Search results for: new information
7310 Infusion of Skills for Undergraduate Scholarship into Teacher Education: Two Case Studies in New York and Florida
Authors: Tunde Szecsi, Janka Szilagyi
Abstract:
Students majoring in education are underrepresented in undergraduate scholarship. To enable and encourage teacher candidates to engage in scholarly activities, it is essential to infuse skills such as problem-solving, critical thinking, oral and written communication, collaboration and the utilization of information literacy, into courses in teacher preparation programs. In this empirical study, we examined two teacher education programs – one in New York State and one in Florida – in terms of the approaches of the course-based infusion of skills for undergraduate research, and the effectiveness of this infusion. First, course-related documents such as syllabi, assignment descriptions, and course activities were reviewed and analyzed. The goal of the document analysis was to identify and describe the targeted skills, and the pedagogical approaches and strategies for promoting research skills in teacher candidates. Next, a selection of teacher candidates’ scholarly products from the institution in Florida was used as a data set to examine teacher candidates’ skill development in the context of the identified assignments. This dataset was analyzed both quantitatively and qualitatively to describe the changes that occurred in teacher candidates’ critical thinking, communication, and information literacy skills, and to uncover patterns in the skill development at the two institutions. Descriptive statistics were calculated to explore the changes in these skills of teacher candidates over a period of three years. The findings based on data from the teacher education program in Florida indicated a steady gain in written communication and critical thinking and a modest increase in informational literacy. At the institution in New York, candidates’ submission and success rates on the edTPA, a New York State Teacher Certification exam, was used as a measure of scholarly skills. Overall, although different approaches were used for infusing the development of scholarly skills in the courses, the results suggest that a holistic and well-orchestrated infusion of the skills into most courses in the teacher education program might result in steadily developing scholarly skills. These results offered essential implications for teacher education programs in terms of further improvements in teacher candidates’ skills for engaging in undergraduate research and scholarship. In this presentation, our purpose is to showcase two approaches developed by two teacher education programs to demonstrate how diverse approaches toward the promotion of undergraduate scholarship activities are responsive to the context of the teacher preparation programs.Keywords: critical thinking, pedagogical strategies, teacher education, undergraduate student research
Procedia PDF Downloads 1627309 Improved Skin Detection Using Colour Space and Texture
Authors: Medjram Sofiane, Babahenini Mohamed Chaouki, Mohamed Benali Yamina
Abstract:
Skin detection is an important task for computer vision systems. A good method for skin detection means a good and successful result of the system. The colour is a good descriptor that allows us to detect skin colour in the images, but because of lightings effects and objects that have a similar colour skin, skin detection becomes difficult. In this paper, we proposed a method using the YCbCr colour space for skin detection and lighting effects elimination, then we use the information of texture to eliminate the false regions detected by the YCbCr colour skin model.Keywords: skin detection, YCbCr, GLCM, texture, human skin
Procedia PDF Downloads 4597308 Partial Knowledge Transfer Between the Source Problem and the Target Problem in Genetic Algorithms
Authors: Terence Soule, Tami Al Ghamdi
Abstract:
To study how the partial knowledge transfer may affect the Genetic Algorithm (GA) performance, we model the Transfer Learning (TL) process using GA as the model solver. The objective of the TL is to transfer the knowledge from one problem to another related problem. This process imitates how humans think in their daily life. In this paper, we proposed to study a case where the knowledge transferred from the S problem has less information than what the T problem needs. We sampled the transferred population using different strategies of TL. The results showed transfer part of the knowledge is helpful and speeds the GA process of finding a solution to the problem.Keywords: transfer learning, partial transfer, evolutionary computation, genetic algorithm
Procedia PDF Downloads 1327307 The Flipped Classroom Used in Business Curricula
Authors: Hedia Mhiri Sellami
Abstract:
This case study used the principles of the flipped classroom (FC) in courses dealing with the use of the Information and Communication Technology (ICT) in three business curricula. The FC was used because our first goal is to devote more time to practice the theoretical concepts, so, before the class session, students had to watch videos introducing the concept they will learn. The videos weren't designed for our course, they are on Youtube and correspond to real cases of the ICT use in companies. This choice was also made in order to meet our second goal; it was to motivate students by showing them that the aspects covered by the course are very useful in the business. This case study reinforced the positive reputation of the FC as it was globally appreciated by our students. Beside, we managed to achieve our objectives relating to the motivation and application of concepts studied.Keywords: flipped classroom, business, ICT, video, learning
Procedia PDF Downloads 2877306 Blockchain Security in MANETs
Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara
Abstract:
The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.Keywords: Ad hocs networks, blockchain, MPR, security
Procedia PDF Downloads 1867305 Application of extraction chromatography to the separation of Sc, Zr and Sn isotopes from target materials
Authors: Steffen Happel
Abstract:
Non-standard isotopes such as Sc-44/47, Zr-89, and Sn-117mare finding interest is increasing in radiopharmaceutical applications. Methods for the separation of these elements from typical target materials were developed. The methods used in this paper are based on the use of extraction chromatographic resins such as UTEVA, TBP, and DGA resin. Information on the selectivity of the resins (Dw values of selected elements in HCl and HNO3 of varying concentration) will be presented as well as results of the method development such as elution studies, chemical recoveries, and decontamination factors. Developed methods are based on the use of vacuum supported separation allowing for fast and selective separation.Keywords: elution, extraction chromatography, radiopharmacy, decontamination factors
Procedia PDF Downloads 4697304 Developing Innovations in Classrom Teaching: Process or Product
Authors: Mani Ram Sharma
Abstract:
We live in a busy world with sudden distractions and many things to think about. The rapid speed of science and technology keeps our world in constant motion. Students leaving the classroom after being taught by the teachers are thinking about a thousand things: "Did I understand what teacher taught?" However, when they come into the classroom, as teachers, we expect them to be ready to learn, ready to receive information, and retain it. There is a question that how can learners do this with so much in their learning process. It is obliviously with the use of innovation in the classroom. It fosters the students to learn innovatively to establish learner's autonomy. This article outlines the role, need, and process of innovation in the language classroom and teaching.Keywords: distraction, foster, innovation, learner's autonomy, retainment
Procedia PDF Downloads 2697303 Traffic Study and Proposal for a Bike Lane for the University of the Basque Country
Authors: Elisabete Alberdi, Irantzu Álvarez, Laura Girón
Abstract:
The objective of this work is to propose a cycle path or network of paths to the UPV/EHU Campus in Leioa. The proposal will be presented from the point of view of sustainability. In order to achieve this, the roads that are already built will be used, and the road or network will be proposed to be built with the least amount of money possible. To select the most suitable route for the bike lane, various sources of information have been used. Through this data, we analyse the transport infrastructure and the mobility around the UPV/EHU Campus in Leioa. This work aims to satisfy the mobility needs of users on the University Campus to contribute to the sustainability of the campus.Keywords: cycle lane, sustainability, accessibility, transport, agenda 2030
Procedia PDF Downloads 2287302 Detonating Culture, Statistic and Developmenet in Imo State of Nigeria
Authors: Ejikeme Ugiri
Abstract:
In an executive summary, UNESCO describes Framework for Cultural Statistics as a tool for organizing cultural statistics both nationally and internationally. This is based on conceptual foundation and a common understanding of culture that will enable the measurement of a wide range of cultural expressions. This means therefore that cultural expression in whatever guise has the potentiality of contributing reasonably to the development of a given society. The paper looked into the various tangible and intangible cultures in Imo State of Nigeria. Due to government’s insensitivity, there is need to remind ourselves of the need to pay adequate attention to the cultural heritage bequeathed to us by our forefathers for the sake of posterity. Documenting this information in written form therefore becomes imperative. The study concludes that culture if developed, could reasonably contribute to economic and social growth of the society.Keywords: culture, detonation, development, statistics
Procedia PDF Downloads 4687301 Unsupervised Reciter Recognition Using Gaussian Mixture Models
Authors: Ahmad Alwosheel, Ahmed Alqaraawi
Abstract:
This work proposes an unsupervised text-independent probabilistic approach to recognize Quran reciter voice. It is an accurate approach that works on real time applications. This approach does not require a prior information about reciter models. It has two phases, where in the training phase the reciters' acoustical features are modeled using Gaussian Mixture Models, while in the testing phase, unlabeled reciter's acoustical features are examined among GMM models. Using this approach, a high accuracy results are achieved with efficient computation time process.Keywords: Quran, speaker recognition, reciter recognition, Gaussian Mixture Model
Procedia PDF Downloads 3807300 Wireless Communication in Sunlight
Authors: Karmveer Sheoran
Abstract:
To make wireless communication a vast success is to use sunlight for wireless communication. We can use sunlight in upper atmosphere to encode messages to efficiently use sunlight. This use of sunlight for wireless communication will need encoders which will encode sunlight according to our message and then resultant will be spread in all atmospheres wherever sunlight goes, it will take our messages with it. With minimum requirement of cost in equipment used at the edge of atmosphere is where sunlight is being encoded. In this way a very high efficient wireless communication system can be designed. On receiver side we will need light detectors which will detect sunlight variations and will finally give the information contained i it. Sunlight can be encoded at a very high speed that nobody will be annoyed by flickering. It will be most sophisticated and efficient wireless communication ever designed. There are far more possibilities in this sunlight communication. Let us call it “Sunlight Communication".Keywords: sunlight communication, emerging trends, wireless communication, wifi
Procedia PDF Downloads 4027299 An Assessment of the Digital Transformation of Radio
Authors: Fatih Sogut
Abstract:
Developments in information technologies have caused significant changes in terms of radio and television broadcasting. With these changes in terms of production format, transmission techniques and service delivery, the distinction between traditional media and New Media has emerged. The viewer/listener, who was in a passive position before, is now in an active position and has a say in many matters, including content production. Visual and auditory data transfer has diversified and become easier thanks to the convergence phenomenon. These transformations and developments also affected one of the oldest electronic communication tools, radio. In this study, in order to adapt to the new era that emerged with the digital age, the change in radio broadcasting and the factors that led to this change were tried to be explained.Keywords: Internet, radio broadcasting, digital transformation, Internet broadcasting
Procedia PDF Downloads 1717298 Unmanned Aerial Vehicle Use for Emergency Purpose
Authors: Shah S. M. A., Aftab U.
Abstract:
It is imperative in today’s world to get a real time information about different emergency situation occurred in the environment. Helicopters are mostly used to access places which are hard to access in emergencies like earthquake, floods, bridge failure or in any other disasters conditions. Use of helicopters are considered more costly to properly collect the data. Therefore a new technique has been introduced in this research to promptly collect data using drones. The drone designed in this research is based on trial and error experimental work with objective to construct an economical drone. Locally available material have been used for this purpose. And a mobile camera were also attached to prepare video during the flight. It was found that within very limited resources the result were quite successful.Keywords: UAV, real time, camera, disasters
Procedia PDF Downloads 2377297 Wavelets Contribution on Textual Data Analysis
Authors: Habiba Ben Abdessalem
Abstract:
The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.Keywords: textual data, wavelet, denoising, contingency table
Procedia PDF Downloads 2777296 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa
Authors: Masa Popovac, Philip Fine
Abstract:
Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa
Procedia PDF Downloads 4837295 Efficient Single Relay Selection Scheme for Cooperative Communication
Authors: Sung-Bok Choi, Hyun-Jun Shin, Hyoung-Kyu Song
Abstract:
This paper proposes a single relay selection scheme in cooperative communication. Decode and forward scheme is considered when a source node wants to cooperate with a single relay for data transmission. To use the proposed single relay selection scheme, the source node make a little different pattern signal which is not complex pattern and broadcasts it. The proposed scheme does not require the channel state information between the source node and candidates of the relay during the relay selection. Therefore, it is able to be used in many fields.Keywords: relay selection, cooperative communication, df, channel codes
Procedia PDF Downloads 6707294 Examining Reading Comprehension Skills Based on Different Reading Comprehension Frameworks and Taxonomies
Authors: Seval Kula-Kartal
Abstract:
Developing students’ reading comprehension skills is an aim that is difficult to accomplish and requires to follow long-term and systematic teaching and assessment processes. In these processes, teachers need tools to provide guidance to them on what reading comprehension is and which comprehension skills they should develop. Due to a lack of clear and evidence-based frameworks defining reading comprehension skills, especially in Turkiye, teachers and students mostly follow various processes in the classrooms without having an idea about what their comprehension goals are and what those goals mean. Since teachers and students do not have a clear view of comprehension targets, strengths, and weaknesses in students’ comprehension skills, the formative feedback processes cannot be managed in an effective way. It is believed that detecting and defining influential comprehension skills may provide guidance both to teachers and students during the feedback process. Therefore, in the current study, some of the reading comprehension frameworks that define comprehension skills operationally were examined. The aim of the study is to develop a simple and clear framework that can be used by teachers and students during their teaching, learning, assessment, and feedback processes. The current study is qualitative research in which documents related to reading comprehension skills were analyzed. Therefore, the study group consisted of recourses and frameworks which made big contributions to theoretical and operational definitions of reading comprehension. A content analysis was conducted on the resources included in the study group. To determine the validity of the themes and sub-categories revealed as the result of content analysis, three educational assessment experts were asked to examine the content analysis results. The Fleiss’ Cappa coefficient revealed that there is consistency among themes and categories defined by three different experts. The content analysis of the reading comprehension frameworks revealed that comprehension skills could be examined under four different themes. The first and second themes focus on understanding information given explicitly or implicitly within a text. The third theme includes skills used by the readers to make connections between their personal knowledge and the information given in the text. Lastly, the fourth theme focus on skills used by readers to examine the text with a critical view. The results suggested that fundamental reading comprehension skills can be examined under four themes. Teachers are recommended to use these themes in their reading comprehension teaching and assessment processes. Acknowledgment: This research is supported by Pamukkale University Scientific Research Unit within the project, whose title is Developing A Reading Comprehension Rubric.Keywords: reading comprehension, assessing reading comprehension, comprehension taxonomies, educational assessment
Procedia PDF Downloads 827293 The Missing Link in Holistic Health Care: Value-Based Medicine in Entrustable Professional Activities for Doctor-Patient Relationship
Authors: Ling-Lang Huang
Abstract:
Background: The holistic health care should ideally cover physical, mental, spiritual, and social aspects of a patient. With very constrained time in current clinical practice system, medical decisions often tip the balance in favor of evidence-based medicine (EBM) in comparison to patient's personal values. Even in the era of competence-based medical education (CBME), when scrutinizing the items of entrustable professional activities (EPAs), we found that EPAs of establishing doctor-patient relationship remained incomplete or even missing. This phenomenon prompted us to raise this project aiming at advocating value-based medicine (VBM), which emphasizes the importance of patient’s values in medical decisions. A true and effective doctor-patient communication and relationship should be a well-balanced harmony of EBM and VBM. By constructing VBM into current EPAs, we can further promote genuine shared decision making (SDM) and fix the missing link in holistic health care. Methods: In this project, we are going to find out EPA elements crucial for establishing an ideal doctor-patient relationship through three distinct pairs of doctor-patient relationships: patients with pulmonary arterial hypertension (relatively young but with grave disease), patients undergoing surgery (facing critical medical decisions), and patients with terminal diseases (facing forthcoming death). We’ll search for important EPA elements through the following steps: 1. Narrative approach to delineate patients’ values among 2. distinct groups. 3.Hermeneutics-based interview: semi-structured interview will be conducted for both patients and physicians, followed by qualitative analysis of collected information by compiling, disassembling, reassembling, interpreting, and concluding. 4. Preliminarily construct those VBM elements into EPAs for doctor-patient relationships in 3 groups. Expected Outcomes: The results of this project are going to give us invaluable information regarding the impact of patients’ values, while facing different medical situations, on the final medical decision. The competence of well-blending and -balanced both values from patients and evidence from clinical sciences is the missing link in holistic health care and should be established in future EPAs to enhance an effective SDM.Keywords: value-based medicine, shared decision making, entrustable professional activities, holistic health care
Procedia PDF Downloads 1217292 Development of a Mathematical Theoretical Model and Simulation of the Electromechanical System for Wave Energy Harvesting
Authors: P. Valdez, M. Pelissero, A. Haim, F. Muiño, F. Galia, R. Tula
Abstract:
As a result of the studies performed on the wave energy resource worldwide, a research project was set up to harvest wave energy for its conversion into electrical energy. Within this framework, a theoretical model of the electromechanical energy harvesting system, developed with MATLAB’s Simulink software, will be provided. This tool recreates the site conditions where the device will be installed and offers valuable information about the amount of energy that can be harnessed. This research provides a deeper understanding of the utilization of wave energy in order to improve the efficiency of a 1:1 scale prototype of the device.Keywords: electromechanical device, modeling, renewable energy, sea wave energy, simulation
Procedia PDF Downloads 4887291 Measures for Conflict Management in Nigerian Higher Institutions
Authors: Oyelade Oluwatoyin
Abstract:
The phenomenon of crises in educational sector in Nigeria has reached its peak in the 21st century. Thus, this paper examines the strategies that can be used in managing the conflict situation in Nigeria Higher Institution of learning. The causes of conflicts such as inadequate funding, insufficient school facilities, poor working condition, poor enrolment, proliferation of higher institutions and unfavourable administrative decision are the major detriment of law and order i.e. strike action, destruction of property and programmes coupled with the student unrest. This write-up will make use of the available information and with the aim of adding value to existing knowledge. It was recommend that steps should be taken by policy maker to prevent scourge of conflicts in tertiary institutions in NigeriaKeywords: conflicts, higher institutions, management, measures
Procedia PDF Downloads 3697290 Using the Semantic Web Technologies to Bring Adaptability in E-Learning Systems
Authors: Fatima Faiza Ahmed, Syed Farrukh Hussain
Abstract:
The last few decades have seen a large proportion of our population bending towards e-learning technologies, starting from learning tools used in primary and elementary schools to competency based e-learning systems specifically designed for applications like finance and marketing. The huge diversity in this crowd brings about a large number of challenges for the designers of these e-learning systems, one of which is the adaptability of such systems. This paper focuses on adaptability in the learning material in an e-learning course and how artificial intelligence and the semantic web can be used as an effective tool for this purpose. The study proved that the semantic web, still a hot topic in the area of computer science can prove to be a powerful tool in designing and implementing adaptable e-learning systems.Keywords: adaptable e-learning, HTMLParser, information extraction, semantic web
Procedia PDF Downloads 3397289 The Meaning System of Tense: A Systemic Functional Approach
Authors: Cunyu Zhang
Abstract:
Through literature review about studies related to tense, it is found that there exist disagreements on the definition and existence of Chinese tense. Influenced by some researches on English language which regard tense as a grammatical category based on the verbal inflections of English, some Chinese researchers claim that there is no tense in Chinese language as there are no verbal inflections involved. Meanwhile, other Chinese researchers hold that Chinese still has tense although its verbs are non-inflectional based on the fact that Chinese lexical expressions can imply temporal meaning. We assume that the reasons for the above disagreements in terms of Chinese tense lie in the fact that all the previous studies prefer to view language “from the below” which means expressions of tense are the core part of these studies. However, there are about 6,000 languages with distinct expressions all over the world. Hence, if the language studies only concentrate on expressions, it must become more difficult to understand the nature of language. By contrast, functions of languages are similar; otherwise, the human beings could not communicate with each other. Therefore, we believe that it is necessary for us to have a theoretical study on Chinese tense within the framework of SFL which holds that language is a system where meaning is the core part while form is just the realization of meaning. In addition, SFL is a general linguistic providing a universal framework for languages all over the world. Therefore, based on Systemic Functional Linguistics, the paper firstly redefines tense as a deictic semantic category for describing the speaker’s temporal location of processes and relevant temporal relations. With reference to this definition, this study explores the meaning system of tense. It is proposed that tense expresses four kinds of meaning, namely interpersonal, experiential, logical and textual meanings. From the interpersonal angle, tense helps to exchange temporal information between the speaker and the listener, and the temporal information refers to the anchoring of a concerned process in the past, present or future by the speaker. From the experiential angle, tense plays a role in the temporal locating of material, mental, relational, existential, behavioral and verbal processes by the speaker. From the logical angle, tense denotes the temporal relations at the two levels of clause and clause complex, and such relations fall into simultaneity, anteriority and posteriority. From the textual angle, tense refers to the temporal relations at the level of text, and the temporal relations in question concern linear serial relations and synchronous serial relations.Keywords: Chinese, meaning system, Systemic Functional Linguistics, tense
Procedia PDF Downloads 4207288 Performance Analysis of Scalable Secure Multicasting in Social Networking
Authors: R. Venkatesan, A. Sabari
Abstract:
Developments of social networking internet scenario are recommended for the requirements of scalable, authentic, secure group communication model like multicasting. Multicasting is an inter network service that offers efficient delivery of data from a source to multiple destinations. Even though multicast has been very successful at providing an efficient and best-effort data delivery service for huge groups, it verified complex process to expand other features to multicast in a scalable way. Separately, the requirement for secure electronic information had become gradually more apparent. Since multicast applications are deployed for mainstream purpose the need to secure multicast communications will become significant.Keywords: multicasting, scalability, security, social network
Procedia PDF Downloads 2927287 Process Flows and Risk Analysis for the Global E-SMC
Authors: Taeho Park, Ming Zhou, Sangryul Shim
Abstract:
With the emergence of the global economy, today’s business environment is getting more competitive than ever in the past. And many supply chain (SC) strategies and operations have significantly been altered over the past decade to overcome more complexities and risks imposed onto the global business. First, offshoring and outsourcing are more adopted as operational strategies. Manufacturing continues to move to better locations for enhancing competitiveness. Second, international operations are a challenge to a company’s SC system. Third, the products traded in the SC system are not just physical goods, but also digital goods (e.g., software, e-books, music, video materials). There are three main flows involved in fulfilling the activities in the SC system: physical flow, information flow, and financial flow. An advance of the Internet and electronic communication technologies has enabled companies to perform the flows of SC activities in electronic formats, resulting in the advent of an electronic supply chain management (e-SCM) system. A SC system for digital goods is somewhat different from the supply chain system for physical goods. However, it involves many similar or identical SC activities and flows. For example, like the production of physical goods, many third parties are also involved in producing digital goods for the production of components and even final products. This research aims at identifying process flows of both physical and digital goods in a SC system, and then investigating all risk elements involved in the physical, information, and financial flows during the fulfilment of SC activities. There are many risks inherent in the e-SCM system. Some risks may have severe impact on a company’s business, and some occur frequently but are not detrimental enough to jeopardize a company. Thus, companies should assess the impact and frequency of those risks, and then prioritize them in terms of their severity, frequency, budget, and time in order to be carefully maintained. We found risks involved in the global trading of physical and digital goods in four different categories: environmental risk, strategic risk, technological risk, and operational risk. And then the significance of those risks was investigated through a survey. The survey asked companies about the frequency and severity of the identified risks. They were also asked whether they had faced those risks in the past. Since the characteristics and supply chain flows of digital goods are varying industry by industry and country by country, it is more meaningful and useful to analyze risks by industry and country. To this end, more data in each industry sector and country should be collected, which could be accomplished in the future research.Keywords: digital goods, e-SCM, risk analysis, supply chain flows
Procedia PDF Downloads 4227286 Investigative Study of Consumer Perceptions to the Quality and Safety Attributes of 'Fresh' versus 'Frozen' Cassava (Manihot esculenta Crantz): A Case for Agro-Processing in Trinidad and Tobago, West Indies
Authors: Nadia Miranda Lorick, Neela Badrie, Marsha Singh
Abstract:
Cassava (Manihot esculenta, Crantz) which is also known as ‘yucca’ or ‘manioc’ has been acknowledged as a millennium crop which has been utilized for food security purposes. The crop provides considerable amount of energy. The aim of the study was to assess consumer groups of both ‘fresh’ and ‘frozen’ in terms of their perceptions toward the quality and safety attributes of frozen cassava. The questionnaire included four sections: consumer demographics, consumer perceptions on quality attributes of ‘frozen’ cassava, consumer knowledge, awareness and attitudes toward food safety of ‘frozen’ cassava and consumer suggestions toward the improvement of frozen cassava. A face-to-face questionnaire was administered to 200 consumers of cassava between April and May 2016. The criteria for inclusion in the survey were that they must be 15 years and over and consumer of cassava. The sections of the questionnaire included demographics of respondents, consumer perception on quality and safety attributes of cassava and suggestions for the improvement of the value-added product. The data was analysed by descriptive and chi-square using SPSS as well as qualitative information was captured. Only 17% of respondents purchased frozen cassava and this was significantly (P<0.05) associated to income. Some (15%) of fresh cassava purchasers had never heard of frozen cassava products and 7.5% o perceived that these products were unhealthy for consumption. More than half (51.3%) of the consumers (all from the ‘fresh’ cassava group) believed that there were ‘no toxins’ within cassava. The ‘frozen’ cassava products were valued for convenience but purchasers were least satisfied with ‘value for money’ (50%), ‘product safety’ (50%) and ‘colour’ (52.9%). Cassava purchasers demonstrated highest dissatisfaction levels with the quality attribute: value for money (6.6%, 11.8%) respectively. The most predominant area outlined by respondents for frozen cassava improvement was promotion /advertising/education (23%). The ‘frozen’ cassava purchasers were ‘least satisfied’ thus most concern that clean knives and clean surface would not be used agro- processing. Fresh cassava purchasers were comparatively more knowledgeable on the potential existence of naturally occurring toxins in cassava, however with 1% respondents being able to specifically identify the toxin as ‘cyanide’. Dangerous preservatives (31%), poor hygiene (30%) and chemicals from the packaging (11%) were identified as some sources of contamination of ‘frozen’ cassava. Purchasers of frozen cassava indicated that the information on packaging label was unclear (P<0.01) when compared to ‘fresh’ cassava consumers.Keywords: consumer satisfaction, convenience, cyanide toxin, product safety, price, label
Procedia PDF Downloads 4027285 Single Valued Neutrosophic Hesitant Fuzzy Rough Set and Its Application
Authors: K. M. Alsager, N. O. Alshehri
Abstract:
In this paper, we proposed the notion of single valued neutrosophic hesitant fuzzy rough set, by combining single valued neutrosophic hesitant fuzzy set and rough set. The combination of single valued neutrosophic hesitant fuzzy set and rough set is a powerful tool for dealing with uncertainty, granularity and incompleteness of knowledge in information systems. We presented both definition and some basic properties of the proposed model. Finally, we gave a general approach which is applied to a decision making problem in disease diagnoses, and demonstrated the effectiveness of the approach by a numerical example.Keywords: single valued neutrosophic fuzzy set, single valued neutrosophic fuzzy hesitant set, rough set, single valued neutrosophic hesitant fuzzy rough set
Procedia PDF Downloads 2727284 Anaplasmosis among Camels in Iran and Observation of Abnormalities in Infected Blood Films
Authors: Khosro Ghazvinian, Touba Khodaiean
Abstract:
Anaplasma organisms are obligatory intracellular bacteria belonging to the order Rickettsiales, family Anaplasmataceae. This disease is distributed around the globe and infected ticks are the most important vectors in anaplasmosis transmission. There is a little information about anaplasmosis in camels. This research investigated the blood films of 35 (20 male, 15 female) camels randomly selected from a flock of 150 camels. Samples were stained with Giemsa and Anaplasma sp. organisms were observed in six out of 35 (17.14 %) blood films. There were also some changes in Diff-Quick and morphology of leukocytes. No significant difference between male and female camels was observed (P>0.05). According to the results anaplasmosis is presented among camels in Iran.Keywords: anaplasma, anaplasmosis, camel, Iran
Procedia PDF Downloads 2467283 An Efficient Clustering Technique for Copy-Paste Attack Detection
Authors: N. Chaitawittanun, M. Munlin
Abstract:
Due to rapid advancement of powerful image processing software, digital images are easy to manipulate and modify by ordinary people. Lots of digital images are edited for a specific purpose and more difficult to distinguish form their original ones. We propose a clustering method to detect a copy-move image forgery of JPEG, BMP, TIFF, and PNG. The process starts with reducing the color of the photos. Then, we use the clustering technique to divide information of measuring data by Hausdorff Distance. The result shows that the purposed methods is capable of inspecting the image file and correctly identify the forgery.Keywords: image detection, forgery image, copy-paste, attack detection
Procedia PDF Downloads 3387282 Prioritizing Ecosystem Services for South-Central Regions of Chile: An Expert-Based Spatial Multi-Criteria Approach
Authors: Yenisleidy Martinez Martinez, Yannay Casas-Ledon, Jo Dewulf
Abstract:
The ecosystem services (ES) concept has contributed to draw attention to the benefits ecosystems generate for people and how necessary natural resources are for human well-being. The identification and prioritization of the ES constitute the first steps to undertake conservation and valuation initiatives on behalf of people. Additionally, mapping the supply of ES is a powerful tool to support decision making regarding the sustainable management of landscape and natural resources. In this context, the present study aimed to identify, prioritize and map the primary ES in Biobio and Nuble regions using a methodology that combines expert judgment, multi-attribute evaluation methods, and Geographic Information Systems (GIS). Firstly, scores about the capacity of different land use/cover types to supply ES and the importance attributed to each service were obtained from experts and stakeholders via an online survey. Afterward, the ES assessment matrix was constructed, and the weighted linear combination (WLC) method was applied to mapping the overall capacity of supply of provisioning, regulating and maintenance, and cultural services. Finally, prioritized ES for the study area were selected and mapped. The results suggest that native forests, wetlands, and water bodies have the highest supply capacities of ES, while urban and industrial areas and bare areas have a very low supply of services. On the other hand, fourteen out of twenty-nine services were selected by experts and stakeholders as the most relevant for the regions. The spatial distribution of ES has shown that the Andean Range and part of the Coastal Range have the highest ES supply capacity, mostly regulation and maintenance and cultural ES. This performance is related to the presence of native forests, water bodies, and wetlands in those zones. This study provides specific information about the most relevant ES in Biobio and Nuble according to the opinion of local stakeholders and the spatial identification of areas with a high capacity to provide services. These findings could be helpful as a reference by planners and policymakers to develop landscape management strategies oriented to preserve the supply of services in both regions.Keywords: ecosystem services, expert judgment, mapping, multi-criteria decision making, prioritization
Procedia PDF Downloads 1267281 Cloud Computing in Jordanian Libraries: An Overview
Authors: Mohammad A. Al-Madi, Nagham A. Al-Madi, Fanan A. Al-Madi
Abstract:
The current concept of the technology of cloud computing libraries has been increasing where users can store their data in a virtual space and can be retrieved from anywhere whilst using the network. By using cloud computing technology, industries and individuals save money, time, and space. Moreover, data and information about libraries can be placed in the cloud. This paper discusses the meaning of cloud computing along with its types. Further, the focus has been given to the application of cloud computing in modern libraries. Additionally, the advantages of cloud computing and the areas in which cloud computing be applied with current usage are discussed. Finally, the present situation of the Jordanian libraries is considered and discussed in further detail.Keywords: cloud computing, community cloud, hybrid cloud, private cloud, public cloud
Procedia PDF Downloads 221