Search results for: open information extraction
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14751

Search results for: open information extraction

10341 Restoring, Revitalizing and Recovering Brazilian Rivers: Application of the Concept to Small Basins in the City of São Paulo, Brazil

Authors: Juliana C. Alencar, Monica Ferreira do Amaral Porto

Abstract:

Watercourses in Brazilian urban areas are constantly being degraded due to the unplanned use of the urban space; however, due to the different contexts of land use and occupation in the river watersheds, different intervention strategies are required to requalify them. When it comes to requalifying watercourses, we can list three main techniques to fulfill this purpose: restoration, revitalization and recovery; each one being indicated for specific contexts of land use and occupation in the basin. In this study, it was demonstrated that the application of these three techniques to three small basins in São Paulo city, listing the aspects involved in each of the contexts and techniques of requalification. For a protected watercourse within a forest park, renaturalization was proposed, where the watercourse is preserved in a state closer to the natural one. For a watercourse in an urban context that still preserves open spaces for its maintenance as a landscape element, an intervention was proposed following the principles of revitalization, integrating the watercourse with the landscape and the population. In the case of a watercourse in a harder context, only recovery was proposed, since the watercourse is found under the road system, which makes it difficult to integrate it into the landscape.

Keywords: sustainable drainage, river restoration, river revitalization, river recovery

Procedia PDF Downloads 153
10340 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 87
10339 Performance Optimization of Low-Cost Solar Dryer Using Modified PI Controller

Authors: Rajesh Kondareddy, Prakash Kumar Nayak, Maunash Das, Vrinatri Velentina Boro

Abstract:

Today, there is a huge global concern for sustainable development which would include minimizing the consumption of non-renewable energies without affecting the basic global economy. Solar drying is one of the important processes used for extending the shelf life of agricultural products. The performance of a low cost automated solar dryer fitted with cascade control scheme and modified PI controller for drying chilli was investigated. The dryer was composed of designed solar collector (air heater) fitted with cylindrical pipes to improve the air velocity and a solar drying chamber containing rack of two cheese cloth (net) trays both being integrated together. The air allowed in through air inlet is heated up in the solar collector and channelled through the drying chamber where it is utilized in drying (removing the moisture content from the food substance or agricultural produce loaded). Here, to maintain the temperature in the heating chambers and to improve performance, a modified PI (Proportional–Integral) controller was used due its simplicity and robustness. Drying time for drying chilli from the initial moisture content of 88.5% (wb) to 7.3% (wb) was estimated to be 14 hours in solar dryer whereas 32 h was observed in the open sun drying.

Keywords: cascade control, chilli, PI controller, solar dryer

Procedia PDF Downloads 285
10338 Facilitating Conditions Mediating SME’s Intention to Use Social Media for Knowledge Sharing

Authors: Stevens Phaphadi Mamorobela

Abstract:

The Covid-19 pandemic has accelerated the use of social media in SMEs to stay abreast with information about the latest news and developments and to predict the future world of business. The national shutdown regulations for curbing the spread of the Covid-19 virus resulted in SMEs having to distribute large volumes of information through social media platforms to collaborate and conduct business remotely. How much of the information shared on social media is used by SMEs as significant knowledge for economic rent is yet to be known. This study aims to investigate the facilitating conditions that enable SMEs’ intention to use social media as a knowledge-sharing platform to create economic rent and to cope with the Covid-19 challenges. A qualitative research approach was applied where semi-structured interviews were conducted with 13 SME owners located in the Gauteng province in South Africa to identify and explain the facilitating conditions of SMEs towards their intention to use social media as a knowledge-sharing tool in the Covid-19 era. The study discovered that the national lockdown regulations towards curbing the spread of the Covid-19 pandemic had compelled SMEs to adopt digital technologies that enabled them to quickly transform their business processes to cope with the challenges of the pandemic. The facilitating conditions, like access to high bandwidth internet coverage in the Gauteng region, enable SMEs to have strong intentions to use social media to distribute content and to reach out to their target market. However, the content is shared informally using diverse social media platforms without any guidelines for transforming content into rent-yielding knowledge.

Keywords: facilitating conditions, knowledge sharing, social media, intention to use, SME

Procedia PDF Downloads 102
10337 The Dangers of Attentional Inertia in the Driving Task

Authors: Catherine Thompson, Maryam Jalali, Peter Hills

Abstract:

The allocation of visual attention is critical when driving and anything that limits attention will have a detrimental impact on safety. Engaging in a secondary task reduces the amount of attention directed to the road because drivers allocate resources towards this task, leaving fewer resources to process driving-relevant information. Yet the dangers associated with a secondary task do not end when the driver returns their attention to the road. Instead, the attentional settings adopted to complete a secondary task may persist to the road, affecting attention, and therefore affecting driver performance. This 'attentional inertia' effect was investigated in the current work. Forty drivers searched for hazards in driving video clips while their eye-movements were recorded. At varying intervals they were instructed to attend to a secondary task displayed on a tablet situated to their left-hand side. The secondary task consisted of three separate computer games that induced horizontal, vertical, and random eye movements. Visual search and hazard detection in the driving clips were compared across the three conditions of the secondary task. Results showed that the layout of information in the secondary task, and therefore the allocation of attention in this task, had an impact on subsequent search in the driving clips. Vertically presented information reduced the wide horizontal spread of search usually associated with accurate driving and had a negative influence on the detection of hazards. The findings show the additional dangers of engaging in a secondary task while driving. The attentional inertia effect has significant implications for semi-autonomous and autonomous vehicles in which drivers have greater opportunity to direct their attention away from the driving task.

Keywords: attention, eye-movements, hazard perception, visual search

Procedia PDF Downloads 160
10336 Valence and Arousal-Based Sentiment Analysis: A Comparative Study

Authors: Usama Shahid, Muhammad Zunnurain Hussain

Abstract:

This research paper presents a comprehensive analysis of a sentiment analysis approach that employs valence and arousal as its foundational pillars, in comparison to traditional techniques. Sentiment analysis is an indispensable task in natural language processing that involves the extraction of opinions and emotions from textual data. The valence and arousal dimensions, representing the intensity and positivity/negativity of emotions, respectively, enable the creation of four quadrants, each representing a specific emotional state. The study seeks to determine the impact of utilizing these quadrants to identify distinct emotional states on the accuracy and efficiency of sentiment analysis, in comparison to traditional techniques. The results reveal that the valence and arousal-based approach outperforms other approaches, particularly in identifying nuanced emotions that may be missed by conventional methods. The study's findings are crucial for applications such as social media monitoring and market research, where the accurate classification of emotions and opinions is paramount. Overall, this research highlights the potential of using valence and arousal as a framework for sentiment analysis and offers invaluable insights into the benefits of incorporating specific types of emotions into the analysis. These findings have significant implications for researchers and practitioners in the field of natural language processing, as they provide a basis for the development of more accurate and effective sentiment analysis tools.

Keywords: sentiment analysis, valence and arousal, emotional states, natural language processing, machine learning, text analysis, sentiment classification, opinion mining

Procedia PDF Downloads 93
10335 One Step Further: Pull-Process-Push Data Processing

Authors: Romeo Botes, Imelda Smit

Abstract:

In today’s modern age of technology vast amounts of data needs to be processed in real-time to keep users satisfied. This data comes from various sources and in many formats, including electronic and mobile devices such as GPRS modems and GPS devices. They make use of different protocols including TCP, UDP, and HTTP/s for data communication to web servers and eventually to users. The data obtained from these devices may provide valuable information to users, but are mostly in an unreadable format which needs to be processed to provide information and business intelligence. This data is not always current, it is mostly historical data. The data is not subject to implementation of consistency and redundancy measures as most other data usually is. Most important to the users is that the data are to be pre-processed in a readable format when it is entered into the database. To accomplish this, programmers build processing programs and scripts to decode and process the information stored in databases. Programmers make use of various techniques in such programs to accomplish this, but sometimes neglect the effect some of these techniques may have on database performance. One of the techniques generally used,is to pull data from the database server, process it and push it back to the database server in one single step. Since the processing of the data usually takes some time, it keeps the database busy and locked for the period of time that the processing takes place. Because of this, it decreases the overall performance of the database server and therefore the system’s performance. This paper follows on a paper discussing the performance increase that may be achieved by utilizing array lists along with a pull-process-push data processing technique split in three steps. The purpose of this paper is to expand the number of clients when comparing the two techniques to establish the impact it may have on performance of the CPU storage and processing time.

Keywords: performance measures, algorithm techniques, data processing, push data, process data, array list

Procedia PDF Downloads 238
10334 Typology of Fake News Dissemination Strategies in Social Networks in Social Events

Authors: Mohadese Oghbaee, Borna Firouzi

Abstract:

The emergence of the Internet and more specifically the formation of social media has provided the ground for paying attention to new types of content dissemination. In recent years, Social media users share information, communicate with others, and exchange opinions on social events in this space. Many of the information published in this space are suspicious and produced with the intention of deceiving others. These contents are often called "fake news". Fake news, by disrupting the circulation of the concept and similar concepts such as fake news with correct information and misleading public opinion, has the ability to endanger the security of countries and deprive the audience of the basic right of free access to real information; Competing governments, opposition elements, profit-seeking individuals and even competing organizations, knowing about this capacity, act to distort and overturn the facts in the virtual space of the target countries and communities on a large scale and influence public opinion towards their goals. This process of extensive de-truthing of the information space of the societies has created a wave of harm and worries all over the world. The formation of these concerns has led to the opening of a new path of research for the timely containment and reduction of the destructive effects of fake news on public opinion. In addition, the expansion of this phenomenon has the potential to create serious and important problems for societies, and its impact on events such as the 2016 American elections, Brexit, 2017 French elections, 2019 Indian elections, etc., has caused concerns and led to the adoption of approaches It has been dealt with. In recent years, a simple look at the growth trend of research in "Scopus" shows an increasing increase in research with the keyword "false information", which reached its peak in 2020, namely 524 cases, reached, while in 2015, only 30 scientific-research contents were published in this field. Considering that one of the capabilities of social media is to create a context for the dissemination of news and information, both true and false, in this article, the classification of strategies for spreading fake news in social networks was investigated in social events. To achieve this goal, thematic analysis research method was chosen. In this way, an extensive library study was first conducted in global sources. Then, an in-depth interview was conducted with 18 well-known specialists and experts in the field of news and media in Iran. These experts were selected by purposeful sampling. Then by analyzing the data using the theme analysis method, strategies were obtained; The strategies achieved so far (research is in progress) include unrealistically strengthening/weakening the speed and content of the event, stimulating psycho-media movements, targeting emotional audiences such as women, teenagers and young people, strengthening public hatred, calling the reaction legitimate/illegitimate. events, incitement to physical conflict, simplification of violent protests and targeted publication of images and interviews were introduced.

Keywords: fake news, social network, social events, thematic analysis

Procedia PDF Downloads 60
10333 Multi Cloud Storage Systems for Resource Constrained Mobile Devices: Comparison and Analysis

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

Cloud storage is a model of online data storage where data is stored in virtualized pool of servers hosted by third parties (CSPs) and located in different geographical locations. Cloud storage revolutionized the way how users access their data online anywhere, anytime and using any device as a tablet, mobile, laptop, etc. A lot of issues as vendor lock-in, frequent service outage, data loss and performance related issues exist in single cloud storage systems. So to evade these issues, the concept of multi cloud storage introduced. There are a lot of multi cloud storage systems exists in the market for mobile devices. In this article, we are providing comparison of four multi cloud storage systems for mobile devices Otixo, Unclouded, Cloud Fuze, and Clouds and evaluate their performance on the basis of CPU usage, battery consumption, time consumption and data usage parameters on three mobile phones Nexus 5, Moto G and Nexus 7 tablet and using Wi-Fi network. Finally, open research challenges and future scope are discussed.

Keywords: cloud storage, multi cloud storage, vendor lock-in, mobile devices, mobile cloud computing

Procedia PDF Downloads 402
10332 Arithmetic Operations Based on Double Base Number Systems

Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan

Abstract:

Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.

Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm

Procedia PDF Downloads 392
10331 A Brain Controlled Robotic Gait Trainer for Neurorehabilitation

Authors: Qazi Umer Jamil, Abubakr Siddique, Mubeen Ur Rehman, Nida Aziz, Mohsin I. Tiwana

Abstract:

This paper discusses a brain controlled robotic gait trainer for neurorehabilitation of Spinal Cord Injury (SCI) patients. Patients suffering from Spinal Cord Injuries (SCI) become unable to execute motion control of their lower proximities due to degeneration of spinal cord neurons. The presented approach can help SCI patients in neuro-rehabilitation training by directly translating patient motor imagery into walkers motion commands and thus bypassing spinal cord neurons completely. A non-invasive EEG based brain-computer interface is used for capturing patient neural activity. For signal processing and classification, an open source software (OpenVibe) is used. Classifiers categorize the patient motor imagery (MI) into a specific set of commands that are further translated into walker motion commands. The robotic walker also employs fall detection for ensuring safety of patient during gait training and can act as a support for SCI patients. The gait trainer is tested with subjects, and satisfactory results were achieved.

Keywords: brain computer interface (BCI), gait trainer, spinal cord injury (SCI), neurorehabilitation

Procedia PDF Downloads 156
10330 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 157
10329 Computer Countenanced Diagnosis of Skin Nodule Detection and Histogram Augmentation: Extracting System for Skin Cancer

Authors: S. Zith Dey Babu, S. Kour, S. Verma, C. Verma, V. Pathania, A. Agrawal, V. Chaudhary, A. Manoj Puthur, R. Goyal, A. Pal, T. Danti Dey, A. Kumar, K. Wadhwa, O. Ved

Abstract:

Background: Skin cancer is now is the buzzing button in the field of medical science. The cyst's pandemic is drastically calibrating the body and well-being of the global village. Methods: The extracted image of the skin tumor cannot be used in one way for diagnosis. The stored image contains anarchies like the center. This approach will locate the forepart of an extracted appearance of skin. Partitioning image models has been presented to sort out the disturbance in the picture. Results: After completing partitioning, feature extraction has been formed by using genetic algorithm and finally, classification can be performed between the trained and test data to evaluate a large scale of an image that helps the doctors for the right prediction. To bring the improvisation of the existing system, we have set our objectives with an analysis. The efficiency of the natural selection process and the enriching histogram is essential in that respect. To reduce the false-positive rate or output, GA is performed with its accuracy. Conclusions: The objective of this task is to bring improvisation of effectiveness. GA is accomplishing its task with perfection to bring down the invalid-positive rate or outcome. The paper's mergeable portion conflicts with the composition of deep learning and medical image processing, which provides superior accuracy. Proportional types of handling create the reusability without any errors.

Keywords: computer-aided system, detection, image segmentation, morphology

Procedia PDF Downloads 144
10328 Raman, Atomic Force Microscopy and Mass Spectrometry for Isotopic Ratios Methods Used to Investigate Human Dentine and Enamel

Authors: Nicoleta Simona Vedeanu, Rares Stiufiuc, Dana Alina Magdas

Abstract:

A detailed knowledge of the teeth structure is mandatory to understand and explain the defects and the dental pathology, but especially to take a correct decision regarding dental prophylaxis and treatment. The present work is an alternative study to the traditional investigation methods used in dentistry, a study based on the use of modern, sensitive physical methods to investigate human enamel and dentin. For the present study, several teeth collected from patients of different ages were used for structural and dietary investigation. The samples were investigated by Raman spectroscopy for the molecular structure analysis of dentin and enamel, atomic force microscopy (AFM) to view the dental topography at the micrometric size and mass spectrometry for isotopic ratios as a fingerprint of patients’ personal diet. The obtained Raman spectra and their interpretation are in good correlation with the literature and may give medical information by comparing affected dental structures with healthy ones. AFM technique gave us the possibility to study in details the dentin and enamel surface to collect information about dental hardness or dental structural changes. δ¹³C values obtained for the studied samples can be classified in C4 category specific to young people and children diet (sweets, cereals, juices, pastry). The methods used in this attempt furnished important information about dentin and enamel structure and dietary habits and each of the three proposed methods can be extended at a larger level in the study of the teeth structure.

Keywords: AFM, dentine, enamel, Raman spectroscopy

Procedia PDF Downloads 142
10327 Bioefficacy of Catharanthus roseus on Reproductive Performance of Red Cotton Bug, Dysdercus koenigii (Heteroptera: Pyrrhocoriedae)

Authors: Sunil Kayesth, Kamal Kumar Gupta

Abstract:

Influence of hexane extract of Catharanthus roseus leaves on reproductive fitness of Dysdercus koenigii was investigated by evaluating mating behaviour, oviposition behaviour and fertility of the treated insects. The volatiles of the plants were extracted in hexane by ‘cold extraction method’. The insects were treated with the extracts by ‘dry film residual method’. Our studies indicated that the treated male showed altered courtship behaviour, less number of mounting attempts, took more time to mate, less percent successful mating, and more disrupted mating. Similarly, the treated female exhibited either mating refusal or neutral behaviour towards courting males. The maximum disruption in the mating was observed in a cross T♂ X T♀, where males and females were treated with Catharanthus extract. The Dysdercus treated with Catharanthus extracts also showed marked reduction in their reproductive success. The treated females laid lesser number of egg batches and eggs in their life span. Catharanthus extract was effective in alteration of the oviposition behaviour. The eggs laid by the mated females were fertile indicating insemination of the mated females. However, the percent hatchability of the eggs laid by the treated females was less than control. The GC-MS analysis of the extract revealed the presence of juvenile hormone mimics, and the intermediates of juvenile hormone biosynthesis. Therefore, some of these compounds individually or synergistically alter reproductive behaviour of Dysdercus.

Keywords: Catharanthus roseus, Dysdercus koenigii, GC-MS analysis, reproductive performance

Procedia PDF Downloads 249
10326 Choice of Landscape Elements for Residents' Quality of Life Living in Apartment Housing: Case Study of Bhopal, India

Authors: Ankita Srivastava, Yogesh K. Garg

Abstract:

Housing provides comforts and well being leading towards the quality of life. Earlier research had established that landscape elements enhance the residents’ quality of life through its significant experiences occur due to their presence in the housing. This paper tries to identify the preference of landscape elements that enhance residents’ quality of life living in the apartment. Hence, landscape elements that can be planned in the open spaces of housing and quality of life components were identified from the secondary data sources. Experts’ were asked to identify the quality of life components with respect to landscape elements. A questionnaire survey of residents’ living in the apartment housing in Bhopal, India was conducted. The statistical analysis of survey data facilitated to explore the preference of landscape elements for the quality of life in the apartment housing. The final ranking compiled from the experts’ opinion, residents’ perception as well as factor analysis results to have an insight of the preference of landscape elements for the quality of life living in the apartment. Preference of landscape elements present in the paper may provide an overview of planning for apartment housing that may be used by architects, planners and developers for enhancing residents’ quality of life.

Keywords: landscape elements, quality of life, residents, housing

Procedia PDF Downloads 254
10325 Identifying the Knowledge Management and its Capabilities in Universities: A Case Study of Public Universities in Nigeria

Authors: Hilary Joseph Watsilla

Abstract:

Research work is a vital part of the university system; in Nigeria public universities, research is used in measuring the development of individuals and departments within the academic system. Information technology has impacted the way research is carried out by providing easy access to information and improved collaboration between research and other instruments necessary for research activities. However, access to some of these IT facilities is not readily available in most of the public institutions in Nigeria. Research activities are usually tedious and rigorous and any inadequacy in research resources might affect the quality of research outcome. This study aims to identify the IT capability and knowledge management capabilities necessary for academic researchers in public universities in Nigeria, as it will provide more incite to the knowledge creation processes of research. The research will be conducted using an interpretive lens, which will provide a more qualitative understanding of the subject matter. The outcome of the research will provide an empirical understanding of the IT capabilities, which help in the optimization of the knowledge management capabilities of the university.

Keywords: IT capabilities, KM capabilities, universities, academic research

Procedia PDF Downloads 3
10324 Effect of Cerebellar High Frequency rTMS on the Balance of Multiple Sclerosis Patients with Ataxia

Authors: Shereen Ismail Fawaz, Shin-Ichi Izumi, Nouran Mohamed Salah, Heba G. Saber, Ibrahim Mohamed Roushdi

Abstract:

Background: Multiple sclerosis (MS) is a chronic, inflammatory, mainly demyelinating disease of the central nervous system, more common in young adults. Cerebellar involvement is one of the most disabling lesions in MS and is usually a sign of disease progression. It plays a major role in the planning, initiation, and organization of movement via its influence on the motor cortex and corticospinal outputs. Therefore, it contributes to controlling movement, motor adaptation, and motor learning, in addition to its vast connections with other major pathways controlling balance, such as the cerebellopropriospinal pathways and cerebellovestibular pathways. Hence, trying to stimulate the cerebellum by facilitatory protocols will add to our motor control and balance function. Non-invasive brain stimulation, both repetitive transcranial magnetic stimulation (rTMS) and transcranial direct current stimulation (tDCS), has recently emerged as effective neuromodulators to influence motor and nonmotor functions of the brain. Anodal tDCS has been shown to improve motor skill learning and motor performance beyond the training period. Similarly, rTMS, when used at high frequency (>5 Hz), has a facilitatory effect on the motor cortex. Objective: Our aim was to determine the effect of high-frequency rTMS over the cerebellum in improving balance and functional ambulation of multiple sclerosis patients with Ataxia. Patients and methods: This was a randomized single-blinded placebo-controlled prospective trial on 40 patients. The active group (N=20) received real rTMS sessions, and the control group (N=20) received Sham rTMS using a placebo program designed for this treatment. Both groups received 12 sessions of high-frequency rTMS over the cerebellum, followed by an intensive exercise training program. Sessions were given three times per week for four weeks. The active group protocol had a frequency of 10 Hz rTMS over the cerebellar vermis, work period 5S, number of trains 25, and intertrain interval 25s. The total number of pulses was 1250 pulses per session. The control group received Sham rTMS using a placebo program designed for this treatment. Both groups of patients received an intensive exercise program, which included generalized strengthening exercises, endurance and aerobic training, trunk abdominal exercises, generalized balance training exercises, and task-oriented training such as Boxing. As a primary outcome measure the Modified ICARS was used. Static Posturography was done with: Patients were tested both with open and closed eyes. Secondary outcome measures included the expanded Disability Status Scale (EDSS) and 8 Meter walk test (8MWT). Results: The active group showed significant improvements in all the functional scales, modified ICARS, EDSS, and 8-meter walk test, in addition to significant differences in static Posturography with open eyes, while the control group did not show such differences. Conclusion: Cerebellar high-frequency rTMS could be effective in the functional improvement of balance in MS patients with ataxia.

Keywords: brain neuromodulation, high frequency rTMS, cerebellar stimulation, multiple sclerosis, balance rehabilitation

Procedia PDF Downloads 88
10323 Identification of Phenolic Compounds with Antibacterial Activity in Raisin Extract

Authors: Yousef M. Abouzeed A. Elfahem, F. Zgheel, M. A. Saad, Mohamed O. Ahmed

Abstract:

The bioactive properties of phytochemicals indicate their potential as natural drug products to prevent and treat human disease; in particular, compounds with antioxidant and antimicrobial activities may represent a novel class of safe and effective drugs. Following desiccation, grapes (Vitis vinifera) become more resistant to microbial-based degradation, suggesting that raisins may be a source of antimicrobial compounds. To investigate this hypothesis, total phenolic extracts were obtained from common raisins, local market-sourced. The acetone extract was tested for antibacterial activity against four prevalent bacterial pathogens (Staphylococcus aureus, Pseudomonas aeruginosa, Salmonella spp. and Escherichia coli). Antibiotic sensitivity and the Minimum Inhibitory Concentration (MIC) were determined for each bacterium. High performance liquid chromatography was used to identify compounds in the total phenolic extract. The raisin phenolic extract inhibited growth of all the tested bacteria; the greatest inhibitive effect (normalized to cefotaxime sodium control antibiotic) occurred against P. aeruginosa, followed by S. aureus > Salmonella spp.= E. coli. The phenolic extracts contained the bioactive compounds catechin, quercetin, and rutin. Thus, phytochemicals in raisin extract have antibacterial properties; this plant-based extract, or its bioactive constituents, may represent a promising natural preservative or antimicrobial agent for the food industry or anti-infective drug.

Keywords: Vitis vinifera raisin, extraction, phenolic compounds, antibacterial activity

Procedia PDF Downloads 600
10322 Controlling Dimensions and Shape of Carbon Nanotubes Using Nanoporous Anodic Alumina under Different Conditions

Authors: Amine Mezni, Merfat Algethami, Ali Aldalbahi, Arwa Alrooqi, Abel Santos, Dusan Losic, Sarah Alharthi, Tariq Altalhi

Abstract:

In situ synthesis of carbon nanotubes featuring different diameters (10-200 nm), lengths (1 to 100 µm) and periodically nanostructured shape was performed in a custom designed chemical vapor deposition (CVD) system using nanoporous anodic alumina (NAA) under different conditions. The morphology of the resulting CNTs/NAA composites and free-standing CNTs were analyzed by transmission electron microscopy (TEM) and scanning electron microscopy (SEM). The results confirm that highly ordered arrays of CNTs with precise control of nanotube dimensions in the range 20-200 nm with tube length in the range < 1 µm to > 100 μm and with periodically shaped morphology can be fabricated using nanostructured NAA templates prepared by anodization. This technique allows us to obtain tubes open at one / both ends with a uniform diameter along the pore length without using any metal catalyst. Our finding suggests that this fabrication strategy for designing new CNTs membranes and structures can be significant for emerging applications as molecular separation/transport, optical biosensing, and drug delivery.

Keywords: carbon nanotubes, CVD approach, composites membrane, nanoporous anodic alumina

Procedia PDF Downloads 277
10321 Participation in IAEA Proficiency Test to Analyse Cobalt, Strontium and Caesium in Seawater Using Direct Counting and Radiochemical Techniques

Authors: S. Visetpotjanakit, C. Khrautongkieo

Abstract:

Radiation monitoring in the environment and foodstuffs is one of the main responsibilities of Office of Atoms for Peace (OAP) as the nuclear regulatory body of Thailand. The main goal of the OAP is to assure the safety of the Thai people and environment from any radiological incidents. Various radioanalytical methods have been developed to monitor radiation and radionuclides in the environmental and foodstuff samples. To validate our analytical performance, several proficiency test exercises from the International Atomic Energy Agency (IAEA) have been performed. Here, the results of a proficiency test exercise referred to as the Proficiency Test for Tritium, Cobalt, Strontium and Caesium Isotopes in Seawater 2017 (IAEA-RML-2017-01) are presented. All radionuclides excepting ³H were analysed using various radioanalytical methods, i.e. direct gamma-ray counting for determining ⁶⁰Co, ¹³⁴Cs and ¹³⁷Cs and developed radiochemical techniques for analysing ¹³⁴Cs, ¹³⁷Cs using AMP pre-concentration technique and 90Sr using di-(2-ethylhexyl) phosphoric acid (HDEHP) liquid extraction technique. The analysis results were submitted to IAEA. All results passed IAEA criteria, i.e. accuracy, precision and trueness and obtained ‘Accepted’ statuses. These confirm the data quality from the OAP environmental radiation laboratory to monitor radiation in the environment.

Keywords: international atomic energy agency, proficiency test, radiation monitoring, seawater

Procedia PDF Downloads 168
10320 Automatic Diagnosis of Electrical Equipment Using Infrared Thermography

Authors: Y. Laib Dit Leksir, S. Bouhouche

Abstract:

Analysis and processing of data bases resulting from infrared thermal measurements made on the electrical installation requires the development of new tools in order to obtain correct and additional information to the visual inspections. Consequently, the methods based on the capture of infrared digital images show a great potential and are employed increasingly in various fields. Although, there is an enormous need for the development of effective techniques to analyse these data base in order to extract relevant information relating to the state of the equipments. Our goal consists in introducing recent techniques of modeling based on new methods, image and signal processing to develop mathematical models in this field. The aim of this work is to capture the anomalies existing in electrical equipments during an inspection of some machines using A40 Flir camera. After, we use binarisation techniques in order to select the region of interest and we make comparison between these methods of thermal images obtained to choose the best one.

Keywords: infrared thermography, defect detection, troubleshooting, electrical equipment

Procedia PDF Downloads 470
10319 Development and Modeling of a Geographic Information System Solar Flux in Adrar, Algeria

Authors: D. Benatiallah, A. Benatiallah, K. Bouchouicha, A. Harouz

Abstract:

The development and operation of renewable energy known an important development in the world with significant growth potential. Estimate the solar radiation on terrestrial geographic locality is of extreme importance, firstly to choose the appropriate site where to place solar systems (solar power plants for electricity generation, for example) and also for the design and performance analysis of any system using solar energy. In addition, solar radiation measurements are limited to a few areas only in Algeria. Thus, we use theoretical approaches to assess the solar radiation on a given location. The Adrar region is one of the most favorable sites for solar energy use with a medium flow that exceeds 7 kWh / m2 / d and saddle of over 3500 hours per year. Our goal in this work focuses on the creation of a data bank for the given data in the energy field of the Adrar region for the period of the year and the month then the integration of these data into a geographic Information System (GIS) to estimate the solar flux on a location on the map.

Keywords: Adrar, flow, GIS, deposit potential

Procedia PDF Downloads 369
10318 The Doctor-Patient Interaction Experience Hierarchy Using Rasch Measurement Model Analysis

Authors: Wan Nur'ashiqin Wan Mohamad, Zarina Othman, Mohd Azman Abas, Azizah Ya'acob, Rozmel Abdul Latiff

Abstract:

Effective doctor-patient interaction is vital to both doctor and patient relationship. It is the cornerstone of good practice and an integral quality of a healthcare institution. This paper presented the hierarchy of the communication elements in doctor-patient interaction during medical consultations in a medical centre in Malaysia. This study adapted The Picker Patient Experience Questionnaire (2002) to obtain the information from patients. The questionnaire survey was responded by 100 patients between the ages of 20 and 50. Data collected were analysed using Rasch Measurement Model to yield the hierarchy of the communication elements in doctor-patient interaction. The findings showed that the three highest ranking on the doctor-patient interaction were doctor’s treatment, important information delivery and patient satisfaction of doctor’s responses. The results are valuable in developing the framework for communication ethics of doctors.

Keywords: communication elements, doctor-patient interaction, hierarchy, Rasch measurement model

Procedia PDF Downloads 160
10317 Mechanical and Optical Properties of Doped Aluminum Nitride Thin Films

Authors: Padmalochan Panda, R. Ramaseshan

Abstract:

Aluminum nitride (AlN) is a potential candidate for semiconductor industry due to its wide band gap (6.2 eV), high thermal conductivity and low thermal coefficient of expansion. A-plane oriented AlN film finds an important role in deep UV-LED with higher isotropic light extraction efficiency. Also, Cr-doped AlN films exhibit dilute magnetic semiconductor property with high Curie temperature (300 K), and thus compatible with modern day microelectronics. In this work, highly a-axis oriented wurtzite AlN and Al1-xMxN (M = Cr, Ti) films have synthesized by reactive co-sputtering technique at different concentration. Crystal structure of these films is studied by Grazing incidence X-ray diffraction (GIXRD) and Transmission electron microscopy (TEM). Identification of binding energy and concentration (x) in these films is carried out by X-ray photoelectron spectroscopy (XPS). Local crystal structure around the Cr and Ti atom of these films are investigated by X-ray absorption spectroscopy (XAS). It is found that Cr and Ti replace the Al atom in AlN lattice and the bond lengths in first and second coordination sphere with N and Al, respectively, decrease concerning doping concentration due to strong p-d hybridization. The nano-indentation hardness of Cr and Ti-doped AlN films seems to increase from 17.5 GPa (AlN) to around 23 and 27.5 GPa, respectively. An-isotropic optical properties of these films are studied by the Spectroscopic Ellipsometry technique. Refractive index and extinction coefficient of these films are enhanced in normal dispersion region as compared to the parent AlN film. The optical band gap energies also seem to vary between deep UV to UV regions with the addition of Cr, thus by bringing out the usefulness of these films in the area of optoelectronic device applications.

Keywords: ellipsometry, GIXRD, hardness, XAS

Procedia PDF Downloads 109
10316 Development of a Comprehensive Energy Model for Canada

Authors: Matthew B. Davis, Amit Kumar

Abstract:

With potentially dangerous impacts of climate change on the horizon, Canada has an opportunity to take a lead role on the international stage to demonstrate how energy use intensity and greenhouse gas emission intensity may be effectively reduced. Through bottom-up modelling of Canada’s energy sector using Long-range Energy Alternative Planning (LEAP) software, it can be determined where efforts should to be concentrated to produce the most positive energy management results. By analyzing a provincially integrated Canada, one can develop strategies to minimize the country’s economic downfall while transitioning to lower-emission energy technologies. Canada’s electricity sector plays an important role in accommodating these transitionary technologies as fossil-fuel based power production is prevalent in many parts of the country and is responsible for a large portion (17%) of Canada’s greenhouse gas emissions. Current findings incorporate an in-depth model of Canada’s current energy supply and demand sectors, as well as a business-as-usual scenario up to the year 2035. This allows for in-depth analysis of energy flow from resource potential, to extraction, to fuel and electricity production, to energy end use and emissions in Canada’s residential, transportation, commercial, institutional, industrial, and agricultural sectors. Bottom-up modelling techniques such as these are useful to critically analyze and compare the various possible scenarios of implementing sustainable energy measures. This work can aid government in creating effective energy and environmental policies, as well as guide industry to what technology or process changes would be most worthwhile to pursue.

Keywords: energy management, LEAP, energy end-use, GHG emissions

Procedia PDF Downloads 298
10315 A Possible Determinant of Musical Preference in Big Five Personality Traits

Authors: Peter S. Kim

Abstract:

The increasing availability of music facilitated by new technology and open sourcing has eliminated many traditional limiting factors in musical taste, creating a culture of choice. This study tested 191 international subjects, mostly young adults more decisively shaped by emerging technologies like Facebook, the platform for the study. Using an aggregated Big Five personality test, subjects were asked to self-report on questions related to extraversion, agreeableness, conscientiousness, neuroticism, and openness. Subsequently, subjects listened to five pairs of musical works reflecting opposite extremes of one of five musical qualities: tempo (fast/slow), complexity (simple/complex), degree of dissonance (tonal/atonal), familiarity (familiar/unfamiliar), and extra-musical significance (significant/not significant). Subjects were then asked to record listening times and preferences among the selections. Strikingly, this study shows a relatively high positive correlation between agreeableness and musical preferences (predicting preferences for simple, familiar, and fast music), as compared to extraversion, openness, conscientiousness, and neuroticism. Thus, this research suggests that the not yet well-understood relationship between personality traits and musical qualities merits further study.

Keywords: music perception, psychology, cognition, musical preference

Procedia PDF Downloads 308
10314 Evaluation of Long Term Evolution Mobile Signal Propagation Models and Vegetation Attenuation in the Livestock Department at Escuela Superior Politécnica de Chimborazo

Authors: Cinthia Campoverde, Mateo Benavidez, Victor Arias, Milton Torres

Abstract:

This article evaluates and compares three propagation models: the Okumura-Hata model, the Ericsson 9999 model, and the SUI model. The inclusion of vegetation attenuation in the area is also taken into account. These mathematical models aim to predict the power loss between a transmitting antenna (Tx) and a receiving antenna (Rx). The study was conducted in the open areas of the Livestock Department at the Escuela Superior Politécnica de Chimborazo (ESPOCH) University, located in the city of Riobamba, Ecuador. The necessary parameters for each model were calculated, considering LTE technology. The transmitting antenna belongs to the mobile phone company ”TUENTI” in Band 2, operating at a frequency of 1940 MHz. The reception power data in the area were empirically measured using the ”Network Cell Info” application. A total of 170 samples were collected, distributed across 19 radius, forming concentric circles around the transmitting antenna. The results demonstrate that the Okumura Hata urban model provides the best fit to the measured data.

Keywords: propagation models, reception power, LTE, power losses, correction factor

Procedia PDF Downloads 76
10313 Geographic Information System Applications in Prioritizing Karlahi Forest Reserve Area for Conservation

Authors: Samuel Hyellamada Jerry

Abstract:

This study focused on assessing conservation priorities within the Karlahi Forest Reserve of Fufore Local Government in Adamawa State. The main objective was to identify specific areas within the forest reserve that require immediate conservation attention. The research employed remote sensing and GIS techniques to achieve this goal. By overlaying the IDRIS Silva module results, a spatial distribution map was generated, highlighting the cumulative priority areas within and outside the forest. Among the total vegetated area of 26.38 km² in the Karlahi Forest Reserve, the analysis revealed that 16.16 km² were classified as high-priority conservation zones. Additionally, 4.59 km² and 5.63 km² were identified as medium and low-priority areas, respectively. In light of these findings, it is recommended that conservation efforts incorporate detailed land cover information and regular assessments of species diversity. Furthermore, strict adherence to national and state policies regarding forest reserves and parks is crucial for effective conservation management.

Keywords: priority, Karlahi, forest, reserve, IDRISI Silva, species diversity

Procedia PDF Downloads 143
10312 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 314