Search results for: Biometric security technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2074

Search results for: Biometric security technologies

1414 A Collusion-Resistant Distributed Signature Delegation Based on Anonymous Mobile Agent

Authors: Omaima Bamasak

Abstract:

This paper presents a novel method that allows an agent host to delegate its signing power to an anonymous mobile agent in such away that the mobile agent does not reveal any information about its host-s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service provision. The solution introduces a verification server to verify the signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The solution incorporates three methods: Agent Signature Key Generation method, Agent Signature Generation method, Agent Signature Verification method. The most notable feature of the solution is that, in addition to allowing secure and anonymous signature delegation, it enables tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed solution are analyzed, and the solution is compared with the most related work.

Keywords: Anonymous signature delegation, collusion resistance, e-commerce fairness, mobile agent security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1431
1413 Modification of the Conventional Power Flow Analysis for the Deployment of an HVDC Grid System in the Indian Subcontinent

Authors: Farhan Beg

Abstract:

The Indian subcontinent is facing a massive challenge with regards to the energy security in member countries, i.e. providing a reliable source of electricity to facilitate development across various sectors of the economy and thereby achieve the developmental targets it has set for itself. A highly precarious situation exists in the subcontinent which is observed in the series of system failures which most of the times leads to system collapses-blackouts. To mitigate the issues related with energy security as well as keep in check the increasing supply demand gap, a possible solution that stands in front of the subcontinent is the deployment of an interconnected electricity ‘Supergrid’ designed to carry huge quanta of power across the sub continent as well as provide the infra structure for RES integration. This paper assesses the need and conditions for a Supergrid deployment and consequently proposes a meshed topology based on VSC HVDC converters for the Supergrid modeling.

Keywords: Super grid, Wind and Solar Energy, HVDC, Electricity management, Load Flow Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1719
1412 Genetic-based Anomaly Detection in Logs of Process Aware Systems

Authors: Hanieh Jalali, Ahmad Baraani

Abstract:

Nowaday-s, many organizations use systems that support business process as a whole or partially. However, in some application domains, like software development and health care processes, a normative Process Aware System (PAS) is not suitable, because a flexible support is needed to respond rapidly to new process models. On the other hand, a flexible Process Aware System may be vulnerable to undesirable and fraudulent executions, which imposes a tradeoff between flexibility and security. In order to make this tradeoff available, a genetic-based anomaly detection model for logs of Process Aware Systems is presented in this paper. The detection of an anomalous trace is based on discovering an appropriate process model by using genetic process mining and detecting traces that do not fit the appropriate model as anomalous trace; therefore, when used in PAS, this model is an automated solution that can support coexistence of flexibility and security.

Keywords: Anomaly Detection, Genetic Algorithm, ProcessAware Systems, Process Mining.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1905
1411 Information Overload, Information Literacy and Use of Technology by Students

Authors: Elena Krelja Kurelović, Jasminka Tomljanović, Vlatka Davidović

Abstract:

The development of web technologies and mobile devices makes creating, accessing, using and sharing information or communicating with each other simpler every day. However, while the amount of information constantly increasing it is becoming harder to effectively organize and find quality information despite the availability of web search engines, filtering and indexing tools. Although digital technologies have overall positive impact on students’ lives, frequent use of these technologies and digital media enriched with dynamic hypertext and hypermedia content, as well as multitasking, distractions caused by notifications, calls or messages; can decrease the attention span, make thinking, memorizing and learning more difficult, which can lead to stress and mental exhaustion. This is referred to as “information overload”, “information glut” or “information anxiety”. Objective of this study is to determine whether students show signs of information overload and to identify the possible predictors. Research was conducted using a questionnaire developed for the purpose of this study. The results show that students frequently use technology (computers, gadgets and digital media), while they show moderate level of information literacy. They have sometimes experienced symptoms of information overload. According to the statistical analysis, higher frequency of technology use and lower level of information literacy are correlated with larger information overload. The multiple regression analysis has confirmed that the combination of these two independent variables has statistically significant predictive capacity for information overload. Therefore, the information science teachers should pay attention to improving the level of students’ information literacy and educate them about the risks of excessive technology use.

Keywords: Information overload, technology use, digital media, information literacy, students.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2668
1410 Cloud Computing Cryptography "State-of-the-Art"

Authors: Omer K. Jasim, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem

Abstract:

Cloud computing technology is very useful in present day to day life, it uses the internet and the central remote servers to provide and maintain data as well as applications. Such applications in turn can be used by the end users via the cloud communications without any installation. Moreover, the end users’ data files can be accessed and manipulated from any other computer using the internet services. Despite the flexibility of data and application accessing and usage that cloud computing environments provide, there are many questions still coming up on how to gain a trusted environment that protect data and applications in clouds from hackers and intruders. This paper surveys the “keys generation and management” mechanism and encryption/decryption algorithms used in cloud computing environments, we proposed new security architecture for cloud computing environment that considers the various security gaps as much as possible. A new cryptographic environment that implements quantum mechanics in order to gain more trusted with less computation cloud communications is given.

Keywords: Cloud Computing, Cloud Encryption Model, Quantum Key Distribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4078
1409 Authenticated Mobile Device Proxy Service

Authors: W. Adi, Khaled E. A. Negm, A. Mabrouk, H. Ghraieb

Abstract:

In the current study we present a system that is capable to deliver proxy based differentiated service. It will help the carrier service node to sell a prepaid service to clients and limit the use to a particular mobile device or devices for a certain time. The system includes software and hardware architecture for a mobile device with moderate computational power, and a secure protocol for communication between it and its carrier service node. On the carrier service node a proxy runs on a centralized server to be capable of implementing cryptographic algorithms, while the mobile device contains a simple embedded processor capable of executing simple algorithms. One prerequisite is needed for the system to run efficiently that is a presence of Global Trusted Verification Authority (GTVA) which is equivalent to certifying authority in IP networks. This system appears to be of great interest for many commercial transactions, business to business electronic and mobile commerce, and military applications.

Keywords: Mobile Device Security, Identity Authentication, Mobile Commerce Security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1613
1408 Key Issues and Challenges of Intrusion Detection and Prevention System: Developing Proactive Protection in Wireless Network Environment

Authors: M. Salman, B. Budiardjo, K. Ramli

Abstract:

Nowadays wireless technology plays an important role in public and personal communication. However, the growth of wireless networking has confused the traditional boundaries between trusted and untrusted networks. Wireless networks are subject to a variety of threats and attacks at present. An attacker has the ability to listen to all network traffic which becoming a potential intrusion. Intrusion of any kind may lead to a chaotic condition. In addition, improperly configured access points also contribute the risk to wireless network. To overcome this issue, a security solution that includes an intrusion detection and prevention system need to be implemented. In this paper, first the security drawbacks of wireless network will be analyzed then investigate the characteristics and also the limitations on current wireless intrusion detection and prevention system. Finally, the requirement of next wireless intrusion prevention system will be identified including some key issues which should be focused on in the future to overcomes those limitations.

Keywords: intrusion detection, intrusion prevention, wireless networks, proactive protection

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3916
1407 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chiawchan

Abstract:

This study found that most corporate personnel are using social media to communicate with colleagues to make the process of working more efficient. Complete satisfaction occurred on the use of security within the University’s computer network. The social network usage for communication, collaboration, entertainment and demonstrating concerns accounted for fifty percent of variance to predict interpersonal relationships of corporate personnel. This evaluation on the effectiveness of social networking involved 213 corporate personnel’s. The data was collected by questionnaires. This data was analyzed by using percentage, mean, and standard deviation. The results from the analysis and the effectiveness of using online social networks were derived from the attitude of private users and safety data within the security system. The results showed that the effectiveness on the use of an online social network for corporate personnel of Suan Sunandha Rajabhat University was specifically at a good level, and the overall effects of each aspect was (Ẋ=3.11).

Keywords: Behaviors, Social Media, Social Network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1383
1406 Influence of Degradative Enzymatic Activities on the Shelf Life of Ready-to-Eat Prickly Pear Fruits

Authors: D. Scalone, R. Palmeri, F. Licciardello, G. Muratore, A. Todaro, G. Spagna

Abstract:

Prickly pear fruit (Opuntia ficus indica L. Miller) belongs to the Cactaceae family. This species is very sensitive to low storage temperatures (< 5°C) which cause damages. The fruits can be peeled, suitably packaged and successfully commercialized as a ready-to-eat product. The main limit to the extension of the shelf life is the production of off-flavors due to different factors, the growth of microorganisms and the action of endogenous enzymes. Lipoxygenase (LOX) and Pectinesterase (PE) are involved in fruit degradation. In particular, LOX pathway is directly responsible for lipid oxidation, and the subsequent production of off-flavours, while PE causes the softening of fruit during maturation. They act on the texture and shelf-life of post-harvest, packaged fruits, as a function of the the grown of microorganisms and packaging technologies used. The aim of this work is to compare the effect of different packaging technologies on the shelf life extension of ready-to-eat prickly pear fruits with regards for the enzymes activities.

Keywords: Enzymes, packaging, prickly pear, shelf life.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1646
1405 Chances and Challenges of Intelligent Technologies in the Production and Retail Sector

Authors: Carsten Röcker

Abstract:

This paper provides an introduction into the evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different phases of information processing in the work domain. It starts by charting the past and present usage of computers in work environments and shows current technological trends, which are likely to influence future business applications. The second part starts by briefly describing, how the usage of computers changed business processes in the past, and presents first Ambient Intelligence applications based on identification and localization information, which are already used in the production and retail sector. Based on current systems and prototype applications, the paper gives an outlook of how Ambient Intelligence technologies could change business processes in the future.

Keywords: Ambient Intelligence, Ubiquitous Computing, Business Applications, Radio Frequency Identification (RFID).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1897
1404 Millennials' Career Expectations: Exploring Attitudes and Individual Differences

Authors: Lovorka Galetić, Maja Klindžić, Ivana Načinović Braje

Abstract:

Generation Y individuals or Millennials are known for their unique views, work values and motivational needs which implies that, in order to attract and retain those individuals, activities in the area of career management should be given special attention by HRM managers. After a theoretical background on Millennials’ life and work attitudes, an empirical research on career preferences of Millennials in Croatia was described. Empirical research was conducted among 249 members of generation Y. The data analysis revealed that respondents generally perceive promotion opportunities as the most important career aspect; however, job security and work-life balance are almost as important. Furthermore, it was shown that Generation Y is not necessarily a homogenous group. More precisely, women assign greater importance than men to work-life balance and job security. Therefore, HRM managers should adapt career planning activities not only with respect to generational preferences, but individual characteristics as well.

Keywords: Career, individual differences, millennials, work values.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1997
1403 Communication and Devices: Face to Face Communication versus Communication with Mobile Technologies

Authors: Nuran Öze

Abstract:

With the rapid changes occurring in the last twenty five years, mobile phone technology has influenced every aspect of life. Technological developments within the Internet and mobile phone areas have not only changed communication practices; it has also changed the everyday life practices of individuals. This article has focused on understanding how people’s communication practices and everyday life practices have changed with the smartphone usage. The study was conducted by using in-depth interview method and the research was conducted on twenty Turkish Cypriots who live in Northern Cyprus. According to the research results, communicating via Internet has rapidly replaced face to face communication in recent years. However, results have changed according to generations. Younger generations can easily adapt themselves to technological changes because they are already gaining everyday life practices right now. However, the older generations practices are already present in their everyday life.

Keywords: Face to face communication, internet, mobile technologies, North Cyprus.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1421
1402 Computational Study of Improving the Efficiency of Photovoltaic Panels in the UAE

Authors: Ben Richard Hughes, Ng Ping Sze Cherisa, Osman Beg

Abstract:

Various solar energy technologies exist and they have different application techniques in the generation of electrical power. The widespread use of photovoltaic (PV) modules in such technologies has been limited by relatively high costs and low efficiencies. The efficiency of PV panels decreases as the operating temperatures increase. This is due to the affect of solar intensity and ambient temperature. In this work, Computational Fluid Dynamics (CFD) was used to model the heat transfer from a standard PV panel and thus determine the rate of dissipation of heat. To accurately model the specific climatic conditions of the United Arab Emirates (UAE), a case study of a new build green building in Dubai was used. A finned heat pipe arrangement is proposed and analyzed to determine the improved heat dissipation and thus improved performance efficiency of the PV panel. A prototype of the arrangement is built for experimental testing to validate the CFD modeling and proof of concept.

Keywords: Computational Fluid Dynamics, Improving Efficiency, Photovoltaic (PV) Panels, Heat-pipe

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3477
1401 Renewable Energy Supply Options in Kuwait

Authors: Osamah A. Alsayegh, Fatma A. Fairouz

Abstract:

This paper compares planning results of the electricity and water generation inventory up to year 2030 in the State of Kuwait. Currently, the generation inventory consists of oil and gas fired technologies only. The planning study considers two main cases. The first case, Reference case, examines a generation inventory based on oil and gas fired generation technologies only. The second case examines the inclusion of renewables as part of the generation inventory under two scenarios. In the first scenario, Ref-RE, renewable build-out is based on optimum economic performance of overall generation system. Result shows that the optimum installed renewable capacity with electric energy generation of 11% . In the second scenario, Ref-RE20, the renewable capacity build-out is forced to provide 20% of electric energy by 2030. The respective energy systems costs of Reference, Ref-RE and Ref-RE20 case scenarios reach US dollar 24, 10 and 14 billion annually in 2030.

Keywords: Generation inventory, solar, planning, TIMES, wind.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2616
1400 ICT Education: Digital History Learners

Authors: Lee Bih Ni, Elvis Fung

Abstract:

This article is to review and understand the new generation of students to understand their expectations and attitudes. There are a group of students on school projects, creative work, educational software and digital signal source, the use of social networking tools to communicate with friends and a part in the competition. Today's students have been described as the new millennium students. They use information and communication technology in a more creative and innovative at home than at school, because the information and communication technologies for different purposes, in the home, usually occur in school. They collaborate and communicate more effectively when they are at home. Most children enter school, they will bring about how to use information and communication technologies, some basic skills and some tips on how to use information and communication technology will provide a more advanced than most of the school's expectations. Many teachers can help students, however, still a lot of work, "tradition", without a computer, and did not see the "new social computing networks describe young people to learn and new ways of working life in the future", in the education system of the benefits of using a computer.

Keywords: ICT Education, Digital History.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2174
1399 Happiness, Media and Sustainability of Communities in Donkeaw, Mearim District, Chiang Mai, Thailand

Authors: Panida Jongsuksomsakul

Abstract:

This study of the ‘happiness’ and ‘sustainability’ in the community of Donkeaw, Amphoe Mae Rim, Chiang Mai Province during the non-election period in Thailand, noted that their happiness levels are in the middle-average range. This was found using a mixed approach of qualitative and quantitative methods (N = 386, α = 0.05). The study explores indicators for six aspects of well-being and happiness, including, good local governance, administrative support for the health system that maintains people’s mental and physical health, environment and weather, job security and a regular income aids them in managing a sustainable lifestyle. The impact of economic security and community relationships on social and cultural capital, and the way these aspects impact on the life style of the community, affects the sustainable well-being of people. Moreover, living with transparency and participatory communication led to diverse rewards in many areas.

Keywords: Communication, happiness, well-being, Donkeaw community, social and cultural capital.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 875
1398 Decision Support for the Selection of Electric Power Plants Generated from Renewable Sources

Authors: Aumnad Phdungsilp, Teeradej Wuttipornpun

Abstract:

Decision support based upon risk analysis into comparison of the electricity generation from different renewable energy technologies can provide information about their effects on the environment and society. The aim of this paper is to develop the assessment framework regarding risks to health and environment, and the society-s benefits of the electric power plant generation from different renewable sources. The multicriteria framework to multiattribute risk analysis technique and the decision analysis interview technique are applied in order to support the decisionmaking process for the implementing renewable energy projects to the Bangkok case study. Having analyses the local conditions and appropriate technologies, five renewable power plants are postulated as options. As this work demonstrates, the analysis can provide a tool to aid decision-makers for achieving targets related to promote sustainable energy system.

Keywords: Analytic Hierarchy Process, Bangkok, MultiattributeRisk Analysis, Renewable Energy Technology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1938
1397 Innovative Design Considerations for Adaptive Spacecraft

Authors: K. Parandhama Gowd

Abstract:

Space technologies have changed the way we live in the present day society and manage many aspects of our daily affairs through Remote sensing, Navigation & Communications. Further, defense and military usage of spacecraft has increased tremendously along with civilian purposes. The number of satellites deployed in space in Low Earth Orbit (LEO), Medium Earth Orbit (MEO), and the Geostationary Orbit (GEO) has gone up. The dependency on remote sensing and operational capabilities are most invariably to be exploited more and more in future. Every country is acquiring spacecraft in one way or other for their daily needs, and spacecraft numbers are likely to increase significantly and create spacecraft traffic problems. The aim of this research paper is to propose innovative design concepts for adaptive spacecraft. The main idea here is to improve existing design methods of spacecraft design and development to further improve upon design considerations for futuristic adaptive spacecraft with inbuilt features for automatic adaptability and self-protection. In other words, the innovative design considerations proposed here are to have future spacecraft with self-organizing capabilities for orbital control and protection from anti-satellite weapons (ASAT). Here, an attempt is made to propose design and develop futuristic spacecraft for 2030 and beyond due to tremendous advancements in VVLSI, miniaturization, and nano antenna array technologies, including nano technologies are expected.

Keywords: Satellites, low earth orbit, medium earth orbit, geostationary earth orbit, self-organizing control system, anti-satellite weapons, orbital control, radar warning receiver, missile warning receiver, laser warning receiver, attitude and orbit control systems, command and data handling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 989
1396 Security, Securitization and Human Capital: The New Wave of Canadian Immigration Laws

Authors: Robert M. Russo

Abstract:

This paper analyzes the linkage between migration, economic globalization and terrorism concerns. On a broad level, I analyze Canadian economic and political considerations, searching for causal relationships between political and economic actors on the one hand, and Canadian immigration law on the other. Specifically, the paper argues that there are contradictory impulses affecting state sovereignty. These impulses are are currently being played out in the field of Canadian immigration law through several proposed changes to Canada-s Immigration and Refugee Protection Act (IRPA). These changes reflect an ideological conception of sovereignty that is intrinsically connected with decision-making capacity centered on an individual. This conception of sovereign decision-making views Parliamentary debate and bureaucratic inefficiencies as both equally responsible for delaying essential decisions relating to the protection of state sovereignty, economic benefits and immigration control This paper discusses these concepts in relation to Canadian immigration policy under Canadian governments over the past twenty five years.

Keywords: Globalization, immigration law, security, anti-terrorism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3200
1395 Accounting for Rice Productivity Heterogeneity in Ghana: The Two-Step Stochastic Metafrontier Approach

Authors: Franklin Nantui Mabe, Samuel A. Donkoh, Seidu Al-Hassan

Abstract:

Rice yields among agro-ecological zones are heterogeneous. Farmers, researchers and policy makers are making frantic efforts to bridge rice yield gaps between agro-ecological zones through the promotion of improved agricultural technologies (IATs). Farmers are also modifying these IATs and blending them with indigenous farming practices (IFPs) to form farmer innovation systems (FISs). Also, different metafrontier models have been used in estimating productivity performances and their drivers. This study used the two-step stochastic metafrontier model to estimate the productivity performances of rice farmers and their determining factors in GSZ, FSTZ and CSZ. The study used both primary and secondary data. Farmers in CSZ are the most technically efficient. Technical inefficiencies of farmers are negatively influenced by age, sex, household size, education years, extension visits, contract farming, access to improved seeds, access to irrigation, high rainfall amount, less lodging of rice, and well-coordinated and synergized adoption of technologies. Albeit farmers in CSZ are doing well in terms of rice yield, they still have the highest potential of increasing rice yield since they had the lowest TGR. It is recommended that government through the ministry of food and agriculture, development partners and individual private companies promote the adoption of IATs as well as educate farmers on how to coordinate and synergize the adoption of the whole package. Contract farming concept and agricultural extension intensification should be vigorously pursued to the latter.

Keywords: Efficiency, farmer innovation systems, improved agricultural technologies, two-step stochastic metafrontier approach.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 831
1394 Determination of Sea Transport Route for Staple Food Distribution to Achieve Food Security in the Eastern Indonesia

Authors: Kuncoro Harto Widodo, Yandra Rahadian Perdana, Iwan Puja Riyadi

Abstract:

Effectiveness and efficiency of food distribution is necessary to maintain food security in a region. Food supply varies among regions depending on their production capacity; therefore, it is necessary to regulate food distribution. Sea transportation could play a great role in the food distribution system. To play this role and to support transportation needs in the Eastern Indonesia, sea transportation shall be supported by fleet which is adequate and reliable, both in terms of load and worthiness. This research uses Linear Programming (LP) method to analyze food distribution pattern in order to determine the optimal distribution system. In this research, transshipment points have been selected for regions in one province. Comparison between result of modeling and existing shipping route reveals that from 369 existing routes, 54 routes are used for transporting rice, corn, green bean, peanut, soybean, sweet potato, and cassava.

Keywords: Distribution, Sea Transportation, Eastern Indonesia (KTI), Linear Programming (LP).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2143
1393 Determinants of Knowledge-Based Improving Workflow and Communication within Surgical Team

Authors: J. Bartnicka

Abstract:

Surgical team consists of variety types of medical specialists possessing different kind of knowledge, motivations, personalities or abilities. This together with poor knowledge transfer, lack of information and communication technologies (ICT) implementations in hospitals can cause protraction of patient care processes and even jeopardize patient safety. There is presented in the article the outcomes of studies on communication and workflow in surgical team in the background of different collaboration levels in healthcare system. As a result the five determinants of improving workflow and communication within surgical team were indicated as well as knowledge-based tools and supporting information technology were proposed.

Keywords: Knowledge transfer, absorption abilities, knowledge representation, information and communication technologies, cooperation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2114
1392 Revised Technology Acceptance Model Framework for M-Commerce Adoption

Authors: Manish Gupta

Abstract:

Following the E-Commerce era, M-Commerce is the next big phase in the technology involvement and advancement. This paper intends to explore how Indian consumers are influenced to adopt the M-commerce. In this paper, the revised Technology Acceptance Model (TAM) has been presented on the basis of the most dominant factors that affect the adoption of M-Commerce in Indian scenario. Furthermore, an analytical questionnaire approach was carried out to collect data from Indian consumers. These collected data were further used for the validation of the presented model. Findings indicate that customization, convenience, instant connectivity, compatibility, security, download speed in M-Commerce affect the adoption behavior. Furthermore, the findings suggest that perceived usefulness and attitude towards M-Commerce are positively influenced by number of M-Commerce drivers (i.e. download speed, compatibility, convenience, security, customization, connectivity, and input mechanism).

Keywords: M-Commerce, perceived usefulness, technology acceptance model, perceived ease of use.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1451
1391 Installation Stability of Low Temperature Steel Mesh in LNG Storage

Authors: Rui Yu, Huiqing Ying

Abstract:

To enhance installation security, a LNG storage in Rudong of Jiangsu province was adopted as a practical work, and it was analyzed by nonlinear finite element method to research overall and local stability performance, as well as the stress and deformation under the action of wind load and self-weight. Results indicate that deformation is tiny when steel mesh maintains as an overall ring, and stress caused by vertical bending moment and tension of bottom tie wire are also in the safe range. However, axial forces of lap reinforcement in adjacent steel mesh exceed the ultimate bearing capacity of tie wire. Hence, tie wires are ruptured; single mesh loses lateral connection and turns into monolithic status as the destruction of overall structure. Further more, monolithic steel mesh is led to collapse by the damage of bottom connection. So, in order to prevent connection failure and enhance installation security, the overlapping parts of steel mesh should be taken more reliable measures.

Keywords: low temperature steel mesh, installation stability, nonlinear finite element, tie wire.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1753
1390 An Exploration of the Provision of Government-Subsidised Housing without Title Deeds: A Recipient’s Interpretation of Security of Tenure

Authors: Maléne Maria Magdalena Campbell, Jeremiah Mholo

Abstract:

Low-income households earning less than 3,500 ZAR (about 175 GBP) per month can apply to the South African government, through the National Housing Subsidy, for fully subsidised houses. An objective of this subsidy is to enable low-income households’ participation in the formal housing market; however, the beneficiaries received houses without title deeds. As such, if the beneficiaries did not have a secured tenure at the time of their death then surviving family may face possible eviction. Therefore, an aim of this research was to determine how these beneficiaries interpret tenure security. The research focused on government subsidised housing in the Dithlake settlement of a rural hamlet named Koffiefontein, in the Letsemeng Local Municipality of South Africa. Quantitative data on the beneficiaries were collected from the local municipality, while qualitative data were collected from a sample of 45 beneficiaries.

Keywords: Low-income families, subsidised housing, titling, housing market, South Africa.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1349
1389 Digital Learning Environments for Joint Master in Science Programmes in Building and Construction in Europe: Experimenting with Tools and Technologies

Authors: E. Dado, R. Beheshti

Abstract:

Recent developments in information and communication technologies (ICT) have created excellent conditions for profoundly enhancing the traditional learning and teaching practices. New modes of teaching in higher education subjects can profoundly enhance ones ability to proactively constructing his or her personal learning universe. These developments have contributed to digital learning environments becoming widely available and accessible. In addition, there is a trend towards enlargement and specialization in higher education in Europe. With as a result that existing Master of Science (MSc) programmes are merged or new programmes have been established that are offered as joint MSc programmes to students. In these joint MSc programmes, the need for (common) digital learning environments capable of surmounting the barriers of time and location has become evident. This paper discusses the past and ongoing efforts to establish such common digital learning environments in two joint MSc programmes in Europe and discusses the way technology-based learning environments affect the traditional way of learning.

Keywords: education, engineering, learning environments, ICT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1540
1388 Use of Integrated Knowledge Networks to Increase Innovation in Nanotechnology Research and Development

Authors: R. Byler

Abstract:

Innovation, particularly in technology development, is a crucial aspect of nanotechnology R&D and, although several approaches to effective innovation management exist, organizational structures that promote knowledge exchange have been found to be most effect in supporting new and emerging technologies. This paper discusses Integrated Knowledge Networks (IKNs) and evaluates its use within nanotechnology R&D to increase technology innovation. Specifically, this paper reviews the role of IKNs in bolstering national and international nanotechnology development and in enhancing nanotechnology innovation. Both physical and virtual IKNs, particularly IT-based network platforms for community-based innovation, offer strategies for enhanced technology innovation, interdisciplinary cooperation, and enterprise development. Effectively creating and managing technology R&D networks can facilitate successful knowledge exchange, enhanced innovation, commercialization, and technology transfer. As such, IKNs are crucial to technology development processes and, thus, in increasing the quality and access to new, innovative nanoscience and technologies worldwide.

Keywords: Community-based innovation, integrated knowledge networks, nanotechnology, technology innovation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 887
1387 A Comparative Performance Evaluation Model of Mobile Agent Versus Remote Method Invocation for Information Retrieval

Authors: Yousry El-Gamal, Khalid El-Gazzar, Magdy Saeb

Abstract:

The development of distributed systems has been affected by the need to accommodate an increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is emerging as an alternative to build a smart generation of highly distributed systems. In this work, we investigate the performance aspect of agent-based technologies for information retrieval. We present a comparative performance evaluation model of Mobile Agents versus Remote Method Invocation by means of an analytical approach. We demonstrate the effectiveness of mobile agents for dynamic code deployment and remote data processing by reducing total latency and at the same time producing minimum network traffic. We argue that exploiting agent-based technologies significantly enhances the performance of distributed systems in the domain of information retrieval.

Keywords: Mobile Agent, performance evaluation, RMI, information retrieval, distributed systems, database.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2240
1386 Roles of Early Warning in Sea and Coast Guard Activity in Indonesia: Bakorkamla Integrated Information System

Authors: Tuti Ida Halida

Abstract:

This paper will define the system that minimize the risk of the ship accidents because of high or dangerous waves namely early warning system. Since Indonesia is located in a strategic position, many internasional vessels pass by the Indonesian Sea Lanes. Therefore many issues often occur in Indonesian waters, one of the issues is the shipwreck because of dangerous waves. In order to do the preventive action for the vessels that indicated exposed the dangerous waves, Indonesian Maritime Security Coordinating Board or Bakorkamla, has built up and implemented an early warning system through integrated system, called Bakorkamla Integrated Information System (BIIS). By implementing BIIS means that Bakorkamla has already done one of the Five Principles of Sea and Coast Guard Agency, which is safety and security, and Bakorkamla also has already saved the lives of many people on the ship that will have an accident due to high waves. 

Keywords: Early Warning System, Integrated Information System, Sea and Coast Guard, Principles.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2706
1385 Composite Distributed Generation and Transmission Expansion Planning Considering Security

Authors: Amir Lotfi, Seyed Hamid Hosseini

Abstract:

During the recent past, due to the increase of electrical energy demand and governmental resources constraints in creating additional capacity in the generation, transmission, and distribution, privatization, and restructuring in electrical industry have been considered. So, in most of the countries, different parts of electrical industry like generation, transmission, and distribution have been separated in order to create competition. Considering these changes, environmental issues, energy growth, investment of private equity in energy generation units and difficulties of transmission lines expansion, distributed generation (DG) units have been used in power systems. Moreover, reduction in the need for transmission and distribution, the increase of reliability, improvement of power quality, and reduction of power loss have caused DG to be placed in power systems. On the other hand, considering low liquidity need, private investors tend to spend their money for DGs. In this project, the main goal is to offer an algorithm for planning and placing DGs in order to reduce the need for transmission and distribution network.

Keywords: Planning, transmission, distributed generation, power security, power systems.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1111