Search results for: family security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1415

Search results for: family security

275 Data Hiding by Vector Quantization in Color Image

Authors: Yung-Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: Data hiding, vector quantization, watermark.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1766
274 Face Detection in Color Images using Color Features of Skin

Authors: Fattah Alizadeh, Saeed Nalousi, Chiman Savari

Abstract:

Because of increasing demands for security in today-s society and also due to paying much more attention to machine vision, biometric researches, pattern recognition and data retrieval in color images, face detection has got more application. In this article we present a scientific approach for modeling human skin color, and also offer an algorithm that tries to detect faces within color images by combination of skin features and determined threshold in the model. Proposed model is based on statistical data in different color spaces. Offered algorithm, using some specified color threshold, first, divides image pixels into two groups: skin pixel group and non-skin pixel group and then based on some geometric features of face decides which area belongs to face. Two main results that we received from this research are as follow: first, proposed model can be applied easily on different databases and color spaces to establish proper threshold. Second, our algorithm can adapt itself with runtime condition and its results demonstrate desirable progress in comparison with similar cases.

Keywords: face detection, skin color modeling, color, colorfulimages, face recognition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2289
273 Identifications and Monitoring of Power System Dynamics Based on the PMUs and Wavelet Technique

Authors: Samir Avdakovic, Amir Nuhanovic

Abstract:

Low frequency power oscillations may be triggered by many events in the system. Most oscillations are damped by the system, but undamped oscillations can lead to system collapse. Oscillations develop as a result of rotor acceleration/deceleration following a change in active power transfer from a generator. Like the operations limits, the monitoring of power system oscillating modes is a relevant aspect of power system operation and control. Unprevented low-frequency power swings can be cause of cascading outages that can rapidly extend effect on wide region. On this regard, a Wide Area Monitoring, Protection and Control Systems (WAMPCS) help in detecting such phenomena and assess power system dynamics security. The monitoring of power system electromechanical oscillations is very important in the frame of modern power system management and control. In first part, this paper compares the different technique for identification of power system oscillations. Second part analyzes possible identification some power system dynamics behaviors Using Wide Area Monitoring Systems (WAMS) based on Phasor Measurement Units (PMUs) and wavelet technique.

Keywords: Power system oscillations, Modal analysis, Prony, Wavelet, PMU, Wide Area Monitoring System.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2747
272 School Emergency Drills Evaluation through E-PreS Monitoring System

Authors: A. Kourou, A. Ioakeimidou, V. Avramea

Abstract:

Planning for natural disasters and emergencies is something every school or educational institution must consider, regardless of its size or location. Preparedness is the key to save lives if a disaster strikes. School disaster management mirrors individual and family disaster prevention, and wider community disaster prevention efforts. This paper presents the usage of E-PreS System as a helpful, managerial tool during the school earthquake drill, in order to support schools in developing effective disaster and emergency plans specific to their local needs. The project comes up with a holistic methodology using real-time evaluation involving different categories of actors, districts, steps and metrics. The main outcomes of E-PreS project are the development of E-PreS web platform that host the needed data of school emergency planning; the development of E-PreS System; the implementation of disaster drills using E-PreS System in educational premises and local schools; and the evaluation of E-PreS System. Taking into consideration that every disaster drill aims to test and valid school plan and procedures; clarify and train personnel in roles and responsibilities; improve interagency coordination; identify gaps in resources; improve individual performance; and identify opportunities for improvement, E-PreS Project was submitted and approved by the European Commission (EC).

Keywords: Disaster drills, earthquake preparedness, E-PreS system, school emergency plans.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1114
271 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone

Authors: R. Bernaoui, P. Ohly

Abstract:

Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.

Keywords: Algeria, Breeder-veterinarian, Digital Heritage, Networking, Mobile phone.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 601
270 Changing Social Life of the Potters of Nongpok Sekmai in Manipur, India

Authors: Keisham Ingocha Singh, Mayanglambam Mani Babu, Lorho Mary Maheo

Abstract:

Background: The tradition of the development of pottery through the handling of clay is one of the earliest skills known to the Chakpas of Manipur. Nongpok Sekmai, a Chakpa village in Thoubal district of Manipur, India, is strictly associated with making pots of red ochre colour called uyan. In the past, pottery was in great demand, each family needed them in rituals, festive occasions and also for day to day use. The whole village was engaged in the occupation of pot making. However the tradition of pottery making is fast declining. People have switched over to other economic activities which can provide them a better socioeconomic life leaving behind the age-old tradition of pottery occupation. The present study was carried out to find out the social life of the potters of Nongpok Sekmai. Materials and Method: In-depth interviews, household survey and observation were conducted to collect information on the pottery trend in the village. Results: The total population of the surveyed village is 1194 persons out of which 582 are male and 612 are female, distributed through 252 households. At present 4.94 % of the total population are still engaged in this profession. The study recorded 19 occupations other than pottery among women indicating decline of the traditional occupation. Conclusion: The study has revealed the changing life of the potters due to technological development, globalization and social network.

Keywords: Chakpas, Nongpok Sekmai, pottery, uyan.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1106
269 An Implementation of EURORADIO Protocol for ERTMS Systems

Authors: Gabriele Cecchetti, Anna Lina Ruscelli, Filippo Cugini, Piero Castoldi

Abstract:

European Rail Traffic Management System (ERTMS) is the European reference for interoperable and safer signaling systems to efficiently manage trains running. If implemented, it allows trains cross seamlessly intra-European national borders. ERTMS has defined a secure communication protocol, EURORADIO, based on open communication networks. Its RadioInfill function can improve the reaction of the signaling system to changes in line conditions, avoiding unnecessary braking: its advantages in terms of power saving and travel time has been analyzed. In this paper a software implementation of the EURORADIO protocol with RadioInfill for ERTMS Level 1 using GSM-R is illustrated as part of the SR-Secure Italian project. In this building-blocks architecture the EURORADIO layers communicates together through modular Application Programm Interfaces. Security coding rules and railway industry requirements specified by EN 50128 standard have been respected. The proposed implementation has successfully passed conformity tests and has been tested on a computer-based simulator.

Keywords: ERTMS, ETCS signalling, EURORADIO protocol, radio infill function.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4414
268 Street Begging and Its Psychosocial Social Effects in Ibadan Metropolis, Oyo State, Nigeria

Authors: Temitope M. Ojo, Titilayo A. Benson

Abstract:

This study investigated street begging and its psychosocial effect in Ibadan Metropolis, Oyo State, Nigeria. In carrying out this study, four research questions were used. The instrument used for data collection was a face-to-face and self-developed questionnaire. The results revealed there is high awareness level on the causes of street begging among the respondents, who also mentioned several factors contributing to street begging. However, respondents disagreed that lack of education is a factor contributing to street begging in Nigeria. The psycho-social effects of street begging, as identified by the respondents, are development of inferiority complex, lack of social interaction, loss of self-respect and dignity, increased mindset of poverty and loss of self-confident. Solution to street begging as identified by the respondents also includes provision of rehabilitation centers, provision of food for students in Islamic schools and monthly survival allowance. Specific policies and other legislative frameworks are needed in terms of age, sex, disability, and family-related issues, to effectively address the begging problem. Therefore, it is recommended that policy planners must adopt multi-faceted, multi-targeted, and multi-tiered approaches if they are to have any impact on the lives of street beggars in all four categories. In this regard, both preventative and responsive interventions are needed instead of rehabilitative solutions for each category of street beggars.

Keywords: Beggars, begging, psychosocial effect, respondents, street begging.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3694
267 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: NDP, SEND, CGA, modifier, malicious node.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1189
266 Decoy-pulse Protocol for Frequency-coded Quantum Key Distribution

Authors: Sudeshna Bhattacharya, Pratyush Pandey, Pradeep Kumar K

Abstract:

We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security loss as an eavesdropper can distinguish between signal and decoy pulses by measuring the carrier photon number without affecting other statistics. We overcome this problem by optimizing the ratio of carrier photon number of decoy-to-signal pulse to be as close to unity as possible. In our method the switching between signal and decoy pulses is achieved by changing the amplitude of RF signal as opposed to modulating the intensity of optical signal thus reducing system cost. We find an improvement by a factor of 100 approximately in the key generation rate using decoy-state protocol. We also study the effect of source fluctuation on key rate. Our simulation results show a key generation rate of 1.5×10-4/pulse for link lengths up to 70km. Finally, we discuss the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio.

Keywords: B92, decoy-pulse, frequency-coding, quantum key distribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1712
265 Competency-Based Social Work Practice and Challenges in Child Case Management: Studies in the Districts Social Welfare Services, Malaysia

Authors: S. Brahim, M. S. Mohamad, E. Zakaria, N. Sarnon@Kusenin

Abstract:

This study aimed to explore the practical experience of child welfare caseworkers and professionalism in child case management in Malaysia. This paper discussed the specific social work practice competency and the challenges faced by child caseworkers in the fieldwork. This research was qualitative with grounded theory approach. Four sessions of focused group discussion (FGD) were conducted involving a total of 27 caseworkers (child protector and probation officers) in the Klang Valley. The study found that the four basic principles of knowledge in child case management namely: 1. knowledge in child case management; 2. professional values of caseworkers towards children; 3. skills in managing cases; and 4. culturally competent practice in child case management. In addition, major challenges faced by the child case manager are the capacity and commitment of the family in children’s rehabilitation program, the credibility of caseworkers are being challenged, and the challenges of support system from intra and interagency. This study is important for policy makers to take into account the capacity and the needs of the child’s caseworker in accordance with the national social work competency framework. It is expected that case management services for children will improve systematically in line with national standards.

Keywords: Social work practice, child case management, competency-based knowledge, and professionalism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2891
264 Secure Power Systems Against Malicious Cyber-Physical Data Attacks: Protection and Identification

Authors: Morteza Talebi, Jianan Wang, Zhihua Qu

Abstract:

The security of power systems against malicious cyberphysical data attacks becomes an important issue. The adversary always attempts to manipulate the information structure of the power system and inject malicious data to deviate state variables while evading the existing detection techniques based on residual test. The solutions proposed in the literature are capable of immunizing the power system against false data injection but they might be too costly and physically not practical in the expansive distribution network. To this end, we define an algebraic condition for trustworthy power system to evade malicious data injection. The proposed protection scheme secures the power system by deterministically reconfiguring the information structure and corresponding residual test. More importantly, it does not require any physical effort in either microgrid or network level. The identification scheme of finding meters being attacked is proposed as well. Eventually, a well-known IEEE 30-bus system is adopted to demonstrate the effectiveness of the proposed schemes.

Keywords: Algebraic Criterion, Malicious Cyber-Physical Data Injection, Protection and Identification, Trustworthy Power System.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1980
263 Impact of Hepatitis C Virus Chronic Infection on Quality of Life in Egypt

Authors: Ammal M. Metwally, Ghada A. Abdel-Latif, Walaa A. Fouad, Thanaa M. Rabah, Amira Mohsen, Fatma A. Shaaban, Iman I. Salama

Abstract:

The study aimed at determining the impact of chronic hepatitis C virus (HCV) infection on patients’ Quality of Life (QoL), its relation to geographical characteristics of patients, awareness of the disease, treatment regimen, co-morbid psychiatric or other diseases. 457 patients were randomly selected from ten National Treatment Reference Centers of Ministry of Health hospitals from four community locations representing Egypt. Health related QoL assessment questionnaire with the 36-item Short Form used for assessment of the enrolled patients. The study showed no significant difference between HCV patients in different governorates as regards total QoL. Females, illiterate patients and those had bilharziasis, diabetes mellitus, hypertension or were depressed had significantly the lowest QoL score. HCV patients who knew the danger of the disease had significant lower mean score of physical and mental health components. Optimal care of overall well-being of HCV patients requires adequate knowledge of their neurological and psychological status. It is important to know how to cope with having a family member with hepatitis C and more importantly to know what should you say and what shouldn’t you say as a positive hopeful attitude is essential for combating HCV chronic infection.

Keywords: Hepatitis C virus chronic infection, physical health component and mental health component of QoL, total quality of life.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2047
262 Novel Security Strategy for Real Time Digital Videos

Authors: Prakash Devale, R. S. Prasad, Amol Dhumane, Pritesh Patil

Abstract:

Now a days video data embedding approach is a very challenging and interesting task towards keeping real time video data secure. We can implement and use this technique with high-level applications. As the rate-distortion of any image is not confirmed, because the gain provided by accurate image frame segmentation are balanced by the inefficiency of coding objects of arbitrary shape, with a lot factors like losses that depend on both the coding scheme and the object structure. By using rate controller in association with the encoder one can dynamically adjust the target bitrate. This paper discusses about to keep secure videos by mixing signature data with negligible distortion in the original video, and to keep steganographic video as closely as possible to the quality of the original video. In this discussion we propose the method for embedding the signature data into separate video frames by the use of block Discrete Cosine Transform. These frames are then encoded by real time encoding H.264 scheme concepts. After processing, at receiver end recovery of original video and the signature data is proposed.

Keywords: Data Hiding, Digital Watermarking, video coding H.264, Rate Control, Block DCT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1552
261 Intelligent Speaker Verification based Biometric System for Electronic Commerce Applications

Authors: Anastasis Kounoudes, Stephanos Mavromoustakos

Abstract:

Electronic commerce is growing rapidly with on-line sales already heading for hundreds of billion dollars per year. Due to the huge amount of money transferred everyday, an increased security level is required. In this work we present the architecture of an intelligent speaker verification system, which is able to accurately verify the registered users of an e-commerce service using only their voices as an input. According to the proposed architecture, a transaction-based e-commerce application should be complemented by a biometric server where customer-s unique set of speech models (voiceprint) is stored. The verification procedure requests from the user to pronounce a personalized sequence of digits and after capturing speech and extracting voice features at the client side are sent back to the biometric server. The biometric server uses pattern recognition to decide whether the received features match the stored voiceprint of the customer who claims to be, and accordingly grants verification. The proposed architecture can provide e-commerce applications with a higher degree of certainty regarding the identity of a customer, and prevent impostors to execute fraudulent transactions.

Keywords: Speaker Recognition, Biometrics, E-commercesecurity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1719
260 Protecting the Privacy and Trust of VIP Users on Social Network Sites

Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi

Abstract:

There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.

Keywords: Social Network Sites, Online Social Network, Privacy, Trust, Security and Authentication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3767
259 Social Support and Quality of Life of Youth Suffering from Cerebral Palsy Temporarily Orphaned Due to Emigration of a Parent

Authors: A. Gagat-Matuła

Abstract:

The article is concerned in the issue of social support and quality of life of youth suffering from cerebral palsy, who are temporarily orphaned due to the emigration of a parent. Migration causes multi-aspect consequences in various spheres of life. They are particularly severe for the functioning of families. Temporal parting of parents and children, especially the disabled, is a difficult situation. In this case, the family structure is changed, as well as the quality of life of its members. Children can handle migration parting in a better or worse way; these can be divided into properly functioning and manifesting behaviour disorders. In conditions of the progressing phenomenon of labour migration of Poles and a wide spectrum of consequences for the whole social life, it is essential to undertake actions aimed at support of migrants and their families. This article focuses mainly on social support and quality of families members, of which, are the labour migrants perceived by youth suffering from cerebral palsy. The quantitative method was used in this study. In the study, the Satisfaction with Life Scale (SWLS) by Diener, was used. The analysed group consisted of 50 persons (37 girls and 13 boys), aged 16 years to 18 years, whose parents are labour migrants. The results indicate that the quality of life and social support for youth suffering from cerebral palsy who are temporarily orphaned is at a low and average level.

Keywords: Social support, quality of life, migration, cerebral palsy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 792
258 Transformation of Industrial Policy towards Industry 4.0 and Its Impact on Firms' Competition

Authors: Arūnas Burinskas

Abstract:

Although Europe is on the threshold of a new industrial revolution called Industry 4.0, many believe that this will increase the flexibility of production, the mass adaptation of products to consumers and the speed of their service; it will also improve product quality and dramatically increase productivity. However, as expected, all the benefits of Industry 4.0 face many of the inevitable changes and challenges they pose. One of them is the inevitable transformation of current competition and business models. This article examines the possible results of competitive conversion from the classic Bertrand and Cournot models to qualitatively new competition based on innovation. Ability to deliver a new product quickly and the possibility to produce the individual design (through flexible and quickly configurable factories) by reducing equipment failures and increasing process automation and control is highly important. This study shows that the ongoing transformation of the competition model is changing the game. This, together with the creation of complex value networks, means huge investments that make it particularly difficult for small and medium-sized enterprises. In addition, the ongoing digitalization of data raises new concerns regarding legal obligations, intellectual property, and security.

Keywords: Bertrand and Cournot Competition, competition model, Industry 4.0, industrial organization, monopolistic competition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 449
257 Power Generation Scheduling of Thermal Units Considering Gas Pipelines Constraints

Authors: Sara Mohtashami, Habib Rajabi Mashhadi

Abstract:

With the growth of electricity generation from gas energy gas pipeline reliability can substantially impact the electric generation. A physical disruption to pipeline or to a compressor station can interrupt the flow of gas or reduce the pressure and lead to loss of multiple gas-fired electric generators, which could dramatically reduce the supplied power and threaten the power system security. Gas pressure drops during peak loading time on pipeline system, is a common problem in network with no enough transportation capacity which limits gas transportation and causes many problem for thermal domain power systems in supplying their demand. For a feasible generation scheduling planning in networks with no sufficient gas transportation capacity, it is required to consider gas pipeline constraints in solving the optimization problem and evaluate the impacts of gas consumption in power plants on gas pipelines operating condition. This paper studies about operating of gas fired power plants in critical conditions when the demand of gas and electricity peak together. An integrated model of gas and electric model is used to consider the gas pipeline constraints in the economic dispatch problem of gas-fueled thermal generator units.

Keywords:

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2131
256 A Comparison of Energy Calculations for a Single-Family Detached Home with Two Energy Simulation Methods

Authors: Amir Sattari

Abstract:

For newly produced houses and energy renovations, an energy calculation needs to be conducted. This is done to verify whether the energy consumption criteria of the house -to reach the energy targets by 2020 and 2050- are in-line with the norms. The main purpose of this study is to confirm whether easy to use energy calculation software or hand calculations used by small companies or individuals give logical results compared to advanced energy simulation program used by researchers or bigger companies. There are different methods for calculating energy consumption. In this paper, two energy calculation programs are used and the relation of energy consumption with solar radiation is compared. A hand calculation is also done to validate whether the hand calculations are still reasonable. The two computer programs which have been used are TMF Energi (the easy energy calculation variant used by small companies or individuals) and IDA ICE - Indoor Climate and Energy (the advanced energy simulation program used by researchers or larger companies). The calculations are done for a standard house from the Swedish house supplier Fiskarhedenvillan. The method is based on having the same conditions and inputs in the different calculation forms so that the results can be compared and verified. The house has been faced differently to see how the orientation affects energy consumption in different methods. The results for the simulations are close to each other and the hand calculation differs from the computer programs by only 5%. Even if solar factors differ due to the orientation of the house, energy calculation results from different computer programs and even hand calculation methods are in line with each other.

Keywords: Energy calculation, energy consumption, energy simulation, IDA ICE, TMF Energi.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1025
255 A Study of Panel Logit Model and Adaptive Neuro-Fuzzy Inference System in the Prediction of Financial Distress Periods

Authors: Ε. Giovanis

Abstract:

The purpose of this paper is to present two different approaches of financial distress pre-warning models appropriate for risk supervisors, investors and policy makers. We examine a sample of the financial institutions and electronic companies of Taiwan Security Exchange (TSE) market from 2002 through 2008. We present a binary logistic regression with paned data analysis. With the pooled binary logistic regression we build a model including more variables in the regression than with random effects, while the in-sample and out-sample forecasting performance is higher in random effects estimation than in pooled regression. On the other hand we estimate an Adaptive Neuro-Fuzzy Inference System (ANFIS) with Gaussian and Generalized Bell (Gbell) functions and we find that ANFIS outperforms significant Logit regressions in both in-sample and out-of-sample periods, indicating that ANFIS is a more appropriate tool for financial risk managers and for the economic policy makers in central banks and national statistical services.

Keywords: ANFIS, Binary logistic regression, Financialdistress, Panel data

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2332
254 A Blueprint for an Educational Trajectory: The Power of Discourse in Constructing “Naughty” and “Adorable” Kindergarten Students

Authors: Fernanda T. Orsati, Julie Causton

Abstract:

Discursive practices enacted by educators in kindergarten create a blueprint for how the educational trajectories of students with disabilities are constructed. This two-year ethnographic case study critically examines educators’ relationships with students considered to present challenging behaviors in one kindergarten classroom located in a predominantly White middle class school district in the Northeast of the United States. Focusing on the language and practices used by one special education teacher and three teaching assistants, this paper analyzes how teacher responses to students’ behaviors constructs and positions students over one year of kindergarten education. Using a critical discourse analysis it shows that educators understand students’ behaviors as deficit and needing consequences. This study highlights how educators’ responses reflect students' individual characteristics including family background, socioeconomics and ability status. This paper offers in depth analysis of two students’ stories, which evidenced that the language used by educators amplifies the social positioning of students within the classroom and creates a foundation for who they are constructed to be. Through exploring routine language and practices, this paper demonstrates that educators outlined a blueprint of kindergartners, which positioned students as learners in ways that became the ground for either a limited or a promising educational pathway for them.

Keywords: Behavior, early education, special education, critical discourse analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1548
253 Closing Africa’s Infrastructure Deficit: The Role of Gender Responsiveness in Urban Planning

Authors: K. Buyana, S. Lwasa, L. Schiebinger

Abstract:

Although urbanization in Africa has been characterized by fragile socio-economic successes, the sustainability of city infrastructure is now central to planning processes as a pathway to closing the deficit in terms of coverage and access. This paper builds on survey and interview data from Kampala city, to demonstrate how the principle gender responsiveness can inform improvements in urban infrastructure and service delivery. We discovered that women prefer infrastructure that combines living and working spaces for reduced labour and travel burdens between homes, markets, schools, and other urban spaces. Men’s conception of infrastructure needs on the other hand, mirrored public security and connectivity concerns along city streets and work places. However, the urban planning approach at city-level is guided by mainstream engineering and architectural designs that do not necessarily reflect the social context within which urban infrastructure influences gender roles and the attendant mobility needs. To address the challenge across cities of similar context, the paper concludes with a set of analytic steps on how the gendered influences on infrastructure-use can be considered in urban planning cycles.

Keywords: African cities, gender responsiveness, city infrastructure, urban planning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2165
252 Behavior of Foreign Tourists Visited Wat Phrachetuponwimolmangkalaram

Authors: Pranee Pathomchaiwat

Abstract:

This research aims to study tourism data and behavior of foreign tourists visited Wat Phrachetuponwimolmangkalaram (Wat Po) Sample groups are tourists who visited inside the temple, during February, March, April and May 2013. Tools used in the research are questionnaires constructed by the researcher, and samples are dawn by Convenience sampling. There are 207 foreign tourists who are willing to be respondents. Statistics used are percentage, average mean and standard deviation. The results of the research reveal that: A. General Data of Respondents The foreign tourists who visited the temple are mostly female (57.5 %), most respondents are aged between 20-29 years (37.2%). Most respondents live in Europe (62.3%), most of them got the Bachelor’s degree (40.1%), British are mostly found (16.4%), respondents who are students are also found (23.2%), and Christian are mostly found (60.9%). B. Tourists’ Behavior While Visiting the Temple Compound. The result shows that the respondents came with family (46.4%), have never visited the temples (40.6%), and visited once (42 %). It is found that the foreign tourists’ inappropriate behavior are wearing revealing attires (58.9%), touching or getting closed to the monks (55.1%), and speaking loudly (46.9%) respectively. The respondents’ outstanding objectives are to visit inside the temple (57.5%), to pay respect to the Reclining Buddha Image in the Viharn (44.4%) and to worship the Buddha image in the Phra Ubosod (37.7%) respectively. C. The Respondents’ Self-evaluation of Performance It is found that over all tourists evaluated themselves in the highest level averaged 4.40. When focusing on each item, it is shown that they evaluated themselves in the highest level on obeying the temple staff averaged 4.57, and cleanness concern of the temple averaged 4.52, well-behaved performance during the temple visit averaged 4.47 respectively.

Keywords: Deportment, Traveler

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2529
251 Aged Society: A Pitfall

Authors: Siti Norfazlina Yusoff, Noorlailahusna Mohd Yusof

Abstract:

The aging of the workforce is occurring globally and has significant impact on organizations. The Malaysian population is ageing. Although, not as quickly as the populations of a number of Asian nations, or of parts of Europe; the rate is sufficient to cause a concern. The life expectancy of Malaysians has increased in year 2012 with an average of 73.8 years or equal to 71.1 years for males and 76.7 years for females. The birth and death rates are 26.05 births/1,000 population and 5.29 deaths/1,000 population respectively. These figures have placed a greater liability on the government’s shoulder, and have become a push factor for the country to revise a new retirement age for the public servants. The ‘aged population’ impinged on the new challenges faced by the Malaysian government, which had to deal with an unproductive aged workforce. A new retirement age from 58 to 60 years old has been introduced and this could have a positive effect on this cohort, in maintaining financial security. However, keeping older employees might affect organizations’ performance and productivity. The organizations need to pay more attention on them, since they are less effective and might be affected by numerous health problems. An innovative culture should be introduced and this could be a good indicator for organizations that deal with these ‘expensive’ workers.

Keywords: Aged workforce, financial relief, innovative culture retirement policy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837
250 Water Quality Determination of River Systems in Antalya Basin by Biomonitoring

Authors: Hasan Kalyoncu, Füsun Kılçık, Hatice Gülboy Akyıldırım, Aynur Özen, Mehmet Acar, Nur Yoluk

Abstract:

For evaluation of water quality of the river systems in Antalya Basin, macrozoobenthos samples were taken from 22 determined stations by a hand net and identified at family level. Water quality of Antalya Basin was determined according to Biological Monitoring Working Party (BMWP) system, by using macrozoobenthic invertebrates and physicochemical parameters. As a result of the evaluation, while Aksu Stream was determined as the most polluted stream in Antalya Basin, Isparta Stream was determined as the most polluted tributary of Aksu Stream. Pollution level of the Isparta Stream was determined as quality class V and it is the extremely polluted part of stream. Pollution loads at the sources of the streams were determined in low levels in general. Due to some parts of the streams have passed through deep canyons and take their sources from nonresidential and non-arable regions, majority of the streams that take place in Antalya Basin are at high quality level. Waste water, which comes from agricultural and residential regions, affects the lower basins of the streams. Because of the waste water, lower parts of the stream basins exposed to the pollution under anthropogenic effects. However, in Aksu Stream, which differs by being exposed to domestic and industrial wastes of Isparta City, extreme pollution was determined, particularly in the Isparta Stream part.

Keywords: Antalya Basin, biomonitoring, BMWP, water quality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1503
249 Study on Influencing Factors of Walkability of Rail Transit Station Area

Authors: Yang Wenjuan, Xu Yilun

Abstract:

Based on the comparative analysis of the relevant evaluation methods of walking environment, this paper selects the combined evaluation method of macro urban morphology analysis and micro urban design quality survey, then investigates and analyzes the walking environment of three rail transit station area in Nanjing to explore the influence factor and internal relation of walkability of rail transit station area. Analysis shows that micro urban design factors have greater impact on the walkability of rail transit station area compared with macro urban morphology factors, the convenience is the key factor in the four aspects of convenience, security, identity and comfortability of the urban design factors, the convenience is not only affected by the block network form, but also related to the quality of the street space. The overall evaluation of walkability comes from the overlapping and regrouping of the walking environment at different levels, but some environmental factors play a leading role. The social attributes of pedestrians also partly influence their walking perception and evaluation.

Keywords: Rail transit station area, walkability, evaluation, influence factors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 823
248 Spectral Amplitude Coding Optical CDMA: Performance Analysis of PIIN Reduction Using VC Code Family

Authors: Hassan Yousif Ahmed, Ibrahima Faye, N.M.Saad, S.A. Aljined

Abstract:

Multi-user interference (MUI) is the main reason of system deterioration in the Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) system. MUI increases with the number of simultaneous users, resulting into higher probability bit rate and limits the maximum number of simultaneous users. On the other hand, Phase induced intensity noise (PIIN) problem which is originated from spontaneous emission of broad band source from MUI severely limits the system performance should be addressed as well. Since the MUI is caused by the interference of simultaneous users, reducing the MUI value as small as possible is desirable. In this paper, an extensive study for the system performance specified by MUI and PIIN reducing is examined. Vectors Combinatorial (VC) codes families are adopted as a signature sequence for the performance analysis and a comparison with reported codes is performed. The results show that, when the received power increases, the PIIN noise for all the codes increases linearly. The results also show that the effect of PIIN can be minimized by increasing the code weight leads to preserve adequate signal to noise ratio over bit error probability. A comparison study between the proposed code and the existing codes such as Modified frequency hopping (MFH), Modified Quadratic- Congruence (MQC) has been carried out.

Keywords: FBG, MUI, PIIN, SAC-OCDMA, VCC.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2198
247 Performance Assessment of Multi-Level Ensemble for Multi-Class Problems

Authors: Rodolfo Lorbieski, Silvia Modesto Nassar

Abstract:

Many supervised machine learning tasks require decision making across numerous different classes. Multi-class classification has several applications, such as face recognition, text recognition and medical diagnostics. The objective of this article is to analyze an adapted method of Stacking in multi-class problems, which combines ensembles within the ensemble itself. For this purpose, a training similar to Stacking was used, but with three levels, where the final decision-maker (level 2) performs its training by combining outputs from the tree-based pair of meta-classifiers (level 1) from Bayesian families. These are in turn trained by pairs of base classifiers (level 0) of the same family. This strategy seeks to promote diversity among the ensembles forming the meta-classifier level 2. Three performance measures were used: (1) accuracy, (2) area under the ROC curve, and (3) time for three factors: (a) datasets, (b) experiments and (c) levels. To compare the factors, ANOVA three-way test was executed for each performance measure, considering 5 datasets by 25 experiments by 3 levels. A triple interaction between factors was observed only in time. The accuracy and area under the ROC curve presented similar results, showing a double interaction between level and experiment, as well as for the dataset factor. It was concluded that level 2 had an average performance above the other levels and that the proposed method is especially efficient for multi-class problems when compared to binary problems.

Keywords: Stacking, multi-layers, ensemble, multi-class.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1080
246 A Content Based Image Watermarking Scheme Resilient to Geometric Attacks

Authors: Latha Parameswaran, K. Anbumani

Abstract:

Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.

Keywords: Image moments, wavelets, content-based watermarking, moment normalization, geometric attacks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1442