Search results for: desktop application
2972 Development and Usability Assessment of a Connected Resistance Exercise Band Application for Strength-Monitoring
Authors: J. A. Batsis, G. G. Boateng, L. M. Seo, C. L. Petersen, K. L. Fortuna, E. V. Wechsler, R. J. Peterson, S. B. Cook, D. Pidgeon, R. S. Dokko, R. J. Halter, D. F. Kotz
Abstract:
Resistance exercise bands are a core component of any physical activity strengthening program. Strength training can mitigate the development of sarcopenia, the loss of muscle mass or strength and function with aging. Yet, the adherence of such behavioral exercise strategies in a home-based setting are fraught with issues of monitoring and compliance. Our group developed a Bluetooth-enabled resistance exercise band capable of transmitting data to an open-source platform. In this work, we developed an application to capture this information in real-time, and conducted three usability studies in two mixed-aged groups of participants (n=6 each) and a group of older adults with obesity participating in a weight-loss intervention (n=20). The system was favorable, acceptable and provided iterative information that could assist in future deployment on ubiquitous platforms. Our formative work provides the foundation to deliver home-based monitoring interventions in a high-risk, older adult population.
Keywords: Application, mHealth, older adult, resistance exercise band, sarcopenia.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7582971 Perception-Oriented Model Driven Development for Designing Data Acquisition Process in Wireless Sensor Networks
Authors: K. Indra Gandhi
Abstract:
Wireless Sensor Networks (WSNs) have always been characterized for application-specific sensing, relaying and collection of information for further analysis. However, software development was not considered as a separate entity in this process of data collection which has posed severe limitations on the software development for WSN. Software development for WSN is a complex process since the components involved are data-driven, network-driven and application-driven in nature. This implies that there is a tremendous need for the separation of concern from the software development perspective. A layered approach for developing data acquisition design based on Model Driven Development (MDD) has been proposed as the sensed data collection process itself varies depending upon the application taken into consideration. This work focuses on the layered view of the data acquisition process so as to ease the software point of development. A metamodel has been proposed that enables reusability and realization of the software development as an adaptable component for WSN systems. Further, observing users perception indicates that proposed model helps in improving the programmer's productivity by realizing the collaborative system involved.
Keywords: Model-driven development, wireless sensor networks, data acquisition, separation of concern, layered design.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9572970 Magnesium Foliar Application and Phosphorien Soil Inoculation Positively Affect Pisum sativum L. Plants Grown on Sandy Calcareous Soil
Authors: Saad M. Howladar, Ashraf Sh. Osman, Mostafa M. Rady, Hassan S. Al-Zahrani
Abstract:
The effects of soil inoculation with phosphorien-containing phosphate-dissolving bacteria (PDB) and/or magnesium (Mg) foliar application at the rates of 0, 0.5 and 1mM on growth, green pod and seed yields, and chemical constituents of Pisum sativum L. grown on a sandy calcareous soil were investigated. Results indicated that PDB and/or Mg significantly increased shoot length, number of branches plant–1, total leaf area plant–1 and canopy dry weight plant–1, leaf contents of pigments, soluble sugars, free proline, nitrogen, phosphorus, potassium, magnesium, and calcium, and Ca/Na ratio, while leaf Na content was reduced. PDB and/or Mg also increased green pod and seed yields. We concluded that PDB and Mg have pronounced positive effects on Pisum sativum L. plants grown on sandy calcareous soil. PDB and Mg, therefore, have the potential to be applied for various crops to overcome the adverse effects of the newly-reclaimed sandy calcareous soils.
Keywords: Bio-P-fertilizer, Mg foliar application, Newly-reclaimed soils, Pisum sativum L.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29302969 Performance Study on Audio Codec and Session Transfer of Open Source VoIP applications
Authors: Cheng-Suan Lee, Khong Neng Choong, So Gean Koh, Chee Onn Chow, Mazlan Abbas
Abstract:
Voice over Internet Protocol (VoIP) application or commonly known as softphone has been developing an increasingly large market in today-s telecommunication world and the trend is expected to continue with the enhancement of additional features. This includes leveraging on the existing presence services, location and contextual information to enable more ubiquitous and seamless communications. In this paper, we discuss the concept of seamless session transfer for real-time application such as VoIP and IPTV, and our prototype implementation of such concept on a selected open source VoIP application. The first part of this paper is about conducting performance evaluation and assessments across some commonly found open source VoIP applications that are Ekiga, Kphone, Linphone and Twinkle so as to identify one of them for implementing our design of seamless session transfer. Subjective testing has been carried out to evaluate the audio performance on these VoIP applications and rank them according to their Mean Opinion Score (MOS) results. The second part of this paper is to discuss on the performance evaluations of our prototype implementation of session transfer using Linphone.
Keywords: audio codec, softphone, session transfer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16862968 Optimizing Allocation of Two Dimensional Irregular Shapes using an Agent Based Approach
Authors: Ramin Halavati, Saeed B. Shouraki, Mahdieh Noroozian, Saman H. Zadeh
Abstract:
Packing problems arise in a wide variety of application areas. The basic problem is that of determining an efficient arrangement of different objects in a region without any overlap and with minimal wasted gap between shapes. This paper presents a novel population based approach for optimizing arrangement of irregular shapes. In this approach, each shape is coded as an agent and the agents' reproductions and grouping policies results in arrangements of the objects in positions with least wasted area between them. The approach is implemented in an application for cutting sheets and test results on several problems from literature are presented.Keywords: Optimization, Bin Packing, Agent Based Systems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24932967 Preparation of Porous Metal Membrane by Thermal Annealing for Thin Film Encapsulation
Authors: Jaibir Sharma, Lee JaeWung, Merugu Srinivas, Navab Singh
Abstract:
This paper presents thermal annealing de-wetting technique for the preparation of porous metal membrane for Thin Film Encapsulation (TFE) application. Thermal annealing de-wetting experimental results reveal that pore size formation in porous metal membrane depend upon i.e. 1. The substrate at which metal is deposited, 2. Melting point of metal used for porous metal cap layer membrane formation, 3. Thickness of metal used for cap layer, 4. Temperature used for formation of porous metal membrane. In order to demonstrate this technique, Silver (Ag) was used as a metal for preparation of porous metal membrane on amorphous silicon (a-Si) and silicon oxide. The annealing of the silver thin film of various thicknesses was performed at different temperature. Pores in porous silver film were analyzed using Scanning Electron Microscope (SEM). In order to check the usefulness of porous metal film for TFE application, the porous silver film prepared on amorphous silicon (a- Si) and silicon oxide was released using XeF2 and VHF, respectively. Finally, guide line and structures are suggested to use this porous membrane for robust TFE application.Keywords: De-wetting, thermal annealing, metal, melting point, porous.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20682966 Application of Seismic Wave Method in Early Estimation of Wencheng Earthquake
Authors: Wenlong Liu, Yucheng Liu
Abstract:
This paper introduces the application of seismic wave method in earthquake prediction and early estimation. The advantages of the seismic wave method over the traditional earthquake prediction method are demonstrated. An example is presented in this study to show the accuracy and efficiency of using the seismic wave method in predicting a medium-sized earthquake swarm occurred in Wencheng, Zhejiang, China. By applying this method, correct predictions were made on the day after this earthquake swarm started and the day the maximum earthquake occurred, which provided scientific bases for governmental decision-making.
Keywords: earthquake prediction, earthquake swarm, seismicactivity method, seismic wave method, Wencheng earthquake
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16562965 Towards the Use of Renewable Energy Sources in the Home
Authors: Adriana Alexandru, Elena Jitaru, Rayner Mayer
Abstract:
The paper presents the results of the European EIE project “Realising the potential for small scale renewable energy sources in the home – Kyotointhehome". The project's global aim is to inform and educate teachers, students and their families so that they can realise the need and can assess the potential for energy efficiency (EE) measures and renewable energy sources (RES) in their homes. The project resources were translated and trialled by 16 partners in 10 European countries. A web-based methodology which will enable families to assess how RES can be incorporated into energy efficient homes was accomplished. The web application “KYOTOINHOME" will help the citizens to identify what they can do to help their community meet the Kyoto target for greenhouse gas reductions and prevent global warming. This application provides useful information on how the citizens can use renewable energy sources in their home to provide space heating and cooling, hot water and electricity. A methodology for assessing heat loss in a dwelling and application of heat pump system was elaborated and will be implemented this year. For schools, we developed a set of practical activities concerned with preventing climate change through using renewable energy sources. Complementary resources will also developed in the Romanian research project “Romania Contribution to the European Targets Regarding the Development of Renewable Energy Sources" - PROMES.Keywords: Education, energy policy, Internet, renewable energy sources.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17062964 Design and Development of Ferroelectric Material for Microstrip Patch Array Antenna
Abstract:
This paper presents the utilizing of ferroelectric material on antenna application. There are two different ferroelectric had been used on the proposed antennas which include of Barium Strontium Titanate (BST) and Bismuth Titanate (BiT), suitable for Access Points operating in the WLAN IEEE 802.11 b/g and WiMAX IEEE 802.16 within the range of 2.3 GHz to 2.5 GHz application. BST, which had been tested to own a dielectric constant of εr = 15 while BiT has a dielectric constant that higher than BST which is εr = 21 and both materials are in rectangular shaped. The influence of various parameters on antenna characteristics were investigated extensively using commercial electromagnetic simulations software by Communication Simulation Technology (CST). From theoretical analysis and simulation results, it was demonstrated that ferroelectric material used have not only improved the directive emission but also enhanced the radiation efficiency.Keywords: Ferroelectric material, WLAN, WiMAX, dielectric constant
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20112963 Illumination Invariant Face Recognition using Supervised and Unsupervised Learning Algorithms
Authors: Shashank N. Mathur, Anil K. Ahlawat, Virendra P. Vishwakarma
Abstract:
In this paper, a comparative study of application of supervised and unsupervised learning algorithms on illumination invariant face recognition has been carried out. The supervised learning has been carried out with the help of using a bi-layered artificial neural network having one input, two hidden and one output layer. The gradient descent with momentum and adaptive learning rate back propagation learning algorithm has been used to implement the supervised learning in a way that both the inputs and corresponding outputs are provided at the time of training the network, thus here is an inherent clustering and optimized learning of weights which provide us with efficient results.. The unsupervised learning has been implemented with the help of a modified Counterpropagation network. The Counterpropagation network involves the process of clustering followed by application of Outstar rule to obtain the recognized face. The face recognition system has been developed for recognizing faces which have varying illumination intensities, where the database images vary in lighting with respect to angle of illumination with horizontal and vertical planes. The supervised and unsupervised learning algorithms have been implemented and have been tested exhaustively, with and without application of histogram equalization to get efficient results.Keywords: Artificial Neural Networks, back propagation, Counterpropagation networks, face recognition, learning algorithms.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16862962 Fortification for P2P Grid Computing Used for Resource Discovery
Authors: Bhawneet Singh Marwah, Rishabh Rastogi, Shinon Kochar
Abstract:
Grid computing provides an effective infrastructure for massive computation among flexible and dynamic collection of individual system for resource discovery. The major challenge for grid computing is to prevent breaches and secure the data from trespassers. To overcome such conflicts a semantic approach can be designed which will filter the access requests of peers by checking the resource description specifying the data and the metadata as factual statements. Between every node in the grid a semantic firewall as a middleware will be present The intruder will be required to present an application specifying there needs to the firewall and hence accordingly the system will grant or deny the application request.
Keywords: Grid Computing, Metadata, Semantic, Peers, Resource Discovery, Firewall.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15662961 Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles
Authors: R. Mkahl, A. Nait-Sidi-Moh, M. Wack
Abstract:
Batteries of electric vehicles (BEV) are becoming more attractive with the advancement of new battery technologies and promotion of electric vehicles. BEV batteries are recharged on board vehicles using either the grid (G2V for Grid to Vehicle) or renewable energies in a stand-alone application (H2V for Home to Vehicle). This paper deals with the modeling, sizing and control of a photovoltaic stand-alone application that can charge the BEV at home. The modeling approach and developed mathematical models describing the system components are detailed. Simulation and experimental results are presented and commented.
Keywords: Electric vehicles, photovoltaic energy, lead-acid batteries, charging process, modeling, simulation, experimental tests.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41992960 Assessing and Managing Intellectual Capital to Support Open Innovation Paradigm
Authors: Michele Grimaldi, Livio Cricelli, Francesco Rogo, Alessia Iannarelli
Abstract:
The objective of this paper is to support the application of Open Innovation practices in firms and organizations by the assessment and management of Intellectual Capital. Intellectual Capital constituents are analyzed in order to verify their capability of acting as key drivers of Open Innovation processes and, therefore, of creating value. A methodology is defined to settle a procedure which helps to select the most relevant Intellectual Capital value drivers and to provide Communities of Innovation with strategic and managerial guidelines in sustaining Open Innovation paradigm. An application of the methodology is developed within a specifically addressed project and its results are hereafter examined.
Keywords: Assessment, Community of Innovation, Intellectual Capital, Management, Open Innovation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17872959 EDULOGIC+ - Knowledge Management through Data Analysis in Education
Authors: Alok Sharma, Dr. Harvinder S. Saini, Raviteja Tiruvury
Abstract:
This paper outlines the application of Knowledge Management (KM) principles in the context of Educational institutions. The paper caters to the needs of the engineering institutions for imparting quality education by delineating the instruction delivery process in a highly structured, controlled and quantified manner. This is done using a software tool EDULOGIC+. The central idea has been based on the engineering education pattern in Indian Universities/ Institutions. The data, contents and results produced over contiguous years build the necessary ground for managing the related accumulated knowledge. Application of KM has been explained using certain examples of data analysis and knowledge extraction.Keywords: Education software system, information system, knowledge management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17522958 Requirements Management as a Competitive Factor in the it Mid Tier Business Concerning the Implementation of Erp-Software
Authors: Oliver Grün
Abstract:
The success of IT-projects concerning the implementation of business application Software is strongly depending upon the application of an efficient requirements management, to understand the business requirements and to realize them in the IT. But in fact, the Potentials of the requirements management are not fully exhausted by small and medium sized enterprises (SME) of the IT sector. To work out recommendations for action and furthermore a possible solution, allowing a better exhaust of potentials, it shall be examined in a scientific research project, which problems occur out of which causes. In the same place, the storage of knowledge from the requirements management, and its later reuse are important, to achieve sustainable improvements of the competitive of the IT-SMEs. Requirements Engineering is one of the most important topics in Product Management for Software to achieve the goal of optimizing the success of the software product.Keywords: ERP, Requirements Management
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11392957 Thermal Characterization of Graphene Oxide-Epoxy Nanocomposites Produced by Aqueous Emulsion
Authors: H. A. Brandão Cordeiro, M. G. Bocardo, N. C. Penteado, V. T. de Moraes, S. M. Giampietri Lebrão, G. W. Lebrão
Abstract:
The present study desired to obtain a nanocomposite of epoxy resin reinforced with graphene oxide (OG), for aerospace application, produced by aqueous emulsion. It was obtained proof bodies with 0.00 wt%, 0.10 wt%, 0.25 wt% and 0.50 wt% in weight of nanoparticles, to check the influence of it in the final quality of the obtained product. The validation of the results was done by the application thermal characterization by differential scanning calorimetry (DSC). It was seen that the nanocomposite reinforced with 0.10 wt% of OG showed the best results, the average glass transition temperature, at 2 °C, compared to the pure resin.Keywords: Aqueous emulsion, graphene, nanocomposites, thermal characterization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8512956 MR-Implantology: Exploring the Use for Mixed Reality in Dentistry Education
Authors: Areej R. Banjar, Abraham G. Campbell
Abstract:
The use of Mixed Reality (MR) in teaching and training is growing popular and can improve students’ ability to perform technical procedures. This paper outlines the creation of an interactive educational MR 3D application that aims to improve the quality of instruction for dentistry students. This application is called ”MR-Implantology” and aims to teach and train dentistry students on single dental implant placement. MR-Implantology uses cone-beam computed tomography (CBCT) images as the source for 3D dental models that dentistry students will be able to freely manipulate within a 3D MR world to aid their learning process.
Keywords: Cone-Beam Computed Tomography, dentistry education, implantology, Mixed Reality, MR.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5052955 User Selections on Social Network Applications
Authors: C. C. Liang
Abstract:
MSN used to be the most popular application for communicating among social networks, but Facebook chat is now the most popular. Facebook and MSN have similar characteristics, including usefulness, ease-of-use, and a similar function, which is the exchanging of information with friends. Facebook outperforms MSN in both of these areas. However, the adoption of Facebook and abandonment of MSN have occurred for other reasons. Functions can be improved, but users’ willingness to use does not just depend on functionality. Flow status has been established to be crucial to users’ adoption of cyber applications and to affects users’ adoption of software applications. If users experience flow in using software application, they will enjoy using it frequently, and even change their preferred application from an old to this new one. However, no investigation has examined choice behavior related to switching from Facebook to MSN based on a consideration of flow experiences and functions. This investigation discusses the flow experiences and functions of social-networking applications. Flow experience is found to affect perceived ease of use and perceived usefulness; perceived ease of use influences information ex-change with friends, and perceived usefulness; information exchange influences perceived usefulness, but information exchange has no effect on flow experience.Keywords: Consumer behavior, social media, technology acceptance model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14062954 Packaging and Interconnection Technologies of Power Devices, Challenges and Future Trends
Authors: Raed A. Amro
Abstract:
Standard packaging and interconnection technologies of power devices have difficulties meeting the increasing thermal demands of new application fields of power electronics devices. Main restrictions are the decreasing reliability of bond-wires and solder layers with increasing junction temperature. In the last few years intensive efforts have been invested in developing new packaging and interconnection solutions which may open a path to future application of power devices. In this paper, the main failure mechanisms of power devices are described and principle of new packaging and interconnection concepts and their power cycling reliability are presented.Keywords: Power electronics devices, Reliability, Power Cycling, Low-temperature joining technique (LTJT)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25952953 Using Services Oriented Architecture to Improve Efficient Web-Services for Postgraduate Students
Authors: Ehab N. Alkhanak, Salimah Mokhtar
Abstract:
The main aim of this paper is to present the research findings on the solution of centralized Web-Services for students by adopting a framework and a prototype for Service Oriented Architecture (SOA) Web-Services. The current situation of students- Web-based application services has been identified and proposed an effective SOA to increase the operational efficiency of Web-Services for them it was necessary to identify the challenges in delivering a SOA technology to increase operational efficiency of Web-Services. Moreover, the SOA is an emerging concept, used for delivering efficient student SOA Web-Services. Therefore, service reusability from SOA Web-Services is provided and logically divided services into smaller services to increase reusability and modularity. In this case each service is a modular unit by itself and interoperability services.Keywords: Services Oriented Architecture (SOA), Web-based Application services, and Web-Services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12732952 Cloud Computing Databases: Latest Trends and Architectural Concepts
Authors: Tarandeep Singh, Parvinder S. Sandhu
Abstract:
The Economic factors are leading to the rise of infrastructures provides software and computing facilities as a service, known as cloud services or cloud computing. Cloud services can provide efficiencies for application providers, both by limiting up-front capital expenses, and by reducing the cost of ownership over time. Such services are made available in a data center, using shared commodity hardware for computation and storage. There is a varied set of cloud services available today, including application services (salesforce.com), storage services (Amazon S3), compute services (Google App Engine, Amazon EC2) and data services (Amazon SimpleDB, Microsoft SQL Server Data Services, Google-s Data store). These services represent a variety of reformations of data management architectures, and more are on the horizon.Keywords: Data Management in Cloud, AWS, EC2, S3, SQS, TQG.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19862951 Predicting Application Layer DDoS Attacks Using Machine Learning Algorithms
Authors: S. Umarani, D. Sharmila
Abstract:
A Distributed Denial of Service (DDoS) attack is a major threat to cyber security. It originates from the network layer or the application layer of compromised/attacker systems which are connected to the network. The impact of this attack ranges from the simple inconvenience to use a particular service to causing major failures at the targeted server. When there is heavy traffic flow to a target server, it is necessary to classify the legitimate access and attacks. In this paper, a novel method is proposed to detect DDoS attacks from the traces of traffic flow. An access matrix is created from the traces. As the access matrix is multi dimensional, Principle Component Analysis (PCA) is used to reduce the attributes used for detection. Two classifiers Naive Bayes and K-Nearest neighborhood are used to classify the traffic as normal or abnormal. The performance of the classifier with PCA selected attributes and actual attributes of access matrix is compared by the detection rate and False Positive Rate (FPR).
Keywords: Distributed Denial of Service (DDoS) attack, Application layer DDoS, DDoS Detection, K- Nearest neighborhood classifier, Naive Bayes Classifier, Principle Component Analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 52792950 Application of Advanced Oxidation Processes to Mefenamic Acid Elimination
Authors: Olga Gimeno, Javier Rivas, Angel Encinas, Fernando Beltran
Abstract:
The elimimation of mefenamic acid has been carried out by photolysis, ozonation, adsorption onto activated carbon (AC) and combinations of the previous single systems (O3+AC and O3+UV). The results obtained indicate that mefenamic acid is not photo-reactive, showing a relatively low quantum yield of the order of 6 x 10-4 mol Einstein-1. Application of ozone to mefenamic aqueous solutions instantaneously eliminates the pharmaceutical, achieving simultaneously a 40% of mineralization. Addition of AC to the ozonation process does not enhance the process, moreover, mineralization is completely inhibited if compared to results obtained by single ozonation. The combination of ozone and UV radiation led to the best results in terms of mineralization (60% after 120 min).Keywords: Photolysis, mefenamic acid, ozone, activated carbon.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19652949 Novel and Different Definitions for Fuzzy Union and Intersection Operations
Authors: Aarthi Chandramohan, M. V. C. Rao
Abstract:
This paper presents three new methodologies for the basic operations, which aim at finding new ways of computing union (maximum) and intersection (minimum) membership values by taking into effect the entire membership values in a fuzzy set. The new methodologies are conceptually simple and easy from the application point of view and are illustrated with a variety of problems such as Cartesian product of two fuzzy sets, max –min composition of two fuzzy sets in different product spaces and an application of an inverted pendulum to determine the impact of the new methodologies. The results clearly indicate a difference based on the nature of the fuzzy sets under consideration and hence will be highly useful in quite a few applications where different values have significant impact on the behavior of the system.Keywords: Centroid, fuzzy set operations, intersection, triangular norms , triangular S-norms, union.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15052948 Basic Research on Applying Temporary Work Engineering at the Design Phase
Authors: Jin Woong Lee, Kyuman Cho, Taehoon Kim
Abstract:
The application of constructability is increasingly required not only in the construction phase but also in the whole project stage. In particular, the proper application of construction experience and knowledge during the design phase enables the minimization of inefficiencies such as design changes and improvements in constructability during the construction phase. In order to apply knowledge effectively, engineering technology efforts should be implemented with design progress. Among many engineering technologies, engineering for temporary works, including facilities, equipment, and other related construction methods, is important to improve constructability. Therefore, as basic research, this study investigates the applicability of temporary work engineering during the design phase in the building construction industry. As a result, application of temporary work engineering has a greater impact on construction cost reduction and constructability improvement. In contrast to the existing design-bid-build method, the turn-key and CM (construct management) procurement methods currently being implemented in Korea are expected to have a significant impact on the direction of temporary work engineering. To introduce temporary work engineering, expert/professional organization training is first required, and a lack of client awareness should be preferentially improved. The results of this study are expected to be useful as reference material for the development of more effective temporary work engineering tasks and work processes in the future.
Keywords: Temporary work engineering, design phase, constructability, building construction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9722947 A Taxonomy of Internal Attacks in Wireless Sensor Network
Authors: Muhammad R Ahmed, Xu Huang, Dharmendra Sharma
Abstract:
Developments in communication technologies especially in wireless have enabled the progress of low-cost and lowpower wireless sensor networks (WSNs). The features of such WSN are holding minimal energy, weak computational capabilities, wireless communication and an open-medium nature where sensors are deployed. WSN is underpinned by application driven such as military applications, the health sector, etc. Due to the intrinsic nature of the network and application scenario, WSNs are vulnerable to many attacks externally and internally. In this paper we have focused on the types of internal attacks of WSNs based on OSI model and discussed some security requirements, characterizers and challenges of WSNs, by which to contribute to the WSN-s security research.Keywords: Wireless sensor network, internal attacks, security, OSI model.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30242946 Information System Life Cycle: Applications in Construction and Manufacturing
Authors: Carlos J. Costa, Manuela Aparício
Abstract:
In this paper, we present the information life cycle, and analyze the importance of managing the corporate application portfolio across this life cycle. The approach presented here does not correspond just to the extension of the traditional information system development life cycle. This approach is based in the generic life cycle employed in other contexts like manufacturing or marketing. In this paper it is proposed a model of an information system life cycle, supported in the assumption that a system has a limited life. But, this limited life may be extended. This model is also applied in several cases; being reported here two examples of the framework application in a construction enterprise, and in a manufacturing enterprise.
Keywords: Information systems/technology, informatio nsystems life cycle, organization engineering, information economics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16022945 The Application of Action Research to Integrate the Innovation in Learning Experience in a Design Course
Authors: Walaa Mohammed Metwally
Abstract:
This case study used the action research concept as a tool to integrate the innovation in a learning experience on a design course. The action research was investigated at Prince Sultan University, College of Engineering in the Interior Design and Architecture Department in January 2015, through the Higher Education Academy program. The action research was presented first with the definition of the research, leading to how it was used and how solutions were found. It concluded by showing that once the action research application in interior design and architecture were studied it was an effective tool to improve student’s learning, develop their practice in design courses, and it discussed the negative and positive issues that were encountered.Keywords: Action research, innovation, intervention, learning experience, peer review.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15812944 Application of Extreme Learning Machine Method for Time Series Analysis
Authors: Rampal Singh, S. Balasundaram
Abstract:
In this paper, we study the application of Extreme Learning Machine (ELM) algorithm for single layered feedforward neural networks to non-linear chaotic time series problems. In this algorithm the input weights and the hidden layer bias are randomly chosen. The ELM formulation leads to solving a system of linear equations in terms of the unknown weights connecting the hidden layer to the output layer. The solution of this general system of linear equations will be obtained using Moore-Penrose generalized pseudo inverse. For the study of the application of the method we consider the time series generated by the Mackey Glass delay differential equation with different time delays, Santa Fe A and UCR heart beat rate ECG time series. For the choice of sigmoid, sin and hardlim activation functions the optimal values for the memory order and the number of hidden neurons which give the best prediction performance in terms of root mean square error are determined. It is observed that the results obtained are in close agreement with the exact solution of the problems considered which clearly shows that ELM is a very promising alternative method for time series prediction.Keywords: Chaotic time series, Extreme learning machine, Generalization performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 35192943 Application of the Discrete-Event Simulation When Optimizing of Business Processes in Trading Companies
Authors: Maxat Bokambayev, Bella Tussupova, Aisha Mamyrova, Erlan Izbasarov
Abstract:
Optimization of business processes in trading companies is reviewed in the report. There is the presentation of the “Wholesale Customer Order Handling Process” business process model applicable for small and medium businesses. It is proposed to apply the algorithm for automation of the customer order processing which will significantly reduce labor costs and time expenditures and increase the profitability of companies. An optimized business process is an element of the information system of accounting of spare parts trading network activity. The considered algorithm may find application in the trading industry as well.
Keywords: Business processes, discrete-event simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1564