Search results for: distributed network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6363

Search results for: distributed network

2583 Unleashing Potential in Pedagogical Innovation for STEM Education: Applying Knowledge Transfer Technology to Guide a Co-Creation Learning Mechanism for the Lingering Effects Amid COVID-19

Authors: Lan Cheng, Harry Qin, Yang Wang

Abstract:

Background: COVID-19 has induced the largest digital learning experiment in history. There is also emerging research evidence that students have paid a high cost of learning loss from virtual learning. University-wide survey results demonstrate that digital learning remains difficult for students who struggle with learning challenges, isolation, or a lack of resources. Large-scale efforts are therefore increasingly utilized for digital education. To better prepare students in higher education for this grand scientific and technological transformation, STEM education has been prioritized and promoted as a strategic imperative in the ongoing curriculum reform essential for unfinished learning needs and whole-person development. Building upon five key elements identified in the STEM education literature: Problem-based Learning, Community and Belonging, Technology Skills, Personalization of Learning, Connection to the External Community, this case study explores the potential of pedagogical innovation that integrates computational and experimental methodologies to support, enrich, and navigate STEM education. Objectives: The goal of this case study is to create a high-fidelity prototype design for STEM education with knowledge transfer technology that contains a Cooperative Multi-Agent System (CMAS), which has the objectives of (1) conduct assessment to reveal a virtual learning mechanism and establish strategies to facilitate scientific learning engagement, accessibility, and connection within and beyond university setting, (2) explore and validate an interactional co-creation approach embedded in project-based learning activities under the STEM learning context, which is being transformed by both digital technology and student behavior change,(3) formulate and implement the STEM-oriented campaign to guide learning network mapping, mitigate the loss of learning, enhance the learning experience, scale-up inclusive participation. Methods: This study applied a case study strategy and a methodology informed by Social Network Analysis Theory within a cross-disciplinary communication paradigm (students, peers, educators). Knowledge transfer technology is introduced to address learning challenges and to increase the efficiency of Reinforcement Learning (RL) algorithms. A co-creation learning framework was identified and investigated in a context-specific way with a learning analytic tool designed in this study. Findings: The result shows that (1) CMAS-empowered learning support reduced students’ confusion, difficulties, and gaps during problem-solving scenarios while increasing learner capacity empowerment, (2) The co-creation learning phenomenon have examined through the lens of the campaign and reveals that an interactive virtual learning environment fosters students to navigate scientific challenge independently and collaboratively, (3) The deliverables brought from the STEM educational campaign provide a methodological framework both within the context of the curriculum design and external community engagement application. Conclusion: This study brings a holistic and coherent pedagogy to cultivates students’ interest in STEM and develop them a knowledge base to integrate and apply knowledge across different STEM disciplines. Through the co-designing and cross-disciplinary educational content and campaign promotion, findings suggest factors to empower evidence-based learning practice while also piloting and tracking the impact of the scholastic value of co-creation under the dynamic learning environment. The data nested under the knowledge transfer technology situates learners’ scientific journey and could pave the way for theoretical advancement and broader scientific enervators within larger datasets, projects, and communities.

Keywords: co-creation, cross-disciplinary, knowledge transfer, STEM education, social network analysis

Procedia PDF Downloads 105
2582 Wavelength Conversion of Dispersion Managed Solitons at 100 Gbps through Semiconductor Optical Amplifier

Authors: Kadam Bhambri, Neena Gupta

Abstract:

All optical wavelength conversion is essential in present day optical networks for transparent interoperability, contention resolution, and wavelength routing. The incorporation of all optical wavelength convertors leads to better utilization of the network resources and hence improves the efficiency of optical networks. Wavelength convertors that can work with Dispersion Managed (DM) solitons are attractive due to their superior transmission capabilities. In this paper, wavelength conversion for dispersion managed soliton signals was demonstrated at 100 Gbps through semiconductor optical amplifier and an optical filter. The wavelength conversion was achieved for a 1550 nm input signal to1555nm output signal. The output signal was measured in terms of BER, Q factor and system margin.    

Keywords: all optical wavelength conversion, dispersion managed solitons, semiconductor optical amplifier, cross gain modultation

Procedia PDF Downloads 442
2581 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 312
2580 Prevalence of Human Papillomavirus in Squamous Intraepithelial Lesions and Cervical Cancer in Women of the North of Chihuahua, Mexico

Authors: Estefania Ponce-Amaya, Ana Lidia Arellano-Ortiz, Cecilia Diaz-Hernandez, Jose Alberto Lopez-Diaz, Antonio De La Mora-Covarrubias, Claudia Lucia Vargas-Requena, Mauricio Salcedo-Vargas, Florinda Jimenez-Vega

Abstract:

Cervical Cancer (CC) is the second leading cause of death among women worldwide and it had been associated with a persistent infection of human papillomavirus (HPV). The goal of the current study was to identify the prevalence of HPV infection in women with abnormal Pap smear who were attended at Dysplasia Clinic of Ciudad Juarez, Mexico. Methods: Cervical samples from 146 patients, who attended the Colposcopy Clinic at Sanitary Jurisdiction II of Cd Juarez, were collected for histopathology and molecular study. DNA was isolated for the HPV detection by Polymerase Chain Reaction (PCR) using MY09/011 and GP5/6 primers. The associated risk factors were assessed by a questionnaire. The statistical analysis was performed by ANOVA, using EpiINFO V7 software. Results: HPV infection was present in 142 patients (97.3 %). The prevalence of HPV infection was distributed in a 96% of all evaluated groups, low-grade squamous intraepithelial lesion (LSIL), high-grade squamous intraepithelial lesion (HISIL) and CC. We found a statistical significance (α = <0.05) between gestation and number of births as risk factors. The median values showed an ascending tend according with the lesion progression. However, CC showed a statistically significant difference with respect to the pre-carcinogenic stages. Conclusions: In these Mexican patients exists a high prevalence of HPV infection, and for that reason, we are studying the most prevalent HPV genotypes in this population.

Keywords: cervical cancer, HPV, prevalence hpv, squamous intraepithelial lesion

Procedia PDF Downloads 308
2579 A Review of the Parameters Used in Gateway Selection Schemes for Internet Connected MANETs

Authors: Zainab S. Mahmood, Aisha H. Hashim, Wan Haslina Hassan, Farhat Anwar

Abstract:

The wide use of the internet-based applications bring many challenges to the researchers to guarantee the continuity of the connections needed by the mobile hosts and provide reliable Internet access for them. One of proposed solutions by Internet Engineering Task Force (IETF) is to connect the local, multi-hop, and infrastructure-less Mobile Ad hoc Network (MANET) with Internet structure. This connection is done through multi-interface devices known as Internet Gateways. Many issues are related to this connection like gateway discovery, hand off, address auto-configuration and selecting the optimum gateway when multiple gateways exist. Many studies were done proposing gateway selection schemes with a single selection criterion or weighted multiple criteria. In this research, a review of some of these schemes is done showing the differences, the features, the challenges and the drawbacks of each of them.

Keywords: Internet Gateway, MANET, mobility, selection criteria

Procedia PDF Downloads 414
2578 Irrigation Challenges, Climate Change Adaptation and Sustainable Water Usage in Developing Countries. A Case Study, Nigeria

Authors: Faith Eweluegim Enahoro-Ofagbe

Abstract:

Worldwide, every nation is experiencing the effects of global warming. In developing countries, due to the heavy reliance on agriculture for socioeconomic growth and security, among other things, these countries are more affected by climate change, particularly with the availability of water. Floods, droughts, rising temperatures, saltwater intrusion, groundwater depletion, and other severe environmental alterations are all brought on by climatic change. Life depends on water, a vital resource; these ecological changes affect all water use, including agriculture and household water use. Therefore adequate and adaptive water usage strategies for sustainability are essential in developing countries. Therefore, this paper investigates Nigeria's challenges due to climate change and adaptive techniques that have evolved in response to such issues to ensure water management and sustainability for irrigation and provide quality water to residents. Questionnaires were distributed to respondents in the study area, central Nigeria, for quantitative evaluation of sustainable water resource management techniques. Physicochemical analysis was done, collecting soil and water samples from several locations under investigation. Findings show that farmers use different methods, ranging from intelligent technologies to traditional strategies for water resource management. Also, farmers need to learn better water resource management techniques for sustainability. Since more residents obtain their water from privately held sources, the government should enforce legislation to ensure that private borehole construction businesses treat water sources of poor quality before the general public uses them.

Keywords: developing countries, irrigation, strategies, sustainability, water resource management, water usage

Procedia PDF Downloads 103
2577 Optimal MPPT Charging Battery System for Photovoltaic Standalone Applications

Authors: Kelaiaia Mounia Samira, Labar Hocine, Mesbah Tarek, Kelaiaia samia

Abstract:

The photovoltaic panel produces green power, and because of its availability across the globe, it can supply isolated loads (site away of the electrical network or difficult of access). Unfortunately this energy remains very expensive. The most application of these types of power needs storage devices, the Lithium batteries are commonly used because of its powerful storage capability. Using a solar panel or an array of panels without a controller that can perform MPPT will often result in wasted power, which results in the need to install more panels for the same power requirement. For devices that have the battery connected directly to the panel, this will also result in premature battery failure or capacity loss. In this paper it is proposed a modified P&O algorithm for the MPPT which takes in account the battery’s internal resistance vs temperature and stage of charging. Of course the temperature variation and irradiation of the PV panel are also introduced.

Keywords: modeling, battery, MPPT, charging, PV Panel

Procedia PDF Downloads 513
2576 Efficacy of Clickers in L2 Interaction

Authors: Ryoo Hye Jin Agnes

Abstract:

This study aims to investigate the efficacy of clickers in fostering L2 class interaction. In an L2 classroom, active learner-to-learner interactions and learner-to-teacher interactions play an important role in language acquisition. In light of this, introducing learning tools that promote such interactions would benefit L2 classroom by fostering interaction. This is because the anonymity of clickers allows learners to express their needs without the social risks associated with speaking up in the class. clickers therefore efficiently help learners express their level of understanding during the process of learning itself. This allows for an evaluative feedback loop where both learners and teachers understand the level of progress of the learners, better enabling classrooms to adapt to the learners’ needs. Eventually this tool promotes participation from learners. This, in turn, is believed to be effective in fostering classroom interaction, allowing learning to take place in a more comfortable yet vibrant way. This study is finalized by presenting the result of an experiment conducted to verify the effectiveness of this approach when teaching pragmatic aspect of Korean expressions with similar semantic functions. The learning achievement of learners in the experimental group was found higher than the learners’ in a control group. A survey was distributed to the learners, questioning them regarding the efficacy of clickers, and how it contributed to their learning in areas such as motivation, self-assessment, increasing participation, as well as giving feedback to teachers. Analyzing the data collected from the questionnaire given to the learners, the study presented data suggesting that this approach increased the scope of interactivity in the classroom, thus not only increasing participation but enhancing the type of classroom participation among learners. This participation in turn led to a marked improvement in their communicative abilities.

Keywords: second language acquisition, interaction, clickers, learner response system, output from learners, learner’s cognitive process

Procedia PDF Downloads 509
2575 A New Approach for PE100 Characterization; An in-Reactor HDPE Alloy with Semi Hard and Soft Segments

Authors: Sasan Talebnezhad, Parviz Hamidia

Abstract:

GPC and RMS analysis showed no distinct difference between PE 100 On, Off, and Reference grade. But FTIR spectra and multiple endothermic peaks obtained from SSA analysis, attributed to heterogeneity of ethylene sequence length, lamellar thickness and also the non-uniformity of short chain branching, showed sharp discrepancy and proposed a blend structure of high-density polyethylenes in PE 100 grade. Catalysis along with process parameters dictates poly blend PE 100 structure. This in-reactor blend is a mixture of compatible co-crystallized phases with different crystalinity, forming a physical semi hard and soft segment network responsible for improved impact properties in PE 100 pipe grade. We propose a new approach for PE100 evaluation that is more efficient than normal microstructure characterization.

Keywords: HDPE, pipe grade, in-reactor blend, hard and soft segments

Procedia PDF Downloads 438
2574 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 189
2573 A Combination of Independent Component Analysis, Relative Wavelet Energy and Support Vector Machine for Mental State Classification

Authors: Nguyen The Hoang Anh, Tran Huy Hoang, Vu Tat Thang, T. T. Quyen Bui

Abstract:

Mental state classification is an important step for realizing a control system based on electroencephalography (EEG) signals which could benefit a lot of paralyzed people including the locked-in or Amyotrophic Lateral Sclerosis. Considering that EEG signals are nonstationary and often contaminated by various types of artifacts, classifying thoughts into correct mental states is not a trivial problem. In this work, our contribution is that we present and realize a novel model which integrates different techniques: Independent component analysis (ICA), relative wavelet energy, and support vector machine (SVM) for the same task. We applied our model to classify thoughts in two types of experiment whether with two or three mental states. The experimental results show that the presented model outperforms other models using Artificial Neural Network, K-Nearest Neighbors, etc.

Keywords: EEG, ICA, SVM, wavelet

Procedia PDF Downloads 374
2572 Training a Neural Network Using Input Dropout with Aggressive Reweighting (IDAR) on Datasets with Many Useless Features

Authors: Stylianos Kampakis

Abstract:

This paper presents a new algorithm for neural networks called “Input Dropout with Aggressive Re-weighting” (IDAR) aimed specifically at datasets with many useless features. IDAR combines two techniques (dropout of input neurons and aggressive re weighting) in order to eliminate the influence of noisy features. The technique can be seen as a generalization of dropout. The algorithm is tested on two different benchmark data sets: a noisy version of the iris dataset and the MADELON data set. Its performance is compared against three other popular techniques for dealing with useless features: L2 regularization, LASSO and random forests. The results demonstrate that IDAR can be an effective technique for handling data sets with many useless features.

Keywords: neural networks, feature selection, regularization, aggressive reweighting

Procedia PDF Downloads 443
2571 The Twin Terminal of Pedestrian Trajectory Based on City Intelligent Model (CIM) 4.0

Authors: Chen Xi, Lao Xuerui, Li Junjie, Jiang Yike, Wang Hanwei, Zeng Zihao

Abstract:

To further promote the development of smart cities, the microscopic "nerve endings" of the City Intelligent Model (CIM) are extended to be more sensitive. In this paper, we develop a pedestrian trajectory twin terminal based on the CIM and CNN technology. It also uses 5G networks, architectural and geoinformatics technologies, convolutional neural networks, combined with deep learning networks for human behaviour recognition models, to provide empirical data such as 'pedestrian flow data and human behavioural characteristics data', and ultimately form spatial performance evaluation criteria and spatial performance warning systems, to make the empirical data accurate and intelligent for prediction and decision making.

Keywords: urban planning, urban governance, CIM, artificial intelligence, convolutional neural network

Procedia PDF Downloads 114
2570 Fabrication of Chitosan/Polyacrylonitrile Blend and SEMI-IPN Hydrogel with Epichlorohydrin

Authors: Muhammad Omer Aijaz, Sajjad Haider, Fahad S. Al Mubddal, Yousef Al-Zeghayer, Waheed A. Al Masry

Abstract:

The present study is focused on the preparation of chitosan-based blend and Semi-Interpenetrating Polymer Network (SEMI-IPN) with polyacrylonitrile (PAN). Blend Chitosan/Polyacrylonitrile (PAN) hydrogel films were prepared by solution blending and casting technique. Chitosan in the blend was cross-linked with epichlorohydrin (ECH) to prepare SEMI-IPN. The developed Chitosan/PAN blend and SEMI-IPN hydrogels were characterized with SEM, FTIR, TGA, and DSC. The result showed good miscibility between chitosan and PAN, crosslinking of chitosan in the blend, and improved thermal properties for SEMI-IPN. The swelling of the different blended and SEMI-IPN hydrogels samples were examined at room temperature. Blend (C80/P20) sample showed highest swelling (2400%) and fair degree of stability (28%) whereas SEMI-IPN hydrogel exhibited relatively low degree of swelling (244%) and high degree of aqueous stability (85.5%).

Keywords: polymer hydrogels, chitosan, SEMI-IPN, polyacrylonitrile, epichlorohydrin

Procedia PDF Downloads 359
2569 Instance Segmentation of Wildfire Smoke Plumes using Mask-RCNN

Authors: Jamison Duckworth, Shankarachary Ragi

Abstract:

Detection and segmentation of wildfire smoke plumes from remote sensing imagery are being pursued as a solution for early fire detection and response. Smoke plume detection can be automated and made robust by the application of artificial intelligence methods. Specifically, in this study, the deep learning approach Mask Region-based Convolutional Neural Network (RCNN) is being proposed to learn smoke patterns across different spectral bands. This method is proposed to separate the smoke regions from the background and return masks placed over the smoke plumes. Multispectral data was acquired using NASA’s Earthdata and WorldView and services and satellite imagery. Due to the use of multispectral bands along with the three visual bands, we show that Mask R-CNN can be applied to distinguish smoke plumes from clouds and other landscape features that resemble smoke.

Keywords: deep learning, mask-RCNN, smoke plumes, spectral bands

Procedia PDF Downloads 111
2568 A Low-Power, Low-Noise and High Linearity 60 GHz LNA for WPAN Applications

Authors: Noha Al Majid, Said Mazer, Moulhime El Bekkali, Catherine Algani, Mahmoud Mehdi

Abstract:

A low noise figure (NF) and high linearity V-band Low Noise Amplifier (LNA) is reported in this article. The LNA compromises a three-stage cascode configuration. This LNA will be used as a part of a WPAN (Wireless Personal Area Network) receiver in the millimeter-wave band at 60 GHz. It is designed according to the MMIC technology (Monolithic Microwave Integrated Circuit) in PH 15 process from UMS foundry and uses a 0.15 μm GaAs PHEMT (Pseudomorphic High Electron Mobility Transistor). The particularity of this LNA compared to other LNAs in literature is its very low noise figure which is equal to 1 dB and its high linearity (IIP3 is about 22 dB). The LNA consumes 0.24 Watts, achieving a high gain which is about 23 dB, an input return loss better than -10 dB and an output return loss better than -8 dB.

Keywords: low noise amplifier, V-band, MMIC technology, LNA, amplifier, cascode, pseudomorphic high electron mobility transistor (PHEMT), high linearity

Procedia PDF Downloads 499
2567 Foot Recognition Using Deep Learning for Knee Rehabilitation

Authors: Rakkrit Duangsoithong, Jermphiphut Jaruenpunyasak, Alba Garcia

Abstract:

The use of foot recognition can be applied in many medical fields such as the gait pattern analysis and the knee exercises of patients in rehabilitation. Generally, a camera-based foot recognition system is intended to capture a patient image in a controlled room and background to recognize the foot in the limited views. However, this system can be inconvenient to monitor the knee exercises at home. In order to overcome these problems, this paper proposes to use the deep learning method using Convolutional Neural Networks (CNNs) for foot recognition. The results are compared with the traditional classification method using LBP and HOG features with kNN and SVM classifiers. According to the results, deep learning method provides better accuracy but with higher complexity to recognize the foot images from online databases than the traditional classification method.

Keywords: foot recognition, deep learning, knee rehabilitation, convolutional neural network

Procedia PDF Downloads 148
2566 Analysis and Forecasting of Bitcoin Price Using Exogenous Data

Authors: J-C. Leneveu, A. Chereau, L. Mansart, T. Mesbah, M. Wyka

Abstract:

Extracting and interpreting information from Big Data represent a stake for years to come in several sectors such as finance. Currently, numerous methods are used (such as Technical Analysis) to try to understand and to anticipate market behavior, with mixed results because it still seems impossible to exactly predict a financial trend. The increase of available data on Internet and their diversity represent a great opportunity for the financial world. Indeed, it is possible, along with these standard financial data, to focus on exogenous data to take into account more macroeconomic factors. Coupling the interpretation of these data with standard methods could allow obtaining more precise trend predictions. In this paper, in order to observe the influence of exogenous data price independent of other usual effects occurring in classical markets, behaviors of Bitcoin users are introduced in a model reconstituting Bitcoin value, which is elaborated and tested for prediction purposes.

Keywords: big data, bitcoin, data mining, social network, financial trends, exogenous data, global economy, behavioral finance

Procedia PDF Downloads 350
2565 Application of Hydrological Model in Support of Streamflow Allocation in Arid Watersheds in Northwestern China

Authors: Chansheng He, Lanhui Zhang, Baoqing Zhang

Abstract:

Spatial heterogeneity of landscape significantly affects watershed hydrological processes, particularly in high elevation and cold mountainous watersheds such as the inland river (terminal lake) basins in Northwest China, where the upper reach mountainous areas are the main source of streamflow for the downstream agricultural oases and desert ecosystems. Thus, it is essential to take into account spatial variations of hydrological processes in streamflow allocation at the watershed scale. This paper adapts the Distributed Large Basin Runoff Model (DLBRM) to the Heihe River Watershed, the second largest inland river with a drainage area of about 128,000 km2 in Northwest China, for understanding the transfer and partitioning mechanism among the glacier and snowmelt, surface runoff, evapotranspiration, and groundwater recharge among the upper, middle, and lower reaches in the study area. Results indicate that the upper reach Qilian Mountain area is the main source of streamflow for the middle reach agricultural oasis and downstream desert areas. Large withdrawals for agricultural irrigation in the middle reach had significantly depleted river flow for the lower reach desert ecosystems. Innovative conservation and enforcement programs need to be undertaken to ensure the successful implementation of water allocation plan of delivering 0.95 x 109 m3 of water downstream annually by the State Council in the Heihe River Watershed.

Keywords: DLBRM, Northwestern China, spatial variation, water allocation

Procedia PDF Downloads 289
2564 Design an Assessment Model of Research and Development Capabilities with the New Product Development Approach: A Case Study of Iran Khodro Company

Authors: Hamid Hanifi, Adel Azar, Alireza Booshehri

Abstract:

In order to know about the capability level of R & D units in automotive industry, it is essential that organizations always compare themselves with standard level and higher than themselves so that to be improved continuously. In this research, with respect to the importance of this issue, we have tried to present an assessment model for R & D capabilities having reviewed on new products development in automotive industry of Iran. Iran Khodro Company was selected for the case study. To this purpose, first, having a review on the literature, about 200 indicators effective in R & D capabilities and new products development were extracted. Then, of these numbers, 29 indicators which were more important were selected by industry and academia experts and the questionnaire was distributed among statistical population. Statistical population was consisted of 410 individuals in Iran Khodro Company. We used the 410 questionnaires for exploratory factor analysis and then used the data of 308 questionnaires from the same population randomly for confirmatory factor analysis. The results of exploratory factor analysis led to categorization of dimensions in 9 secondary dimensions. Naming the dimensions was done according to a literature review and the professors’ opinion. Using structural equation modeling and AMOS software, confirmatory factor analysis was conducted and ultimate model with 9 secondary dimensions was confirmed. Meanwhile, 9 secondary dimensions of this research are as follows: 1) Research and design capability, 2) Customer and market capability, 3) Technology capability, 4) Financial resources capability, 5) Organizational chart, 6) Intellectual capital capability, 7) NPD process capability, 8) Managerial capability and 9) Strategy capability.

Keywords: research and development, new products development, structural equations, exploratory factor analysis, confirmatory factor analysis

Procedia PDF Downloads 325
2563 Urban Poor: The Situations and Characteristics of the Problem and Social Welfare Service of Bangkok Metropolis

Authors: Sanchai Ratthanakwan

Abstract:

This research aims to study situations and characteristics of the problems facing the urban poor. The data and information are collected by focus group and in-depth interview leader and members of Four Regions Slum Network, community representatives and the social welfare officer. The research can be concluded that the problems of the urban poor faced with three major problems: Firstly, the shortage of housing and stability issues in housing; secondly, the problem of substandard quality of life; and thirdly, the debt problem. The study found that a solution will be found in two ways: First way is the creation of housing for the urban poor in slums or community intrusion by the state. Second way is the stability in the housing and subsistence provided by the community center called “housing stability”.

Keywords: urban poor, social welfare, Bangkok metropolis, housing stability

Procedia PDF Downloads 410
2562 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 422
2561 Use of Artificial Intelligence Based Models to Estimate the Use of a Spectral Band in Cognitive Radio

Authors: Danilo López, Edwin Rivas, Fernando Pedraza

Abstract:

Currently, one of the major challenges in wireless networks is the optimal use of radio spectrum, which is managed inefficiently. One of the solutions to existing problem converges in the use of Cognitive Radio (CR), as an essential parameter so that the use of the available licensed spectrum is possible (by secondary users), well above the usage values that are currently detected; thus allowing the opportunistic use of the channel in the absence of primary users (PU). This article presents the results found when estimating or predicting the future use of a spectral transmission band (from the perspective of the PU) for a chaotic type channel arrival behavior. The time series prediction method (which the PU represents) used is ANFIS (Adaptive Neuro Fuzzy Inference System). The results obtained were compared to those delivered by the RNA (Artificial Neural Network) algorithm. The results show better performance in the characterization (modeling and prediction) with the ANFIS methodology.

Keywords: ANFIS, cognitive radio, prediction primary user, RNA

Procedia PDF Downloads 408
2560 Determination and Distribution of Formation Thickness Using Seismic and Well Data in Baga/Lake Sub-basin, Chad Basin Nigeria

Authors: Gabriel Efomeh Omolaiye, Olatunji Seminu, Jimoh Ajadi, Yusuf Ayoola Jimoh

Abstract:

The Nigerian part of the Chad Basin till date has been one of the few critically studied basins, with few published scholarly works, compared to other basins such as Niger Delta, Dahomey, etc. This work was undertaken by the integration of 3D seismic interpretations and the well data analysis of eight wells fairly distributed in block A, Baga/Lake sub-basin in Borno basin with the aim of determining the thickness of Chad, Kerri-Kerri, Fika, and Gongila Formations in the sub-basin. Da-1 well (type-well) used in this study was subdivided into stratigraphic units based on the regional stratigraphic subdivision of the Chad basin and was later correlated with other wells using similarity of observed log responses. The combined density and sonic logs were used to generate synthetic seismograms for seismic to well ties. Five horizons were mapped, representing the tops of the formations on the 3D seismic data covering the block; average velocity function with maximum error/residual of 0.48% was adopted in the time to depth conversion of all the generated maps. There is a general thickening of sediments from the west to the east, and the estimated thicknesses of the various formations in the Baga/Lake sub-basin are Chad Formation (400-750 m), Kerri-Kerri Formation (300-1200 m), Fika Formation (300-2200 m) and Gongila Formation (100-1300 m). The thickness of the Bima Formation could not be established because the deepest well (Da-1) terminates within the formation. This is a modification to the previous and widely referenced studies of over forty decades that based the estimation of formation thickness within the study area on the observed outcrops at different locations and the use of few well data.

Keywords: Baga/Lake sub-basin, Chad basin, formation thickness, seismic, velocity

Procedia PDF Downloads 168
2559 Implementation of the Canadian Emergency Department Triage and Acuity Scale (CTAS) in an Urgent Care Center in Saudi Arabia

Authors: Abdullah Arafat, Ali Al-Farhan, Amir Omair

Abstract:

Objectives: To review and assess the effectiveness of the implemented modified five-levels triage and acuity scale triage system in AL-Yarmook Urgent Care Center (UCC), King Abdulaziz Residential city, Riyadh, Saudi Arabia. Method: The applied study design was an observational cross sectional design. A data collection sheet was designed and distributed to triage nurses; the data collection was done during triage process and was directly observed by the co-investigator. Triage system was reviewed by measuring three time intervals as quality indicators: time before triage (TBT), time before being seen by physician (TBP) and total length of stay (TLS) taking in consideration timing of presentation and level of triage. Results: During the study period, a total of 187 patients were included in our study. 118 visits were at weekdays and 68 visits at weekends. Overall, 173 patients (92.5%) were seen by the physician in timely manner according to triage guidelines while 14 patients (7.5%) were not seen at appropriate time.Overall, The mean time before seen the triage nurse (TBT) was 5.36 minutes, the mean time to be seen by physician (TBP) was 22.6 minutes and the mean length of stay (TLS) was 59 minutes. The data didn’t showed significant increase in TBT, TBP, and number of patients not seen at the proper time, referral rate and admission rate during weekend. Conclusion: The CTAS is adaptable to countries beyond Canada and worked properly. The applied CTAS triage system in Al-Yarmook UCC is considered to be effective and well applied. Overall, urgent cases have been seen by physician in timely manner according to triage system and there was no delay in the management of urgent cases.

Keywords: CTAS, emergency, Saudi Arabia, triage, urgent care

Procedia PDF Downloads 313
2558 Electroencephalogram Based Alzheimer Disease Classification using Machine and Deep Learning Methods

Authors: Carlos Roncero-Parra, Alfonso Parreño-Torres, Jorge Mateo Sotos, Alejandro L. Borja

Abstract:

In this research, different methods based on machine/deep learning algorithms are presented for the classification and diagnosis of patients with mental disorders such as alzheimer. For this purpose, the signals obtained from 32 unipolar electrodes identified by non-invasive EEG were examined, and their basic properties were obtained. More specifically, different well-known machine learning based classifiers have been used, i.e., support vector machine (SVM), Bayesian linear discriminant analysis (BLDA), decision tree (DT), Gaussian Naïve Bayes (GNB), K-nearest neighbor (KNN) and Convolutional Neural Network (CNN). A total of 668 patients from five different hospitals have been studied in the period from 2011 to 2021. The best accuracy is obtained was around 93 % in both ADM and ADA classifications. It can be concluded that such a classification will enable the training of algorithms that can be used to identify and classify different mental disorders with high accuracy.

Keywords: alzheimer, machine learning, deep learning, EEG

Procedia PDF Downloads 110
2557 Genomic Surveillance of Bacillus Anthracis in South Africa Revealed a Unique Genetic Cluster of B- Clade Strains

Authors: Kgaugelo Lekota, Ayesha Hassim, Henriette Van Heerden

Abstract:

Bacillus anthracis is the causative agent of anthrax that is composed of three genetic groups, namely A, B, and C. Clade-A is distributed world-wide, while sub-clades B has been identified in Kruger National Park (KNP), South Africa. KNP is one of the endemic anthrax regions in South Africa with distinctive genetic diversity. Genomic surveillance of KNP B. anthracis strains was employed on the historical culture collection isolates (n=67) dated from the 1990’s to 2015 using a whole genome sequencing approach. Whole genome single nucleotide polymorphism (SNPs) and pan-genomics analysis were used to define the B. anthracis genetic population structure. This study showed that KNP has heterologous B. anthracis strains grouping in the A-clade with more prominent ABr.005/006 (Ancient A) SNP lineage. The 2012 and 2015 anthrax isolates are dispersed amongst minor sub-clades that prevail in non-stabilized genetic evolution strains. This was augmented with non-parsimony informative SNPs of the B. anthracis strains across minor sub-clades of the Ancient A clade. Pan-genomics of B. anthracis showed a clear distinction between A and B-clade genomes with 11 374 predicted clusters of protein coding genes. Unique accessory genes of B-clade genomes that included biosynthetic cell wall genes and multidrug resistant of Fosfomycin. South Africa consists of diverse B. anthracis strains with unique defined SNPs. The sequenced B. anthracis strains in this study will serve as a means to further trace the dissemination of B. anthracis outbreaks globally and especially in South Africa.

Keywords: bacillus anthracis, whole genome single nucleotide polymorphisms, pangenomics, kruger national park

Procedia PDF Downloads 130
2556 Knowledge and Attitude towards Helicobacter pylori: Awareness about Health Impacts of H. pylori Gastric Ulcer and Its Carcinogenic Potential among Adults in Sharjah

Authors: Abdullah Malek, Muzn Al Khaldi, Lian Odeh, Atheer Tariq, Mohammad Al Fardan, Hiba Barqawi

Abstract:

H. pylori bacterium is a known underlying agent for gastritis, peptic ulcer disease, and gastric cancer and is believed to infect half of the world’s population. Even with the ubiquity of H. pylori bacterium, there is lack of knowledge regarding its modes of transmission, associated diseases, carcinogenic effect and means of prevention; especially in the UAE. A cross sectional study of 500 participants, of which 58% (n= 289) of the respondents were female, and 42% (n=210) were male, was conducted in Sharjah to assess the knowledge, and explore the attitudes and practices among UAE residents towards Helicobacter Pylori and its associated PUD as well as its carcinogenic nature. A structured self-administered questionnaire was distributed to the target population to establish their demographic background and selected aspects of their lifestyle. General knowledge about H. Pylori was poor, only 24.6% stated they have heard of H. pylori. Attitudes towards prevention and practices were relatively poor as well. Subjects who suffered from severe symptoms (ALARM symptoms) had significantly lower habit scores than those with mild and moderate symptoms (p=0.0078**). To the authours’ knowledge, no previous studies were conducted in the United Arab Emirates regarding the epidemiology of the infection to detect the extent of H. Pylori’s impact on the public health. The results of this study can be used to draw conclusions about the average knowledge of the UAE population regarding H. pylori. It can also be a starting point to devise new education programs and campaigns that raise awareness of this health issue which could be easily avoided with early diagnosis and antibiotic treatment.

Keywords: chronic gastritis, community health, gastric cancer, Helicobacter pylori, peptic ulcers

Procedia PDF Downloads 244
2555 Analysis of the Social Impact of Agro-Allied Industries on the Rural Dwellers in Benue State, Nigeria

Authors: Ali Ocholi

Abstract:

The study was conducted to analyze the impact of agro-allied industries on rural dwellers in Benue state, Nigeria. Stratified random sampling technique was used to select the respondents for the study. Primary data were collected through the use of structured questionnaires administered on 366 respondents from the selected communities; the data were analyzed using both descriptive and inferential statistics. The result of Mann-Whitney (U) statistics showed that water availability (14350) and good road network (15082.00) were the only social impact derived from the industries by the rural dwellers. The study recommended that right and proper policies and programmes should be put in place by the government to mandate all private and public agro-allied industries to embark on projects that would be in favour of the rural dwellers where the agro-allied industries are situated.

Keywords: agriculture, agro-allied industry, rural dwellers, Benue state

Procedia PDF Downloads 234
2554 Evaluation of Interaction Between Fans and Celebrities in New Media

Authors: Mohadese Motahari

Abstract:

In general, we consider the phenomenon of "fandism" or extreme fandom to be an aspect of fandom for a person, a group, or a collection, which leads to extreme support for them. So, for example, we consider a fan or a "fanatic" (which literally means a "fanatical person") to be a person who is extremely interested in a certain topic or topics and has a special passion and fascination for that issue. It may also be beyond the scope of logic and normal behavior of the society. With the expansion of the media and the advancement of technology, the phenomenon of fandom also underwent many changes and not only became more intense, but a large economy was also formed alongside it, and it is becoming more and more important every day. This economy, which emerged from the past with the formation of the first media, has now taken a different form with the development of media and social networks, as well as the change in the interaction between celebrities and audiences. Earning huge amounts of money with special methods in every social network and every media is achieved through fans and fandoms. In this article, we have studied the relationship between fans and famous people with reference to the economic debates surrounding it.

Keywords: fandism, famous people, social media, new media

Procedia PDF Downloads 80