Search results for: Cooperative banks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 323

Search results for: Cooperative banks

113 Maximizing Sum-Rate for Multi-User Two-Way Relaying Networks with ANC Protocol

Authors: Muhammad Abrar, Xiang Gui, Amal Punchihewa

Abstract:

In this paper we study the resource allocation problem for an OFDMA based cooperative two-way relaying (TWR) network. We focus on amplify and forward (AF) analog network coding (ANC) protocol. An optimization problem for two basic resources namely, sub-carrier and power is formulated for multi-user TWR networks. A joint optimal optimization problem is investigated and two-step low complexity sub-optimal resource allocation algorithm is proposed for multi-user TWR networks with ANC protocol. The proposed algorithm has been evaluated in term of total achievable system sum-rate and achievable individual sum-rate for each userpair. The good tradeoff between system sum-rate and fairness is observed in the two-step proportional resource allocation scheme.

Keywords: Relay Network, Relay Protocols, Resource Allocation, Two –way relaying.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1613
112 Disability Diversity Management: A Case Study of the Banking Sector in the KSA

Authors: Nada Azhar

Abstract:

This paper is drawn from a wider study of the management of gender, age and disability diversity in the banking sector in the Kingdom of Saudi Arabia (KSA), which aims to develop a framework for diversity management (DM) in this sector. The paper focuses on the management of disability diversity. The purpose of the paper is to assist in understanding disability DM in the banking sector in KSA and to make suggestions for its enhancement. Hence, it contributes to filling a research gap, as there is a dearth of literature on disability DM, in KSA in general, and in the banking sector specifically. Discrimination against people with disabilities is a social issue that has not been entirely overcome in any society. However, in KSA, Islam informs almost every aspect of daily life including work, and Islam is against discrimination. Hence, in KSA, there are regulations to accommodate people with disabilities; however, employers are still free not to hire job applicants with disabilities specifically because of their condition. Indeed, disabled people are almost entirely absent from the labour market. There are 12 Saudi-owned or part-Saudi-owned banks in KSA and two managers from each of these were interviewed, making a total of 24. The interviews aimed to investigate empirically the understanding of managers in the banking sector in KSA of diversity management, including disability DM, in the banking sector. The interview data were analysed using thematic analysis. Two interviewees stated that banks used the employment of people with disabilities to enhance their corporate image, while five expressed the opinion that disabled employees could contribute to the bank provided they did not have to deal with customers face-to-face. Nine of the interviewees perceived that disabled employees could be of value to the bank for their own sake, not only in ‘behind the scenes’ roles. Another two interviewees mentioned that employing disabled people could be part of the bank’s community service programme and one thought it would be part of the bank’s Saudisation efforts. The remaining five interviewees did not know how disabled people could contribute to the bank. The findings show that disability DM in the banking sector in KSA is a relatively new concept, and is not yet well understood. In the light of the findings, in order to achieve the purpose of the paper, the following suggestions were made for the enhancement of disability DM in the banking sector in KSA. A change in attitudes towards disabled people is necessary. Such a change in the workplace can only be achieved if a top-down approach is taken to the integration of disabled people. Hence, it is suggested that management and employees follow a course in disability awareness. Further, a diversity officer in the HR department could enhance the integration of disabled people into the banking workforce. It is also suggested that greater government support is required through closely monitored and enforced anti-discrimination legislation. Moreover, flexible working arrangements such as part-time work would facilitate the employment of disabled people and benefit other groups of employees.

Keywords: Banking, disability, diversity management, Kingdom of Saudi Arabia.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3857
111 Categories of Botnet: A Survey

Authors: D. Seenivasan, K. Shanthi

Abstract:

Botnets are one of the most serious and widespread cyber threats. Today botnets have been facilitating many cybercrimes, especially financial, top secret thefts. Botnets can be available for lease in the market and are utilized by the cybercriminals to launch massive attacks like DDoS, click fraud, phishing attacks etc., Several large institutions, hospitals, banks, government organizations and many social networks such as twitter, facebook etc., became the target of the botmasters. Recently, noteworthy researches have been carried out to detect bot, C&C channels, botnet and botmasters. Using many sophisticated technologies, botmasters made botnet a titan of the cyber world. Innumerable challenges have been put forth by the botmasters to the researchers in the detection of botnet. In this paper we present a survey of different types of botnet C&C channels and also provide a comparison of various botnet categories. Finally we hope that our survey will create awareness for forthcoming botnet research endeavors.

Keywords: Bot, Botmaster, Botnet, Botnet cloud, Mobile Botnet.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4067
110 The Use of Complex Contourlet Transform on Fusion Scheme

Authors: Dipeng Chen, Qi Li

Abstract:

Image fusion aims to enhance the perception of a scene by combining important information captured by different sensors. Dual-Tree Complex Wavelet (DT-CWT) has been thouroughly investigated for image fusion, since it takes advantages of approximate shift invariance and direction selectivity. But it can only handle limited direction information. To allow a more flexible directional expansion for images, we propose a novel fusion scheme, referred to as complex contourlet transform (CCT). It successfully incorporates directional filter banks (DFB) into DT-CWT. As a result it efficiently deal with images containing contours and textures, whereas it retains the property of shift invariance. Experimental results demonstrated that the method features high quality fusion performance and can facilitate many image processing applications.

Keywords: Complex contourlet transform, Complex wavelettransform, Fusion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1533
109 Frequency Controller Design for Distributed Generation by Load Shedding: Multi-Agent Systems Approach

Authors: M. R. Vaezi, R. Ghasemi, A. Akramizadeh

Abstract:

Frequency stability of microgrids under islanded operation attracts particular attention recently. A new cooperative frequency control strategy based on centralized multi-agent system (CMAS) is proposed in this study. Based on this strategy, agents sent data and furthermore each component has its own to center operating decisions (MGCC).After deciding on the information, they are returned. Frequency control strategies include primary and secondary frequency control and disposal of multi-stage load in which this study will also provide a method and algorithm for load shedding. This could also be a big problem for the performance of micro-grid in times of disaster. The simulation results show the promising performance of the proposed structure of the controller based on multi agent systems.

Keywords: Frequency Control, Islanded Micro-grid, Load shedding, Multi-agent System.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2887
108 Impacts of Financial Development and Operating Scale on Bank Efficiencies in Taiwan

Authors: Ying-Hsiu Chen, Pao-Peng Hsu

Abstract:

This paper adopts a two-stage data envelopment analysis to explore the impacts of financial development and bank operating scale on bank efficiencies. The sample comprises unbalanced panel data of 32 Taiwanese listed domestic commercial banks over the period 1998 to 2013. Empirical results show that pure technical efficiency is positively related to financial development, whereas the effect of financial development on scale efficiency is insignificant. Enlargement of bank operating scale improves bank efficiencies, but the efficiency gains are decreased gradually when the scale increases. Increases in capital adequacy ratio and market power of loans lead into a growth of bank efficiencies.

Keywords: Financial development, Operating scale, Efficiency, DEA.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1701
107 Distributed Coverage Control by Robot Networks in Unknown Environments Using a Modified EM Algorithm

Authors: Mohammadhosein Hasanbeig, Lacra Pavel

Abstract:

In this paper, we study a distributed control algorithm for the problem of unknown area coverage by a network of robots. The coverage objective is to locate a set of targets in the area and to minimize the robots’ energy consumption. The robots have no prior knowledge about the location and also about the number of the targets in the area. One efficient approach that can be used to relax the robots’ lack of knowledge is to incorporate an auxiliary learning algorithm into the control scheme. A learning algorithm actually allows the robots to explore and study the unknown environment and to eventually overcome their lack of knowledge. The control algorithm itself is modeled based on game theory where the network of the robots use their collective information to play a non-cooperative potential game. The algorithm is tested via simulations to verify its performance and adaptability.

Keywords: Distributed control, game theory, multi-agent learning, reinforcement learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 917
106 Dual Band Fractal Antenna for Wireless Sensor Network Application

Authors: M. Shanmugapriya, M. A. Maluk Mohamed, J. William

Abstract:

A wireless sensor network (WSN) is a collection of sensor nodes organized into a cooperative network. These nodes communicate through a wireless antenna. Reduction in physical size and multiband operation is an important requirement of WSN antenna. Fractal antenna is used for miniaturization and multiband operation. The self-similar or self-affine and space filling property of fractal geometry increases the effective electrical length of the antenna, reduces the size and make them frequency independent. This paper elaborates on Dual band fractal antenna with Coplanar Waveguide (CPW) feed for WSN. The proposed antenna is designed on a FR4 substrate with the dimension of 27mm x 28.5mm x 1.6mm, resonates at 2.4GHz and 5.2GHz with a return loss less than -10dB. The design and simulation process is carried out using IE3D simulation software. The simulated and measured results are found in good agreement.

Keywords: CPW, Fractal, Iterations, Miniaturization, Space filling, Self Similar, WSN, WLAN.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2422
105 LumaCert: Conception and Creation of New Digital Certificate for Online User Authentication in e-Banking Systems

Authors: Artan Luma, Betim Prevalla, Besart Qoku, Bujar Raufi

Abstract:

Electronic banking must be secure and easy to use and many banks heavily advertise an apparent of 100% secure system which is contestable in many points. In this work, an alternative approach to the design of e-banking system, through a new solution for user authentication and security with digital certificate called LumaCert is introduced. The certificate applies new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and UltraPentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and UltraPentor operator from the mentioned parameters.

Keywords: Security, Digital Certificate, Cryptography.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2160
104 Survey to Assess the Feasibility of Executing the Web-Based Collaboration Process Using WBCS

Authors: Mohamed A. Sullabi

Abstract:

The importance of the formal specification in the software life cycle is barely concealing to anyone. Formal specifications use mathematical notation to describe the properties of information system precisely, without unduly constraining the way in how these properties are achieved. Having a correct and quality software specification is not easy task. This study concerns with how a group of rectifiers can communicate with each other and work to prepare and produce a correct formal software specification. WBCS has been implemented based mainly in the proposed supported cooperative work model and a survey conducted on the existing Webbased collaborative writing tools. This paper aims to assess the feasibility of executing the web-based collaboration process using WBCS. The purpose of conducting this test is to test the system as a whole for functionality and fitness for use based on the evaluation test plan.

Keywords: Formal methods, Formal specifications, collaborative writing, Usability testing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1665
103 Fault Tolerance in Distributed Database Systems

Authors: M. A. Adeboyejo, O. O. Adeosun

Abstract:

Pioneer networked systems assume that connections are reliable, and a faulty operation will be considered in case of losing a connection. Transient connections are typical of mobile devices. Areas of application of data sharing system such as these, lead to the conclusion that network connections may not always be reliable, and that the conventional approaches can be improved. Nigerian commercial banking industry is a critical system whose operation is increasingly becoming dependent on information technology (IT) driven information system. The proposed solution to this problem makes use of a hierarchically clustered network structure which we selected to reflect (as much as possible) the typical organizational structure of the Nigerian commercial banks. Representative transactions such as data updates and replication of the results of such updates were used to simulate the proposed model to show its applicability.

Keywords: Dependability, reliability, data redundancy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3304
102 An Agent Oriented Architecture to Supply Dynamic Document Generation in ERP Systems

Authors: Hassan Haghighi, Seyedeh Zahra Hosseini, Seyedeh Elahe Jalambadani

Abstract:

One of the most important aspects expected from an ERP system is to mange user\administrator manual documents dynamically. Since an ERP package is frequently changed during its implementation in customer sites, it is often needed to add new documents and/or apply required changes to existing documents in order to cover new or changed capabilities. The worse is that since these changes occur continuously, the corresponding documents should be updated dynamically; otherwise, implementing the ERP package in the organization encounters serious risks. In this paper, we propose a new architecture which is based on the agent oriented vision and supplies the dynamic document generation expected from ERP systems using several independent but cooperative agents. Beside the dynamic document generation which is the main issue of this paper, the presented architecture will address some aspects of intelligence and learning capabilities existing in ERP.

Keywords: enterprise resource planning, dynamic documentgeneration, software architecture, agent oriented architecture, learning, intelligence

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1608
101 Italian Central Guarantee Fund: An Analysis of the Guaranteed SMEs’ Default Risk

Authors: M. C. Arcuri, L. Gai, F. Ielasi

Abstract:

Italian Central Guarantee Fund (CGF) has the purpose to facilitate Small and Medium-sized Enterprises (SMEs)’ access to credit. The aim of the paper is to study the evaluation method adopted by the CGF with regard to SMEs requiring its intervention. This is even more important in the light of the recent CGF reform. We analyse an initial sample of more than 500.000 guarantees from 2012 to 2018. We distinguish between a counter-guarantee delivered to a mutual guarantee institution and a guarantee directly delivered to a bank. We investigate the impact of variables related to the operations and the SMEs on Altman Z’’-score and the score consistent with CGF methodology. We verify that the type of intervention affects the scores and the initial condition changes with the new assessment criterions. 

Keywords: Banks, default risk, Italian Guarantee Fund, mutual guarantee institutions.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1030
100 Analyzing the Effects of Adding Bitcoin to Portfolio

Authors: Shashwat Gangwal

Abstract:

This paper analyses the effect of adding Bitcoin, to the portfolio (stocks, bonds, Baltic index, MXEF, gold, real estate and crude oil) of an international investor by using daily data available from 2nd of July, 2010 to 2nd of August, 2016. We conclude that adding Bitcoin to portfolio, over the course of the considered period, always yielded a higher Sharpe ratio. This means that Bitcoin’s returns offset its high volatility. This paper, recognizing the fact that Bitcoin is a relatively new asset class, gives the readers a basic idea about the working of the virtual currency, the increasing number developments in the financial industry revolving around it, its unique features and the detailed look into its continuously growing acceptance across different fronts (Banks, Merchants and Countries) globally. We also construct optimal portfolios to reflect the highly lucrative and largely unexplored opportunities associated with investment in Bitcoin.

Keywords: Portfolio management, Bitcoin, optimization, Sharpe ratio.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6026
99 Optical Road Monitoring of the Future Smart Roads – Preliminary Results

Authors: Maria Jokela, Matti Kutila, Jukka Laitinen, Florian Ahlers, Nicolas Hautière, TobiasSchendzielorz

Abstract:

It has been shown that in most accidents the driver is responsible due to being distracted or misjudging the situation. In order to solve such problems research has been dedicated to developing driver assistance systems that are able to monitor the traffic situation around the vehicle. This paper presents methods for recognizing several circumstances on a road. The methods use both the in-vehicle warning systems and the roadside infrastructure. Preliminary evaluation results for fog and ice-on-road detection are presented. The ice detection results are based on data recorded in a test track dedicated to tyre friction testing. The achieved results anticipate that ice detection could work at a performance of 70% detection with the right setup, which is a good foundation for implementation. However, the full benefit of the presented cooperative system is achieved by fusing the outputs of multiple data sources, which is the key point of discussion behind this publication.

Keywords: Smart roads, traffic monitoring, traffic scenedetection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1575
98 Increasing the Heterogeneity and Competition of Early Stage Financing: An Analysis of the Role of Crowdfunding in Entrepreneurial Ventures

Authors: Lars Silver, Björn Berggren, Andreas Fili

Abstract:

The financial crisis has decreased the opportunities of small businesses to acquire financing through conventional financial actors, such as commercial banks. This credit constraint is partly the reason for the emergence of new alternatives of financing, in addition to the spreading opportunities for communication and secure financial transfer through Internet. One of the most interesting venues for finance is termed “crowdfunding". As the term suggests crowdfunding is an appeal to prospective customers and investors to form a crowd that will finance projects that otherwise would find it hard to generate support through the most common financial actors. Crowdfunding is in this paper divided into different models; the threshold model, the microfinance model, the micro loan model and the equity model. All these models add to the financial possibilities of emerging entrepreneurs.

Keywords: Entrepreneurship, crowdfunding, equity finance, bank finance.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2625
97 Social Relation between the Malays and Chinese Communities from a Civilizational Perspectives

Authors: Wan Norhasniah Wan Husin, Mohd Ridhuan Tee Abdullah

Abstract:

Towards the end of 19th century, the discovery of tin and the growing importance of rubber, had led Malaya to once again become the centre of attraction to western colonization, which later on caused the region to be influxed by cheap labour from China and India. One of the factors which attracted the alien communities was the characteristics of social relation offered by the Malays. If one analyzes the history of social relation of the Malays either among themselves or their relation with alien communities, it is apparent that the community places high regards to values such as tolerant, cooperative, respectful and helpful with each other. In fact, all these values are deeply rooted in the value of 'budi'. With the arrival of Islam, the value of 'budi' had been well assimilated with Islamic values thus giving birth to the value of 'budi-Islam'. Through 'budi- Islam', the Malay conducted their dealings with British as well the other communities during the time of peace or conflict. This value is well nurtured due to the geographical circumstances like the fertile, naturally rich land and bountiful marine life. Besides, a set of Malay customs known as 'adat' custom contributed in enhancing the values of budi.

Keywords: Adat System, budi and Islam, Chinese community, Malay community

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2173
96 Supervisory Board in the Governance of Cooperatives: Disclosing Power Elements in the Selection of Directors

Authors: Kari Huhtala, Iiro Jussila

Abstract:

The supervisory board is assumed to use power in the governance of a firm, but the actual use of power has been scantly investigated. The research question of the paper is “How does the supervisory board use power in the selection of the board of directors”. The data stem from 11 large Finnish agricultural cooperatives. The research approach was qualitative including semi-structured interviews of the board of directors and supervisory board chairpersons. The results were analyzed and interpreted against theories of social power. As a result, the use of power is approached from two perspectives: (1) formal position-based authority and (2) informal power. Central elements of power were the mandate of the supervisory board, the role of the supervisory board, the supervisory board chair, the nomination committee, collaboration between the supervisory board and the board of directors, the role of regions and the role of the board of directors. The study contributes to the academic discussion on corporate governance in cooperatives and on the supervisory board in the context of the two-tier model. Additional research of the model in other countries and of other types of cooperatives would further academic understanding of supervisory boards.

Keywords: Board, cooperative, supervisory board, selection, director, power.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 842
95 CybeRisk Management in Banks: An Italian Case Study

Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini

Abstract:

The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.

Keywords: Bank, CybeRisk, information technology, risk management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1352
94 Replicating Data Objects in Large-scale Distributed Computing Systems using Extended Vickrey Auction

Authors: Samee Ullah Khan, Ishfaq Ahmad

Abstract:

This paper proposes a novel game theoretical technique to address the problem of data object replication in largescale distributed computing systems. The proposed technique draws inspiration from computational economic theory and employs the extended Vickrey auction. Specifically, players in a non-cooperative environment compete for server-side scarce memory space to replicate data objects so as to minimize the total network object transfer cost, while maintaining object concurrency. Optimization of such a cost in turn leads to load balancing, fault-tolerance and reduced user access time. The method is experimentally evaluated against four well-known techniques from the literature: branch and bound, greedy, bin-packing and genetic algorithms. The experimental results reveal that the proposed approach outperforms the four techniques in both the execution time and solution quality.

Keywords: Auctions, data replication, pricing, static allocation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1421
93 Multiclass Support Vector Machines for Environmental Sounds Classification Using log-Gabor Filters

Authors: S. Souli, Z. Lachiri

Abstract:

In this paper we propose a robust environmental sound classification approach, based on spectrograms features driven from log-Gabor filters. This approach includes two methods. In the first methods, the spectrograms are passed through an appropriate log-Gabor filter banks and the outputs are averaged and underwent an optimal feature selection procedure based on a mutual information criteria. The second method uses the same steps but applied only to three patches extracted from each spectrogram.

To investigate the accuracy of the proposed methods, we conduct experiments using a large database containing 10 environmental sound classes. The classification results based on Multiclass Support Vector Machines show that the second method is the most efficient with an average classification accuracy of 89.62 %.

Keywords: Environmental sounds, Log-Gabor filters, Spectrogram, SVM Multiclass, Visual features.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1699
92 A Computational Study of N–H…O Hydrogen Bonding to Investigate Cooperative Effects

Authors: Setareh Shekarsaraei, Marjan Moridi, Nasser L. Hadipour

Abstract:

In this study, nuclear magnetic resonance spectroscopy and nuclear quadrupole resonance spectroscopy parameters of 14N (Nitrogen in imidazole ring) in N–H…O hydrogen bonding for Histidine hydrochloride monohydrate were calculated via density functional theory. We considered a five-molecule model system of Histidine hydrochloride monohydrate. Also we examined the trends of environmental effect on hydrogen bonds as well as cooperativity. The functional used in this research is M06-2X which is a good functional and the obtained results has shown good agreement with experimental data. This functional was applied to calculate the NMR and NQR parameters. Some correlations among NBO parameters, NMR and NQR parameters have been studied which have shown the existence of strong correlations among them. Furthermore, the geometry optimization has been performed using M062X/6-31++G(d,p) method. In addition, in order to study cooperativity and changes in structural parameters, along with increase in cluster size, natural bond orbitals have been employed.

Keywords: Hydrogen bonding, Density Functional Theory (DFT), Natural bond Orbitals (NBO), cooperativity effects.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1946
91 Voltage Stability Enhancement Using Cat Swarm Optimization Algorithm

Authors: P. Suryakumari, P. Kantarao

Abstract:

Optimal Power Flow (OPF) problem in electrical power system is considered as a static, non-linear, multi-objective or a single objective optimization problem. This paper presents an algorithm for solving the voltage stability objective reactive power dispatch problem in a power system .The proposed approach employs cat swarm optimization algorithm for optimal settings of RPD control variables. Generator terminal voltages, reactive power generation of the capacitor banks and tap changing transformer setting are taken as the optimization variables. CSO algorithm is tested on standard IEEE 30 bus system and the results are compared with other methods to prove the effectiveness of the new algorithm. As a result, the proposed method is the best for solving optimal reactive power dispatch problem.

Keywords: RPD problem, voltage stability enhancement, CSO algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2387
90 Using Axiomatic Design for Developing a Framework of Manufacturing Cloud Service Composition in the Equilibrium State

Authors: Ehsan Vaziri Goodarzi, Mahmood Houshmand, Omid Fatahi Valilai, Vahidreza Ghezavati, Shahrooz Bamdad

Abstract:

One important paradigm of industry 4.0 is Cloud Manufacturing (CM). In CM everything is considered as a service, therefore, the CM platform should consider all service provider's capabilities and tries to integrate services in an equilibrium state. This research develops a framework for implementing manufacturing cloud service composition in the equilibrium state. The developed framework using well-known tools called axiomatic design (AD) and game theory. The research has investigated the factors for forming equilibrium for measures of the manufacturing cloud service composition. Functional requirements (FRs) represent the measures of manufacturing cloud service composition in the equilibrium state. These FRs satisfied by related Design Parameters (DPs). The FRs and DPs are defined by considering the game theory, QoS, consumer needs, parallel and cooperative services. Ultimately, four FRs and DPs represent the framework. To insure the validity of the framework, the authors have used the first AD’s independent axiom.

Keywords: Axiomatic design, manufacturing cloud service composition, cloud manufacturing, Industry 4.0.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 628
89 Approaches to Determining Optimal Asset Structure for a Commercial Bank

Authors: Svetlana Saksonova

Abstract:

Every commercial bank optimises its asset portfolio depending on the profitability of assets and chosen or imposed constraints. This paper proposes and applies a stylized model for optimising banks' asset and liability structure, reflecting profitability of different asset categories and their risks as well as costs associated with different liability categories and reserve requirements. The level of detail for asset and liability categories is chosen to create a suitably parsimonious model and to include the most important categories in the model. It is shown that the most appropriate optimisation criterion for the model is the maximisation of the ratio of net interest income to assets. The maximisation of this ratio is subject to several constraints. Some are accounting identities or dictated by legislative requirements; others vary depending on the market objectives for a particular bank. The model predicts variable amount of assets allocated to loan provision.

Keywords: asset structure, commercial bank, model, optimisation

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2915
88 Learning and Practicing Assessment in a Pre-service Teacher Education Program: Comparative Perspective of UK and Pakistani Universities

Authors: Malik Ghulam Behlol, Alison Fox, Faiza Masood, Sabiha Arshad

Abstract:

This paper explores the barriers to the application of learning-supportive assessment at teaching practicum while investigating the role of university teachers (UT), cooperative teachers (CT), prospective teachers (PT) and heads of the practicum schools (HPS) in the selected universities of Pakistan and the UK. It is a qualitative case study and data were collected through the lesson observation of UT in the pre-service teacher education setting and PT in practicum schools. Interviews with UT, HPS, and Focus Group Discussions with PT were conducted too. The study has concluded that as compared to the UK counterpart, PTs in Pakistan face significant barriers in applying learning-supportive assessment in the school practicum settings because of large class sizes, lack of institutionalised collaboration between universities and schools, poor modelling of the lesson, ineffective feedback practices, lower order thinking assignments, and limited opportunities to use technology in school settings.

Keywords: Learning supportive assessment, pre-service teacher education, theory-practice gap, teacher education.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 67
87 Parallel Distributed Computational Microcontroller System for Adaptive Antenna Downlink Transmitter Power Optimization

Authors: K. Prajindra Sankar, S.K. Tiong, S.P. Johnny Koh

Abstract:

This paper presents a tested research concept that implements a complex evolutionary algorithm, genetic algorithm (GA), in a multi-microcontroller environment. Parallel Distributed Genetic Algorithm (PDGA) is employed in adaptive beam forming technique to reduce power usage of adaptive antenna at WCDMA base station. Adaptive antenna has dynamic beam that requires more advanced beam forming algorithm such as genetic algorithm which requires heavy computation and memory space. Microcontrollers are low resource platforms that are normally not associated with GAs, which are typically resource intensive. The aim of this project was to design a cooperative multiprocessor system by expanding the role of small scale PIC microcontrollers to optimize WCDMA base station transmitter power. Implementation results have shown that PDGA multi-microcontroller system returned optimal transmitted power compared to conventional GA.

Keywords: Microcontroller, Genetic Algorithm, Adaptiveantenna, Power optimization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1741
86 The Psychological Contract and the Readiness to Verbalize It in Financial Institutions in Poland

Authors: Anna Rogozińska-Pawełczyk

Abstract:

A psychological contract is an agreement between the employer and an employee that covers the parties’ informal and frequently non-verbalized obligations and expectations towards each other. The contract is a cognitive pattern-governing employee’s behaviour in the organization. A gap between employee’s expectations and the organizational reality may lead to difficult-to-solve conflicts or cause the employee to modify their behaviour towards organizational values and goals, if they are willing and ready to verbalize their expectations. The article discusses psychological contracts in the financial institutions in Poland. Its theoretical part outlines the types of psychological contracts in organizations (relational, transactional, and balanced) and shows the process of their verbalization. The purpose of the article is to present how the type of the psychological contract relates to employee’s readiness to verbalize it. The article ends with conclusions arising from the study.

Keywords: Customer contact staff in banks, employee expectations, financial institutions, mutual expectations, psychological contract, verbalization of the psychological contract.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1743
85 Mapping Soil Fertility at Different Scales to Support Sustainable Brazilian Agriculture

Authors: Rachel Bardy Prado, Vinícius de Melo Benites, José Carlos Polidoro, Carlos Eduardo Gonçalves, Alexey Naumov

Abstract:

Most agricultural crops cultivated in Brazil are highly nutrient demanding. Brazilian soils are generally acidic with low base saturation and available nutrients. Demand for fertilizer application has increased because the national agricultural sector expansion. To improve productivity without environmental impact, there is the need for the utilization of novel procedures and techniques to optimize fertilizer application. This includes the digital soil mapping and GIS application applied to mapping in different scales. This paper is based on research, realized during 2005 to 2010 by Brazilian Corporation for Agricultural Research (EMBRAPA) and its partners. The purpose was to map soil fertility in national and regional scales. A soil profile data set in national scale (1:5,000,000) was constructed from the soil archives of Embrapa Soils, Rio de Janeiro and in the regional scale (1:250,000) from COMIGO Cooperative soil data set, Rio Verde, Brazil. The mapping was doing using ArcGIS 9.1 tools from ESRI.

Keywords: agricultural sustainability, fertilizer optimization, GIS, soil attributes.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2559
84 Analysis and Categorization of e-Learning Activities Based On Meaningful Learning Characteristics

Authors: Arda Yunianta, Norazah Yusof, Mohd Shahizan Othman, Dewi Octaviani

Abstract:

Learning is the acquisition of new mental schemata, knowledge, abilities and skills which can be used to solve problems potentially more successfully. The learning process is optimum when it is assisted and personalized. Learning is not a single activity, but should involve many possible activities to make learning become meaningful. Many e-learning applications provide facilities to support teaching and learning activities. One way to identify whether the e-learning system is being used by the learners is through the number of hits that can be obtained from the e-learning system's log data. However, we cannot rely solely to the number of hits in order to determine whether learning had occurred meaningfully. This is due to the fact that meaningful learning should engage five characteristics namely active, constructive, intentional, authentic and cooperative. This paper aims to analyze the e-learning activities that is meaningful to learning. By focusing on the meaningful learning characteristics, we match it to the corresponding Moodle e-learning activities. This analysis discovers the activities that have high impact to meaningful learning, as well as activities that are less meaningful. The high impact activities is given high weights since it become important to meaningful learning, while the low impact has less weight and said to be supportive e-learning activities. The result of this analysis helps us categorize which e-learning activities that are meaningful to learning and guide us to measure the effectiveness of e-learning usage.

Keywords: e-learning system, e-learning activity, meaningful learning characteristics, Moodle

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3088