Search results for: chronic health problems
1634 Secured Session Based Profile Caching for E-Learning Systems Using WiMAX Networks
Authors: R. Chithra, B. Kalaavathi
Abstract:
E-Learning enables the users to learn at anywhere at any time. In E-Learning systems, authenticating the E-Learning user has security issues. The usage of appropriate communication networks for providing the internet connectivity for E-learning is another challenge. WiMAX networks provide Broadband Wireless Access through the Multicast Broadcast Service so these networks can be most suitable for E-Learning applications. The authentication of E-Learning user is vulnerable to session hijacking problems. The repeated authentication of users can be done to overcome these issues. In this paper, session based Profile Caching Authentication is proposed. In this scheme, the credentials of E-Learning users can be cached at authentication server during the initial authentication through the appropriate subscriber station. The proposed cache based authentication scheme performs fast authentication by using cached user profile. Thus, the proposed authentication protocol reduces the delay in repeated authentication to enhance the security in ELearning.Keywords: Authentication, E-Learning, WiMAX, Security, Profile caching.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15701633 China's Strategic Aid Diplomacy to Foster Development of Latin America
Authors: Wanda Luen-Wun Siu, Xiaowen Zhang
Abstract:
This paper adopted a retrospective review of China’s assistance to Latin America from the 1950s to 2020. Findings suggested that China’s assistance to Latin America can be roughly divided into five stages: The 1950s to 1960s was the initial stage of China’s assistance to Latin America, mainly focusing on the establishment of diplomatic relations with Cuba and other Latin American countries. The strategy has a strong ideological basis. The 1980s were the stage of development of China's aid to Latin America, which was characterized by consolidating and expanding diplomatic space, emphasizing the spirit of cooperation of equality, mutual benefit, and common development. The 1990s to 2000s marked the further development of diplomatic relations with Latin American countries, plus domestic market-oriented reforms, emphasizing the importance of economic considerations, and less ideological orientation; and this period also witnessed more Chinese state-owned enterprises going out to invest in Latin America. 2010-2019 marked the further development of Latin American relations. This paper contributes to the literature of diplomacy and health assistance to Latin America and highlights the importance of foreign aid and health assistance in sealing bilateral diplomatic relations.
Keywords: Broad Spectrum Assistance, China, Latin America, bilateral relations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3341632 Methods for Case Maintenance in Case-Based Reasoning
Authors: A. Lawanna, J. Daengdej
Abstract:
Case-Based Reasoning (CBR) is one of machine learning algorithms for problem solving and learning that caught a lot of attention over the last few years. In general, CBR is composed of four main phases: retrieve the most similar case or cases, reuse the case to solve the problem, revise or adapt the proposed solution, and retain the learned cases before returning them to the case base for learning purpose. Unfortunately, in many cases, this retain process causes the uncontrolled case base growth. The problem affects competence and performance of CBR systems. This paper proposes competence-based maintenance method based on deletion policy strategy for CBR. There are three main steps in this method. Step 1, formulate problems. Step 2, determine coverage and reachability set based on coverage value. Step 3, reduce case base size. The results obtained show that this proposed method performs better than the existing methods currently discussed in literature.Keywords: Case-Based Reasoning, Case Base Maintenance, Coverage, Reachability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16601631 The Problems of Employment Form Selection of Capital Group Management Team Members in the Light of Chosen Company Management Theories
Authors: D. Bąk-Grabowska, A. Jagoda
Abstract:
Managing a capital group is a complex and specific process. It creates special conditions for the introduction of team work organization of managers. The selection of a manager employment form is a problem which gets complicated in case of management teams. The considered possibilities are an employment-based and non-employment managerial contract, which can be based on a thorough action or on formulating definite expectations regarding the results of a manager’s work. The problem of selection between individual and collegiate settlement of managers’ work has been pointed out. The deliberations were based on the assumptions of chosen company management theories, including transactional cost, agency theory, nexus of contracts theory, stewardship theory and theories referring directly to management teams, i.e. Upper echelons theory.
Keywords: Capital group, employment forms, management teams, managers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14211630 Automatic Clustering of Gene Ontology by Genetic Algorithm
Authors: Razib M. Othman, Safaai Deris, Rosli M. Illias, Zalmiyah Zakaria, Saberi M. Mohamad
Abstract:
Nowadays, Gene Ontology has been used widely by many researchers for biological data mining and information retrieval, integration of biological databases, finding genes, and incorporating knowledge in the Gene Ontology for gene clustering. However, the increase in size of the Gene Ontology has caused problems in maintaining and processing them. One way to obtain their accessibility is by clustering them into fragmented groups. Clustering the Gene Ontology is a difficult combinatorial problem and can be modeled as a graph partitioning problem. Additionally, deciding the number k of clusters to use is not easily perceived and is a hard algorithmic problem. Therefore, an approach for solving the automatic clustering of the Gene Ontology is proposed by incorporating cohesion-and-coupling metric into a hybrid algorithm consisting of a genetic algorithm and a split-and-merge algorithm. Experimental results and an example of modularized Gene Ontology in RDF/XML format are given to illustrate the effectiveness of the algorithm.
Keywords: Automatic clustering, cohesion-and-coupling metric, gene ontology; genetic algorithm, split-and-merge algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19581629 A Fitted Random Sampling Scheme for Load Distribution in Grid Networks
Authors: O. A. Rahmeh, P. Johnson, S. Lehmann
Abstract:
Grid networks provide the ability to perform higher throughput computing by taking advantage of many networked computer-s resources to solve large-scale computation problems. As the popularity of the Grid networks has increased, there is a need to efficiently distribute the load among the resources accessible on the network. In this paper, we present a stochastic network system that gives a distributed load-balancing scheme by generating almost regular networks. This network system is self-organized and depends only on local information for load distribution and resource discovery. The in-degree of each node is refers to its free resources, and job assignment and resource discovery processes required for load balancing is accomplished by using fitted random sampling. Simulation results show that the generated network system provides an effective, scalable, and reliable load-balancing scheme for the distributed resources accessible on Grid networks.
Keywords: Complex networks, grid networks, load-balancing, random sampling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17881628 Scientific Workflow Interoperability Evaluation
Authors: Ahmed Alqaoud
Abstract:
There is wide range of scientific workflow systems today, each one designed to resolve problems at a specific level. In large collaborative projects, it is often necessary to recognize the heterogeneous workflow systems already in use by various partners and any potential collaboration between these systems requires workflow interoperability. Publish/Subscribe Scientific Workflow Interoperability Framework (PS-SWIF) approach was proposed to achieve workflow interoperability among workflow systems. This paper evaluates the PS-SWIF approach and its system to achieve workflow interoperability using Web Services with asynchronous notification messages represented by WS-Eventing standard. This experiment covers different types of communication models provided by Workflow Management Coalition (WfMC). These models are: Chained processes, Nested synchronous sub-processes, Event synchronous sub-processes, and Nested sub-processes (Polling/Deferred Synchronous). Also, this experiment shows the flexibility and simplicity of the PS-SWIF approach when applied to a variety of workflow systems (Triana, Taverna, Kepler) in local and remote environments.Keywords: Publish/subscribe, scientific workflow, web services, workflow interoperability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18241627 An Efficient and Secure Solution for the Problems of ARP Cache Poisoning Attacks
Authors: Md. Ataullah, Naveen Chauhan
Abstract:
The Address Resolution Protocol (ARP) is used by computers to map logical addresses (IP) to physical addresses (MAC). However ARP is an all trusting protocol and is stateless which makes it vulnerable to many ARP cache poisoning attacks such as Man-in-the-Middle (MITM) and Denial of service (DoS) attacks. These flaws result in security breaches thus weakening the appeal of the computer for exchange of sensitive data. In this paper we describe ARP, outline several possible ARP cache poisoning attacks and give the detailed of some attack scenarios in network having both wired and wireless hosts. We have analyzed each of proposed solutions, identify their strengths and limitations. Finally get that no solution offers a feasible solution. Hence, this paper presents an efficient and secure version of ARP that is able to cope up with all these types of attacks and is also a feasible solution. It is a stateful protocol, by storing the information of the Request frame in the ARP cache, to reduce the chances of various types of attacks in ARP. It is more efficient and secure by broadcasting ARP Reply frame in the network and storing related entries in the ARP cache each time when communication take place.Keywords: ARP cache poisoning, MITM, DoS
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 29271626 The Effect of Clamping Restrain on the Prediction of Drape Simulation Software Tool
Authors: T.A. Adegbola, IEA Aghachi, E.R. Sadiku
Abstract:
To investigates the effect of fiberglass clamping process improvement on drape simulation prediction. This has great effect on the mould and the fiber during manufacturing process. This also, improves the fiber strain, the quality of the fiber orientation in the area of folding and wrinkles formation during the press-forming process. Drape simulation software tool was used to digitalize the process, noting the formation problems on the contour sensitive part. This was compared with the real life clamping processes using single and double frame set-ups to observe the effects. Also, restrains are introduced by using clips, and the G-clamps with predetermine revolution to; restrain the fabric deformation during the forming process.The incorporation of clamping and fabric restrain deformation improved on the prediction of the simulation tool. Therefore, for effective forming process, incorporation of clamping process into the drape simulation process will assist in the development of fiberglass application in manufacturing process.Keywords: clamping, fiberglass, drape simulation, pressforming.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15661625 Modeling of Reinforcement in Concrete Beams Using Machine Learning Tools
Authors: Yogesh Aggarwal
Abstract:
The paper discusses the results obtained to predict reinforcement in singly reinforced beam using Neural Net (NN), Support Vector Machines (SVM-s) and Tree Based Models. Major advantage of SVM-s over NN is of minimizing a bound on the generalization error of model rather than minimizing a bound on mean square error over the data set as done in NN. Tree Based approach divides the problem into a small number of sub problems to reach at a conclusion. Number of data was created for different parameters of beam to calculate the reinforcement using limit state method for creation of models and validation. The results from this study suggest a remarkably good performance of tree based and SVM-s models. Further, this study found that these two techniques work well and even better than Neural Network methods. A comparison of predicted values with actual values suggests a very good correlation coefficient with all four techniques.Keywords: Linear Regression, M5 Model Tree, Neural Network, Support Vector Machines.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20371624 The European Union’s Generalized System of Preferences (GSP) and the Prospect of a Unified Database
Authors: Iasha Meskhia, Rusudan Seturidze
Abstract:
Free access for Georgian goods to the EU markets is one of the important factors for Georgia’s economic development, attraction of investments and raising the standard of living. The European Union is the most important trade partner for Georgia. Great experience has been accumulated with respect to removing trade barriers between Georgia and the European Union. Despite it, certain problems still persist.
In the present article, we have reviewed the systems of preferences with the European Union, the EU’s Generalized System of Preferences (GSP) and the essence of ongoing reform; we have assessed weak and strong sides of relations established between the European Union and Georgia in this regard; analyzed Georgia’s export and import over the past years; also reviewed the prospect of a unified database; established existing and anticipated positive and negative factors. Based on the analysis, we have provided the relevant recommendations.
Keywords: EU-Georgia trade, EU’s GSP reform, Georgia’s export-import, REX system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22211623 Consumers’ Perceptions of Noncommunicable Diseases and Perceived Product Value Impacts on Healthy Food Purchasing Decisions
Authors: Khatesiree Sripoothon, Usanee Sengpanich, Rattana Sittioum
Abstract:
The objective of this study is to examine the factors influencing consumer purchasing decisions about healthy food. This model consists of two latent variables: Consumer Perception relating to NCDs and Consumer Perceived Product Value. The study was conducted in the northern provinces of Thailand, which are popular with tourists and have received support from the government for health and wellness tourism. A survey was used as the data collection method, and the questionnaire was applied to 385 consumers. An accidental sampling method was used to identify the sample. The statistics of frequency, percentage, mean, and structural equation model were used to analyze the data obtained. Additionally, all factors had a significant positive influence on healthy food purchasing decisions (p<0.001) and were predictive of healthy food purchasing decisions at 46.20% (R2=0.462). Also, these findings seem to underline the supposition that consumer perceptions of NCDs and perceived product value are key variables that strengthen the competitive effects of healthy-friendly business entrepreneurs. Moreover, it reduces the countries' public health costs for treating patients with the disease of NCDs in Thailand.
Keywords: healthy food, perceived product value, perception of noncommunicable diseases, purchasing decisions
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5721622 Optimization of Strategies and Models Review for Optimal Technologies - Based On Fuzzy Schemes for Green Architecture
Authors: Ghada Elshafei, Abdelazim Negm
Abstract:
Recently, the green architecture becomes a significant way to a sustainable future. Green building designs involve finding the balance between comfortable homebuilding and sustainable environment. Moreover, the utilization of the new technologies such as artificial intelligence techniques are used to complement current practices in creating greener structures to keep the built environment more sustainable. The most common objectives in green buildings should be designed to minimize the overall impact of the built environment that effect on ecosystems in general and in particularly human health and natural environment. This will lead to protecting occupant health, improving employee productivity, reducing pollution and sustaining the environmental. In green building design, multiple parameters which may be interrelated, contradicting, vague and of qualitative/quantitative nature are broaden to use. This paper presents a comprehensive critical state- ofart- review of current practices based on fuzzy and its combination techniques. Also, presented how green architecture/building can be improved using the technologies that been used for analysis to seek optimal green solutions strategies and models to assist in making the best possible decision out of different alternatives.
Keywords: Green architecture/building, technologies, optimization, strategies, fuzzy techniques and models.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25261621 Multipurpose Cadastre, Essential for Urban Development Plans in Iran
Authors: Mehrshad Khalaj, Elham Lashkari
Abstract:
Majority of researches conducted on Iranian urban development plans indicate that they have been almost unsuccessful in terms of draft, execution and goal achievement. Lack or shortage of essential statistics and information can be listed as an important reason of the failure of these plans. Lack of figures and information has turned into an obvious part of the country-s statistics officials. This problem has made urban planner themselves to embark on physical surveys including real estate and land pricing, population and economic census of the city. Apart from the problems facing urban developers, the possibility of errors is high in such surveys. In the present article, applying the interview technique, it has been mentioned that utilizing multipurpose cadastre system as a land information system is essential for urban development plans in Iran. It can minimize or even remove the failures facing urban development plans.Keywords: Multipurpose Cadastre, Urban Development Plan(UDP), Land Information System (LIS), Interview Technique
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24531620 A Review on Development of Historical City Center and Revitalization Process in Isfahan/Iran
Authors: Reihaneh Rafiemanzelat, Maryam Imani Emadi
Abstract:
The need to protect our cultural heritage was stressed on revitalization of historical city centers in communities. The main aim of this research is to attract finance and activities to the historical city centers through the citizens and municipalities participation while cities expanded their boundaries toward suburban areas. Today the main problems which facing to the most historical city centers, is loss of their centrality through effect of urbanization on any point of the cities which is the most important issue on neglect and abandonment of the historical central area by decentralizing living, commerce and public areas. This article evaluate the ways in which city center revitalization can be effect on vitality and viability of the central area in case of Naghshe Jahan square which situated at the center of Isfahan city, Iran. Constructed between 1598 and 1629, it is now an important historical site, and one of UNESCO's World Heritage Sites.Keywords: City centers, revitalization, urban development, vitality and viability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18211619 Coverage and Connectivity Problem in Sensor Networks
Authors: Meenakshi Bansal, Iqbal Singh, Parvinder S. Sandhu
Abstract:
In over deployed sensor networks, one approach to Conserve energy is to keep only a small subset of sensors active at Any instant. For the coverage problems, the monitoring area in a set of points that require sensing, called demand points, and consider that the node coverage area is a circle of range R, where R is the sensing range, If the Distance between a demand point and a sensor node is less than R, the node is able to cover this point. We consider a wireless sensor network consisting of a set of sensors deployed randomly. A point in the monitored area is covered if it is within the sensing range of a sensor. In some applications, when the network is sufficiently dense, area coverage can be approximated by guaranteeing point coverage. In this case, all the points of wireless devices could be used to represent the whole area, and the working sensors are supposed to cover all the sensors. We also introduce Hybrid Algorithm and challenges related to coverage in sensor networks.Keywords: Wireless sensor networks, network coverage, Energy conservation, Hybrid Algorithms.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17271618 Incidence of Acinetobacter in Fresh Carrot (Daucus carota subsp. sativus)
Authors: M. Dahiru, O. I. Enabulele
Abstract:
The research aims to investigate the occurrence of multidrug-resistant Acinetobacter, in carrot and estimate the role of carrot in its transmission in a rapidly growing urban population. Thus, 50 carrot samples were collected from Jakara wastewater irrigation farms and are analyzed on MacConkey agar and screened by Microbact 24E (Oxoid) and susceptibility of isolates is tested against 10 commonly used antibiotics. Acinetobacter baumannii and A. lwoffii were isolated in 22.00% and 16% of samples respectively. Resistance to ceporex and penicillin of 36.36% and 27.27% in A. baumannii, and sensitivity to ofloxacin, pefloxacin, gentimycin and co-trimoxazole were observed. However, for A. lwoffii apart from 37.50% resistance to ceporex, it was also resistant to all other drugs tested. There were similarities in the resistances shown by A. baumannii and A. lwoffii to fluoroquinolones and β- lactame drug families in addition to between sulfonamide and animoglycoside demonstrated by A. lwoffii. Significant correlation in similarities were observed at P < 0.05 to CPX to NA (46.2%), and SXT to AU (52.6%) A. baumannii and A. lwoffii respectively and high multi drug resistance (MDR) of 27.27% and 62.50% by A. baumannii and A. lwoffii respectively. The occurrence of multidrug-resistance pathogen in carrot is a serious challenge to public health care, especially in a rapidly growing urban population where subsistence agriculture contributes greatly to urban livelihood and source of vegetables.Keywords: Urban agriculture, Public health, Fluoroquinolone, Sulfonamide, Multidrug-resistance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16141617 Global GMRES with Deflated Restarting for Families of Shifted Linear Systems
Authors: Jing Meng, Peiyong Zhu, Houbiao Li
Abstract:
Many problems in science and engineering field require the solution of shifted linear systems with multiple right hand sides and multiple shifts. To solve such systems efficiently, the implicitly restarted global GMRES algorithm is extended in this paper. However, the shift invariant property could no longer hold over the augmented global Krylov subspace due to adding the harmonic Ritz matrices. To remedy this situation, we enforce the collinearity condition on the shifted system and propose shift implicitly restarted global GMRES. The new method not only improves the convergence but also has a potential to simultaneously compute approximate solution for the shifted systems using only as many matrix vector multiplications as the solution of the seed system requires. In addition, some numerical experiments also confirm the effectiveness of our method.
Keywords: Shifted linear systems, global Krylov subspace, GLGMRESIR, GLGMRESIRsh, harmonic Ritz matrix, harmonic Ritz vector.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19791616 Dynamic Economic Dispatch Using Glowworm Swarm Optimization Technique
Authors: K. C. Meher, R. K. Swain, C. K. Chanda
Abstract:
This paper gives an intuition regarding glowworm swarm optimization (GSO) technique to solve dynamic economic dispatch (DED) problems of thermal generating units. The objective of the problem is to schedule optimal power generation of dedicated thermal units over a specific time band. In this study, Glowworm swarm optimization technique enables a swarm of agents to split into subgroup, exhibit simultaneous taxis towards each other and rendezvous at multiple optima (not necessarily equal) of a given multimodal function. The feasibility of the GSO method has been tested on ten-unit-test systems where the power balance constraints, operating limits, valve point effects, and ramp rate limits are taken into account. The results obtained by the proposed technique are compared with other heuristic techniques. The results show that GSO technique is capable of producing better results.
Keywords: Dynamic economic dispatch, Glowworm swarm optimization, Luciferin, Valve–point loading effect, Ramp rate limits.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13171615 Towards a Web 2.0 Based Practical Works Management System at a Public University: Case of Sultan Moulay Slimane University
Authors: Khalid Ghoulam, Belaid Bouikhalene, Zakaria Harmouch, Hicham Mouncif
Abstract:
The goal of engineering education is to prepare students to cope with problems of real devices and systems. Usually there are not enough devices or time for conducting experiments in a real lab. Other factors that prevent the use of lab devices directly by students are inaccessible or dangerous phenomena, or polluting chemical reactions. The technology brings additional strategies of learning and teaching, there are two types of online labs, virtual and remote labs RL. We present an example of a successful development and deployment of a remote lab in the field of engineering education, integrated in the Moodle platform, using very low-coast, high documented devices and free software. The remote lab is user friendly for both teachers and students. Our web 2.0 based user interface would attract and motivate students, as well as solving the problem of larger classes and expensive lab devices.Keywords: Remote lab, online learning, Moodle, Arduino, SMSU, lab experimentation, engineering education, online engineering education.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13631614 A Survey of Business Component Identification Methods and Related Techniques
Authors: Zhongjie Wang, Xiaofei Xu, Dechen Zhan
Abstract:
With deep development of software reuse, componentrelated technologies have been widely applied in the development of large-scale complex applications. Component identification (CI) is one of the primary research problems in software reuse, by analyzing domain business models to get a set of business components with high reuse value and good reuse performance to support effective reuse. Based on the concept and classification of CI, its technical stack is briefly discussed from four views, i.e., form of input business models, identification goals, identification strategies, and identification process. Then various CI methods presented in literatures are classified into four types, i.e., domain analysis based methods, cohesion-coupling based clustering methods, CRUD matrix based methods, and other methods, with the comparisons between these methods for their advantages and disadvantages. Additionally, some insufficiencies of study on CI are discussed, and the causes are explained subsequently. Finally, it is concluded with some significantly promising tendency about research on this problem.Keywords: Business component, component granularity, component identification, reuse performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19801613 Contrast-Enhanced Multispectal Upconversion Fluorescence Analysis for High-Resolution in-vivo Deep Tissue Imaging
Authors: Lijiang Wang, Wei Wang, Yuhong Xu
Abstract:
Lanthanide-doped upconversion nanoparticles which can convert near-infrared lights to visible lights have attracted growing interest because of their great potentials in fluorescence imaging. Upconversion fluorescence imaging technique with excitation in the near-infrared (NIR) region has been used for imaging of biological cells and tissues. However, improving the detection sensitivity and decreasing the absorption and scattering in biological tissues are as yet unresolved problems. In this present study, a novel NIR-reflected multispectral imaging system was developed for upconversion fluorescent imaging in small animals. Based on this system, we have obtained the high contrast images without the autofluorescence when biocompatible UCPs were injected near the body surface or deeply into the tissue. Furthermore, we have extracted respective spectra of the upconversion fluorescence and relatively quantify the fluorescence intensity with the multispectral analysis. To our knowledge, this is the first time to analyze and quantify the upconversion fluorescence in the small animal imaging.
Keywords: Multispectral imaging, near-infrared, upconversion fluorescence imaging, upconversion nanoparticles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17181612 A Straightforward Approach for Determining the Weights of Decision Makers Based on Angle Cosine and Projection Method
Authors: Qiang Yang, Ping-An Du
Abstract:
Group decision making with multiple attribute has attracted intensive concern in the decision analysis area. This paper assumes that the contributions of all the decision makers (DMs) are not equal to the decision process based on different knowledge and experience in group setting. The aim of this paper is to develop a novel approach to determine weights of DMs in the group decision making problems. In this paper, the weights of DMs are determined in the group decision environment via angle cosine and projection method. First of all, the average decision of all individual decisions is defined as the ideal decision. After that, we define the weight of each decision maker (DM) by aggregating the angle cosine and projection between individual decision and ideal decision with associated direction indicator μ. By using the weights of DMs, all individual decisions are aggregated into a collective decision. Further, the preference order of alternatives is ranked in accordance with the overall row value of collective decision. Finally, an example in a chemical company is provided to illustrate the developed approach.Keywords: Angel cosine, ideal decision, projection method, weights of decision makers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18651611 The Development and Examination of a Teaching Commitment Scale for Elementary School Health and Physical Education Teachers
Authors: Yi-Hsiang Pan, Wei-Ting Hsu, Chang-Pang Lin
Abstract:
The purpose of this study was to develop and examine a Teaching Commitment Scale of Health and Physical Education (TCS-HPE) for Taiwanese elementary school teachers. First of all, based on teaching commitment related theory and literatures to develop a original scale with 40 items, later both stratified random sampling and cluster sampling were used to sample participants. During the first stage, 300 teachers were sampled and 251 valid scales (83.7%) returned. Later, the data was analyzed by exploratory factor analysis to obtain 74.30% of total variance for the construct validity. The Cronbach-s alpha coefficient of sum scale reliability was 0.94, and subscale coefficients were between 0.80 and 0.96. In the second stage, 400 teachers were sampled and 318 valid scales (79.5%) returned. Finally, this study used confirmatory factor analysis to test validity and reliability of TCS-HPE. The result showed that the fit indexes reached acceptable criteria(¤ç2 (246 ) =557.64 , p<.05, RMSEA= 0.03, GFI = 0.96, AGFI = 0.95, NFI = 0.91, CFI = 0.98, RMR = 0.04, SRMR = 0.03). In conclusion, TCS-HPE has four dimensions with 24 items, including teaching identification, teaching involvement, teaching objectives and tendency towards work continuation. It is an acceptable measurement instrument with reliability and validity.Keywords: Attitude, belief, construct validity, teachers' professional development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23841610 Designing a Multilingual Auction Website for Selling Agricultural Products
Authors: Popa Cosmin, Chiran Aurel
Abstract:
The study aimed to identify the logical structure of data and particularities of developing and testing a website designed for selling farm products through online auctions. The research is based on a short literature review in the field and exploratory trials of some successful models from other industries, in order to identify the advantages of using such tool, as well as the optimal structure and functionality of an auction portal. In the last part, the study focuses on the results of testing the website by the potential beneficiaries. Conclusions of the study underlines that the particularities of some agricultural products could raise difficulties in the process of selling them through online auctions, but the use of such system it is perceived to bring significant improvements in the supply chain. The results of scientific investigations require a more detailed study regarding the importance of using quality standards for agricultural products sold via online auction, the impact that implementation of an online payment system could have on trade with agricultural products and problems which could arise in using the website in different countries.Keywords: E-commerce, online auctions, marketing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 36001609 Transmitter Macrodiversity in Multihopping- SFN Based Algorithm for Improved Node Reachability and Robust Routing
Authors: Magnus Eriksson, Arif Mahmud
Abstract:
A novel idea presented in this paper is to combine multihop routing with single-frequency networks (SFNs) for a broadcasting scenario. An SFN is a set of multiple nodes that transmit the same data simultaneously, resulting in transmitter macrodiversity. Two of the most important performance factors of multihop networks, node reachability and routing robustness, are analyzed. Simulation results show that our proposed SFN-D routing algorithm improves the node reachability by 37 percentage points as compared to non-SFN multihop routing. It shows a diversity gain of 3.7 dB, meaning that 3.7 dB lower transmission powers are required for the same reachability. Even better results are possible for larger networks. If an important node becomes inactive, this algorithm can find new routes that a non-SFN scheme would not be able to find. Thus, two of the major problems in multihopping are addressed; achieving robust routing as well as improving node reachability or reducing transmission power.Keywords: OFDM, single-frequency networks (SFN), DSFN, MANET; multihop routing, transmitter macrodiversity, broadcasting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19291608 Critical Buckling Load of Carbon Nanotube with Non-Local Timoshenko Beam Using the Differential Transform Method
Authors: Tayeb Bensattalah, Mohamed Zidour, Mohamed Ait Amar Meziane, Tahar Hassaine Daouadji, Abdelouahed Tounsi
Abstract:
In this paper, the Differential Transform Method (DTM) is employed to predict and to analysis the non-local critical buckling loads of carbon nanotubes with various end conditions and the non-local Timoshenko beam described by single differential equation. The equation differential of buckling of the nanobeams is derived via a non-local theory and the solution for non-local critical buckling loads is finding by the DTM. The DTM is introduced briefly. It can easily be applied to linear or nonlinear problems and it reduces the size of computational work. Influence of boundary conditions, the chirality of carbon nanotube and aspect ratio on non-local critical buckling loads are studied and discussed. Effects of nonlocal parameter, ratios L/d, the chirality of single-walled carbon nanotube, as well as the boundary conditions on buckling of CNT are investigated.
Keywords: Boundary conditions, buckling, non-local, the differential transform method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9671607 Satisfying and Frustrating Aspects of ICT Teaching: A Comparison Based On Self-Efficacy
Authors: Deniz Deryakulu, Sener Buyukozturk, Sirin Karadeniz, Sinan Olkun
Abstract:
The purpose of this study was to determine the most satisfying and frustrating aspects of ICT (Information and Communications Technologies) teaching in Turkish schools. Another aim was to compare these aspects based-on ICT teachers- selfefficacy. Participants were 119 ICT teachers from different geographical areas of Turkey. Participants were asked to list salient satisfying and frustrating aspects of ICT teaching, and to fill out the Self-Efficacy Scale for ICT Teachers. Results showed that the high self-efficacy teachers listed more positive and negative aspects of ICT teaching then did the low self-efficacy teachers. The satisfying aspects of ICT teaching were the dynamic nature of ICT subject, higher student interest, having opportunity to help other subject teachers, and lecturing in well-equipped labs, whereas the most frequently cited frustrating aspects of ICT teaching were ICT-related extra works of schools and colleagues, shortages of hardware and technical problems, indifferent students, insufficient teaching time, and the status of ICT subject in school curriculum. This information could be useful in redesigning ICT teachers- roles and responsibilities as well as job environment in schools.
Keywords: ICT teachers, frustrating aspects of ICT teaching, satisfying aspects of ICT teaching, teacher self-efficacy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17461606 Minimization Problems for Generalized Reflexive and Generalized Anti-Reflexive Matrices
Authors: Yongxin Yuan
Abstract:
Let R ∈ Cm×m and S ∈ Cn×n be nontrivial unitary involutions, i.e., RH = R = R−1 = ±Im and SH = S = S−1 = ±In. A ∈ Cm×n is said to be a generalized reflexive (anti-reflexive) matrix if RAS = A (RAS = −A). Let ρ be the set of m × n generalized reflexive (anti-reflexive) matrices. Given X ∈ Cn×p, Z ∈ Cm×p, Y ∈ Cm×q and W ∈ Cn×q, we characterize the matrices A in ρ that minimize AX−Z2+Y HA−WH2, and, given an arbitrary A˜ ∈ Cm×n, we find a unique matrix among the minimizers of AX − Z2 + Y HA − WH2 in ρ that minimizes A − A˜. We also obtain sufficient and necessary conditions for existence of A ∈ ρ such that AX = Z, Y HA = WH, and characterize the set of all such matrices A if the conditions are satisfied. These results are applied to solve a class of left and right inverse eigenproblems for generalized reflexive (anti-reflexive) matrices.
Keywords: approximation, generalized reflexive matrix, generalized anti-reflexive matrix, inverse eigenvalue problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11131605 Impact of Implementing VPN to Secure Wireless LAN
Authors: H. Bourdoucen, A. Al Naamany, A. Al Kalbani
Abstract:
Many corporations are seriously concerned about security of networks and therefore, their network supervisors are still reluctant to install WLANs. In this regards, the IEEE802.11i standard was developed to address the security problems, even though the mistrust of the wireless LAN technology is still existing. The thought was that the best security solutions could be found in open standards based technologies that can be delivered by Virtual Private Networking (VPN) being used for long time without addressing any security holes for the past few years. This work, addresses this issue and presents a simulated wireless LAN of IEEE802.11g protocol, and analyzes impact of integrating Virtual Private Network technology to secure the flow of traffic between the client and the server within the LAN, using OPNET WLAN utility. Two Wireless LAN scenarios have been introduced and simulated. These are based on normal extension to a wired network and VPN over extension to a wired network. The results of the two scenarios are compared and indicate the impact of improving performance, measured by response time and load, of Virtual Private Network over wireless LAN.Keywords: IEEE802.11, VPN, Networking, Secure Wireless, WLAN, Opnet.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3003