Abstract: The aim of this paper is to give an assessment of
environmental effects of IPPC permit conditions of installations that
are in specific territory with high concentration of industrial
activities.
The IPPC permit is the permit that each operator should hold to
operate the installation as stated by the directive 2010/75/UE on
industrial emissions (integrated pollution prevention and control),
known as IED (Industrial Emissions Directive).
The IPPC permit includes all the measures necessary to achieve a
high level of protection of the environment as a whole, also defining
the monitoring requirements as measurement methodology,
frequency and evaluation procedure. The emissions monitoring of a
specific plant may also give indications of the contribution of these
emissions on the air quality of a definite area.
So, it is clear that the IPPC permits are important tools both to
improve the environmental framework and to achieve the air quality
standards, assisting to assess the possible industrial sources
contributions to air pollution.
Abstract: Different tools and technologies were implemented
for Crisis Response and Management (CRM) which is generally
using available network infrastructure for information exchange.
Depending on type of disaster or crisis, network infrastructure could
be affected and it could not be able to provide reliable connectivity.
Thus any tool or technology that depends on the connectivity could
not be able to fulfill its functionalities. As a solution, a new message
exchange framework has been developed. Framework provides
offline/online information exchange platform for CRM Information
Systems (CRMIS) and it uses XML compression and packet
prioritization algorithms and is based on open source web
technologies. By introducing offline capabilities to the web
technologies, framework will be able to perform message exchange
on unreliable networks. The experiments done on the simulation
environment provide promising results on low bandwidth networks
(56kbps and 28.8 kbps) with up to 50% packet loss and the solution is
to successfully transfer all the information on these low quality
networks where the traditional 2 and 3 tier applications failed.
Abstract: Image search engines rely on the surrounding textual
keywords for the retrieval of images. It is a tedious work for the
search engines like Google and Bing to interpret the user’s search
intention and to provide the desired results. The recent researches
also state that the Google image search engines do not work well on
all the images. Consequently, this leads to the emergence of efficient
image retrieval technique, which interprets the user’s search intention
and shows the desired results. In order to accomplish this task, an
efficient image re-ranking framework is required. Sequentially, to
provide best image retrieval, the new image re-ranking framework is
experimented in this paper. The implemented new image re-ranking
framework provides best image retrieval from the image dataset by
making use of re-ranking of retrieved images that is based on the
user’s desired images. This is experimented in two sections. One is
offline section and other is online section. In offline section, the reranking
framework studies differently (reference classes or Semantic
Spaces) for diverse user query keywords. The semantic signatures get
generated by combining the textual and visual features of the images.
In the online section, images are re-ranked by comparing the
semantic signatures that are obtained from the reference classes with
the user specified image query keywords. This re-ranking
methodology will increases the retrieval image efficiency and the
result will be effective to the user.
Abstract: The study of organisations’ information security
cultures has attracted scholars as well as healthcare services industry
to research the topic and find appropriate tools and approaches to
develop a positive culture. The vast majority of studies in Saudi
national health services are on the use of technology to protect and
secure health services information. On the other hand, there is a lack
of research on the role and impact of an organisation’s cultural
dimensions on information security. This research investigated and
analysed the role and impact of cultural dimensions on information
security in Saudi Arabia health service. Hypotheses were tested and
two surveys were carried out in order to collect data and information
from three major hospitals in Saudi Arabia (SA). The first survey
identified the main cultural-dimension problems in SA health
services and developed an initial information security culture
framework model. The second survey evaluated and tested the
developed framework model to test its usefulness, reliability and
applicability. The model is based on human behaviour theory, where
the individual’s attitude is the key element of the individual’s
intention to behave as well as of his or her actual behaviour. The
research identified a set of cultural and sub-cultural dimensions in SA
health information security and services.
Abstract: Building loss estimation methodologies which have
been advanced considerably in recent decades are usually used to
estimate socio and economic impacts resulting from seismic structural
damage. In accordance with these methods, this paper presents the
evaluation of an annual loss probability of a reinforced concrete
moment resisting frame designed according to Korean Building Code.
The annual loss probability is defined by (1) a fragility curve obtained
from a capacity spectrum method which is similar to a method adopted
from HAZUS, and (2) a seismic hazard curve derived from annual
frequencies of exceedance per peak ground acceleration. Seismic
fragilities are computed to calculate the annual loss probability of a
certain structure using functions depending on structural capacity,
seismic demand, structural response and the probability of exceeding
damage state thresholds. This study carried out a nonlinear static
analysis to obtain the capacity of a RC moment resisting frame
selected as a prototype building. The analysis results show that the
probability of being extensive structural damage in the prototype
building is expected to 0.01% in a year.
Abstract: The development, operation and maintenance of
Integrated Waste Management Systems (IWMS) affects essentially
the sustainable concern of every region. The features of such systems
have great influence on all of the components of sustainability. In
order to reach the optimal way of processes, a comprehensive
mapping of the variables affecting the future efficiency of the system
is needed such as analysis of the interconnections among the
components and modeling of their interactions. The planning of a
IWMS is based fundamentally on technical and economical
opportunities and the legal framework. Modeling the sustainability
and operation effectiveness of a certain IWMS is not in the scope of
the present research. The complexity of the systems and the large
number of the variables require the utilization of a complex approach
to model the outcomes and future risks. This complex method should
be able to evaluate the logical framework of the factors composing
the system and the interconnections between them. The authors of
this paper studied the usability of the Fuzzy Cognitive Map (FCM)
approach modeling the future operation of IWMS’s. The approach
requires two input data set. One is the connection matrix containing
all the factors affecting the system in focus with all the
interconnections. The other input data set is the time series, a
retrospective reconstruction of the weights and roles of the factors.
This paper introduces a novel method to develop time series by
content analysis.
Abstract: This study examines several critical dimensions of eservice
quality overlooked in the existing literature and proposes a
model and instrument framework for measuring customer perceived
e-service quality in the banking sector. The initial design was derived
from a pool of instrument dimensions and their items from the
existing literature review by content analysis. Based on focused
group discussion, nine dimensions were extracted. An exploratory
factor analysis approach was applied to data from a survey of 323
respondents. The instrument has been designed specifically for the
banking sector. Research data was collected from bank customers
who use electronic banking in a developing economy. A nine-factor
instrument has been proposed to measure the e-service quality. The
instrument has been checked for reliability. The validity and sample
place limited the applicability of the instrument across economies and
service categories. Future research must be conducted to check the
validity. This instrument can help bankers in developing economies
like India to measure the e-service quality and make improvements.
The present study offers a systematic procedure that provides insights
on to the conceptual and empirical comprehension of customer
perceived e-service quality and its constituents.
Abstract: This research study is an exploration of the selfdirected
professional development of teachers who teach in public
schools in an era of democracy and educational change in South
Africa. Amidst an ever-changing educational system, the teachers in
this study position themselves as self-directed teacher-learners where
they adopt particular learning practices which enable change within
the broader discourses of public schooling. Life-story interviews
were used to enter into the private and public spaces of five teachers
which offer glimpses of how particular systems shaped their
identities, and how the meanings of self-directed teacher-learner
shaped their learning practices. Through the Multidimensional
Framework of Analysis and Interpretation the teachers’ stories were
analysed through three lenses: restorying the field texts - the self
through story; the teacher-learner in relation to social contexts, and
practices of self-directed learning. This study shows that as teacherlearners
learn for change through self-directed learning practices,
they develop their agency as transformative intellectuals, which is
necessary for the reworking of South African public schools.
Abstract: A capacity spectrum method (CSM), one of methodologies to evaluate seismic fragilities of building structures, has been long recognized as the most convenient method, even if it contains several limitations to predict the seismic response of structures of interest. This paper proposes the procedure to estimate seismic fragility curves using an incremental dynamic analysis (IDA) rather than the method adopting a CSM. To achieve the research purpose, this study compares the seismic fragility curves of a 5-story reinforced concrete (RC) moment frame obtained from both methods; an IDA method and aCSM. Both seismic fragility curves are similar in slight and moderate damage states whereas the fragility curve obtained from the IDA method presents less variation (or uncertainties) in extensive and complete damage states. This is due to the fact that the IDA method can properly capture the structural response beyond yielding rather than the CSM and can directly calculate higher mode effects. From these observations, the CSM could overestimate seismic vulnerabilities of the studied structure in extensive or complete damage states.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: Web-based Cognitive Writing Instruction (WeCWI)’s
contribution towards language development can be divided into
linguistic and non-linguistic perspectives. In linguistic perspective,
WeCWI focuses on the literacy and language discoveries, while the
cognitive and psychological discoveries are the hubs in non-linguistic
perspective. In linguistic perspective, WeCWI draws attention to free
reading and enterprises, which are supported by the language
acquisition theories. Besides, the adoption of process genre approach
as a hybrid guided writing approach fosters literacy development.
Literacy and language developments are interconnected in the
communication process; hence, WeCWI encourages meaningful
discussion based on the interactionist theory that involves input,
negotiation, output, and interactional feedback. Rooted in the elearning
interaction-based model, WeCWI promotes online
discussion via synchronous and asynchronous communications,
which allows interactions happened among the learners, instructor,
and digital content. In non-linguistic perspective, WeCWI highlights
on the contribution of reading, discussion, and writing towards
cognitive development. Based on the inquiry models, learners’
critical thinking is fostered during information exploration process
through interaction and questioning. Lastly, to lower writing anxiety,
WeCWI develops the instructional tool with supportive features to
facilitate the writing process. To bring a positive user experience to
the learner, WeCWI aims to create the instructional tool with
different interface designs based on two different types of perceptual
learning style.
Abstract: There is decagram of strategic decisions of operations
and production/service management (POSM) within operational
research (OR) which must collate, namely: design, inventory, quality,
location, process and capacity, layout, scheduling, maintain ace, and
supply chain. This paper presents an architectural configuration
conceptual framework of a decagram of sets decisions in a form of
mathematical complete graph and abelian graph.
Mathematically, a complete graph is undirected (UDG), and
directed (DG) a relationship where every pair of vertices is
connected, collated, confluent, and holomorphic.
There has not been any study conducted which, however,
prioritizes the holomorphic sets which of POMS within OR field of
study. The study utilizes OR structured technique known as The
Analytic Hierarchy Process (AHP) analysis for organizing, sorting
and prioritizing(ranking) the sets within the decagram of POMS
according to their attribution (propensity), and provides an analysis
how the prioritization has real-world application within the 21st
century.
Abstract: Modular structural systems are constructed using a
method that they are assembled with prefabricated unit modular
frames on-site. This provides a benefit that can significantly reduce
building construction time. The structural design is usually carried out
under the assumption that their load-carrying mechanism is similar to
that of traditional steel moment-resisting systems. However, both
systems are different in terms of beam-column connection details
which may strongly influence the lateral structural behavior. Specially,
the presence of access holes in a beam-column joint of a unit modular
frame could cause undesirable failure during strong earthquakes.
Therefore, this study carried out finite element analyses (FEMs) of
unit modular frames to investigate the cyclic behavior of beam-column
joints with the access holes. Analysis results show that the unit
modular frames present stable cyclic response with large deformation
capacities and their joints are classified into semi-rigid connections
even if there are access holes.
Abstract: Nowadays, the successful implementation of ICTs is
vital for almost any kind of organization. Good governance and ICT
management are essential for delivering value, managing
technological risks, managing resources and performance
measurement. In addition, outsourcing is a strategic IT service
solution which complements IT services provided internally in
organizations. This paper proposes the measurement tools of a new
holistic maturity model based on standards ISO/IEC 20000 and
ISO/IEC 38500, and the frameworks and best practices of ITIL and
COBIT, with a specific focus on IT outsourcing. These measurement
tools allow independent validation and practical application in the
field of higher education, using a questionnaire, metrics tables, and
continuous improvement plan tables as part of the measurement
process. Guidelines and standards are proposed in the model for
facilitating adaptation to universities and achieving excellence in the
outsourcing of IT services.
Abstract: Femtocells are regarded as a milestone for next
generation cellular networks. As femtocells are deployed in an
unplanned manner, there is a chance of assigning same resource to
neighboring femtocells. This scenario may induce co-channel
interference and may seriously affect the service quality of
neighboring femtocells. In addition, the dominant transmit power of a
femtocell will induce co-tier interference to neighboring femtocells.
Thus to jointly handle co-tier and co-channel interference, we
propose an interference-free power and resource block allocation
(IFPRBA) algorithm for closely located, closed access femtocells.
Based on neighboring list, inter-femto-base station distance and
uplink noise power, the IFPRBA algorithm assigns non-interfering
power and resource to femtocells. The IFPRBA algorithm also
guarantees the quality of service to femtouser based on the
knowledge of resource requirement, connection type, and the
tolerable delay budget. Simulation result shows that the interference
power experienced in IFPRBA algorithm is below the tolerable
interference power and hence the overall service success ratio, PRB
efficiency and network throughput are maximum when compared to
conventional resource allocation framework for femtocell (RAFF)
algorithm.
Abstract: Real time image and video processing is a demand in
many computer vision applications, e.g. video surveillance, traffic
management and medical imaging. The processing of those video
applications requires high computational power. Thus, the optimal
solution is the collaboration of CPU and hardware accelerators. In
this paper, a Canny edge detection hardware accelerator is proposed.
Edge detection is one of the basic building blocks of video and image
processing applications. It is a common block in the pre-processing
phase of image and video processing pipeline. Our presented
approach targets offloading the Canny edge detection algorithm from
processing system (PS) to programmable logic (PL) taking the
advantage of High Level Synthesis (HLS) tool flow to accelerate the
implementation on Zynq platform. The resulting implementation
enables up to a 100x performance improvement through hardware
acceleration. The CPU utilization drops down and the frame rate
jumps to 60 fps of 1080p full HD input video stream.
Abstract: Software Architecture is the basic structure of
software that states the development and advancement of a software
system. Software architecture is also considered as a significant tool
for the construction of high quality software systems. A clean design
leads to the control, value and beauty of software resulting in its
longer life while a bad design is the cause of architectural erosion
where a software evolution completely fails. This paper discusses the
occurrence of software architecture erosion and presents a set of
methods for the detection, declaration and prevention of architecture
erosion. The causes and symptoms of architecture erosion are
observed with the examples of prescriptive and descriptive
architectures and the practices used to stop this erosion are also
discussed by considering different types of software erosion and their
affects. Consequently finding and devising the most suitable
approach for fighting software architecture erosion and in some way
reducing its affect is evaluated and tested on different scenarios.
Abstract: The star network is one of the promising
interconnection networks for future high speed parallel computers, it
is expected to be one of the future-generation networks. The star
network is both edge and vertex symmetry, it was shown to have
many gorgeous topological proprieties also it is owns hierarchical
structure framework. Although much of the research work has been
done on this promising network in literature, it still suffers from
having enough algorithms for load balancing problem. In this paper
we try to work on this issue by investigating and proposing an
efficient algorithm for load balancing problem for the star network.
The proposed algorithm is called Star Clustered Dimension Exchange
Method SCDEM to be implemented on the star network. The
proposed algorithm is based on the Clustered Dimension Exchange
Method (CDEM). The SCDEM algorithm is shown to be efficient in
redistributing the load balancing as evenly as possible among all
nodes of different factor networks.
Abstract: Supply chain (SC) is an operational research (OR)
approach and technique which acts as catalyst within central nervous
system of business today. Without SC, any type of business is at
doldrums, hence entropy. SC is the lifeblood of business today
because it is the pivotal hub which provides imperative competitive
advantage. The paper present a conceptual framework dubbed as
Homomorphic Conceptual Framework for Effective Supply Chain
Strategy (HCEFSC).The term Homomorphic is derived from abstract
algebraic mathematical term homomorphism (same shape) which
also embeds the following mathematical application sets:
monomorphisms, isomorphism, automorphisms, and endomorphism.
The HCFESC is intertwined and integrated with wide and broad sets
of elements.
Abstract: The computational fluid dynamics (CFD) study of
stirred tank with the air-water interface are carried out in the presence
of different types of the impeller and with or without baffles. A
multiple reference frame (MRF) approach with the volume of fluid
(VOF) method is used to capture the air-water interface. The RANS
(Reynolds Averaged Navier-Stokes) equations with k-ε turbulence
model are solved to predict the flow behavior of water and air phase
which are treated as a different phases. The predicted results have
shown that the VOF method is able to capture the interface in the
unbaffled tank. While, the VOF method is showing an unfeasible
results in the baffled tank with high rotational impeller speed. For
continuous stirred tank, the air-water interface is disturbed by the
inflow and the level of water is also increased with time.