Search results for: Leakage Current
1729 Managing Legal, Consumers and Commerce Risks in Phishing
Authors: Dinna N. M. N., Leau Y. B., Habeeb S. A. H., Yanti A. S.
Abstract:
Phishing scheme is a new emerged security issue of E-Commerce Crime in globalization. In this paper, the legal scaffold of Malaysia, United States and United Kingdom are analyzed and followed by discussion on critical issues that rose due to phishing activities. The result revealed that inadequacy of current legal framework is the main challenge to govern this epidemic. However, lack of awareness among consumers, crisis on merchant-s responsibility and lack of intrusion reports and incentive arrangement contributes to phishing proliferating. Prevention is always better than curb. By the end of this paper, some best practices for consumers and corporations are suggested.Keywords: Phishing, Online Fraud, Business risks, Consumers privacy, Legal Issue, Cyber law.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22531728 A Microwave Bandstop Filter Using Defected Microstrip Structure
Authors: H. Elftouh, N. T. Amar, M. Aghoutane, M. Boussouis
Abstract:
In this paper, two bandstop filters resonating at 5.25 GHz and 7.3 GHz using Defected Microstrip Structure (DMS) are discussed. These slots are incorporated in the feed lines of filters to perform a serious LC resonance property in certain frequency and suppress the spurious signals. Therefore, this method keeps the filter size unchanged and makes a resonance frequency that is due to the abrupt change of the current path of the filter. If the application requires elimination of this band of frequencies, additional filter elements are required, which can only be accomplished by adding this DMS element resonant at desired frequency band rejection. The filters are optimized and simulated with Computer Simulation Technology (CST) tool.
Keywords: Defected microstrip structure, microstrip filters, passive filter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13731727 ORR Activity and Stability of Pt-Based Electrocatalysts in PEM Fuel Cell
Authors: S. Limpattayanate, M. Hunsom
Abstract:
A comparison of activity and stability of the as-formed Pt/C, Pt-Co and Pt-Pd/C electrocatalysts, prepared by a combined approach of impregnation and seeding, was performed. According to the activity test in a single Proton Exchange Membrane (PEM) fuel cell, the Oxygen Reduction Reaction (ORR) activity of the Pt-M/C electrocatalyst was slightly lower than that of Pt/C. The j0.9 V and E10 mA/cm2 of the as-prepared electrocatalysts increased in the order of Pt/C > Pt-Co/C > Pt-Pd/C. However, in the medium-to-high current density region, Pt-Pd/C exhibited the best performance. With regard to their stability in a 0.5 M H2SO4 electrolyte solution, the electrochemical surface area decreased as the number of rounds of repetitive potential cycling increased due to the dissolution of the metals within the catalyst structure. For long-term measurement, Pt- Pd/C was the most stable than the other three electrocatalysts.Keywords: ORR activity, Stability, Pt-based electrocatalysts, PEM fuel cell.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24201726 WAF: an Interface Web Agent Framework
Authors: Xizhi Li, Qinming He
Abstract:
A trend in agent community or enterprises is that they are shifting from closed to open architectures composed of a large number of autonomous agents. One of its implications could be that interface agent framework is getting more important in multi-agent system (MAS); so that systems constructed for different application domains could share a common understanding in human computer interface (HCI) methods, as well as human-agent and agent-agent interfaces. However, interface agent framework usually receives less attention than other aspects of MAS. In this paper, we will propose an interface web agent framework which is based on our former project called WAF and a Distributed HCI template. A group of new functionalities and implications will be discussed, such as web agent presentation, off-line agent reference, reconfigurable activation map of agents, etc. Their enabling techniques and current standards (e.g. existing ontological framework) are also suggested and shown by examples from our own implementation in WAF.Keywords: HCI, Interface agent, MAS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16591725 Improving Financial Education for Young Women: A Case Study of Australian School Students
Authors: Laura de Zwaan, Tracey West
Abstract:
There is a sustained observable gender gap in financial literacy, with females consistently having lower levels than males. This research explores the knowledge and experiences of high school students in Australia aged 14 to 18 in order to understand how this gap can be improved. Using a predominantly qualitative approach, we find evidence to support impacts on financial literacy from financial socialization and socio-economic environment. We also find evidence that current teaching and assessment approaches to financial literacy may disadvantage female students. We conclude by offering recommendations to improve the way financial literacy education is delivered within the curriculum.
Keywords: Financial literacy, financial socialization, gender, maths.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3591724 Rethinking the Analysis of Means-End Chain Data in Marketing Research
Authors: P. Puustinen, A. Kanto
Abstract:
This paper proposes a new procedure for analyzing means-end chain data in marketing research. Most commonly the collected data is summarized in the Hierarchical Value Map (HVM) illustrating the main attribute-consequence-value linkages. This paper argues that traditionally constructed HVM may give an erroneous impression of the results of a means-end study. To justify the arguments, an alternative procedure to (1) determine the dominant attribute-consequence-value linkages and (2) construct HVM in a precise manner is presented. The current approach makes a contribution to means-end analysis, allowing marketers to address a set of marketing problems, such as advertising strategy.
Keywords: Means-end chain analysis, Laddering, Hierarchical Value Map.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27911723 Generator Damage Recognition Based on Artificial Neural Network
Authors: Chang-Hung Hsu, Chun-Yao Lee, Guan-Lin Liao, Yung-Tsan Jou, Jin-Maun Ho, Yu-Hua Hsieh, Yi-Xing Shen
Abstract:
This article simulates the wind generator set which has two fault bearing collar rail destruction and the gear box oil leak fault. The electric current signal which produced by the generator, We use Empirical Mode Decomposition (EMD) as well as Fast Fourier Transform (FFT) obtains the frequency range-s signal figure and characteristic value. The last step is use a kind of Artificial Neural Network (ANN) classifies which determination fault signal's type and reason. The ANN purpose of the automatic identification wind generator set fault..Keywords: Wind-driven generator, Fast Fourier Transform, Neural network
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17611722 Towards the Creation of Adaptive Content from Web Resources in an E-Learning Platform to Learners Profiles
Authors: M. Chaoui, M-T. Laskri
Abstract:
The evolution of information and communication technology has made a very powerful support for the improvement of online learning platforms in creation of courses. This paper presents a study that attempts to explore new web architecture for creating an adaptive online learning system to profiles of learners, using the Web as a source for the automatic creation of courses for the online training platform. This architecture will reduce the time and decrease the effort performed by the drafters of the current e-learning platform, and direct adaptation of the Web content will greatly enrich the quality of online training courses.Keywords: Web Content, e-Learning, Educational Content, LMS, Profiles of Learners
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15231721 Performance Analysis of BPJLT with Different Gate and Spacer Materials
Authors: Porag Jyoti Ligira, Gargi Khanna
Abstract:
The paper presents a simulation study of the electrical characteristic of Bulk Planar Junctionless Transistor (BPJLT) using spacer. The BPJLT is a transistor without any PN junctions in the vertical direction. It is a gate controlled variable resistor. The characteristics of BPJLT are analyzed by varying the oxide material under the gate. It can be shown from the simulation that an ideal subthreshold slope of ~60 mV/decade can be achieved by using highk dielectric. The effects of variation of spacer length and material on the electrical characteristic of BPJLT are also investigated in the paper. The ION / IOFF ratio improvement is of the order of 107 and the OFF current reduction of 10-4 is obtained by using gate dielectric of HfO2 instead of SiO2.Keywords: BPJLT, double gate, high-k, spacer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17861720 Analysis of a Novel Strained Silicon RF LDMOS
Authors: V.Fathipour, M. A. Malakootian, S. Fathipour, M. Fathipour
Abstract:
In this paper we propose a novel RF LDMOS structure which employs a thin strained silicon layer at the top of the channel and the N-Drift region. The strain is induced by a relaxed Si0.8 Ge0.2 layer which is on top of a compositionally graded SiGe buffer. We explain the underlying physics of the device and compare the proposed device with a conventional LDMOS in terms of energy band diagram and carrier concentration. Numerical simulations of the proposed strained silicon laterally diffused MOS using a 2 dimensional device simulator indicate improvements in saturation and linear transconductance, current drivability, cut off frequency and on resistance. These improvements are however accompanied with a suppression in the break down voltage.
Keywords: High Frequency MOSFET, Design of RF LDMOS, Strained-Silicon, LDMOS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17951719 Survey on Image Mining Using Genetic Algorithm
Authors: Jyoti Dua
Abstract:
One image is worth more than thousand words. Images if analyzed can reveal useful information. Low level image processing deals with the extraction of specific feature from a single image. Now the question arises: What technique should be used to extract patterns of very large and detailed image database? The answer of the question is: “Image Mining”. Image Mining deals with the extraction of image data relationship, implicit knowledge, and another pattern from the collection of images or image database. It is nothing but the extension of Data Mining. In the following paper, not only we are going to scrutinize the current techniques of image mining but also present a new technique for mining images using Genetic Algorithm.
Keywords: Image Mining, Data Mining, Genetic Algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24451718 Bubble Growth in a Two Phase Upward Flow in a Miniature Tube
Authors: R. S. Hassani, S. Chikh, L. Tadrist, S. Radev
Abstract:
A bubbly flow in a vertical miniature tube is analyzed theoretically. The liquid and gas phase are co-current flowing upward. The gas phase is injected via a nozzle whose inner diameter is 0.11mm and it is placed on the axis of the tube. A force balance is applied on the bubble at its detachment. The set of governing equations are solved by use of Mathematica software. The bubble diameter and the bubble generation frequency are determined for various inlet phase velocities represented by the inlet mass quality. The results show different behavior of bubble growth and detachment depending on the tube size.
Keywords: Two phase flow, bubble growth, minichannel, generation frequency.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18071717 A New Physical Modeling for Multiquantum Well Structure APD Considering Nonuniformity of Electric Field in Active Regin
Authors: F. Barzegar, M. H. Sheikhi
Abstract:
In the present work we model a Multiquantum Well structure Separate Absorption and Charge Multiplication Avalanche Photodiode (MQW-SACM-APD), while the Absorption region coincide with the MQW. We consider the nonuniformity of electric field using split-step method in active region. This model is based on the carrier rate equations in the different regions of the device. Using the model we obtain the photocurrent, and dark current. As an example, InGaAs/InP SACM-APD and MQW-SACM-APD are simulated. There is a good agreement between the simulation and experimental results.Keywords: Avalanche Photodiode, Physical Model, MultiquantumWell, Split Step Method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15241716 Ethnic Andean Concepts of Health and Illness in the Post-Colombian World and Its Relevance Today
Authors: Elizabeth J. Currie, Fernando Ortega Perez
Abstract:
—‘MEDICINE’ is a new project funded under the EC Horizon 2020 Marie-Sklodowska Curie Actions, to determine concepts of health and healing from a culturally specific indigenous context, using a framework of interdisciplinary methods which integrates archaeological-historical, ethnographic and modern health sciences approaches. The study will generate new theoretical and methodological approaches to model how peoples survive and adapt their traditional belief systems in a context of alien cultural impacts. In the immediate wake of the conquest of Peru by invading Spanish armies and ideology, native Andeans responded by forming the Taki Onkoy millenarian movement, which rejected European philosophical and ontological teachings, claiming “you make us sick”. The study explores how people’s experience of their world and their health beliefs within it, is fundamentally shaped by their inherent beliefs about the nature of being and identity in relation to the wider cosmos. Cultural and health belief systems and related rituals or behaviors sustain a people’s sense of identity, wellbeing and integrity. In the event of dislocation and persecution these may change into devolved forms, which eventually inter-relate with ‘modern’ biomedical systems of health in as yet unidentified ways. The development of new conceptual frameworks that model this process will greatly expand our understanding of how people survive and adapt in response to cultural trauma. It will also demonstrate the continuing role, relevance and use of TM in present-day indigenous communities. Studies will first be made of relevant pre-Colombian material culture, and then of early colonial period ethnohistorical texts which document the health beliefs and ritual practices still employed by indigenous Andean societies at the advent of the 17th century Jesuit campaigns of persecution - ‘Extirpación de las Idolatrías’. Core beliefs drawn from these baseline studies will then be used to construct a questionnaire about current health beliefs and practices to be taken into the study population of indigenous Quechua peoples in the northern Andean region of Ecuador. Their current systems of knowledge and medicine have evolved within complex historical contexts of both the conquest by invading Inca armies in the late 15th century, followed a generation later by Spain, into new forms. A new model will be developed of contemporary Andean concepts of health, illness and healing demonstrating the way these have changed through time. With this, a ‘policy tool’ will be constructed as a bridhging facility into contemporary global scenarios relevant to other Indigenous, First Nations, and migrant peoples to provide a means through which their traditional health beliefs and current needs may be more appropriately understood and met. This paper presents findings from the first analytical phases of the work based upon the study of the literature and the archaeological records. The study offers a novel perspective and methods in the development policies sensitive to indigenous and minority people’s health needs.Keywords: Andean ethnomedicine, andean health beliefs, health beliefs models, traditional medicine.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13091715 Cybersecurity Awareness among Applied Sciences Student Population
Authors: Nikolina Kasunic, Sanja Bracun
Abstract:
After graduation, student population of applied sciences will become the population of employees on IT experts’ positions or "just" business users of certain IT technologies for which the level of awareness of existing cybersecurity risks is extremely important. This research results define the current cybersecurity awareness level of students at Zagreb University of Applied Sciences (TVZ), what can be useful not only for teaching staff to form a curriculum related to cybersecurity more accurately but also to employers to know what to expect from their future employees regarding cybersecurity awareness level. There is also a connection determined between the student’s behaviour and their level of cybersecurity awareness.
Keywords: Applied sciences students’ population, cybersecurity, cybersecurity awareness, student population cybersecurity awareness.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5681714 A Critical Study of Media Profiling on Society-s Social Problems from a British Perspective
Authors: Cj Gletus Matthews Cn Jacobs, Kogilah Narayanasamy
Abstract:
This article explores the sociological perspectives on social problems and the role of the media which has a delicate role to tread in balancing its duty to the public and the victim Whilst social problems have objective conditions, it is the subjective definition of such problems that ensure which social problem comes to the fore and which doesn-t. Further it explores the roles and functions of policymakers when addressing social problems and the impact of the inception of media profiling as well as the advantages and disadvantages of media profiling towards social problems. It focuses on the inception of media profiling due to its length and a follow up article will explore how current media profiling towards social problems have evolved since its inception.Keywords: Media Profiling, Policy Response, Social Problems
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13231713 Simulation of Superconducting Nanowire Single-Photon Detector with Circuit Modeling
Authors: Seyed Ali Sedigh Zyabari, A. Zarifkar
Abstract:
Single photon detectors have been fabricated NbN nano wire. These detectors are fabricated from high quality, ultra high vacuum sputtered NbN thin films on a sapphire substrate. In this work a typical schematic of the nanowire Single Photon Detector structure and then driving and measurement electronic circuit are shown. The response of superconducting nanowire single photon detectors during a photo detection event, is modeled by a special electrical circuits (two circuit). Finally, current through the wire is calculated by solving equations of models.Keywords: NbN, nanowire meander, superconducting single photon detector, kinetic inductance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15031712 The AI Application and Talent Demand of Taiwan High-Tech Manufacturing Industry
Authors: Shi-Yu Lu, Chung-Han Yeh, Li-Ping Chen, Yu-Cheng Chang
Abstract:
This paper uses both quantitative and qualitative approaches to survey the current status of AI-related applications and the structure of key AI jobs in Taiwan's high-tech manufacturing industry, as well as the demand for professional AI talents, skills, and training. The result shows that AI applications and talent demand vary from different industries in many aspects, including technologies used, talent structure, and training methods. This paper serves as a reference for the government to establish appropriate talent training programs, and to reduce the demand gap for professional AI talents in Taiwan manufacturers.
Keywords: Artificial intelligence, manufacturing, talent, training.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3941711 Thermal Analysis of a Sliding Electric Contact System Using Finite Element Method
Authors: Adrian T. Pleșca
Abstract:
In this paper a three dimensional thermal model of a sliding contact system is proposed for both steady-state or transient conditions. The influence of contact force, electric current and ambient temperature on the temperature distribution, has been investigated. A thermal analysis of the different type of the graphite material of fixed electric contact and its influence on contact system temperature rise, has been performed. To validate the three dimensional thermal model, some experimental tests have been done. There is a good correlation between experimental and simulation results.Keywords: Sliding electric contact, temperature distribution, thermal analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21311710 Numerical Flow Simulation around HSP Propeller in Open Water and behind a Vessel Wake Using RANS CFD Code
Authors: Kadda Boumediene, Mohamed Bouzit
Abstract:
The prediction of the flow around marine propellers and vessel hulls propeller interaction is one of the challenges of Computational fluid dynamics (CFD). The CFD has emerged as a potential tool in recent years and has promising applications. The objective of the current study is to predict the hydrodynamic performances of HSP marine propeller in open water and behind a vessel. The unsteady 3-D flow was modeled numerically along with respectively the K-ω standard and K-ω SST turbulence models for steady and unsteady cases. The hydrodynamic performances such us a torque and thrust coefficients and efficiency show good agreement with the experiment results.
Keywords: Seiun Maru propeller, steady, unsteady, CFD, HSP.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8411709 Effective Methodology for Security Risk Assessment of Computer Systems
Authors: Daniel F. García, Adrián Fernández
Abstract:
Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodologies leading to the selection of a proper methodology to fulfill these requirements. Then, a detailed analysis of the most effective methodology is accomplished, presenting numerical examples to demonstrate how easy it is to use.
Keywords: Computer security, qualitative and quantitative methods, risk assessment methodologies, security risk assessment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31681708 General Purpose Pulse Width Modulation Based Sliding Mode Controller for Buck DC-DC
Authors: M.Bensaada , A.Boudghene Stambouli , M.Bekhti, A. Bellar, L. Boukhris
Abstract:
This paper is a simple and systematic approaches to the design and analysis a pulse width modulation (PWM) based sliding mode controller for buck DC-DC Converters. Various aspects of the design, including the practical problems and the proposed solutions, are detailed. However, these control strategies can't compensate for large load current and input voltage variations. In this paper, a new control strategy by compromising both schemes advantages and avoiding their drawbacks is proposed, analyzed and simulated.
Keywords: Buck, DC/DC converters, sliding mode control, pulse width modulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26841707 IT Management: How IT Managers Gain IT knowledge
Authors: Jes Søndergaard, Torben Tambo, Christian Koch
Abstract:
It is not a secret that, IT management has become more and more and integrated part of almost all organizations. IT managers posses an enormous amount of knowledge within both organizational knowledge and general IT knowledge. This article investigates how IT managers keep themselves updated on IT knowledge in general and looks into how much time IT managers spend on weekly basis searching the net for new or problem solving IT knowledge. The theory used in this paper is used to investigate the current role of IT managers and what issues they are facing. Furthermore a research is conducted where 7 IT managers in medium sized and large Danish companies are interviewed to add further focus on the role of the IT manager and to focus on how they keep themselves updated. Beside finding substantial need for more research, IT managers – generalists or specialists – only have limited knowledge resources at hand in updating their own knowledge – leaving much initiative to vendors.Keywords: CIO, information Technology, Knowledge, Management, Organization
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14961706 Auto Regressive Tree Modeling for Parametric Optimization in Fuzzy Logic Control System
Authors: Arshia Azam, J. Amarnath, Ch. D. V. Paradesi Rao
Abstract:
The advantage of solving the complex nonlinear problems by utilizing fuzzy logic methodologies is that the experience or expert-s knowledge described as a fuzzy rule base can be directly embedded into the systems for dealing with the problems. The current limitation of appropriate and automated designing of fuzzy controllers are focused in this paper. The structure discovery and parameter adjustment of the Branched T-S fuzzy model is addressed by a hybrid technique of type constrained sparse tree algorithms. The simulation result for different system model is evaluated and the identification error is observed to be minimum.Keywords: Fuzzy logic, branch T-S fuzzy model, tree modeling, complex nonlinear system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13891705 Bifurcation and Chaos of the Memristor Circuit
Authors: Wang Zhulin, Min Fuhong, Peng Guangya, Wang Yaoda, Cao Yi
Abstract:
In this paper, a magnetron memristor model based on hyperbolic sine function is presented and the correctness proved by studying the trajectory of its voltage and current phase, and then a memristor chaotic system with the memristor model is presented. The phase trajectories and the bifurcation diagrams and Lyapunov exponent spectrum of the magnetron memristor system are plotted by numerical simulation, and the chaotic evolution with changing the parameters of the system is also given. The paper includes numerical simulations and mathematical model, which confirming that the system, has a wealth of dynamic behavior.
Keywords: Memristor, chaotic circuit, dynamical behavior, chaotic system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17981704 Design and Implementation of Project Time Management Risk Assessment Tool for SME Projects using Oracle Application Express
Authors: Abdullahi Mohamud Sharif, Mohd. Zaidi Abd. Rozan
Abstract:
Risk Assessment Tool (RAT) is an expert system that assesses, monitors, and gives preliminary treatments automatically based on the project plan. In this paper, a review was taken out for the current project time management risk assessment tools for SME software development projects, analyze risk assessment parameters, conditions, scenarios, and finally propose risk assessment tool (RAT) model to assess, treat, and monitor risks. An implementation prototype system is developed to validate the model.Keywords: Project Time Management, Risk Assessment Tool(RAT), Small and Medium Enterprises (SME).
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23281703 Stimulus-Dependent Polyrhythms of Central Pattern Generator Hardware
Authors: Le Zhao, Alain Nogaret
Abstract:
We have built universal central pattern generator (CPG) hardware by interconnecting Hodgkin-Huxley neurons with reciprocally inhibitory synapses. We investigate the dynamics of neuron oscillations as a function of the time delay between current steps applied to individual neurons. We demonstrate stimulus dependent switching between spiking polyrhythms and map the phase portraits of the neuron oscillations to reveal the basins of attraction of the system. We experimentally study the dependence of the attraction basins on the network parameters: The neuron response time and the strength of inhibitory connections.
Keywords: Central pattern generator, winnerless competition principle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17511702 Criteria of Selecting 3pl Provider: A Literature Review
Authors: Rajesh Gupta, Anish Sachdeva, Arvind Bhardwaj
Abstract:
Shippers are concentrating on the core competency to stay competitive and outsourcing the logistic activities to the third party who is expert in this field. This third party logistics (3PL) is drawing the due attention at government, industrial, academicians and practitioner-s levels. If the logistics cost in India can be brought down from the current level of 13% of GDP to 9% (level in the U.S.), the savings would be around Rs 3 lakh crore approximately per annum. But the problem with the shippers is to select the suitable 3PL provider. Various criteria for selection of 3PL have been listed in the literature which are discussed in the present literature review. Every shipper will select the criteria suitable to its own requirement which have to be dynamically reviewed time to time so as to fit in the ever changing environment.Keywords: 3PL, criteria, shipper, outsourcing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 50681701 Smart and Connected Aircraft Cabin: A Balancing Act between Operational Cabin Management, Airline Business and Passenger Expectations
Authors: Ralf God, Lothar Kerschgens, Leonardo Goratti, Steven Lemaire
Abstract:
Ubiquitous connectivity is a reality and a basic need for users on ground. Air travel connectivity in the cabin is also becoming increasingly important for passengers during cabin use. Wireless sensor networks that provide information to cabin management systems are being used by airlines to optimize cabin crew workload. In networked cabin systems, communications and digitally transmitted data must be managed by airlines in every direction. Security and privacy, information processing and knowledge management are the current and future requirements for a smart and connected cabin.
Keywords: Smart and connected cabin management, Internet of Things, power management, airline business.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4361700 Comparison of Valuation Techniques for Bone Age Assessment
Authors: N. Olarte L, A. Rubiano F, A. Mejía F.
Abstract:
This comparison of valuation techniques for bone age assessment is a work carried out by the Telemedicine Research Group of the Military University - TIGUM, as a preliminary to the Design and development a treatment system of hand and wrist radiological images for children aged 0-6 years to bone age assessment . In this paper the techniques mentioned for decades have been the most widely used and the statistically significant. Althought, initially with the current project, it wants to work with children who have limit age, this comparison and evaluation techniques work will help in the future to expand the study subject in the system to bone age assessment, implementing more techniques, tools and deeper analysis to accomplish this purpose.Keywords: Atlas, Bone Age Assessment, Hand and Wrist Radiograph, Image Processing
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2512