Search results for: Daniel Mejia
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 507

Search results for: Daniel Mejia

477 Composite Components Manufacturing in SAE Formula Student, a Case Study of AGH Racing

Authors: Hanna Faron, Wojciech Marcinkowski, Daniel Prusak, Władysław Hamiga

Abstract:

Interest in composite materials comes out of two basic premises: their supreme mechanical and strength properties,combined with a small specific weight. Origin and evolution of modern composite materials bonds with development of manufacturing of synthetic fibers, which have begun during Second World War. Main condition to achieve intended properties of composite materials is proper bonding of reinforcing layer with appropriate adhesive in manufacturing process. It is one of the fundamental quality evaluation criterion of fabrication processes.

Keywords: SAE, formula student, composite materials, carbon fiber, Aramid fiber, hot wire cutter

Procedia PDF Downloads 484
476 Neural Rendering Applied to Confocal Microscopy Images

Authors: Daniel Li

Abstract:

We present a novel application of neural rendering methods to confocal microscopy. Neural rendering and implicit neural representations have developed at a remarkable pace, and are prevalent in modern 3D computer vision literature. However, they have not yet been applied to optical microscopy, an important imaging field where 3D volume information may be heavily sought after. In this paper, we employ neural rendering on confocal microscopy focus stack data and share the results. We highlight the benefits and potential of adding neural rendering to the toolkit of microscopy image processing techniques.

Keywords: neural rendering, implicit neural representations, confocal microscopy, medical image processing

Procedia PDF Downloads 625
475 DWDM Network Implementation in the Honduran Telecommunications Company "Hondutel"

Authors: Tannia Vindel, Carlos Mejia, Damaris Araujo, Carlos Velasquez, Darlin Trejo

Abstract:

The DWDM (Dense Wavelenght Division Multiplexing) is in constant growth around the world by consumer demand to meet their needs. Since its inception in this operation arises the need for a system which enable us to expand the communication of an entire nation to improve the computing trends of their societies according to their customs and geographical location. The Honduran Company of Telecommunications (HONDUTEL), provides the internet services and data transport technology with a PDH and SDH, which represents in the Republic of Honduras C. A., the option of viability for the consumer in terms of purchase value and its ease of acquisition; but does not have the efficiency in terms of technological advance and represents an obstacle that limits the long-term socio-economic development in comparison with other countries in the region and to be able to establish a competition between telecommunications companies that are engaged in this heading. For that reason we propose to establish a new technological trend implemented in Europe and that is applied in our country that allows us to provide a data transfer in broadband as it is DWDM, in this way we will have a stable service and quality that will allow us to compete in this globalized world, and that must be replaced by one that would provide a better service and which must be in the forefront. Once implemented the DWDM is build upon the existing resources, such as the equipment used, and you will be given life to a new stage providing a business image to the Republic of Honduras C,A, as a nation, to ensure the data transport and broadband internet to a meaningful relationship. Same benefits in the first instance to existing customers and to all the institutions were bidden to these public and private need of such services.

Keywords: demultiplexers, light detectors, multiplexers, optical amplifiers, optical fibers, PDH, SDH

Procedia PDF Downloads 227
474 Attitude towards Doping of High-Performance Athletes in a Sports Institute of the City of Medellin, Colombia

Authors: Yuban Sebastian Cuartas-Agudelo, Sandra Marcela López-Hincapié, Vivianna Alexandra Garrido-Altamar, María de los Ángeles Rodríguez-Gázquez, Camilo Ruiz-Mejía, Lina María Martínez-Sánchez, Gloria Inés Martínez-Domínguez, Luis Eduardo Contreras, Felipe Eduardo Marino-Isaza

Abstract:

Introduction: Doping is a prohibited practice in competitive sports with potential adverse effects; therefore, it is crucial to describe the attitudes of athletes towards this behavior and to determine which o these increase the susceptibility to carry out this practice. Objective: To determine the attitude of high-performance athletes towards doping in a sports institute in the city of Medellin, Colombia. Methods: We performed a cross-sectional study during 2016, with a sample taken to convenience consisting of athletes over 18 years old enrolled in a sports institute of the city of Medellin (Colombia). The athletes filled by themselves the Petroczi and Aidman questionnaire: Performance Enhancement Attitude Scale (PEAS) adapted to the Spanish language by Morente-Sánchez et al. This scale has 17 items with likert answer options, with a score ranging from 1 to 6, with a higher score indicating a stronger tendency towards doping practices. Results: 112 athletes were included with an average age of 21.6 years old, a 60% of them were male and the most frequent sports were karate 17%, judo 12.5% and athletics 9.8%. The average score of the questionnaire was 35.5 points of a 102 possible points. The lowest score was obtained in the following items: Is Doping necessary 1,4 and Doping isn’t cheating, everyone does it 1,5. Conclusion: In our population, there is a low tendency towards doping practices.

Keywords: sports, doping in sports, athletic performance, attitude

Procedia PDF Downloads 192
473 Shortening Distances: The Link between Logistics and International Trade

Authors: Felipe Bedoya Maya, Agustina Calatayud, Vileydy Gonzalez Mejia

Abstract:

Encompassing inventory, warehousing, and transportation management, logistics is a crucial predictor of firm performance. This has been extensively proven by extant literature in business and operations management. Logistics is also a fundamental determinant of a country's ability to access international markets. Available studies in international and transport economics have shown that limited transport infrastructure and underperforming transport services can severely affect international competitiveness. However, the evidence lacks the overall impact of logistics performance-encompassing all inventory, warehousing, and transport components- on global trade. In order to fill this knowledge gap, the paper uses a gravitational trade model with 155 countries from all geographical regions between 2007 and 2018. Data on logistics performance is obtained from the World Bank's Logistics Performance Index (LPI). First, the relationship between logistics performance and a country’s total trade is estimated, followed by a breakdown by the economic sector. Then, the analysis is disaggregated according to the level of technological intensity of traded goods. Finally, after evaluating the intensive margin of trade, the relevance of logistics infrastructure and services for the extensive trade margin is assessed. Results suggest that: (i) improvements in both logistics infrastructure and services are associated with export growth; (ii) manufactured goods can significantly benefit from these improvements, especially when both exporting and importing countries increase their logistics performance; (iii) the quality of logistics infrastructure and services becomes more important as traded goods are technology-intensive; and (iv) improving the exporting country's logistics performance is essential in the intensive margin of trade while enhancing the importing country's logistics performance is more relevant in the extensive margin.

Keywords: gravity models, infrastructure, international trade, logistics

Procedia PDF Downloads 177
472 BingleSeq: A User-Friendly R Package for Single-Cell RNA-Seq Data Analysis

Authors: Quan Gu, Daniel Dimitrov

Abstract:

BingleSeq was developed as a shiny-based, intuitive, and comprehensive application that enables the analysis of single-Cell RNA-Sequencing count data. This was achieved via incorporating three state-of-the-art software packages for each type of RNA sequencing analysis, alongside functional annotation analysis and a way to assess the overlap of differential expression method results. At its current state, the functionality implemented within BingleSeq is comparable to that of other applications, also developed with the purpose of lowering the entry requirements to RNA Sequencing analyses. BingleSeq is available on GitHub and will be submitted to R/Bioconductor.

Keywords: bioinformatics, functional annotation analysis, single-cell RNA-sequencing, transcriptomics

Procedia PDF Downloads 164
471 Development and Evaluation of Removable Shear Link with Perforated Web

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

The objective of this paper is to investigate, through an analytical study, the behavior of both stiffened and un-stiffened removable shear link with perforated web considering different number and size of web openings. Removable shear link with perforated web is a novel shear link beam proposed to be used in eccentrically braced frame (EBF). The proposed link overcomes the difficulties during construction slab due to less cross-sectional areas of the link to control the plastic deformation on the conventional EBF with removable shear link. Finite element analyses were conducted under both cyclic and monotonic loading and from the results obtained design equations are developed.

Keywords: eccentrically braced frame, removable shear link, perforated web, non-linear FE analysis

Procedia PDF Downloads 331
470 Evaluation of the exIWO Algorithm Based on the Traveling Salesman Problem

Authors: Daniel Kostrzewa, Henryk Josiński

Abstract:

The expanded Invasive Weed Optimization algorithm (exIWO) is an optimization metaheuristic modelled on the original IWO version created by the researchers from the University of Tehran. The authors of the present paper have extended the exIWO algorithm introducing a set of both deterministic and non-deterministic strategies of individuals’ selection. The goal of the project was to evaluate the exIWO by testing its usefulness for solving some test instances of the traveling salesman problem (TSP) taken from the TSPLIB collection which allows comparing the experimental results with optimal values.

Keywords: expanded invasive weed optimization algorithm (exIWO), traveling salesman problem (TSP), heuristic approach, inversion operator

Procedia PDF Downloads 806
469 Chromosomal Damage in Human Lymphocytes by Ultraviolet Radiation

Authors: Felipe Osorio Ospina, Maria Adelaida Mejia Arango, Esteban Onésimo Vallejo Agudelo, Victoria Lucía Dávila Osorio, Natalia Vargas Grisales, Lina María Martínez Sanchez, Camilo Andrés Agudelo Vélez, Ángela Maria Londoño García, Isabel Cristina Ortiz Trujillo

Abstract:

Excessive exposure to ultraviolet radiation, has shown to be a risk factor for photodamage, alteration of the immune mechanisms to recognize malignant cells and cutaneous pro-inflamatorios States and skin cancers. Objective: Identify the time of exposure to ultraviolet radiation for the production of chromosomal damage in human lymphocytes. Methodology: We conducted an in vitro study serial, in which samples were taken from heparinized blood of healthy people, who do not submit exposure to agents that could induce chromosomal alterations. The samples were cultured in RPMI-1640 medium containing 10% fetal bovine serum, penicillin and streptomycin antibiotic. Subsequently, they were grouped and exposed to ultraviolet light for 1 to 20 seconds. At the end of the treatments, cytology samples were prepared, and it was colored with Giemsa (5%). Reading was carried out in an optical microscope and 100 metaphases analysed by treatment for posting chromosomal alterations. Each treatment was conducted at three separate times and each became two replicas. Results: We only presented chromosomal alterations in lymphocytes exposed to UV for a groups 1 to 3 seconds (p<0.05). Conclusions: Exposure to ultraviolet radiation generates visible damage in chromosomes from human lymphocytes observed in light microscopy, the highest rates of injury was observed between two and three seconds, and above this value, the reduction in the number of mitotic cells was evident.

Keywords: ultraviolet rays, lymphocytes, chromosome breakpoints, photodamage

Procedia PDF Downloads 401
468 Ultraviolet Radiation and Chromosomal Damage in Human Lymphocytes

Authors: Felipe Osorio Ospina, Maria Adelaida Mejia Arango, Esteban Onésimo Vallejo Agudelo, Victoria Lucía Dávila Osorio, Natalia Vargas Grisales, Lina María Martínez Sanchez, Camilo Andrés Agudelo Vélez, Ángela Maria Londoño García, Isabel Cristina Ortiz Trujillo

Abstract:

Excessive exposure to ultraviolet radiation, has shown to be a risk factor for photodamage, alteration of the immune mechanisms to recognize malignant cells and cutaneous pro-inflamatorios states and skin cancers. Objective: To identify the time of exposure to ultraviolet radiation for the production of chromosomal damage in human lymphocytes. Methodology: We conducted an in vitro study serial, in which samples were taken from the heparinized blood of healthy people, who do not submit exposure to agents that could induce chromosomal alterations. The samples were cultured in RPMI-1640 medium containing 10% fetal bovine serum, penicillin, and streptomycin antibiotic. Subsequently, they were grouped and exposed to ultraviolet light for 1 to 20 seconds. At the end of the treatments, cytology samples were prepared, and it was colored with Giemsa (5%). Reading was carried out in an optical microscope and 100 metaphases analysed by treatment for posting chromosomal alterations. Each treatment was conducted at three separate times and each became two replicas. Results: We only presented chromosomal alterations in lymphocytes exposed to UV for groups 1 to 3 seconds (p < 0.05). Conclusions: Exposure to ultraviolet radiation generates visible damage in chromosomes from human lymphocytes observed in light microscopy, the highest rates of injury was observed between two and three seconds, and above this value, the reduction in the number of mitotic cells was evident.

Keywords: chromosome breakpoints, lymphocytes, photodamage, ultraviolet rays

Procedia PDF Downloads 550
467 The Effects of Cost-Sharing Contracts on the Costs and Operations of E-Commerce Supply Chains

Authors: Sahani Rathnasiri, Pritee Ray, Sardar M. N. Isalm, Carlos A. Vega-Mejia

Abstract:

This study develops a cooperative game theory-based cost-sharing contract model for a business to consumer (B2C) e-commerce supply chain to minimize the overall supply chain costs and the individual costs within an information asymmetry scenario. The objective of this study is to address the issues of strategic interactions among the key players of the e-commerce supply chain operation, which impedes the optimal operational outcomes. Game theory has been included in the field of supply chain management to resolve strategic decision-making issues; however, most of the studies are limited only to two-echelons of the supply chains. Multi-echelon supply chain optimizations based on game-theoretic models are less explored in the previous literature. This study adopts a cooperative game model to focus on the common payoff of operations and addresses the issues of information asymmetry and coordination of a three-echelon e-commerce supply chain. The cost-sharing contract model integrates operational features such as production, inventory management and distribution with the contract related constraints. The outcomes of the model highlight the importance of maintaining lower operational costs by all players to obtain benefits from the cost-sharing contract. Further, the cost-sharing contract ensures true cost revelation, and hence eliminates the information asymmetry issues among the players. Comparing the results of the contract model with the de-centralized e-commerce supply chain operation further emphasizes that the cost-sharing contract derives Pareto-improved outcomes and minimizes the costs of overall e-commerce supply chain operation.

Keywords: cooperative game theory, cost-sharing contract, e-commerce supply chain, information asymmetry

Procedia PDF Downloads 96
466 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 210
465 Sex Positions Decisions and Negotiations of Sexual Pleasure and Gender in Ghana

Authors: Daniel Y. Fiaveh, Chimaraoke O. Izugbara

Abstract:

Based on the narratives of 20 women and 16 men, the paper explores how knowing more about the factors that trigger sex positions decisions advance knowledge of male and female sexuality, and how these translate into higher levels of female sexual negotiations in Ghana. Findings demonstrated that the willingness to perform sex positions or not were gendered and derive, at least in part, from differences in demographic profiles (such as age, gender, and marriage), beliefs associated with sexual practices (such as anal sex), the desire to maximize sexual pleasure, and sexual myths and misconceptions e.g. fear of infecundity. The women were not passive to sex positions decisions and engaged in a dialogical sexual encounter with men including threats of sexual refusal in negotiating sex.

Keywords: sexual positions, sexual pleasure, masculinity, femininity, Ghana

Procedia PDF Downloads 455
464 Evaluation of Free Technologies as Tools for Business Process Management

Authors: Julio Sotomayor, Daniel Yucra, Jorge Mayhuasca

Abstract:

The article presents an evaluation of free technologies for business process automation, with emphasis only on tools compatible with the general public license (GPL). The compendium of technologies was based on promoting a service-oriented enterprise architecture (SOA) and the establishment of a business process management system (BPMS). The methodology for the selection of tools was Agile UP. This proposal allows businesses to achieve technological sovereignty and independence, in addition to the promotion of service orientation and the development of free software based on components.

Keywords: BPM, BPMS suite, open-source software, SOA, enterprise architecture, business process management

Procedia PDF Downloads 253
463 The Magic Bullet in Africa: Exploring an Alternative Theoretical Model

Authors: Daniel Nkrumah

Abstract:

The Magic Bullet theory was a popular media effect theory that defined the power of the mass media in altering beliefs and perceptions of its audiences. However, following the People's Choice study, the theory was said to have been disproved and was supplanted by the Two-Step Flow Theory. This paper examines the relevance of the Magic Bullet theory in Africa and establishes whether it is still relevant in Africa's media spaces and societies. Using selected cases on the continent, it adopts a grounded theory approach and explores a new theoretical model that attempts to enforce an argument that the Two-Step Flow theory though important and valid, was ill-conceived as a direct replacement to the Magic Bullet theory.

Keywords: magic bullet theory, two-step flow theory, media effects, african media

Procedia PDF Downloads 88
462 Spectral Efficiency Improvement in 5G Systems by Polyphase Decomposition

Authors: Wilson Enríquez, Daniel Cardenas

Abstract:

This article proposes a filter bank format combined with the mathematical tool called polyphase decomposition and the discrete Fourier transform (DFT) with the purpose of improving the performance of the fifth-generation communication systems (5G). We started with a review of the literature and the study of the filter bank theory and its combination with DFT in order to improve the performance of wireless communications since it reduces the computational complexity of these communication systems. With the proposed technique, several experiments were carried out in order to evaluate the structures in 5G systems. Finally, the results are presented in graphical form in terms of bit error rate against the ratio bit energy/noise power spectral density (BER vs. Eb / No).

Keywords: multi-carrier system (5G), filter bank, polyphase decomposition, FIR equalizer

Procedia PDF Downloads 169
461 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 530
460 Characterization of Chest Pain in Patients Consulting to the Emergency Department of a Health Institution High Level of Complexity during 2014-2015, Medellin, Colombia

Authors: Jorge Iván Bañol-Betancur, Lina María Martínez-Sánchez, María de los Ángeles Rodríguez-Gázquez, Estefanía Bahamonde-Olaya, Ana María Gutiérrez-Tamayo, Laura Isabel Jaramillo-Jaramillo, Camilo Ruiz-Mejía, Natalia Morales-Quintero

Abstract:

Acute chest pain is a distressing sensation between the diaphragm and the base of the neck and it represents a diagnostic challenge for any physician in the emergency department. Objective: To establish the main clinical and epidemiological characteristics of patients who present with chest pain to the emergency department in a private clinic from the city of Medellin, during 2014-2015. Methods: Cross-sectional retrospective observational study. Population and sample were patients who consulted for chest pain in the emergency department who met the eligibility criteria. The information was analyzed in SPSS program vr.21; qualitative variables were described through relative frequencies, and the quantitative through mean and standard deviation ‬or medians according to their distribution in the study population. Results: A total of 231 patients were evaluated, the mean age was 49.5 ± 19.9 years, 56.7% were females. The most frequent pathological antecedents were hypertension 35.5%, diabetes 10,8%, dyslipidemia 10.4% and coronary disease 5.2%. Regarding pain features, in 40.3% of the patients the pain began abruptly, in 38.2% it had a precordial location, for 20% of the cases physical activity acted as a trigger, and 60.6% was oppressive. Costochondritis was the most common cause of chest pain among patients with an established etiologic diagnosis, representing the 18.2%. Conclusions: Although the clinical features of pain reported coincide with the clinical presentation of an acute coronary syndrome, the most common cause of chest pain in study population was costochondritis instead, indicating that it is a differential diagnostic in the approach of patients with pain acute chest.

Keywords: acute coronary syndrome, chest pain, epidemiology, osteochondritis

Procedia PDF Downloads 312
459 Algorithms for Fast Computation of Pan Matrix Profiles of Time Series Under Unnormalized Euclidean Distances

Authors: Jing Zhang, Daniel Nikovski

Abstract:

We propose an approximation algorithm called LINKUMP to compute the Pan Matrix Profile (PMP) under the unnormalized l∞ distance (useful for value-based similarity search) using double-ended queue and linear interpolation. The algorithm has comparable time/space complexities as the state-of-the-art algorithm for typical PMP computation under the normalized l₂ distance (useful for shape-based similarity search). We validate its efficiency and effectiveness through extensive numerical experiments and a real-world anomaly detection application.

Keywords: pan matrix profile, unnormalized euclidean distance, double-ended queue, discord discovery, anomaly detection

Procedia PDF Downloads 214
458 Clinical and Epidemiological Profile of Patients with Chronic Obstructive Pulmonary Disease in a Medical Institution from the City of Medellin, Colombia

Authors: Camilo Andres Agudelo-Velez, Lina María Martinez-Sanchez, Natalia Perilla-Hernandez, Maria De Los Angeles Rodriguez-Gazquez, Felipe Hernandez-Restrepo, Dayana Andrea Quintero-Moreno, Camilo Ruiz-Mejia, Isabel Cristina Ortiz-Trujillo, Monica Maria Zuluaga-Quintero

Abstract:

Chronic obstructive pulmonary disease is common condition, characterized by a persistent blockage of airflow, partially reversible and progressive, that represents 5% of total deaths around the world, and it is expected to become the third leading cause of death by 2030. Objective: To establish the clinical and epidemiological profile of patients with chronic obstructive pulmonary disease in a medical institution from the city of Medellin, Colombia. Methods: A cross-sectional study was performed, with a sample of 50 patients with a diagnosis of chronic obstructive pulmonary disease in a private institution in Medellin, during 2015. The software SPSS vr. 20 was used for the statistical analysis. For the quantitative variables, averages, standard deviations, and maximun and minimun values were calculated, while for ordinal and nominal qualitative variables, proportions were estimated. Results: The average age was 73.5±9.3 years, 52% of the patients were women, 50% of them had retired, 46% ere married and 80% lived in the city of Medellín. The mean time of diagnosis was 7.8±1.3 years and 100% of the patients were treated at the internal medicine service. The most common clinical features were: 36% were classified as class D for the disease, 34% had a FEV1 <30%, 88% had a history of smoking and 52% had oxygen therapy at home. Conclusion: It was found that class D was the most common, and the majority of the patients had a history of smoking, indicating the need to strengthen promotion and prevention strategies in this regard.

Keywords: pulmonary disease, chronic obstructive, pulmonary medicine, oxygen inhalation therapy

Procedia PDF Downloads 415
457 An Investigation into the Isolation and Bandwidth Characteristics of X-Band Chireix Power Amplifier Combiners

Authors: Daniel P. Clayton, Edward A. Ball

Abstract:

This paper describes an investigation into the isolation characteristics and bandwidth performance of RF combiners that are used as part of Chireix PA architectures, designed for use in the X-Band range of frequencies. Combiner designs investigated are the typical Chireix and Wilkinson configurations which also include simulation of the Wilkinson using manufacturer’s data for the isolation resistor. Another simulation was the less common approach of using a Branchline coupler to form the combiner, as well as simulation results from adding an additional stage. This paper presents the findings of this investigation and compares the bandwidth performance and isolation characteristics to determine suitability.

Keywords: bandwidth, Chireix, couplers, outphasing, power amplifiers, Wilkinson, X-Band

Procedia PDF Downloads 227
456 A New Type Safety-Door for Earthquake Disaster Prevention: Part I

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

From the past earthquake events, many people get hurt at the exit while they are trying to go out of the buildings because of the exit doors are unable to be opened. The door is not opened because it deviates from its the original position. The aim of this research is to develop and evaluate a new type safety door that keeps the door frame in its original position or keeps its edge angles perpendicular during and post-earthquake. The proposed door is composed of three components: outer frame joined to the wall, inner frame (door frame) and circular hollow section connected to the inner and outer frame which is used as seismic energy dissipating device.

Keywords: safety-door, earthquake disaster, low yield point steel, passive energy dissipating device, FE analysis

Procedia PDF Downloads 499
455 Low-Cost VoIP University Solution

Authors: Carlos Henrique Rodrigues de Oliveira, Luis Carlos Costa Fonseca, Caio de Castro Torres, Daniel Gusmão Pereira, Luiz Ricardo Souza Ripardo, Magno Castro Moraes, Ana Paula Ferreira Costa, Luiz Carlos Chaves Lima Junior, Aurelianny Almeida da Cunha

Abstract:

VoIP University is a communication solution based on the IP protocol. This solution was proposed to modernize and save on communication, which required the development of Android, iOS, and Windows applications and a web service server. This solution allows integration with management system databases to create and manage a list of user extensions. VoIP University was deployed in a university, and a financial analysis revealed that annual spending on telephone bills decreased by more than 97 %.

Keywords: VoIP eTec, VoIP UEMA, VoIP University, VoIP Valen

Procedia PDF Downloads 21
454 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 135
453 Management Control Systems in Post-Incubation: An Investigation of Closed Down High-Technology Start-Ups

Authors: Jochen Edmund Kerschenbauer, Roman Salinger, Daniel Strametz

Abstract:

Insufficient informal communication systems can lead to the first crisis (‘Crisis of Leadership’) for start-ups. Management Control Systems (MCS) are one way for high-technology start-ups to successfully overcome these problems. So far the literature has investigated the incubation of a start-up, but focused less on the post-incubation stage. This paper focuses on the use of MCS in post-incubation and, if failed start-ups agree, on how MCS are used. We conducted 14 semi-structured interviews for this purpose, to obtain our results. The overall conclusion is that the majority of the companies were closed down due to a combination of strategic, operative and financial reasons.

Keywords: closed down, high-technology, incubation, levers of control, management control systems, post-incubation, start-ups

Procedia PDF Downloads 1068
452 Geoeducation Strategies for Teaching Natural Hazards in Schools

Authors: Carlos Alberto Ríos Reyes, Andrés Felipe Mejía Durán, Oscar Mauricio Castellanos Alarcón

Abstract:

There is no doubt of great importance to make it known that planet Earth is an entity in constant change and transformation; processes such as construction and destruction are part of the evolution of the territory. Geoeducation workshops represent a significant contribution to the search for educational projects focused on teaching relevant geoscience topics to make natural threats known in schools through recreational and didactic activities. This initiative represents an educational alternative that must be developed with the participation of primary and secondary schools, universities, and local communities. The methodology is based on several phases, which include: diagnosis to know the best teaching method for basic concepts and establish a starting point for the topics to be taught, as well as to identify areas and concepts that need to be reinforced and/or deepened; design of activities that involve all students regardless of their ability or level; use of accessible materials and experimentation to support clear and concise explanations for all students; adaptation of the teaching-learning process to individual needs; sensitization about natural threats; and evaluation and feedback. It is expected to offer a series of activities and materials as a significant contribution to the search for educational projects focused on teaching relevant geoscientific topics such as natural threats associated with earthquakes, volcanic eruptions, floods, landslides, etc. The major findings of this study are the pedagogical strategies that primary and secondary school teachers can appropriate to face the challenge of transferring geological knowledge and to advise decision-makers and citizens on the importance of geosciences for daily life. We conclude that the knowledge of the natural threats to our planet is very important to contribute to mitigating their risk.

Keywords: workshops, geoeducation, curriculum, geosciences, natural threats

Procedia PDF Downloads 47
451 Effect of Waste Dumping on Groundwater Quality at Guntun Layi Funtua, Katsina State

Authors: Isiya Aminu Dabai, Adebola Kayode, Adeosun Kayode Daniel

Abstract:

Rural water supply relies mainly on groundwater exploitation, because it is more accessible, reliable, cheaper to develop and maintain, also with good quality compared to the surface water. Despite these advantages, groundwater has come under pollution threats like waste dumps, mineral exploitation, industrialization etc. This study investigates the effects of an open dumping to the surrounding groundwater. Ten hand dug well water samples were collected from the surroundings and tested. The average result shows that temperature, colour and turbidity to be 8.50 c, 6.1 TCU and 3.1 NTU respectively and pH, conductivity, total dissolved solids, chloride content and hardness to be 7.2, 4.78, 1.8, 5.7, and 3.4 respectively while in the bacteriological test well no. 1, 2, 3, and 5 shows the presence of coliforms and E. Coli bacteria.

Keywords: groundwater, pollution, waste, dump site, unsafe, quality

Procedia PDF Downloads 656
450 Engaging Teacher Inquiry via New Media in Traditional and E-Learning Environments

Authors: Daniel A. Walzer

Abstract:

As the options for course delivery and development expand, plenty of misconceptions still exist concerning e-learning and online course delivery. Classroom instructors often discuss pedagogy, methodologies, and best practices regarding teaching from a singular, traditional in-class perspective. As more professors integrate online, blended, and hybrid courses into their dossier, a clearly defined rubric for gauging online course delivery is essential. The transition from a traditional learning structure towards an updated distance-based format requires careful planning, evaluation, and revision. This paper examines how new media stimulates reflective practice and guided inquiry to improve pedagogy, engage interdisciplinary collaboration, and supply rich qualitative data for future research projects in media arts disciplines.

Keywords: action research, inquiry, new media, reflection

Procedia PDF Downloads 286
449 Angle of Arrival Estimation Using Maximum Likelihood Method

Authors: Olomon Wu, Hung Lu, Nick Wilkins, Daniel Kerr, Zekeriya Aliyazicioglu, H. K. Hwang

Abstract:

Multiple Input Multiple Output (MIMO) radar has received increasing attention in recent years. MIMO radar has many advantages over conventional phased array radar such as target detection, resolution enhancement, and interference suppression. In this paper, the results are presented from a simulation study of MIMO Uniformly-Spaced Linear Array (ULA) antennas. The performance is investigated under varied parameters, including varied array size, Pseudo Random (PN) sequence length, number of snapshots, and Signal to Noise Ratio (SNR). The results of MIMO are compared to a traditional array antenna.

Keywords: MIMO radar, phased array antenna, target detection, radar signal processing

Procedia PDF Downloads 510
448 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 460