Search results for: didactic material resources
1544 Study of Structural and Electronic Properties of Ternary PdMnGe Half-Heusler Alloy
Authors: F. Bendahma, M. Mana, B. Bestani, S. Bentata
Abstract:
This study deals with the structural and electronic properties of ternary PdMnGe Half-Heusler alloy using the full potential linearized augmented plane wave (FP-LAPW) method based on the density functional theory (DFT) as implemented in the WIEN2k package, within the framework of generalized gradient approximation (GGA). Structural parameters, total and partial densities of states were also analyzed. The obtained result shows that the studied material is metallic in GGA treatment. The elastic constants (Cij) show that our compound is ductile, stiff and anisotropic.
Keywords: Full potential linearized augmented plane wave, generalized gradient approximation treatment, Half-Heusler, structural and electronic properties.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6481543 A Software of Intrusion Detection Mechanism for Virtual Platforms
Authors: Ying-Chuan Chen, Shuen-Tai Wang
Abstract:
Security is an interesting and significance issue for popular virtual platforms, such as virtualization cluster and cloud platforms. Virtualization is the powerful technology for cloud computing services, there are a lot of benefits by using virtual machine tools which be called hypervisors, such as it can quickly deploy all kinds of virtual Operating Systems in single platform, able to control all virtual system resources effectively, cost down for system platform deployment, ability of customization, high elasticity and high reliability. However, some important security problems need to take care and resolved in virtual platforms that include terrible viruses, evil programs, illegal operations and intrusion behavior. In this paper, we present useful Intrusion Detection Mechanism (IDM) software that not only can auto to analyze all system-s operations with the accounting journal database, but also is able to monitor the system-s state for virtual platforms.Keywords: security, cluster, cloud, virtualization, virtual machine, virus, intrusion detection
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15461542 Out-of-Plane Bending Properties of Out-of-Autoclave Thermosetting Prepregs during Forming Processes
Authors: Hassan A. Alshahrani, Mehdi H. Hojjati
Abstract:
In order to predict and model wrinkling which is caused by out of plane deformation due to compressive loading in the plane of the material during composite prepregs forming, it is necessary to quantitatively understand the relative magnitude of the bending stiffness. This study aims to examine the bending properties of out-of-autoclave (OOA) thermosetting prepreg under vertical cantilever test condition. A direct method for characterizing the bending behavior of composite prepregs was developed. The results from direct measurement were compared with results derived from an image-processing procedure that analyses the captured image during the vertical bending test. A numerical simulation was performed using ABAQUS to confirm the bending stiffness value.Keywords: Bending stiffness, out of autoclave prepreg, forming process, numerical simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16871541 Cultivation of Thymus by In Vitro And Hydroponics Combined Method
Authors: E. Sargsyan, A. Vardanyan, L. Ghalachyan, S. Bulgadaryan
Abstract:
Our results showed that for the growth of qualitative seedling and vegetative raw material of ðó. marschallianus Willd. and T. serphyllum L. it is more profitable to use the in vitro and hydroponics combined method. In in vitro culture it is possible to do micro-propagation whole year with 98-99% rhizogenesis. 30000 micro-plants were obtained from one explant during 9 months. Hydroponic conditions provide the necessary microclimate for microplants where the survival rate without acclimatization was 93.3%. The essential oil content in hydroponic dry herb of both species in vegetative and blossom phase was 1.3% whereas in wild plants it was 1.2%, the content of extractive substances and vitamin C also exceeded wild plants. Our biochemical and radiochemical investigations indicated that the medicinal raw materials obtained from hydroponic and wild plants of Thymus species correspond to the demands of SPh XI, and the content of artificial radionuclides does not exceed the MACL.Keywords: Hydroponics, In vitro, Micro-propagation, Thymus
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24851540 Embodied Carbon Footprint of Existing Malaysian Green Homes
Authors: Fahanim Abdul Rashid, Muhammad Azzam Ismail
Abstract:
Part and parcel of building green homes (GHs) with favorable thermal comfort (TC) is to design and build with reduced carbon footprint (CF) from embodied energy in the building envelope and reduced operational CF overall. Together, the environmental impact of GHs can be reduced significantly. Nevertheless, there is still a need to identify the base CF value for Malaysian GHs and this can be done by assessing existing ones which can then be compared to conventional and vernacular houses which are built differently with different building materials. This paper underlines the research design and introduces the case studies. For now, the operational CF of the case studies is beyond the scope of this study. Findings from this research could identify the best building material and construction technique combination to build GHs depending on the available skills, financial constraints and the condition of the immediate environment.
Keywords: Embodied carbon footprint, Malaysian green homes.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21981539 South African MNEs Entry Strategies in Africa
Authors: N.M. Museisi
Abstract:
This is a cross-cultural study that determines South African multinational enterprises (MNEs) entry strategies as they invest in Africa. An integrated theoretical framework comprising the transaction cost theory, Uppsala model, eclectic paradigm and the distance framework was adopted. A sample of 40 South African MNEs with 415 existing FDI entries in Africa was drawn. Using an ordered logistic regression model, the impact of culture on the choice of degree of control by South African MNEs in Africa was determined. Cultural distance was one of significant factors that influenced South African MNEs- choice of degree of control. Furthermore, South African MNEs are risk averse in all countries in Africa but minimize the risks differently across sectors. Service sectors chooses to own their subsidiaries 100% and avoid dealing with the locals while manufacturing, resources and construction choose to have a local partner to share the risk.Keywords: Cross-cultural, emerging MNEs, entry strategies, internationalization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37611538 Identifying and Ranking Critical Success Factors for Implementing Leagile Manufacturing Industries Using Modified TOPSIS
Authors: Naveen Virmani, Rajeev Saha, Rajeshwar Sahai
Abstract:
Leagile is combination of both lean and agile system. Lean is concerned with less of everything i.e. less material, less time, less space, less manpower to produce a product, while agile is concerned with quick respond to customer demand and to reconfigure the system as soon as possible to meet the customer expectations well on time. The market is excessively competitive, so there is a dire need for the companies to adopt new and modern technologies with latest equipments. It has been seen that implementation of leagile system become tedious so the purpose of the paper is to find critical success factors (CSF) affecting leagile manufacturing system using literature review and rank them by using modified TOPSIS (Technique of order preference by similarity to ideal solution) technique.
Keywords: Agile manufacturing, lean manufacturing, leagile manufacturing, modified TOPSIS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9941537 Optimisation of A Phase Change Thermal Storage System
Authors: Nasrul Amri Mohd Amin, Martin Belusko, Frank Bruno
Abstract:
PCMs have always been viewed as a suitable candidate for off peak thermal storage, particularly for refrigeration systems, due to the high latent energy densities of these materials. However, due to the need to have them encapsulated within a container this density is reduced. Furthermore, PCMs have a low thermal conductivity which reduces the useful amount of energy which can be stored. To consider these factors, the true energy storage density of a PCM system was proposed and optimised for PCMs encapsulated in slabs. Using a validated numerical model of the system, a parametric study was undertaken to investigate the impact of the slab thickness, gap between slabs and the mass flow rate. The study showed that, when optimised, a PCM system can deliver a true energy storage density between 53% and 83% of the latent energy density of the PCM.Keywords: Phase change material, refrigeration, sustainability, thermal energy storage.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22991536 3A Distributed Method Algorithm for Exact Side Load Managing Smart Grid Using LABVIEW
Authors: N. Ravi Kumar, R. Kamalakannan
Abstract:
The advancement of hybrid energy resources such as solar and wind power leading to the emergence of customer owned grid. It provides an opportunity to regulars to obtain low energy costs as well as enabling the power supplier to regulate the utility grid. There is a need to develop smart systems that will automatically submit energy demand schedule and monitors energy price signals in real-time without the prompt of customers. In this paper, a demand side energy management for a grid connected household and also smart preparation of electrical appliance have been presented. It also reduces electricity bill for the consumers in the grid. In addition to this, when production is high, the surplus energy fashioned in the customer owned grid is given to main grid or neighboring micro grids. The simulation of the entire system is presented using LabVIEW software.
Keywords: Distributed renewable energy resource, power storage devices, scheduling, smart meters, smart micro grid, electric vehicle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10931535 Survey of Impact of Production and Adoption of Nanocrops on Food Security
Authors: Sahar Dehyouri, Seyed Jamal Farajollah Hosseini
Abstract:
Perspective of food security in 21 century showed shortage of food that production is faced to vital problem. Food security strategy is applied longtime method to assess required food. Meanwhile, nanotechnology revolution changes the world face. Nanotechnology is adequate method utilize of its characteristics to decrease environmental problems and possible further access to food for small farmers. This article will show impact of production and adoption of nanocrops on food security. Population is researchers of agricultural research center of Esfahan province. The results of study show that there was a relationship between uses, conversion, distribution, and production of nanocrops, operative human resources, operative circumstance, and constrains of usage of nanocrops and food security. Multivariate regression analysis by enter model shows that operative circumstance, use, production and constrains of usage of nanocrops had positive impact on food security and they determine in four steps 20 percent of it.Keywords: adoption, food safety, food security, nanocrops
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17531534 Energy Consumption and Surface Finish Analysis of Machining Ti6Al4V
Authors: Salman Pervaiz, Ibrahim Deiab, Amir Rashid, Mihai Nicolescu, Hossam Kishawy
Abstract:
Greenhouse gases (GHG) emissions impose major threat to global warming potential (GWP). Unfortunately manufacturing sector is one of the major sources that contribute towards the rapid increase in greenhouse gases (GHG) emissions. In manufacturing sector electric power consumption is the major driver that influences CO2 emission. Titanium alloys are widely utilized in aerospace, automotive and petrochemical sectors because of their high strength to weight ratio and corrosion resistance. Titanium alloys are termed as difficult to cut materials because of their poor machinability rating. The present study analyzes energy consumption during cutting with reference to material removal rate (MRR). Surface roughness was also measured in order to optimize energy consumption.Keywords: Energy Consumption, CO2 Emission, Ti6Al4V.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27841533 Geometrical Structure and Layer Orientation Effects on Strength, Material Consumption and Building Time of FDM Rapid Prototyped Samples
Authors: Ahmed A. D. Sarhan, Chong Feng Duan, Mum Wai Yip, M. Sayuti
Abstract:
Rapid Prototyping (RP) technologies enable physical parts to be produced from various materials without depending on the conventional tooling. Fused Deposition Modeling (FDM) is one of the famous RP processes used at present. Tensile strength and compressive strength resistance will be identified for different sample structures and different layer orientations of ABS rapid prototype solid models. The samples will be fabricated by a FDM rapid prototyping machine in different layer orientations with variations in internal geometrical structure. The 0° orientation where layers were deposited along the length of the samples displayed superior strength and impact resistance over all the other orientations. The anisotropic properties were probably caused by weak interlayer bonding and interlayer porosity.Keywords: Building orientation, compression strength, rapid prototyping, tensile strength.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17101532 Modelling Medieval Vaults: Digital Simulation of the North Transept Vault of St Mary, Nantwich, England
Authors: N. Webb, A. Buchanan
Abstract:
Digital and virtual heritage is often associated with the recreation of lost artefacts and architecture; however, we can also investigate works that were not completed, using digital tools and techniques. Here we explore physical evidence of a fourteenth-century Gothic vault located in the north transept of St Mary’s church in Nantwich, Cheshire, using existing springer stones that are built into the walls as a starting point. Digital surveying tools are used to document the architecture, followed by an analysis process to hypothesise and simulate possible design solutions, had the vault been completed. A number of options, both two-dimensionally and three-dimensionally, are discussed based on comparison with examples of other contemporary vaults, thus adding another specimen to the corpus of vault designs. Dissemination methods such as digital models and 3D prints are also explored as possible resources for demonstrating what the finished vault might have looked like for heritage interpretation and other purposes.Keywords: Digital simulation, heritage interpretation, medieval vaults, virtual heritage, 3D scanning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11781531 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.
Keywords: Cloud computing, cloud monitoring, performance optimization, high availability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 741530 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds
Authors: Sahar Sohrabi
Abstract:
The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.Keywords: Bayesian, cloud computing, real-time private cloud, scheduling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14091529 Between Kenzo Tange and Fernando Távora: An ‘Affinitarian’ Architectural Regard
Authors: João Cepeda
Abstract:
In crafting their way between theory and practice, authors and artists seem to be always immersed in a never-ending process of relating epochs, objects and images. Endless ‘affinities’ emerge, from a somewhat unexplainable (and intimate) magnetic relation. It is through this ‘warburgian’ assessment that two of the most prominent twentieth century modern architects from Japan and Portugal are put into perspective in this paper, focusing on their paths and thinking-practice, and on the research of their personal and professional archives. Moreover, this research especially aims its focus at essaying specifically on the possible ‘affinities’ between two of their most renowned architectural projects: the Kenzo Tange’s (demolished) Villa Seijo project in Tokyo (Japan), and Fernando Távora’s Tennis Pavilion design in Matosinhos (Portugal), respectively, side-by-side – through in-depth fieldwork in the sites, bibliographical and archival research, (unprecedented) material analysis, and a final critical consideration.
Keywords: Tange, Távora, architecture, affinities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 941528 A Quantitative Assessment of the Social Marginalization in Romania
Authors: Andra Costache, Rădiţa Alexe
Abstract:
The analysis of the spatial disparities of social marginalization is a requirement in the present-day socio-economic and political context of Romania, an East-European state, member of the European Union since 2007, at present faced with the imperatives of the growth of its territorial cohesion. The main objective of this article is to develop a methodology for the assessment of social marginalization, in order to understand the intensity of the marginalization phenomenon at different spatial scales. The article proposes a social marginalization index (SMI), calculated through the integration of ten indicators relevant for the two components of social marginalization: the material component and the symbolical component. The results highlighted a strong connection between the total degree of social marginalization and the dependence on social benefits, unemployment rate, non-inclusion in the compulsory education, criminality rate, and the type of pension insurance.
Keywords: Romania, social marginalization index, territorial disparities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19611527 Server Virtualization Using User Behavior Model Focus on Provisioning Concept
Authors: D. Prangchumpol
Abstract:
Server provisioning is one of the most attractive topics in virtualization systems. Virtualization is a method of running multiple independent virtual operating systems on a single physical computer. It is a way of maximizing physical resources to maximize the investment in hardware. Additionally, it can help to consolidate servers, improve hardware utilization and reduce the consumption of power and physical space in the data center. However, management of heterogeneous workloads, especially for resource utilization of the server, or so called provisioning becomes a challenge. In this paper, a new concept for managing workloads based on user behavior is presented. The experimental results show that user behaviors are different in each type of service workload and time. Understanding user behaviors may improve the efficiency of management in provisioning concept. This preliminary study may be an approach to improve management of data centers running heterogeneous workloads for provisioning in virtualization system.
Keywords: association rule, provisioning, server virtualization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17221526 Seismic Fragility for Sliding Failure of Weir Structure Considering the Process of Concrete Aging
Authors: HoYoung Son, Ki Young Kim, Woo Young Jung
Abstract:
This study investigated the change of weir structure performances when durability of concrete, which is the main material of weir structure, decreased due to their aging by mean of seismic fragility analysis. In the analysis, it was assumed that the elastic modulus of concrete was reduced by 10% in order to account for their aged deterioration. Additionally, the analysis of seismic fragility was based on Monte Carlo Simulation method combined with a 2D nonlinear finite element in ABAQUS platform with the consideration of deterioration of concrete. Finally, the comparison of seismic fragility of model pre- and post-deterioration was made to study the performance of weir. Results show that the probability of failure in moderate damage for deteriorated model was found to be larger than pre-deterioration model when peak ground acceleration (PGA) passed 0.4 g.Keywords: Weir, FEM, concrete, fragility, aging.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9201525 Anomalous Thermal Behavior of CuxMg1-xNb2O6 (x=0,0.4,0.6,1) for LTCC Substrate
Authors: Jyotirmayee Satapathy, M. V. Ramana Reddy
Abstract:
LTCC (Low Temperature Co-fired Ceramics) being the most advantageous technology towards the multilayer substrates for various applications, demands an extensive study of its raw materials. In the present work, a series of CuxMg1-xNb2O6 (x=0,0.4,0.6,1) has been prepared using sol-gel synthesis route and sintered at a temperature of 900°C to study its applicability for LTCC technology as the firing temperature is 900°C in this technology. The phase formation has been confirmed using X-ray Diffraction. Thermal properties like thermal conductivity and thermal expansion being very important aspect as the former defines the heat flow to avoid thermal instability in layers and the later provides the dimensional congruency of the dielectric material and the conductors, are studied here over high temperature up to the firing temperature. Although the values are quite satisfactory from substrate requirement point view, results have shown anomaly over temperature. The anomalous thermal behavior has been further analyzed using TG-DTA.
Keywords: Niobates, LTCC, Thermal conductivity, Thermal expansion, TG-DTA.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16271524 Implementation of Renewable Energy Technologies in Rural Africa
Authors: J. Levodo, A. Ford, I. Chaer
Abstract:
Africa enjoys some of the best solar radiation levels in the world averaging between 4-6 kWh/m2/day for most of the year and the global economic and political conditions that tend to make African countries more dependent on their own energy resources have caused growing interest in renewable energy based technologies. However to-date, implementation of modern Energy Technologies in Africa is still very low especially the use of solar conversion technologies. This paper presents literature review and analysis relating to the techno-economic feasibility of solar photovoltaic power generation in Africa. The literature is basically classified into the following four main categories. Techno-economic feasibility of solar photovoltaic power generation, design methods, performance evaluations of various systems and policy of potential future of technological development of photovoltaic (PV) in Africa by exploring the impact of alternative policy instruments and technology cost reductions on the financial viability of investing solar photovoltaic in Africa.
Keywords: Africa Solar Potential, Policy, Photovoltaic, Technologies.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31781523 Simulation Study for Performance Comparison of Routing Protocols in Mobile Adhoc Network
Authors: Ahmad Anzaar, Husain Shahnawaz, Chand Mukesh, S. C. Gupta, R. Gowri, H. L. Mandoria
Abstract:
Due to insufficient frequency band and tremendous growth of the mobile users, complex computation is needed for the use of resources. Long distance communication began with the introduction of telegraphs and simple coded pulses, which were used to transmit short messages. Since then numerous advances have rendered reliable transfer of information both easier and quicker. Wireless network refers to any type of computer network that is wireless, and is commonly associated with a telecommunications network whose interconnections between nodes is implemented without the use of wires. Wireless network can be broadly categorized in infrastructure network and infrastructure less network. Infrastructure network is one in which we have a base station to serve the mobile users and in the infrastructure less network is one in which no infrastructure is available to serve the mobile users this kind of networks are also known as mobile Adhoc networks. In this paper we have simulated the result for different scenarios with protocols like AODV and DSR; we simulated the result for throughput, delay and receiving traffic in the given scenario.
Keywords: Adhoc network, AODV, DSR. mobility.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21091522 The Relationship between Democracy, Freedom, and Economic Development
Authors: Ugur Karakaya, Hasan Bulent Kantarcı
Abstract:
In this study, firstly democratic thoughts which directly or indirectly affect economic development and/or the interaction between authoritarian regimes and the economic development and the direction and channels of this interaction were studied and then the study tried to determine how democracy affects economic development. It was concluded that the positive contributions of democracy to economic development were more determinant than the effects that were either negative or restrictive in terms of development. When compared to autocracy, since democracy is more successful in managing social conflicts, ensuring political stability and preventing social disasters such as famine, it contributes more to economic development. Democracy also facilitates delegation of authority, provides a stable investment environment and accelerates mobilization of resources in accordance with economic growth/development. Democracy leads to an increase in human capital accumulation and increases the growth rate through reducing income inequality. It can be said that democratic regimes are the most appropriate ones in terms of increasing economic performance and supporting economic development through their strong institutional structures and the assurance they will ensure in property rights.Keywords: Autocratic Regime, Democracy, Economic Development, Economic Freedom.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 56021521 Towards a Secure Storage in Cloud Computing
Authors: Mohamed Elkholy, Ahmed Elfatatry
Abstract:
Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.Keywords: Access control, data integrity, data confidentiality, Kerberos authentication, cloud security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17711520 Application the Queuing Theory in the Warehouse Optimization
Authors: Jaroslav Masek, Juraj Camaj, Eva Nedeliakova
Abstract:
The aim of optimization of store management is not only designing the situation of store management itself including its equipment, technology and operation. In optimization of store management we need to consider also synchronizing of technological, transport, store and service operations throughout the whole process of logistic chain in such a way that a natural flow of material from provider to consumer will be achieved the shortest possible way, in the shortest possible time in requested quality and quantity and with minimum costs. The paper deals with the application of the queuing theory for optimization of warehouse processes. The first part refers to common information about the problematic of warehousing and using mathematical methods for logistics chains optimization. The second part refers to preparing a model of a warehouse within queuing theory. The conclusion of the paper includes two examples of using queuing theory in praxis.
Keywords: Queuing theory, logistics system, mathematical methods, warehouse optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 65681519 Multi-Functional Insect Cuticles: Informative Designs for Man-Made Surfaces
Authors: Hsuan-Ming S Hu, Jolanta A Watson, Bronwen W Cribb, Gregory S Watson
Abstract:
Biomimicry has many potential benefits as many technologies found in nature are superior to their man-made counterparts. As technological device components approach the micro and nanoscale, surface properties such as surface adhesion and friction may need to be taken into account. Lowering surface adhesion by manipulating chemistry alone might no longer be sufficient for such components and thus physical manipulation may be required. Adhesion reduction is only one of the many surface functions displayed by micro/nano-structured cuticles of insects. Here, we present a mini review of our understanding of insect cuticle structures and the relationship between the structure dimensions and the corresponding functional mechanisms. It may be possible to introduce additional properties to material surfaces (indeed multi-functional properties) based on the design of natural surfaces.Keywords: Biomimicry, micro/nanostructures, self-cleaning surfaces, superhydrophobicity
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18921518 Anomaly Based On Frequent-Outlier for Outbreak Detection in Public Health Surveillance
Authors: Zalizah Awang Long, Abdul Razak Hamdan, Azuraliza Abu Bakar
Abstract:
Public health surveillance system focuses on outbreak detection and data sources used. Variation or aberration in the frequency distribution of health data, compared to historical data is often used to detect outbreaks. It is important that new techniques be developed to improve the detection rate, thereby reducing wastage of resources in public health. Thus, the objective is to developed technique by applying frequent mining and outlier mining techniques in outbreak detection. 14 datasets from the UCI were tested on the proposed technique. The performance of the effectiveness for each technique was measured by t-test. The overall performance shows that DTK can be used to detect outlier within frequent dataset. In conclusion the outbreak detection technique using anomaly-based on frequent-outlier technique can be used to identify the outlier within frequent dataset.
Keywords: Outlier detection, frequent-outlier, outbreak, anomaly, surveillance, public health
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22741517 Learning Object Interface Adapted to the Learner's Learning Style
Authors: Zenaide Carvalho da Silva, Leandro Rodrigues Ferreira, Andrey Ricardo Pimentel
Abstract:
Learning styles (LS) refer to the ways and forms that the student prefers to learn in the teaching and learning process. Each student has their own way of receiving and processing information throughout the learning process. Therefore, knowing their LS is important to better understand their individual learning preferences, and also, understand why the use of some teaching methods and techniques give better results with some students, while others it does not. We believe that knowledge of these styles enables the possibility of making propositions for teaching; thus, reorganizing teaching methods and techniques in order to allow learning that is adapted to the individual needs of the student. Adapting learning would be possible through the creation of online educational resources adapted to the style of the student. In this context, this article presents the structure of a learning object interface adaptation based on the LS. The structure created should enable the creation of the adapted learning object according to the student's LS and contributes to the increase of student’s motivation in the use of a learning object as an educational resource.
Keywords: Adaptation, interface, learning object, learning style.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9861516 Overviews of Rainwater Harvesting and Utilization in Thailand: Bangsaiy Municipality
Authors: N. Areerachakul
Abstract:
In developing countries located in monsoon areas like Thailand where rainwater is currently of no value for urban dwellers due to easily access to piped water supply at each household, studies in rainwater harvesting for domestic use are of low interest. However it is needed to undertake research to find out appropriate rainwater harvesting systems particularly for small urban communities that are recently developed from a full rural structure to urban context. As a matter of fact, in such transitional period, relying on only common water resources is risky. With some specific economic settings, land use patterns, and historical and cultural context that dominate perceptions of water users in the study area, the level of service in this study may certainly be different from megacities or cities located in industrial zone. The overviews of some available technologies and background of rainwater harvesting including alternate resource are included in this paper. Among other sources of water supply, ground water use as the water resource of Thailand and also in the study area.Keywords: Developing country, water supply, rainwater, ground water.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25771515 Facebook Spam and Spam Filter Using Artificial Neural Networks
Authors: Fahim A., Mutahira N. Naseem
Abstract:
Spam is any unwanted electronic message or material in any form posted too many people. As the world is growing as global world, social networking sites play an important role in making world global providing people from different parts of the world a platform to meet and express their views. Among different social networking sites Facebook become the leading one. With increase in usage different users start abusive use of Facebook by posting or creating ways to post spam. This paper highlights the potential spam types nowadays Facebook users’ faces. This paper also provide the reason how user become victim to spam attack. A methodology is proposed in the end discusses how to handle different types of spam.
Keywords: Artificial neural networks, Facebook spam, social networking sites, spam filter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3138