Search results for: informatio nsystems life cycle
936 Object Localization in Medical Images Using Genetic Algorithms
Authors: George Karkavitsas, Maria Rangoussi
Abstract:
We present a genetic algorithm application to the problem of object registration (i.e., object detection, localization and recognition) in a class of medical images containing various types of blood cells. The genetic algorithm approach taken here is seen to be most appropriate for this type of image, due to the characteristics of the objects. Successful cell registration results on real life microscope images of blood cells show the potential of the proposed approach.
Keywords: Genetic algorithms, object registration, pattern recognition, blood cell microscope images.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1969935 Production Structure Monitoring - A Neurologic Based Approach
Authors: G. Reinhart, J. Pohl
Abstract:
Manufacturing companies are facing a broad variety of challenges caused by a dynamic production environment. To succeed in such an environment, it is crucial to minimize the loss of time required to trigger the adaptation process of a company-s production structures. This paper presents an approach for the continuous monitoring of production structures by neurologic principles. It enhances classical monitoring concepts, which are principally focused on reactive strategies, and enables companies to act proactively. Thereby, strategic aspects regarding the harmonization of certain life cycles are integrated into the decision making process for triggering the reconfiguration process of the production structure.Keywords: Continuous Factory Planning, Production Structure, Production Management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448934 Enhanced Economic Evaluation – Approach for a Holistic Evaluation of Factory Planning Variants
Authors: Candy P. Schulze, Michael Brieke, Prof. Peter Nyhuis
Abstract:
The building of a factory can be a strategic investment owing to its long service life. An evaluation that only focuses, for example, on payments for the building, the technical equipment of the factory, and the personnel for the enterprise is – considering the complexity of the system factory – not sufficient for this long-term view. The success of an investment is secured, among other things, by the attainment of nonmonetary goals, too, like transformability. Such aspects are not considered in traditional investment calculations like the net present value method. This paper closes this gap with the enhanced economic evaluation (EWR) for factory planning. The procedure and the first results of an application in a project are presented.Keywords: economic efficiency, holistic evaluation, factory planning
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1696933 An Overview on the Effectiveness of Critical Thinking on Knowledge
Authors: Solehah Yaacob
Abstract:
The study focuses on revisiting the effectiveness of Critical Thinking in human mind capability as a major faculty in human life. The tool used as a measurement of this knowledge ability consists of several processes including experience and education background. To emphasize the `Overview` concept, the researcher highlights two major aspects of philosophical approach, they are; Divine Revelation Concept and Modern Scientific Theory. The research compares between the both parties to introduce the Divine Revelation into Modern Scientific theory. An analytical and critical study of the both concepts become the methodology of the discussion.Keywords: Critical thinking, knowledge, intellectual, language.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1083932 Experimental Testing of Ceramic Cutting Tool Inserts at Irregular Interrupted Cut
Authors: Robert Cep, Jana Petru, Lenka Cepova, Tomas Zlamal
Abstract:
Paper is dealing by testing of IN23 ceramic cutting tools at irregular shocks at special fixture - interrupted cut simulator. Standard tests provided at fixture were at regular interrupted cut at 4 slats by 90°. These new tests will be at irregular cut for 1 slat, 2 slats against each other, 2 slats side by side, 3 slats and 4 slats. The main goal is check if irregular shocks have influence at mechanical and thermal shock at tool life of cutting inserts.
Keywords: Test, Ceramic Cutting Tool, Irregular Interrupted Cut.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448931 From e-Government to e-Democracy Challenges and Opportunities for Development in Montenegro
Authors: Tamara Djurickovic MSc
Abstract:
Internet today has a huge impact on all aspects of life, and also in the area of the broader context of democracy, politics and politicians. If democracy is freedom of choice, there are a number of conditions that can ensure in practice the freedom to be achieved and realized. These preconditions must be achieved regardless of the manner of voting. The key contribution of ICT to achieve freedom of choice is that technology enables the correlation of the citizens and elected representatives on the better way than it was possible without the Internet. In this sense, we can say that the Internet and ICT are changing significantly, and potentially improving the environment in which democratic processes are taking place. This paper aims to describe trends in use of ICT in democratic processes, and analyzes the challenges for implementation of e-Democracy in MontenegroKeywords: About four key words or phrases in alphabetical order, separated by commas.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1607930 An Application of Generalized Fuzzy Soft Sets in a Social Decision Making Problem
Authors: Nisha Singhal, Usha Chouhan
Abstract:
At present, application of the extension of soft set theory in decision making problems in day to day life is progressing rapidly. The concepts of fuzzy soft set and its properties have been evolved as an area of interest for the researchers. The generalization of the concepts recently got importance and a rapid growth in the research in this area witnessed its vital-ness. In this paper, an application of the concept of generalized fuzzy soft set to make decision in a social problem is presented. Further, this paper also highlights some of the key issues of the related areas.Keywords: Soft set, Fuzzy Soft set, Generalized Fuzzy Soft set, Membership and Non-Membership Score.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 947929 Reducing Later Life Loneliness: A Systematic Literature Review of Loneliness Interventions
Authors: Dhruv Sharma, Lynne Blair, Stephen Clune
Abstract:
Later life loneliness is a social issue that is increasing alongside an upward global population trend. As a society, one way that we have responded to this social challenge is through developing non-pharmacological interventions such as befriending services, activity clubs, meet-ups, etc. Through a systematic literature review, this paper suggests that currently there is an underrepresentation of radical innovation, and underutilization of digital technologies in developing loneliness interventions for older adults. This paper examines intervention studies that were published in English language, within peer reviewed journals between January 2005 and December 2014 across 4 electronic databases. In addition to academic databases, interventions found in grey literature in the form of websites, blogs, and Twitter were also included in the overall review. This approach yielded 129 interventions that were included in the study. A systematic approach allowed the minimization of any bias dictating the selection of interventions to study. A coding strategy based on a pattern analysis approach was devised to be able to compare and contrast the loneliness interventions. Firstly, interventions were categorized on the basis of their objective to identify whether they were preventative, supportive, or remedial in nature. Secondly, depending on their scope, they were categorized as one-to-one, community-based, or group based. It was also ascertained whether interventions represented an improvement, an incremental innovation, a major advance or a radical departure, in comparison to the most basic form of a loneliness intervention. Finally, interventions were also assessed on the basis of the extent to which they utilized digital technologies. Individual visualizations representing the four levels of coding were created for each intervention, followed by an aggregated visual to facilitate analysis. To keep the inquiry within scope and to present a coherent view of the findings, the analysis was primarily concerned the level of innovation, and the use of digital technologies. This analysis highlights a weak but positive correlation between the level of innovation and the use of digital technologies in designing and deploying loneliness interventions, and also emphasizes how certain existing interventions could be tweaked to enable their migration from representing incremental innovation to radical innovation for example. This analysis also points out the value of including grey literature, especially from Twitter, in systematic literature reviews to get a contemporary view of latest work in the area under investigation.
Keywords: Loneliness, ageing, innovation, digital.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 853928 Adding Security Blocks to the DevOps Lifecycle
Authors: Andrew John Zeller, Francis Pouatcha
Abstract:
Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.
Keywords: Information security, data security, cybersecurity, DevOps, IT management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 115927 Security Analysis on Anonymous Mutual Authentication Protocol for RFID Tag without Back-End Database and its Improvement
Authors: Songyi Kim, Kwangwoo Lee, Seungjoo Kim, Dongho Won
Abstract:
RFID (Radio Frequency IDentification) system has been widely used in our life, such as transport systems, passports, automotive, animal tracking, human implants, library, and so on. However, the RFID authentication protocols between RF (Radio Frequency) tags and the RF readers have been bring about various privacy problems that anonymity of the tags, tracking, eavesdropping, and so on. Many researchers have proposed the solution of the problems. However, they still have the problem, such as location privacy, mutual authentication. In this paper, we show the problems of the previous protocols, and then we propose a more secure and efficient RFID authentication protocol.Keywords: RFID, mutual authentication, serverless, anonymity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1934926 Turkish Adolescents' Subjective Well-Being with Respect to Age, Gender and SES of Parents
Authors: Ali Eryılmaz
Abstract:
In this research it is aimed that the effect of some demographic factors on Turkish Adolescents' subjective well being is investigated. 432 adolescents who are 247 girls and 185 boys are participated in this study. They are ages 15-17, and also are high school students. The Positive and Negative Affect Scale and Life Satisfaction Scale are used for measuring adolescents' subjective well being. The ANOVA method is used in order to examine the effect of ages. For gender differences, independent t-test method is used, and finally the Pearson Correlation method is used so as to examine the effect of socio economic statues of adolescents' parents. According to results, there is no gender difference on adolescents' subjective well being. On the other hand, SES and age are effect significantly lover level on adolescents' subjective well being.
Keywords: Subjective wellbeing, adolescents, and age, gender, SES.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2943925 Multiphase Flow Regime Detection Algorithm for Gas-Liquid Interface Using Ultrasonic Pulse-Echo Technique
Authors: Serkan Solmaz, Jean-Baptiste Gouriet, Nicolas Van de Wyer, Christophe Schram
Abstract:
Efficiency of the cooling process for cryogenic propellant boiling in engine cooling channels on space applications is relentlessly affected by the phase change occurs during the boiling. The effectiveness of the cooling process strongly pertains to the type of the boiling regime such as nucleate and film. Geometric constraints like a non-transparent cooling channel unable to use any of visualization methods. The ultrasonic (US) technique as a non-destructive method (NDT) has therefore been applied almost in every engineering field for different purposes. Basically, the discontinuities emerge between mediums like boundaries among different phases. The sound wave emitted by the US transducer is both transmitted and reflected through a gas-liquid interface which makes able to detect different phases. Due to the thermal and structural concerns, it is impractical to sustain a direct contact between the US transducer and working fluid. Hence the transducer should be located outside of the cooling channel which results in additional interfaces and creates ambiguities on the applicability of the present method. In this work, an exploratory research is prompted so as to determine detection ability and applicability of the US technique on the cryogenic boiling process for a cooling cycle where the US transducer is taken place outside of the channel. Boiling of the cryogenics is a complex phenomenon which mainly brings several hindrances for experimental protocol because of thermal properties. Thus substitute materials are purposefully selected based on such parameters to simplify experiments. Aside from that, nucleate and film boiling regimes emerging during the boiling process are simply simulated using non-deformable stainless steel balls, air-bubble injection apparatuses and air clearances instead of conducting a real-time boiling process. A versatile detection algorithm is perennially developed concerning exploratory studies afterward. According to the algorithm developed, the phases can be distinguished 99% as no-phase, air-bubble, and air-film presences. The results show the detection ability and applicability of the US technique for an exploratory purpose.Keywords: Ultrasound, ultrasonic, multiphase flow, boiling, cryogenics, detection algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1004924 Exploration of Floristic Composition and Management of Gujar Tal in District Jaunpur
Authors: Mayank Singh, Mahendra P. Singh
Abstract:
Present paper enumerates highlights of seasonal variation in floristic composition and ecological strategies for the management of ‘Gujar Tal’ at Jaunpur in tropical semi-arid region of eastern U.P. (India). Total composition of macrophytes recorded was 47 from 26 families with maximum 6 plant species of Cyperaceae from April, 2012 to March, 2013 at certain periodic intervals. Maximum number of plants (39) was present during winter followed by (37) rainy and (27) summer seasons. The distribution pattern depicted that maximum number of plants (27) was of marshy and swampy habitats usually transitional between land and water.Keywords: Floristic, life form, management, weeds.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1374923 Evaluation of Systemic Immune-Inflammation Index in Obese Children
Authors: Mustafa M. Donma, Orkide Donma
Abstract:
A growing list of cancers might be influenced by obesity. Obesity is associated with an increased risk for the occurrence and development of some cancers. Inflammation can lead to cancer. It is one of the characteristic features of cancer and plays a critical role in cancer development. C-reactive protein (CRP) is under evaluation related to the new and simple prognostic factors in patients with metastatic renal cell cancer. Obesity can predict and promote systemic inflammation in healthy adults. BMI is correlated with hs-CRP. In this study, SII index and CRP values were evaluated in children with normal BMI and those within the range of different obesity grades to detect the tendency towards cancer in pediatric obesity. A total of one hundred and ninety-four children; thirty-five children with normal BMI, twenty overweight (OW), forty-seven obese (OB) and ninety-two morbid obese (MO) participated in the study. Age- and sex-matched groups were constituted using BMI-for age percentiles. Informed consent was obtained. Ethical Committee approval was taken. Weight, height, waist circumference (C), hip C, head C and neck C of the children were measured. The complete blood count test was performed. C-reactive protein analysis was performed. Statistical analyses were performed using SPSS. The degree for statistical significance was p≤0.05. SII index values were progressively increasing starting from normal weight (NW) to MO children. There is a statistically significant difference between NW and OB as well as MO children. No significant difference was observed between NW and OW children, however, a correlation was observed between NW and OW children. MO constitutes the only group, which exhibited a statistically significant correlation between SII index and CRP. Obesity-related bladder, kidney, cervical, liver, colorectal, endometrial cancers are still being investigated. Obesity, characterized as a chronic low-grade inflammation, is a crucial risk factor for colon cancer. Elevated childhood BMI values may be indicative of processes leading to cancer, initiated early in life. Prevention of childhood adiposity may decrease the cancer incidence in adults. To authors’ best knowledge, this study is the first to introduce SII index values during obesity of varying degrees of severity. It is suggested that this index seems to affect all stages of obesity with an increasing tendency and may point out the concomitant status of obesity and cancer starting from very early periods of life.
Keywords: Children, c- reactive protein, systemic immune-inflammation index, obesity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 847922 Spam E-mail: How Malaysian E-mail Users Deal with It?
Authors: Yanti Rosmunie Bujang, Husnayati Hussin
Abstract:
This paper attempts to discuss the spam issue from the Malaysian e-mail users- perspective. The purpose is to discover how Malaysian users handle the spam e-mail problem. From the experiences we hope to discover the necessary effort needed to be undertaken to face this problem in the context of Malaysia. A survey was conducted to understand how Malaysian individual perceived spam and what they actually do with the spam e-mail they received in their daily life. The findings indicate that the level of awareness on spam issue in action is still low and need some extra effort by government and relevant agencies to increase their level of awareness.
Keywords: E-mail, Malaysia, spam, users' perspective.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1889921 Effect of Biostimulants to Control the Phelipanche ramosa L. Pomel in Processing Tomato Crop
Authors: G. Disciglio, G. Gatta, F. Lops, A. Libutti, A. Tarantino, E. Tarantino
Abstract:
The experimental trial was carried out in open field at Foggia district (Apulia Region, Southern Italy), during the spring-summer season 2014, in order to evaluate the effect of four biostimulant products (RadiconÒ, Viormon plusÒ, LysodinÒ and SiaptonÒ 10L), compared with a control (no biostimulant), on the infestation of processing tomato crop (cv Dres) by the chlorophyll-lacking root parasite Phelipanche ramosa. Biostimulants consist in different categories of products (microbial inoculants, humic and fulvic acids, hydrolyzed proteins and aminoacids, seaweed extracts) which play various roles in plant growing, including the improvement of crop resistance and quali-quantitative characteristics of yield. The experimental trial was arranged according to a complete randomized block design with five treatments, each of one replicated three times. The processing tomato seedlings were transplanted on 5 May 2014. Throughout the crop cycle, P. ramosa infestation was assessed according to the number of emerged shoots (branched plants) counted in each plot, at 66, 78 and 92 day after transplanting. The tomato fruits were harvested at full-stage of maturity on 8 August 2014. From each plot, the marketable yield was measured and the quali-quantitative yield parameters (mean weight, dry matter content, colour coordinate, colour index and soluble solids content of the fruits) were determined. The whole dataset was tested according to the basic assumptions for the analysis of variance (ANOVA) and the differences between the means were determined using Tukey’s tests at the 5% probability level. The results of the study showed that none of the applied biostimulants provided a whole control of Phelipanche, although some positive effects were obtained from their application. To this respect, the RadiconÒ appeared to be the most effective in reducing the infestation of this root-parasite in tomato crop. This treatment also gave the higher tomato yield.
Keywords: Biostimulants, control methods, Phelipanche ramosa, processing tomato crop.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1904920 Scheduled Maintenance and Downtime Cost in Aircraft Maintenance Management
Authors: Remzi Saltoglu, Nazmia Humaira, Gokhan Inalhan
Abstract:
During aircraft maintenance scheduling, operator calculates the budget of the maintenance. Usually, this calculation includes only the costs that are directly related to the maintenance process such as cost of labor, material, and equipment. In some cases, overhead cost is also included. However, in some of those, downtime cost is neglected claiming that grounding is a natural fact of maintenance; therefore, it is not considered as part of the analytical decision-making process. Based on the normalized data, we introduce downtime cost with its monetary value and add its seasonal character. We envision that the rest of the model, which works together with the downtime cost, could be checked with the real life cases, through the review of MRO cost and airline spending in the particular and scheduled maintenance events.
Keywords: Aircraft maintenance, downtime, downtime cost, maintenance cost.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4424919 The Use of TV and the Internet in the Social Context
Authors: Khulood Miliany
Abstract:
This study examines the media habits of young people in Saudi Arabia, in particular their use of the Internet and television in the domestic sphere, and how use of the Internet impacts upon other activities. In order to address the research questions, focus group interviews were conducted with Saudi university students. The study found that television has become a central part of social life within the household where television represents a main source for family time, particularly in Ramadan while the Internet is a solitary activity where it is used in more private spaces. Furthermore, Saudi females were also more likely to have their Internet access monitored and circumscribed by family members, with parents controlling the location and the amount of time spent using the Internet.
Keywords: Domestication of Technology. Internet, Social context, Television, Young people.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2228918 Application of 1-MCP on ‘Centro’ Melon at Different Days after Harvest
Authors: L. P. L. Nguyen, G. Hitka, T. Zsom, Z. Kókai
Abstract:
This study is aimed to investigate the influence of postharvest delays of 1-Methylcyclopropene (1-MCP) treatment on prolonging the storage potential of melon. Melons were treated with 625-650 ppb 1-MCP at 10 °C for 24 hours on the 1st, 3rd and 5th day after harvest. Decreased ethylene production and retarded softening of melon fruits after 7 days of storage at 10 °C plus 3 days of shelflife were obtained by 1-MCP applications. 1-MCP strongly affected the chlorophyll fluorescence characteristics and hue angle values of melon. After shelf-life, the peel color of treated melon was slow in turning to yellow compared to the control. Additionally, firmness of melons treated on the first day after harvest was 38% higher than that of the control fruit. Results showed that fruits treated on the 1st and the 3rd day after harvest could maintain the quality of melon.Keywords: 1-MCP, delay, muskmelon, storage.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1418917 Islam and Fertility Regulations
Authors: Muhammad Hammad Lakhvi
Abstract:
Islam has a general principle of increase in population. But the Muslims are equally obliged to take care of health, education and the provisions etc. for their offspring and wives in the best possible way. The Muslims would have to regulate and manage the number of children, if any situation affects their duties regarding their wives or children. Islam accomplishes permissibility of temporary blockade in human fertility if someone faces any problem regarding health of mother or children. During the life of the Holy Prophet (SAW), Azl (coitus interruptus) was the only way for temporary spacing between the children. In technologically developed environment, the same can be resort through some advanced methodology or instrument of temporary blockade. Solid grounds are available in Islam that the fertility rate should be managed if any of the aspect of human quality is being affected.Keywords: Islam, Fertility Regulations, Muslims, Qur'an
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1516916 Royal Mound “Baygetobe“ from the Burial Ground Shilikty
Authors: Abdesh Toleubayev, Rinat Zhumatayev, Kulzhazira Toleubayeva
Abstract:
Mounds are one of the most valuable sources of information on various aspects of life, household skills, rituals and beliefs of the ancient peoples of Kazakhstan. Moreover, the objects associated with the cult of the burial of the dead are the most informative, and often the only source of knowledge about past eras. The present study is devoted to some results of the excavations carried out on the mound "Baygetobe" of Shilikti burial ground. The purpose of the work is associated with certain categories of grave goods and reading "Fine Text" of Shilikti graves, whose structure is the same for burials of nobles and ordinary graves. The safety of a royal burial mounds, the integrity and completeness of the source are of particular value for studying.Keywords: Animal style, barrow, Baygetobe, dromos, Shilikty.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2449915 Method for Solving Fully Fuzzy Assignment Problems Using Triangular Fuzzy Numbers
Authors: Amit Kumar, Anila Gupta, Amarpreet Kaur
Abstract:
In this paper, a new method is proposed to find the fuzzy optimal solution of fuzzy assignment problems by representing all the parameters as triangular fuzzy numbers. The advantages of the pro-posed method are also discussed. To illustrate the proposed method a fuzzy assignment problem is solved by using the proposed method and the obtained results are discussed. The proposed method is easy to understand and to apply for finding the fuzzy optimal solution of fuzzy assignment problems occurring in real life situations.
Keywords: Fuzzy assignment problem, Ranking function, Triangular fuzzy numbers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1698914 Geochemical Assessment of Heavy Metals Concentration in Surface Sediment of West Port, Malaysia
Authors: B.Tavakoly Sany, A. Salleh, A.H .Sulaiman, A. Mehdinia, GH. Monazami
Abstract:
One year (November 2009-October 2010) sediment monitoring was used to evaluate pollution status, concentration and distribution of heavy metals (As, Cu, Cd, Cr, Hg, Ni, Pb and Zn) in West Port of Malaysia. Sediment sample were collected from nine stations every four months. Geo-accumulation factor and Pollution Load Index (PLI) were estimated to better understand the pollution level in study area. The heavy metal concentration (Mg/g dry weight) were ranged from 20.2 to 162 for As, 7.4 to 27.6 for Cu, 0.244 to 3.53 for Cd, 11.5 to 61.5 for Cr, 0.11 to 0.409 for Hg, 7.2 to 22.2 for Ni, 22.3 to 80 for Pb and 23 to 98.3 for Zn. In general, concentration some metals (As,Cd, Hg and Pb) was higher than background values that are considered as serious concern for aquatic life and the human health.
Keywords: Heavy metals, Sediment Quality, geo-accumulationindex, Pollution Load Index
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2529913 Affordability and Expenditure Patterns towards Sustainable Consumption in Malaysia
Authors: Affordability, Expenditure Patterns towards Sustainable Consumption in Malaysia
Abstract:
Safe drinking water is needed for survival. Households have to pay the water bill monthly. However, lower income households are sometimes unable to afford the cost. This study examines water access and affordability among households in Malaysia and the determinants of water affordability using cross-sectional data and multiple regression. The paper expects that the bill for basic water consumption is inversely related to average income. This means that policy makers need to redesign the water tariff to improve the quality of life of lower income households.
Keywords: Affordability, households, income, water tariff.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1074912 Home Network-Specific RBAC Model
Authors: Geon-Woo Kim, Do-Woo Kim, Jun-Ho Lee, Jin-Beon Hwang, Jong-Wook Han
Abstract:
As various mobile sensing technologies, remote control and ubiquitous infrastructure are developing and expectations on quality of life are increasing, a lot of researches and developments on home network technologies and services are actively on going, Until now, we have focused on how to provide users with high-level home network services, while not many researches on home network security for guaranteeing safety are progressing. So, in this paper, we propose an access control model specific to home network that provides various kinds of users with home network services up one-s characteristics and features, and protects home network systems from illegal/unnecessary accesses or intrusions.Keywords: Home network security, RBAC, access control, authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1730911 Learners’ Perceptions of Tertiary Level Teachers’ Code Switching: A Vietnamese Perspective
Authors: Hoa Pham
Abstract:
The literature on language teaching and second language acquisition has been largely driven by monolingual ideology with a common assumption that a second language (L2) is best taught and learned in the L2 only. The current study challenges this assumption by reporting learners' positive perceptions of tertiary level teachers' code switching practices in Vietnam. The findings of this study contribute to our understanding of code switching practices in language classrooms from a learners' perspective. Data were collected from student participants who were working towards a Bachelor degree in English within the English for Business Communication stream through the use of focus group interviews. The literature has documented that this method of interviewing has a number of distinct advantages over individual student interviews. For instance, group interactions generated by focus groups create a more natural environment than that of an individual interview because they include a range of communicative processes in which each individual may influence or be influenced by others - as they are in their real life. The process of interaction provides the opportunity to obtain the meanings and answers to a problem that are "socially constructed rather than individually created" leading to the capture of real-life data. The distinct feature of group interaction offered by this technique makes it a powerful means of obtaining deeper and richer data than those from individual interviews. The data generated through this study were analysed using a constant comparative approach. Overall, the students expressed positive views of this practice indicating that it is a useful teaching strategy. Teacher code switching was seen as a learning resource and a source supporting language output. This practice was perceived to promote student comprehension and to aid the learning of content and target language knowledge. This practice was also believed to scaffold the students' language production in different contexts. However, the students indicated their preference for teacher code switching to be constrained, as extensive use was believed to negatively impact on their L2 learning and trigger cognitive reliance on the L1 for L2 learning. The students also perceived that when the L1 was used to a great extent, their ability to develop as autonomous learners was negatively impacted. This study found that teacher code switching was supported in certain contexts by learners, thus suggesting that there is a need for the widespread assumption about the monolingual teaching approach to be re-considered.Keywords: Code switching, L1 use, L2 teaching, Learners’ perception.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2502910 Development of Sleep Quality Index Using Heart Rate
Authors: Dongjoo Kim, Chang-Sik Son, Won-Seok Kang
Abstract:
Adequate sleep affects various parts of one’s overall physical and mental life. As one of the methods in determining the appropriate amount of sleep, this research presents a heart rate based sleep quality index. In order to evaluate sleep quality using the heart rate, sleep data from 280 subjects taken over one month are used. Their sleep data are categorized by a three-part heart rate range. After categorizing, some features are extracted, and the statistical significances are verified for these features. The results show that some features of this sleep quality index model have statistical significance. Thus, this heart rate based sleep quality index may be a useful discriminator of sleep.Keywords: Sleep, sleep quality, heart rate, statistical analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1504909 Predicting Protein Function using Decision Tree
Authors: Manpreet Singh, Parminder Kaur Wadhwa, Surinder Kaur
Abstract:
The drug discovery process starts with protein identification because proteins are responsible for many functions required for maintenance of life. Protein identification further needs determination of protein function. Proposed method develops a classifier for human protein function prediction. The model uses decision tree for classification process. The protein function is predicted on the basis of matched sequence derived features per each protein function. The research work includes the development of a tool which determines sequence derived features by analyzing different parameters. The other sequence derived features are determined using various web based tools.Keywords: Sequence Derived Features, decision tree.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1951908 Modelling Forest Fire Risk in the Goaso Forest Area of Ghana: Remote Sensing and Geographic Information Systems Approach
Authors: Bernard Kumi-Boateng, Issaka Yakubu
Abstract:
Forest fire, which is, an uncontrolled fire occurring in nature has become a major concern for the Forestry Commission of Ghana (FCG). The forest fires in Ghana usually result in massive destruction and take a long time for the firefighting crews to gain control over the situation. In order to assess the effect of forest fire at local scale, it is important to consider the role fire plays in vegetation composition, biodiversity, soil erosion, and the hydrological cycle. The occurrence, frequency and behaviour of forest fires vary over time and space, primarily as a result of the complicated influences of changes in land use, vegetation composition, fire suppression efforts, and other indigenous factors. One of the forest zones in Ghana with a high level of vegetation stress is the Goaso forest area. The area has experienced changes in its traditional land use such as hunting, charcoal production, inefficient logging practices and rural abandonment patterns. These factors which were identified as major causes of forest fire, have recently modified the incidence of fire in the Goaso area. In spite of the incidence of forest fires in the Goaso forest area, most of the forest services do not provide a cartographic representation of the burned areas. This has resulted in significant amount of information being required by the firefighting unit of the FCG to understand fire risk factors and its spatial effects. This study uses Remote Sensing and Geographic Information System techniques to develop a fire risk hazard model using the Goaso Forest Area (GFA) as a case study. From the results of the study, natural forest, agricultural lands and plantation cover types were identified as the major fuel contributing loads. However, water bodies, roads and settlements were identified as minor fuel contributing loads. Based on the major and minor fuel contributing loads, a forest fire risk hazard model with a reasonable accuracy has been developed for the GFA to assist decision making.
Keywords: Forest risk, GIS, remote sensing, Goaso.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1999907 Can We Secure Security?
Authors: Dominykas Broga
Abstract:
Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of everyday life. Yet, the paper argues, neither of security discourses accounted for, disclosed and challenged the fundamental aporias embedded in Western security narratives. In turn, the paper aims to unpick the conventional security wisdom, which is haunted with strong ontologies, embedded in the politics of Orientalism, and (in)security nexus. The paper concludes that current security affair conceals the integral impossibility of fulfilling its very own promise of assured security. The paper also provides suggestions about alternative security discourse based on mutual dialogue.
Keywords: Identity, (in)security, migration, ontology
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1600