Search results for: Effective band inference based power control algorithm (EBIA)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 17724

Search results for: Effective band inference based power control algorithm (EBIA)

7614 Solvent Effect on Antioxidant Activity and Total Phenolic Content of Betula alba and Convolvulus arvensi

Authors: Mohd Azman A. Nurul, Husni Shafik, Almajano P. Maria, Gallego G. Maria

Abstract:

The potential of using herbal Betula alba (BA) and Convolvulus arvensis (CA) as a natural antioxidant for food applications were investigated. Each plant extract was prepared by using pure ethanol, different concentration of ethanol aqueous solutions, including 50% and 75%, 50% methanol aqueous and water. Total phenolic content (TPC) was determined using Folin–Ciocalteau method and antioxidant activity were analyzed by 2,2-diphenyl-1-picrylhydrazyl (DPPH) radicals, trolox equivalent antioxidant capacity (TEAC), Oxygen radical absorbance capacity (ORAC) and ferric reducing antioxidant power (FRAP) respectively. Ethanol extract of CA exhibited the highest TPC and antioxidant activity; however BA showed varies of antioxidant activity value in each assay. The BA and CA exhibit the potential sources of natural antioxidant for food commodities.

Keywords: Solvent effect, Antioxidant activity, Betula Alba, Convolvulus arvensis, Total Phenolic Content.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3817
7613 Why do Clawback Provisions Affect Financial Reporting Quality? - An Analysis of Trigger Effects

Authors: Yu-Chun Lin

Abstract:

We identify clawback triggers from firms- proxy statements (Form DEF 14A) and use the likelihood of restatements to proxy for financial reporting quality. Based on a sample of 578 U.S. firms that voluntarily adopt clawback provisions during 2003-2009, when restatement-based triggers could be decomposed into two types: fraud and unintentional error, and we do observe the evidence that using fraud triggers is associated with high financial reporting quality. The findings support that fraud triggers can enhance deterrent effect of clawback provision by establishing a viable disincentive against fraud, misconduct, and otherwise harmful acts. These results are robust to controlling for the compensation components, to different sample specifications and to a number of sensitivity.

Keywords: Accruals quality, Clawback provisions, Compensation, Restatements.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2563
7612 CScheme in Traditional Concurrency Problems

Authors: Nathar Shah, Visham Cheerkoot

Abstract:

CScheme, a concurrent programming paradigm based on scheme concept enables concurrency schemes to be constructed from smaller synchronization units through a GUI based composer and latter be reused on other concurrency problems of a similar nature. This paradigm is particularly important in the multi-core environment prevalent nowadays. In this paper, we demonstrate techniques to separate concurrency from functional code using the CScheme paradigm. Then we illustrate how the CScheme methodology can be used to solve some of the traditional concurrency problems – critical section problem, and readers-writers problem - using synchronization schemes such as Single Threaded Execution Scheme, and Readers Writers Scheme.

Keywords: Concurrent Programming, Object Oriented Programming, Environments for multiple-processor systems, Programming paradigms.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1675
7611 Microseismicity of the Tehran Region Based on Three Seismic Networks

Authors: Jamileh Vasheghani Farahani

Abstract:

The main purpose of this research is to show the current active faults and active tectonic of the area by three seismic networks in Tehran region: 1-Tehran Disaster Mitigation and Management Organization (TDMMO), 2-Broadband Iranian National Seismic Network Center (BIN), 3-Iranian Seismological Center (IRSC). In this study, we analyzed microearthquakes happened in Tehran city and its surroundings using the Tehran networks from 1996 to 2015. We found some active faults and trends in the region. There is a 200-year history of historical earthquakes in Tehran. Historical and instrumental seismicity show that the east of Tehran is more active than the west. The Mosha fault in the North of Tehran is one of the active faults of the central Alborz. Moreover, other major faults in the region are Kahrizak, Eyvanakey, Parchin and North Tehran faults. An important seismicity region is an intersection of the Mosha and North Tehran fault systems (Kalan village in Lavasan). This region shows a cluster of microearthquakes. According to the historical and microseismic events analyzed in this research, there is a seismic gap in SE of Tehran. The empirical relationship is used to assess the Mmax based on the rupture length. There is a probability of occurrence of a strong motion of 7.0 to 7.5 magnitudes in the region (based on the assessed capability of the major faults such as Parchin and Eyvanekey faults and historical earthquakes).

Keywords: Iran, major faults, microseismicity, Tehran.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1498
7610 Optimizing Machine Vision System Setup Accuracy by Six-Sigma DMAIC Approach

Authors: Joseph C. Chen

Abstract:

Machine vision system provides automatic inspection to reduce manufacturing costs considerably. However, only a few principles have been found to optimize machine vision system and help it function more accurately in industrial practice. Mostly, there were complicated and impractical design techniques to improve the accuracy of machine vision system. This paper discusses implementing the Six Sigma Define, Measure, Analyze, Improve, and Control (DMAIC) approach to optimize the setup parameters of machine vision system when it is used as a direct measurement technique. This research follows a case study showing how Six Sigma DMAIC methodology has been put into use.

Keywords: DMAIC, machine vision system, process capability, Taguchi parameter design.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1220
7609 Components of Emotional Intelligence in Iranian Entrepreneurs

Authors: Farzaneh Noori

Abstract:

Entrepreneurs face different sort of difficulties especially with customers, organizations and employees. Emotional intelligence which is the ability to understand and control the emotions is an important factor to help entrepreneurs end up challenges to the result they prefer. So it is assumed that entrepreneurs especially those who have passed the first challenging years of starting a new business, have high emotional intelligence. In this study the Iranian established entrepreneurs have been surveyed. According to Iran Gem 2014 report the percentage of established entrepreneur in Iran is 10.92%. So by using Cochran sample formula (1%) 96 Iranian established entrepreneurs have been selected and Emotional intelligence appraisal questionnaire distributed to them. The SPSS19 result shows high emotional intelligence in Iranian established entrepreneurs.

Keywords: Emotional intelligence, Emotional intelligence appraisal questionnaire, Entrepreneurs, Iran.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2047
7608 The Vulnerability Analysis of Java Bytecode Based on Points-to Dataflow

Authors: Tang Hong, Zhang Lufeng, Chen Hua, Zhang Jianbo

Abstract:

Today many developers use the Java components collected from the Internet as external LIBs to design and develop their own software. However, some unknown security bugs may exist in these components, such as SQL injection bug may comes from the components which have no specific check for the input string by users. To check these bugs out is very difficult without source code. So a novel method to check the bugs in Java bytecode based on points-to dataflow analysis is in need, which is different to the common analysis techniques base on the vulnerability pattern check. It can be used as an assistant tool for security analysis of Java bytecode from unknown softwares which will be used as extern LIBs.

Keywords: Java bytecode, points-to dataflow, vulnerability analysis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1742
7607 Multiple Input Multiple Output Detection Using Roulette Wheel Based Ant Colony Optimization Technique

Authors: B. Rebekka, B. Malarkodi

Abstract:

This paper describes an approach to detect the transmitted signals for 2×2 Multiple Input Multiple Output (MIMO) setup using roulette wheel based ant colony optimization technique. The results obtained are compared with classical zero forcing and least mean square techniques. The detection rates achieved using this technique are consistently larger than the one achieved using classical methods for 50 number of attempts with two different antennas transmitting the input stream from a user. This paves the path to use alternative techniques to improve the throughput achieved in advanced networks like Long Term Evolution (LTE) networks.

Keywords: MIMO, ant colony optimization, roulette wheel, soft computing, LTE.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1053
7606 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: False negative rate, intrusion detection system, machine learning methods, performance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1045
7605 Segmentation of Korean Words on Korean Road Signs

Authors: Lae-Jeong Park, Kyusoo Chung, Jungho Moon

Abstract:

This paper introduces an effective method of segmenting Korean text (place names in Korean) from a Korean road sign image. A Korean advanced directional road sign is composed of several types of visual information such as arrows, place names in Korean and English, and route numbers. Automatic classification of the visual information and extraction of Korean place names from the road sign images make it possible to avoid a lot of manual inputs to a database system for management of road signs nationwide. We propose a series of problem-specific heuristics that correctly segments Korean place names, which is the most crucial information, from the other information by leaving out non-text information effectively. The experimental results with a dataset of 368 road sign images show 96% of the detection rate per Korean place name and 84% per road sign image.

Keywords: Segmentation, road signs, characters, classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2724
7604 Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol

Authors: Hyoungseob Lee, Donghyun Choi, Yunho Lee, Dongho Won, Seungjoo Kim

Abstract:

Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.-s protocol is not secure to randomly chosen password attack and impersonation attack, and proposed an improved protocol. Their protocol provided mutual authentication and efficient password management. In this paper, we analyze the security weaknesses and point out the vulnerabilities of Wang et al.-s protocol.

Keywords: Message Alteration Attack, Impersonation Attack

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1749
7603 Environmental Analysis of Springs in Urban Areas–A Methodological Proposal

Authors: Milton Pavezzi Netto, Gustavo D'Almeida Scarpinella, Ricardo Siloto da Silva

Abstract:

The springs located in urban areas are the outpouring of surface water, which can serve as water supply, effluent receptors and important local macro-drainage elements. With unplanned occupation, non-compliance with environmental legislation and the importance of these water bodies, it is vital to analyze the springs within urban areas, considering the Brazilian forest code. This paper submits an analysis and discussion methodology proposal of environmental compliance functions of urban springs, by means of G.I.S. - Geographic Information System analysis - and in situ analysis. The case study included two springs which exhibit a history of occupation along its length, with different degrees of impact. The proposed method is effective and easy to apply, representing a powerful tool for analyzing the environmental conditions of springs in urban areas.

Keywords: Springs, urban area, Brazilian forest code.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1571
7602 Design and Development of a 3D Printed Myoelectric-Controlled Prosthesis Hand Using sEMG Sensor

Authors: Sher Shermin Azmiri Khan, Syeda Jannatul Ferdous, Sushmita Chakraborty

Abstract:

Over the last decades, biomedical engineering prosthetics become one of the most essential grounds. Prosthetic hands are rapidly evolving. Therefore, for designing prosthetic components, it is essential to improve quality such as make it affordable and improve patient comfort and mobility by making them lightweight and easy to wear. In this paper, we proposed a myoelectric controlled prosthesis hand. We can fabricate and manufacture customized cost-effective, small volumes of 3D printed hand which is interesting. The total weight of an adult hand is about 1000 gm including a battery. The prosthetic hand is built up with low-cost materials and techniques, the cost of manufacturing will be approximately US$145. The hand can grip objects of different shapes and sizes. The 3D printed hand can rotate its wrist like a human hand. The prosthetic hand is capable of showing some types of human gestures.

Keywords: Prosthetic Hand, sEMG, 3D printing, Arduino.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 551
7601 Joint Microstatistic Multiuser Detection and Cancellation of Nonlinear Distortion Effects for the Uplink of MC-CDMA Systems Using Golay Codes

Authors: Peter Drotar, Juraj Gazda, Pavol Galajda, Dusan Kocur

Abstract:

The study in this paper underlines the importance of correct joint selection of the spreading codes for uplink of multicarrier code division multiple access (MC-CDMA) at the transmitter side and detector at the receiver side in the presence of nonlinear distortion due to high power amplifier (HPA). The bit error rate (BER) of system for different spreading sequences (Walsh code, Gold code, orthogonal Gold code, Golay code and Zadoff-Chu code) and different kinds of receivers (minimum mean-square error receiver (MMSE-MUD) and microstatistic multi-user receiver (MSF-MUD)) is compared by means of simulations for MC-CDMA transmission system. Finally, the results of analysis will show, that the application of MSF-MUD in combination with Golay codes can outperform significantly the other tested spreading codes and receivers for all mostly used models of HPA.

Keywords: HPA, MC-CDMA, microstatistic filter, multi-user receivers, PAPR.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1743
7600 A Numerical Study of a Droplet Impinging on a Liquid Surface

Authors: S.Asadi, H.Panahi

Abstract:

The Navier–Stokes equations for unsteady, incompressible, viscous fluids in the axisymmetric coordinate system are solved using a control volume method. The volume-of-fluid (VOF) technique is used to track the free-surface of the liquid. Model predictions are in good agreement with experimental measurements. It is found that the dynamic processes after impact are sensitive to the initial droplet velocity and the liquid pool depth. The time evolution of the crown height and diameter are obtained by numerical simulation. The critical We number for splashing (Wecr) is studied for Oh (Ohnesorge) numbers in the range of 0.01~0.1; the results compares well with those of the experiments.

Keywords: Droplet impingement, free surface flows, liquid crown, numerical simulation, thin liquid film.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1964
7599 Knitting Stitches’ Manipulation for Catenary Textile Structures

Authors: Virginia Melnyk

Abstract:

This paper explores the design for catenary structure using knitted textiles. Using the advantages of Grasshopper and Kangaroo parametric software to simulate and pre-design an overall form, the design is then translated to a pattern that can be made with hand manipulated stitches on a knitting machine. The textile takes advantage of the structure of knitted materials and the ability for it to stretch. Using different types of stitches to control the amount of stretch that can occur in portions of the textile generates an overall formal design. The textile is then hardened in an upside-down hanging position and then flipped right-side-up. This then becomes a structural catenary form. The resulting design is used as a small Cat House for a cat to sit inside and climb on top of.

Keywords: Architectural materials, catenary structures, knitting fabrication, textile design.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 791
7598 A Case Study of Key-Dependent Permutations in Feistel Ciphers

Authors: Hani Almimi, Ola Osabi, Azman Samsudin

Abstract:

Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposals is the key- dependent S-box which was implemented in some of the high-profile ciphers. In this paper a key-dependent permutation box is proposed and implemented on DES as a case study. The new modified DES, MDES, was tested against Diehard Tests, avalanche test, and performance test. The results showed that in general MDES is more resistible to attacks than DES with negligible overhead. Therefore, it is believed that the proposed key-dependent permutation should be considered as a valuable primitive that can help strengthen the security of Substitution-Permutation Network which is a core design in many Feistel based block ciphers.

Keywords: Block Cipher, Feistel Structure, DES, Diehard Tests, Avalanche Effect.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1975
7597 Influence of Orientation in Complex Building Architecture in Various Climatic Regions in Winter

Authors: M. Alwetaishi, Giulia Sonetti

Abstract:

It is architecturally accepted that building form and design is considered as one of the most important aspects in affecting indoor temperature. The total area of building plan might be identical, but the design will have a major influence on the total area of external walls. This will have a clear impact on the amount of heat exchange with outdoor. Moreover, it will affect the position and area of glazing system. This has not received enough consideration in research by the specialists, since most of the publications are highlighting the impact of building envelope in terms of physical heat transfer in buildings. This research will investigate the impact of orientation of various building forms in various climatic regions. It will be concluded that orientation and glazing to wall ratio were recognized to be the most effective variables despite the shape of the building. However, linear ad radial forms were found more appropriate shapes almost across the continent.

Keywords: Architectural building design, building form, indoor air temperature, building design in different climate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1117
7596 Ghazal Ozon River and Preserving the Existent Aquatics While Constructing the Siazakh Dam

Authors: Reza Gharehkhani

Abstract:

The main purpose of the dam is to control the surface streams and rivers across the country. Dam construction and formation of river and big water reservoirs and resources happen in the glen is a big incident which would change its surrounding area considerably. In fact, constructing a dam the glen width is close and fishes don't migrate from upstream to downstream and ultimately it would led to their death. To resolve this, it seems necessity to create a passage for fishes during the construction of dam. It is provided establishing a set of stepped pools overlooking each other as a fish way or fish ladder a proper pathway for moving fishes. In this article we first examine the surrounding environment and then Ghazal Ozon River and preserving the aquatics.

Keywords: Ghazal Ozon River, fish way, Dam construction, fish

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1202
7595 Smartphones for In-home Diagnostics in Telemedicine

Authors: Nálevka Petr

Abstract:

Many contemporary telemedical applications rely on regular consultations over the phone or video conferencing which consumes valuable resources such as the time of the doctors. Some applications or treatments allow automated diagnostics on the patient side which only notifies the doctors in case a significant worsening of patient’s condition is measured. Such programs can save valuable resources but an important implementation issue is how to ensure effective and cheap diagnostics on the patient side. First, specific diagnostic devices on patient side are expensive and second, they need to be user-˜friendly to encourage patient’s cooperation and reduce errors in usage which may cause noise in diagnostic data. This article proposes the use of modern smartphones and various build-in or attachable sensors as universal diagnostic devices applicable in a wider range of telemedical programs and demonstrates their application on a case-study – a program for schizophrenic relapse prevention.

Keywords: Smartphones, Actigraphy, Telemedicine, In-home Diagnostics

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1854
7594 Intelligent Off-Grid Photovoltaic Supply Systems

Authors: Prashant Kumar Soori, Parthasarathy L., Masami Okano, Awet Mana

Abstract:

Off-grid Photovoltaic (PV) systems are empowering technology in underdeveloped countries like Ethiopia where many people live far away from the modern world. Where there is relatively low energy consumption, providing energy from grid systems is not commercially cost-effective. As a result, significant people groups worldwide stay without access to electricity. One remote village in northern Ethiopia was selected by the United Nations for a pilot project to improve its living conditions. As part of this comprehensive project, an intelligent charge controller circuit for Off-grid PV systems was designed for the clinic in that village. In this paper, design aspects of an intelligent charge controller unit and its load driver circuits are discussed for an efficient utilization of PVbased supply systems.

Keywords: Compact Fluorescent Lamp (CFL), FluorescentLamp, Intelligent Charge Controller Unit (ICCU), Light EmittingDiode (LED), Photovoltaic (PV).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1983
7593 CBIR Using Multi-Resolution Transform for Brain Tumour Detection and Stages Identification

Authors: H. Benjamin Fredrick David, R. Balasubramanian, A. Anbarasa Pandian

Abstract:

Image retrieval is the most interesting technique which is being used today in our digital world. CBIR, commonly expanded as Content Based Image Retrieval is an image processing technique which identifies the relevant images and retrieves them based on the patterns that are extracted from the digital images. In this paper, two research works have been presented using CBIR. The first work provides an automated and interactive approach to the analysis of CBIR techniques. CBIR works on the principle of supervised machine learning which involves feature selection followed by training and testing phase applied on a classifier in order to perform prediction. By using feature extraction, the image transforms such as Contourlet, Ridgelet and Shearlet could be utilized to retrieve the texture features from the images. The features extracted are used to train and build a classifier using the classification algorithms such as Naïve Bayes, K-Nearest Neighbour and Multi-class Support Vector Machine. Further the testing phase involves prediction which predicts the new input image using the trained classifier and label them from one of the four classes namely 1- Normal brain, 2- Benign tumour, 3- Malignant tumour and 4- Severe tumour. The second research work includes developing a tool which is used for tumour stage identification using the best feature extraction and classifier identified from the first work. Finally, the tool will be used to predict tumour stage and provide suggestions based on the stage of tumour identified by the system. This paper presents these two approaches which is a contribution to the medical field for giving better retrieval performance and for tumour stages identification.

Keywords: Brain tumour detection, content based image retrieval, classification of tumours, image retrieval.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 740
7592 Chilean Wines Classification based only on Aroma Information

Authors: Nicolás H. Beltrán, Manuel A. Duarte-Mermoud, Víctor A. Soto, Sebastián A. Salah, and Matías A. Bustos

Abstract:

Results of Chilean wine classification based on the information provided by an electronic nose are reported in this paper. The classification scheme consists of two parts; in the first stage, Principal Component Analysis is used as feature extraction method to reduce the dimensionality of the original information. Then, Radial Basis Functions Neural Networks is used as pattern recognition technique to perform the classification. The objective of this study is to classify different Cabernet Sauvignon, Merlot and Carménère wine samples from different years, valleys and vineyards of Chile.

Keywords: Feature extraction techniques, Pattern recognitiontechniques, Principal component analysis, Radial basis functionsneural networks, Wine classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1530
7591 Traditional Ecological Knowledge System as Climate Change Adaptation Strategies for Mountain Community of Tangkhul Tribe in Northeast India

Authors: Tuisem Shimrah

Abstract:

One general agreement on climate change is that its causes may be local but the effects are global. Indigenous people are subscribed to “low-carbon” traditional ways of life and as such they have contributed little to causes of climate change. On the contrary they are the most adversely affected by climate change due to their dependence on surrounding rich biological wealth as a source of their livelihood, health care, entertainment and cultural activities This paper deals with the results of the investigation of various adaptation strategies adopted to combat climate change by traditional community. The result shows effective ways of application of traditional knowledge and wisdom applied by Tangkhul traditional community at local and community level in remote areas in Northeast India. Four adaptation measures are being presented in this paper.

Keywords: Climate change, adaptation, Tangkhul, traditional community, policy, Northeast India.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1084
7590 Modeling and Numerical Simulation of Sound Radiation by the Boundary Element Method

Authors: Costa, E.S., Borges, E.N.M., Afonso, M.M.

Abstract:

The modeling of sound radiation is of fundamental importance for understanding the propagation of acoustic waves and, consequently, develop mechanisms for reducing acoustic noise. The propagation of acoustic waves, are involved in various phenomena such as radiation, absorption, transmission and reflection. The radiation is studied through the linear equation of the acoustic wave that is obtained through the equation for the Conservation of Momentum, equation of State and Continuity. From these equations, is the Helmholtz differential equation that describes the problem of acoustic radiation. In this paper we obtained the solution of the Helmholtz differential equation for an infinite cylinder in a pulsating through free and homogeneous. The analytical solution is implemented and the results are compared with the literature. A numerical formulation for this problem is obtained using the Boundary Element Method (BEM). This method has great power for solving certain acoustical problems in open field, compared to differential methods. BEM reduces the size of the problem, thereby simplifying the input data to be worked and reducing the computational time used.

Keywords: Acoustic radiation, boundary element

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1453
7589 Digital Narrative as a Change Agent to Teach Reading to Media-Centric Students

Authors: Robert F. Kenny

Abstract:

Because today-s media centric students have adopted digital as their native form of communication, teachers are having increasingly difficult time motivating reluctant readers to read and write. Our research has shown these text-averse individuals can learn to understand the importance of reading and writing if the instruction is based on digital narratives. While these students are naturally attracted to story, they are better at consuming them than creating them. Therefore, any intervention that utilizes story as its basis needs to include instruction on the elements of story making. This paper presents a series of digitally-based tools to identify potential weaknesses of visually impaired visual learners and to help motivate these and other media-centric students to select and complete books that are assigned to them

Keywords: Cognitive tempo, digital narratives, digital Booktalk

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1573
7588 Toward a Risk Assessment Model Based On Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi, Siham Benhadou, Hicham Medromi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: Cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2233
7587 Application of Extruded Maize Flour in Gluten-free Bread Formulations

Authors: Laila Ozola, Evita Straumite, Ruta Galoburda, Dace Klava

Abstract:

Celiac disease is an immune-mediated disease, triggered in genetically susceptible individuals by ingested gluten from wheat, rye, barley and other closely related cereal grains. The only effective treatment is a strict gluten free diet for life. Latvian producers do not offer gluten-free products. In this research, use of extruded maize flour was tested for substituting rice, maize or buckwheat flour in gluten-free bread formulations at different ratios. Also the influence of extruded maize flour on the quality parameters of gluten-free bread was investigated. The aim of research was to study the influence of extruded maize flour on gluten-free bread quality. Addition of extruded maize flour affect gluten-free bread crumb color, structure of crumb, weight loss and dry off of bread.

Keywords: extruded maize flour, gluten-free bread, quality

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2148
7586 Unipolar Anamorphosis and its use in Accessibility Analyses

Authors: T. Hudecek, Z. Zakova

Abstract:

The paper deals with cartographic visualisation of results of transport accessibility monitoring with the use of a semiautomated method of unipolar anamorphosis, developed by the authors in the GIS environment. The method is based on transformation of distance in the map to values of a geographical phenomenon. In the case of time accessibility it is based on transformation of isochrones converted into the form of concentric circles, taking into account selected topographic and thematic elements in the map. The method is most suitable for analyses of accessibility to or from a centre and for modelling its long-term context. The paper provides a detailed analysis of the procedures and functionality of the method, discussing the issues of coordinates, transformation, scale and visualisation. It also offers a discussion of possible problems and inaccuracies. A practical application of the method is illustrated by previous research results by the authors in the filed of accessibility in Czechia.

Keywords: accessibility, GIS, transformation, unipolar anamorphosis

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1395
7585 Numerical and Experimental Study of Flow from a Leaking Buried Pipe in an Unsaturated Porous Media

Authors: S.M.Hosseinalipour, H.Aghakhani

Abstract:

Considering the numerous applications of the study of the flow due to leakage in a buried pipe in unsaturated porous media, finding a proper model to explain the influence of the effective factors is of great importance.There are various important factors involved in this type of flow such as: pipe leakage size and location, burial depth, the degree of the saturation of the surrounding porous medium, characteristics of the porous medium, fluid type and pressure of the upstream.In this study, the flow through unsaturated porous media due to leakage of a buried pipe for up and down leakage location is studied experimentally and numerically and their results are compared. Study results show that Darcy equation together with BCM method (for calculating the relative permeability) have suitable ability for predicting the flow due to leakage of buried pipes in unsaturated porous media.

Keywords: Buried, Leaking pipe, Porous media, Unsaturated

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2356