Search results for: Environment control and life support
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8620

Search results for: Environment control and life support

3700 Analysis and Categorization of e-Learning Activities Based On Meaningful Learning Characteristics

Authors: Arda Yunianta, Norazah Yusof, Mohd Shahizan Othman, Dewi Octaviani

Abstract:

Learning is the acquisition of new mental schemata, knowledge, abilities and skills which can be used to solve problems potentially more successfully. The learning process is optimum when it is assisted and personalized. Learning is not a single activity, but should involve many possible activities to make learning become meaningful. Many e-learning applications provide facilities to support teaching and learning activities. One way to identify whether the e-learning system is being used by the learners is through the number of hits that can be obtained from the e-learning system's log data. However, we cannot rely solely to the number of hits in order to determine whether learning had occurred meaningfully. This is due to the fact that meaningful learning should engage five characteristics namely active, constructive, intentional, authentic and cooperative. This paper aims to analyze the e-learning activities that is meaningful to learning. By focusing on the meaningful learning characteristics, we match it to the corresponding Moodle e-learning activities. This analysis discovers the activities that have high impact to meaningful learning, as well as activities that are less meaningful. The high impact activities is given high weights since it become important to meaningful learning, while the low impact has less weight and said to be supportive e-learning activities. The result of this analysis helps us categorize which e-learning activities that are meaningful to learning and guide us to measure the effectiveness of e-learning usage.

Keywords: e-learning system, e-learning activity, meaningful learning characteristics, Moodle

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3137
3699 Cultural Effects on the Performance of Non- Profit and For-Profit Microfinance Institutions

Authors: Patrick M. Stanton, William R. McCumber

Abstract:

Using a large dataset of more than 2,400 individual microfinance institutions (MFIs) from 120 countries from 1999 to 2016, this study finds that nearly half of the international MFIs operate as for-profit institutions. Formal institutions (business regulatory environment, property rights, social protection, and a developed financial sector) impact the likelihood of MFIs being for-profit across countries. Cultural differences across countries (power distance, individualism, masculinity, and indulgence) seem to be a factor in the legal status of the MFI (non-profit or for-profit). MFIs in countries with stronger formal institutions, a greater degree of power distance, and a higher degree of collectivism experience better financial and social performance.

Keywords: Hofstede cultural dimensions, international finance, microfinance institutions, non-profit.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 984
3698 The Challenges of Hyper-Textual Learning Approach for Religious Education

Authors: Elham Shirvani–Ghadikolaei, Seyed Mahdi Sajjadi

Abstract:

State of the art technology has the tremendous impact on our life, in this situation education system have been influenced as well as. In this paper, tried to compare two space of learning text and hypertext with each other, and some challenges of using hypertext in religious education. Regarding the fact that, hypertext is an undeniable part of learning in this world and it has highly beneficial for the education process from class to office and home. In this paper tried to solve this question: the consequences and challenges of applying hypertext in religious education. Also, the consequences of this survey demonstrate the role of curriculum designer and planner of education to solve this problem.

Keywords: Hyper-textual, education, religious text, religious education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1406
3697 Transformative Leadership and Learning Management Systems Implementation: Leadership Practices in Instructional Design for Online Learning

Authors: Felix Brito

Abstract:

With the growth of online learning, several higher education institutions have attempted to incorporate technology in their curriculum. Successful technology implementation projects really on technology infrastructure and on the acceptance of education professionals towards innovation. This research study is aimed at illustrating the relevance of the human component in technology implementation projects in higher education by describing the Learning Management System implementation project executed by instructional designers working for a higher education institution in the southeast region of the United States. An analysis of the Transformative Leadership Theory, the Technology Acceptance Model, and the Diffusion of Innovation Process provide the support for a solid understanding of this issue and address recommendations for future technology implementation projects in higher education institutions.

Keywords: Learning management systems, transformative leadership theory, technology acceptance model, diffusion of innovation process, leadership, instructional design, online learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1556
3696 Robust Control for Discrete-Time Sector Bounded Systems with Time-Varying Delay

Authors: Ju H. Park, S.M. Lee

Abstract:

In this paper, we propose a robust controller design method for discrete-time systems with sector-bounded nonlinearities and time-varying delay. Based on the Lyapunov theory, delaydependent stabilization criteria are obtained in terms of linear matrix inequalities (LMIs) by constructing the new Lyapunov-Krasovskii functional and using some inequalities. A robust state feedback controller is designed by LMI framework and a reciprocally convex combination technique. The effectiveness of the proposed method is verified throughout a numerical example.

Keywords: Lur'e systems, Time-delay, Stabilization, LMIs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1681
3695 Can EEG Test Helps in Identifying Brain Tumor?

Authors: M. Sharanreddy, P. K. Kulkarni

Abstract:

Brain tumor is inherently serious and life-threatening disease. Brain tumor builds the intracranial pressure in the brain, by shifting the brain or pushing against the skull, and also damaging nerves and healthy brain tissues. This intracranial pressure affects and interferes with normal brain functionality, which results in generation of abnormal electrical activities from brain. With recent development in the medical engineering and instruments, EEG instruments are able to record the brain electric activities with high accuracy, which establishes EEG as a primary tool for diagnosing the brain abnormalities. Research scholars and general physicians, often face difficulty in understanding EEG patterns. This paper presents the EEG patterns associated with brain tumor by combing medicine theory and neurologist experience. Paper also explains the pros-cons of the EEG based brain tumor identification.

Keywords: Brain tumor, Electroencephalogram (EEG).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10283
3694 A New Proxy Signature Scheme As Secure As ElGamal Signature

Authors: Song Han, Elizabeth Chang, Jie Wang, Wanquan Liu

Abstract:

Proxy signature helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.

Keywords: ElGamal signature, Proxy signature, Security, Hash function, Fair privacy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1586
3693 Using High Performance Computing for Online Flood Monitoring and Prediction

Authors: Stepan Kuchar, Martin Golasowski, Radim Vavrik, Michal Podhoranyi, Boris Sir, Jan Martinovic

Abstract:

The main goal of this article is to describe the online flood monitoring and prediction system Floreon+ primarily developed for the Moravian-Silesian region in the Czech Republic and the basic process it uses for running automatic rainfall-runoff and hydrodynamic simulations along with their calibration and uncertainty modeling. It takes a long time to execute such process sequentially, which is not acceptable in the online scenario, so the use of a high performance computing environment is proposed for all parts of the process to shorten their duration. Finally, a case study on the Ostravice River catchment is presented that shows actual durations and their gain from the parallel implementation.

Keywords: Flood prediction process, High performance computing, Online flood prediction system, Parallelization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2322
3692 Impact of Brand Origin on Brand Loyalty: A Case of Personal Care Products in Pakistan

Authors: Aimen Batool Bint-E-Rashid, Syed Muhammad Dawood Ali Shah, Muhammad Usman Farooq, Mahgul Anwar

Abstract:

As the world is progressing, the needs and demands of the consumer market are also changing. Nowadays the trends of consumer purchase decisions are dependent upon multiple factors. This study aims to identify the influential impact of country of origin over the perception and devotion towards daily personal care products specifically in reference to the knowledge and awareness regarding that particular brand in Pakistan. To corroborate this study, a 30-item brand origin questionnaire has been used with 300 purchase decision makers belonging to different age groups. To illustrate this study, a model has been developed based on brand origin, brand awareness and brand loyalty. Correlation and regression analysis have been used to find out the results which conclude the findings on the perspective of Pakistan’s consumer market as that brand origin has a direct relationship with brand loyalty provided that the consumer has a positive brand awareness. Support for the fact that brand origin impacts brand loyalty through brand awareness has been presented in this study.

Keywords: Brand awareness, brand loyalty, brand origin, personal care products, P&G, Unilever.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1093
3691 Drive-Related Behaviors as Elements of Thinking

Authors: Peter Pfeifer, Julian Pfeifer, Niko Pfeifer

Abstract:

Information processing is at the focus of brain and cognition research. This work has a different perspective, it starts with behaviors. The detailed analysis of behaviors leads to the discovery that a significant proportion of them are based on only five basic drives. These basic drives are combinable, and the combinations result in the diversity of human behavior and thinking. The key elements are drive memories. They collect memories of drive-related situations and feelings. They contain variations of basic drives in numerous areas of life and build combinations with different meanings depending on the area. Human thinking could be explained with variations on these nested combinations of basic drives.

Keywords: Cognitive modeling, psycholinguistics, psychology, psychophysiology of cognition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 909
3690 4D Flight Trajectory Optimization Based on Pseudospectral Methods

Authors: Kouamana Bousson, Paulo Machado

Abstract:

The optimization and control problem for 4D trajectories is a subject rarely addressed in literature. In the 4D navigation problem we define waypoints, for each mission, where the arrival time is specified in each of them. One way to design trajectories for achieving this kind of mission is to use the trajectory optimization concepts. To solve a trajectory optimization problem we can use the indirect or direct methods. The indirect methods are based on maximum principle of Pontryagin, on the other hand, in the direct methods it is necessary to transform into a nonlinear programming problem. We propose an approach based on direct methods with a pseudospectral integration scheme built on Chebyshev polynomials.

Keywords: Pseudospectral Methods, Trajectory Optimization, 4DTrajectories

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2400
3689 Kirchhoff’s Depth Migration over Heterogeneous Velocity Models with Ray Tracing Modeling Approach

Authors: Alok Kumar Routa, Priya Ranjan Mohanty

Abstract:

Complex seismic signatures are generated due to the complexity of the subsurface which is difficult to interpret. In the present study, an attempt has been made to model the complex subsurface using the Ray tracing modeling technique. Add to this, for the imaging of these geological features, Kirchhoff’s prestack depth migration is applied over the synthetic common shot gather dataset. It is found that the Kirchhoff’s migration technique in addition with the Ray tracing modeling concept has the flexibility towards the imaging of various complex geology which gives satisfactory results with proper delineation of the reflectors at their respective true depth position. The entire work has been carried out under the MATLAB environment.

Keywords: Kirchhoff’s migration, Prestack depth migration, Ray tracing modeling, Velocity model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1367
3688 Synthesis of the Robust Regulators on the Basis of the Criterion of the Maximum Stability Degree

Authors: S. A. Gayvoronsky, T. A. Ezangina

Abstract:

The robust control system objects with interval- undermined parameters is considers in this paper. Initial information about the system is its characteristic polynomial with interval coefficients. On the basis of coefficient estimations of quality indices and criterion of the maximum stability degree, the methods of synthesis of a robust regulator parametric is developed. The example of the robust stabilization system synthesis of the rope tension is given in this article.

Keywords: An interval polynomial, controller synthesis, analysis of quality factors, maximum degree of stability, robust degree of stability, robust oscillation, system accuracy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1587
3687 Technology and Its Social Implications: Myths and Realities in the Interpretation of the Concept

Authors: E. V. Veraszto, J. T. F. Camargo, D. Silva, N. A. Miranda, F. O. Simon, S. F. Amaral, L. V. Freitas

Abstract:

The concept of technology as well as itself has evolved continuously over time, such that, nowadays, this concept is still marked by myths and realities. Even the concept of science is frequently misunderstood as technology. In this way, this paper presents different forms of interpretation of the concept of technology in the course of history, as well as the social and cultural aspects associated with it, through an analysis made by means of insights from sociological studies of science and technology and its multiple relations with society. Through the analysis of contents, the paper presents a classification of how technology is interpreted in the social sphere and search channel efforts to show how a broader understanding can contribute to better interpretations of how scientific and technological development influences the environment in which we operate. The text also presents a particular point of view for the interpretation of the concept from the analysis throughout the whole work.

Keywords: Technology, conceptions of technology, technological myths, definition of technology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1533
3686 Managing Handheld Devices in Ad-Hoc Collaborative Computing Environments

Authors: Alaa Alwani, Hassan Artail, Haidar Safa, Ayman Abi Abdallah, Bashir Basha, Tarek Abdel Khalek

Abstract:

The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to process needed tasks under certain constraints. One of the proposed solutions to this drawback is the introduction of Collaborative Computing, a new concept dealing with the distribution of computational tasks amongst several handhelds. This paper introduces the basics of Collaborative Computing, and proposes a new protocol that aims at managing and optimizing computing tasks in Ad-Hoc Collaborative Computing Environments.

Keywords: Handheld devices, Collaborative Computing, mainprocess, Collaboration Table.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1554
3685 Experimental and Numerical Investigation of the Dispersion of Microparticles Emitted by Machining Operation

Authors: F. Tafnout, E. Belut, B. Oesterlé, J.R. Fontaine

Abstract:

As a part of the development of a numerical method of close capture exhausts systems for machining devices, a test rig recreating a situation similar to a grinding operation, but in a perfectly controlled environment, is used. The properties of the obtained spray of solid particles are initially characterized using particle tracking velocimetry (PTV), in order to obtain input and validation parameters for numerical simulations. The dispersion of a tracer gas (SF6) emitted simultaneously with the particle jet is then studied experimentally, as the dispersion of such a gas is representative of that of finer particles, whose aerodynamic response time is negligible. Finally, complete modeling of the test rig is achieved to allow comparison with experimental results and thus to progress towards validation of the models used to describe a twophase flow generated by machining operation.

Keywords: Pollutants, capture, tracer gas, SF6, PTV, numericalmodeling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1511
3684 Drug Abuse among Immigrant Youth in Canada

Authors: Qin Wei

Abstract:

There has been an increased number of immigrants arriving in Canada and a concurrent rise in the number of immigrant youth suffering from drug abuse. Immigrant youths’ drug abuse has become a significant social and public health concern for researchers. This paper explores the nature of immigrant youths’ drug abuse by examining the factors influencing the onset of substance misuse, the barriers that discourage youth to seek out treatment, and how to resolve addictions amidst immigrant youth. Findings demonstrate that diminished parental supervision, acculturation challenges, peer conformity, discrimination, and ethnic marginalization are all significant factors influencing youth to use drugs as an outlet for their pain, while culturally incompetent care and fear of family and culture-based addiction stigma act as barriers discouraging youth from seeking out addiction support. To resolve addiction challenges amidst immigrant youth, future research should focus on promoting and implementing culturally sensitive practices and psychoeducational initiatives into immigrant communities and within public health policies.

Keywords: Approaches, barriers, drug abuse, Canada, immigrant youth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 955
3683 Ontology Population via NLP Techniques in Risk Management

Authors: Jawad Makki, Anne-Marie Alquier, Violaine Prince

Abstract:

In this paper we propose an NLP-based method for Ontology Population from texts and apply it to semi automatic instantiate a Generic Knowledge Base (Generic Domain Ontology) in the risk management domain. The approach is semi-automatic and uses a domain expert intervention for validation. The proposed approach relies on a set of Instances Recognition Rules based on syntactic structures, and on the predicative power of verbs in the instantiation process. It is not domain dependent since it heavily relies on linguistic knowledge. A description of an experiment performed on a part of the ontology of the PRIMA1 project (supported by the European community) is given. A first validation of the method is done by populating this ontology with Chemical Fact Sheets from Environmental Protection Agency2. The results of this experiment complete the paper and support the hypothesis that relying on the predicative power of verbs in the instantiation process improves the performance.

Keywords: Information Extraction, Instance Recognition Rules, Ontology Population, Risk Management, Semantic analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1525
3682 Enhancing Privacy-Preserving Cloud Database Querying by Preventing Brute Force Attacks

Authors: Ambika Vishal Pawar, Ajay Dani

Abstract:

Considering the complexities involved in Cloud computing, there are still plenty of issues that affect the privacy of data in cloud environment. Unless these problems get solved, we think that the problem of preserving privacy in cloud databases is still open. In tokenization and homomorphic cryptography based solutions for privacy preserving cloud database querying, there is possibility that by colluding with service provider adversary may run brute force attacks that will reveal the attribute values.

In this paper we propose a solution by defining the variant of K –means clustering algorithm that effectively detects such brute force attacks and enhances privacy of cloud database querying by preventing this attacks.

Keywords: Privacy, Database, Cloud Computing, Clustering, K-means, Cryptography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2548
3681 Massive Lesions Classification using Features based on Morphological Lesion Differences

Authors: U. Bottigli, D.Cascio, F. Fauci, B. Golosio, R. Magro, G.L. Masala, P. Oliva, G. Raso, S.Stumbo

Abstract:

Purpose of this work is the development of an automatic classification system which could be useful for radiologists in the investigation of breast cancer. The software has been designed in the framework of the MAGIC-5 collaboration. In the automatic classification system the suspicious regions with high probability to include a lesion are extracted from the image as regions of interest (ROIs). Each ROI is characterized by some features based on morphological lesion differences. Some classifiers as a Feed Forward Neural Network, a K-Nearest Neighbours and a Support Vector Machine are used to distinguish the pathological records from the healthy ones. The results obtained in terms of sensitivity (percentage of pathological ROIs correctly classified) and specificity (percentage of non-pathological ROIs correctly classified) will be presented through the Receive Operating Characteristic curve (ROC). In particular the best performances are 88% ± 1 of area under ROC curve obtained with the Feed Forward Neural Network.

Keywords: Neural Networks, K-Nearest Neighbours, SupportVector Machine, Computer Aided Diagnosis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1374
3680 Augmenting People's Creative Idea Generation Using an Artificial Intelligent Sketching Collaborator

Authors: Joseph Maloba Makokha

Abstract:

Idea generation is an important part of the design process, and many strategies to support this stage have been developed. As artificial intelligence (AI) gains adoption in many domains, we need to understand its role, if any, in the design process. This paper introduces the concept of a “Disruptive Interjector”, an AI system that frequently interjects with suggestions based on observing what a user does. The concept emanates from a study that was conducted with pairs of humans on one hand, and human-AI pairs on the other collaborating on idea generation by sketching. Results from a study show that participants who collaborated with, and took cues from the AI sketch suggestions generated more ideas; and also had more ideas ranked by experts as “creative” compared to two humans working together on the same tasks. It is notable that while researchers from diverse fields of engineering, psychology, art and others have explored conditions and environments that enhance people's creativity - and have provided insights on creativity in general - there still exists a gap on the role that AI can play on creativity. We attempt to narrow this gap.

Keywords: Artificial intelligence, design collaboration, creativity, human-machine collaboration, machine learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1023
3679 Entrepreneurship and the Discovery and Exploitation of Business Opportunities: Empirical Evidence from the Malawian Tourism Sector

Authors: Aravind Mohan Krishnan

Abstract:

This paper identifies a research gap in the literature on tourism entrepreneurship in Malawi, Africa, and investigates how entrepreneurs from the Malawian tourism sector discover and exploit business opportunities. In particular, the importance of prior experience and business networks in the opportunity development process is debated. Another area of empirical research examined here is the opportunity recognition-venture creation sequence. While Malawi presents fruitful business opportunities, exploiting these opportunities into fully realized business ideas is a real challenge due to the country’s difficult business environment and poor promotional and marketing efforts. The study concludes by calling for further research in Sub-Saharan Africa in order to develop our understanding of entrepreneurship in this (African) context.

Keywords: Tourism, entrepreneurship, Malawi, business opportunities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2341
3678 Design and Implementation of Real-Time Automatic Censoring System on Chip for Radar Detection

Authors: Imron Rosyadi, Ridha A. Djemal, Saleh A. Alshebeili

Abstract:

Design and implementation of a novel B-ACOSD CFAR algorithm is presented in this paper. It is proposed for detecting radar target in log-normal distribution environment. The BACOSD detector is capable to detect automatically the number interference target in the reference cells and detect the real target by an adaptive threshold. The detector is implemented as a System on Chip on FPGA Altera Stratix II using parallelism and pipelining technique. For a reference window of length 16 cells, the experimental results showed that the processor works properly with a processing speed up to 115.13MHz and processing time0.29 ┬Ás, thus meets real-time requirement for a typical radar system.

Keywords: CFAR, FPGA, radar.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3103
3677 The Application of Homotopy Method In Solving Electrical Circuit Design Problem

Authors: Talib Hashim Hasan

Abstract:

This paper describes simple implementation of homotopy (also called continuation) algorithm for determining the proper resistance of the resistor to dissipate energy at a specified rate of an electric circuit. Homotopy algorithm can be considered as a developing of the classical methods in numerical computing such as Newton-Raphson and fixed point methods. In homoptopy methods, an embedding parameter is used to control the convergence. The method purposed in this work utilizes a special homotopy called Newton homotopy. Numerical example solved in MATLAB is given to show the effectiveness of the purposed method

Keywords: electrical circuit homotopy, methods, MATLAB, Newton homotopy

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3021
3676 Relation between Environmental Accounting and Pillars of Sustainability

Authors: P. Harazin, Gy. Horváth

Abstract:

There are four challenges of sustainable development and in corporate level sustainability management-s role is to answer for ecological sustainability challenge, social sustainability challenge, economic sustainability challenges to environment and social management and integration challenge of corporate sustainable challenges by the help of different concepts, methods, instruments, which are in the toolbox of sustainability management. These instruments, concepts have different relevance in these challenges, and according to different literatures environmental management is outside of social and integration challenge. Main aim of this paper is to represent the answer for the question that: is it true that social and integration point of view is outside of the concept environmental accounting? Using literature review and primer research at the end of the paper the answer will be confirmed.

Keywords: Corporate social responsibility, Environmentalaccounting, Integration, Sustainability management

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2473
3675 Feasibility of Risk Assessment for Type 2 Diabetes in Community Pharmacies Using Two Different Approaches: A Pilot Study in Thailand

Authors: Thitaporn Thoopputra, Tipaporn Pongmesa, Shuchuen Li

Abstract:

Aims: To evaluate the application of non-invasive diabetes risk assessment tool in community pharmacy setting. Methods: Thai diabetes risk score was applied to assess individuals at risk of developing type 2 diabetes. Interactive computer-based risk screening (IT) and paper-based risk screening (PT) tools were applied. Participants aged over 25 years with no known diabetes were recruited in six participating pharmacies. Results: A total of 187 clients, mean aged (+SD) was 48.6 (+10.9) years. 35% were at high risk. The mean value of willingness-to-pay for the service fee in IT group was significantly higher than PT group (p=0.013). No significant difference observed for the satisfaction between groups. Conclusions: Non-invasive risk assessment tool, whether paper-based or computerized-based can be applied in community pharmacy to support the enhancing role of pharmacists in chronic disease management. Long term follow up is needed to determine the impact of its application in clinical, humanistic and economic outcomes.

Keywords: Community pharmacy, intervention, prevention, risk assessment, type 2 diabetes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2194
3674 Photonic Crystal Waveguide 1x3 Flexible Power Splitter for Optical Network

Authors: Jyothi Digge, B. U. Rindhe, S. K. Narayankhedkar

Abstract:

A compact 1x3 power splitter based on Photonic Crystal Waveguides (PCW) with flexible power splitting ratio is presented in this paper. Multimode interference coupler (MMI) is integrated with PCW. The device size reduction compared with the conventional MMI power splitter is attributed to the large dispersion of the PCW. Band Solve tool is used to calculate the band structure of PCW. Finite Difference Time Domain (FDTD) method is adopted to simulate the relevant structure at 1550nm wavelength. The device is polarization insensitive and allows the control of output (o/p) powers within certain percentage points for both polarizations.

Keywords: Dispersion, MMI Coupler, Photonic Bandgap, Power Splitter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1798
3673 A Computational Design Algorithm for Manufacturing of Reinforced Structures with Wire Winding

Authors: Amer Ezoji, Mohammad Sedighi

Abstract:

In the article, the wire winding process for the reinforcement of a pressure vessel frame has been studied. Firstly, the importance of the wire winding method has been explained and literature was reviewed. The main step in the design process is the methodology axial force control. The frame consists of two columns and two semi-cylinders with circumstantial wires. A computational algorithm has been presented based on the governing equations and relations on stress-strain behavior of the whole system of the frame.  Then a case study was studied to calculate the frame dimensions and wire winding procedure.

Keywords: Wire winding, Frame, stress, Design for Manufacturing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1772
3672 Acceptance Single Sampling Plan with Fuzzy Parameter with The Using of Poisson Distribution

Authors: Ezzatallah Baloui Jamkhaneh, Bahram Sadeghpour-Gildeh, Gholamhossein Yari

Abstract:

This purpose of this paper is to present the acceptance single sampling plan when the fraction of nonconforming items is a fuzzy number and being modeled based on the fuzzy Poisson distribution. We have shown that the operating characteristic (oc) curves of the plan is like a band having a high and low bounds whose width depends on the ambiguity proportion parameter in the lot when that sample size and acceptance numbers is fixed. Finally we completed discuss opinion by a numerical example. And then we compared the oc bands of using of binomial with the oc bands of using of Poisson distribution.

Keywords: Statistical quality control, acceptance single sampling, fuzzy number.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1984
3671 Optimum Design of Photovoltaic Water Pumping System Application

Authors: Sarah Abdourraziq, Rachid El Bachtiri

Abstract:

The solar power source for pumping water is one of the most promising areas in photovoltaic applications. The implementation of these systems allows to protect the environment and reduce the CO2 gas emission compared to systems trained by diesel generators. This paper presents a comparative study between the photovoltaic pumping system driven by DC motor, and AC motor to define the optimum design of this application. The studied system consists of PV array, DC-DC Boost Converter, inverter, motor-pump set and storage tank. The comparison was carried out to define the characteristics and the performance of each system. Each subsystem is modeled in order to simulate the whole system in MATLAB/ Simulink. The results show the efficiency of the proposed technique.

Keywords: Photovoltaic water pumping system, DC motor-pump, AC motor-pump, DC-DC boost converter.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1922