Search results for: George Kaliabetsos
88 Trust and Security in Electronic Payments: What We Have and Need to Know?
Authors: Theodosios Tsiakis, George Stephanides, George Pekos
Abstract:
The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital-electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent levels of trust and security served in conventional paper-based payment transactions. The paper addresses the challenge of the first trade problem in e-commerce, provides a brief literature review on electronic payment and attempts to explain the underlying concept and method of trust in relevance to electronic payment.
Keywords: Electronic payment, security, trust, electronic business mechanism.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 279687 Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm
Authors: Konstantinos Chalkias, George Filiadis, George Stephanides
Abstract:
In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.
Keywords: Elliptic Curve Cryptography, ElGamal, authentication protocol.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 204186 Considerations of Public Key Infrastructure (PKI), Functioning as a Chain of Trust in Electronic Payments Systems
Authors: Theodosios Tsiakis, George Stephanides, George Pekos
Abstract:
The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital – electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent level of security served in conventional paper-based payment transactions. PKI, which is functioning as a chain of trust in security architecture, can enable security services of cryptography to epayments, in order to take advantage of the wider base either of customer or of trading partners and the reduction of cost transaction achieved by the use of Internet channels. The paper addresses the possibilities and the implementation suggestions of PKI in relevance to electronic payments by suggesting a framework that should be followed.Keywords: Electronic Payment, Security, Trust
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 142285 Identifying Areas on the Pavement Where Rain Water Runoff Affects Motorcycle Behavior
Authors: Panagiotis Lemonakis, Theodoros Αlimonakis, George Kaliabetsos, Nikos Eliou
Abstract:
It is very well known that certain vertical and longitudinal slopes have to be assured in order to achieve adequate rainwater runoff from the pavement. The selection of longitudinal slopes, between the turning points of the vertical curves that meet the afore-mentioned requirement does not ensure adequate drainage because the same condition must also be applied at the transition curves. In this way none of the pavement edges’ slopes (as well as any other spot that lie on the pavement) will be opposite to the longitudinal slope of the rotation axis. Horizontal and vertical alignment must be properly combined in order to form a road which resultant slope does not take small values and hence, checks must be performed in every cross section and every chainage of the road. The present research investigates the rain water runoff from the road surface in order to identify the conditions under which, areas of inadequate drainage are being created, to analyze the rainwater behavior in such areas, to provide design examples of good and bad drainage zones and to track down certain motorcycle types which might encounter hazardous situations due to the presence of water film between the pavement and both of their tires resulting loss of traction. Moreover, it investigates the combination of longitudinal and cross slope values in critical pavement areas. It should be pointed out that the drainage gradient is analytically calculated for the whole road width and not just for an oblique slope per chainage (combination of longitudinal grade and cross slope). Lastly, various combinations of horizontal and vertical design are presented, indicating the crucial zones of bad pavement drainage. The key conclusion of the study is that any type of motorcycle will travel for some time inside the area of improper runoff for a certain time frame which depends on the speed and the trajectory that the rider chooses along the transition curve. Taking into account that on this section the rider will have to lean his motorcycle and hence reduce the contact area of his tire with the pavement it is apparent that any variations on the friction value due to the presence of a water film may lead to serious problems regarding his safety. The water runoff from the road pavement is improved when between reverse longitudinal slopes, crest instead of sag curve is chosen and particularly when its edges coincide with the edges of the horizontal curve. Lastly, the results of the investigation have shown that the variation of the longitudinal slope involves the vertical shift of the center of the poor water runoff area. The magnitude of this area increases as the length of the transition curve increases.
Keywords: Drainage, motorcycle safety, superelevation, transition curves, vertical grade.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 53684 Ecosystem Post-Wildfire Effects of Thasos Island
Authors: George D. Ranis, Valasia Iakovoglou, George N. Zaimes
Abstract:
Fires is one of the main types of disturbances that shape ecosystems in the Mediterranean region. However nowadays, climate alterations towards higher temperatures result on increased levels of fire intensity, frequency and spread as well as difficulties for natural regeneration to occur. Thasos Island is one of the Greek islands that has experienced those problems. Since 1984, a series of wildfires led to the reduction of forest cover from 61.6% to almost 20%. The negative impacts were devastating in many different aspects for the island. The absence of plant cover, post-wildfire precipitation and steep slopes were the major factors that induced severe soil erosion and intense floods. That also resulted to serious economic problems to the local communities and the inability of the burnt areas to regenerate naturally. Despite the substantial amount of published work regarding Thasos wildfires, there is no information related to post-wildfire effects on factors such as soil erosion. More research related to post-fire effects should help to an overall assessment of the negative impacts of wildfires on land degradation through processes such as soil erosion and flooding.Keywords: Erosion, land degradation, Mediterranean islands, regeneration, Thasos, wildfires.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 226283 Patronage Network and Ideological Manipulations in Translation of Literary Texts: A Case Study of George Orwell's “1984” in Persian Translation in the Period 1980 to 2015
Authors: Masoud Hassanzade Novin, Bahloul Salmani
Abstract:
The process of the translation is not merely the linguistic aspects. It is also considered in the cultural framework of both the source and target text cultures. The translation process and translated texts are confronted the new aspect in 20th century which is considered mostly in the patronage framework and ideological grillwork of the target language. To have these factors scrutinized in the process of the translation both micro-element factors and macro-element factors can be taken into consideration. For the purpose of this study through a qualitative type of research based on critical discourse analysis approach, the case study of the novel “1984” written by George Orwell was chosen as the corpus of the study to have the contrastive analysis by its Persian translated texts. Results of the study revealed some distortions embedded in the target texts which were overshadowed by ideological aspect and patronage network. The outcomes of the manipulated terms were different in various categories which revealed the manipulation aspects in the texts translated.
Keywords: Critical discourse analysis, ideology, translated texts, patronage network.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 158782 Enhancing Cooperation Between LEAs and Citizens: The INSPEC2T Approach
Authors: George Leventakis, George Kokkinis, Nikos Moustakidis, George Papalexandratos, Ioanna Vasiliadou
Abstract:
Enhancing the feeling of public safety and crime prevention are tasks customarily assigned to the Police. Police departments have, however, recognized that traditional ways of policing methods are becoming obsolete; Community Policing (CP) philosophy; however, when applied appropriately, leads to seamless collaboration between various stakeholders like the Police, NGOs and the general public and provides the opportunity to identify risks, assist in solving problems of crime, disorder, safety and crucially contribute to improving the quality of life for everyone in a community. Social Media, on the other hand, due to its high level of infiltration in modern life, constitutes a powerful mechanism which offers additional and direct communication channels to reach individuals or communities. These channels can be utilized to improve the citizens’ perception of the Police and to capture individual and community needs, when their feedback is taken into account by Law Enforcement Agencies (LEAs) in a structured and coordinated manner. This paper presents research conducted under INSPEC2T (Inspiring CitizeNS Participation for Enhanced Community PoliCing AcTions), a project funded by the European Commission’s research agenda to bridge the gap between CP as a philosophy and as an organizational strategy, capitalizing on the use of Social Media. The project aims to increase transparency, trust, police accountability, and the role of civil society. It aspires to build strong, trusting relationships between LEAs and the public, supporting two-way, contemporary communication while at the same time respecting anonymity of all affected parties. Results presented herein summarize the outcomes of four online multilingual surveys, focus group interviews, desktop research and interviews with experts in the field of CP practices. The above research activities were conducted in various EU countries aiming to capture requirements of end users from diverse backgrounds (social, cultural, legal and ethical) and determine public expectations regarding CP, community safety and crime prevention.
Keywords: Community partnerships, next generation community policing, public safety, social media.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 153081 Industrial Compressor Anti-Surge Computer Control
Authors: Ventzas Dimitrios, Petropoulos George
Abstract:
The paper presents a compressor anti-surge control system, that results in maximizing compressor throughput with pressure standard deviation reduction, increased safety margin between design point and surge limit line and avoiding possible machine surge. Alternative control strategies are presented.Keywords: Anti-surge, control, compressor, PID control, safety, fault tolerance, start-up, ESD.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 896480 Semantic Web Technologies in e - Government
Authors: Stamatios A. Theocharis, George A. Tsihrintzis
Abstract:
e-Government is already in its second decade. Prerequisite for further development and adaptation to new realities is the optimal management of administrative information and knowledge production by those involved, i.e. the public sector, citizens and businesses. Nowadays, the amount of information displayed or distributed on the Internet has reached enormous dimensions, resulting in serious difficulties when extracting and managing knowledge. The semantic web is expected to play an important role in solving this problem and the technologies that support it. In this article, we address some relevant issues.
Keywords: e-Government, semantic web, ontologies
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 217879 Energy Consumption Analysis of Design Patterns
Authors: Andreas Litke, Kostas Zotos, Alexander Chatzigeorgiou, George Stephanides
Abstract:
The importance of low power consumption is widely acknowledged due to the increasing use of portable devices, which require minimizing the consumption of energy. Energy dissipation is heavily dependent on the software used in the system. Applying design patterns in object-oriented designs is a common practice nowadays. In this paper we analyze six design patterns and explore the effect of them on energy consumption and performance.Keywords: Design Patterns, Embedded Systems, Energy Consumption, Performance Evaluation, Software Design and Development, Software Engineering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 209378 Social Media and Counseling: Opportunities, Risks and Ethical Considerations
Authors: Kyriaki G. Giota, George Kleftaras
Abstract:
The purpose of this article is to briefly review the opportunities that social media present to counselors and psychologists. Particular attention was given to understanding some of the more important common risks inherent in social media and the potential ethical dilemmas which may arise for counselors and psychologists who embrace them in their practice. Key considerations of issues pertinent to an online presence such as multiple relationships, visibility and privacy, maintaining ethical principles and professional boundaries are being discussed.
Keywords: Social Media, Counseling, Risks, Ethics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 797177 Modelling and Analyzing a Hospital Procedureusing a Petri-Net Approach
Authors: Mourtou Efstratia, Abdel-Badeeh M. Salem, Pavlidis George
Abstract:
Hierarchical high-level PNs (HHPNs) with time versions are a useful tool to model systems in a variety of application domains, ranging from logistics to complex workflows. This paper addresses an application domain which is receiving more and more attention: procedure that arranges the final inpatient charge in payment-s office and their management. We shall prove that Petri net based analysis is able to improve the delays during the procedure, in order that inpatient charges could be more reliable and on time.Keywords: eHealth, Petri-Nets, Hospital Services, InpatientCharges, Workflow Modeling.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 197676 High-Speed Pipeline Implementation of Radix-2 DIF Algorithm
Authors: Christos Meletis, Paul Bougas, George Economakos , Paraskevas Kalivas, Kiamal Pekmestzi
Abstract:
In this paper, we propose a new architecture for the implementation of the N-point Fast Fourier Transform (FFT), based on the Radix-2 Decimation in Frequency algorithm. This architecture is based on a pipeline circuit that can process a stream of samples and produce two FFT transform samples every clock cycle. Compared to existing implementations the architecture proposed achieves double processing speed using the same circuit complexity.
Keywords: Digital signal processing, systolic circuits, FFTalgorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 221475 Photodegradation of Optically Trapped Polystyrene Beads at 442 nm
Authors: V. Subramanyan Namboodiri, Sajan. D. George, Steffen Hardt
Abstract:
Polystyrene particles of different sizes are optically trapped with a gaussian beam from a He-Cd laser operating at 442 nm. The particles are observed to exhibit luminescence after a certain trapping time followed by an escape from the optical trap. The observed luminescence is explained in terms of the photodegradation of the polystyrene backbone. It is speculated that these chemical modifications also play a role for the escape of the particles from the trap. Variations of the particle size and the laser power show that these parameters have a great influence on the observed phenomena.Keywords: Photodegradation, Polystyrene particles, Opticaltrapping
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 149874 ClassMATE: Enabling Ambient Intelligence in the Classroom
Authors: Asterios Leonidis, George Margetis, Margherita Antona, Constantine Stephanidis
Abstract:
Ambient Intelligence (AmI) environments bring significant potential to exploit sophisticated computer technology in everyday life. In particular, the educational domain could be significantly enhanced through AmI, as personalized and adapted learning could be transformed from paper concepts and prototypes to real-life scenarios. In this paper, an integrated framework is presented, named ClassMATE, supporting ubiquitous computing and communication in a school classroom. The main objective of ClassMATE is to enable pervasive interaction and context aware education in the technologically augmented classroom of the future.Keywords: Ambient intelligence, smart classroom, pervasivecomputing, education.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 232373 Application of Robot Formation Scheme for Screening Solar Energy in a Greenhouse
Authors: George K. Fourlas, Konstantinos Kalovrektis, Evangelos Fountas
Abstract:
Many agricultural and especially greenhouse applications like plant inspection, data gathering, spraying and selective harvesting could be performed by robots. In this paper multiple nonholonomic robots are used in order to create a desired formation scheme for screening solar energy in a greenhouse through data gathering. The formation consists from a leader and a team member equipped with appropriate sensors. Each robot is dedicated to its mission in the greenhouse that is predefined by the requirements of the application. The feasibility of the proposed application includes experimental results with three unmanned ground vehicles (UGV).Keywords: Greenhouses application, robot formation, solarenergy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 163172 Object Localization in Medical Images Using Genetic Algorithms
Authors: George Karkavitsas, Maria Rangoussi
Abstract:
We present a genetic algorithm application to the problem of object registration (i.e., object detection, localization and recognition) in a class of medical images containing various types of blood cells. The genetic algorithm approach taken here is seen to be most appropriate for this type of image, due to the characteristics of the objects. Successful cell registration results on real life microscope images of blood cells show the potential of the proposed approach.
Keywords: Genetic algorithms, object registration, pattern recognition, blood cell microscope images.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 196871 Conductivity and Selection of Copper Clad Steel Wires for Grounding Applications
Authors: George Eduful, Kingsford J. A. Atanga
Abstract:
Copper clad steel wire (CCS) is primarily used for grounding applications to reduce the high incidence of copper ground conductor theft in electrical installations. The cross sectional area of the CCS is selected by relating the diameter equivalence to a copper conductor. The main difficulty is how to use a simple analytical relation to determine the right conductivity of CCS for a particular application. The use of Eddy-Current instrument for measuring conductivity is known but in most cases, the instrument is not readily available. The paper presents a simplified approach on how to size and determine CCS conductivity for a given application.
Keywords: Copper clad steel wire, conductivity, grounding, skin effect.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 73670 Cluster Analysis for the Statistical Modeling of Aesthetic Judgment Data Related to Comics Artists
Authors: George E. Tsekouras, Evi Sampanikou
Abstract:
We compare three categorical data clustering algorithms with respect to the problem of classifying cultural data related to the aesthetic judgment of comics artists. Such a classification is very important in Comics Art theory since the determination of any classes of similarities in such kind of data will provide to art-historians very fruitful information of Comics Art-s evolution. To establish this, we use a categorical data set and we study it by employing three categorical data clustering algorithms. The performances of these algorithms are compared each other, while interpretations of the clustering results are also given.Keywords: Aesthetic judgment, comics artists, cluster analysis, categorical data.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 163369 Scale-Space Volume Descriptors for Automatic 3D Facial Feature Extraction
Authors: Daniel Chen, George Mamic, Clinton Fookes, Sridha Sridharan
Abstract:
An automatic method for the extraction of feature points for face based applications is proposed. The system is based upon volumetric feature descriptors, which in this paper has been extended to incorporate scale space. The method is robust to noise and has the ability to extract local and holistic features simultaneously from faces stored in a database. Extracted features are stable over a range of faces, with results indicating that in terms of intra-ID variability, the technique has the ability to outperform manual landmarking.
Keywords: Scale space volume descriptor, feature extraction, 3D facial landmarking
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 150768 Preparation and Antibacterial Properties of Ag+-Exchanged Tobermorite-Chitosan Films
Authors: Andrew P. Hurt, George J. Vine, Samantha E. Booth, Nichola J. Coleman
Abstract:
Silver-exchanged zeolites and clays are used in polymer composites to confer broad-spectrum antimicrobial properties on a range of functional materials. Tobermorite is a layer lattice mineral whose potential as a carrier for Ag+ ions in antibacterial composites has not yet been investigated. Accordingly, in this study, synthetic tobermorite was ion-exchanged with 10 wt% silver ions and the resulting material was incorporated into a composite film with chitosan. Chitosan is a biocompatible, biodegradable derivative of chitin, a polysaccharide obtained from the shells of crustaceans. The solvent-cast Ag+-exchanged tobermorite-chitosan films were found to exhibit antimicrobial action against Staphylococcus aureus, Escherichia coli and Pseudomonas aeruginosa.Keywords: Antimicrobial, chitosan, silver, tobermorite.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 189667 Removal of Heavy Metals from Wastewater by Adsorption and Membrane Processes: a Comparative Study
Authors: Nermen N. Maximous, George F. Nakhla, W. K. Wan
Abstract:
This research aimed at investigating the Cr (III), Cd (II) and Pb (II) removal efficiencies by using the newly synthesized metal oxides/ polyethersulfone (PES), Al2O3/PES and ZrO2/PES, membranes from synthetic wastewater and exploring fouling mechanisms. A Comparative study between the removal efficiencies of Cr (III), Cd (II) and Pb (II) from synthetic and natural wastewater by using adsorption onto agricultural by products and the newly synthesized Al2O3/PES and ZrO2/PES membranes was conducted to assess the advantages and limitations of using the metal oxides/PES membranes for heavy metals removal. The results showed that about 99 % and 88 % removal efficiencies were achieved by the tested membranes for Pb (II) and Cr (III), respectively.Keywords: Adsorption, metals removal, ultrafiltrationmembranes, wastewater
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 568366 The Effects of the Inference Process in Reading Texts in Arabic
Authors: May George
Abstract:
Inference plays an important role in the learning process and it can lead to a rapid acquisition of a second language. When learning a non-native language i.e., a critical language like Arabic, the students depend on the teacher’s support most of the time to learn new concepts. The students focus on memorizing the new vocabulary and stress on learning all the grammatical rules. Hence, the students became mechanical and cannot produce the language easily. As a result, they are unable to predicate the meaning of words in the context by relying heavily on the teacher, in that they cannot link their prior knowledge or even identify the meaning of the words without the support of the teacher. This study explores how the teacher guides students learning during the inference process and what are the processes of learning that can direct student’s inference.Keywords: Inference, Reading, Arabic, and Language Acquisition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 205265 Fuzzy Clustering of Categorical Attributes and its Use in Analyzing Cultural Data
Authors: George E. Tsekouras, Dimitris Papageorgiou, Sotiris Kotsiantis, Christos Kalloniatis, Panagiotis Pintelas
Abstract:
We develop a three-step fuzzy logic-based algorithm for clustering categorical attributes, and we apply it to analyze cultural data. In the first step the algorithm employs an entropy-based clustering scheme, which initializes the cluster centers. In the second step we apply the fuzzy c-modes algorithm to obtain a fuzzy partition of the data set, and the third step introduces a novel cluster validity index, which decides the final number of clusters.
Keywords: Categorical data, cultural data, fuzzy logic clustering, fuzzy c-modes, cluster validity index.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 170764 Advanced Manufacturing Technology Adoption in Manufacturing Companies in Kenya
Authors: George M. Nyori, Peter K’Obonyo
Abstract:
Over the past few decades, manufacturing has evolved from a more labor-intensive set of mechanical processes to a sophisticated set of information based technology processes. With the existence of various advanced manufacturing technologies (AMTs), more and more functions or jobs are performed by these machines instead of human labour. This study was undertaken in order to research the extent of AMTs adoption in manufacturing companies in Kenya. In order to investigate a survey was conducted via questionnaires that were sent to 183 selected AMT manufacturing companies in Kenya. 92 companies responded positively. All the surveyed companies were found to have a measure of investment in at least two of the 14 types of AMTs investigated. In general the company surveyed showed that the level of AMT adoption in Kenya is very low with investments levels at a mean of 2.057 and integration levels at a mean of 1.639 in a scale of 1-5.Keywords: AMT adoption, AMT investments, AMT integration, companies in Kenya.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 194163 A “Greedy“ Czech Manufacturing Case
Authors: George Cristian Gruia, Michal Kavan
Abstract:
The article describes a case study on one of Czech Republic-s manufacturing middle size enterprises (ME), where due to the European financial crisis, production lines had to be redesigned and optimized in order to minimize the total costs of the production of goods. It is considered an optimization problem of minimizing the total cost of the work load, according to the costs of the possible locations of the workplaces, with an application of the Greedy algorithm and a partial analogy to a Set Packing Problem. The displacement of working tables in a company should be as a one-toone monotone increasing function in order for the total costs of production of the goods to be at minimum. We use a heuristic approach with greedy algorithm for solving this linear optimization problem, regardless the possible greediness which may appear and we apply it in a Czech ME.Keywords: Czech, greedy algorithm, minimize, total costs.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 162162 On the Seismic Response of Collided Structures
Authors: George D. Hatzigeorgiou, Nikos G. Pnevmatikos
Abstract:
This study examines the inelastic behavior of adjacent planar reinforced concrete (R.C.) frames subjected to strong ground motions. The investigation focuses on the effects of vertical ground motion on the seismic pounding. The examined structures are modeled and analyzed by RUAUMOKO dynamic nonlinear analysis program using reliable hysteretic models for both structural members and contact elements. It is found that the vertical ground motion mildly affects the seismic response of adjacent buildings subjected to structural pounding and, for this reason, it can be ignored from the displacement and interstorey drifts assessment. However, the structural damage is moderately affected by the vertical component of earthquakes.
Keywords: Nonlinear seismic behavior, reinforced concrete structures, structural pounding, vertical ground motions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 209161 Performance of Laboratory Experiments over the Internet: Towards an Intelligent Tutoring System on Automatic Control
Authors: Kleanthis Prekas, Maria Rangoussi, Savvas Vassiliadis, George Prekas
Abstract:
Intelligent tutoring systems constitute an evolution of computer-aided educational software. We present here the modules of an intelligent tutoring system for Automatic Control, developed in our department. Through the software application developed,students can perform complete automatic control laboratory experiments, either over the departmental local area network or over the Internet. Monitoring of access to the system (local as well as international), along with student performance statistics, has yielded strongly encouraging results (as of fall 2004), despite the advanced technical content of the presented paradigm, thus showing the potential of the system developed for education and for training.
Keywords: Automatic control, tutoring system, Internet access, laboratory experiments.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 165560 Run-off Storage in Sand Reservoirs as an Alternative Source of Water Supply for Rura land Semi-arid areas of South Africa
Authors: Olufisayo A. Olufayo, Fred A. O. Otieno, George M. Ochieng
Abstract:
Abstraction of water from the dry river sand-beds is well-known as an alternative source of water during dry seasons. Internally, because of the form of sand particles, voids are created which can store water in the riverbeds. Large rivers are rare in South Africa. Many rivers are sand river types and without water during the prolonged dry periods. South Africa has not taken full advantage of water storage in sand as a solution to the growing water scarcity both in urban and rural areas. The paper reviews the benefits of run-off storage in sand reservoirs gained from other arid areas and need for adoption in rural areas of South Africa as an alternative water supply where it is probable.Keywords: Groundwater, Perennial river, Run-off storage, Sandreservoir.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 173959 Endometrial Cancer Recognition via EEG Dependent upon 14-3-3 Protein Leading to an Ontological Diagnosis
Authors: Marios Poulos, Eirini Maliagani, Minas Paschopoulos, George Bokos
Abstract:
The purpose of my research proposal is to demonstrate that there is a relationship between EEG and endometrial cancer. The above relationship is based on an Aristotelian Syllogism; since it is known that the 14-3-3 protein is related to the electrical activity of the brain via control of the flow of Na+ and K+ ions and since it is also known that many types of cancer are associated with 14-3-3 protein, it is possible that there is a relationship between EEG and cancer. This research will be carried out by well-defined diagnostic indicators, obtained via the EEG, using signal processing procedures and pattern recognition tools such as neural networks in order to recognize the endometrial cancer type. The current research shall compare the findings from EEG and hysteroscopy performed on women of a wide age range. Moreover, this practice could be expanded to other types of cancer. The implementation of this methodology will be completed with the creation of an ontology. This ontology shall define the concepts existing in this research-s domain and the relationships between them. It will represent the types of relationships between hysteroscopy and EEG findings.Keywords: Bioinformatics, Protein 14-3-3, EEG, Endometrial cancer, Ontology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1628