Search results for: security measures
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1774

Search results for: security measures

364 A Renovated Cook's Distance Based On The Buckley-James Estimate In Censored Regression

Authors: Nazrina Aziz, Dong Q. Wang

Abstract:

There have been various methods created based on the regression ideas to resolve the problem of data set containing censored observations, i.e. the Buckley-James method, Miller-s method, Cox method, and Koul-Susarla-Van Ryzin estimators. Even though comparison studies show the Buckley-James method performs better than some other methods, it is still rarely used by researchers mainly because of the limited diagnostics analysis developed for the Buckley-James method thus far. Therefore, a diagnostic tool for the Buckley-James method is proposed in this paper. It is called the renovated Cook-s Distance, (RD* i ) and has been developed based on the Cook-s idea. The renovated Cook-s Distance (RD* i ) has advantages (depending on the analyst demand) over (i) the change in the fitted value for a single case, DFIT* i as it measures the influence of case i on all n fitted values Yˆ∗ (not just the fitted value for case i as DFIT* i) (ii) the change in the estimate of the coefficient when the ith case is deleted, DBETA* i since DBETA* i corresponds to the number of variables p so it is usually easier to look at a diagnostic measure such as RD* i since information from p variables can be considered simultaneously. Finally, an example using Stanford Heart Transplant data is provided to illustrate the proposed diagnostic tool.

Keywords: Buckley-James estimators, censored regression, censored data, diagnostic analysis, product-limit estimator, renovated Cook's Distance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1409
363 A Study of Panel Logit Model and Adaptive Neuro-Fuzzy Inference System in the Prediction of Financial Distress Periods

Authors: Ε. Giovanis

Abstract:

The purpose of this paper is to present two different approaches of financial distress pre-warning models appropriate for risk supervisors, investors and policy makers. We examine a sample of the financial institutions and electronic companies of Taiwan Security Exchange (TSE) market from 2002 through 2008. We present a binary logistic regression with paned data analysis. With the pooled binary logistic regression we build a model including more variables in the regression than with random effects, while the in-sample and out-sample forecasting performance is higher in random effects estimation than in pooled regression. On the other hand we estimate an Adaptive Neuro-Fuzzy Inference System (ANFIS) with Gaussian and Generalized Bell (Gbell) functions and we find that ANFIS outperforms significant Logit regressions in both in-sample and out-of-sample periods, indicating that ANFIS is a more appropriate tool for financial risk managers and for the economic policy makers in central banks and national statistical services.

Keywords: ANFIS, Binary logistic regression, Financialdistress, Panel data

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2311
362 Ideological Tendencies of the Teachers about the Causes of Vandalism in Schools and Solution Proposals

Authors: Sevgi Birsel Nemlioğlu, Hasan Atak

Abstract:

Aggression is a behavior that cannot be approved by the society. Vandalism which is aggression towards objects is an action that tends to damage public or personal property. The behaviors that are described as vandalism can often be observed in the schools as well. According to Zwier and Vaughan (1) previous research about the reasons of and precautionary measures for vandalism in schools can be grouped in three tendency categories: conservative, liberal and radical. In this context, the main aim of this study is to discover which ideological tendency of the reasons of school vandalism is adopted by the teachers and what are their physical, environmental, school system and societal solutions for vandalism. A total of 200 teachers participated in this study, and the mean age was 34.20 years (SD = 6.54). The sample was made up of 109 females and 91 males. For the analysis of the data, SPSS 15.00, frequency, percentage, and t-test were used. The research showed that the teachers have tendencies in the order of conservative, liberal and radical for the reasons of vandalism. The research also showed that the teachers do not have any tendency for eliminating vandalism physically and general solutions on the level of society; on the other hand they mostly adopt a conservative tendency in terms of precautions against vandalism in the school system. Second most, they adopt the liberal tendency in terms of precautions against vandalism in the school system. . It is observed that the findings of this study are comparable to the existing literature on the subject. Future studies should be conducted with multiple variants and bigger sampling.

Keywords: Vandalism, School, Vandal, Turkey, Teacher, Tendency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1908
361 Selection of Wind Farms to Add Virtual Inertia Control to Assist the Power System Frequency Regulation

Authors: W. Du, X. Wang, Jun Cao, H. F. Wang

Abstract:

Due to the randomness and uncertainty of wind energy, modern power systems integrating large-scale wind generation will be significantly impacted in terms of system performance and technical challenges. System inertia with high wind penetration is decreasing when conventional thermal generators are gradually replaced by wind turbines, which do not naturally contribute to inertia response. The power imbalance caused by wind power or demand fluctuations leads to the instability of system frequency. Accordingly, the need to attach the supplementary virtual inertia control to wind farms (WFs) strongly arises. When multi-wind farms are connected to the grid simultaneously, the selection of which critical WFs to install the virtual inertia control is greatly important to enhance the stability of system frequency. By building the small signal model of wind power systems considering frequency regulation, the installation locations are identified by the geometric measures of the mode observability of WFs. In addition, this paper takes the impacts of grid topology and selection of feedback control signals into consideration. Finally, simulations are conducted on a multi-wind farms power system and the results demonstrate that the designed virtual inertia control method can effectively assist the frequency regulation.

Keywords: Frequency regulation, virtual inertia control, installation locations, observability, wind farms.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2110
360 Closing Africa’s Infrastructure Deficit: The Role of Gender Responsiveness in Urban Planning

Authors: K. Buyana, S. Lwasa, L. Schiebinger

Abstract:

Although urbanization in Africa has been characterized by fragile socio-economic successes, the sustainability of city infrastructure is now central to planning processes as a pathway to closing the deficit in terms of coverage and access. This paper builds on survey and interview data from Kampala city, to demonstrate how the principle gender responsiveness can inform improvements in urban infrastructure and service delivery. We discovered that women prefer infrastructure that combines living and working spaces for reduced labour and travel burdens between homes, markets, schools, and other urban spaces. Men’s conception of infrastructure needs on the other hand, mirrored public security and connectivity concerns along city streets and work places. However, the urban planning approach at city-level is guided by mainstream engineering and architectural designs that do not necessarily reflect the social context within which urban infrastructure influences gender roles and the attendant mobility needs. To address the challenge across cities of similar context, the paper concludes with a set of analytic steps on how the gendered influences on infrastructure-use can be considered in urban planning cycles.

Keywords: African cities, gender responsiveness, city infrastructure, urban planning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2143
359 Addressing Scalability Issues of Named Entity Recognition Using Multi-Class Support Vector Machines

Authors: Mona Soliman Habib

Abstract:

This paper explores the scalability issues associated with solving the Named Entity Recognition (NER) problem using Support Vector Machines (SVM) and high-dimensional features. The performance results of a set of experiments conducted using binary and multi-class SVM with increasing training data sizes are examined. The NER domain chosen for these experiments is the biomedical publications domain, especially selected due to its importance and inherent challenges. A simple machine learning approach is used that eliminates prior language knowledge such as part-of-speech or noun phrase tagging thereby allowing for its applicability across languages. No domain-specific knowledge is included. The accuracy measures achieved are comparable to those obtained using more complex approaches, which constitutes a motivation to investigate ways to improve the scalability of multiclass SVM in order to make the solution more practical and useable. Improving training time of multi-class SVM would make support vector machines a more viable and practical machine learning solution for real-world problems with large datasets. An initial prototype results in great improvement of the training time at the expense of memory requirements.

Keywords: Named entity recognition, support vector machines, language independence, bioinformatics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1663
358 Logistics Outsourcing: Performance Models and Financial and Operational Indicators

Authors: Carlos Sanchís-Pedregosa, José A. D. M achuca, María del Mar González-Zamora

Abstract:

The growing outsourcing of logistics services resulting from the ongoing current in firms of costs reduction/increased efficiency means that it is becoming more and more important for the companies doing the outsourcing to carry out a proper evaluation. The multiple definitions and measures of logistics service performance found in research on the topic create a certain degree of confusion and do not clear the way towards the proper measurement of their performance. Do a model and a specific set of indicators exist that can be considered appropriate for measuring the performance of logistics services outsourcing in industrial environments? Are said indicators in keeping with the objectives pursued by outsourcing? We aim to answer these and other research questions in the study we have initiated in the field within the framework of the international High Performance Manufacturing (HPM) project of which this paper forms part. As the first stage of this research, this paper reviews articles dealing with the topic published in the last 15 years with the aim of detecting the models most used to make this measurement and determining which performance indicators are proposed as part of said models and which are most used. The first steps are also taken in determining whether these indicators, financial and operational, cover the aims that are being pursued when outsourcing logistics services. The findings show there is a wide variety of both models and indicators used. This would seem to testify to the need to continue with our research in order to try to propose a model and a set of indicators for measuring the performance of logistics services outsourcing in industrial environments.

Keywords: Logistics, objectives, outsourcing, performancemeasurement systems

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2100
357 Alkali Silica Reaction Mitigation and Prevention Measures for Arkansas Local Aggregates

Authors: Amin Kamal Akhnoukh, Lois Zaki Kamel, Magued Mourad Barsoum

Abstract:

The objective of this research is to mitigate and prevent the alkali silica reactivity (ASR) in highway construction projects. ASR is a deleterious reaction initiated when the silica content of the aggregate reacts with alkali hydroxides in cement in the presence of relatively high moisture content. The ASR results in the formation of an expansive white colored gel-like material which forms the destructive tensile stresses inside hardened concrete. In this research, different types of local aggregates available in the State of Arkansas were mixed and mortar bars were poured according to the ASTM specifications. Mortar bars expansion was measured versus time and aggregates with potential ASR problems were detected. Different types of supplementary cementitious materials (SCMs) were used in remixing mortar bars with highly reactive aggregates. Length changes for remixed bars proved that different types of SCMs can be successfully used in reducing the expansive effect of ASR. SCMs percentage by weight is highly dependent on the SCM type. The result of this study will help avoiding future losses due to ASR cracking in construction project and reduce the maintenance, repair, and replacement budgets required for highways network.

Keywords: Alkali Silica Reaction, Aggregates, Moisture, Cracks, Mortar Bar Test supplementary cementitious materials.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1974
356 Analysis of Attention to the Confucius Institute from Domestic and Foreign Mainstream Media

Authors: Wei Yang, Xiaohui Cui, Weiping Zhu, Liqun Liu

Abstract:

The rapid development of the Confucius Institute is attracting more and more attention from mainstream media around the world. Mainstream media plays a large role in public information dissemination and public opinion. This study presents efforts to analyze the correlation and functional relationship between domestic and foreign mainstream media by analyzing the amount of reports on the Confucius Institute. Three kinds of correlation calculation methods, the Pearson correlation coefficient (PCC), the Spearman correlation coefficient (SCC), and the Kendall rank correlation coefficient (KCC), were applied to analyze the correlations among mainstream media from three regions: mainland of China; Hong Kong and Macao (the two special administration regions of China denoted as SARs); and overseas countries excluding China, such as the United States, England, and Canada. Further, the paper measures the functional relationships among the regions using a regression model. The experimental analyses found high correlations among mainstream media from the different regions. Additionally, we found that there is a linear relationship between the mainstream media of overseas countries and those of the SARs by analyzing the amount of reports on the Confucius Institute based on a data set obtained by crawling the websites of 106 mainstream media during the years 2004 to 2014.

Keywords: Confucius Institute, correlation analysis, mainstream media, regression model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1321
355 Aged Society: A Pitfall

Authors: Siti Norfazlina Yusoff, Noorlailahusna Mohd Yusof

Abstract:

The aging of the workforce is occurring globally and has significant impact on organizations. The Malaysian population is ageing. Although, not as quickly as the populations of a number of Asian nations, or of parts of Europe; the rate is sufficient to cause a concern. The life expectancy of Malaysians has increased in year 2012 with an average of 73.8 years or equal to 71.1 years for males and 76.7 years for females. The birth and death rates are 26.05 births/1,000 population and 5.29 deaths/1,000 population respectively. These figures have placed a greater liability on the government’s shoulder, and have become a push factor for the country to revise a new retirement age for the public servants. The ‘aged population’ impinged on the new challenges faced by the Malaysian government, which had to deal with an unproductive aged workforce. A new retirement age from 58 to 60 years old has been introduced and this could have a positive effect on this cohort, in maintaining financial security. However, keeping older employees might affect organizations’ performance and productivity. The organizations need to pay more attention on them, since they are less effective and might be affected by numerous health problems. An innovative culture should be introduced and this could be a good indicator for organizations that deal with these ‘expensive’ workers.

Keywords: Aged workforce, financial relief, innovative culture retirement policy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1819
354 Study on Influencing Factors of Walkability of Rail Transit Station Area

Authors: Yang Wenjuan, Xu Yilun

Abstract:

Based on the comparative analysis of the relevant evaluation methods of walking environment, this paper selects the combined evaluation method of macro urban morphology analysis and micro urban design quality survey, then investigates and analyzes the walking environment of three rail transit station area in Nanjing to explore the influence factor and internal relation of walkability of rail transit station area. Analysis shows that micro urban design factors have greater impact on the walkability of rail transit station area compared with macro urban morphology factors, the convenience is the key factor in the four aspects of convenience, security, identity and comfortability of the urban design factors, the convenience is not only affected by the block network form, but also related to the quality of the street space. The overall evaluation of walkability comes from the overlapping and regrouping of the walking environment at different levels, but some environmental factors play a leading role. The social attributes of pedestrians also partly influence their walking perception and evaluation.

Keywords: Rail transit station area, walkability, evaluation, influence factors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 804
353 Students’ Level of Knowledge Construction and Pattern of Social Interaction in an Online Forum

Authors: K. Durairaj, I. N. Umar

Abstract:

The asynchronous discussion forum is one of the most widely used activities in learning management system environment. Online forum allows participants to interact, construct knowledge, and can be used to complement face to face sessions in blended learning courses. However, to what extent do the students perceive the benefits or advantages of forum remain to be seen. Through content and social network analyses, instructors will be able to gauge the students’ engagement and knowledge construction level. Thus, this study aims to analyze the students’ level of knowledge construction and their participation level that occur through online discussion. It also attempts to investigate the relationship between the level of knowledge construction and their social interaction patterns. The sample involves 23 students undertaking a master course in one public university in Malaysia. The asynchronous discussion forum was conducted for three weeks as part of the course requirement. The finding indicates that the level of knowledge construction is quite low. Also, the density value of 0.11 indicating the overall communication among the participants in the forum is low. This study reveals that strong and significant correlations between SNA measures (in-degree centrality, out-degree centrality) and level of knowledge construction. Thus, allocating these active students in different group aids the interactive discussion takes place. Finally, based upon the findings, some recommendations to increase students’ level of knowledge construction and also for further research are proposed.

Keywords: Asynchronous Discussion Forums, Content Analysis, Knowledge Construction, Social Network Analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2172
352 On the Allopatry of National College Entrance Exam in China: The Root, Policy and Strategy

Authors: Shi Zhang

Abstract:

This paper aims to introduce the allopatry of national college entrance examination which allow migrant students enter senior high schools and take college entrance exam where they live, identifies the reasons affect the implementation of this policy in the Chinese context. Most of China’s provinces and municipalities recently have announced new policies regarding national college entrance exams for non-local students. The paper conducts SWOT analysis reveals the opportunities, strength, weakness and challenges of the scheme, so as to discuss the implementation strategies from the perspectives of idea and institution. The research findings imply that the government should take a more positive attitude toward relaxing the allopatry of NCEE policy restrictions, and promote the reform household registration policy and NCEE policy with synchronous operations. Higher education institutions should explore the diversification of enrollment model; the government should issue the authority of universities and colleges to select elite migrant students beyond the restrictions of NCEE. To suit reform policies to local conditions, the big cities such as Beijing, Shanghai and Guangzhou should publish related compensate measures for children of migrant workers access to higher vocational colleges with tuition fee waivered. 

Keywords: College entrance examination, higher education, education policy, education equality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2648
351 Seismic Directionality Effects on In-Structure Response Spectra in Seismic Probabilistic Risk Assessment

Authors: S. Jarernprasert, E. Bazan-Zurita, P. C. Rizzo

Abstract:

Currently, seismic probabilistic risk assessments (SPRA) for nuclear facilities use In-Structure Response Spectra (ISRS) in the calculation of fragilities for systems and components. ISRS are calculated via dynamic analyses of the host building subjected to two orthogonal components of horizontal ground motion. Each component is defined as the median motion in any horizontal direction. Structural engineers applied the components along selected X and Y Cartesian axes. The ISRS at different locations in the building are also calculated in the X and Y directions. The choice of the directions of X and Y are not specified by the ground motion model with respect to geographic coordinates, and are rather arbitrarily selected by the structural engineer. Normally, X and Y coincide with the “principal” axes of the building, in the understanding that this practice is generally conservative. For SPRA purposes, however, it is desirable to remove any conservatism in the estimates of median ISRS. This paper examines the effects of the direction of horizontal seismic motion on the ISRS on typical nuclear structure. We also evaluate the variability of ISRS calculated along different horizontal directions. Our results indicate that some central measures of the ISRS provide robust estimates that are practically independent of the selection of the directions of the horizontal Cartesian axes.

Keywords: Seismic, Directionality, In-Structure Response Spectra, Probabilistic Risk Assessment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2503
350 A Content Based Image Watermarking Scheme Resilient to Geometric Attacks

Authors: Latha Parameswaran, K. Anbumani

Abstract:

Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.

Keywords: Image moments, wavelets, content-based watermarking, moment normalization, geometric attacks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1425
349 Real-time Target Tracking Using a Pan and Tilt Platform

Authors: Moulay A. Akhloufi

Abstract:

In recent years, we see an increase of interest for efficient tracking systems in surveillance applications. Many of the proposed techniques are designed for static cameras environments. When the camera is moving, tracking moving objects become more difficult and many techniques fail to detect and track the desired targets. The problem becomes more complex when we want to track a specific object in real-time using a moving Pan and Tilt camera system to keep the target within the image. This type of tracking is of high importance in surveillance applications. When a target is detected at a certain zone, the possibility of automatically tracking it continuously and keeping it within the image until action is taken is very important for security personnel working in very sensitive sites. This work presents a real-time tracking system permitting the detection and continuous tracking of targets using a Pan and Tilt camera platform. A novel and efficient approach for dealing with occlusions is presented. Also a new intelligent forget factor is introduced in order to take into account target shape variations and avoid learning non desired objects. Tests conducted in outdoor operational scenarios show the efficiency and robustness of the proposed approach.

Keywords: Tracking, surveillance, target detection, Pan and tilt.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1758
348 Combating Money Laundering in the Banking Industry: Malaysian Experience

Authors: Aspalella A. Rahman

Abstract:

Money laundering has been described by many as the lifeblood of crime and is a major threat to the economic and social well-being of societies. It has been recognized that the banking system has long been the central element of money laundering. This is in part due to the complexity and confidentiality of the banking system itself. It is generally accepted that effective anti-money laundering (AML) measures adopted by banks will make it tougher for criminals to get their "dirty money" into the financial system. In fact, for law enforcement agencies, banks are considered to be an important source of valuable information for the detection of money laundering. However, from the banks- perspective, the main reason for their existence is to make as much profits as possible. Hence their cultural and commercial interests are totally distinct from that of the law enforcement authorities. Undoubtedly, AML laws create a major dilemma for banks as they produce a significant shift in the way banks interact with their customers. Furthermore, the implementation of the laws not only creates significant compliance problems for banks, but also has the potential to adversely affect the operations of banks. As such, it is legitimate to ask whether these laws are effective in preventing money launderers from using banks, or whether they simply put an unreasonable burden on banks and their customers. This paper attempts to address these issues and analyze them against the background of the Malaysian AML laws. It must be said that effective coordination between AML regulator and the banking industry is vital to minimize problems faced by the banks and thereby to ensure effective implementation of the laws in combating money laundering.

Keywords: Banking Industry, Bank Negara Money, Laundering, Malaysia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4254
347 A Secure Semi-Fragile Watermarking Scheme for Authentication and Recovery of Images Based On Wavelet Transform

Authors: Rafiullah Chamlawi, Asifullah Khan, Adnan Idris, Zahid Munir

Abstract:

Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.

Keywords: Integer Wavelet Transform (IWT), Discrete Cosine Transform (DCT), JPEG Compression, Authentication and Self- Recovery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2049
346 MiSense Hierarchical Cluster-Based Routing Algorithm (MiCRA) for Wireless Sensor Networks

Authors: Kavi K. Khedo, R. K. Subramanian

Abstract:

Wireless sensor networks (WSN) are currently receiving significant attention due to their unlimited potential. These networks are used for various applications, such as habitat monitoring, automation, agriculture, and security. The efficient nodeenergy utilization is one of important performance factors in wireless sensor networks because sensor nodes operate with limited battery power. In this paper, we proposed the MiSense hierarchical cluster based routing algorithm (MiCRA) to extend the lifetime of sensor networks and to maintain a balanced energy consumption of nodes. MiCRA is an extension of the HEED algorithm with two levels of cluster heads. The performance of the proposed protocol has been examined and evaluated through a simulation study. The simulation results clearly show that MiCRA has a better performance in terms of lifetime than HEED. Indeed, MiCRA our proposed protocol can effectively extend the network lifetime without other critical overheads and performance degradation. It has been noted that there is about 35% of energy saving for MiCRA during the clustering process and 65% energy savings during the routing process compared to the HEED algorithm.

Keywords: Clustering algorithm, energy consumption, hierarchical model, sensor networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1749
345 Customer Adoption and Attitudes in Mobile Banking in Sri Lanka

Authors: Prasansha Kumari

Abstract:

This paper intends to identify and analyze customer adoption and attitudes towards mobile banking facilities. The study uses six perceived characteristics of innovation that can be used to form a favorable or unfavorable attitude toward an innovation, namely: Relative advantage, compatibility, complexity, trailability, risk, and observability. Collected data were analyzed using Pearson Chi-Square test. The results showed that mobile bank users were predominantly males. There is a growing trend among young, educated customers towards converting to mobile banking in Sri Lanka. The research outcomes suggested that all the six factors are statistically highly significant in influencing mobile banking adoption and attitude formation towards mobile banking in Sri Lanka. The major reasons for adopting mobile banking services are the accessibility and availability of services regardless of time and place. Over the 75 percent of the respondents mentioned that savings in time and effort and low financial costs of conducting mobile banking were advantageous. Issue of security was found to be the most important factor that motivated consumer adoption and attitude formation towards mobile banking. Main barriers to mobile banking were the lack of technological skills, the traditional cash‐carry banking culture, and the lack of awareness and insufficient guidance to using mobile banking.

Keywords: Compatibility, complexity, mobile banking, risk.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2630
344 Effect of Ambient Oxygen Content and Lifting Frequency on the Participant’s Lifting Capabilities, Muscle Activities, and Perceived Exertion

Authors: Atef M. Ghaleb, Mohamed Z. Ramadan, Khalid Saad Aljaloud

Abstract:

The aim of this study is to assesses the lifting capabilities of persons experiencing hypoxia. It also examines the behavior of the physiological response induced through the lifting process related to changing in the hypoxia and lifting frequency variables. For this purpose, the study performed two consecutive tests by using; (1) training and acclimatization; and (2) an actual collection of data. A total of 10 male students from King Saud University, Kingdom of Saudi Arabia, were recruited in the study. A two-way repeated measures design, with two independent variables (ambient oxygen (15%, 18% and 21%)) and lifting frequency (1 lift/min and 4 lifts/min) and four dependent variables i.e., maximum acceptable weight of lift (MAWL), Electromyography (EMG) of four muscle groups (anterior deltoid, trapezius, biceps brachii, and erector spinae), rating of perceived exertion (RPE), and rating of oxygen feeling (ROF) were used in this study. The results show that lifting frequency has significantly impacted the MAWL and muscles’ activities. The oxygen content had a significant effect on the RPE and ROE. The study has revealed that acclimatization and training sessions significantly reduce the effect of the hypoxia on the human physiological parameters during the manual materials handling tasks.

Keywords: Lifting capabilities, muscle activities (sEMG), oxygen content, perceived exertion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 607
343 Assessment of Water Quality Used for Irrigation: Case Study of Josepdam Irrigation Scheme

Authors: M. A. Adejumobi, J. O. Ojediran

Abstract:

The aim of irrigation is to recharge the available water in the soil. Quality of irrigation water is essential for the yield and quality of crops produced, maintenance of soil productivity and protection of the environment. The analysis of irrigation water arises as a need to know the impact of irrigation water on the yield of crops, the effect, and the necessary control measures to rectify the effect of this for optimum production and yield of crops. This study was conducted to assess the quality of irrigation water with its performance on crop planted, in Josepdam irrigation scheme Bacita, Nigeria. Field visits were undertaken to identify and locate water supply sources and collect water samples from these sources; X1 Drain, Oshin, River Niger loop and Ndafa. Laboratory experiments were then undertaken to determine the quality of raw water from these sources. The analysis was carried for various parameters namely; physical and chemical analyses after water samples have been taken from four sources. The samples were tested in laboratory. Results showed that the raw water sources shows no salinity tendencies with SAR values less than 1me/l and Ecvaules at Zero while the pH were within the recommended range by FAO, there are increase in potassium and sulphate content contamination in three of the location. From this, it is recommended that there should be proper monitoring of the scheme by conducting analysis of water and soil in the environment, preferable test should be carried out at least one year to cover the impact of seasonal variations and to determine the physical and chemical analysis of the water used for irrigation at the scheme.

Keywords: Irrigation, Salinity, Raw water quality, Scheme.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2390
342 Effects of Length of Time of Fasting upon Subjective and Objective Variables When Controlling Sleep, Food and Fluid Intakes

Authors: H. Alabed, K. Abuzayan. L. Fgie, K. Zarug

Abstract:

Ramadan requires individuals to abstain from food and fluid intake between sunrise and sunset; physiological considerations predict that poorer mood, physical performance and mental performance will result. In addition, any difficulties will be worsened because preparations for fasting and recovery from it often mean that nocturnal sleep is decreased in length, and this independently affects mood and performance.

A difficulty of interpretation in many studies is that the observed changes could be due to fasting but also to the decreased length of sleep and altered food and fluid intakes before and after the daytime fasting. These factors were separated in this study, which took place over three separate days and compared the effects of different durations of fasting (4, 8 or 16h) upon a wide variety of measures (including subjective and objective assessments of performance, body composition, dehydration and responses to a short bout of exercise) - but with an unchanged amount of nocturnal sleep, controlled supper the previous evening, controlled intakes at breakfast and daytime naps not being allowed. Many of the negative effects of fasting observed in previous studies were present in this experiment also. These findings indicate that fasting was responsible for many of the changes previously observed, though some effect of sleep loss, particularly if occurring on successive days (as would occur in Ramadan) cannot be excluded.

Keywords: Drinking, Eating, Mental Performance, Physical Performance, Social Activity, Blood, Sleepiness.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1618
341 GenCos- Optimal Bidding Strategy Considering Market Power and Transmission Constraints: A Cournot-based Model

Authors: A. Badri

Abstract:

Restructured electricity markets may provide opportunities for producers to exercise market power maintaining prices in excess of competitive levels. In this paper an oligopolistic market is presented that all Generation Companies (GenCos) bid in a Cournot model. Genetic algorithm (GA) is applied to obtain generation scheduling of each GenCo as well as hourly market clearing prices (MCP). In order to consider network constraints a multiperiod framework is presented to simulate market clearing mechanism in which the behaviors of market participants are modelled through piecewise block curves. A mixed integer linear programming (MILP) is employed to solve the problem. Impacts of market clearing process on participants- characteristic and final market prices are presented. Consequently, a novel multi-objective model is addressed for security constrained optimal bidding strategy of GenCos. The capability of price-maker GenCos to alter MCP is evaluated through introducing an effective-supply curve. In addition, the impact of exercising market power on the variation of market characteristics as well as GenCos scheduling is studied.

Keywords: Optimal bidding strategy, Cournot equilibrium, market power, network constraints, market auction mechanism

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1609
340 A New Model for Economic Optimization of Water Diversion System during Dam Construction using PSO Algorithm

Authors: Saeed Sedighizadeh, Abbas Mansoori, Mohammad Reza Pirestani, Davoud Sedighizadeh

Abstract:

The usual method of river flow diversion involves construction of tunnels and cofferdams. Given the fact that the cost of diversion works could be as high as 10-20% of the total dam construction cost, due attention should be paid to optimum design of the diversion works. The cost of diversion works depends, on factors, such as: the tunnel dimensions and the intended tunneling support measures during and after excavation; quality and characterizes of the rock through which the tunnel should be excavated; the dimensions of the upstream (and downstream) cofferdams; and the magnitude of river flood the system is designed to divert. In this paper by use of the cost of unit prices for tunnel excavation, tunnel lining, tunnel support (rock bolt + shotcrete) and cofferdam fill the cost function was determined. The function is then minimized by the aid of PSO Algorithm (particle swarm optimization). It is found that the optimum diameter and the total diversion cost are directly related to the river flood discharge (Q). It has also shown that in addition to optimum diameter design discharge (Q), river length, tunnel length, is mainly a function of the ratios (not the absolute values) of the unit prices and does not depend on the overall price levels in the respective country. The results of optimization use in some of the case study lead us to significant changes in the cost.

Keywords: Diversion Tunnel, Optimization, PSO Algorithm

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2687
339 Adopting Artificial Intelligence and Deep Learning Techniques in Cloud Computing for Operational Efficiency

Authors: Sandesh Achar

Abstract:

Artificial intelligence (AI) is being increasingly incorporated into many applications across various sectors such as health, education, security, and agriculture. Recently, there has been rapid development in cloud computing technology, resulting in AI’s implementation into cloud computing to enhance and optimize the technology service rendered. The deployment of AI in cloud-based applications has brought about autonomous computing, whereby systems achieve stated results without human intervention. Despite the amount of research into autonomous computing, work incorporating AI/ML into cloud computing to enhance its performance and resource allocation remains a fundamental challenge. This paper highlights different manifestations, roles, trends, and challenges related to AI-based cloud computing models. This work reviews and highlights investigations and progress in the domain. Future directions are suggested for leveraging AI/ML in next-generation computing for emerging computing paradigms such as cloud environments. Adopting AI-based algorithms and techniques to increase operational efficiency, cost savings, automation, reducing energy consumption and solving complex cloud computing issues are the major findings outlined in this paper.

Keywords: Artificial intelligence, AI, cloud computing, deep learning, machine learning, ML, internet of things, IoT.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 548
338 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an  enormous number of applications, cyber-threats have significantly  increased accordingly. Thus, accurate detection of malicious traffic in  a timely manner is a critical concern in today’s Internet for security.  One approach for intrusion detection is to use Machine Learning (ML)  techniques. Several methods based on ML algorithms have been  introduced over the past years, but they are largely limited in terms of  detection accuracy and/or time and space complexity to run. In this  work, we present a novel method for intrusion detection that  incorporates a set of supervised learning algorithms. The proposed  technique provides high accuracy and outperforms existing techniques  that simply utilizes a single learning method. In addition, our  technique relies on partial flow information (rather than full  information) for detection, and thus, it is light-weight and desirable for  online operations with the property of early identification. With the  mid-Atlantic CCDC intrusion dataset publicly available, we show that  our proposed technique yields a high degree of detection rate over 99%  with a very low false alarm rate (0.4%). 

 

Keywords: Intrusion Detection, Supervised Learning, Traffic Classification.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2000
337 Searchable Encryption in Cloud Storage

Authors: Ren-Junn Hwang, Chung-Chien Lu, Jain-Shing Wu

Abstract:

Cloud outsource storage is one of important services in cloud computing. Cloud users upload data to cloud servers to reduce the cost of managing data and maintaining hardware and software. To ensure data confidentiality, users can encrypt their files before uploading them to a cloud system. However, retrieving the target file from the encrypted files exactly is difficult for cloud server. This study proposes a protocol for performing multikeyword searches for encrypted cloud data by applying k-nearest neighbor technology. The protocol ranks the relevance scores of encrypted files and keywords, and prevents cloud servers from learning search keywords submitted by a cloud user. To reduce the costs of file transfer communication, the cloud server returns encrypted files in order of relevance. Moreover, when a cloud user inputs an incorrect keyword and the number of wrong alphabet does not exceed a given threshold; the user still can retrieve the target files from cloud server. In addition, the proposed scheme satisfies security requirements for outsourced data storage.

Keywords: Fault-tolerance search, multi-keywords search, outsource storage, ranked search, searchable encryption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3045
336 Strategic Redesign of Public Spaces with a Sustainable Approach: Case Study of Parque Huancavilca, Guayaquil

Authors: Juan Carlos Briones Macias

Abstract:

Currently, the Huancavilca City Park in Guayaquil is an abandoned public space that is discovering a growing problem of insecurity, where various problems have been perceived, such as the lack of green areas, deteriorating furniture, insufficient lighting, the use of inadequate cladding materials and very sunny areas due to the lack of planning in the design of green areas. The objective of this scientific article is to redesign Huancavilca Park through public space design strategies for more attractive and comfortable areas, becoming a point of interaction in a safe and accessible way. A mixed methodology (qualitative and quantitative) was applied, obtaining information based on surveys, interviews, field observations, and systematizing the data in the traditional weighting of the structuring aspects of the park. The results were obtained from the methodological design scheme of iterative analysis of public spaces by Jan Güell. It is concluded that the use of urban strategies in the structuring elements of the park, such as vegetation, furniture, generating new activities, and security interventions, will specifically solve all the problems of the Huancavilca Park tested in a Pareto 80/20 Diagram.

Keywords: Public space, green areas, vegetation, street furniture, urban analysis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 257
335 An Investigation on Thermo Chemical Conversions of Solid Waste for Energy Recovery

Authors: Sharmina Begum, M. G. Rasul, Delwar Akbar

Abstract:

Solid waste can be considered as an urban burden or as a valuable resource depending on how it is managed. To meet the rising demand for energy and to address environmental concerns, a conversion from conventional energy systems to renewable resources is essential. For the sustainability of human civilization, an environmentally sound and techno-economically feasible waste treatment method is very important to treat recyclable waste. Several technologies are available for realizing the potential of solid waste as an energy source, ranging from very simple systems for disposing of dry waste to more complex technologies capable of dealing with large amounts of industrial waste. There are three main pathways for conversion of waste material to energy: thermo chemical, biochemical and physicochemical. This paper investigates the thermo chemical conversion of solid waste for energy recovery. The processes, advantages and dis-advantages of various thermo chemical conversion processes are discussed and compared. Special attention is given to Gasification process as it provides better solutions regarding public acceptance, feedstock flexibility, near-zero emissions, efficiency and security. Finally this paper presents comparative statements of thermo chemical processes and introduces an integrated waste management system.

Keywords: Gasification, Incineration, Pyrolysis, Thermo chemical conversion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3252