Search results for: join
180 From Two-Way to Multi-Way: A Comparative Study for Map-Reduce Join Algorithms
Authors: Marwa Hussien Mohamed, Mohamed Helmy Khafagy
Abstract:
Map-Reduce is a programming model which is widely used to extract valuable information from enormous volumes of data. Map-reduce designed to support heterogeneous datasets. Apache Hadoop map-reduce used extensively to uncover hidden pattern like data mining, SQL, etc. The most important operation for data analysis is joining operation. But, map-reduce framework does not directly support join algorithm. This paper explains and compares two-way and multi-way map-reduce join algorithms for map reduce also we implement MR join Algorithms and show the performance of each phase in MR join algorithms. Our experimental results show that map side join and map merge join in two-way join algorithms has the longest time according to preprocessing step sorting data and reduce side cascade join has the longest time at Multi-Way join algorithms.Keywords: Hadoop, MapReduce, multi-way join, two-way join, Ubuntu
Procedia PDF Downloads 488179 New Two-Way Map-Reduce Join Algorithm: Hash Semi Join
Authors: Marwa Hussein Mohamed, Mohamed Helmy Khafagy, Samah Ahmed Senbel
Abstract:
Map Reduce is a programming model used to handle and support massive data sets. Rapidly increasing in data size and big data are the most important issue today to make an analysis of this data. map reduce is used to analyze data and get more helpful information by using two simple functions map and reduce it's only written by the programmer, and it includes load balancing , fault tolerance and high scalability. The most important operation in data analysis are join, but map reduce is not directly support join. This paper explains two-way map-reduce join algorithm, semi-join and per split semi-join, and proposes new algorithm hash semi-join that used hash table to increase performance by eliminating unused records as early as possible and apply join using hash table rather than using map function to match join key with other data table in the second phase but using hash tables isn't affecting on memory size because we only save matched records from the second table only. Our experimental result shows that using a hash table with hash semi-join algorithm has higher performance than two other algorithms while increasing the data size from 10 million records to 500 million and running time are increased according to the size of joined records between two tables.Keywords: map reduce, hadoop, semi join, two way join
Procedia PDF Downloads 514178 Building 1-Well-Covered Graphs by Corona, Join, and Rooted Product of Graphs
Authors: Vadim E. Levit, Eugen Mandrescu
Abstract:
A graph is well-covered if all its maximal independent sets are of the same size. A well-covered graph is 1-well-covered if deletion of every vertex of the graph leaves it well-covered. It is known that a graph without isolated vertices is 1-well-covered if and only if every two disjoint independent sets are included in two disjoint maximum independent sets. Well-covered graphs are related to combinatorial commutative algebra (e.g., every Cohen-Macaulay graph is well-covered, while each Gorenstein graph without isolated vertices is 1-well-covered). Our intent is to construct several infinite families of 1-well-covered graphs using the following known graph operations: corona, join, and rooted product of graphs. Adopting some known techniques used to advantage for well-covered graphs, one can prove that: if the graph G has no isolated vertices, then the corona of G and H is 1-well-covered if and only if H is a complete graph of order two at least; the join of the graphs G and H is 1-well-covered if and only if G and H have the same independence number and both are 1-well-covered; if H satisfies the property that every three pairwise disjoint independent sets are included in three pairwise disjoint maximum independent sets, then the rooted product of G and H is 1-well-covered, for every graph G. These findings show not only how to generate some more families of 1-well-covered graphs, but also that, to this aim, sometimes, one may use graphs that are not necessarily 1-well-covered.Keywords: maximum independent set, corona, concatenation, join, well-covered graph
Procedia PDF Downloads 211177 A Two Level Load Balancing Approach for Cloud Environment
Authors: Anurag Jain, Rajneesh Kumar
Abstract:
Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling
Procedia PDF Downloads 432176 The Reasons behind Individuals to Join Terrorist Organizations: Recruitment from Outside
Authors: Murat Sözen
Abstract:
Today terrorism is gaining momentum again. Parallel to this, it hurts more than before because it has victims from not only its own locations but also remote places. As victims are from outside, militants are likewise from own location and outside. What made these individuals join the terrorist organizations and how these organizations recruit militants are still unanswered. The purpose of this work is to find reasons of joining and power of recruiting. In addition, the role of most popular tool of recruiting, ‘social media’ will be examined.Keywords: recruitment, social media, recruitment, militants
Procedia PDF Downloads 351175 Spatial Data Mining by Decision Trees
Authors: Sihem Oujdi, Hafida Belbachir
Abstract:
Existing methods of data mining cannot be applied on spatial data because they require spatial specificity consideration, as spatial relationships. This paper focuses on the classification with decision trees, which are one of the data mining techniques. We propose an extension of the C4.5 algorithm for spatial data, based on two different approaches Join materialization and Querying on the fly the different tables. Similar works have been done on these two main approaches, the first - Join materialization - favors the processing time in spite of memory space, whereas the second - Querying on the fly different tables- promotes memory space despite of the processing time. The modified C4.5 algorithm requires three entries tables: a target table, a neighbor table, and a spatial index join that contains the possible spatial relationship among the objects in the target table and those in the neighbor table. Thus, the proposed algorithms are applied to a spatial data pattern in the accidentology domain. A comparative study of our approach with other works of classification by spatial decision trees will be detailed.Keywords: C4.5 algorithm, decision trees, S-CART, spatial data mining
Procedia PDF Downloads 613174 Finite Element Modelling and Analysis of Human Knee Joint
Authors: R. Ranjith Kumar
Abstract:
Computer modeling and simulation of human movement is playing an important role in sports and rehabilitation. Accurate modeling and analysis of human knee join is more complex because of complicated structure whose geometry is not easily to represent by a solid model. As part of this project, from the number of CT scan images of human knee join surface reconstruction is carried out using 3D slicer software, an open source software. From this surface reconstruction model, using mesh lab (another open source software) triangular meshes are created on reconstructed surface. This final triangular mesh model is imported to Solid Works, 3D mechanical CAD modeling software. Finally this CAD model is imported to ABAQUS, finite element analysis software for analyzing the knee joints. The results obtained are encouraging and provides an accurate way of modeling and analysis of biological parts without human intervention.Keywords: solid works, CATIA, Pro-e, CAD
Procedia PDF Downloads 124173 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 164172 Structured Access Control Mechanism for Mesh-based P2P Live Streaming Systems
Authors: Chuan-Ching Sue, Kai-Chun Chuang
Abstract:
Peer-to-Peer (P2P) live streaming systems still suffer a challenge when thousands of new peers want to join into the system in a short time, called flash crowd, and most of new peers suffer long start-up delay. Recent studies have proposed a slot-based user access control mechanism, which periodically determines a certain number of new peers to enter the system, and a user batch join mechanism, which divides new peers into several tree structures with fixed tree size. However, the slot-based user access control mechanism is difficult for accurately determining the optimal time slot length, and the user batch join mechanism is hard for determining the optimal tree size. In this paper, we propose a structured access control (SAC) mechanism, which constructs new peers to a multi-layer mesh structure. The SAC mechanism constructs new peer connections layer by layer to replace periodical access control, and determines the number of peers in each layer according to the system’s remaining upload bandwidth and average video rate. Furthermore, we propose an analytical model to represent the behavior of the system growth if the system can utilize the upload bandwidth efficiently. The analytical result has shown the similar trend in system growth as the SAC mechanism. Additionally, the extensive simulation is conducted to show the SAC mechanism outperforms two previously proposed methods in terms of system growth and start-up delay.Keywords: peer-to-peer, live video streaming system, flash crowd, start-up delay, access control
Procedia PDF Downloads 318171 Location-Domination on Join of Two Graphs and Their Complements
Authors: Analen Malnegro, Gina Malacas
Abstract:
Dominating sets and related topics have been studied extensively in the past few decades. A dominating set of a graph G is a subset D of V such that every vertex not in D is adjacent to at least one member of D. The domination number γ(G) is the number of vertices in a smallest dominating set for G. Some problems involving detection devices can be modeled with graphs. Finding the minimum number of devices needed according to the type of devices and the necessity of locating the object gives rise to locating-dominating sets. A subset S of vertices of a graph G is called locating-dominating set, LD-set for short, if it is a dominating set and if every vertex v not in S is uniquely determined by the set of neighbors of v belonging to S. The location-domination number λ(G) is the minimum cardinality of an LD-set for G. The complement of a graph G is a graph Ḡ on same vertices such that two distinct vertices of Ḡ are adjacent if and only if they are not adjacent in G. An LD-set of a graph G is global if it is an LD-set of both G and its complement Ḡ. The global location-domination number λg(G) is defined as the minimum cardinality of a global LD-set of G. In this paper, global LD-sets on the join of two graphs are characterized. Global location-domination numbers of these graphs are also determined.Keywords: dominating set, global locating-dominating set, global location-domination number, locating-dominating set, location-domination number
Procedia PDF Downloads 184170 Excluded: The Sense of Non-Belonging and Violent Radicalisation in the Case of the United Kingdom
Authors: Lorand Bodo
Abstract:
There are many stories of young British citizens who have left their country and families to join Islamist militant groups. So, what drives these young people to abandon their families and countries to join terrorist groups such as the so-called Islamic State? Much has been written to explain the phenomenon of violent radicalisation, whereby the concepts of identity and belonging are identified as one of the most significant drivers for violent radicalisation. In this respect, this paper explores the connection between the sense of belonging and violent radicalisation. That is necessary to gain a more nuanced understanding of the process of violent radicalisation in order to create and implement more effective counter-measures for tackling violent radicalisation. By using an inductive approach, this dissertation attempts to answer the question to what extent does the sense of non-belonging lead to the violent radicalisation of a few individuals. Therefore, alongside an expert interview, a survey, and qualitative content analysis of secondary sources, an exclusive semi-structured interview was conducted with a former violently radicalised Jihadi and recruiter. Overall, the sense of non-belonging significantly affects the process of violent radicalisation of a few individuals. Nevertheless, being religiously fundamental is not the problem of becoming violently radicalised in the first place, but belonging to the wrong group that is strongly determined by ideology, constitutes the main problem.Keywords: identity, sense of non-belonging, social identity theory, violent radicalisation
Procedia PDF Downloads 201169 Improving Sustainability of the Apparel Industry with Joining the Forces among the Brand Owners: The Case Study of Digital Textile Printing
Authors: Babak Mohajeri, Elina Ilen, Timo Nyberg
Abstract:
Sustainability has become an important topic in contemporary business. The apparel industry is a good example to assess sustainability in practice. Value chains in the apparel industry are faced with various challenges regarding sustainability issues. Apparel companies pay higher attention to economic sustainability issues, and environmental and social sustainability issues of the apparel industry are often underrated. In this paper, we analyze the role of the different players in the value chain of the apparel industry in terms of sustainability. We realize that the brand owners have the highest impact on improving the sustainability of the apparel industry. We design a collaborative business model to join the forces among the brand owners for improving the sustainability of the apparel industry throughout the value chain. We have conducted a case study of shifting from conventional screen-printing to more environmentally sustainable digital textile printing. We suggest that this shift can be accelerated if the brand owners join their forces together to shift from conventional printing to digital printing technology in the apparel industry. Based on the proposed business model, we suggest future directions for using joining the forces among the brand owners for case of sustainabilityKeywords: sustainability, digital textile printing , joining forces, apparel industry
Procedia PDF Downloads 421168 Reasons for Adhesion of Membership: A Case Study of Brazilian Soccer Team
Authors: Alexandre Olkoski, Marcelo Curth
Abstract:
Football in Brazil is considered a passion, being the most popular sport in the country, both by the consumer public and by the means of communication that divulge it individually, when compared with other sports modalities. In the last two decades, the soccer teams have given greater importance to the management, since they understood that the same should be managed as a company, but with peculiarities related to the business. In this sense, Brazilian soccer clubs started to make bigger investments for the adhesion of fans in their social frames, allowing a greater need of understanding about the profile of this group of fans/clients. Thus, this work aims to understand the reasons that cause the fans to join the club and identify variables present in the process of intention to join the club. For that, a qualitative exploratory research was conducted, in which thirty-one membership of a soccer club from southern Brazil were interviewed. Based on the interviews, five categories were classified as emotional aspects (passion and love), cognitive aspects (easy access to the stadium and promotional values in tickets), external influences (family and friends), situational aspects (club moment) and aspects related to the event (engagement by modality). As results found in the analysis, it can be highlighted that the motivation of the majority of the respondents to become a member of the analyzed club, is related to the emotional aspects, such as passion and love. Thus, it is perceived that sport, in the case of soccer, generates in the involved ones (fans and leaders) different manifestations, suggesting that the management of this type of business has great complexity and should not be observed only by the spectrum of the club like a business.Keywords: consumer behavior, marketing, membership, soccer
Procedia PDF Downloads 334167 Embedding Employability Skills in Computer and Information Science Program Curriculum
Authors: Nadezda Pizika
Abstract:
The paper discusses possible approaches of embedding the development of employability skills in the program curriculum. This paper contains analysis of the problem areas raised by employers regarding new graduates’ readiness to join workforce, the ways of possible improvements, and the actions required from different stakeholders. The case discussed in the paper is related to Computer and Information Science (CIS) Program offered at Higher Colleges of Technology (UAE).Keywords: curriculum design, employability skills, employers, graduates, education, entrepreneurship
Procedia PDF Downloads 325166 Management Trainee Program
Authors: Ambreen Amir Ali
Abstract:
In todays’ dynamic environment, it has become very crucial to have comprehensive management trainee program to hire future leaders of organization. It is being proved that fresh graduates mostly join organizations because of its institution but later on they leave organization because of their immediate manager or supervisor. The concept of coaching and mentoring in talent management systems are very important, because mentors are those who can advise, facilitate, help and support new entrants to advance in their career. When it comes to going for talent hunt, one point needs to be highlighted that MTs are the raw talent for your organization, now it’s the responsibility of employers to nourish them, polish and developed them so that they can enthusiastically take care of senior leadership roles.Keywords: management trainee, retention, leadership roles, coaching
Procedia PDF Downloads 638165 The K-Distance Neighborhood Polynomial of a Graph
Authors: Soner Nandappa D., Ahmed Mohammed Naji
Abstract:
In a graph G = (V, E), the distance from a vertex v to a vertex u is the length of shortest v to u path. The eccentricity e(v) of v is the distance to a farthest vertex from v. The diameter diam(G) is the maximum eccentricity. The k-distance neighborhood of v, for 0 ≤ k ≤ e(v), is Nk(v) = {u ϵ V (G) : d(v, u) = k}. In this paper, we introduce a new distance degree based topological polynomial of a graph G is called a k- distance neighborhood polynomial, denoted Nk(G, x). It is a polynomial with the coefficient of the term k, for 0 ≤ k ≤ e(v), is the sum of the cardinalities of Nk(v) for every v ϵ V (G). Some properties of k- distance neighborhood polynomials are obtained. Exact formulas of the k- distance neighborhood polynomial for some well-known graphs, Cartesian product and join of graphs are presented.Keywords: vertex degrees, distance in graphs, graph operation, Nk-polynomials
Procedia PDF Downloads 551164 Semirings of Graphs: An Approach Towards the Algebra of Graphs
Authors: Gete Umbrey, Saifur Rahman
Abstract:
Graphs are found to be most capable in computing, and its abstract structures have been applied in some specific computations and algorithms like in phase encoding controller, processor microcontroller, and synthesis of a CMOS switching network, etc. Being motivated by these works, we develop an independent approach to study semiring structures and various properties by defining the binary operations which in fact, seems analogous to an existing definition in some sense but with a different approach. This work emphasizes specifically on the construction of semigroup and semiring structures on the set of undirected graphs, and their properties are investigated therein. It is expected that the investigation done here may have some interesting applications in theoretical computer science, networking and decision making, and also on joining of two network systems.Keywords: graphs, join and union of graphs, semiring, weighted graphs
Procedia PDF Downloads 149163 Intermetallic Phases in the Fusion Weld of CP Ti to Stainless Steel
Authors: Juzar Vohra, Ravish Malhotra, Tim Pasang, Mana Azizi, Yuan Tao, Masami Mizutani
Abstract:
In this paper, dissimilar welding of titanium to stainless steels is reported. Laser Beam Welding (LBW) and Gas Tungsten Arc Welding (GTAW) were employed to join CPTi to SS304. The welds were examined using scanning electron microscopy (SEM) and energy dispersive X-ray spectroscopy (EDS). FeTi, Ti2Cr and Fe2Ti dendrites are formed along with beta phase titanium matrix. The hardness values of these phases are high which makes them brittle and leading to cracking along the weld pool. However, it is believed that cracking, hence, fracturing of this weld joint is largely due to the difference in thermal properties of the two alloys.Keywords: dissimilar metals, fusion welding, intermetallics, brittle
Procedia PDF Downloads 496162 Biochemical Identification and Study of Antibiotic Resistance in Isolated Bacteria from WWTP TIMGAD
Authors: Abdessemed Zineb, Atia Yahia, Yeza Salima
Abstract:
Water is self-purified by activated sludge process which makes its uniqueness. The main goal is the microbial biocenosis study of the input and output water of the waste water treatment system plant Timgad. 89.47% of the identified biocenosis belongs to ɤ-Proteobacteria while the remaining 10.52 % is equally divided between α-Proteobacteria and β-Proteobacteria. The antibiotics susceptibility profiles reveal that over 30 % are wild strains while the penicillinases are often present (11.30-20 %) with also other profiles. This proportion is worrying that the water discharged join the Oued Soltez used for irrigation. This disadvantage involves the installation of a chlorination step.Keywords: activated sludge, biocenosis, antibiotics profiles, penicillinases, physic-chemical quality
Procedia PDF Downloads 305161 Elements of Usability and Sociability in Activity Management System for e-Masjid
Authors: Hidayah bt Rahmalan, Marhazli Kipli, Muhammad Suffian Sikandar Ghani, Maisarah Abu, Muhammad Faisal Ashaari, Norlizam Md Sukiban
Abstract:
This study presents an example of activity management system for e-Masjid implementing elements of usability and sociability. It is expected to resolve the shortcomings of the most e-Masjid that provide lot of activities to their community. However, the data on handling a lot of activities or events in which involve a lot of people will be difficult to manipulate. Thus, this paper presents the usability and sociability element on an activity management system that not only eases the job for the user but being practical for future when the community join any events. For the time being, this activity management system was only applied for Sayyidina Abu Bakar Mosque in Utem, Malacca.Keywords: e-masjid, usability, sociability, activity management system
Procedia PDF Downloads 368160 Representation of “Gezi Parkı Actions” in Media and Resistance
Authors: Sibel Özkan
Abstract:
This study aims to set forth the perception of young people in Turkey about “Gezi Parkı Actions” which has been represented by different views on social and traditional media. In-depth interview method was carried out with all of the participants who consisted of high school students. All interviews has been conducted in areas where the actions take place and the numbers of participants who are using and not using social media were equal. There are minor differences between young people who are using and not using social media. Participants who are not using social media had an opinion only about saving nature aspect of Gezi Parkı Actions. On the other hand, people who are using social media had another reasons such as freedom of expression, respect to the lifestyles etc. to join Gezi Parkı Actions. It was found that young people do not completely trust traditional media anymore.Keywords: Gezi Parkı, resistance, social media, hegemony
Procedia PDF Downloads 438159 A Quantitative Study of the Evolution of Open Source Software Communities
Authors: M. R. Martinez-Torres, S. L. Toral, M. Olmedilla
Abstract:
Typically, virtual communities exhibit the well-known phenomenon of participation inequality, which means that only a small percentage of users is responsible of the majority of contributions. However, the sustainability of the community requires that the group of active users must be continuously nurtured with new users that gain expertise through a participation process. This paper analyzes the time evolution of Open Source Software (OSS) communities, considering users that join/abandon the community over time and several topological properties of the network when modeled as a social network. More specifically, the paper analyzes the role of those users rejoining the community and their influence in the global characteristics of the network.Keywords: open source communities, social network Analysis, time series, virtual communities
Procedia PDF Downloads 525158 The Application of ICT in E-Assessment and E-Learning in Language Learning and Teaching
Authors: Seyyed Hassan Seyyedrezaei
Abstract:
The advent of computer and ICT thereafter has introduced many irrevocable changes in learning and teaching. There is substantially growing need for the use of IT and ICT in language learning and teaching. In other words, the integration of Information Technology (IT) into online teaching is of vital importance for education and assessment. Considering the fact that the image of education is undergone drastic changes by the advent of technology, education systems and teachers move beyond the walls of traditional classes and methods in order to join with other educational centers to revitalize education. Given the advent of distance learning, online courses and virtual universities, e-assessment has taken a prominent place in effective teaching and meeting the learners' educational needs. The purpose of this paper is twofold: first, scrutinizing e-learning, it discusses how and why e-assessment is becoming widely used by educationalists and administrators worldwide. As a second purpose, a couple of effective strategies for online assessment will be enumerated.Keywords: e-assessment, e learning, ICT, online assessment
Procedia PDF Downloads 569157 Economic Conflict between the United Kingdom and the European Community 1945-1975
Authors: Soumia Hebbri
Abstract:
The relationship between Britain and the European Union is phenomenally complex with a great opposition to Europe in the British Conservative and Labour Parties emerged since 1945. During the history and development of the European Union, Europe saw a lack of British involvement until 1961, after refusing to sign the Treaties of Rome of 1957 for being a member of the European Economic Community. Britain then applied to join the EEC in 1961 under Harold Macmillan’s Conservative Government, its application led by the Chief Negotiator Edward Heath. This application was vetoed by President de Gaulle. With de Gaulle out of power Britain. finally could joined in 1973. But again Labour and conservative both found themselves divided on the issue and they hold a referendum under labour on whether to continue the UK’s membership.Keywords: the European Union, the British, economic community, de Gaulle
Procedia PDF Downloads 491156 Forecasting Solid Waste Generation in Turkey
Authors: Yeliz Ekinci, Melis Koyuncu
Abstract:
Successful planning of solid waste management systems requires successful prediction of the amount of solid waste generated in an area. Waste management planning can protect the environment and human health, hence it is tremendously important for countries. The lack of information in waste generation can cause many environmental and health problems. Turkey is a country that plans to join European Union, hence, solid waste management is one of the most significant criteria that should be handled in order to be a part of this community. Solid waste management system requires a good forecast of solid waste generation. Thus, this study aims to forecast solid waste generation in Turkey. Artificial Neural Network and Linear Regression models will be used for this aim. Many models will be run and the best one will be selected based on some predetermined performance measures.Keywords: forecast, solid waste generation, solid waste management, Turkey
Procedia PDF Downloads 508155 Modelling Farmer’s Perception and Intention to Join Cashew Marketing Cooperatives: An Expanded Version of the Theory of Planned Behaviour
Authors: Gospel Iyioku, Jana Mazancova, Jiri Hejkrlik
Abstract:
The “Agricultural Promotion Policy (2016–2020)” represents a strategic initiative by the Nigerian government to address domestic food shortages and the challenges in exporting products at the required quality standards. Hindered by an inefficient system for setting and enforcing food quality standards, coupled with a lack of market knowledge, the Federal Ministry of Agriculture and Rural Development (FMARD) aims to enhance support for the production and activities of key crops like cashew. By collaborating with farmers, processors, investors, and stakeholders in the cashew sector, the policy seeks to define and uphold high-quality standards across the cashew value chain. Given the challenges and opportunities faced by Nigerian cashew farmers, active participation in cashew marketing groups becomes imperative. These groups serve as essential platforms for farmers to collectively navigate market intricacies, access resources, share knowledge, improve output quality, and bolster their overall bargaining power. Through engagement in these cooperative initiatives, farmers not only boost their economic prospects but can also contribute significantly to the sustainable growth of the cashew industry, fostering resilience and community development. This study explores the perceptions and intentions of farmers regarding their involvement in cashew marketing cooperatives, utilizing an expanded version of the Theory of Planned Behaviour. Drawing insights from a diverse sample of 321 cashew farmers in Southwest Nigeria, the research sheds light on the factors influencing decision-making in cooperative participation. The demographic analysis reveals a diverse landscape, with a substantial presence of middle-aged individuals contributing significantly to the agricultural sector and cashew-related activities emerging as a primary income source for a substantial proportion (23.99%). Employing Structural Equation Modelling (SEM) with Maximum Likelihood Robust (MLR) estimation in R, the research elucidates the associations among latent variables. Despite the model’s complexity, the goodness-of-fit indices attest to the validity of the structural model, explaining approximately 40% of the variance in the intention to join cooperatives. Moral norms emerge as a pivotal construct, highlighting the profound influence of ethical considerations in decision-making processes, while perceived behavioural control presents potential challenges in active participation. Attitudes toward joining cooperatives reveal nuanced perspectives, with strong beliefs in enhanced connections with other farmers but varying perceptions on improved access to essential information. The SEM analysis establishes positive and significant effects of moral norms, perceived behavioural control, subjective norms, and attitudes on farmers’ intention to join cooperatives. The knowledge construct positively affects key factors influencing intention, emphasizing the importance of informed decision-making. A supplementary analysis using partial least squares (PLS) SEM corroborates the robustness of our findings, aligning with covariance-based SEM results. This research unveils the determinants of cooperative participation and provides valuable insights for policymakers and practitioners aiming to empower and support this vital demographic in the cashew industry.Keywords: marketing cooperatives, theory of planned behaviour, structural equation modelling, cashew farmers
Procedia PDF Downloads 87154 Investigating Teachers’ Confidence and Beliefs in Using Technology in Teaching Mathematics in Rwandan Secondary Schools
Authors: Odette Umugiraneza, Etienne Nzaramyimana
Abstract:
Confidence and beliefs are the main contributors to the improvement of teachers’ mathematical knowledge. The objective of this study was to investigate teachers’ confidence and beliefs towards technology use in teaching mathematics subjects in the Musanze District. The data were collected using closed and open questions. These were distributed to 118 secondary school senior 1 to 6 mathematics teachers in Musanze district. The findings revealed that the teachers’ confidence about the use of technology in teaching mathematics needs improvement. Apart from confidence, almost a third of the teachers convoyed negative beliefs that technology plays great importance in promoting the understanding of mathematics. Teachers as knowledge transmitters are required to join various professional courses towards technology integration in the teaching of mathematics, to improve the effectiveness of teaching and learning.Keywords: knowledge, technology, teachers’ confidence, beliefs, barriers of technology use
Procedia PDF Downloads 126153 Proactive Pure Handoff Model with SAW-TOPSIS Selection and Time Series Predict
Authors: Harold Vásquez, Cesar Hernández, Ingrid Páez
Abstract:
This paper approach cognitive radio technic and applied pure proactive handoff Model to decrease interference between PU and SU and comparing it with reactive handoff model. Through the study and analysis of multivariate models SAW and TOPSIS join to 3 dynamic prediction techniques AR, MA ,and ARMA. To evaluate the best model is taken four metrics: number failed handoff, number handoff, number predictions, and number interference. The result presented the advantages using this type of pure proactive models to predict changes in the PU according to the selected channel and reduce interference. The model showed better performance was TOPSIS-MA, although TOPSIS-AR had a higher predictive ability this was not reflected in the interference reduction.Keywords: cognitive radio, spectrum handoff, decision making, time series, wireless networks
Procedia PDF Downloads 491152 E-Learning Approaches Based on Artificial Intelligence Techniques: A Survey
Authors: Nabila Daly, Hamdi Ellouzi, Hela Ltifi
Abstract:
In last year’s, several recent researches’ that focus on e-learning approaches having as goal to improve pedagogy and student’s academy level assessment. E-learning-related works have become an important research file nowadays due to several problems that make it impossible for students join classrooms, especially in last year’s. Among those problems, we note the current epidemic problems in the word case of Covid-19. For those reasons, several e-learning-related works based on Artificial Intelligence techniques are proposed to improve distant education targets. In the current paper, we will present a short survey of the most relevant e-learning based on Artificial Intelligence techniques giving birth to newly developed e-learning tools that rely on new technologies.Keywords: artificial intelligence techniques, decision, e-learning, support system, survey
Procedia PDF Downloads 225151 Design of Middleware for Mobile Group Control in Physical Proximity
Authors: Moon-Tak Oh, Kyung-Min Park, Tae-Eun Yoon, Hoon Choi, Chil-Woo Lee
Abstract:
This paper is about middle-ware which enables group-user applications on mobile devices in physical proximity to interact with other devices without intervention of a central server. Requirements of the middle-ware are identified from service usage scenarios, and the functional architecture of the middle-ware is specified. These requirements include group management, synchronization, and resource management. Group Management needs to provide various capabilities to such applications with respect to managing multiple users (e.g., creation of groups, discovery of group or individual users, member join/leave, election of a group manager and service-group association) using D2D communication technology. We designed the middle-ware for the above requirements on the Android platform.Keywords: group user, middleware, mobile service, physical proximity
Procedia PDF Downloads 507