Search results for: importance of biometric
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5503

Search results for: importance of biometric

5413 Metropolis-Hastings Sampling Approach for High Dimensional Testing Methods of Autonomous Vehicles

Authors: Nacer Eddine Chelbi, Ayet Bagane, Annie Saleh, Claude Sauvageau, Denis Gingras

Abstract:

As recently stated by National Highway Traffic Safety Administration (NHTSA), to demonstrate the expected performance of a highly automated vehicles system, test approaches should include a combination of simulation, test track, and on-road testing. In this paper, we propose a new validation method for autonomous vehicles involving on-road tests (Field Operational Tests), test track (Test Matrix) and simulation (Worst Case Scenarios). We concentrate our discussion on the simulation aspects, in particular, we extend recent work based on Importance Sampling by using a Metropolis-Hasting algorithm (MHS) to sample collected data from the Safety Pilot Model Deployment (SPMD) in lane-change scenarios. Our proposed MH sampling method will be compared to the Importance Sampling method, which does not perform well in high-dimensional problems. The importance of this study is to obtain a sampler that could be applied to high dimensional simulation problems in order to reduce and optimize the number of test scenarios that are necessary for validation and certification of autonomous vehicles.

Keywords: automated driving, autonomous emergency braking (AEB), autonomous vehicles, certification, evaluation, importance sampling, metropolis-hastings sampling, tests

Procedia PDF Downloads 253
5412 Smart Airport: Application of Internet of Things for Confronting Airport Challenges

Authors: Ali Safaeianpour, Nima Shamandi

Abstract:

As air traffic expands, many airports have evolved into transit centers for people, information, and commerce, and technology implementation is an absolute part of airport development. Several challenges are in the way of implementing technology in an airport. Airport 4.0 proposes the "Smart Airport" concept, which focuses on using modern technologies such as Big Data, the Internet of Things (IoT), advanced biometric systems, blockchain, and cloud computing to alter and enhance passengers' journeys. Several common IoT concrete topics as partial keys to smart airports are discussed and introduced, ranging from automated check-in systems to exterior tracking processes, with the goal of enlightening more and more insightful ideas and proposals about smart airport solutions. IoT will dramatically alter people's lives by infusing intelligence, boosting the quality of life, and assembling it smarter. This paper reviews the approaches to transforming an airport into a smart airport and describes several enabling components of IoT and challenges that can hinder the implementation of a smart airport's function, which require to be addressed.

Keywords: airport 4.0, digital airport, smart airport, IoT

Procedia PDF Downloads 82
5411 The Importance of Knowledge Innovation for External Audit on Anti-Corruption

Authors: Adel M. Qatawneh

Abstract:

This paper aimed to determine the importance of knowledge innovation for external audit on anti-corruption in the entire Jordanian bank companies are listed in Amman Stock Exchange (ASE). The study importance arises from the need to recognize the Knowledge innovation for external audit and anti-corruption as the development in the world of business, the variables that will be affected by external audit innovation are: reliability of financial data, relevantly of financial data, consistency of the financial data, Full disclosure of financial data and protecting the rights of investors to achieve the objectives of the study a questionnaire was designed and distributed to the society of the Jordanian bank are listed in Amman Stock Exchange. The data analysis found out that the banks in Jordan have a positive importance of Knowledge innovation for external audit on anti-corruption. They agree on the benefit of Knowledge innovation for external audit on anti-corruption. The statistical analysis showed that Knowledge innovation for external audit had a positive impact on the anti-corruption and that external audit has a significantly statistical relationship with anti-corruption, reliability of financial data, consistency of the financial data, a full disclosure of financial data and protecting the rights of investors.

Keywords: knowledge innovation, external audit, anti-corruption, Amman Stock Exchange

Procedia PDF Downloads 435
5410 The Importance of Cultural Adaptation of B2C E-Services Design in Germany

Authors: Rasha Alhendawi

Abstract:

This research will give the introductory ideas for cultural adaption of B2C E-Service design in Germany. By the intense competition of E-Service development, many companies have realized the importance of understanding the emotional and cultural characteristics of their customers. Ignoring customers’ needs and requirements throughout the E-Service design can lead to faults, mistakes, and gaps. The term of E-Service usability now is changed not only to develop high quality E-Services, but also to be extended to include customer satisfaction and provide for them to feel local.

Keywords: human computer interaction (HCI), usability, cultural usability, E-Services, business-to-consumer (B2C), e-services

Procedia PDF Downloads 408
5409 Occurrence of Aspidiscus cristatus (Lamarck) in the 'Marnes De Smail' from the Bellezma-Batna Range (Algeria): An Index Species for the Middle Cenomanian 

Authors: Salmi-Laouar Sihem, Aouissi Riadh

Abstract:

The Cenomanian formations of the Bellezma-Batna Range are yielding very diversified fossiliferous beds. Among the abundant and well-preserved fossils stands out Aspidiscus cristatus (Lamarck). This taxon is assigned to the Family Latomeandridae (Alloiteau) for the presence of six symmetry axes. The outer morphology of sampled specimens documents a low-energy environment with a high sedimentary rate and a mud-supported bottom. Its provincialism evidences some characteristic thermal gradients of the marked Tethysian climatic areas. Biometric measurements are given. Coral size increases from the North towards the southeastern Tethysian margin where waters are supposed warmer; this feature is also underlined by a frequent bio-erosion of sampled specimens. Its limited stratigraphic range makes it a good candidate for an index species for the Middle Cenomanian.

Keywords: Aspidiscus cristatus, coral, Middle Cenomanian, Batna, Bellezma, Algeria

Procedia PDF Downloads 141
5408 Fingerprint Image Encryption Using a 2D Chaotic Map and Elliptic Curve Cryptography

Authors: D. M. S. Bandara, Yunqi Lei, Ye Luo

Abstract:

Fingerprints are suitable as long-term markers of human identity since they provide detailed and unique individual features which are difficult to alter and durable over life time. In this paper, we propose an algorithm to encrypt and decrypt fingerprint images by using a specially designed Elliptic Curve Cryptography (ECC) procedure based on block ciphers. In addition, to increase the confusing effect of fingerprint encryption, we also utilize a chaotic-behaved method called Arnold Cat Map (ACM) for a 2D scrambling of pixel locations in our method. Experimental results are carried out with various types of efficiency and security analyses. As a result, we demonstrate that the proposed fingerprint encryption/decryption algorithm is advantageous in several different aspects including efficiency, security and flexibility. In particular, using this algorithm, we achieve a margin of about 0.1% in the test of Number of Pixel Changing Rate (NPCR) values comparing to the-state-of-the-art performances.

Keywords: arnold cat map, biometric encryption, block cipher, elliptic curve cryptography, fingerprint encryption, Koblitz’s encoding

Procedia PDF Downloads 171
5407 An Object-Based Image Resizing Approach

Authors: Chin-Chen Chang, I-Ta Lee, Tsung-Ta Ke, Wen-Kai Tai

Abstract:

Common methods for resizing image size include scaling and cropping. However, these two approaches have some quality problems for reduced images. In this paper, we propose an image resizing algorithm by separating the main objects and the background. First, we extract two feature maps, namely, an enhanced visual saliency map and an improved gradient map from an input image. After that, we integrate these two feature maps to an importance map. Finally, we generate the target image using the importance map. The proposed approach can obtain desired results for a wide range of images.

Keywords: energy map, visual saliency, gradient map, seam carving

Procedia PDF Downloads 452
5406 Durability of Reinforced Concrete Structure on Very High Aggressive Environment: A Case Study

Authors: Karla Peitl Miller, Leomar Bravin Porto, Kaitto Correa Fraga, Nataniele Eler Mendes

Abstract:

This paper presents the evaluation and study of a real reinforced concrete structure of a fertilizer storage building, constructed on a Vale’s Port at Brazil, which has been recently under refurbishment. Data that will be shared and commented aim to show how wrong choices in project concepts allied to a very high aggressive environment lead to a fast track degradation, incurring on a hazardous condition associated with huge and expensive treatment for repair and guarantee of minimum performance conditions and service life. It will be also shown and discussed all the covered steps since pathological manifestations first signs were observed until the complete revitalization and reparation planning would be drawn. The conclusions of the work easily explicit the importance of professional technical qualification, the importance of minimum requirements for design and structural reforms, and mainly, the importance of good inspection and diagnostic engineering continuous work.

Keywords: durability, reinforced concrete repair, structural inspection, diagnostic engineering

Procedia PDF Downloads 107
5405 Importance of Human Resources Training in an Information Age

Authors: A. Serap Fırat

Abstract:

The aim of this study is to display conceptually the relationship and interaction between matter of human resources training and the information age. Fast development from industrial community to an information community has occurred and organizations have been seeking ways to overcome this change. Human resources policy and human capital with enhanced competence will have direct impact on work performance; therefore, this paper deals with the increased importance of human resource management due to the fact that it nurtures human capital. Researching and scanning are used as a method in this study. Both local and foreign literature and expert views are employed -as much as one could be- in the making of the theoretical framework of this study.

Keywords: human resources, information age, education, organization, occupation

Procedia PDF Downloads 336
5404 Kant’s Conception of Human Dignity and the Importance of Singularity within Commonality

Authors: Francisco Lobo

Abstract:

Kant’s household theory of human dignity as a common feature of all rational beings is the starting point of any intellectual endeavor to unravel the implications of this normative notion. Yet, it is incomplete, as it neglects considering the importance of the singularity or uniqueness of the individual. In a first, deconstructive stage, this paper describes the Kantian account of human dignity as one among many conceptions of human dignity. It reads carefully into the original wording used by Kant in German and its English translations, as well as the works of modern commentators, to identify its shortcomings. In a second, constructive stage, it then draws on the theories of Aristotle, Alexis de Tocqueville, John Stuart Mill, and Hannah Arendt to try and enhance the Kantian conception, in the sense that these authors give major importance to the singularity of the individual. The Kantian theory can be perfected by including elements from the works of these authors, while at the same time being mindful of the dangers entailed in focusing too much on singularity. The conclusion of this paper is that the Kantian conception of human dignity can be enhanced if it acknowledges that not only morality has dignity, but also the irreplaceable human individual to the extent that she is a narrative, original creature with the potential to act morally.

Keywords: commonality, dignity, Kant, singularity

Procedia PDF Downloads 245
5403 Quality of Life and Willingness to Take Treatment and the Importance of the Disease in the Lives of Patients with Eating Disorders

Authors: Marzena Trojanczyk, Mariusz Jaworski, Ewa Dmoch Gajzlerska

Abstract:

Purpose: The purpose of this paper is to assess the relationship between the level of quality of life and willingness to take treatment in patients with eating disorders as anorexia, bulimia and compulsive bingeing. Material and methods: The subjects consisted of 99 women with eating disorders: anorexia, n = 33; bulimia, n = 35; compulsive overeating, n = 31 and 35 women in the control group. The study used an original questionnaire to assess the overall quality of life, as well as selected areas of the physical, mental, social and spiritual satisfaction. The subjects were also asked about the level of motivation for treatment, and the importance of the disease in the lives of patients. Statistical analyses were performed using the statistical program SPSS 18.0. Results: Women with eating disorders in particular groups did not differ with respect to each other in the aspect of overall quality of life, satisfaction with the development of the spiritual, social functioning and mental health. The severity level of the disease in the lives of patients showed a negative correlation with social functioning in women with anorexia nervosa. In the case of patients with compulsive bingeing a positive relationship between the level of importance of the disease and the satisfaction of spiritual development is reported. Conclusions: Concerning the inferior quality of life, there is no relationship between a willingness to take treatment and the importance of the disease in the lives of patients with anorexia, bulimia and compulsive bingeing.

Keywords: anorexia, bulimia, compulsive overeating, quality of life

Procedia PDF Downloads 362
5402 Effect of Perceived Importance of a Task in the Prospective Memory Task

Authors: Kazushige Wada, Mayuko Ueda

Abstract:

In the present study, we reanalyzed lapse errors in the last phase of a job, by re-counting near lapse errors and increasing the number of participants. We also examined the results of this study from the perspective of prospective memory (PM), which concerns future actions. This study was designed to investigate whether perceiving the importance of PM tasks caused lapse errors in the last phase of a job and to determine if such errors could be explained from the perspective of PM processing. Participants (N = 34) conducted a computerized clicking task, in which they clicked on 10 figures that they had learned in advance in 8 blocks of 10 trials. Participants were requested to click the check box in the start display of a block and to click the checking off box in the finishing display. This task was a PM task. As a measure of PM performance, we counted the number of omission errors caused by forgetting to check off in the finishing display, which was defined as a lapse error. The perceived importance was manipulated by different instructions. Half the participants in the highly important task condition were instructed that checking off was very important, because equipment would be overloaded if it were not done. The other half in the not important task condition was instructed only about the location and procedure for checking off. Furthermore, we controlled workload and the emotion of surprise to confirm the effect of demand capacity and attention. To manipulate emotions during the clicking task, we suddenly presented a photo of a traffic accident and the sound of a skidding car followed by an explosion. Workload was manipulated by requesting participants to press the 0 key in response to a beep. Results indicated too few forgetting induced lapse errors to be analyzed. However, there was a weak main effect of the perceived importance of the check task, in which the mouse moved to the “END” button before moving to the check box in the finishing display. Especially, the highly important task group showed more such near lapse errors, than the not important task group. Neither surprise, nor workload affected the occurrence of near lapse errors. These results imply that high perceived importance of PM tasks impair task performance. On the basis of the multiprocess framework of PM theory, we have suggested that PM task performance in this experiment relied not on monitoring PM tasks, but on spontaneous retrieving.

Keywords: prospective memory, perceived importance, lapse errors, multi process framework of prospective memory.

Procedia PDF Downloads 417
5401 A Sensor Placement Methodology for Chemical Plants

Authors: Omid Ataei Nia, Karim Salahshoor

Abstract:

In this paper, a new precise and reliable sensor network methodology is introduced for unit processes and operations using the Constriction Coefficient Particle Swarm Optimization (CPSO) method. CPSO is introduced as a new search engine for optimal sensor network design purposes. Furthermore, a Square Root Unscented Kalman Filter (SRUKF) algorithm is employed as a new data reconciliation technique to enhance the stability and accuracy of the filter. The proposed design procedure incorporates precision, cost, observability, reliability together with importance-of-variables (IVs) as a novel measure in Instrumentation Criteria (IC). To the best of our knowledge, no comprehensive approach has yet been proposed in the literature to take into account the importance of variables in the sensor network design procedure. In this paper, specific weight is assigned to each sensor, measuring a process variable in the sensor network to indicate the importance of that variable over the others to cater to the ultimate sensor network application requirements. A set of distinct scenarios has been conducted to evaluate the performance of the proposed methodology in a simulated Continuous Stirred Tank Reactor (CSTR) as a highly nonlinear process plant benchmark. The obtained results reveal the efficacy of the proposed method, leading to significant improvement in accuracy with respect to other alternative sensor network design approaches and securing the definite allocation of sensors to the most important process variables in sensor network design as a novel achievement.

Keywords: constriction coefficient PSO, importance of variable, MRMSE, reliability, sensor network design, square root unscented Kalman filter

Procedia PDF Downloads 135
5400 Marketing Mix for Tourism in the Chonburi Province

Authors: Pisit Potjanajaruwit

Abstract:

The objectives of the study were to determine the marketing mix factors that influencing tourist’s destination decision making for cultural tourism in the Chonburi province. Both quantitative and qualitative data were applied in this study. The samples of 400 cases for quantitative analysis were tourists (both Thai and foreign) who were interested in cultural tourism in the Chonburi province, and traveled to cultural sites in Chonburi and 14 representatives from provincial tourism committee of Chonburi and local tourism experts. Statistics utilized in this research included frequency, percentage, mean, standard deviation, and multiple regression analysis. The study found that Thai and foreign tourists are influenced by different important marketing mix factors. The important factors for Thai respondents were physical evidence, price, people, and place at high importance level. For foreign respondents, physical evidence, price, people, and process were high importance level, whereas, product, place, and promotion were moderate importance level.

Keywords: Chonburi Province, decision making, cultural tourism, marketing mixed

Procedia PDF Downloads 353
5399 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 191
5398 The Importance of Supply Chain Management in Prosperity of Organizations

Authors: Seyedeza Baharisaravi

Abstract:

As we know, we are living in the hyper competitive environment and all of companies strive hard to engross more and more customers. Thus, in this milieu, we should produce and deliver diverse commodities, regarding with the consumers' interests. So, all companies elicit that they should pay attention on the external resources besides the internal ones. Hence, the meaning of supply chain management has been introduced as a fundamental issue for global e-business, e-commerce and e-government. The present paper explains prominences, challenges, keys, various descriptions, advantages and disadvantages, globalization and the future of one of the vital issues in the business realm which is supply chain management (SCM). This issue is one of the newest concepts of business science that has transformed the essence of every business and attitude of marketers.

Keywords: SCM concepts, supply chain management, the importance of SCM, SCM in organization

Procedia PDF Downloads 273
5397 The Importance and Feasibility of Hospital Interventions for Patient Aggression and Violence Against Physicians in China: A Delphi Study

Authors: Yuhan Wu, CTB (Kees) Ahaus, Martina Buljac-Samardzic

Abstract:

Patient aggression and violence is a complex occupational hazards for physicians working in hospitals, and it can have multiple severe negative effects for physicians and hospitals. Although there is a range of interventions in the healthcare sector applied in various countries, China lacks a comprehensive set of interventions at the hospital level in this area. Therefore, due to cultural differences, this study investigates whether international interventions are important and feasible in the Chinese cultural context by conducting a Delphi study. Based on a literature search, a list of 47 hospital interventions to prevent and manage patient aggression and violence was constructed, including 8 categories: hospital environment design, access and entrance, staffing and work practice, training and education, leadership and culture, support, during/after-the-event actions, and hospital policy. The list of interventions will be refined, extended and brought back during a three-round Delphi study. The panel consists of 17 Chinese experts, including physicians experiencing patient aggression and violence, hospital management team members, scientists working in this research area, and policymakers in the healthcare sector. In each round, experts will receive the possible interventions with the instruction to indicate the importance and feasibility of each intervention for preventing and managing patient violence and aggression in Chinese hospitals. Experts will be asked about the importance and feasibility of interventions for patient violence and aggression at the same time. This study will exclude or include interventions based on the score of importance. More specifically, an intervention will be included after each round if >80% of the experts judged it as important or very important and excluded if >50% judged an intervention as not or moderately important. The three-round Delphi study will provide a list of included interventions and assess which of the 8 categories of interventions are considered as important. It is expected that this study can bring new ideas and inspiration to Chinese hospitals in the prevention and management of patient aggression and violence.

Keywords: patient aggression and violence, hospital interventions, feasibility, importance

Procedia PDF Downloads 53
5396 Coexisting Pathology of Unruptured Ectopic Pregnancy With Concurrent Ipsilateral Dermoid Cyst: A Rare Occurrence

Authors: Anne Nicole Fuentes

Abstract:

A 29 year old Gravida 1 Para 0 who presented at the hospital with a 5-week history of amenorrhea, abdominal pain and vaginal bleeding. Transvaginal ultrasound revealed 3 pathologic findings : Tuboovarian complex on the right adnexa, a complex mass indicative of an unruptured ectopic pregnancy and right ovarian new growth probably endometrioma. Pelvic laparotomy was done and histopathologic finding revealed tubal pregnancy, right and mature cystic teratoma of the right ovary. This case report demonstrates the importance of considering the coexistence of different gynecologic pathologies in the same patient and clinical importance of an accurate diagnostic evaluation.

Keywords: mature cystic teratoma, ectopic pregnancy, Tuboovarian abscess, bHCG

Procedia PDF Downloads 98
5395 Importance of Human Capital Development and Management in Industries

Authors: Birce Boga Bakirli

Abstract:

In this paper, we investigate ideas on human capital development and management in industries. We structured a model to be able to gather the data from the interviews conducted with worker, specialists and owners of companies. Different aspects of the situation are found in these interviews, and we used the information to model the benefit of the business owners and workers perspectives. These are modelled as a bi-level programming problem. Several instances of the generic cases are solved. The results show the importance of education within and out of the company for workers, and it returns for the company.

Keywords: bi-level programming, corporate strategy, cost tradeoffs, human capital, mixed integer programming, Stackelberg game, supplier relations, strategic planning

Procedia PDF Downloads 319
5394 Each One, Reach One: Peer Mentoring Support for Faculty Women of Color

Authors: Teresa Leary Handy

Abstract:

As awareness of the importance of diversity has increased in society, higher education has also begun to recognize the importance of supporting faculty of color. In the university setting, faculty women of color specifically encounter barriers that impact their level of job satisfaction, retention rates, and pedagogical practices. These barriers and challenges not only undermine faculty diversity efforts but also hinder the ability of colleges and universities to provide a supportive environment that fosters students' academic success and sense of belonging. Faculty who are marginalized and on the periphery in higher education institutions need support so that they can feel confident in building a student’s sense of belonging which can impact a student’s academic success and goal of earning a college degree. This study examined and sought to understand the importance of supporting faculty of color, specifically women faculty of color, and how this type of faculty support can impact student academic success and a student’s sense of belonging. The study furthered original research on strategies to move an institution forward on the equity spectrum to support belonging and inclusions as core culture elements.

Keywords: equity, inclusion, belonging, women, faculty support

Procedia PDF Downloads 34
5393 The Importance of Visual Communication in Artificial Intelligence

Authors: Manjitsingh Rajput

Abstract:

Visual communication plays an important role in artificial intelligence (AI) because it enables machines to understand and interpret visual information, similar to how humans do. This abstract explores the importance of visual communication in AI and emphasizes the importance of various applications such as computer vision, object emphasis recognition, image classification and autonomous systems. In going deeper, with deep learning techniques and neural networks that modify visual understanding, In addition to AI programming, the abstract discusses challenges facing visual interfaces for AI, such as data scarcity, domain optimization, and interpretability. Visual communication and other approaches, such as natural language processing and speech recognition, have also been explored. Overall, this abstract highlights the critical role that visual communication plays in advancing AI capabilities and enabling machines to perceive and understand the world around them. The abstract also explores the integration of visual communication with other modalities like natural language processing and speech recognition, emphasizing the critical role of visual communication in AI capabilities. This methodology explores the importance of visual communication in AI development and implementation, highlighting its potential to enhance the effectiveness and accessibility of AI systems. It provides a comprehensive approach to integrating visual elements into AI systems, making them more user-friendly and efficient. In conclusion, Visual communication is crucial in AI systems for object recognition, facial analysis, and augmented reality, but challenges like data quality, interpretability, and ethics must be addressed. Visual communication enhances user experience, decision-making, accessibility, and collaboration. Developers can integrate visual elements for efficient and accessible AI systems.

Keywords: visual communication AI, computer vision, visual aid in communication, essence of visual communication.

Procedia PDF Downloads 49
5392 Progressive View on Quality Management and Research on Improving Services in Railway Transport

Authors: Eva Nedeliakova, Michal Panak

Abstract:

This article describes the results of research focused on progressive view on quality management. It characterizes a research of improving services in railway transport. Improvement of these services has a strong importance in customer considering on the future use of railway transport. The research provides quality characteristics of transportation, defines critical points of technological processes and specifies the quality model supported by software solution. Main principles and results of the research have a significant importance and belong to numerous initiatives aimed to develop and support railway transport.

Keywords: quality, service, software solution, railway transport

Procedia PDF Downloads 319
5391 Attendance Management System Implementation Using Face Recognition

Authors: Zainab S. Abdullahi, Zakariyya H. Abdullahi, Sahnun Dahiru

Abstract:

Student attendance in schools is a very important aspect in school management record. In recent years, security systems have become one of the most demanding systems in school. Every institute have its own method of taking attendance, many schools in Nigeria use the old fashion way of taking attendance. That is writing the students name and registration number in a paper and submitting it to the lecturer at the end of the lecture which is time-consuming and insecure, because some students can write for their friends without the lecturer’s knowledge. In this paper, we propose a system that takes attendance using face recognition. There are many automatic methods available for this purpose i.e. biometric attendance, but they all waste time, because the students have to follow a queue to put their thumbs on a scanner which is time-consuming. This attendance is recorded by using a camera attached in front of the class room and capturing the student images, detect the faces in the image and compare the detected faces with database and mark the attendance. The principle component analysis was used to recognize the faces detected with a high accuracy rate. The paper reviews the related work in the field of attendance system, then describe the system architecture, software algorithm and result.

Keywords: attendance system, face detection, face recognition, PCA

Procedia PDF Downloads 328
5390 Knowledge Management: Why is So Difficult? From “A Good Idea” to Organizational Contribute

Authors: Lisandro Blas, Héctor Tamanini

Abstract:

From earliest 90 to now, no many companies or organization can “really” implement a knowledge management (KM) system that works (no only viewed from a measurement model, but in this continuity). Which are the reasons of that? Some of the reason maybe could be embedded in how KM is demanded (usefulness, priority, experts, a definition of KM) vs the importance and resources that the organizations afford (budget, responsible of a specific area of KM, intangibility). Many organizations “claim” the importance of Knowledge Management but thhese demands are not reflecting these claims in their future actions. With another’s tools or managements ideas the organizations put the economics and human resources to work. Why it´s not occur in KM? This paper tray to explain some of this reasons and tray to deal with this situations through a survey done in 2011 for a IAPG (Argentinean Institute from Oil & Gas) Congress.

Keywords: knowledge management into organizations, new perspectives, failure in implementation, claim

Procedia PDF Downloads 390
5389 Morphometric Study of the Eggs of Pheasant Eggs Phasianus colchicus (Aves, Phasianidae)

Authors: S. Zenia, A. Menasseria, A. E. Kheidous, F. Larinouna, A. Smai, H. Saadi, F. Haddadj, A. Milla, F. Marniche

Abstract:

Pheasant, is a bird of great ornamental value through the beauty of its form and colors, it is among the most popular birds. The present study was conducted in an experimental breeding. The objective of this work is to know the quality of the eggs of this bird. A total of 938 eggs were collected. To deepen the knowledge about the characteristics of external shell quality, biometric parameters were studied, among them we find the weight with a mean value of 29.2± 2, 24 g. Egg length (mm) and egg width (mm) mean value are respectively 43.01 ± 1,84 cm and 34.05 ± 1,44cm. The volume and shape index of eggs obtained are respectively 25,63±2,88cm3 and 79.00 ± 3%, shell index which recorded an average of 68%. Water loss recorded is 13%. Note that all these parameters and others may influence hatching. The analysis of variance applied for the comparison of egg weight shows that there is no significant difference in the same form factor (P> 0.05). Otherwise, the comparison test used shows a significant difference with P <0.05 for length, width, volume, density, indices of shell and water loss of eggs between the different. Indeed, several factors may explain the difference as the absence of sorting eggs during incubation and other factors that will be exposing later.

Keywords: analysis of variance, egg, hatching, morphometry of eggs Phaisan (Phasianus colchicus.L.)

Procedia PDF Downloads 554
5388 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 333
5387 Digital Privacy Legislation Awareness

Authors: Henry Foulds, Magda Huisman, Gunther R. Drevin

Abstract:

Privacy is regarded as a fundamental human right and it is clear that the study of digital privacy is an important field. Digital privacy is influenced by new and constantly evolving technologies and this continuous change makes it hard to create legislation to protect people’s privacy from being exploited by misuse of these technologies.

This study aims to benefit digital privacy legislation efforts by evaluating the awareness and perceived importance of digital privacy legislation among computer science students. The chosen fixed variables for the population are study year and gamer classification.

The use of location based services in mobile applications and games are a concern for digital privacy. For this reason the study focused on computer science students as they have a high likelihood to use and develop this type of software. Surveys were used to evaluate awareness and perceived importance of digital privacy legislation.

The results of the study show that privacy legislation and awareness of privacy legislation are important to people. The perception of the importance of privacy legislation increases with academic experience. Awareness of privacy legislation increases from non-gamers to pro gamers. 

Keywords: digital privacy, legislation awareness, gaming, privacy legislation

Procedia PDF Downloads 330
5386 Classification of Equations of Motion

Authors: Amritpal Singh Nafria, Rohit Sharma, Md. Shami Ansari

Abstract:

Up to now only five different equations of motion can be derived from velocity time graph without needing to know the normal and frictional forces acting at the point of contact. In this paper we obtained all possible requisite conditions to be considering an equation as an equation of motion. After that we classified equations of motion by considering two equations as fundamental kinematical equations of motion and other three as additional kinematical equations of motion. After deriving these five equations of motion, we examine the easiest way of solving a wide variety of useful numerical problems. At the end of the paper, we discussed the importance and educational benefits of classification of equations of motion.

Keywords: velocity-time graph, fundamental equations, additional equations, requisite conditions, importance and educational benefits

Procedia PDF Downloads 754
5385 Venezuela in the US Oil Geopolitics: An Analysis in the Light of the New Oil Landscape

Authors: William Clavijo, Edmar Almeida

Abstract:

The article analyzes the importance of Venezuela in the US geopolitics of oil considering the new oil landscape. To this end, the importance of oil in the geopolitics of the United States is discussed from the perspective of energy security as well as considering a broader view of national security. Based on this discussion, the relevance of Venezuelan oil reserves on US geopolitical agenda is analyzed. Among the results, the article shows that the transformations in the supply structure of the international oil market during the last decade have allowed the United States to achieve greater levels of independence from oil imports from other producing countries. This new reality has profoundly changed the US interest in Venezuelan oil to a broader subject that involves sensitive issues of its national security agenda.

Keywords: oil geopolitics, Venezuela, United States, energy security, national security

Procedia PDF Downloads 133
5384 South Asia as an Emerging Region of the World in the 21st Century

Authors: Shazia Shinwari

Abstract:

In the 21st century, South Asia is becoming one of the rising sub-regions of the world. In the whole of Asia, South Asia is going to be the center part of opportunities, development, and challenges. The increasing economy and its geopolitical importance are changing the landscape of South Asia. Despite intensifying the opportunities and development, the region is also facing the challenges of security, poverty, and conflicts. It is one of the most populated sub-regions and has many internal conflicts because of which the region remains for a long time a least developed region in the world. But now South Asia is transforming into the developing process and trying to utilize its potentials and to remove the hurdles in the way of development. South Asia is one of the distinctive regions of the world and could play an important role at the global level if the potentials of the region are properly utilized. South Asia is one of the most important regions of the world and assumed more importance after the British withdrawal from the region. Now South Asia is playing an important role in world politics due to its strategic and geographical location. That is why the importance of this region in the international political systems cannot be ignored. Day by day, changes have been taking place in the structure of the global economy, and South Asia could take advantage of these changes to advance as an economic region. For this, South Asia will need to look at its history, and that changes, particularly in the India and Pakistan relations, are necessary for the development of the South Asian region. Despite having challenges in the region, South Asia is also rising as the land of opportunities and development if the potentials of the region are properly utilized and smoothen the way for regional integration.

Keywords: challenges, development, opportunities, South Asia

Procedia PDF Downloads 160