Search results for: pervasive computing
727 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys
Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo
Abstract:
Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations
Procedia PDF Downloads 64726 ABET Accreditation Process for Engineering and Technology Programs: Detailed Process Flow from Criteria 1 to Criteria 8
Authors: Amit Kumar, Rajdeep Chakrabarty, Ganesh Gupta
Abstract:
This paper illustrates the detailed accreditation process of Accreditation Board of Engineering and Technology (ABET) for accrediting engineering and Technology programs. ABET is a non-governmental agency that accredits engineering and technology, applied and natural sciences, and computing sciences programs. ABET was founded on 10th May 1932 and was founded by Institute of Electrical and Electronics Engineering. International industries accept ABET accredited institutes having the highest standards in their academic programs. In this accreditation, there are eight criteria in general; criterion 1 describes the student outcome evaluations, criteria 2 measures the program's educational objectives, criteria 3 is the student outcome calculated from the marks obtained by students, criteria 4 establishes continuous improvement, criteria 5 focus on curriculum of the institute, criteria 6 is about faculties of this institute, criteria 7 measures the facilities provided by the institute and finally, criteria 8 focus on institutional support towards staff of the institute. In this paper, we focused on the calculative part of each criterion with equations and suitable examples, the files and documentation required for each criterion, and the total workflow of the process. The references and the values used to illustrate the calculations are all taken from the samples provided at ABET's official website. In the final section, we also discuss the criterion-wise score weightage followed by evaluation with timeframe and deadlines.Keywords: Engineering Accreditation Committee, Computing Accreditation Committee, performance indicator, Program Educational Objective, ABET Criterion 1 to 7, IEEE, National Board of Accreditation, MOOCS, Board of Studies, stakeholders, course objective, program outcome, articulation, attainment, CO-PO mapping, CO-PO-SO mapping, PDCA cycle, degree certificates, course files, course catalogue
Procedia PDF Downloads 59725 On the Causes of Boko Haram Terrorism: Socio-Economic versus Religious Injunctions
Authors: Sogo Angel Olofinbiyi
Abstract:
There have been widespread assumptions across the globe that the root cause of Boko Haram terrorism in Nigeria is religious rather than socio-economic. An investigation into this dichotomy allowed this study to fully demonstrate that the root cause of Boko Haram’s terrorist actions emanates from the non-fulfillment of socio-economic goals that are prompted by the violation of fundamental human rights, corruption, poverty, unconstitutional and undemocratic practices in the northern part of the Nigerian state. To achieve its aim of establishing the root cause of the terrorism crisis in the latter country, the study critically appraised the socio-economic context of the insurgency by adopting one-on-one in-depth interviews involving forty (40) participants to interrogate the phenomenon. Empirical evidence from the study demonstrated that the evolution of Boko Haram terrorism was a response to socio-economic phlebotomy, political and moral putrescence, and the dehumanization of people that stem from a combination of decades of mismanagement and pervasive corruption by various Nigerian leaders. The study concludes that, as long as the endemic socio-economic problems caused by global capitalism vis-a-vis unequal hegemonic power exchange as expressed in socio-political, ethno-religious and cultural forms persist in the Nigerian society, the terrorism insurgency will recur and remain an inevitable enterprise and indeed a normal social reaction to every undesirable state of affairs. Based on the findings, the study urges the need for the amelioration of the conditions of the vast majority of the Nigerian populace by making socio-economic facilities available to them through the political state.Keywords: Boko Haram Terrorism, insurgency, socio-economic, religious injunctions
Procedia PDF Downloads 185724 Breaking Barriers: Utilizing Innovation to Improve Educational Outcomes for Students with Disabilities
Authors: Emily Purdom, Rachel Robinson
Abstract:
As the number of students worldwide requiring speech-language therapy, occupational therapy and mental health services during their school day increases, innovation is becoming progressively more important to meet the demand. Telepractice can be used to reach a greater number of students requiring specialized therapy while maintaining the highest quality of care. It can be provided in a way that is not only effective but ultimately more convenient for student, teacher and therapist without the added burden of travel. Teletherapy eradicates many hurdles to traditional on-site service delivery and helps to solve the pervasive shortage of certified professionals. Because location is no longer a barrier to specialized education plans for students with disabilities when teletherapy is conducted, there are many advantages that can be deployed. Increased frequency of engagement is possible along with students receiving specialized care from a clinician that may not be in their direct area. Educational teams, including parents, can work together more easily and engage in face-to-face, student-centered collaboration through videoconference. Practical strategies will be provided for connecting students with qualified therapists without the typical in-person dynamic. In most cases, better therapy outcomes are going to be achieved when treatment is most convenient for the student and educator. This workshop will promote discussion in the field of education to increase advocacy for remote service delivery. It will serve as a resource for those wanting to expand their knowledge of options for students with special needs afforded through innovation.Keywords: education technology, innovation, student support services, telepractice
Procedia PDF Downloads 246723 Educators’ Adherence to Learning Theories and Their Perceptions on the Advantages and Disadvantages of E-Learning
Authors: Samson T. Obafemi, Seraphin D. Eyono-Obono
Abstract:
Information and Communication Technologies (ICTs) are pervasive nowadays, including in education where they are expected to improve the performance of learners. However, the hope placed in ICTs to find viable solutions to the problem of poor academic performance in schools in the developing world has not yet yielded the expected benefits. This problem serves as a motivation to this study whose aim is to examine the perceptions of educators on the advantages and disadvantages of e-learning. This aim will be subdivided into two types of research objectives. Objectives on the identification and design of theories and models will be achieved using content analysis and literature review. However, the objective on the empirical testing of such theories and models will be achieved through the survey of educators from different schools in the Pinetown District of the South African Kwazulu-Natal province. SPSS is used to quantitatively analyse the data collected by the questionnaire of this survey using descriptive statistics and Pearson correlations after assessing the validity and the reliability of the data. The main hypothesis driving this study is that there is a relationship between the demographics of educators’ and their adherence to learning theories on one side, and their perceptions on the advantages and disadvantages of e-learning on the other side, as argued by existing research; but this research views these learning theories under three perspectives: educators’ adherence to self-regulated learning, to constructivism, and to progressivism. This hypothesis was fully confirmed by the empirical study except for the demographic factor where teachers’ level of education was found to be the only demographic factor affecting the perceptions of educators on the advantages and disadvantages of e-learning.Keywords: academic performance, e-learning, learning theories, teaching and learning
Procedia PDF Downloads 273722 Systematic Discovery of Bacterial Toxins Against Plants Pathogens Fungi
Authors: Yaara Oppenheimer-Shaanan, Nimrod Nachmias, Marina Campos Rocha, Neta Schlezinger, Noam Dotan, Asaf Levy
Abstract:
Fusarium oxysporum, a fungus that attacks a broad range of plants and can cause infections in humans, operates across different kingdoms. This pathogen encounters varied conditions, such as temperature, pH, and nutrient availability, in plant and human hosts. The Fusarium oxysporum species complex, pervasive in soils globally, can affect numerous plants, including key crops like tomatoes and bananas. Controlling Fusarium infections can involve biocontrol agents that hinder the growth of harmful strains. Our research developed a computational method to identify toxin domains within a vast number of microbial genomes, leading to the discovery of nine distinct toxins capable of killing bacteria and fungi, including Fusarium. These toxins appear to function as enzymes, causing significant damage to cellular structures, membranes and DNA. We explored biological control using bacteria that produce polymorphic toxins, finding that certain bacteria, non-pathogenic to plants, offer a safe biological alternative for Fusarium management, as they did not harm macrophage cells or C. elegans. Additionally, we elucidated the 3D structures of two toxins with their protective immunity proteins, revealing their function as unique DNases. These potent toxins are likely instrumental in microbial competition within plant ecosystems and could serve as biocontrol agents to mitigate Fusarium wilt and related diseases.Keywords: microbial toxins, antifungal, Fusarium oxysporum, bacterial-fungal intreactions
Procedia PDF Downloads 59721 Research and Implementation of Cross-domain Data Sharing System in Net-centric Environment
Authors: Xiaoqing Wang, Jianjian Zong, Li Li, Yanxing Zheng, Jinrong Tong, Mao Zhan
Abstract:
With the rapid development of network and communication technology, a great deal of data has been generated in different domains of a network. These data show a trend of increasing scale and more complex structure. Therefore, an effective and flexible cross-domain data-sharing system is needed. The Cross-domain Data Sharing System(CDSS) in a net-centric environment is composed of three sub-systems. The data distribution sub-system provides data exchange service through publish-subscribe technology that supports asynchronism and multi-to-multi communication, which adapts to the needs of the dynamic and large-scale distributed computing environment. The access control sub-system adopts Attribute-Based Access Control(ABAC) technology to uniformly model various data attributes such as subject, object, permission and environment, which effectively monitors the activities of users accessing resources and ensures that legitimate users get effective access control rights within a legal time. The cross-domain access security negotiation subsystem automatically determines the access rights between different security domains in the process of interactive disclosure of digital certificates and access control policies through trust policy management and negotiation algorithms, which provides an effective means for cross-domain trust relationship establishment and access control in a distributed environment. The CDSS’s asynchronous,multi-to-multi and loosely-coupled communication features can adapt well to data exchange and sharing in dynamic, distributed and large-scale network environments. Next, we will give CDSS new features to support the mobile computing environment.Keywords: data sharing, cross-domain, data exchange, publish-subscribe
Procedia PDF Downloads 124720 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques
Authors: Stefan K. Behfar
Abstract:
The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing
Procedia PDF Downloads 78719 Use Cloud-Based Watson Deep Learning Platform to Train Models Faster and More Accurate
Authors: Susan Diamond
Abstract:
Machine Learning workloads have traditionally been run in high-performance computing (HPC) environments, where users log in to dedicated machines and utilize the attached GPUs to run training jobs on huge datasets. Training of large neural network models is very resource intensive, and even after exploiting parallelism and accelerators such as GPUs, a single training job can still take days. Consequently, the cost of hardware is a barrier to entry. Even when upfront cost is not a concern, the lead time to set up such an HPC environment takes months from acquiring hardware to set up the hardware with the right set of firmware, software installed and configured. Furthermore, scalability is hard to achieve in a rigid traditional lab environment. Therefore, it is slow to react to the dynamic change in the artificial intelligent industry. Watson Deep Learning as a service, a cloud-based deep learning platform that mitigates the long lead time and high upfront investment in hardware. It enables robust and scalable sharing of resources among the teams in an organization. It is designed for on-demand cloud environments. Providing a similar user experience in a multi-tenant cloud environment comes with its own unique challenges regarding fault tolerance, performance, and security. Watson Deep Learning as a service tackles these challenges and present a deep learning stack for the cloud environments in a secure, scalable and fault-tolerant manner. It supports a wide range of deep-learning frameworks such as Tensorflow, PyTorch, Caffe, Torch, Theano, and MXNet etc. These frameworks reduce the effort and skillset required to design, train, and use deep learning models. Deep Learning as a service is used at IBM by AI researchers in areas including machine translation, computer vision, and healthcare.Keywords: deep learning, machine learning, cognitive computing, model training
Procedia PDF Downloads 209718 The State and Poverty Reduction Strategy in Nigeria: An Assessement
Authors: Musa Ogah Ari
Abstract:
Poverty has engaged the attention of the global community. Both the rich and poor countries are concerned about its prevalence and impacts. This phenomenon is more pervasive among developing countries with the greater challenges manifesting among African countries. In Nigeria people live with very low income, and so decent three-square meals, clothes, shelter and other basic necessities are very difficult to come by for most of the population. Qualitative health facilities are seriously lacking to over 160 million population in the state. Equally lacking are educational and social infrastructures that can be available to the people at affordable rates. Roads linking the interior parts of the state are generally in deplorable conditions, particularly in the rainy season. Safe drinking water is hard to come by as the state is not properly placed and equipped to function in full capacity to serve the interest of the people. The challenges of poverty is definitely enormous for both the national and state governments consequently, debilitating scourge of poverty. As the ruling elites in Nigeria claim to reduce the rising profile of poverty through series of policies and programmes, food production, promotion and funding of co-operatives for agriculture, improvement of infrastructures at the rural areas to guaranteeing employment through skill acquisition, assistance of rural women to break away from poverty and the provision of small scale credit facilities to poor members of the public were abysmally low. It is observed that the poverty alleviation programmes and policies failed because they were by nature, character and implementation pro-elites and anti-masses. None of the programmes or policies engaged the rural poor either in terms of formulation or implementation.Keywords: the state, poverty, government policies, strategies, social amenities, corruption
Procedia PDF Downloads 356717 Understanding Student Engagement through Sentiment Analytics of Response Times to Electronically Shared Feedback
Authors: Yaxin Bi, Peter Nicholl
Abstract:
The rapid advancement of Information and communication technologies (ICT) is extremely influencing every aspect of Higher Education. It has transformed traditional teaching, learning, assessment and feedback into a new era of Digital Education. This also introduces many challenges in capturing and understanding student engagement with their studies in Higher Education. The School of Computing at Ulster University has developed a Feedback And Notification (FAN) Online tool that has been used to send students links to personalized feedback on their submitted assessments and record students’ frequency of review of the shared feedback as well as the speed of collection. The feedback that the students initially receive is via a personal email directing them through to the feedback via a URL link that maps to the feedback created by the academic marker. This feedback is typically a Word or PDF report including comments and the final mark for the work submitted approximately three weeks before. When the student clicks on the link, the student’s personal feedback is viewable in the browser and they can view the contents. The FAN tool provides the academic marker with a report that includes when and how often a student viewed the feedback via the link. This paper presents an investigation into student engagement through analyzing the interaction timestamps and frequency of review by the student. We have proposed an approach to modeling interaction timestamps and use sentiment classification techniques to analyze the data collected over the last five years for a set of modules. The data studied is across a number of final years and second-year modules in the School of Computing. The paper presents the details of quantitative analysis methods and describes further their interactions with the feedback overtime on each module studied. We have projected the students into different groups of engagement based on sentiment analysis results and then provide a suggestion of early targeted intervention for the set of students seen to be under-performing via our proposed model.Keywords: feedback, engagement, interaction modelling, sentiment analysis
Procedia PDF Downloads 103716 The Triple Threat: Microplastic, Nanoplastic, and Macroplastic Pollution and Their Cumulative Impacts on Marine Ecosystem
Authors: Tabugbo B. Ifeyinwa, Josephat O. Ogbuagu, Okeke A. Princewill, Victor C. Eze
Abstract:
The increasing amount of plastic pollution in maritime settings poses a substantial risk to the functioning of ecosystems and the preservation of biodiversity. This comprehensive analysis combines the most recent data on the environmental effects of pollution from macroplastics, microplastics, and nanoplastics within marine ecosystems. Our goal is to provide a comprehensive understanding of the cumulative impacts that plastic waste accumulates on marine life by outlining the origins, processes, and ecological repercussions connected with each size category of plastic debris. Microplastics and nanoplastics have more sneaky effects that are controlled by chemicals. These effects can get through biological barriers and affect the health of cells and the whole body. Compared to macroplastics, which primarily contribute to physical harm through entanglement and ingestion by marine fauna, microplastics, and nanoplastics are associated with non-physical effects. The review underlines a vital need for research that crosses disciplinary boundaries to untangle the intricate interactions that the various sizes of plastic pollution have with marine animals, evaluate the long-term ecological repercussions, and identify effective measures for mitigating the effects of plastic pollution. Additionally, we urge governmental interventions and worldwide cooperation to solve this pervasive environmental concern. Specifically, we identify significant knowledge gaps in the detection and effect assessment of nanoplastics. To protect marine biodiversity and preserve ecosystem services, this review highlights how urgent it is to address the broad spectrum of plastic pollution.Keywords: macroplastic pollution, marine ecosystem, microplastic pollution, nanoplastic pollution
Procedia PDF Downloads 76715 Increasing Employee Productivity and Work Well-Being by Employing Affective Decision Support and a Knowledge-Based System
Authors: Loreta Kaklauskiene, Arturas Kaklauskas
Abstract:
This employee productivity and work well-being effective system aims to maximise the work performance of personnel and boost well-being in offices. Affective computing, decision support, and knowledge-based systems were used in our research. The basis of this effective system is our European Patent application (No: EP 4 020 134 A1) and two Lithuanian patents (LT 6841, LT 6866). Our study examines ways to support efficient employee productivity and well-being by employing mass-customised, personalised office environment. Efficient employee performance and well-being are managed by changing mass-customised office environment factors such as air pollution levels, humidity, temperature, data, information, knowledge, activities, lighting colours and intensity, scents, media, games, videos, music, and vibrations. These aspects of management generate a customised, adaptive environment for users taking into account their emotional, affective, and physiological (MAP) states measured and fed into the system. This research aims to develop an innovative method and system which would analyse, customise and manage a personalised office environment according to a specific user’s MAP states in a cohesive manner. Various values of work spaces (e.g., employee utilitarian, hedonic, perceived values) are also established throughout this process, based on the measurements that describe MAP states and other aspects related to the office environment. The main contribution of our research is the development of a real-time mass-customised office environment to boost employee performance and well-being. Acknowledgment: This work was supported by Project No. 2020-1-LT01-KA203-078100 “Minimizing the influence of coronavirus in a built environment” (MICROBE) from the European Union’s Erasmus + program.Keywords: effective decision support and a knowledge-based system, human resource management, employee productivity and work well-being, affective computing
Procedia PDF Downloads 111714 Development of Mobile Application for Internship Program Management Using the Concept of Model View Controller (MVC) Pattern
Authors: Shutchapol Chopvitayakun
Abstract:
Nowadays, especially for the last 5 years, mobile devices, mobile applications and mobile users, through the deployment of wireless communication and mobile phone cellular network, all these components are growing significantly bigger and stronger. They are being integrated into each other to create multiple purposes and pervasive deployments into every business and non-business sector such as education, medicine, traveling, finance, real estate and many more. Objective of this study was to develop a mobile application for seniors or last-year students who enroll the internship program at each tertiary school (undergraduate school) and do onsite practice at real field sties, real organizations and real workspaces. During the internship session, all students as the interns are required to exercise, drilling and training onsite with specific locations and specific tasks or may be some assignments from their supervisor. Their work spaces are both private and government corporates and enterprises. This mobile application is developed under schema of a transactional processing system that enables users to keep daily work or practice log, monitor true working locations and ability to follow daily tasks of each trainee. Moreover, it provides useful guidance from each intern’s advisor, in case of emergency. Finally, it can summarize all transactional data then calculate each internship cumulated hours from the field practice session for each individual intern.Keywords: internship, mobile application, Android OS, smart phone devices, mobile transactional processing system, guidance and monitoring, tertiary education, senior students, model view controller (MVC)
Procedia PDF Downloads 315713 Estimating Heavy Metal Leakage and Environmental Damage from Cigarette Butt Disposal in Urban Areas through CBPI Evaluation
Authors: Muhammad Faisal, Zai-Jin You, Muhammad Naeem
Abstract:
Concerns about the environment, public health, and the economy are raised by the fact that the world produces around 6 trillion cigarettes annually. Arguably the most pervasive forms of environmental litter, this dangerous trash must be eliminated. The researchers wanted to get an idea of how much pollution is seeping out of cigarette butts in metropolitan areas by studying their distribution and concentration. In order to accomplish this goal, the cigarette butt pollution indicator was applied in 29 different areas. The locations were monitored monthly for a full calendar year. The conditions for conducting the investigation of the venues were the same on both weekends and during the weekdays. By averaging the metal leakage ratio in various climates and the average weight of cigarette butts, we were able to estimate the total amount of heavy metal leakage. The findings revealed that the annual average value of the index for the areas that were investigated ranged from 1.38 to 10.4. According to these numbers, just 27.5% of the areas had a low pollution rating, while 43.5% had a major pollution status or worse. Weekends witnessed the largest fall (31% on average) in all locations' indices, while spring and summer saw the largest increase (26% on average) compared to autumn and winter. It was calculated that the average amount of heavy metals such as Cr, Cu, Cd, Zn, and Pb that seep into the environment from discarded cigarette butts in commercial, residential, and park areas, respectively, is 0.25 µg/m2, 0.078 µg/m2, and 0.18 µg/m2. Butt from cigarettes is one of the most prevalent forms of litter in the area that was examined. This litter is the origin of a wide variety of contaminants, including heavy metals. This toxic garbage poses a significant risk to the city.Keywords: heavy metal, hazardous waste, waste management, litter
Procedia PDF Downloads 82712 A Rationale to Describe Ambident Reactivity
Authors: David Ryan, Martin Breugst, Turlough Downes, Peter A. Byrne, Gerard P. McGlacken
Abstract:
An ambident nucleophile is a nucleophile that possesses two or more distinct nucleophilic sites that are linked through resonance and are effectively “in competition” for reaction with an electrophile. Examples include enolates, pyridone anions, and nitrite anions, among many others. Reactions of ambident nucleophiles and electrophiles are extremely prevalent at all levels of organic synthesis. The principle of hard and soft acids and bases (the “HSAB principle”) is most commonly cited in the explanation of selectivities in such reactions. Although this rationale is pervasive in any discussion on ambident reactivity, the HSAB principle has received considerable criticism. As a result, the principle’s supplantation has become an area of active interest in recent years. This project focuses on developing a model for rationalizing ambident reactivity. Presented here is an approach that incorporates computational calculations and experimental kinetic data to construct Gibbs energy profile diagrams. The preferred site of alkylation of nitrite anion with a range of ‘hard’ and ‘soft’ alkylating agents was established by ¹H NMR spectroscopy. Pseudo-first-order rate constants were measured directly by ¹H NMR reaction monitoring, and the corresponding second-order constants and Gibbs energies of activation were derived. These, in combination with computationally derived standard Gibbs energies of reaction, were sufficient to construct Gibbs energy wells. By representing the ambident system as a series of overlapping Gibbs energy wells, a more intuitive picture of ambident reactivity emerges. Here, previously unexplained switches in reactivity in reactions involving closely related electrophiles are elucidated.Keywords: ambident, Gibbs, nucleophile, rates
Procedia PDF Downloads 85711 Bilateral Thalamic Hypodense Lesions in Computing Tomography
Authors: Angelis P. Barlampas
Abstract:
Purpose of Learning Objective: This case depicts the need for cooperation between the emergency department and the radiologist to achieve the best diagnostic result for the patient. The clinical picture must correlate well with the radiology report and when it does not, this is not necessarily someone’s fault. Careful interpretation and good knowledge of the limitations, advantages and disadvantages of each imaging procedure are essential for the final diagnostic goal. Methods or Background: A patient was brought to the emergency department by their relatives. He was suddenly confused and his mental status was altered. He hadn't any history of mental illness and was otherwise healthy. A computing tomography scan without contrast was done, but it was unremarkable. Because of high clinical suspicion of probable neurologic disease, he was admitted to the hospital. Results or Findings: Another T was done after 48 hours. It showed a hypodense region in both thalamic areas. Taking into account that the first CT was normal, but the initial clinical picture of the patient was alerting of something wrong, the repetitive CT exam is highly suggestive of a probable diagnosis of bilateral thalamic infractions. Differential diagnosis: Primary bilateral thalamic glioma, Wernicke encephalopathy, osmotic myelinolysis, Fabry disease, Wilson disease, Leigh disease, West Nile encephalitis, Greutzfeldt Jacob disease, top of the basilar syndrome, deep venous thrombosis, mild to moderate cerebral hypotension, posterior reversible encephalopathy syndrome, Neurofibromatosis type 1. Conclusion: As is the case of limitations for any imaging procedure, the same applies to CT. The acute ischemic attack can not depict on CT. A period of 24 to 48 hours has to elapse before any abnormality can be seen. So, despite the fact that there are no obvious findings of an ischemic episode, like paresis or imiparesis, one must be careful not to attribute the patient’s clinical signs to other conditions, such as toxic effects, metabolic disorders, psychiatric symptoms, etc. Further investigation with MRI or at least a repeated CT must be done.Keywords: CNS, CT, thalamus, emergency department
Procedia PDF Downloads 123710 Porphyry Cu-Mo-(Au) Mineralization at Paraga Area, Nakhchivan District, Azerbaijan: Evidence from Mineral Paragenesis, Hyrothermal Alteration and Geochemical Studies
Authors: M. Kumral, A. Abdelnasser, M. Budakoglu, M. Karaman, D. K. Yildirim, Z. Doner, A. Bostanci
Abstract:
The Paraga area is located at the extreme eastern part of Nakhchivan district at the boundary with Armenia. The field study is situated at Ordubad region placed in 9 km from Paraga village and stays at 2300-2800 m height over sea level. It lies within a region of low-grade metamorphic porphyritic volcanic and plutonic rocks. The detailed field studies revealed that this area composed mainly of metagabbro-diorite intrusive rocks with porphyritic character emplaced into meta-andesitic rocks. This complex is later intruded by unmapped olivine gabbroic rocks. The Cu-Mo-(Au) mineralization at Paraga deposit is vein-type mineralization that is essentially related to quartz veins stockwork which cut the dioritic rocks and concentrated at the eastern and northeastern parts of the area with different directions N80W, N25W, N70E and N45E. Also, this mineralization is associated with two shearing zones directed N75W and N15E. The host porphyritic rocks were affected by intense sulfidation, carbonatization, sericitization and silicification with pervasive hematitic alterations accompanied with mineralized quartz veins and quartz-carbonate veins. Sulfide minerals which are chalcopyrite, pyrite, arsenopyrite and sphalerite occurred in two cases either inside these mineralized quartz veins or disseminated in the highly altered rocks as well as molybdenite and also at the peripheries between the altered host rock and veins. Gold found as inclusion disseminated in arsenopyrite and pyrite as well as in their cracks.Keywords: porphyry Cu-Mo-(Au), Paraga area, Nakhchivan, Azerbaijan, paragenesis, hyrothermal alteration
Procedia PDF Downloads 408709 Lying Decreases Relying: Deceiver's Distrust in Online Restaurant Reviews
Authors: Jenna Barriault, Reeshma Haji
Abstract:
Online consumer behaviourand reliance on online reviews may be more pervasive than ever, andthis necessitates a better scientific understanding of the widespread phenomenon of online deception. The present research focuses on the understudied topic of deceiver’s distrust, where those who engage in deception later have less trust in others in the context of online restaurant reviews. The purpose was to examine deception and valence in online restaurant reviews and the effects they had on deceiver’s distrust. Undergraduate university students (N = 76) completed an online study where valence was uniquely manipulated by telling participants that either positive (or negative reviews) were influential and asking them to write a correspondingly valenced review. Deception was manipulated in the same task. Participants in the deception condition were asked to write an online restaurant review that was counter to their actual experience of the restaurant (negative review of a restaurant they liked, positive review of the restaurant they did not like). In the no deception condition, participants were asked to write a review that they actually liked or didn’t like (based on the valence condition to which they were randomly assigned). Participants’ trust was then assessed through various measures, includingfuture reliance on online reviews. There was a main effect of deception on reliance on online reviews. Consistent with deceiver’s distrust, those who deceived reported that they would rely less on online reviews. This study demonstrates that even when participants are induced to write a deceptive review, it can result in deceiver’s distrust, thereby lowering their trust in online reviews. If trust or reliance can be altered through deception in online reviews, people may start questioning the objectivity or true representation of a company based on such reviews. A primary implication is that people may reduce theirreliance upon online reviews if they know they are easily subject to manipulation. The findings of this study also contribute to the limited research regarding deceiver’s distrust in an online context, and further research is clarifying the specific conditions in which it is most likely to occur.Keywords: deceiver’s distrust, deception, online reviews, trust, valence
Procedia PDF Downloads 124708 Housing Prices and Travel Costs: Insights from Origin-Destination Demand Estimation in Taiwan’s Science Parks
Authors: Kai-Wei Ji, Dung-Ying Lin
Abstract:
This study investigates the impact of transportation on housing prices in regions surrounding Taiwan's science parks. As these parks evolve into crucial economic and population growth centers, they attract an increasing number of residents and workers, significantly influencing local housing markets. This demographic shift raises important questions about the role of transportation in shaping real estate values. Our research examines four major science parks in Taiwan, providing a comparative analysis of how transportation conditions and population dynamics interact to affect housing price premiums. We employ an origin-destination (OD) matrix derived from pervasive traffic data to model travel patterns and their effects on real estate values. The methodology utilizes a bi-level framework: a genetic algorithm optimizes OD demand estimation at the upper level, while a user equilibrium (UE) model simulates traffic flow at the lower level. This approach enables a nuanced exploration of how population growth impacts transportation conditions and housing price premiums. By analyzing the interplay between travel costs based on OD demand estimation and housing prices, we offer valuable insights for urban planners and policymakers. These findings are crucial for informed decision-making in rapidly developing areas, where understanding the relationship between mobility and real estate values is essential for sustainable urban development.Keywords: demand estimation, genetic algorithm, housing price, transportation
Procedia PDF Downloads 22707 The Fefe Indices: The Direction of Donal Trump’s Tweets Effect on the Stock Market
Authors: Sergio Andres Rojas, Julian Benavides Franco, Juan Tomas Sayago
Abstract:
An increasing amount of research demonstrates how market mood affects financial markets, but their primary goal is to demonstrate how Trump's tweets impacted US interest rate volatility. Following that lead, this work evaluates the effect that Trump's tweets had during his presidency on local and international stock markets, considering not just volatility but the direction of the movement. Three indexes for Trump's tweets were created relating his activity with movements in the S&P500 using natural language analysis and machine learning algorithms. The indexes consider Trump's tweet activity and the positive or negative market sentiment they might inspire. The first explores the relationship between tweets generating negative movements in the S&P500; the second explores positive movements, while the third explores the difference between up and down movements. A pseudo-investment strategy using the indexes produced statistically significant above-average abnormal returns. The findings also showed that the pseudo strategy generated a higher return in the local market if applied to intraday data. However, only a negative market sentiment caused this effect on daily data. These results suggest that the market reacted primarily to a negative idea reflected in the negative index. In the international market, it is not possible to identify a pervasive effect. A rolling window regression model was also performed. The result shows that the impact on the local and international markets is heterogeneous, time-changing, and differentiated for the market sentiment. However, the negative sentiment was more prone to have a significant correlation most of the time.Keywords: market sentiment, Twitter market sentiment, machine learning, natural dialect analysis
Procedia PDF Downloads 64706 Off-Line Text-Independent Arabic Writer Identification Using Optimum Codebooks
Authors: Ahmed Abdullah Ahmed
Abstract:
The task of recognizing the writer of a handwritten text has been an attractive research problem in the document analysis and recognition community with applications in handwriting forensics, paleography, document examination and handwriting recognition. This research presents an automatic method for writer recognition from digitized images of unconstrained writings. Although a great effort has been made by previous studies to come out with various methods, their performances, especially in terms of accuracy, are fallen short, and room for improvements is still wide open. The proposed technique employs optimal codebook based writer characterization where each writing sample is represented by a set of features computed from two codebooks, beginning and ending. Unlike most of the classical codebook based approaches which segment the writing into graphemes, this study is based on fragmenting a particular area of writing which are beginning and ending strokes. The proposed method starting with contour detection to extract significant information from the handwriting and the curve fragmentation is then employed to categorize the handwriting into Beginning and Ending zones into small fragments. The similar fragments of beginning strokes are grouped together to create Beginning cluster, and similarly, the ending strokes are grouped to create the ending cluster. These two clusters lead to the development of two codebooks (beginning and ending) by choosing the center of every similar fragments group. Writings under study are then represented by computing the probability of occurrence of codebook patterns. The probability distribution is used to characterize each writer. Two writings are then compared by computing distances between their respective probability distribution. The evaluations carried out on ICFHR standard dataset of 206 writers using Beginning and Ending codebooks separately. Finally, the Ending codebook achieved the highest identification rate of 98.23%, which is the best result so far on ICFHR dataset.Keywords: off-line text-independent writer identification, feature extraction, codebook, fragments
Procedia PDF Downloads 513705 Comparative Study to Evaluate the Efficacy of Control Criterion in Determining Consolidation Scope in the Public Sector
Authors: Batool Zarei
Abstract:
This study aims to answer this question whether control criterion with two elements of power and benefit which is introduced as 'control criterion of consolidation scope' in national and international standards of accounting in public sector (and also private sector) is efficient enough or not. The methodology of this study is comparative and the results of this research are significantly generalizable, due to the given importance to the sample of countries which were studied. Findings of this study states that in spite of pervasive use of control criterion (including 2 elements of power and benefit), criteria for determining the existence of control in public sector accounting standards, are not efficient enough to determine the consolidation scope of whole of government financial statements in a way that meet decision making and accountability needs of managers, policy makers and supervisors; specially parliament. Therefore, the researcher believes that for determining consolidation scope in public sector, in addition to economic view, it is better to pay attention to budgetary, legal and statistical concepts and also to practical and financial risk and define indicators for proving the existence of control (power and benefit) which include accountability relationships (budgetary relation, legal form and nature of activity). these findings also reveals the necessity of passing a comprehensive public financial management (PFM) legislation in order to redefine the characteristics of public sector entities and whole of government financial statements scope and review Statistics organizations and central banks duties for preparing government financial statistics and national accounts in order to achieve sustainable development and resilient economy goals.Keywords: control, consolidation scope, public sector accounting, government financial statistics, resilient economy
Procedia PDF Downloads 259704 On Adaptive and Auto-Configurable Apps
Authors: Prisa Damrongsiri, Kittinan Pongpianskul, Mario Kubek, Herwig Unger
Abstract:
Apps are today the most important possibility to adapt mobile phones and computers to fulfill the special needs of their users. Location- and context-sensitive programs are hereby the key to support the interaction of the user with his/her environment and also to avoid an overload with a plenty of dispensable information. The contribution shows, how a trusted, secure and really bi-directional communication and interaction among users and their environment can be established and used, e.g. in the field of home automation.Keywords: apps, context-sensitive, location-sensitive, self-configuration, mobile computing, smart home
Procedia PDF Downloads 397703 The Role of Mass Sport Guidance in the Health Service Industry of China
Authors: Qiu Jian-Rong, Li Qing-Hui, Zhan Dong, Zhang Lei
Abstract:
Facing the problem of the demand of economic restructuring and risk of social economy stagnation due to the ageing of population, the Health Service Industry will play a very important role in the structure of industry in the future. During the process, the orient of Chinese sports medicine as well as the joint with preventive medicine, and the integration with data bank and cloud computing will be involved.Keywords: China, the health service industry, mass sport, data bank
Procedia PDF Downloads 628702 Effect of a Polyherbal Gut Therapy Protocol in Changes of Gut and Behavioral Symptoms of Antibiotic Induced Dysbiosis of Autistic Babies
Authors: Dinesh K. S., D. R. C. V. Jayadevan
Abstract:
Autism is the most prevalent of a subset of the disorders organized under the umbrella of pervasive developmental disorders. After the publication of Andrew Wakefield's paper in lancet, many critiques deny this connection even without looking in to the matter. The British Medical Journal even put an editorial regarding this issue. BMJ 2010; 340:c1807. But ayurveda has ample of evidences to believe this connectivity. Dysbiosis, yeast growth of the gut, nutritional deficiencies, enzyme deficiencies, essential fatty acid deficiencies, Gastro esophageal reflux disease, indigestion, inflammatory bowel, chronic constipation & its cascade are few of them to note. The purpose of this paper is to present the observed changes in the behavioural symptoms of autistic babies after a gut management protocol which is a usual programme of our autism treatment plan especially after dysbiotic changes after antibiotic administration. Is there any correlation between changes (if significant) in gut symptoms and behavioral problems of autistic babies especially after a dysbiosis induced by antibiotics. Retrospective analysis of the case sheets of autistic patients admitted in Vaidyaratnam P.S.Varier Ayurveda College hospital, kottakkal,kerala, india from September 2010 are taken for the data processing. Autistic patients are used to come to this hospital as a part of their usual course of treatment. We investigated 40 cases diagnosed as autistic by clinical psychologists from different institutions who had dysbiosis induced by antibiotics. Significant change in gut symptoms before and after treatment p<0.05 in most of its components Significant change in behavioral symptoms before and after treatments p<0.05 in most of the components Correlation between gut symptoms change and behavioral symptoms changes after treatment is + 0.86. Conclusion : Selected Polyherbal Ayurveda treatment has significant role to play to make changes abnormal behaviors in autistic babies and has a positive correlation with changes in gut symptoms induced by dysbiosis of antibiotic intake.Keywords: ayurveda, autism, dysbiosis, antibiotic
Procedia PDF Downloads 628701 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud
Authors: N. Nalini, Bhanu Prakash Gopularam
Abstract:
The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping
Procedia PDF Downloads 385700 Disabling Barriers to Community Participation in Everyday Environments from the Perspective of People with Disabilities
Authors: Leah Samples
Abstract:
Barriers to participation persist for people with disabilities despite a long history of legislation designed to support equal opportunity for people with disabilities. Historically, the focus has been solely placed on structural barriers, but newer research highlights the importance of looking at social and informational barriers to participation. Collectively, these barriers prevent people with disabilities from fully engaging in community life and consequently from achieving full citizenship. Disability is crucial to understanding the meaning of citizenship. Drawing upon the influences of feminist, critical race and human rights theorists, citizenship can be defined as a set of rights and responsibilities that an individual has because they are a part of a community. However, when those rights are taken away or denied one’s citizenship is in question. Employing this definition of citizenship allows one to examine how barriers to citizenship present themselves in societies that are built on an ideal of a non-disabled person. To understand at a deeper level how this notion of citizenship manifests itself, this study seeks to unearth commonly experienced barriers to participation in the lives of visually-impaired adults in everyday environments. The purpose of this qualitative study is to explore commonly-experienced barriers to participation in the lives of visually impaired adults in leisure settings (e.g. restaurants, stores, etc.). Thirty adults with visual impairments participated in semi-structured interviews, as well as participant observations. The results suggest that barriers to participation are still pervasive in everyday environments and subsequently have an adverse effect on participation and belonging for people with visual impairments. This study highlights the importance of exploring and acknowledging the daily tensions that persons with disabilities face in their communities. A full exploration of these tensions is necessary in order to develop solutions and tools to create more just communities for everyone.Keywords: barriers, citizenship, belonging, everyday environments
Procedia PDF Downloads 417699 The Correlation Between Self-Talk and COVID-19
Authors: Abigail Vallance
Abstract:
Current research shows a correlation between declining mental health in the United States and the effect of COVID-19 on young adults and adolescents. Anxiety and depression are the two most common psychiatric illnesses, which are also the leading impediments to academic success. Spending six hours a day or more using computers is associated with higher risks of depression, with this time constraint pervasive even in present-day academia. Along with many hours on the computer, common issues COVID-19 had on students’ academic performance during online school included technical difficulties, poor support services, and difficulty adapting to online learning. Given the volume of requirements with unrealistic deadlines, and despite experiencing COVID-19, students showed an increase in their levels of anxiety. Besides the prevalent effect of COVID-19 on mental health, many studies show a correlation between mental health, COVID-19, academia, and sports performance. Academic research showed that negative self-talk, in relation to one’s self-efficacy, correlated with negative academic performance. Research showed that students who reported negative self-efficacy when test-taking led to negative test results. Furthermore, in sports performance, negative effects were found when athletes engage in negative self-talk. Overall, motivational self-talk, by oneself and through teammates and coaches, correlated with better performance than regular self-talk in sports. In relation to sports performance, the COVID-19 pandemic canceled complete sports seasons for millions of adolescents across the country. Many student-athletes use their sport to release emotions and escape from their mental health, but this was taken away. The purpose of this study is to address the current increase in mental health diagnoses in adolescents, including suicide rates after the COVID-19 pandemic began in 2020.This literature analysis is actively being studied.Keywords: self-talk, COVID-19, mental health, adolescents
Procedia PDF Downloads 56698 Developing a Framework for Open Source Software Adoption in a Higher Education Institution in Uganda. A case of Kyambogo University
Authors: Kafeero Frank
Abstract:
This study aimed at developing a frame work for open source software adoption in an institution of higher learning in Uganda, with the case of KIU as a study area. There were mainly four research questions based on; individual staff interaction with open source software forum, perceived FOSS characteristics, organizational characteristics and external characteristics as factors that affect open source software adoption. The researcher used causal-correlation research design to study effects of these variables on open source software adoption. A quantitative approach was used in this study with self-administered questionnaire on a purposively and randomly sampled sample of university ICT staff. Resultant data was analyzed using means, correlation coefficients and multivariate multiple regression analysis as statistical tools. The study reveals that individual staff interaction with open source software forum and perceived FOSS characteristics were the primary factors that significantly affect FOSS adoption while organizational and external factors were secondary with no significant effect but significant correlation to open source software adoption. It was concluded that for effective open source software adoption to occur there must be more effort on primary factors with subsequent reinforcement of secondary factors to fulfill the primary factors and adoption of open source software. Lastly recommendations were made in line with conclusions for coming up with Kyambogo University frame work for open source software adoption in institutions of higher learning. Areas of further research recommended include; Stakeholders’ analysis of open source software adoption in Uganda; Challenges and way forward. Evaluation of Kyambogo University frame work for open source software adoption in institutions of higher learning. Framework development for cloud computing adoption in Ugandan universities. Framework for FOSS development in Uganda IT industryKeywords: open source software., organisational characteristics, external characteristics, cloud computing adoption
Procedia PDF Downloads 72