Search results for: public space usage
7449 Pleated Surfaces: Experimentation and Examples
Authors: Maritza Granados Manjarrés
Abstract:
This paper makes part of an investigation project which experiments with flat surfaces in order to pleat them using tessellations and flat origami conditions. The aim of the investigation is to eventually propose not only a methodology on how to pleat those surfaces but also to find an structural system to make them work as building skins. This stage of the investigation emphasizes on the experimentation with flat surfaces and different kinds of folding patterns and shows the many examples that can be made from this experimentation.Keywords: flat origami, fold, space, surface
Procedia PDF Downloads 2917448 Real-Space Mapping of Surface Trap States in Cigse Nanocrystals Using 4D Electron Microscopy
Authors: Riya Bose, Ashok Bera, Manas R. Parida, Anirudhha Adhikari, Basamat S. Shaheen, Erkki Alarousu, Jingya Sun, Tom Wu, Osman M. Bakr, Omar F. Mohammed
Abstract:
This work reports visualization of charge carrier dynamics on the surface of copper indium gallium selenide (CIGSe) nanocrystals in real space and time using four-dimensional scanning ultrafast electron microscopy (4D S-UEM) and correlates it with the optoelectronic properties of the nanocrystals. The surface of the nanocrystals plays a key role in controlling their applicability for light emitting and light harvesting purposes. Typically for quaternary systems like CIGSe, which have many desirable attributes to be used for optoelectronic applications, relative abundance of surface trap states acting as non-radiative recombination centre for charge carriers remains as a major bottleneck preventing further advancements and commercial exploitation of these nanocrystals devices. Though ultrafast spectroscopic techniques allow determining the presence of picosecond carrier trapping channels, because of relative larger penetration depth of the laser beam, only information mainly from the bulk of the nanocrystals is obtained. Selective mapping of such ultrafast dynamical processes on the surfaces of nanocrystals remains as a key challenge, so far out of reach of purely optical probing time-resolved laser techniques. In S-UEM, the optical pulse generated from a femtosecond (fs) laser system is used to generate electron packets from the tip of the scanning electron microscope, instead of the continuous electron beam used in the conventional setup. This pulse is synchronized with another optical excitation pulse that initiates carrier dynamics in the sample. The principle of S-UEM is to detect the secondary electrons (SEs) generated in the sample, which is emitted from the first few nanometers of the top surface. Constructed at different time delays between the optical and electron pulses, these SE images give direct and precise information about the carrier dynamics on the surface of the material of interest. In this work, we report selective mapping of surface dynamics in real space and time of CIGSe nanocrystals applying 4D S-UEM. We show that the trap states can be considerably passivated by ZnS shelling of the nanocrystals, and the carrier dynamics can be significantly slowed down. We also compared and discussed the S-UEM kinetics with the carrier dynamics obtained from conventional ultrafast time-resolved techniques. Additionally, a direct effect of the state trap removal can be observed in the enhanced photoresponse of the nanocrystals after shelling. Direct observation of surface dynamics will not only provide a profound understanding of the photo-physical mechanisms on nanocrystals’ surfaces but also enable to unlock their full potential for light emitting and harvesting applications.Keywords: 4D scanning ultrafast microscopy, charge carrier dynamics, nanocrystals, optoelectronics, surface passivation, trap states
Procedia PDF Downloads 2957447 Making Food Science Education and Research Activities More Attractive for University Students and Food Enterprises by Utilizing Open Innovative Space-Approach
Authors: Anna-Maria Saarela
Abstract:
At the Savonia University of Applied Sciences (UAS), curriculum and studies have been improved by applying an Open Innovation Space approach (OIS). It is based on multidisciplinary action learning. The key elements of OIS-ideology are work-life orientation, and student-centric communal learning. In this approach, every participant can learn from each other and innovations will be created. In this social innovation educational approach, all practices are carried out in close collaboration with enterprises in real-life settings, not in classrooms. As an example, in this paper, Savonia UAS’s Future Food RDI hub (FF) shows how OIS practices are implemented by providing food product development and consumer research services for enterprises in close collaboration with academicians, students and consumers. In particular one example of OIS experimentation in the field is provided by a consumer research carried out utilizing verbal analysis protocol combined with audio-visual observation (VAP-WAVO). In this case, all co-learners were acting together in supermarket settings to collect the relevant data for a product development and the marketing department of a company. The company benefitted from the results obtained, students were more satisfied with their studies, educators and academicians were able to obtain good evidence for further collaboration as well as renewing curriculum contents based on the requirements of working life. In addition, society will benefit over time as young university adults find careers more easily through their OIS related food science studies. Also this knowledge interaction model re-news education practices and brings working-life closer to educational research institutes.Keywords: collaboration, education, food science, industry, knowledge transfer, RDI, student
Procedia PDF Downloads 3737446 Investigation into Varied Inspection Utilization for Mass Customization
Authors: Trishen Naidoo, Anthony Walker, Shaniel Davrajh, Glen Bright
Abstract:
An investigation into on-line inspection was performed where research is focused on the use of varied inspection (as opposed to 100% inspection) for mass customization (MC). Manufacturers need new methods for quality control in mass customization, and these methods need to address some of the old problems such as over-inspection and bottlenecking. Due to the risks of varied inspection, many manufacturers do not implement it and rather opt for sampling methods. However, there are many advantages of varied inspection and can have applications in mass customization. A control system incorporating fuzzy logic (FL) control is used to perform the variations in inspection usage in a simulated environment. The proposed system can have a key impact in appraisal costs reduction and possibly work-in-process reduction in high variety environments.Keywords: appraisal costs, fuzzy logic, quality control, work-in-process
Procedia PDF Downloads 2327445 Technology and the Need for Integration in Public Education
Authors: Eric Morettin
Abstract:
Cybersecurity and digital literacy are pressing issues among Canadian citizens, yet formal education does not provide today’s students with the necessary knowledge and skills needed to adapt to these challenging issues within the physical and digital labor-market. Canada’s current education systems do not highlight the importance of these respective fields, aside from using technology for learning management systems and alternative methods of assignment completion. Educators are not properly trained to integrate technology into the compulsory courses within public education, to better prepare their learners in these topics and Canada’s digital economy. ICTC addresses these gaps in education and training through cross-Canadian educational programming in digital literacy and competency, cybersecurity and coding which is bridged with Canada’s provincially regulated K-12 curriculum guidelines. After analyzing Canada’s provincial education, it is apparent that there are gaps in learning related to technology, as well as inconsistent educational outcomes that do not adequately represent the current Canadian and global economies. Presently only New Brunswick, Nova Scotia, Ontario, and British Columbia offer curriculum guidelines for cybersecurity, computer programming, and digital literacy. The remaining provinces do not address these skills in their curriculum guidelines. Moreover, certain courses across some provinces not being updated since the 1990’s. The three territories respectfully take curriculum strands from other provinces and use them as their foundation in education. Yukon uses all British Columbia curriculum. Northwest Territories and Nunavut respectfully use a hybrid of Alberta and Saskatchewan curriculum as their foundation of learning. Education that is provincially regulated does not allow for consistency across the country’s educational outcomes and what Canada’s students will achieve – especially when curriculum outcomes have not been updated to reflect present day society. Through this, ICTC has aligned Canada’s provincially regulated curriculum and created opportunities for focused education in the realm of technology to better serve Canada’s present learners and teachers; while addressing inequalities and applicability within curriculum strands and outcomes across the country. As a result, lessons, units, and formal assessment strategies, have been created to benefit students and teachers in this interdisciplinary, cross-curricular, practice - as well as meeting their compulsory education requirements and developing skills and literacy in cyber education. Teachers can access these lessons and units through ICTC’s website, as well as receive professional development regarding the assessment and implementation of these offerings from ICTC’s education coordinators, whose combines experience exceeds 50 years of teaching in public, private, international, and Indigenous schools. We encourage you to take this opportunity that will benefit students and educators, and will bridge the learning and curriculum gaps in Canadian education to better reflect the ever-changing public, social, and career landscape that all citizens are a part of. Students are the future, and we at ICTC strive to ensure their futures are bright and prosperous.Keywords: cybersecurity, education, curriculum, teachers
Procedia PDF Downloads 827444 An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment
Authors: Ujjwall Sai Sunder Uppuluri
Abstract:
Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach.Keywords: complex systems, evolutionary theory, group theory, international political economy
Procedia PDF Downloads 1397443 Biophilic Design Strategies: Four Case-Studies from Northern Europe
Authors: Carmen García Sánchez
Abstract:
The UN's 17 Sustainable Development Goals – specifically the nº 3 and nº 11- urgently call for new architectural design solutions at different design scales to increase human contact with nature in the health and wellbeing promotion of primarily urban communities. The discipline of Interior Design offers an important alternative to large-scale nature-inclusive actions which are not always possible due to space limitations. These circumstances provide an immense opportunity to integrate biophilic design, a complex emerging and under-developed approach that pursues sustainable design strategies for increasing the human-nature connection through the experience of the built environment. Biophilic design explores the diverse ways humans are inherently inclined to affiliate with nature, attach meaning to and derive benefit from the natural world. It represents a biological understanding of architecture which categorization is still in progress. The internationally renowned Danish domestic architecture built in the 1950´s and early 1960´s - a golden age of Danish modern architecture - left a leading legacy that has greatly influenced the domestic sphere and has further led the world in terms of good design and welfare. This study examines how four existing post-war domestic buildings establish a dialogue with nature and her variations over time. The case-studies unveil both memorable and unique biophilic resources through sophisticated and original design expressions, where transformative processes connect the users to the natural setting and reflect fundamental ways in which they attach meaning to the place. In addition, fascinating analogies in terms of this nature interaction with particular traditional Japanese architecture inform the research. They embody prevailing lessons for our time today. The research methodology is based on a thorough literature review combined with a phenomenological analysis into how these case-studies contribute to the connection between humans and nature, after conducting fieldwork throughout varying seasons to document understanding in nature transformations multi-sensory perception (via sight, touch, sound, smell, time and movement) as a core research strategy. The cases´ most outstanding features have been studied attending the following key parameters: 1. Space: 1.1. Relationships (itineraries); 1.2. Measures/scale; 2. Context: Context: Landscape reading in different weather/seasonal conditions; 3. Tectonic: 3.1. Constructive joints, elements assembly; 3.2. Structural order; 4. Materiality: 4.1. Finishes, 4.2. Colors; 4.3. Tactile qualities; 5. Daylight interplay. Departing from an artistic-scientific exploration this groundbreaking study provides sustainable practical design strategies, perspectives, and inspiration to boost humans´ contact with nature through the experience of the interior built environment. Some strategies are associated with access to outdoor space or require ample space, while others can thrive in a dense urban context without direct access to the natural environment. The objective is not only to produce knowledge, but to phase in biophilic design in the built environment, expanding its theory and practice into a new dimension. Its long-term vision is to efficiently enhance the health and well-being of urban communities through daily interaction with Nature.Keywords: sustainability, biophilic design, architectural design, interior design, nature, Danish architecture, Japanese architecture
Procedia PDF Downloads 1017442 Teachers’ Role and Principal’s Administrative Functions as Correlates of Effective Academic Performance of Public Secondary School Students in Imo State, Nigeria
Authors: Caroline Nnokwe, Iheanyi Eneremadu
Abstract:
Teachers and principals are vital and integral parts of the educational system. For educational objectives to be met, the role of teachers and the functions of the principals are not to be overlooked. However, the inability of teachers and principals to carry out their roles effectively has impacted the outcome of the students’ performance. The study, therefore, examined teachers’ roles and principal’s administrative functions as correlates of effective academic performance of public secondary school students in Imo state, Nigeria. Four research questions and two hypotheses guided the study. The study adopted a correlation research design. The sample size was 5,438 respondents via the Yaro-Yamane technique, which consists of 175 teachers, 13 principals and 5,250 students using the proportional stratified random sampling technique. The instruments for data collection were a researcher-made questionnaire titled Teachers’ Role/Principals’ Administrative Functions Questionnaire (TRPAFQ) with a Cronbach Alpha coefficient of .82 and student's internal results obtained from the school authorities. Data collected were analyzed using the Pearson product-moment correlation coefficient and simple linear regression. Research questions were answered using Pearson Product Moment Correlation statistics, while the hypotheses were tested at 0.05 level of significance using regression analysis. The findings of the study showed that the educational qualification of teachers, organizing, and planning correlated student’s academic performance to a great extent, while availability and proper use of instructional materials by teachers correlated the academic performance of students to a very high extent. The findings also revealed that there is a significant relationship between teachers’ role, principals’ administrative functions and student’s academic performance of public secondary schools in Imo State, The study recommended among others that there is the need for government, through the ministry of education, and education authorities to adequately staff their supervisory department in order to carry out proper supervision of secondary school teachers, and also provide adequate instructional materials to ensure greater academic performance among secondary school students of Imo state, Nigeria.Keywords: instructional materials, principals’ administrative functions, students’ academic performance, teacher role
Procedia PDF Downloads 867441 UniFi: Universal Filter Model for Image Enhancement
Authors: Aleksei Samarin, Artyom Nazarenko, Valentin Malykh
Abstract:
Image enhancement is becoming more and more popular, especially on mobile devices. Nowadays, it is a common approach to enhance an image using a convolutional neural network (CNN). Such a network should be of significant size; otherwise, a possibility for the artifacts to occur is overgrowing. The existing large CNNs are computationally expensive, which could be crucial for mobile devices. Another important flaw of such models is they are poorly interpretable. There is another approach to image enhancement, namely, the usage of predefined filters in combination with the prediction of their applicability. We present an approach following this paradigm, which outperforms both existing CNN-based and filter-based approaches in the image enhancement task. It is easily adaptable for mobile devices since it has only 47 thousand parameters. It shows the best SSIM 0.919 on RANDOM250 (MIT Adobe FiveK) among small models and is thrice faster than previous models.Keywords: universal filter, image enhancement, neural networks, computer vision
Procedia PDF Downloads 1017440 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria
Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue
Abstract:
The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.Keywords: personal variables, students, perception, school security
Procedia PDF Downloads 777439 R-Killer: An Email-Based Ransomware Protection Tool
Authors: B. Lokuketagoda, M. Weerakoon, U. Madushan, A. N. Senaratne, K. Y. Abeywardena
Abstract:
Ransomware has become a common threat in past few years and the recent threat reports show an increase of growth in Ransomware infections. Researchers have identified different variants of Ransomware families since 2015. Lack of knowledge of the user about the threat is a major concern. Ransomware detection methodologies are still growing through the industry. Email is the easiest method to send Ransomware to its victims. Uninformed users tend to click on links and attachments without much consideration assuming the emails are genuine. As a solution to this in this paper R-Killer Ransomware detection tool is introduced. Tool can be integrated with existing email services. The core detection Engine (CDE) discussed in the paper focuses on separating suspicious samples from emails and handling them until a decision is made regarding the suspicious mail. It has the capability of preventing execution of identified ransomware processes. On the other hand, Sandboxing and URL analyzing system has the capability of communication with public threat intelligence services to gather known threat intelligence. The R-Killer has its own mechanism developed in its Proactive Monitoring System (PMS) which can monitor the processes created by downloaded email attachments and identify potential Ransomware activities. R-killer is capable of gathering threat intelligence without exposing the user’s data to public threat intelligence services, hence protecting the confidentiality of user data.Keywords: ransomware, deep learning, recurrent neural networks, email, core detection engine
Procedia PDF Downloads 2157438 Compare Hot Forming and Cold Forming in Rolling Process
Authors: Ali Moarrefzadeh
Abstract:
In metalworking, rolling is a metal forming process in which metal stock is passed through a pair of rolls. Rolling is classified according to the temperature of the metal rolled. If the temperature of the metal is above its recrystallization temperature, then the process is termed as hot rolling. If the temperature of the metal is below its recrystallization temperature, the process is termed as cold rolling. In terms of usage, hot rolling processes more tonnage than any other manufacturing process, and cold rolling processes the most tonnage out of all cold working processes. This article describes the use of advanced tubing inspection NDT methods for boiler and heat exchanger equipment in the petrochemical industry to supplement major turnaround inspections. The methods presented include remote field eddy current, magnetic flux leakage, internal rotary inspection system and eddy current.Keywords: hot forming, cold forming, metal, rolling, simulation
Procedia PDF Downloads 5307437 The Renewal of Chinese Urban Village on Cultural Ecology: Hubei Village as an Example
Authors: Shaojun Zheng, Lei Xu, Yunzi Wang
Abstract:
The main purpose of the research is to use the cultural ecology to analyze the renewal of Shenzhen urban village in the process of China's urbanization and to evaluate and guide the renewal, which will combine the society value and economic efficiency and activate urban villages. The urban village has a long history. There are also many old buildings, various residents, and a strong connection with the surrounding environment. Cultural ecology, which uses the knowledge of ecology to study culture, provides us a cultural perspective in the renewal. We take Hubei village in Shenzhen as our example. By using cultural ecology, we find a new way dealing with the relationship between culture and other factors. It helps us to give the buildings and space the culture meanings from different scales. It enables us to find a unique development pattern of urban village. After analyzing several famous cultural blocks cases, we find it is possible to connect the unique culture of urban village with the renovation of its buildings, community, and commerce. We propose the following strategies with specific target: 1. Building renovation: We repair and rebuild the origin buildings as little as possible, and retain the original urban space tissue as much as possible to keep the original sense of place and the cultural atmosphere. 2. Community upgrade: We reshape the village stream, fix the original function, add event which will activate people to complete the existing cultural circle 3. District commerce: We implant food and drink district, boutique commercial, and creative industries, to make full use of the historical atmosphere of the site to enhance the culture feelings For the renewal of a seemingly chaotic mixed urban village, it is important to break out from the conventional practices of building shopping malls or residential towers. Without creating those building landmarks, cultural ecology activates the urban village by exploiting its unique culture, which makes the old and new combine and becomes a new stream of energy, forming the new cultural, commercial and stylish landmark of the city.Keywords: cultural ecology, urban village, renewal, combination
Procedia PDF Downloads 3947436 Left Posterior Pericardiotomy in the Prevention of Post-Operative Atrial Fibrillation and Cardiac Tamponade: A Retrospective Study of 2118 Isolated Coronary Artery Bypass Graft Patients
Authors: Ayeshmanthe Rathnayake, Siew Goh, Carmel Fenton, Ashutosh Hardikar
Abstract:
Post-Operative Atrial Fibrillation (POAF) is the most frequent complication of cardiac surgery and is associated with reduced survival, increased rates of cognitive changes and cerebrovascular accident, heart failure, renal dysfunction, infection and length of stay, and hospital costs. Cardiac tamponade, although less common, carries high morbidity and mortality. Shed mediastinal blood in the pericardial space is a major source of intrapericardial oxidative stress and inflammation that triggers POAF. The utilisation of a left posterior pericardiotomy aims to shunt blood from the pericardium into the pleural space and have a role in the prevention of POAF as well as cardiac tamponade. 2118 patients had undergone isolated Coronary Artery Bypass Graft (CABG) at Royal Hobart Hospital from 2008-2021. They were divided into pericardiotomy vs control group. Patient baseline demographics, intraoperative data, and post-operative outcomes were reviewed retrospectively. Total incidence of new POAF and cardiac tamponade was 26.1% and 0.75%, respectively. Primary outcome of both the incidence of POAF(22.9% vs27.8%OR 0.77 p<0.05) and Cardiac Tamponade (0% vs 1.1% OR 0.85 p<0.05) were less in the pericardiotomy group.Increasing age, BMI, poor left ventricular function (EF <30%), and return to theatre were independent predictors of developing POAF. There were similar rates of return to theatre for bleeding however, no cases of tamponade in the pericardiotomy group. There were no complications attributable to left posterior pericardiotomy and the time added to the duration of surgery was minimal. Left posterior pericardiotomy is associated with a significant reduction in the incidence of POAFand cardiac tamponade and issafe and efficient.Keywords: cardiac surgery, pericardiotomy, post-operative atrial fibrillation, cardiac tamponade
Procedia PDF Downloads 917435 Impact of ICT on Efficient Services Providing to Users by LIPs in NCR India
Authors: Mani Gupta
Abstract:
This study deals with question: i) Whether ICT plays a positive role in improvement of efficiency of LIPs in terms of providing efficient services to the Users in LICs? and ii) Role of finance in terms of required technological logistics and infrastructure for usage of ICT based services to comfort in accessing databases by Users in LICs. This is based on primary data which are collected from various libraries and Information Centers of NCR Delhi. The survey conducted during December 15 and 31, 2010 on 496 respondents across 96 libraries and information centers in NCR Delhi through electronic data collection method. There is positive and emphatic relationship between ICT and its effect on improving the level of efficient services providing by LIPs in LICs in NCR Delhi. This is divided into 6 sub-headings and finally the outcomes.Keywords: modern globalization, linear correlation, efficient service, internet revolution, logistics
Procedia PDF Downloads 3577434 On a Negative Relation between Bacterial Taxis and Turing Pattern Formation
Authors: A. Elragig, S. Townley, H. Dreiwi
Abstract:
In this paper we introduce a bacteria-leukocyte model with bacteria chemotaxsis. We assume that bacteria develop a tactic defense mechanism as a response to Leukocyte phagocytosis. We explore the effect of this tactic motion on Turing space in two parameter spaces. A fine tuning of bacterial chemotaxis shows a significant effect on developing a non-uniform steady state.Keywords: chemotaxis-diffusion driven instability, bacterial chemotaxis, mathematical biology, ecology
Procedia PDF Downloads 3687433 Measurement of Radon Exhalation Rate, Natural Radioactivity, and Radiation Hazard Assessment in Soil Samples from the Surrounding Area of Kasimpur Thermal Power Plant Kasimpur (U. P.), India
Authors: Anil Sharma, Ajay Kumar Mahur, R. G. Sonkawade, A. C. Sharma, R. Prasad
Abstract:
In coal fired thermal power stations, large amount of fly ash is produced after burning of coal. Fly ash is spread and distributed in the surrounding area by air and may be deposited on the soil of the region surrounding the power plant. Coal contains increased levels of these radionuclides and fly ash may increase the radioactivity in the soil around the power plant. Radon atoms entering into the pore space from the mineral grain are transported by diffusion and advection through this space until they in turn decay or are released into the atmosphere. In the present study, Soil samples were collected from the region around a Kasimpur Thermal Power Plant, Kasimpur, Aligarh (U.P.). Radon activity, radon surface exhalation and mass exhalation rates were measured using “sealed can technique” using LR 115-type II nuclear track detectors. Radon activities vary from 92.9 to 556.8 Bq m-3 with mean value of 279.8 Bq m-3. Surface exhalation rates (EX) in these samples are found to vary from 33.4 to 200.2 mBq m-2 h-1 with an average value of 100.5 mBq m-2 h-1 whereas, Mass exhalation rates (EM) vary from 1.2 to 7.7 mBq kg-1 h-1 with an average value of 3.8 mBq kg-1 h-1. Activity concentrations of radionuclides were measured in these samples by using a low level NaI (Tl) based gamma ray spectrometer. Activity concentrations of 226Ra 232Th and 40K vary from 12 to 49 Bq kg-1, 24 to 49 Bq kg-1 and 135 to 546 Bq kg-1 with overall mean values of 30.3 Bq kg-1, 38.5 Bq kg-1 and 317.8 Bq kg-1, respectively. Radium equivalent activity has been found to vary from 80.0 to 143.7 Bq kg-1 with an average value of 109.7 Bq kg-1. Absorbed dose rate varies from 36.1 to 66.4 nGy h-1 with an average value of 50.4 nGy h-1 and corresponding outdoor annual effective dose varies from 0.044 to 0.081 mSv with an average value of 0.061 mSv. Values of external and internal hazard index Hex, Hin in this study vary from 0.21 to 0.38 and 0.27 to 0.50 with an average value of 0.29 and 0.37, Respectively. The results will be discussed in light of various factors.Keywords: natural radioactivity, radium equivalent activity, absorbed dose rate, gamma ray spectroscopy
Procedia PDF Downloads 3627432 A Strength Weaknesses Opportunities and Threats Analysis of Socialisation Externalisation Combination and Internalisation Modes in Knowledge Management Practice: A Systematic Review of Literature
Authors: Aderonke Olaitan Adesina
Abstract:
Background: The paradigm shift to knowledge, as the key to organizational innovation and competitive advantage, has made the management of knowledge resources in organizations a mandate. A key component of the knowledge management (KM) cycle is knowledge creation, which is researched to be the result of the interaction between explicit and tacit knowledge. An effective knowledge creation process requires the use of the right model. The SECI (Socialisation, Externalisation, Combination, and Internalisation) model, proposed in 1995, is attested to be a preferred model of choice for knowledge creation activities. The model has, however, been criticized by researchers, who raise their concern, especially about its sequential nature. Therefore, this paper reviews extant literature on the practical application of each mode of the SECI model, from 1995 to date, with a view to ascertaining the relevance in modern-day KM practice. The study will establish the trends of use, with regards to the location and industry of use, and the interconnectedness of the modes. The main research question is, for organizational knowledge creation activities, is the SECI model indeed linear and sequential? In other words, does the model need to be reviewed in today’s KM practice? The review will generate a compendium of the usage of the SECI modes and propose a framework of use, based on the strength weaknesses opportunities and threats (SWOT) findings of the study. Method: This study will employ the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) methodology to investigate the usage and SWOT of the modes, in order to ascertain the success, or otherwise, of the sequential application of the modes in practice from 1995 to 2019. To achieve the purpose, four databases will be explored to search for open access, peer-reviewed articles from 1995 to 2019. The year 1995 is chosen as the baseline because it was the year the first paper on the SECI model was published. The study will appraise relevant peer-reviewed articles under the search terms: SECI (or its synonym, knowledge creation theory), socialization, externalization, combination, and internalization in the title, abstract, or keywords list. This review will include only empirical studies of knowledge management initiatives in which the SECI model and its modes were used. Findings: It is expected that the study will highlight the practical relevance of each mode of the SECI model, the linearity or not of the model, the SWOT in each mode. Concluding Statement: Organisations can, from the analysis, determine the modes of emphasis for their knowledge creation activities. It is expected that the study will support decision making in the choice of the SECI model as a strategy for the management of organizational knowledge resources, and in appropriating the SECI model, or its remodeled version, as a theoretical framework in future KM research.Keywords: combination, externalisation, internalisation, knowledge management, SECI model, socialisation
Procedia PDF Downloads 3567431 Virtual Reference Service as a Space for Communication and Interaction: Providing Infrastructure for Learning in Times of Crisis at Uppsala University
Authors: Nadja Ylvestedt
Abstract:
Uppsala University Library is a geographically dispersed research library consisting of nine subject libraries located in different campus areas throughout the city of Uppsala. Despite the geographical dispersion, it is the library's ambition to be perceived as a cohesive library with consistently high service and quality. A key factor to being one cohesive library is the library's online services, especially the virtual reference service. E-mail, chat and phone are answered by a team of specially trained staff under the supervision of a team leader. When covid-19 hit, well-established routines and processes to provide an infrastructure for students and researchers at the university changed radically. The strong connection between services provided at the library locations as well as at the VRS has been one of the key components of the library’s success in providing patrons with the help they need. With radically minimized availability at the physical locations, the infrastructure was at risk of collapsing. Objectives:- The objective of this project has been to evaluate the consequences of the sudden change in the organization of the library. The focus of this evaluation is the library’s VRS as an important space for learning, interaction and communication between the library and the community when other traditional spaces were not available. The goal of this evaluation is to capture the lessons learned from providing infrastructure for learning and research in times of crisis both on a practical, user-centered level but also to stress the importance of leadership in ever-changing environments that supports and creates agile, flexible services and teams instead of rigid processes adhering to obsolete goals. Results:- Reduced availability at the physical library locations was one of the strategies to prevent the spread of the covid-19 virus. The library staff was encouraged to work from home, so student workers staffed the library’s physical locations during that time, leaving the VRS to be the only place where patrons could get expert help. The VRS had an increase of 65% of questions asked between spring term 2019 and spring term 2020. The VRS team had to navigate often complicated and fast-changing new routines depending on national guidelines. The VRS team has a strong emphasis on agility in their approach to the challenges and opportunities, with methods to evaluate decisions regularly with user experience in mind. Fast decision-making, collecting feedback, an open-minded approach to reviewing rules and processes with both a short-term and a long-term focus and providing a healthy work environment have been key factors in managing this crisis and learn from it. This was resting on a strong sense of ownership regarding the VRS, well-working communication tools and agile and active communication between team members, as well as between the team and the rest of the organization who served as a second-line support system to aid the VRS team. Moving forward, the VRS has become an important space for communication, interaction and provider of infrastructure, implementing new routines and more extensive availability due to the lessons learned during crisis. The evaluation shows that the virtual environment has become an important addition to the physical spaces, existing in its own right but always in connection with and in relationship with the library structure as a whole. Thereby showing that the basis of human interaction stays the same while its form morphs and adapts to changes, thus leaving the virtual environment as a space of communication and infrastructure with unique opportunities for outreach and the potential to become a staple in patron’s education and learning.Keywords: virtual reference service, leadership, digital infrastructure, research library
Procedia PDF Downloads 1717430 Contactless Attendance System along with Temperature Monitoring
Authors: Nalini C. Iyer, Shraddha H., Anagha B. Varahamurthy, Dikshith C. S., Ishwar G. Kubasad, Vinayak I. Karalatti, Pavan B. Mulimani
Abstract:
The current scenario of the pandemic due to COVID-19 has led to the awareness among the people to avoid unneces-sary contact in public places. There is a need to avoid contact with physical objects to stop the spreading of infection. The contactless feature has to be included in the systems in public places wherever possible. For example, attendance monitoring systems with fingerprint biometric can be replaced with a contactless feature. One more important protocol followed in the current situation is temperature monitoring and screening. The paper describes an attendance system with a contactless feature and temperature screening for the university. The system displays a QR code to scan, which redirects to the student login web page only if the location is valid (the location where the student scans the QR code should be the location of the display of the QR code). Once the student logs in, the temperature of the student is scanned by the contactless temperature sensor (mlx90614) with an error of 0.5°C. If the temperature falls in the range of the desired value (range of normal body temperature), then the attendance of the student is marked as present, stored in the database, and the door opens automatically. The attendance is marked as absent in the other case, alerted with the display of temperature, and the door remains closed. The door is automated with the help of a servomotor. To avoid the proxy, IR sensors are used to count the number of students in the classroom. The hardware system consisting of a contactless temperature sensor and IR sensor is implemented on the microcontroller, NodeMCU.Keywords: NodeMCU, IR sensor, attendance monitoring, contactless, temperature
Procedia PDF Downloads 1857429 Design and Development of an Optimal Fault Tolerant 3 Degree of Freedom Robotic Manipulator
Authors: Ramish, Farhan Khalique Awan
Abstract:
Kinematic redundancy within the manipulators presents extended dexterity and manipulability to the manipulators. Redundant serial robotic manipulators are very popular in industries due to its competencies to keep away from singularities during normal operation and fault tolerance because of failure of one or more joints. Such fault tolerant manipulators are extraordinarily beneficial in applications where human interference for repair and overhaul is both impossible or tough; like in case of robotic arms for space programs, nuclear applications and so on. The design of this sort of fault tolerant serial 3 DoF manipulator is presented in this paper. This work was the extension of the author’s previous work of designing the simple 3R serial manipulator. This work is the realization of the previous design with optimizing the link lengths for incorporating the feature of fault tolerance. Various measures have been followed by the researchers to quantify the fault tolerance of such redundant manipulators. The fault tolerance in this work has been described in terms of the worst-case measure of relative manipulability that is, in fact, a local measure of optimization that works properly for certain configuration of the manipulators. An optimum fault tolerant Jacobian matrix has been determined first based on prescribed null space properties after which the link parameters have been described to meet the given Jacobian matrix. A solid model of the manipulator was then developed to realize the mathematically rigorous design. Further work was executed on determining the dynamic properties of the fault tolerant design and simulations of the movement for various trajectories have been carried out to evaluate the joint torques. The mathematical model of the system was derived via the Euler-Lagrange approach after which the same has been tested using the RoboAnalyzer© software. The results have been quite in agreement. From the CAD model and dynamic simulation data, the manipulator was fabricated in the workshop and Advanced Machining lab of NED University of Engineering and Technology.Keywords: fault tolerant, Graham matrix, Jacobian, kinematics, Lagrange-Euler
Procedia PDF Downloads 2227428 Customization of Moodle Open Source LMS for Tanzania Secondary Schools’ Use
Authors: Ellen A. Kalinga
Abstract:
Moodle is an open source learning management system that enables creation of a powerful and flexible learning environment. Many organizations, especially learning institutions have customized Moodle open source LMS for their own use. In general open source LMSs are of great interest due to many advantages they offer in terms of cost, usage and freedom to customize to fit a particular context. Tanzania Secondary School e-Learning (TanSSe-L) system is the learning management system for Tanzania secondary schools. TanSSe-L system was developed using a number of methods, one of them being customization of Moodle Open Source LMS. This paper presents few areas on the way Moodle OS LMS was customized to produce a functional TanSSe-L system fitted to the requirements and specifications of Tanzania secondary schools’ context.Keywords: LMS, Moodle, e-learning, Tanzania, secondary school
Procedia PDF Downloads 3937427 Need Assessments of Midwives in Public's Health Center (Puskesmas) at Sukabumi Municipal, Province of Jawa Barat, Indonesia
Authors: Al Asyary, Meita Veruswati, Dian Ayyubi
Abstract:
Sukabumi municipal has highest rank for maternal mortality in Indonesia with 102 by 100,000 live birth with almost 80% of birth were not attended by skilled birth attendant (SBA). Although universal health coverage has been implemented, availability and sufficiency of SBA, such as midwife in this developing country, are problematic agenda for the quality of public healthcare as well as decreasing maternal mortality rate. This study aims to describe the equal distribution of midwives in Sukabumi municipal as support of government’s program named Millennium Development Goals (MDGs) that suppressed maternal mortality rate in Indonesia. We conducted an observational study with Workload Indicator of Staffing Need (WISN) analysis to present the dispersion of midwives by their activities and workloads in 37 Puskesmas. We also generated in-depth interview with several executive chief of health sections, including chief of health offices in Sukabumi municipal. It resulted inferentially that several activities in midwives’ program were differed at once of existing than needed condition ideally (ρ value = 0.002 < 0.05). Meanwhile, decision for midwives’ procurement and placement were held by un-systematically procedure such as based on where the midwife was staying, and it also progressed by neighborhood issue priorities. The absence of formal regulation in local government is a serious problem that indicated poor political commitment, while access to SBA shall be focused carefully.Keywords: developing country, health professional resources, health policy, need assessment
Procedia PDF Downloads 1687426 Municipal Solid Waste Management Characteristics and Management Challenges in Bauchi Metropolitan Area, Nigeria
Authors: Haruna Abdu Usman, Bashir Usman Mohammed, Mohammed Umar Jamil
Abstract:
Municipal solid waste management constitutes a serious problem bedeviling environmental protection agencies in many cities of developing countries. Most agencies do not collect the totality of the waste generated in their cities. This study presents the current solid waste management practices and problems in Bauchi metropolis, Bauchi state Nigeria. The general feature is characterized by inefficient, insufficient and irrational collection and improper disposal alternatives. The consequent environmental effects of these problems depict clogged city drains, uncollected heap of waste on road sides of residential areas, vacant plots and uncompleted buildings and highways. This contributes immensely to flooding in the city. The major challenges facing the state environmental protection agency includes; lack of collection and disposal points, technical and institutional arrangements, financial resources and general attitude of the serving public among others. The study suggested a comprehensive and integrated approach to the solid waste management which recognizes and incorporates the interventionist role of the state government, the private formal and informal waste management operators and the serving public.Keywords: municipal solid waste, bauchi metropolitan area, environmental protection agency, solid waste management, waste disposal
Procedia PDF Downloads 7437425 Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case
Authors: Patrick J. Kerpan, Ryan C. Koop, Margaret M. Walker, Chris P. Swan
Abstract:
The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS.Keywords: cloud computing, protocols, UDP multicast, virtualization
Procedia PDF Downloads 5907424 The Politics of Health Education: A Cultural Analysis of Tobacco Control Communication in India
Authors: Ajay Ivan
Abstract:
This paper focuses on the cultural politics of health-promotional and disease-preventive pedagogic practices in the context of the national tobacco control programme in India. Tobacco consumption is typically problematised as a paradox: tobacco poses objective health risks such as cancer and heart disease, but its production, sale and export contribute significantly to state revenue. A blanket ban on tobacco products, therefore, is infeasible though desirable. Instead, initiatives against tobacco use have prioritised awareness creation and behaviour change to reduce its demand. This paper argues that public health communication is not, as commonly assumed, an apolitical and neutral transmission of disease-preventive information. Drawing on Michel Foucault’s concept of governmentality, it examines such campaigns as techniques of disciplining people rather than coercing them to give up tobacco use, which would be both impractical and counter-productive. At the level of the population, these programmes constitute a security mechanism that reduces risks without eliminating them, so as to ensure an optimal level of public health without hampering the economy. Anti-tobacco pedagogy thus aligns with a contemporary paradigm of health that emphasises risk-assessment and lifestyle management as tools of governance, using pedagogic techniques to teach people how to be healthy. The paper analyses the pictorial health warnings on tobacco packets and anti-tobacco advertisements in movie theatres mandated by the state, along with awareness-creation messages circulated by anti-tobacco advocacy groups in India, to show how they discursively construct tobacco and its consumption as a health risk. Smoking is resignified from a pleasurable and sociable practice to a deadly addiction that jeopardises the health of those who smoke and those who passively inhale the smoke. While disseminating information about the health risks of tobacco, these initiatives employ emotional and affective techniques of persuasion to discipline tobacco users. They incite fear of death and of social ostracism to motivate behaviour change, complementing their appeals to reason. Tobacco is portrayed as a grave moral danger to the family and a detriment to the vitality of the nation, such that using it contradicts one’s duties as a parent or citizen. Awareness programmes reproduce prevailing societal assumptions about health and disease, normalcy and deviance, and proper and improper conduct. Pedagogy thus functions as an apparatus of public health governance, recruiting subjects as volunteers in their own regulation and aligning their personal goals and aspirations to the objectives of tobacco control. The paper links this calculated management of subjectivity and the self-responsibilisation of the pedagogic subject to a distinct mode of neoliberal civic governance in contemporary India. Health features prominently in this mode of governance that serves the biopolitical obligation of the state as laid down in Article 39 of the Constitution, which includes a duty to ensure the health of its citizens. Insofar as the health of individuals is concerned, the problem is how to balance this duty of the state with the fundamental right of the citizen to choose how to live. Public health pedagogy, by directing the citizen’s ‘free’ choice without unduly infringing upon it, offers a tactical solution.Keywords: public health communication, pedagogic power, tobacco control, neoliberal governance
Procedia PDF Downloads 837423 Impact of Electronic Guest Relationship Management (e-GRM) on Brand Loyalty: The Case of Croatian Hotels
Authors: Marina Laškarin, Vlado Galičić
Abstract:
Quick adoption of e-business and emerging influence of “Electronic Word of Mouth e-WOM” communication on guests made leading hotel brands successful examples of electronic guest relationship management. Main reasons behind such success are well established procedures in collection, analysis and usage of highly valuable data available on the Internet, generated through some form of e-GRM programme. E-GRM is more than just a technology solution. It’s a system which balance respective guest demands, hotel technological capabilities and organizational culture of employees, discharging the universal approach in guest relations “same for all”. The purpose of this research derives from the necessity of determining the importance of monitoring and applying e-WOM communication as one of the methods used in managing guest relations. This paper analyses and compares different hotelier’s opinions on e-WOM communication.Keywords: brand loyalty, e-WOM communication, GRM programmes, organizational culture
Procedia PDF Downloads 2907422 Influence of Information and Communication Technology on Dress Culture among Senior Secondary School Students in Ife East Local Government, Osun State, Nigeria
Authors: Idowu J. Diyaolu, Ebenezer O. Obayomi, Taiwo A. Bamidele
Abstract:
Information and Communication Technology (ICT) has been observed to have influence on the lifestyle of youths in general. Dressing styles, fashion consciousness and choice of role model are some of the areas of influence. The study was carried out to examine the perception and influence of ICT on the clothing culture of selected Senior Secondary School Students in Ife-East Local government area of Osun State, Nigeria. Two hundred Senior Secondary School Students from public and private schools were randomly selected. Data was collected using structured questionnaire. The result showed that 79.0% were computer literate, 64.5% have facebook account and 93.5% browse with phones. Based on their perception on the influence of ICT, 74.5% of the respondents agreed that frequent use of ICT has increased their level of fashion consciousness while 60.5% were motivated by the images and dressing pattern in magazines, on TV and the internet. Also, large proportions (60.5%) were influenced by the dressing styles of their friends on social media. Male students were significantly more engaged in ICT related activities than females (t = 1.29, P < 0.05), whereas there is no significant difference in the involvement in ICT activities between private and public school students (t = 0.325, P > 0.05). Since ICT has influence on dressing, appropriate dressing pattern should be encouraged on mass media.Keywords: dress culture, information and communication technology, fashion trend, role model
Procedia PDF Downloads 4637421 Importance of Secularism in Iraq
Authors: Azhin Hamad Ameen
Abstract:
This research paper explores the concept of secularism in Iraq, analyzing its historical development, contemporary manifestations, and potential future trajectories. Using a combination of qualitative and quantitative methods, including archival research, interviews with experts and practitioners, and surveys of public opinion, the study examines the complex and often contested relationship between religion, politics, and state power in Iraq. The research finds that secularism has played a significant role in shaping Iraq's political and social landscape over the past century, reflecting both the influence of Western modernity and the challenges of managing religious diversity in a multiethnic, multi-sectarian society. However, the study also reveals that secularism in Iraq is highly contested and fragmented, with competing visions and interpretations among different groups and factions. The research identifies several key factors that have contributed to this fragmentation, including the legacy of colonialism, sectarian conflicts, external interventions, and the rise of Islamist movements. Despite these challenges, the study suggests that secularism continues to hold important potential for promoting democratic governance, protecting human rights, and fostering social cohesion in Iraq. The research concludes by outlining several key policy recommendations for strengthening secularism in Iraq, including promoting interfaith dialogue and tolerance, enhancing public education and civic engagement, and supporting grassroots initiatives for social and political reform. Overall, this research contributes to our understanding of the complex dynamics of secularism in Iraq and highlights the urgent need for innovative and inclusive approaches to promoting democratic governance and social justice in the country.Keywords: secularism, Iraq, religion, politics, state power, historical development, contemporary manifestations, multiethnic society, multi-sectarian society, western modernity, religious diversity, fragmentation, colonialism, sectarian conflicts, external interventions, Islamist movements, democratic governance, human rights, social cohesion, interfaith dialogue, tolerance, public education, civic engagement, grassroots initiatives, social and political reform
Procedia PDF Downloads 717420 A Comprehensive Survey and Improvement to Existing Privacy Preserving Data Mining Techniques
Authors: Tosin Ige
Abstract:
Ethics must be a condition of the world, like logic. (Ludwig Wittgenstein, 1889-1951). As important as data mining is, it possess a significant threat to ethics, privacy, and legality, since data mining makes it difficult for an individual or consumer (in the case of a company) to control the accessibility and usage of his data. This research focuses on Current issues and the latest research and development on Privacy preserving data mining methods as at year 2022. It also discusses some advances in those techniques while at the same time highlighting and providing a new technique as a solution to an existing technique of privacy preserving data mining methods. This paper also bridges the wide gap between Data mining and the Web Application Programing Interface (web API), where research is urgently needed for an added layer of security in data mining while at the same time introducing a seamless and more efficient way of data mining.Keywords: data, privacy, data mining, association rule, privacy preserving, mining technique
Procedia PDF Downloads 173