Search results for: information technology outsourcing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5757

Search results for: information technology outsourcing

2637 Computer Assisted Learning in a Less Resource Region

Authors: Hamidullah Sokout, Samiullah Paracha, Abdul Rashid Ahmadi

Abstract:

Passing the entrance exam to a university is a major step in one's life. University entrance exam commonly known as Kankor is the nationwide entrance exam in Afghanistan. This examination is prerequisite for all public and private higher education institutions at undergraduate level. It is usually taken by students who are graduated from high schools. In this paper, we reflect the major educational school graduates issues and propose ICT-based test preparation environment, known as ‘Online Kankor Exam Prep System’ to give students the tools to help them pass the university entrance exam on the first try. The system is based on Intelligent Tutoring System (ITS), which introduced an essential package of educational technology for learners that features: (I) exam-focused questions and content; (ii) self-assessment environment; and (iii) test preparation strategies in order to help students to acquire the necessary skills in their carrier and keep them up-to-date with instruction.

Keywords: Web-based test prep systems, Learner-centered design, E-Learning, Intelligent tutoring system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1953
2636 A Design-Based Approach to Developing a Mobile Learning System

Authors: Martina Holenko Dlab, Natasa Hoic-Bozic, Ivica Boticki

Abstract:

This paper presents technologically innovative and scalable mobile learning solution within the SCOLLAm project (“Opening up education through Seamless and COLLAborative mobile learning on tablet computers”). The main research method applied during the development of the SCOLLAm mobile learning system is design-based research. It assumes iterative refinement of the system guided by collaboration between researches and practitioners. Following the identification of requirements, a multiplatform mobile learning system SCOLLAm [in]Form was developed. Several experiments were designed and conducted in the first and second grade of elementary school. SCOLLAm [in]Form system was used to design learning activities for math classes during which students practice calculation. System refinements were based on experience and interaction data gathered during class observations. In addition to implemented improvements, the data were used to outline possible improvements and deficiencies of the system that should be addressed in the next phase of the SCOLLAm [in]Form development.

Keywords: Adaptation, collaborative learning, educational technology, mobile learning, tablet computers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1229
2635 Implementation of the SIP Express Router with Mediaproxy Method on VoIP

Authors: Heru Nurwarsito, R. Arief Setyawan, Rakhmadhany Primananda

Abstract:

Voice Over IP (VoIP) is a technology that could pass the voice traffic and data packet form over an IP network. Network can be used for intranet or Internet. Phone calls using VoIP has advantages in terms of cheaper cost of PSTN phone to more than half, because the cost is calculated by the cost of the global nature of the Internet. Session Initiation Protocol (SIP) is a signaling protocol at the application layer which serves to establish, modify, and terminate a multimedia session involving one or more users. This SIP signaling has SIP message in text form that is used for session management by the SIP components, such as User Agent, Registrar, Redirect Server, and Proxy Server. To build a SIP communication is required SIP Express Router (SER) to be able to receive SIP messages, for handling the basic functions of SIP messages. Problems occur when the NAT through which affects the voice communication will be blocked starting from the sound that is not sent or one side of the sound are sent (half duplex). How that could be used to penetrate NAT is to use a given mediaproxy random RTP port to penetrate NAT.

Keywords: VoIP, SIP, SIP Express Router, NAT, Mediaproxy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2558
2634 Genetic Mining: Using Genetic Algorithm for Topic based on Concept Distribution

Authors: S. M. Khalessizadeh, R. Zaefarian, S.H. Nasseri, E. Ardil

Abstract:

Today, Genetic Algorithm has been used to solve wide range of optimization problems. Some researches conduct on applying Genetic Algorithm to text classification, summarization and information retrieval system in text mining process. This researches show a better performance due to the nature of Genetic Algorithm. In this paper a new algorithm for using Genetic Algorithm in concept weighting and topic identification, based on concept standard deviation will be explored.

Keywords: Genetic Algorithm, Text Mining, Term Weighting, Concept Extraction, Concept Distribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3715
2633 A Bayesian Network Reliability Modeling for FlexRay Systems

Authors: Kuen-Long Leu, Yung-Yuan Chen, Chin-Long Wey, Jwu-E Chen, Chung-Hsien Hsu

Abstract:

The increasing importance of FlexRay systems in automotive domain inspires unceasingly relative researches. One primary issue among researches is to verify the reliability of FlexRay systems either from protocol aspect or from system design aspect. However, research rarely discusses the effect of network topology on the system reliability. In this paper, we will illustrate how to model the reliability of FlexRay systems with various network topologies by a well-known probabilistic reasoning technology, Bayesian Network. In this illustration, we especially investigate the effectiveness of error containment built in star topology and fault-tolerant midpoint synchronization algorithm adopted in FlexRay communication protocol. Through a FlexRay steer-by-wire case study, the influence of different topologies on the failure probability of the FlexRay steerby- wire system is demonstrated. The notable value of this research is to show that the Bayesian Network inference is a powerful and feasible method for the reliability assessment of FlexRay systems.

Keywords: Bayesian Network, FlexRay, fault tolerance, network topology, reliability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2029
2632 Web 2.0 in Higher Education: The Instructors’ Acceptance in Higher Educational Institutes in Kingdom of Bahrain

Authors: Amal M. Alrayes, Hayat M. Ali

Abstract:

Since the beginning of distance education with the rapid evolution of technology, the social network plays a vital role in the educational process to enforce the interaction been the learners and teachers. There are many Web 2.0 technologies, services and tools designed for educational purposes. This research aims to investigate instructors’ acceptance towards web-based learning systems in higher educational institutes in Kingdom of Bahrain. Questionnaire is used to investigate the instructors’ usage of Web 2.0 and the factors affecting their acceptance. The results confirm that instructors had high accessibility to such technologies. However, patterns of use were complex. Whilst most expressed interest in using online technologies to support learning activities, learners seemed cautious about other values associated with web-based system, such as the shared construction of knowledge in a public format. The research concludes that there are main factors that affect instructors’ adoption which are security, performance expectation, perceived benefits, subjective norm, and perceived usefulness.

Keywords: Web 2.0, Higher education, Acceptance, Students’ perception.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1309
2631 A Learning Agent for Knowledge Extraction from an Active Semantic Network

Authors: Simon Thiel, Stavros Dalakakis, Dieter Roller

Abstract:

This paper outlines the development of a learning retrieval agent. Task of this agent is to extract knowledge of the Active Semantic Network in respect to user-requests. Based on a reinforcement learning approach, the agent learns to interpret the user-s intention. Especially, the learning algorithm focuses on the retrieval of complex long distant relations. Increasing its learnt knowledge with every request-result-evaluation sequence, the agent enhances his capability in finding the intended information.

Keywords: Reinforcement learning, learning retrieval agent, search in semantic networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1494
2630 Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC)

Authors: Ahmed K. Hasan, A. A. Zaidan, Anas Majeed, B. B. Zaidan, Rosli Salleh, Omar Zakaria, Ali Zuheir

Abstract:

Wireless mesh networks based on IEEE 802.11 technology are a scalable and efficient solution for next generation wireless networking to provide wide-area wideband internet access to a significant number of users. The deployment of these wireless mesh networks may be within different authorities and without any planning, they are potentially overlapped partially or completely in the same service area. The aim of the proposed model is design a new model to Enhancement Throughput of Unplanned Wireless Mesh Networks Deployment Using Partitioning Hierarchical Cluster (PHC), the unplanned deployment of WMNs are determinates there performance. We use throughput optimization approach to model the unplanned WMNs deployment problem based on partitioning hierarchical cluster (PHC) based architecture, in this paper the researcher used bridge node by allowing interworking traffic between these WMNs as solution for performance degradation.

Keywords: Wireless Mesh Networks, 802.11s Internetworking, partitioning Hierarchical Cluste.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1534
2629 Assessing Water Quality Using GIS: The Case of Northern Lebanon Miocene Aquifer

Authors: M. Saba, A. Iaaly, E. Carlier, N. Georges

Abstract:

This research focuses on assessing the ground water quality of Northern Lebanon affected by saline water intrusion. The chemical, physical and microbiological parameters were collected in various seasons spanning over the period of two years. Results were assessed using Geographic Information System (GIS) due to its visual capabilities in presenting the pollution extent in the studied region. Future projections of the excessive pumping were also simulated using GIS in order to assess the extent of the problem of saline intrusion in the near future.

Keywords: GIS, saline water, quality control, drinkable water quality standards, pumping.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1567
2628 The Effects of Immersion on Visual Attention and Detection of Signals Performance for Virtual Reality Training Systems

Authors: Shiau-Feng Lin, Chiuhsiang Joe Lin, Rou-Wen Wang, Wei-Jung Shiang

Abstract:

The Virtual Reality (VR) is becoming increasingly important for business, education, and entertainment, therefore VR technology have been applied for training purposes in the areas of military, safety training and flying simulators. In particular, the superior and high reliability VR training system is very important in immersion. Manipulation training in immersive virtual environments is difficult partly because users must do without the hap contact with real objects they rely on in the real world to orient themselves and their manipulated. In this paper, we create a convincing questionnaire of immersion and an experiment to assess the influence of immersion on performance in VR training system. The Immersion Questionnaire (IQ) included spatial immersion, Psychological immersion, and Sensory immersion. We show that users with a training system complete visual attention and detection of signals. Twenty subjects were allocated to a factorial design consisting of two different VR systems (Desktop VR and Projector VR). The results indicated that different VR representation methods significantly affected the participants- Immersion dimensions.

Keywords: Virtual Reality, Training, Immersion, Visual Attention, Visual Detection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1829
2627 Signal and Thermodynamic Analysis for Evaluation of Thermal and Power of Gas Turbine-Solid Oxide Fuel Cell Hybrid System

Authors: R. Mahjoub, K. Maghsoudi Mehraban

Abstract:

In recent years, solid oxide fuel cells have been used as one of the main technologies for the production of electrical energy with high-efficiency ratio, which is used hydrogen and other hydrocarbons as fuels. The fuel cell technology can be used either alone or in hybrid gas turbines systems. In this study, thermodynamics analysis for GT-SOFC hybrid system is developed, and then mass balance and exergy equations have been applied not only on the process but also on the individual components of the hybrid system, which enable us to estimate the thermal efficiency of the hybrid systems. Furthermore, various sources of irreversibility in the solid oxide fuel cell system are discussed, and modeling and parametric analyses like heat and pressure are carried out. This study enables us to consider the irreversible effects of solid oxide fuel cells, and also it leads to the specification of efficiency of the system accurately. Next in the study, both methane and hydrogen as a fuel for SOFC are used and implemented, and finally, our results are compared with other references.

Keywords: hybrid system, gas turbine, entropy and exergy analysis, irreversibility analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 494
2626 Adopting Procedural Animation Technology to Generate Locomotion of Quadruped Characters in Dynamic Environments

Authors: Zongyou He, Bashu Tsai, Chinhung Ko, Tainchi Lu

Abstract:

A procedural-animation-based approach which rapidly synthesize the adaptive locomotion for quadruped characters that they can walk or run in any directions on an uneven terrain within a dynamic environment was proposed. We devise practical motion models of the quadruped animals for adapting to a varied terrain in a real-time manner. While synthesizing locomotion, we choose the corresponding motion models by means of the footstep prediction of the current state in the dynamic environment, adjust the key-frames of the motion models relying on the terrain-s attributes, calculate the collision-free legs- trajectories, and interpolate the key-frames according to the legs- trajectories. Finally, we apply dynamic time warping to each part of motion for seamlessly concatenating all desired transition motions to complete the whole locomotion. We reduce the time cost of producing the locomotion and takes virtual characters to fit in with dynamic environments no matter when the environments are changed by users.

Keywords: Dynamic environment, motion synthesis, procedural animation, quadruped locomotion

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1891
2625 MEAL Project: Modifying Eating Attitudes and Actions through Learning

Authors: E. Oliver, A. Cebolla, A. Dominguez, A. Gonzalez-Segura, E. de la Cruz, S. Albertini, L. Ferrini, K. Kronika, T. Nilsen, R. Baños

Abstract:

The main objective of MEAL is to develop a pedagogical tool aimed to help teachers and nutritionists (students and professionals) to acquire, train, promote and deliver to children basic nutritional education and healthy eating behaviours competencies. MEAL is focused on eating behaviours and not only in nutritional literacy, and will use new technologies like Information and Communication Technologies (ICTs) and serious games (SG) platforms to consolidate the nutritional competences and habits.

Keywords: Nutritional Education, Pedagogical ICT Platform, Serious Games, Teachers and Nutritionists, Training Course.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2276
2624 Roundness Deviation Measuring Strategy at Coordination Measuring Machines and Conventional Machines

Authors: Lenka Ocenasova, Bartosz Gapinski, Robert Cep, Linda Gregova, Branimir Barisic, Jana Novakova, Lenka Petrkovska

Abstract:

Today technological process makes possible surface control of producing parts which is needful for product quality guarantee. Geometrical structure of part surface includes form, proportion, accuracy to shape, accuracy to size, alignment and surface topography (roughness, waviness, etc.). All these parameters are dependence at technology, production machine parameters, material properties, but also at human, etc. Every parameters approves at total part accuracy, it is means at accuracy to shape. One of the most important accuracy to shape element is roundness. This paper will be deals by comparison of roughness deviations at coordination measuring machines and at special single purpose machines. Will describing measuring by discreet method (discontinuous) and scanning method (continuous) at coordination measuring machines and confrontation with reference method using at single purpose machines.

Keywords: Coordinating Measuring Machines (CMM), Measuring Strategy, Roughness Deviation, Accuracy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2374
2623 Modeling of a Small Unmanned Aerial Vehicle

Authors: A. Elsayed Ahmed, A. Hafez, A. N. Ouda, H. Eldin Hussein Ahmed, H. Mohamed Abd-Elkader

Abstract:

Unmanned aircraft systems (UAS) are playing increasingly prominent roles in defense programs and defense strategies around the world. Technology advancements have enabled the development of it to do many excellent jobs as reconnaissance, surveillance, battle fighters, and communications relays. Simulating a small unmanned aerial vehicle (SUAV) dynamics and analyzing its behavior at the preflight stage is too important and more efficient. The first step in the UAV design is the mathematical modeling of the nonlinear equations of motion. . In this paper, a survey with a standard method to obtain the full non-linear equations of motion is utilized, and then the linearization of the equations according to a steady state flight condition (trimming) is derived. This modeling technique is applied to an Ultrastick-25e fixed wing UAV to obtain the valued linear longitudinal and lateral models. At the end the model is checked by matching between the behavior of the states of the nonlinear UAV and the resulted linear model with doublet at the control surfaces.

Keywords: Equations of motion, linearization, modeling, nonlinear model, UAV.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5611
2622 Effect of Rubber Tyre and Plastic Wastes Use in Asphalt Concrete Pavement

Authors: F. Onyango, Salim R. Wanjala, M. Ndege, L. Masu

Abstract:

Asphalt concrete pavements have a short life cycle, failing mainly due to temperature changes, traffic loading and ageing. Modified asphalt mixtures provide the technology to produce a bituminous binder with improved viscoelastic properties, which remain in balance over a wider temperature range and loading conditions. In this research, 60/70 penetration grade asphalt binder was modified by adding 2, 4, 6, 8 and 10 percent by weight of asphalt binder following the wet process and the mineral aggregate was modified by adding 1, 2, 3, 4 and 5 percent crumb rubber by volume of the mineral aggregate following the dry process. The LDPE modified asphalt binder rheological properties were evaluated. The laboratory results showed an increase in viscosity, softening point and stiffness of the binder. The modified asphalt was then used in preparing asphalt mixtures by Marshall Mix design procedure. The Marshall Stability values for mixes containing 2% crumb rubber and 4% LDPE were found to be 30% higher than the conventional asphalt concrete mix.

Keywords: Crumb rubber, dry process, low-density polyethylene, hot mix asphalt, wet process.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4707
2621 Consumers’ Responses to Non-Traditional Marketing Communication Strategies for Advertising Herbal Products

Authors: Chioma Ifeoma Agbasimelo, Stephen Afam Kenechukwu

Abstract:

The study examined consumers’ responses to non-traditional marketing communication strategies in advertising herbal products. The study identified the following non-traditional marketing communication strategies: (a) trado-instrumental marketing strategy, (b) trado-demonstrative marketing strategy, and (c) trado-iconographic marketing strategy. Anchored on the Black Box Theory, it adopted the survey design of three metropolises (Awka, Onitsha, and Nnewi) in Anambra State, Nigeria. Major findings indicated that among the identified strategies, the trado-instrumental marketing strategy is the most dominant strategy. Other strategies: (b) trado-demonstrative marketing strategy and (c) trado-iconographic marketing strategy, are sparingly used in semi-urban cities. It also found that consumers’ preferences and adoption of non-traditional marketing communication were minimal. Based on the findings, there is a need to create a unified system of integration of both traditional and non-traditional marketing communication strategies due to technology interfaces.

Keywords: Advertising, consumers’ responses, herbal products, non-traditional marketing communication strategies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 86
2620 A Bi-Objective Preventive Healthcare Facility Network Design with Incorporating Cost and Time Saving

Authors: Mehdi Seifbarghy, Keyvan Roshan

Abstract:

Main goal of preventive healthcare problems are at decreasing the likelihood and severity of potentially life-threatening illnesses by protection and early detection. The levels of establishment and staffing costs along with summation of the travel and waiting time that clients spent are considered as objectives functions of the proposed nonlinear integer programming model. In this paper, we have proposed a bi-objective mathematical model for designing a network of preventive healthcare facilities so as to minimize aforementioned objectives, simultaneously. Moreover, each facility acts as M/M/1 queuing system. The number of facilities to be established, the location of each facility, and the level of technology for each facility to be chosen are provided as the main determinants of a healthcare facility network. Finally, to demonstrate performance of the proposed model, four multi-objective decision making techniques are presented to solve the model.

Keywords: Preventive healthcare problems, Non-linear integer programming models, Multi-objective decision making techniques

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1770
2619 Embodied Cognition and Its Implications in Education: An Overview of Recent Literature

Authors: Panagiotis Kosmas, Panayiotis Zaphiris

Abstract:

Embodied Cognition (EC) as a learning paradigm is based on the idea of an inseparable link between body, mind, and environment. In recent years, the advent of theoretical learning approaches around EC theory has resulted in a number of empirical studies exploring the implementation of the theory in education. This systematic literature overview identifies the mainstream of EC research and emphasizes on the implementation of the theory across learning environments. Based on a corpus of 43 manuscripts, published between 2013 and 2017, it sets out to describe the range of topics covered under the umbrella of EC and provides a holistic view of the field. The aim of the present review is to investigate the main issues in EC research related to the various learning contexts. Particularly, the study addresses the research methods and technologies that are utilized, and it also explores the integration of body into the learning context. An important finding from the overview is the potential of the theory in different educational environments and disciplines. However, there is a lack of an explicit pedagogical framework from an educational perspective for a successful implementation in various learning contexts.

Keywords: Embodied cognition, embodied learning, education, technology, schools.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1735
2618 Using Automatic Ontology Learning Methods in Human Plausible Reasoning Based Systems

Authors: A. R. Vazifedoost, M. Rahgozar, F. Oroumchian

Abstract:

Knowledge discovery from text and ontology learning are relatively new fields. However their usage is extended in many fields like Information Retrieval (IR) and its related domains. Human Plausible Reasoning based (HPR) IR systems for example need a knowledge base as their underlying system which is currently made by hand. In this paper we propose an architecture based on ontology learning methods to automatically generate the needed HPR knowledge base.

Keywords: Ontology Learning, Human Plausible Reasoning, knowledge extraction, knowledge representation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1601
2617 Air Pollution Control from Rice Shellers - A Case Study

Authors: S. M. Ahuja

Abstract:

A Rice Sheller is used for obtaining polished white rice from paddy. There are about 3000 Rice Shellers in Punjab and 50000 in India. During the process of shelling lot of dust is emitted from different unit operations like paddy silo, paddy shaker, bucket elevators, huskers, paddy separator etc. These dust emissions have adverse effect on the health of the workers and the wear and tear of the shelling machinery is fast. All the dust emissions spewing out of these unit operations of a rice Sheller were contained by providing suitable hoods and enclosures while ensuring their workability. These were sucked by providing an induced draft fan followed by a high efficiency cyclone separator that has got an overall dust collection efficiency of more than 90%. This cyclone separator replaced two cyclone separators and a filter bag house, which the Rice Sheller was already having. The dust concentration in the stack after the installation of cyclone separator is well within the stipulated standards. Besides controlling pollution, there is improvement in the quality of products like bran and the life of shelling machinery has enhanced. The payback period of this technology is less than four shelling months.

Keywords: Air Pollution, Cyclone Separator, Pneumatic Conveying, Rice Sheller.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3374
2616 Two New Low Power High Performance Full Adders with Minimum Gates

Authors: M.Hosseinghadiry, H. Mohammadi, M.Nadisenejani

Abstract:

with increasing circuits- complexity and demand to use portable devices, power consumption is one of the most important parameters these days. Full adders are the basic block of many circuits. Therefore reducing power consumption in full adders is very important in low power circuits. One of the most powerconsuming modules in full adders is XOR/XNOR circuit. This paper presents two new full adders based on two new logic approaches. The proposed logic approaches use one XOR or XNOR gate to implement a full adder cell. Therefore, delay and power will be decreased. Using two new approaches and two XOR and XNOR gates, two new full adders have been implemented in this paper. Simulations are carried out by HSPICE in 0.18μm bulk technology with 1.8V supply voltage. The results show that the ten-transistors proposed full adder has 12% less power consumption and is 5% faster in comparison to MB12T full adder. 9T is more efficient in area and is 24% better than similar 10T full adder in term of power consumption. The main drawback of the proposed circuits is output threshold loss problem.

Keywords: Full adder, XNOR, Low power, High performance, Very Large Scale Integrated Circuit.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2081
2615 The Layered Transition Metal Dichalcogenides as Materials for Storage Clean Energy: Ab initio Investigations

Authors: S. Meziane, H. I. Faraoun, C. Esling

Abstract:

Transition metal dichalcogenides have potential applications in power generation devices that convert waste heat into electric current by the so-called Seebeck and Hall effects thus providing an alternative energy technology to reduce the dependence on traditional fossil fuels. In this study, the thermoelectric properties of 1T and 2HTaX2 (X= S or Se) dichalcogenide superconductors have been computed using the semi-classical Boltzmann theory. Technologically, the task is to fabricate suitable materials with high efficiency. It is found that 2HTaS2 possesses the largest value of figure of merit ZT= 1.27 at 175 K. From a scientific point of view, we aim to model the underlying materials properties and in particular the transport phenomena as mediated by electrons and lattice vibrations responsible for superconductivity, Charge Density Waves (CDW) and metal/insulator transitions as function of temperature. The goal of the present work is to develop an understanding of the superconductivity of these selected materials using the transport properties at the fundamental level.

Keywords: Ab initio, high efficiency, power generation devices, transition metal dichalcogenides.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1785
2614 Fast Extraction of Edge Histogram in DCT Domain based on MPEG7

Authors: Minyoung Eom, Yoonsik Choe

Abstract:

In these days, multimedia data is transmitted and processed in compressed format. Due to the decoding procedure and filtering for edge detection, the feature extraction process of MPEG-7 Edge Histogram Descriptor is time-consuming as well as computationally expensive. To improve efficiency of compressed image retrieval, we propose a new edge histogram generation algorithm in DCT domain in this paper. Using the edge information provided by only two AC coefficients of DCT coefficients, we can get edge directions and strengths directly in DCT domain. The experimental results demonstrate that our system has good performance in terms of retrieval efficiency and effectiveness.

Keywords: DCT, Descriptor, EHD, MPEG7.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2127
2613 Semi-Automatic Approach for Semantic Annotation

Authors: Mohammad Yasrebi, Mehran Mohsenzadeh

Abstract:

The third phase of web means semantic web requires many web pages which are annotated with metadata. Thus, a crucial question is where to acquire these metadata. In this paper we propose our approach, a semi-automatic method to annotate the texts of documents and web pages and employs with a quite comprehensive knowledge base to categorize instances with regard to ontology. The approach is evaluated against the manual annotations and one of the most popular annotation tools which works the same as our tool. The approach is implemented in .net framework and uses the WordNet for knowledge base, an annotation tool for the Semantic Web.

Keywords: Semantic Annotation, Metadata, Information Extraction, Semantic Web, knowledge base.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1867
2612 Investigating Simple Multipath Compensation for Frequency Modulated Signals at Lower Frequencies

Authors: Lusungu Ndovi

Abstract:

Radio propagation from point-to-point is affected by the physical channel in many ways. A signal arriving at a destination travels through a number of different paths which are referred to as multi-paths. Research in this area of wireless communications has progressed well over the years with the research taking different angles of focus. By this is meant that some researchers focus on ways of reducing or eluding Multipath effects whilst others focus on ways of mitigating the effects of Multipath through compensation schemes. Baseband processing is seen as one field of signal processing that is cardinal to the advancement of software defined radio technology. This has led to wide research into the carrying out certain algorithms at baseband. This paper considers compensating for Multipath for Frequency Modulated signals. The compensation process is carried out at Radio frequency (RF) and at Quadrature baseband (QBB) and the results are compared. Simulations are carried out using MatLab so as to show the benefits of working at lower QBB frequencies than at RF.

Keywords: Quadrature baseband, Radio frequency, MultipathCompensation, Frequency modulation, Signal Processing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1651
2611 Preliminary Development of a Hydrogen Peroxide Thruster

Authors: Y. A. Chan, H. J. Liu, K. C. Tseng, T. C. Kuo

Abstract:

Green propellants used for satellite-level propulsion system become attractive in recent years because the non-toxicity and lower requirements of safety protection. One of the green propellants, high-concentration hydrogen peroxide H2O2 solution (≥70% w/w, weight concentration percentage), often known as high-test peroxide (HTP), is considered because it is ITAR-free, easy to manufacture and the operating temperature is lower than traditional monopropellant propulsion. To establish satellite propulsion technology, the National Space Organization (NSPO) in Taiwan has initialized a long-term cooperation project with the National Cheng Kung University to develop compatible tank and thruster. An experimental propulsion payload has been allocated for the future self-reliant satellite to perform orbit transfer and maintenance operations. In the present research, an 1-Newton thruster prototype is designed and the thrusting force is measured by a pendulum-type platform. The preliminary hot-firing test at ambient environment showed the generated thrust and the specific impulse are about 0.7 Newton and 102 seconds, respectively.

Keywords: Hydrogen peroxide, propulsion, RCS, satellite.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4768
2610 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Y. Cifuentes, L. Beltrán, L. Ramírez

Abstract:

The availability to deploy mobile applications for health care is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4411
2609 Deep Learning for Renewable Power Forecasting: An Approach Using LSTM Neural Networks

Authors: Fazıl Gökgöz, Fahrettin Filiz

Abstract:

Load forecasting has become crucial in recent years and become popular in forecasting area. Many different power forecasting models have been tried out for this purpose. Electricity load forecasting is necessary for energy policies, healthy and reliable grid systems. Effective power forecasting of renewable energy load leads the decision makers to minimize the costs of electric utilities and power plants. Forecasting tools are required that can be used to predict how much renewable energy can be utilized. The purpose of this study is to explore the effectiveness of LSTM-based neural networks for estimating renewable energy loads. In this study, we present models for predicting renewable energy loads based on deep neural networks, especially the Long Term Memory (LSTM) algorithms. Deep learning allows multiple layers of models to learn representation of data. LSTM algorithms are able to store information for long periods of time. Deep learning models have recently been used to forecast the renewable energy sources such as predicting wind and solar energy power. Historical load and weather information represent the most important variables for the inputs within the power forecasting models. The dataset contained power consumption measurements are gathered between January 2016 and December 2017 with one-hour resolution. Models use publicly available data from the Turkish Renewable Energy Resources Support Mechanism. Forecasting studies have been carried out with these data via deep neural networks approach including LSTM technique for Turkish electricity markets. 432 different models are created by changing layers cell count and dropout. The adaptive moment estimation (ADAM) algorithm is used for training as a gradient-based optimizer instead of SGD (stochastic gradient). ADAM performed better than SGD in terms of faster convergence and lower error rates. Models performance is compared according to MAE (Mean Absolute Error) and MSE (Mean Squared Error). Best five MAE results out of 432 tested models are 0.66, 0.74, 0.85 and 1.09. The forecasting performance of the proposed LSTM models gives successful results compared to literature searches.

Keywords: Deep learning, long-short-term memory, energy, renewable energy load forecasting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1596
2608 Survey on Jamming Wireless Networks: Attacks and Prevention Strategies

Authors: S. Raja Ratna, R. Ravi

Abstract:

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general overview of jamming in wireless network. It covers relevant works, different jamming techniques, various types of jammers and typical prevention techniques. Challenges associated with comparing several anti-jamming techniques are also highlighted.

Keywords: Channel, Cryptography, Frequency, Jamming, Legitimate, Security, Wavelength.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3162