Search results for: Geographic information systems (GIS)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18695

Search results for: Geographic information systems (GIS)

15965 Modeling and Control Design of a Centralized Adaptive Cruise Control System

Authors: Markus Mazzola, Gunther Schaaf

Abstract:

A vehicle driving with an Adaptive Cruise Control System (ACC) is usually controlled decentrally, based on the information of radar systems and in some publications based on C2X-Communication (CACC) to guarantee stable platoons. In this paper, we present a Model Predictive Control (MPC) design of a centralized, server-based ACC-System, whereby the vehicular platoon is modeled and controlled as a whole. It is then proven that the proposed MPC design guarantees asymptotic stability and hence string stability of the platoon. The Networked MPC design is chosen to be able to integrate system constraints optimally as well as to reduce the effects of communication delay and packet loss. The performance of the proposed controller is then simulated and analyzed in an LTE communication scenario using the LTE/EPC Network Simulator LENA, which is based on the ns-3 network simulator.

Keywords: adaptive cruise control, centralized server, networked model predictive control, string stability

Procedia PDF Downloads 516
15964 Adsorptive Waste Heat Based Air-Conditioning Control Strategy for Automotives

Authors: Indrasen Raghupatruni, Michael Glora, Ralf Diekmann, Thomas Demmer

Abstract:

As the trend in automotive technology is fast moving towards hybridization and electrification to curb emissions as well as to improve the fuel efficiency, air-conditioning systems in passenger cars have not caught up with this trend and still remain as the major energy consumers amongst others. Adsorption based air-conditioning systems, e.g. with silica-gel water pair, which are already in use for residential and commercial applications, are now being considered as a technology leap once proven feasible for the passenger cars. In this paper we discuss a methodology, challenges and feasibility of implementing an adsorption based air-conditioning system in a passenger car utilizing the exhaust waste heat. We also propose an optimized control strategy with interfaces to the engine control unit of the vehicle for operating this system with reasonable efficiency supported by our simulation and validation results in a prototype vehicle, additionally comparing to existing implementations, simulation based as well as experimental. Finally we discuss the influence of start-stop and hybrid systems on the operation strategy of the adsorption air-conditioning system.

Keywords: adsorption air-conditioning, feasibility study, optimized control strategy, prototype vehicle

Procedia PDF Downloads 436
15963 Technological Advancements and Innovation: The Drivers of International Aviation

Authors: Sundaram Nataraja

Abstract:

As time passes, humanity will innovate and design new technology in pursuit of making various tasks easier. Whether it is something simple as making an item to socialize easier with others or to be the first to get to a meteor and mine its precious ore, humans will continue to create new ways to achieve their dreams. One industry where it is a requirement to be better, to be more efficient, to be more affordable, and to be safer is the aviation industry. While the aviation industry is struggling to keep pace with the invention of new technology, it must do so to continuously improve comfort, efficiency, and safety. There are advancements in technology and innovation that impact international aviation and that will become more prevalent in the future. Some of such advancements and innovative practices are discussed in this paper and they are as follows: (1) artificial intelligence, (2) autonomous aircraft, (3) glass cockpit, (4) jet engines capable of using kerosene-based jet fuel, (5) electric propulsion, (6) advanced materials, (7) digital twin technology, (8) fly-by-wire flight controls, (9) augmented reality, (10) virtual reality, (11) internet of things connectivity, (12) data analytics and machine leaning, (13) biometrics, and (14) sustainable aviation. The research has used online research methods including social network analysis and web scraping for extracting data and information from websites automatically to analyze large amounts of information. The major findings of the study indicate that technological advancements in aviation are significantly impacting global air travel by improving safety, fuel efficiency, operational efficiency, passenger experience, and sustainability through innovations like advanced aircraft designs, sophisticated autopilot systems, improved navigation tools, data analytics, AI-powered decision making, and the development of electric and hybrid-electric aircraft, all aimed at reducing environmental impact and optimizing flight operations across the globe.

Keywords: advances in technology, artificial intelligence, innovation, sustainable aviation

Procedia PDF Downloads 0
15962 Understanding the Dynamics of Linker Histone Using Mathematical Modeling and FRAP Experiments

Authors: G. Carrero, C. Contreras, M. J. Hendzel

Abstract:

Linker histones or histones H1 are highly mobile nuclear proteins that regulate the organization of chromatin and limit DNA accessibility by binding to the chromatin structure (DNA and associated proteins). It is known that this binding process is driven by both slow (strong binding) and rapid (weak binding) interactions. However, the exact binding mechanism has not been fully described. Moreover, the existing models only account for one type of bound population that does not distinguish explicitly between the weakly and strongly bound proteins. Thus, we propose different systems of reaction-diffusion equations to describe explicitly the rapid and slow interactions during a FRAP (Fluorescence Recovery After Photobleaching) experiment. We perform a model comparison analysis to characterize the binding mechanism of histone H1 and provide new meaningful biophysical information on the kinetics of histone H1.

Keywords: FRAP (Fluorescence Recovery After Photobleaching), histone H1, histone H1 binding kinetics, linker histone, reaction-diffusion equation

Procedia PDF Downloads 443
15961 The Relationship of Building Information Modeling (BIM) Capability in Quantity Surveying Practice and Project Performance

Authors: P. F. Wong, H. Salleh, F. A. Rahim

Abstract:

The adoption of building information modeling (BIM) is increasing in the construction industry. However, quantity surveyors are slow in adoption compared to other professions due to lack of awareness of the BIM’s potential in their profession. It is still unclear on how BIM application can enhance quantity surveyors’ work performance and project performance. The aim of this research is to identify the capabilities of BIM in quantity surveying practices and examine the relationship between BIM capabilities and project performance. Questionnaire survey and interviews were adopted for data collection. Literature reviews identified there are eleven BIM capabilities in quantity surveying practice. Questionnaire results showed that there are several BIM capabilities significantly correlated with project performance in time, cost and quality aspects and the results were validated through interviews. These findings show that BIM has the capabilities to enhance quantity surveyors’ performances and subsequently improved project performance.

Keywords: Building Information Modeling (BIM), quantity surveyors, capability, project performance

Procedia PDF Downloads 370
15960 Heat Transfer Enhancement Using Aluminium Oxide Nanofluid: Effect of the Base Fluid

Authors: M. Amoura, M. Benmoussa, N. Zeraibi

Abstract:

The flow and heat transfer is an important phenomenon in engineering systems due to its wide application in electronic cooling, heat exchangers, double pane windows etc.. The enhancement of heat transfer in these systems is an essential topic from an energy saving perspective. Lower heat transfer performance when conventional fluids, such as water, engine oil and ethylene glycol are used hinders improvements in performance and causes a consequent reduction in the size of such systems. The use of solid particles as an additive suspended into the base fluid is a technique for heat transfer enhancement. Therefore, the heat transfer enhancement in a horizontal circular tube that is maintained at a constant temperature under laminar regime has been investigated numerically. A computational code applied to the problem by use of the finite volume method was developed. Nanofluid was made by dispersion of Al2O3 nanoparticles in pure water and ethylene glycol. Results illustrate that the suspended nanoparticles increase the heat transfer with an increase in the nanoparticles volume fraction and for a considered range of Reynolds numbers. On the other hand, the heat transfer is very sensitive to the base fluid.

Keywords: Al2O3 nanoparticles, circular tube, heat transfert enhancement, numerical simulation

Procedia PDF Downloads 325
15959 A Review of the Drawbacks of Current Fixed Connection Façade Systems, Non-Structural Standards, and Ways of Integrating Movable Façade Technology into Buildings

Authors: P. Abtahi, B. Samali

Abstract:

Façade panels of various shapes, weights, and connections usually act as a barrier between the indoor and outdoor environments. They also play a major role in enhancing the aesthetics of building structures. They are attached by different types of connections to the primary structure or inner panels in double skin façade skins. Structural buildings designed to withstand seismic shocks have been undergoing a critical appraisal in recent years, with the emphasis changing from ‘strength’ to ‘performance’. Performance based design and analysis have found their way into research, development, and practice of earthquake engineering, particularly after the 1994 Northridge and 1995 Kobe earthquakes. The design performance of facades as non-structural elements has now focused mainly on evaluating the damage sustained by façade frames with fixed connections, not movable ones. This paper will review current design standards for structural buildings, including the performance of structural and non-structural components during earthquake excitations in order to overview and evaluate the damage assessment and behaviour of various façade systems in building structures during seismic activities. The proposed solutions for each facade system will be discussed case by case to evaluate their potential for incorporation with newly designed connections. Finally, Double-Skin-Facade systems can potentially be combined with movable facade technology, although other glazing systems would require minor to major changes in their design before being integrated into the system.

Keywords: building performance, earthquake engineering, glazing system, movable façade technology

Procedia PDF Downloads 550
15958 Bridging the Gap between Different Interfaces for Business Process Modeling

Authors: Katalina Grigorova, Kaloyan Mironov

Abstract:

The paper focuses on the benefits of business process modeling. Although this discipline is developing for many years, there is still necessity of creating new opportunities to meet the ever-increasing users’ needs. Because one of these needs is related to the conversion of business process models from one standard to another, the authors have developed a converter between BPMN and EPC standards using workflow patterns as intermediate tool. Nowadays there are too many systems for business process modeling. The variety of output formats is almost the same as the systems themselves. This diversity additionally hampers the conversion of the models. The presented study is aimed at discussing problems due to differences in the output formats of various modeling environments.

Keywords: business process modeling, business process modeling standards, workflow patterns, converting models

Procedia PDF Downloads 589
15957 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 297
15956 Designing a Model for Preparing Reports on the Automatic Earned Value Management Progress by the Integration of Primavera P6, SQL Database, and Power BI: A Case Study of a Six-Storey Concrete Building in Mashhad, Iran

Authors: Hamed Zolfaghari, Mojtaba Kord

Abstract:

Project planners and controllers are frequently faced with the challenge of inadequate software for the preparation of automatic project progress reports based on actual project information updates. They usually make dashboards in Microsoft Excel, which is local and not applicable online. Another shortcoming is that it is not linked to planning software such as Microsoft Project, which lacks the database required for data storage. This study aimed to propose a model for the preparation of reports on automatic online project progress based on actual project information updates by the integration of Primavera P6, SQL database, and Power BI for a construction project. The designed model could be applicable to project planners and controller agents by enabling them to prepare project reports automatically and immediately after updating the project schedule using actual information. To develop the model, the data were entered into P6, and the information was stored on the SQL database. The proposed model could prepare a wide range of reports, such as earned value management, HR reports, and financial, physical, and risk reports automatically on the Power BI application. Furthermore, the reports could be published and shared online.

Keywords: primavera P6, SQL, Power BI, EVM, integration management

Procedia PDF Downloads 110
15955 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 360
15954 RFID Based Student Attendance System

Authors: Aniket Tiwari, Ameya London

Abstract:

Web-based student attendance management system is required to assist the faculty and the lecturer for the time-consuming process. For this purpose, GSM/GPRS (Global System for Mobile Communication/General Packet Radio Service) based student’s attendance management system using RFID (Radio Frequency Identification) is a much convenient method to take the attendance. Student is provided with the RFID tags. When student comes near to the reader, it will sense the respective student and update attendance. The whole process is controlled using the microcontroller. The main advantage of this system is that it reduced the complexity comparison to student attendance system using RF technology. This system requires only one microcontroller for the operation, it is real time process. This paper reviews some of these monitoring systems and proposes a GPRS based student attendance system. The system can be easily accessed by the lecturers via the web and most importantly, the reports can be generated in real-time processing, thus, provides valuable information about the students’ commitments in attending the classes.

Keywords: RFID reader, RFID tags, student, attendance

Procedia PDF Downloads 512
15953 Improving Access and Quality of Patient Information Resources for Orthognathic Treatment: A Quality Improvement Project

Authors: Evelyn Marie Richmond, Andrew McBride, Chris Johnston, John Marley

Abstract:

Background: Good quality patient information resources for orthognathic treatment help to reinforce information delivered during the initial consultation and help patients make informed decisions about their care. The Consultant Orthodontists and a Dental Core Trainee noted limited patient engagement with the British Orthodontic Society (BOS) 'Your Jaw Surgery' online resources and that the existing BOS patient information leaflet (PIL) could be customised and developed to meet local requirements. Aim: The quality improvement project (QIP) aimed to improve patients' understanding of orthognathic treatment by ensuring at least 90% of patients had read the new in-house patient information leaflet (PIL) and a minimum of 50% of patients had accessed the British Orthodontic Society (BOS) 'Your Jaw Surgery' online resources before attending the joint orthognathic multidisciplinary clinic by June 2023. Methods: The QIP was undertaken in the orthodontic department of the School of Dentistry, Belfast. Data was collected prospectively during a 6-month period from January 2023 to June 2023 over 3 Plan, Do, Study, Act (PDSA) cycles. Suitable patients were identified at consultant orthodontic new patient clinics. Following initial consultation for orthognathic treatment, patients were contacted to complete a patient questionnaire. Design: The change ideas were a poster with a QR code directing patients to the BOS 'Your Jaw Surgery' website in consultation areas and a new in-house PIL with a QR code directing patients to the BOS 'Your Jaw Surgery' website. Results: In PDSA cycle 1, 86.7% of patients were verbally directed to the BOS 'Your Jaw Surgery' website, and 53.3% accessed the online resources after their initial consultation. Although 100% of patients reported reading the existing PIL, only 64.3% felt it discussed the risks of orthognathic treatment in sufficient detail. By PDSA cycle 3, 100% of patients reported being directed to the BOS 'Your Jaw Surgery' website, however, only 58.3% engaged with the website. 100% of patients who read the new PIL felt that it discussed the risks of orthognathic treatment in sufficient detail. Conclusion: The slight improvement in access to the BOS 'Your Jaw Surgery' website shows that patients do not necessarily choose to access information online despite its availability. The uptake of the new PIL was greater than reported patient engagement with the BOS 'Your Jaw Surgery' website, which indicates patients still value written information despite the availability of online resources.

Keywords: orthognathic surgery, patient information resources, quality improvement project, risks

Procedia PDF Downloads 63
15952 The Legal Framework for Solid Waste Disposal and Management in Kwara State, Nigeria

Authors: Alabi Odunayo Mayowa, Ajayi Oluwasola Felix

Abstract:

Solid waste such as “garbage” “trash” “refuse” “slug” and “rubbish” is disposed off or is required to be disposed off in accordance with national law. The study relies on primary and secondary sources of information. The primary sources include the Constitution, statutes and subsidiary legislation. The secondary sources of information include books, journals, conference proceedings, newspapers, magazines and internet materials. The information obtained from these sources is subjected to content and contextual analysis. The study examines the Kwara State Environmental Protection Agency Law, 1992 and other laws on waste disposal and management in Kwara State, Nigeria. The study also examines the regulations and the agency i.e. the Kwara State Environmental Protection Agency created by the law with a view to determine the inadequacies in the law.

Keywords: solid waste, waste disposal, waste management, domestic waste

Procedia PDF Downloads 483
15951 Simscape Library for Large-Signal Physical Network Modeling of Inertial Microelectromechanical Devices

Authors: S. Srinivasan, E. Cretu

Abstract:

The information flow (e.g. block-diagram or signal flow graph) paradigm for the design and simulation of Microelectromechanical (MEMS)-based systems allows to model MEMS devices using causal transfer functions easily, and interface them with electronic subsystems for fast system-level explorations of design alternatives and optimization. Nevertheless, the physical bi-directional coupling between different energy domains is not easily captured in causal signal flow modeling. Moreover, models of fundamental components acting as building blocks (e.g. gap-varying MEMS capacitor structures) depend not only on the component, but also on the specific excitation mode (e.g. voltage or charge-actuation). In contrast, the energy flow modeling paradigm in terms of generalized across-through variables offers an acausal perspective, separating clearly the physical model from the boundary conditions. This promotes reusability and the use of primitive physical models for assembling MEMS devices from primitive structures, based on the interconnection topology in generalized circuits. The physical modeling capabilities of Simscape have been used in the present work in order to develop a MEMS library containing parameterized fundamental building blocks (area and gap-varying MEMS capacitors, nonlinear springs, displacement stoppers, etc.) for the design, simulation and optimization of MEMS inertial sensors. The models capture both the nonlinear electromechanical interactions and geometrical nonlinearities and can be used for both small and large signal analyses, including the numerical computation of pull-in voltages (stability loss). Simscape behavioral modeling language was used for the implementation of reduced-order macro models, that present the advantage of a seamless interface with Simulink blocks, for creating hybrid information/energy flow system models. Test bench simulations of the library models compare favorably with both analytical results and with more in-depth finite element simulations performed in ANSYS. Separate MEMS-electronic integration tests were done on closed-loop MEMS accelerometers, where Simscape was used for modeling the MEMS device and Simulink for the electronic subsystem.

Keywords: across-through variables, electromechanical coupling, energy flow, information flow, Matlab/Simulink, MEMS, nonlinear, pull-in instability, reduced order macro models, Simscape

Procedia PDF Downloads 139
15950 Barriers and Challenges to a Healthy Lifestyle for Postpartum Women and the Possibilities in an Information Technology-Based Intervention: A Qualitative Study

Authors: Pernille K. Christiansen, Mette Maria Skjøth, Line Lorenzen, Eva Draborg, Christina Anne Vinter, Trine Kjær, Mette Juel Rothmann

Abstract:

Background and aims: Overweight and obesity are an increasing challenge on a global level. In Denmark, more than one-third of all pregnant women are overweight or obese, and many women exceed the gestational weight gain recommendations from the Institute of Medicine. Being overweight or obese, is associated with a higher risk of adverse maternal and fetal outcomes, including gestational diabetes and childhood obesity. Thus, it is important to focus on the women’s lifestyles between their pregnancies to lower the risk of gestational weight retention in the long run. The objective of this study was to explorer what barriers and challenges postpartum women experience with respect to healthy lifestyles during the postpartum period and to access whether an Information Technology based intervention might be a supportive tool to assist and motivate postpartum women to a healthy lifestyle. Materials and methods: The method is inspired by participatory design. A systematic text condensation was applied to semi-structured focus groups. Five focus group interviews were carried out with a total of 17 postpartum women and two interviews with a total of six health professionals. Participants were recruited through the municipality in Svendborg, Denmark, and at Odense University Hospital in Odense, Denmark, during a four-month period in early 2018. Results: From the women’s perspective, better assistance is needed from the health professionals to obtain or maintain a healthy lifestyle. The women need tools that inform and help them understand and prioritise their own health-related risks, and to motivate them to plan and take care of their own health. As the women use Information Technology on a daily basis, the solution could be delivered through Information Technology. Finally, there is room for engaging the partner more in the communication related to the baby and family’s lifestyle. Conclusion: Postpartum women need tools that inform and motivate a healthy lifestyle postpartum. The tools should allow access to high-quality information from health care professionals, when the information is needed, and also allow engagement from the partner. Finally, Information Technology is a potential tool for delivering tools.

Keywords: information technology, lifestyle, overweight, postpartum

Procedia PDF Downloads 148
15949 Recognition of Objects in a Maritime Environment Using a Combination of Pre- and Post-Processing of the Polynomial Fit Method

Authors: R. R. Hordijk, O. J. G. Somsen

Abstract:

Traditionally, radar systems are the eyes and ears of a ship. However, these systems have their drawbacks and nowadays they are extended with systems that work with video and photos. Processing of data from these videos and photos is however very labour-intensive and efforts are being made to automate this process. A major problem when trying to recognize objects in water is that the 'background' is not homogeneous so that traditional image recognition technics do not work well. Main question is, can a method be developed which automate this recognition process. There are a large number of parameters involved to facilitate the identification of objects on such images. One is varying the resolution. In this research, the resolution of some images has been reduced to the extreme value of 1% of the original to reduce clutter before the polynomial fit (pre-processing). It turned out that the searched object was clearly recognizable as its grey value was well above the average. Another approach is to take two images of the same scene shortly after each other and compare the result. Because the water (waves) fluctuates much faster than an object floating in the water one can expect that the object is the only stable item in the two images. Both these methods (pre-processing and comparing two images of the same scene) delivered useful results. Though it is too early to conclude that with these methods all image problems can be solved they are certainly worthwhile for further research.

Keywords: image processing, image recognition, polynomial fit, water

Procedia PDF Downloads 536
15948 Improving Part-Time Instructors’ Academic Outcomes with Gamification

Authors: Jared R. Chapman

Abstract:

This study introduces a type of motivational information system called an educational engagement information system (EEIS). An EEIS draws on principles of behavioral economics, motivation theory, and learning cognition theory to design information systems that help students want to improve their performance. This study compares academic outcomes for course sections taught by part- and full-time instructors both with and without an EEIS. Without an EEIS, students in the part-time instructor's course sections demonstrated significantly higher failure rates (a 143.8% increase) and dropout rates (a 110.4% increase) with significantly fewer students scoring a B- or higher (39.8% decrease) when compared to students in the course sections taught by a full-time instructor. It is concerning that students in the part-time instructor’s course without an EEIS had significantly lower academic outcomes, suggesting less understanding of the course content. This could impact retention and continuation in a major. With an EEIS, when comparing part- and full-time instructors, there was no significant difference in failure and dropout rates or in the number of students scoring a B- or higher in the course. In fact, with an EEIS, the failure and dropout rates were statistically identical for part- and full-time instructor courses. When using an EEIS (compared with not using an EEIS), the part-time instructor showed a 62.1% decrease in failures, a 61.4% decrease in dropouts, and a 41.7% increase in the number of students scoring a B- or higher in the course. We are unaware of other interventions that yield such large improvements in academic performance. This suggests that using an EEIS such as Delphinium may compensate for part-time instructors’ limitations of expertise, time, or rewards that can have a negative impact on students’ academic outcomes. The EEIS had only a minimal impact on failure rates (7.7% decrease) and dropout rates (18.8% decrease) for the full-time instructor. This suggests there is a ceiling effect for the improvements that an EEIS can make in student performance. This may be because experienced instructors are already doing the kinds of things that an EEIS does, such as motivating students, tracking grades, and providing feedback about progress. Additionally, full-time instructors have more time to dedicate to students outside of class than part-time instructors and more rewards for doing so. Using adjunct and other types of part-time instructors will likely remain a prevalent practice in higher education management courses. Given that using part-time instructors can have a negative impact on student graduation and persistence in a field of study, it is important to identify ways we can augment part-time instructors’ performance. We demonstrated that when part-time instructors use an EEIS, it can result in significantly lower students’ failure and dropout rates and an increase in the rate of students earning a B- or above; and bring their students’ performance to parity with the performance of students taught by a full-time instructor.

Keywords: gamification, engagement, motivation, academic outcomes

Procedia PDF Downloads 71
15947 Implementation of Enterprise Asset Management (E-AM) System at Oman Electricity Transmission Company

Authors: Omran Al Balushi, Haitham Al Rawahi

Abstract:

Enterprise Asset Management (eAM) has been implemented across different Generation, Transmission and Distribution subsidiaries in Nama Group companies. As part of Nama group, Oman Electricity Transmission Company (OETC) was the first company to implement this system. It was very important for OETC to implement and maintain such a system to achieve its business objectives and for effective operations, which will also support the delivery of the asset management strategy. Enterprise Asset Management (eAM) addresses the comprehensive asset maintenance requirements of Oman Electricity Transmission Company (OETC). OETC needs to optimize capacity and increase utilization, while lowering unit production. E-AM will enable OETC to adopt this strategy. Implementation of e-AM has improved operation performance with preventive and scheduled maintenance as well as it increased safety. Implementation of e-AM will also enable OETC to create optimal asset management strategy which will increase revenue and decrease cost by effectively monitoring operational data such as maintenance history and operation conditions. CMMS (Computerised Maintenance Management System) is the main software and the back-bone of e-AM system. It is used to provide an improved working practice to properly establish information and data flow related to maintenance activities. Implementation of e-AM system was one of the factors that supported OETC to achieve ISO55001 Certificate on fourth quarter of 2016. Also, full implementation of e-AM system will result in strong integration between CMMS and Geographical Information Systems (GIS) application and it will improve OETC to build a reliable maintenance strategy for all asset classes in its Transmission network. In this paper we will share our experience and knowledge of implementing such a system and how it supported OETC’s management to make decisions. Also we would highlight the challenges and difficulties that we encountered during the implementation of e-AM. Also, we will list some features and advantages of e-AM in asset management, preventive maintenance and maintenance cost management.

Keywords: CMMS, Maintenance Management, Asset Management, Maintenance Strategy

Procedia PDF Downloads 148
15946 Two-Sided Information Dissemination in Takeovers: Disclosure and Media

Authors: Eda Orhun

Abstract:

Purpose: This paper analyzes a target firm’s decision to voluntarily disclose information during a takeover event and the effect of such disclosures on the outcome of the takeover. Such voluntary disclosures especially in the form of earnings forecasts made around takeover events may affect shareholders’ decisions about the target firm’s value and in return takeover result. This study aims to shed light on this question. Design/methodology/approach: The paper tries to understand the role of voluntary disclosures by target firms during a takeover event in the likelihood of takeover success both theoretically and empirically. A game-theoretical model is set up to analyze the voluntary disclosure decision of a target firm to inform the shareholders about its real worth. The empirical implication of model is tested by employing binary outcome models where the disclosure variable is obtained by identifying the target firms in the sample that provide positive news by issuing increasing management earnings forecasts. Findings: The model predicts that a voluntary disclosure of positive information by the target decreases the likelihood that the takeover succeeds. The empirical analysis confirms this prediction by showing that positive earnings forecasts by target firms during takeover events increase the probability of takeover failure. Overall, it is shown that information dissemination through voluntary disclosures by target firms is an important factor affecting takeover outcomes. Originality/Value: This study is the first to the author's knowledge that studies the impact of voluntary disclosures by the target firm during a takeover event on the likelihood of takeover success. The results contribute to information economics, corporate finance and M&As literatures.

Keywords: takeovers, target firm, voluntary disclosures, earnings forecasts, takeover success

Procedia PDF Downloads 320
15945 Maternal-Fetal Bonding for African American Mothers

Authors: Tracey Estriplet-Adams

Abstract:

This paper focuses on the influence of maternal-fetal bonding by examining attachment theory, psycho-social-cultural influences/adaptations, and maternal well-being. A systematic review methodology was used to synthesize research results to summarize current evidence that can contribute to evidence-based practices. It explores the relationship between attachment styles, prenatal attachment, and perceptions of maternal-infant bonding/attachment six weeks postpartum. It also examines the protective factors of maternal-fetal attachment development. The research explores Bowlby's attachment theory and its relevance to maternal-fetal bonding with a Black Feminist Theory lens. Additionally, it discusses the impact of perceived stress, social support, and ecological models on maternal-fetal attachment. The relationship between maternal well-being, maternal-fetal attachment, and early postpartum bonding is reviewed. Moreover, the paper specifically addresses black mothers and maternal-fetal bonding, exploring the intersectionality of race, ethnicity, class, geographic location, cultural identities, and immigration status. It considers the role of familial and partner support, as well as the relationship between maternal attachment style and maternal-fetal bonding, within the framework of attachment theory and black feminist theory. Therefore, it is imperative to center Black women's voices in research, policy, and healthcare practices. Black women are experts in their own experiences and advocate for their autonomy in decision-making regarding maternal-fetal health. By amplifying their voices, we can ensure that interventions are grounded in their lived experiences.

Keywords: maternal-fetal bonding, infant well-being, maternal-infant attachment, black mothers

Procedia PDF Downloads 76
15944 A Context-Sensitive Algorithm for Media Similarity Search

Authors: Guang-Ho Cha

Abstract:

This paper presents a context-sensitive media similarity search algorithm. One of the central problems regarding media search is the semantic gap between the low-level features computed automatically from media data and the human interpretation of them. This is because the notion of similarity is usually based on high-level abstraction but the low-level features do not sometimes reflect the human perception. Many media search algorithms have used the Minkowski metric to measure similarity between image pairs. However those functions cannot adequately capture the aspects of the characteristics of the human visual system as well as the nonlinear relationships in contextual information given by images in a collection. Our search algorithm tackles this problem by employing a similarity measure and a ranking strategy that reflect the nonlinearity of human perception and contextual information in a dataset. Similarity search in an image database based on this contextual information shows encouraging experimental results.

Keywords: context-sensitive search, image search, similarity ranking, similarity search

Procedia PDF Downloads 367
15943 A Block World Problem Based Sudoku Solver

Authors: Luciana Abednego, Cecilia Nugraheni

Abstract:

There are many approaches proposed for solving Sudoku puzzles. One of them is by modelling the puzzles as block world problems. There have been three model for Sudoku solvers based on this approach. Each model expresses Sudoku solver as a parameterized multi agent systems. In this work, we propose a new model which is an improvement over the existing models. This paper presents the development of a Sudoku solver that implements all the proposed models. Some experiments have been conducted to determine the performance of each model.

Keywords: Sudoku puzzle, Sudoku solver, block world problem, parameterized multi agent systems

Procedia PDF Downloads 342
15942 Customer Focus in Digital Economy: Case of Russian Companies

Authors: Maria Evnevich

Abstract:

In modern conditions, in most markets, price competition is becoming less effective. On the one hand, there is a gradual decrease in the level of marginality in main traditional sectors of the economy, so further price reduction becomes too ‘expensive’ for the company. On the other hand, the effect of price reduction is leveled, and the reason for this phenomenon is likely to be informational. As a result, it turns out that even if the company reduces prices, making its products more accessible to the buyer, there is a high probability that this will not lead to increase in sales unless additional large-scale advertising and information campaigns are conducted. Similarly, a large-scale information and advertising campaign have a much greater effect itself than price reductions. At the same time, the cost of mass informing is growing every year, especially when using the main information channels. The article presents generalization, systematization and development of theoretical approaches and best practices in the field of customer focus approach to business management and in the field of relationship marketing in the modern digital economy. The research methodology is based on the synthesis and content-analysis of sociological and marketing research and on the study of the systems of working with consumer appeals and loyalty programs in the 50 largest client-oriented companies in Russia. Also, the analysis of internal documentation on customers’ purchases in one of the largest retail companies in Russia allowed to identify if buyers prefer to buy goods for complex purchases in one retail store with the best price image for them. The cost of attracting a new client is now quite high and continues to grow, so it becomes more important to keep him and increase the involvement through marketing tools. A huge role is played by modern digital technologies used both in advertising (e-mailing, SEO, contextual advertising, banner advertising, SMM, etc.) and in service. To implement the above-described client-oriented omnichannel service, it is necessary to identify the client and work with personal data provided when filling in the loyalty program application form. The analysis of loyalty programs of 50 companies identified the following types of cards: discount cards, bonus cards, mixed cards, coalition loyalty cards, bank loyalty programs, aviation loyalty programs, hybrid loyalty cards, situational loyalty cards. The use of loyalty cards allows not only to stimulate the customer to purchase ‘untargeted’, but also to provide individualized offers, as well as to produce more targeted information. The development of digital technologies and modern means of communication has significantly changed not only the sphere of marketing and promotion, but also the economic landscape as a whole. Factors of competitiveness are the digital opportunities of companies in the field of customer orientation: personalization of service, customization of advertising offers, optimization of marketing activity and improvement of logistics.

Keywords: customer focus, digital economy, loyalty program, relationship marketing

Procedia PDF Downloads 165
15941 Design and Analysis of Highly Efficient and Reliable Single-Phase Transformerless Inverter for PV Systems

Authors: L. Ashok Kumar, N. Sujith Kumar

Abstract:

Most of the PV systems are designed with transformer for safety purpose with galvanic isolation. However, the transformer is big, heavy and expensive. Also, it reduces the overall frequency of the conversion stage. Generally PV inverter with transformer is having efficiency around 92%–94% only. To overcome these problems, transformerless PV system is introduced. It is smaller, lighter, cheaper and higher in efficiency. However, dangerous leakage current will flow between PV array and the grid due to the stray capacitance. There are different types of configurations available for transformerless inverters like H5, H6, HERIC, oH5, and Dual paralleled buck inverter. But each configuration is suffering from its own disadvantages like high conduction losses, shoot-through issues of switches, dead-time requirements at zero crossing instants of grid voltage to avoid grid shoot-through faults and MOSFET reverse recovery issues. The main objective of the proposed transformerless inverter is to address two key issues: One key issue for a transformerless inverter is that it is necessary to achieve high efficiency compared to other existing inverter topologies. Another key issue is that the inverter configuration should not have any shoot-through issues for higher reliability.

Keywords: grid-connected, photovoltaic (PV) systems, transformerless inverter, stray capacitance, common-mode, leakage current, pulse width modulation (PWM)

Procedia PDF Downloads 502
15940 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks

Authors: Afnan Al-Romi, Iman Al-Momani

Abstract:

The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.

Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN

Procedia PDF Downloads 324
15939 Effects of Initial State on Opinion Formation in Complex Social Networks with Noises

Authors: Yi Yu, Vu Xuan Nguyen, Gaoxi Xiao

Abstract:

Opinion formation in complex social networks may exhibit complex system dynamics even when based on some simplest system evolution models. An interesting and important issue is the effects of the initial state on the final steady-state opinion distribution. By carrying out extensive simulations and providing necessary discussions, we show that, while different initial opinion distributions certainly make differences to opinion evolution in social systems without noises, in systems with noises, given enough time, different initial states basically do not contribute to making any significant differences in the final steady state. Instead, it is the basal distribution of the preferred opinions that contributes to deciding the final state of the systems. We briefly explain the reasons leading to the observed conclusions. Such an observation contradicts with a long-term belief on the roles of system initial state in opinion formation, demonstrating the dominating role that opinion mutation can play in opinion formation given enough time. The observation may help to better understand certain observations of opinion evolution dynamics in real-life social networks.

Keywords: opinion formation, Deffuant model, opinion mutation, consensus making

Procedia PDF Downloads 179
15938 Feedback of an Automated Hospital about the Performance of an Automated Drug Dispensing System’s Implementation

Authors: Bouami Hind, Millot Patrick

Abstract:

The implementation of automated devices in life-critical systems such as hospitals can bring a new set of challenges related to automation malfunctions. While automation has been identified as great leverage for the medication dispensing system’s security and efficiency, it also increases the complexity of the organization. In particular, the installation and operation stage of automated devices can be complex when malfunctions related to automated systems occur. This paper aims to document operators’ situation awareness about the malfunctions of automated drug delivery systems (ADCs) during their implementation through Saint Brieuc hospital’s feedback. Our evaluation approach has been deployed in Saint Brieuc hospital center’s pharmacy, which has been equipped with automated nominative drug dispensing systems since January of 2021. The analysis of Saint Brieuc hospital center pharmacy’s automation revealed numerous malfunctions related to the implementation of Automated Delivery Cabinets. It appears that the targeted performance is not reached in the first year of implementation in this case study. Also, errors have been collected in patients' automated treatments’ production such as lack of drugs in pill boxes or nominative carnets, excess of drugs, wrong location of the drug, drug blister damaged, non-compliant sachet, or ticket errors. Saint Brieuc hospital center’s pharmacy is doing a tremendous job of setting up and monitoring performance indicators from the beginning of automation and throughout ADC’s operation to control ADC’s malfunctions and meet the performance targeted by the hospital. Health professionals, including pharmacists, biomedical engineers and directors of work, technical services and safety, are heavily involved in an automation project. This study highlights the importance of the evaluation of ADCs’ performance throughout the implementation process and the hospital’s team involvement in automation supervision and management.

Keywords: life-critical systems, situation awareness, automated delivery cabinets, implementation, risks and malfunctions

Procedia PDF Downloads 101
15937 Impact of innovative Solar Heating Systems on Greenhouse ‎Microclimates: A Case Study with Zucchini (Cucurbita pepo)‎

Authors: Ilham Ihoume, Rachid Tadili, Nora Arbaoui

Abstract:

Recent innovations in economical heating systems have significantly boosted ‎agricultural production by effectively managing temperature drops in greenhouse ‎microclimates. These advancements enhance product profitability in terms of quality, ‎quantity, and growth duration. This study experimentally investigates the impact of a ‎solar heating system on the microclimate of an agricultural greenhouse, focusing on ‎zucchini (Cucurbita pepo). The System comprises a copper tube placed between double ‎roof glazing and a sensible heat storage system, converting solar energy during the day ‎and storing it for night-time release. A second control greenhouse without heating ‎allows for comparative analysis at various growth stages. During the cold season, the ‎experimental greenhouse showed a temperature increase of 3°C compared to the ‎control greenhouse and 5°C above external ambient air. The relative humidity in the ‎experimental greenhouse ranged from 69% to 70%, whereas the control greenhouse recorded 68% to 86%, and ambient air ‎was between 94% to 99%. The heating systems achieved an efficiency of 73%, and ‎zucchini plants in the experimental greenhouse developed fruit 13 days earlier than ‎those in the control greenhouse.‎

Keywords: solar energy, storage, energy managment, heating system

Procedia PDF Downloads 47
15936 Challenges in E-Government: Conceptual Views and Solutions

Authors: Rasim Alguliev, Farhad Yusifov

Abstract:

Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.

Keywords: electron government, public administration, information security, web-analytics, social networks, data mining

Procedia PDF Downloads 475