Search results for: responsive environment
742 Hydrophobic Characteristics of EPDM Composite Insulators in Simulated Arid Desert Environment
Authors: Yasin Khan
Abstract:
Overhead electrical insulators form an important link in an electric power system. Along with the traditional insulators (i.e. glass and porcelain, etc) presently the polymeric insulators are also used world widely. These polymeric insulators are very sensitive to various environmental parameters such temperature, environmental pollution, UV-radiations, etc. which seriously effect their electrical, chemical and hydrophobic properties. The UV radiation level in the central region of Saudi Arabia is high as compared to the IEC standard for the accelerated aging of the composite insulators. Commonly used suspension type of composite EPDM (Ethylene Propylene Diene Monomer) insulator was subjected to accelerated stress aging as per modified IEC standard simulating the inland arid deserts atmospheric condition and also as per IEC-61109 standard. The hydrophobic characteristics were studied by measuring the contact angle along the insulator surface before and after the accelerated aging of the samples. It was found that EPDM insulator loses it hydrophobic properties proportional to the intensity of UV irradiations and its rate of recovery is also very low as compared to Silicone Rubber insulator.KeywordsEPDM, composite insulators, accelerated aging, hydrophobicity, contact angle.Keywords: EPDM, composite insulators, accelerated aging, hydrophobicity, contact angle.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2756741 A Mixed Expert Evaluation System and Dynamic Interval-Valued Hesitant Fuzzy Selection Approach
Authors: Hossein Gitinavard, Mohammad Hossein Fazel Zarandi
Abstract:
In the last decades, concerns about the environmental issues lead to professional and academic efforts on green supplier selection problems. In this sake, one of the main issues in evaluating the green supplier selection problems, which could increase the uncertainty, is the preferences of the experts' judgments about the candidate green suppliers. Therefore, preparing an expert system to evaluate the problem based on the historical data and the experts' knowledge can be sensible. This study provides an expert evaluation system to assess the candidate green suppliers under selected criteria in a multi-period approach. In addition, a ranking approach under interval-valued hesitant fuzzy set (IVHFS) environment is proposed to select the most appropriate green supplier in planning horizon. In the proposed ranking approach, the IVHFS and the last aggregation approach are considered to margin the errors and to prevent data loss, respectively. Hence, a comparative analysis is provided based on an illustrative example to show the feasibility of the proposed approach.Keywords: Green supplier selection, expert system, ranking approach, interval-valued hesitant fuzzy setting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1424740 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes
Authors: Jiří Barta
Abstract:
At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.Keywords: Computer simulation, communication, continuity, critical infrastructure, information systems, safety.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1719739 Estimation of Vertical Handover Probability in an Integrated UMTS and WLAN Networks
Authors: Diganta Kumar Pathak, Manashjyoti Bhuyan, Vaskar Deka
Abstract:
Vertical Handover(VHO) among different communication technologies ensuring uninterruption and service continuity is one of the most important performance parameter in Heterogenous networks environment. In an integrated Universal Mobile Telecommunicatin System(UMTS) and Wireless Local Area Network(WLAN), WLAN is given an inherent priority over UMTS because of its high data rates with low cost. Therefore mobile users want to be associated with WLAN maximum of the time while roaming, to enjoy best possible services with low cost. That encourages reduction of number of VHO. In this work the reduction of number of VHO with respect to varying number of WLAN Access Points(APs) in an integrated UMTS and WLAN network is investigated through simulation to provide best possible cost effective service to the users. The simulation has been carried out for an area (7800 × 9006)m2 where COST-231 Hata model and 3GPP (TR 101 112 V 3.1.0) specified models are used for WLAN and UMTS path loss models respectively. The handover decision is triggered based on the received signal level as compared to the fade margin. Fade margin gives a probabilistic measure of the reliability of the communication link. A relationship between number of WLAN APs and the number of VHO is also established in this work.
Keywords: VHO, UMTS, WLAN, MT, AP, BS.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2036738 Role of Feedbacks in Simulation-Based Learning
Authors: Usman Ghani
Abstract:
Feedback is a vital element for improving student learning in a simulation-based training as it guides and refines learning through scaffolding. A number of studies in literature have shown that students’ learning is enhanced when feedback is provided with personalized tutoring that offers specific guidance and adapts feedback to the learner in a one-to-one environment. Thus, emulating these adaptive aspects of human tutoring in simulation provides an effective methodology to train individuals. This paper presents the results of a study that investigated the effectiveness of automating different types of feedback techniques such as Knowledge-of-Correct-Response (KCR) and Answer-Until- Correct (AUC) in software simulation for learning basic information technology concepts. For the purpose of comparison, techniques like simulation with zero or no-feedback (NFB) and traditional hands-on (HON) learning environments are also examined. The paper presents the summary of findings based on quantitative analyses which reveal that the simulation based instructional strategies are at least as effective as hands-on teaching methodologies for the purpose of learning of IT concepts. The paper also compares the results of the study with the earlier studies and recommends strategies for using feedback mechanism to improve students’ learning in designing and simulation-based IT training.Keywords: Simulation, feedback, training, hands-on, labs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1570737 Long Short-Term Memory Based Model for Modeling Nicotine Consumption Using an Electronic Cigarette and Internet of Things Devices
Authors: Hamdi Amroun, Yacine Benziani, Mehdi Ammi
Abstract:
In this paper, we want to determine whether the accurate prediction of nicotine concentration can be obtained by using a network of smart objects and an e-cigarette. The approach consists of, first, the recognition of factors influencing smoking cessation such as physical activity recognition and participant’s behaviors (using both smartphone and smartwatch), then the prediction of the configuration of the e-cigarette (in terms of nicotine concentration, power, and resistance of e-cigarette). The study uses a network of commonly connected objects; a smartwatch, a smartphone, and an e-cigarette transported by the participants during an uncontrolled experiment. The data obtained from sensors carried in the three devices were trained by a Long short-term memory algorithm (LSTM). Results show that our LSTM-based model allows predicting the configuration of the e-cigarette in terms of nicotine concentration, power, and resistance with a root mean square error percentage of 12.9%, 9.15%, and 11.84%, respectively. This study can help to better control consumption of nicotine and offer an intelligent configuration of the e-cigarette to users.
Keywords: Iot, activity recognition, automatic classification, unconstrained environment, deep neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1133736 Influences on Occupational Identity through Trans and Gender Diverse Identity: A Qualitative Study about Work Experiences of Trans and Gender Diverse Individuals
Authors: Robin C. Ladwig
Abstract:
Work experiences and satisfaction as well as the feeling of belonging has been narrowly explored from the perspective of trans and gender diverse individuals. Hence, the study investigates the relationship of values, attitudes, and norms of occupational environments and the working identity of trans and gender diverse people of the Australian workforce. Based on 22 semi-structured interviews with trans and gender diverse individuals regarding their work and career experiences, a first insight about their feeling of belonging through commonality in the workplace could be established. Communality between the values, attitudes and norms of a trans and gender diverse individuals working identities and profession, organization and working environment could increase the feeling of belonging. Further reflection and evaluation of trans and gender diverse identities in the workplace need to be considered to create an equitable and inclusive workplace of the future. Consequently, an essential development step for the future of work and its fundamental values of diversity, inclusion, and belonging will consist of the acknowledgement and inclusion of trans and gender diverse people as part of a broader social identity of the workplace.Keywords: Belonging, future of work, working identity, trans and gender diverse identity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 560735 A Review on the Development and Challenges of Green Roof Systems in Malaysia
Authors: M. F. Chow, M. F. Abu Bakar
Abstract:
Green roof system is considered a relatively new concept in Malaysia even though it has been implemented widely in the developed countries. Generally, green roofs provide many benefits such as enhancing aesthetical quality of the built environment, reduce urban heat island effect, reduce energy consumption, improve stormwater attenuation, and reduce noise pollution. A better understanding on the implementation of green roof system in Malaysia is crucial, as Malaysia’s climate is different if compared with the climate in temperate countries where most of the green roof studies have been conducted. This study has concentrated on the technical aspect of green roof system which focuses on i) types of plants and method of planting; ii) engineering design for green roof system; iii) its hydrological performance on reducing stormwater runoff; and iv) benefits of green roofs with respect to energy. Literature review has been conducted to identify the development and obstacles associated with green roofs systems in Malaysia. The study had identified the challenges and potentials of green roofs development in Malaysia. This study also provided the recommendations on standard design and strategies on the implementation of green roofs in Malaysia in the near future.Keywords: Engineering design, green roof, sustainable development, tropical countries.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4659734 Classroom Incivility Behaviours among Medical Students: A Comparative Study in Pakistan
Authors: Manal Rauf
Abstract:
Trained medical practitioners are produced from medical colleges serving in public and private sectors. Prime responsibility of teaching faculty is to inculcate required work ethic among the students by serving as role models for them. It is an observed fact that classroom incivility behaviours are providing a friction in achieving these targets. Present study aimed at identification of classroom incivility behaviours observed by teachers and students of public and private medical colleges as per Glasser’s Choice Theory, making a comparison and investigating the strategies being adopted by teachers of both sectors to control undesired class room behaviours. Findings revealed that a significant difference occurs between teacher and student incivility behaviours. Public sector teacher focussed on survival as a strong factor behind in civil behaviours whereas private sector teachers considered power as the precedent for incivility. Teachers of both sectors are required to use verbal as well as non-verbal immediacy to reach a healthy leaning environment.
Keywords: Classroom incivility behaviour, Glasser choice theory, Mehrabian immediacy theory, medical student.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1364733 Study of Characteristics of Multi-Layer Piezoelectric Transformers by using 3-D Finite Element Method
Authors: C. Panya-Isara, T. Kulworawanichpong, P. Pao-La-Or
Abstract:
Piezoelectric transformers are electronic devices made from piezoelectric materials. The piezoelectric transformers as the name implied are used for changing voltage signals from one level to another. Electrical energy carried with signals is transferred by means of mechanical vibration. Characterizing in both electrical and mechanical properties leads to extensively use and efficiency enhancement of piezoelectric transformers in various applications. In this paper, study and analysis of electrical and mechanical properties of multi-layer piezoelectric transformers in forms of potential and displacement distribution throughout the volume, respectively. This paper proposes a set of quasi-static mathematical model of electromechanical coupling for piezoelectric transformer by using a set of partial differential equations. Computer-based simulation utilizing the three-dimensional finite element method (3-D FEM) is exploited as a tool for visualizing potentials and displacements distribution within the multi-layer piezoelectric transformer. This simulation was conducted by varying a number of layers. In this paper 3, 5 and 7 of the circular ring type were used. The computer simulation based on the use of the FEM has been developed in MATLAB programming environment.Keywords: Multi-layer Piezoelectric Transformer, 3-D Finite Element Method (3-D FEM), Electro-mechanical Coupling, Mechanical Vibration
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1644732 Energy Efficient Resource Allocation and Scheduling in Cloud Computing Platform
Authors: Shuen-Tai Wang, Ying-Chuan Chen, Yu-Ching Lin
Abstract:
There has been renewal of interest in the relation between Green IT and cloud computing in recent years. Cloud computing has to be a highly elastic environment which provides stable services to users. The growing use of cloud computing facilities has caused marked energy consumption, putting negative pressure on electricity cost of computing center or data center. Each year more and more network devices, storages and computers are purchased and put to use, but it is not just the number of computers that is driving energy consumption upward. We could foresee that the power consumption of cloud computing facilities will double, triple, or even more in the next decade. This paper aims at resource allocation and scheduling technologies that are short of or have not well developed yet to reduce energy utilization in cloud computing platform. In particular, our approach relies on recalling services dynamically onto appropriate amount of the machines according to user’s requirement and temporarily shutting down the machines after finish in order to conserve energy. We present initial work on integration of resource and power management system that focuses on reducing power consumption such that they suffice for meeting the minimizing quality of service required by the cloud computing platform.Keywords: Cloud computing, energy utilization, power consumption, resource allocation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1442731 Digital Forensics Compute Cluster: A High Speed Distributed Computing Capability for Digital Forensics
Authors: Daniel Gonzales, Zev Winkelman, Trung Tran, Ricardo Sanchez, Dulani Woods, John Hollywood
Abstract:
We have developed a distributed computing capability, Digital Forensics Compute Cluster (DFORC2) to speed up the ingestion and processing of digital evidence that is resident on computer hard drives. DFORC2 parallelizes evidence ingestion and file processing steps. It can be run on a standalone computer cluster or in the Amazon Web Services (AWS) cloud. When running in a virtualized computing environment, its cluster resources can be dynamically scaled up or down using Kubernetes. DFORC2 is an open source project that uses Autopsy, Apache Spark and Kafka, and other open source software packages. It extends the proven open source digital forensics capabilities of Autopsy to compute clusters and cloud architectures, so digital forensics tasks can be accomplished efficiently by a scalable array of cluster compute nodes. In this paper, we describe DFORC2 and compare it with a standalone version of Autopsy when both are used to process evidence from hard drives of different sizes.Keywords: Cloud computing, cybersecurity, digital forensics, Kafka, Kubernetes, Spark.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1658730 Gender Differences in Entrepreneurship: Situation, Characteristics, Motivation and Entrepreneurial Behavior of Women Entrepreneurs in Switzerland
Authors: Mathias Rossi, Silna Borter, Marie Sansonnens
Abstract:
Entrepreneurs are important for national labour markets and economies in that they contribute significantly to economic growth as well as provide the majority of jobs and create new ones. According to the Global Entrepreneurship Monitor’s “Report on Women and Entrepreneurship”, investment in women’s entrepreneurship is an important way to exponentially increase the impact of new venture creation finding ways to empower women’s participation and success in entrepreneurship are critical for more sustainable and successful economic development. Our results confirm that they are still differences between men and women entrepreneurs The reasons seems to be the lack of specific business skills, the less extensive social network, and the lack of identification patterns among women. Those differences can be explained by the fact that women still have fewer opportunities to make a career. If this is correct, we can predict an increasing proportion of women among entrepreneurs in the next years. Concerning the development of a favorable environment for developing and enhancing women entrepreneurship activities, our results show the insertion in a network and the role of a model doubtless represent elements determining in the choice to launch an entrepreneurship activity, as well as a precious resource for the success of her company.
Keywords: Women entrepreneurship, entrepreneurship motivation, entrepreneurial behavior.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3353729 Design and Analysis of Fault Tolerate feature of n-Phase Induction Motor Drive
Authors: G. Renuka Devi
Abstract:
This paper presents design and analysis of fault tolerate feature of n-phase induction motor drive. The n-phase induction motor (more than 3-phases) has a number of advantages over conventional 3-phase induction motor, it has low torque pulsation with increased torque density, more fault tolerant feature, low current ripple with increased efficiency. When increasing the number of phases, it has reduced current per phase without increasing per phase voltage, resulting in an increase in the total power rating of n-phase motors in the same volume machine. In this paper, the theory of operation of a multi-phase induction motor is discussed. The detailed study of d-q modeling of n-phase induction motors is elaborated. The d-q model of n-phase (5, 6, 7, 9 and 12) induction motors is developed in a MATLAB/Simulink environment. The steady state and dynamic performance of the multi-phase induction motor is studied under varying load conditions. Comparison of 5-phase induction is presented under normal and fault conditions.
Keywords: d-q model, dynamic Response, fault tolerant feature, matlab/simulink, multi-phase induction motor, transient response.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 578728 Generational PipeLined Genetic Algorithm (PLGA)using Stochastic Selection
Authors: Malay K. Pakhira, Rajat K. De
Abstract:
In this paper, a pipelined version of genetic algorithm, called PLGA, and a corresponding hardware platform are described. The basic operations of conventional GA (CGA) are made pipelined using an appropriate selection scheme. The selection operator, used here, is stochastic in nature and is called SA-selection. This helps maintaining the basic generational nature of the proposed pipelined GA (PLGA). A number of benchmark problems are used to compare the performances of conventional roulette-wheel selection and the SA-selection. These include unimodal and multimodal functions with dimensionality varying from very small to very large. It is seen that the SA-selection scheme is giving comparable performances with respect to the classical roulette-wheel selection scheme, for all the instances, when quality of solutions and rate of convergence are considered. The speedups obtained by PLGA for different benchmarks are found to be significant. It is shown that a complete hardware pipeline can be developed using the proposed scheme, if parallel evaluation of the fitness expression is possible. In this connection a low-cost but very fast hardware evaluation unit is described. Results of simulation experiments show that in a pipelined hardware environment, PLGA will be much faster than CGA. In terms of efficiency, PLGA is found to outperform parallel GA (PGA) also.Keywords: Hardware evaluation, Hardware pipeline, Optimization, Pipelined genetic algorithm, SA-selection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1443727 Data Integrity: Challenges in Health Information Systems in South Africa
Authors: T. Thulare, M. Herselman, A. Botha
Abstract:
Poor system use, including inappropriate design of health information systems, causes difficulties in communication with patients and increased time spent by healthcare professionals in recording the necessary health information for medical records. System features like pop-up reminders, complex menus, and poor user interfaces can make medical records far more time consuming than paper cards as well as affect decision-making processes. Although errors associated with health information and their real and likely effect on the quality of care and patient safety have been documented for many years, more research is needed to measure the occurrence of these errors and determine the causes to implement solutions. Therefore, the purpose of this paper is to identify data integrity challenges in hospital information systems through a scoping review and based on the results provide recommendations on how to manage these. Only 34 papers were found to be most suitable out of 297 publications initially identified in the field. The results indicated that human and computerized systems are the most common challenges associated with data integrity and factors such as policy, environment, health workforce, and lack of awareness attribute to these challenges but if measures are taken the data integrity challenges can be managed.
Keywords: Data integrity, data integrity challenges, hospital information systems, South Africa.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1376726 Design and Analysis of MEMS based Accelerometer for Automatic Detection of Railway Wheel Flat
Authors: Rajib Ul Alam Uzzal, Ion Stiharu, Waiz Ahmed
Abstract:
This paper presents the modeling of a MEMS based accelerometer in order to detect the presence of a wheel flat in the railway vehicle. A haversine wheel flat is assigned to one wheel of a 5 DOF pitch plane vehicle model, which is coupled to a 3 layer track model. Based on the simulated acceleration response obtained from the vehicle-track model, an accelerometer is designed that meets all the requirements to detect the presence of a wheel flat. The proposed accelerometer can survive in a dynamic shocking environment with acceleration up to ±150g. The parameters of the accelerometer are calculated in order to achieve the required specifications using lumped element approximation and the results are used for initial design layout. A finite element analysis code (COMSOL) is used to perform simulations of the accelerometer under various operating conditions and to determine the optimum configuration. The simulated results are found within about 2% of the calculated values, which indicates the validity of lumped element approach. The stability of the accelerometer is also determined in the desired range of operation including the condition under shock.
Keywords: MEMS accelerometer, Pitch plane vehicle, wheel flat.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3073725 Developing a Regulator for Improving the Operation Modes of the Electrical Drive Motor
Authors: Baghdasaryan Marinka
Abstract:
The operation modes of the synchronous motors used in the production processes are greatly conditioned by the accidentally changing technological and power indices. As a result, the electrical drive synchronous motor may appear in irregular operation regimes. Although there are numerous works devoted to the development of the regulator for the synchronous motor operation modes, their application for the motors working in the irregular modes is not expedient. In this work, to estimate the issues concerning the stability of the synchronous electrical drive system, the transfer functions of the electrical drive synchronous motors operating in the synchronous and induction modes have been obtained. For that purpose, a model for investigating the frequency characteristics has been developed in the LabView environment. Frequency characteristics for assessing the transient process of the electrical drive system, operating in the synchronous and induction modes have been obtained, and based on their assessment, a regulator for improving the operation modes of the motor has been proposed. The proposed regulator can be successfully used to prevent the irregular modes of the electrical drive synchronous motor, as well as to estimate the operation state of the drive motor of the mechanism with a changing load.
Keywords: Electrical drive system, synchronous motor, regulator, stability, transition process.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 709724 The Application of International Law in Terms of Earthlife Africa Johannesburg and Another v Minister of Energy and Others 65662/16 (2017) Case
Authors: M. van der Bank
Abstract:
This study involves a legal analysis of the case Earthlife Africa Johannesburg v Minister of Environmental Affairs and Others. The case considered the impact of the Thabametsi Power Project if it operated to the expected year 2060 on the global climate and ever-changing climate, in South Africa. This judgment highlights the significance, place and principles of climate change and where climate change impacts the South African environmental law which has its founding principles in the Constitution of the Republic of South Africa, 1996. This paper seeks to examine the advances for climate change regulation and application in terms of international law, in South Africa, through a qualitative study involving comparative national and international case law. A literature review study was conducted to compare and contrast the various aspects of law in order to support the argument undertaken. The paper presents a detailed discussion of the current legislation and the position as it currently stands with reference to international law and interpretation. The relevant protections as outlined in the National Environmental Management Act will be discussed. It then proceeds to outline the potential liability of the Minister in the interpretation and application of international law.
Keywords: Climate change, environment, environmental review, international law, principles.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 946723 The Impact of the Type of Diversification of Listed Construction Enterprises in China on Corporation Performance
Authors: Yi-Hsin Lin, Ying-Ying Li
Abstract:
The construction industry is the pillar industry in China, accounting for about 6% of the gross domestic product. Along with changes in the external environment of the construction industry in China, the construction firm faces fierce competition. The paper aims to investigate the relationship between diversified types of construction firm and its performance in China. Based on generalist and specialist strategy in organizational ecology, we think a generalist organization can be applied to an enterprise with diversified developments, while specialist groups are extended to professional enterprises .This study takes advantage of annual financial data of listed construction firm to empirically verify the relationship between diversification and corporation performance establishing a regression equation to econometric analysis. We find that: 1) Specialization can significantly improve the level of profitability of listed construction firms, and there is a significant positive relationship with corporate performance; 2) The level of operating performance of listed construction enterprises which engage in unrelated diversification is higher than those with related diversification; 3) The relationship between state-owned construction firms and corporate performance is negative. The more the year of foundation is, the higher performance will be; however, the more the year of being listed, the lower performance will be.Keywords: Diversification, Specialization, Construction Firm, Performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1749722 From Vertigo to Verticality: An Example of Phenomenological Design in Architecture
Authors: E. Osorio Schmied
Abstract:
Architects commonly attempt a depiction of organic forms when their works are inspired by nature, regardless of the building site. Nevertheless it is also possible to try matching structures with natural scenery, by applying a phenomenological approach in terms of spatial operations, regarding perceptions from nature through architectural aspects such as protection, views, and orientation. This method acknowledges a relationship between place and space, where intentions towards tangible facts then become design statements. Although spaces resulting from such a process may present an effective response to the environment, they can also offer further outcomes beyond the realm of form. The hypothesis is that, in addition to recognising a bond between architecture and nature, it is also plausible to associate such perceptions with the inner ambient of buildings, by analysing features such as daylight. The case study of a single-family house in a rainforest near Valdivia, Chilean Patagonia is presented, with the intention of addressing the above notions through a discussion of the actual effects of inhabiting a place by way of a series of insights, including a revision of diagrams and photographs that assist in understanding the implications of this design practice. In addition, figures based on post-occupancy behaviour and daylighting performance relate both architectural and environmental issues to a decision-making process motivated by the observation of nature.
Keywords: Architecture, design statements, nature, perception.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1077721 Social Semantic Web-Based Analytics Approach to Support Lifelong Learning
Authors: Khaled Halimi, Hassina Seridi-Bouchelaghem
Abstract:
The purpose of this paper is to describe how learning analytics approaches based on social semantic web techniques can be applied to enhance the lifelong learning experiences in a connectivist perspective. For this reason, a prototype of a system called SoLearn (Social Learning Environment) that supports this approach. We observed and studied literature related to lifelong learning systems, social semantic web and ontologies, connectivism theory, learning analytics approaches and reviewed implemented systems based on these fields to extract and draw conclusions about necessary features for enhancing the lifelong learning process. The semantic analytics of learning can be used for viewing, studying and analysing the massive data generated by learners, which helps them to understand through recommendations, charts and figures their learning and behaviour, and to detect where they have weaknesses or limitations. This paper emphasises that implementing a learning analytics approach based on social semantic web representations can enhance the learning process. From one hand, the analysis process leverages the meaning expressed by semantics presented in the ontology (relationships between concepts). From the other hand, the analysis process exploits the discovery of new knowledge by means of inferring mechanism of the semantic web.
Keywords: Connectivism, data visualization, informal learning, learning analytics, semantic web, social web.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 813720 A General Mandatory Access Control Framework in Distributed Environments
Authors: Feng Yang, Xuehai Zhou, Dalei Hu
Abstract:
In this paper, we propose a general mandatory access framework for distributed systems. The framework can be applied into multiple operating systems and can handle multiple stakeholders. Despite considerable advancements in the area of mandatory access control, a certain approach to enforcing mandatory access control can only be applied in a specific operating system. Other than PC market in which windows captures the overwhelming shares, there are a number of popular operating systems in the emerging smart phone environment, i.e. Android, Windows mobile, Symbian, RIM. It should be noted that more and more stakeholders are involved in smartphone software, such as devices owners, service providers and application providers. Our framework includes three parts—local decision layer, the middle layer and the remote decision layer. The middle layer takes charge of managing security contexts, OS API, operations and policy combination. The design of the remote decision layer doesn’t depend on certain operating systems because of the middle layer’s existence. We implement the framework in windows, linux and other popular embedded systems.
Keywords: Mandatory Access Control, Distributed System, General Platform.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2232719 Enhancing the Effectiveness of Air Defense Systems through Simulation Analysis
Authors: F. Felipe
Abstract:
Air Defense Systems contain high-value assets that are expected to fulfill their mission for several years - in many cases, even decades - while operating in a fast-changing, technology-driven environment. Thus, it is paramount that decision-makers can assess how effective an Air Defense System is in the face of new developing threats, as well as to identify the bottlenecks that could jeopardize the security of the airspace of a country. Given the broad extent of activities and the great variety of assets necessary to achieve the strategic objectives, a systems approach was taken in order to delineate the core requirements and the physical architecture of an Air Defense System. Then, value-focused thinking helped in the definition of the measures of effectiveness. Furthermore, analytical methods were applied to create a formal structure that preliminarily assesses such measures. To validate the proposed methodology, a powerful simulation was also used to determine the measures of effectiveness, now in more complex environments that incorporate both uncertainty and multiple interactions of the entities. The results regarding the validity of this methodology suggest that the approach can support decisions aimed at enhancing the capabilities of Air Defense Systems. In conclusion, this paper sheds some light on how consolidated approaches of Systems Engineering and Operations Research can be used as valid techniques for solving problems regarding a complex and yet vital matter.Keywords: Air defense, effectiveness, system, simulation, decision-support.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 408718 Adaptation Learning Speed Control for a High- Performance Induction Motor using Neural Networks
Authors: M. Zerikat, S. Chekroun
Abstract:
This paper proposes an effective adaptation learning algorithm based on artificial neural networks for speed control of an induction motor assumed to operate in a high-performance drives environment. The structure scheme consists of a neural network controller and an algorithm for changing the NN weights in order that the motor speed can accurately track of the reference command. This paper also makes uses a very realistic and practical scheme to estimate and adaptively learn the noise content in the speed load torque characteristic of the motor. The availability of the proposed controller is verified by through a laboratory implementation and under computation simulations with Matlab-software. The process is also tested for the tracking property using different types of reference signals. The performance and robustness of the proposed control scheme have evaluated under a variety of operating conditions of the induction motor drives. The obtained results demonstrate the effectiveness of the proposed control scheme system performances, both in steady state error in speed and dynamic conditions, was found to be excellent and those is not overshoot.Keywords: Electric drive, Induction motor, speed control, Adaptive control, neural network, High Performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2027717 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: Access controls, cloud computing, confidentiality, identity and access management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 728716 Investigating the Contemporary Architecture Education Challenges in India
Authors: Vriddhi Prasad
Abstract:
The paper briefly outlines the nature of contemporary Architecture Education in India and its present challenges with theoretically feasible solutions. It explores in detail the arduous position of architecture education owing to, privatization of higher education institutes in India, every changing demand of the technology driven industry and discipline, along with regional and cultural resources that should be explored academically for the enrichment of graduates. With the government's education policy of supporting privatization, a comprehensive role for the regulating body of Architecture Education becomes imperative. The paper provides key insights through empirical research into the nature of these roles and the areas which need attention in light of the problems. With the aid of critically acclaimed education model like Design Build, contextual retrofits for Indian institutes can be stressed for inclusion in the curriculum. The pairing of a private institute and public industry/research body and vice versa can lead to pro-economic and pro-social research environment. These reforms if stressed by an autonomous nationwide regulating body rather than the state will lead to uniformity and flexibility of curriculum which promotes the creation of fresh graduates who are adaptable to the changing needs.
Keywords: Architecture education, building information modeling, design build, pedagogy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1111715 On the Network Packet Loss Tolerance of SVM Based Activity Recognition
Authors: Gamze Uslu, Sebnem Baydere, Alper K. Demir
Abstract:
In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Keywords: Activity recognition, support vector machines, acceleration sensor, wireless sensor networks, packet loss.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2871714 Bayesian Network Model for Students- Laboratory Work Performance Assessment: An Empirical Investigation of the Optimal Construction Approach
Authors: Ifeyinwa E. Achumba, Djamel Azzi, Rinat Khusainov
Abstract:
There are three approaches to complete Bayesian Network (BN) model construction: total expert-centred, total datacentred, and semi data-centred. These three approaches constitute the basis of the empirical investigation undertaken and reported in this paper. The objective is to determine, amongst these three approaches, which is the optimal approach for the construction of a BN-based model for the performance assessment of students- laboratory work in a virtual electronic laboratory environment. BN models were constructed using all three approaches, with respect to the focus domain, and compared using a set of optimality criteria. In addition, the impact of the size and source of the training, on the performance of total data-centred and semi data-centred models was investigated. The results of the investigation provide additional insight for BN model constructors and contribute to literature providing supportive evidence for the conceptual feasibility and efficiency of structure and parameter learning from data. In addition, the results highlight other interesting themes.Keywords: Bayesian networks, model construction, parameterlearning, structure learning, performance index, model comparison.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1727713 Secure Socket Layer in the Network and Web Security
Authors: Roza Dastres, Mohsen Soori
Abstract:
In order to electronically exchange information between network users in the web of data, different software such as outlook is presented. So, the traffic of users on a site or even the floors of a building can be decreased as a result of applying a secure and reliable data sharing software. It is essential to provide a fast, secure and reliable network system in the data sharing webs to create an advanced communication systems in the users of network. In the present research work, different encoding methods and algorithms in data sharing systems is studied in order to increase security of data sharing systems by preventing the access of hackers to the transferred data. To increase security in the networks, the possibility of textual conversation between customers of a local network is studied. Application of the encryption and decryption algorithms is studied in order to increase security in networks by preventing hackers from infiltrating. As a result, a reliable and secure communication system between members of a network can be provided by preventing additional traffic in the website environment in order to increase speed, accuracy and security in the network and web systems of data sharing.
Keywords: Secure Socket Layer, Security of networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 510