Search results for: sharing mechanism
3727 Intelligent Building as a Pragmatic Approach towards Achieving a Sustainable Environment
Authors: Zahra Hamedani
Abstract:
Many wonderful technological developments in recent years has opened up the possibility of using intelligent buildings for a number of important applications, ranging from minimizing resource usage as well as increasing building efficiency to maximizing comfort, adaption to inhabitants and responsiveness to environmental changes. The concept of an intelligent building refers to the highly embedded, interactive environment within which by exploiting the use of artificial intelligence provides the ability to know its configuration, anticipate the optimum dynamic response to prevailing environmental stimuli, and actuate the appropriate physical reaction to provide comfort and efficiency. This paper contains a general identification of the intelligence paradigm and its impacts on the architecture arena, that with examining the performance of artificial intelligence, a mechanism to analyze and finally for decision-making to control the environment will be described. This mechanism would be a hierarchy of the rational agents which includes decision-making, information, communication and physical layers. This multi-agent system relies upon machine learning techniques for automated discovery, prediction and decision-making. Then, the application of this mechanism regarding adaptation and responsiveness of intelligent building will be provided in two scales of environmental and user. Finally, we review the identifications of sustainability and evaluate the potentials of intelligent building systems in the creation of sustainable architecture and environment.Keywords: artificial intelligence, intelligent building, responsiveness, adaption, sustainability
Procedia PDF Downloads 4103726 Co-Integration and Error Correction Mechanism of Supply Response of Sugarcane in Pakistan (1980-2012)
Authors: Himayatullah Khan
Abstract:
This study estimates supply response function of sugarcane in Pakistan from 1980-81 to 2012-13. The study uses co-integration approach and error correction mechanism. Sugarcane production, area and price series were tested for unit root using Augmented Dickey Fuller (ADF). The study found that these series were stationary at their first differenced level. Using the Augmented Engle-Granger test and Cointegrating Regression Durbin-Watson (CRDW) test, the study found that “production and price” and “area and price” were co-integrated suggesting that the two sets of time series had long-run or equilibrium relationship. The results of the error correction models for the two sets of series showed that there was disequilibrium in the short run there may be disequilibrium. The Engle-Granger residual may be thought of as the equilibrium error which can be used to tie the short-run behavior of the dependent variable to its long-run value. The Granger-Causality test results showed that log of price granger caused both the long of production and log of area whereas, the log of production and log of area Granger caused each other.Keywords: co-integration, error correction mechanism, Granger-causality, sugarcane, supply response
Procedia PDF Downloads 4353725 Modification of a Natural Zeolite with a Short-Chain Quaternary Ammonium Salt in an Ultrasonication Process and Investigation of Its Ability to Eliminate Nitrate Ions: Characterization and Mechanism Study
Authors: Nona Mirzamohammadi, Bahram Nasernejad
Abstract:
This work mainly focuses on studying the mechanism governing the adsorption of tetraethylammonium bromide, a short-chain quaternary ammonium salt, on the surface of natural zeolite and to characterize modified and raw zeolites in order to study the removal of nitrate anions from water. Natural clinoptilolite, as the most common zeolite, was chosen and modified in an ultrasonication process using tetraethylammonium bromide, subsequent to being contacted with NaCl solutions. FT-IR studies indicated a peak attributed to the stretching vibrations of the –CH₂ group in the molecule of tetraethylammonium bromide in the spectrum of the modified sample. Moreover, the SEM images showed some obvious changes in the surface morphology and crystallinity of clinoptilolite after being modified. Batch adsorption experiments show that the modified zeolite is capable of removing nitrate anions, and the predominant removal mechanism is suggested to be a combination of electrostatic attraction and ion exchange since the results from the zeta potential analysis showed a decrease in the net negative charge of clinoptilolite after modification, while bromide ions were detected in the modified sample in the µXRF analysis.Keywords: adsorption, clinoptilolite, short-chain quaternary ammonium salt, tetraethylammoniumbromide, ultrasonication
Procedia PDF Downloads 1093724 Information Sharing with Potential Users of Traditional Knowledge under Provisions of Nagoya Protocol: Issues of Participation of Indigenous People and Local Communities
Authors: Hasrat Arjjumend, Sabiha Alam
Abstract:
The Nagoya Protocol is landmark international legislation governing access to genetic resources and benefit sharing from utilization of genetic resource and traditional knowledge. The field implications of the international law have been assessed by surveying academic/ research institutions, civil society organizations (CSOs) and concerned individuals, who gave their opinions on whether the provider parties (usually developing countries) would ensure effective participation of Indigenous people and local communities (ILCs) in establishing the mechanisms to inform the potential users of traditional knowledge (TK) about their obligations under art. 12.2 of Nagoya Protocol. First of all, involvement and participation of ILCs in suggested clearing-house mechanisms of the Parties are seldom witnessed. Secondly, as respondents expressed, it is doubtful that developing countries would ensure effective participation of ILCs in establishing the mechanisms to inform the potential users of TK about their obligations. Yet, as most of ILCs speak and understand local or indigenous languages, whether the Nagoya Protocol provides or not, it is a felt need that the Parties should disclose information in a language understandable to ILCs. Alternative opinions indicate that if TK held by ILCs is disclosed, the value is gone. Therefore, it should be protected by the domestic law first and should be disclosed then.Keywords: genetic resources, indigenous people, language, Nagoya protocol, participation, traditional knowledge
Procedia PDF Downloads 1503723 Kinetic and Mechanistic Study on the Degradation of Typical Pharmaceutical and Personal Care Products in Water by Using Carbon Nanodots/C₃N₄ Composite and Ultrasonic Irradiation
Authors: Miao Yang
Abstract:
PPCPs (pharmaceutical and personal care products) in water, as an environmental pollutant, becomes an issue of increasing concern. Therefore, the techniques for degradation of PPCPs has been a hotspot in water pollution control field. Since there are several disadvantages for common degradation techniques of PPCPs, such as low degradation efficiency for certain PPCPs (ibuprofen and Carbamazepine) this proposal will adopt a combined technique by using CDs (carbon nanodots)/C₃N₄ composite and ultrasonic irradiation to mitigate or overcome these shortages. There is a significant scientific problem that the mechanism including PPCPs, major reactants, and interfacial active sites is not clear yet in the study of PPCPs degradation. This work aims to solve this problem by using both theoretical and experimental methodologies. Firstly, optimized parameters will be obtained by evaluating the kinetics and oxidation efficiency under different conditions. The competition between H₂O₂ and PPCPs with HO• will be elucidated, after which the degradation mechanism of PPCPs by the synergy of CDs/C₃N₄ composite and ultrasonic irradiation will be proposed. Finally, a sonolysis-adsorption-catalysis coupling mechanism will be established which is the theoretical basis and technical support for developing new efficient degradation techniques for PPCPs in the future.Keywords: carbon nanodots/C₃N₄, pharmaceutical and personal care products, ultrasonic irradiation, hydroxyl radical, heterogeneous catalysis
Procedia PDF Downloads 1803722 Adsorption Behavior and Mechanism of Illite Surface under the Action of Different Surfactants
Authors: Xiuxia Sun, Yan Jin, Zilong Liu, Shiming Wei
Abstract:
As a critical mineral component of shale, illite is essential in oil exploration and development due to its surface hydration characteristics and action mechanism. This paper, starting from the perspective of the molecular structure of organic matter, uses molecular dynamics simulation technology to deeply explore the interaction mechanism between organic molecules and the illite surface. In the study, we thoroughly considered the forces such as van der Waals force, electrostatic force, and steric hindrance and constructed an illite crystal model covering C8-C18 modifiers. Subsequently, we systematically analyzed surfactants' adsorption behavior and hydration characteristics with different alkyl chain numbers, lengths, and concentrations on the illite surface. The simulation results show that surfactant molecules with shorter alkyl chains present a lateral monolayer or inclined double-layer arrangement on the illite surface, and these two arrangements may coexist under different concentration conditions. In addition, with the increase in the number of alkyl chains, the interlayer spacing of illite increases significantly. In contrast, the change in alkyl chain length has a limited effect on surface properties. It is worth noting that the change in functional group structure has a particularly significant effect on the wettability of the illite surface, and its influence even exceeds the change in the alkyl chain structure. This discovery gives us a new perspective on understanding and regulating the wetting properties. The results obtained are consistent with the XRD analysis and wettability experimental data in this paper, further confirming the reliability of the research conclusions. This study deepened our understanding of illite's hydration characteristics and mechanism. We provided new ideas and directions for the molecular design and application development of oilfield chemicals.Keywords: illite, surfactant, hydration, wettability, adsorption
Procedia PDF Downloads 433721 Study on the Mechanism of CO₂-Viscoelastic Fluid Synergistic Oil Displacement in Tight Sandstone Reservoirs
Authors: Long Long Chen, Xinwei Liao, Shanfa Tang, Shaojing Jiang, Ruijia Tang, Rui Wang, Shu Yun Feng, Si Yao Wang
Abstract:
Tight oil reservoirs have poor physical properties, insufficient formation energy, and low natural productivity; it is necessary to effectively improve their crude oil recovery. CO₂ flooding is an important technical means to enhance oil recovery and achieve effective CO₂ storage in tight oil reservoirs, but its heterogeneity is strong, which makes CO₂ flooding prone to gas channeling and poor recovery. Aiming at the problem of gas injection channeling, combined with the excellent performance of low interfacial tension viscoelastic fluid (GOBTK), the research on CO₂-low interfacial tension viscoelastic fluid synergistic oil displacement in tight reservoirs was carried out, and the synergy of CO₂ and low interfacial tension viscoelastic fluid was discussed. Oil displacement mechanism. Experiments show that GOBTK has good injectability in tight oil reservoirs (Kg=0.141~0.793mD); CO₂-0.4% GOBTK synergistic flooding can improve the recovery factor of low permeability layers (31.41%) under heterogeneous (gradient difference of 10) conditions the) effect is better than that of CO₂ flooding (0.56%) and 0.4% GOBT-water flooding (20.99%); CO₂-GOBT synergistic oil displacement mechanism includes: 1) The formation of CO₂ foam increases the flow resistance of viscoelastic fluid, forcing the displacement fluid to flow 2) GOBTK can emulsify and disperse residual oil into small oil droplets, and smoothly pass through narrow pores to produce; 3) CO₂ dissolved in GOBTK synergistically enhances the water wettability of the core, and the use of viscosity Elastomeric fluid injection and stripping of residual oil; 4) CO₂-GOBTK synergy superimposes multiple mechanisms, effectively improving the swept volume and oil washing efficiency of the injected fluid to the reservoir.Keywords: tight oil reservoir, CO₂ flooding, low interfacial tension viscoelastic fluid flooding, synergistic oil displacement, EOR mechanism
Procedia PDF Downloads 1833720 Using the Internet of Things to Deal with Ventilators for Minimizing the Direct Contact with COVID-19 Patients
Authors: Mohammed Al-Shalabi
Abstract:
In recent years, the Internet of Things (IoT) has become an important technology for connecting various smart objects in many applications, especially in health monitoring applications. The IoT technology develops healthcare applications from traditional to personalized ones by making the treatment and monitoring of patients easier. Nowadays, especially during the COVID-19 pandemic, the necessity of enhancing healthcare monitoring applications to avoid the spreading of this pandemic is increased. In this paper, a mechanism is proposed to minimize direct contact with COVID-19 patients who need ventilators by using IoT technology. The proposed mechanism saves medical providers from COVID-19 infection and then minimizes the spreading of this disease.Keywords: internet of things, healthcare monitoring, COVID-19, ventilators, thingspeak, clouds
Procedia PDF Downloads 1353719 The Real Ambassador: How Hip Hop Culture Connects and Educates across Borders
Authors: Frederick Gooding
Abstract:
This paper explores how many Hip Hop artists have intentionally and strategically invoked sustainability principles of people, planet and profits as a means to create community, compensate for and cope with structural inequalities in society. These themes not only create community within one's country, but the powerful display and demonstration of these narratives create community on a global plane. Listeners of Hip Hop are therefore able to learn about the political events occurring in another country free of censure, and establish solidarity worldwide. Hip Hop therefore can be an ingenious tool to create self-worth, recycle positive imagery, and serve as a defense mechanism from institutional and structural forces that conspire to make an upward economic and social trajectory difficult, if not impossible for many people of color, all across the world. Although the birthplace of Hip Hop, the United States of America, is still predominately White, it has undoubtedly grown more diverse at a breath-taking pace in recent decades. Yet, whether American mainstream media will fully reflect America’s newfound diversity remains to be seen. As it stands, American mainstream media is seen and enjoyed by diverse audiences not just in America, but all over the world. Thus, it is imperative that further inquiry is conducted about one of the fastest growing genres within one of the world’s largest and most influential media industries generating upwards of $10 billion annually. More importantly, hip hop, its music and associated culture collectively represent a shared social experience of significant value. They are important tools used both to inform and influence economic, social and political identity. Conversely, principles of American exceptionalism often prioritize American political issues over those of others, thereby rendering a myopic political view within the mainstream. This paper will therefore engage in an international contextualization of the global phenomena entitled Hip Hop by exploring the creative genius and marketing appeal of Hip Hop within the global context of information technology, political expression and social change in addition to taking a critical look at historically racialized imagery within mainstream media. Many artists the world over have been able to freely express themselves and connect with broader communities outside of their own borders, all through the sound practice of the craft of Hip Hop. An empirical understanding of political, social and economic forces within the United States will serve as a bridge for identifying and analyzing transnational themes of commonality for typically marginalized or disaffected communities facing similar struggles for survival and respect. The sharing of commonalities of marginalized cultures not only serves as a source of education outside of typically myopic, mainstream sources, but it also creates transnational bonds globally to the extent that practicing artists resonate with many of the original themes of (now mostly underground) Hip Hop as with many of the African American artists responsible for creating and fostering Hip Hop's powerful outlet of expression. Hip Hop's power of connectivity and culture-sharing transnationally across borders provides a key source of education to be taken seriously by academics.Keywords: culture, education, global, hip hop, mainstream music, transnational
Procedia PDF Downloads 1013718 TRNG Based Key Generation for Certificateless Signcryption
Authors: S.Balaji, R.Sujatha, M. Ramakrishnan
Abstract:
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generatorKeywords: pseudo random umber generator, signcryption, true random number generator, node deployment
Procedia PDF Downloads 3413717 How Acupuncture Improve Migraine: A Literature Review
Authors: Hsiang-Chun Lai, Hsien-Yin Liao, Yi-Wen Lin
Abstract:
Migraine is a primary headache disorder which presented as recurrent and moderate to severe headaches and affects nearly fifteen percent of people’s daily life. In East Asia, acupuncture is a common treatment for migraine prevention. Acupuncture can modulate migraine through both peripheral and central mechanism and decrease the allodynia process. Molecular pathway suggests that acupuncture relief migraine by regulating neurotransmitters/neuromodulators. This process was also proven by neural imaging. Acupuncture decrease the headache frequency and intensity compared to routine care. We also review the most common chosen acupoints to treat migraine and its treatment protocol. As a result, we suggested that acupuncture can serve as an option to migraine treatment and prevention. However, more studies are needed to establish the mechanism and therapeutic roles of acupuncture in treating migraine.Keywords: acupuncture, allodynia, headache, migraine
Procedia PDF Downloads 2653716 MAS Capped CdTe/ZnS Core/Shell Quantum Dot Based Sensor for Detection of Hg(II)
Authors: Dilip Saikia, Suparna Bhattacharjee, Nirab Adhikary
Abstract:
In this piece of work, we have presented the synthesis and characterization of CdTe/ZnS core/shell (CS) quantum dots (QD). CS QDs are used as a fluorescence probe to design a simple cost-effective and ultrasensitive sensor for the detection of toxic Hg(II) in an aqueous medium. Mercaptosuccinic acid (MSA) has been used as a capping agent for the synthesis CdTe/ZnS CS QD. Photoluminescence quenching mechanism has been used in the detection experiment of Hg(II). The designed sensing technique shows a remarkably low detection limit of about 1 picomolar (pM). Here, the CS QDs are synthesized by a simple one-pot aqueous method. The synthesized CS QDs are characterized by using advanced diagnostics tools such as UV-vis, Photoluminescence, XRD, FTIR, TEM and Zeta potential analysis. The interaction between CS QDs and the Hg(II) ions results in the quenching of photoluminescence (PL) intensity of QDs, via the mechanism of excited state electron transfer. The proposed mechanism is explained using cyclic voltammetry and zeta potential analysis. The designed sensor is found to be highly selective towards Hg (II) ions. The analysis of the real samples such as drinking water and tap water has been carried out and the CS QDs show remarkably good results. Using this simple sensing method we have designed a prototype low-cost electronic device for the detection of Hg(II) in an aqueous medium. The findings of the experimental results of the designed sensor is crosschecked by using AAS analysis.Keywords: photoluminescence, quantum dots, quenching, sensor
Procedia PDF Downloads 2663715 Coping Mechanisms for Families in Raising a Child with Disability in Bangladesh: Family Members' Perspectives
Authors: Reshma P. Nuri, Ebenezer Dassah
Abstract:
Introduction: Raising a child with a disability can affect family members in different ways. However, this can be determined by the way in which a family member copes with the situation. There is little research that explores how families develop coping strategies to overcome barriers in raising CWDs. Objective: This study explored family members’ coping mechanism in raising a child with disability in Bangladesh. Method: A qualitative approach that involved 20 interviews with family members of CWDs. A purposive sampling procedure was used in selecting the study participants. A digital recorder was used to record all the interviews. Transcriptions were done in Bengali, translated into English, and then imported to NVivo software 12 for analysis. Thematic analysis was used to analyze the data. Results: The study revealed that family members adopted different coping strategies for their CWDs, including seeking support from formal (e.g., service providers) and informal sources (family members and friends); relying on religious beliefs; accepting the situation. Additionally, to cope with extra cost in raising CWDs, family members strategies included relying on overtime work; borrowing money from financial institutions; selling or mortgaging assets; and replying on donations from community members. Finally, some families had to reduce spending on food and buying toys for their CWDs. Conclusion: This qualitative study highlighted a range of coping mechanism adopted by family members in Bangladesh. The information provided in this study is potentially important to policy makers and service providers as it presents evidence on the coping mechanism of families in raising their CWDs. This underscores the need for policy design and service delivery in government support system in Bangladesh and potentially in other low- and middle-income contexts.Keywords: Bangladesh, children with disabilities, coping mechanism, family members
Procedia PDF Downloads 2023714 A Privacy Protection Scheme Supporting Fuzzy Search for NDN Routing Cache Data Name
Authors: Feng Tao, Ma Jing, Guo Xian, Wang Jing
Abstract:
Named Data Networking (NDN) replaces IP address of traditional network with data name, and adopts dynamic cache mechanism. In the existing mechanism, however, only one-to-one search can be achieved because every data has a unique name corresponding to it. There is a certain mapping relationship between data content and data name, so if the data name is intercepted by an adversary, the privacy of the data content and user’s interest can hardly be guaranteed. In order to solve this problem, this paper proposes a one-to-many fuzzy search scheme based on order-preserving encryption to reduce the query overhead by optimizing the caching strategy. In this scheme, we use hash value to ensure the user’s query safe from each node in the process of search, so does the privacy of the requiring data content.Keywords: NDN, order-preserving encryption, fuzzy search, privacy
Procedia PDF Downloads 4853713 Object Negotiation Mechanism for an Intelligent Environment Using Event Agents
Authors: Chiung-Hui Chen
Abstract:
With advancements in science and technology, the concept of the Internet of Things (IoT) has gradually developed. The development of the intelligent environment adds intelligence to objects in the living space by using the IoT. In the smart environment, when multiple users share the living space, if different service requirements from different users arise, then the context-aware system will have conflicting situations for making decisions about providing services. Therefore, the purpose of establishing a communication and negotiation mechanism among objects in the intelligent environment is to resolve those service conflicts among users. This study proposes developing a decision-making methodology that uses “Event Agents” as its core. When the sensor system receives information, it evaluates a user’s current events and conditions; analyses object, location, time, and environmental information; calculates the priority of the object; and provides the user services based on the event. Moreover, when the event is not single but overlaps with another, conflicts arise. This study adopts the “Multiple Events Correlation Matrix” in order to calculate the degree values of incidents and support values for each object. The matrix uses these values as the basis for making inferences for system service, and to further determine appropriate services when there is a conflict.Keywords: internet of things, intelligent object, event agents, negotiation mechanism, degree of similarity
Procedia PDF Downloads 2903712 A Parametric Study on Effects of Internal Factors on Carbonation of Reinforced Concrete
Authors: Kunal Tongaria, Abhishek Mangal, S. Mandal, Devendra Mohan
Abstract:
The carbonation of concrete is a phenomenon which is a function of various interdependent parameters. Therefore, in spite of numerous literature and database, the useful generalization is not an easy task. These interdependent parameters can be grouped under the category of internal and external factors. This paper focuses on the internal parameters which govern and increase the probability of the ingress of deleterious substances into concrete. The mechanism of effects of internal parameters such as microstructure for with and without supplementary cementing materials (SCM), water/binder ratio, the age of concrete etc. has been discussed. This is followed by the comparison of various proposed mathematical models for the deterioration of concrete. Based on existing laboratory experiments as well as field results, this paper concludes the present understanding of mechanism, modeling and future research needs in this field.Keywords: carbonation, diffusion coefficient, microstructure of concrete, reinforced concrete
Procedia PDF Downloads 4083711 Electrochemical Study of Copper–Tin Alloy Nucleation Mechanisms onto Different Substrates
Authors: Meriem Hamla, Mohamed Benaicha, Sabrine Derbal
Abstract:
In the present work, several materials such as M/glass (M = Pt, Mo) were investigated to test their suitability for studying the early nucleation stages and growth of copper-tin clusters. It was found that most of these materials stand as good substrates to be used in the study of the nucleation and growth of electrodeposited Cu-Sn alloys from aqueous solution containing CuCl2, SnCl2 as electroactive species and Na3C6H5O7 as complexing agent. Among these substrates, Pt shows instantaneous models followed by 3D diffusion-limited growth. On the other hand, the electrodeposited copper-tin thin films onto Mo substrate followed progressive nucleation. The deposition mechanism of the Cu-Sn films has been studied using stationary electrochemical techniques (cyclic voltammetery (CV) and chronoamperometry (CA). The structural, morphological and compositional of characterization have been studied using X-ray diffraction (XRD), scanning electron microscopy (SEM) and EDAX techniques respectively.Keywords: electrodeposition, CuSn, nucleation, mechanism
Procedia PDF Downloads 3983710 Lies of Police Interrogators in the Ultimatum Game
Authors: Eitan Elaad
Abstract:
The present study's purpose was to examine lyingand pretend fairness by police interrogators in sharing situations. Forty police officers and 40 laypeople from the community, all males, self-assessed their lie-telling ability, rated the frequency of their lies, evaluated the acceptability of lying, and indicated using rational and intuitive thinking while lying. Next, according to the ultimatum game procedure, participants were asked to share 100 points with a virtual target, either a male police interrogator or a male layman. Participantsallocated points to the target person bearing in mind that the other person must accept their offer. Participants' goal was to retain as many points as possible, and to this end, they could tell the target person that fewer than 100 points were available for distribution. The difference between the available 100 points and the sum of points designated for sharing defines lying. The ratio of offered and designated points defines pretend fairness. Results indicate that those police officers lied more than laypeople. Similar results emergedeven when the target person was a police interrogator. However, police interrogators presented higher pretend fairness than laypeople. The higher pretend fairness may be in line with interrogation tactics of persuasion used in the criminal interrogation. Higher-lying frequency reported by police interrogators compared with laypeople support the present results. Finally, lie acceptability predicted lying in the ultimatum game. Specifically, participants who rated lying as more acceptable tended to lie more than low acceptability raters.Keywords: lying, police interrogators, lie acceptability, ultimatum game, pretend fairness
Procedia PDF Downloads 1533709 A Study of Relational Factors Associated with Online Celebrity Business and Consumer Purchase Intention
Authors: Sixing Chen, Shuai Yang
Abstract:
Online celebrity business, also known as Internet celebrity business (or Wanghong business in Chinese), is an emerging relational C2C business model, and an alternative to traditional C2C transactional business models. There are already millions of these consumers, and this number is growing. In this model, consumer purchase decisions are driven by recommendations and endorsements in videos posted online by celebrities. The purpose of this paper is to determine the relational constructs within consumer relationships in the Internet celebrity business model and to investigate relationships between the constructs and consumer purchase intention. A questionnaire-based study was conducted with consumers who had an awareness of, or prior purchase experience with online celebrities. The results of exploratory factor analysis (EFA) and multiple regression analysis revealed three valid relational constructs: product experience sharing, lifestyle association, and real-time interaction. This study indicated that these constructs had the direct effect on consumer preference and purchase intention. The findings of this study provide insight into a business model in which online shopping is driven by celebrities. They suggest that online celebrities should pay more attention to product experience sharing, life style association and real-time interaction for managing their product promotions. These are the most salient factors with respect to the relational constructs identified in this study.Keywords: customer relationship, customer to customer, Internet celebrity, online celebrity, online marketing, purchase intention
Procedia PDF Downloads 3183708 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol
Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang
Abstract:
NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism
Procedia PDF Downloads 4513707 Mobile Traffic Management in Congested Cells using Fuzzy Logic
Authors: A. A. Balkhi, G. M. Mir, Javid A. Sheikh
Abstract:
To cater the demands of increasing traffic with new applications the cellular mobile networks face new changes in deployment in infrastructure for making cellular networks heterogeneous. To reduce overhead processing the densely deployed cells require smart behavior with self-organizing capabilities with high adaptation to the neighborhood. We propose self-organization of unused resources usually excessive unused channels of neighbouring cells with densely populated cells to reduce handover failure rates. The neighboring cells share unused channels after fulfilling some conditional candidature criterion using threshold values so that they are not suffered themselves for starvation of channels in case of any abrupt change in traffic pattern. The cells are classified as ‘red’, ‘yellow’, or ‘green’, as per the available channels in cell which is governed by traffic pattern and thresholds. To combat the deficiency of channels in red cell, migration of unused channels from under-loaded cells, hierarchically from the qualified candidate neighboring cells is explored. The resources are returned back when the congested cell is capable of self-contained traffic management. In either of the cases conditional sharing of resources is executed for enhanced traffic management so that User Equipment (UE) is provided uninterrupted services with high Quality of Service (QoS). The fuzzy logic-based simulation results show that the proposed algorithm is efficiently in coincidence with improved successful handoffs.Keywords: candidate cell, channel sharing, fuzzy logic, handover, small cells
Procedia PDF Downloads 1203706 The Role of the University of Zululand in Documenting and Disseminating Indigenous Knowledge, in KwaZulu-Natal, South Africa
Authors: Smiso Buthelezi, Petros Dlamini, Dennis Ocholla
Abstract:
The study assesses the University of Zululand's practices for documenting, sharing, and accessing indigenous knowledge. Two research objectives guided it: to determine how indigenous knowledge (IK) is developed at the University of Zululand and how indigenous knowledge (IK) is documented at the University of Zululand. The study adopted both interpretive and positivist research paradigms. Ultimately, qualitative and quantitative research methods were used. The qualitative research approach collected data from academic and non-academic staff members. Interviews were conducted with 18 academic staff members and 5 with support staff members. The quantitative research approach was used to collect data from indigenous knowledge (IK) theses and dissertations from the University of Zululand Institutional Repository between 2009-2019. The study results revealed that many departments across the University of Zululand were involved in creating indigenous knowledge (IK)-related content. The department of African Languages was noted to be more involved in creating IK-related content. Moreover, the documentation of the content related to indigenous knowledge (IK) at the University of Zululand is done frequently but is not readily known. It was found that the creation and documentation of indigenous knowledge by different departments faced several challenges. The common challenges are a lack of interest among indigenous knowledge (IK) owners in sharing their knowledge, the local language as a barrier, and a shortage of proper tools for recording and capturing indigenous knowledge (IK). One of the study recommendations is the need for an indigenous knowledge systems (IKS) policy to be in place at the University of Zululand.Keywords: knowledge creation, SECI model, information and communication technology., indigenous knowledge
Procedia PDF Downloads 1133705 Modeling Generalization in the Acquired Equivalence Paradigm with the Successor Representation
Authors: Troy M. Houser
Abstract:
The successor representation balances flexible and efficient reinforcement learning by learning to predict the future, given the present. As such, the successor representation models stimuli as what future states they lead to. Therefore, two stimuli that are perceptually dissimilar but lead to the same future state will come to be represented more similarly. This is very similar to an older behavioral paradigm -the acquired equivalence paradigm, which measures the generalization of learned associations. Here, we test via computational modeling the plausibility that the successor representation is the mechanism by which people generalize knowledge learned in the acquired equivalence paradigm. Computational evidence suggests that this is a plausible mechanism for acquired equivalence and thus can guide future empirical work on individual differences in associative-based generalization.Keywords: acquired equivalence, successor representation, generalization, decision-making
Procedia PDF Downloads 273704 The Structural System Concept of Reinforced Concrete Pier Accompanied with Friction Device plus Gap in Numerical Analysis
Authors: Angga S. Fajar, Y. Takahashi, J. Kiyono, S. Sawada
Abstract:
The problem of medium span bridge bearing support in the extreme temperatures fluctuation region is deterioration in case the suppression of superstructure that sustains temperature expansion. The other hand, the behavior and the parameter of RC column accompanied with friction damping mechanism were determined successfully based on the experiment and numerical analysis. This study proposes the structural system of RC pier accompanied with multi sliding friction damping mechanism to substitute the conventional system of pier together with bearing support. In this system, the pier has monolith behavior to the superstructure with flexible small deformation to accommodate thermal expansion of the superstructure. The flexible small deformation behavior is realized by adding the gap mechanism in the multi sliding friction devices form. The important performances of this system are sufficient lateral flexibility in small deformation, sufficient elastic deformation capacity, sufficient lateral force resistance, and sufficient energy dissipation. Numerical analysis performed for this system with fiber element model. It shows that the structural system has good performance not only under small deformation due to thermal expansion of the superstructure but also under seismic load.Keywords: RC Pier, thermal expansion, multi sliding friction device, flexible small deformation
Procedia PDF Downloads 3083703 Erosion of Culture through Democratization
Authors: Mladen Milicevic
Abstract:
This paper explores how the explosion of computer technologies has allowed for the democratization of many aspects of human activities, which were in the past only available through the institutionalized channels of production and distribution. We will going to use as an example the music recording industries, just to illustrate this process, but the analogies to other activities and aspects of human life can easily be extrapolated from it.Keywords: aura, democratization, music industry, music sharing, paradigm-shift
Procedia PDF Downloads 2363702 Optimization of Slider Crank Mechanism Using Design of Experiments and Multi-Linear Regression
Authors: Galal Elkobrosy, Amr M. Abdelrazek, Bassuny M. Elsouhily, Mohamed E. Khidr
Abstract:
Crank shaft length, connecting rod length, crank angle, engine rpm, cylinder bore, mass of piston and compression ratio are the inputs that can control the performance of the slider crank mechanism and then its efficiency. Several combinations of these seven inputs are used and compared. The throughput engine torque predicted by the simulation is analyzed through two different regression models, with and without interaction terms, developed according to multi-linear regression using LU decomposition to solve system of algebraic equations. These models are validated. A regression model in seven inputs including their interaction terms lowered the polynomial degree from 3rd degree to 1st degree and suggested valid predictions and stable explanations.Keywords: design of experiments, regression analysis, SI engine, statistical modeling
Procedia PDF Downloads 1863701 How Whatsappization of the Chatbot Affects User Satisfaction, Trust, and Acceptance in a Drive-Sharing Task
Authors: Nirit Gavish, Rotem Halutz, Liad Neta
Abstract:
Nowadays, chatbots are gaining more and more attention due to the advent of large language models. One of the important considerations in chatbot design is how to create an interface to achieve high user satisfaction, trust, and acceptance. Since WhatsApp conversations sometimes substitute for face-to-face communication, we studied whether WhatsAppization of the chatbot -making the conversation resemble a WhatsApp conversation more- will improve user satisfaction, trust, and acceptance, or whether the opposite will occur due to the Uncanny Valley (UV) effect. The task was a drive-sharing task, in which participants communicated with a textual chatbot via WhatsApp and could decide whether to participate in a ride to college with a driver suggested by the chatbot. WhatsAppization of the chatbot was done in two ways: By a dialog-style conversation (Dialog versus No Dialog), and by adding WhatsApp indicators – “Last Seen”, “Connected”, “Read Receipts”, and “Typing…” (Indicators versus No Indicators). Our 120 participants were randomly assigned to one of the four 2 by 2 design groups, with 30 participants in each. They interacted with the WhatsApp chatbot and then filled out a questionnaire. The results demonstrated that, as expected from the manipulation, the interaction with the chatbot was longer for the dialog condition compared to the no dialog. This extra interaction, however, did not lead to higher acceptance -quite the opposite, since participants in the dialog condition were less willing to implement the decision made at the end of the conversation with the chatbot and continue the interaction with the driver they chose. The results are even more striking when considering the Indicators condition. Both for the satisfaction measures and the trust measures, participants’ ratings were lower in the Indicators condition compared to the No Indicators. Participants in the Indicators condition felt that the ride search process was harder to operate, and slower (even though the actual interaction time was similar). They were less convinced that the chatbot suggested real trips and they trusted the person offering the ride and referred to them by the chatbot less. These effects were more evident for participants who preferred to share their rides using WhatsApp compared to participants who preferred chatbots for that purpose. Considering our findings, we can say that the WhatsAppization of the chatbot was detrimental. This is true for the both chatbot WhatsAppization methods – by making the conversation more a dialog and adding WhatsApp indicators. For the chosen drive-sharing task, the results were, in addition to lower satisfaction, less trust in the chatbot’s suggestion and even in the driver suggested by the chatbot, and lower willingness to actually undertake the suggested ride. In addition, it seems that the most problematic WhatsAppization method was using WhatsApp’s indicators during the interaction with the chatbot. The current study suggests that a conversation with an artificial agent should also not imitate a WhatsApp conversation very closely. With the proliferation of WhatsApp use, the emotional and social aspect of face-to face commination are moving to WhatsApp communication. Based on the current study’s findings, it is possible that the UV effect also occurs in WhatsAppization, and not only in humanization, of the chatbot, with a similar feeling of eeriness, and is more pronounced for people who prefer to use WhatsApp over chatbots. The current research can serve as a starting point to study the very interesting and important topic of chatbots WhatsAppization. More methods of WhatsAppization and other tasks could be the focus of further studies.Keywords: chatbot, WhatsApp, humanization, Uncanny Valley, drive sharing
Procedia PDF Downloads 483700 Augmented ADRC for Trajectory Tracking of a Novel Hydraulic Spherical Motion Mechanism
Authors: Bin Bian, Liang Wang
Abstract:
A hydraulic spherical motion mechanism (HSMM) is proposed. Unlike traditional systems using serial or parallel mechanisms for multi-DOF rotations, the HSMM is capable of implementing continuous 2-DOF rotational motions in a single joint without the intermediate transmission mechanisms. It has some advantages of compact structure, low inertia and high stiffness. However, as HSMM is a nonlinear and multivariable system, it is very complicate to realize accuracy control. Therefore, an augmented active disturbance rejection controller (ADRC) is proposed in this paper. Compared with the traditional PD control method, three compensation items, i.e., dynamics compensation term, disturbance compensation term and nonlinear error elimination term, are added into the proposed algorithm to improve the control performance. The ADRC algorithm aims at offsetting the effects of external disturbance and realizing accurate control. Euler angles are applied to describe the orientation of rotor. Lagrange equations are utilized to establish the dynamic model of the HSMM. The stability of this algorithm is validated with detailed derivation. Simulation model is formulated in Matlab/Simulink. The results show that the proposed control algorithm has better competence of trajectory tracking in the presence of uncertainties.Keywords: hydraulic spherical motion mechanism, dynamic model, active disturbance rejection control, trajectory tracking
Procedia PDF Downloads 1063699 Targeted Nano Anti-Cancer Drugs for Curing Cancers
Authors: Imran Ali
Abstract:
General chemotherapy for cancer treatment has many side and toxic effects. A new approach of targeting nano anti-cancer drug is under development stage and only few drugs are available in the market today. The unique features of these drugs are targeted action on cancer cells only without any side effect. Sometimes, these are called magic drugs. The important molecules used for nano anti-cancer drugs are cisplatin, carboplatin, bleomycin, 5-fluorouracil, doxorubicin, dactinomycin, 6-mercaptopurine, paclitaxel, topotecan, vinblastin and etoposide etc. The most commonly used materials for preparing nano particles carriers are dendrimers, polymeric, liposomal, micelles inorganic, organic etc. The proposed lecture will comprise the-of-art of nano drugs in cancer chemo-therapy including preparation, types of drugs, mechanism, future perspectives etc.Keywords: cancer, nano-anti-cancer drugs, chemo-therapy, mechanism of action, future perspectives
Procedia PDF Downloads 4483698 Off-Policy Q-learning Technique for Intrusion Response in Network Security
Authors: Zheni S. Stefanova, Kandethody M. Ramachandran
Abstract:
With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.Keywords: cyber security, intrusion prevention, optimal policy, Q-learning
Procedia PDF Downloads 238