Search results for: career information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11215

Search results for: career information

7225 Unmanned Aerial Vehicle Use for Emergency Purpose

Authors: Shah S. M. A., Aftab U.

Abstract:

It is imperative in today’s world to get a real time information about different emergency situation occurred in the environment. Helicopters are mostly used to access places which are hard to access in emergencies like earthquake, floods, bridge failure or in any other disasters conditions. Use of helicopters are considered more costly to properly collect the data. Therefore a new technique has been introduced in this research to promptly collect data using drones. The drone designed in this research is based on trial and error experimental work with objective to construct an economical drone. Locally available material have been used for this purpose. And a mobile camera were also attached to prepare video during the flight. It was found that within very limited resources the result were quite successful.

Keywords: UAV, real time, camera, disasters

Procedia PDF Downloads 237
7224 Wavelets Contribution on Textual Data Analysis

Authors: Habiba Ben Abdessalem

Abstract:

The emergence of giant set of textual data was the push that has encouraged researchers to invest in this field. The purpose of textual data analysis methods is to facilitate access to such type of data by providing various graphic visualizations. Applying these methods requires a corpus pretreatment step, whose standards are set according to the objective of the problem studied. This step determines the forms list contained in contingency table by keeping only those information carriers. This step may, however, lead to noisy contingency tables, so the use of wavelet denoising function. The validity of the proposed approach is tested on a text database that offers economic and political events in Tunisia for a well definite period.

Keywords: textual data, wavelet, denoising, contingency table

Procedia PDF Downloads 277
7223 Cyber Bullying, Online Risks and Parental Mediation: A Comparison between Adolescent Reports and Parent Perceptions in South Africa

Authors: Masa Popovac, Philip Fine

Abstract:

Information and Communication Technologies (ICTs) have altered our social environments, and young people in particular have immersed themselves in the digital age. Despite countless benefits, younger ICT users are being exposed to various online risks such as contact with strangers, viewing of risky content, sending or receiving sexually themed images or comments (i.e. ‘sexting’) as well as cyber bullying. Parents may not be fully aware of the online spaces their children inhabit and often struggle to implement effective mediation strategies. This quantitative study explored (i) three types of online risks (contact risks, content risks and conduct risks), (ii) cyber bullying victimization and perpetration, and (iii) parental mediation among a sample of 689 South African adolescents aged between 12-17 years. Survey data was also collected for 227 of their parents relating to their perceptions of their child’s online experiences. A comparison between adolescent behaviors and parental perceptions was examined on the three variables in the study. Findings reveal various online risk taking behaviors. In terms of contact risks, 56% of adolescents reported having contact with at least one online stranger, with many meeting these strangers in person. Content risks included exposure to harmful information such as websites promoting extreme diets or self-harm as well as inappropriate content: 84% of adolescents had seen violent content and 75% had seen sexual content online. Almost 60% of adolescents engaged in conduct risks such as sexting. Eight online victimization behaviors were examined in the study and 79% of adolescents had at least one of these negative experiences, with a third (34%) defining this experience as cyber bullying. A strong connection between victimization and perpetration was found, with 63% of adolescents being both a victim and perpetrator. Very little parental mediation of ICT use was reported. Inferential statistics revealed that parents consistently underestimated their child’s online risk taking behaviors as well as their cyber bullying victimization and perpetration. Parents also overestimated mediation strategies in the home. The generational gap in the knowledge and use of ICTs is a barrier to effective parental mediation and online safety, since many negative online experiences by adolescents go undetected and can continue for extended periods of time thereby exacerbating the potential psychological and emotional distress. The study highlights the importance of including parents in online safety efforts.

Keywords: cyber bullying, online risk behaviors, parental mediation, South Africa

Procedia PDF Downloads 482
7222 Efficient Single Relay Selection Scheme for Cooperative Communication

Authors: Sung-Bok Choi, Hyun-Jun Shin, Hyoung-Kyu Song

Abstract:

This paper proposes a single relay selection scheme in cooperative communication. Decode and forward scheme is considered when a source node wants to cooperate with a single relay for data transmission. To use the proposed single relay selection scheme, the source node make a little different pattern signal which is not complex pattern and broadcasts it. The proposed scheme does not require the channel state information between the source node and candidates of the relay during the relay selection. Therefore, it is able to be used in many fields.

Keywords: relay selection, cooperative communication, df, channel codes

Procedia PDF Downloads 670
7221 Examining Reading Comprehension Skills Based on Different Reading Comprehension Frameworks and Taxonomies

Authors: Seval Kula-Kartal

Abstract:

Developing students’ reading comprehension skills is an aim that is difficult to accomplish and requires to follow long-term and systematic teaching and assessment processes. In these processes, teachers need tools to provide guidance to them on what reading comprehension is and which comprehension skills they should develop. Due to a lack of clear and evidence-based frameworks defining reading comprehension skills, especially in Turkiye, teachers and students mostly follow various processes in the classrooms without having an idea about what their comprehension goals are and what those goals mean. Since teachers and students do not have a clear view of comprehension targets, strengths, and weaknesses in students’ comprehension skills, the formative feedback processes cannot be managed in an effective way. It is believed that detecting and defining influential comprehension skills may provide guidance both to teachers and students during the feedback process. Therefore, in the current study, some of the reading comprehension frameworks that define comprehension skills operationally were examined. The aim of the study is to develop a simple and clear framework that can be used by teachers and students during their teaching, learning, assessment, and feedback processes. The current study is qualitative research in which documents related to reading comprehension skills were analyzed. Therefore, the study group consisted of recourses and frameworks which made big contributions to theoretical and operational definitions of reading comprehension. A content analysis was conducted on the resources included in the study group. To determine the validity of the themes and sub-categories revealed as the result of content analysis, three educational assessment experts were asked to examine the content analysis results. The Fleiss’ Cappa coefficient revealed that there is consistency among themes and categories defined by three different experts. The content analysis of the reading comprehension frameworks revealed that comprehension skills could be examined under four different themes. The first and second themes focus on understanding information given explicitly or implicitly within a text. The third theme includes skills used by the readers to make connections between their personal knowledge and the information given in the text. Lastly, the fourth theme focus on skills used by readers to examine the text with a critical view. The results suggested that fundamental reading comprehension skills can be examined under four themes. Teachers are recommended to use these themes in their reading comprehension teaching and assessment processes. Acknowledgment: This research is supported by Pamukkale University Scientific Research Unit within the project, whose title is Developing A Reading Comprehension Rubric.

Keywords: reading comprehension, assessing reading comprehension, comprehension taxonomies, educational assessment

Procedia PDF Downloads 82
7220 The Missing Link in Holistic Health Care: Value-Based Medicine in Entrustable Professional Activities for Doctor-Patient Relationship

Authors: Ling-Lang Huang

Abstract:

Background: The holistic health care should ideally cover physical, mental, spiritual, and social aspects of a patient. With very constrained time in current clinical practice system, medical decisions often tip the balance in favor of evidence-based medicine (EBM) in comparison to patient's personal values. Even in the era of competence-based medical education (CBME), when scrutinizing the items of entrustable professional activities (EPAs), we found that EPAs of establishing doctor-patient relationship remained incomplete or even missing. This phenomenon prompted us to raise this project aiming at advocating value-based medicine (VBM), which emphasizes the importance of patient’s values in medical decisions. A true and effective doctor-patient communication and relationship should be a well-balanced harmony of EBM and VBM. By constructing VBM into current EPAs, we can further promote genuine shared decision making (SDM) and fix the missing link in holistic health care. Methods: In this project, we are going to find out EPA elements crucial for establishing an ideal doctor-patient relationship through three distinct pairs of doctor-patient relationships: patients with pulmonary arterial hypertension (relatively young but with grave disease), patients undergoing surgery (facing critical medical decisions), and patients with terminal diseases (facing forthcoming death). We’ll search for important EPA elements through the following steps: 1. Narrative approach to delineate patients’ values among 2. distinct groups. 3.Hermeneutics-based interview: semi-structured interview will be conducted for both patients and physicians, followed by qualitative analysis of collected information by compiling, disassembling, reassembling, interpreting, and concluding. 4. Preliminarily construct those VBM elements into EPAs for doctor-patient relationships in 3 groups. Expected Outcomes: The results of this project are going to give us invaluable information regarding the impact of patients’ values, while facing different medical situations, on the final medical decision. The competence of well-blending and -balanced both values from patients and evidence from clinical sciences is the missing link in holistic health care and should be established in future EPAs to enhance an effective SDM.

Keywords: value-based medicine, shared decision making, entrustable professional activities, holistic health care

Procedia PDF Downloads 121
7219 Development of a Mathematical Theoretical Model and Simulation of the Electromechanical System for Wave Energy Harvesting

Authors: P. Valdez, M. Pelissero, A. Haim, F. Muiño, F. Galia, R. Tula

Abstract:

As a result of the studies performed on the wave energy resource worldwide, a research project was set up to harvest wave energy for its conversion into electrical energy. Within this framework, a theoretical model of the electromechanical energy harvesting system, developed with MATLAB’s Simulink software, will be provided. This tool recreates the site conditions where the device will be installed and offers valuable information about the amount of energy that can be harnessed. This research provides a deeper understanding of the utilization of wave energy in order to improve the efficiency of a 1:1 scale prototype of the device.

Keywords: electromechanical device, modeling, renewable energy, sea wave energy, simulation

Procedia PDF Downloads 488
7218 Measures for Conflict Management in Nigerian Higher Institutions

Authors: Oyelade Oluwatoyin

Abstract:

The phenomenon of crises in educational sector in Nigeria has reached its peak in the 21st century. Thus, this paper examines the strategies that can be used in managing the conflict situation in Nigeria Higher Institution of learning. The causes of conflicts such as inadequate funding, insufficient school facilities, poor working condition, poor enrolment, proliferation of higher institutions and unfavourable administrative decision are the major detriment of law and order i.e. strike action, destruction of property and programmes coupled with the student unrest. This write-up will make use of the available information and with the aim of adding value to existing knowledge. It was recommend that steps should be taken by policy maker to prevent scourge of conflicts in tertiary institutions in Nigeria

Keywords: conflicts, higher institutions, management, measures

Procedia PDF Downloads 369
7217 Using the Semantic Web Technologies to Bring Adaptability in E-Learning Systems

Authors: Fatima Faiza Ahmed, Syed Farrukh Hussain

Abstract:

The last few decades have seen a large proportion of our population bending towards e-learning technologies, starting from learning tools used in primary and elementary schools to competency based e-learning systems specifically designed for applications like finance and marketing. The huge diversity in this crowd brings about a large number of challenges for the designers of these e-learning systems, one of which is the adaptability of such systems. This paper focuses on adaptability in the learning material in an e-learning course and how artificial intelligence and the semantic web can be used as an effective tool for this purpose. The study proved that the semantic web, still a hot topic in the area of computer science can prove to be a powerful tool in designing and implementing adaptable e-learning systems.

Keywords: adaptable e-learning, HTMLParser, information extraction, semantic web

Procedia PDF Downloads 339
7216 The Meaning System of Tense: A Systemic Functional Approach

Authors: Cunyu Zhang

Abstract:

Through literature review about studies related to tense, it is found that there exist disagreements on the definition and existence of Chinese tense. Influenced by some researches on English language which regard tense as a grammatical category based on the verbal inflections of English, some Chinese researchers claim that there is no tense in Chinese language as there are no verbal inflections involved. Meanwhile, other Chinese researchers hold that Chinese still has tense although its verbs are non-inflectional based on the fact that Chinese lexical expressions can imply temporal meaning. We assume that the reasons for the above disagreements in terms of Chinese tense lie in the fact that all the previous studies prefer to view language “from the below” which means expressions of tense are the core part of these studies. However, there are about 6,000 languages with distinct expressions all over the world. Hence, if the language studies only concentrate on expressions, it must become more difficult to understand the nature of language. By contrast, functions of languages are similar; otherwise, the human beings could not communicate with each other. Therefore, we believe that it is necessary for us to have a theoretical study on Chinese tense within the framework of SFL which holds that language is a system where meaning is the core part while form is just the realization of meaning. In addition, SFL is a general linguistic providing a universal framework for languages all over the world. Therefore, based on Systemic Functional Linguistics, the paper firstly redefines tense as a deictic semantic category for describing the speaker’s temporal location of processes and relevant temporal relations. With reference to this definition, this study explores the meaning system of tense. It is proposed that tense expresses four kinds of meaning, namely interpersonal, experiential, logical and textual meanings. From the interpersonal angle, tense helps to exchange temporal information between the speaker and the listener, and the temporal information refers to the anchoring of a concerned process in the past, present or future by the speaker. From the experiential angle, tense plays a role in the temporal locating of material, mental, relational, existential, behavioral and verbal processes by the speaker. From the logical angle, tense denotes the temporal relations at the two levels of clause and clause complex, and such relations fall into simultaneity, anteriority and posteriority. From the textual angle, tense refers to the temporal relations at the level of text, and the temporal relations in question concern linear serial relations and synchronous serial relations.

Keywords: Chinese, meaning system, Systemic Functional Linguistics, tense

Procedia PDF Downloads 420
7215 Performance Analysis of Scalable Secure Multicasting in Social Networking

Authors: R. Venkatesan, A. Sabari

Abstract:

Developments of social networking internet scenario are recommended for the requirements of scalable, authentic, secure group communication model like multicasting. Multicasting is an inter network service that offers efficient delivery of data from a source to multiple destinations. Even though multicast has been very successful at providing an efficient and best-effort data delivery service for huge groups, it verified complex process to expand other features to multicast in a scalable way. Separately, the requirement for secure electronic information had become gradually more apparent. Since multicast applications are deployed for mainstream purpose the need to secure multicast communications will become significant.

Keywords: multicasting, scalability, security, social network

Procedia PDF Downloads 292
7214 Process Flows and Risk Analysis for the Global E-SMC

Authors: Taeho Park, Ming Zhou, Sangryul Shim

Abstract:

With the emergence of the global economy, today’s business environment is getting more competitive than ever in the past. And many supply chain (SC) strategies and operations have significantly been altered over the past decade to overcome more complexities and risks imposed onto the global business. First, offshoring and outsourcing are more adopted as operational strategies. Manufacturing continues to move to better locations for enhancing competitiveness. Second, international operations are a challenge to a company’s SC system. Third, the products traded in the SC system are not just physical goods, but also digital goods (e.g., software, e-books, music, video materials). There are three main flows involved in fulfilling the activities in the SC system: physical flow, information flow, and financial flow. An advance of the Internet and electronic communication technologies has enabled companies to perform the flows of SC activities in electronic formats, resulting in the advent of an electronic supply chain management (e-SCM) system. A SC system for digital goods is somewhat different from the supply chain system for physical goods. However, it involves many similar or identical SC activities and flows. For example, like the production of physical goods, many third parties are also involved in producing digital goods for the production of components and even final products. This research aims at identifying process flows of both physical and digital goods in a SC system, and then investigating all risk elements involved in the physical, information, and financial flows during the fulfilment of SC activities. There are many risks inherent in the e-SCM system. Some risks may have severe impact on a company’s business, and some occur frequently but are not detrimental enough to jeopardize a company. Thus, companies should assess the impact and frequency of those risks, and then prioritize them in terms of their severity, frequency, budget, and time in order to be carefully maintained. We found risks involved in the global trading of physical and digital goods in four different categories: environmental risk, strategic risk, technological risk, and operational risk. And then the significance of those risks was investigated through a survey. The survey asked companies about the frequency and severity of the identified risks. They were also asked whether they had faced those risks in the past. Since the characteristics and supply chain flows of digital goods are varying industry by industry and country by country, it is more meaningful and useful to analyze risks by industry and country. To this end, more data in each industry sector and country should be collected, which could be accomplished in the future research.

Keywords: digital goods, e-SCM, risk analysis, supply chain flows

Procedia PDF Downloads 422
7213 Investigative Study of Consumer Perceptions to the Quality and Safety Attributes of 'Fresh' versus 'Frozen' Cassava (Manihot esculenta Crantz): A Case for Agro-Processing in Trinidad and Tobago, West Indies

Authors: Nadia Miranda Lorick, Neela Badrie, Marsha Singh

Abstract:

Cassava (Manihot esculenta, Crantz) which is also known as ‘yucca’ or ‘manioc’ has been acknowledged as a millennium crop which has been utilized for food security purposes. The crop provides considerable amount of energy. The aim of the study was to assess consumer groups of both ‘fresh’ and ‘frozen’ in terms of their perceptions toward the quality and safety attributes of frozen cassava. The questionnaire included four sections: consumer demographics, consumer perceptions on quality attributes of ‘frozen’ cassava, consumer knowledge, awareness and attitudes toward food safety of ‘frozen’ cassava and consumer suggestions toward the improvement of frozen cassava. A face-to-face questionnaire was administered to 200 consumers of cassava between April and May 2016. The criteria for inclusion in the survey were that they must be 15 years and over and consumer of cassava. The sections of the questionnaire included demographics of respondents, consumer perception on quality and safety attributes of cassava and suggestions for the improvement of the value-added product. The data was analysed by descriptive and chi-square using SPSS as well as qualitative information was captured. Only 17% of respondents purchased frozen cassava and this was significantly (P<0.05) associated to income. Some (15%) of fresh cassava purchasers had never heard of frozen cassava products and 7.5% o perceived that these products were unhealthy for consumption. More than half (51.3%) of the consumers (all from the ‘fresh’ cassava group) believed that there were ‘no toxins’ within cassava. The ‘frozen’ cassava products were valued for convenience but purchasers were least satisfied with ‘value for money’ (50%), ‘product safety’ (50%) and ‘colour’ (52.9%). Cassava purchasers demonstrated highest dissatisfaction levels with the quality attribute: value for money (6.6%, 11.8%) respectively. The most predominant area outlined by respondents for frozen cassava improvement was promotion /advertising/education (23%). The ‘frozen’ cassava purchasers were ‘least satisfied’ thus most concern that clean knives and clean surface would not be used agro- processing. Fresh cassava purchasers were comparatively more knowledgeable on the potential existence of naturally occurring toxins in cassava, however with 1% respondents being able to specifically identify the toxin as ‘cyanide’. Dangerous preservatives (31%), poor hygiene (30%) and chemicals from the packaging (11%) were identified as some sources of contamination of ‘frozen’ cassava. Purchasers of frozen cassava indicated that the information on packaging label was unclear (P<0.01) when compared to ‘fresh’ cassava consumers.

Keywords: consumer satisfaction, convenience, cyanide toxin, product safety, price, label

Procedia PDF Downloads 402
7212 Single Valued Neutrosophic Hesitant Fuzzy Rough Set and Its Application

Authors: K. M. Alsager, N. O. Alshehri

Abstract:

In this paper, we proposed the notion of single valued neutrosophic hesitant fuzzy rough set, by combining single valued neutrosophic hesitant fuzzy set and rough set. The combination of single valued neutrosophic hesitant fuzzy set and rough set is a powerful tool for dealing with uncertainty, granularity and incompleteness of knowledge in information systems. We presented both definition and some basic properties of the proposed model. Finally, we gave a general approach which is applied to a decision making problem in disease diagnoses, and demonstrated the effectiveness of the approach by a numerical example.

Keywords: single valued neutrosophic fuzzy set, single valued neutrosophic fuzzy hesitant set, rough set, single valued neutrosophic hesitant fuzzy rough set

Procedia PDF Downloads 272
7211 Anaplasmosis among Camels in Iran and Observation of Abnormalities in Infected Blood Films

Authors: Khosro Ghazvinian, Touba Khodaiean

Abstract:

Anaplasma organisms are obligatory intracellular bacteria belonging to the order Rickettsiales, family Anaplasmataceae. This disease is distributed around the globe and infected ticks are the most important vectors in anaplasmosis transmission. There is a little information about anaplasmosis in camels. This research investigated the blood films of 35 (20 male, 15 female) camels randomly selected from a flock of 150 camels. Samples were stained with Giemsa and Anaplasma sp. organisms were observed in six out of 35 (17.14 %) blood films. There were also some changes in Diff-Quick and morphology of leukocytes. No significant difference between male and female camels was observed (P>0.05). According to the results anaplasmosis is presented among camels in Iran.

Keywords: anaplasma, anaplasmosis, camel, Iran

Procedia PDF Downloads 246
7210 An Efficient Clustering Technique for Copy-Paste Attack Detection

Authors: N. Chaitawittanun, M. Munlin

Abstract:

Due to rapid advancement of powerful image processing software, digital images are easy to manipulate and modify by ordinary people. Lots of digital images are edited for a specific purpose and more difficult to distinguish form their original ones. We propose a clustering method to detect a copy-move image forgery of JPEG, BMP, TIFF, and PNG. The process starts with reducing the color of the photos. Then, we use the clustering technique to divide information of measuring data by Hausdorff Distance. The result shows that the purposed methods is capable of inspecting the image file and correctly identify the forgery.

Keywords: image detection, forgery image, copy-paste, attack detection

Procedia PDF Downloads 338
7209 Prioritizing Ecosystem Services for South-Central Regions of Chile: An Expert-Based Spatial Multi-Criteria Approach

Authors: Yenisleidy Martinez Martinez, Yannay Casas-Ledon, Jo Dewulf

Abstract:

The ecosystem services (ES) concept has contributed to draw attention to the benefits ecosystems generate for people and how necessary natural resources are for human well-being. The identification and prioritization of the ES constitute the first steps to undertake conservation and valuation initiatives on behalf of people. Additionally, mapping the supply of ES is a powerful tool to support decision making regarding the sustainable management of landscape and natural resources. In this context, the present study aimed to identify, prioritize and map the primary ES in Biobio and Nuble regions using a methodology that combines expert judgment, multi-attribute evaluation methods, and Geographic Information Systems (GIS). Firstly, scores about the capacity of different land use/cover types to supply ES and the importance attributed to each service were obtained from experts and stakeholders via an online survey. Afterward, the ES assessment matrix was constructed, and the weighted linear combination (WLC) method was applied to mapping the overall capacity of supply of provisioning, regulating and maintenance, and cultural services. Finally, prioritized ES for the study area were selected and mapped. The results suggest that native forests, wetlands, and water bodies have the highest supply capacities of ES, while urban and industrial areas and bare areas have a very low supply of services. On the other hand, fourteen out of twenty-nine services were selected by experts and stakeholders as the most relevant for the regions. The spatial distribution of ES has shown that the Andean Range and part of the Coastal Range have the highest ES supply capacity, mostly regulation and maintenance and cultural ES. This performance is related to the presence of native forests, water bodies, and wetlands in those zones. This study provides specific information about the most relevant ES in Biobio and Nuble according to the opinion of local stakeholders and the spatial identification of areas with a high capacity to provide services. These findings could be helpful as a reference by planners and policymakers to develop landscape management strategies oriented to preserve the supply of services in both regions.

Keywords: ecosystem services, expert judgment, mapping, multi-criteria decision making, prioritization

Procedia PDF Downloads 126
7208 Cloud Computing in Jordanian Libraries: An Overview

Authors: Mohammad A. Al-Madi, Nagham A. Al-Madi, Fanan A. Al-Madi

Abstract:

The current concept of the technology of cloud computing libraries has been increasing where users can store their data in a virtual space and can be retrieved from anywhere whilst using the network. By using cloud computing technology, industries and individuals save money, time, and space. Moreover, data and information about libraries can be placed in the cloud. This paper discusses the meaning of cloud computing along with its types. Further, the focus has been given to the application of cloud computing in modern libraries. Additionally, the advantages of cloud computing and the areas in which cloud computing be applied with current usage are discussed. Finally, the present situation of the Jordanian libraries is considered and discussed in further detail.

Keywords: cloud computing, community cloud, hybrid cloud, private cloud, public cloud

Procedia PDF Downloads 221
7207 Digital Image Forensics: Discovering the History of Digital Images

Authors: Gurinder Singh, Kulbir Singh

Abstract:

Digital multimedia contents such as image, video, and audio can be tampered easily due to the availability of powerful editing softwares. Multimedia forensics is devoted to analyze these contents by using various digital forensic techniques in order to validate their authenticity. Digital image forensics is dedicated to investigate the reliability of digital images by analyzing the integrity of data and by reconstructing the historical information of an image related to its acquisition phase. In this paper, a survey is carried out on the forgery detection by considering the most recent and promising digital image forensic techniques.

Keywords: Computer Forensics, Multimedia Forensics, Image Ballistics, Camera Source Identification, Forgery Detection

Procedia PDF Downloads 247
7206 Theoretical Investigation of Structural and Electronic Properties of AlBi

Authors: S. Louhibi-Fasla, H. Achour, B. Amrani

Abstract:

The purpose of this work is to provide some additional information to the existing data on the physical properties of AlBi with state-of-the-art first-principles method of the full potential linear augmented plane wave (FPLAPW). Additionally to the structural properties, the electronic properties have also been investigated. The dependence of the volume, the bulk modulus, the variation of the thermal expansion α, as well as the Debye temperature are successfully obtained in the whole range from 0 to 30 GPa and temperature range from 0 to 1200 K. The latter are the basis of solid-state science and industrial applications and their study is of importance to extend our knowledge on their specific behaviour when undergoing severe constraints of high pressure and high temperature environments.

Keywords: AlBi, FP-LAPW, structural properties, electronic properties

Procedia PDF Downloads 380
7205 Quantum Graph Approach for Energy and Information Transfer through Networks of Cables

Authors: Mubarack Ahmed, Gabriele Gradoni, Stephen C. Creagh, Gregor Tanner

Abstract:

High-frequency cables commonly connect modern devices and sensors. Interestingly, the proportion of electric components is rising fast in an attempt to achieve lighter and greener devices. Modelling the propagation of signals through these cable networks in the presence of parameter uncertainty is a daunting task. In this work, we study the response of high-frequency cable networks using both Transmission Line and Quantum Graph (QG) theories. We have successfully compared the two theories in terms of reflection spectra using measurements on real, lossy cables. We have derived a generalisation of the vertex scattering matrix to include non-uniform networks – networks of cables with different characteristic impedances and propagation constants. The QG model implicitly takes into account the pseudo-chaotic behavior, at the vertices, of the propagating electric signal. We have successfully compared the asymptotic growth of eigenvalues of the Laplacian with the predictions of Weyl law. We investigate the nearest-neighbour level-spacing distribution of the resonances and compare our results with the predictions of Random Matrix Theory (RMT). To achieve this, we will compare our graphs with the generalisation of Wigner distribution for open systems. The problem of scattering from networks of cables can also provide an analogue model for wireless communication in highly reverberant environments. In this context, we provide a preliminary analysis of the statistics of communication capacity for communication across cable networks, whose eventual aim is to enable detailed laboratory testing of information transfer rates using software defined radio. We specialise this analysis in particular for the case of MIMO (Multiple-Input Multiple-Output) protocols. We have successfully validated our QG model with both TL model and laboratory measurements. The growth of Eigenvalues compares well with Weyl’s law and the level-spacing distribution agrees so well RMT predictions. The results we achieved in the MIMO application compares favourably with the prediction of a parallel on-going research (sponsored by NEMF21.)

Keywords: eigenvalues, multiple-input multiple-output, quantum graph, random matrix theory, transmission line

Procedia PDF Downloads 173
7204 Fuzzy Expert Approach for Risk Mitigation on Functional Urban Areas Affected by Anthropogenic Ground Movements

Authors: Agnieszka A. Malinowska, R. Hejmanowski

Abstract:

A number of European cities are strongly affected by ground movements caused by anthropogenic activities or post-anthropogenic metamorphosis. Those are mainly water pumping, current mining operation, the collapse of post-mining underground voids or mining-induced earthquakes. These activities lead to large and small-scale ground displacements and a ground ruptures. The ground movements occurring in urban areas could considerably affect stability and safety of structures and infrastructures. The complexity of the ground deformation phenomenon in relation to the structures and infrastructures vulnerability leads to considerable constraints in assessing the threat of those objects. However, the increase of access to the free software and satellite data could pave the way for developing new methods and strategies for environmental risk mitigation and management. Open source geographical information systems (OS GIS), may support data integration, management, and risk analysis. Lately, developed methods based on fuzzy logic and experts methods for buildings and infrastructure damage risk assessment could be integrated into OS GIS. Those methods were verified base on back analysis proving their accuracy. Moreover, those methods could be supported by ground displacement observation. Based on freely available data from European Space Agency and free software, ground deformation could be estimated. The main innovation presented in the paper is the application of open source software (OS GIS) for integration developed models and assessment of the threat of urban areas. Those approaches will be reinforced by analysis of ground movement based on free satellite data. Those data would support the verification of ground movement prediction models. Moreover, satellite data will enable our mapping of ground deformation in urbanized areas. Developed models and methods have been implemented in one of the urban areas hazarded by underground mining activity. Vulnerability maps supported by satellite ground movement observation would mitigate the hazards of land displacements in urban areas close to mines.

Keywords: fuzzy logic, open source geographic information science (OS GIS), risk assessment on urbanized areas, satellite interferometry (InSAR)

Procedia PDF Downloads 159
7203 Colonization Pattern and Growth of Reintroduced Tiger (Panthera tigris) Population at Central India

Authors: M. S. Sarkar, J. A. Johnson, S. Sen, G. K. Saha, K. Ramesh

Abstract:

There is growing recognition of several important roles played by tigers for maintaining sustainable biodiversity at diverse ecosystems in South and South-East Asia. Only <3200 individuals are left in the wild because of poaching and habitat loss. Thus, restoring wild population is an emerging as well as important conservation initiative, but such efforts still remain challenging due to their elusive and solitary behavior. After careful translocation of few individuals, how reintroduced individuals colonize into suitable habitat and achieve stable stage population through reproduction is vital information for forest managers and policy makers of its 13 distribution range countries. Four wild and two captive radio collared tigers were reintroduced at Panna Tiger Reserve, Madhya-pradesh, India during 2009-2014. We critically examined their settlement behavior and population growth over the period. Results from long term telemetry data showed that male explored larger areas rapidly in short time span, while females explored small area in long time period and with significant high rate of movement in both sexes during exploratory period. Significant difference in home range sizes of tigers were observed in exploratory and settlement period. Though all reintroduced tigers preferred densely vegetated undisturbed forest patches within the core area of tiger reserve, a niche based k select analysis showed that individual variation in habitat selection was prominent among reintroduced tigers. Total 18 litter of >42 known cubs were born with low mortality rate, high maternity rate, high observed growth rate and short generation time in both the sexes. The population achieved its carrying capacity in a very short time span, marking success of this current tiger conservation programme. Our study information could provide significant insights on the tiger biology of translocated tigers with implication for future conservation strategies that consider translocation based recovery in their range countries.

Keywords: reintroduction, tiger, home range, demography

Procedia PDF Downloads 219
7202 Impact of Financial and Non-Financial Motivation on Motivating Employees

Authors: Al-Yaqdhan Al-Rawahi, Kaneez Fatima Sadriwala

Abstract:

The purpose of this paper is to discover the readiness of Civil Service Employee Pension Fund (CSEPF), a governmental organization, in motivating its staff. Exploratory survey has been conducted in order to extract needed information. For this purpose we proposed a questionnaire to understand staff viewpoint of motivation. Data was analyzed by using SPSS 15.0 for Windowsand Excel. Major results prove that good working conditions is the most important factor of staff and sympathetic help with personal problem is the least important one. Also the relationship between financial motivation and employee motivation is very weak, whereas with non-financial motivation and employee motivation is moderate. Future research may focus on studying all departments of CSEPF.

Keywords: financial motivation, non-financial motivation, employee motivation

Procedia PDF Downloads 386
7201 The Relevance of Intellectual Capital: An Analysis of Spanish Universities

Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez

Abstract:

In recent years, the intellectual capital reporting in higher education institutions has been acquiring progressive importance worldwide. Intellectual capital approaches becomes critical at universities, mainly due to the fact that knowledge is the main output as well as input in these institutions. Universities produce knowledge, either through scientific and technical research (the results of investigation, publications, etc.) or through teaching (students trained and productive relationships with their stakeholders). The purpose of the present paper is to identify the intangible elements about which university stakeholders demand most information. The results of a study done at Spanish universities are used to see which groups of universities have stakeholders who are more proactive to the disclosure of intellectual capital.

Keywords: intellectual capital, universities, Spain, cluster analysis

Procedia PDF Downloads 508
7200 Enhancing EFL Learners' Motivation and Classroom Interaction through Self-Disclosure in Moroccan Higher Education

Authors: Mohsine Jebbour

Abstract:

Motivation and classroom interaction are of prime significance for second/foreign language learning to take place effectively. Thus, a considerable amount of motivation and classroom interaction helps ensure students’ success in and continuation of learning the TL. One way to enhance students’ motivation and classroom interaction in the Moroccan EFL classroom then is through the use of self-disclosure. For the purposes of this study, self-disclosure has been defined as the verbal communication of positive personal information including opinions, feelings, experiences, family and friendship stories to classmates and teachers. This paper is meant to demonstrate that positive self-disclosure can serve as an effective tool for helping students develop favorable attitudes toward the EFL classroom (i.e., English courses, teacher of English, and classroom activities) and promoting their intrinsic motivation (IM to know and IM toward stimulation). A further objective is that since self-disclosure is reciprocal, when teachers of English reveal their personal information, students will uncover their personal matters in return. This will help ensure effective classroom participation, foster teacher-student communication, and encourage students to practice and hence improve their oral proficiency (i.e., the speaking skill). A questionnaire was used to collect data in this study. 164 undergraduate students (99 females and 65 males) from the department of English at the faculty of letters and humanities, Dher el Mehraz, Sidi Mohammed Ben Abd Allah University completed a questionnaire that assessed self-disclosure in relation to motivation (i.e., attitudes toward the learning situation and intrinsic motivation) and classroom interaction (i.e., teacher-student interaction, participation, and out-of-class communication) on a 1 to 5 scale with (1) Strongly Disagree and (5) Strongly Agree. The level of agreement on the positive dimension of self-disclosure was ranked first by the respondents. The hypothesis set at the very beginning of the study, which posited that positive self-disclosure is essential to enhancing motivation and classroom interaction in the EFL context, was confirmed. In this regard, the findings suggest that implementing self-disclosure in the Moroccan EFL classroom may serve as an effective tool to have positive affect of teacher, class and classroom activities. This in turn will encourage the learners to attend classes, enjoy the language learning activity, complete classroom assignments, participate in class discussions, and interact with their teachers and classmates. It is hoped that teachers benefit from the results of this study and hence encourage the use of positive self-disclosure to develop English language learning in the Moroccan context where opportunities of using English outside the classroom are limited.

Keywords: EFL classroom, classroom interaction, motivation, self-disclosure

Procedia PDF Downloads 313
7199 A Method for Automated Planning of Fiber to the Home Access Network Infrastructures

Authors: Hammad Khalid

Abstract:

In this paper, a strategy for computerized arranging of Fiber to the Home (FTTH) get to systems is proposed. We presented an efficient methodology for arranging access organize framework. The GIS information and a lot of calculations were utilized to make the arranging procedure increasingly programmed. The technique clarifies various strides of the arranging process. Considering various situations, various designs can be produced by utilizing the technique. It was likewise conceivable to produce the designs in an extremely brief temporal contrast with the conventional arranging. A contextual investigation is considered to delineate the utilization and abilities of the arranging technique. The technique, be that as it may, doesn't completely robotize the arranging however, make the arranging procedure fundamentally quick. The outcomes and dialog are displayed and end is given at last.

Keywords: FTTH, GIS, robotize, plan

Procedia PDF Downloads 153
7198 Path-Spin to Spin-Spin Hybrid Quantum Entanglement: A Conversion Protocol

Authors: Indranil Bayal, Pradipta Panchadhyayee

Abstract:

Path-spin hybrid entanglement generated and confined in a single spin-1/2 particle is converted to spin-spin hybrid interparticle entanglement, which finds its important applications in quantum information processing. This protocol uses beam splitter, spin flipper, spin measurement, classical channel, unitary transformations, etc., and requires no collective operation on the pair of particles whose spin variables share complete entanglement after the accomplishment of the protocol. The specialty of the protocol lies in the fact that the path-spin entanglement is transferred between spin degrees of freedom of two separate particles initially possessed by a single party.

Keywords: entanglement, path-spin entanglement, spin-spin entanglement, CNOT operation

Procedia PDF Downloads 198
7197 Chinese Tourists's Behaviors towards Travel and Shopping in Bangkok

Authors: Sasitorn Chetanont

Abstract:

The objectives of this study are to study Chinese tourist’s Behaviors towards travel and shopping in Bangkok. The research methodology was a quantitative research. The sample of this research was 400 Chinese tourists in Bangkok chosen by the accidental sampling and the purposive sampling. Inferential Statistics Analysis by using the Chi-square statistics. As for the results of this study the researcher found that differences between personal, social and cultural information, i.e., gender, age, place of residence, educational level, occupation, income, family, and main objectives of tourism with behaviors of Chinese tourists in Bangkok towards travel and shopping in Bangkok.

Keywords: tourists’ behavior, Chinese tourists, travelling, expenses in travels

Procedia PDF Downloads 524
7196 Importance of Human Capital Development and Management in Industries

Authors: Birce Boga Bakirli

Abstract:

In this paper, we investigate ideas on human capital development and management in industries. We structured a model to be able to gather the data from the interviews conducted with worker, specialists and owners of companies. Different aspects of the situation are found in these interviews, and we used the information to model the benefit of the business owners and workers perspectives. These are modelled as a bi-level programming problem. Several instances of the generic cases are solved. The results show the importance of education within and out of the company for workers, and it returns for the company.

Keywords: bi-level programming, corporate strategy, cost tradeoffs, human capital, mixed integer programming, Stackelberg game, supplier relations, strategic planning

Procedia PDF Downloads 354