Search results for: New Technology Development
3017 Comparison of the Effectiveness of Communication between the Traditional Lecture and IELS
Authors: A. Althobaiti, M. Munro
Abstract:
Communication and effective information exchange within technology has become a crucial part of delivering knowledge to students during the learning process. It enables better understanding, builds trust and respect, and increases the sharing of knowledge between students. This paper examines the communication between undergraduate students and their lecturers during the traditional lecture and when using the Interactive Electronic Lecture System (IELS). The IELS is an application that offers a set of components which support the effective communication between students and their peers and between students and their lecturers. Moreover, this paper highlights communication skills such as sender, receiver, channel and feedback. It will show how the IELS creates a rich communication environment between its users and how they communicate effectively. To examine and assess the effectiveness of communication, an experiment was conducted on groups of users; students and lecturers. The first group communicated in the traditional lecture while the second group communicated by means of the IELS application. The results show that there was more effective communication between the second group than the first.
Keywords: Communication, effective information exchange.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16143016 Development of a Value Evaluation Model of Highway Box-Girder Bridge
Authors: Hao Hsi Tseng
Abstract:
Taiwan’s infrastructure is gradually deteriorating, while resources for maintenance and replacement are increasingly limited, raising the urgent need for methods for maintaining existing infrastructure within constrained budgets. Infrastructure value evaluation is used to enhance the efficiency of infrastructure maintenance work, allowing administrators to quickly assess the maintenance needs and performance by observing variation in infrastructure value. This research establishes a value evaluation model for Taiwan’s highway box girder bridges. The operating mechanism and process of the model are illustrated in a practical case.Keywords: Box girder bridge, deterioration, infrastructure, maintenance, value evaluation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12423015 A Software of Intrusion Detection Mechanism for Virtual Platforms
Authors: Ying-Chuan Chen, Shuen-Tai Wang
Abstract:
Security is an interesting and significance issue for popular virtual platforms, such as virtualization cluster and cloud platforms. Virtualization is the powerful technology for cloud computing services, there are a lot of benefits by using virtual machine tools which be called hypervisors, such as it can quickly deploy all kinds of virtual Operating Systems in single platform, able to control all virtual system resources effectively, cost down for system platform deployment, ability of customization, high elasticity and high reliability. However, some important security problems need to take care and resolved in virtual platforms that include terrible viruses, evil programs, illegal operations and intrusion behavior. In this paper, we present useful Intrusion Detection Mechanism (IDM) software that not only can auto to analyze all system-s operations with the accounting journal database, but also is able to monitor the system-s state for virtual platforms.Keywords: security, cluster, cloud, virtualization, virtual machine, virus, intrusion detection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15613014 Green Technologies and Sustainability in the Care and Maintenance of Protective Textiles
Authors: R. Nayak, T. Panwar, R. Padhye
Abstract:
Protective textiles get soiled, stained and even worn during their use, which may not be usable after a certain period due to the loss of protective performance. They need regular cleaning and maintenance, which helps to extend the durability of the clothing, retains their useful properties and ensures that fresh clothing is ready to wear when needed. Generally, the cleaning processes used for various protective clothing include dry-cleaning (using solvents) or wet cleaning (using water). These cleaning processes can alter the fabric surface properties, dimensions, and physical, mechanical and performance properties. The technology of laundering and dry-cleaning has undergone several changes. Sustainable methods and products are available for faster, safer and improved cleaning of protective textiles. We performed a comprehensive and systematic review of green technologies and eco-friendly products for sustainable cleaning of protective textiles. Special emphasis is given on the care and maintenance procedures of protective textiles for protection from fire, bullets, chemical and other types of protective clothing.
Keywords: Sustainable cleaning, protective textiles, eco-friendly cleaning, ozone laundering, ultrasonic cleaning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13523013 Is HR in a State of Transition? An International Comparative Study on the Development of HR Competencies
Authors: Barbara Covarrubias Venegas, Sabine Groblschegg, Bernhard Klaus, Julia Domnanovich
Abstract:
Research Objectives: The roles and activities of Human Resource Management (HRM) have changed a lot in the past years. Driven by a changing environment and therefore new business requirements, the scope of human resource (HR) activities has widened. The extent to which these activities should focus on strategic issues to support the long term success of a company has been discussed in science for many years. As many economies of Central and Eastern Europe (CEE) experienced a phase of transition after the socialist era and are now recovering from the 2008 global crisis it is needed to examine the current state of HR positioning. Furthermore a trend in HR work developing from rather administrative units to being strategic partners of management can be noticed. This leads to the question of better understanding the underlying competencies which are necessary to support organisations. This topic was addressed by the international study “HR Competencies in international comparison”. The quantitative survey was conducted by the Institute for Human Resources & Organisation of FHWien University of Applied Science of WKW (A) in cooperation with partner universities in the countries Bosnia- Herzegovina, Croatia, Serbia and Slovenia. Methodology: Using the questionnaire developed by Dave Ulrich we tested whether the HR Competency model can be used for Austria, Bosnia and Herzegovina, Croatia, Serbia and Slovenia. After performing confirmatory and exploratory factor analysis for the whole data set containing all five countries we could clearly distinguish between four competencies. In a further step our analysis focused on median and average comparisons between the HR competency dimensions. Conclusion: Our literature review, in alignment with other studies, shows a relatively rapid pace of development of HR Roles and HR Competencies in BCSS in the past decades. Comparing data from BCSS and Austria we still can notice that regards strategic orientation there is a lack in BCSS countries, thus competencies are not as developed as in Austria. This leads us to the tentative conclusion that HR has undergone a rapid change but is still in a State of Transition from being a rather administrative unit to performing the role of a strategic partner.Keywords: Comparative study, HR competencies, HRM, HR Roles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21663012 The Importance of Cultural Adaptation of B2C E-Services Design in Germany
Authors: Rasha Alhendawi, Kyrill Meyer
Abstract:
This research will give the introductory ideas for cultural adaption of B2C E-Service design in Germany. By the intense competition of E-Service development, many companies have realized the importance of understanding the emotional and cultural characteristics of their customers. Ignoring customers’ needs and requirements throughout the E-Service design can lead to faults, mistakes, and gaps. The term of E-Service usability now is changed not only to develop high quality E-Services, but also to be extended to include customer satisfaction and provide for them to feel local.Keywords: Human Computer Interaction (HCI), Usability, Cultural usability, E-Services, Business-to-Consumer (B2C), EServices.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21903011 People Participation as Social Capital Form for Realizing Sustainable Ecotourism
Authors: I Putu Eka N. Kencana, I Wayan Mertha
Abstract:
As an entity of the tourism system, local communities were considered have better understanding of their region as well as influenced positively or negatively by the tourism activities in the region. This paper aimed to study role of community involvement in the development of ecotourism at Kintamani Bali from two perspectives of view, i.e. participation in the process of initiatives and participation in the utilizing the economic benefits of tourism. Thorough participation as an antecedent of social capital form, the sustainability of ecotourism at Kintamani could be expected.
Keywords: Community involvement, ecotourism, participation, social capital.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23933010 An Advanced Hybrid P2p Botnet 2.0
Authors: T. T. Lu, H.Y. Liao, M .F. Chen
Abstract:
Recently, malware attacks have become more serious over the Internet by e-mail, denial of service (DoS) or distributed denial of service (DDoS). The Botnets have become a significant part of the Internet malware attacks. The traditional botnets include three parts – botmaster, command and control (C&C) servers and bots. The C&C servers receive commands from botmaster and control the distributions of computers remotely. Bots use DNS to find the positions of C&C server. In this paper, we propose an advanced hybrid peer-to-peer (P2P) botnet 2.0 (AHP2P botnet 2.0) using web 2.0 technology to hide the instructions from botmaster into social sites, which are regarded as C&C servers. Servent bots are regarded as sub-C&C servers to get the instructions from social sites. The AHP2P botnet 2.0 can evaluate the performance of servent bots, reduce DNS traffics from bots to C&C servers, and achieve harder detection bots actions than IRC-based botnets over the Internet.Keywords: Peer-to-peer, Botnets, Botnet 2.0, Hybridpeer-to-peer
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24323009 Design and Parametric Analysis of Pentaband Meander Line Antenna for Mobile Handset Applications
Authors: Shrinivas P. Mahajan, Aarti C. Kshirsagar
Abstract:
Wireless communication technology is rapidly changing with recent developments in portable devices and communication protocols. This has generated demand for more advanced and compact antenna structures and therefore, proposed work focuses on Meander Line Antenna (MLA) design. Here, Pentaband MLA is designed on a FR4 substrate (85 mm x 40 mm) with dielectric constant (ϵr) 4.4, loss tangent (tan ) 0.018 and height 1.6 mm with coplanar feed and open stub structure. It can be operated in LTE (0.670 GHz-0.696 GHz) GPS (1.564 GHz-1.579 GHz), WCDMA (1.920 GHz-2.135 GHz), LTE UL frequency band 23 (2-2.020 GHz) and 5G (3.10 GHz-3.550 GHz) application bands. Also, it gives good performance in terms of Return Loss (RL) which is < -10 dB, impedance bandwidth with maximum Bandwidth (BW) up to 0.21 GHz and realized gains with maximum gain up to 3.28 dBi. Antenna is simulated with open stub and without open stub structures to see the effect on impedance BW coverage. In addition to this, it is checked with human hand and head phantoms to assure that it falls within specified Specific Absorption Rate (SAR) limits.
Keywords: Coplanar feed, L shaped ground, MLA, phantom, SAR, stub.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5573008 A Case Study on How Outreach Programmes Form and Develop the Biomedical Engineering Community in Hong Kong
Authors: Sum Lau, Wing Chung Cleo Lau, Wing Yan Chu, Long Ching Ip, Wan Yin Lo, Jo Long Sam Yau, Ka Ho Hui, Sze Yi Mak
Abstract:
Biomedical engineering (BME) is an interdisciplinary subject where knowledge about biology and medicine is applied to novel applications, solving clinical problems. This subject is crucial for cities such as Hong Kong where the burden on the medical system is rising due to reasons like ageing population. Hong Kong, who is actively boosting technological advancements in recent years, sets BME, or biotechnology as a major category, as reflected in the 2018-19 Budget where biotechnology was one of the four pillars for development. Over the years, while resources in terms of money and space have been provided, there has been a lack of talents, expressed by both the academia and industry. While exogenous factors, such as COVID-19, may have hindered talents from outside Hong Kong to come, endogenous factors should also be considered. In particular, since there are already a few local universities offering BME programmes, their curriculum or style of education requires to be reviewed to intensify the network of the BME community and support post-academic career development. It was observed that while undergraduate (UG) studies focus on knowledge teaching with some technical training and postgraduate (PG) programmes concentrate on upstream research, the programmes are generally confined to the academic sector and lack connections to the industry. In light of that, a “Biomedical Innovation and Outreach Programme 2022” (“B.I.O.2022”) was held to connect students and professors from academia with clinicians and engineers from the industry, serving as a comparative approach to conventional education methods (UG and PG programmes from tertiary institutions). Over 100 participants, including undergraduates, postgraduates, secondary school students, researchers, engineers, and clinicians, took part in various outreach events such as conference and site visits, all held from June to July 2022. As a case study, this programme aimed to tackle the aforementioned problems with the theme of “4Cs” (connection, communication, collaboration, and commercialisation). The effectiveness of the programme is investigated by its ability to serve as adult and continuing education, and the effectiveness of causing social change to tackle current societal challenges, with the focus on tackling the lack of talents engaging in BME. In this study, B.I.O. 2022 is found to be able to complement the traditional educational methods, particularly in terms of knowledge exchange between the academia and the industry. With enhanced communications between participants from different career stages, there were students who followed up to visit or even work with the professionals after the programme. Furthermore, connections between the academia and industry could foster the generation of new knowledge, which ultimately pointed to commercialisation, adding value to the BME industry while filling the gap in terms of human resources. With the continuation of events like B.I.O. 2022, it provides a promising starting point for development and relationship strengthening of a BME community in Hong Kong, and shows potential as an alternative way of adult education or learning with societal benefits.
Keywords: Biomedical engineering, adult education, social change, comparative methods, lifelong learning, innovation, professional community.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5173007 Augmenting Use Case View for Modeling
Authors: Pradip Peter Dey, Bhaskar Raj Sinha, Mohammad Amin, Hassan Badkoobehi
Abstract:
Mathematical, graphical and intuitive models are often constructed in the development process of computational systems. The Unified Modeling Language (UML) is one of the most popular modeling languages used by practicing software engineers. This paper critically examines UML models and suggests an augmented use case view with the addition of new constructs for modeling software. It also shows how a use case diagram can be enhanced. The improved modeling constructs are presented with examples for clarifying important design and implementation issues.Keywords: Software architecture, software design, Unified Modeling Language (UML), user interface.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19533006 Smart Monitoring and Control of Tap Changer Using Intelligent Electronic Device
Authors: K. N. Dinesh Babu, G. R. Manjunatha, R. Ramaprabha, V. Rajini, M. V. Gopalan
Abstract:
In this paper, monitoring and control of tap changer mechanism of a transformer implementation in an Intelligent Electronic Device (IED) is discussed. It has been a custom for decades to provide a separate panel for on load tap changer control for monitoring the tap position. However, this facility cannot either record or transfer the information to remote control centers. As there is a technology shift towards the smart grid protection and control standards, the need for implementing remote control and monitoring has necessitated the implementation of this feature in numerical relays. This paper deals with the programming, settings and logic implementation which is applicable to both IEC 61850 compatible and non-compatible IEDs thereby eliminating the need for separate tap changer control equipment. The monitoring mechanism has been implemented in a 28MVA, 110 /6.9kV transformer with 16 tap position with GE make T60 IED at Ultratech cement limited Gulbarga, Karnataka and is in successful service.Keywords: Transformer protection, tap changer control, tap position monitoring, on load tap changer, intelligent electronic device (IED).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40393005 Cloud Computing Cryptography "State-of-the-Art"
Authors: Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem
Abstract:
Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the “keys generation and management” mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.
Keywords: Cloud Computing, Cloud Encryption Model, Quantum Key Distribution.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 41023004 Multi-Label Hierarchical Classification for Protein Function Prediction
Authors: Helyane B. Borges, Julio Cesar Nievola
Abstract:
Hierarchical classification is a problem with applications in many areas as protein function prediction where the dates are hierarchically structured. Therefore, it is necessary the development of algorithms able to induce hierarchical classification models. This paper presents experimenters using the algorithm for hierarchical classification called Multi-label Hierarchical Classification using a Competitive Neural Network (MHC-CNN). It was tested in ten datasets the Gene Ontology (GO) Cellular Component Domain. The results are compared with the Clus-HMC and Clus-HSC using the hF-Measure.
Keywords: Hierarchical Classification, Competitive Neural Network, Global Classifier.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23883003 Protection of the Object of the Critical Infrastructure in the Czech Republic
Authors: Michaela Vašková
Abstract:
With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.
Keywords: Critical infrastructure, object of critical infrastructure, protection, safety, security, security audit.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18023002 Molding Properties of Cobalt-Chrome-Based Feedstocks Used in Low-Pressure Powder Injection Molding
Authors: Ehsan Gholami, Vincent Demers
Abstract:
Low-pressure powder injection molding is an emerging technology for cost-effectively producing complex shape metallic parts with the proper dimensional tolerances, either in high or in low production volumes. In this study, the molding properties of cobalt-chrome-based feedstocks were evaluated for use in a low-pressure powder injection molding process. The rheological properties of feedstock formulations were obtained by mixing metallic powder with a proprietary wax-based binder system. Rheological parameters such as reference viscosity, shear rate sensitivity index, and activation energy for viscous flow, were extracted from the viscosity profiles and introduced into the Weir model to calculate the moldability index. Feedstocks were experimentally injected into a spiral mold cavity to validate the injection performance calculated with the model.
Keywords: Binder, feedstock, moldability, powder injection molding, viscosity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7343001 IVE: Virtual Humans AI Prototyping Toolkit
Authors: Cyril Brom, Zuzana Vlckova
Abstract:
IVE toolkit has been created for facilitating research,education and development in the ?eld of virtual storytelling andcomputer games. Primarily, the toolkit is intended for modellingaction selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploringjoint behaviour and role-passing technique (Sec. V). Additionally, thetoolkit can be used as an AI middleware without any changes. Themain facility of IVE is that it serves for prototyping both the AI andvirtual worlds themselves. The purpose of this paper is to describeIVE?s features in general and to present our current work - includingan educational game - on this platform.Keywords? AI middleware, simulation, virtual world.Keywords: AI middleware, simulation, virtual world
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16643000 The Effects of Plantation Size and Internal Transport on Energy Efficiency of Biofuel Production
Authors: Olga Orynycz, Andrzej Wasiak
Abstract:
Mathematical model describing energetic efficiency (defined as a ratio of energy obtained in the form of biofuel to the sum of energy inputs necessary to facilitate production) of agricultural subsystem as a function of technological parameters was developed. Production technology is characterized by parameters of machinery, topological characteristics of the plantation as well as transportation routes inside and outside of plantation. The relationship between the energetic efficiency of agricultural and industrial subsystems is also derived. Due to the assumed large area of the individual field, the operations last for several days increasing inter-fields routes because of several returns. The total distance driven outside of the fields is, however, small as compared to the distance driven inside of the fields. This results in small energy consumption during inter-fields transport that, however, causes a substantial decrease of the energetic effectiveness of the whole system.
Keywords: Biofuel, energetic efficiency, EROEI, mathematical modelling, production system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8762999 Knowledge Mining in Web-based Learning Environments
Authors: Nittaya Kerdprasop, Kittisak Kerdprasop
Abstract:
The state of the art in instructional design for computer-assisted learning has been strongly influenced by advances in information technology, Internet and Web-based systems. The emphasis of educational systems has shifted from training to learning. The course delivered has also been changed from large inflexible content to sequential small chunks of learning objects. The concepts of learning objects together with the advanced technologies of Web and communications support the reusability, interoperability, and accessibility design criteria currently exploited by most learning systems. These concepts enable just-in-time learning. We propose to extend theses design criteria further to include the learnability concept that will help adapting content to the needs of learners. The learnability concept offers a better personalization leading to the creation and delivery of course content more appropriate to performance and interest of each learner. In this paper we present a new framework of learning environments containing knowledge discovery as a tool to automatically learn patterns of learning behavior from learners' profiles and history.Keywords: Knowledge mining, Web-based learning, Learning environments.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17932998 A Training Model for Successful Implementation of Enterprise Resource Planning
Authors: Volker Heierhoff, Aurilla Aurelie Bechina Arntzen, Gerrit Muller
Abstract:
It well recognized that one feature that makes a successful company is its ability to successfully align its business goals with its information communication technologies platform. Enterprise Resource Planning (ERP) systems contribute to achieve better performance by integrating various business functions and providing support for information flows. However, the technological systems complexity is known to prevent the business users to exploit in an efficient way the Enterprise Resource Planning Systems (ERP). This paper aims to investigate the role of training in improving the usage of ERP systems. To this end, we have designed an instrument survey to employees of a Norwegian multinational global provider of technology solutions. Based on the analysis of collected data, we have delineated a training model that could be high relevance for both researchers and practitioners as a step towards a better understanding of ERP system implementation.Keywords: Business User Training, Enterprise resource planning system, Global consulting company, Role and responsibilities
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29622997 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.
Keywords: Cloud computing, cloud monitoring, performance optimization, high availability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1072996 A GA-Based Role Assignment Approach for Web-based Cooperative Learning Environments
Authors: Yi-Chun Chang, Jian-Wei Li
Abstract:
Web-based cooperative learning focuses on (1) the interaction and the collaboration of community members, and (2) the sharing and the distribution of knowledge and expertise by network technology to enhance learning performance. Numerous research literatures related to web-based cooperative learning have demonstrated that cooperative scripts have a positive impact to specify, sequence, and assign cooperative learning activities. Besides, literatures have indicated that role-play in web-based cooperative learning environments enhances two or more students to work together toward the completion of a common goal. Since students generally do not know each other and they lack the face-to-face contact that is necessary for the negotiation of assigning group roles in web-based cooperative learning environments, this paper intends to further extend the application of genetic algorithm (GA) and propose a GA-based algorithm to tackle the problem of role assignment in web-based cooperative learning environments, which not only saves communication costs but also reduces conflict between group members in negotiating role assignments.
Keywords: genetic algorithm (GA), role assignment, role-play; web-based cooperative learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14652995 Transcutaneous Inductive Powering Links Based on ASK Modulation Techniques
Authors: S. M. Abbas, M. A. Hannan, S. A. Samad, A. Hussain
Abstract:
This paper presented a modified efficient inductive powering link based on ASK modulator and proposed efficient class- E power amplifier. The design presents the external part which is located outside the body to transfer power and data to the implanted devices such as implanted Microsystems to stimulate and monitoring the nerves and muscles. The system operated with low band frequency 10MHZ according to industrial- scientific – medical (ISM) band to avoid the tissue heating. For external part, the modulation index is 11.1% and the modulation rate 7.2% with data rate 1 Mbit/s assuming Tbit = 1us. The system has been designed using 0.35-μm fabricated CMOS technology. The mathematical model is given and the design is simulated using OrCAD P Spice 16.2 software tool and for real-time simulation, the electronic workbench MULISIM 11 has been used.Keywords: Implanted devices, ASK techniques, Class-E power amplifier, Inductive powering and low-frequency ISM band.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23822994 Multiagent Systems Simulation
Authors: G. Balakayeva, A. Aktymbayeva
Abstract:
In this paper, we consider components of discrete event imitating model, implementing a simulation model by using JAVA and performing an input analysis of the data and an output analysis of the simulation results. Was lead development of imitating model of mass service system with n (n≥1) devices of service. On the basis of the developed process of a multithreading simulated the distributed processes with presence of synchronization. Was developed the algorithm of event-oriented simulation, was received results of system functioning with n devices of service.
Keywords: Imitating modeling, Mass service system, Multi agentsystem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15992993 Post ERP Feral System and use of ‘Feral System as Coping Mechanism
Authors: Tajul Urus, S., Molla, A., Teoh, S.Y.
Abstract:
A number of studies highlighted problems related to ERP systems, yet, most of these studies focus on the problems during the project and implementation stages but not during the postimplementation use process. Problems encountered in the process of using ERP would hinder the effective exploitation and the extended and continued use of ERP systems and their value to organisations. This paper investigates the different types of problems users (operational, supervisory and managerial) faced in using ERP and how 'feral system' is used as the coping mechanism. The paper adopts a qualitative method and uses data collected from two cases and 26 interviews, to inductively develop a casual network model of ERP usage problem and its coping mechanism. This model classified post ERP usage problems as data quality, system quality, interface and infrastructure. The model is also categorised the different coping mechanism through use of 'feral system' inclusive of feral information system, feral data and feral use of technology.Keywords: Case Studies, Coping Mechanism, Post Implementation ERP system, Usage Problem
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15182992 Key Issues and Challenges of Intrusion Detection and Prevention System: Developing Proactive Protection in Wireless Network Environment
Authors: M. Salman, B. Budiardjo, K. Ramli
Abstract:
Nowadays wireless technology plays an important role in public and personal communication. However, the growth of wireless networking has confused the traditional boundaries between trusted and untrusted networks. Wireless networks are subject to a variety of threats and attacks at present. An attacker has the ability to listen to all network traffic which becoming a potential intrusion. Intrusion of any kind may lead to a chaotic condition. In addition, improperly configured access points also contribute the risk to wireless network. To overcome this issue, a security solution that includes an intrusion detection and prevention system need to be implemented. In this paper, first the security drawbacks of wireless network will be analyzed then investigate the characteristics and also the limitations on current wireless intrusion detection and prevention system. Finally, the requirement of next wireless intrusion prevention system will be identified including some key issues which should be focused on in the future to overcomes those limitations.Keywords: intrusion detection, intrusion prevention, wireless networks, proactive protection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39472991 The Semantic Web: a New Approach for Future World Wide Web
Authors: Sahar Nasrolahi, Mahdi Nikdast, Mehrdad Mahdavi Boroujerdi
Abstract:
The purpose of semantic web research is to transform the Web from a linked document repository into a distributed knowledge base and application platform, thus allowing the vast range of available information and services to be more efficiently exploited. As a first step in this transformation, languages such as OWL have been developed. Although fully realizing the Semantic Web still seems some way off, OWL has already been very successful and has rapidly become a defacto standard for ontology development in fields as diverse as geography, geology, astronomy, agriculture, defence and the life sciences. The aim of this paper is to classify key concepts of Semantic Web as well as introducing a new practical approach which uses these concepts to outperform Word Wide Web.Keywords: Semantic Web, Ontology, OWL, Microformat, Word Wide Web.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16092990 Comparing SVM and Naïve Bayes Classifier for Automatic Microaneurysm Detections
Authors: A. Sopharak, B. Uyyanonvara, S. Barman
Abstract:
Diabetic retinopathy is characterized by the development of retinal microaneurysms. The damage can be prevented if disease is treated in its early stages. In this paper, we are comparing Support Vector Machine (SVM) and Naïve Bayes (NB) classifiers for automatic microaneurysm detection in images acquired through non-dilated pupils. The Nearest Neighbor classifier is used as a baseline for comparison. Detected microaneurysms are validated with expert ophthalmologists’ hand-drawn ground-truths. The sensitivity, specificity, precision and accuracy of each method are also compared.
Keywords: Diabetic retinopathy, microaneurysm, Naïve Bayes classifier, SVM classifier.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 61162989 Case Study of the Exercise Habits and Aging Anxiety of Taiwanese Insurance Agents
Authors: W. T. Hsu, H. L. Tsai
Abstract:
The rapid aging of the population is a common trend in the world. However, the progress of modern medical technology has increased the average life expectancy. The global population structure has changed dramatically, and the elderly population has risen rapidly. In the face of rapid population growth, it must be noted issues of the aging population must face up to, which are the physiological, psychological, and social problems associated with aging. This study aims to investigate how insurance agents are actively dealing with an aging society, their own aging anxiety, and their exercise habits. Purposive sampling was the sampling method of this study, a total of 204 respondents were surveyed and 204 valid surveys were returned. The returned valid ratio was 100%. Statistical method included descriptive statistics, t-test, and one-way ANOVA. The results of the study found that the insurance agent’s age, seniority, exercise habits to aging anxiety are significantly different.
Keywords: Insurance agent, aging anxiety, exercise habits, elderly.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11942988 Climate Change Policies in Australia: Gender Equality, Power and Knowledge
Authors: Thomas K. Wanner
Abstract:
This paper examines the link between gender equality and climate change policies in Australia. It critically analyses the extent to which gender mainstreaming and gender dimensions have been taken into account in the national policy processes for climate change in Australia. The paper argues that climate change adaptation and mitigation policies in Australia neglect gender dimensions. This endangers the advances made in gender equality and works against socially equitable and effective climate change strategies.Keywords: Climate change, gender equality, gendermainstreaming, sustainable development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1660