Search results for: development environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6218

Search results for: development environment

3098 Real-time Laser Monitoring based on Pipe Detective Operation

Authors: Mongkorn Klingajay, Tawatchai Jitson

Abstract:

The pipe inspection operation is the difficult detective performance. Almost applications are mainly relies on a manual recognition of defective areas that have carried out detection by an engineer. Therefore, an automation process task becomes a necessary in order to avoid the cost incurred in such a manual process. An automated monitoring method to obtain a complete picture of the sewer condition is proposed in this work. The focus of the research is the automated identification and classification of discontinuities in the internal surface of the pipe. The methodology consists of several processing stages including image segmentation into the potential defect regions and geometrical characteristic features. Automatic recognition and classification of pipe defects are carried out by means of using an artificial neural network technique (ANN) based on Radial Basic Function (RBF). Experiments in a realistic environment have been conducted and results are presented.

Keywords: Artificial neural network, Radial basic function, Curve fitting, CCTV, Image segmentation, Data acquisition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1805
3097 The Role of the Internal Audit Unit in Detecting and Preventing Fraud at Public Universities in West Java, Indonesia

Authors: Fury Khristianty Fitriyah

Abstract:

This study aims to identify the extent of the role of the Satuan Pengawas Intern (Internal Audit Unit) in detecting and preventing fraud in public universities in West Java under the Ministry of Research, Technology and Higher Education. The research method applied was a qualitative case study approach, while the unit of analysis for this study is the Internal Audit Unit at each public university. Results of this study indicate that the Internal Audit Unit is able to detect and prevent fraud within a public university environment by means of red flags to mark accounting anomalies. These stem from inaccurate budget planning that prompts inappropriate use of funds, exacerbated by late disbursements of funds, which potentially lead to fictitious transactions, and discrepancies in recording state-owned assets into a state property management system (SIMAK BMN), which, if not conducted properly, potentially causes loss to the state.

Keywords: Internal Audit Unit, efficiency, fraud, public university.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2140
3096 Radar Charts Analysis to Compare the Level of Innovation in Mexico with Most Innovative Countries in Triple Helix Schema Economic and Human Factor Dimension

Authors: Peña Aguilar Juan M., Valencia Luis, Pastrana Alberto, Nava Estefany, Martinez A., Vivanco M., Castañeda A.

Abstract:

 

This paper seeks to compare the innovation of Mexico from an economic and human perspective, with the seven most innovative countries according to the Global Innovation Index 2013, done by the World Intellectual Property Organization (WIPO). The above analysis suggests nine dimensions: Expenditure on R & D, intellectual property, appropriate environment to conduct business, economic stability, triple helix for R & D, ICT Infrastructure, education, human resources and quality of life. Each dimension is represented by an indicator which is later used to construct a radial graph that compares the innovative capacity of the countries analyzed. As a result, it is proposed a new indicator of innovation called The Area of Innovation. Observations are made from the results, and finally as a conclusion, those items or dimensions in which Mexico suffers lag in innovation are identify.

Keywords: Dimension, measure, innovation level, economy, radar chart.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3741
3095 A Research on Determining the Viability of a Job Board Website for Refugees in Kenya

Authors: Prince Mugoya, Collins Oduor Ondiek, Patrick Kanyi Wamuyu

Abstract:

Refugee Job Board Website is a web-based application that provides a platform for organizations to post jobs specifically for refugees. Organizations upload job opportunities and refugees can view them on the website. The website also allows refugees to input their skills and qualifications. The methodology used to develop this system is a waterfall (traditional) methodology. Software development tools include Brackets which will be used to code the website and PhpMyAdmin to store all the data in a database.

Keywords: Information technology, refugee, skills, utilization, economy, jobs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 754
3094 Magnetic Field Analysis for a Distribution Transformer with Unbalanced Load Conditions by using 3-D Finite Element Method

Authors: P. Meesuk, T. Kulworawanichpong, P. Pao-la-or

Abstract:

This paper proposes a set of quasi-static mathematical model of magnetic fields caused by high voltage conductors of distribution transformer by using a set of second-order partial differential equation. The modification for complex magnetic field analysis and time-harmonic simulation are also utilized. In this research, transformers were study in both balanced and unbalanced loading conditions. Computer-based simulation utilizing the threedimensional finite element method (3-D FEM) is exploited as a tool for visualizing magnetic fields distribution volume a distribution transformer. Finite Element Method (FEM) is one among popular numerical methods that is able to handle problem complexity in various forms. At present, the FEM has been widely applied in most engineering fields. Even for problems of magnetic field distribution, the FEM is able to estimate solutions of Maxwell-s equations governing the power transmission systems. The computer simulation based on the use of the FEM has been developed in MATLAB programming environment.

Keywords: Distribution Transformer, Magnetic Field, Load Unbalance, 3-D Finite Element Method (3-D FEM)

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2677
3093 Start Talking in an e-Learning Environment: Building and Sustaining Communities of Practice

Authors: Melissa C. LaDuke

Abstract:

The purpose of this targeted analysis was to identify the use of online communities of practice (CoP) within e-learning environments as a method to build social interaction and student-centered educational experiences. A literature review was conducted to survey and collect scholarly thoughts concerning CoPs from a variety of sources. Data collected included best practices, ties to educational theories, and examples of online CoPs. Social interaction has been identified as a critical piece of the learning infrastructure, specifically for adult learners. CoPs are an effective way to help students connect to each other and the material of interest. The use of CoPs falls in line with many educational theories, including situated learning theory, social constructivism, connectivism, adult learning theory, and motivation. New literacies such as social media and gamification can help increase social interaction in online environments and provide methods to host CoPs. Steps to build and sustain a CoP were discussed in addition to CoP considerations and best practices.

Keywords: Community of practice, knowledge sharing, social interaction, online course design, new literacies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 204
3092 Designing an Adventure: University of Southern California’s Experiment in Using Alternate Reality Games to Educate Students and Inspire Change

Authors: Anahita Dalmia

Abstract:

There has been a recent rise in ‘audience-centric’ and immersive storytelling. This indicates audiences are gaining interest in experiencing real adventure with everything that encompasses the struggle, the new friendships, skill development, and growth. This paper examines two themed alternate reality games created by a group of students at the University of Southern California as an experiment in how to design an adventure and to evaluate its impact on participants. The experiences combined immersive improvisational theatre and live-action roleplaying to create socially aware experiences within the timespan of four hours, using Harry Potter and mythology as themes. In each experiment, over 500 players simultaneously embarked on quests -a series of challenges including puzzle-solving, scavenger-hunting, and character interactions- to join a narrative faction. While playing, the participants were asked to choose faction alignments based on the characters they interacted with, as well as their own backgrounds and moral values. During the narrative finale, the impact of their individual choices on the larger story and game were revealed. After the conclusion of each experience, participants filled out questionnaires and were interviewed. Through this, it was discovered that participants developed transferable problem-solving, team-work, and persuasion skills. They also learned about the theme of the experience and reflected on their own moral values and judgment-making abilities after they realized the consequences of their actions in the game-world, inspiring some participants to make changes outside of it. This reveals that alternative reality games can lead to socialization, educational development, and real-world change in a variety of contexts when implemented correctly. This experiment has begun to discover the value of alternate reality games in a real-world context and to develop a reproducible format to continue to create such an impact.

Keywords: Adventure, alternate reality games, education, immersive entertainment, interactive entertainment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 654
3091 Prevention of Corruption in Public Purchases

Authors: Anatoly Krivinsh

Abstract:

The results of dissertation research "Preventing and  combating corruption in public procurement" are presented in this  publication. The study was conducted 2011 till 2013 in a Member  State of the European Union– in the Republic of Latvia.  Goal of the thesis is to explore corruption prevention and  combating issues in public procurement sphere, to identify the  prevalence rates, determinants and contributing factors and  prevention opportunities in Latvia.  In the first chapter the author analyzes theoretical aspects of  understanding corruption in public procurement, with particular  emphasis on corruption definition problem, its nature, causes and  consequences. A separate section is dedicated to the public  procurement concept, mechanism and legal framework. In the first  part of this work the author presents cognitive methodology of  corruption in public procurement field, based on which the author has  carried out an analysis of corruption situation in public procurement  in Republic of Latvia.  In the second chapter of the thesis, the author analyzes the  problem of corruption in public procurement, including its historical  aspects, typology and classification of corruption subjects involved,  corruption risk elements in public procurement and their  identification. During the development of the second chapter author's  practical experience in public procurements was widely used.  The third and fourth chapter deals with issues related to the  prevention and combating corruption in public procurement, namely  the operation of the concept, principles, methods and techniques,  subjects in Republic of Latvia, as well as an analysis of foreign  experience in preventing and combating corruption. The fifth chapter  is devoted to the corruption prevention and combating perspectives  and their assessment. In this chapter the author has made the  evaluation of corruption prevention and combating measures  efficiency in Republic of Latvia, assessment of anti-corruption  legislation development stage in public procurement field in Latvia. 

Keywords: Prevention of corruption, public purchases.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1876
3090 Service Blueprint for Improving Clinical Guideline Adherence via Mobile Health Technology

Authors: Y. O’Connor, C. Heavin, S. O’ Connor, J. Gallagher, J. Wu, J. O’Donoghue

Abstract:

Background: To improve the delivery of paediatric healthcare in low resource settings, Community Health Workers (CHW) have been provided with a paper-based set of protocols known as Community Case Management (CCM). Yet research has shown that CHW adherence to CCM guidelines is poor, ultimately impacting health service delivery. Digitising the CCM guidelines via mobile technology is argued in extant literature to improve CHW adherence. However, little research exist which outlines how (a) this process can be digitised and (b) adherence could be improved as a result. Aim: To explore how an electronic mobile version of CCM (eCCM) can overcome issues associated with the paper-based CCM protocol (inadequate adherence to guidelines) vis-à-vis service blueprinting. This service blueprint will outline how (a) the CCM process can be digitised using mobile Clinical Decision Support Systems software to support clinical decision-making and (b) adherence can be improved as a result. Method: Development of a single service blueprint for a standalone application which visually depicts the service processes (eCCM) when supporting the CHWs, using an application known as Supporting LIFE (SL eCCM app) as an exemplar. Results: A service blueprint is developed which illustrates how the SL eCCM app can be utilised by CHWs to assist with the delivery of healthcare services to children. Leveraging smartphone technologies can (a) provide CHWs with just-in-time data to assist with their decision making at the point-of-care and (b) improve CHW adherence to CCM guidelines. Conclusions: The development of the eCCM opens up opportunities for the CHWs to leverage the inherent benefit of mobile devices to assist them with health service delivery in rural settings. To ensure that benefits are achieved, it is imperative to comprehend the functionality and form of the eCCM service process. By creating such a service blueprint for an eCCM approach, CHWs are provided with a clear picture regarding the role of the eCCM solution, often resulting in buy-in from the end-users.

Keywords: Adherence, community health workers, developing countries, mobile clinical decision support systems, CDSS, service blueprint.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2710
3089 LiDAR Based Real Time Multiple Vehicle Detection and Tracking

Authors: Zhongzhen Luo, Saeid Habibi, Martin v. Mohrenschildt

Abstract:

Self-driving vehicle require a high level of situational awareness in order to maneuver safely when driving in real world condition. This paper presents a LiDAR based real time perception system that is able to process sensor raw data for multiple target detection and tracking in dynamic environment. The proposed algorithm is nonparametric and deterministic that is no assumptions and priori knowledge are needed from the input data and no initializations are required. Additionally, the proposed method is working on the three-dimensional data directly generated by LiDAR while not scarifying the rich information contained in the domain of 3D. Moreover, a fast and efficient for real time clustering algorithm is applied based on a radially bounded nearest neighbor (RBNN). Hungarian algorithm procedure and adaptive Kalman filtering are used for data association and tracking algorithm. The proposed algorithm is able to run in real time with average run time of 70ms per frame.

Keywords: LiDAR, real-time system, clustering, tracking, data association.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4662
3088 A Signature-Based Secure Authentication Framework for Vehicular Ad Hoc Networks

Authors: J. Jenefa, E. A. Mary Anita

Abstract:

Vehicular Ad hoc NETwork (VANET) is a kind of Mobile Ad hoc NETwork (MANET). It allows the vehicles to communicate with one another as well as with nearby Road Side Units (RSU) and Regional Trusted Authorities (RTA). Vehicles communicate through On-Board Units (OBU) in which privacy has to be assured which will avoid the misuse of private data. A secure authentication framework for VANETs is proposed in which Public Key Cryptography (PKC) based adaptive pseudonym scheme is used to generate self-generated pseudonyms. Self-generated pseudonyms are used instead of real IDs for privacy preservation and non-repudiation. The ID-Based Signature (IBS) and ID-Based Online/Offline Signature (IBOOS) schemes are used for authentication. IBS is used to authenticate between vehicle and RSU whereas IBOOS provides authentication among vehicles. Security attacks like impersonation attack in the network are resolved and the attacking nodes are rejected from the network, thereby ensuring secure communication among the vehicles in the network. Simulation results shows that the proposed system provides better authentication in VANET environment.

Keywords: Non-repudiation, privacy preservation, public key cryptography, self- generated pseudonym.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1438
3087 Open Source Software in Higher Education: Oman SQU Case Study

Authors: Amal S. Al-Badi, Ali H. Al-Badi

Abstract:

Many organizations are opting to adopt Open Source Software (OSS) as it is the current trend to rely on each other rather than on companies (Software vendors). It is a clear shift from organizations to individuals, the concept being to rely on collective participation rather than companies/vendors.

The main objectives of this research are 1) to identify the current level of OSS usage in Sultan Qaboos University; 2) to identify the potential benefits of using OSS in educational institutes; 3) to identify the OSS applications that are most likely to be used within an educational institute; 4) to identify the existing and potential barriers to the successful adoption of OSS in education.

To achieve these objectives a two-stage research method was conducted. First a rigorous literature review of previously published material was performed (interpretive/descriptive approach), and then a set of interviews were conducted with the IT professionals at Sultan Qaboos University in Oman in order to explore the extent and nature of their usage of OSS.

Keywords: Open source software; social software, e-learning 2.0, Web 2.0, connectivism, personal learning environment (PLE), OpenID, OpenSocial and OpenCourseWare.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3638
3086 Requirements and Guidelines for the Design of Team Awareness Systems

Authors: Carsten Röcker

Abstract:

This paper presents a set of guidelines for the design of multi-user awareness systems. In a first step, general requirements for team awareness systems are analyzed. In the second part of the paper, the identified requirements are aggregated and transformed into concrete design guidelines for the development of team awareness systems.

Keywords: User Interface Design, Awareness Systems, User- Centered Design, Human Factors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1488
3085 Effective Relay Communication for Scalable Video Transmission

Authors: Jung Ah Park, Zhijie Zhao, Doug Young Suh, Joern Ostermann

Abstract:

In this paper, we propose an effective relay communication for layered video transmission as an alternative to make the most of limited resources in a wireless communication network where loss often occurs. Relaying brings stable multimedia services to end clients, compared to multiple description coding (MDC). Also, retransmission of only parity data about one or more video layer using channel coder to the end client of the relay device is paramount to the robustness of the loss situation. Using these methods in resource-constrained environments, such as real-time user created content (UCC) with layered video transmission, can provide high-quality services even in a poor communication environment. Minimal services are also possible. The mathematical analysis shows that the proposed method reduced the probability of GOP loss rate compared to MDC and raptor code without relay. The GOP loss rate is about zero, while MDC and raptor code without relay have a GOP loss rate of 36% and 70% in case of 10% frame loss rate.

Keywords: Relay communication, Multiple Description Coding, Scalable Video Coding

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1430
3084 Intelligent Agent Approach to the Control of Critical Infrastructure Networks

Authors: James D. Gadze, Niki Pissinou, Kia Makki

Abstract:

In this paper we propose an intelligent agent approach to control the electric power grid at a smaller granularity in order to give it self-healing capabilities. We develop a method using the influence model to transform transmission substations into information processing, analyzing and decision making (intelligent behavior) units. We also develop a wireless communication method to deliver real-time uncorrupted information to an intelligent controller in a power system environment. A combined networking and information theoretic approach is adopted in meeting both the delay and error probability requirements. We use a mobile agent approach in optimizing the achievable information rate vector and in the distribution of rates to users (sensors). We developed the concept and the quantitative tools require in the creation of cooperating semiautonomous subsystems which puts the electric grid on the path towards intelligent and self-healing system.

Keywords: Mobile agent, power system operation and control, real time, wireless communication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1664
3083 Co-Pyrolysis of Olive Pomace with Plastic Wastes and Characterization of Pyrolysis Products

Authors: Merve Sogancioglu, Esra Yel, Ferda Tartar, Nihan Canan Iskender

Abstract:

Waste polyethylene (PE) is classified as waste low density polyethylene (LDPE) and waste high density polyethylene (HDPE) according to their densities. Pyrolysis of plastic waste may have an important role in dealing with the enormous amounts of plastic waste produced all over the world, by decreasing their negative impact on the environment. This waste may be converted into economically valuable hydrocarbons, which can be used both as fuels and as feed stock in the petrochemical industry. End product yields and properties depend on the plastic waste composition. Pyrolytic biochar is one of the most important products of waste plastics pyrolysis. In this study, HDPE and LDPE plastic wastes were co-pyrolyzed together with waste olive pomace. Pyrolysis runs were performed at temperature 700°C with heating rates of 5°C/min. Higher pyrolysis oil and gas yields were observed by the using waste olive pomace. The biochar yields of HDPE- olive pomace and LDPEolive pomace were 6.37% and 7.26% respectively for 50% olive pomace doses. The calorific value of HDPE-olive pomace and LDPE-olive pomace of pyrolysis oil were 8350 and 8495 kCal.

Keywords: Biochar, co-pyrolysis, waste plastic, waste olive pomace.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2269
3082 e/b-Learning Activities and High School Pedagogy

Authors: Rui Antunes

Abstract:

This article presents the implementation of several different e/b-Learning collaborative activities, used to improve the students learning process in an high school Polytechnic Institution. A new learning model arises, based on a combination between face-toface and distance leaning. Learning is now becoming centered with the development of collaborative activities, and its actors (teachers and students) have to be re-socialized to a new e/b-Learning paradigm. Measuring approaches are proposed for this model and results are presented, showing prospective correlation between students learning success and the use of online collaborative activities.

Keywords: e/b-Learning, Collaborative Learning, TeachingCommunities, Web-based Courseware

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1693
3081 A Study of Visitors, on Service Quality, Satisfaction and Loyal in Ya Tam San Bikeway

Authors: Ching-hui Lin, Yen-Chieh Wen

Abstract:

The main purpose of this study is to analyze the feelings of tourists for the service quality of the bikeway. In addition, this study also analyzed the causal relationship between service quality and satisfaction to visitor-s lane loyalty. In this study, the Ya Tam San bikeway visitor-s subjects, using the designated convenience sampling carried out the survey, a total of 651 questionnaires were validly. Valid questionnaires after statistical analysis, the following findings: 1. Visitor-s lane highest quality of service project: the routes through the region weather pleasant. Lane "with health and sports," the highest satisfaction various factors of service quality and satisfaction, loyal between correlations exist. 4. Guided tours of bikeways, the quality of the environment, and modeling imagery can effectively predict visitor satisfaction. 5. Quality of bikeway, public facilities, guided tours, and modeling imagery can effectively predict visitor loyalty. According to the above results, the study not only makes recommendations to the government units and the bicycle industry, also asked the research direction for future researchers.

Keywords: Service quality, satisfaction, loyal, bikeway.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1359
3080 Evaluation of Hazardous Status of Avenue Trees in University of Port Harcourt

Authors: F. S. Eguakun, T. C. Nkwor

Abstract:

Trees in the university environment are uniquely position; however, they can also present a millstone to the infrastructure and humans they coexist with. The numerous benefits of trees can be negated due to poor tree health and anthropogenic activities and as such can become hazardous. The study aims at evaluating the hazardous status of avenue trees in University of Port Harcourt. Data were collected from all the avenue trees within the selected major roads in the University. Tree growth variables were measured and health condition of the avenue trees were assessed as an indicator of some structural defects. The hazard status of the avenue trees was determined. Several tree species were used as avenue trees in the University however, Azadirachta indica (81%) was found to be most abundant. The result shows that only 0.3% avenue tree species was found to pose severe harzard in Abuja part of the University. Most avenue trees (55.2%) were rated as medium hazard status. Due to the danger and risk associated with hazardous trees, the study recommends that good and effective management strategies be implemented so as to prevent future damages from trees with small or medium hazard status.

Keywords: Avenue tree, hazard status, inventory, urban.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 701
3079 Energy Efficient Clustering Algorithm with Global and Local Re-clustering for Wireless Sensor Networks

Authors: Ashanie Guanathillake, Kithsiri Samarasinghe

Abstract:

Wireless Sensor Networks consist of inexpensive, low power sensor nodes deployed to monitor the environment and collect data. Gathering information in an energy efficient manner is a critical aspect to prolong the network lifetime. Clustering  algorithms have an advantage of enhancing the network lifetime. Current clustering algorithms usually focus on global re-clustering and local re-clustering separately. This paper, proposed a combination of those two reclustering methods to reduce the energy consumption of the network. Furthermore, the proposed algorithm can apply to homogeneous as well as heterogeneous wireless sensor networks. In addition, the cluster head rotation happens, only when its energy drops below a dynamic threshold value computed by the algorithm. The simulation result shows that the proposed algorithm prolong the network lifetime compared to existing algorithms.

Keywords: Energy efficient, Global re-clustering, Local re-clustering, Wireless sensor networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2359
3078 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: Internet of things, security, hybrid algorithm, privacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4179
3077 Enhancement of Cement Mortar Mechanical Properties with Replacement of Seashell Powder

Authors: Abdoullah Namdar, Fadzil Mat Yahaya

Abstract:

Many synthetic additives have been using for improve cement mortar and concrete characteristics, but natural additive is a friendly environment option. The quantity of (2% and 4%) seashell powder has been replaced in cement mortar, and compared with plain cement mortar in early age of 7 days. The strain gauges have been installed on beams and cube, for monitoring fluctuation of flexural and compressive strength. Main objective of this paper is to study effect of linear static force on flexural and compressive strength of modified cement mortar. The results have been indicated that the replacement of appropriate proportion of seashell powder enhances cement mortar mechanical properties. The replacement of 2% seashell causes improvement of deflection, time to failure and maximum load to failure on concrete beam and cube, the same occurs for compressive modulus elasticity. Increase replacement of seashell to 4% reduces all flexural strength, compressive strength and strain of cement mortar.

Keywords: Compressive strength, flexural strength, compressive modulus elasticity, time to failure, deflection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3444
3076 A Study on the Differential Diagnostic Model for Newborn Hearing Loss Screening

Authors: Chun-Lang Chang

Abstract:

According to the statistics, the prevalence of congenital hearing loss in Taiwan is approximately six thousandths; furthermore, one thousandths of infants have severe hearing impairment. Hearing ability during infancy has significant impact in the development of children-s oral expressions, language maturity, cognitive performance, education ability and social behaviors in the future. Although most children born with hearing impairment have sensorineural hearing loss, almost every child more or less still retains some residual hearing. If provided with a hearing aid or cochlear implant (a bionic ear) timely in addition to hearing speech training, even severely hearing-impaired children can still learn to talk. On the other hand, those who failed to be diagnosed and thus unable to begin hearing and speech rehabilitations on a timely manner might lose an important opportunity to live a complete and healthy life. Eventually, the lack of hearing and speaking ability will affect the development of both mental and physical functions, intelligence, and social adaptability. Not only will this problem result in an irreparable regret to the hearing-impaired child for the life time, but also create a heavy burden for the family and society. Therefore, it is necessary to establish a set of computer-assisted predictive model that can accurately detect and help diagnose newborn hearing loss so that early interventions can be provided timely to eliminate waste of medical resources. This study uses information from the neonatal database of the case hospital as the subjects, adopting two different analysis methods of using support vector machine (SVM) for model predictions and using logistic regression to conduct factor screening prior to model predictions in SVM to examine the results. The results indicate that prediction accuracy is as high as 96.43% when the factors are screened and selected through logistic regression. Hence, the model constructed in this study will have real help in clinical diagnosis for the physicians and actually beneficial to the early interventions of newborn hearing impairment.

Keywords: Data mining, Hearing impairment, Logistic regression analysis, Support vector machines

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1794
3075 Blind Identification Channel Using Higher Order Cumulants with Application to Equalization for MC−CDMA System

Authors: Mohammed Zidane, Said Safi, Mohamed Sabri, Ahmed Boumezzough

Abstract:

In this paper we propose an algorithm based on higher order cumulants, for blind impulse response identification of frequency radio channels and downlink (MC−CDMA) system Equalization. In order to test its efficiency, we have compared with another algorithm proposed in the literature, for that we considered on theoretical channel as the Proakis’s ‘B’ channel and practical frequency selective fading channel, called Broadband Radio Access Network (BRAN C), normalized for (MC−CDMA) systems, excited by non-Gaussian sequences. In the part of (MC−CDMA), we use the Minimum Mean Square Error (MMSE) equalizer after the channel identification to correct the channel’s distortion. The simulation results, in noisy environment and for different signal to noise ratio (SNR), are presented to illustrate the accuracy of the proposed algorithm.

Keywords: Blind identification and equalization, Higher Order Cumulants, (MC−CDMA) system, MMSE equalizer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1772
3074 Influence of Textured Clusters on the Goss Grains Growth in Silicon Steels Consideration of Energy and Mobility

Authors: H. Afer, N. Rouag, R. Penelle

Abstract:

In the Fe-3%Si sheets, grade Hi-B, with AlN and MnS as inhibitors, the Goss grains which abnormally grow do not have a size greater than the average size of the primary matrix. In this heterogeneous microstructure, the size factor is not a required condition for the secondary recrystallization. The onset of the small Goss grain abnormal growth appears to be related to a particular behavior of their grain boundaries, to the local texture and to the distribution of the inhibitors. The presence and the evolution of oriented clusters ensure to the small Goss grains a favorable neighborhood to grow. The modified Monte-Carlo approach, which is applied, considers the local environment of each grain. The grain growth is dependent of its real spatial position; the matrix heterogeneity is then taken into account. The grain growth conditions are considered in the global matrix and in different matrixes corresponding to A component clusters. The grain growth behaviour is considered with introduction of energy only, energy and mobility, energy and mobility and precipitates.

Keywords: Abnormal grain growth, grain boundary energy andmobility, neighbourhood, oriented clusters.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1363
3073 Heat and Mass Transfer in a Solar Dryer with Biomass Backup Burner

Authors: Andrew R.H. Rigit, Patrick T.K. Low

Abstract:

Majority of pepper farmers in Malaysia are using the open-sun method for drying the pepper berries. This method is time consuming and exposed the berries to rain and contamination. A maintenance-friendly and properly enclosed dryer is therefore desired. A dryer design with a solar collector and a chimney was studied and adapted to suit the needs of small-scale pepper farmers in Malaysia. The dryer will provide an environment with an optimum operating temperature meant for drying pepper berries. The dryer model was evaluated by using commercially available computational fluid dynamic (CFD) software in order to understand the heat and mass transfer inside the dryer. Natural convection was the only mode of heat transportation considered in this study as in accordance to the idea of having a simple and maintenance-friendly design. To accommodate the effect of low buoyancy found in natural convection driers, a biomass burner was integrated into the solar dryer design.

Keywords: Computational fluid dynamics, heat and masstransfer, solar dryer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3656
3072 Software Technology Behind Computer Accounting

Authors: M. Župan, V. Budimir

Abstract:

The main problems of data centric and open source project are large number of developers and changes of core framework. Model-View-Control (MVC) design pattern significantly improved the development and adjustments of complex projects. Entity framework as a Model layer in MVC architecture has simplified communication with the database. How often are the new technologies used and whether they have potentials for designing more efficient Enterprise Resource Planning (ERP) system that will be more suited to accountants?

Keywords: Accounting, Enterprise Resource Planning, Model- View-Control, Object Role Modeling, Open Source

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1881
3071 A Review on the Comparison of EU Countries Based on Research and Development Efficiencies

Authors: Yeliz Ekinci, Raife Merve Ön

Abstract:

Nowadays, technological progress is one of the most important components of economic growth and the efficiency of R&D activities is particularly essential for countries. This study is an attempt to analyze the R&D efficiencies of EU countries. The indicators related to R&D efficiencies should be determined in advance in order to use DEA. For this reason a list of input and output indicators are derived from the literature review. Considering the data availability, a final list is given for the numerical analysis for future research.

Keywords: Data envelopment analysis, economic growth, EU Countries, R&D efficiency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2038
3070 Design of Synchronous Torque Couplers

Authors: M. H. Nagrial, J. Rizk, A. Hellany

Abstract:

This paper presents the design, analysis and development of permanent magnet (PM) torque couplers. These couplers employ rare-earth magnets. Based on finite element analysis and earlier analytical works both concentric and face-type synchronous type couplers have been designed and fabricated. The experimental performance has good correlation with finite element calculations.

Keywords: Finite Element Analysis, Synchronous TorqueCouplers, Permanent Magnet Torque Couplers

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3037
3069 Embodied Cognition and Its Implications in Education: An Overview of Recent Literature

Authors: Panagiotis Kosmas, Panayiotis Zaphiris

Abstract:

Embodied Cognition (EC) as a learning paradigm is based on the idea of an inseparable link between body, mind, and environment. In recent years, the advent of theoretical learning approaches around EC theory has resulted in a number of empirical studies exploring the implementation of the theory in education. This systematic literature overview identifies the mainstream of EC research and emphasizes on the implementation of the theory across learning environments. Based on a corpus of 43 manuscripts, published between 2013 and 2017, it sets out to describe the range of topics covered under the umbrella of EC and provides a holistic view of the field. The aim of the present review is to investigate the main issues in EC research related to the various learning contexts. Particularly, the study addresses the research methods and technologies that are utilized, and it also explores the integration of body into the learning context. An important finding from the overview is the potential of the theory in different educational environments and disciplines. However, there is a lack of an explicit pedagogical framework from an educational perspective for a successful implementation in various learning contexts.

Keywords: Embodied cognition, embodied learning, education, technology, schools.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1693