Search results for: access network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7679

Search results for: access network

3749 Household Water Practices in a Rapidly Urbanizing City and Its Implications for the Future of Potable Water: A Case Study of Abuja Nigeria

Authors: Emmanuel Maiyanga

Abstract:

Access to sufficiently good quality freshwater has been a global challenge, but more notably in low-income countries, particularly in the Sub-Saharan countries, which Nigeria is one. Urban population is soaring, especially in many low-income countries, the existing centralised water supply infrastructures are ageing and inadequate, moreover in households peoples’ lifestyles have become more water-demanding. So, people mostly device coping strategies where municipal supply is perceived to have failed. This development threatens the futures of groundwater and calls for a review of management strategy and research approach. The various issues associated with water demand management in low-income countries and Nigeria, in particular, are well documented in the literature. However, the way people use water daily in households and the reasons they do so, and how the situation is constructing demand among the middle-class population in Abuja Nigeria is poorly understood. This is what this research aims to unpack. This is achieved by using the social practices research approach (which is based on the Theory of Practices) to understand how this situation impacts on the shared groundwater resource. A qualitative method was used for data gathering. This involved audio-recorded interviews of householders and water professionals in the private and public sectors. It also involved observation, note-taking, and document study. The data were analysed thematically using NVIVO software. The research reveals the major household practices that draw on the water on a domestic scale, and they include water sourcing, body hygiene and sanitation, laundry, kitchen, and outdoor practices (car washing, domestic livestock farming, and gardening). Among all the practices, water sourcing, body hygiene, kitchen, and laundry practices, are identified to impact most on groundwater, with impact scale varying with household peculiarities. Water sourcing practices involve people sourcing mostly from personal boreholes because the municipal water supply is perceived inadequate and unreliable in terms of service delivery and water quality, and people prefer easier and unlimited access and control using boreholes. Body hygiene practices reveal that every respondent prefers bucket bathing at least once daily, and the majority bathe twice or more every day. Frequency is determined by the feeling of hotness and dirt on the skin. Thus, people bathe to cool down, stay clean, and satisfy perceived social, religious, and hygiene demand. Kitchen practice consumes water significantly as people run the tap for vegetable washing in daily food preparation and dishwashing after each meal. Laundry practice reveals that most people wash clothes most frequently (twice in a week) during hot and dusty weather, and washing with hands in basins and buckets is the most prevalent and water wasting due to soap overdose. The research also reveals poor water governance as a major cause of current inadequate municipal water delivery. The implication poor governance and widespread use of boreholes is an uncontrolled abstraction of groundwater to satisfy desired household practices, thereby putting the future of the shared aquifer at great risk of total depletion with attendant multiplying effects on the people and the environment and population continues to soar.

Keywords: boreholes, groundwater, household water practices, self-supply

Procedia PDF Downloads 121
3748 Teaching English to Students with Hearing Impairments - A Preliminary Study

Authors: Jane O`Halloran

Abstract:

This research aims to identify the issues and challenges of teaching English as a Foreign Language to Japanese university students who have special learning needs. This study sought to investigate factors influencing the academic performance of students with special or additional needs in an inclusive education context. This study will focus on a consideration of the methods available to support those with hearing impairments. While the study population is limited, it is important to give classes to be inclusive places where all students receive equal access to content. Hearing impairments provide an obvious challenge to language learning and, therefore, second-language learning. However, strategies and technologies exist to support the instructor without specialist training. This paper aims to identify these and present them to other teachers of English as a second language who wish to provide the best possible learning experience for every student. Two case studies will be introduced to compare and contrast the experience of in-class teaching and the online option and to share the positives and negatives of the two approaches. While the study focuses on the situation in a university in Japan, the lessons learned by the author may have universal value to any classroom with a student with a hearing disability.

Keywords: inclusive learning, special needs, hearing impairments, teaching strategies

Procedia PDF Downloads 127
3747 Heterogeneity of Thinking: Religious Beliefs and Logical Concepts

Authors: Alisa Rekunova

Abstract:

According to the theory of word meaning structure developed by Lev Vygotsky (and later modified by Aaro Toomela), there are several levels of thought: sensory-based concepts, situation concepts, logical concepts, and structural-systemic concepts. There are differences between people who have relatively easy access to logical thought compared to those who mostly tend to think in everyday concepts. Religious beliefs are connected with unprovable concepts (Christian Jesus’s ascension or Pagan energy) that cannot be non-controversially related to scientific concepts. However, many scientists in the research are believers of some kinds. Religious views can be different: there are believers, non-believers (atheists), and undecided (we can call them agnostics). Some of the respondents say that scientific or professional and religious spheres do not overlap. Therefore, we can assume they do not see any conflict. Some of them, on the contrary, hesitate to answer and we can conclude they see the conflicts, but they do not want (or do not believe they are able to) to solve it. Finally, the third category of respondents says that religious beliefs and scientific concepts cannot coexist in the human mind. It can be expected that the third category of respondents should have higher education (or even work in the scientific field) but many scientists in the research answer that religious and scientific spheres do not overlap. Therefore, there are other things besides the level of education that is connected with resolving conflicts.

Keywords: conflicts in thinking, cultural-historical psychology, heterogeneity of thinking, religious thinking

Procedia PDF Downloads 149
3746 From Linear to Nonlinear Deterrence: Deterrence for Rising Power

Authors: Farhad Ghasemi

Abstract:

Along with transforming the international system into a complex and chaotic system, the fundamental question arises: how can deterrence be reconstructed conceptually and theoretically in this system model? The deterrence system is much more complex today than it was seven decades ago. This article suggests that the perception of deterrence as a linear system is a fundamental mistake because it does not consider the new dynamics of the international system, including network power dynamics. The author aims to improve this point by focusing on complexity and chaos theories, especially their nonlinearity and cascading failure principles. This article proposes that the perception of deterrence as a linear system is a fundamental mistake, as the new dynamics of the surrounding international system do not take into account. The author recognizes deterrence as a nonlinear system and introduces it as a concept in strategic studies.

Keywords: complexity, international system, deterrence, linear deterrence, nonlinear deterrence

Procedia PDF Downloads 136
3745 Moral Obligation as a Governor to Skeptical Theism's Relativism

Authors: Peter J. Morgan

Abstract:

In response to evidential arguments from evil, Stephen Wykstra presents CORNEA (Condition of Reasonable Epistemic Access) as a foundational principle for Skeptical Theism which urges one to think in terms of what can be expected in a given situation. The use of CORNEA results in skepticism regarding the ability of human ken to know divine levels of knowledge in instances of intense evil. However, William Rowe presents a critique of Skeptical Theism that questions its ability to argue successfully for theism. Rowe contends that siding with Skeptical Theism is akin to boarding a trolley car that does not stop. Contra Wykstra, Rowe observes that, for all that can be known, there could be greater amounts of evils than goods, and the goods that are seen may not be the best possible goods. This amounts to a mortally challenging critique of Skeptical Theism. However, there is a brake on Rowe’s Trolley. This paper makes the argument that the ubiquitous presence of Moral Obligation (MO) serves as a braking system for Rowe’s Trolley. When the rider begins to feel lost in an epistemic stalemate of good and evil it is MO that turns the tide: MO serves as evidence towards the good on a basic human level, and it is a reminder that God’s character will result in actions towards the good.

Keywords: CORNEA, moral obligation, problem of evil, skeptical theism

Procedia PDF Downloads 202
3744 Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria

Authors: K. Alese Boniface, K. Adu Michael

Abstract:

Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.

Keywords: cybercrime, sign-up portal, internet service provider (ISP), internet protocol address (IP address)

Procedia PDF Downloads 274
3743 Review on Rainfall Prediction Using Machine Learning Technique

Authors: Prachi Desai, Ankita Gandhi, Mitali Acharya

Abstract:

Rainfall forecast is mainly used for predictions of rainfall in a specified area and determining their future rainfall conditions. Rainfall is always a global issue as it affects all major aspects of one's life. Agricultural, fisheries, forestry, tourism industry and other industries are widely affected by these conditions. The studies have resulted in insufficient availability of water resources and an increase in water demand in the near future. We already have a new forecast system that uses the deep Convolutional Neural Network (CNN) to forecast monthly rainfall and climate changes. We have also compared CNN against Artificial Neural Networks (ANN). Machine Learning techniques that are used in rainfall predictions include ARIMA Model, ANN, LR, SVM etc. The dataset on which we are experimenting is gathered online over the year 1901 to 20118. Test results have suggested more realistic improvements than conventional rainfall forecasts.

Keywords: ANN, CNN, supervised learning, machine learning, deep learning

Procedia PDF Downloads 193
3742 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 125
3741 Customer Relations and Use of Online Shopping Sites

Authors: Bahar Urhan Torun, Havva Nur Tarakcı

Abstract:

At the present time, online marketing has become the common target of small and full-scale organizations. Today’s humanbeing who has to spend most of their time in front of the computer because of his job, prefers to socialize by internet due to the easy access to technology. So online marketing area expands day by day. All business organizations from the smallest to the biggest are in a race in order to get a cut from the virtual market share in an extreme competitive environment. However these organizations which use the internet to reach more consumers cannot determine their target group accurately, so this is the biggest handicap of online marketing sales nowadays. The aim of this study is to determine some significant elements about need for communicating efficiently with the consumer on the internet on online marketing. The strategies that can be used in order to increase sales and the limitations of virtual environment where cannot be communicated with the consumer face to face are argued in this study’s scope. As a consequence it is thought that to study on this subject because of lacking and also being limited efficiency of researches and outputs. Within this scope suggesting some proposals about how to communicate efficiently with the consumer and also offering the consumers’ demands efficiently is the essential objective of this study.

Keywords: online marketing, competition, consumer, communication

Procedia PDF Downloads 266
3740 Bibliometric Measures on Leveraging Technology to Mitigate the Impact of Covid-19 on Business

Authors: Olanrewaju Johnson Akinduntire

Abstract:

This paper investigates the statistical evaluation of books, citations, articles, journals and other publications in accounting and finance on leveraging technology to mitigate the impact of COVID-19 on business. The research proffers an appraisal of the impact of computerized accounting systems in pre and post pandemic era on activities of the formal and informal sectors, it analyzes the concept of computerized accounting systems, and it seeks to determine the impact of computerized of the overall activities of the informal sector. A special focus of this ICT strategy should be to demystify and promote the diffusion of ICT as a general-purpose technology to the informal sector. It is believed that the use of new technologies can be crucial to meeting the Millennium Development Goals (MDGs) in a timely and effective fashion. Consequent to these, there is a need to prevent the further marginalization of the informal sector by availing ICT services which are mixed appropriately and also properly located. By implication, this will help them access markets and other business information, which can enable or make their economic activities more vibrant and facilitate the availability of information about new opportunities. Conclusively, for one to understand the application of ICT and their locational dynamics in informal sector clusters, there is a need to comprehend and acknowledge the drivers and pressures leading to the adoption of new technology.

Keywords: COVID-19 , (MDGs) , ICT, bibliometric

Procedia PDF Downloads 179
3739 Media Regulation and Public Sphere in the Digital Age: An Analysis in the Light of Constructive Democracy

Authors: Carlos Marden Cabral Coutinho, Jose Luis Bolzan de Morais

Abstract:

The article proposed intends to analyze the possibility (and conditions) of a media regulation law in a democratic rule of law in the twenty-first century. To do so, will be presented initially the idea of the public sphere (by Jürgen Habermas), showing how it is presented as an interface between the citizen and the state (or the private and public) and how important is it in a deliberative democracy. Based on this paradigm, the traditional perception of the role of public information (such as system functional element) and on the possibility of media regulation will be exposed, due to the public nature of their activity. A critical argument will then be displayed from two different perspectives: a) the formal function of the current media information, considering that the digital age has fragmented the information access; b) the concept of a constructive democracy, which reduces the need for representation, changing the strategic importance of the public sphere. The question to be addressed (based on the comparative law) is if the regulation is justified in a polycentric democracy, especially when it operates under the digital age (with immediate and virtual communication). The proposal is to be presented in the sense that even in a twenty-first century the media in a democratic rule of law still has an extremely important role and may be subject to regulation, but this should be on terms very different (and narrower) from those usually defended.

Keywords: constructive democracy, media, digital age, public sphere

Procedia PDF Downloads 375
3738 The Environmental Impact of Wireless Technologies in Nigeria: An Overview of the IoT and 5G Network

Authors: Powei Happiness Kerry

Abstract:

Introducing wireless technologies in Nigeria have improved the quality of lives of Nigerians, however, not everyone sees it in that light. The paper on the environmental impact of wireless technologies in Nigeria summarizes the scholarly views on the impact of wireless technologies on the environment, beaming its searchlight on 5G and internet of things in Nigeria while also exploring the theory of the Technology Acceptance Model (TAM). The study used a qualitative research method to gather important data from relevant sources and contextually draws inference from the derived data. The study concludes that the Federal Government of Nigeria, before agreeing to any latest development in the world of wireless technologies, should weigh the implications and deliberate extensively with all stalk holders putting into consideration the confirmation it will receive from the National Assembly.  

Keywords: Internet of Things, radiofrequency, electromagnetic radiation, information and communications technology, ICT, 5G

Procedia PDF Downloads 129
3737 Feasibility of Small Hydropower Plants Odisha

Authors: Sanoj Sahu, Ramakar Jha

Abstract:

Odisha (India) is in need of reliable, cost-effective power generation. A prolonged electricity crisis and increasing power demand have left over thousands of citizens without access to electricity, and much of the population suffers from sporadic outages. The purpose of this project is to build a methodology to evaluate small hydropower potential, which can be used to alleviate the Odisha’s energy problem among rural communities. This project has three major tasks: the design of a simple SHEP for a single location along a river in the Odisha; the development of water flow prediction equations through a linear regression analysis; and the design of an ArcGIS toolset to estimate the flow duration curves (FDCs) at locations where data do not exist. An explanation of the inputs to the tool, as well has how it produces a suitable output for SHEP evaluation will be presented. The paper also gives an explanation of hydroelectric power generation in the Odisha, SHEPs, and the technical and practical aspects of hydroelectric power. Till now, based on topographical and rainfall analysis we have located hundreds of sites. Further work on more number of site location and accuracy of location is to be done.

Keywords: small hydropower, ArcGIS, rainfall analysis, Odisha’s energy problem

Procedia PDF Downloads 444
3736 Implementation of Successive Interference Cancellation Algorithms in the 5g Downlink

Authors: Mokrani Mohamed Amine

Abstract:

In this paper, we have implemented successive interference cancellation algorithms in the 5G downlink. We have calculated the maximum throughput in Frequency Division Duplex (FDD) mode in the downlink, where we have obtained a value equal to 836932 b/ms. The transmitter is of type Multiple Input Multiple Output (MIMO) with eight transmitting and receiving antennas. Each antenna among eight transmits simultaneously a data rate of 104616 b/ms that contains the binary messages of the three users; in this case, the Cyclic Redundancy Check CRC is negligible, and the MIMO category is the spatial diversity. The technology used for this is called Non-Orthogonal Multiple Access (NOMA) with a Quadrature Phase Shift Keying (QPSK) modulation. The transmission is done in a Rayleigh fading channel with the presence of obstacles. The MIMO Successive Interference Cancellation (SIC) receiver with two transmitting and receiving antennas recovers its binary message without errors for certain values of transmission power such as 50 dBm, with 0.054485% errors when the transmitted power is 20dBm and with 0.00286763% errors for a transmitted power of 32 dBm(in the case of user 1) as well as with 0.0114705% errors when the transmitted power is 20 dBm also with 0.00286763% errors for a power of 24 dBm(in the case of user2) by applying the steps involved in SIC.

Keywords: 5G, NOMA, QPSK, TBS, LDPC, SIC, capacity

Procedia PDF Downloads 99
3735 An Exact Algorithm for Location–Transportation Problems in Humanitarian Relief

Authors: Chansiri Singhtaun

Abstract:

This paper proposes a mathematical model and examines the performance of an exact algorithm for a location–transportation problems in humanitarian relief. The model determines the number and location of distribution centers in a relief network, the amount of relief supplies to be stocked at each distribution center and the vehicles to take the supplies to meet the needs of disaster victims under capacity restriction, transportation and budgetary constraints. The computational experiments are conducted on the various sizes of problems that are generated. Branch and bound algorithm is applied for these problems. The results show that this algorithm can solve problem sizes of up to three candidate locations with five demand points and one candidate location with up to twenty demand points without premature termination.

Keywords: disaster response, facility location, humanitarian relief, transportation

Procedia PDF Downloads 444
3734 Theoretical Exploration for the Impact of Accounting for Special Methods in Connectivity-Based Cohesion Measurement

Authors: Jehad Al Dallal

Abstract:

Class cohesion is a key object-oriented software quality attribute that is used to evaluate the degree of relatedness of class attributes and methods. Researchers have proposed several class cohesion measures. However, the effect of considering the special methods (i.e., constructors, destructors, and access and delegation methods) in cohesion calculation is not thoroughly theoretically studied for most of them. In this paper, we address this issue for three popular connectivity-based class cohesion measures. For each of the considered measures we theoretically study the impact of including or excluding special methods on the values that are obtained by applying the measure. This study is based on analyzing the definitions and formulas that are proposed for the measures. The results show that including/excluding special methods has a considerable effect on the obtained cohesion values and that this effect varies from one measure to another. For each of the three connectivity-based measures, the proposed theoretical study recommended excluding the special methods in cohesion measurement.

Keywords: object-oriented class, software quality, class cohesion measure, class cohesion, special methods

Procedia PDF Downloads 290
3733 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 309
3732 Comparative Study between Classical P-Q Method and Modern Fuzzy Controller Method to Improve the Power Quality of an Electrical Network

Authors: A. Morsli, A. Tlemçani, N. Ould Cherchali, M. S. Boucherit

Abstract:

This article presents two methods for the compensation of harmonics generated by a nonlinear load. The first is the classic method P-Q. The second is the controller by modern method of artificial intelligence specifically fuzzy logic. Both methods are applied to an Active Power Filter shunt (APFs) based on a three-phase voltage converter at five levels NPC topology. In calculating the harmonic currents of reference, we use the algorithm P-Q and pulse generation, we use the intersective PWM. For flexibility and dynamics, we use fuzzy logic. The results give us clear that the rate of Harmonic Distortion issued by fuzzy logic is better than P-Q.

Keywords: fuzzy logic controller, P-Q method, pulse width modulation (PWM), shunt active power filter (sAPF), total harmonic distortion (THD)

Procedia PDF Downloads 544
3731 Towards Value-Based Healthcare through a Nursing Sector Management Approach

Authors: Hadeer Hegazy, Wael Ewieda, Ranin Soliman, Samah Elway, Asmaa Tawfik, Ragaa Sayed, Sahar Mousa

Abstract:

The current healthcare system is facing major challenges in terms of cost, quality of care, and access to services. In response, the concept of value-based healthcare has emerged as a new approach to healthcare delivery. This concept puts the focus on patient values rather than on the traditional medical model of care. To achieve this, healthcare organizations must be agile and able to anticipate and respond quickly to changing needs. Agile management is essential for healthcare organizations to achieve value-based care, as it allows them to rapidly adjust their strategies to changing circumstances. Additionally, it is argued that agile management can help healthcare organizations gain a better understanding of the needs of their patients and develop better care delivery models. Besides, it can help healthcare organizations develop new services, innovate, and become more efficient. The authors provide evidence to support their argument, drawing on examples from successful value-based healthcare initiatives at children’s cancer hospital Egypt-57357. The paper offers insight into how agile management can be used to facilitate the shift towards value-based healthcare and how it can be used to maximize value in the healthcare system.

Keywords: value-based healthcare, agility in healthcare, nursing department, patients outcomes

Procedia PDF Downloads 762
3730 Emotion-Convolutional Neural Network for Perceiving Stress from Audio Signals: A Brain Chemistry Approach

Authors: Anup Anand Deshmukh, Catherine Soladie, Renaud Seguier

Abstract:

Emotion plays a key role in many applications like healthcare, to gather patients’ emotional behavior. Unlike typical ASR (Automated Speech Recognition) problems which focus on 'what was said', it is equally important to understand 'how it was said.' There are certain emotions which are given more importance due to their effectiveness in understanding human feelings. In this paper, we propose an approach that models human stress from audio signals. The research challenge in speech emotion detection is finding the appropriate set of acoustic features corresponding to an emotion. Another difficulty lies in defining the very meaning of emotion and being able to categorize it in a precise manner. Supervised Machine Learning models, including state of the art Deep Learning classification methods, rely on the availability of clean and labelled data. One of the problems in affective computation is the limited amount of annotated data. The existing labelled emotions datasets are highly subjective to the perception of the annotator. We address the first issue of feature selection by exploiting the use of traditional MFCC (Mel-Frequency Cepstral Coefficients) features in Convolutional Neural Network. Our proposed Emo-CNN (Emotion-CNN) architecture treats speech representations in a manner similar to how CNN’s treat images in a vision problem. Our experiments show that Emo-CNN consistently and significantly outperforms the popular existing methods over multiple datasets. It achieves 90.2% categorical accuracy on the Emo-DB dataset. We claim that Emo-CNN is robust to speaker variations and environmental distortions. The proposed approach achieves 85.5% speaker-dependant categorical accuracy for SAVEE (Surrey Audio-Visual Expressed Emotion) dataset, beating the existing CNN based approach by 10.2%. To tackle the second problem of subjectivity in stress labels, we use Lovheim’s cube, which is a 3-dimensional projection of emotions. Monoamine neurotransmitters are a type of chemical messengers in the brain that transmits signals on perceiving emotions. The cube aims at explaining the relationship between these neurotransmitters and the positions of emotions in 3D space. The learnt emotion representations from the Emo-CNN are mapped to the cube using three component PCA (Principal Component Analysis) which is then used to model human stress. This proposed approach not only circumvents the need for labelled stress data but also complies with the psychological theory of emotions given by Lovheim’s cube. We believe that this work is the first step towards creating a connection between Artificial Intelligence and the chemistry of human emotions.

Keywords: deep learning, brain chemistry, emotion perception, Lovheim's cube

Procedia PDF Downloads 149
3729 Safety Status of Stations and Tunnels of Tehran Line 4 Urban and Suburb Railways (Subway) Against Fire Risks

Authors: Yousefi Aryian, Ghanbaripour Amir naser

Abstract:

Record of 2 million trips during a day by subway makes it the most application and the most efficient branch of public transportation. Great safety, energy consumption reduction, appropriate speed, and lower prices for passengers in comparison with private cars or buses, are some reasons for this remarkable statics. This increasing popularity compels the author to evaluate the safety of subway stations and tunnels against fire and fire extinguishing systems in Tehran subway network and then compare some of its safety parameters to other countries. This paper assessed the methods and systems used in different parts of Tehran subway and then by comparing the facilities and equipment necessary to declare and extinguish the fire, the solutions and world standards (NFPA) are explored.

Keywords: subway station, tunnel, fire alarm, extinguishing fire, NFPA standards

Procedia PDF Downloads 473
3728 The Visualizer for Real-Time Analysis of Internet Trends

Authors: Radek Malinský, Ivan Jelínek

Abstract:

The current web has become a modern encyclopedia, where people share their thoughts and ideas on various topics around them. Such kind of encyclopedia is very useful for other people who are looking for answers to their questions. However, with the growing popularity of social networking and blogging and ever expanding network services, there has also been a growing diversity of technologies along with different structure of individual websites. It is, therefore, difficult to directly find a relevant answer for a common Internet user. This paper presents a web application for the real-time end-to-end analysis of selected Internet trends; where the trend can be whatever the people post online. The application integrates fully configurable tools for data collection and analysis using selected webometric algorithms, and for its chronological visualization to user. It can be assumed that the application facilitates the users to evaluate the quality of various products that are mentioned online.

Keywords: Trend, visualizer, web analysis, web 2.0.

Procedia PDF Downloads 261
3727 Developing an AI-Driven Application for Real-Time Emotion Recognition from Human Vocal Patterns

Authors: Sayor Ajfar Aaron, Mushfiqur Rahman, Sajjat Hossain Abir, Ashif Newaz

Abstract:

This study delves into the development of an artificial intelligence application designed for real-time emotion recognition from human vocal patterns. Utilizing advanced machine learning algorithms, including deep learning and neural networks, the paper highlights both the technical challenges and potential opportunities in accurately interpreting emotional cues from speech. Key findings demonstrate the critical role of diverse training datasets and the impact of ambient noise on recognition accuracy, offering insights into future directions for improving robustness and applicability in real-world scenarios.

Keywords: artificial intelligence, convolutional neural network, emotion recognition, vocal patterns

Procedia PDF Downloads 45
3726 Collaborative Implementation of Master Plans in Afghanistan's Context Considering Land Readjustment as Case Study

Authors: Ahmad Javid Habib, Tetsuo Kidokoro

Abstract:

There is an increasing demand for developing urban land to provide better living conditions for all citizens in Afghanistan. Most of the development will involve the acquisition of land. And the current land acquisition method practiced by central government is expropriation, which is a cash-based transaction method that imposes heavy fiscal burden on local municipalities and central government, and it does not protect ownership rights and social equity of landowners besides it relocates the urban poor to remote areas with limited access to jobs and public services. The questionnaire analysis, backed by observations of different case studies in countries where land readjustment is used as a collaborative land development tool indicates that the method plays a key role in valuing landowners’ rights, giving other community members and stakeholders the opportunity to collaboratively implement urban development projects. The practice of the method is reducing the heavy fiscal burden on the local and central governments and is a better option to deal with the current development challenges in Afghanistan.

Keywords: collaboration, land readjustment, master plan, expropriation

Procedia PDF Downloads 291
3725 Stimuli Responsives of Crosslinked Poly on 2-HydroxyEthyl MethAcrylate – Optimization of Parameters by Experimental Design

Authors: Tewfik Bouchaour, Salah Hamri, Yasmina Houda Bendahma, Ulrich Maschke

Abstract:

Stimuli-responsive materials based on UV crosslinked acrylic polymer networks are fabricated. A various kinds of polymeric systems, hydrophilic polymers based on 2-Hydroxyethyl methacrylate have been widely studied because of their ability to simulate biological tissues, which leads to many applications. The acrylic polymer network PHEMA developed by UV photopolymerization has been used for dye retention. For these so-called smart materials, the properties change in response to an external stimulus. In this contribution, we report the influence of some parameters (initial composition, temperature, and nature of components) in the properties of final materials. Optimization of different parameters is examined by experimental design.

Keywords: UV photo-polymerization, PHEMA, external stimulus, optimization

Procedia PDF Downloads 252
3724 Issue Reorganization Using the Measure of Relevance

Authors: William Wong Xiu Shun, Yoonjin Hyun, Mingyu Kim, Seongi Choi, Namgyu Kim

Abstract:

Recently, the demand of extracting the R&D keywords from the issues and using them in retrieving R&D information is increasing rapidly. But it is hard to identify the related issues or to distinguish them. Although the similarity between the issues cannot be identified, but with the R&D lexicon, the issues that always shared the same R&D keywords can be determined. In details, the R&D keywords that associated with particular issue is implied the key technology elements that needed to solve the problem of the particular issue. Furthermore, the related issues that sharing the same R&D keywords can be showed in a more systematic way through the issue clustering constructed from the perspective of R&D. Thus, sharing of the R&D result and reusable of the R&D technology can be facilitated. Indirectly, the redundancy of investment on the same R&D can be reduce as the R&D information can be shared between those corresponding issues and reusability of the related R&D can be improved. Therefore, a methodology of constructing an issue clustering from the perspective of common R&D keywords is proposed to satisfy the demands mentioned.

Keywords: clustering, social network analysis, text mining, topic analysis

Procedia PDF Downloads 570
3723 Combined Localization, Beamforming, and Interference Threshold Estimation in Underlay Cognitive System

Authors: Omar Nasr, Yasser Naguib, Mohamed Hafez

Abstract:

This paper aims at providing an innovative solution for blind interference threshold estimation in an underlay cognitive network to be used in adaptive beamforming by secondary user Transmitter and Receiver. For the task of threshold estimation, blind detection of modulation and SNR are used. For the sake of beamforming several localization algorithms are compared to settle on best one for cognitive environment. Beamforming algorithms as LCMV (Linear Constraint Minimum Variance) and MVDR (Minimum Variance Distortion less) are also proposed and compared. The idea of just nulling the primary user after knowledge of its location is discussed against the idea of working under interference threshold.

Keywords: cognitive radio, underlay, beamforming, MUSIC, MVDR, LCMV, threshold estimation

Procedia PDF Downloads 577
3722 Enabling Exporting in Cameroon Using Export Promotion Programs

Authors: Morfaw Bernice Njinju

Abstract:

The contribution of exporting and small businesses to an economy cannot be overemphasized. However, small firms in developing economies are characterized by resource deficiencies, which hinders their exporting abilities. As a result, export promotion programs are designed by the government as external resources that small firms can access to overcome export barriers and improve their exporting. Nevertheless, doubts still exist as to whether firms are aware of these programs and the extent to which they are utilizing it. To analyse the level of awareness and usage of these programs, the questionnaire was developed from the review of the literature. A pilot study was conducted to determine the ease of completing the questionnaire by respondent before incorporating feedback to produce the final questionnaire. Data were collected from 200 small businesses in Cameroon in the manufacturing and agricultural sector through random sampling and analysed using regression analysis. The results indicated that different programs had different levels of awareness than others. Programs to provide training to improve product quality was found to have the highest level of awareness while those providing findings had low levels of awareness. Despite these different levels of awareness, usage was very low, as firms do not want to open up to government scrutiny of their business. Implications to policy, practice, and direction for further research are also discussed.

Keywords: export promotion programs, exporting, small businesses, Cameroon

Procedia PDF Downloads 107
3721 UAV’s Enhanced Data Collection for Heterogeneous Wireless Sensor Networks

Authors: Kamel Barka, Lyamine Guezouli, Assem Rezki

Abstract:

In this article, we propose a protocol called DataGA-DRF (a protocol for Data collection using a Genetic Algorithm through Dynamic Reference Points) that collects data from Heterogeneous wireless sensor networks. This protocol is based on DGA (Destination selection according to Genetic Algorithm) to control the movement of the UAV (Unmanned aerial vehicle) between dynamic reference points that virtually represent the sensor node deployment. The dynamics of these points ensure an even distribution of energy consumption among the sensors and also improve network performance. To determine the best points, DataGA-DRF uses a classification algorithm such as K-Means.

Keywords: heterogeneous wireless networks, unmanned aerial vehicles, reference point, collect data, genetic algorithm

Procedia PDF Downloads 77
3720 Short Text Classification for Saudi Tweets

Authors: Asma A. Alsufyani, Maram A. Alharthi, Maha J. Althobaiti, Manal S. Alharthi, Huda Rizq

Abstract:

Twitter is one of the most popular microblogging sites that allows users to publish short text messages called 'tweets'. Increasing the number of accounts to follow (followings) increases the number of tweets that will be displayed from different topics in an unclassified manner in the timeline of the user. Therefore, it can be a vital solution for many Twitter users to have their tweets in a timeline classified into general categories to save the user’s time and to provide easy and quick access to tweets based on topics. In this paper, we developed a classifier for timeline tweets trained on a dataset consisting of 3600 tweets in total, which were collected from Saudi Twitter and annotated manually. We experimented with the well-known Bag-of-Words approach to text classification, and we used support vector machines (SVM) in the training process. The trained classifier performed well on a test dataset, with an average F1-measure equal to 92.3%. The classifier has been integrated into an application, which practically proved the classifier’s ability to classify timeline tweets of the user.

Keywords: corpus creation, feature extraction, machine learning, short text classification, social media, support vector machine, Twitter

Procedia PDF Downloads 151