Search results for: Policy server
858 Access Policy Specification for SCADA Networks
Authors: Rodrigo Chandia, Mauricio Papa
Abstract:
Efforts to secure supervisory control and data acquisition (SCADA) systems must be supported under the guidance of sound security policies and mechanisms to enforce them. Critical elements of the policy must be systematically translated into a format that can be used by policy enforcement components. Ideally, the goal is to ensure that the enforced policy is a close reflection of the specified policy. However, security controls commonly used to enforce policies in the IT environment were not designed to satisfy the specific needs of the SCADA environment. This paper presents a language, based on the well-known XACML framework, for the expression of authorization policies for SCADA systems.Keywords: Access policy specification, process control systems, network security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2314857 Decomposition of the Customer-Server Interaction in Grocery Shops
Authors: Andreas Ahrens, Ojaras Purvinis Jelena Zāšcerinska
Abstract:
A successful shopping experience without overcrowded shops and long waiting times undoubtedly leads to the release of happiness hormones and is generally considered as the goal of any optimization. Factors influencing the shopping experience can be divided into internal and external ones. External factors are related e. g. to the arrival of the customers to the shop whereas internal factors are linked with the service process itself when checking out (waiting in the queue to the cash register and the scanning of the goods as well as the payment process itself) or any other non-expected delay when changing the status from a visitor to a buyer by choosing goods or items. This paper divides the customer-server interaction in five phases starting with the customer arrival at the shop, the selection of goods, the buyer waiting in the queue to the cash register, the payment process and ending with the customer or buyer departure. Our simulation results show how five phases are intertwined and influence the overall shopping experience. Parameters for measuring the shopping experience based on a burstiness level in each of the five phases of the customer-server interaction are estimated.
Keywords: Customers’ burstiness, cash register, customers’ waiting time, gap distribution function.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 350856 Investigation of Chord Protocol in Peer to Peer-Wireless Mesh Network with Mobility
Authors: P. Prasanna Murali Krishna, M. V. Subramanyam, K. Satya Prasad
Abstract:
File sharing in networks is generally achieved using Peer-to-Peer (P2P) applications. Structured P2P approaches are widely used in adhoc networks due to its distributed and scalability features. Efficient mechanisms are required to handle the huge amount of data distributed to all peers. The intrinsic characteristics of P2P system makes for easier content distribution when compared to client-server architecture. All the nodes in a P2P network act as both client and server, thus, distributing data takes lesser time when compared to the client-server method. CHORD protocol is a resource routing based where nodes and data items are structured into a 1- dimensional ring. The structured lookup algorithm of Chord is advantageous for distributed P2P networking applications. However, structured approach improves lookup performance in a high bandwidth wired network it could contribute to unnecessary overhead in overlay networks leading to degradation of network performance. In this paper, the performance of existing CHORD protocol on Wireless Mesh Network (WMN) when nodes are static and dynamic is investigated.Keywords: Wireless mesh network (WMN), structured P2P networks, peer to peer resource sharing, CHORD protocol, DHT.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2119855 Proxisch: An Optimization Approach of Large-Scale Unstable Proxy Servers Scheduling
Authors: Xiaoming Jiang, Jinqiao Shi, Qingfeng Tan, Wentao Zhang, Xuebin Wang, Muqian Chen
Abstract:
Nowadays, big companies such as Google, Microsoft, which have adequate proxy servers, have perfectly implemented their web crawlers for a certain website in parallel. But due to lack of expensive proxy servers, it is still a puzzle for researchers to crawl large amounts of information from a single website in parallel. In this case, it is a good choice for researchers to use free public proxy servers which are crawled from the Internet. In order to improve efficiency of web crawler, the following two issues should be considered primarily: (1) Tasks may fail owing to the instability of free proxy servers; (2) A proxy server will be blocked if it visits a single website frequently. In this paper, we propose Proxisch, an optimization approach of large-scale unstable proxy servers scheduling, which allow anyone with extremely low cost to run a web crawler efficiently. Proxisch is designed to work efficiently by making maximum use of reliable proxy servers. To solve second problem, it establishes a frequency control mechanism which can ensure the visiting frequency of any chosen proxy server below the website’s limit. The results show that our approach performs better than the other scheduling algorithms.Keywords: Proxy server, priority queue, optimization approach, distributed web crawling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2892854 Performance Analysis of Search Medical Imaging Service on Cloud Storage Using Decision Trees
Authors: González A. Julio, Ramírez L. Leonardo, Puerta A. Gabriel
Abstract:
Telemedicine services use a large amount of data, most of which are diagnostic images in Digital Imaging and Communications in Medicine (DICOM) and Health Level Seven (HL7) formats. Metadata is generated from each related image to support their identification. This study presents the use of decision trees for the optimization of information search processes for diagnostic images, hosted on the cloud server. To analyze the performance in the server, the following quality of service (QoS) metrics are evaluated: delay, bandwidth, jitter, latency and throughput in five test scenarios for a total of 26 experiments during the loading and downloading of DICOM images, hosted by the telemedicine group server of the Universidad Militar Nueva Granada, Bogotá, Colombia. By applying decision trees as a data mining technique and comparing it with the sequential search, it was possible to evaluate the search times of diagnostic images in the server. The results show that by using the metadata in decision trees, the search times are substantially improved, the computational resources are optimized and the request management of the telemedicine image service is improved. Based on the experiments carried out, search efficiency increased by 45% in relation to the sequential search, given that, when downloading a diagnostic image, false positives are avoided in management and acquisition processes of said information. It is concluded that, for the diagnostic images services in telemedicine, the technique of decision trees guarantees the accessibility and robustness in the acquisition and manipulation of medical images, in improvement of the diagnoses and medical procedures in patients.
Keywords: Cloud storage, decision trees, diagnostic image, search, telemedicine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 948853 Tool Tracker: A Toolkit Ensembling Useful Online Networking Tools for Efficient Management and Operation of a Network
Authors: Onkar Bhat Kodical, Sridhar Srinivasan, N.K. Srinath
Abstract:
Tool Tracker is a client-server based application. It is essentially a catalogue of various network monitoring and management tools that are available online. There is a database maintained on the server side that contains the information about various tools. Several clients can access this information simultaneously and utilize this information. The various categories of tools considered are packet sniffers, port mappers, port scanners, encryption tools, and vulnerability scanners etc for the development of this application. This application provides a front end through which the user can invoke any tool from a central repository for the purpose of packet sniffing, port scanning, network analysis etc. Apart from the tool, its description and the help files associated with it would also be stored in the central repository. This facility will enable the user to view the documentation pertaining to the tool without having to download and install the tool. The application would update the central repository with the latest versions of the tools. The application would inform the user about the availability of a newer version of the tool currently being used and give the choice of installing the newer version to the user. Thus ToolTracker provides any network administrator that much needed abstraction and ease-ofuse with respect to the tools that he can use to efficiently monitor a network.
Keywords: Network monitoring, single platform, client/server application, version management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1300852 How Do Crisis Affect Economic Policy?
Authors: Eva Kotlánová
Abstract:
After recession that began in 2007 in the United States and subsequently spilled over the Europe we could expect recovery of economic growth. According to the last estimation of economic progress of European countries, this recovery is not strong enough. Among others, it will depend on economic policy, where and in which way, the economic indicators will proceed. Economic theories postulate that the economic subjects prefer stably, continual economic policy without repeated and strong fluctuations. This policy is perceived as support of economic growth. Mostly in crises period, when the government must cope with consequences of recession, the economic policy becomes unpredictable for many subjects and economic policy uncertainty grows, which have negative influence on economic growth. The aim of this paper is to use panel regression to prove or disprove this hypothesis on the example of five largest European economies in the period 2008–2012.
Keywords: Economic Crises in Europe, Economic Policy, Uncertainty, Panel Analysis Regression.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1530851 Optical Wireless Sensor Networks Based on VLC with PLC-Ethernet Interface
Authors: Heejin Lee, Yeonjoo Kim, Kyungrak Sohn
Abstract:
We present a white LED-based optical wireless communication systems for indoor ubiquitous sensor networks. Each sensor node could access to the server through the PLC (Power Line Communication)-Ethernet interface. The proposed system offers a full-duplex wireless link by using different wavelengths to reduce the inter-symbol interference between uplink and downlink. Through the 1-to-n optical wireless sensor network and PLC modem, the mobile terminals send a temperature data to server. The data transmission speed and distance are 115.2kbps and about 60cm, respectively.Keywords: Visible light communications, LED lighting, powerline communications, ubiquitous sensor networks, full-duplex links
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3752850 Globalization and Public Policy Analysis: A Case Study of Foreign Policy of ASEAN Member States
Authors: Nattapol Pourprasert
Abstract:
This study has an objective to analyze foreign policy of member states in globalization current, aiming to answer that the foreign policy of member states have been changed or remained the same and there are any factors affecting changing of foreign policy of the member states. From the study results, it is found that the foreign policy of Thailand is a friendly foreign policy with all states. The policy of Indonesia is more opened because of a change in leader, allowing more democratic development in the country; the government has proceeded with friendly foreign policy with the states in order to bring funds into the state. The foreign policy of Malaysia is not much changed as there is no changing in the leader; the policy of Malaysia has reconciled relations with main city of Indian and Chinese residing in the country in order to bring investments into the country and to relieve tensions in the country. The foreign policy of the Philippines has proceeded with policy under the ASEAN framework and emphasized on international Islam communities. The foreign policy of Singapore has the least changed as the Singapore's policy focuses on internal trade since the state was found. As for the foreign policy of Brunei Darussalam, Brunei has a little role in the international stage; the state having closest relationship as from the view of history is Singapore as the Singaporean has invested in retailing business in Brunei. The foreign policy of Vietnam has emphasized on an omnidirectional foreign policy in order to compete with several states in global stage. The foreign policy of Myanmar has proceeded with a friendly foreign policy with all ASEAN member states, the East-west Corridor transportation line from Myanmar through Thailand and Lao to Vietnam has been developed. As for the foreign policy of Lao, In 2001, the Thai government and Lao government held a discussion which Thailand reaffirmed the position not to support the anti-Lao group. The foreign policy of Cambodia has proceeded with more openness, having good relation with China, Russia and USA as these states has invested in the state, especially the US company.Keywords: Globalization, Public Policy Analysis, Foreign Policy, ASEAN Member States.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1909849 Robot Movement Using the Trust Region Policy Optimization
Authors: Romisaa Ali
Abstract:
The Policy Gradient approach is a subset of the Deep Reinforcement Learning (DRL) combines Deep Neural Networks (DNN) with Reinforcement Learning (RL). This approach finds the optimal policy of robot movement, based on the experience it gains from interaction with its environment. Unlike previous policy gradient algorithms, which were unable to handle the two types of error variance and bias introduced by the DNN model due to over- or underestimation, this algorithm is capable of handling both types of error variance and bias. This article will discuss the state-of-the-art SOTA policy gradient technique, trust region policy optimization (TRPO), by applying this method in various environments compared to another policy gradient method, the Proximal Policy Optimization (PPO), to explain their robust optimization, using this SOTA to gather experience data during various training phases after observing the impact of hyper-parameters on neural network performance.
Keywords: Deep neural networks, deep reinforcement learning, Proximal Policy Optimization, state-of-the-art, trust region policy optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 184848 Security of Mobile Agent in Ad hoc Network using Threshold Cryptography
Authors: S.M. Sarwarul Islam Rizvi, Zinat Sultana, Bo Sun, Md. Washiqul Islam
Abstract:
In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.
Keywords: Ad hoc network, Mobile Agent, Security, Threats, Threshold Cryptography.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1967847 Video Sharing System Based on Wi-Fi Camera
Authors: Qidi Lin, Hewei Yu, Jinbin Huang, Weile Liang
Abstract:
This paper introduces a video sharing platform based on WiFi, which consists of camera, mobile phone and PC server. This platform can receive wireless signal from the camera and show the live video on the mobile phone captured by camera. In addition, it is able to send commands to camera and control the camera’s holder to rotate. The platform can be applied to interactive teaching and dangerous area’s monitoring and so on. Testing results show that the platform can share the live video of mobile phone. Furthermore, if the system’s PC server and the camera and many mobile phones are connected together, it can transfer photos concurrently.Keywords: Wifi Camera, Socket, Mobile platform, Video monitoring, Remote control.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1787846 Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm
Authors: Konstantinos Chalkias, George Filiadis, George Stephanides
Abstract:
In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.
Keywords: Elliptic Curve Cryptography, ElGamal, authentication protocol.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2043845 NSBS: Design of a Network Storage Backup System
Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan
Abstract:
The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and the snapshot and hierarchical index are used in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.
Keywords: Agent, network backup system, three architecture model, NSBS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2232844 Transient Analysis of a Single-Server Queue with Fixed-Size Batch Arrivals
Authors: Vitalice K. Oduol, C. Ardil
Abstract:
The transient analysis of a queuing system with fixed-size batch Poisson arrivals and a single server with exponential service times is presented. The focus of the paper is on the use of the functions that arise in the analysis of the transient behaviour of the queuing system. These functions are shown to be a generalization of the modified Bessel functions of the first kind, with the batch size B as the generalizing parameter. Results for the case of single-packet arrivals are obtained first. The similarities between the two families of functions are then used to obtain results for the general case of batch arrival queue with a batch size larger than one.
Keywords: batch arrivals, generalized Bessel functions, queuetransient analysis, time-varying probabilities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1753843 Intrinsic Contradictions of Entrepreneurship Development and Self-development
Authors: Revaz Gvelesiani
Abstract:
The intrinsic contradictions of entrepreneurship development and self-development strategies complicate the task of reaching compliance between the state economic policy and the company entrepreneurship policy: on the one hand, there is a contradiction between the social and the competitive order within economic order policy and on the other hand, the contradiction exists between entrepreneurship strategy and entrepreneurship culture within entrepreneurship policy.
Keywords: Economic Order Policy, Entrepreneurship, Development Contradictions, Self-Development Contradictions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1721842 Overload Control in a SIP Signaling Network
Authors: Masataka Ohta
Abstract:
The Internet telephony employs a new type of Internet communication on which a mutual communication is realized by establishing sessions. Session Initiation Protocol (SIP) is used to establish sessions between end-users. For unreliable transmission (UDP), SIP message should be retransmitted when it is lost. The retransmissions increase a load of the SIP signaling network, and sometimes lead to performance degradation when a network is overloaded. The paper proposes an overload control for a SIP signaling network to protect from a performance degradation. Introducing two thresholds in a queue of a SIP proxy server, the SIP proxy server detects a congestion. Once congestion is detected, a SIP signaling network restricts to make new calls. The proposed overload control is evaluated using the network simulator (ns-2). With simulation results, the paper shows the proposed overload control works well.
Keywords: SIP signalling congestion overload control retransmission throughput simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1758841 Functional and Efficient Query Interpreters: Principle, Application and Performances’ Comparison
Authors: Laurent Thiry, Michel Hassenforder
Abstract:
This paper presents a general approach to implement efficient queries’ interpreters in a functional programming language. Indeed, most of the standard tools actually available use an imperative and/or object-oriented language for the implementation (e.g. Java for Jena-Fuseki) but other paradigms are possible with, maybe, better performances. To proceed, the paper first explains how to model data structures and queries in a functional point of view. Then, it proposes a general methodology to get performances (i.e. number of computation steps to answer a query) then it explains how to integrate some optimization techniques (short-cut fusion and, more important, data transformations). It then compares the functional server proposed to a standard tool (Fuseki) demonstrating that the first one can be twice to ten times faster to answer queries.Keywords: Data transformation, functional programming, information server, optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 753840 Japan’s Policy towards the Countries of Central Asia
Authors: R. Sadykova
Abstract:
This article analyses the peculiarities of Japan’s policy toward the countries of Central Asia. The increasing role of Central Asia in the system of international relations engendered an objective need for understanding of the policy of leading states, including Japan, in the region in the twenty-first century. The purpose of the study is to investigate the peculiarities of the formation and development of Japan policy in Central Asia and to identify the problems and prospects of Japan’s policy toward the countries of the region on the basis of experts’ opinions. In this article, the method of analysis of the situation and a systematic method were used. Prognostic methods, the collective expert assessment and scenarios were used in the study to determine the prospects of Japan’s policy toward the countries of Central Asia.
Keywords: Japan, Central Asia, the Eurasian concept, ‘Central Asia plus Japan’ Dialogue.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2439839 Trajectory-Based Modified Policy Iteration
Abstract:
This paper presents a new problem solving approach that is able to generate optimal policy solution for finite-state stochastic sequential decision-making problems with high data efficiency. The proposed algorithm iteratively builds and improves an approximate Markov Decision Process (MDP) model along with cost-to-go value approximates by generating finite length trajectories through the state-space. The approach creates a synergy between an approximate evolving model and approximate cost-to-go values to produce a sequence of improving policies finally converging to the optimal policy through an intelligent and structured search of the policy space. The approach modifies the policy update step of the policy iteration so as to result in a speedy and stable convergence to the optimal policy. We apply the algorithm to a non-holonomic mobile robot control problem and compare its performance with other Reinforcement Learning (RL) approaches, e.g., a) Q-learning, b) Watkins Q(λ), c) SARSA(λ).Keywords: Markov Decision Process (MDP), Mobile robot, Policy iteration, Simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1446838 Brazilian Environmental Public Policies Analysis
Authors: Estela Macedo Alves
Abstract:
This paper is an overview on public policy analysis focused on the study of Brazilian public policy making process. The methodology is based on the review of some theories on the subject, linking them to Brazilian reality. The study presents basic policy analysis concepts, such as policy, polity and politics. It is emphasized John Kingdon's Multiple Stream Model, because of its clarifying aspects concerning public policies formulation process in democratic countries. In this path it was possible to establish interpretations on environmental public policies in Brazil and understand its methods, instead of presenting only a case study. At the end, it is possible to connect theory with Brazilian reality, identifying negative and positive points of its political processes and structure.
Keywords: Brazilian policies, environmental public policy, multiple stream model, public policy analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2170837 Agent-Based Offline Electronic Voting
Authors: Mehmet Tahir Sandıkkaya, Bülent Örencik
Abstract:
Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proofs were introduced. The common ground for all these three systems is that none of them works without real time cryptologic calculations that should be held on a server. As far as known, the agent-based approach has not been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not contain real time calculations on the server side, is proposed. Conventional cryptologic methods are used in the proposed schema and some of the requirements of an electronic voting system are constructed within the schema. The schema seems quite secure if the used cryptologic methods and agents are secure. In this paper, proposed schema will be explained and compared with already known electronic voting systems.
Keywords: Electronic voting, E-voting, Mobile softwareagents, Offline electronic voting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1539836 Public R and D Risk and Risk Management Policy
Authors: Youngseok Lee, Dongjin Chung, Youngjin Kim
Abstract:
R&D risk management has been suggested as one of the management approaches for accomplishing the goals of public R&D investment. The investment in basic science and core technology development is the essential roles of government for securing the social base needed for continuous economic growth. And, it is also an important role of the science and technology policy sectors to generate a positive environment in which the outcomes of public R&D can be diffused in a stable fashion by controlling the uncertainties and risk factors in advance that may arise during the application of such achievements to society and industry. Various policies have already been implemented to manage uncertainties and variables that may have negative impact on accomplishing public R& investment goals. But we may derive new policy measures for complementing the existing policies and for exploring progress direction by analyzing them in a policy package from the viewpoint of R&D risk management.Keywords: Risk management, Public R&D policy, Science andtechnology policy, Performance management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1656835 Impacts of E-Learning on Educational Policy: Policy of Sensitization and Training in E-Learning in Saudi Arabia
Authors: Layla Albdr
Abstract:
Saudi Arabia instituted the policy of sensitizing and training stakeholders for e-learning and witnessed wide adoption in many institutions. However, it is at the infancy stage and needs time to develop to mirror the US and UK. The majority of the higher education institutions in Saudi Arabia have adopted e-learning as an alternative to traditional methods to advance education. Conversely, effective implementation of the policy of sensitization and training of stakeholders for e-learning implementation has not been attained because of various challenges. The objectives included determining the challenges and opportunities of the e-learning policy of sensitization and training of stakeholders in Saudi Arabia's higher education and examining if sensitization and training of stakeholder's policy will help promote the implementation of e-learning in institutions. The study employed a descriptive research design based on qualitative analysis. The researcher recruited 295 students and 60 academic staff from four Saudi Arabian universities to participate in the study. An online questionnaire was used to collect the data. The data were then analyzed and reported both quantitatively and qualitatively. The analysis provided an in-depth understanding of the opportunities and challenges of e-learning policy in Saudi Arabian universities. The main challenges identified as internal challenges were the lack of educators’ interest in adopting the policy, and external challenges entailed lack of ICT infrastructure and Internet connectivity. The study recommends encouraging, sensitizing, and training all stakeholders to address these challenges and adopt the policy.
Keywords: e-learning, educational policy, Saudi Arabian higher education, policy of sensitization and training
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 608834 Modeling and Control Design of a Centralized Adaptive Cruise Control System
Authors: Markus Mazzola, Gunther Schaaf
Abstract:
A vehicle driving with an Adaptive Cruise Control System (ACC) is usually controlled decentrally, based on the information of radar systems and in some publications based on C2X-Communication (CACC) to guarantee stable platoons. In this paper we present a Model Predictive Control (MPC) design of a centralized, server-based ACC-System, whereby the vehicular platoon is modeled and controlled as a whole. It is then proven that the proposed MPC design guarantees asymptotic stability and hence string stability of the platoon. The Networked MPC design is chosen to be able to integrate system constraints optimally as well as to reduce the effects of communication delay and packet loss. The performance of the proposed controller is then simulated and analyzed in an LTE communication scenario using the LTE/EPC Network Simulator LENA, which is based on the ns-3 network simulator.
Keywords: Adaptive Cruise Control, Centralized Server, Networked Model Predictive Control, String Stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2834833 The American Christian Right Women’s Advocacy Groups and US Foreign Policy
Authors: Mohd Afandi Salleh
Abstract:
The paper examines two women advocacy groups of the American Christian Right, namely: Concerned Women for America (CWA) and Eagle Forum. Focus will be placed on their interests in American foreign policy and global social policy particularly during the George W. Bush administration. It examines the organizations’ historical backgrounds, and study their agendas, issues and forms of international engagement which relate to American foreign policy. The paper shows that the Christian Right movement is not a monolithic movement in term of its focus, objectives or activism. Despite their diversity, various actions of these advocacy groups have strengthened the role of the Christian Right in exerting its influence on US foreign policy. Finally, it contends that, although traditionally the Christian Right advocacy groups’ motives for activism are strongly based on the Bible and Judeo–Christian values, the arguments and ideas behind their present struggle are presented in a very nationalistic, secular and pragmatic vein.
Keywords: Christian Right, Concerned Women for America, Eagle Forum, Global social policy, US foreign policy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1699832 Coloured Petri Nets Model for Web Architectures of Web and Database Servers
Authors: Nidhi Gaur, Padmaja Joshi, Vijay Jain, Rajeev Srivastava
Abstract:
Web application architecture is important to achieve the desired performance for the application. Performance analysis studies are conducted to evaluate existing or planned systems. Web applications are used by hundreds of thousands of users simultaneously, which sometimes increases the risk of server failure in real time operations. We use Coloured Petri Net (CPN), a very powerful tool for modelling dynamic behaviour of a web application system. CPNs extend the vocabulary of ordinary Petri nets and add features that make them suitable for modelling large systems. The major focus of this work is on server side of web applications. The presented work focuses on modelling restructuring aspects, with major focus on concurrency and architecture, using CPN. It also focuses on bringing out the appropriate architecture for web and database servers given the number of concurrent users.Keywords: Coloured petri nets, concurrent users, performance modelling, web application architecture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1290831 Totally Integrated Smart Energy System through Data Acquisition via Remote Location
Authors: Muhammad Tahir Qadri, M. Irfan Anis, M. Nawaz Irshad Khan
Abstract:
This paper discusses the approach of real-time controlling of the energy management system using the data acquisition tool of LabVIEW. The main idea of this inspiration was to interface the Station (PC) with the system and publish the data on internet using LabVIEW. In this venture, controlling and switching of 3 phase AC loads are effectively and efficiently done. The phases are also sensed through devices. In case of any failure the attached generator starts functioning automatically. The computer sends command to the system and system respond to the request. The modern feature is to access and control the system world-wide using world wide web (internet). This controlling can be done at any time from anywhere to effectively use the energy especially in developing countries where energy management is a big problem. In this system totally integrated devices are used to operate via remote location.Keywords: VI-server, Remote Access, Telemetry, Data Acquisition, web server.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1879830 Into the Bank Lending Channel of SEE: Greek Banks- Buffering Effects
Authors: Stefanos V. Fotopoulos, Harry V. Papapanagos, Fotios M. Siokis
Abstract:
This paper tries to shed light on the existence of a bank lending channel (BLC) in South Eastern European countries (SEE). Based on a VAR framework we test the responsiveness of credit supply to monetary policy shocks. By compiling a new data set and using the reserve requirement ratio, among others, as the policy instrument we measure the effectiveness of the BLC and the buffering effect of the banks in the SEE countries. The results indicate that loan supply is significantly affected by shifts in monetary policy, when demand factors are controlled. Furthermore, by analyzing the effect of the Greek banks in the region we conclude that Greek banks do buffer the negative effects of monetary policy transmission. By having a significant market share of the SEE-s banking markets we argue that Greek banks influence positively the economic growth of SEE countries.
Keywords: Bank Lending Channel, Monetary Policy Transmission, Policy Buffering, South Eastern Europe
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1693829 Impact of Fiscal Policy on Economic Growth under the Contributions of Level of External Debt in Developing Countries
Authors: Zohreh Bang Tavakoli, Shuktika Chatterjee
Abstract:
This study investigates the fiscal policy impact on countries’ economic growth in developing countries with a different external debt level. The fiscal policy effectiveness has been re-emphasized in the global financial crisis of 2008 with the external debt as its new contemporary driver. Different theories have proposed the economic consequence of fiscal policy, specifically for developing countries. However, fiscal policy literature is lacking research regarding the fiscal policy’s effectiveness with the external debt’s contributions through comprehensive study. Also, high levels of external debt will influence economic growth. Through foreign resources and channel of investment in which high level of debt decreases the amount of foreign investment in the developing countries. The finding of this study suggests that only countries with a low external debt level and appropriate fiscal policies and good quality institutions can gain the proper quantity and quality of foreign investors in which will help the economic growth. For this, this research is examining the impact of fiscal policy on developing countries' economic growth in the situation of different external debt levels.
Keywords: fiscal policy, external debt, gross domestic product, developing countries
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 483