Search results for: intelligent gathering
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1226

Search results for: intelligent gathering

806 An intelligent Troubleshooting System and Performance Evaluator for Computer Network

Authors: Iliya Musa Adamu

Abstract:

This paper seeks to develop an expert system that would troubleshoot computer network and evaluate the network system performance so as to reduce the workload on technicians and increase the efficiency and effectiveness of solutions proffered to computer network problems. The platform of the system was developed using ASP.NET, whereas the codes are implemented in Visual Basic and integrated with SQL Server 2005. The knowledge base was represented using production rule, whereas the searching method that was used in developing the network troubleshooting expert system is the forward-chaining-rule-based-system. This software tool offers the advantage of providing an immediate solution to most computer network problems encountered by computer users.

Keywords: expert system, forward chaining rule based system, network, troubleshooting

Procedia PDF Downloads 647
805 Intelligent CRISPR Design for Bone Regeneration

Authors: Yu-Chen Hu

Abstract:

Gene editing by CRISPR and gene regulation by microRNA or CRISPR activation have dramatically changed the way to manipulate cellular gene expression and cell fate. In recent years, various gene editing and gene manipulation technologies have been applied to control stem cell differentiation to enhance tissue regeneration. This research will focus on how to develop CRISPR, CRISPR activation (CRISPRa), CRISPR inhibition (CRISPRi), as well as bi-directional CRISPR-AI gene regulation technologies to control cell differentiation and bone regeneration. Moreover, in this study, CRISPR/Cas13d-mediated RNA editng for miRNA editing and bone regeneration will be discussed.

Keywords: gene therapy, bone regeneration, stem cell, CRISPR, gene regulation

Procedia PDF Downloads 90
804 Polyvinyl Alcohol Incorporated with Hibiscus Extract Microcapsules as Combined Active and Intelligent Composite Film for Meat Preservation: Antimicrobial, Antioxidant, and Physicochemical Investigations

Authors: Ahmed F. Ghanem, Marwa I. Wahba, Asmaa N. El-Dein, Mohamed A. EL-Raey, Ghada E. A. Awad

Abstract:

Numerous attempts are being performed in order to formulate suitable packaging materials for the meat products. However, to the best of our knowledge, the incorporation of the free hibiscus extract or its microcapsules in the pure polyvinyl alcohol (PVA) matrix as packaging materials for the meats is seldom reported. Therefore, this study aims at the protection of the aqueous crude extract of the hibiscus flowers utilizing the spry drying encapsulation technique. Results of the Fourier transform infrared (FTIR), the scanning electron microscope (SEM), and the particle size analyzer confirmed the successful formation of the assembled capsules via strong interactions, the spherical rough microparticles, and the particle size of ~ 235 nm, respectively. Also, the obtained microcapsules enjoy higher thermal stability than the free extract. Then, the obtained spray-dried particles were incorporated into the casting solution of the pure PVA film with a concentration of 10 wt. %. The segregated free-standing composite films were investigated, compared to the neat matrix, with several characterization techniques such as FTIR, SEM, thermal gravimetric analysis (TGA), mechanical tester, contact angle, water vapor permeability, and oxygen transmission. The results demonstrated variations in the physicochemical properties of the PVA film after the inclusion of the free and the extract microcapsules. Moreover, biological studies emphasized the biocidal potential of the hybrid films against the microorganisms contaminating the meat. Specifically, the microcapsules imparted not only antimicrobial but also antioxidant activities to the PVA matrix. Application of the prepared films on the real meat samples displayed a low bacterial growth with a slight increase in the pH over the storage time which continued up to 10 days at 4 oC, as further evidence to the meat safety. Moreover, the colors of the films did not significantly changed except after 21 days indicating the spoilage of the meat samples. No doubt, the dual-functional of the prepared composite films pave the way towards combined active and smart food packaging applications. This would play a vital role in the food hygiene, including also the quality control and the assurance.

Keywords: PVA, hibiscus, extraction, encapsulation, active packaging, smart and intelligent packaging, meat spoilage

Procedia PDF Downloads 90
803 Identification of the Relationship Between Signals in Continuous Monitoring of Production Systems

Authors: Maciej Zaręba, Sławomir Lasota

Abstract:

Understanding the dependencies between the input signal, that controls the production system and signals, that capture its output, is of a great importance in intelligent systems. The method for identification of the relationship between signals in continuous monitoring of production systems is described in the paper. The method discovers the correlation between changes in the states derived from input signals and resulting changes in the states of output signals of the production system. The method is able to handle system inertia, which determines the time shift of the relationship between the input and output.

Keywords: manufacturing operation management, signal relationship, continuous monitoring, production systems

Procedia PDF Downloads 92
802 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 455
801 Analyse of User Interface Design in Mobile Teaching Apps

Authors: Asma Ashoul

Abstract:

Nowadays, smartphones are playing a major role in our lives, by communicating with family, friends or using them to learn different things in life. Using smartphones to learn and teach today is something common to see in places like schools or colleges. Therefore, thinking about developing an app that teaches Arabic language may help some categories in society to learn a second language. For example, kids under the age of five or older would learn fast by using smartphones. The problem is based on the Arabic language, which is most like to be not used anymore. The developer assumed to develop an app that would help the younger generation on their learning the Arabic language. A research was completed about user interface design to help the developer choose appropriate layouts and designs. Developing the artefact contained different stages. First, analyzing the requirements with the client, which is needed to be developed. Secondly, designing the user interface design based on the literature review. Thirdly, developing and testing the application after it is completed contacting all the tools that have been used. Lastly, evaluation and future recommendation, which contained the overall view about the application followed by the client’s feedback. Gathering the requirements after having client meetings based on the interface design. The project was done following an agile development methodology. Therefore, this methodology helped the developer to manage to finish the work on time.

Keywords: developer, application, interface design, layout, Agile, client

Procedia PDF Downloads 115
800 Intelligent and Optimized Placement for CPLD Devices

Authors: Abdelkader Hadjoudja, Hajar Bouazza

Abstract:

The PLD/CPLD devices are widely used for logic synthesis since several decades. Based on sum of product terms (PTs) architecture, the PLD/CPLD offer a high degree of flexibility to support various application requirements. They are suitable for large combinational logic, finite state machines as well as intensive I/O designs. CPLDs offer very predictable timing characteristics and are therefore ideal for critical control applications. This paper describes how the logic synthesis techniques, such as 1) XOR detection, 2) logic doubling, 3) complement of a Boolean function are combined, applied and used to optimize the CPLDs devices architecture that is based on PAL-like macrocells. Our goal is to use these techniques for minimizing the number of macrocells required to implement a circuit and minimize the delay of mapped circuit.

Keywords: CPLD, doubling, optimization, XOR

Procedia PDF Downloads 282
799 What It Means to Be an Internally Displaced Person: The Story of the Abu-Shouk Camp

Authors: Mawa Abdelbagi Mohamed Mohamed, Eslam Alaa Elbahlawan

Abstract:

This study examines the complex social fabric woven within the Abu-Shouk internally displaced persons camp, shaped by the chaotic waves of armed conflict and displacement in the early 2000s. The impact of war, economic constraints, and altered living conditions have fundamentally reshaped families and traditions, presenting both challenges and opportunities. In this exploration, we navigate the resilience of a community thrust into adversity, spotlighting how it emerged as essential in rebuilding social bonds. Exchanges of culture, intertribal marriages, and communal gathering spots have become essential tools in fostering cohesion and understanding amidst diversity. However, this resilience has been tested by the intrusion of politics, leading to shifts in governance structures and community dynamics. As we conclude, it is evident that while the scars of displacement and political disruptions are present, the community's enduring spirit and adaptability shine through. Empowering the community to rebuild their social tapestry, bridging the gaps, and restoring unity amid evolving political realities remain the beacon guiding their journey toward a shared, purposeful future.

Keywords: darfur, internally displaced person, social fabric, conflict

Procedia PDF Downloads 64
798 Vegetative Materia Medica for the Women Illness in mss2999 Kitab Tibb: A Modern Medical Interpretation of a Malay Medical Manuscript

Authors: Wan Aminah Hasbullah

Abstract:

The knowledge of medicine in Malay society stemmed out from the need to remedy disease process. Such knowledge came from observations by looking at the signs on the plants which signify it uses, the doctrine of signature, and also observing what kind of animal and its parts that can be used to treat the disease. Prayers (jampi and doa’) play a very important role in the therapeutic processes addressing the ethereal part of the body. In Malay medicine, prayers were said in the heart of the Malay bomoh (medicine man) when they are first approaching the diseased person, seeking the help of Allah in accurately directing his mind into making the right diagnosis and subsequently the right choice of treatment. In the making of medicine, similar rituals were religiously followed, starting from gathering the materia medica to the final concoction of the medicine. Thus, all the materia medica and the prayers in Malay medicine were gathered and documented in the medical manuscript known as MSS 2999 Kitab Tibb. For this study, a collection of vegetative materia medica which is specialized for the women illness from this manuscript will be gathered and analysed. A medical and cultural interpretation will be highlighted to see the relationship between efficacy in traditional Malay medicine as practiced in the past and the recent practice of the modern medicine.

Keywords: vegetative, materia medica, woman illness, Malay medical manuscript

Procedia PDF Downloads 252
797 Requirement Analysis for Emergency Management Software

Authors: Tomáš Ludík, Jiří Barta, Sabina Chytilová, Josef Navrátil

Abstract:

Emergency management is a discipline of dealing with and avoiding risks. Appropriate emergency management software allows better management of these risks and has a direct influence on reducing potential negative impacts. Although there are several emergency management software products in the Czech Republic, they cover user requirements from the emergency management field only partially. Therefore, the paper focuses on the issues of requirement analysis within development of emergency management software. Analysis of the current state describes the basic features and properties of user requirements for software development as well as basic methods and approaches for gathering these requirements. Then, the paper presents more specific mechanisms for requirement analysis based on chosen software development approach: structured, object-oriented or agile. Based on these experiences it is designed new methodology for requirement analysis. Methodology describes how to map user requirements comprehensively in the field of emergency management and thus reduce misunderstanding between software analyst and emergency manager. Proposed methodology was consulted with department of fire brigade and also has been applied in the requirements analysis for their current emergency management software. The proposed methodology has general character and can be used also in other specific areas during requirement analysis.

Keywords: emergency software, methodology, requirement analysis, stakeholders, use case diagram, user stories

Procedia PDF Downloads 540
796 Entrepreneurial Practice and Corruption in Tourism Sector: A Study of Entrepreneurial Orientation and Organizational Corruption in Nepali Star Hotels

Authors: Prabin Raj Gautam

Abstract:

Entrepreneurship in tourism sectors, particularly hotel entrepreneurship has contributed to Nepalese Gross Domestic Production (GDP). The tourist standard and star hotels in developing countries have not only been generating revenues but also providing international hospitality to the guest in the local areas. For doing so, these hotel enterprises must need to implement different business strategies to enhance and maintain their international business benchmark. The Entrepreneurial Orientation (EO) is core for making business strategies. Meanwhile, the corruption is labeled as negative factor for economic development. This paper presents the relationship between EO of Nepalese star hotels and organizational corruption. The study employed questionnaire survey as data collection tool under the quantitative methodology. Five hypotheses are developed and tested. After gathering the data form 216 questionnaire distributed to CEOs/Managers of the sample hotels, the findings show that out of five dimensions of EO, only autonomy, pro-activeness, and innovativeness are not significant to organizational corruption; however, risk-taking and competitive aggressiveness are found significant contributor. The descriptive statistics and structural equation modeling are employed to describe the data and fit the model.

Keywords: entrepreneurship, entrepreneurial orientation, organizational corruption, dimensions

Procedia PDF Downloads 318
795 Optimized Algorithm for Particle Swarm Optimization

Authors: Fuzhang Zhao

Abstract:

Particle swarm optimization (PSO) is becoming one of the most important swarm intelligent paradigms for solving global optimization problems. Although some progress has been made to improve PSO algorithms over the last two decades, additional work is still needed to balance parameters to achieve better numerical properties of accuracy, efficiency, and stability. In the optimal PSO algorithm, the optimal weightings of (√ 5 − 1)/2 and (3 − √5)/2 are used for the cognitive factor and the social factor, respectively. By the same token, the same optimal weightings have been applied for intensification searches and diversification searches, respectively. Perturbation and constriction effects are optimally balanced. Simulations of the de Jong, the Rosenbrock, and the Griewank functions show that the optimal PSO algorithm indeed achieves better numerical properties and outperforms the canonical PSO algorithm.

Keywords: diversification search, intensification search, optimal weighting, particle swarm optimization

Procedia PDF Downloads 581
794 Determinants for Transportation Services in Addis Ababa City

Authors: Yared Yitagesu Tilahun

Abstract:

Every nation, developed or developing, relies on transportation, but Addis Abeba City's transportation service is impacted by a number of variables. The current study's objectives are to determine the factors that influence transportation and gauge consumer satisfaction with such services in Addis Abeba. Customers and employees of Addis Ababa's transportation service authority would be the study's target group. 40 workers of the authority would be counted as part of the 310 000 clients that make up the population of the searcher service. Using a straightforward random selection technique, the researcher only chose 99 customers and 28 staff from this enormous group due to the considerable cost and time involved. Data gathering and analysis options included both quantitative and qualitative approaches. The results of this poll show that young people between the ages of 18 and 25 make up the majority of respondents (51.6%). The majority of employees and customers indicated that they are not satisfied with Addis Ababa's overall transportation system. The Addis Abeba Transportation Authority prioritizes client happiness by providing fair service. The company should have a system in place for managing time, resources, and people effectively. It should also provide employees the opportunity to contribute to client handling policies.

Keywords: customer satisfaction, transportation, services, determinants

Procedia PDF Downloads 77
793 Designing AI-Enabled Smart Maintenance Scheduler: Enhancing Object Reliability through Automated Management

Authors: Arun Prasad Jaganathan

Abstract:

In today's rapidly evolving technological landscape, the need for efficient and proactive maintenance management solutions has become increasingly evident across various industries. Traditional approaches often suffer from drawbacks such as reactive strategies, leading to potential downtime, increased costs, and decreased operational efficiency. In response to these challenges, this paper proposes an AI-enabled approach to object-based maintenance management aimed at enhancing reliability and efficiency. The paper contributes to the growing body of research on AI-driven maintenance management systems, highlighting the transformative impact of intelligent technologies on enhancing object reliability and operational efficiency.

Keywords: AI, machine learning, predictive maintenance, object-based maintenance, expert team scheduling

Procedia PDF Downloads 58
792 Proactive Approach to Innovation Management

Authors: Andrus Pedai, Igor Astrov

Abstract:

The focus of this paper is to compare common approaches for Systems of Innovation (SI) and identify proactive alternatives for driving the innovation. Proactive approaches will also consider short and medium term perspectives with developments in the field of Computer Technology and Artificial Intelligence. Concerning computer technology and large connected information systems, it is reasonable to predict that during current or the next century, intelligence and innovation will be separated from the constraints of human-driven management. After this happens, humans will no longer be driving the innovation and there is possibility that SI for new intelligent systems will set its own targets and exclude humans. Over long time scale, these developments could result in a scenario, which will lead to the development of larger, cross galactic (universal) proactive SI and Intelligence.

Keywords: artificial intelligence, DARPA, Moore’s law, proactive innovation, singularity, systems of innovation

Procedia PDF Downloads 478
791 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 424
790 Impact of Endogenous Risk Factors on Risk Cost in KSA PPP Projects

Authors: Saleh Alzahrani, Halim Boussabaine

Abstract:

The Public Private Partnership (PPP) contracts are produced taking into account the reason that the configuration, development, operation, and financing of an open undertaking is to be recompensed to a private gathering inside a solitary contractual structure. PPP venture dangers are ordinarily connected with the improvement and development of another resource and in addition its operation for a considerable length of time. Without a doubt, the most genuine outcomes of dangers amid the development period are value and time overwhelms. These occasions are amongst the most extensively utilized situations as a part of worth for cash investigation dangers. The wellsprings of danger change over the life cycle of a PPP venture. In customary acquirement, the general population segment ordinarily needs to cover all value trouble from these dangers. At any rate there is bounty confirmation to recommend that cost pain is a standard in a percentage of the tasks that are conveyed under customary obtainment. This paper means to research the effect of endogenous dangers on expense overwhelm in KSA PPP ventures. The paper displays a brief writing survey on PPP danger evaluating systems, and after that presents an affiliation model between danger occasions and expense invade in KSA. The paper finishes up with considerations for future examination.

Keywords: PPP, risk pricing, impact of risk, Endogenous risks

Procedia PDF Downloads 451
789 Vision-Based Hand Segmentation Techniques for Human-Computer Interaction

Authors: M. Jebali, M. Jemni

Abstract:

This work is the part of vision based hand gesture recognition system for Natural Human Computer Interface. Hand tracking and segmentation are the primary steps for any hand gesture recognition system. The aim of this paper is to develop robust and efficient hand segmentation algorithm such as an input to another system which attempt to bring the HCI performance nearby the human-human interaction, by modeling an intelligent sign language recognition system based on prediction in the context of dialogue between the system (avatar) and the interlocutor. For the purpose of hand segmentation, an overcoming occlusion approach has been proposed for superior results for detection of hand from an image.

Keywords: HCI, sign language recognition, object tracking, hand segmentation

Procedia PDF Downloads 412
788 Sustainability of High-Rise Affordable Housing: Critical Issues in Applying Green Building Rating Tools

Authors: Poh Im. Lim, Hillary Yee Qin. Tan

Abstract:

Nowadays, going green has become a trend, and being emphasized in the construction industry. In Malaysia, there are several green rating tools available in the industry and among these, GBI and GreenRE are considered as the most common tools adopted for residential buildings. However, being green is not equal to or making something sustainable. Being sustainable is to take economic, environmental and social aspects into consideration. This is particularly essential in the affordable housing sector as the end-users belong to lower-income and places importance on many socio-economic needs beyond the environmental criteria. This paper discusses the arguments in proposing a sustainability framework that is tailor-made for high-rise affordable housing. In-depth interviews and observation mapping methods were used in gathering inputs from the end-users, non-governmental organisations (NGOs) as well as the professionals. ‘Bottom-up’ approach was applied in this research to show the significance of participation from the local community in the decision-making process. The proposed sustainability framework illustrates the discrepancies between user priorities and what the industry is providing. The outcome of this research suggests that integrating sustainability into high-rise affordable housing is achievable and beneficial to the industry, society, and the environment.

Keywords: green building rating tools, high-rise affordable housing, sustainability framework, sustainable development

Procedia PDF Downloads 138
787 Factors Affecting Transportation Services in Addis Ababa City

Authors: Yared Yitagesu Tilahun

Abstract:

Every nation, developed or developing, relies on transportation, but Addis Abeba City's transportation service is impacted by a number of variables. The current study's objectives are to determine the factors that influence transportation and gauge consumer satisfaction with such services in Addis Abeba. Customers and employees of Addis Ababa's transportation service authority would be the study's target group. 40 workers of the authority would be counted as part of the 310 000 clients that make up the population of the searcher service. Using a straightforward random selection technique, the researcher only chose 99 customers and 28 staff from this enormous group due to the considerable cost and time involved. Data gathering and analysis options included both quantitative and qualitative approaches. The results of this poll show that young people between the ages of 18 and 25 make up the majority of respondents (51.6%). The majority of employees and customers indicated that they are not satisfied with Addis Ababa's overall transportation system. The Addis Abeba Transportation Authority prioritizes client happiness by providing fair service. The company should have a system in place for managing time, resources, and people effectively. It should also provide employees the opportunity to contribute to client handling policies.

Keywords: transportation, customer satisfaction, services, determinants

Procedia PDF Downloads 124
786 Factors Effecting the Success and Failure of Social Enterprise in Thailand

Authors: Jatuporn Juyjingam, Pitak Siriwong

Abstract:

This paper presents a study of factors effecting the success and failure of social enterprise in Thailand identifying communication as one of the criteria for measuring the social impact of social enterprise. The study focused on the communication driver of the SCALERS model. The research examines how communication is viewed in Thailand social enterprise. The research aims to determine how selected social enterprise uses communication in their operations. More specifically, the study aims to 1) describe the profile of social enterprise in Thailand, 2) identify the different roles of communication in the operation of social enterprise in Thailand, 3) determine Thailand social enterprise concept of communication. The study made use of the case study and cross case study research designs. For the profiling of the social enterprises, the case study was used. The researchers made use of the cross-case research design in identifying trends across the ten social enterprises and in determining the social entrepreneurs’ concept of communication. Key informant interviews were conducted with the heads or representatives of selected social enterprises, a three-part interview schedule was used to facilitate data gathering. The three parts included are 1) Profile of social enterprise in Thailand 2) How social enterprises apply communication in their operations 3) What is the key success in using communication among social enterprise in Thailand. This study is an exploratory research.

Keywords: communication, social entrepreneurship, social enterprise, sustainability development

Procedia PDF Downloads 501
785 A Review of Serious Games Characteristics: Common and Specific Aspects

Authors: B. Ben Amara, H. Mhiri Sellami

Abstract:

Serious games adoption is increasing in multiple fields, including health, education, and business. In the same way, many research studied serious games (SGs) for various purposes such as classification, positive impacts, or learning outcomes. Although most of these research examine SG characteristics (SGCs) for conducting their studies, to author’s best knowledge, there is no consensus about features neither in number not in the description. In this paper, we conduct a literature review to collect essential game attributes regardless of the application areas and the study objectives. Firstly, we aimed to define Common SGCs (CSGCs) that characterize the game aspect, by gathering features having the same meanings. Secondly, we tried to identify specific features related to the application area or to the study purpose as a serious aspect. The findings suggest that any type of SG can be defined by a number of CSGCs depicting the gaming side, such as adaptability and rules. In addition, we outlined a number of specific SGCs describing the 'serious' aspect, including specific needs of the domain and indented outcomes. In conclusion, our review showed that it is possible to bridge the research gap due to the lack of consensus by using CSGCs. Moreover, these features facilitate the design and development of successful serious games in any domain and provide a foundation for further research in this area.

Keywords: serious game characteristics, serious games common aspects, serious games features, serious games outcomes

Procedia PDF Downloads 135
784 One-Shot Text Classification with Multilingual-BERT

Authors: Hsin-Yang Wang, K. M. A. Salam, Ying-Jia Lin, Daniel Tan, Tzu-Hsuan Chou, Hung-Yu Kao

Abstract:

Detecting user intent from natural language expression has a wide variety of use cases in different natural language processing applications. Recently few-shot training has a spike of usage on commercial domains. Due to the lack of significant sample features, the downstream task performance has been limited or leads to an unstable result across different domains. As a state-of-the-art method, the pre-trained BERT model gathering the sentence-level information from a large text corpus shows improvement on several NLP benchmarks. In this research, we are proposing a method to change multi-class classification tasks into binary classification tasks, then use the confidence score to rank the results. As a language model, BERT performs well on sequence data. In our experiment, we change the objective from predicting labels into finding the relations between words in sequence data. Our proposed method achieved 71.0% accuracy in the internal intent detection dataset and 63.9% accuracy in the HuffPost dataset. Acknowledgment: This work was supported by NCKU-B109-K003, which is the collaboration between National Cheng Kung University, Taiwan, and SoftBank Corp., Tokyo.

Keywords: OSML, BERT, text classification, one shot

Procedia PDF Downloads 101
783 Computer Based Model for Collaborative Research as a Panacea for National Development in Third World Countries

Authors: M. A. Rahman, A. O. Enikuomehin

Abstract:

Sharing commitment to reach a common goal in research by harnessing available resources from two or more parties can simply be referred to as collaborative research. Asides from avoiding duplication of research, the benefits often accrued from such research alliances include time economy as well as expenses reduction in completing such studies. Likewise, it provides an avenue to produce a wider horizon of scientific knowledge sequel to gathering of skills, knowledge and resources. In institutions of higher learning and research institutes, it often gives scholars an opportunity to strengthen the teaching and research capacity of their various institutions. Between industries and institutions, collaborative research breeds promising relationship that could be geared towards addressing different research problems such as producing and enhancing industrial-based products and services, including technological transfer. For Nigeria to take advantage of this collaboration, different issues like licensing of technology, intellectual property right, confidentiality, and funding among others, which could arise during this collaborative research programme, are identified in this paper. An important tool required to achieve this height in developing economy is the use of appropriate computer model. The paper highlights the costs of the collaborations and likewise stresses the need for evaluating the effectiveness and efficiency of such collaborative research activities and proposes an appropriate computer model to assist in this regard.

Keywords: collaborative research, developing country, computerization, model

Procedia PDF Downloads 332
782 Iranian Sexual Health Needs in Viewpoint of Policy Makers: A Qualitative Study

Authors: Mahnaz Motamedi, Mohammad Shahbazi, Shahrzad Rahimi-Naghani, Mehrdad Salehi

Abstract:

Introduction: Identifying sexual health needs, developing appropriate plans, and delivering services to meet those needs is an essential component of health programs for women, men, and children all over the world, especially in poor countries. Main Subject: The aim of this study was to describe the needs of sexual health from the viewpoint of health policymakers in Iran. Methods: A qualitative study using thematic content analysis was designed and conducted. Data gathering was conducted through semi-structured, in-depth interviews with 25 key informants within the healthcare system. Key informants were selected through both purposive and snowball sampling. MAXQUDA software (version 10) was used to facilitate transcription, classification of codes, and conversion of data into meaningful units, by the process of reduction and compression. Results: The analysis of narratives and information categorized sexual health needs into five categories: culturalization of sexual health discourse, sexual health care services, sexual health educational needs, sexual health research needs, and organizational needs. Conclusion: Identifying and explaining sexual health needs is an important factor in determining the priority of sexual health programs and identification of barriers to meet these needs. This can help other policymakers and health planners to develop appropriate programs to promote sexual and reproductive health.

Keywords: sexual health, sexual health needs, policy makers, health system, qualitative study

Procedia PDF Downloads 219
781 Analysis of Noodle Production Process at Yan Hu Food Manufacturing: Basis for Production Improvement

Authors: Rhadinia Tayag-Relanes, Felina C. Young

Abstract:

This study was conducted to analyze the noodle production process at Yan Hu Food Manufacturing for the basis of production improvement. The study utilized the PDCA approach and record review in the gathering of data for the calendar year 2019 from August to October data of the noodle products miki, canton, and misua. Causal-comparative research was used in this study; it attempts to establish cause-effect relationships among the variables such as descriptive statistics and correlation, both were used to compute the data gathered. The study found that miki, canton, and misua production has different cycle time sets for each production and has different production outputs in every set of its production process and a different number of wastages. The company has not yet established its allowable rejection rate/ wastage; instead, this paper used a 1% wastage limit. The researcher recommended the following: machines used for each process of the noodle product must be consistently maintained and monitored; an assessment of all the production operators by checking their performance statistically based on the output and the machine performance; a root cause analysis for finding the solution must be conducted; and an improvement on the recording system of the input and output of the production process of noodle product should be established to eliminate the poor recording of data.

Keywords: continuous improvement, process, operations, PDCA

Procedia PDF Downloads 72
780 Prospects for an Integrated Public Transport System (IPTS) in Harare: An Institutional and Policy Analysis

Authors: Abdon O. Makore

Abstract:

The study analyses policy and institutional implications with regard to the successful implementation of IPTS in Harare. IPTS has widely been recommended as a rich solution to chaotic public transport operations, yet studies to determine the suitability or applicability of this concept have not been done in light of the existing transport institutions and policy framework in Harare. A predominantly qualitative research approach was employed backed by a deep scrutiny of the NTP and other subsidiary legislations and plans in place so as to ascertain the views and perceptions of various stakeholders regarding the proposed concept. As such, key informant interviews, unstructured interviews, and questionnaires were vital tools in gathering data and these were effectively buttressed by observations, photography, and documentary analysis. The study revealed from a policy perspective that there are high prospects for the implementation of IPTS in Harare as the existing NTP, subsidiary legislations and plans do have provisions for the concept backed by keen interest of all responsible urban public transport authorities. However, there is lack of coherent and systematic approach among other responsible institutions, as such recommendations formulated advocated for institutional integration and strong political will for the ultimate success of the concept.

Keywords: integrated public transport system, policy, legislation, institutions

Procedia PDF Downloads 388
779 Real-Time Implementation of Self-Tuning Fuzzy-PID Controller for First Order Plus Dead Time System Base on Microcontroller STM32

Authors: Maitree Thamma, Witchupong Wiboonjaroen, Thanat Suknuan, Karan Homchat

Abstract:

First order plus dead time (FOPDT) is a high dynamic system. Therefore, the controller must be intelligent. This paper presents the development and implementation of self-tuning Fuzzy-PID controller for controlling the FOPDT system. The water level process used represented FOPDT system and the mathematical model of the system was approximated by using System Identification toolbox in Matlab. The control programming and Fuzzy-PID algorithm used Matlab/Simulink and run on Microcontroller STM32.

Keywords: real-time control, self-tuning fuzzy-PID, FOPDT system, the water lever process

Procedia PDF Downloads 292
778 Valuation of Entrepreneurship Education (EE) Curriculum and Self-Employment Generation among Graduates of Tertiary Institutions in Edo State, Nigeria

Authors: Angela Obose Oriazowanlan

Abstract:

Despite the introduction of Entrepreneurship education into the Nigerian University curriculum to prepare graduates for self-employment roles in order to abate employment challenges, their unemployment rate still soars high. The study, therefore, examined the relevance of the curriculum contents and its delivery mechanism to equip graduates with appropriate entrepreneurial skills prior to graduation. Four research questions and two hypotheses guided the study. The survey research design was adopted for the study. An infinite population of graduates of a period of five years with 200 sample representatives using the simple random sampling technique was adopted. A 45-item structured questionnaire was used for data gathering. The gathered data thereof was anlysed using the descriptive statistics of mean and standard deviation, while the formulated hypotheses were tested with Z-score at 0.5 level of significance. The findings revealed, among others, that graduates acquisition of appropriate entrepreneurial skills for self-employment generation is low due to curriculum deficiencies, insufficient time allotment, and the delivery mechanism. It was recommended, among others, that the curriculum should be reviewed to improve its relevancy and that sufficient time should be allotted to enable adequate teaching and learning process.

Keywords: evaluation of entrepreneurship education (EE) curriculum, self-employment generation, graduates of tertiary institutions, Edo state, Nigeria

Procedia PDF Downloads 99
777 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 358