Search results for: State space description.
1374 Alexandria’s Eastern Entrance: Analysis of Qaitbay Waterfront Development
Authors: Riham A. Ragheb
Abstract:
Water is a fundamental attraction in all cultures and among all classes of people,tourists and citizens. It is a favorite location for major tourism initiatives, celebrations and ceremonies. The vitality of any city depends on citizen action to take part in creating the neighborhoods they desire. Waterfront can provide extensive new areas of high quality public open space in parts of the city that are popular venues for social activities and also have the highest land values. Each city must have a character that can be used as a key attraction for the development. The morphology of a waterfront can be identified by both its physical characteristics and the socio-cultural activities that take place in the area. Alexandria has been selected as an area of study because it has a unique character due to its possession of a variety of waterfronts.
This paper aims to set some criteria of successful waterfront development and then through these criteria analyzing the development of the Qaitbay waterfront in the eastern harbor in Alexandria, Egypt. Hence, a comprehensive improvement of the waterfront areas is certainly needed to ensure a successful waterfront development radiated the sense of uniformity and coherence.
Alexandria can benefit from these criteria to develop its urban waterfront in order to preserve and revitalize its unique waterfront character and achieve mixed uses and tourism development.
Keywords: Place making, Qaitbay, responsive environment, sustainable urban design, waterfront development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31931373 Exact Solutions of Steady Plane Flows of an Incompressible Fluid of Variable Viscosity Using (ξ, ψ)- Or (η, ψ)- Coordinates
Authors: Rana Khalid Naeem, Asif Mansoor, Waseem Ahmed Khan, Aurangzaib
Abstract:
The exact solutions of the equations describing the steady plane motion of an incompressible fluid of variable viscosity for an arbitrary state equation are determined in the (ξ,ψ) − or (η,ψ )- coordinates where ψ(x,y) is the stream function, ξ and η are the parts of the analytic function, ϖ =ξ( x,y )+iη( x,y ). Most of the solutions involve arbitrary function/ functions indicating that the flow equations possess an infinite set of solutions.
Keywords: Exact solutions, Fluid of variable viscosity, Navier-Stokes equations, Steady plane flows
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34481372 Gas Lift Optimization Using Smart Gas Lift Valve
Authors: Mohamed A. G. H. Abdalsadig, Amir Nourian, G. G. Nasr, M. Babaie
Abstract:
Gas lift is one of the most common forms of artificial lift, particularly for offshore wells because of its relative down hole simplicity, flexibility, reliability, and ability to operate over a large range of rates and occupy very little space at the well head. Presently, petroleum industry is investing in exploration and development fields in offshore locations where oil and gas wells are being drilled thousands of feet below the ocean in high pressure and temperature conditions. Therefore, gas-lifted oil wells are capable of failure through gas lift valves which are considered as the heart of the gas lift system for controlling the amount of the gas inside the tubing string. The gas injection rate through gas lift valve must be controlled to be sufficient to obtain and maintain critical flow, also, gas lift valves must be designed not only to allow gas passage through it and prevent oil passage, but also for gas injection into wells to be started and stopped when needed. In this paper, smart gas lift valve has been used to investigate the effect of the valve port size, depth of injection and vertical lift performance on well productivity; all these aspects have been investigated using PROSPER simulator program coupled with experimental data. The results show that by using smart gas lift valve, the gas injection rate can be controlled which leads to improved flow performance.
Keywords: Effect of gas lift valve port size, effect water cut, and vertical flow performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24571371 A Business Model Design Process for Social Enterprises: The Critical Role of the Environment
Authors: Hadia Abdel Aziz, Raghda El Ebrashi
Abstract:
Business models are shaped by their design space or the environment they are designed to be implemented in. The rapidly changing economic, technological, political, regulatory and market external environment severely affects business logic. This is particularly true for social enterprises whose core mission is to transform their environments, and thus, their whole business logic revolves around the interchange between the enterprise and the environment. The context in which social business operates imposes different business design constraints while at the same time, open up new design opportunities. It is also affected to a great extent by the impact that successful enterprises generate; a continuous loop of interaction that needs to be managed through a dynamic capability in order to generate a lasting powerful impact. This conceptual research synthesizes and analyzes literature on social enterprise, social enterprise business models, business model innovation, business model design, and the open system view theory to propose a new business model design process for social enterprises that takes into account the critical role of environmental factors. This process would help the social enterprise develop a dynamic capability that ensures the alignment of its business model to its environmental context, thus, maximizing its probability of success.
Keywords: Social enterprise, business model, business model design.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30321370 Time Compression in Engineer-to-Order Industry: A Case Study of a Norwegian Shipbuilding Industry
Authors: Tarek Fatouh, Chehab Elbelehy, Alaa Abdelsalam, Eman Elakkad, Alaa Abdelshafie
Abstract:
This paper aims to explore the possibility of time compression in Engineer to Order production networks. A case study research method is used in a Norwegian shipbuilding project by implementing a value stream mapping lean tool with total cycle time as a unit of analysis. The analysis resulted in demonstrating the time deviations for the planned tasks in one of the processes in the shipbuilding project. So, authors developed a future state map by removing time wastes from value stream process.
Keywords: Engineer to order, total cycle time, value stream mapping, shipbuilding.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5961369 Regulation of Water Balance of the Plant from the Different Geo-Environmental Locations
Authors: Astghik R. Sukiasyan
Abstract:
Under the drought stress condition, the plants would grow slower. Temperature is one of the most important abiotic factors which suppress the germination processes. However, the processes of transpiration are regulated directly by the cell water, which followed to an increase in volume of vacuoles. During stretching under the influence of water pressure, the cell goes into the state of turgor. In our experiments, lines of the semi-dental sweet maize of Armenian population from various zones of growth under mild and severe drought stress were tested. According to results, the value of the water balance of the plant cells may reflect the ability of plants to adapt to drought stress. It can be assumed that the turgor allows evaluating the number of received dissolved substance in cell.Keywords: Water balance, turgor, drought stress, Armenian population of maize.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 10281368 A Mapping Approach of Code Generation for Arinc653-Based Avionics Software
Authors: Lu Zou, Dianfu MA, Ying Wang, Xianqi Zhao
Abstract:
Avionic software architecture has transit from a federated avionics architecture to an integrated modular avionics (IMA) .ARINC 653 (Avionics Application Standard Software Interface) is a software specification for space and time partitioning in Safety-critical avionics Real-time operating systems. Methods to transform the abstract avionics application logic function to the executable model have been brought up, however with less consideration about the code generating input and output model specific for ARINC 653 platform and inner-task synchronous dynamic interaction order sequence. In this paper, we proposed an AADL-based model-driven design methodology to fulfill the purpose to automatically generating Cµ executable model on ARINC 653 platform from the ARINC653 architecture which defined as AADL653 in order to facilitate the development of the avionics software constructed on ARINC653 OS. This paper presents the mapping rules between the AADL653 elements and the elements in Cµ language, and define the code generating rules , designs an automatic C µ code generator .Then, we use a case to illustrate our approach. Finally, we give the related work and future research directions.Keywords: IMA, ARINC653, AADL653, code generation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30381367 Political Finance in Africa: Ethiopia as a Case Study
Authors: Wondwosen Teshome B.
Abstract:
Since 1991 Ethiopia has officially adopted multi-party democracy. At present, there are 89 registered political parties in the country. Though political parties play an important role in the functioning of a democratic government, how to fund them is an issue of major concern. Political parties and individual candidates running for political office have to raise funds for election campaigns, and to survive as political candidates. The aim of this paper is to examine party funding problems in Africa by taking the case of Ethiopia as an example. The paper also evaluates the motives of local and international donors in giving financial and material support to political parties in emerging democracies and assesses the merits and de-merits of their donations.
Keywords: Africa, State funding, Ethiopia, Political finance, Political party, Western donors.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21461366 Heat and Mass Transfer in a Saturated Porous Medium Confined in Cylindrical Annular Geometry
Authors: A. Ja, J. Belabid, A. Cheddadi
Abstract:
This paper reports the numerical simulation of doublediffusive natural convection flows within a horizontal annular filled with a saturated porous medium. The analysis concerns the influence of the different parameters governing the problem, namely, the Rayleigh number Ra, the Lewis number Le and the buoyancy ratio N, on the heat and mass transfer and on the flow structure, in the case of a fixed radius ratio R = 2. The numerical model used for the discretization of the dimensionless equations governing the problem is based on the finite difference method, using the ADI scheme. The study is focused on steady-state solutions in the cooperation situation.
Keywords: Natural convection, double-diffusion, porous medium, annular geometry, finite differences.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22141365 The Resource-Base View of Organization and Innovation: Recognition of Significant Relationship in an Organization
Authors: Francis Deinmodei W. Poazi, Jasmine O. Tamunosiki-Amadi, Maurice Fems
Abstract:
In recent times the resource-based view (RBV) of strategic management has recorded a sizeable attention yet there has not been a considerable scholarly and managerial discourse, debate and attention. As a result, this paper gives special bit of critical reasoning as well as top-notch analyses and relationship between RBV and organizational innovation. The study examines those salient aspects of RBV that basically have the will power in ensuring the organization's capacity to go for innovative capability. In achieving such fit and standpoint, the paper joins other relevant academic discourse and empirical evidence. To this end, a reasonable amount of contributions in setting the ground running for future empirical researches would have been provided. More so, the study is guided and built on the following strength and significance: Firstly, RBV sees resources as heterogeneity which forms a strong point of strength and allows organisations to gain competitive advantage. In order words, competitive advantage can be achieved or delivered to the organization when resources are distinctively utilized in a valuable manner more than the envisaged competitors of the organization. Secondly, RBV is significantly influential in determining the real resources that are available in the organization with a view to locate capabilities within in order to attract more profitability into the organization when applied. Thus, there will be more sustainable growth and success in the ever competitive and emerging market. Thus, to have succinct description of the basic methodologies, the study adopts both qualitative as well as quantitative approach with a view to have a broad samples of opinion in establishing and identifying key and strategic organizational resources to enable managers of resources to gain a competitive advantage as well as generating a sustainable increase and growth in profit. Furthermore, a comparative approach and analysis was used to examine the performance of RBV within the organization. Thus, the following are some of the findings of the study: it is clear that there is a nexus between RBV and growth of competitively viable organizations. More so, in most parts, organizations have heterogeneous resources domiciled in their organizations but not all organizations as it was specifically and intelligently adopting the tenets of RBV to strengthen heterogeneity of resources which allows organisations to gain competitive advantage. Other findings of this study reveal that of managerial perception of RBV with respect to application and transformation of resources to achieve a profitable end. It is against this backdrop, the importance of RBV cannot be overemphasized; the study is strongly convinced and think that RBV view is one focal and distinct approach that is focused on internal to outside strategy which engenders sourcing or generating resources internally as well as having the quest to apply such internally sourced resources diligently to increase or gain competitive advantage.
Keywords: Competitive advantage, innovation, organisation, recognition, resource-based view.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21591364 An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic
Authors: Diogen Babuc
Abstract:
The question that is a motivation of writing is how many devote themselves to discovering something in the world of science where much is discerned and revealed, but at the same time, much is unknown. The insightful elements of this algorithm are the ciphering and deciphering algorithms of Playfair, Caesar, and Vigen`ere. Only a few of their main properties are taken and modified, with the aim of forming a specific functionality of the algorithm called Latin Djokovic. Specifically, a string is entered as input data. A key k is given, with a random value between the values a and b = a+3. The obtained value is stored in a variable with the aim of being constant during the run of the algorithm. In correlation to the given key, the string is divided into several groups of substrings, and each substring has a length of k characters. The next step involves encoding each substring from the list of existing substrings. Encoding is performed using the basis of Caesar algorithm, i.e. shifting with k characters. However, that k is incremented by 1 when moving to the next substring in that list. When the value of k becomes greater than b + 1, it will return to its initial value. The algorithm is executed, following the same procedure, until the last substring in the list is traversed. Using this polyalphabetic method, ciphering and deciphering of strings are achieved. The algorithm also works for a 100-character string. The x character is not used when the number of characters in a substring is incompatible with the expected length. The algorithm is simple to implement, but it is questionable if it works better than the other methods, from the point of view of execution time and storage space.
Keywords: Ciphering and deciphering, Authentic Algorithm, Polyalphabetic Cipher, Random Key, methods comparison.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1961363 Multi-Objective Optimization Contingent on Subcarrier-Wise Beamforming for Multiuser MIMO-OFDM Interference Channels
Authors: R. Vedhapriya Vadhana, Ruba Soundar, K. G. Jothi Shalini
Abstract:
We address the problem of interference over all the channels in multiuser MIMO-OFDM systems. This paper contributes three beamforming strategies designed for multiuser multiple-input and multiple-output by way of orthogonal frequency division multiplexing, in which the transmit and receive beamformers are acquired repetitious by secure-form stages. In the principal case, the transmit (TX) beamformers remain fixed then the receive (RX) beamformers are computed. This eradicates one interference span for every user by means of extruding the transmit beamformers into a null space of relevant channels. Formerly, by gratifying the orthogonality condition to exclude the residual interferences in RX beamformer for every user is done by maximizing the signal-to-noise ratio (SNR). The second case comprises mutually optimizing the TX and RX beamformers from controlled SNR maximization. The outcomes of first case is used here. The third case also includes combined optimization of TX-RX beamformers; however, uses the both controlled SNR and signal-to-interference-plus-noise ratio maximization (SINR). By the standardized channel model for IEEE 802.11n, the proposed simulation experiments offer rapid beamforming and enhanced error performance.Keywords: Beamforming, interference channels, MIMO-OFDM, multi-objective optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11261362 Experimental Study of Tunable Layout Printed Fresnel Lens Structure Based on Dye Doped Liquid Crystal
Authors: M. Javadzadeh, H. Khoshsima
Abstract:
In this article, we present a layout printing way for producing Fresnel zone on 1294-1b doped liquid crystal with Methyl-Red azo dye. We made a Fresnel zone mask with 25 zones and radius of 5 mm using lithography technique. With layout printing way, we recorded mask’s pattern on cell with λ=532 nm solid-state diode pump laser. By recording Fresnel zone pattern on cell and making Fresnel pattern on the surface of cell, odd and even zones, will form. The printed pattern, because of Azo dye’s photoisomerization, was permanent. Experimentally, we saw focal length tunability from 32 cm to 43 cm.
Keywords: Liquid crystal, lens, Fresnel zone, diffraction, Fresnel lens.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12591361 Effects of an Added Foaming Agent on Hydro-Mechanical Properties of Soil
Authors: Moez Selmi, Mariem Kacem, Mehrez Jamei, Philippe Dubujet
Abstract:
Earth pressure balance (EPB) tunnel boring machines are designed for digging in different types of soil, especially clay soils. This operation requires the treatment of soil by lubricants to facilitate the procedure of excavation. A possible use of this soil is limited by the effect of treatment on the hydro-mechanical properties of the soil. This work aims to study the effect of a foaming agent on the hydro-mechanical properties of clay soil. The injection of the foam agent in the soil leads to create a soil matrix in which they are incorporated gas bubbles. The state of the foam in the soil is scalable thanks to the degradation of the gas bubbles in the soil.Keywords: EPB, clay soils, foam agent, hydro-mechanical properties, degradation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15791360 Formal Modeling and Verification of Software Models
Authors: Siamak Rasulzadeh
Abstract:
Graph transformation has recently become more and more popular as a general visual modeling language to formally state the dynamic semantics of the designed models. Especially, it is a very natural formalism for languages which basically are graph (e.g. UML). Using this technique, we present a highly understandable yet precise approach to formally model and analyze the behavioral semantics of UML 2.0 Activity diagrams. In our proposal, AGG is used to design Activities, then using our previous approach to model checking graph transformation systems, designers can verify and analyze designed Activity diagrams by checking the interesting properties as combination of graph rules and LTL (Linear Temporal Logic) formulas on the Activities.Keywords: UML 2.0 Activity, Verification, Model Checking, Graph Transformation, Dynamic Semantics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14451359 Fault Detection and Isolation in Attitude Control Subsystem of Spacecraft Formation Flying Using Extended Kalman Filters
Authors: S. Ghasemi, K. Khorasani
Abstract:
In this paper, the problem of fault detection and isolation in the attitude control subsystem of spacecraft formation flying is considered. In order to design the fault detection method, an extended Kalman filter is utilized which is a nonlinear stochastic state estimation method. Three fault detection architectures, namely, centralized, decentralized, and semi-decentralized are designed based on the extended Kalman filters. Moreover, the residual generation and threshold selection techniques are proposed for these architectures.
Keywords: Formation flight of satellites, extended Kalman filter, fault detection and isolation, actuator fault.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19491358 Robust H8 Fuzzy Control Design for Nonlinear Two-Time Scale System with Markovian Jumps based on LMI Approach
Authors: Wudhichai Assawinchaichote, Sing Kiong Nguang
Abstract:
This paper examines the problem of designing a robust H8 state-feedback controller for a class of nonlinear two-time scale systems with Markovian Jumps described by a Takagi-Sugeno (TS) fuzzy model. Based on a linear matrix inequality (LMI) approach, LMI-based sufficient conditions for the uncertain Markovian jump nonlinear two-time scale systems to have an H8 performance are derived. The proposed approach does not involve the separation of states into slow and fast ones and it can be applied not only to standard, but also to nonstandard nonlinear two-time scale systems. A numerical example is provided to illustrate the design developed in this paper.
Keywords: TS fuzzy, Markovian jumps, LMI, two-time scale systems.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14561357 Applications of Prediction and Identification Using Adaptive DCMAC Neural Networks
Authors: Yu-Lin Liao, Ya-Fu Peng
Abstract:
An adaptive dynamic cerebellar model articulation controller (DCMAC) neural network used for solving the prediction and identification problem is proposed in this paper. The proposed DCMAC has superior capability to the conventional cerebellar model articulation controller (CMAC) neural network in efficient learning mechanism, guaranteed system stability and dynamic response. The recurrent network is embedded in the DCMAC by adding feedback connections in the association memory space so that the DCMAC captures the dynamic response, where the feedback units act as memory elements. The dynamic gradient descent method is adopted to adjust DCMAC parameters on-line. Moreover, the analytical method based on a Lyapunov function is proposed to determine the learning-rates of DCMAC so that the variable optimal learning-rates are derived to achieve most rapid convergence of identifying error. Finally, the adaptive DCMAC is applied in two computer simulations. Simulation results show that accurate identifying response and superior dynamic performance can be obtained because of the powerful on-line learning capability of the proposed DCMAC.Keywords: adaptive, cerebellar model articulation controller, CMAC, prediction, identification
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14011356 Design of Mobile Teaching for Students Collaborative Learning in Distance Higher Education
Authors: Lisbeth Amhag
Abstract:
The aim of the study is to describe and analyze design of mobile teaching for students collaborative learning in distance higher education with a focus on mobile technologies as online webinars (web-based seminars or conferencing) by using laptops, smart phones, or tablets. These multimedia tools can provide face-toface interactions, recorded flipped classroom videos and parallel chat communications. The data collection consists of interviews with 22 students and observations of online face-to-face webinars, as well two surveys. Theoretically, the study joins the research tradition of Computer Supported Collaborative learning, CSCL, as well as Computer Self-Efficacy, CSE concerned with individuals’ media and information literacy. Important conclusions from the study demonstrated mobile interactions increased student centered learning. As the students were appreciating the working methods, they became more engaged and motivated. The mobile technology using among student also contributes to increased flexibility between space and place, as well as media and information literacy.
Keywords: Computer self-efficacy, computer supported collaborative learning, distance and open learning, educational design and technologies, media and information literacy, mobile learning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19151355 An Efficient Approach to Mining Frequent Itemsets on Data Streams
Authors: Sara Ansari, Mohammad Hadi Sadreddini
Abstract:
The increasing importance of data stream arising in a wide range of advanced applications has led to the extensive study of mining frequent patterns. Mining data streams poses many new challenges amongst which are the one-scan nature, the unbounded memory requirement and the high arrival rate of data streams. In this paper, we propose a new approach for mining itemsets on data stream. Our approach SFIDS has been developed based on FIDS algorithm. The main attempts were to keep some advantages of the previous approach and resolve some of its drawbacks, and consequently to improve run time and memory consumption. Our approach has the following advantages: using a data structure similar to lattice for keeping frequent itemsets, separating regions from each other with deleting common nodes that results in a decrease in search space, memory consumption and run time; and Finally, considering CPU constraint, with increasing arrival rate of data that result in overloading system, SFIDS automatically detect this situation and discard some of unprocessing data. We guarantee that error of results is bounded to user pre-specified threshold, based on a probability technique. Final results show that SFIDS algorithm could attain about 50% run time improvement than FIDS approach.Keywords: Data stream, frequent itemset, stream mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14201354 Psychological Structure of “Aitys“ as a Process of Oral Creative Competition in Kazakh Traditional Folklore
Authors: S. K. Berdibayeva, Z. Z. Beissenova, A. Z. Ayaganova
Abstract:
the aim of this study was to analyze ethnopsychological content of “Aitys" as a process of creative competition in Kazakh traditional folklore by means of Transaction analysis (three types of Ego states are Parent, Adult and Child). “Aitys" is as sources of Kazakh national self-consciousness and form of oral Kazakh national creativity. Comparative psychological analysis of classical and modern “aityses" is carried out. Empirical proved that the victory in “Aitys" is provided with a position of egostate “Adult".
Keywords: aitys, creative competition, Ego state, transaction analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16641353 Swine Flu Transmission Model in Risk and Non-Risk Human Population
Authors: P. Pongsumpun
Abstract:
The Swine flu outbreak in humans is due to a new strain of influenza A virus subtype H1N1 that derives in part from human influenza, avian influenza, and two separated strains of swine influenza. It can be transmitted from human to human. A mathematical model for the transmission of Swine flu is developed in which the human populations are divided into two classes, the risk and non-risk human classes. Each class is separated into susceptible, exposed, infectious, quarantine and recovered sub-classes. In this paper, we formulate the dynamical model of Swine flu transmission and the repetitive contacts between the people are also considered. We analyze the behavior for the transmission of this disease. The Threshold condition of this disease is found and numerical results are shown to confirm our theoretical predictions.Keywords: Mathematical model, Steady state, Swine flu, threshold condition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13131352 Analysis of Performance of 3T1D Dynamic Random-Access Memory Cell
Authors: Nawang Chhunid, Gagnesh Kumar
Abstract:
On-chip memories consume a significant portion of the overall die space and power in modern microprocessors. On-chip caches depend on Static Random-Access Memory (SRAM) cells and scaling of technology occurring as per Moore’s law. Unfortunately, the scaling is affecting stability, performance, and leakage power which will become major problems for future SRAMs in aggressive nanoscale technologies due to increasing device mismatch and variations. 3T1D Dynamic Random-Access Memory (DRAM) cell is a non-destructive read DRAM cell with three transistors and a gated diode. In 3T1D DRAM cell gated diode (D1) acts as a storage device and also as an amplifier, which leads to fast read access. Due to its high tolerance to process variation, high density, and low cost of memory as compared to 6T SRAM cell, it is universally used by the advanced microprocessor for on chip data and program memory. In the present paper, it has been shown that 3T1D DRAM cell can perform better in terms of fast read access as compared to 6T, 4T, 3T SRAM cells, respectively.Keywords: DRAM cell, read access time, tanner EDA tool write access time and retention time, average power dissipation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13401351 Stochastic Modeling for Parameters of Modified Car-Following Model in Area-Based Traffic Flow
Authors: N. C. Sarkar, A. Bhaskar, Z. Zheng
Abstract:
The driving behavior in area-based (i.e., non-lane based) traffic is induced by the presence of other individuals in the choice space from the driver’s visual perception area. The driving behavior of a subject vehicle is constrained by the potential leaders and leaders are frequently changed over time. This paper is to determine a stochastic model for a parameter of modified intelligent driver model (MIDM) in area-based traffic (as in developing countries). The parametric and non-parametric distributions are presented to fit the parameters of MIDM. The goodness of fit for each parameter is measured in two different ways such as graphically and statistically. The quantile-quantile (Q-Q) plot is used for a graphical representation of a theoretical distribution to model a parameter and the Kolmogorov-Smirnov (K-S) test is used for a statistical measure of fitness for a parameter with a theoretical distribution. The distributions are performed on a set of estimated parameters of MIDM. The parameters are estimated on the real vehicle trajectory data from India. The fitness of each parameter with a stochastic model is well represented. The results support the applicability of the proposed modeling for parameters of MIDM in area-based traffic flow simulation.
Keywords: Area-based traffic, car-following model, micro-simulation, stochastic modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7741350 Comparative Exergy Analysis of Vapor Compression Refrigeration System Using Alternative Refrigerants
Authors: Gulshan Sachdeva, Vaibhav Jain
Abstract:
In present paper, the performance of various alternative refrigerants is compared to find the substitute of R22, the widely used hydrochlorofluorocarbon refrigerant in developing countries. These include the environmentally friendly hydrofluorocarbon (HFC) refrigerants such as R134A, R410A, R407C and M20. In the present study, a steady state thermodynamic model (includes both first and second law analysis) which simulates the working of an actual vapor-compression system is developed. The model predicts the performance of system with alternative refrigerants. Considering the recent trends of replacement of ozone depleting refrigerants and improvement in system efficiency, R407C is found to be potential candidate to replace R22 refrigerant in the present study.
Keywords: Refrigeration, compression system, performance study, modeling, R407C.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16211349 Business Process Orientation: Case of Croatia
Authors: Ljubica Milanović Glavan
Abstract:
Because of the increasing business pressures, companies must be adaptable and flexible in order to withstand them. Inadequate business processes and low level of business process orientation, that in its core accentuates business processes as opposed to business functions and focuses on process performance and customer satisfaction, hider the ability to adapt to changing environment. It has been shown in previous studies that the companies which have reached higher business process maturity level consistently outperform those that have not reached them. The aim of this paper is to provide a basic understanding of business process orientation concept and business process maturity model. Besides that the paper presents the state of business process orientation in Croatia that has been captured with a study conducted in 2013. Based on the results some practical implications and guidelines for managers are given.
Keywords: Business process orientation, business process maturity, Croatia, maturity score.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16791348 The Effect of Education Level on Psychological Empowerment and Burnout-The Mediating Role of Workplace Learning Behaviors
Authors: Sarit Rashkovits, Yael Livne
Abstract:
The study investigates the relationship between education level, workplace learning behaviors, psychological empowerment and burnout in a sample of 191 teachers. We hypothesized that education level will positively affect psychological state of increased empowerment and decreased burnout, and we purposed that these effects will be mediated by workplace learning behaviors. We used multiple regression analyses to test the model that included also the 6 following control variables: The teachers' age, gender, and teaching tenure; the schools' religious level, the pupils' needs: regular/ special needs, and the class level: elementary/ high school. The results support the purposed mediating model.Keywords: Education level, Learning behaviors, Psychological empowerment, Burnout.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27371347 Teachers' Preferences on the Issue of Segregation of Gifted Pupils in Czech Educational System
Authors: I. Kočvarová, E. Machů, N. Bártlová
Abstract:
The issue of inclusion - segregation in the current Czech educational system is highly actual due to changes in legislation. It applies primarily to pupils with special educational needs, but it should also apply to pupils with giftedness. The paper presents chosen results of an exploratory survey that was carried out on a convenience sample of 1101 Czech teachers working in lower secondary education (ISCED2). The rate of teachers´ agreement with segregation of gifted pupils in the education system was monitored during this investigation. A validated questionnaire of our own design was used for the purpose of this investigation. The results were compared across groups of teachers in terms of selected variables. Results show that 36,3 % of teachers incline to segregation (rather than inclusion) of gifted pupils. Teachers who are not educated in this field and have no experience in teaching gifted pupils tend to support their segregation more in comparison with other teachers. Teachers of specialized schools for gifted pupils paradoxically agree with segregation to a slightly lesser extent than teachers from traditional schools, but they also manifest the most hesitant attitude in this issue. Preferences for segregation of gifted pupils are not related to attitudes toward gifted pupils or teachers' self-evaluation in terms of care for the gifted. Investigation indicates that the issue of education of gifted children and their inclusion in the educational system needs more space within the further education of teachers.
Keywords: Educational system, evaluation, gifted pupil, inclusion, segregation, teacher.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6501346 The Use of Music Therapy to Improve Non-Verbal Communication Skills for Children with Autism
Authors: Maria Vinca Novenia
Abstract:
The number of school-aged children with autism in Indonesia has been increasing each year. Autism is a developmental disorder which can be diagnosed in childhood. One of the symptoms is the lack of communication skills. Music therapy is known as an effective treatment for children with autism. Music elements and structures create a good space for children with autism to express their feelings and communicate their thoughts. School-aged children are expected to be able to communicate non-verbally very well, but children with autism experience the difficulties of communicating non-verbally. The aim of this research is to analyze the significance of music therapy treatment to improve non-verbal communication tools for children with autism. This research informs teachers and parents on how music can be used as a media to communicate with children with autism. The qualitative method is used to analyze this research, while the result is described with the microanalysis technique. The result is measured specifically from the whole experiment, hours of every week, minutes of every session, and second of every moment. The samples taken are four school-aged children with autism in the age range of six to 11 years old. This research is conducted within four months started with observation, interview, literature research, and direct experiment. The result demonstrates that music therapy could be effectively used as a non-verbal communication tool for children with autism, such as changes of body gesture, eye contact, and facial expression.Keywords: Autism, non-verbal communication, microanalysis, music therapy, school-aged children.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21171345 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies, and therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and thus the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.
Keywords: Cyberattacks, detection, first-order logic, Metaverse, privacy, security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 67