Search results for: Demand side management
2207 Customization of Moodle Open Source LMS for Tanzania Secondary Schools’ Use
Authors: Ellen. A. Kalinga
Abstract:
Moodle is an open source learning management system that enables creation of a powerful and flexible learning environment. Many organizations, especially learning institutions have customized Moodle open source LMS for their own use. In general open source LMSs are of great interest due to many advantages they offer in terms of cost, usage and freedom to customize to fit a particular context. Tanzania Secondary School e- Learning (TanSSe-L) system is the learning management system for Tanzania secondary schools. TanSSe-L system was developed using a number of methods, one of them being customization of Moodle Open Source LMS. This paper presents few areas on the way Moodle OS LMS was customized to produce a functional TanSSe-L system fitted to the requirements and specifications of Tanzania secondary schools’ context.
Keywords: LMS, Moodle, e-Learning, Tanzania, Secondary school.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37362206 System Reliability by Prediction of Generator Output and Losses in a Competitive Energy Market
Authors: Perumal Nallagownden, Ravindra N. Mukerjee, Syafrudin Masri
Abstract:
In a competitive energy market, system reliability should be maintained at all times. Power system operation being of online in nature, the energy balance requirements must be satisfied to ensure reliable operation the system. To achieve this, information regarding the expected status of the system, the scheduled transactions and the relevant inputs necessary to make either a transaction contract or a transmission contract operational, have to be made available in real time. The real time procedure proposed, facilitates this. This paper proposes a quadratic curve learning procedure, which enables a generator-s contribution to the retailer demand, power loss of transaction in a line at the retail end and its associated losses for an oncoming operating scenario to be predicted. Matlab program was used to test in on a 24-bus IEE Reliability Test System, and the results are found to be acceptable.Keywords: Deregulation, learning coefficients, reliability, prediction, competitive energy market.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14782205 Model of Continuous Cheese Whey Fermentation by Candida Pseudotropicalis
Authors: Rudy Agustriyanto, Akbarningrum Fatmawati
Abstract:
The utilization of cheese whey as a fermentation substrate to produce bio-ethanol is an effort to supply bio-ethanol demand as a renewable energy. Like other process systems, modeling is also required for fermentation process design, optimization and plant operation. This research aims to study the fermentation process of cheese whey by applying mathematics and fundamental concept in chemical engineering, and to investigate the characteristic of the cheese whey fermentation process. Steady state simulation results for inlet substrate concentration of 50, 100 and 150 g/l, and various values of hydraulic retention time, showed that the ethanol productivity maximum values were 0.1091, 0.3163 and 0.5639 g/l.h respectively. Those values were achieved at hydraulic retention time of 20 hours, which was the minimum value used in this modeling. This showed that operating reactor at low hydraulic retention time was favorable. Model of bio-ethanol production from cheese whey will enhance the understanding of what really happen in the fermentation process.Keywords: Cheese whey, ethanol, fermentation, modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18192204 Case Study Analysis of 2017 European Railway Traffic Management Incident: The Application of System for Investigation of Railway Interfaces Methodology
Authors: Sanjeev Kumar Appicharla
Abstract:
This paper presents the results of the modelling and analysis of the European Railway Traffic Management (ERTMS) safety critical incident to raise awareness of biases in systems engineering process on the Cambrian Railway in the UK using the RAIB 17/2019 as a primary input. The RAIB, the UK independent accident investigator, published the Report- RAIB 17/2019 giving the details of their investigation of the focal event in the form of immediate cause, causal factors and underlying factors and recommendations to prevent a repeat of the safety-critical incident on the Cambrian Line. The Systems for Investigation of Railway Interfaces (SIRI) is the Methodology used to model and analyse the safety-critical incident. The SIRI Methodology uses the Swiss Cheese Model to model the incident and identify latent failure conditions (potentially less than adequate conditions) by means of the Management Oversight and Risk Tree technique. The benefits of the SIRI Methodology are threefold: first is that it incorporates “Heuristics and Biases” approach, in the Management Oversight and Risk Tree technique to identify systematic errors. Civil engineering and programme management railway professionals are aware of role “optimism bias” plays in programme cost overruns and are aware of bow tie (fault and event tree) model-based safety risk modelling technique. However, the role of systematic errors due to “Heuristics and Biases” is not appreciated as yet. This overcomes the problems of omission of human and organisational factors from accident analysis. Second, the scope of the investigation includes all levels of the socio-technical system, including government, regulatory, railway safety bodies, duty holders, signalling firms and transport planners, and front-line staff such that lessons learned at the decision making and implementation level as well. Third, the author’s past accident case studies are supplemented with research pieces of evidence drawn from the practitioner’s and academic researchers’ publications as well. This is to discuss the role of system thinking to improve the decision making and risk management processes and practices in the IEC 15288 Systems Engineering standard, and in the industrial context such as the GB railways and Artificial Intelligence (AI) contexts as well.
Keywords: Accident analysis, AI algorithm internal audit, bounded rationality, Byzantine failures, heuristics and biases approach.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3812203 Potential of Energy Conservation of Daylight Linked Lighting System in India
Authors: Biswajit Biswas
Abstract:
Demand of energy is increasing faster than the generation. It leads shortage of power in all sectors of society. At peak hours this shortage is higher. Unless we utilize energy efficient technology, it is very difficult to minimize the shortage of energy. So energy efficiency program and energy conservation has an important role. Energy efficient technologies are cost intensive hence it is always not possible to implement in country like India. In the recent study, an educational building with operating hours from 10:00 a.m. to 05:00 p.m. has been selected to quantify the possibility of lighting energy conservation. As the operating hour is in daytime, integration of daylight with artificial lighting system will definitely reduce the lighting energy consumption. Moreover the initial investment has been given priority and hence the existing lighting installation was unaltered. An automatic controller has been designed which will be operated as a function of daylight through windows and the lighting system of the room will function accordingly. The result of the study of integrating daylight gave quite satisfactory for visual comfort as well as energy conservation.
Keywords: Lighting energy, energy efficiency, daylight, illumination, energy conservation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19562202 An Anonymity-Based Secure On-Demand Routing for Mobile Ad Hoc Networks
Authors: M. Gunasekaran, K. Premalatha
Abstract:
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) due to its unique nature such as scarce of resources and absence of centralized authority. There are number of protocols have been proposed to provide privacy and security for data communication in an adverse environment, but those protocols are compromised in many ways by the attackers. The concept of anonymity (in terms of unlinkability and unobservability) and pseudonymity has been introduced in this paper to ensure privacy and security. In this paper, a Secure Onion Throat (SOT) protocol is proposed to provide complete anonymity in an adverse environment. The SOT protocol is designed based on the combination of group signature and onion routing with ID-based encryption for route discovery. The security analysis demonstrates the performance of SOT protocol against all categories of attacks. The simulation results ensure the necessity and importance of the proposed SOT protocol in achieving such anonymity.
Keywords: Routing, anonymity, privacy, security and MANET.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27402201 Understanding Student Pilot Mental Workload in Recreational Aircraft Training
Authors: Ron Bishop, Jim Mitchell, Talitha Best
Abstract:
The increase in air travel worldwide has resulted in a pilot shortage. To increase student pilot capacity and lower costs, flight schools have increased the use of recreational aircraft (RA) with technological advanced cockpits in flight schools. The impact of RA based training compared to general aviation (GA) aircraft training on student mental workload is not well understood. This research investigated student pilot (N = 17) awareness of mental workload between technologically advanced cockpit equipped RA training with analogue gauge equipped GA training. The results showed a significantly higher rating of mental workload across subscales of mental and physical demand on the NASA-TLX in recreational aviation aircraft training compared to GA aircraft. Similarly, thematic content analysis of follow-up questions identified that mental workload of the student pilots flying the RA was perceived to be more than the GA aircraft.
Keywords: Glass cockpit, flight training, mental workload, student pilot.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8692200 Managerial Leadership Styles of Deans in Indonesian Universities
Authors: Jenny Ngo, Harry De Boer, Jürgen Enders
Abstract:
Indonesian higher education has experienced significant changes over the last decade. In 1999, the government published an overall strategy for decentralisation and enhancement of local autonomy in many sectors, including (higher) education. Indonesian higher education reforms have forced universities to restructure their internal university governance to become more entrepreneurial. These new types of internal university governance are likely to affect the institutions’ leadership and management. This paper discusses the approach and findings of a study on the managerial leadership styles of deans in Indonesian universities. The study aims to get a better understanding of styles exhibited by deans manifested in their behaviours. Using the theories of reasoned action and planned behaviour, in combination with the competing values framework, a large-scale survey was conducted to gather information on the deans’ behaviours, attitudes, subjective norms, and perceived behavioural control. Based on the responses of a sample of 218 deans, the study identifies a number of leadership styles: the Master, the Competitive Consultant, the Consensual Goal-Setter, the Focused Team Captain, and the Informed Trust-Builder style. The study demonstrates that attitudes are the primary determinant of the styles that were found. Perceived behavioural control is a factor that explains some managerial leadership styles. By understanding the attitudes of deans in Indonesian universities, and their leadership styles, universities can strengthen their management and governance, and thus improve their effectiveness.Keywords: Deans, Indonesian higher education, leadership and management, style.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21572199 A Survey on Ambient Intelligence in Agricultural Technology
Abstract:
Despite the advances made in various new technologies, application of these technologies for agriculture still remains a formidable task, as it involves integration of diverse domains for monitoring the different process involved in agricultural management. Advances in ambient intelligence technology represents one of the most powerful technology for increasing the yield of agricultural crops and to mitigate the impact of water scarcity, climatic change and methods for managing pests, weeds and diseases. This paper proposes a GPS-assisted, machine to machine solutions that combine information collected by multiple sensors for the automated management of paddy crops. To maintain the economic viability of paddy cultivation, the various techniques used in agriculture are discussed and a novel system which uses ambient intelligence technique is proposed in this paper. The ambient intelligence based agricultural system gives a great scope.Keywords: Ambient Intelligence, Agricultural technology, smart agriculture, precise farming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22082198 Critical Thinking Perspectives on Work Integrated Learning in Information Systems Education
Abstract:
Students with high level skills are in demand, especially in scare skill environments. If universities wish to be successful and competitive, its students need to be adequately equipped with the necessary tools. Work Integrated Learning (WIL) is an essential component of the education of a student. The relevance of higher education should be assessed in terms of how it meets the needs of society and the world of work in a global economy. This paper demonstrates how to use Habermas's theory of communicative action to reflect on students- perceptions on their integration in the work environment to achieve social integration and financial justification. Interpretive questionnaires are used to determine the students- view of how they are integrated into society, and contributing to the economy. This paper explores the use of Habermas-s theory of communicative action to give theoretical and methodological guidance for the practice of social findings obtained in this inquiry.
Keywords: Discourse, Habermas, Information Systems Education, Theory of Communicative Action, Work Integrated Learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16262197 Optimal Placement and Sizing of SVC for Load Margin Improvement Using BF Algorithm
Authors: Santi Behera, M. Tripathy, J. K. Satapathy
Abstract:
Power systems are operating under stressed condition due to continuous increase in demand of load. This can lead to voltage instability problem when face additional load increase or contingency. In order to avoid voltage instability suitable size of reactive power compensation at optimal location in the system is required which improves the load margin. This work aims at obtaining optimal size as well as location of compensation in the 39- bus New England system with the help of Bacteria Foraging and Genetic algorithms. To reduce the computational time the work identifies weak candidate buses in the system, and then picks only two of them to take part in the optimization. The objective function is based on a recently proposed voltage stability index which takes into account the weighted average sensitivity index is a simpler and faster approach than the conventional CPF algorithm. BFOA has been found to give better results compared to GA.
Keywords: BFOA, GA, SSVSL, WASI.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21902196 An Approach for Ensuring Data Flow in Freight Delivery and Management Systems
Authors: Aurelija Burinskienė, Dalė Dzemydienė, Arūnas Miliauskas
Abstract:
This research aims at developing the approach for more effective freight delivery and transportation process management. The road congestions and the identification of causes are important, as well as the context information recognition and management. The measure of many parameters during the transportation period and proper control of driver work became the problem. The number of vehicles per time unit passing at a given time and point for drivers can be evaluated in some situations. The collection of data is mainly used to establish new trips. The flow of the data is more complex in urban areas. Herein, the movement of freight is reported in detail, including the information on street level. When traffic density is extremely high in congestion cases, and the traffic speed is incredibly low, data transmission reaches the peak. Different data sets are generated, which depend on the type of freight delivery network. There are three types of networks: long-distance delivery networks, last-mile delivery networks and mode-based delivery networks; the last one includes different modes, in particular, railways and other networks. When freight delivery is switched from one type of the above-stated network to another, more data could be included for reporting purposes and vice versa. In this case, a significant amount of these data is used for control operations, and the problem requires an integrated methodological approach. The paper presents an approach for providing e-services for drivers by including the assessment of the multi-component infrastructure needed for delivery of freights following the network type. The construction of such a methodology is required to evaluate data flow conditions and overloads, and to minimize the time gaps in data reporting. The results obtained show the possibilities of the proposing methodological approach to support the management and decision-making processes with functionality of incorporating networking specifics, by helping to minimize the overloads in data reporting.Keywords: Transportation networks, freight delivery, data flow, monitoring, e-services.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6082195 Algorithm for Reconstructing 3D-Binary Matrix with Periodicity Constraints from Two Projections
Authors: V. Masilamani, Kamala Krithivasan
Abstract:
We study the problem of reconstructing a three dimensional binary matrices whose interiors are only accessible through few projections. Such question is prominently motivated by the demand in material science for developing tool for reconstruction of crystalline structures from their images obtained by high-resolution transmission electron microscopy. Various approaches have been suggested to reconstruct 3D-object (crystalline structure) by reconstructing slice of the 3D-object. To handle the ill-posedness of the problem, a priori information such as convexity, connectivity and periodicity are used to limit the number of possible solutions. Formally, 3Dobject (crystalline structure) having a priory information is modeled by a class of 3D-binary matrices satisfying a priori information. We consider 3D-binary matrices with periodicity constraints, and we propose a polynomial time algorithm to reconstruct 3D-binary matrices with periodicity constraints from two orthogonal projections.
Keywords: 3D-Binary Matrix Reconstruction, Computed Tomography, Discrete Tomography, Integral Max Flow Problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 48952194 An Overview of Sludge Utilization into Fired Clay Brick
Authors: Aeslina Binti Abdul Kadir, Ahmad Shayuti Bin Abdul Rahim
Abstract:
Brick is one of the most common masonry units used as building material. Due to the demand, different types of waste have been investigated to be incorporated into the bricks. Many types of sludge have been incorporated in fired clay brick for example marble sludge, stone sludge, water sludge, sewage sludge, and ceramic sludge. The utilization of these waste materials in fired clay bricks usually has positive effects on the properties such as lightweight bricks with improved shrinkage, porosity, and strength. This paper reviews on utilization of different types of sludge wastes into fired clay bricks. Previous investigations have demonstrated positive effects on the physical and mechanical properties as well as less impact towards the environment. Thus, the utilizations of sludge waste could produce a good quality of brick and could be one of alternative disposal methods for the sludge wastes.
Keywords: Fired Clay Brick, Sludge waste, Compressive strength, Shrinkage, Water absorption.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 54742193 Numerical Investigation of Hot Oil Velocity Effect on Force Heat Convection and Impact of Wind Velocity on Convection Heat Transfer in Receiver Tube of Parabolic Trough Collector System
Authors: O. Afshar
Abstract:
A solar receiver is designed for operation under extremely uneven heat flux distribution, cyclic weather, and cloud transient cycle conditions, which can include large thermal stress and even receiver failure. In this study, the effect of different oil velocity on convection coefficient factor and impact of wind velocity on local Nusselt number by Finite Volume Method will be analyzed. This study is organized to give an overview of the numerical modeling using a MATLAB software, as an accurate, time efficient and economical way of analyzing the heat transfer trends over stationary receiver tube for different Reynolds number. The results reveal when oil velocity is below 0.33m/s, the value of convection coefficient is negligible at low temperature. The numerical graphs indicate that when oil velocity increases up to 1.2 m/s, heat convection coefficient increases significantly. In fact, a reduction in oil velocity causes a reduction in heat conduction through the glass envelope. In addition, the different local Nusselt number is reduced when the wind blows toward the concave side of the collector and it has a significant effect on heat losses reduction through the glass envelope.
Keywords: Receiver tube, heat convection, heat conduction, Nusselt number.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18962192 The Southwestern Bangladesh’s Experience of Tidal River Management: An Analysis of Effectiveness and Challenges
Authors: Md. SajadulAlam, I. Ahmed, A. Naqib Jimmy, M. Haque Munna, N. Ahsan Khan
Abstract:
The construction of coastal polders to reduce salinity ingress at greater Khulna-Jashore region area was initiated in the 1960s by Bangladesh Water Development Board (BWDB). Although successful in a short run the, the Coastal Embankment Project (CEP) and its predecessors are often held accountable for the entire ecological disasters that affected many people. To overcome the water-logging crisis the first Tidal River Management (TRM) at Beel Bhaiana, Bhabodaho was implemented by the affected local people in an unplanned. TRM is an eco-engineering, low cost and participatory approach that utilizes the natural tidal characteristics and the local community’s indigenous knowledge for design and operation of watershed management. But although its outcomes were overwhelming in terms of reducing water-logging, increasing navigability etc. at Beel Bhaina the outcomes of its consequent schemes were debatable. So this study aims to examine the effectiveness and impact of the TRM schemes. Primary data were collected through questionnaire survey, Focus Group Discussion (FGD) and Key Informant Interview (KII) so as to collect mutually complementary quantitative and qualitative information along with extensive literature review. The key aspects that were examined include community participation, community perception on effectiveness and operational challenges.
Keywords: Sustainable, livelihood, salinity, water-logging, shrimp fry collectors, coastal region.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5472191 Towards Better Understanding of the Concept of Tacit Knowledge – A Cognitive Approach
Authors: Ilkka J. Virtanen
Abstract:
Tacit knowledge has been one of the most discussed and contradictory concepts in the field of knowledge management since the mid 1990s. The concept is used relatively vaguely to refer to any type of information that is difficult to articulate, which has led to discussions about the original meaning of the concept (adopted from Polanyi-s philosophy) and the nature of tacit knowing. It is proposed that the subject should be approached from the perspective of cognitive science in order to connect tacit knowledge to empirically studied cognitive phenomena. Some of the most important examples of tacit knowing presented by Polanyi are analyzed in order to trace the cognitive mechanisms of tacit knowing and to promote better understanding of the nature of tacit knowledge. The cognitive approach to Polanyi-s theory reveals that the tacit/explicit typology of knowledge often presented in the knowledge management literature is not only artificial but totally opposite approach compared to Polanyi-s thinking.Keywords: Cognitive science, explicit knowledge, knowledgemanagement, tacit knowledge.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24572190 Affective (and Effective) Teaching and Learning in Higher Education: Getting Social Again
Authors: Laura Zizka, Gaby Probst
Abstract:
The COVID-19 pandemic has affected the way Higher Education Institutions (HEIs) have given their courses. From emergency remote where all students and faculty were immediately confined to home teaching and learning, the continuing evolving sanitary situation obliged HEIs to adopt other methods of teaching and learning from blended courses that included both synchronous and asynchronous courses and activities to HyFlex models where some students were on campus while others followed the course simultaneously online. Each semester brought new challenges for HEIs and, subsequently, additional emotional reactions. This paper investigates the affective side of teaching and learning in various online modalities and its toll on students and faculty members over the past three semesters. The findings confirm that students and faculty who have more self-efficacy, flexibility, and resilience reported positive emotions and embraced the opportunities that these past semesters have offered. While HEIs have begun a new semester in an attempt to return to ‘normal’ face-to-face courses, this paper posits that there are lessons to be learned from these past three semesters. The opportunities that arose from the challenge of the pandemic should be considered when moving forward by focusing on a greater emphasis on the affective aspect of teaching and learning in HEIs worldwide.
Keywords: affective teaching and learning, engagement, interaction, motivation, social presence
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15302189 Current Starved Ring Oscillator Image Sensor
Authors: Devin Atkin, Orly Yadid-Pecht
Abstract:
The continual demands for increasing resolution and dynamic range in complimentary metal-oxide semiconductor (CMOS) image sensors have resulted in exponential increases in the amount of data that need to be read out of an image sensor, and existing readouts cannot keep up with this demand. Interesting approaches such as sparse and burst readouts have been proposed and show promise, but at considerable trade-offs in other specifications. To this end, we have begun designing and evaluating various readout topologies centered around an attempt to parallelize the sensor readout. In this paper, we have designed, simulated, and started testing a light-controlled oscillator topology with dual column and row readouts. We expect the parallel readout structure to offer greater speed and alleviate the trade-off typical in this topology, where slow pixels present a major framerate bottleneck.
Keywords: CMOS image sensors, high-speed capture, wide dynamic range, light controlled oscillator.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1852188 Issues in Deploying Smart Antennas in Mobile Radio Networks
Authors: Rameshwar Kawitkar
Abstract:
With the exponentially increasing demand for wireless communications the capacity of current cellular systems will soon become incapable of handling the growing traffic. Since radio frequencies are diminishing natural resources, there seems to be a fundamental barrier to further capacity increase. The solution can be found in smart antenna systems. Smart or adaptive antenna arrays consist of an array of antenna elements with signal processing capability, that optimize the radiation and reception of a desired signal, dynamically. Smart antennas can place nulls in the direction of interferers via adaptive updating of weights linked to each antenna element. They thus cancel out most of the co-channel interference resulting in better quality of reception and lower dropped calls. Smart antennas can also track the user within a cell via direction of arrival algorithms. This implies that they are more advantageous than other antenna systems. This paper focuses on few issues about the smart antennas in mobile radio networks.Keywords: Smart/Adaptive Antenna, Multipath fading, Beamforming, Radio propagation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26692187 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers
Authors: Pawan Kumar, Pitamber Singh Negi
Abstract:
Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.
Keywords: Borer, conifer, cones, chilgoza pine, lepidoptera, juniper, management, seed.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8672186 Management Pattern for Lodging Business in Bang Khonthi Samut Songkram with Sufficient Economy Approach
Authors: Krisada Sungkhamanee
Abstract:
The objectives of this research are to search the management pattern of Bang Khonthi lodging entrepreneurs for sufficient economy ways, to know the threat that affects this sector and design fit arrangement model to sustain their business with Samut Songkram style. What will happen if they do not use this approach? Will they have a financial crisis? The data and information are collected by informal discussions with 8 managers and 400 questionnaires. A mixed methods of both qualitative research and quantitative research are used. Bent Flyvbjerg-s phronesis is utilized for this analysis. Our research will prove that sufficient economy can help small business firms to solve their problems. We think that the results of our research will be a financial model to solve many problems of the entrepreneurs and this way will can be a model for other provinces of Thailand.Keywords: Bang Khonthi, Lodging Business, Sufficient Economy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37242185 Environmental Competency Framework: Development of a Modified 2-Tuple Delphi Approach
Authors: M. Bouri, L. Chraïbi, N. Sefiani
Abstract:
Currently, industries endeavor to align their environmental management system with the ISO 14001:2015 international standard, while preserving competitiveness and sustainability. Then, a key driver for these industries is to develop a skilled workforce that is able to implement, continuously improve and audit the environmental management system. The purpose of this paper is to provide an environmental competency framework that aims to identify, rank and categorize the competencies required by both the environmental managers and auditors. This competency framework is expected to be useful during competency assessment, recruitment, and training processes. To achieve this end, a modified 2-tuple Delphi approach is here proposed based on a combination of the modified Delphi approach and the 2-tuple linguistic representation model. The adopted approach is presented as numerous questionnaires that are spread over multiple rounds in order to obtain a consensus among the different Moroccan experts participating to this study.
Keywords: Competency framework, Delphi, environmental competency, 2-tuple.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4022184 Labor Productivity in the Construction Industry -Factors Influencing the Spanish Construction Labor Productivity-
Authors: G. Robles, A. Stifi, José L. Ponz-Tienda, S. Gentes
Abstract:
This research paper aims to identify, analyze and rank factors affecting labor productivity in Spain with respect to their relative importance. Using a selected set of 35 factors, a structured questionnaire survey was utilized as the method to collect data from companies. Target population is comprised by a random representative sample of practitioners related with the Spanish construction industry. Findings reveal the top five ranked factors are as follows: (1) shortage or late supply of materials; (2) clarity of the drawings and project documents; (3) clear and daily task assignment; (4) tools or equipment shortages; (5) level of skill and experience of laborers. Additionally, this research also pretends to provide simple and comprehensive recommendations so that they could be implemented by construction managers for an effective management of construction labor forces.
Keywords: Construction management, Factors, Improvement, Labor productivity, Lean construction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 69692183 Scenarios of Societal Security and Business Continuity Cycles
Authors: Jiří F. Urbánek, Jiří Barta
Abstract:
Societal security, continuity scenarios and methodological cycling approach explained in this article. Namely societal security organizational challenges ask implementation of international standards BS 25999-2 & global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity & interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization system, resulting to a crisis scene or even to a battle theatre. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management & overmastering in real environments.
Keywords: Business Continuity, Societal Security Crisis Scenarios Cycles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21642182 Heat transfer Characteristics of Fin-and-Tube heat Exchanger under Condensing Conditions
Authors: Abdenour Bourabaa, Mohamed Saighi, Said El Metenani
Abstract:
In the present work an investigation of the effects of the air frontal velocity, relative humidity and dry air temperature on the heat transfer characteristics of plain finned tube evaporator has been conducted. Using an appropriate correlation for the air side heat transfer coefficient the temperature distribution along the fin surface was calculated using a dimensionless temperature distribution. For a constant relative humidity and bulb temperature, it is found that the temperature distribution decreases with increasing air frontal velocity. Apparently, it is attributed to the condensate water film flowing over the fin surface. When dry air temperature and face velocity are being kept constant, the temperature distribution decreases with the increase of inlet relative humidity. An increase in the inlet relative humidity is accompanied by a higher amount of moisture on the fin surface. This results in a higher amount of latent heat transfer which involves higher fin surface temperature. For the influence of dry air temperature, the results here show an increase in the dimensionless temperature parameter with a decrease in bulb temperature. Increasing bulb temperature leads to higher amount of sensible and latent heat transfer when other conditions remain constant.Keywords: Fin efficiency, heat and mass transfer, dehumidifying conditions, finned tube heat exchangers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21892181 Evaluation of Hybrid Viscoelastic Damper for Passive Energy Dissipation
Authors: S. S. Ghodsi, M. H. Mehrabi, Zainah Ibrahim, Meldi Suhatril
Abstract:
This research examines the performance of a hybrid passive control device for enhancing the seismic response of steel frame structures. The device design comprises a damper which employs a viscoelastic material to control both shear and axial strain. In the design, energy is dissipated through the shear strain of a two-layer system of viscoelastic pads which are located between steel plates. In addition, viscoelastic blocks have been included on either side of the main shear damper which obtains compressive strains in the viscoelastic blocks. These dampers not only dissipate energy but also increase the stiffness of the steel frame structure, and the degree to which they increase the stiffness may be controlled by the size and shape. In this research, the cyclical behavior of the damper was examined both experimentally and numerically with finite element modeling. Cyclic loading results of the finite element modeling reveal fundamental characteristics of this hybrid viscoelastic damper. The results indicate that incorporating a damper of the design can significantly improve the seismic performance of steel frame structures.
Keywords: Cyclic loading, energy dissipation, hybrid damper, passive control system, viscoelastic damper.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8482180 Application of Transportation Linear Programming Algorithms to Cost Reduction in Nigeria Soft Drinks Industry
Authors: A. O. Salami
Abstract:
The transportation problems are primarily concerned with the optimal way in which products produced at different plants (supply origins) are transported to a number of warehouses or customers (demand destinations). The objective in a transportation problem is to fully satisfy the destination requirements within the operating production capacity constraints at the minimum possible cost. The objective of this study is to determine ways of minimizing transportation cost in order to maximum profit. Data were sourced from the records of the Distribution Department of 7-Up Bottling Company Plc., Ilorin, Kwara State, Nigeria. The data were computed and analyzed using the three methods of solving transportation problem. The result shows that the three methods produced the same total transportation costs amounting to N1, 358, 019, implying that any of the method can be adopted by the company in transporting its final products to the wholesale dealers in order to minimize total production cost.
Keywords: Allocation problem, Cost Minimization, Distribution system, Resources utilization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 88032179 Design and Parametric Analysis of Pentaband Meander Line Antenna for Mobile Handset Applications
Authors: Shrinivas P. Mahajan, Aarti C. Kshirsagar
Abstract:
Wireless communication technology is rapidly changing with recent developments in portable devices and communication protocols. This has generated demand for more advanced and compact antenna structures and therefore, proposed work focuses on Meander Line Antenna (MLA) design. Here, Pentaband MLA is designed on a FR4 substrate (85 mm x 40 mm) with dielectric constant (ϵr) 4.4, loss tangent (tan ) 0.018 and height 1.6 mm with coplanar feed and open stub structure. It can be operated in LTE (0.670 GHz-0.696 GHz) GPS (1.564 GHz-1.579 GHz), WCDMA (1.920 GHz-2.135 GHz), LTE UL frequency band 23 (2-2.020 GHz) and 5G (3.10 GHz-3.550 GHz) application bands. Also, it gives good performance in terms of Return Loss (RL) which is < -10 dB, impedance bandwidth with maximum Bandwidth (BW) up to 0.21 GHz and realized gains with maximum gain up to 3.28 dBi. Antenna is simulated with open stub and without open stub structures to see the effect on impedance BW coverage. In addition to this, it is checked with human hand and head phantoms to assure that it falls within specified Specific Absorption Rate (SAR) limits.
Keywords: Coplanar feed, L shaped ground, MLA, phantom, SAR, stub.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5462178 Corporate Governance of Enterprise IT: Research Study on IT Governance Maturity
Authors: Mario Spremić
Abstract:
Despite the financial crisis and ongoing need for cost cutting, companies all around the world heavily invest in Information Systems (IS) and underlying Information Technology (IT). Proliferation of governance of enterprise IT helps companies manage, or rather, governs IS as a primary business function with executive management involved in making decision about IS and IT. The business value of IT is raising with the involvement of the executive management in IT decision making process and quality IT governance mechanisms in place. In this paper the practice of governing the enterprise IT will be investigated on a sample of the largest 100 Croatian companies. Research questions posed here will reveal if there are some formal IT governance mechanisms, are there any differences in perceived role of IS and IT between CIOs (Chief Information Officers) and CEOs (Chief Executive Officers) of the sampled companies and what are the mechanisms to govern massive investment in enterprise IT.Keywords: IT governance, governance of enterprise IT, information system auditing, IT maturity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1689