Search results for: social issues.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2567

Search results for: social issues.

1457 A Detailed Review on Pin Fin Heat Sink

Authors: Vedulla Manoj Kumar, B. Nageswara Rao, Sk. Farooq

Abstract:

Heat sinks are being considered in many advanced heat transfer applications including automotive and stationary fuel cells as well as cooling of electronic devices. However, there are innumerable fundamental issues in the fields of heat transfer and fluid mechanics perspectives which remains unresolved. The present review emphasizes on the progress of research in the field of pin fin heat sinks, while understanding the fluid dynamics and heat transfer characteristics with a detailed and sophisticated prediction of the temperature distribution, high heat flux removal and by minimizing thermal resistance. Lot of research work carried out across the globe to address this challenge and trying to come up with an economically viable and user friendly solution. The high activities for future pin fin heat sinks research and development to meet the current issue is recorded in this article.

Keywords: Heat sinks, heat transfer, heat flux, thermal resistance, electronic devices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2644
1456 A New Routing Algorithm: MIRAD

Authors: Amir Gholami Pastaki, Ali Reza Sahab, Seyed Mehdi Sadeghi

Abstract:

LSP routing is among the prominent issues in MPLS networks traffic engineering. The objective of this routing is to increase number of the accepted requests while guaranteeing the quality of service (QoS). Requested bandwidth is the most important QoS criterion that is considered in literatures, and a various number of heuristic algorithms have been presented with that regards. Many of these algorithms prevent flows through bottlenecks of the network in order to perform load balancing, which impedes optimum operation of the network. Here, a modern routing algorithm is proposed as MIRAD: having a little information of the network topology, links residual bandwidth, and any knowledge of the prospective requests it provides every request with a maximum bandwidth as well as minimum end-to-end delay via uniform load distribution across the network. Simulation results of the proposed algorithm show a better efficiency in comparison with similar algorithms.

Keywords: new generation networks, QoS, traffic engineering, MPLS, QoS based routing, LSP

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1911
1455 A Robust Visual Tracking Algorithm with Low-Rank Region Covariance

Authors: Songtao Wu, Yuesheng Zhu, Ziqiang Sun

Abstract:

Region covariance (RC) descriptor is an effective and efficient feature for visual tracking. Current RC-based tracking algorithms use the whole RC matrix to track the target in video directly. However, there exist some issues for these whole RCbased algorithms. If some features are contaminated, the whole RC will become unreliable, which results in lost object-tracking. In addition, if some features are very discriminative to the background, other features are still processed and thus reduce the efficiency. In this paper a new robust tracking method is proposed, in which the whole RC matrix is decomposed into several low rank matrices. Those matrices are dynamically chosen and processed so as to achieve a good tradeoff between discriminability and complexity. Experimental results have shown that our method is more robust to complex environment changes, especially either when occlusion happens or when the background is similar to the target compared to other RC-based methods.

Keywords: Visual tracking, region covariance descriptor, lowrankregion covariance

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1574
1454 Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)

Authors: Dong-Young Yoo, Jong-Whoi Shin, Gang Shin Lee, Jae-Il Lee

Abstract:

As the disfunctions of the information society and social development progress, intrusion problems such as malicious replies, spam mail, private information leakage, phishing, and pharming, and side effects such as the spread of unwholesome information and privacy invasion are becoming serious social problems. Illegal access to information is also becoming a problem as the exchange and sharing of information increases on the basis of the extension of the communication network. On the other hand, as the communication network has been constructed as an international, global system, the legal response against invasion and cyber-attack from abroad is facing its limit. In addition, in an environment where the important infrastructures are managed and controlled on the basis of the information communication network, such problems pose a threat to national security. Countermeasures to such threats are developed and implemented on a yearly basis to protect the major infrastructures of information communication. As a part of such measures, we have developed a methodology for assessing the information protection level which can be used to establish the quantitative object setting method required for the improvement of the information protection level.

Keywords: Information Security Evaluation Methodology, Critical Information Infrastructure Protection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1654
1453 Exploring Inter-Relationships between Events to Identify Strategic Technological Competencies: A Combined Approach

Authors: Cláudio Santos, Madalena Araújo, Nuno Correia

Abstract:

The inherent complexity in nowadays- business environments is forcing organizations to be attentive to the dynamics in several fronts. Therefore, the management of technological innovation is continually faced with uncertainty about the future. These issues lead to a need for a systemic perspective, able to analyze the consequences of interactions between different factors. The field of technology foresight has proposed methods and tools to deal with this broader perspective. In an attempt to provide a method to analyze the complex interactions between events in several areas, departing from the identification of the most strategic competencies, this paper presents a methodology based on the Delphi method and Quality Function Deployment. This methodology is applied in a sheet metal processing equipment manufacturer, as a case study.

Keywords: Competencies, Delphi Method, Quality Function Deployment, Technology Foresight.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1692
1452 An Integrated Framework for Engaging Stakeholders in the Circular Economy Processes Using Building Information Modeling and Virtual Reality

Authors: Erisasadat Sahebzamani, Núria Forcada, Francisco Lendinez

Abstract:

Global climate change has become increasingly problematic over the past few decades. The construction industry has contributed to greenhouse gas emissions in recent decades. Considering these issues and the high demand for materials in the construction industry, Circular Economy (CE) is considered necessary to keep materials in the loop and extend their useful lives. By providing tangible benefits, Construction 4.0 facilitates the adoption of CE by reducing waste, updating standard work, sharing knowledge, and increasing transparency and stability. This study aims to present a framework for integrating CE and digital tools like Building Information Modeling (BIM) and Virtual Reality (VR) to examine the impact on the construction industry based on stakeholders' perspectives.

Keywords: Circular Economy, Building Information Modeling, Virtual Reality, stakeholder engagement.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 250
1451 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: Smart grid network, security, threats, vulnerabilities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 585
1450 A Study of Geographic Information System Combining with GPS and 3G for Parking Guidance and Information System

Authors: Yu-Chi Shiue, Jyong Lin, Shih-Chang Chen

Abstract:

With the increase of economic behavior and the upgrade of living standar, the ratio for people in Taiwan who own automobiles and motorcycles have recently increased with multiples. Therefore, parking issues will be a big challenge to facilitate traffic network and ensure urban life quality. The Parking Guidance and Information System is one of important systems for Advanced Traveler Information Services (ATIS). This research proposes a parking guidance and information system which integrates GPS and 3G network for a map on the Geographic Information System to solution inadequate of roadside information kanban. The system proposed in this study mainly includes Parking Host, Parking Guidance and Information Server, Geographic Map and Information System as well as Parking Guidance and Information Browser. The study results show this system can increase driver-s efficiency to find parking space and efficiently enhance parking convenience in comparison with roadside kanban system.

Keywords: Geographic Information System, 3G, GPS, parkinginformation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1802
1449 Shadow Detection for Increased Accuracy of Privacy Enhancing Methods in Video Surveillance Edge Devices

Authors: F. Matusek, G. Pujolle, R. Reda

Abstract:

Shadow detection is still considered as one of the potential challenges for intelligent automated video surveillance systems. A pre requisite for reliable and accurate detection and tracking is the correct shadow detection and classification. In such a landscape of conditions, privacy issues add more and more complexity and require reliable shadow detection. In this work the intertwining between security, accuracy, reliability and privacy is analyzed and, accordingly, a novel architecture for Privacy Enhancing Video Surveillance (PEVS) is introduced. Shadow detection and masking are dealt with through the combination of two different approaches simultaneously. This results in a unique privacy enhancement, without affecting security. Subsequently, the methodology was employed successfully in a large-scale wireless video surveillance system; privacy relevant information was stored and encrypted on the unit, without transferring it over an un-trusted network.

Keywords: Video Surveillance, Intelligent Video Surveillance, Physical Security, WSSU, Privacy, Shadow Detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1336
1448 Application of Artificial Neural Network in the Investigation of Bearing Defects

Authors: S. Sendhil Kumar, M. Senthil Kumar

Abstract:

Maintenance and design engineers have great concern for the functioning of rotating machineries due to the vibration phenomenon. Improper functioning in rotating machinery originates from the damage to rolling element bearings. The status of rolling element bearings require advanced technologies to monitor their health status efficiently and effectively. Avoiding vibration during machine running conditions is a complicated process. Vibration simulation should be carried out using suitable sensors/ transducers to recognize the level of damage on bearing during machine operating conditions. Various issues arising in rotating systems are interlinked with bearing faults. This paper presents an approach for fault diagnosis of bearings using neural networks and time/frequencydomain vibration analysis.

Keywords: Bearing vibration, Condition monitoring, Fault diagnosis, Frequency domain.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2515
1447 Key Based Text Watermarking of E-Text Documents in an Object Based Environment Using Z-Axis for Watermark Embedding

Authors: Mussarat Abdullah, Fazal Wahab

Abstract:

Data hiding into text documents itself involves pretty complexities due to the nature of text documents. A robust text watermarking scheme targeting an object based environment is presented in this research. The heart of the proposed solution describes the concept of watermarking an object based text document where each and every text string is entertained as a separate object having its own set of properties. Taking advantage of the z-ordering of objects watermark is applied with the z-axis letting zero fidelity disturbances to the text. Watermark sequence of bits generated against user key is hashed with selected properties of given document, to determine the bit sequence to embed. Bits are embedded along z-axis and the document has no fidelity issues when printed, scanned or photocopied.

Keywords: Digital Watermarking, Object Based Environment, Watermark, z-ordering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1683
1446 Review of Trust Models in Wireless Sensor Networks

Authors: V. Uma Rani, K. Soma Sundaram

Abstract:

The major challenge faced by wireless sensor networks is security. Because of dynamic and collaborative nature of sensor networks the connected sensor devices makes the network unusable. To solve this issue, a trust model is required to find malicious, selfish and compromised insiders by evaluating trust worthiness sensors from the network. It supports the decision making processes in wireless sensor networks such as pre key-distribution, cluster head selection, data aggregation, routing and self reconfiguration of sensor nodes. This paper discussed the kinds of trust model, trust metrics used to address attacks by monitoring certain behavior of network. It describes the major design issues and their countermeasures of building trust model. It also discusses existing trust models used in various decision making process of wireless sensor networks.

Keywords: Attacks, Security, Trust, Trust model, Wireless sensor network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4562
1445 SBTAR: An Enhancing Method for Automate Test Tools

Authors: Noppakit Nawalikit, Pattarasinee Bhattarakosol

Abstract:

Since Software testing becomes an important part of Software development in order to improve the quality of software, many automation tools are created to help testing functionality of software. There are a few issues about usability of these tools, one is that the result log which is generated from tools contains useless information that the tester cannot use result log to communicate efficiently, or the result log needs to use a specific application to open. This paper introduces a new method, SBTAR that improves usability of automated test tools in a part of a result log. The practice will use the capability of tools named as IBM Rational Robot to create a customized function, the function would generate new format of a result log which contains useful information faster and easier to understand than using the original result log which was generated from the tools. This result log also increases flexibility by Microsoft Word or WordPad to make them readable.

Keywords: Software Automation Testing, Automated test tool, IBM Rational Robot.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1432
1444 The Announcer Trainee Satisfaction by National Broadcasting and Telecommunications Commission of Thailand

Authors: Nareenad Panbun

Abstract:

The objective is to study the knowledge utilization from the participants of the announcer training program by National Broadcasting and Telecommunications Commission (NBTC). This study is a quantitative research based on surveys and self-answering questionnaires. The population of this study is 100 participants randomly chosen by non-probability sampling method. The results have shown that most of the participants were satisfied with the topics of general knowledge about the broadcasting and television business for 37 people representing 37%, followed by the topics of broadcasting techniques. The legal issues, consumer rights, television business ethics, and credibility of the media are, in addition to the media's role and responsibilities in society, the use of language for successful communication. Therefore, the communication language skills are the most important for all of the trainees and will also build up the image of the broadcasting center.

Keywords: Announcer training program, participant, requirements announced, theory of utilization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 747
1443 Grief and Repenting: The Engaging Remembrance in Thomas Hardy’s ‘Poems of 1912-13’

Authors: Chih-Chun Tang

Abstract:

Nostalgia, to some people, may seem foolhardy in a way. However, nostalgia is a completely and intensely private but social, collective emotion. It has continuing consequence and outgrowth for our lives as social actions. It leads people to hunt and explore remembrance of persons and places of our past in an effort to confer meaning of persons and places of present. In the ‘Poems of 1912-13’ Thomas Hardy, a British poet, composed a series of poems after the unexpected death of his long-disaffected wife, Emma. The series interprets the cognitive and emotional concussion of Emma’s death on Hardy, concerning his mind and real visit to the landscape in Cornwall, England. Both spaces perform the author’s innermost in thought to his late wife and to the landscape. They present an apparent counterpart of the poet and his afflicted conscience. After Emma had died, Hardy carried her recollections alive by roaming about in the real visit and whimsical land (space) they once had drifted and meandered. This paper highlights the nostalgias and feds that seem endlessly to crop up.

Keywords: Thomas Hardy, remembrance, psychological, poems 1912-13, Fred Davis, nostalgia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1127
1442 Government Initiatives: The Missing Key for E-commerce Growth in KSA

Authors: R. AlGhamdi, S. Drew, S. Alkhalaf

Abstract:

This paper explores the issues that influence online retailing in Saudi Arabia. Retailers in Saudi Arabia have been reserved in their adoption of electronically delivered aspects of their business. Despite the fact that Saudi Arabia has the largest and fastest growth of ICT marketplaces in the Arab region, e-commerce activities are not progressing at the same speed. Only very few Saudi companies, mostly medium and large companies from the manufacturing sector, are involved in e-commerce implementation. Based on qualitative data collected by conducting interviews with 16 retailers and 16 potential customers in Saudi Arabia, several factors influencing online retailing diffusion in Saudi Arabia are identified. However, government support comes the highest and most influencing factor for online retailing growth as identified by both parties; retailers and potential customers in Saudi Arabia.

Keywords: government support, key factor, online retailing growth, Saudi Arabia

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1847
1441 Impact of Health Sector Economic Reforms in Underdeveloped Countries

Authors: Haga Elimam

Abstract:

This paper investigates the connotation, and some of the realistic implications, of the economic reform of health sector in under developed countries. The paper investigates the issues that economic reforms have to address, and the policy targets they are considered to accomplish. The work argues that the development of economic reform is not connected only with understanding the priorities and refining them, furthermore with reformation and restructuring the organizations through which health policies are employed. Considering various organizational values, that are likely to be regular to all economic reform programs, a regulatory approach to institutional reform is unsuitable. The paper further investigates the selection of economic reform that may as well influence via technical suggestions and analysis, but the verdict to continue, and the consequent success of execution, eventually depends on the progressive political sustainability. The paper concludes by giving examples of institutional reforms from various underdeveloped countries and includes recommendation of the responsibility and control of donor organizations.

Keywords: Economic Reform, Health Sector, underdeveloped Countries.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1693
1440 Understanding Narrative Transformations of Ebola in Negotiations of Epidemic Risk

Authors: N. W. Paul, M. Banerjee

Abstract:

Discussing the nexus between global health policy and local practices, this article addresses the recent Ebola outbreak as a role model for narrative co-constructions of epidemic risk. We will demonstrate in how far a theory-driven and methodologically rooted analysis of narrativity can help to improve mechanisms of prevention and intervention whenever epidemic risk needs to be addressed locally in order to contribute to global health. Analyzing the narrative transformation of Ebola, we will also address issues of transcultural problem-solving and of normative questions at stake. In this regard, we seek to contribute to a better understanding of a key question of global health and justice as well as to the underlying ethical questions. By highlighting and analyzing the functions of narratives, this paper provides a translational approach to refine our practices by which we address epidemic risk, be it on the national, the transnational or the global scale.

Keywords: Ebola, Epidemic Risk, Medical Ethics, Medical Humanities.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2098
1439 Sustainability of Healthcare Insurance in India: A Review of Health Insurance Scheme Launched by States in India

Authors: Mohd Zuhair, Ram Babu Roy

Abstract:

This paper presents an overview of the accessibility, design, and functioning of health insurance plans launched by state governments in India. In recent years, the governments of several states in India have come forward to provide health insurance coverage for the low-income group and rural population to reduce the out of pocket expenditure (OPE) on healthcare. Different health insurance schemes have different structures and offerings which differ in the different demographic factors. This study will portray a comparative analysis of the various health insurance schemes by analyzing different offerings and finance generation of the schemes. The comparative analysis will explain the lesson to be learned from these schemes and extend the existing knowledge of the health insurance in India. This would help in recognizing tension between various drivers and identifying issues pertaining to the sustainability of health insurance schemes in India.

Keywords: Health insurance, out of pocket expenditure, universal healthcare, sustainability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1149
1438 Rule-Based Expert System for Headache Diagnosis and Medication Recommendation

Authors: Noura Al-Ajmi, Mohammed A. Almulla

Abstract:

With the increased utilization of technology devices around the world, healthcare and medical diagnosis are critical issues that people worry about these days. Doctors are doing their best to avoid any medical errors while diagnosing diseases and prescribing the wrong medication. Subsequently, artificial intelligence applications that can be installed on mobile devices such as rule-based expert systems facilitate the task of assisting doctors in several ways. Due to their many advantages, the usage of expert systems has increased recently in health sciences. This work presents a backward rule-based expert system that can be used for a headache diagnosis and medication recommendation system. The structure of the system consists of three main modules, namely the input unit, the processing unit, and the output unit.

Keywords: Headache diagnosis system, treatment recommender system, rule-based expert system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 734
1437 Development of Road Maintenance Management System Based on WebGIS

Authors: Feng Xiao, Zhou Hongyu, YuCaixia

Abstract:

Based on an analysis of the current research and application of Road maintenance, geographic information system (WebGIS) and ArcGIS Server, the platform overhead construction for Road maintenance development is studied and the key issues are presented, including the organization and design of spatial data on the basis of the geodatabase technology, middleware technology, tiles cache index technology and dynamic segmentation of WebGIS. Road maintenance geographic information platform is put forward through the researching ideas of analysis of the system design. The design and application of WebGIS system are discussed on the basis of a case study of BaNan district of Chongqing highway maintenance management .The feasibility of the theories and methods are validated through the system.

Keywords: WebGIS, Tile, Road maintenance, dynamic segmentation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2238
1436 A Study of Social and Cultural Context for Tourism Management by Community Kamchanoad District, Amphoe Ban Dung, Udon Thani Province

Authors: Phusit Phukamchanoad, Chutchai Ditchareon, Suwaree Yordchim

Abstract:

This research was to study on background and social and cultural context of Kamchanoad community for sustainable tourism management. All data was collected through in-depth interview with village headmen, community committees, teacher, monks, Kamchanoad forest field officers and respected senior citizen above 60 years old in the community who have lived there for more than 40 years. Altogether there were 30 participants for this research. After analyzing the data, content from interview and discussion, Kamchanoad has both high land and low land in the region as well as swamps that are very capable of freshwater animals’ conservation. Kamchanoad is also good for agriculture and animal farming. 80% of Kamchanoad’s land are forest, freshwater and rice farms. Kamchanoad was officially set up as community in 1994 as “Baan Nonmuang”. Inhabitants in Kamchanoad make a living by farming based on sufficiency economy. They have rice farm, eucalyptus farm, cassava farm and rubber tree farm. Local people in Kamchanoad still believe in the myth of Srisutto Naga. They are still religious and love to preserve their traditional way of life. In order to understand how to create successful tourism business in Kamchanoad, we have to study closely on local culture and traditions. Outstanding event in Kamchanoad is the worship of Grand Srisutto, which is on the fullmoon day of 6th month or Visakhabucha Day. Other big events are also celebration at the end of Buddhist lent, Naga firework, New Year celebration, Boon Mahachart, Songkran, Buddhist Lent, Boon Katin and Loy Kratong. Buddhism is the main religion in Kamchanoad. The promotion of tourism in Kamchanoad is expected to help spreading more income for this region. More infrastructures will be provided for local people as well as funding for youth support and people activities.

Keywords: Social and Culture Area, Tourism Management, Kamchanoad Community.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1857
1435 Integrating Security Indifference Curve to Formal Decision Evaluation

Authors: Anon Yantarasri, Yachai Limpiyakorn

Abstract:

Decisions are regularly made during a project or daily life. Some decisions are critical and have a direct impact on project or human success. Formal evaluation is thus required, especially for crucial decisions, to arrive at the optimal solution among alternatives to address issues. According to microeconomic theory, all people-s decisions can be modeled as indifference curves. The proposed approach supports formal analysis and decision by constructing indifference curve model from the previous experts- decision criteria. These knowledge embedded in the system can be reused or help naïve users select alternative solution of the similar problem. Moreover, the method is flexible to cope with unlimited number of factors influencing the decision-making. The preliminary experimental results of the alternative selection are accurately matched with the expert-s decisions.

Keywords: Decision Analysis and Resolution, Indifference Curve, Multi-criteria Decision Making.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1616
1434 Free and Open Source Licences, Software Programmers, and the Social Norm of Reciprocity

Authors: Luke McDonagh

Abstract:

Over the past three decades, free and open source software (FOSS) programmers have developed new, innovative and legally binding licences that have in turn enabled the creation of innumerable pieces of everyday software, including Linux, Mozilla Firefox and Open Office. That FOSS has been highly successful in competing with 'closed source software' (e.g. Microsoft Office) is now undeniable, but in noting this success, it is important to examine in detail why this system of FOSS has been so successful. One key reason is the existence of networks or communities of programmers, who are bound together by a key shared social norm of 'reciprocity'. At the same time, these FOSS networks are not unitary – they are highly diverse and there are large divergences of opinion between members regarding which licences are generally preferable: some members favour the flexible ‘free’ or 'no copyleft' licences, such as BSD and MIT, while other members favour the ‘strong open’ or 'strong copyleft' licences such as GPL. This paper argues that without both the existence of the shared norm of reciprocity and the diversity of licences, it is unlikely that the innovative legal framework provided by FOSS would have succeeded to the extent that it has.

Keywords: Open source, software, licences, reciprocity, networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1046
1433 Application of Geographic Information Systems(GIS) in the History of Cartography

Authors: Bangbo Hu

Abstract:

This paper discusses applications of a revolutionary information technology, Geographic Information Systems (GIS), in the field of the history of cartography by examples, including assessing accuracy of early maps, establishing a database of places and historical administrative units in history, integrating early maps in GIS or digital images, and analyzing social, political, and economic information related to production of early maps. GIS provides a new mean to evaluate the accuracy of early maps. Four basic steps using GIS for this type of study are discussed. In addition, several historical geographical information systems are introduced. These include China Historical Geographic Information Systems (CHGIS), the United States National Historical Geographic Information System (NHGIS), and the Great Britain Historical Geographical Information System. GIS also provides digital means to display and analyze the spatial information on the early maps or to layer them with modern spatial data. How GIS relational data structure may be used to analyze social, political, and economic information related to production of early maps is also discussed in this paper. Through discussion on these examples, this paper reveals value of GIS applications in this field.

Keywords: Cartography, GIS, history, maps.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3145
1432 Investigation of Time Delay Factors in Global Software Development

Authors: Khalid Khan, Atique Ahmad Zafar, Mohammed A. Alnuem, Hashim Khan

Abstract:

Global Software Development (GSD) projects are passing through different boundaries of a company, country and even in other continents where time zone differs between both sites. Beside many benefits of such development, research declared plenty of negative impacts on these GSD projects. It is important to understand problems which may lie during the execution of GSD project with different time zones. This research project discussed and provided different issues related to time delays in GSD projects. In this paper, authors investigated some of the time delay factors which usually lie in GSD projects with different time zones. This investigation is done through systematic review of literature. Furthermore, the practices to overcome these delay factors which have already been reported in literature and GSD organizations are also explored through literature survey and case studies.

Keywords: Case Studies, Global Software Development, Global Software Engineering, Temporal Difference, Time Delay

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1979
1431 Problems of Lifelong Education Course in Information and Communication Technology

Authors: Hisham Md Suhadi, Faaizah Shahbodin, Jamaluddin Hashim

Abstract:

The study is the way to identify the problems that occur in organizing short course’s lifelong learning in the information and communication technology (ICT) education which are faced by the lecturer and staff at the Mara Skill Institute and Industrial Training Institute in Pahang Malaysia. The important aspects of these issues are classified to five which are selecting the courses administrative. Fifty lecturers and staff were selected as a respondent. The sample is selected by using the non-random sampling method purpose sampling. The questionnaire is used as a research instrument and divided into five main parts. All the data that gain from the questionnaire are analyzed by using the SPSS in term of mean, standard deviation and percentage. The findings showed, there are the problems occur in organizing the short course for lifelong learning in ICT education.

Keywords: Lifelong education, information and communication technology (ICT), short course, ICT education, courses administrative.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1807
1430 Changes in Subjective and Objective Measures of Performance in Ramadan

Authors: H. Alabed, K. Abuzayan, J. Waterhouse

Abstract:

The Muslim faith requires individuals to fast between the hours of sunrise and sunset during the month of Ramadan. Our recent work has concentrated on some of the changes that take place during the daytime when fasting. A questionnaire was developed to assess subjective estimates of physical, mental and social activities, and fatigue. Four days were studied: in the weeks before and after Ramadan (control days) and during the first and last weeks of Ramadan (experimental days). On each of these four days, this questionnaire was given several times during the daytime and once after the fast had been broken and just before individuals retired at night. During Ramadan, daytime mental, physical and social activities all decreased below control values but then increased to abovecontrol values in the evening. The desires to perform physical and mental activities showed very similar patterns. That is, individuals tried to conserve energy during the daytime in preparation for the evenings when they ate and drank, often with friends. During Ramadan also, individuals were more fatigued in the daytime and napped more often than on control days. This extra fatigue probably reflected decreased sleep, individuals often having risen earlier (before sunrise, to prepare for fasting) and retired later (to enable recovery from the fast). Some physiological measures and objective measures of performance (including the response to a bout of exercise) have also been investigated. Urine osmolality fell during the daytime on control days as subjects drank, but rose in Ramadan to reach values at sunset indicative of dehydration. Exercise performance was also compromised, particularly late in the afternoon when the fast had lasted several hours. Self-chosen exercise work-rates fell and a set amount of exercise felt more arduous. There were also changes in heart rate and lactate accumulation in the blood, indicative of greater cardiovascular and metabolic stress caused by the exercise in subjects who had been fasting. Daytime fasting in Ramadan produces widespread effects which probably reflect combined effects of sleep loss and restrictions to intakes of water and food.

Keywords: Drinking, Eating, Mental Performance, Physical Performance, Social Activity, Sleepiness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1736
1429 Component Lifecycle and Concurrency Model in Usage Control (UCON) System

Authors: P. Ghann, J. Shiguang, C. Zhou

Abstract:

Access control is one of the most challenging issues facing information security. Access control is defined as, the ability to permit or deny access to a particular computational resource or digital information by an unauthorized user or subject. The concept of usage control (UCON) has been introduced as a unified approach to capture a number of extensions for access control models and systems. In UCON, an access decision is determined by three factors: authorizations, obligations and conditions. Attribute mutability and decision continuity are two distinct characteristics introduced by UCON for the first time. An observation of UCON components indicates that, the components are predefined and static. In this paper, we propose a new and flexible model of usage control for the creation and elimination of some of these components; for example new objects, subjects, attributes and integrate these with the original UCON model. We also propose a model for concurrent usage scenarios in UCON.

Keywords: Access Control, Concurrency, Digital container, Usage control.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1843
1428 Problems of the Management of Legal Entities of Private Law in Georgia

Authors: Ketevan Kokrashvili, Rusudan Kutateladze, Nino Pailodze

Abstract:

Importance of management of legal entities under private law of which especially corporate management, as well as looking for ways of its improvement and perfection has become especially relevant in the twenty-first century, which was greatly contributed to by the global economic crisis. Some states have adopted Corporate Governance Codes; the European Union has set to work on a series of directives the main purpose of which is an improvement of corporate governance, provision of greater transparency and implementation of an effective control mechanism. This process is not yet completed, and various problematic issues associated with management of legal persons are still being debated among practitioner experts and scholars. Georgia is not an exception in this regard. The article discusses the legislative gaps, and in some cases, discrepancies having arisen in legal relationships under private law and having caused many practical problems. This especially applies to the management of capital companies.

Keywords: Business entities, corporate management, public capital management, collective norms, existing problems, legal discrepancies.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 918