Search results for: computer generated holograms
5360 Microbial Corrosion on Oil and Gas Facilities: A Case Study of Oil and Gas Facilities in the Niger-Delta
Authors: Frederick Otite Ighovojah
Abstract:
Corrosion in the oil and gas industries is one of the most common causes of failure. Such failure includes leaks in above-ground storage tanks (AGST). The involvement of microorganisms in the corrosion process in AGST systems is often ignored, and this outlines the need to investigate the effect of microbial corrosion in oil and gas facilities. This study's methodology comprised gathering generated water samples from a nearby AGST oil facility that was operating, which were then equally divided into two batch reactors, 1 and 2. Each batch reactor was filled with five prepared X60 coupons using sterilized forceps. To provide nutrients for the microorganisms in batch reactor 1 during the test period, 2g of NPK 15- 15-15 fertilizer was added on a weekly basis. To kill the microorganisms and significantly lower their concentration in the generated water, 5ml of dissolved ozone (a biocide) with a 0.5ppm concentration was added to batch reactor 2. The weight loss measurement (WLM) was used to evaluate for corrosion. Coupons were removed from each batch reactor, and weight loss was measured at every interval of 336 hrs for 2016 hrs. The overall results obtained indicated that coupons from the batch 1 reactor showed a higher corrosion rate and higher mass loss, and this was due to the metabolic production of an aggressive compound in the medium.Keywords: AGST, microbial corrosion, reactor, X60 steel
Procedia PDF Downloads 875359 Genesis of Entrepreneur Business Models in New Ventures
Authors: Arash Najmaei, Jo Rhodes, Peter Lok, Zahra Sadeghinejad
Abstract:
In this article, we endeavor to explore how a new business model comes into existence in the Australian cloud-computing eco-system. Findings from multiple case study methodology reveal that to develop a business model new ventures adopt a three-phase approach. In the first phase, labelled as business model ideation (BMID) various ideas for a viable business model are generated from both internal and external networks of the entrepreneurial team and the most viable one is chosen. Strategic consensus and commitment are generated in the second phase. This phase is a business modelling strategic action phase. We labelled this phase as business model strategic commitment (BMSC) because through commitment and the subsequent actions of executives resources are pooled, coordinated and allocated to the business model. Three complementary sets of resources shape the business model: managerial (MnRs), marketing (MRs) and technological resources (TRs). The third phase is the market-test phase where the business model is reified through the delivery of the intended value to customers and conversion of revenue into profit. We labelled this phase business model actualization (BMAC). Theoretical and managerial implications of these findings will be discussed and several directions for future research will be illuminated.Keywords: entrepreneur business model, high-tech venture, resources, conversion of revenue
Procedia PDF Downloads 4505358 3 Dimensional (3D) Assesment of Hippocampus in Alzheimer’s Disease
Authors: Mehmet Bulent Ozdemir, Sultan Çagirici, Sahika Pinar Akyer, Fikri Turk
Abstract:
Neuroanatomical appearance can be correlated with clinical or other characteristics of illness. With the introduction of diagnostic imaging machines, producing 3D images of anatomic structures, calculating the correlation between subjects and pattern of the structures have become possible. The aim of this study is to examine the 3D structure of hippocampus in cases with Alzheimer disease in different dementia severity. For this purpose, 62 female and 38 male- 68 patients’s (age range between 52 and 88) MR scanning were imported to the computer. 3D model of each right and left hippocampus were developed by a computer aided propramme-Surf Driver 3.5. Every reconstruction was taken by the same investigator. There were different apperance of hippocampus from normal to abnormal. In conclusion, These results might improve the understanding of the correlation between the morphological changes in hippocampus and clinical staging in Alzheimer disease.Keywords: Alzheimer disease, hippocampus, computer-assisted anatomy, 3D
Procedia PDF Downloads 4865357 Bright–Dark Pulses in Nonlinear Polarisation Rotation Based Erbium-Doped Fiber Laser
Authors: R. Z. R. R. Rosdin, N. M. Ali, S. W. Harun, H. Arof
Abstract:
We have experimentally demonstrated bright-dark pulses in a nonlinear polarization rotation (NPR) based mode-locked Erbium-doped fiber laser (EDFL) with a long cavity configuration. Bright–dark pulses could be achieved when the laser works in the passively mode-locking regime and the net group velocity dispersion is quite anomalous. The EDFL starts to generate a bright pulse train with degenerated dark pulse at the mode-locking threshold pump power of 35.09 mW by manipulating the polarization states of the laser oscillation modes using a polarization controller (PC). A split bright–dark pulse is generated when further increasing the pump power up to 37.95 mW. Stable bright pulses with no obvious evidence of a dark pulse can also be generated when further adjusting PC and increasing the pump power up to 52.19 mW. At higher pump power of 54.96 mW, a new form of bright-dark pulse emission was successfully identified with the repetition rate of 29 kHz. The bright and dark pulses have a duration of 795.5 ns and 640 ns, respectively.Keywords: Erbium-doped fiber laser, nonlinear polarization rotation, bright-dark pulse, photonic
Procedia PDF Downloads 5295356 An Anthropometric and Postural Risk Assessment of Students in Computer Laboratories of a State University
Authors: Sarah Louise Cruz, Jemille Venturina
Abstract:
Ergonomics considers the capabilities and limitations of a person as they interact with tools, equipment, facilities and tasks in their work environment. Workplace is one example of physical work environment, be it a workbench or a desk. In school laboratories, sitting is the most common working posture of the students. Students maintain static sitting posture as they perform different computer-aided activities. The College of Engineering and College of Information and Communication Technology of a State University consist of twenty-two computer laboratories. Normally, students aren’t usually aware of the importance of sustaining proper sitting posture while doing their long hour computer laboratory activities. The study evaluates the perceived discomfort and working postures of students as they are exposed on current workplace design of computer laboratories. The current study utilizes Rapid Upper Limb Assessment (RULA), Body Discomfort Chart using Borg’s CR-10 Scale Rating and Quick Exposure Checklist in order to assess the posture and the current working condition. The result of the study may possibly minimize the body discomfort experienced by the students. The researchers redesign the individual workstations which includes working desk, sitting stool and other workplace design components. Also, the economic variability of each alternative was considered given that the study focused on improvement of facilities of a state university.Keywords: computer workstation, ergonomics, posture, students, workplace
Procedia PDF Downloads 3175355 A Study on the Impacts of Computer Aided Design on the Architectural Design Process
Authors: Halleh Nejadriahi, Kamyar Arab
Abstract:
Computer-aided design (CAD) tools have been extensively used by the architects for the several decades. It has evolved from being a simple drafting tool to being an intelligent architectural software and a powerful means of communication for architects. CAD plays an essential role in the profession of architecture and is a basic tool for any architectural firm. It is not possible for an architectural firm to compete without taking the advantage of computer software, due to the high demand and competition in the architectural industry. The aim of this study is to evaluate the impacts of CAD on the architectural design process from conceptual level to final product, particularly in architectural practice. It examines the range of benefits of integrating CAD into the industry and discusses the possible defects limiting the architects. Method of this study is qualitatively based on data collected from the professionals’ perspective. The identified benefits and limitations of CAD on the architectural design process will raise the awareness of professionals on the potentials of CAD and proper utilization of that in the industry, which would result in a higher productivity along with a better quality in the architectural offices.Keywords: architecture, architectural practice, computer aided design (CAD), design process
Procedia PDF Downloads 3655354 Assessment of Air Pollution Impacts On Population Health in Béjaia City
Authors: Benaissa Fatima, Alkama Rezak, Annesi-Maesano Isabella
Abstract:
To assess the health impact of the air pollution on the population of Béjaia, we carried out a descriptive epidemiologic inquiry near the medical establishments of three areas. From the registers of hospital admissions, we collected data on the hospital mortality and admissions relating to the various cardiorespiratory pathologies generated by this type of pollution. In parallel, data on the automobile fleet of Bejaia and other measurements were exploited to show that the concentrations of the pollutants are strongly correlated with the concentration the urban traffic. This study revealed that the whole of the population is touched, but the sensitivity to pollution can show variations according to the age, the sex and the place of residence. So the under population of the town of Bejaia marked the most raised death and morbidity rates, followed that of Kherrata. Weak rates are recorded for under rural population of Feraoun. This approach enables us to conclude that the population of Béjaia could not escape the urban pollution generated by her old automobile fleet. To install a monitoring and measuring site of the air pollution in this city could provide a beneficial tool to protect its inhabitants by them informing on quality from the air that they breathe and measurements to follow to minimize the impacts on their health and by alerting the authorities during the critical situations.Keywords: air, urban pollution, health, impacts
Procedia PDF Downloads 3645353 A Comparative Study of Virus Detection Techniques
Authors: Sulaiman Al amro, Ali Alkhalifah
Abstract:
The growing number of computer viruses and the detection of zero day malware have been the concern for security researchers for a large period of time. Existing antivirus products (AVs) rely on detecting virus signatures which do not provide a full solution to the problems associated with these viruses. The use of logic formulae to model the behaviour of viruses is one of the most encouraging recent developments in virus research, which provides alternatives to classic virus detection methods. In this paper, we proposed a comparative study about different virus detection techniques. This paper provides the advantages and drawbacks of different detection techniques. Different techniques will be used in this paper to provide a discussion about what technique is more effective to detect computer viruses.Keywords: computer viruses, virus detection, signature-based, behaviour-based, heuristic-based
Procedia PDF Downloads 4895352 Expression of Micro RNAs in the Liver Tissue of Mice Generated through in vitro Embryo Culture and Embryo Transfer
Authors: Göksel Doğan, Murat Öztürk, Didar Tuğçe Karakulak, Mehmet Nurullah Orman, Nicolas Sylvius, Matthew Blades, Mustafa Sandıkçı, Cengiz Ünsal, Mehtap Kılıç Eren, Funda Kıral, Levent Karagenç
Abstract:
Assisted reproduction is associated with impaired glucose metabolism in adulthood. miRNAs are key regulators of glucose metabolism. Whether embryo culture and/or transfer alters the expression of miRNAs and to what extent this process affects glucose metabolism remain largely unknown. The purpose of the present study was to examine the expression of miRNAs in the liver in mice obtained by the transfer of blastocysts. The study was comprised of an experimental (EG) and a control group (CG). EG was generated by embryo transfer to pseudo-pregnant females. Mice born from naturally ovulating females were used as the CG. Differential expression of miRNAs, blood glucose, plasma insulin, liver glycogen, and activities of some of the rate-limiting enzymes involved in glucose metabolism were determined at ten weeks of age. Blood glucose, plasma insulin, and glycogen concentrations were similar between the groups in both sexes. Activities of enzymes were similar among females. EG males had significantly less glucokinase and phosphofructokinase activity compared to CG males. None of the miRNAs were differentially expressed in males. On the other hand, miR-143-3p expression was upregulated in EG females. Expression of none of the genes targeted by miR143-3p differed between the groups. These results demonstrate that miR143-3p, a novel regulator of type 2 diabetes, is upregulated in mice generated by assisted reproduction in a sexually-dimorphic manner with no apparent effect on glucose and insulin levels at ten weeks of age. It remains to be determined if this process is associated with impaired glucose homeostasis in the long term.Keywords: assisted reproduction, blastocyst, embryo culture, glucose metabolism, miR143-3p, oxygen
Procedia PDF Downloads 1905351 2D and 3D Unsteady Simulation of the Heat Transfer in the Sample during Heat Treatment by Moving Heat Source
Authors: Zdeněk Veselý, Milan Honner, Jiří Mach
Abstract:
The aim of the performed work is to establish the 2D and 3D model of direct unsteady task of sample heat treatment by moving source employing computer model on the basis of finite element method. The complex boundary condition on heat loaded sample surface is the essential feature of the task. Computer model describes heat treatment of the sample during heat source movement over the sample surface. It is started from the 2D task of sample cross section as a basic model. Possibilities of extension from 2D to 3D task are discussed. The effect of the addition of third model dimension on the temperature distribution in the sample is showed. Comparison of various model parameters on the sample temperatures is observed. Influence of heat source motion on the depth of material heat treatment is shown for several velocities of the movement. Presented computer model is prepared for the utilization in laser treatment of machine parts.Keywords: computer simulation, unsteady model, heat treatment, complex boundary condition, moving heat source
Procedia PDF Downloads 4005350 Information Technology Approaches to Literature Text Analysis
Authors: Ayse Tarhan, Mustafa Ilkan, Mohammad Karimzadeh
Abstract:
Science was considered as part of philosophy in ancient Greece. By the nineteenth century, it was understood that philosophy was very inclusive and that social and human sciences such as literature, history, and psychology should be separated and perceived as an autonomous branch of science. The computer was also first seen as a tool of mathematical science. Over time, computer science has grown by encompassing every area in which technology exists, and its growth compelled the division of computer science into different disciplines, just as philosophy had been divided into different branches of science. Now there is almost no branch of science in which computers are not used. One of the newer autonomous disciplines of computer science is digital humanities, and one of the areas of digital humanities is literature. The material of literature is words, and thanks to the software tools created using computer programming languages, data that a literature researcher would need months to complete, can be achieved quickly and objectively. In this article, three different tools that literary researchers can use in their work will be introduced. These studies were created with the computer programming languages Python and R and brought to the world of literature. The purpose of introducing the aforementioned studies is to set an example for the development of special tools or programs on Ottoman language and literature in the future and to support such initiatives. The first example to be introduced is the Stylometry tool developed with the R language. The other is The Metrical Tool, which is used to measure data in poems and was developed with Python. The latest literature analysis tool in this article is Voyant Tools, which is a multifunctional and easy-to-use tool.Keywords: DH, literature, information technologies, stylometry, the metrical tool, voyant tools
Procedia PDF Downloads 1565349 Management and Evaluation of Developing Medical Device Software in Compliance with Rules
Authors: Arash Sepehri bonab
Abstract:
One of the regions of critical development in medical devices has been the part of the software - as an indispensable component of a therapeutic device, as a standalone device, and more as of late, as applications on portable gadgets. The chance related to a breakdown of the standalone computer program utilized inside healthcare is in itself not a model for its capability or not as a medical device. It is, subsequently, fundamental to clarify a few criteria for the capability of a stand-alone computer program as a medical device. The number of computer program items and therapeutic apps is persistently expanding and so as well is used in wellbeing education (e. g., in clinics and doctors' surgeries) for determination and treatment. Within the last decade, the use of information innovation in healthcare has taken a developing part. In reality, the appropriation of an expanding number of computer devices has driven several benefits related to the method of quiet care and permitted simpler get to social and health care assets. At the same time, this drift gave rise to modern challenges related to the usage of these modern innovations. The program utilized in healthcare can be classified as therapeutic gadgets depending on the way they are utilized and on their useful characteristics. In the event that they are classified as therapeutic gadgets, they must fulfill particular directions. The point of this work is to show a computer program improvement system that can permit the generation of secure and tall, quality restorative gadget computer programs and to highlight the correspondence between each program advancement stage and the fitting standard and/or regulation.Keywords: medical devices, regulation, software, development, healthcare
Procedia PDF Downloads 1125348 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 1005347 An Optimized Approach to Generate the Possible States of Football Tournaments Final Table
Authors: Mouslem Damkhi
Abstract:
This paper focuses on possible states of a football tournament final table according to the number of participating teams. Each team holds a position in the table with which it is possible to determine the highest and lowest points for that team. This paper proposes an optimized search space based on the minimum and maximum number of points which can be gained by each team to produce and enumerate the possible states for a football tournament final table. The proposed search space minimizes producing the invalid states which cannot occur during a football tournament. The generated states are filtered by a validity checking algorithm which seeks to reach a tournament graph based on a generated state. Thus, the algorithm provides a way to determine which team’s wins, draws and loses values guarantee a particular table position. The paper also presents and discusses the experimental results of the approach on the tournaments with up to eight teams. Comparing with a blind search algorithm, our proposed approach reduces generating the invalid states up to 99.99%, which results in a considerable optimization in term of the execution time.Keywords: combinatorics, enumeration, graph, tournament
Procedia PDF Downloads 1275346 Motivation and Criteria as Determinant Factors in Accepting New Talents on User-Generated Content (UGC): Youtube as a Platform
Authors: Shereen Nadira Binti Jasney, Mohd Syuhaidi Bin Abu Bakar, Hafizah Binti Rosli
Abstract:
This quantitative study explored factors that motivate the public to use YouTube; and the elements of criteria, which the public are looking for to accept new talents on User-Generated Content (UGC). There are mass inputs on the net but the publics are still being very selective in accepting new talents. Thus, it is important to identify determinant factors that contribute to the acceptance of new talents on UGC. A total number of 236 respondents have participated in this study using Simple Random Sampling and they were analyzed with descriptive analysis. The findings of this paper advocate that tremendous expansion; and diversification YouTube music offers are main factors that motivated public viewers in using YouTube on accepting new talents. It is also found that by being relatable and concurrently providing interesting contents, having the artist name and song title in the YouTube talent’s title video and the number of views and likes of the video are some of the criteria that the public are looking for in accepting new talents on the UGC. This paper introduces YouTube as a mean of discovering new talents in the music industry where the public, especially the younger generations, whom are actively engaged with current digital landscape that they’ve been presently silver-plated.Keywords: motivation, criteria, new talents, UGC, YouTube
Procedia PDF Downloads 2915345 Determination of the Cooling Rate Dependency of High Entropy Alloys Using a High-Temperature Drop-on-Demand Droplet Generator
Authors: Saeedeh Imani Moqadam, Ilya Bobrov, Jérémy Epp, Nils Ellendt, Lutz Mädler
Abstract:
High entropy alloys (HEAs), having adjustable properties and enhanced stability compared with intermetallic compounds, are solid solution alloys that contain more than five principal elements with almost equal atomic percentage. The concept of producing such alloys pave the way for developing advanced materials with unique properties. However, the synthesis of such alloys may require advanced processes with high cooling rates depending on which alloy elements are used. In this study, the micro spheres of different diameters of HEAs were generated via a drop-on-demand droplet generator and subsequently solidified during free-fall in an argon atmosphere. Such droplet generators can generate individual droplets with high reproducibility regarding droplet diameter, trajectory and cooling while avoiding any interparticle momentum or thermal coupling. Metallography as well as X-ray diffraction investigations for each diameter of the generated metallic droplets where then carried out to obtain information about the microstructural state. To calculate the cooling rate of the droplets, a droplet cooling model was developed and validated using model alloys such as CuSn%6 and AlCu%4.5 for which a correlation of secondary dendrite arm spacing (SDAS) and cooling rate is well-known. Droplets were generated from these alloys and their SDAS was determined using quantitative metallography. The cooling rate was then determined from the SDAS and used to validate the cooling rates obtained from the droplet cooling model. The application of that model on the HEA then leads to the cooling rate dependency and hence to the identification of process windows for the synthesis of these alloys. These process windows were then compared with cooling rates obtained in processes such as powder production, spray forming, selective laser melting and casting to predict if a synthesis is possible with these processes.Keywords: cooling rate, drop-on-demand, high entropy alloys, microstructure, single droplet generation, X-ray Diffractometry
Procedia PDF Downloads 2155344 The Use of Computer-Aided Design in Small Contractors in a Local Area of Korea
Authors: Myunghoun Jang
Abstract:
A survey of small-size contractors in Jeju was conducted to investigate college graduate's computer-aided design (CAD) competence. Most of small-size contractors use CAD software to review and update drawings submitted from an architect. This research analyzed the curriculum of the architectural engineering in several national universities. The CAD classes have 4 or 6 hours per week and use AutoCAD primarily. This paper proposes that a CAD class needs 6 hours per week, 2D drawing is the main theme in the curriculum, and exercises to make 3D models are also included in the CAD class. An improved method, for example Internet cafe and real time feedbacks using smartphones, to evaluate the reports and exercise results is necessary.Keywords: CAD (Computer Aided Design), CAD education, education improvement, small-size contractor
Procedia PDF Downloads 2705343 The Integration of Patient Health Record Generated from Wearable and Internet of Things Devices into Health Information Exchanges
Authors: Dalvin D. Hill, Hector M. Castro Garcia
Abstract:
A growing number of individuals utilize wearable devices on a daily basis. The usage and functionality of these wearable devices vary from user to user. One popular usage of said devices is to track health-related activities that are typically stored on a device’s memory or uploaded to an account in the cloud; based on the current trend, the data accumulated from the wearable device are stored in a standalone location. In many of these cases, this health related datum is not a factor when considering the holistic view of a user’s health lifestyle or record. This health-related data generated from wearable and Internet of Things (IoT) devices can serve as empirical information to a medical provider, as the standalone data can add value to the holistic health record of a patient. This paper proposes a solution to incorporate the data gathered from these wearable and IoT devices, with that a patient’s Personal Health Record (PHR) stored within the confines of a Health Information Exchange (HIE).Keywords: electronic health record, health information exchanges, internet of things, personal health records, wearable devices, wearables
Procedia PDF Downloads 1335342 Computer-Aided Teaching of Transformers for Undergraduates
Authors: Rajesh Kumar, Roopali Dogra, Puneet Aggarwal
Abstract:
In the era of technological advancement, use of computer technology has become inevitable. Hence it has become the need of the hour to integrate software methods in engineering curriculum as a part to boost pedagogy techniques. Simulations software is a great help to graduates of disciplines such as electrical engineering. Since electrical engineering deals with high voltages and heavy instruments, extra care must be taken while operating with them. The viable solution would be to have appropriate control. The appropriate control could be well designed if engineers have knowledge of kind of waveforms associated with the system. Though these waveforms can be plotted manually, but it consumes a lot of time. Hence aid of simulation helps to understand steady state of system and resulting in better performance. In this paper computer, aided teaching of transformer is carried out using MATLAB/Simulink. The test carried out on a transformer includes open circuit test and short circuit respectively. The respective parameters of transformer are then calculated using the values obtained from open circuit and short circuit test respectively using Simulink.Keywords: computer aided teaching, open circuit test, short circuit test, simulink, transformer
Procedia PDF Downloads 3835341 Permanent Magnet Generator – One Phase Regime Operation
Authors: Pawel Pistelok
Abstract:
The article presents the concept of an electromagnetic circuit of a 3-phase surface-mounted permanent magnet generator designed for a single phase operation. A cross section of electromagnetic circuit and a field-circuit model of generator used for computations are shown. The paper presents comparative analysis of simulation results obtained for two different versions of generator regarding construction of armature winding. In the first version of generator the voltages generated in each of three winding phases have different rms values (different number of turns in each of phases), three winding phases are connected in series and one phase load is connected to the two output terminals of generator. The second version of generator is very similar, i.e. three winding phases are connected in series and one phase load is powered by generator, but in this version the voltages generated in each of winding phases have exactly the same rms values (the same number of turns in each of phases). The time waveforms of voltages, currents and electromagnetic torques in the airgaps of two machine versions for rated power are shown.Keywords: permanent magnet generator, permanent magnets, synchronous generator, vibration, course of torque, single phase work, unsymmetrical operation point, serial connection of winding phase
Procedia PDF Downloads 6985340 The Essence and Attribution of Intellectual Property Rights Generated in the Digitization of Intangible Cultural Heritage
Authors: Jiarong Zhang
Abstract:
Digitizing intangible cultural heritage is a complex and comprehensive process from which sorts of intellectual property rights may be generated. Digitizing may be a repacking process of cultural heritage, which creates copyrights; recording folk songs and indigenous performances can create 'related rights'. At the same time, digitizing intangible cultural heritage may infringe the intellectual property rights of others unintentionally. Recording religious rituals of indigenous communities without authorization can violate the moral right of the ceremony participants of the community; making digital copies of rock paintings may infringe the right of reproduction. In addition, several parties are involved in the digitization process: indigenous peoples, museums, and archives can be holders of cultural heritage; companies and research institutions can be technology providers; internet platforms can be promoters and sellers; the public and groups above can be beneficiaries. When diverse intellectual property rights versus various parties, problems and disputes can arise easily. What are the types of intellectual property rights generated in the digitization process? What is the essence of these rights? Who should these rights belong to? How to use intellectual property to protect the digitalization of cultural heritage? How to avoid infringing on the intellectual property rights of others? While the digitization has been regarded as an effective approach to preserve intangible cultural heritage, related intellectual property issues have not received the attention and full discussion. Thus, parties involving in the digitization process may face intellectual property infringement lawsuits. The article will explore those problems from the intersection perspective of intellectual property law and cultural heritage. From a comparative approach, the paper will analysis related legal documents and cases, and shed some lights of those questions listed. The findings show, although there are no intellectual property laws targeting the cultural heritage in most countries, the involved stakeholders can seek protection from existing intellectual property rights following the suggestions of the article. The research will contribute to the digitization of intangible cultural heritage from a legal and policy aspect.Keywords: copyright, digitization, intangible cultural heritage, intellectual property, Internet platforms
Procedia PDF Downloads 1555339 The Impact of Blended Learning on Developing the students' Writing Skills and the Perception of Instructors and Students: Hawassa University in Focus
Authors: Mulu G. Gencha, Gebremedhin Simon, Menna Olango
Abstract:
This study was conducted at Hawassa University (HwU) in the Southern Nation Nationalities Peoples Regional State (SNNPRS) of Ethiopia. The prime concern of this study was to examine the writing performances of experimental and control group students, perception of experimental group students, and subject instructors. The course was blended learning (BL). Blended learning is a hybrid of classroom and on-line learning. Participants were eighty students from the School of Computer Science. Forty students attended the BL delivery involved using Face-to-Face (FTF) and campus-based online instruction. All instructors, fifty, of School of Language and Communication Studies along with 10 FGD members participated in the study. The experimental group went to the computer lab two times a week for four months, March-June, 2012, using the local area network (LAN), and software (MOODLE) writing program. On the other hand, the control group, forty students, took the FTF writing course five times a week for four months in similar academic calendar. The three instruments, the attitude questionnaire, tests and FGD were designed to identify views of students, instructors, and FGD participants on BL. At the end of the study, students’ final course scores were evaluated. Data were analyzed using independent samples t-tests. A statistically, significant difference was found between the FTF and BL (p<0.05). The analysis showed that the BL group was more successful than the conventional group. Besides, both instructors and students had positive attitude towards BL. The final section of the thesis showed the potential benefits and challenges, considering the pedagogical implications for the BL, and recommended possible avenues for further works.Keywords: blended learning, computer attitudes, computer usefulness, computer liking, computer confidence, computer phobia
Procedia PDF Downloads 4185338 Computer Self-Efficacy, Study Behaviour and Use of Electronic Information Resources in Selected Polytechnics in Ogun State, Nigeria
Authors: Fredrick Olatunji Ajegbomogun, Bello Modinat Morenikeji, Okorie Nancy Chituru
Abstract:
Electronic information resources are highly relevant to students' academic and research needs but are grossly underutilized, despite the institutional commitment to making them available. The under-utilisation of these resources could be attributed to a low level of study behaviour coupled with a low level of computer self-efficacy. This study assessed computer self-efficacy, study behaviour, and the use of electronic information resources by students in selected polytechnics in Ogun State. A simple random sampling technique using Krejcie and Morgan's (1970) Table was used to select 370 respondents for the study. A structured questionnaire was used to collect data on respondents. Data were analysed using frequency counts, percentages, mean, standard deviation, Pearson Product Moment Correlation (PPMC) and multiple regression analysis. Results reveal that the internet (= 1.94), YouTube (= 1.74), and search engines (= 1.72) were the common information resources available to the students, while the Internet (= 4.22) is the most utilized resource. Major reasons for using electronic information resources were to source materials and information (= 3.30), for research (= 3.25), and to augment class notes (= 2.90). The majority (91.0%) of the respondents have a high level of computer self-efficacy in the use of electronic information resources through selecting from screen menus (= 3.12), using data files ( = 3.10), and efficient use of computers (= 3.06). Good preparation for tests (= 3.27), examinations (= 3.26), and organization of tutorials (= 3.11) are the common study behaviours of the respondents. Overall, 93.8% have good study behaviour. Inadequate computer facilities to access information (= 3.23), and poor internet access (= 2.87) were the major challenges confronting students’ use of electronic information resources. According to the PPMC results, study behavior (r = 0.280) and computer self-efficacy (r = 0.304) have significant (p 0.05) relationships with the use of electronic information resources. Regression results reveal that self-efficacy (=0.214) and study behavior (=0.122) positively (p 0.05) influenced students' use of electronic information resources. The study concluded that students' use of electronic information resources depends on the purpose, their computer self-efficacy, and their study behaviour. Therefore, the study recommended that the management should encourage the students to improve their study habits and computer skills, as this will enhance their continuous and more effective utilization of electronic information resources.Keywords: computer self-efficacy, study behaviour, electronic information resources, polytechnics, Nigeria
Procedia PDF Downloads 1295337 Development of a Computer Vision System for the Blind and Visually Impaired Person
Authors: Rodrigo C. Belleza, Jr., Roselyn A. Maaño, Karl Patrick E. Camota, Darwin Kim Q. Bulawan
Abstract:
Eyes are an essential and conspicuous organ of the human body. Human eyes are outward and inward portals of the body that allows to see the outside world and provides glimpses into ones inner thoughts and feelings. Inevitable blindness and visual impairments may result from eye-related disease, trauma, or congenital or degenerative conditions that cannot be corrected by conventional means. The study emphasizes innovative tools that will serve as an aid to the blind and visually impaired (VI) individuals. The researchers fabricated a prototype that utilizes the Microsoft Kinect for Windows and Arduino microcontroller board. The prototype facilitates advanced gesture recognition, voice recognition, obstacle detection and indoor environment navigation. Open Computer Vision (OpenCV) performs image analysis, and gesture tracking to transform Kinect data to the desired output. A computer vision technology device provides greater accessibility for those with vision impairments.Keywords: algorithms, blind, computer vision, embedded systems, image analysis
Procedia PDF Downloads 3225336 A New Computational Tool for Noise Prediction of Rotating Surfaces (FACT)
Authors: Ana Vieira, Fernando Lau, João Pedro Mortágua, Luís Cruz, Rui Santos
Abstract:
The air transport impact on environment is more than ever a limitative obstacle to the aeronautical industry continuous growth. Over the last decades, considerable effort has been carried out in order to obtain quieter aircraft solutions, whether by changing the original design or investigating more silent maneuvers. The noise propagated by rotating surfaces is one of the most important sources of annoyance, being present in most aerial vehicles. Bearing this is mind, CEIIA developed a new computational chain for noise prediction with in-house software tools to obtain solutions in relatively short time without using excessive computer resources. This work is based on the new acoustic tool, which aims to predict the rotor noise generated during steady and maneuvering flight, making use of the flexibility of the C language and the advantages of GPU programming in terms of velocity. The acoustic tool is based in the Formulation 1A of Farassat, capable of predicting two important types of noise: the loading and thickness noise. The present work describes the most important features of the acoustic tool, presenting its most relevant results and framework analyses for helicopters and UAV quadrotors.Keywords: rotor noise, acoustic tool, GPU Programming, UAV noise
Procedia PDF Downloads 4045335 Language Use in Computer-Mediated Communication and Users’ Social Identity
Authors: Miramar Damanhouri
Abstract:
This study examines the relationship between language use in computer-mediated communication and the social identity of the user. The data were collected by surveying 298 Saudi bilingual speakers who are familiar with Arabizi, a blend of Latin characters and Arabic numerals to transliterate Arabic sounds, and then analyzed quantitatively by running tests for statistical confidence in order to determine differences in perceptions between young adults (ages 15-25 years) and middle-aged adults (ages 26-50 years). According to the findings of this study, English is the dominant language among most of the young adults surveyed, and when they do use Arabic, they use Arabizi because of its flexibility, compatibility with modern technology, and its acceptance among people of their age and sociocultural backgrounds. On the other hand, most middle-aged adults surveyed here tend to use Arabic, as they believe that they should show their loyalty to their origin. The results of the study demonstrate a mutual relationship between language use in computer-mediated communication and the user’s social identity, as language is used both to reflect and construct that identity.Keywords: Arabizi, computer mediated communication, digital communication, language use
Procedia PDF Downloads 1385334 Design of an Acoustic System for Small-Scale Power Plants
Authors: Mohammadreza Judaki, Hosein Mohammadnezhad Shourkaei
Abstract:
Usually, noise generated by industrial units, is a pollution and disturbs people and causes problems for human health and sometimes these units will be closed because they cannot eliminate this pollution. Small-scale power plants usually are built close to residential areas, and noise generated by these power plants is an important factor in choosing their location and their design. Materials used to reduce noise are studied by measuring their absorption and reflection index numerically and experimentally. We can use MIKI model (Yasushi Miki, 1990) to simulate absorption index by using software like Ansys or Soundflow and compare calculation results with experimental simulation data. We consider high frequency sounds of power plant engines octave band diagram because dB value of high frequency noise is more noticeable for human ears. To prove this, in this study we first will study calculating octave band of engines exhausts and then we will study acoustic behavior of materials that we will use in high frequencies and this will give us our optimum noise reduction plan.Keywords: acoustic materials, eliminating engine noise, octave level diagram, power plant noise
Procedia PDF Downloads 1475333 Mechanical Prosthesis Controlled by Brain-Computer Interface
Authors: Tianyu Cao, KIRA (Ruizhi Zhao)
Abstract:
The purpose of our research is to study the possibility of people with physical disabilities manipulating mechanical prostheses through brain-computer interface (BCI) technology. The brain-machine interface (BCI) of the neural prosthesis records signals from neurons and uses mathematical modeling to decode them, converting desired movements into body movements. In order to improve the patient's neural control, the prosthesis is given a natural feeling. It records data from sensitive areas from the body to the prosthetic limb and encodes signals in the form of electrical stimulation to the brain. In our research, the brain-computer interface (BCI) is a bridge connecting patients’ cognition and the real world, allowing information to interact with each other. The efficient work between the two is achieved through external devices. The flow of information is controlled by BCI’s ability to record neuronal signals and decode signals, which are converted into device control. In this way, we could encode information and then send it to the brain through electrical stimulation, which has significant medical application.Keywords: biomedical engineering, brain-computer interface, prosthesis, neural control
Procedia PDF Downloads 1835332 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 1885331 Ethical Perspectives on Implementation of Computer Aided Design Curriculum in Architecture in Nigeria: A Case Study of Chukwuemeka Odumegwu Ojukwu University, Uli
Authors: Kelechi Ezeji
Abstract:
The use of Computer Aided Design (CAD) technologies has become pervasive in the Architecture, Engineering and Construction (AEC) industry. This has led to its inclusion as an important part of the training module in the curriculum for Architecture Schools in Nigeria. This paper examines the ethical questions that arise in the implementation of Computer Aided Design (CAD) Content of the curriculum for Architectural education. Using existing literature, it begins this scrutiny from the propriety of inclusion of CAD into the education of the architect and the obligations of the different stakeholders in the implementation process. It also examines the questions raised by the negative use of computing technologies as well as perceived negative influence of the use of CAD on design creativity. Survey methodology was employed to gather data from the Department of Architecture, Chukwuemeka Odumegwu Ojukwu University Uli, which has been used as a case study on how the issues raised are being addressed. The paper draws conclusions on what will make for successful ethical implementation.Keywords: computer aided design, curriculum, education, ethics
Procedia PDF Downloads 418