Search results for: smart national identity card (SNIC)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7000

Search results for: smart national identity card (SNIC)

6760 From Tionghoa to Tjina: Historical Tracing on the Identity Politics in Demonization of Ethnic Chinese in Indonesia

Authors: Michael J. Kristiono

Abstract:

This paper attempts to investigate the reasons behind the negative sentiments directed towards Chinese Indonesians from International Relations (IR) perspective. By tracing back the treatment of the New Order government towards ethnic Chinese, it was found that such demonization initially happened due to two politically motivated reasons. Firstly, as part of de-Soekarnoization done by the New Order, the Chinese were outcast because Chinese identity does not conform to the 'Indonesian identity', which was in essence, the Javanese identity. Secondly, the condition reflected the change in Indonesian foreign policy which drifted apart from People’s Republic of China (PRC) as the latter was suspected to be involved in September 30 Movement. Then, this paper argues that due to those reasons, coupled by blatant maltreatment from the New Order Government, Chinese Indonesians were constructed as the Others, that is, as non-Indonesians. Such construct has been deeply embedded such that reconciliation attempts done by the Reformation Era government were not sufficient enough to stop ethnic discrimination towards Chinese Indonesians from happening even until the present.

Keywords: Chinese Indonesians, ethnic discrimination, identity, New Order

Procedia PDF Downloads 306
6759 Digital Recording System Identification Based on Audio File

Authors: Michel Kulhandjian, Dimitris A. Pados

Abstract:

The objective of this work is to develop a theoretical framework for reliable digital recording system identification from digital audio files alone, for forensic purposes. A digital recording system consists of a microphone and a digital sound processing card. We view the cascade as a system of unknown transfer function. We expect same manufacturer and model microphone-sound card combinations to have very similar/near identical transfer functions, bar any unique manufacturing defect. Input voice (or other) signals are modeled as non-stationary processes. The technical problem under consideration becomes blind deconvolution with non-stationary inputs as it manifests itself in the specific application of digital audio recording equipment classification.

Keywords: blind system identification, audio fingerprinting, blind deconvolution, blind dereverberation

Procedia PDF Downloads 280
6758 Preference Aggregation and Mechanism Design in the Smart Grid

Authors: Zaid Jamal Saeed Almahmoud

Abstract:

Smart Grid is the vision of the future power system that combines advanced monitoring and communication technologies to provide energy in a smart, efficient, and user-friendly manner. This proposal considers a demand response model in the Smart Grid based on utility maximization. Given a set of consumers with conflicting preferences in terms of consumption and a utility company that aims to minimize the peak demand and match demand to supply, we study the problem of aggregating these preferences while modelling the problem as a game. We also investigate whether an equilibrium can be reached to maximize the social benefit. Based on such equilibrium, we propose a dynamic pricing heuristic that computes the equilibrium and sets the prices accordingly. The developed approach was analysed theoretically and evaluated experimentally using real appliances data. The results show that our proposed approach achieves a substantial reduction in the overall energy consumption.

Keywords: heuristics, smart grid, aggregation, mechanism design, equilibrium

Procedia PDF Downloads 77
6757 Modeling, Analysis and Control of a Smart Composite Structure

Authors: Nader H. Ghareeb, Mohamed S. Gaith, Sayed M. Soleimani

Abstract:

In modern engineering, weight optimization has a priority during the design of structures. However, optimizing the weight can result in lower stiffness and less internal damping, causing the structure to become excessively prone to vibration. To overcome this problem, active or smart materials are implemented. The coupled electromechanical properties of smart materials, used in the form of piezoelectric ceramics in this work, make these materials well-suited for being implemented as distributed sensors and actuators to control the structural response. The smart structure proposed in this paper is composed of a cantilevered steel beam, an adhesive or bonding layer, and a piezoelectric actuator. The static deflection of the structure is derived as function of the piezoelectric voltage, and the outcome is compared to theoretical and experimental results from literature. The relation between the voltage and the piezoelectric moment at both ends of the actuator is also investigated and a reduced finite element model of the smart structure is created and verified. Finally, a linear controller is implemented and its ability to attenuate the vibration due to the first natural frequency is demonstrated.

Keywords: active linear control, lyapunov stability theorem, piezoelectricity, smart structure, static deflection

Procedia PDF Downloads 364
6756 Modernization Causing Loss of Cultural Identity: A Case Study of Maheshkhali, Bangladesh

Authors: Sarika Siraj

Abstract:

Nothing talks more about the identity of a place than its cultural heritage. More often than ever, it is the architecture of the place that embodies its cultural heritage. With these thoughts in mind, this paper looks closely into the present scene of earthen architecture of Bangladesh and the changes it has been going through due to modernity. Along with the gradual erasure of this sustainable practice, a loss of cultural identity can be observed in present times. This paper intends to examine the loss along with the reasons, taking the village of Maheshkhali, located in south east Bangladesh, as a case study for this research. Based on the empirical findings, this paper will contextualize sustainability as well as discuss western development as a creator of new cultural identities in eastern countries.

Keywords: cultural identity, sustainability, architecture, heritage

Procedia PDF Downloads 49
6755 The Role of the Municipal Executive in the Process of Creating a Smart City

Authors: Jakub Bryla

Abstract:

Cities are now seen as business entities, and their executive body is similar to a chief executive officer. However, it is not enough for the legal system to provide a strong role for the executive branch. It seems that the authority must take the form of a managerial body. This solution answers the demands of smart governance, which in such a regulated relation between the unit head and the city see a guarantee of reliable implementation of the municipal strategy proposed during the recruitment and of the motivation to carry out statutory tasks to communes and their residents.

Keywords: smart cities, local government, executive organ, municipality, city management

Procedia PDF Downloads 53
6754 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 149
6753 The Greek Diaspora in Australia: Identity and Transnational Identity

Authors: Panayiota Romios

Abstract:

As the use of 'diaspora' has proliferated in the last decade, its meaning has been stretched in various directions. Current diaspora frames of identity representation do not adequately capture the complexities of everyday lived experiences of transnational individuals and groups. This paper presents the findings of a qualitative research project conducted in Melbourne, Australia with second generation Greek Australians. It analyses the forms of intercultural identities of the second generation Greek Australians returning to Australia post-2008, after living in Greece for an extended period of time. The discussion highlights key characteristics in relation to diaspora-homeland ties, seeking to denaturalise the commonplace assumptions and imaginations about the cultures and identities of Greek Australian diaspora communities and probe the relevance of identity markers such a country of origin, nationality, ethnicity, ethnic origin, language and mother tongue. The definition of diaspora experienced in this transnational lexicon is interestingly quite distinct from original articulations and also from others returning ‘home’.

Keywords: diaspora, identity, migration, displacement

Procedia PDF Downloads 325
6752 Implementation and Modeling of a Quadrotor

Authors: Ersan Aktas, Eren Turanoğuz

Abstract:

In this study, the quad-electrical rotor driven unmanned aerial vehicle system is designed and modeled using fundamental dynamic equations. After that, mechanical, electronical and control system of the air vehicle are designed and implemented. Brushless motor speeds are altered via electronic speed controllers in order to achieve desired controllability. The vehicle's fundamental Euler angles (i.e., roll angle, pitch angle, and yaw angle) are obtained via AHRS sensor. These angles are provided as an input to the control algorithm that run on soft the processor on the electronic card. The vehicle control algorithm is implemented in the electronic card. Controller is designed and improved for each Euler angles. Finally, flight tests have been performed to observe and improve the flight characteristics.

Keywords: quadrotor, UAS applications, control architectures, PID

Procedia PDF Downloads 332
6751 Fraud Detection in Credit Cards with Machine Learning

Authors: Anjali Chouksey, Riya Nimje, Jahanvi Saraf

Abstract:

Online transactions have increased dramatically in this new ‘social-distancing’ era. With online transactions, Fraud in online payments has also increased significantly. Frauds are a significant problem in various industries like insurance companies, baking, etc. These frauds include leaking sensitive information related to the credit card, which can be easily misused. Due to the government also pushing online transactions, E-commerce is on a boom. But due to increasing frauds in online payments, these E-commerce industries are suffering a great loss of trust from their customers. These companies are finding credit card fraud to be a big problem. People have started using online payment options and thus are becoming easy targets of credit card fraud. In this research paper, we will be discussing machine learning algorithms. We have used a decision tree, XGBOOST, k-nearest neighbour, logistic-regression, random forest, and SVM on a dataset in which there are transactions done online mode using credit cards. We will test all these algorithms for detecting fraud cases using the confusion matrix, F1 score, and calculating the accuracy score for each model to identify which algorithm can be used in detecting frauds.

Keywords: machine learning, fraud detection, artificial intelligence, decision tree, k nearest neighbour, random forest, XGBOOST, logistic regression, support vector machine

Procedia PDF Downloads 116
6750 Walkability and Urban Social Identity

Authors: Reihaneh Rafiemanzelat

Abstract:

One of the most recent fields of investigation in urban issues focuses on the walkability in urban spaces. The paper aims to establish the theoretical relationship between the people's link with definite urban public spaces and the social identity processes derived from the relation with these places. The theoretical aspects which are examined for this purpose are: the concept of walkability and its developments and the social identity theories derived from walkable spaces. In fact, the paper presents the main results obtained from an empirical investigation which concern to the genesis of urban social identity in particular street as one of the main elements of public spaces in cities. İsmet İnönü Blvd which known as Salamis Street in Famagusta, North Cyprus is one of the main street in city whit high level of physical and social activities all the time. The urban social identity of users was analyzed, focusing on three main factors: walkability of space, social identification, and image of the space. These three factors were analyzed in relation to a series of items in the initial questionnaire, evaluation of existing natural resources, and environmental attitudes.

Keywords: walkability, urban public space, pedestrian, social activity, social identity

Procedia PDF Downloads 402
6749 Evaluating India's Smart Cities against the Sustainable Development Goals

Authors: Suneet Jagdev

Abstract:

17 Sustainable Development Goals were adopted by the world leaders in September 2015 at the United Nations Sustainable Development Summit. These goals were adopted by UN member states to promote prosperity, health and human rights while protecting the planet. Around the same time, the Government of India launched the Smart City Initiative to speed up development of state of the art infrastructure and services in 100 cities with a focus on sustainable and inclusive development. These cities are meant to become role models for other cities in India and promote sustainable regional development. This paper examines goals set under the Smart City Initiative and evaluates them in terms of the Sustainable Development Goals, using case studies of selected Smart Cities in India. The study concludes that most Smart City projects at present actually consist of individual solutions to individual problems identified in a community rather than comprehensive models for complex issues in cities across India. Systematic, logical and comparative analysis of important literature and data has been done, collected from government sources, government papers, research papers by various experts on the topic, and results from some online surveys. Case studies have been used for a graphical analysis highlighting the issues of migration, ecology, economy and social equity in these Smart Cities.

Keywords: housing, migration, smart cities, sustainable development goals, urban infrastructure

Procedia PDF Downloads 381
6748 Examining Cyber Crime and Its Impacts on E-Banking in Nigeria

Authors: Auwal Nata'ala

Abstract:

The Information and Communication Technology (ICT) has had impacts in almost every area human endeavor. From business, industries, banks to none profit organizations. ICT has simplified business process such as sorting, summarizing, coding, updating and generating a report in a real-time processing mode. However, the use of these ICT facilities such as computer and internet has also brought unintended consequences of criminal activities such as spamming, credit card frauds, ATM frauds, phishing, identity theft, denial of services and other related cyber crimes. This study sought to examined cyber-crime and its impact on the banking institution in Nigeria. It also examined the existing policy framework and assessed the success of the institutional countermeasures in combating cyber crime in the banking industry. This paper X-ray’s cyber crimes, policies issues and provides insight from a Nigeria perspective.

Keywords: cyber crimes, e-banking, policies, ICT

Procedia PDF Downloads 388
6747 A Survey on Intelligent Connected-Vehicle Applications Based on Intercommunication Techniques in Smart Cities

Authors: B. Karabuluter, O. Karaduman

Abstract:

Connected-Vehicles consists of intelligent vehicles, each of which can communicate with each other. Smart Cities are the most prominent application area of intelligent vehicles that can communicate with each other. The most important goal that is desired to be realized in Smart Cities planned for facilitating people's lives is to make transportation more comfortable and safe with intelligent/autonomous/driverless vehicles communicating with each other. In order to ensure these, the city must have communication infrastructure in the first place, and the vehicles must have the features to communicate with this infrastructure and with each other. In this context, intelligent transport studies to solve all transportation and traffic problems in classical cities continue to increase rapidly. In this study, current connected-vehicle applications developed for smart cities are considered in terms of communication techniques, vehicular networking, IoT, urban transportation implementations, intelligent traffic management, road safety, self driving. Taxonomies and assessments performed in the work show the trend of studies in inter-vehicle communication systems in smart cities and they are contributing to by ensuring that the requirements in this area are revealed.

Keywords: smart city, connected vehicles, infrastructures, VANET, wireless communication, intelligent traffic management

Procedia PDF Downloads 497
6746 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 69
6745 A Comparative Study on the Identity Formation among Pre-Teens Exposed to the Different Types of Parental Regulation on Social Media Use

Authors: Jehnyne Lalaine Bautista, Marquise Baldemor, Ciara Mendoza

Abstract:

This study is an attempt to investigate the extent to which pre-teens engage in social media, the effects of social media use on the different facets of their identity development such as physical, social, cognitive, aspirations, and personality, as well as the effects of parental regulation on their identity formation. Twelve Filipino children, ages from 9-12 years old and are either regulated, semi-regulated, or unregulated on social media use, participated in this study along with their parent or guardian. The data were gathered through in-depth interviews with the participants and were analyzed through the use of thematic analysis. Results show that despite accessing similar social media applications, the effects of these on children from different types of parental regulation vary since they have different levels of exposure to social media content. Those who have parents with high parental regulation on the use of social media tend to perform better in school, to find time for extracurricular activities, and to develop positive identity formation. The results of this study suggest that parental regulation on social media use has the positive influence on the identity development of children while there are dangers to unregulated use of social media.

Keywords: identity formation, parental regulation, pre-teens, social media

Procedia PDF Downloads 360
6744 Smart Forms and Intelligent Transportation Network Patterns, an Integrated Spatial Approach to Smart Cities and Intelligent Transport Systems in India Cities

Authors: Geetanjli Rani

Abstract:

The physical forms and network pattern of the city is expected to be enhanced with the advancement of technology. Reason being, the era of virtualisation and digital urban realm convergence with physical development. By means of comparative Spatial graphics and visuals of cities, the present paper attempts to revisit the very base of efficient physical forms and patterns to sync the emergence of virtual activities. Thus, the present approach to integrate spatial Smartness of Cities and Intelligent Transportation Systems is a brief assessment of smart forms and intelligent transportation network pattern to the dualism of physical and virtual urban activities. Finally, the research brings out that the grid iron pattern, radial, ring-radial, orbital etc. stands to be more efficient, effective and economical transit friendly for users, resource optimisation as well as compact urban and regional systems. Moreover, this paper concludes that the idea of flow and contiguity hidden in such smart forms and intelligent transportation network pattern suits to layering, deployment, installation and development of Intelligent Transportation Systems of Smart Cities such as infrastructure, facilities and services.

Keywords: smart form, smart infrastructure, intelligent transportation network pattern, physical and virtual integration

Procedia PDF Downloads 122
6743 Smart Cities’ Sustainable Modular Houses Architecture

Authors: Khaled Elbehiery, Hussam Elbehiery

Abstract:

Smart cities are a framework of technologies along with sustainable infrastructure to provide their citizens an improved quality of life, safer environment, affordability, and more, which in turn helps with the society's economic growth. The proposed research will focus on the primary building block of the smart city; the infrastructure of the house itself. The traditional method of building houses has been, for a long time, nothing but a costly manufacturing process, and consequently, buying a house becomes not an option for everyone anymore. The smart cities' Modular Houses are not using traditional building construction materials; the design reduces the common lengthy construction times and associated high costs. The Modular Houses are technological homes, low-cost and customizable based on a family's requirements. In addition, the Modular Houses are environmentally friendly and healthy enough to assist with the pandemic situation.

Keywords: smart cities, modular houses, single-unit property, multi-unit property, mobility features, chain-supply, livable environment, carbon footprint

Procedia PDF Downloads 93
6742 Exploring the Formation of High School Students’ Science Identity: A Qualitative Study

Authors: Sitong. Chen, Bing Wei

Abstract:

As a sociocultural concept, identity has increasingly gained attention in educational research, and the notion of students’ science identity has been widely discussed in the field of science education. Science identity was proved to be a key indicator of students’ learning engagement, persistence, and career intentions in science-related and STEM fields. Thus, a great deal of educational effort has been made to promote students’ science identity in former studies. However, most of this research was focused on students’ identity development during undergraduate and graduate periods, except for a few studies exploring high school students’ identity formation. High school has been argued as a crucial period for promoting science identity. This study applied a qualitative method to explore how high school students have come to form their science identities in previous learning and living experiences. Semi-structured interviews were conducted with 8 newly enrolled undergraduate students majoring in science-related fields. As suggested by the narrative data from interviews, students’ formation of science identities was driven by their five interrelated experiences: growing self-recognition as a science person, achieving success in learning science, getting recognized by influential others, being interested in science subjects, and informal science experiences in various contexts. Specifically, students’ success and achievement in science learning could facilitate their interest in science subjects and others’ recognition. And their informal experiences could enhance their interest and performance in formal science learning. Furthermore, students’ success and interest in science, as well as recognition from others together, contribute to their self-recognition. Based on the results of this study, some practical implications were provided for science teachers and researchers in enhancing high school students’ science identities.

Keywords: high school students, identity formation, learning experiences, living experiences, science identity

Procedia PDF Downloads 21
6741 The Disposable Identities; Enabling Trust-by-Design to Build Sustainable Data-Driven Value

Authors: Lorna Goulden, Kai M. Hermsen, Jari Isohanni, Mirko Ross, Jef Vanbockryck

Abstract:

This article introduces disposable identities, with reference use cases and explores possible technical approaches. The proposed approach, when fully developed as an open-source toolkit, enables developers of mobile or web apps to employ a self-sovereign identity and data privacy framework, in order to rebuild trust in digital services by providing greater transparency, decentralized control, and GDPR compliance. With a user interface for the management of self-sovereign identity, digital authorizations, and associated data-driven transactions, the advantage of Disposable Identities is that they may also contain verifiable data such as the owner’s photograph, official or even biometric identifiers for more proactive prevention of identity abuse. These Disposable Identities designed for decentralized privacy management can also be time, purpose and context-bound through a secure digital contract; with verification functionalities based on tamper-proof technology.

Keywords: dentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRdentity, trust, self-sovereign, disposable identity, privacy toolkit, decentralised identity, verifiable credential, cybersecurity, data driven business, PETs, GDPRI

Procedia PDF Downloads 192
6740 Hui as Religious over Ethnic Identity: A Case Study of Muslim Ethnic Interaction in Central Northwest China

Authors: Hugh Battye

Abstract:

In recent years, Muslim identity in China has strengthened against the backdrop of a worldwide Islamic revival. One discussion arising from this has been focused around the Hui, an ethnicity created by the Communist government in the 1950s covering the Chinese speaking 'Sino-Muslims' as opposed to those with their own language. While the term Hui in Chinese has traditionally meant 'Muslim', the strengthening of Hui identity in recent decades has led to a debate among scholars as to whether this identity is primarily ethnically or religiously driven. This article looks at the case of a mixed ethnic community in rural Gansu Province, Central Northwest China, which not only contains the official Hui ethnicity but also members of the smaller Muslim Salar and Bonan minority groups. In analyzing the close interaction between these groups, the paper will argue that, despite government attempts to promote the Hui as an ethnicity within its modern ethnic paradigm, in rural Gansu and the general region, Hui is still essentially seen as a religious identity. Having provided an overview of the historical evolution of the Hui ethnonym in China and presented the views of some of the important scholars involved in the discussion, the paper will then offer its findings based on participant observation and survey work in Gansu. The results will show that, firstly, for the local Muslims, religious identity clearly dominates ethnic identity. On the ground, the term Hui continues to be used as a catch-all term for Muslims, whether they belong to the official 'Hui' nationality or not, and against this backdrop, the ethnic importance of being 'Hui', 'Bonan' or 'Salar' within the Muslim community itself is by contrast minimal. Secondly, however, this local Muslim solidarity is not at present pointing towards some kind of national pan-ethnic Islamic movement that could potentially set itself up in opposition to the Chinese government; rather it is better seen as part of an ongoing negotiation by local Muslims with the state in the context of its ascribed ethnic categories. The findings of this study in a region where many of the Muslims are more conservative in their beliefs is not necessarily replicated in other contexts, such as in urban areas and in eastern and southern China, and hence reification of the term Hui as one idea extending all across China should be avoided, whether in terms of a united religious 'ummah' or of a real or imagined 'ethnic group.' Rather, this localized case study seeks to demonstrate ways in which Muslims of rural Central Northwest China are 'being Hui,' as a contribution to the broader discussion on what it means to be Muslim and Chinese in the reform era.

Keywords: China, ethnicity, Hui, identity, Muslims

Procedia PDF Downloads 93
6739 Enhancing Visual Corporate Identity on Festive Money Packets Design with Cultural Symbolisms

Authors: Noranis Ismail, Shamsul H. A. Rahman

Abstract:

The objective of this research is to accentuate the importance of Visual Corporate Identity by utilizing Malay motifs amalgamated with Malay proverbs to enhance the corporate brand of The Design School (TDS) of Taylor’s University. The researchers aim to manipulate festive money packet as a mean to communicate to the audience by using non-verbal visual cues such as colour, languages, and symbols that reflect styles and cultural heritage. The paper concluded that it is possible to utilize Hari Raya packet as a medium for creative expressions by creating high-impact design through the symbolism of selected Malay proverbs and traditional Malay motifs to enhance TDS corporate visual identity. It also provides a vital contribution to other organizations to understand an integral part of corporate visual identity in heightening corporate brand by communicating indirectly to its stakeholders using visual mnemonic and cultural heritage.

Keywords: corporate branding, cultural cues, Malay culture, visual identity

Procedia PDF Downloads 397
6738 Development and Validation of Thermal Stability in Complex System ABDM has two ASIC by NISA and COMSOL Tools

Authors: A. Oukaira, A. Lakhssassi, O. Ettahri

Abstract:

To make a good thermal management in an ABDM (Adapter Board Detector Module) card, we must first control temperature and its gradient from the first step in the design of integrated circuits ASIC of our complex system. In this paper, our main goal is to develop and validate the thermal stability in order to get an idea of the flow of heat around the ASIC in transient and thus address the thermal issues for integrated circuits at the ABDM card. However, we need heat sources simulations for ABDM card to establish its thermal mapping. This led us to perform simulations at each ASIC that will allow us to understand the thermal ABDM map and find real solutions for each one of our complex system that contains 36 ABDM map, taking into account the different layers around ASIC. To do a transient simulation under NISA, we had to build a function of power modulation in time TIMEAMP. The maximum power generated in the ASIC is 0.6 W. We divided the power uniformly in the volume of the ASIC. This power was applied for 5 seconds to visualize the evolution and distribution of heat around the ASIC. The DBC (Dirichlet Boundary conditions) method was applied around the ABDM at 25°C and just after these simulations in NISA tool we will validate them by COMSOL tool, wich is a numerical calculation software for a modular finite element for modeling a wide variety of physical phenomena characterizing a real problem. It will also be a design tool with its ability to handle 3D geometries for complex systems.

Keywords: ABDM, APD, thermal mapping, complex system

Procedia PDF Downloads 242
6737 A Unique Immunization Card for Early Detection of Retinoblastoma

Authors: Hiranmoyee Das

Abstract:

Aim. Due to late presentation and delayed diagnosis mortality rate of retinoblastoma is more than 50% in developing counties. So to facilitate the diagnosis, to decrease the disease and treatment burden and to increase the disease survival rate, an attempt was made for early diagnosis of Retinoblastoma by including fundus examination in routine immunization programs. Methods- A unique immunization card is followed in a tertiary health care center where examination of pupillary reflex is made mandatory in each visit of the child for routine immunization. In case of any abnormality, the child is referred to the ophthalmology department. Conclusion- Early detection is the key in the management of retinoblastoma. Every child is brought to the health care system at least five times before the age of 2 years for routine immunization. We should not miss this golden opportunity for early detection of retinoblastoma.

Keywords: retinoblastoma, immunization, unique, early

Procedia PDF Downloads 166
6736 Restoration of Digital Design Using Row and Column Major Parsing Technique from the Old/Used Jacquard Punched Cards

Authors: R. Kumaravelu, S. Poornima, Sunil Kumar Kashyap

Abstract:

The optimized and digitalized restoration of the information from the old and used manual jacquard punched card in textile industry is referred to as Jacquard Punch Card (JPC) reader. In this paper, we present a novel design and development of photo electronics based system for reading old and used punched cards and storing its binary information for transforming them into an effective image file format. In our textile industry the jacquard punched cards holes diameters having the sizes of 3mm, 5mm and 5.5mm pitch. Before the adaptation of computing systems in the field of textile industry those punched cards were prepared manually without digital design source, but those punched cards are having rich woven designs. Now, the idea is to retrieve binary information from the jacquard punched cards and store them in digital (Non-Graphics) format before processing it. After processing the digital format (Non-Graphics) it is converted into an effective image file format through either by Row major or Column major parsing technique.To accomplish these activities, an embedded system based device and software integration is developed. As part of the test and trial activity the device was tested and installed for industrial service at Weavers Service Centre, Kanchipuram, Tamilnadu in India.

Keywords: file system, SPI. UART, ARM controller, jacquard, punched card, photo LED, photo diode

Procedia PDF Downloads 140
6735 A Product-Specific/Unobservable Approach to Segmentation for a Value Expressive Credit Card Service

Authors: Manfred F. Maute, Olga Naumenko, Raymond T. Kong

Abstract:

Using data from a nationally representative financial panel of Canadian households, this study develops a psychographic segmentation of the customers of a value-expressive credit card service and tests for effects on relational response differences. The variety of segments elicited by agglomerative and k means clustering and the familiar profiles of individual clusters suggest that the face validity of the psychographic segmentation was quite high. Segmentation had a significant effect on customer satisfaction and relationship depth. However, when socio-demographic characteristics like household size and income were accounted for in the psychographic segmentation, the effect on relational response differences was magnified threefold. Implications for the segmentation of financial services markets are considered.

Keywords: customer satisfaction, financial services, psychographics, response differences, segmentation

Procedia PDF Downloads 303
6734 The Way Digitized Lectures and Film Presence Coaching Impact Academic Identity: An Expert Facilitated Participatory Action Research Case Study

Authors: Amanda Burrell, Tonia Gary, David Wright, Kumara Ward

Abstract:

This paper explores the concept of academic identity as it relates to the lecture, in particular, the digitized lecture delivered to a camera, in the absence of a student audience. Many academics have the performance aspect of the role thrust upon them with little or no training. For the purpose of this study, we look at the performance of the academic identity and examine tailored film presence coaching for its contributions toward academic identity, specifically in relation to feelings of self-confidence and diminishment of discomfort or stage fright. The case is articulated through the lens of scholar-practitioners, using expert facilitated participatory action research. It demonstrates in our sample of experienced academics, all reported some feelings of uncertainty about presenting lectures to camera prior to coaching. We share how power poses and reframing fear, produced improvements in the ease and competency of all participants. We share exactly how this insight could be adapted for self-coaching by any academic when called to present to a camera and consider the relationship between this and academic identity.

Keywords: academic identity, digitized lecture, embodied learning, performance coaching

Procedia PDF Downloads 312
6733 The Influence of Superordinate Identity and Group Size on Group Decision Making through Discussion

Authors: Lin Peng, Jin Zhang, Yuanyuan Miao, Quanquan Zheng

Abstract:

Group discussion and group decision-making have long been a topic of research interest. Traditional research on group decision making typically focuses on the strategies or functional models of combining members’ preferences to reach an optimal consensus. In this research, we want to explore natural process group decision making through discussion and examine relevant, influential factors--common superordinate identity shared by group and size of the groups. We manipulated the social identity of the groups into either a shared superordinate identity or different subgroup identities. We also manipulated the size to make it either a big (6-8 person) group or small group (3-person group). Using experimental methods, we found members of a superordinate identity group tend to modify more of their own opinions through the discussion, compared to those only identifying with their subgroups. Besides, members of superordinate identity groups also formed stronger identification with group decision--the results of group discussion than their subgroup peers. We also found higher member modification in bigger groups compared to smaller groups. Evaluations of decisions before and after discussion as well as group decisions are strongly linked to group identity, as members of superordinate group feel more confident and satisfied with both the results and decision-making process. Members’ opinions are more similar and homogeneous in smaller groups compared to bigger groups. This research have many implications for further research and applied behaviors in organizations.

Keywords: group decision making, group size, identification, modification, superordinate identity

Procedia PDF Downloads 282
6732 Approximation Algorithms for Peak-Demand Reduction

Authors: Zaid Jamal Saeed Almahmoud

Abstract:

Smart grid is emerging as the future power grid, with smart techniques to optimize power consumption and electricity generation. Minimizing peak power consumption under a fixed delay requirement is a significant problem in the smart grid.For this problem, all appliances must be scheduled within a given finite time duration. We consider the problem of minimizing the peak demand under appliances constraints by scheduling power jobs with uniform release dates and deadlines. As the problem is known to be NP-hard, we analyze the performance of a version of the natural greedy heuristic for solving this problem. Our theoretical analysis and experimental results show that the proposed heuristic outperforms existing methods by providing a better approximation to the optimal solution.

Keywords: peak demand scheduling, approximation algorithms, smart grid, heuristics

Procedia PDF Downloads 65
6731 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 727