Search results for: length of service
1740 An Approach to Flatten the Gain of Fiber Raman Amplifiers with Multi-Pumping
Authors: Surinder Singh, Adish Bindal
Abstract:
The effects of the pumping wavelength and their power on the gain flattening of a fiber Raman amplifier (FRA) are investigated. The multi-wavelength pumping scheme is utilized to achieve gain flatness in FRA. It is proposed that gain flatness becomes better with increase in number of pumping wavelengths applied. We have achieved flat gain with 0.27 dB fluctuation in a spectral range of 1475-1600 nm for a Raman fiber length of 10 km by using six pumps with wavelengths with in the 1385-1495 nm interval. The effect of multi-wavelength pumping scheme on gain saturation in FRA is also studied. It is proposed that gain saturation condition gets improved by using this scheme and this scheme is more useful for higher spans of Raman fiber length.Keywords: FRA, gain, pumping, WDM.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19281739 Experimental Study of LPG Diffusion Flame at Elevated Preheated Air Temperatures
Authors: A. A. Amer, H. M. Gad, I. A. Ibrahim, S. I. Abdel-Mageed, T. M. Farag
Abstract:
This paper represents an experimental study of LPG diffusion flame at elevated preheated air temperatures. The flame is stabilized in a vertical water-cooled combustor by using air swirler. An experimental test rig was designed to investigate the different operating conditions. The burner head is designed so that the LPG fuel issued centrally and surrounded by the swirling air issues from an air swirler. There are three air swirlers having the same dimensions but having different blade angles to give different swirl numbers of 0.5, 0.87 and 1.5. The combustion air was heated electrically before entering the combustor up to a temperature about 500 K. Five air to fuel mass ratios of 15, 20, 30, 40 and 50 were also studied. The effect of preheated air temperature, swirl number and air to fuel mass ratios on the temperature maps, visible flame length, high temperature region (size) and exhaust species concentrations are studied. Some results show that as the preheated air temperature increases, the volume of high temperature region also increased but the flame length decreased. Increasing the preheated air temperature, EINOx, EICO2 and EIO2 increased, while EICO decreased. Increasing the preheated air temperature from 300 to 500 K, for all air swirl numbers used, the highest increase in EINOx, EICO2 and EIO2 are 141, 4 and 65%, respectively.Keywords: Preheated air temperature, air swirler, flame length, emission index.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20251738 Analysis of Flow in Cylindrical Mixing Chamber
Authors: Václav Dvořák
Abstract:
The article deals with numerical investigation of axisymmetric subsonic air to air ejector. An analysis of flow and mixing processes in cylindrical mixing chamber are made. Several modes with different velocity and ejection ratio are presented. The mixing processes are described and differences between flow in the initial region of mixing and the main region of mixing are described. The lengths of both regions are evaluated. Transition point and point where the mixing processes are finished are identified. It was found that the length of the initial region of mixing is strongly dependent on the velocity ratio, while the length of the main region of mixing is dependent on velocity ratio only slightly.
Keywords: Air ejector, mixing chamber, CFD.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 39761737 Information Requirements for Vessel Traffic Service Operations
Authors: Fan Li, Chun-Hsien Chen, Li Pheng Khoo
Abstract:
Operators of vessel traffic service (VTS) center provides three different types of services; namely information service, navigational assistance and traffic organization to vessels. To provide these services, operators monitor vessel traffic through computer interface and provide navigational advice based on the information integrated from multiple sources, including automatic identification system (AIS), radar system, and closed circuit television (CCTV) system. Therefore, this information is crucial in VTS operation. However, what information the VTS operator actually need to efficiently and properly offer services is unclear. The aim of this study is to investigate into information requirements for VTS operation. To achieve this aim, field observation was carried out to elicit the information requirements for VTS operation. The study revealed that the most frequent and important tasks were handling arrival vessel report, potential conflict control and abeam vessel report. Current location and vessel name were used in all tasks. Hazard cargo information was particularly required when operators handle arrival vessel report. The speed, the course, and the distance of two or several vessels were only used in potential conflict control. The information requirements identified in this study can be utilized in designing a human-computer interface that takes into consideration what and when information should be displayed, and might be further used to build the foundation of a decision support system for VTS.
Keywords: Vessel traffic service, information requirements, hierarchy task analysis, field observation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15911736 An Augmented Beam-search Based Algorithm for the Strip Packing Problem
Authors: Hakim Akeb, Mhand Hifi
Abstract:
In this paper, the use of beam search and look-ahead strategies for solving the strip packing problem (SPP) is investigated. Given a strip of fixed width W, unlimited length L, and a set of n circular pieces of known radii, the objective is to determine the minimum length of the initial strip that packs all the pieces. An augmented algorithm which combines beam search and a look-ahead strategies is proposed. The look-ahead is used in order to evaluate the nodes at each level of the tree search. The best nodes are then retained for branching. The computational investigation showed that the proposed augmented algorithm is able to improve the best known solutions of the literature on most instances used.
Keywords: Combinatorial optimization, cutting and packing, beam search, heuristic, look-ahead strategy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13571735 The Attitudes of Pre-Service Teachers towards Analytical Thinking Skill Development Based On Miller’s Model
Authors: Thassanant Unnanantn, Suttipong Boonphadung
Abstract:
This research study aimed to survey and analyze the attitudes of pre-service teachers’ the analytical thinking development based on Miller’s Model. The informants of this study were 22 third year teacher students majoring in Thai. The course where the instruction was conducted was English for Academic Purposes in Thai Language 2. The instrument of this research was an open-ended questionnaire with two dimensions of questions: academic and satisfaction dimensions. The investigation revealed the positive attitudes. In the academic dimension, the majority of 12 (54.54%), the highest percentage, reflected that the method of teaching analytical thinking and language simultaneously was their new knowledge and the similar percentage also belonged to text cohesion in writing. For the satisfaction, the highest frequency count was from 17 of them (77.27%) and this majority favored the openness or friendliness of the teacher.
Keywords: Analytical thinking development, Attitudes, Miller’s Model, Pre-service teachers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21141734 Mathematical Rescheduling Models for Railway Services
Authors: Zuraida Alwadood, Adibah Shuib, Norlida Abd Hamid
Abstract:
This paper presents the review of past studies concerning mathematical models for rescheduling passenger railway services, as part of delay management in the occurrence of railway disruption. Many past mathematical models highlighted were aimed at minimizing the service delays experienced by passengers during service disruptions. Integer programming (IP) and mixed-integer programming (MIP) models are critically discussed, focusing on the model approach, decision variables, sets and parameters. Some of them have been tested on real-life data of railway companies worldwide, while a few have been validated on fictive data. Based on selected literatures on train rescheduling, this paper is able to assist researchers in the model formulation by providing comprehensive analyses towards the model building. These analyses would be able to help in the development of new approaches in rescheduling strategies or perhaps to enhance the existing rescheduling models and make them more powerful or more applicable with shorter computing time.
Keywords: Mathematical modelling, Mixed-integer programming, Railway rescheduling, Service delays.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32511733 The Urban Transportation Systems in Two Cities Located in the Rio de Janeiro State, Brazil
Authors: D. I. De Souza, G. P. Azevedo, R. Rocha
Abstract:
The State of Rio de Janeiro, Brazil, will hold two important events in the nearby future. In 2014 it will have the final game of the Football World Cup, and in 2016 it will be holding the Olympic Games. Therefore, the public transportation system (mainly buses) is of a major concern to the Rio de Janeiro State authorities-. The main objective of this work is to compare the quality of service of the bus companies operating in the cities of ItaperunaandCampos, both cities situated in the state of Rio de Janeiro, Brazil. The outcome of thiscomparison, based on the opinion of the bus users, has shownthemdispleased with the quality of the service provided by the bus companies operating in both cities. It is urgent the need to find possible practical alternatives to minimize the consequences of the main problems detected in this work. With these practical alternatives available, we will be able to offer to the Rio de Janeiro State authorities- suggestions about possible solutions to the main problems identified in this survey, as well as the time of implantation and costs of these solutions.
Keywords: Public Transportation, Quality of Service, Riders' Opinion, Bus Companies, Practical Alternatives.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16491732 Secure Protocol for Short Message Service
Authors: Shubat S. Ahmeda, Ashraf M. Ali Edwila
Abstract:
Short Message Service (SMS) has grown in popularity over the years and it has become a common way of communication, it is a service provided through General System for Mobile Communications (GSM) that allows users to send text messages to others. SMS is usually used to transport unclassified information, but with the rise of mobile commerce it has become a popular tool for transmitting sensitive information between the business and its clients. By default SMS does not guarantee confidentiality and integrity to the message content. In the mobile communication systems, security (encryption) offered by the network operator only applies on the wireless link. Data delivered through the mobile core network may not be protected. Existing end-to-end security mechanisms are provided at application level and typically based on public key cryptosystem. The main concern in a public-key setting is the authenticity of the public key; this issue can be resolved by identity-based (IDbased) cryptography where the public key of a user can be derived from public information that uniquely identifies the user. This paper presents an encryption mechanism based on the IDbased scheme using Elliptic curves to provide end-to-end security for SMS. This mechanism has been implemented over the standard SMS network architecture and the encryption overhead has been estimated and compared with RSA scheme. This study indicates that the ID-based mechanism has advantages over the RSA mechanism in key distribution and scalability of increasing security level for mobile service.Keywords: Elliptic Curve Cryptography (ECC), End-to-end Security, Identity-based Cryptography, Public Key, RSA, SMS Protocol.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22231731 The Impact of Culture on Tourists’ Evaluation of Hotel Service Experiences
Authors: Eid Alotaibi
Abstract:
The purpose of this study is to investigate the impact of tourists’ culture on perception and evaluation of hotel service experience and behavioral intentions. Drawing on Hofested’s cultural dimensions, this study seeks to further contribute towards understanding the effect of culture on perception and evaluation of hotels’ services, and whether there are differences between Saudi and European tourists’ perceptions of hotel services evaluation. A descriptive cross-sectional design was used in this study. Data were collected from tourists staying in five-star hotels in Saudi Arabia using the self-completion technique. The findings show that evaluations of hotel services differ from one culture to another. T-test results reveal that Saudis were more tolerant and reported significantly higher levels of satisfaction, were more likely to return and recommend the hotel, and perceived the price for the hotel stay as being good value for money as compared to their European counterparts. The sample was relatively small and specific to only five-star hotel evaluations. As a result, findings cannot be generalized to the wider tourist population. The results of this research have important implications for management within the Saudi hospitality industry. The study contributes to the tourist cultural theory by emphasizing the relative importance of cultural dimensions in-service evaluation. The author argues that no studies could be identified that compare Saudis and Europeans in their evaluations of their experiences staying at hotels. Therefore, the current study would enhance understanding of the effects of cultural factors on service evaluations and provide valuable input for international market segmentation and resource allocation in the Saudi hotel industry.
Keywords: Culture, tourist, service experience, hotel industry, Hofested’s cultural dimensions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10951730 Digital Transformation of Payment Systems Using Field Service Management
Authors: Hamze Torabian, Mohammad Mehrabioun Mohammadi
Abstract:
Like many other industries, the payment industry has been affected by digital transformation. The importance of digital transformation in the payment industry is very crucial. Because the payment industry is considered a leading industry in digital and emerging technologies, and the digitalization of other industries such as retail, health, and telecommunication, it also depends on the growth rate of digitalized payment systems. One of the technological innovations in service management is Field Service Management (FSM). Despite the widespread use of FSM in various industries such as petrochemical, health, maintenance, etc., this technology can also be recruited in the payment industry, transforming the payment industry into a more agile and efficient one. Accordingly, the present study pays close attention to the application of FSM in the payment industry. Given the importance of merchants' bargaining power in the payment industry, this study aims to use FSM in the digital transformation initiative with a targeted focus on providing real-time services to merchants. The research method consists of three parts. Firstly, conducting the review of past research, applications of FSM in the payment industry are considered. In the next step, merchants' benefits such as emotional, functional, economic, and social benefits in using FSM are identified using in-depth interviews and content analysis methods. The related business model in helping the payment industry transforming into a more agile and efficient industry is considered in the following step. The results revealed the 10 main pillars required to realize the digital transformation of payment systems using FSM.
Keywords: Digital transformation, field service management, merchant support systems, payment industry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6201729 Selection of Plants as Possible Rhizoremediators for Restoration of Oil Contaminated Soil
Authors: Togzhan D. Mukasheva, Anel A. Omirbekova, Raikhan S. Sydykbekova, Ramza Zh. Berzhanova, Lyudmila V. Ignatova
Abstract:
In studying the possibility of using plants as rhizoremediators, barley and grass mixture which showed resistance to various concentrations of oil were selected. The minimum inhibitory effect of oil on these plants by morphological parameters such as survival of plants, length and biomass of shoot and root compared with the control was showed. In determining physiological parameters, a slight decrease in the number of chlorophyll a and b in the leaves of plants was noted. The differences in the ratio of the total surface of the roots to the work surface with the growth of plants in soil with oil in the study of adsorption of the root surface were showed.
Keywords: Length of shoot and root, biomass, chlorophyll a and b, adsorption surface, barley, grass mixture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16191728 Information Tree - Establishment of Lifestyle-Based IT Visual Model
Authors: Chiung-Hui Chen
Abstract:
Traditional service channel is losing its edge due to emerging service technology. To establish interaction with the clients, the service industry is using effective mechanism to give clients direct access to services with emerging technologies. Thus, as service science receives attention, special and unique consumption pattern evolves; henceforth, leading to new market mechanism and influencing attitudes toward life and consumption patterns. The market demand for customized services is thus valued due to the emphasis of personal value, and is gradually changing the demand and supply relationship in the traditional industry. In respect of interior design service, in the process of traditional interior design, a designer converts to a concrete form the concept generated from the ideas and needs dictated by a user (client), by using his/her professional knowledge and drawing tool. The final product is generated through iterations of communication and modification, which is a very time-consuming process. Although this process has been accelerated with the help of computer graphics software today, repeated discussions and confirmations with users are still required to complete the task. In consideration of what is addressed above a space user’s life model is analyzed with visualization technique to create an interaction system modeled after interior design knowledge. The space user document intuitively personal life experience in a model requirement chart, allowing a researcher to analyze interrelation between analysis documents, identify the logic and the substance of data conversion. The repeated data which is documented are then transformed into design information for reuse and sharing. A professional interior designer may sort out the correlation among user’s preference, life pattern and design specification, thus deciding the critical design elements in the process of service design.
Keywords: Information Design, Life Model-Based, Aesthetic Computing, Communication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17191727 A Study of Standing-Wave Thermoacoustic Refrigerator
Authors: Patcharin Saechan, Isares Dhuchakallaya
Abstract:
Thermoacoustic refrigerator is a cooling device which uses the acoustic waves to produce the cooling effect. The aim of this paper is to explore the experimental and numerical feasibility of a standing-wave thermoacoustic refrigerator. The effects of the stack length, position of stack and operating frequency on the cooling performance are carried out. The circular pore stacks are tested under the atmospheric pressure. A low-cost loudspeaker is used as an acoustic driver. The results show that the location of stack installed in resonator tube has a greater effect on the cooling performance, than the stack length and operating frequency, respectively. The temperature difference across the ends of stack can be generated up to 13.7°C, and the temperature of cold-end is dropped down by 5.3°C from the ambient temperature.Keywords: Cooling performance, Refrigerator, Standing-wave, Thermoacoustics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23551726 Performance Evaluation of Prioritized Limited Processor-Sharing System
Authors: Yoshiaki Shikata, Wataru Katagiri, Yoshitaka Takahashi
Abstract:
We propose a novel prioritized limited processor-sharing (PS) rule and a simulation algorithm for the performance evaluation of this rule. The performance measures of practical interest are evaluated using this algorithm. Suppose that there are two classes and that an arriving (class-1 or class-2) request encounters n1 class-1 and n2 class-2 requests (including the arriving one) in a single-server system. According to the proposed rule, class-1 requests individually and simultaneously receive m / (m * n1+ n2) of the service-facility capacity, whereas class-2 requests receive 1 / (m *n1 + n2) of it, if m * n1 + n2 ≤ C. Otherwise (m * n1 + n2 > C), the arriving request will be queued in the corresponding class waiting room or rejected. Here, m (1) denotes the priority ratio, and C ( ∞), the service-facility capacity. In this rule, when a request arrives at [or departs from] the system, the extension [shortening] of the remaining sojourn time of each request receiving service can be calculated using the number of requests of each class and the priority ratio. Employing a simulation program to execute these events and calculations enables us to analyze the performance of the proposed prioritized limited PS rule, which is realistic in a time-sharing system (TSS) with a sufficiently small time slot. Moreover, this simulation algorithm is expanded for the evaluation of the prioritized limited PS system with N 3 priority classes.Keywords: PS rule, priority ratio, service-facility capacity, simulation algorithm, sojourn time, performance measures
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11921725 Cycle Embedding in Folded Hypercubes with More Faulty Elements
Authors: Wen-Yin Huang, Jia-Jie Liu, Jou-Ming Chang
Abstract:
Faults in a network may take various forms such as hardware/software errors, vertex/edge faults, etc. Folded hypercube is a well-known variation of the hypercube structure and can be constructed from a hypercube by adding a link to every pair of nodes with complementary addresses. Let FFv (respectively, FFe) be the set of faulty nodes (respectively, faulty links) in an n-dimensional folded hypercube FQn. Hsieh et al. have shown that FQn - FFv - FFe for n ≥ 3 contains a fault-free cycle of length at least 2n -2|FFv|, under the constraints that (1) |FFv| + |FFe| ≤ 2n - 4 and (2) every node in FQn is incident to at least two fault-free links. In this paper, we further consider the constraints |FFv| + |FFe| ≤ 2n - 3. We prove that FQn - FFv - FFe for n ≥ 5 still has a fault-free cycle of length at least 2n - 2|FFv|, under the constraints : (1) |FFv| + |FFe| ≤ 2n - 3, (2) |FFe| ≥ n + 2, and (3) every vertex is still incident with at least two links.
Keywords: Folded hypercubes, interconnection networks, cycle embedding, faulty elements.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14831724 Asymmetrical Informative Estimation for Macroeconomic Model: Special Case in the Tourism Sector of Thailand
Authors: Chukiat Chaiboonsri, Satawat Wannapan
Abstract:
This paper used an asymmetric informative concept to apply in the macroeconomic model estimation of the tourism sector in Thailand. The variables used to statistically analyze are Thailand international and domestic tourism revenues, the expenditures of foreign and domestic tourists, service investments by private sectors, service investments by the government of Thailand, Thailand service imports and exports, and net service income transfers. All of data is a time-series index which was observed between 2002 and 2015. Empirically, the tourism multiplier and accelerator were estimated by two statistical approaches. The first was the result of the Generalized Method of Moments model (GMM) based on the assumption which the tourism market in Thailand had perfect information (Symmetrical data). The second was the result of the Maximum Entropy Bootstrapping approach (MEboot) based on the process that attempted to deal with imperfect information and reduced uncertainty in data observations (Asymmetrical data). In addition, the tourism leakages were investigated by a simple model based on the injections and leakages concept. The empirical findings represented the parameters computed from the MEboot approach which is different from the GMM method. However, both of the MEboot estimation and GMM model suggests that Thailand’s tourism sectors are in a period capable of stimulating the economy.
Keywords: Thailand tourism, maximum entropy bootstrapping approach, macroeconomic model, asymmetric information.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12641723 Heritability Estimates of Lactation Traits in Maltese Goat
Authors: R. Pesce Delfino, M. Selvaggi, G. V. Celano, C. Dario
Abstract:
Data on 657 lactation from 163 Maltese goat, collected over a 5-year period were analyzed by a mixed model to estimate the variance components for heritability. The considered lactation traits were: milk yield (MY) and lactation length (LL). Year, parity and type of birth (single or twin) were significant sources of variation for lactation length; on the other hand milk yield was significantly influenced only by the year. The average MY was 352.34 kg and the average LL was 230 days. Estimates of heritability were 0.21 and 0.15 for MY and LL respectively. These values suggest there is low correlation between genotype and phenotype so it may be difficult to evaluate animals directly on phenotype. So, the genetic improvement of this breed may be quite slow without the support of progeny test aimed to select Maltese breeders.Keywords: Heritability estimate, lactation traits, Maltese goat
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22321722 String Matching using Inverted Lists
Authors: Chouvalit Khancome, Veera Boonjing
Abstract:
This paper proposes a new solution to string matching problem. This solution constructs an inverted list representing a string pattern to be searched for. It then uses a new algorithm to process an input string in a single pass. The preprocessing phase takes 1) time complexity O(m) 2) space complexity O(1) where m is the length of pattern. The searching phase time complexity takes 1) O(m+α ) in average case 2) O(n/m) in the best case and 3) O(n) in the worst case, where α is the number of comparing leading to mismatch and n is the length of input text.
Keywords: String matching, inverted list, inverted index, pattern, algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15561721 Texture Feature Extraction of Infrared River Ice Images using Second-Order Spatial Statistics
Authors: Bharathi P. T, P. Subashini
Abstract:
Ice cover County has a significant impact on rivers as it affects with the ice melting capacity which results in flooding, restrict navigation, modify the ecosystem and microclimate. River ices are made up of different ice types with varying ice thickness, so surveillance of river ice plays an important role. River ice types are captured using infrared imaging camera which captures the images even during the night times. In this paper the river ice infrared texture images are analysed using first-order statistical methods and secondorder statistical methods. The second order statistical methods considered are spatial gray level dependence method, gray level run length method and gray level difference method. The performance of the feature extraction methods are evaluated by using Probabilistic Neural Network classifier and it is found that the first-order statistical method and second-order statistical method yields low accuracy. So the features extracted from the first-order statistical method and second-order statistical method are combined and it is observed that the result of these combined features (First order statistical method + gray level run length method) provides higher accuracy when compared with the features from the first-order statistical method and second-order statistical method alone.
Keywords: Gray Level Difference Method, Gray Level Run Length Method, Kurtosis, Probabilistic Neural Network, Skewness, Spatial Gray Level Dependence Method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29081720 Kinematic Parameters for Asa River Routing
Authors: A. O. Ogunlela, B. Adelodun
Abstract:
Flood routing is used in estimating the travel time and attenuation of flood waves as they move downstream a river or channel. The routing procedure is usually classified as hydrologic or hydraulic. Hydraulic methods utilize the equations of continuity and motion. Kinematic routing, a hydraulic technique was used in routing Asa River at Ilorin. The river is of agricultural and industrial importance to Ilorin, the capital of Kwara State, Nigeria. This paper determines the kinematic parameters of kinematic wave velocity, time step, time required to traverse, weighting factor and change in length. Values obtained were 4.67 m/s, 19 secs, 21 secs, 0.75 and 100 m, respectively. These parameters adequately reflect the watershed and flow characteristics essential for the routing. The synthetic unit hydrograph was developed using the Natural Resources Conservation Service (NRCS) method. 24-hr 10yr, 25yr, 50yr and 100yr storm hydrographs were developed from the unit hydrograph using convolution procedures and the outflow hydrographs were obtained for each of 24-hr 10yr, 25yr, 50yr and 100yr indicating 0.11 m3/s, 0.10 m3/s, 0.10 m3/s and 0.10 m3/s attenuations respectively.
Keywords: Asa River, Kinematic parameters, Routing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23011719 SMEs Relationship Banking: Length, Loyalty, Trust. Do SMEs get Something in Return?
Authors: Daniel Badulescu
Abstract:
Under the difficult access to finance of SMEs, they expect that its relationship with the banks shall constitute a real help to access appropriate financing, at reasonable costs and requirements, given the possibility of mutually beneficial and long lasting relation. The literature, but also the research we have carried on, is centered on such determinants as concentration and the length of the relationship, but at the same time, there is little certainty that banks are responding positively to them. Furthermore, although the trust is considered as being a fundamental element of bank relationship – see the case house bank – SMEs find that the banks finance them looking rather on collaterals and covenants than to trust. Moreover, a positive behavior, such as prompt or advance repayments of loans, doesn-t generate any positive feedback from the banks side. All these show a deep un-satisfaction of the SMEs concerning their relationship banking.
Keywords: Banks' behavior, relationship banking, SMEs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21811718 Approximation Algorithm for the Shortest Approximate Common Superstring Problem
Authors: A.S. Rebaï, M. Elloumi
Abstract:
The Shortest Approximate Common Superstring (SACS) problem is : Given a set of strings f={w1, w2, ... , wn}, where no wi is an approximate substring of wj, i ≠ j, find a shortest string Sa, such that, every string of f is an approximate substring of Sa. When the number of the strings n>2, the SACS problem becomes NP-complete. In this paper, we present a greedy approximation SACS algorithm. Our algorithm is a 1/2-approximation for the SACS problem. It is of complexity O(n2*(l2+log(n))) in computing time, where n is the number of the strings and l is the length of a string. Our SACS algorithm is based on computation of the Length of the Approximate Longest Overlap (LALO).Keywords: Shortest approximate common superstring, approximation algorithms, strings overlaps, complexities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15061717 FPGA Implementation of the “PYRAMIDS“ Block Cipher
Authors: A. AlKalbany, H. Al hassan, M. Saeb
Abstract:
The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.
Keywords: FPGA, VHDL, micro-architecture, encryption, cryptography, algorithm, data communication security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17041716 Investigating the Possible use of Session Initiation Protocol for Extending Mobility Service to the Biomedical Engineers
Authors: Anwar Sadat
Abstract:
Today, the Internet based communication has widen the opportunity of event monitoring system in the medical field. There is always a need of analyzing and designing secure and reliable mobile communication between the hospital and biomedical engineers mobile units. This study has been carried out to find possible solution using SIP-based event notification for alerting the technical staff about the Biomedical Device (BMD) status and Patients treatment session. The Session Initiation Protocol (SIP) can be used to create a medical event notification system. SIP can work on a variety of devices. Its adoption as the protocol of choice for third generation wireless networks allows for a robust and scalable environment. One of the advantages of SIP is that it supports personal mobility through the separation of user addressing and device addressing. The solution for Telemed alert notification system is based on SIP - Specific Event Notification. The aim of this project is to extend mobility service to the hospital technicians who are using Telemedicine system.Keywords: Biomedical, Mobility Service, Notify, Proxy Server, SIP, Subscribe, Telemedicine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18001715 AI-Based Approaches for Task Offloading, Resource Allocation and Service Placement of IoT Applications: State of the Art
Authors: Fatima Z. Cherhabil, Mammar Sedrati, Sonia-Sabrina Bendib
Abstract:
In order to support the continued growth, critical latency of IoT applications and various obstacles of traditional data centers, Mobile Edge Computing (MEC) has emerged as a promising solution that extends the cloud data-processing and decision-making to edge devices. By adopting a MEC structure, IoT applications could be executed locally, on an edge server, different fog nodes or distant cloud data centers. However, we are often faced with wanting to optimize conflicting criteria such as minimizing energy consumption of limited local capabilities (in terms of CPU, RAM, storage, bandwidth) of mobile edge devices and trying to keep high performance (reducing response time, increasing throughput and service availability) at the same time. Achieving one goal may affect the other making Task Offloading (TO), Resource Allocation (RA) and Service Placement (SP) complex processes. It is a nontrivial multi-objective optimization problem to study the trade-off between conflicting criteria. The paper provides a survey on different TO, SP and RA recent Multi-Objective Optimization (MOO) approaches used in edge computing environments, particularly Artificial Intelligent (AI) ones, to satisfy various objectives, constraints and dynamic conditions related to IoT applications.
Keywords: Mobile Edge Computing, Multi-Objective Optimization, Artificial Intelligence Approaches, Task Offloading, Resource Allocation, Service Placement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5141714 On Simple Confidence Intervals for the Normal Mean with Known Coefficient of Variation
Authors: Suparat Niwitpong, Sa-aat Niwitpong
Abstract:
In this paper we proposed the new confidence interval for the normal population mean with known coefficient of variation. In practice, this situation occurs normally in environment and agriculture sciences where we know the standard deviation is proportional to the mean. As a result, the coefficient of variation of is known. We propose the new confidence interval based on the recent work of Khan [3] and this new confidence interval will compare with our previous work, see, e.g. Niwitpong [5]. We derive analytic expressions for the coverage probability and the expected length of each confidence interval. A numerical method will be used to assess the performance of these intervals based on their expected lengths.
Keywords: confidence interval, coverage probability, expected length, known coefficient of variation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17601713 SAP: A Smart Amusement Park System for Tourist Services
Authors: Pei-Chun Lee, Sheng-Shih Wang, Pei-Hsuan Ku
Abstract:
Many existing amusement parks have been operated with assistance of a variety of information and communications technologies to design friendly and efficient service systems for tourists. However, these systems leave various levels of decisions to tourists to make by themselves. This incurs pressure on tourists and thereby bringing negative experience in their tour. This paper proposes a smart amusement park system to offer each tourist the GPS-based customized plan without tourists making decisions by themselves. The proposed system consists of the mobile app subsystem, the central subsystem, and the detecting/counting subsystem. The mobile app subsystem interacts with the central subsystem. The central subsystem performs the necessary computing and database management of the proposed system. The detecting/counting subsystem aims to detect and compute the number of visitors to an attraction. Experimental results show that the proposed system can not only work well, but also provide an innovative business operating model for owners of amusement parks.Keywords: Amusement park, location-based service (LBS), mobile app, tourist service.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32021712 Consideration a Novel Manner for Data Sending Quality in Heterogeneous Radio Networks
Authors: Mohammadreza Amini, Omid Moradtalab, Ebadollah Zohrevandi
Abstract:
In real-time networks a large number of application programs are relying on video data and heterogeneous data transmission techniques. The aim of this research is presenting a method for end-to-end vouch quality service in surface applicationlayer for sending video data in comparison form in wireless heterogeneous networks. This method tries to improve the video sending over the wireless heterogeneous networks with used techniques in surface layer, link and application. The offered method is showing a considerable improvement in quality observing by user. In addition to this, other specifications such as shortage of data load that had require to resending and limited the relation period length to require time for second data sending, help to be used the offered method in the wireless devices that have a limited energy. The presented method and the achieved improvement is simulated and presented in the NS-2 software.
Keywords: Heterogeneous wireless networks, adaptation mechanism, multi-level, Handoff, stop mechanism, graceful degrades, application layer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16691711 Exploring the Perspective of Service Quality in mHealth Services during the COVID-19 Pandemic
Authors: Wan-I Lee, Nelio Mendoza Figueredo
Abstract:
The impact of COVID-19 has a significant effect on all sectors of society globally. Health information technology (HIT) has become an effective health strategy in this age of distancing. In this regard, Mobile Health (mHealth) plays a critical role in managing patient and provider workflows during the COVID-19 pandemic. Therefore, the users' perception of service quality about mHealth services plays a significant role in shaping confidence and subsequent behaviors regarding the mHealth users' intention of use. This study's objective was to explore levels of user attributes analyzed by a qualitative method of how health practitioners and patients are satisfied or dissatisfied with using mHealth services; and analyzed the users' intention in the context of Taiwan during the COVID-19 pandemic. This research explores the experienced usability of a mHealth services during the Covid-19 pandemic. This study uses qualitative methods that include in-depth and semi-structured interviews that investigate participants' perceptions and experiences and the meanings they attribute to them. The five cases consisted of health practitioners, clinic staff, and patients' experiences using mHealth services. This study encourages participants to discuss issues related to the research question by asking open-ended questions, usually in one-to-one interviews. The findings show the positive and negative attributes of mHealth service quality. Hence, the significant importance of patients' and health practitioners' issues on several dimensions of perceived service quality is system quality, information quality, and interaction quality. A concept map for perceptions regards to emergency uses' intention of mHealth services process is depicted. The findings revealed that users pay more attention to "Medical care", "ease of use" and "utilitarian benefits" and have less importance for "Admissions and Convenience" and "Social influence". To improve mHealth services, the mHealth providers and health practitioners should better manage users' experiences to enhance mHealth services. This research contributes to the understanding of service quality issues in mHealth services during the COVID-19 pandemic.
Keywords: COVID-19, mobile health, mHealth, service quality, use intention.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 697