Search results for: Information Gain Ratio
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6099

Search results for: Information Gain Ratio

4479 Improving the LDMOS Temperature Compensation Bias Circuit to Optimize Back-Off

Authors: Antonis Constantinides, Christos Yiallouras, Christakis Damianou

Abstract:

The application of today's semiconductor transistors in high power UHF DVB-T linear amplifiers has evolved significantly by utilizing LDMOS technology. This fact provides engineers with the option to design a single transistor signal amplifier which enables output power and linearity that was unobtainable previously using bipolar junction transistors or later type first generation MOSFETS. The quiescent current stability in terms of thermal variations of the LDMOS guarantees a robust operation in any topology of DVB-T signal amplifiers. Otherwise, progressively uncontrolled heat dissipation enhancement on the LDMOS case can degrade the amplifier’s crucial parameters in regards to the gain, linearity and RF stability, resulting in dysfunctional operation or a total destruction of the unit. This paper presents one more sophisticated approach from the traditional biasing circuits used so far in LDMOS DVB-T amplifiers. It utilizes a microprocessor control technology, providing stability in topologies where IDQ must be perfectly accurate.

Keywords: Amplifier, DVB-T, LDMOS, MOSFETS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3238
4478 Temperature Control of Industrial Water Cooler using Hot-gas Bypass

Authors: Jung-in Yoon, Seung-taek Oh, Seung-moon Baek, Jun-hyuk Choi, Jong-yeong Byun, Seok-kwon Jeong, Choon-guen Moon

Abstract:

In this study, we experiment on precise control outlet temperature of water from the water cooler with hot-gas bypass method based on PI control logic for machine tool. Recently, technical trend for machine tools is focused on enhancement of speed and accuracy. High speedy processing causes thermal and structural deformation of objects from the machine tools. Water cooler has to be applied to machine tools to reduce the thermal negative influence with accurate temperature controlling system. The goal of this study is to minimize temperature error in steady state. In addition, control period of an electronic expansion valve were considered to increment of lifetime of the machine tools and quality of product with a water cooler.

Keywords: Hot-gas bypass, Water cooler, PI control, Electronic Expansion Valve, Gain tuning

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3135
4477 Agent Decision using Granular Computing in Traffic System

Authors: Yasser F. Hassan, Marwa Abdeen, Mustafa Fahmy

Abstract:

In recent years multi-agent systems have emerged as one of the interesting architectures facilitating distributed collaboration and distributed problem solving. Each node (agent) of the network might pursue its own agenda, exploit its environment, develop its own problem solving strategy and establish required communication strategies. Within each node of the network, one could encounter a diversity of problem-solving approaches. Quite commonly the agents can realize their processing at the level of information granules that is the most suitable from their local points of view. Information granules can come at various levels of granularity. Each agent could exploit a certain formalism of information granulation engaging a machinery of fuzzy sets, interval analysis, rough sets, just to name a few dominant technologies of granular computing. Having this in mind, arises a fundamental issue of forming effective interaction linkages between the agents so that they fully broadcast their findings and benefit from interacting with others.

Keywords: Granular computing, rough sets, agents, traffic system.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1706
4476 Effects of Maternal Nutrition at Different Stages of Pregnancy in Bali Cows on Growth Performance of the Offspring to Weaning

Authors: D. P. Rahardja, A. L. Toleng, M. Yusuf

Abstract:

The objective of this study was to investigate the lifelong effect of in utero nutrition fed at different stages of pregnancy in Bali cows (n = 40): (U1) without in utero nutrition (0 – parturition, negative control); (U2) 0 – 90 d of gestation; (U3) 90 - 180 d of gestation; (U4) 180 d – parturition; and (U5) in utero nutrition along gestation period (0 d to parturition – positive control) on the growth performance of the offspring to weaning age. The results indicated that effect of maternal nutrition on male and female offspring were particularly indicated by the growth performance of both the male and female offspring from birth to weaning.

Keywords: Bali cows, birth weight, maternal nutrition, preweaning daily gain, weaning weight.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1776
4475 Roles of Early Warning in Sea and Coast Guard Activity in Indonesia: Bakorkamla Integrated Information System

Authors: Tuti Ida Halida

Abstract:

This paper will define the system that minimize the risk of the ship accidents because of high or dangerous waves namely early warning system. Since Indonesia is located in a strategic position, many internasional vessels pass by the Indonesian Sea Lanes. Therefore many issues often occur in Indonesian waters, one of the issues is the shipwreck because of dangerous waves. In order to do the preventive action for the vessels that indicated exposed the dangerous waves, Indonesian Maritime Security Coordinating Board or Bakorkamla, has built up and implemented an early warning system through integrated system, called Bakorkamla Integrated Information System (BIIS). By implementing BIIS means that Bakorkamla has already done one of the Five Principles of Sea and Coast Guard Agency, which is safety and security, and Bakorkamla also has already saved the lives of many people on the ship that will have an accident due to high waves. 

Keywords: Early Warning System, Integrated Information System, Sea and Coast Guard, Principles.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2700
4474 Discrete Polynomial Moments and Savitzky-Golay Smoothing

Authors: Paul O'Leary, Matthew Harker

Abstract:

This paper presents unified theory for local (Savitzky- Golay) and global polynomial smoothing. The algebraic framework can represent any polynomial approximation and is seamless from low degree local, to high degree global approximations. The representation of the smoothing operator as a projection onto orthonormal basis functions enables the computation of: the covariance matrix for noise propagation through the filter; the noise gain and; the frequency response of the polynomial filters. A virtually perfect Gram polynomial basis is synthesized, whereby polynomials of degree d = 1000 can be synthesized without significant errors. The perfect basis ensures that the filters are strictly polynomial preserving. Given n points and a support length ls = 2m + 1 then the smoothing operator is strictly linear phase for the points xi, i = m+1. . . n-m. The method is demonstrated on geometric surfaces data lying on an invariant 2D lattice.

Keywords: Gram polynomials, Savitzky-Golay Smoothing, Discrete Polynomial Moments

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2755
4473 Best Combination of Design Parameters for Buildings with Buckling-Restrained Braces

Authors: Ángel de J. López-Pérez, Sonia E. Ruiz, Vanessa A. Segovia

Abstract:

Buildings vulnerability due to seismic activity has been highly studied since the middle of last century. As a solution to the structural and non-structural damage caused by intense ground motions, several seismic energy dissipating devices, such as buckling-restrained braces (BRB), have been proposed. BRB have shown to be effective in concentrating a large portion of the energy transmitted to the structure by the seismic ground motion. A design approach for buildings with BRB elements, which is based on a seismic Displacement-Based formulation, has recently been proposed by the coauthors in this paper. It is a practical and easy design method which simplifies the work of structural engineers. The method is used here for the design of the structure-BRB damper system. The objective of the present study is to extend and apply a methodology to find the best combination of design parameters on multiple-degree-of-freedom (MDOF) structural frame – BRB systems, taking into account simultaneously: 1) initial costs and 2) an adequate engineering demand parameter. The design parameters considered here are: the stiffness ratio (α = Kframe/Ktotal), and the strength ratio (γ = Vdamper/Vtotal); where K represents structural stiffness and V structural strength; and the subscripts "frame", "damper" and "total" represent: the structure without dampers, the BRB dampers and the total frame-damper system, respectively. The selection of the best combination of design parameters α and γ is based on an initial costs analysis and on the structural dynamic response of the structural frame-damper system. The methodology is applied to a 12-story 5-bay steel building with BRB, which is located on the intermediate soil of Mexico City. It is found the best combination of design parameters α and γ for the building with BRB under study.

Keywords: Best combination of design parameters, BRB, buildings with energy dissipating devices, buckling-restrained braces, initial costs.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1159
4472 Enhancing Thermal Efficiency of Double Skin Façade Buildings in Semi-Arid Climate

Authors: Farid Vahedi

Abstract:

There is a great deal of interest in constructing Double Skin Facade (DSF) structures which are considered as modern movement in field of Energy Conservation, renewable energies, and Architecture design. This trend provides many conclusive alternatives which are frequently associated with sustainable building. In this paper a building with Double Skin Facade is considered in the semiarid climate of Tehran, Iran, in order to consider the DSF-s performance during hot seasons. Mathematical formulations calculate solar heat gain by the external skin. Moreover, Computational Fluid Dynamics (CFD) simulations were performed on the case study building to enhance effectiveness of the facade. The conclusion divulged difference of gained energy by the cavity and room with and without blind and louvers. Some solutions were introduced to surge the performance of natural ventilation by plunging the cooling loads in summer.

Keywords: Double Skin Façade Buildings, Energy Conservation, Renewable Energy, Natural Ventilation, Semi-arid Climate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5398
4471 The Relationship of Building Information Modeling (BIM) Capability in Quantity Surveying Practice and Project Performance

Authors: P. F. Wong, H. Salleh, F. A. Rahim

Abstract:

The adoption of building information modeling (BIM) is increasing in the construction industry. However, quantity surveyors are slow in adoption compared to other professions due to lack of awareness of the BIM’s potential in their profession. It is still unclear on how BIM application can enhance quantity surveyors’ work performance and project performance. The aim of this research is to identify the capabilities of BIM in quantity surveying practices and examine the relationship between BIM capabilities and project performance. Questionnaire survey and interviews were adopted for data collection. Literature reviews identified there are eleven BIM capabilities in quantity surveying practice. Questionnaire results showed that there are several BIM capabilities significantly correlated with project performance in time, cost and quality aspects and the results were validated through interviews. These findings show that BIM has the capabilities to enhance quantity surveyors’ performances and subsequently improved project performance.

Keywords: Building information modeling (BIM), quantity surveyors, capability, project performance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7231
4470 Embedded Semi-Fragile Signature Based Scheme for Ownership Identification and Color Image Authentication with Recovery

Authors: M. Hamad Hassan, S.A.M. Gilani

Abstract:

In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three LSBs of each central 2×2 sub-block are set to zero to hold the ownership, authentication and recovery information. The size & position of sub-block is important for correct localization, enhanced security & fast computation. As YS ÔèÑ T so it is suitable to embed the recovery information apart from the ownership and authentication information, therefore 4×4 block of T channel along with ownership information is then deployed by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. H(m)=H(m'). For recovery, intensity mean of 4x4 block of each channel is computed and encoded upto eight bits. For watermark embedding, key based mapping of blocks is performed using 2DTorus Automorphism. Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one.

Keywords: Hash Collision, LSB, MD5, PSNR, SHA160

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1498
4469 Effect of Core Stability Ex ercises on Trunk Muscle Balance in Healthy Adult Individuals

Authors: Amira A. A. Abdallah, Amir A. Beltagi

Abstract:

Background: Core stability training has recently attracted attention for improving muscle balance and optimizing performance in healthy and unhealthy individuals. Purpose: This study investigated the effect of beginner’s core stability exercises on trunk flexors’/extensors’ peak torque ratio and trunk flexors’ and extensors’ peak torques. Methods: Thirty five healthy individuals participated in the study. They were randomly assigned to two groups; experimental “group I, n=20” and control “group II, n=15”. Their mean age, weight and height were 20.7±2.4 vs. 20.3±0.61 years, 66.5±12.1 vs. 68.57±12.2 kg and 166.7±7.8 vs. 164.28 ±7.59 cm. for group I vs. group II. Data were collected using the Biodex Isokinetic system. The participants were tested twice; before and after a 6-week period during which group I performed a core stability training program. Results: The 2x2 Mixed Design ANOVA revealed that there were no significant differences (p>0.025) in the trunk flexors’/extensors’ peak torque ratio between the pre-test and post-test conditions for either group. Moreover, there were no significant differences (p>0.025) in the trunk flexion/extension ratios between both groups at either condition. However, the 2x2 Mixed Design MANOVA revealed significant increases (p<0.025) in the trunk flexors’ and extensors’ peak torques in the post-test condition compared with the pre-test in group I with no significant differences (p>0.025) in group II. Moreover, there was a significant increase (p<0.025) in the trunk flexors’ peak torque only in group I compared with group II in the post-test condition with no significant differences in the other conditions. Interpretation/Conclusion: The improvement in muscle performance indicated by the increase in the trunk flexors’ and extensors’ peak torques in the experimental group recommends including core stability training in the exercise programs that aim to improve muscle performance.

Keywords: Core Stability, Isokinetic, Trunk Muscles.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3655
4468 A Novel Multiplex Real-Time PCR Assay Using TaqMan MGB Probes for Rapid Detection of Trisomy 21

Authors: Mehrdad Hashemi, Mitra Behrooz Aghdam, Reza Mahdian, Ahmad Reza Kamyab

Abstract:

Cytogenetic analysis still remains the gold standard method for prenatal diagnosis of trisomy 21 (Down syndrome, DS). Nevertheless, the conventional cytogenetic analysis needs live cultured cells and is too time-consuming for clinical application. In contrast, molecular methods such as FISH, QF-PCR, MLPA and quantitative Real-time PCR are rapid assays with results available in 24h. In the present study, we have successfully used a novel MGB TaqMan probe-based real time PCR assay for rapid diagnosis of trisomy 21 status in Down syndrome samples. We have also compared the results of this molecular method with corresponding results obtained by the cytogenetic analysis. Blood samples obtained from DS patients (n=25) and normal controls (n=20) were tested by quantitative Real-time PCR in parallel to standard G-banding analysis. Genomic DNA was extracted from peripheral blood lymphocytes. A high precision TaqMan probe quantitative Real-time PCR assay was developed to determine the gene dosage of DSCAM (target gene on 21q22.2) relative to PMP22 (reference gene on 17p11.2). The DSCAM/PMP22 ratio was calculated according to the formula; ratio=2 -ΔΔCT. The quantitative Real-time PCR was able to distinguish between trisomy 21 samples and normal controls with the gene ratios of 1.49±0.13 and 1.03±0.04 respectively (p value <0.001). These results represent the presence of 3 copies of target gene in DS samples Vs 2 copies in normal controls. The results of quantitative Real-time PCR were in complete agreement with results of cytogenetic analysis. This study confirms previous reports regarding successful implementation of quantitative Real-time PCR for detection of trisomy 21. However, the assay has been improved by using MGB probes and more accurate data analysis. This assay, in particular, when performed in combination with another molecular assay such as QF-PCR or MLPA, can be used as a reliable technique for rapid prenatal diagnosis of trisomy 21.

Keywords: Trisomy 21, Real-time PCR, MGB-TaqMan Probes, Gene Dosage.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2516
4467 The Role of the Ethnos of Intellect in Legal and Informatical Observation of “Information Society“

Authors: Guranda Tevdoradze

Abstract:

By the end of XX century in the structure of humanity some changes have been provoked: a new ethnos - Ethnos of Intellect is formed and is still being formed, beside the historical types of ethnoses: open ethnos, closed ethnos, wandering ethnos, dead ethnos, - and this event was caused by the technical progress, development of informational and transport communications, especially - by creation of Internet. The Ethnos of Intellect is something very close to the ÔÇ×Information Society“ described by J. Ellule and Y. Masuda that was regarded as the culture of XXI century, being an antithesis for technical and technicistical civilizations, but it-s necessary to indicate also the essential difference between these concepts: the Ethnos of Intellect is the antithesis of Socium. The existence of such an ethnos within human society that has already become an Information Society itself is extremely important in observing legally and informatically a new kind of reins in the hands of the political power, revealing every attempt to violate the human rights of simple citizens. A concrete example of some conjunction points of legal informatics and informatical law in a certain kind of ambiental studies of the project ''State Registre of Population'' in Russia is very eloquent.

Keywords: Culturology, Legal Informatics, Sociology of Groups.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1526
4466 ‘The Right to Information’: A Malaysian Political Blog Readers’ Perspective

Authors: Norraihan Zakaria, Abdul Rahman Othman

Abstract:

Political blogs are one of the pivotal alternative communication channels for political news in Malaysia. Many have argued that the mushrooming of political blogs nurtures the effective realization of human rights in the country. The paper studies the ‘Malaysian political blog readers–human rights’ relationship by exploring these questions: Has traditional mainstream media become obsolete with the rise of political blogosphere? Why do blog readers visit political blogs? A survey was conducted and the findings revealed that traditional mainstream media is still a pertinent source for political news in the country. Apart from acquiring the latest political updates quickly and at anytime, blog readers compare the news published in political blogs with the ones reported in traditional mainstream media. This suggests that freedom of information is deemed as one of the prime motives for Malaysian blog readers clinging to political blogosphere.

Keywords: Freedom of information, Human rights, Malaysian political blog readers, Malaysian political blogosphere.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2014
4465 Intelligent Automatic Generation Control of Two Area Interconnected Power System using Hybrid Neuro Fuzzy Controller

Authors: Sathans, A. Swarup

Abstract:

This paper presents the development and application of an adaptive neuro fuzzy inference system (ANFIS) based intelligent hybrid neuro fuzzy controller for automatic generation control (AGC) of two-area interconnected thermal power system with reheat non linearity. The dynamic response of the system has been studied for 1% step load perturbation in area-1. The performance of the proposed neuro fuzzy controller is compared against conventional proportional-integral (PI) controller, state feedback linear quadratic regulator (LQR) controller and fuzzy gain scheduled proportionalintegral (FGSPI) controller. Comparative analysis demonstrates that the proposed intelligent neuro fuzzy controller is the most effective of all in improving the transients of frequency and tie-line power deviations against small step load disturbances. Simulations have been performed using Matlab®.

Keywords: Automatic generation control, ANFIS, LQR, Hybrid neuro fuzzy controller

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2664
4464 KM for Solving Economic Problem and Poverty in Community: a Case from Thailand

Authors: Usa Sutthisakorn, Samchai Jirapatarasil

Abstract:

This paper aims to present knowledge management for solving economic problem and poverty in Thai community. A community in Thailand is studied as a case study for master plan or social and economic plan which derived form the research people conducted by themselves in their community. The result shows that community uses knowledge management in recording income and expense, analyzing their consumption, and then systematic planning of the production, distribution and consumption in the community. Besides, community enterprises, that people create as the by-products of master plan, can facilitate diverse economic activities which are able to reduce economic problem and poverty. The knowledge that people gain from solving their problem through building community enterprises are both tacit and explicit knowledge. Four styles of knowledge conversion: socialization,externalization, combination and internalization, are used. Besides, knowledge sharing inside the organization, between organizations and its environment are found. Keywordsknowledge management, community enterprise, Thailand.

Keywords: knowledge management, community enterprise, Thailand

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1467
4463 Catalytical Effect of Fluka 05120 on Methane Decomposition

Authors: Vidyasagar Shilapuram, Nesrin Ozalp, Anam Waheed

Abstract:

Carboneous catalytical methane decomposition is an attractive process because it produces two valuable products: hydrogen and carbon. Furthermore, this reaction does not emit any green house or hazardous gases. In the present study, experiments were conducted in a thermo gravimetric analyzer using Fluka 05120 as carboneous catalyst to analyze its effectiveness in methane decomposition. Various temperatures and methane partial pressures were chosen and carbon mass gain was observed as a function of time. Results are presented in terms of carbon formation rate, hydrogen production and catalytical activity. It is observed that there is linearity in carbon deposition amount by time at lower reaction temperature (780 °C). On the other hand, it is observed that carbon and hydrogen formation rates are increased with increasing temperature. Finally, we observed that the carbon formation rate is highest at 950 °C within the range of temperatures studied.

Keywords: Catalysis, Fluka 05120, Hydrogen production, Methane decomposition

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1872
4462 A New Image Encryption Approach using Combinational Permutation Techniques

Authors: A. Mitra, Y. V. Subba Rao, S. R. M. Prasanna

Abstract:

This paper proposes a new approach for image encryption using a combination of different permutation techniques. The main idea behind the present work is that an image can be viewed as an arrangement of bits, pixels and blocks. The intelligible information present in an image is due to the correlations among the bits, pixels and blocks in a given arrangement. This perceivable information can be reduced by decreasing the correlation among the bits, pixels and blocks using certain permutation techniques. This paper presents an approach for a random combination of the aforementioned permutations for image encryption. From the results, it is observed that the permutation of bits is effective in significantly reducing the correlation thereby decreasing the perceptual information, whereas the permutation of pixels and blocks are good at producing higher level security compared to bit permutation. A random combination method employing all the three techniques thus is observed to be useful for tactical security applications, where protection is needed only against a casual observer.

Keywords: Encryption, Permutation, Good key, Combinationalpermutation, Pseudo random index generator.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2211
4461 The Importance of Conserving Pre-Historical, Historical and Cultural Heritage and Its Tourist Exploitation

Authors: Diego Renan G. Tudela, Veruska C. Dutra, Mary Lucia Gomes Silveira de Senna, Afonso R. Aquino

Abstract:

Tourism in the present is the largest industry in the world, being an important global activity that has grown a lot in recent times. In this context, the activity of cultural tourism is growing, being seen as an important source of knowledge and information enjoyed by visitors. This article aims to discuss the cultural tourism, archaeological records and indigenous communities and the importance of preserving these invaluable sources of information, focusing on the records of the first peoples inhabiting the South American and North American lands. The study was based on discussions, theoretical studies, bibliographical research. Archaeological records are an important source of knowledge and information. Indigenous ethnic tourism represents a rescue of the authenticity of indigenous traditional cultures and their relation to the natural habitat. Cultural and indigenous tourism activity requires long-term planning to make it a sustainable activity.

Keywords: Tourism, culture, preservation, discussions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 811
4460 A Comparative Study on the Creativity of Organizations in Office Management and Secretarial Work and the Assessment of Creativity among Students Training in This Field

Authors: Mehmet Altınöz

Abstract:

Today, the working areas put forward the administration of change. In order to provide this; it is required from the organizations to be creative. Professional creativity in offices depends on an environment that enables the development of the organization only after the individual or collective exertions within the organization. By providing this environment, the organization will gain efficiency, productivity, and work pleasure. In order to bring up the workforce appropriate to the related expectations, the professional creativity of the office management and secretarial profession candidates should be evaluated, education programs appropriate to this and related directly with the service quality should be prepared and the future of this profession should be directed. The aim of this study is to ensure the attention to improve the prepared education program as well as the creative thoughts and their applications, when carrying out an office management and secretarial training. 144 students took place in this research and a questionnaire of 48 questions was carried out.

Keywords: Creativity, professional creativity, creativity evaluation, office management, secretarial

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1182
4459 String Searching in Dispersed Files using MDS Convolutional Codes

Authors: A. S. Poornima, R. Aparna, B. B. Amberker, Prashant Koulgi

Abstract:

In this paper, we propose use of convolutional codes for file dispersal. The proposed method is comparable in complexity to the information Dispersal Algorithm proposed by M.Rabin and for particular choices of (non-binary) convolutional codes, is almost as efficient as that algorithm in terms of controlling expansion in the total storage. Further, our proposed dispersal method allows string search.

Keywords: Convolutional codes, File dispersal, Filereconstruction, Information Dispersal Algorithm, String search.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1258
4458 An Application of Geographic Information System to Select Areas for Sanitary Landfill in Bang Nok- Khwaek Municipality

Authors: Musthaya Patchanee

Abstract:

The study of Sanitary landfill in Bang Nok-khwaek municipality consists of two procedures. First, to survey and create the spatial database by using physical factor, environmental factor, economical factor and social factor to follow the method of Geographic information system: GIS, second, to analyze the proper spatial for allocating the sanitary landfill in Bang Nok-khwaek municipality by using Overlay techniques to calculate the weighting linear total in Arc GIS program. The study found that there are 2.49 sq.km. proper spatial for the sanitary landfill in Bang Nok-khwaek municipals city which is 66.76% of the whole area. The highest proper spatial is 0.02 sq.km. which is 0.54%, The high proper spatial is 0.3 sq.km. which is 8.04%, the moderate spatial is 1.62 sq.km. which is 43.43% and the low proper spatial is 0.55 sq.km. which is 14.75%. These results will be used as the guideline to select the sanitary landfill area in accordance with sanitation standard for Subdistrict Administrative Organization and Subbdistrict Municipality in Samut Songkhram provice.

Keywords: An application of Geographic Information System, select areas for sanitary landfill and Bang Nok-khwaek municipality.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1142
4457 Evaluation of Natural Drainage Flow Pattern, Necessary for Flood Control, Using Digitized Topographic Information: A Case Study of Bayelsa State Nigeria

Authors: Collins C. Chiemeke

Abstract:

The need to evaluate and understand the natural drainage pattern in a flood prone, and fast developing environment is of paramount importance. This information will go a long way to help the town planners to determine the drainage pattern, road networks and areas where prominent structures are to be located. This research work was carried out with the aim of studying the Bayelsa landscape topography using digitized topographic information, and to model the natural drainage flow pattern that will aid the understanding and constructions of workable drainages. To achieve this, digitize information of elevation and coordinate points were extracted from a global imagery map. The extracted information was modeled into 3D surfaces. The result revealed that the average elevation for Bayelsa State is 12 m above sea level. The highest elevation is 28 m, and the lowest elevation 0 m, along the coastline. In Yenagoa the capital city of Bayelsa were a detail survey was carried out showed that average elevation is 15 m, the highest elevation is 25 m and lowest is 3 m above the mean sea level. The regional elevation in Bayelsa, showed a gradation decrease from the North Eastern zone to the South Western Zone. Yenagoa showed an observed elevation lineament, were low depression is flanked by high elevation that runs from the North East to the South west. Hence, future drainages in Yenagoa should be directed from the high elevation, from South East toward the North West and from the North West toward South East, to the point of convergence which is at the center that flows from South East toward the North West. Bayelsa when considered on a regional Scale, the flow pattern is from the North East to the South West, and also North South. It is recommended that in the event of any large drainage construction at municipal scale, it should be directed from North East to the South West or from North to South. Secondly, detail survey should be carried out to ascertain the local topography and the drainage pattern before the design and construction of any drainage system in any part of Bayelsa.

Keywords: Bayelsa, Digitized Topographic Information, Drainage, Flood.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2235
4456 Parallel Vector Processing Using Multi Level Orbital DATA

Authors: Nagi Mekhiel

Abstract:

Many applications use vector operations by applying single instruction to multiple data that map to different locations in conventional memory. Transferring data from memory is limited by access latency and bandwidth affecting the performance gain of vector processing. We present a memory system that makes all of its content available to processors in time so that processors need not to access the memory, we force each location to be available to all processors at a specific time. The data move in different orbits to become available to other processors in higher orbits at different time. We use this memory to apply parallel vector operations to data streams at first orbit level. Data processed in the first level move to upper orbit one data element at a time, allowing a processor in that orbit to apply another vector operation to deal with serial code limitations inherited in all parallel applications and interleaved it with lower level vector operations.

Keywords: Memory organization, parallel processors, serial code, vector processing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1041
4455 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards health information application in Smart National Identity Card. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the factors of trust, perceived risk, Privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. Empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: Unified Theory of Acceptance and Use of Technology (UTAUT) model, UTAUT2 model, Smart National Identity Card (SNIC), Health information application, Privacy Calculus Model (PCM).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2984
4454 Mitigation of Radiation Levels for Base Transceiver Stations based on ITU-T Recommendation K.70

Authors: Reyes C., Ramos B.

Abstract:

This essay presents applicative methods to reduce human exposure levels in the area around base transceiver stations in a environment with multiple sources based on ITU-T recommendation K.70. An example is presented to understand the mitigation techniques and their results and also to learn how they can be applied, especially in developing countries where there is not much research on non-ionizing radiations.

Keywords: Electromagnetic fields (EMF), human exposure limits, intentional radiator, cumulative exposure ratio, base transceiver station (BTS), radiation levels.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2672
4453 On Musical Information Geometry with Applications to Sonified Image Analysis

Authors: Shannon Steinmetz, Ellen Gethner

Abstract:

In this paper a theoretical foundation is developed to segment, analyze and associate patterns within audio. We explore this on imagery via sonified audio applied to our segmentation framework. The approach involves a geodesic estimator within the statistical manifold, parameterized by musical centricity. We demonstrate viability by processing a database of random imagery to produce statistically significant clusters of similar imagery content.

Keywords: Sonification, musical information geometry, image content extraction, automated quantification, audio segmentation, pattern recognition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 376
4452 Signal Driven Sampling and Filtering a Promising Approach for Time Varying Signals Processing

Authors: Saeed Mian Qaisar, Laurent Fesquet, Marc Renaudin

Abstract:

The mobile systems are powered by batteries. Reducing the system power consumption is a key to increase its autonomy. It is known that mostly the systems are dealing with time varying signals. Thus, we aim to achieve power efficiency by smartly adapting the system processing activity in accordance with the input signal local characteristics. It is done by completely rethinking the processing chain, by adopting signal driven sampling and processing. In this context, a signal driven filtering technique, based on the level crossing sampling is devised. It adapts the sampling frequency and the filter order by analysing the input signal local variations. Thus, it correlates the processing activity with the signal variations. It leads towards a drastic computational gain of the proposed technique compared to the classical one.

Keywords: Level Crossing Sampling, Activity Selection, Adaptive Rate Filtering, Computational Complexity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1345
4451 Design of Encoding Calculator Software for Huffman and Shannon-Fano Algorithms

Authors: Wilson Chanhemo, Henry. R. Mgombelo, Omar F Hamad, T. Marwala

Abstract:

This paper presents a design of source encoding calculator software which applies the two famous algorithms in the field of information theory- the Shannon-Fano and the Huffman schemes. This design helps to easily realize the algorithms without going into a cumbersome, tedious and prone to error manual mechanism of encoding the signals during the transmission. The work describes the design of the software, how it works, comparison with related works, its efficiency, its usefulness in the field of information technology studies and the future prospects of the software to engineers, students, technicians and alike. The designed “Encodia" software has been developed, tested and found to meet the intended requirements. It is expected that this application will help students and teaching staff in their daily doing of information theory related tasks. The process is ongoing to modify this tool so that it can also be more intensely useful in research activities on source coding.

Keywords: Coding techniques, Coding algorithms, Codingefficiency, Encodia, Encoding software.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3452
4450 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: Channel estimation, inter-cell interference, pilot contamination attacks, wireless communications.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 656