responses are same for both the systems.

Keywords: low-rank cholesky factor alternating directions implicit iteration, LTI Descriptor system, Lyapunov equations, Square-root balanced truncation

Procedia PDF Downloads 391
282 Municipal Employees’ Perceptions of Fairness of Human Resource Management Practices and Employee Organisational Commitment

Authors: Lineo Dzansi

Abstract:

South African government has been mandated by the Constitution (Act 108 of 1996) to deliver basic services to all who live in it. However, service delivery has always been marred with much criticism and citizens’ dissatisfaction regarding the quality of services rendered to them. This is evidenced by public protests that are common in South Africa lately which they are mostly alleged to link with failure by the government through various municipalities to meet citizens’ service delivery expectations. Municipalities render services through people. People management plays a crucial role in influencing employee and organisational performance and it thus needs to be conducted in a fair and just manner. Literature confirms that there is a relationship between organisational justice perceptions and employee behaviour, and that positive or negative justice perceptions can have an influence on employee attitudes, commitment to their jobs and organisation. The nature of the attachments formed by individuals to their employing organisations depends on the manner in which the organisation treats them. This implies that Municipal employees’ commitment could be linked to fair or unfair perceptions of Human Resource Management practices within their organisations. Unfortunately, the political nature of municipal environment could be a fertile ground for appointments of people based on political affiliation as a reward for political patronage rather than on merit. This paper seeks to investigate the relationship between municipal employees’ perceptions of fairness of Human Resource Management practices and employee commitment from the organisational justice point of view. Research on organisational justice has shown that employees’ organisational justice perceptions link directly with job satisfaction and employee organisational commitment. Quantitative research methods were employed to collect and analyse data from selected managerial and non-managerial municipal employees within selected municipalities in Free State Province of South Africa. Employee commitment has positive relationships with HRM practices at the .05 and .01 levels of significance – indicating that the higher the levels of HRM practices in municipal employees the higher the organisational commitment of employees. Therefore, it is concluded that organisational commitment of municipal employees (EOC) is positively related to their perceptions of fairness of HRM practices (PHF) of municipalities. In other words, fair HRM practices of municipalities promote organisational commitment in municipal employees.

Keywords: organisational Justice, HRM practices, employee organisational commitment, employee attitudes

Procedia PDF Downloads 52
281 Design of Collection and Transportation System of Municipal Solid Waste in Meshkinshahr City

Authors: Ebrahim Fataei, Seyed Ali Hosseini, Zahra Arabi, Habib farhadi, Mehdi Aalipour Erdi, Seiied Taghi Seiied Safavian

Abstract:

Solid waste production is an integral part of human life and management of waste require full scientific approach and essential planning. The allocation of most management cost to collection and transportation and also the necessity of operational efficiency in this system, by limiting time consumption, and on the other hand optimum collection system and transportation is the base of waste design and management. This study was done to optimize the exits collection and transportation system of solid waste in Meshkinshahr city. So based on the analyzed data of municipal solid waste components in seven zones of Meshkinshahr city, and GIS software, applied to design storage place based on origin recycling and a route to collect and transport. It was attempted to represent an appropriate model to store, collect and transport municipal solid waste. The result shows that GIS can be applied to locate the waste container and determine a waste collection direction in an appropriate way.

Keywords: municipal solid waste management, transportation, optimizing, GIS, Iran

Procedia PDF Downloads 504
280 Creative Practice and Consciousness in Juju Music: A Nigerian Musical and Cultural Perspective

Authors: Olupemi E. Oludare

Abstract:

This paper investigates the creative practice engaged in Juju music, a Nigerian Neo-traditional genre of the Yoruba, and its influence on the consciousness of societal praxis. It takes a musical and cultural perspective, as representational indices of how the people’s religious, social, educational, and political consciousness is expressed in their music. The study adopts the historical cum descriptive design in its methodology, tracing the historical development of Juju music, the appropriation of musical and cultural materials in its creative process, and a descriptive analysis of its musical practice, in order to substantiate the role and function of Juju music and its musicians in the political, philosophical, and social consciousness of Nigeria’s pre- and post-independence epoch. Data were collected through oral interviews of selected Juju practitioners, stakeholders, and enthusiasts. It also employed the use of discography of Juju musicians. This paper discusses musical factors such as form, melodic and rhythmic patterns, and thematic materials, while highlighting cultural factors such as linguistic elements, with textual analysis, as a conscious avenue of expression. The study revealed that Juju musicians composed their music by engaging both indigenous and foreign musical materials, as a means of creative practice for musical entertainment, while expressing the people’s consciousness of their beliefs, values, and socio-political issues, hence the music functioning as a vehicle for social commentaries. The popularization and commercialization of Juju music brought the musicians national and international accolades, subsequently attracting contributions from contemporary musicians, which led to innovations of new brands, such as ‘Afro-Juju’, ‘Gospel-Juju’, ‘Hip-Hop-Juju’, etc., albeit retaining the basic musical elements of its progenitor, as a conscious music for socio-cultural functions. This study concludes that Juju music and its musicians remain germane in the musical scene of the nation’s social, educational, and political terrain, especially in the current Nigerian democratic climate. This paper recommends the promotion and patronage of the Juju music in its original form, to prevent its decline in current times, since it serves as an enrichment of national identity both in Nigeria, and Internationally.

Keywords: appropriation, consciousness, creative practice, national identity, neo-traditional

Procedia PDF Downloads 407
279 Experimental Studies on Stress Strain Behavior of Expanded Polystyrene Beads-Sand Mixture

Authors: K. N. Ashna

Abstract:

Lightweight fills are a viable alternative where weak soils such as soft clay, peat, and loose silt are encountered. Materials such as Expanded Polystyrene (EPS) geo-foam, plastics, tire wastes, rubber wastes have been used along with soil in order to obtain a lightweight fill. Out of these, Expanded Polystyrene (EPS) geo-foam has gained wide popularity in civil engineering over the past years due to its wide variety of applications. It is extremely lightweight, durable and is available in various densities to meet the strength requirements. It can be used as backfill behind retaining walls to reduce lateral load, as a fill over soft clay or weak soils to prevent the excessive settlements and to reduce seismic forces. Geo-foam is available in block form as well as beads form. In this project Expanded Polystyrene (EPS) beads of various diameters and varying densities were mixed along with sand to study their lightweight as well as strength properties. Four types of EPS beads were used 1mm, 2mm, 3-7 mm and a mix of 1-7 mm. In this project, EPS beads were varied at .25%, .5%, .75% and 1% by weight of sand. A water content of 10% by weight of sand was added to prevent segregation of the mixture. Unconsolidated Unconfined (UU) tri-axial test was conducted at 100kPa, 200 kPa and 300 kPa and angle of internal friction, and cohesion was obtained. Unit weight of the mix was obtained for a relative density of 65%. The results showed that by increasing the EPS content by weight, maximum deviator stress, unit weight, angle of internal friction and initial elastic modulus decreased. An optimum EPS bead content was arrived at by considering the strength as well as the unit weight. The stress-strain behaviour of the mix was found to be dependent on type of bead, bead content and density of the beads. Finally, regression equations were developed to predict the initial elastic modulus of the mix.

Keywords: expanded polystyrene beads, geofoam, lightweight fills, stress-strain behavior, triaxial test

Procedia PDF Downloads 241
278 IoT Based Monitoring Temperature and Humidity

Authors: Jay P. Sipani, Riki H. Patel, Trushit Upadhyaya

Abstract:

Today there is a demand to monitor environmental factors almost in all research institutes and industries and even for domestic uses. The analog data measurement requires manual effort to note readings, and there may be a possibility of human error. Such type of systems fails to provide and store precise values of parameters with high accuracy. Analog systems are having drawback of storage/memory. Therefore, there is a requirement of a smart system which is fully automated, accurate and capable enough to monitor all the environmental parameters with utmost possible accuracy. Besides, it should be cost-effective as well as portable too. This paper represents the Wireless Sensor (WS) data communication using DHT11, Arduino, SIM900A GSM module, a mobile device and Liquid Crystal Display (LCD). Experimental setup includes the heating arrangement of DHT11 and transmission of its data using Arduino and SIM900A GSM shield. The mobile device receives the data using Arduino, GSM shield and displays it on LCD too. Heating arrangement is used to heat and cool the temperature sensor to study its characteristics.

Keywords: wireless communication, Arduino, DHT11, LCD, SIM900A GSM module, mobile phone SMS

Procedia PDF Downloads 257
277 Producing Carbon Nanoparticles from Agricultural and Municipal Wastes

Authors: Kanik Sharma

Abstract:

In the year of 2011, the global production of carbon nano-materials (CNMs) was around 3,500 tons, and it is projected to expand at a compound annual growth rate of 30.6%. Expanding markets for applications of CNMs, such as carbon nano-tubes (CNTs) and carbon nano-fibers (CNFs), place ever-increasing demands on lowering their production costs. Current technologies for CNM generation require intensive premium feedstock consumption and employ costly catalysts; they also require input of external energy. Industrial-scale CNM production is conventionally achieved through chemical vapor deposition (CVD) methods which consume a variety of expensive premium chemical feedstocks such as ethylene, carbon monoxide (CO) and hydrogen (H2); or by flame synthesis techniques, which also consume premium feedstock fuels. Additionally, CVD methods are energy-intensive. Renewable and replenishable feedstocks, such as those found in municipal, industrial, agricultural recycling streams have a more judicious reason for usage, in the light of current emerging needs for sustainability. Agricultural sugarcane bagasse and corn residues, scrap tire chips as well as post-consumer polyethylene (PE) and polyethylene terephthalate (PET) bottle shreddings when either thermally treated by sole pyrolysis or by sequential pyrolysis and partial oxidation result in the formation of gaseous carbon-bearing effluents which when channeled into a heated reactor, produce CNMs, including carbon nano-tubes, catalytically synthesized therein on stainless steel meshes. The structure of the nano-material synthesized depends on the type of feedstock available for pyrolysis, and can be determined by analysing the feedstock. These feedstocks could supersede the use of costly and often toxic or highly-flammable chemicals such as hydrocarbon gases, carbon monoxide and hydrogen, which are commonly used as feedstocks in current nano-manufacturing process for CNMs.

Keywords: nanomaterials, waste plastics, sugarcane bagasse, pyrolysis

Procedia PDF Downloads 210
276 Time-Series Analysis of Port State Control Inspections for Tankers

Authors: Chien-Chung Yuan, Cunqiang Cai, Wu-Hsun Chung, Shu-Te Sung

Abstract:

A tanker is a critical vessel used to transport or store liquids or gases in bulk in maritime shipping. However, it is more dangerous than other types of vessels. Port State Control (PSC) inspection is an important measure to ensure maritime safety when such vessels traveling between ports. However, the current inspection system lacks a useful tool to observe the inspections for tankers and to identify non-random instances in PSC inspections. This study collects the inspection records in Taiwan’s ports from 2015 to 2018 and utilizes run charts to map the PSC inspections for tankers in terms of deficiencies. Based on these time-series charts, several patterns of deficiencies are identified. The results demonstrate that run charts are a useful tool to observe how the PSC inspections for tankers are performed. Also, the charts can help port administrations to identify abnormal phenomena for further investigation. Furthermore, with valuable information from the analysis, port administrations can take proactive improvement measures to ensure the safety of tanker shipping.

Keywords: port state control, tanker, run chart, deficiency

Procedia PDF Downloads 129
275 Knowledge Reactor: A Contextual Computing Work in Progress for Eldercare

Authors: Scott N. Gerard, Aliza Heching, Susann M. Keohane, Samuel S. Adams

Abstract:

The world-wide population of people over 60 years of age is growing rapidly. The explosion is placing increasingly onerous demands on individual families, multiple industries and entire countries. Current, human-intensive approaches to eldercare are not sustainable, but IoT and AI technologies can help. The Knowledge Reactor (KR) is a contextual, data fusion engine built to address this and other similar problems. It fuses and centralizes IoT and System of Record/Engagement data into a reactive knowledge graph. Cognitive applications and services are constructed with its multiagent architecture. The KR can scale-up and scaledown, because it exploits container-based, horizontally scalable services for graph store (JanusGraph) and pub-sub (Kafka) technologies. While the KR can be applied to many domains that require IoT and AI technologies, this paper describes how the KR specifically supports the challenging domain of cognitive eldercare. Rule- and machine learning-based analytics infer activities of daily living from IoT sensor readings. KR scalability, adaptability, flexibility and usability are demonstrated.

Keywords: ambient sensing, AI, artificial intelligence, eldercare, IoT, internet of things, knowledge graph

Procedia PDF Downloads 150
274 Research on Straightening Process Model Based on Iteration and Self-Learning

Authors: Hong Lu, Xiong Xiao

Abstract:

Shaft parts are widely used in machinery industry, however, bending deformation often occurred when this kind of parts is being heat treated. This parts needs to be straightened to meet the requirement of straightness. As for the pressure straightening process, a good straightening stroke algorithm is related to the precision and efficiency of straightening process. In this paper, the relationship between straightening load and deflection during the straightening process is analyzed, and the mathematical model of the straightening process has been established. By the mathematical model, the iterative method is used to solve the straightening stroke. Compared to the traditional straightening stroke algorithm, straightening stroke calculated by this method is much more precise; because it can adapt to the change of material performance parameters. Considering that the straightening method is widely used in the mass production of the shaft parts, knowledge base is used to store the data of the straightening process, and a straightening stroke algorithm based on empirical data is set up. In this paper, the straightening process control model which combine the straightening stroke method based on iteration and straightening stroke algorithm based on empirical data has been set up. Finally, an experiment has been designed to verify the straightening process control model.

Keywords: straightness, straightening stroke, deflection, shaft parts

Procedia PDF Downloads 305
273 A Model for Optimizing Inventory Replenishment and Shelf Space Management in Retail Industries

Authors: Nermine A. Harraz, Aliaa Abouali

Abstract:

The retail stores put up for sale multiple items while the spaces in the backroom and display areas constitute a scarce resource. Availability, volume, and location of the product displayed in the showroom influence the customer’s demand. Managing these operations individually will result in sub-optimal overall retail store’s profit; therefore, a non-linear integer programming model (NLIP) is developed to determine the inventory replenishment and shelf space allocation decisions that together maximize the retailer’s profit under shelf space and backroom storage constraints taking into consideration that the demand rate is positively dependent on the amount and location of items displayed in the showroom. The developed model is solved using LINGO® software. The NLIP model is implemented in a real world case study in a large retail outlet providing a large variety of products. The proposed model is validated and shows logical results when using the experimental data collected from the market.

Keywords: retailing management, inventory replenishment, shelf space allocation, showroom, backroom

Procedia PDF Downloads 330
272 Cross Project Software Fault Prediction at Design Phase

Authors: Pradeep Singh, Shrish Verma

Abstract:

Software fault prediction models are created by using the source code, processed metrics from the same or previous version of code and related fault data. Some company do not store and keep track of all artifacts which are required for software fault prediction. To construct fault prediction model for such company, the training data from the other projects can be one potential solution. The earlier we predict the fault the less cost it requires to correct. The training data consists of metrics data and related fault data at function/module level. This paper investigates fault predictions at early stage using the cross-project data focusing on the design metrics. In this study, empirical analysis is carried out to validate design metrics for cross project fault prediction. The machine learning techniques used for evaluation is Naïve Bayes. The design phase metrics of other projects can be used as initial guideline for the projects where no previous fault data is available. We analyze seven data sets from NASA Metrics Data Program which offer design as well as code metrics. Overall, the results of cross project is comparable to the within company data learning.

Keywords: software metrics, fault prediction, cross project, within project.

Procedia PDF Downloads 315
271 Application of Knowledge Discovery in Database Techniques in Cost Overruns of Construction Projects

Authors: Mai Ghazal, Ahmed Hammad

Abstract:

Cost overruns in construction projects are considered as worldwide challenges since the cost performance is one of the main measures of success along with schedule performance. To overcome this problem, studies were conducted to investigate the cost overruns' factors, also projects' historical data were analyzed to extract new and useful knowledge from it. This research is studying and analyzing the effect of some factors causing cost overruns using the historical data from completed construction projects. Then, using these factors to estimate the probability of cost overrun occurrence and predict its percentage for future projects. First, an intensive literature review was done to study all the factors that cause cost overrun in construction projects, then another review was done for previous researcher papers about mining process in dealing with cost overruns. Second, a proposed data warehouse was structured which can be used by organizations to store their future data in a well-organized way so it can be easily analyzed later. Third twelve quantitative factors which their data are frequently available at construction projects were selected to be the analyzed factors and suggested predictors for the proposed model.

Keywords: construction management, construction projects, cost overrun, cost performance, data mining, data warehousing, knowledge discovery, knowledge management

Procedia PDF Downloads 340
270 Argument Representation in Non-Spatial Motion Bahasa Melayu Based Conceptual Structure Theory

Authors: Nurul Jamilah Binti Rosly

Abstract:

The typology of motion must be understood as a change from one location to another. But from a conceptual point of view, motion can also occur in non-spatial contexts associated with human and social factors. Therefore, from the conceptual point of view, the concept of non-spatial motion involves the movement of time, ownership, identity, state, and existence. Accordingly, this study will focus on the lexical as shared, accept, be, store, and exist as the study material. The data in this study were extracted from the Database of Languages and Literature Corpus Database, Malaysia, which was analyzed using semantics and syntax concepts using Conceptual Structure Theory - Ray Jackendoff (2002). Semantic representations are represented in the form of conceptual structures in argument functions that include functions [events], [situations], [objects], [paths] and [places]. The findings show that the mapping of these arguments comprises three main stages, namely mapping the argument structure, mapping the tree, and mapping the role of thematic items. Accordingly, this study will show the representation of non- spatial Malay language areas.

Keywords: arguments, concepts, constituencies, events, situations, thematics

Procedia PDF Downloads 110
269 Development of Web Application for Warehouse Management System: A Case Study of Ceramics Factory

Authors: Thanaphat Suwanaklang, Supaporn Suwannarongsri

Abstract:

Presently, there are many industries in Thailand producing various products for both domestic distribution and export to foreign countries. Warehouse is one of the most important areas of business needing to store their products. Such businesses need to have a suitable warehouse management system for reducing the storage time and using the space as much as possible. This paper proposes the development of a web application for a warehouse management system. One of the ceramics factories in Thailand is conducted as a case study. By applying the ABC analysis, fixed location, commodity system, ECRS, and 7-waste theories and principles, the web application for the warehouse management system of the selected ceramics factory is developed to design the optimal storage area for groups of products and design the optimal routes of forklifts. From experimental results, it was found that the warehouse management system developed via the web application can reduce the travel distance of forklifts and the time of searching for storage area by 100% once compared with the conventional method. In addition, the entire storage area can be on-line and real-time monitored.

Keywords: warehouse management system, warehouse design method, logistics system, web application

Procedia PDF Downloads 109
268 Integrating ICT in Teaching and Learning English in the Algerian Classroom

Authors: A. Tahar Djebbar

Abstract:

Modern technologies have penetrated all spheres of human life, education being one of them. This paper focuses the attention on the integration of technology-based education in the Algerian classroom in teaching foreign languages. It sheds light on a specific area of ICT application: ICT in English learning and teaching. Some Algerian teachers or tutors of English face many challenges among which the lack of teaching materials which are indispensable for transmitting knowledge to learners. Thus, they find themselves compelled to use online e-books or download them in PDF form to support their lessons. Teachers even download such teaching materials like pictures, videos, audios, podcasts, and flash cards from the internet and store them in their Flash USBs to shape up the teaching-learning conditions. They use computers, data shows, and the internet so as to facilitate the teaching–learning process in the classroom. Hence, technology has become a must in the Algerian classroom especially in teaching English which has become a very important language in a national and an international level. This study aims at showing that Algerian tutors/teachers who take up the challenge of getting involved in the technology-enhanced language learning and teaching in the Algerian schools and universities face many obstacles.

Keywords: computer, communication, English, internet, learners, language acquisition, teaching, technology

Procedia PDF Downloads 605
267 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 113
266 Machine Learning Data Architecture

Authors: Neerav Kumar, Naumaan Nayyar, Sharath Kashyap

Abstract:

Most companies see an increase in the adoption of machine learning (ML) applications across internal and external-facing use cases. ML applications vend output either in batch or real-time patterns. A complete batch ML pipeline architecture comprises data sourcing, feature engineering, model training, model deployment, model output vending into a data store for downstream application. Due to unclear role expectations, we have observed that scientists specializing in building and optimizing models are investing significant efforts into building the other components of the architecture, which we do not believe is the best use of scientists’ bandwidth. We propose a system architecture created using AWS services that bring industry best practices to managing the workflow and simplifies the process of model deployment and end-to-end data integration for an ML application. This narrows down the scope of scientists’ work to model building and refinement while specialized data engineers take over the deployment, pipeline orchestration, data quality, data permission system, etc. The pipeline infrastructure is built and deployed as code (using terraform, cdk, cloudformation, etc.) which makes it easy to replicate and/or extend the architecture to other models that are used in an organization.

Keywords: data pipeline, machine learning, AWS, architecture, batch machine learning

Procedia PDF Downloads 35
265 The Factors Influencing Consumer Behavior of Beverage in Retail Stores Chiang Mai Province

Authors: Winita Kitisak, Boontarika Panyomoon, Siriyakorn Nilpoun, Nithit Yosit, Peeraya Somsak

Abstract:

The purpose of this study will affect the marketing mix that influences the consumers’ behavior towards beverage purchasing from retail stores. It aims to study the consumers and to better understand their behaviors and factors influencing their decision making on buying beverage in retail stores. We study the example of 400 consumers in Chiang Mai. The study shows that most of the respondents were male, 50 percent is 20-30 year old, and 36.66 percent is 31-40 year old, only 2.66 percent is upper 50 years old, bachelor’s degree holders, working in business field and student with 10,001-15,000 Baht income. Most buyers spend 4-6 times a week buying cheap beverage from retail stores. The consumer bought alcoholic beverages, green tea drinks, and soft drinks, but the mainly purchased product was beer. The results indicate that the brand of the product motivates more on consumers’ demand. While shelf displays, products presentation, and sales promotion affect the most on the consumers’ decision to purchase from the retail stores, the promotions moderately impact the consumers’ decision on purchasing from retail stores.

Keywords: consumer behavior, beverage, retail stores, convenience store

Procedia PDF Downloads 200
264 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 229
263 An Analysis of Non-Elliptic Curve Based Primality Tests

Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li

Abstract:

Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.

Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test

Procedia PDF Downloads 59
262 Formula Student Car: Design, Analysis and Lap Time Simulation

Authors: Rachit Ahuja, Ayush Chugh

Abstract:

Aerodynamic forces and moments, as well as tire-road forces largely affects the maneuverability of the vehicle. Car manufacturers are largely fascinated and influenced by various aerodynamic improvements made in formula cars. There is constant effort of applying these aerodynamic improvements in road vehicles. In motor racing, the key differentiating factor in a high performance car is its ability to maintain highest possible acceleration in appropriate direction. One of the main areas of concern in motor racing is balance of aerodynamic forces and stream line the flow of air across the body of the vehicle. At present, formula racing cars are regulated by stringent FIA norms, there are constrains for dimensions of the vehicle, engine capacity etc. So one of the fields in which there is a large scope of improvement is aerodynamics of the vehicle. In this project work, an attempt has been made to design a formula- student (FS) car, improve its aerodynamic characteristics through steady state CFD simulations and simultaneously calculate its lap time. Initially, a CAD model of a formula student car is made using SOLIDWORKS as per the given dimensions and a steady-state external air-flow simulation is performed on the baseline model of the formula student car without any add on device to evaluate and analyze the air-flow pattern around the car and aerodynamic forces using FLUENT Solver. A detailed survey on different add-on devices used in racing application like: - front wing, diffuser, shark pin, T- wing etc. is made and geometric model of these add-on devices are created. These add-on devices are assembled with the baseline model. Steady state CFD simulations are done on the modified car to evaluate the aerodynamic effects of these add-on devices on the car. Later comparison of lap time simulation of the formula student car with and without the add-on devices is done with the help of MATLAB. Aerodynamic performances like: - lift, drag and their coefficients are evaluated for different configuration and design of the add-on devices at different speed of the vehicle. From parametric CFD simulations on formula student car attached with add-on devices, there is a considerable amount of drag and lift force reduction besides streamlining the airflow across the car. The best possible configuration of these add-on devices is obtained from these CFD simulations and also use of these add-on devices have shown an improvement in performance of the car which can be compared by various lap time simulations of the car.

Keywords: aerodynamic performance, front wing, laptime simulation, t-wing

Procedia PDF Downloads 179
261 Development of Non-frozen Vegan Burger Patty Using Tender Jackfruit (Artocarpus Heterophyllus) as a Meat Substitute: Evaluation of Textural, Physico-Chemical, and Sensory Characteristics

Authors: O. D. A. N. Perera, H. G. Wanigasinghe

Abstract:

Tender jackfruit is an underutilized biomass, which still has a good consumer demand. Valorization of this ingredient into meat analog would obtain greater consumer acceptance due to concerns about health, the environment, and living sustainably of mankind have increased significantly in this decade, opening the market for meat substitutes. The objective of this research was to create a plant-based meat substitute with a structure similar to meat products. In this study, three different combinations of tender jackfruit were used to create vegan burger patties, which were then examined for their textural, physico-chemical, and sensory qualities. The developed burger patties have been compared with store-bought chicken patties. The developed vegan burger patties P1, P2, and P3 had a comparable flavor preference to the control and demonstrated considerable general acceptability (p >.05). P3 has a high quantity of protein (17.10 ± 0.02%) and fiber (6.40 ± 0.06%). At the same time, the vegan burger patty resulted in less fat, high fiber, and high protein which meets the vegan consumer requirements.

Keywords: underutilized, high fibre, soya protein isolate, cooking yield

Procedia PDF Downloads 40
260 Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model

Authors: Yangrae Cho, Jinseok Kim, Yongtae Park

Abstract:

Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets.

Keywords: mobile app service, usage pattern, Hidden Markov Model, pattern detection

Procedia PDF Downloads 308
259 Radio Frequency Identification System and Its Effect on Retailing Sector

Authors: Ayşe Çoban, Orhan Çoban, Murat Birekul

Abstract:

In this study, the effects of radio frequency identification system on the retailing sector were theoretically analysed. The technology of Radio Frequency Identification (RFID) is a method enabling to identify the objects individually and automatically, using radio frequency. RFID generally consists of a tag and reader. RFID tags can be programmed to receive, store, and send the information of object such as Electronic Product Code (EPC). Having read the tags placed on product by the reader, the information associated with the management of supply chain can be automatically recorded and replaced. Recently, RFID technology used in many areas has particularly important effects on the businesses that are active in the retailing sector. The most important disadvantage of this technology is that the cost of installation and operation is higher compared to its alternatives. However, it provides important advantages to the business enterprises in the application process. At present, it is especially adopted by the large sized enterprises and with chain stores in the international areas. The application results point out that RFID technology provides business enterprises with the important competitive advantage.

Keywords: RFID, retailing sector, RFID technologies, electronic product code

Procedia PDF Downloads 363
258 A New Complex Method for Integrated Warehouse Design in Aspect of Dynamic and Static Capacity

Authors: Tamas Hartvanyi, Zoltan Andras Nagy, Miklos Szabo

Abstract:

The dynamic and static capacity are two opposing aspect of warehouse design. Static capacity optimization aims to maximize the space-usage for goods storing, while dynamic capacity needs more free place to handling them. They are opposing by the building structure and the area utilization. According to Pareto principle: the 80% of the goods are the 20% of the variety. From the origin of this statement, it worth to store the big amount of same products by fulfill the space with minimal corridors, meanwhile the rest 20% of goods have the 80% variety of the whole range, so there is more important to be fast-reachable instead of the space utilizing, what makes the space fulfillment numbers worse. The warehouse design decisions made in present practice by intuitive and empiric impressions, the planning method is formed to one selected technology, making this way the structure of the warehouse homogeny. Of course the result can’t be optimal for the inhomogeneous demands. A new innovative model based on our research will be introduced in this paper to describe the technic capacities, what makes possible to define optimal cluster of technology. It is able to optimize the space fulfillment and the dynamic operation together with this cluster application.

Keywords: warehouse, warehouse capacity, warehouse design method, warehouse optimization

Procedia PDF Downloads 108
257 Hydraulic Performance of Urban Drainage System Using SWMM: A Case Study of Siti Khadijah Retention Pond in Palembang City

Authors: Muhammad B. Al Amin, Nyimas S. Rika, Dwi F. Yanto, Marcelina

Abstract:

Siti Khadijah retention pond is located beside of Siti Khadijah Islamic Hospital on Demang Lebar Daun Street in Palembang City. This retention pond is functioned as storage for runoff from drainage channels in the surrounding area before entering Sekanak River, which is one of Musi River tributaries. However, in recent years, the developments in the surrounding area into paved area trigger to increase runoff discharge that causes the pond can no longer store it adequately. This study aimed to investigate the hydraulic performance of drainage system in the area around Siti Khadijah retention pond. A SWMM model was used to simulate runoff discharge into the pond and out from the pond, so the water level fluctuation within the pond and its capacity could be determined. Besides that, the water depth within drainage channels was simulated as well. The results showed that capacity of retention pond and some drainage channels already inadequate, so the area around it potentially to be flooded. Thus, it is necessary to increase the capacity of the retention pond and drainage channels.

Keywords: flood, retention pond, SWMM, urban drainage system

Procedia PDF Downloads 420
256 Evolution of Rock-Cut Caves of Dhamnar at Dhamnar, MP

Authors: Abhishek Ranka

Abstract:

Rock-cut Architecture is a manifestation of human endurance in constructing magnificent structures by sculpting and cutting entire hills. Cave Architecture in India form an important part of rock-cut development and is among the most prolific examples of rock-cut architecture in the world. There are more than 1500 rock-cut caves in various regions of India. Among them mostly are located in western India, more particularly in the state of Maharashtra. Some of the rock-cut caves are located in the central region of India, which is presently known as Malawa (Madhya Pradesh). The region is dominated by the vidhyachal hill ranges toward the west, dotted with the coarse laterite rock. Dhamnar Caves have been excavated in the central region of Mandsaur Dist. With a combination of shared sacred faiths. The earliest rock-cut activity began in the north, in Bihar, where caves were excavated in the Barabar and the Nagarjuni hills during the Mauryan period (3rd century BCE). The rock-cut activity then shifts to the central part of India in Madhya Pradesh, where the caves at Dhamnar, Bagh, Udayagiri, Poldungar, etc. excavated between 3rdto 9ᵗʰ CE. The rock-cut excavation continued to flourish in Madhya Pradesh till 10ᵗʰ century CE, simultaneously with monolithic Hindu temples. Dhamnar caves fall into four architectural typologies: the Lena caves, Chaitya caves, Viharas & Lena-Chaityagriha caves. The Buddhist rock-cutting activity in central India is divisible into two phases. In the first phase (2ndBCE-3rd CE), the Buddha image is conspicuously absent. After a lapse of about three centuries, activity begins again, and the Buddha images this time are carved. The former group belongs to the Hinayana (Lesser Vehicle) phase and the latter to the Mahayana (Greater Vehicle). Dhamnar caves has an elaborate facades, pillar capitals, and many more creative sculptures in various postures. These caves were excavated against the background of invigorating trade activities and varied socio-religious or Socio Cultural contexts. These caves also highlights the wealthy and varied patronage provided by the dynasties of the past. This paper speaks about the appraisal of the rock cut mechanisms, design strategies, and approaches while promoting a scope for further research in conservation practices. Rock-cut sites, with their physical setting and various functional spaces as a sustainable habitat for centuries, has a heritage footprint with a researchquotient.

Keywords: rock-cut architecture, buddhism, hinduism, Iconography, and architectural typologies, Jainism

Procedia PDF Downloads 119