Search results for: data%20fusion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25107

Search results for: data%20fusion

20607 Periodicity Analysis of Long-Term Waterquality Data Series of the Hungarian Section of the River Tisza Using Morlet Wavelet Spectrum Estimation

Authors: Péter Tanos, József Kovács, Angéla Anda, Gábor Várbíró, Sándor Molnár, István Gábor Hatvani

Abstract:

The River Tisza is the second largest river in Central Europe. In this study, Morlet wavelet spectrum (periodicity) analysis was used with chemical, biological and physical water quality data for the Hungarian section of the River Tisza. In the research 15, water quality parameters measured at 14 sampling sites in the River Tisza and 4 sampling sites in the main artificial changes were assessed for the time period 1993 - 2005. Results show that annual periodicity was not always to be found in the water quality parameters, at least at certain sampling sites. Periodicity was found to vary over space and time, but in general, an increase was observed in the company of higher trophic states of the river heading downstream.

Keywords: annual periodicity water quality, spatiotemporal variability of periodic behavior, Morlet wavelet spectrum analysis, River Tisza

Procedia PDF Downloads 342
20606 21st Century Teacher Image to Stakeholders of Teacher Education Institutions in the Philippines

Authors: Marilyn U. Balagtas, Maria Ruth M. Regalado, Carmelina E. Barrera, Ramer V. Oxiño, Rosarito T. Suatengco, Josephine E. Tondo

Abstract:

This study presents the perceptions of the students and teachers from kindergarten to tertiary level of the image of the 21st century teacher to provide basis in designing teacher development programs in Teacher Education Institutions (TEIs) in the Philippines. The highlights of the report are the personal, psychosocial, and professional images of the 21st century teacher in basic education and the teacher educators based on a survey done to 612 internal stakeholders of nine member institutions of the National Network of Normal Schools (3NS). Data were obtained through the use of a validated researcher-made instrument which allowed generation of both quantitative and qualitative descriptions of the teacher image. Through the use of descriptive statistics, the common images of the teacher were drawn, which were validated and enriched by the information drawn from the qualitative data. The study recommends a repertoire of teacher development programs to create the good image of the 21st century teachers for a better Philippines.

Keywords: teacher image, 21st century teacher, teacher education, development program

Procedia PDF Downloads 364
20605 Acylated Ghrelin in Response to Aerobic Training Induced Weight Loss in Obese Men

Authors: Masoumeh Hosseini

Abstract:

Obesity is known to be associated with cardiovascular diseases and metabolic syndrome. This study aimed to assess the effect of a long term aerobic training program on serum ghrelin in obese men. For this purpose, twenty four sedentary adult obese men aged 30-40 years and body mass index 30-36 kg/m2 were participated in this study and divided randomly into exercise (3 months aerobic training, 3 times/weekly) or control (no training) groups. Serum ghrelin and cardiovascular risk factor (TG, TC, LDL, and HDL) were measured before and after treatment. Anthropometrical markers were measured at two occasions. Data were analyzed by independent-paired T-test. Significance was accepted at P < 0.05. Aerobic training resulted in significant decrease in serum ghrelin and TG in exercise group. All anthropometrical markers decreased significantly in exercise group but not in control subjects. Based on these data, it is concluded that weight loss by aerobic training can be affect serum ghrelin in obese subject, although some cardiovascular risk factor remained without changed.

Keywords: aerobic training, homeostasis, lipid profile, obesity

Procedia PDF Downloads 462
20604 Bilingualism: A Case Study of Assamese and Bodo Classifiers

Authors: Samhita Bharadwaj

Abstract:

This is an empirical study of classifiers in Assamese and Bodo, two genetically unrelated languages of India. The objective of the paper is to address the language contact between Assamese and Bodo as reflected in classifiers. The data has been collected through fieldwork in Bodo recording narratives and folk tales and eliciting specific data from the speakers. The data for Assamese is self-produced as native speaker of the language. Assamese is the easternmost New-Indo-Aryan (henceforth NIA) language mainly spoken in the Brahmaputra valley of Assam and some other north-eastern states of India. It is the lingua franca of Assam and is creolised in the neighbouring state of Nagaland. Bodo, on the other hand, is a Tibeto-Burman (henceforth TB) language of the Bodo-Garo group. It has the highest number of speakers among the TB languages of Assam. However, compared to Assamese, it is still a lesser documented language and due to the prestige of Assamese, all the Bodo speakers are fluent bi-lingual in Assamese, though the opposite isn’t the case. With this context, classifiers, a characteristic phenomenon of TB languages, but not so much of NIA languages, presents an interesting case study on language contact caused by bilingualism. Assamese, as a result of its language contact with the TB languages which are rich in classifiers; has developed the richest classifier system among the IA languages in India. Yet, as a part of rampant borrowing of Assamese words and patterns into Bodo; Bodo is seen to borrow even Assamese classifiers into its system. This paper analyses the borrowed classifiers of Bodo and finds the route of this borrowing phenomenon in the number system of the languages. As the Bodo speakers start replacing the higher numbers from five with Assamese ones, they also choose the Assamese classifiers to attach to these numbers. Thus, the partial loss of number in Bodo as a result of language contact and bilingualism in Assamese is found to be the reason behind the borrowing of classifiers in Bodo. The significance of the study lies in exploring an interesting aspect of language contact in Assam. It is hoped that this will attract further research on bilingualism and classifiers in Assam.

Keywords: Assamese, bi-lingual, Bodo, borrowing, classifier, language contact

Procedia PDF Downloads 220
20603 Functional Instruction Set Simulator of a Neural Network IP with Native Brain Float-16 Generator

Authors: Debajyoti Mukherjee, Arathy B. S., Arpita Sahu, Saranga P. Pogula

Abstract:

A functional model to mimic the functional correctness of a neural network compute accelerator IP is very crucial for design validation. Neural network workloads are based on a Brain Floating Point (BF-16) data type. The major challenge we were facing was the incompatibility of GCC compilers to the BF-16 datatype, which we addressed with a native BF-16 generator integrated into our functional model. Moreover, working with big GEMM (General Matrix Multiplication) or SpMM (Sparse Matrix Multiplication) Work Loads (Dense or Sparse) and debugging the failures related to data integrity is highly painstaking. In this paper, we are addressing the quality challenge of such a complex neural network accelerator design by proposing a functional model-based scoreboard or software model using SystemC. The proposed functional model executes the assembly code based on the ISA of the processor IP, decodes all instructions, and executes as expected to be done by the DUT. The said model would give a lot of visibility and debug capability in the DUT, bringing up micro-steps of execution.

Keywords: ISA, neural network, Brain Float-16, DUT

Procedia PDF Downloads 91
20602 Seismic Performance Evaluation of Existing Building Using Structural Information Modeling

Authors: Byungmin Cho, Dongchul Lee, Taejin Kim, Minhee Lee

Abstract:

The procedure for the seismic retrofit of existing buildings includes the seismic evaluation. In the evaluation step, it is assessed whether the buildings have satisfactory performance against seismic load. Based on the results of that, the buildings are upgraded. To evaluate seismic performance of the buildings, it usually goes through the model transformation from elastic analysis to inelastic analysis. However, when the data is not delivered through the interwork, engineers should manually input the data. In this process, since it leads to inaccuracy and loss of information, the results of the analysis become less accurate. Therefore, in this study, the process for the seismic evaluation of existing buildings using structural information modeling is suggested. This structural information modeling makes the work economic and accurate. To this end, it is determined which part of the process could be computerized through the investigation of the process for the seismic evaluation based on ASCE 41. The structural information modeling process is developed to apply to the seismic evaluation using Perform 3D program usually used for the nonlinear response history analysis. To validate this process, the seismic performance of an existing building is investigated.

Keywords: existing building, nonlinear analysis, seismic performance, structural information modeling

Procedia PDF Downloads 382
20601 Developing Serious Games to Improve Learning Experience of Programming: A Case Study

Authors: Shan Jiang, Xinyu Tang

Abstract:

Game-based learning is an emerging pedagogy to make the learning experience more effective, enjoyable, and fun. However, most games used in classroom settings have been overly simplistic. This paper presents a case study on a Python-based online game designed to improve the effectiveness in both teaching and research in higher education. The proposed game system not only creates a fun and enjoyable experience for students to learn various topics in programming but also improves the effectiveness of teaching in several aspects, including material presentation, helping students to recognize the importance of the subjects, and linking theoretical concepts to practice. The proposed game system also serves as an information cyber-infrastructure that automatically collects and stores data from players. The data could be useful in research areas including human-computer interaction, decision making, opinion mining, and artificial intelligence. They further provide other possibilities beyond these areas due to the customizable nature of the game.

Keywords: game-based learning, programming, research-teaching integration, Hearthstone

Procedia PDF Downloads 163
20600 The Decision Making of Students to Study at Rajabhat University in Thailand

Authors: Pisit Potjanajaruwit

Abstract:

TThe research objective was to study the integrated marketing communication strategy that is affecting the student’s decision making to study at Rajabhat University in Thailand. This research is a quantitative research. The sampling for this study is the first year students of Rajabhat University for 400 sampling. The data collection is made by a questionnaire. The data analysis by the descriptive statistic include frequency, percentage, mean and standardization and influence statistic as the multiple regression. The results show that integrated marketing communication including the advertising, public relation, sale promotion is important and significant with the student’s making decision in terms of brand awareness and brand recognized. The university scholar and word of mouth have an impact on decision-making of the student. The direct marketing such as Facebook also relate to the student decision. In addition, we found that the marketing communication budget, university brand positioning and university mission have the direct effect on the marketing communication.

Keywords: decision making of higher education, integrated marketing communication, rajabhat university, social media

Procedia PDF Downloads 340
20599 Fracture Pressure Predict Based on Well Logs of Depleted Reservoir in Southern Iraqi Oilfield

Authors: Raed H. Allawi

Abstract:

Formation pressure is the most critical parameter in hydrocarbon exploration and exploitation. Specifically, predicting abnormal pressures (high formation pressures) and subnormal pressure zones can provide valuable information to minimize uncertainty for anticipated drilling challenges and risks. This study aims to interpret and delineate the pore and fracture pressure of the Mishrif reservoir in the southern Iraq Oilfield. The data required to implement this study included acoustic compression wave, gamma-ray, bulk density, and drilling events. Furthermore, supporting these models needs the pore pressure measurement from the Modular Formation Dynamics Tester (MDT). Many measured values of pore pressure were used to validate the accurate model. Using sonic velocity approaches, the mean absolute percentage error (MAPE) was about 4%. The fracture pressure results were consistent with the measurement data, actual drilling report, and events. The model's results will be a guide for successful drilling in future wells in the same oilfield.

Keywords: pore pressure, fracture pressure, overburden pressure, effective stress, drilling events

Procedia PDF Downloads 81
20598 Development and Evaluation of Virtual Basketball Game Using Motion Capture Technology

Authors: Shunsuke Aoki, Taku Ri, Tatsuya Yamazaki

Abstract:

These days, along with the development of e-sports, video games as a competitive sport is attracting attention. But, in many cases, action in the screen does not match the real motion of operation. Inclusiveness of player motion is needed to increase reality and excitement for sports games. Therefore, in this study, the authors propose a method to recognize player motion by using the motion capture technology and develop a virtual basketball game. The virtual basketball game consists of a screen with nine targets, players, depth sensors, and no ball. The players pretend a two-handed basketball shot without a ball aiming at one of the nine targets on the screen. Time-series data of three-dimensional coordinates of player joints are captured by the depth sensor. 20 joints data are measured for each player to estimate the shooting motion in real-time. The trajectory of the thrown virtual ball is calculated based on the time-series data and hitting on the target is judged as success or failure. The virtual basketball game can be played by 2 to 4 players as a competitive game among the players. The developed game was exhibited to the public for evaluation on the authors' university open campus days. 339 visitors participated in the exhibition and enjoyed the virtual basketball game over the two days. A questionnaire survey on the developed game was conducted for the visitors who experienced the game. As a result of the survey, about 97.3% of the players found the game interesting regardless of whether they had experienced actual basketball before or not. In addition, it is found that women are easy to comfort for shooting motion. The virtual game with motion capture technology has the potential to become a universal entertainment between e-sports and actual sports.

Keywords: basketball, motion capture, questionnaire survey, video ga

Procedia PDF Downloads 126
20597 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.

Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations

Procedia PDF Downloads 59
20596 The Effect of Multimedia Use on Students’ Academic Achievement and Course-Oriented Self-Efficacy

Authors: Hasan Coruk, Recep Cakir

Abstract:

This study aimed at investigating the effect of multimedia containing ‘the structure and properties of matter’ unit on students’ academic achievement level and self-efficacy relating to science and technology course. The study used an experimental design with pre-test and post-test groups. The data collection tools were ‘Science and Technology Course Achievement Test’ and ‘Science and Technology Self-Efficacy Scale’. The sample of the study consisted of 8th grade students at a primary school in Tokat Province. The study was carried out with 42 students from two classes, 21 (8 males, 13 females) from experimental group and 21 (13 males and 8 females) from control group. The data were analyzed in SPSS.18 software. The findings of the study indicated that the use of multimedia increased the students’ academic achievement in science and technology course in comparison with traditional teaching methods. It was also determined that there was not a significant difference in students’ course-oriented self-efficacy levels regarding the two methods. Necessary and feasible suggestions were put forward for whom it concerns.

Keywords: multimedia learning, science and technology, the structure-properties of matter, self-efficacy, academic achievement

Procedia PDF Downloads 451
20595 Fluvial Stage-Discharge Rating of a Selected Reach of Jamuna River

Authors: Makduma Zahan Badhan, M. Abdul Matin

Abstract:

A study has been undertaken to develop a fluvial stage-discharge rating curve for Jamuna River. Past Cross-sectional survey of Jamuna River reach within Sirajgonj and Tangail has been analyzed. The analysis includes the estimation of discharge carrying capacity, possible maximum scour depth and sediment transport capacity of the selected reaches. To predict the discharge and sediment carrying capacity, stream flow data which include cross-sectional area, top width, water surface slope and median diameter of the bed material of selected stations have been collected and some are calculated from reduced level data. A well-known resistance equation has been adopted and modified to a simple form in order to be used in the present analysis. The modified resistance equation has been used to calculate the mean velocity through the channel sections. In addition, a sediment transport equation has been applied for the prediction of transport capacity of the various sections. Results show that the existing drainage sections of Jamuna channel reach under study have adequate carrying capacity under existing bank-full conditions, but these reaches are subject to bed erosion even in low flow situations. Regarding sediment transport rate, it can be estimated that the channel flow has a relatively high range of bed material concentration. Finally, stage­ discharge curves for various sections have been developed. Based on stage-discharge rating data of various sections, water surface profile and sediment-rating curve of Jamuna River have been developed and also the flooding conditions have been analyzed from predicted water surface profile.

Keywords: discharge rating, flow profile, fluvial, sediment rating

Procedia PDF Downloads 183
20594 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit

Authors: Yllka Hysaj, Ylberina Hysaj Arifi

Abstract:

Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.

Keywords: migration, self-initiated expatriates, Brexit, job security

Procedia PDF Downloads 169
20593 The Role of Healthcare Informatics in Combating the COVID-19 Pandemic

Authors: Philip Eappen, Narasimha Rao Vajjhala

Abstract:

This chapter examines how healthcare organizations harnessed innovative healthcare informatics to navigate the challenges posed by the COVID-19 pan-demic, addressing critical needs and improving care delivery. The pandemic's un-precedented demands necessitated the adoption of new and advanced tools to manage healthcare operations more effectively. Informatics solutions played a crucial role in facilitating the smooth functioning of healthcare systems during this crisis and are anticipated to remain central to future healthcare management. Technologies such as telemedicine helped healthcare professionals minimize ex-posure to COVID-19 patients, thereby reducing infection risks within healthcare facilities. This chapter explores a range of informatics applications utilized worldwide, including telemedicine, AI-driven solutions, big data analytics, drones, robots, and digital platforms for drug delivery, all of which enabled re-mote patient care and enhanced healthcare accessibility and safety during the pan-demic.

Keywords: healthcare informatics, COVID-19 Pandemic, telemedicine, AI-driven healthcare, big data analytics, remote patient care, digital health platforms

Procedia PDF Downloads 4
20592 Surveying the Effect of Cybernetics on Knowledge Management from Users' Viewpoint Who Are Members of Electronic Discussion Groups (ALA, ALIA)

Authors: Mitra Ghiasi, Roghayeh Ghorbani Bousari

Abstract:

Nowadays, the aim of the organizations is to gain sustainable competitive. So, developing their intellectual capital, encouraging innovation, increasing suitable performance can be done by knowledge management. Knowledge turns into science if knowledge is used to improve decision making, decision quality and make effective decisions. The current research intends to investigate the relationship between cybernetics and knowledge management from the perspective of users who are members of electronic discussion groups (ALA, ALIA). The research methodology is survey method, and it is a type of correlation research. Cybernetics and knowledge management questionnaires used for collecting data. The questionnaire that was designed in electronic format, distributed among two electronic discussion groups during 30 days and completed by 100 members of each electronic discussion groups. The finding of this research showed that although cybernetics has an impact on knowledge management, there is no significant difference between the ALA and ALIA user's view regard to effect of cybernetics on knowledge management. The results also indicated that this conceptual model is consistent with the data collected from the sample.

Keywords: ALA discussion group, ALIA discussion group, cybernetics, knowledge management

Procedia PDF Downloads 237
20591 Antecedents and Consequences of Organizational Intelligence in an R and D Organization

Authors: Akriti Srivastava, Soumi Awasthy

Abstract:

One of the disciplines that provoked increased interest in the importance of intelligence is the management and organization development literature. Organization intelligence is a key enabling force underlying many vital activities and processes dominating organizational life. Hence, the factors which lead to organizational intelligence and the result which comes out of the whole procedure is important to be understood with the understanding of OI. The focus of this research was to uncover potential antecedents and consequences of organizational intelligence, thus a non-experimental explanatory survey research design was used. A non-experimental research design is in which the manipulation of variables and randomization of samples are not present. The data was collected with the help of the questionnaire from 321 scientists from different laboratories of an R & D organization. Out of which 304 data were found suitable for the analysis. There were 194 males (age, M= 35.03, SD=7.63) and 110 females (age, M= 34.34, SD=8.44). This study tested a conceptual model linking antecedent variables (leadership and organizational culture) to organizational intelligence, followed by organizational innovational capability and organizational performance. Structural equation modeling techniques were used to analyze the hypothesized model. But, before that, confirmatory factor analysis of organizational intelligence scale was done which resulted in an insignificant model. Then, exploratory factor analysis was done which gave six factors for organizational intelligence scale. This structure was used throughout the study. Following this, the final analysis revealed relatively good fit of data to the hypothesized model with certain modifications. Leadership and organizational culture emerged out as the significant antecedents of organizational intelligence. Organizational innovational capability and organizational performance came out to be the consequent factors of organizational intelligence. But organizational intelligence did not predict organizational performance via organizational innovational capability. With this, additional significant pathway emerged out between leadership and organizational performance. The model offers a fresh and comprehensive view of the organizational intelligence. In this study, prior studies in related literature were reviewed to offer a basic framework of organizational intelligence. The study proved to be beneficial for organizational intelligence scholarship, seeing its importance in the competitive environment.

Keywords: leadership, organizational culture, organizational intelligence, organizational innovational capability

Procedia PDF Downloads 340
20590 Nurses’ Knowledge and Practice in the Management of Childhood Malnutrition in Selected Health Centers in Rwanda

Authors: Uwera Monique, Bagweneza Vedaste, Rugema Joselyne, Lakshmi Rajeswaran

Abstract:

Background: Malnutrition contributes significantly to childhood morbidity and mortality. Nurses usually exhibit inadequate knowledge of childhood malnutrition management. Nurses require appropriate knowledge and skills to manage malnutrition using appropriate protocols. Objectives: The general objective of this study was to assess Nurses’ knowledge and practice in the management of childhood malnutrition in selected health centers in Rwanda. The specific objectives were to assess the level of nurses’ knowledge in the management of childhood malnutrition, to determine the level of practice in the management of childhood malnutrition in selected health centers in Rwanda, and to establish the relationship between the demographic profile and nurses’ knowledge in the management of childhood malnutrition in selected health centers in Rwanda. Methods: The study used a descriptive cross-sectional study design and quantitative approach among 196 nurses from 24 health centers in one district. A questionnaire was used to collect data on knowledge and practice towards childhood malnutrition management. The entire population was used, and SPSS version 25 helped to analyze data. Descriptive statistics helped to produce the frequencies and percentages, while chi-square helped to determine the relationship between demographic variables and knowledge and practice scores. Results: The study findings showed that of 196 participants, 48% had a high level of knowledge about malnutrition management with more than 75% score, and 17% and 35% had low and moderate levels of knowledge, respectively. 61% of them had a high level of practice in malnutrition management, as the acceptable score was 75%. 13% had a low level, while 26% had a moderate level of practice. Most socio-demographic characteristics have shown a statistical relationship with the level of knowledge. Conclusion: The study findings revealed that almost half of the nurses had good knowledge of childhood malnutrition management, and this was associated with many socio-demographic data, while more than half had good practice in that aspect. However, some nurses who still have gaps in knowledge and practice require necessary measures to boost these components.

Keywords: nurse, knowledge, practice, childhood malnutrition

Procedia PDF Downloads 65
20589 The Role and Importance of Genome Sequencing in Prediction of Cancer Risk

Authors: M. Sadeghi, H. Pezeshk, R. Tusserkani, A. Sharifi Zarchi, A. Malekpour, M. Foroughmand, S. Goliaei, M. Totonchi, N. Ansari–Pour

Abstract:

The role and relative importance of intrinsic and extrinsic factors in the development of complex diseases such as cancer still remains a controversial issue. Determining the amount of variation explained by these factors needs experimental data and statistical models. These models are nevertheless based on the occurrence and accumulation of random mutational events during stem cell division, thus rendering cancer development a stochastic outcome. We demonstrate that not only individual genome sequencing is uninformative in determining cancer risk, but also assigning a unique genome sequence to any given individual (healthy or affected) is not meaningful. Current whole-genome sequencing approaches are therefore unlikely to realize the promise of personalized medicine. In conclusion, since genome sequence differs from cell to cell and changes over time, it seems that determining the risk factor of complex diseases based on genome sequence is somewhat unrealistic, and therefore, the resulting data are likely to be inherently uninformative.

Keywords: cancer risk, extrinsic factors, genome sequencing, intrinsic factors

Procedia PDF Downloads 268
20588 Optimal Design and Simulation of a Grid-Connected Photovoltaic (PV) Power System for an Electrical Department in University of Tripoli, Libya

Authors: Mustafa Al-Refai

Abstract:

This paper presents the optimal design and simulation of a grid-connected Photovoltaic (PV) system to supply electric power to meet the energy demand by Electrical Department in University of Tripoli Libya. Solar radiation is the key factor determining electricity produced by photovoltaic (PV) systems. This paper is designed to develop a novel method to calculate the solar photovoltaic generation capacity on the basis of Mean Global Solar Radiation data available for Tripoli Libya and finally develop a system design of possible plant capacity for the available roof area. MatLab/Simulink Programming tools and monthly average solar radiation data are used for this design and simulation. The specifications of equipments are provided based on the availability of the components in the market. Simulation results and analyses are presented to validate the proposed system configuration.

Keywords: photovoltaic (PV), grid, Simulink, solar energy, power plant, solar irradiation

Procedia PDF Downloads 299
20587 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 82
20586 A Bayesian Classification System for Facilitating an Institutional Risk Profile Definition

Authors: Roman Graf, Sergiu Gordea, Heather M. Ryan

Abstract:

This paper presents an approach for easy creation and classification of institutional risk profiles supporting endangerment analysis of file formats. The main contribution of this work is the employment of data mining techniques to support set up of the most important risk factors. Subsequently, risk profiles employ risk factors classifier and associated configurations to support digital preservation experts with a semi-automatic estimation of endangerment group for file format risk profiles. Our goal is to make use of an expert knowledge base, accuired through a digital preservation survey in order to detect preservation risks for a particular institution. Another contribution is support for visualisation of risk factors for a requried dimension for analysis. Using the naive Bayes method, the decision support system recommends to an expert the matching risk profile group for the previously selected institutional risk profile. The proposed methods improve the visibility of risk factor values and the quality of a digital preservation process. The presented approach is designed to facilitate decision making for the preservation of digital content in libraries and archives using domain expert knowledge and values of file format risk profiles. To facilitate decision-making, the aggregated information about the risk factors is presented as a multidimensional vector. The goal is to visualise particular dimensions of this vector for analysis by an expert and to define its profile group. The sample risk profile calculation and the visualisation of some risk factor dimensions is presented in the evaluation section.

Keywords: linked open data, information integration, digital libraries, data mining

Procedia PDF Downloads 422
20585 IoT Based Information Processing and Computing

Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed

Abstract:

The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.

Keywords: IoT, computing, information processing, Iot computing

Procedia PDF Downloads 183
20584 Production, Utilization and Marketing of Non-Timber Forest Products (NTFPs) in Ikwuano Local Government Area of Abia State, Nigeria

Authors: Nneka M. Chidieber-Mark, Roseline D. Ejike

Abstract:

Non-Timber Forest Products (NTFPs) have been described as all biological materials, other than timber extracted from natural and managed forests for human subsistence and economic activities. This study focused on the production, utilization and marketing of Non-Timber Forest Products (NTFPs) in Ikwuano Local Government Area of Abia State, Nigeria. A multistage sampling technique was adopted in the selection of respondents for the study. Data were from primary sources only. Data collected were analysed using descriptive statistical tools as well as Net Income Analysis. Results show that a vast number of plant based and animal based NTFPs exist in the study area. They are harvested and used for multiple purposes. NTFPs are a source of income for the indigenes that depend on it for their livelihood. Unsustainable production and harvesting as well as poor marketing information was among the constraints impeding the growth and development of NTFPs sub-sector in the study area.

Keywords: non-timber forest products, production, utilization, marketing

Procedia PDF Downloads 446
20583 A Destination Marketing Study on Capitalising on the Cultural Link between Ireland and North America Using Social Media

Authors: Colm Barcoe, Garvan Whelan

Abstract:

This study examines how a destination marketing organisation can use social media channels to engage the interests of the US and Canadian markets in a way that maximises the number of visits (and revisits) to Ireland. The research reveals how the cultural link between Ireland and North America is exploited through the use of social media strategies. The findings are based on quantitative and qualitative empirical data obtained through a survey of North American holidaymakers in the pre, during and post trip phases coupled with in-depth interviews of 20 industry experts who are responsible for the implementation of relationship marketing strategies for this segment. The qualitative data was analysed using Netnography in order to provide insights into the effectiveness of various social media channels in developing cultural links between Ireland and North American tourists. The findings of this investigation will extend an under-researched body of literature pertaining to Ireland and North America. The empirical evidence of this study will be of value to both academics and industry practitioners.

Keywords: Ireland, marketing, North America, relationship, strategies

Procedia PDF Downloads 183
20582 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 270
20581 Comparing Two Unmanned Aerial Systems in Determining Elevation at the Field Scale

Authors: Brock Buckingham, Zhe Lin, Wenxuan Guo

Abstract:

Accurate elevation data is critical in deriving topographic attributes for the precision management of crop inputs, especially water and nutrients. Traditional ground-based elevation data acquisition is time consuming, labor intensive, and often inconvenient at the field scale. Various unmanned aerial systems (UAS) provide the capability of generating digital elevation data from high-resolution images. The objective of this study was to compare the performance of two UAS with different global positioning system (GPS) receivers in determining elevation at the field scale. A DJI Phantom 4 Pro and a DJI Phantom 4 RTK(real-time kinematic) were applied to acquire images at three heights, including 40m, 80m, and 120m above ground. Forty ground control panels were placed in the field, and their geographic coordinates were determined using an RTK GPS survey unit. For each image acquisition using a UAS at a particular height, two elevation datasets were generated using the Pix4D stitching software: a calibrated dataset using the surveyed coordinates of the ground control panels and an uncalibrated dataset without using the surveyed coordinates of the ground control panels. Elevation values for each panel derived from the elevation model of each dataset were compared to the corresponding coordinates of the ground control panels. The coefficient of the determination (R²) and the root mean squared error (RMSE) were used as evaluation metrics to assess the performance of each image acquisition scenario. RMSE values for the uncalibrated elevation dataset were 26.613 m, 31.141 m, and 25.135 m for images acquired at 120 m, 80 m, and 40 m, respectively, using the Phantom 4 Pro UAS. With calibration for the same UAS, the accuracies were significantly improved with RMSE values of 0.161 m, 0.165, and 0.030 m, respectively. The best results showed an RMSE of 0.032 m and an R² of 0.998 for calibrated dataset generated using the Phantom 4 RTK UAS at 40m height. The accuracy of elevation determination decreased as the flight height increased for both UAS, with RMSE values greater than 0.160 m for the datasets acquired at 80 m and 160 m. The results of this study show that calibration with ground control panels improves the accuracy of elevation determination, especially for the UAS with a regular GPS receiver. The Phantom 4 Pro provides accurate elevation data with substantial surveyed ground control panels for the 40 m dataset. The Phantom 4 Pro RTK UAS provides accurate elevation at 40 m without calibration for practical precision agriculture applications. This study provides valuable information on selecting appropriate UAS and flight heights in determining elevation for precision agriculture applications.

Keywords: unmanned aerial system, elevation, precision agriculture, real-time kinematic (RTK)

Procedia PDF Downloads 162
20580 Relationship between Employee Welfare Practices and Performance of Non-Governmental Organizations in Kenya

Authors: Protus A. Lumiti, Susan O. Wekesa, Mary Omondi

Abstract:

Performance is a key pillar to the accomplishment of the goals of all organizations, whether private, public or non- profit. Employees are the intellectual assets of the organization and they are an avenue to the achievement of competitive advantage. An employee welfare service in an organization is vital in fostering employee motivation and improving their productivity. In view of this, the main goal of this research was to determine the relationship between employee welfare practices and the performance of non-governmental organizations in Kenya. The study was guided by four objectives, namely: to establish, determine, evaluate and assess the relationship between employee welfare practices and the performance of non-governmental organizations in Kenya. The study utilized a survey design using both qualitative and quantitative approaches. In this study, a purposive, stratified and simple random sampling technique was used to arrive at a sample of 355 respondents who comprised senior managers, middle level managers and operational employees out of the targeted population of 14,283 employees of non-governmental organizations working in Nairobi County. The primary data collection tools were questionnaires supplemented by an interview schedule, while secondary data was obtained from reviewed journals, published books and articles. Data analysis was done using Statistical Packages for Social Sciences Software version 23. The study utilized multiple linear regression and a structural equation model. The findings of the study were that: employee welfare practices had a positive and significant relationship with the performance of Non-governmental organizations in Kenya. In addition, there was also a linear relationship between the independent variables and the dependent variable and the study concluded that there was a relationship between the predictor variable and the dependent variable of the study. The study recommended that management of No-governmental organization boards in Kenya should come up with a comprehensive policy document on employee welfare practices in order to enhance the performance of non-governmental organizations in Kenya.

Keywords: employee, economic, performance, welfare

Procedia PDF Downloads 179
20579 EFL Learners' Attitudes towards the Proper Pronunciation of English and towards Podcasts as a Facilitator for Proper Pronunciation

Authors: Riam Almaqrn, Abdulrahman Alshabeb

Abstract:

The study aims to examine the attitudes of Saudi students of English towards proper pronunciation and towards podcasts as a facilitator for proper pronunciation. In order to fulfill the purpose of the study, twenty-three students participated in this study. The study used a questionnaire as the main data collection instrument. The questionnaire included two parts, one or proper pronunciation and the other for podcasts. Data analysis showed that the participants, in spite of the low rate of improvement in their pronunciation, had positive attitudes towards proper pronunciation of English. This outcome is compatible with previous studies` results that assert the fact that having a positive attitude towards a particular language and its speakers can improve pronunciation. As for podcasts, students received a total of five podcasts related to their listening and speaking textbook. At the end of the project, students showed high rate of acceptance for podcasts and positive attitudes towards them. The findings proved the usefulness of examining learners` attitudes towards new CALL applications before using them in a practical way. In the light of the findings, pedagogical implications and suggestions were presented for language instructors and academics.

Keywords: CALL, MALL, podcast, learning English

Procedia PDF Downloads 262
20578 Comparison of EMG Normalization Techniques Recommended for Back Muscles Used in Ergonomics Research

Authors: Saif Al-Qaisi, Alif Saba

Abstract:

Normalization of electromyography (EMG) data in ergonomics research is a prerequisite for interpreting the data. Normalizing accounts for variability in the data due to differences in participants’ physical characteristics, electrode placement protocols, time of day, and other nuisance factors. Typically, normalized data is reported as a percentage of the muscle’s isometric maximum voluntary contraction (%MVC). Various MVC techniques have been recommended in the literature for normalizing EMG activity of back muscles. This research tests and compares the recommended MVC techniques in the literature for three back muscles commonly used in ergonomics research, which are the lumbar erector spinae (LES), latissimus dorsi (LD), and thoracic erector spinae (TES). Six healthy males from a university population participated in this research. Five different MVC exercises were compared for each muscle using the Tringo wireless EMG system (Delsys Inc.). Since the LES and TES share similar functions in controlling trunk movements, their MVC exercises were the same, which included trunk extension at -60°, trunk extension at 0°, trunk extension while standing, hip extension, and the arch test. The MVC exercises identified in the literature for the LD were chest-supported shoulder extension, prone shoulder extension, lat-pull down, internal shoulder rotation, and abducted shoulder flexion. The maximum EMG signal was recorded during each MVC trial, and then the averages were computed across participants. A one-way analysis of variance (ANOVA) was utilized to determine the effect of MVC technique on muscle activity. Post-hoc analyses were performed using the Tukey test. The MVC technique effect was statistically significant for each of the muscles (p < 0.05); however, a larger sample of participants was needed to detect significant differences in the Tukey tests. The arch test was associated with the highest EMG average at the LES, and also it resulted in the maximum EMG activity more often than the other techniques (three out of six participants). For the TES, trunk extension at 0° was associated with the largest EMG average, and it resulted in the maximum EMG activity the most often (three out of six participants). For the LD, participants obtained their maximum EMG either from chest-supported shoulder extension (three out of six participants) or prone shoulder extension (three out of six participants). Chest-supported shoulder extension, however, had a larger average than prone shoulder extension (0.263 and 0.240, respectively). Although all the aforementioned techniques were superior in their averages, they did not always result in the maximum EMG activity. If an accurate estimate of the true MVC is desired, more than one technique may have to be performed. This research provides additional MVC techniques for each muscle that may elicit the maximum EMG activity.

Keywords: electromyography, maximum voluntary contraction, normalization, physical ergonomics

Procedia PDF Downloads 192