Search results for: exercise behaviors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 533

Search results for: exercise behaviors

443 GenCos- Optimal Bidding Strategy Considering Market Power and Transmission Constraints: A Cournot-based Model

Authors: A. Badri

Abstract:

Restructured electricity markets may provide opportunities for producers to exercise market power maintaining prices in excess of competitive levels. In this paper an oligopolistic market is presented that all Generation Companies (GenCos) bid in a Cournot model. Genetic algorithm (GA) is applied to obtain generation scheduling of each GenCo as well as hourly market clearing prices (MCP). In order to consider network constraints a multiperiod framework is presented to simulate market clearing mechanism in which the behaviors of market participants are modelled through piecewise block curves. A mixed integer linear programming (MILP) is employed to solve the problem. Impacts of market clearing process on participants- characteristic and final market prices are presented. Consequently, a novel multi-objective model is addressed for security constrained optimal bidding strategy of GenCos. The capability of price-maker GenCos to alter MCP is evaluated through introducing an effective-supply curve. In addition, the impact of exercising market power on the variation of market characteristics as well as GenCos scheduling is studied.

Keywords: Optimal bidding strategy, Cournot equilibrium, market power, network constraints, market auction mechanism

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1652
442 The Organizational Justice-Citizenship Behavior Link in Hotels: Does Customer Orientation Matter?

Authors: Pablo Zoghbi-Manrique-de-Lara, Miguel A. Suárez-Acosta

Abstract:

The goal of the present paper is to model two classic lines of research in which employees starred, organizational justice and citizenship behavior (OCB), but that have never been studied together when targeting customers. The suggestion is made that a hotel’s fair treatment (in terms of distributive, procedural, and interactional justice) toward customers will be appreciated by the employees, who will reciprocate in kind by favoring the hotel with increased customer-oriented behaviors (COBs). Data were collected from 204 employees at eight upscale hotels in the Canary Islands (Spain). Unlike in the case of perceptions of distributive justice, results of structural equation modeling demonstrate that employees substantively react to interactional and procedural justice toward guests by engaging in customer-oriented behaviors (COBs). The findings offer new reasons why employees decide to engage in COBs, and they highlight potentially beneficial effects of fair treatment toward guests bring to hospitality through promoting COBs.

Keywords: Hotel guests’ (mis) treatment, customer-oriented behaviors, employee citizenship, organizational justice, third-party observers, third-party intervention.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2404
441 Animal-Assisted Therapy for Persons with Disabilities Based on Canine Tail Language Interpretation via Gaussian-Trapezoidal Fuzzy Emotional Behavior Model

Authors: W. Phanwanich, O. Kumdee, P. Ritthipravat, Y. Wongsawat

Abstract:

In order to alleviate the mental and physical problems of persons with disabilities, animal-assisted therapy (AAT) is one of the possible modalities that employs the merit of the human-animal interaction. Nevertheless, to achieve the purpose of AAT for persons with severe disabilities (e.g. spinal cord injury, stroke, and amyotrophic lateral sclerosis), real-time animal language interpretation is desirable. Since canine behaviors can be visually notable from its tail, this paper proposes the automatic real-time interpretation of canine tail language for human-canine interaction in the case of persons with severe disabilities. Canine tail language is captured via two 3-axis accelerometers. Directions and frequencies are selected as our features of interests. The novel fuzzy rules based on Gaussian-Trapezoidal model and center of gravity (COG)-based defuzzification method are proposed in order to interpret the features into four canine emotional behaviors, i.e., agitate, happy, scare and neutral as well as its blended emotional behaviors. The emotional behavior model is performed in the simulated dog and has also been evaluated in the real dog with the perfect recognition rate.

Keywords: Animal-assisted therapy (AAT), Persons with disabilities, Canine tail language, Fuzzy emotional behavior model

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2017
440 Automatic Detection of Suicidal Behaviors Using an RGB-D Camera: Azure Kinect

Authors: Maha Jazouli

Abstract:

Suicide is one of the leading causes of death among prisoners, both in Canada and internationally. In recent years, rates of attempts of suicide and self-harm suicide have increased, with hangings being the most frequently used method. The objective of this article is to propose a method to automatically detect suicidal behaviors in real time. We present a gesture recognition system that consists of three modules: model-based movement tracking, feature extraction, and gesture recognition using machine learning algorithms (MLA). Tests show that the proposed system gives satisfactory results. This smart video surveillance system can help assist staff responsible for the safety and health of inmates by alerting them when suicidal behavior is detected, which helps reduce mortality rates and save lives.

Keywords: Suicide detection, Kinect Azure, RGB-D camera, SVM, gesture recognition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 449
439 Human Behavior Modeling in Video Surveillance of Conference Halls

Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini

Abstract:

In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.

Keywords: Activity modeling, clustering, PLSA, video representation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 842
438 A Blueprint for an Educational Trajectory: The Power of Discourse in Constructing “Naughty” and “Adorable” Kindergarten Students

Authors: Fernanda T. Orsati, Julie Causton

Abstract:

Discursive practices enacted by educators in kindergarten create a blueprint for how the educational trajectories of students with disabilities are constructed. This two-year ethnographic case study critically examines educators’ relationships with students considered to present challenging behaviors in one kindergarten classroom located in a predominantly White middle class school district in the Northeast of the United States. Focusing on the language and practices used by one special education teacher and three teaching assistants, this paper analyzes how teacher responses to students’ behaviors constructs and positions students over one year of kindergarten education. Using a critical discourse analysis it shows that educators understand students’ behaviors as deficit and needing consequences. This study highlights how educators’ responses reflect students' individual characteristics including family background, socioeconomics and ability status. This paper offers in depth analysis of two students’ stories, which evidenced that the language used by educators amplifies the social positioning of students within the classroom and creates a foundation for who they are constructed to be. Through exploring routine language and practices, this paper demonstrates that educators outlined a blueprint of kindergartners, which positioned students as learners in ways that became the ground for either a limited or a promising educational pathway for them.

Keywords: Behavior, early education, special education, critical discourse analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1557
437 The Effect of Pilates Method in Scholar’s Trunk Strength and Hamstring Flexibility: Gender Differences

Authors: Noelia González-Gálvez, María Carrasco Poyatos, Pablo Jorge Marcos Pardo, Yuri Feito

Abstract:

Musculoskeletal injuries in school children could be reduced improving trunk strength and hamstring flexibility. Low levels of trunk muscle strength and hamstring flexibility may result in acute and musculoskeletal chronic diseases. The Pilates Method can be appropriate to improve these physical condition attributes and has been rarely employed by this social group. On the other hand, it has been shown that trunk strength and flexibility are different between genders, but there is no evidence about the effect of exercise programs designed to improve both items in school children. Therefore the objective of this study was to measure the effect of a six-week Pilates-based exercise program in 14 year old school children trunk strength and hamstring flexibility, establishing differences in gender. The sample was composed of 57 students divided into experimental group (EG; n=30) and control group (CG; n=27). Bench Trunk Curl test (BTC), Sörensen test and Toe-touch test (TT) were used to measure dynamic muscular resistance in trunk flexion, isometric strength in trunk extension and hamstring flexibility, respectively. EG utilized the Pilates exercise program during six-weeks (2 days/week, 55minutes/session). After this period of training, EG improved trunk strength and hamstring flexibility significantly but there were no significant differences within CG. Although boys were better in BTC test and girls were better in TT test, there were no significant differences between them.

Keywords: Teens, school, trunk muscular resistance, intervention, physical performance, abdominal, back.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2525
436 Violent Videogame Playing and Its Relations to Antisocial Behaviors

Authors: Martin Jelínek, Petr Květon

Abstract:

The presented study focuses on relations between violent videogames playing and various types of antisocial behavior, namely bullying (verbal, indirect, and physical), physical aggression and delinquency. Relevant relationships were also examined with respect to gender. Violent videogames exposure (VGV) was measured by respondents’ most favored games and self-evaluation of its level of violence and frequency of playing. Antisocial behaviors were assessed by self-report questionnaires. The research sample consisted of 333 (166 males, 167 females) primary and secondary school students at the age between 10 and 19 years (m=14.98, sd=1.77). It was found that violent videogames playing is associated with physical aggression (rho=0.288, 95% CI [0.169;0.400]) and bullying (rho=0.369, 95% CI [0.254;0.476]). By means of gender, these relations were slightly weaker in males (VGV - physical aggression: rho=0.104, 95% CI [-0.061;0.264], VGV – bullying: rho=.200, 95% CI [0.032;0.356]) than in females (VGV - physical aggression: rho=0.257, 95% CI [0.089;0.411], VGV – bullying: rho=0.279, 95% CI [0.110;0.432]).

Keywords: Aggression, bullying, gender, violent videogames.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3258
435 Design of Smart Urban Lighting by Using Social Sustainability Approach

Authors: Mohsen Noroozi, Maryam Khalili

Abstract:

Creating cities, objects and spaces that are economically, environmentally and socially sustainable and which meet the challenge of social interaction and generation change will be one of the biggest tasks of designers. Social sustainability is about how individuals, communities and societies live with each other and set out to achieve the objectives of development model which they have chosen for themselves. Urban lightning as one of the most important elements of urban furniture that people constantly interact with it in public spaces; can be a significant object for designers. Using intelligence by internet of things for urban lighting makes it more interactive in public environments. It can encourage individuals to carry out appropriate behaviors and provides them the social awareness through new interactions. The greatest strength of this technology is its strong impact on many aspects of everyday life and users' behaviors. The analytical phase of the research is based on a multiple method survey strategy. Smart lighting proposed in this paper is an urban lighting designed on results obtained from a collective point of view about the social sustainability. In this paper, referring to behavioral design methods, the social behaviors of the people has been studied. Data show that people demands for a deeper experience of social participation, safety perception and energy saving with the meaningful use of interactive and colourful lighting effects. By using intelligent technology, some suggestions are provided in the field of future lighting to consider the new forms of social sustainability.

Keywords: Behavior model, internet of things, social sustainability, urban lighting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 928
434 Evaluation of Stent Performances using FEA considering a Realistic Balloon Expansion

Authors: Won-Pil Park, Seung-Kwan Cho, Jai-Young Ko, Anders Kristensson, S.T.S. Al-Hassani, Han-Sung Kim, Dohyung Lim

Abstract:

A number of previous studies were rarely considered the effects of transient non-uniform balloon expansion on evaluation of the properties and behaviors of stents during stent expansion, nor did they determine parameters to maximize the performances driven by mechanical characteristics. Therefore, in order to fully understand the mechanical characteristics and behaviors of stent, it is necessary to consider a realistic modeling of transient non-uniform balloon-stent expansion. The aim of the study is to propose design parameters capable of improving the ability of vascular stent through a comparative study of seven commercial stents using finite element analyses of a realistic transient non-uniform balloon-stent expansion process. In this study, seven representative commercialized stents were evaluated by finite element (FE) analysis in terms of the criteria based on the itemized list of Food and Drug Administration (FDA) and European Standards (prEN). The results indicate that using stents composed of opened unit cells connected by bend-shaped link structures and controlling the geometrical and morphological features of the unit cell strut or the link structure at the distal ends of stent may improve mechanical characteristics of stent. This study provides a better method at the realistic transient non-uniform balloon-stent expansion by investigating the characteristics, behaviors, and parameters capable of improving the ability of vascular stent.

Keywords: Finite Element Analysis, Mechanical Characteristic, Transient Non-uniform Balloon-Stent Expansion, Vascular Stent.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1801
433 Learning Process Enhancement for Robot Behaviors

Authors: Saeed Mohammed Baneamoon, Rosalina Abdul Salam, Abdullah Zawawi Hj. Talib

Abstract:

Designing a simulated system and training it to optimize its tasks in simulated environment helps the designers to avoid problems that may appear when designing the system directly in real world. These problems are: time consuming, high cost, high errors percentage and low efficiency and accuracy of the system. The proposed system will investigate and improve the efficiency and accuracy of a simulated robot to choose correct behavior to perform its task. In this paper, machine learning, which uses genetic algorithm, is adopted. This type of machine learning is called genetic-based machine learning in which a distributed classifier system is used to improve the efficiency and accuracy of the robot. Consequently, it helps the robot to achieve optimal action.

Keywords: Machine Learning, Genetic-Based MachineLearning, Learning Classifier System, Behaviors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1529
432 A Consideration on the Offset Frontal Impact Modeling Using Spring-Mass Model

Authors: Jaemoon Lim

Abstract:

To construct the lumped spring-mass model considering the occupants for the offset frontal crash, the SISAME software and the NHTSA test data were used. The data on 56 kph 40% offset frontal vehicle to deformable barrier crash test of a MY2007 Mazda 6 4-door sedan were obtained from NHTSA test database. The overall behaviors of B-pillar and engine of simulation models agreed very well with the test data. The trends of accelerations at the driver and passenger head were similar but big differences in peak values. The differences of peak values caused the large errors of the HIC36 and 3 ms chest g’s. To predict well the behaviors of dummies, the spring-mass model for the offset frontal crash needs to be improved.

Keywords: Chest g’s, HIC36, lumped spring-mass model, offset frontal impact, SISAME.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2668
431 Wear Behaviors of B4C and SiC Particle Reinforced AZ91 Magnesium Matrix Metal Composites

Authors: M. E. Turan, H. Zengin, E. Cevik, Y. Sun, Y. Turen, H. Ahlatci

Abstract:

In this study, the effects of B4C and SiC particle reinforcements on wear properties of magnesium matrix metal composites produced by pressure infiltration method were investigated. AZ91 (9%Al-1%Zn) magnesium alloy was used as a matrix. AZ91 magnesium alloy was melted under an argon atmosphere. The melt was infiltrated to the particles with an appropriate pressure. Wear tests, hardness tests were performed respectively. Microstructure characterizations were examined by light optical (LOM) and scanning electron microscope (SEM). The results showed that uniform particle distributions were achieved in both B4C and SiC reinforced composites. Wear behaviors of magnesium matrix metal composites changed as a function of type of particles. SiC reinforced composite has better wear performance and higher hardness than B4C reinforced composite.

Keywords: Magnesium matrix composite, pressure infiltration, SEM, wear.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1686
430 Examination of the Mediating Role of Leader-Member Exchange on the Association between Transformational Leadership and Innovative Behavior: A Study in Turkish Technological Organizations

Authors: Gultekin Gurcay

Abstract:

The objective of this study was to examine the relationship between transformational leadership and innovative work behavior and to evaluate the mediating role of leader-member exchange relationships (LMX) on the assumed relationship. This study has focused on the suggestion that LMX might emerge through transformational leadership behaviors and thus could mediate the relationship between transformational leadership and innovative behavior. A cross-sectional survey research has been conducted on the relationship these leadership approaches and their impact on organizational HRM-outcomes have been conducted on two organizations operating in the technical sector in Istanbul-Turkey. The results of the research have supported the hypotheses. Transformational leadership was positively related to the innovative behaviors and LMX emerged to mediate that relationship.

Keywords: Innovative leadership, Leader- Member Exchange, Transformational leadership, Turkey.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1855
429 Freedom with Limitations: The Nature of Free Expression in the European Case-Law

Authors: Laszlo Vari

Abstract:

In the digital age, the spread of the mobile world and the nature of the cyberspace, offers many new opportunities for the prevalence of the fundamental right to free expression, and therefore, for free speech and freedom of the press; however, these new information communication technologies carry many new challenges. Defamation, censorship, fake news, misleading information, hate speech, breach of copyright etc., are only some of the violations, all of which can be derived from the harmful exercise of freedom of expression, all which become more salient in the internet. Here raises the question: how can we eliminate these problems, and practice our fundamental freedom rightfully? To answer this question, we should understand the elements and the characteristic of the nature of freedom of expression, and the role of the actors whose duties and responsibilities are crucial in the prevalence of this fundamental freedom. To achieve this goal, this paper will explore the European practice to understand instructions found in the case-law of the European Court of Human rights for the rightful exercise of freedom of expression.

Keywords: Collision of rights, European case-law, freedom opinion and expression, media law, freedom of information, online expression

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 929
428 A Construction Management Tool: Determining a Project Schedule Typical Behaviors Using Cluster Analysis

Authors: Natalia Rudeli, Elisabeth Viles, Adrian Santilli

Abstract:

Delays in the construction industry are a global phenomenon. Many construction projects experience extensive delays exceeding the initially estimated completion time. The main purpose of this study is to identify construction projects typical behaviors in order to develop a prognosis and management tool. Being able to know a construction projects schedule tendency will enable evidence-based decision-making to allow resolutions to be made before delays occur. This study presents an innovative approach that uses Cluster Analysis Method to support predictions during Earned Value Analyses. A clustering analysis was used to predict future scheduling, Earned Value Management (EVM), and Earned Schedule (ES) principal Indexes behaviors in construction projects. The analysis was made using a database with 90 different construction projects. It was validated with additional data extracted from literature and with another 15 contrasting projects. For all projects, planned and executed schedules were collected and the EVM and ES principal indexes were calculated. A complete linkage classification method was used. In this way, the cluster analysis made considers that the distance (or similarity) between two clusters must be measured by its most disparate elements, i.e. that the distance is given by the maximum span among its components. Finally, through the use of EVM and ES Indexes and Tukey and Fisher Pairwise Comparisons, the statistical dissimilarity was verified and four clusters were obtained. It can be said that construction projects show an average delay of 35% of its planned completion time. Furthermore, four typical behaviors were found and for each of the obtained clusters, the interim milestones and the necessary rhythms of construction were identified. In general, detected typical behaviors are: (1) Projects that perform a 5% of work advance in the first two tenths and maintain a constant rhythm until completion (greater than 10% for each remaining tenth), being able to finish on the initially estimated time. (2) Projects that start with an adequate construction rate but suffer minor delays culminating with a total delay of almost 27% of the planned time. (3) Projects which start with a performance below the planned rate and end up with an average delay of 64%, and (4) projects that begin with a poor performance, suffer great delays and end up with an average delay of a 120% of the planned completion time. The obtained clusters compose a tool to identify the behavior of new construction projects by comparing their current work performance to the validated database, thus allowing the correction of initial estimations towards more accurate completion schedules.

Keywords: Cluster analysis, construction management, earned value, schedule.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1200
427 Map UI Design of IoT Application Based on Passenger Evacuation Behaviors in Underground Station

Authors: Meng-Cong Zheng

Abstract:

When the public space is in an emergency, how to quickly establish spatial cognition and emergency shelter in the closed underground space is the urgent task. This study takes Taipei Station as the research base and aims to apply the use of Internet of things (IoT) application for underground evacuation mobility design. The first experiment identified passengers' evacuation behaviors and spatial cognition in underground spaces by wayfinding tasks and thinking aloud, then defined the design conditions of User Interface (UI) and proposed the UI design.  The second experiment evaluated the UI design based on passengers' evacuation behaviors by wayfinding tasks and think aloud again as same as the first experiment. The first experiment found that the design conditions that the subjects were most concerned about were "map" and hoping to learn the relative position of themselves with other landmarks by the map and watch the overall route. "Position" needs to be accurately labeled to determine the location in underground space. Each step of the escape instructions should be presented clearly in "navigation bar." The "message bar" should be informed of the next or final target exit. In the second experiment with the UI design, we found that the "spatial map" distinguishing between walking and non-walking areas with shades of color is useful. The addition of 2.5D maps of the UI design increased the user's perception of space. Amending the color of the corner diagram in the "escape route" also reduces the confusion between the symbol and other diagrams. The larger volume of toilets and elevators can be a judgment of users' relative location in "Hardware facilities." Fire extinguisher icon should be highlighted. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. "Fire point tips" of the UI design indicated fire with a graphical fireball can convey precise information to the escaped person. However, "Compass and return to present location" are less used in underground space.

Keywords: Evacuation behaviors, IoT application, map UI design, underground station.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 741
426 U.S. Supreme Court Decision Making in the Area of Religion, 1987-2011

Authors: Joseph Ignagni, Rebecca E. Deen

Abstract:

There are many views on how human decision makers behave. In this work, the Justices of the United States Supreme Court will be viewed in terms of constrained maximization and cognitivecybernetic theory. This paper will integrate research in such fields as law, political science, psychology, economics and decision making theory. It will be argued that due to its heavy workload, the Supreme Court is forced to make decisions in a boundedly rational manner. The ideas and theory put forward here will be tested in the area of the Court’s decisions involving religion. Therefore, the cases involving the U.S. Constitution’s Free Exercise Clause and Establishment Clause will be analyzed. Also, variables such as the U.S. government’s involvement in these cases will be considered. The years to be studied will be 1987-2011.

Keywords: Establishment Clause, Free Exercise Clause, U.S. Constitution, U.S. Supreme Court.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1564
425 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Mobile ad hoc network, MANET, intrusion detection system, back propagation algorithm, neural networks, traffic table, multilayer perceptron, feed-forward back-propagation, network simulator 2.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 928
424 Impact of Behavioral Aspects of Autism on Cognitive Abilities in Children with Autism Spectrum Disorder

Authors: Rana M. Zeina, Laila AL-Ayadhi, Shahid Bashir

Abstract:

Cognitive symptoms and behavioral symptoms may, in fact, overlap and be related to the level of the general cognitive function. We have measured the behavioral aspects of autism and its correlation to the cognitive ability in 30 children with ASD. We used a neuropsychological Battery CANTAB eclipse to evaluate the ASD children's cognitive ability. Individuals with ASD and challenging behaviors showed significant correlation between some cognitive abilities and Motor aspects. Based on these findings, we can conclude that the motor behavioral problems in autism affect specific cognitive abilities in ASDs such as comprehension, learning, reversal, acquisition, attention set shifting, and speed of reaction to one stimulus. Future researches should also focus on the relationship between motor stereotypes and other subtypes of repetitive behaviors, such as verbal stereotypes, ritual routine adherence, and the use of different types of CANTAB tests.

Keywords: Autism, Cognitive ability, Motor Behavior, and Neuropsychological battery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2136
423 Investigation of Rehabilitation Effects on Fire Damaged High Strength Concrete Beams

Authors: Eun Mi Ryu, Ah Young An, Ji Yeon Kang, Yeong Soo Shin, Hee Sun Kim

Abstract:

When high strength reinforced concrete is exposed to high temperature due to a fire, deteriorations occur such as loss in strength and elastic modulus, cracking and spalling of the concrete. Therefore, it is important to understand risk of structural safety in building structures by studying structural behaviors and rehabilitation of fire damaged high strength concrete structures. This paper aims at investigating rehabilitation effect on fire damaged high strength concrete beams using experimental and analytical methods. In the experiments, flexural specimens with high strength concrete are exposed to high temperatures according to ISO 834 standard time temperature curve. From four-point loading test, results show that maximum loads of the rehabilitated beams are similar to or higher than those of the non-fire damaged RC beam. In addition, structural analyses are performed using ABAQUS 6.10-3 with same conditions as experiments to provide accurate predictions on structural and mechanical behaviors of rehabilitated RC beams. The parameters are the fire cover thickness and strengths of repairing mortar. Analytical results show good rehabilitation effects, when the results predicted from the rehabilitated models are compared to structural behaviors of the non-damaged RC beams. In this study, fire damaged high strength concrete beams are rehabilitated using polymeric cement mortar. The predictions from the finite element (FE) models show good agreements with the experimental results and the modeling approaches can be used to investigate applicability of various rehabilitation methods for further study.

Keywords: Fire, High strength concrete, Rehabilitation, Reinforced concrete beam.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2375
422 Elasto-Visco-Plastic-Damage Model for Pre-Strained 304L Stainless Steel Subjected to Low Temperature

Authors: Jeong-Hyeon Kim, Ki-Yeob Kang, Myung-Hyun Kim, Jae-Myung Lee

Abstract:

Primary barrier of membrane type LNG containment system consist of corrugated 304L stainless steel. This 304L stainless steel is austenitic stainless steel which shows different material behaviors owing to phase transformation during the plastic work. Even though corrugated primary barriers are subjected to significant amounts of pre-strain due to press working, quantitative mechanical behavior on the effect of pre-straining at cryogenic temperatures are not available. In this study, pre-strain level and pre-strain temperature dependent tensile tests are carried to investigate mechanical behaviors. Also, constitutive equations with material parameters are suggested for a verification study.

Keywords: Constitutive equation, corrugated sheet, pre-strain effect, elasto-visco-plastic-damage model, 304L stainless steel.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1634
421 The Influence of User Involvement and Personal Innovativeness on User Behavior

Authors: Anne M. Sørebø, Øystein Sørebø, Maung K. Sein

Abstract:

The search for factors that influence user behavior has remained an important theme for both the academic and practitioner Information Systems Communities. In this paper we examine relevant user behaviors in the phase after adoption and investigate two factors that are expected to influence such behaviors, namely User Involvement (UI) and Personal Innovativeness in IT (PIIT). We conduct a field study to examine how these factors influence postadoption behavior and how they are interrelated. Building on theoretical premises and prior empirical findings, we propose and test two alternative models of the relationship between these factors. Our results reveal that the best explanation of post-adoption behavior is provided by the model where UI and PIIT independently influence post-adoption behavior. Our findings have important implications for research and practice. To that end, we offer directions for future research.

Keywords: User involvement, personal innovativeness in IT, use of systems, user support, post-adoption behavior.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1555
420 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chiawchan

Abstract:

This study found that most corporate personnel are using social media to communicate with colleagues to make the process of working more efficient. Complete satisfaction occurred on the use of security within the University’s computer network. The social network usage for communication, collaboration, entertainment and demonstrating concerns accounted for fifty percent of variance to predict interpersonal relationships of corporate personnel. This evaluation on the effectiveness of social networking involved 213 corporate personnel’s. The data was collected by questionnaires. This data was analyzed by using percentage, mean, and standard deviation. The results from the analysis and the effectiveness of using online social networks were derived from the attitude of private users and safety data within the security system. The results showed that the effectiveness on the use of an online social network for corporate personnel of Suan Sunandha Rajabhat University was specifically at a good level, and the overall effects of each aspect was (Ẋ=3.11).

Keywords: Behaviors, Social Media, Social Network.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1394
419 Server Virtualization Using User Behavior Model Focus on Provisioning Concept

Authors: D. Prangchumpol

Abstract:

Server provisioning is one of the most attractive topics in virtualization systems. Virtualization is a method of running multiple independent virtual operating systems on a single physical computer. It is a way of maximizing physical resources to maximize the investment in hardware. Additionally, it can help to consolidate servers, improve hardware utilization and reduce the consumption of power and physical space in the data center. However, management of heterogeneous workloads, especially for resource utilization of the server, or so called provisioning becomes a challenge. In this paper, a new concept for managing workloads based on user behavior is presented. The experimental results show that user behaviors are different in each type of service workload and time. Understanding user behaviors may improve the efficiency of management in provisioning concept. This preliminary study may be an approach to improve management of data centers running heterogeneous workloads for provisioning in virtualization system.

Keywords: association rule, provisioning, server virtualization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1722
418 FITTER - A Framework for Integrating Activity Tracking Technologies into Electric Recreation for Children and Adolescents

Authors: R. Altamimi, G. Skinner, K. Nesbitt

Abstract:

Encouraging physical activity amongst children and adolescents is becoming an increasingly relevant issue in modern society. Studies have shown that involving children and adolescents in physical activity is essential for their physical, mental and social development. However, with technology playing an increasingly important role in reducing physical work it is becoming more critical to incorporate adequate physical activities into our lives. One way to overcome this problem is to harness technology so that it promotes physical activities, for example, by motivating children and adolescents to exercise more. This paper describes a promising solution to the question of how to increase levels of physical activity in children and adolescents by combining gaming technologies with exercise tracking goals. This research describes a framework called FITTER (Framework for Integrating activity Tracking Technologies for Electronic Recreation) that combines video game play with more traditional, non-computer physical activities.

Keywords: Exergames, Home-based eHealth, Human-computer Interaction, Natural User Interfaces, Wearable Health Informatics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2446
417 Software Evolution Based Sequence Diagrams Merging

Authors: Zine-Eddine Bouras, Abdelouaheb Talai

Abstract:

The need to merge software artifacts seems inherent to modern software development. Distribution of development over several teams and breaking tasks into smaller, more manageable pieces are an effective means to deal with the kind of complexity. In each case, the separately developed artifacts need to be assembled as efficiently as possible into a consistent whole in which the parts still function as described. In addition, earlier changes are introduced into the life cycle and easier is their management by designers. Interaction-based specifications such as UML sequence diagrams have been found effective in this regard. As a result, sequence diagrams can be used not only for capturing system behaviors but also for merging changes in order to create a new version. The objective of this paper is to suggest a new approach to deal with the problem of software merging at the level of sequence diagrams by using the concept of dependence analysis that captures, formally, all mapping, and differences between elements of sequence diagrams and serves as a key concept to create a new version of sequence diagram.

Keywords: System behaviors, sequence diagram merging, dependence analysis, sequence diagram slicing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1762
416 Effect of Aging on the Second Law Efficiency, Exergy Destruction and Entropy Generation in the Skeletal Muscles during Exercise

Authors: Jale Çatak, Bayram Yılmaz, Mustafa Ozilgen

Abstract:

The second law muscle work efficiency is obtained by multiplying the metabolic and mechanical work efficiencies. Thermodynamic analyses are carried out with 19 sets of arms and legs exercise data which were obtained from the healthy young people. These data are used to simulate the changes occurring during aging. The muscle work efficiency decreases with aging as a result of the reduction of the metabolic energy generation in the mitochondria. The reduction of the mitochondrial energy efficiency makes it difficult to carry out the maintenance of the muscle tissue, which in turn causes a decline of the muscle work efficiency. When the muscle attempts to produce more work, entropy generation and exergy destruction increase. Increasing exergy destruction may be regarded as the result of the deterioration of the muscles. When the exergetic efficiency is 0.42, exergy destruction becomes 1.49 folds of the work performance. This proportionality becomes 2.50 and 5.21 folds when the exergetic efficiency decreases to 0.30 and 0.17 respectively.

Keywords: Aging mitochondria, entropy generation, exergy destruction, muscle work performance, second law efficiency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1378
415 Summarizing Data Sets for Data Mining by Using Statistical Methods in Coastal Engineering

Authors: Yunus Doğan, Ahmet Durap

Abstract:

Coastal regions are the one of the most commonly used places by the natural balance and the growing population. In coastal engineering, the most valuable data is wave behaviors. The amount of this data becomes very big because of observations that take place for periods of hours, days and months. In this study, some statistical methods such as the wave spectrum analysis methods and the standard statistical methods have been used. The goal of this study is the discovery profiles of the different coast areas by using these statistical methods, and thus, obtaining an instance based data set from the big data to analysis by using data mining algorithms. In the experimental studies, the six sample data sets about the wave behaviors obtained by 20 minutes of observations from Mersin Bay in Turkey and converted to an instance based form, while different clustering techniques in data mining algorithms were used to discover similar coastal places. Moreover, this study discusses that this summarization approach can be used in other branches collecting big data such as medicine.

Keywords: Clustering algorithms, coastal engineering, data mining, data summarization, statistical methods.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1244
414 Numerical Simulation of Thermo-Fluid Behavior in Wavy Microchannel Used in Microelectronic Devices

Authors: A. Balabel, A. F. Khadrawi, Ali S. Al-Osaimy

Abstract:

The hydrodynamic and thermal behaviors of fluid flow in wavy microchannel are investigated numerically. Effects of Reynolds number on the hydrodynamics and thermal behaviors are investigated. Three cases of Reynolds number (580, 1244, and 1910) are adopted in this study. It is found that the separation zone begin appears when Reynolds number is greater than 1910 at the endsection of the wave. Also it is found that dimensionless maximum velocity at the mid-section of the wave decreases and becomes as a turbulent behavior as Reynolds numbers increases. The maximum temperature at the center line at the mid-section of the wave increases as Reynolds number increases until it reaches the turbulent behavior when Reynolds number is equal or greater than 1244, while this behavior will be achieved at very high velocities at the end section of the wave.

Keywords: Thermo-Fluid Behavior, Microelectronic Devices, Numerical Simulation, Wavy Microchannel.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1355