Search results for: Evaluation Framework
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3546

Search results for: Evaluation Framework

2256 Social Media as a Tool for Political Communication: A Case Study of India

Authors: Srikanth Bade

Abstract:

This paper discusses how the usage of social media has altered certain discourses and communicated with the political institutions for major actions in Indian scenario. The advent of new technology in the form of social media has engrossed the general public to discuss in the open forum. How they promulgated their ideas into action is captured in this study. Moreover, these discourses happening in the social media is analyzed from certain philosophical traditions by adopting a framework. Hence, this paper analyses the role of social media in political communication and change the political discourse. Also, this paper tries to address the issue that whether the deliberation made through social media had indeed communicated the issue of political matters to the decision making authorities.

Keywords: Collective action and social capital, political communication, political discourse, social media.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1417
2255 Managing the Information System Life Cycle in Construction and Manufacturing

Authors: Carlos J. Costa, Manuela Aparício

Abstract:

In this paper we present the information life cycle and analyze the importance of managing the corporate application portfolio across this life cycle. The approach presented here corresponds not just to the extension of the traditional information system development life cycle. This approach is based in the generic life cycle. In this paper it is proposed a model of an information system life cycle, supported in the assumption that a system has a limited life. But, this limited life may be extended. This model is also applied in several cases; being reported here two examples of the framework application in a construction enterprise and in a manufacturing enterprise.

Keywords: Information systems/technology, information systems life cycle, organization engineering, information economics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1790
2254 Evaluation of Droplet Sizes from Video Images for Metal Working Fluids

Authors: R. Hacıoğlu, A. Genç, B. Bakırcı

Abstract:

Metal working fluids were used in the preparation of oil in water emulsions. The size of oil droplets were evaluated by using the analysis of video images taken from the zeta potential measurements. The evaluated size distributions for emulsions were also tested by microscopic analysis. In addition, emulsion stabilities were discussed depending on electrolyte concentration and pH. The results showed that the stability of oil emulsions was strongly related to pH and the concentration of CaCl2. However, the same dependency was not observed for NaCl.

Keywords: Droplet size distribution, emulsion stability, o/w emulsions, video images.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1811
2253 Perceptual Framework for a Modern Left-Turn Collision Warning System

Authors: E. Dabbour, S. M. Easa

Abstract:

Most of the collision warning systems currently available in the automotive market are mainly designed to warn against imminent rear-end and lane-changing collisions. No collision warning system is commercially available to warn against imminent turning collisions at intersections, especially for left-turn collisions when a driver attempts to make a left-turn at either a signalized or non-signalized intersection, conflicting with the path of other approaching vehicles traveling on the opposite-direction traffic stream. One of the major factors that lead to left-turn collisions is the human error and misjudgment of the driver of the turning vehicle when perceiving the speed and acceleration of other vehicles traveling on the opposite-direction traffic stream; therefore, using a properly-designed collision warning system will likely reduce, or even eliminate, this type of collisions by reducing human error. This paper introduces perceptual framework for a proposed collision warning system that can detect imminent left-turn collisions at intersections. The system utilizes a commercially-available detection sensor (either a radar sensor or a laser detector) to detect approaching vehicles traveling on the opposite-direction traffic stream and calculate their speeds and acceleration rates to estimate the time-tocollision and compare that time to the time required for the turning vehicle to clear the intersection. When calculating the time required for the turning vehicle to clear the intersection, consideration is given to the perception-reaction time of the driver of the turning vehicle, which is the time required by the driver to perceive the message given by the warning system and react to it by engaging the throttle. A regression model was developed to estimate perception-reaction time based on age and gender of the driver of the host vehicle. Desired acceleration rate selected by the driver of the turning vehicle, when making the left-turn movement, is another human factor that is considered by the system. Another regression model was developed to estimate the acceleration rate selected by the driver of the turning vehicle based on driver-s age and gender as well as on the location and speed of the nearest approaching vehicle along with the maximum acceleration rate provided by the mechanical characteristics of the turning vehicle. By comparing time-to-collision with the time required for the turning vehicle to clear the intersection, the system displays a message to the driver of the turning vehicle when departure is safe. An application example is provided to illustrate the logic algorithm of the proposed system.

Keywords: Collision warning systems, intelligent transportationsystems, vehicle safety.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2031
2252 Wireless Neural Stimulator with Adjustable Electrical Quantity

Authors: Young-Seok Choi

Abstract:

The neural stimulation has been gaining much interest in neuromodulation research and clinical trials. For efficiency, there is a need for variable electrical stimulation such as current and voltage stimuli as well as wireless framework. In this regard, we develop the wireless neural stimulator capable of voltage and current stimuli. The system consists of ZigBee which is a wireless communication module and stimulus generator. The stimulus generator with 8-bits resolution enable both mono-polar and bi-polar waveform in voltage (-3.3~3.3V) and current(-330~330µA) stimulus mode which is controllable. The experimental results suggest that the proposed neural stimulator can play a role as an effective approach for neuromodulation.

Keywords: Neural stimulator, current stimulation, voltage stimulation, neuromodulation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2152
2251 Performance Evaluation of Routing Protocols For High Density Ad Hoc Networks based on Qos by GlomoSim Simulator

Authors: E. Ahvar, M. Fathy

Abstract:

Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR) , Ad Hoc On-Demand Distance Vector Routing (AODV), location-aided routing(LAR1).The performance differentials are analyzed using varying network load, mobility, and network size. We simulate protocols with GLOMOSIM simulator. Based on the observations, we make recommendations about when the performance of either protocol can be best.

Keywords: Ad hoc Network , Glomosim , routing protocols.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1588
2250 VoIP Networks Performance Analysis with Encryption Systems

Authors: Edward Paul Guillen, Diego Alejandro Chacon

Abstract:

The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures with multiple protocols, codecs, software and hardware–based distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This paper analyzes the VoIP throughput and the QoS parameters with different commercial encryption methods. The measurement–based approach uses lab scenarios to simulate LAN and WAN environments. Security mechanisms such as TLS, SIAX2, SRTP, IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.

Keywords: VoIP, Secure VoIP, Throughput Analysis, VoIP QoS evaluation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2877
2249 The Role of the State Budget: An Evaluation of Public Expenditures and Taxes in Turkey

Authors: Erdal Eroğlu, Özhan Çetinkaya

Abstract:

The purpose of this paper is to show how state plays a regulatory role in the relations of distribution by analyzing tax and expenditure in Turkey. This paper has two main arguments. First, state intervenes in economic and social life via budget policies and steers the relations of distribution within the scope of the reproduction of the capital accumulation and legitimacy. Secondly, a great amount of public expenditure benefits capital owners while state gains its tax income mainly from low and middle income groups.

Keywords: Distribution, public expenditure, state budget, taxes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1289
2248 Evaluation of a Surrogate Based Method for Global Optimization

Authors: David Lindström

Abstract:

We evaluate the performance of a numerical method for global optimization of expensive functions. The method is using a response surface to guide the search for the global optimum. This metamodel could be based on radial basis functions, kriging, or a combination of different models. We discuss how to set the cyclic parameters of the optimization method to get a balance between local and global search. We also discuss the eventual problem with Runge oscillations in the response surface.

Keywords: Expensive function, infill sampling criterion, kriging, global optimization, response surface, Runge phenomenon.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2356
2247 Enhanced Traveling Salesman Problem Solving by Genetic Algorithm Technique (TSPGA)

Authors: Buthainah Fahran Al-Dulaimi, Hamza A. Ali

Abstract:

The well known NP-complete problem of the Traveling Salesman Problem (TSP) is coded in genetic form. A software system is proposed to determine the optimum route for a Traveling Salesman Problem using Genetic Algorithm technique. The system starts from a matrix of the calculated Euclidean distances between the cities to be visited by the traveling salesman and a randomly chosen city order as the initial population. Then new generations are then created repeatedly until the proper path is reached upon reaching a stopping criterion. This search is guided by a solution evaluation function.

Keywords: Genetic algorithms, traveling salesman problem solving, optimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2530
2246 A Review on the Outlook of the Circular Economy in the Automotive Industry

Authors: A. Buruzs, A. Torma

Abstract:

The relationship of the automotive industry with raw material supply is a major challenge and presents obstacles. Automobiles are ones of the most complex products using a large variety of materials. Safety, eco-friendliness and comfort requirements, physical, chemical and economic limitations set the framework in which this industry continuously optimizes the efficient and responsible use of resources. The concept of circular economy covers the issues of waste generation, resource scarcity and economic advantages. However, circularity is already known for the automobile industry – several efforts are done to foster material reuse, product remanufacturing and recycling. The aim of this study is to give an overview on how the producers comply with the growing demands on one hand, and gain efficiency and increase profitability on the other hand from circular economy.

Keywords: Automotive industry, circular economy, international requirements, natural resources.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3944
2245 Using Perspective Schemata to Model the ETL Process

Authors: Valeria M. Pequeno, Joao Carlos G. M. Pires

Abstract:

Data Warehouses (DWs) are repositories which contain the unified history of an enterprise for decision support. The data must be Extracted from information sources, Transformed and integrated to be Loaded (ETL) into the DW, using ETL tools. These tools focus on data movement, where the models are only used as a means to this aim. Under a conceptual viewpoint, the authors want to innovate the ETL process in two ways: 1) to make clear compatibility between models in a declarative fashion, using correspondence assertions and 2) to identify the instances of different sources that represent the same entity in the real-world. This paper presents the overview of the proposed framework to model the ETL process, which is based on the use of a reference model and perspective schemata. This approach provides the designer with a better understanding of the semantic associated with the ETL process.

Keywords: conceptual data model, correspondence assertions, data warehouse, data integration, ETL process, object relational database.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1485
2244 Development of an Elastic Functionally Graded Interphase Model for the Micromechanics Response of Composites

Authors: Trevor Sabiston, Mohsen Mohammadi, Mohammed Cherkaoui, Kaan Inal

Abstract:

A new micromechanics framework is developed for long fibre reinforced composites using a single fibre surrounded by a functionally graded interphase and matrix as a representative unit cell. The unit cell is formulated to represent any number of aligned fibres by a single fibre. Using this model the elastic response of long fibre composites is predicted in all directions. The model is calibrated to experimental results and shows very good agreement in the elastic regime. The differences between the proposed model and existing models are discussed.

Keywords: Computational mechanics, functionally graded interphase, long fibre composites, micromechanics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1800
2243 An Edit-Distance Algorithm to Detect Correlated Attacks in Distributed Systems

Authors: Sule Simsek

Abstract:

Intrusion detection systems (IDS)are crucial components of the security mechanisms of today-s computer systems. Existing research on intrusion detection has focused on sequential intrusions. However, intrusions can also be formed by concurrent interactions of multiple processes. Some of the intrusions caused by these interactions cannot be detected using sequential intrusion detection methods. Therefore, there is a need for a mechanism that views the distributed system as a whole. L-BIDS (Lattice-Based Intrusion Detection System) is proposed to address this problem. In the L-BIDS framework, a library of intrusions and distributed traces are represented as lattices. Then these lattices are compared in order to detect intrusions in the distributed traces.

Keywords: Attack graph, distributed, edit-distance, misuse detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1363
2242 Behavior Evaluation of an Anchored Wall

Authors: Polo G. Yohn Edison, Rocha F. Pedricto

Abstract:

This work presents a study about a retaining structure designed for the duplication of the rail FEPASA on the 74th km between Santos and São Paulo. This structure, an anchored retaining wall, was instrumented in the anchors heads with strain gauges in order to monitor its loads. The load measurements occurred during the performance test, locking and also after the works were concluded. A decrease on anchors loads is noticed at the moment immediately after the locking, during construction and after the works finished. It was observed that a loss of load in the anchors occurred to a maximum of 54%.

Keywords: Anchors, Instrumentation, Retaining wall, Strain gauges.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1668
2241 Strategic Priority of Green ICT Policy in Korea: Applying Analytic Hierarchy Process

Authors: Yong Ho Shim, Ki Youn Kim, Ji Yeon Cho, Jin Kyung Park, Bong Gyou Lee

Abstract:

This study considers priorities of primary goals to increase policy efficiency of Green ICT. Recently several studies have been published that address how IT is linked to climate change. However, most of the previous studies are limited to Green ICT industrial statute and policy directions. This paper present Green ICT policy making processes systematically. As a result of the analysis of Korean Green ICT policy, the following emerged as important to accomplish for Green ICT policy: eco-friendliness, technology evolution, economic efficiency, energy efficiency, and stable supply of energy. This is an initial study analyzing Green ICT policy, which provides an academic framework that can be used a guideline to establish Green ICT policy.

Keywords: AHP(Analytic Hierarchy Process), Case Study, Green ICT, Policy Priority

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2210
2240 Meta-Classification using SVM Classifiers for Text Documents

Authors: Daniel I. Morariu, Lucian N. Vintan, Volker Tresp

Abstract:

Text categorization is the problem of classifying text documents into a set of predefined classes. In this paper, we investigated three approaches to build a meta-classifier in order to increase the classification accuracy. The basic idea is to learn a metaclassifier to optimally select the best component classifier for each data point. The experimental results show that combining classifiers can significantly improve the accuracy of classification and that our meta-classification strategy gives better results than each individual classifier. For 7083 Reuters text documents we obtained a classification accuracies up to 92.04%.

Keywords: Meta-classification, Learning with Kernels, Support Vector Machine, and Performance Evaluation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1590
2239 Svision: Visual Identification of Scanning and Denial of Service Attacks

Authors: Iosif-Viorel Onut, Bin Zhu, Ali A. Ghorbani

Abstract:

We propose a novel graphical technique (SVision) for intrusion detection, which pictures the network as a community of hosts independently roaming in a 3D space defined by the set of services that they use. The aim of SVision is to graphically cluster the hosts into normal and abnormal ones, highlighting only the ones that are considered as a threat to the network. Our experimental results using DARPA 1999 and 2000 intrusion detection and evaluation datasets show the proposed technique as a good candidate for the detection of various threats of the network such as vertical and horizontal scanning, Denial of Service (DoS), and Distributed DoS (DDoS) attacks.

Keywords: Anomaly Visualization, Network Security, Intrusion Detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1685
2238 Some Relationships between Classes of Reverse Watson-Crick Finite Automata

Authors: Kazuki Murakami, Takashige Nakamura, Noriko Sakamoto, Kunio Aizawa

Abstract:

A Watson-Crick automaton is recently introduced as a computational model of DNA computing framework. It works on tapes consisting of double stranded sequences of symbols. Symbols placed on the corresponding cells of the double-stranded sequences are related by a complimentary relation. In this paper, we investigate a variation of Watson-Crick automata in which both heads read the tape in reverse directions. They are called reverse Watson-Crick finite automata (RWKFA). We show that all of following four classes, i.e., simple, 1-limited, all-final, all-final and simple, are equal to non-restricted version of RWKFA.

Keywords: automaton, DNA computing, formal languages, Watson-Crick automaton

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1493
2237 Automated Knowledge Engineering

Authors: Sandeep Chandana, Rene V. Mayorga, Christine W. Chan

Abstract:

This article outlines conceptualization and implementation of an intelligent system capable of extracting knowledge from databases. Use of hybridized features of both the Rough and Fuzzy Set theory render the developed system flexibility in dealing with discreet as well as continuous datasets. A raw data set provided to the system, is initially transformed in a computer legible format followed by pruning of the data set. The refined data set is then processed through various Rough Set operators which enable discovery of parameter relationships and interdependencies. The discovered knowledge is automatically transformed into a rule base expressed in Fuzzy terms. Two exemplary cancer repository datasets (for Breast and Lung Cancer) have been used to test and implement the proposed framework.

Keywords: Knowledge Extraction, Fuzzy Sets, Rough Sets, Neuro–Fuzzy Systems, Databases

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1766
2236 Two Stage Fuzzy Methodology to Evaluate the Credit Risks of Investment Projects

Authors: O. Badagadze, G. Sirbiladze, I. Khutsishvili

Abstract:

The work proposes a decision support methodology for the credit risk minimization in selection of investment projects. The methodology provides two stages of projects’ evaluation. Preliminary selection of projects with minor credit risks is made using the Expertons Method. The second stage makes ranking of chosen projects using the Possibilistic Discrimination Analysis Method. The latter is a new modification of a well-known Method of Fuzzy Discrimination Analysis.

Keywords: Expert valuations, expertons, investment project risks, positive and negative discriminations, possibility distribution.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1724
2235 Searching for an Effective Marketing in the Food Supplement Industry in Japan

Authors: Michiko Miyamoto

Abstract:

The market for "functional foods" and "foods with functional claims" that are effective in maintaining and improving health, has expanded year by year due to the entry of major food and beverage manufacturers following the introduction of the specified health food system in 1991 in Japan. To bring health claims related products or services to the market, it is necessary to let consumers to learn about these products or services; an effective marketing through advertising are important. This research proposes a framework for an effective advertisement medium for the food supplement industry by using survey data of 2,500 people.

Keywords: Functional foods, dietary supplements, marketing strategy, structural equation modeling.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 766
2234 Design of Expert System for Search Allergy and Selection of the Skin Tests using CLIPS

Authors: St. Karagiannis, A. I. Dounis, T. Chalastras, P. Tiropanis, D. Papachristos

Abstract:

This work presents the design of an expert system that aims in the procurement of patient medial background and in the search for suitable skin test selections. Skin testing is the tool used most widely to diagnose allergies. The language of expert systems CLIPS is used as a tool of designing. Finally, we present the evaluation of the proposed expert system which was achieved with the import of certain medical cases and the system produced with suitable successful skin tests.

Keywords: Artificial intelligence, expert system - CLIPS, allergy and skin test.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2804
2233 Selected Technological Factors Influencing the Modulus of Elasticity of Concrete

Authors: Klara Krizova, Rudolf Hela

Abstract:

The topic of the article focuses on the evaluation of selected technological factors and their influence on resulting elasticity modulus of concrete. A series of various factors enter into the manufacturing process which, more or less, influences the elasticity modulus. This paper presents the results of concrete in which the influence of water coefficient and the size of maximum fraction of the aggregate on the static elasticity modulus were monitored. Part of selected results of the long-term programme was discussed in which a wide scope of various variants of proposals for the composition of concretes was evaluated.

Keywords: Mix design, water-cement ratio, aggregate, modulus of elasticity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2919
2232 Method for Concept Labeling Based on Mapping between Ontology and Thesaurus

Authors: Kazuki Sonoda, Masahiro Hori

Abstract:

When designing information systems that deal with large amount of domain knowledge, system designers need to consider ambiguities of labeling termsin domain vocabulary for navigating users in the information space. The goal of this study is to develop a methodology for system designers to label navigation items, taking account of ambiguities stems from synonyms or polysemes of labeling terms. In this paper, we propose a method for concept labeling based on mappings between domain ontology andthesaurus, and report results of an empirical evaluation.

Keywords: Concept Labeling, Ontology, Thesaurus, VocabularyProblem

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1319
2231 Specification of a Model of Honeypot Attack Based On Raised Data

Authors: Souleymane Oumtanaga, Prosper Kimou, Kouadio Gaza Kevin

Abstract:

The security of their network remains the priorities of almost all companies. Existing security systems have shown their limit; thus a new type of security systems was born: honeypots. Honeypots are defined as programs or intended servers which have to attract pirates to study theirs behaviours. It is in this context that the leurre.com project of gathering about twenty platforms was born. This article aims to specify a model of honeypots attack. Our model describes, on a given platform, the evolution of attacks according to theirs hours. Afterward, we show the most attacked services by the studies of attacks on the various ports. It is advisable to note that this article was elaborated within the framework of the research projects on honeyspots within the LABTIC (Laboratory of Information Technologies and Communication).

Keywords: Honeypot, networks, attack, leurrecom, computer network

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1444
2230 Suggestions for the Improvement of the Quality of Public Transportation Service in Campos,Brazil

Authors: D. I. De Souza, G. P. Azevedo, P. Duarte

Abstract:

In this paper the main objective is to analyze the quality of service of the bus companies operating in the city of Campos, located in the state of Rio de Janeiro, Brazil. This analysis, based on the opinion of the bus customers, will help to determine their degree of satisfaction with the service provided by the bus companies. The result of this assessment shows that the bus customers are displeased with the quality of service supplied by the bus companies. Therefore, it is necessary to identify alternative solutions to minimize the consequences of the main problems related to customers- dissatisfaction identified in our evaluation and to help the bus companies operating in Campos better fulfill their riders- needs.

Keywords: PubicTransportation, Quality of Service, Riders'Opinion, Bus Companies

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2481
2229 Dynamic Study on the Evaluation of the Settlement of Soil under Sea Dam

Authors: Faroudja Meziani, Amar Kahil

Abstract:

In order to study the variation in settlement of soil under a dyke dam, the modelisation in our study consists of applying an imposed displacement at the base of the mass of soil (consisting of a saturated sand). The imposed displacement follows the evolution of acceleration of the earthquake of Boumerdes 2003 in Algeria. Moreover, the gravity load is taken into consideration by taking account the specific weight of the materials constituting the dyke. The results obtained show that the gravity loads have a direct influence on the evolution of settlement, especially at the center of the dyke where these loads are higher.

Keywords: Settlement, dynamic analysis, rockfill dam, effect of earthquake, soil dynamics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 756
2228 Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm for Multi Hop Mobile Ad Hoc Networks

Authors: Y. Harold Robinson, E. Golden Julie, S. Balaji

Abstract:

The scheduling based routing scheme is presented in this paper to avoid link failure. The main objective of this system is to introduce a cross-layer protocol framework that integrates routing with priority-based traffic management and distributed transmission scheduling. The reservation scheme is based on ID. The presented scheme guarantees that bandwidth reserved time slot is used by another packet in which end-to-end reservation is achieved. The Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm is presented to allocate channels efficiently. The experimental results show that the presented schemes performed well in various parameters compared to existing methods.

Keywords: Integrated routing, scheduling, MAC layer, IEEE 802.11.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1167
2227 Learning and Teaching in the Panopticon:Ethical and Social Issues in Creating a Virtual Educational Environment

Authors: K. Sheehy, R. Ferguson, G. Clough

Abstract:

This paper examines ethical and social issues which have proved important when initiating and creating educational spaces within a virtual environment. It focuses on one project, identifying the key decisions made, the barriers to new practice encountered and the impact these had on the project. It demonstrates the importance of the 'backstage' ethical and social issues involved in the creation of a virtual education community and offers conclusions, and questions, which will inform future research and practice in this area. These ethical issues are considered using Knobel-s framework of front-end, in-process and back-end concerns, and include establishing social practices for the islands, allocating access rights, considering personal safety and supporting researchers appropriately within this context.

Keywords: distance education, ethics, virtual environments.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1476