Search results for: strategic communication
1934 Interactive Systems in B2B Marketing: Perceptions of Sales Configurator Use
Authors: Tommi Mahlamaki, Mika Ojala
Abstract:
Digitalization is changing our lives in many ways. As consumers, we are accustomed using different online interactive sales systems. However, while many online selling sites offer systems that have evolved from simple selling functions, the change has not been as rapid in business-to-business (B2B) markets. This is because many B2B companies rely on personal sales and personal communication. The main objective of this research is to clarify perceptions towards digital interactive sales systems and, more specifically, sales configurators. It also aims to identify trends towards the use of sales configurators. To reach these objectives, an online questionnaire was created that targets Finnish B2B distributors who are, by definition, part of B2B markets. The questionnaire was sent to 340 distributors, and it was returned by 150 respondents. The results showed that 82% of respondents had heard about sales configurators, and 64% had used them. The results also showed that 48% of respondents felt that the use of sales configurators would increase in the future, while only 2% felt they would be used less. The future use of sales configurators was not seen as affecting the level of personal sales. In light of the results, we recommend that B2B companies create marketing strategies that integrate and complement traditional sales processes with digital interactive systems.Keywords: digitalization, interactive systems, marketing, sales process
Procedia PDF Downloads 2471933 Integration of Building Information Modeling Framework for 4D Constructability Review and Clash Detection Management of a Sewage Treatment Plant
Authors: Malla Vijayeta, Y. Vijaya Kumar, N. Ramakrishna Raju, K. Satyanarayana
Abstract:
Global AEC (architecture, engineering, and construction) industry has been coined as one of the most resistive domains in embracing technology. Although this digital era has been inundated with software tools like CAD, STADD, CANDY, Microsoft Project, Primavera etc. the key stakeholders have been working in siloes and processes remain fragmented. Unlike the yesteryears’ simpler project delivery methods, the current projects are of fast-track, complex, risky, multidisciplinary, stakeholder’s influential, statutorily regulative etc. pose extensive bottlenecks in preventing timely completion of projects. At this juncture, a paradigm shift surfaced in construction industry, and Building Information Modeling, aka BIM, has been a panacea to bolster the multidisciplinary teams’ cooperative and collaborative work leading to productive, sustainable and leaner project outcome. Building information modeling has been integrative, stakeholder engaging and centralized approach in providing a common platform of communication. A common misconception that BIM can be used for building/high rise projects in Indian Construction Industry, while this paper discusses of the implementation of BIM processes/methodologies in water and waste water industry. It elucidates about BIM 4D planning and constructability reviews of a Sewage Treatment Plant in India. Conventional construction planning and logistics management involves a blend of experience coupled with imagination. Even though the excerpts or judgments or lessons learnt gained from veterans might be predictive and helpful, but the uncertainty factor persists. This paper shall delve about the case study of real time implementation of BIM 4D planning protocols for one of the Sewage Treatment Plant of Dravyavati River Rejuvenation Project in India and develops a Time Liner to identify logistics planning and clash detection. With this BIM processes, we shall find that there will be significant reduction of duplication of tasks and reworks. Also another benefit achieved will be better visualization and workarounds during conception stage and enables for early involvement of the stakeholders in the Project Life cycle of Sewage Treatment Plant construction. Moreover, we have also taken an opinion poll of the benefits accrued utilizing BIM processes versus traditional paper based communication like 2D and 3D CAD tools. Thus this paper concludes with BIM framework for Sewage Treatment Plant construction which will achieve optimal construction co-ordination advantages like 4D construction sequencing, interference checking, clash detection checking and resolutions by primary engagement of all key stakeholders thereby identifying potential risks and subsequent creation of risk response strategies. However, certain hiccups like hesitancy in adoption of BIM technology by naïve users and availability of proficient BIM trainers in India poses a phenomenal impediment. Hence the nurture of BIM processes from conception, construction and till commissioning, operation and maintenance along with deconstruction of a project’s life cycle is highly essential for Indian Construction Industry in this digital era.Keywords: integrated BIM workflow, 4D planning with BIM, building information modeling, clash detection and visualization, constructability reviews, project life cycle
Procedia PDF Downloads 1221932 Radio-Frequency Identification (RFID) Based Smart Helmet for Coal Miners
Authors: Waheeda Jabbar, Ali Gul, Rida Noor, Sania Kurd, Saba Gulzar
Abstract:
Hundreds of miners die from mining accidents each year due to poisonous gases found underground mining areas. This paper proposed an idea to protect the precious lives of mining workers. A supervising system is designed which is based on ZigBee wireless technique along with the smart protective helmets to detect real-time surveillance and it gives early warnings on presence of different poisonous gases in order to save mineworkers from any danger caused by these poisonous gases. A wireless sensor network is established using ZigBee wireless technique by integrating sensors on the helmet, apart from this helmet have embedded heartbeat sensor to detect the pulse rate and be aware of the physical or mental strength of a mineworker to increase the potential safety. Radio frequency identification (RFID) technology is used to find the location of workers. A ZigBee based base station is set-upped to control the communication. The idea is implemented and results are verified through experiment.Keywords: Arduino, gas sensor (MQ7), RFID, wireless ZigBee
Procedia PDF Downloads 4561931 CLEAN Jakarta Waste Bank Project: Alternative Solution in Urban Solid Waste Management by Community Based Total Sanitation (CBTS) Approach
Authors: Mita Sirait
Abstract:
Everyday Jakarta produces 7,000 tons of solid waste and only about 5,200 tons delivered to landfill out of the city by 720 trucks, the rest are left yet manageable, as reported by Government of Clean Sector. CLEAN Jakarta Project is aimed at empowering community to achieve healthy environment for children and families in urban slum in Semper Barat and Penjaringan sub-district of North Jakarta that consisted of 20,584 people. The project applies Community Based Total Sanitation, an approach to empowering community to achieve total hygiene and sanitation behaviour by triggering activities. As regulated by Ministry of Health, it has 5 pillars: (1) open defecation free, (2) hand-washing with soaps, (3) drinking-water treatment, (4) solid-waste management and (5) waste-water management; and 3 strategic components: 1) demand creation, 2) supply creation and 3) enabling environment. Demand creation is generated by triggering community’s reaction to their daily sanitation habits by exposing them to their surrounding where they can see faeces, waste and other environmental pollutant to stimulate disgusting, embarrassing and responsibility sense. Triggered people then challenged to commit to improving their hygiene practice such as to stop littering and start waste separation. In order to support this commitment, and for supply creation component, the project initiated waste bank with community working group. It facilitated capacity-building trainings, waste bank system formulation and meetings with local authorities to solicit land permit and waste bank decree. As it is of a general banking system, waste bank has customer service, teller, manager, legal paper and provides saving book and money transaction. In 8 months, two waste banks have established with 148 customers, 17 million rupiah cash, and about 9 million of stored recyclables. Approximately 2.5 tons of 15-35 types of recyclable are managed in both waste banks per week. On enabling environment, the project has initiated sanitation working group in community and multi sectors government level, and advocated both parties. The former is expected to promote behaviour change and monitoring in the community, while the latter is expected to support sanitation with regulations, strategies, appraisal and awards; to coordinate partnering and networking, and to replicate best practices to other areas.Keywords: urban community, waste management, Jakarta, community based total sanitation (CBTS)
Procedia PDF Downloads 2941930 Integrated Information System on Human Resource Management in Project-Based Organizations
Authors: Akbar Farahani, Afsaneh Hassani, Peyman M. Farkhondeh
Abstract:
Human Resource Management as one of the core processes of the project-based companies, despite its key role in the success and competitive advantage, is relatively unknown. In the project-based companies, due to the accelerated movement of knowledge in the work activities and the temporary nature of the project, the need to develop mechanisms for achieving optimal management of this issues is very challenging. Approach to human resource management in these companies evolves with goals, strategies, and operational processes. Therefore, the need for appropriate tools to facilitate implementation of the optimized human resource management in the project is more than before,Which currently with the development of information technology and modern communication, appropriate to address the optimal approach for dynamic management of human resources in the project have been provided.This is done by using the referral system implemented in Mahab GCE that provides 1: the ability to use humans in projects without geographic limitation and 2:information on the activities and outcomes of referrals.Furthermore, by using this system, recording the lessons learned after any particular activity on projects,accessing quantitative information, procedures, documentation of learned practices that have been stored in the data base as well as using them in future projects is provided.Keywords: human resource management, project base company, ERP, referrals system
Procedia PDF Downloads 4771929 3D Plant Growth Measurement System Using Deep Learning Technology
Authors: Kazuaki Shiraishi, Narumitsu Asai, Tsukasa Kitahara, Sosuke Mieno, Takaharu Kameoka
Abstract:
The purpose of this research is to facilitate productivity advances in agriculture. To accomplish this, we developed an automatic three-dimensional (3D) recording system for growth of field crops that consists of a number of inexpensive modules: a very low-cost stereo camera, a couple of ZigBee wireless modules, a Raspberry Pi single-board computer, and a third generation (3G) wireless communication module. Our system uses an inexpensive Web stereo camera in order to keep total costs low. However, inexpensive video cameras record low-resolution images that are very noisy. Accordingly, in order to resolve these problems, we adopted a deep learning method. Based on the results of extended period of time operation test conducted without the use of an external power supply, we found that by using Super-Resolution Convolutional Neural Network method, our system could achieve a balance between the competing goals of low-cost and superior performance. Our experimental results showed the effectiveness of our system.Keywords: 3D plant data, automatic recording, stereo camera, deep learning, image processing
Procedia PDF Downloads 2731928 Modern Trends in Foreign Direct Investments in Georgia
Authors: Rusudan Kinkladze, Guguli Kurashvili, Ketevan Chitaladze
Abstract:
Foreign direct investment is a driving force in the development of the interdependent national economies, and the study and analysis of investments is an urgent problem. It is particularly important for transitional economies, such as Georgia, and the study and analysis of investments is an urgent problem. Consequently, the goal of the research is the study and analysis of direct foreign investments in Georgia, and identification and forecasting of modern trends, and covers the period of 2006-2015. The study uses the methods of statistical observation, grouping and analysis, the methods of analytical indicators of time series, trend identification and the predicted values are calculated, as well as various literary and Internet sources relevant to the research. The findings showed that modern investment policy In Georgia is favorable for domestic as well as foreign investors. Georgia is still a net importer of investments. In 2015, the top 10 investing countries was led by Azerbaijan, United Kingdom and Netherlands, and the largest share of FDIs were allocated in the transport and communication sector; the financial sector was the second, followed by the health and social work sector, and the same trend will continue in the future.Keywords: foreign direct investments, methods, statistics, analysis
Procedia PDF Downloads 3321927 Integrating ICT in Teaching and Learning English in the Algerian Classroom
Authors: A. Tahar Djebbar
Abstract:
Modern technologies have penetrated all spheres of human life, education being one of them. This paper focuses the attention on the integration of technology-based education in the Algerian classroom in teaching foreign languages. It sheds light on a specific area of ICT application: ICT in English learning and teaching. Some Algerian teachers or tutors of English face many challenges among which the lack of teaching materials which are indispensable for transmitting knowledge to learners. Thus, they find themselves compelled to use online e-books or download them in PDF form to support their lessons. Teachers even download such teaching materials like pictures, videos, audios, podcasts, and flash cards from the internet and store them in their Flash USBs to shape up the teaching-learning conditions. They use computers, data shows, and the internet so as to facilitate the teaching–learning process in the classroom. Hence, technology has become a must in the Algerian classroom especially in teaching English which has become a very important language in a national and an international level. This study aims at showing that Algerian tutors/teachers who take up the challenge of getting involved in the technology-enhanced language learning and teaching in the Algerian schools and universities face many obstacles.Keywords: computer, communication, English, internet, learners, language acquisition, teaching, technology
Procedia PDF Downloads 6461926 Simulator Dynamic Positioning System with Azimuthal Thruster
Authors: Robson C. Santos, Christian N. Barreto, Gerson G. Cunha, Severino J. C. Neto
Abstract:
This paper aims to project the construction of a prototype azimuthal thruster, mounted with materials of low cost and easy access, testing in a controlled environment to measure their performance, characteristics and feasibility of future projects. The construction of the simulation of dynamic positioning software, responsible for simulating a vessel and reposition it when necessary . Tests for partial and full validation of the model were conducted, operates independently of the control system and executes the commands and commands of the helix of rotation azimuth. The system provides an interface to the user and simulates the conditions unfavorable positioning of a vessel, accurately calculates the azimuth angle, the direction of rotation of the helix and the time that this should be turned on so that the vessel back to position original. There is a serial communication that connects the Simulation Dynamic Positioning System with Embedded System causing the user-generated data to simulate the DP system arrives in the form of control signals to the motors of the propellant. This article addresses issues in the marine industry employees.Keywords: azimuthal thruster, dynamic positioning, embedded system, simulator dynamic positioning
Procedia PDF Downloads 4671925 DOA Estimation Using Golden Section Search
Authors: Niharika Verma, Sandeep Santosh
Abstract:
DOA technique is a localization technique used in the communication field. Various algorithms have been developed for direction of arrival estimation like MUSIC, ROOT MUSIC, etc. These algorithms depend on various parameters like antenna array elements, number of snapshots and various others. Basically the MUSIC spectrum is evaluated and peaks obtained are considered as the angle of arrivals. The angles evaluated using this process depends on the scanning interval chosen. The accuracy of the results obtained depends on the coarseness of the interval chosen. In this paper, golden section search is applied to the MUSIC algorithm and therefore, more accurate results are achieved. Initially the coarse DOA estimations is done using the MUSIC algorithm in the range -90 to 90 degree at the interval of 10 degree. After the peaks obtained then fine DOA estimation is done using golden section search. Also, the partitioning method is applied to estimate the number of signals incident on the antenna array. Dependency of the algorithm on the number of snapshots is also being explained. Hence, the accurate results are being determined using this algorithm.Keywords: Direction of Arrival (DOA), golden section search, MUSIC, number of snapshots
Procedia PDF Downloads 4471924 5G Future Hyper-Dense Networks: An Empirical Study and Standardization Challenges
Authors: W. Hashim, H. Burok, N. Ghazaly, H. Ahmad Nasir, N. Mohamad Anas, A. F. Ismail, K. L. Yau
Abstract:
Future communication networks require devices that are able to work on a single platform but support heterogeneous operations which lead to service diversity and functional flexibility. This paper proposes two cognitive mechanisms termed cognitive hybrid function which is applied in multiple broadband user terminals in order to maintain reliable connectivity and preventing unnecessary interferences. By employing such mechanisms especially for future hyper-dense network, we can observe their performances in terms of optimized speed and power saving efficiency. Results were obtained from several empirical laboratory studies. It was found that selecting reliable network had shown a better optimized speed performance up to 37% improvement as compared without such function. In terms of power adjustment, our evaluation of this mechanism can reduce the power to 5dB while maintaining the same level of throughput at higher power performance. We also discuss the issues impacting future telecommunication standards whenever such devices get in place.Keywords: dense network, intelligent network selection, multiple networks, transmit power adjustment
Procedia PDF Downloads 3801923 'Sea Power: Concept, Influence and Securitization'; the Nigerian Navy's Role in a Developing State like Nigeria
Authors: William Abiodun Duyile
Abstract:
It is common knowledge that marine food has always been found from the sea, energy can also be found underneath and, to a growing extent; other mineral resources have come from the sea spaces. It is the importance of the sea and the sea lines of communication to littoral nations that has made concepts such as sea power, naval power, etc., significant to them. The study relied on documentary data. The documentary data were sourced from government annual departmental reports, newspapers and correspondence. The secondary sources used were subjected to internal and external criticism for authentication, and then to textual and contextual analyses. The study found that the differential level of seamanship amongst states defined their relationship. It was sea power that gave some states an edge over the others. The study proves that over the ages sea power has been core to the development of States or Empires. The study found that the Nigerian Navy was centre to Nigeria’s conquest of the littoral areas of Biafra, like Bonny, Port-Harcourt, and Calabar; it was also an important turning point of the Nigerian civil war since by it Biafra became landlocked. The research was able to identify succinctly the Nigerian Navy’s contribution to the security and development of the Nigerian State.Keywords: sea power, naval power, land locked states, warship
Procedia PDF Downloads 1391922 Heterogeneous Reactions to Digital Opportunities: A Field Study
Authors: Bangaly Kaba
Abstract:
In the global information society, the importance of the Internet cannot be overemphasized. Africa needs access to the powerful information and communication tools of the Internet in order to obtain the resources and efficiency essential for sustainable development. Unfortunately, in 2013, the data from Internetworldstats showed only 15% of African populations have access to Internet. This relative low Internet penetration rate signals a problem that may threaten the economic development, governmental efficiency, and ultimately the global competitiveness of African countries. Many initiatives were undertaken to bring the benefits of the global information revolution to the people of Africa, through connection to the Internet and other Global Information Infrastructure technologies. The purpose is to understand differences between socio-economically advantaged and disadvantaged internet users. From that, we will determine what prevents disadvantaged groups from benefiting from Internet usage. Data were collected through a survey from Internet users in Ivory Coast. The results reveal that Personal network exposure, Self-efficacy and Availability are the key drivers of continued use intention for the socio-economically disadvantaged group. The theoretical and practical implications are also described.Keywords: digital inequality, internet, integrative model, socio-economically advantaged and disadvantaged, use continuance, Africa
Procedia PDF Downloads 4691921 Examining Smallholder Farmers’ Perceptions of Climate Change and Barriers to Strategic Adaptation in Todee District, Liberia
Authors: Joe Dorbor Wuokolo
Abstract:
Thousands of smallholder farmers in Todee District, Montserrado county, are currently vulnerable to the negative impact of climate change. The district, which is the agricultural hot spot for the county, is faced with unfavorable changes in the daily temperature due to climate change. Farmers in the district have observed a dramatic change in the ratio of rainfall to sunshine, which has caused a chilling effect on their crop yields. However, there is a lack of documentation regarding how farmers perceive and respond to these changes and challenges. A study was conducted in the region to examine the perceptions of smallholder farmers regarding the negative impact of climate change, the adaptation strategies practice, and the barriers that hinder the process of advancing adaptation strategy. On purpose, a sample of 41 respondents from five towns was selected, including five town chiefs, five youth leaders, five women leaders, and sixteen community members. Women and youth leaders were specifically chosen to provide gender balance and enhance the quality of the investigation. Additionally, to validate the barriers farmers face during adaptation to climate change, this study interviewed eight experts from local and international organizations and government ministries and agencies involved in climate change and agricultural programs on what they perceived as the major barrier in both local and national level that impede farmers adaptation to climate change impact. SPSS was used to code the data, and descriptive statistics were used to analyze the data. The weighted average index (WAI) was used to rank adaptation strategies and the perceived importance of adaptation practices among farmers. On a scale from 0 to 3, 0 indicates the least important technique, and 3 indicates the most effective technique. In addition, the Problem Confrontation Index (PCI) was used to rank the barriers that prevented farmers from implementing adaptation measures. According to the findings, approximately 60% of all respondents considered the use of irrigation systems to be the most effective adaptation strategy, with drought-resistant varieties making up 30% of the total. Additionally, 80% of respondents placed a high value on drought-resistant varieties, while 63% percent placed it on irrigation practices. In addition, 78% of farmers ranked and indicated that unpredictability of the weather is the most significant barrier to their adaptation strategies, followed by the high cost of farm inputs and lack of access to financing facilities. 80% of respondents believe that the long-term changes in precipitation (rainfall) and temperature (hotness) are accelerating. This suggests that decision-makers should adopt policies and increase the capacity of smallholder farmers to adapt to the negative impact of climate change in order to ensure sustainable food production.Keywords: adaptation strategies, climate change, farmers’ perception, smallholder farmers
Procedia PDF Downloads 831920 Reusing Assessments Tests by Generating Arborescent Test Groups Using a Genetic Algorithm
Authors: Ovidiu Domşa, Nicolae Bold
Abstract:
Using Information and Communication Technologies (ICT) notions in education and three basic processes of education (teaching, learning and assessment) can bring benefits to the pupils and the professional development of teachers. In this matter, we refer to these notions as concepts taken from the informatics area and apply them to the domain of education. These notions refer to genetic algorithms and arborescent structures, used in the specific process of assessment or evaluation. This paper uses these kinds of notions to generate subtrees from a main tree of tests related between them by their degree of difficulty. These subtrees must contain the highest number of connections between the nodes and the lowest number of missing edges (which are subtrees of the main tree) and, in the particular case of the non-existence of a subtree with no missing edges, the subtrees which have the lowest (minimal) number of missing edges between the nodes, where a node is a test and an edge is a direct connection between two tests which differs by one degree of difficulty. The subtrees are represented as sequences. The tests are the same (a number coding a test represents that test in every sequence) and they are reused for each sequence of tests.Keywords: chromosome, genetic algorithm, subtree, test
Procedia PDF Downloads 3251919 Energy-Efficient Internet of Things Communications: A Comparative Study of Long-Term Evolution for Machines and Narrowband Internet of Things Technologies
Authors: Nassim Labdaoui, Fabienne Nouvel, Stéphane Dutertre
Abstract:
The Internet of Things (IoT) is emerging as a crucial communication technology for the future. Many solutions have been proposed, and among them, licensed operators have put forward LTE-M and NB-IoT. However, implementing these technologies requires a good understanding of the device energy requirements, which can vary depending on the coverage conditions. In this paper, we investigate the power consumption of LTE-M and NB-IoT devices using Ublox SARA-R422S modules based on relevant standards from two French operators. The measurements were conducted under different coverage conditions, and we also present an empirical consumption model based on the different states of the radio modem as per the RRC protocol specifications. Our findings indicate that these technologies can achieve a 5 years operational battery life under certain conditions. Moreover, we conclude that the size of transmitted data does not have a significant impact on the total power consumption of the device under favorable coverage conditions. However, it can quickly influence the battery life of the device under harsh coverage conditions. Overall, this paper offers insights into the power consumption of LTE-M and NBIoT devices and provides useful information for those considering the use of these technologies.Keywords: internet of things, LTE-M, NB-IoT, MQTT, cellular IoT, power consumption
Procedia PDF Downloads 1431918 Guide to the Development of the Intensive English Program for Graduate Students
Authors: Piyawan Sunasuan, Thiranan Pansuppawat, Mananya Manaratchasak, Maream Nillapun
Abstract:
This research aims to guide the development of the intensive English program for graduate students. The objectives are 1) to study the English skills in which needed for the graduate students and 2) to study the potential of the current course with the expected proficiency level. The samples are 46 graduate students enrolled in the ENG 102 and ENG 103 courses of the school year of 2019/2020 in semester one from the Silpakorn University, Sanamchandra Palace Campus, and two teachers. The researchers use 1) student survey, 2) teacher interview, and 3) focus group discussion among selected students. The data is analyzed by calculating the mean (x̅), the standard deviation, and document analysis. The findings show that nine skills are in the need of the course development; 1) academic writing 2) occupational purpose writing 3) communicative reading 4) occupational purpose reading 5) academic speaking 6) occupational purpose speaking 7) occupational purpose listening 8) academic listening and 9) communicative listening. The current course does not meet the expectation on a high level but has potential.Keywords: English for academic purposes, English for communication, English for occupational purposes, intensive English
Procedia PDF Downloads 1481917 Bandwidth Efficient Cluster Based Collision Avoidance Multicasting Protocol in VANETs
Authors: Navneet Kaur, Amarpreet Singh
Abstract:
In Vehicular Adhoc Networks, Data Dissemination is a challenging task. There are number of techniques, types and protocols available for disseminating the data but in order to preserve limited bandwidth and to disseminate maximum data over networks makes it more challenging. There are broadcasting, multicasting and geocasting based protocols. Multicasting based protocols are found to be best for conserving the bandwidth. One such protocol named BEAM exists that improves the performance of Vehicular Adhoc Networks by reducing the number of in-network message transactions and thereby efficiently utilizing the bandwidth during an emergency situation. But this protocol may result in multicar chain collision as there was no V2V communication. So, this paper proposes a new protocol named Enhanced Bandwidth Efficient Cluster Based Multicasting Protocol (EBECM) that will overcome the limitations of existing BEAM protocol. And Simulation results will show the improved performance of EBECM in terms of Routing overhead, throughput and PDR when compared with BEAM protocol.Keywords: BEAM, data dissemination, emergency situation, vehicular adhoc network
Procedia PDF Downloads 3491916 A Study of Using Different Printed Circuit Board Design Methods on Ethernet Signals
Authors: Bahattin Kanal, Nursel Akçam
Abstract:
Data transmission size and frequency requirements are increasing rapidly in electronic communication protocols. Increasing data transmission speeds have made the design of printed circuit boards much more important. It is important to carefully examine the requirements and make analyses before and after the design of the digital electronic circuit board. It delves into impedance matching techniques, signal trace routing considerations, and the impact of layer stacking on signal performance. The paper extensively explores techniques for minimizing crosstalk issues and interference, presenting a holistic perspective on design strategies to optimize the quality of high-speed signals. Through a comprehensive review of these design methodologies, this study aims to provide insights into achieving reliable and high-performance printed circuit board layouts for these signals. In this study, the effect of different design methods on Ethernet signals was examined from the type of S parameters. Siemens company HyperLynx software tool was used for the analyses.Keywords: HyperLynx, printed circuit board, s parameters, ethernet
Procedia PDF Downloads 361915 Slope Instability Study Using Kinematic Analysis and Lineament Density Mapping along a Part of National Highway 58, Uttarakhand, India
Authors: Kush Kumar, Varun Joshi
Abstract:
Slope instability is a major problem of the mountainous region, especially in parts of the Indian Himalayan Region (IHR). The on-going tectonic, rugged topography, steep slope, heavy precipitation, toe erosion, structural discontinuities, and deformation are the main triggering factors of landslides in this region. Besides the loss of life, property, and infrastructure caused by a landslide, it also results in various environmental problems, i.e., degradation of slopes, land use, river quality by increased sediments, and loss of well-established vegetation. The Indian state of Uttarakhand, being a part of the active Himalayas, also faces numerous cases of slope instability. Therefore, the vulnerable landslide zones need to be delineated to safeguard various losses. The study area is focused in Garhwal and Tehri -Garhwal district of Uttarakhand state along National Highway 58, which is a strategic road and also connects the four important sacred pilgrims (Char Dham) of India. The lithology of these areas mainly comprises of sandstone, quartzite of Chakrata formation, and phyllites of Chandpur formation. The greywacke and sandstone rock of Saknidhar formation dips northerly and is overlain by phyllite of Chandpur formation. The present research incorporates the lineament density mapping using remote sensing satellite data supplemented by a detailed field study via kinematic analysis. The DEM data of ALOS PALSAR (12.5 m resolution) is resampled to 10 m resolution and used for preparing various thematic maps such as slope, aspect, drainage, hill shade, lineament, and lineament density using ARCGIS 10.6 software. Furthermore, detailed field mapping, including structural mapping, geomorphological mapping, is integrated for kinematic analysis of the slope using Dips 6.0 software of Rockscience. The kinematic analysis of 40 locations was carried out, among which 15 show the planar type of failure, five-show wedge failure, and rest, 20 show no failures. The lineament density map is overlapped with the location of the unstable slope inferred from kinematic analysis to infer the association of the field information and remote sensing derived information, and significant compatibility was observed. With the help of the present study, location-specific mitigation measures could be suggested. The mitigation measures would be helping in minimizing the probability of slope instability, especially during the rainy season, and reducing the hampering of road traffic.Keywords: Indian Himalayan Region, kinematic analysis, lineament density mapping, slope instability
Procedia PDF Downloads 1401914 The Role of Entrepreneur University in the Development of Entrepreneurship Education
Authors: Ramin Tafazzoli, Rahime Zamanfashami, Amir Mohagheghzadeh
Abstract:
Entrepreneurship is the driving engine of countries’ economic development and has a determinant role in the economic, social and cultural improvement of the societies. Entrepreneurship and its impact on countries’ destiny, result in the planner and policy makers’ attempts to explore and extend it in various aspects. These days, all countries follow their social capital development and human resource quality improvement to achieve the strategic national objectives, economic growth, value creation, cultural dynamism, civil excellence and social solidarity, pursuing the sustainable development based on innovation, entrepreneurial technology , knowledge management and knowledge-focused in various levels and areas. Because of the rapid economic and cultural changes in recent decades and also the emerged need for reinforcing the knowledge-based structures and wealth generation via knowledge, a convenient infrastructure is strongly required for generating science and technology. Devoting attention to entrepreneurship and training and fostering the students who have the essential abilities and skills for creating a suitable business unit, is one of the duties of each university. New expectations necessitate that universities in the development trend by way of entrepreneurship, play a prominent role. Since, higher education has an important role in training and fostering the specialist human resource in the society, attention to the academic entrepreneurship help to develop this issue better. The higher education, relying on its core mission (training and researching) be expected to help the path where exploit and apply the created capabilities and also to cause the development in the society. In this term, the higher education play an essential role to expanse and extent the entrepreneurial concepts by establishing the entrepreneurship universities. Therefore, it is necessary to constitute and establish the entrepreneurship university to solve the problems and improve the development trend. The entrepreneurial courses follow the objectives such as: informing, creating culture, entrepreneurial morality, technical knowledge, entrepreneurial skills transferring, preparing the audiences or researching, job creation, business establishing and its preservation. According to the vision 1404 of Islamic republic of Iran in which the society has to include the advanced knowledge in the field of technology and science generation and also economic growth. In this essay, we investigate the entrepreneurship concepts, entrepreneurship university characteristics, entrepreneurship organizations values, entrepreneurship education process, meanwhile paying attention to that fact which the university can play an essential role in entrepreneurs training by education, culture and science. At the end, we present some suggestion and some solution for obstacles, emphasizing on the vision.Keywords: entrepreneurship, entrepreneur university, higher education, university
Procedia PDF Downloads 4341913 A Comparative Human Rights Analysis of the Securitization of Migration in the Fight against Terrorism in Europe: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
The last quarter of the twentieth century was characterized by the emergence of a new kind of terrorism: religiously-inspired terrorism. Islam finds itself at the heart of this new wave, considering the number of international attacks committed by Islamic-inspired perpetrators. With religiously inspired terrorism as an operating framework, governments increasingly rely on immigration law to counter such terrorism. Immigration law seems particularly useful because its core task consists of keeping ‘unwanted’ people out. Islamic terrorists more often than not have an immigrant background and will be subject to immigration law. As a result, immigration law becomes more and more ‘securitized’. The European migration crisis has reinforced this trend. The research explores the human rights consequences of immigration law’s securitization in Europe. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues but respond very differently to them. The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand also introduced restrictions to its immigration policy but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the situation in Belgium. Through a series of legislative changes, the Belgian parliament (i) greatly expanded the possibilities of expelling foreign nationals for (vaguely defined) reasons of ‘national security’; (ii) abolished almost all procedural protection associated with this decision (iii) broadened, as an extra security measure, the possibility of depriving individuals condemned of terrorism of their Belgian nationality. Measures such as these are obviously problematic from a human rights perspective; they jeopardize the principle of legality, the presumption of innocence, the right to protection of private and family life and the prohibition on torture. Moreover, this contribution also raises questions about the efficacy of immigration law’s suitability as a counterterrorism instrument. Is it a legitimate step, considering the type of terrorism we face today? Or, is it merely a strategic move, considering the broader maneuvering space immigration law offers and the lack of political resistance governments receive when infringing the rights of foreigners? Even more so, figures demonstrate that today’s terrorist threat does not necessarily stem from outside our borders. Does immigration law then still absorb - if it has ever done so (completely) - the threat? The study’s goal is to critically assess, from a human rights perspective, the counterterrorism strategies European governments have adopted. As most governments adopt a variation of the same core concepts, the study’s findings will hold true even beyond the four countries addressed.Keywords: Belgium, counterterrorism strategies, human rights, immigration law
Procedia PDF Downloads 1061912 The OLOS® Way to Cultural Heritage: User Interface with Anthropomorphic Characteristics
Authors: Daniele Baldacci, Remo Pareschi
Abstract:
Augmented Reality and Augmented Intelligence are radically changing information technology. The path that starts from the keyboard and then, passing through milestones such as Siri, Alexa and other vocal avatars, reaches a more fluid and natural communication with computers, thus converting the dichotomy between man and machine into a harmonious interaction, now heads unequivocally towards a new IT paradigm, where holographic computing will play a key role. The OLOS® platform contributes substantially to this trend in that it infuses computers with human features, by transferring the gestures and expressions of persons of flesh and bones to anthropomorphic holographic interfaces which in turn will use them to interact with real-life humans. In fact, we could say, boldly but with a solid technological background to back the statement, that OLOS® gives reality to an altogether new entity, placed at the exact boundary between nature and technology, namely the holographic human being. Holographic humans qualify as the perfect carriers for the virtual reincarnation of characters handed down from history and tradition. Thus, they provide for an innovative and highly immersive way of experiencing our cultural heritage as something alive and pulsating in the present.Keywords: digital cinematography, human-computer interfaces, holographic simulation, interactive museum exhibits
Procedia PDF Downloads 1191911 Anti-Fables and Their Linguo Cultural Characteristics
Authors: Tamila Dilaverova
Abstract:
In our era of globalization, the unhindered intercultural communication represents an essential element of development. To be proficient in a language one needs to get acquainted with cultural and national peculiarities of the language of native speakers. Cultural peculiarities are explicitly reflected in the nation’s cultural heritage, monuments, literary works, tales, even in clothes. A specific role in the evaluation of cultural performances, establishment, broadcasting, and preservation of behavior norms belongs to the folk texts, among which the fables occupy one of the most important places. A fable, as a genre has existed since ancient times. Fables are universal because they are absolutely appropriate for any century and for any society. Even in the era of the internet, fables turned out to be actual. Internet offers a wide range of re-made fables. Generally, they are new interpretations of Aesop’s fables, but in some cases they are original. These fables became the subject of our research because they contain some modern slangs and jargons and their language is not that much literary. But, besides the changes in the language, there are some changes in the fields of their occupation, everyday activities and the ways of moneymaking. Because of the numerous changes, these new fables can be called 'anti-fables.' Anti-fables are the very new kinds of fables, that can be absolutely suitable for internet generation and perfectly reflects modern reality. All these changes are the reflections of thoughts and actions of new generation and these anti-fables can become a new internet literary genre.Keywords: intercultural, fable, language, internet
Procedia PDF Downloads 2281910 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It
Authors: Claire Norman-Maillet
Abstract:
Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19
Procedia PDF Downloads 701909 Impact of Radio on Rural Development: A Study of Ipokia Local Government Area, Nigeria
Authors: Haruna Shola Adeosun, Adeoye Odedeji
Abstract:
This paper examines the impact of radio on rural development. The researcher employed survey method to gather primary data. The objectives and questions were used from and hypotheses were formulated were raised from the statement of the problem. Cultivation theory was used as the theoretical study. The populations of the study were the inhabitant of Ipokia Local Government. Questionnaires were administered on the 400 respondents. Data gathered were analyzed, interpreted and hypotheses of the study were tested. The finding revealed that; radio has impacted on the rural dwellers and there is a significant relationship between radio and rural dwellers. Also, radio has brought socio-economic development on rural dwellers. The study recommended that radio messages should be designed in line with the pre-existing attitudes of the rural dwellers. It was also discovered that radio stations should endeavour to use local dialects especially when the radio programme is aimed at the rural dwellers that effective communication that can increase active participation of government and the public. Finally, the study recommends that radio stations should be well funded to produce programmes that would serve the purpose of educating and informing the public on issues relevant to them and there is need to establish community radio stations that will be closer to rural dwellers.Keywords: impact, radio, rural, development
Procedia PDF Downloads 3301908 Emotion Regulation in Young Adult Relationships in Relation to Parenting Styles
Authors: Taylor Brown
Abstract:
The parent-child attachment bond begins early, often before the birth of the child. Both father and mother begin to form a bond with their child by selecting a name, preparing for the birth, etc. The biological mother carries the child and often breastfeeds the infant after birth. While fathers play an important role in caring for the child as well, the mother is traditionally seen as the caregiver with the primary role of caring for her baby. These core ideas could include how to form bonds, how to communicate emotions, and even how to create and maintain relationships. Mothers tend to shape their children’s minds based on their own. Studies have even shown that when mothers stroke their children’s bodies with their fingers, the child does calm down more than most other methods. The bond between mother and child is one that happens immediately and strengthens over time. This attachment affects the child’s overall development. The mother-child attachment style is directly linked to a multitude of patterns in adolescents, and later on, adults. The researcher believes that the subsequent patterns of communication in romantic relationships are included in the multitude. Awareness of these patterns and their effects could improve experiences in romantic relationships during young adulthood.Keywords: emotion regulation, parenting, maternal, attachment, romantic
Procedia PDF Downloads 1751907 Tokenism and Invisible Labor of Black Women Within Social Work Education
Authors: LaShawnda N. Fields, Valandra
Abstract:
As part of a larger study, this particular line of inquiry focuses on experiences of tokenism and invisible labor expected of Black women within social work education. Black women faculty members and doctoral students participated in semi-formal, in-depth interviews. All participants were identified as members of schools of social work within Carnegie-designated R-1 institutions. Several participants believed that their race independently and the intersection of their race and gender was often misrepresented by their institution as an indication of a diverse and equitable environment. These women believed they were often solicited to participate in visual materials and make public appearances to benefit the school while feeling invisible. Most of the Black women interviewed, whether faculty members or doctoral students, were the sole Black person or one of very few Black women at these schools of social work. Similarly, the Black doctoral students spoke of being “paraded around” as a prized show horse while enduring a toxic culture that lacks inclusion. These women expressed frustration and disappointment as their images and scholarship were featured on websites and within marketing materials, not the pride and joy such exposure should elicit. These experiences of tokenism were taking place while the women constantly received messages of not being good enough or not a good fit at their institution. Invisible labor refers to work that is not compensated nor formally recognized. This labor is primarily committee work and student support. Representation of Black women faculty members is limited at these research-intensive schools of social work resulting in these women being sought out by students across disciplines. Similarly, the Black women doctoral students are informally recruited as peer mentors to support those students rising in the ranks behind them. Though this work is rooted in retention efforts, it is never identified as such. All participants identified committee work related to their identities as another way they find themselves engaged in work that often goes unrecognized and underappreciated. Committee work is usually tied to identity work, such as diversity, equity, and inclusion though it rarely translates to action and improvements. This qualitative study provides insight into the lived experiences of an at-risk and under-represented demographic. Institutions can better understand how they can support this demographic. These Black women scholars have been invited into these institutions but have not historically been granted full access. These women have survived unsavory conditions through sheer determination and support found mostly outside their schools of social work. Utilizing this data as a springboard for informed and action-oriented strategic planning would allow institutions to create inclusive and equity cultures that result in Black women thriving versus simply surviving.Keywords: education, equity, invisible labor, tokenism, intersectionality
Procedia PDF Downloads 901906 Exploring Augmented Reality in Graphic Design: A Hybrid Pedagogical Model for Design Education
Authors: Nan Hu, Wujun Wang
Abstract:
In the ever-changing digital arena, augmented reality (AR) applications have transitioned from technological enthusiasm into business endeavors, signaling a near future in which AR applications are integrated into daily life. While practitioners in the design industry continue to explore AR’s potential for innovative communication, educators have taken steps to incorporate AR into the curricula for design, explore its creative potential, and realize early initiatives for teaching AR in design-related disciplines. In alignment with recent advancements, this paper presents a pedagogical model for a hybrid studio course in which students collaborate with AR alongside 3D modeling and graphic design. The course extended students’ digital capacity, fostered their design thinking skills, and immersed them in a multidisciplinary design process. This paper outlines the course and evaluates its effectiveness by discussing challenges encountered and outcomes generated in this particular pedagogical context. By sharing insights from the teaching experience, we aim to empower the community of design educators and offer institutions a valuable reference for advancing their curricular approaches. This paper is a testament to the ever-evolving landscape of design education and its response to the digital age.Keywords: 3D, AR, augmented reality, design thinking, graphic design
Procedia PDF Downloads 711905 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 487