Search results for: Privacy and Data Protection Law
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26333

Search results for: Privacy and Data Protection Law

22763 Students with Disabilities in Today's College Classrooms

Authors: Ashwini Tiwari

Abstract:

This qualitative case study examines students' perceptions of accommodations in higher education institutions. The data were collected from focus groups and one-to-one interviews with 15 students enrolled in a 4-year state university in the southern United States. The data were analyzed using a thematic analysis process. The findings suggest that students perceived that their instructors were willing to accommodate their educational needs. However, the participants expressed concerns about the lack of a formal labeling process in higher education settings, creating a barrier to receiving adequate services to gain meaningful educational experiences.

Keywords: disability, accomodation, services, higher educaiton

Procedia PDF Downloads 75
22762 Using Data Mining Techniques to Evaluate the Different Factors Affecting the Academic Performance of Students at the Faculty of Information Technology in Hashemite University in Jordan

Authors: Feras Hanandeh, Majdi Shannag

Abstract:

This research studies the different factors that could affect the Faculty of Information Technology in Hashemite University students’ accumulative average. The research paper verifies the student information, background, their academic records, and how this information will affect the student to get high grades. The student information used in the study is extracted from the student’s academic records. The data mining tools and techniques are used to decide which attribute(s) will affect the student’s accumulative average. The results show that the most important factor which affects the students’ accumulative average is the student Acceptance Type. And we built a decision tree model and rules to determine how the student can get high grades in their courses. The overall accuracy of the model is 44% which is accepted rate.

Keywords: data mining, classification, extracting rules, decision tree

Procedia PDF Downloads 402
22761 Advancing Sustainable Futures: A Study on Low Carbon Ventures

Authors: Gaurav Kumar Sinha

Abstract:

As the world grapples with climate challenges, this study highlights the instrumental role of AWS services in amplifying the impact of LCVs. Their ability to harness the cloud, data analytics, and scalable infrastructure offered by AWS empowers LCVs to innovate, scale, and drive meaningful change in the quest for a sustainable future. This study serves as a rallying cry, urging stakeholders to recognize, embrace, and maximize the potential of AWS-powered solutions in advancing sustainable and resilient global initiatives.

Keywords: low carbon ventures, sustainability solutions, AWS services, data analytics

Procedia PDF Downloads 53
22760 Incentive-Based Motivation to Network with Coworkers: Strengthening Professional Networks via Online Social Networks

Authors: Jung Lee

Abstract:

The last decade has witnessed more people than ever before using social media and broadening their social circles. Social media users connect not only with their friends but also with professional acquaintances, primarily coworkers, and clients; personal and professional social circles are mixed within the same social media platform. Considering the positive aspect of social media in facilitating communication and mutual understanding between individuals, we infer that social media interactions with co-workers could indeed benefit one’s professional life. However, given privacy issues, sharing all personal details with one’s co-workers is not necessarily the best practice. Should one connect with coworkers via social media? Will social media connections with coworkers eventually benefit one’s long-term career? Will the benefit differ across cultures? To answer, this study examines how social media can contribute to organizational communication by tracing the foundation of user motivation based on social capital theory, leader-member exchange (LMX) theory and expectancy theory of motivation. Although social media was originally designed for personal communication, users have shown intentions to extend social media use for professional communication, especially when the proper incentive is expected. To articulate the user motivation and the mechanism of the incentive expectation scheme, this study applies those three theories and identify six antecedents and three moderators of social media use motivation including social network flaunt, shared interest, perceived social inclusion. It also hypothesizes that the moderating effects of those constructs would significantly differ based on the relationship hierarchy among the workers. To validate, this study conducted a survey of 329 active social media users with acceptable levels of job experiences. The analysis result confirms the specific roles of the three moderators in social media adoption for organizational communication. The present study contributes to the literature by developing a theoretical modeling of ambivalent employee perceptions about establishing social media connections with co-workers. This framework shows not only how both positive and negative expectations of social media connections with co-workers are formed based on expectancy theory of motivation, but also how such expectations lead to behavioral intentions using career success model. It also enhances understanding of how various relationships among employees can be influenced through social media use and such usage can potentially affect both performance and careers. Finally, it shows how cultural factors induced by social media use can influence relations among the coworkers.

Keywords: the social network, workplace, social capital, motivation

Procedia PDF Downloads 110
22759 The Determinants of Trade Flow and Potential between Ethiopia and Group of Twenty

Authors: Terefe Alemu

Abstract:

This study is intended to examine Ethiopia’s trade flow determinants and trade potential with G20 countries whether it was overtraded or there is/are trade potential by using trade gravity model. The sources of panel data used were IMF, WDI, United Nations population division, The Heritage Foundation, Washington's No. 1 think tank online website database, online distance calculator, and others for the duration of 2010 to 2019 for 10 consecutive years. The empirical data analyzing tool used was Random effect model (REM), which is effective in estimation of time-invariant data. The empirical data analyzed using STATA software result indicates that Ethiopia has a trade potential with seven countries of G20, whereas Ethiopia overtrade with 12 countries and EU region. The Ethiopia’s and G20 countries/region bilateral trade flow statistically significant/ p<0.05/determinants were the population of G20 countries, growth domestic products of G20 countries, growth domestic products of Ethiopia, geographical distance between Ethiopia and G20 countries. The top five G20 countries exported to Ethiopia were china, United State of America, European Union, India, and South Africa, whereas the top five G20 countries imported from Ethiopia were EU, China, United State of America, Saudi Arabia, and Germany, respectively. Finally, the policy implication were Ethiopia has to Keep the consistence of trade flow with overtraded countries and improve with under traded countries through trade policy revision, and secondly, focusing on the trade determinants to improve trade flow is recommended.

Keywords: trade gravity model, trade determinants, G20, international trade, trade potential

Procedia PDF Downloads 189
22758 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 269
22757 Kuwait Environmental Remediation Program: Waste Management Data Analytics for Planning and Optimization of Waste Collection

Authors: Aisha Al-Baroud

Abstract:

The United Nations Compensation Commission (UNCC), Kuwait National Focal Point (KNFP) and Kuwait Oil Company (KOC) cooperated in a joint project to undertake comprehensive and collaborative efforts to remediate 26 million m3 of crude oil contaminated soil that had resulted from the Gulf War in 1990/1991. These efforts are referred to as the Kuwait Environmental Remediation Program (KERP). KOC has developed a Total Remediation Solution (TRS) for KERP, which will guide the Remediation projects, comprises of alternative remedial solutions with treatment techniques inclusive of limited landfills for non-treatable soil materials disposal, and relies on treating certain ranges of Total Petroleum Hydrocarbon (TPH) contamination with the most appropriate remediation techniques. The KERP Remediation projects will be implemented within the KOC’s oilfields in North and South East Kuwait. The objectives of this remediation project is to clear land for field development and treat all the oil contaminated features (dry oil lakes, wet oil lakes, and oil contaminated piles) through TRS plan to optimize the treatment processes and minimize the volume of contaminated materials to be placed into landfills. The treatment strategy will comprise of Excavation and Transportation (E&T) of oil contaminated soils from contaminated land to remote treatment areas and to use appropriate remediation technologies or a combination of treatment technologies to achieve remediation target criteria (RTC). KOC has awarded five mega projects to achieve the same and is currently in the execution phase. As a part of the company’s commitment to environment and for the fulfillment of the mandatory HSSEMS procedures, all the Remediation contractors needs to report waste generation data from the various project activities on a monthly basis. Data on waste generation is collected in order to implement cost-efficient and sustainable waste management operations. Data analytics approaches can be built on the top of the data to produce more detailed, and in-time waste generation information for the basis of waste management and collection. The results obtained highlight the potential of advanced data analytic approaches in producing more detailed waste generation information for planning and optimization of waste collection and recycling.

Keywords: waste, tencnolgies, KERP, data, soil

Procedia PDF Downloads 96
22756 Current Status of Ir-192 Brachytherapy in Bangladesh

Authors: M. Safiqul Islam, Md Arafat Hossain Sarkar

Abstract:

Brachytherapy is one of the most important cancer treatment management systems in radiotherapy department. Brachytherapy treatment is moved into High Dose Rate (HDR) after loader from Low Dose Rate (LDR) after loader due to radiation protection advantage. HDR Brachytherapy is a highly multipurpose system for enhancing cure and achieving palliation in many common cancers disease of developing countries. High-dose rate (HDR) Brachytherapy is a type of internal radiation therapy that delivers radiation from implants placed close to or inside, the tumor(s) in the body. This procedure is very effective at providing localized radiation to the tumor site while minimizing the patient’s whole body dose. Brachytherapy has proven to be a highly successful treatment for cancers of the prostate, cervix, endometrium, breast, skin, bronchus, esophagus, and head and neck, as well as soft tissue sarcomas and several other types of cancer. For the time being in our country we have 10 new HDR Remote after loading Brachytherapy. Right now 4 HDR Brachytherapy is already installed and running for patient’s treatment out of 10 HDR Brachytherapy. Ir-192 source is more comfortable than Co-60. In that case people or expert personnel prefer Ir-192 source for different kind of cancer patients. Ir-192 are economically, more flexible and familiar in our country.

Keywords: Ir-192, brachytherapy, cancer treatment, prostate, cervix, endometrium, breast, skin, bronchus, esophagus, soft tissue sarcomas

Procedia PDF Downloads 416
22755 Assessment of Hargreaves Equation for Estimating Monthly Reference Evapotranspiration in the South of Iran

Authors: Ali Dehgan Moroozeh, B. Farhadi Bansouleh

Abstract:

Evapotranspiration is one of the most important components of the hydrological cycle. Evapotranspiration (ETo) is an important variable in water and energy balances on the earth’s surface, and knowledge of the distribution of ET is a key factor in hydrology, climatology, agronomy and ecology studies. Many researchers have a valid relationship, which is a function of climate factors, to estimate the potential evapotranspiration presented to the plant water stress or water loss, prevent. The FAO-Penman method (PM) had been recommended as a standard method. This method requires many data and these data are not available in every area of world. So, other methods should be evaluated for these conditions. When sufficient or reliable data to solve the PM equation are not available then Hargreaves equation can be used. The Hargreaves equation (HG) requires only daily mean, maximum and minimum air temperature extraterrestrial radiation .In this study, Hargreaves method (HG) were evaluated in 12 stations in the North West region of Iran. Results of HG and M.HG methods were compared with results of PM method. Statistical analysis of this comparison showed that calibration process has had significant effect on efficiency of Hargreaves method.

Keywords: evapotranspiration, hargreaves, equation, FAO-Penman method

Procedia PDF Downloads 386
22754 A Comparative Analysis of the Application and Use of Information and Communication Technologies (ICTS) in Selected Manufacturing Industries for Development in Nigeria

Authors: Kolawole Taiwo Olabode

Abstract:

This is a comparative study of ICTs adoption and use in selected manufacturing industries in for development. This study was carried out 2004 and was repeated 2013 (nine years after) using the same selected manufacturing industries to assess the level, improvement and extent ICT facilities used in these companies. The theory of modernization was explored to explain some developmental issues in this study. The same semi-structured questionnaire and IDI were used to elicit data on the subject matter. About 24.9% of the total workers (1,247) were sampled for this study using quota sampling technique. SPSS was used to analysis the quantitative data. The qualitative data was used to buttress the quantitative data. Findings indicated that Seven-Up Bottling Company and Frigoglass Glass Industry still remained Intensive ICT Users while only Niger Match Nigeria Limited still remained Non-Intensive ICT User while unfortunately, Askar Paint Nigeria Limited has gone liquidated. It is also important to discover that only the Intensive ICT users improved on relevant ICT facilities. The existing problems of ICT adoption and used in these companies remained the same in Niger Match Limited. The study concluded that for a society to be developed, management and government at all levels must do all things necessary to ensure that all existing organisations must be ICT compliance for workers and organisational performance and to enhance nation’s development in order to compete with other companies for global standard or recognition.

Keywords: ICT, intensive ICT-users, entrepreneurial, manufacturing industries, industries and development

Procedia PDF Downloads 285
22753 Investigation of the Inhibition Effect of 2,3-Diaminopyridine on Mild Steel Corrosion in Solution Simulating Water of Pores Concrete in Absence and Presence of Chloride Ions

Authors: Fatiha Benghanem, Mokhtar Berarma, Saida Keraghel, Ali Ourari

Abstract:

Corrosion is the result of the reaction between a material and its environment. Steel in concrete is protected from corrosion by a passive film promoted by concrete alkalinity. For the initiation of corrosion, this protective film must be destroyed and this can be mainly done in two ways: by the attack of chlorides on the steel or by carbonation of the cover concrete due the reaction with carbon dioxide, which causes reduction in the alkalinity of concrete. The literature reports several ways to decrease or to prevent reinforcement corrosion. Among them, the use of corrosion inhibitors has been an envisaged solution. Two approaches are generally used to evaluate the efficiency of inhibitors for concrete application; one uses simulated pore solution testing , and the other uses actual concrete or mortar specimens. Both methods are some times used in conjunction. The aim of this study is to investigate the use of 2,3-diaminopyridine as a corrosion inhibitors of steel in alkaline media which simulate the electrolyte in the concrete pores. The effectiveness of this compound as corrosion inhibitor was investigated by measuring the corrosion potentials, the polarization curves and the corrosion current densities of steel with and without chlorides. The study of corrosion inhibition by this compound led to the conclusion that he has low rates of inhibition in the absence of aggressive ions and high rates in their presence. This type of organic compounds are promoting for the protection of armatures in concrete.

Keywords: corrosion, inhibitors, mild steel, conjunction

Procedia PDF Downloads 427
22752 Introducing α-Oxoester (COBz) as a Protecting Group for Carbohydrates

Authors: Atul Kumar, Veeranjaneyulu Gannedi, Qazi Naveed Ahmed

Abstract:

Oligosaccharides, which are essential to all cellular organisms, play vital roles in cell recognition, signaling, and are involved in a broad range of biological processes. The chemical synthesis of carbohydrates represents a powerful tool to provide homogeneous glycans. In carbohydrate synthesis, the major concern is the orthogonal protection of hydroxyl groups that can be unmasked independently. Classical protecting groups include benzyl ethers (Bn), which are normally cleaved through hydrogenolysis or by means of metal reduction, and acetate (Ac), benzoate (Bz) or pivaloate esters, which are removed using base promoted hydrolysis. In present work a series of α-Oxoester (COBz) protected saccharides, with divergent base sensitivity profiles against benzoyl (Bz) and acetyl (Ac), were designed and KHSO₅/CH₃COCl in methanol was identified as an easy, mild, selective and efficient deprotecting reagent for their removal in the perspective of carbohydrate synthesis. Timely monitoring of later reagent was advantageous in establishing both sequential as well as simultaneous deprotecting of COBz, Bz, and Ac. The salient feature of our work is its ease to generate different acceptors using designed monosaccharides. In summary, we demonstrated α-Oxoester (COBz) as a new protecting group for carbohydrates and the application of this group for the synthesis of Glycosylphosphatidylinositol (GPI) anchor are in progress.

Keywords: α-Oxoester, oligosaccharides, new protecting group, acceptor synthesis, glycosylation

Procedia PDF Downloads 135
22751 In vitro Antiviral Activity of Ocimum sanctum against Animal Viruses

Authors: Anjana Goel, Ashok Kumar Bhatia

Abstract:

Ocimum sanctum, a well known medicinal plant is used for various alignments in Ayurvedic medicines. It was found to be effective in treating the humans suffering from different viral infections like chicken pox, small pox, measles and influenza. In addition, curative effect of the plant in malignant patients was also reported. In the present study, leaves of this plant were screened against animal viruses i.e. Bovine Herpes Virus-type-1 (BHV-1), Foot and Mouth disease virus (FMDV) and Newcastle Disease Virus (NDV). BHV-1 and FMDV were screened in MDBK and BHK cell lines respectively using cytopathic inhibition test. While NDV was propagated in chick embryo fibroblast culture and tested by haemagglutination inhibition test. Maximum non toxic dose of aqueous extract of Ocimum sanctum leaves was calculated by MTT assay in all the cell cultures and nontoxic doses were used for antiviral activity against viruses. 98.4% and 85.3% protection were recorded against NDV and BHV-1 respectively. However, Ocimum sanctum extract failed to show any inhibitory effect on the cytopathic effect caused by FMD virus. It can be concluded that Ocimum sanctum is a very effective remedy for curing viral infections in animals also.

Keywords: bovine herpes virus-type-1, foot and mouth disease virus, newcastle disease virus, Ocimum sanctum

Procedia PDF Downloads 254
22750 A QoS Aware Cluster Based Routing Algorithm for Wireless Mesh Network Using LZW Lossless Compression

Authors: J. S. Saini, P. P. K. Sandhu

Abstract:

The multi-hop nature of Wireless Mesh Networks and the hasty progression of throughput demands results in multi- channels and multi-radios structures in mesh networks, but the main problem of co-channels interference reduces the total throughput, specifically in multi-hop networks. Quality of Service mentions a vast collection of networking technologies and techniques that guarantee the ability of a network to make available desired services with predictable results. Quality of Service (QoS) can be directed at a network interface, towards a specific server or router's performance, or in specific applications. Due to interference among various transmissions, the QoS routing in multi-hop wireless networks is formidable task. In case of multi-channel wireless network, since two transmissions using the same channel may interfere with each other. This paper has considered the Destination Sequenced Distance Vector (DSDV) routing protocol to locate the secure and optimised path. The proposed technique also utilizes the Lempel–Ziv–Welch (LZW) based lossless data compression and intra cluster data aggregation to enhance the communication between the source and the destination. The use of clustering has the ability to aggregate the multiple packets and locates a single route using the clusters to improve the intra cluster data aggregation. The use of the LZW based lossless data compression has ability to reduce the data packet size and hence it will consume less energy, thus increasing the network QoS. The MATLAB tool has been used to evaluate the effectiveness of the projected technique. The comparative analysis has shown that the proposed technique outperforms over the existing techniques.

Keywords: WMNS, QOS, flooding, collision avoidance, LZW, congestion control

Procedia PDF Downloads 323
22749 Particulate Pollution and Its Effect on Respiratory Symptoms of Exposed Personnel's in Three Heavy Traffic Cities (Roads), Kathmandu, Nepal

Authors: Sujen Man Shrestha, Kanchan Thapa, Tista Prasai Joshi

Abstract:

Background: The present study was carried out to determine suspended particles and respirable particles of diameter less than 1 micrometers (PM1) on road side and some distance of outside from road; and to compare the respiratory symptoms between traffic police men and shop keepers directly 'exposed' to traffic fumes and office worker stay in 'protected' enclosed environment. Methods: Semi structured questionnaire was used to collect the data among case and control after getting verbal informed consent among the convenience sample of traffic police, shopkeepers and officials in three different locations in Kathmandu. Secondary data analysis of hospital data of three hospitals of Kathmandu was also performed. The data on air Particulate Matter was taken by Haz Dust. Results: The result showed air quality of road side traffic is unhealthy and there was increasing trends of respiratory illness in hospital outpatient department (OPD). The people who were exposed found to have more risk of developing respiratory diseases symptoms. Conclusions: The study concluded that air pollution level is strong contributing factor for respiratory diseases and further recommended strong, epidemiological studies with larger sample size, less bias, and also measuring other significant physical and chemicals parameters of air pollution.

Keywords: heavy traffic cities, Kathmandu, particulate pollution, respiratory symptoms

Procedia PDF Downloads 287
22748 A Survey of Domain Name System Tunneling Attacks: Detection and Prevention

Authors: Lawrence Williams

Abstract:

As the mechanism which converts domains to internet protocol (IP) addresses, Domain Name System (DNS) is an essential part of internet usage. It was not designed securely and can be subject to attacks. DNS attacks have become more frequent and sophisticated and the need for detecting and preventing them becomes more important for the modern network. DNS tunnelling attacks are one type of attack that are primarily used for distributed denial-of-service (DDoS) attacks and data exfiltration. Discussion of different techniques to detect and prevent DNS tunneling attacks is done. The methods, models, experiments, and data for each technique are discussed. A proposal about feasibility is made. Future research on these topics is proposed.

Keywords: DNS, tunneling, exfiltration, botnet

Procedia PDF Downloads 62
22747 Comparison of Number of Waves Surfed and Duration Using Global Positioning System and Inertial Sensors

Authors: João Madureira, Ricardo Lagido, Inês Sousa, Fraunhofer Portugal

Abstract:

Surf is an increasingly popular sport and its performance evaluation is often qualitative. This work aims at using a smartphone to collect and analyze the GPS and inertial sensors data in order to obtain quantitative metrics of the surfing performance. Two approaches are compared for detection of wave rides, computing the number of waves rode in a surfing session, the starting time of each wave and its duration. The first approach is based on computing the velocity from the Global Positioning System (GPS) signal and finding the velocity thresholds that allow identifying the start and end of each wave ride. The second approach adds information from the Inertial Measurement Unit (IMU) of the smartphone, to the velocity thresholds obtained from the GPS unit, to determine the start and end of each wave ride. The two methods were evaluated using GPS and IMU data from two surfing sessions and validated with similar metrics extracted from video data collected from the beach. The second method, combining GPS and IMU data, was found to be more accurate in determining the number of waves, start time and duration. This paper shows that it is feasible to use smartphones for quantification of performance metrics during surfing. In particular, detection of the waves rode and their duration can be accurately determined using the smartphone GPS and IMU.

Keywords: inertial measurement unit (IMU), global positioning system (GPS), smartphone, surfing performance

Procedia PDF Downloads 389
22746 Effect of Different Parameters in the Preparation of Antidiabetic Microparticules by Coacervation

Authors: Nawel Ouennoughi, Kamel Daoud

Abstract:

During recent years, new pharmaceutical dosage forms were developed in the research laboratories and which consists of encapsulating one or more active molecules in a polymeric envelope. Several techniques of encapsulation allow obtaining the microparticles or the nanoparticles containing one or several polymers. In the industry, microencapsulation is implemented to fill the following objectives: to ensure protection, the compatibility and the stabilization of an active matter in a formulation, to carry out an adapted working, to improve the presentation of a product, to mask a taste or an odor, to modify and control the profile of release of an active matter to obtain, for example, prolonged or started effect. To this end, we focus ourselves on the encapsulation of the antidiabetic. It is an oral hypoglycemic agent belonging to the second generation of sulfonylurea’s commonly employed in the treatment of type II non-insulin-dependent diabetes in order to improve profile them dissolution. Our choice was made on the technique of encapsulation by complex coacervation with two types of polymers (gelatin and the gum Arabic) which is a physicochemical process. Several parameters were studied at the time of the formulation of the microparticles and the nanoparticles: temperature, pH, ratio of polymers etc. The microparticles and the nanoparticles obtained were characterized by microscopy, laser granulometry, FTIR and UV-visible spectrophotometry. The profile of dissolution obtained for the microparticles showed an improvement of the kinetics of dissolution compared to that obtained for the active ingredient.

Keywords: coacervation, gum Arabic, microencapsulation, gelatin

Procedia PDF Downloads 256
22745 The Arts of Walisanga's Mosques in Java: Structure/Architecture Studies and Its Meaning in Anthropological Perspective

Authors: Slamet Subiyantoro, Mulyanto

Abstract:

Revealing the structure and symbolism meaning of the walisanga’s mosque arts in Java is very important to explain the philosophy of religious foundation which is a manifestation of the norms/ value system and behavior of the Javanese Islam society that support the culture. This research's aims are also to find the structure pattern of walisanga’s mosque and its symbolic meaning in the context of Javanese Islam society. In order to obtain the research objectives, the research were done in several walisanga’s mosques in Java using anthropological approach which is focused on its interpretation and semiotic analysis. The data were collected through interviews with key informants who well informed about the shape and symbolism of walisanga’s mosques in Java. The observation technique is done through visiting walisanga’s mosques to see directly about its structure/ architecture. In completing the information of comprehensive result of the research, it is also used documents and archives as well as any other source which is analyzed to deepen the discussion in answering the problems research. The flow of analysis is done using an interactive model through stages of data collection, data reduction, data presentation and verification. The analysis is done continuously in a cycle system to draw valid conclusions. The research result indicates that the structure/architecture of walisanga’s mosque in Java is structured/built up vertically as well as horizontally. Its structure/architecture is correlated to each other which is having a sacred meaning that is a process represents the mystical belief such as sangkan paraning dumadi and manuggaling kawula gusti.

Keywords: Walisanga’s mosques, Java, structure and architecture, meaning

Procedia PDF Downloads 346
22744 A Distribution Free Test for Censored Matched Pairs

Authors: Ayman Baklizi

Abstract:

This paper discusses the problem of testing hypotheses about the lifetime distributions of a matched pair based on censored data. A distribution free test based on a runs statistic is proposed. Its null distribution and power function are found in a simple convenient form. Some properties of the test statistic and its power function are studied.

Keywords: censored data, distribution free, matched pair, runs statistics

Procedia PDF Downloads 273
22743 Hybrid Approach for Country’s Performance Evaluation

Authors: C. Slim

Abstract:

This paper presents an integrated model, which hybridized data envelopment analysis (DEA) and support vector machine (SVM) together, to class countries according to their efficiency and performance. This model takes into account aspects of multi-dimensional indicators, decision-making hierarchy and relativity of measurement. Starting from a set of indicators of performance as exhaustive as possible, a process of successive aggregations has been developed to attain an overall evaluation of a country’s competitiveness.

Keywords: Artificial Neural Networks (ANN), Support vector machine (SVM), Data Envelopment Analysis (DEA), Aggregations, indicators of performance

Procedia PDF Downloads 321
22742 Visco-Acoustic Full Wave Inversion in the Frequency Domain with Mixed Grids

Authors: Sheryl Avendaño, Miguel Ospina, Hebert Montegranario

Abstract:

Full Wave Inversion (FWI) is a variant of seismic tomography for obtaining velocity profiles by an optimization process that combine forward modelling (or solution of wave equation) with the misfit between synthetic and observed data. In this research we are modelling wave propagation in a visco-acoustic medium in the frequency domain. We apply finite differences for the numerical solution of the wave equation with a mix between usual and rotated grids, where density depends on velocity and there exists a damping function associated to a linear dissipative medium. The velocity profiles are obtained from an initial one and the data have been modeled for a frequency range 0-120 Hz. By an iterative procedure we obtain an estimated velocity profile in which are detailed the remarkable features of the velocity profile from which synthetic data were generated showing promising results for our method.

Keywords: seismic inversion, full wave inversion, visco acoustic wave equation, finite diffrence methods

Procedia PDF Downloads 448
22741 Evaluation of Pheromone and Tree Trap Efficiency in Orthotomicus erosus (Col: Curculionidae: Scolytinae) Monitoring in Pine Forests of Iran

Authors: Sudabe Amini, Jamasb Nozari, Somaye Rahimi

Abstract:

Bark beetles are one of the most destructive groups of pests in the forest and green space. Mediterranean pine Engraver Orthotomicus erosus (Wollston) is the dominant species in the pine forests of Iran. Pine forests are considered a crucial region in the world and need high protection. Although there is no effective control method, mass trapping is the most common method to suppress the bark beetle population. Due to this, from 2018-to 2020, a survey was conducted on bark beetles mass trapping by using two kinds of traps, including pheromone and tree trap. These traps were evaluated in 10 different sites of pine forests. The statistical results proved that significant differences between the pheromone trap and tree trap were observed. It confirmed that the pheromone trap attracted more beetles than the tree trap. The results of this study suggest that the most effective and applicable method in bark beetle’s management of pines forest is using a pheromone trap that suppresses and maintains bark beetle’s population at an economic level, although tree traps attract bark beetles too. In the future, using tree-pheromone traps, which would synergist attraction of more bark beetles, is recommended.

Keywords: bark beetle, pines forest, Orthotomicus erosus, pheromone trap, tree trap

Procedia PDF Downloads 144
22740 Performance Comparison of Situation-Aware Models for Activating Robot Vacuum Cleaner in a Smart Home

Authors: Seongcheol Kwon, Jeongmin Kim, Kwang Ryel Ryu

Abstract:

We assume an IoT-based smart-home environment where the on-off status of each of the electrical appliances including the room lights can be recognized in a real time by monitoring and analyzing the smart meter data. At any moment in such an environment, we can recognize what the household or the user is doing by referring to the status data of the appliances. In this paper, we focus on a smart-home service that is to activate a robot vacuum cleaner at right time by recognizing the user situation, which requires a situation-aware model that can distinguish the situations that allow vacuum cleaning (Yes) from those that do not (No). We learn as our candidate models a few classifiers such as naïve Bayes, decision tree, and logistic regression that can map the appliance-status data into Yes and No situations. Our training and test data are obtained from simulations of user behaviors, in which a sequence of user situations such as cooking, eating, dish washing, and so on is generated with the status of the relevant appliances changed in accordance with the situation changes. During the simulation, both the situation transition and the resulting appliance status are determined stochastically. To compare the performances of the aforementioned classifiers we obtain their learning curves for different types of users through simulations. The result of our empirical study reveals that naïve Bayes achieves a slightly better classification accuracy than the other compared classifiers.

Keywords: situation-awareness, smart home, IoT, machine learning, classifier

Procedia PDF Downloads 407
22739 Efficient Recommendation System for Frequent and High Utility Itemsets over Incremental Datasets

Authors: J. K. Kavitha, D. Manjula, U. Kanimozhi

Abstract:

Mining frequent and high utility item sets have gained much significance in the recent years. When the data arrives sporadically, incremental and interactive rule mining and utility mining approaches can be adopted to handle user’s dynamic environmental needs and avoid redundancies, using previous data structures, and mining results. The dependence on recommendation systems has exponentially risen since the advent of search engines. This paper proposes a model for building a recommendation system that suggests frequent and high utility item sets over dynamic datasets for a cluster based location prediction strategy to predict user’s trajectories using the Efficient Incremental Rule Mining (EIRM) algorithm and the Fast Update Utility Pattern Tree (FUUP) algorithm. Through comprehensive evaluations by experiments, this scheme has shown to deliver excellent performance.

Keywords: data sets, recommendation system, utility item sets, frequent item sets mining

Procedia PDF Downloads 282
22738 The Development of the Website Learning the Local Wisdom in Phra Nakhon Si Ayutthaya Province

Authors: Bunthida Chunngam, Thanyanan Worasesthaphong

Abstract:

This research had objective to develop of the website learning the local wisdom in Phra Nakhon Si Ayutthaya province and studied satisfaction of system user. This research sample was multistage sample for 100 questionnaires, analyzed data to calculated reliability value with Cronbach’s alpha coefficient method α=0.82. This system had 3 functions which were system using, system feather evaluation and system accuracy evaluation which the statistics used for data analysis was descriptive statistics to explain sample feature so these statistics were frequency, percentage, mean and standard deviation. This data analysis result found that the system using performance quality had good level satisfaction (4.44 mean), system feather function analysis had good level satisfaction (4.11 mean) and system accuracy had good level satisfaction (3.74 mean).

Keywords: website, learning, local wisdom, Phra Nakhon Si Ayutthaya province

Procedia PDF Downloads 107
22737 Brain-Computer Interfaces That Use Electroencephalography

Authors: Arda Ozkurt, Ozlem Bozkurt

Abstract:

Brain-computer interfaces (BCIs) are devices that output commands by interpreting the data collected from the brain. Electroencephalography (EEG) is a non-invasive method to measure the brain's electrical activity. Since it was invented by Hans Berger in 1929, it has led to many neurological discoveries and has become one of the essential components of non-invasive measuring methods. Despite the fact that it has a low spatial resolution -meaning it is able to detect when a group of neurons fires at the same time-, it is a non-invasive method, making it easy to use without possessing any risks. In EEG, electrodes are placed on the scalp, and the voltage difference between a minimum of two electrodes is recorded, which is then used to accomplish the intended task. The recordings of EEGs include, but are not limited to, the currents along dendrites from synapses to the soma, the action potentials along the axons connecting neurons, and the currents through the synaptic clefts connecting axons with dendrites. However, there are some sources of noise that may affect the reliability of the EEG signals as it is a non-invasive method. For instance, the noise from the EEG equipment, the leads, and the signals coming from the subject -such as the activity of the heart or muscle movements- affect the signals detected by the electrodes of the EEG. However, new techniques have been developed to differentiate between those signals and the intended ones. Furthermore, an EEG device is not enough to analyze the data from the brain to be used by the BCI implication. Because the EEG signal is very complex, to analyze it, artificial intelligence algorithms are required. These algorithms convert complex data into meaningful and useful information for neuroscientists to use the data to design BCI devices. Even though for neurological diseases which require highly precise data, invasive BCIs are needed; non-invasive BCIs - such as EEGs - are used in many cases to help disabled people's lives or even to ease people's lives by helping them with basic tasks. For example, EEG is used to detect before a seizure occurs in epilepsy patients, which can then prevent the seizure with the help of a BCI device. Overall, EEG is a commonly used non-invasive BCI technique that has helped develop BCIs and will continue to be used to detect data to ease people's lives as more BCI techniques will be developed in the future.

Keywords: BCI, EEG, non-invasive, spatial resolution

Procedia PDF Downloads 58
22736 Unravelling the Knot: Towards a Definition of ‘Digital Labor’

Authors: Marta D'Onofrio

Abstract:

The debate on the digitalization of the economy has raised questions about how both labor and the regulation of work processes are changing due to the introduction of digital technologies in the productive system. Within the literature, the term ‘digital labor’ is commonly used to identify the impact of digitalization on labor. Despite the wide use of this term, it is still not available an unambiguous definition of it, and this could create confusion in the use of terminology and in the attempts of classification. As a consequence, the purpose of this paper is to provide for a definition and to propose a classification of ‘digital labor’, resorting to the theoretical approach of organizational studies.

Keywords: digital labor, digitalization, data-driven algorithms, big data, organizational studies

Procedia PDF Downloads 137
22735 Analytical Evaluation on Hysteresis Performance of Circular Shear Panel Damper

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

The idea of adding metallic energy dissipaters to a structure to absorb a large part of the seismic energy began four decades ago. There are several types of metal-based devices conceived as dampers for the seismic energy absorber whereby damages to the major structural components could be minimized for both new and existing structures. This paper aimed to develop and evaluate structural performance of both stiffened and non stiffened circular shear panel damper for passive seismic energy protection by inelastic deformation. Structural evaluation was done using commercially available nonlinear FE simulation program. Diameter-to-thickness ratio is employed as main parameter to investigate the hysteresis performance of stiffened and unstiffened circular shear panel. Depending on these parameters three different buckling mode and hysteretic behavior was found: yielding prior to buckling without strength degradation, yielding prior to buckling with strength degradation and yielding with buckling and strength degradation which forms pinching at initial displacement. Hence, the hysteresis behavior is identified, specimens which deform without strength degradation so it will be used as passive energy dissipating device in civil engineering structures.

Keywords: circular shear panel damper, FE analysis, hysteretic behavior, large deformation

Procedia PDF Downloads 374
22734 Efficient Antenna Array Beamforming with Robustness against Random Steering Mismatch

Authors: Ju-Hong Lee, Ching-Wei Liao, Kun-Che Lee

Abstract:

This paper deals with the problem of using antenna sensors for adaptive beamforming in the presence of random steering mismatch. We present an efficient adaptive array beamformer with robustness to deal with the considered problem. The robustness of the proposed beamformer comes from the efficient designation of the steering vector. Using the received array data vector, we construct an appropriate correlation matrix associated with the received array data vector and a correlation matrix associated with signal sources. Then, the eigenvector associated with the largest eigenvalue of the constructed signal correlation matrix is designated as an appropriate estimate of the steering vector. Finally, the adaptive weight vector required for adaptive beamforming is obtained by using the estimated steering vector and the constructed correlation matrix of the array data vector. Simulation results confirm the effectiveness of the proposed method.

Keywords: adaptive beamforming, antenna array, linearly constrained minimum variance, robustness, steering vector

Procedia PDF Downloads 186