Search results for: bottom-up approach
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13870

Search results for: bottom-up approach

9820 Human Resource Development and Social Entrepreneurship: A Pan-African Perspective

Authors: Leon C. Prieto, Simone T. A. Phipps

Abstract:

There is a need to promote social entrepreneurship in order to solve some of the complex problems facing various countries in Africa (poverty, unemployment, crime, HIV, etc.). For example, one possible consequence of the HIV/AIDS crisis in Zimbabwe and elsewhere is a deterioration in the educational opportunities for orphans and other vulnerable children. Given that high returns are associated with education, the loss of education for a large segment of the population would likely worsen the already dire economic consequences of the HIV/AIDS crisis. Using a systems approach, this paper argues that social entrepreneurship can be used as a vehicle to promote national human resource development, which will assist in the alleviation of societal ills on the national level as well as throughout Africa.

Keywords: human resource development, pan-african, social entrepreneurship, social enterprise

Procedia PDF Downloads 384
9819 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards

Authors: Nadezhda Kvatashidze, Elena Kharabadze

Abstract:

It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.

Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value

Procedia PDF Downloads 320
9818 Modeling and Simulation of Standalone Photovoltaic Charging Stations for Electric Vehicles

Authors: R. Mkahl, A. Nait-Sidi-Moh, M. Wack

Abstract:

Batteries of electric vehicles (BEV) are becoming more attractive with the advancement of new battery technologies and promotion of electric vehicles. BEV batteries are recharged on board vehicles using either the grid (G2V for Grid to Vehicle) or renewable energies in a stand-alone application (H2V for Home to Vehicle). This paper deals with the modeling, sizing and control of a photo voltaic stand-alone application that can charge the BEV at home. The modeling approach and developed mathematical models describing the system components are detailed. Simulation and experimental results are presented and commented.

Keywords: electric vehicles, photovoltaic energy, lead-acid batteries, charging process, modeling, simulation, experimental tests

Procedia PDF Downloads 444
9817 Patent License of Transfer Technology: Challenges and Opportunities in Indonesia

Authors: Agung Sujatmiko

Abstract:

One of the purposes of patent licensing was to transfer technology from developed countries to developing countries. For this reason, the role of the patent license agreement was very important and had a function as a tool to achieve technological development. This goal was very good, but in fact, many problems and obstacles arose in its implementation, so the technology transfer that had been implemented had not given good results. For this reason, it was necessary to find a solution so that technology could switch properly. The problem approach used the statutory and conceptual approaches. The analysis used was deductive by analyzing general laws and regulations and then concluding. Several regulations related to technology transfer were the main source to find answers to why technology transfer was difficult to achieve and what caused it. Once the cause was known, a solution would be sought.

Keywords: license, patent, technology, tie in clause

Procedia PDF Downloads 95
9816 A Qualitative Exploration of the Socio-Cultural Determinants of Exclusive Breastfeeding Practice among Rural Mothers in Bindawa and Baure Local Government Areas, Katsina, North West Nigeria

Authors: Friday I. Joseph

Abstract:

Background: Nigeria has an under-five mortality rate that is 128 per 1000 live birth which is higher than the rate for the African region. Optimal breastfeeding practice has the potential to reduce under-five mortality by 13% in developing countries. However, documented exclusive breastfeeding rate in Nigeria from birth to six months is just 17%. Aim: To explore perceptions of the sociocultural factors that influence exclusive breastfeeding for six months among rural mothers in Bindawa and Baure Local Government Area (LGA), Katsina state, North West Nigeria, to inform policies, intervention or strategies to improve exclusive breastfeeding practice in Nigeria. Methods: The social constructionism-interpretivist epistemological approach informed the use of an exploratory study to understand mothers’ experiences and views. Twenty mothers, all from rural areas between 19-35 years old were conveniently sampled from two LGA in Katsina state, north –west Nigeria for semi-structured interviews. Sample size had representation of both Hausa and Fulani ethnic group. Thematic content analysis was utilized for analysis. Results: Three major themes emerged from the study: (1) Breastfeeding initiation - Immediate traditional newborn care practices, birth attendant, place of delivery, the perception of about colostrum determines how soon a mother initiate breastfeeding. (2) Exclusive breastfeeding and introduction of food-Motivation to sustain exclusive breastfeeding relies on the interplay between the obligation to perform traditional rites; mother’s awareness and family support. (3) Decision making about infant feeding – It is not independent of the influence of key social figures like the father, mother-in-law, traditional birth attendant and the health workers. Overall, in spite of awareness of exclusive breastfeeding benefits, mothers expressed concerns that they may not win their family support if they shared contrary views. Conclusions: Health promotion intervention should be tailored, taking cognizant and addressing the sociocultural barriers to the practice of optimal breastfeeding by a focused community and family-based participatory approach. Implementers of interventions should employ culture-sensitive approaches in community-based intervention.

Keywords: exclusive breastfeeding, perception, qualitative, sociocultural determinants

Procedia PDF Downloads 182
9815 Eating Behaviours in Islam and Mental Health: A Preventative Approach

Authors: Muhammad Rafiq, Lamae Zulfiqar, Nazish Idrees Chaudhary

Abstract:

A growing number of research focuses on healthy and unhealthy eating behaviors and their impact on health. It was intended to study the Islamic point of view on eating behavior, its impact on mental health and preventative strategies in the light of the Quran and Sunnah. Different articles and Islamic sayings related to eating behaviors and mental health were reviewed in detail. It was also revealed scientifically and through Islamic point of view that appropriate quantity, quality and timings of food have positive effects on mental health. Therefore, a 3Rs model of eating behaviors has been proposed.

Keywords: food intake, mental health, quality of food, quantity of food

Procedia PDF Downloads 239
9814 A Design for Application of Mobile Agent Technology to MicroService Architecture

Authors: Masayuki Higashino, Toshiya Kawato, Takao Kawamura

Abstract:

A monolithic service is based on the N-tier architecture in many cases. In order to divide a monolithic service into microservices, it is necessary to redefine a model as a new microservice by extracting and merging existing models across layers. Refactoring a monolithic service into microservices requires advanced technical capabilities, and it is a difficult way. This paper proposes a design and concept to ease the migration of a monolithic service to microservices using the mobile agent technology. Our proposed approach, mobile agents-based design and concept, enables to ease dividing and merging services.

Keywords: mobile agent, microservice, web service, distributed system

Procedia PDF Downloads 164
9813 A Study of Traffic Assignment Algorithms

Authors: Abdelfetah Laouzai, Rachid Ouafi

Abstract:

In a traffic network, users usually choose their way so that it reduces their travel time between pairs origin-destination. This behavior might seem selfish as it produces congestions in different parts of the network. The traffic assignment problem (TAP) models the interactions between congestion and user travel decisions to obtain vehicles flows over each axis of the traffic network. The resolution methods of TAP serve as a tool allows predicting users’ distribution, identifying congesting points and affecting the travelers’ behavior in the choice of their route in the network following dynamic data. In this article, we will present a review about specific resolution approach of TAP. A comparative analysis is carried out on those approaches so that it highlights the characteristics, advantages and disadvantages of each.

Keywords: network traffic, travel decisions, approaches, traffic assignment, flows

Procedia PDF Downloads 474
9812 On the Analysis of Pseudorandom Partial Quotient Sequences Generated from Continued Fractions

Authors: T. Padma, Jayashree S. Pillai

Abstract:

Random entities are an essential component in any cryptographic application. The suitability of a number theory based novel pseudorandom sequence called Pseudorandom Partial Quotient Sequence (PPQS) generated from the continued fraction expansion of irrational numbers, in cryptographic applications, is analyzed in this paper. An approach to build the algorithm around a hard mathematical problem has been considered. The PQ sequence is tested for randomness and its suitability as a cryptographic key by performing randomness analysis, key sensitivity and key space analysis, precision analysis and evaluating the correlation properties is established.

Keywords: pseudorandom sequences, key sensitivity, correlation, security analysis, randomness analysis, sensitivity analysis

Procedia PDF Downloads 591
9811 Legacy of Islamic Hadith and Biodiversity

Authors: Mohsen Nouraei, M. Amouei

Abstract:

Islamic studies are considered in both the Quran and Hadith. Hadith is defined as a set of reports that narrated the words, and behaviors, of infallible persons such as the holy Prophet (pbuh) or the Infallible Imams (as). The issue of biodiversity which is the one of the most important environmental aspects is considered in the field of Hadith. The present paper has investigated biodiversity on the basis of descriptive-analytical methods and with the approach of library-documentary. The household of the Prophet (as) have referred biodiversity that were included diversity of animals, plants, climate etc. In addition to, they also have emphasized on the human need to keep diversity and no damage. It should be noted that they have expressed the rights of the animals and plants for correct using of human, so that human can use these rights in conservation of diversity and their generation.

Keywords: biodiversity, conservation of biodiversity, degradation of biodiversity, extinction of biodiversity

Procedia PDF Downloads 464
9810 JavaScript Object Notation Data against eXtensible Markup Language Data in Software Applications a Software Testing Approach

Authors: Theertha Chandroth

Abstract:

This paper presents a comparative study on how to check JSON (JavaScript Object Notation) data against XML (eXtensible Markup Language) data from a software testing point of view. JSON and XML are widely used data interchange formats, each with its unique syntax and structure. The objective is to explore various techniques and methodologies for validating comparison and integration between JSON data to XML and vice versa. By understanding the process of checking JSON data against XML data, testers, developers and data practitioners can ensure accurate data representation, seamless data interchange, and effective data validation.

Keywords: XML, JSON, data comparison, integration testing, Python, SQL

Procedia PDF Downloads 140
9809 Long Short-Term Memory Stream Cruise Control Method for Automated Drift Detection and Adaptation

Authors: Mohammad Abu-Shaira, Weishi Shi

Abstract:

Adaptive learning, a commonly employed solution to drift, involves updating predictive models online during their operation to react to concept drifts, thereby serving as a critical component and natural extension for online learning systems that learn incrementally from each example. This paper introduces LSTM-SCCM “Long Short-Term Memory Stream Cruise Control Method”, a drift adaptation-as-a-service framework for online learning. LSTM-SCCM automates drift adaptation through prompt detection, drift magnitude quantification, dynamic hyperparameter tuning, performing shortterm optimization and model recalibration for immediate adjustments, and, when necessary, conducting long-term model recalibration to ensure deeper enhancements in model performance. LSTM-SCCM is incorporated into a suite of cutting-edge online regression models, assessing their performance across various types of concept drift using diverse datasets with varying characteristics. The findings demonstrate that LSTM-SCCM represents a notable advancement in both model performance and efficacy in handling concept drift occurrences. LSTM-SCCM stands out as the sole framework adept at effectively tackling concept drifts within regression scenarios. Its proactive approach to drift adaptation distinguishes it from conventional reactive methods, which typically rely on retraining after significant degradation to model performance caused by drifts. Additionally, LSTM-SCCM employs an in-memory approach combined with the Self-Adjusting Memory (SAM) architecture to enhance real-time processing and adaptability. The framework incorporates variable thresholding techniques and does not assume any particular data distribution, making it an ideal choice for managing high-dimensional datasets and efficiently handling large-scale data. Our experiments, which include abrupt, incremental, and gradual drifts across both low- and high-dimensional datasets with varying noise levels, and applied to four state-of-the-art online regression models, demonstrate that LSTM-SCCM is versatile and effective, rendering it a valuable solution for online regression models to address concept drift.

Keywords: automated drift detection and adaptation, concept drift, hyperparameters optimization, online and adaptive learning, regression

Procedia PDF Downloads 13
9808 Determinants of Internationalization of Social Enterprises: A 20-Year Review

Authors: Xiaoqing Li

Abstract:

Social entrepreneurship drives the global movement as social enterprises create best ways to satisfy social needs through connecting international resources. However, what determines social enterprises to internationalize is underexplored. This study aims to answer this question by conducting a systematic review of studies of past 20 years on social enterprises' internationalization. Findings reveal that factors at the individual (entrepreneur), firm, and environment (home and host country) levels determine the degree of social enterprises' internationalization. Future research is challenged by: a. adopting an integrated approach examining the three levels to explain social enterprises' internationalization; b. the different nature of social enterprises from commercial businesses demands scholars to refine and develop appropriate theoretical models to capture the dynamism of social enterprises' internationalization behavior.

Keywords: determinants, entrepreneurship, internationalization, social enterprises

Procedia PDF Downloads 216
9807 Sustainable Development: The Human Rights Approach to Environmental Protection in South Africa

Authors: CM van der Bank, Marjoné van der Bank

Abstract:

International and domestic environmental law has evolved quite rapidly in the last few decades. At the international level the Stockholm and Rio Declarations paved the way for a broad based consensus of the international community on environmental issues and principles. At the Domestic level also many states have incorporated environmental protection in their constitutions and even more states are doing the same at least in their domestic legislations. In this process of evolution environmental law has unleashed a number of novel principles such as; the participatory principle, the polluter pays principle, the precautionary principle, the inter-generational and intra-generational principles, the prevention principle, the sustainable development principle and so on.

Keywords: environment, human rights, international law, protection

Procedia PDF Downloads 463
9806 Automated Transformation of 3D Point Cloud to BIM Model: Leveraging Algorithmic Modeling for Efficient Reconstruction

Authors: Radul Shishkov, Orlin Davchev

Abstract:

The digital era has revolutionized architectural practices, with building information modeling (BIM) emerging as a pivotal tool for architects, engineers, and construction professionals. However, the transition from traditional methods to BIM-centric approaches poses significant challenges, particularly in the context of existing structures. This research introduces a technical approach to bridge this gap through the development of algorithms that facilitate the automated transformation of 3D point cloud data into detailed BIM models. The core of this research lies in the application of algorithmic modeling and computational design methods to interpret and reconstruct point cloud data -a collection of data points in space, typically produced by 3D scanners- into comprehensive BIM models. This process involves complex stages of data cleaning, feature extraction, and geometric reconstruction, which are traditionally time-consuming and prone to human error. By automating these stages, our approach significantly enhances the efficiency and accuracy of creating BIM models for existing buildings. The proposed algorithms are designed to identify key architectural elements within point clouds, such as walls, windows, doors, and other structural components, and to translate these elements into their corresponding BIM representations. This includes the integration of parametric modeling techniques to ensure that the generated BIM models are not only geometrically accurate but also embedded with essential architectural and structural information. Our methodology has been tested on several real-world case studies, demonstrating its capability to handle diverse architectural styles and complexities. The results showcase a substantial reduction in time and resources required for BIM model generation while maintaining high levels of accuracy and detail. This research contributes significantly to the field of architectural technology by providing a scalable and efficient solution for the integration of existing structures into the BIM framework. It paves the way for more seamless and integrated workflows in renovation and heritage conservation projects, where the accuracy of existing conditions plays a critical role. The implications of this study extend beyond architectural practices, offering potential benefits in urban planning, facility management, and historic preservation.

Keywords: BIM, 3D point cloud, algorithmic modeling, computational design, architectural reconstruction

Procedia PDF Downloads 63
9805 Application of Granular Computing Paradigm in Knowledge Induction

Authors: Iftikhar U. Sikder

Abstract:

This paper illustrates an application of granular computing approach, namely rough set theory in data mining. The paper outlines the formalism of granular computing and elucidates the mathematical underpinning of rough set theory, which has been widely used by the data mining and the machine learning community. A real-world application is illustrated, and the classification performance is compared with other contending machine learning algorithms. The predictive performance of the rough set rule induction model shows comparative success with respect to other contending algorithms.

Keywords: concept approximation, granular computing, reducts, rough set theory, rule induction

Procedia PDF Downloads 531
9804 EEG Diagnosis Based on Phase Space with Wavelet Transforms for Epilepsy Detection

Authors: Mohmmad A. Obeidat, Amjed Al Fahoum, Ayman M. Mansour

Abstract:

The recognition of an abnormal activity of the brain functionality is a vital issue. To determine the type of the abnormal activity either a brain image or brain signal are usually considered. Imaging localizes the defect within the brain area and relates this area with somebody functionalities. However, some functions may be disturbed without affecting the brain as in epilepsy. In this case, imaging may not provide the symptoms of the problem. A cheaper yet efficient approach that can be utilized to detect abnormal activity is the measurement and analysis of the electroencephalogram (EEG) signals. The main goal of this work is to come up with a new method to facilitate the classification of the abnormal and disorder activities within the brain directly using EEG signal processing, which makes it possible to be applied in an on-line monitoring system.

Keywords: EEG, wavelet, epilepsy, detection

Procedia PDF Downloads 538
9803 Feedback Preference and Practice of English Majors’ in Pronunciation Instruction

Authors: Claerchille Jhulia Robin

Abstract:

This paper discusses the perspective of ESL learners towards pronunciation instruction. It sought to determine how these learners view the type of feedback their speech teacher gives and its impact on their own classroom practice of providing feedback. This study utilized a quantitative-qualitative approach to the problem. The respondents were Education students majoring in English. A survey questionnaire and interview guide were used for data gathering. The data from the survey was tabulated using frequency count and the data from the interview were then transcribed and analyzed. Results showed that ESL learners favor immediate corrective feedback and they do not find any issue in being corrected in front of their peers. They also practice the same corrective technique in their own classroom.

Keywords: ESL, feedback, learner perspective, pronunciation instruction

Procedia PDF Downloads 234
9802 Application of Robotics to Assemble a Used Fuel Container in the Canadian Used Fuel Packing Plant

Authors: Dimitrie Marinceu

Abstract:

The newest Canadian Used Fuel Container (UFC)- (called also “Mark II”) modifies the design approach for its Assembly Robotic Cell (ARC) in the Canadian Used (Nuclear) Fuel Packing Plant (UFPP). Some of the robotic design solutions are presented in this paper. The design indicates that robots and manipulators are expected to be used in the Canadian UFPP. As normally, the UFPP design will incorporate redundancy of all equipment to allow expedient recovery from any postulated upset conditions. Overall, this paper suggests that robot usage will have a significant positive impact on nuclear safety, quality, productivity, and reliability.

Keywords: used fuel packing plant, robotic assembly cell, used fuel container, deep geological repository

Procedia PDF Downloads 291
9801 A Novel Approach to 3D Thrust Vectoring CFD via Mesh Morphing

Authors: Umut Yıldız, Berkin Kurtuluş, Yunus Emre Muslubaş

Abstract:

Thrust vectoring, especially in military aviation, is a concept that sees much use to improve maneuverability in already agile aircraft. As this concept is fairly new and cost intensive to design and test, computational methods are useful in easing the preliminary design process. Computational Fluid Dynamics (CFD) can be utilized in many forms to simulate nozzle flow, and there exist various CFD studies in both 2D mechanical and 3D injection based thrust vectoring, and yet, 3D mechanical thrust vectoring analyses, at this point in time, are lacking variety. Additionally, the freely available test data is constrained to limited pitch angles and geometries. In this study, based on a test case provided by NASA, both steady and unsteady 3D CFD simulations are conducted to examine the aerodynamic performance of a mechanical thrust vectoring nozzle model and to validate the utilized numerical model. Steady analyses are performed to verify the flow characteristics of the nozzle at pitch angles of 0, 10 and 20 degrees, and the results are compared with experimental data. It is observed that the pressure data obtained on the inner surface of the nozzle at each specified pitch angle and under different flow conditions with pressure ratios of 1.5, 2 and 4, as well as at azimuthal angle of 0, 45, 90, 135, and 180 degrees exhibited a high level of agreement with the corresponding experimental results. To validate the CFD model, the insights from the steady analyses are utilized, followed by unsteady analyses covering a wide range of pitch angles from 0 to 20 degrees. Throughout the simulations, a mesh morphing method using a carefully calculated mathematical shape deformation model that simulates the vectored nozzle shape exactly at each point of its travel is employed to dynamically alter the divergent part of the nozzle over time within this pitch angle range. The mesh morphing based vectored nozzle shapes were compared with the drawings provided by NASA, ensuring a complete match was achieved. This computational approach allowed for the creation of a comprehensive database of results without the need to generate separate solution domains. The database contains results at every 0.01° increment of nozzle pitch angle. The unsteady analyses, generated using the morphing method, are found to be in excellent agreement with experimental data, further confirming the accuracy of the CFD model.

Keywords: thrust vectoring, computational fluid dynamics, 3d mesh morphing, mathematical shape deformation model

Procedia PDF Downloads 84
9800 Secure Image Encryption via Enhanced Fractional Order Chaotic Map

Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi

Abstract:

in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.

Keywords: image encryption, logistic map, fibonacci matrix, grayscale images

Procedia PDF Downloads 318
9799 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 78
9798 Active Learning in Computer Exercises on Electronics

Authors: Zoja Raud, Valery Vodovozov

Abstract:

Modelling and simulation provide effective way to acquire engineering experience. An active approach to modelling and simulation proposed in the paper involves, beside the compulsory part directed by the traditional step-by-step instructions, the new optional part basing on the human’s habits to design thus stimulating the efforts towards success in active learning. Computer exercises as a part of engineering curriculum incorporate a set of effective activities. In addition to the knowledge acquired in theoretical training, the described educational arrangement helps to develop problem solutions, computation skills, and experimentation performance along with enhancement of practical experience and qualification.

Keywords: modelling, simulation, engineering education, electronics, active learning

Procedia PDF Downloads 391
9797 The Development of Cultural Routes: The Case of Greece

Authors: Elissavet Kosta

Abstract:

Introduction: In this research, we will propose the methodology, which is required for the planning of the cultural route in order to prepare substantiated proposals for the development and planning of cultural routes in Greece in the near future. Our research has started at 2016. Methodology in our research: Α combination of primary and secondary research will be used as project methodology. Furthermore, this study aims to follow a multidisciplinary approach, using dimensions of qualitative and quantitative data analysis models. Regarding the documentation of the theoretical part of the project, the method of secondary research will be mainly used, yet in combination with bibliographic sources. However, the data collection regarding the research topic will be conducted exclusively through primary research (questionnaires and interviews). Cultural Routes: The cultural route is defined as a brand name touristic product, that is a product of cultural tourism, which is shaped according to a specific connecting element. Given its potential, the cultural route is an important ‘tool’ for the management and development of cultural heritage. Currently, a constant development concerning the cultural routes is observed in an international level during the last decades, as it is widely accepted that cultural tourism has an important role in the world touristic industry. Cultural Routes in Greece: Especially for Greece, we believe, actions have not been taken to the systematic development of the cultural routes yet. The cultural routes that include Greece and have been design in a world scale as well as the cultural routes, which have been design in Greek ground up to this moment are initiations of the Council of Europe, World Tourism Organization UNWTO and ‘Diazoma’ association. Regarding the study of cultural routes in Greece as a multidimensional concept, the following concerns have arisen: Firstly, we are concerned about the general impact of cultural routes at local and national level and specifically in the economic sector. Moreover, we deal with the concerns regarding the natural environment and we delve into the educational aspect of cultural routes in Greece. In addition, the audience we aim at is both specific and broad and we put forward the institutional framework of the study. Finally, we conduct the development and planning of new cultural routes, having in mind the museums as both the starting and ending point of a route. Conclusion: The contribution of our work is twofold and lies firstly on the fact that we attempt to create cultural routes in Greece and secondly on the fact that an interdisciplinary approach is engaged towards realizing our study objective. In particular, our aim is to take advantage of all the ways in which the promotion of a cultural route can have a positive influence on the way of life of society. As a result, we intend to analyze how a cultural route can turn into a well-organized activity that can be used as social intervention to develop tourism, strengthen the economy and improve access to cultural goods in Greece during the economic crisis.

Keywords: cultural heritage, cultural routes, cultural tourism, Greece

Procedia PDF Downloads 235
9796 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 62
9795 A Human Activity Recognition System Based on Sensory Data Related to Object Usage

Authors: M. Abdullah, Al-Wadud

Abstract:

Sensor-based activity recognition systems usually accounts which sensors have been activated to perform an activity. The system then combines the conditional probabilities of those sensors to represent different activities and takes the decision based on that. However, the information about the sensors which are not activated may also be of great help in deciding which activity has been performed. This paper proposes an approach where the sensory data related to both usage and non-usage of objects are utilized to make the classification of activities. Experimental results also show the promising performance of the proposed method.

Keywords: Naïve Bayesian, based classification, activity recognition, sensor data, object-usage model

Procedia PDF Downloads 322
9794 Seismic Fragility Curves Methodologies for Bridges: A Review

Authors: Amirmozafar Benshams, Khatere Kashmari, Farzad Hatami, Mesbah Saybani

Abstract:

As a part of the transportation network, bridges are one of the most vulnerable structures. In order to investigate the vulnerability and seismic evaluation of bridges performance, identifying of bridge associated with various state of damage is important. Fragility curves provide important data about damage states and performance of bridges against earthquakes. The development of vulnerability information in the form of fragility curves is a widely practiced approach when the information is to be developed accounting for a multitude of uncertain source involved. This paper presents the fragility curve methodologies for bridges and investigates the practice and applications relating to the seismic fragility assessment of bridges.

Keywords: fragility curve, bridge, uncertainty, NLTHA, IDA

Procedia PDF Downloads 282
9793 Teaching the Meaning of the Holy Quran Using Modern Technology

Authors: Arjumand Warsy

Abstract:

Among the Muslims, the Holy Quran is taught from early childhood and generally by the age of 7-8 years the reading of the entire Quran is completed by most of the children in Muslim families. During this period excellent reciter’s are selected to teach and emphasis is laid on correct reading, pronunciation and memorization. Following these years, the parents lay emphasis on the recitation of the Quran on daily basis. During the month of Ramadan the entire Quran is read one or more times and there are considerable number of Muslims who complete the entire Quran once or more each calendar month. Many Muslims do not know Arabic and for them message in the Quran is what others tell them and often they have no idea about this Guidance sent to them. This deficiency is reflected in many ways, both among people living in Muslim or non-Muslim countries. Due to the deficiency in knowledge about Islamic teachings, the foundations of Islam are being eroded by a variety of forces. In an attempt to guard against the non-Islamic influences, every Muslim must have a clear understanding of the Islamic teachings and requirements. The best guidance can be provided by the understanding of the Holy Quran. However, we are faced with the problem that often the Quran is taught in a way that fails to develop an interest and understanding of the message from Allah. Looking at the teaching of other subjects both scientific and non-scientific, at school, college or University levels, it is obvious that the advances in teaching methodologies using electronic technology have had a major impact, where both the understanding and the interest of the students are significantly elevated. We attempted to teach the meaning of the Holy Quran to children and adults using a scientific and modern approach using slide presentation and animations. The results showed almost 100% increase in the understanding of the Quran message; all attendees claimed they developed an increased interest in the study of the Holy Quran and did not lose track or develop boredom throughout the lectures. They learnt the information and remembered it more effectively. The love for Allah and Prophet Mohammad (PBUH) increased significantly. The fear of Allah and love of Heaven developed significantly. Historical facts and the stories of the past nations became clearer and the Greatness of the Creator was strongly felt. Several of attendees wanted to become better Muslims and to spread the knowledge of Islam. In this presentation, the adopted teaching method will be first presented and demonstrated to the audience using a short Surah from the Quran, followed by discussion on the results achieved during our study. We will endeavor to convey to the audience that there is a need to adopt a more scientific approach to teach the Quran so that a greater benefit is achieved by all.

Keywords: The Holy Quran, Muslims, presentations, technology

Procedia PDF Downloads 428
9792 Practical Techniques of Improving State Estimator Solution

Authors: Kiamran Radjabli

Abstract:

State Estimator became an intrinsic part of Energy Management Systems (EMS). The SCADA measurements received from the field are processed by the State Estimator in order to accurately determine the actual operating state of the power systems and provide that information to other real-time network applications. All EMS vendors offer a State Estimator functionality in their baseline products. However, setting up and ensuring that State Estimator consistently produces a reliable solution often consumes a substantial engineering effort. This paper provides generic recommendations and describes a simple practical approach to efficient tuning of State Estimator, based on the working experience with major EMS software platforms and consulting projects in many electrical utilities of the USA.

Keywords: convergence, monitoring, state estimator, performance, troubleshooting, tuning, power systems

Procedia PDF Downloads 156
9791 Computational Approach to the Interaction of Neurotoxins and Kv1.3 Channel

Authors: Janneth González, George Barreto, Ludis Morales, Angélica Sabogal

Abstract:

Sea anemone neurotoxins are peptides that interact with Na+ and K+ channels, resulting in specific alterations on their functions. Some of these neurotoxins (1ROO, 1BGK, 2K9E, 1BEI) are important for the treatment of nearly eighty autoimmune disorders due to their specificity for Kv1.3 channel. The aim of this study was to identify the common residues among these neurotoxins by computational methods, and establish whether there is a pattern useful for the future generation of a treatment for autoimmune diseases. Our results showed eight new key common residues between the studied neurotoxins interacting with a histidine ring and the selectivity filter of the receptor, thus showing a possible pattern of interaction. This knowledge may serve as an input for the design of more promising drugs for autoimmune treatments.

Keywords: neurotoxins, potassium channel, Kv1.3, computational methods, autoimmune diseases

Procedia PDF Downloads 374