Search results for: digital transformation artificial intelligence
2053 Challenges Facing Farmers in the Governorate of Al-Baha, Saudi Arabia
Authors: Mohammed Alghamdi, Ghanem Al-Ghamdi
Abstract:
The Governorate of Al-Baha is known for a history of farming that focused on plant products such as Date Palm, olives, figs, pomegranate and cereals as well as raising cattle, sheep, goats and to some extent camels for many decades. However, farmers have been facing with very significant natural and artificial challenges lately. The goal of this study was to determine the most significant challenges facing farmers in the Governorate of Al-Baha. Sixty farms were surveyed during the year of 2013. Farm survey focused on the farm management, farm financial status and governmental support. Our results showed that most farms were dedicated to farming with limited number of farms used parts of its premises for recreation. About 90% of farms were engaged in exclusively farming business. The financial status was good in most of the farms (80%), stable in 16% and hardly standing in less than 5%. Nearly 60% of the farms marketed 1-3 products and 23% marketed up to 6 products, 14% of the farms marketed up to 9 products and 4% marketed more than 9 products. Less than 14% had a chance to market their products over seven times per year while about 11% market their products and 32% of farms market 3-4 per year and 43% of farms market 1-2 per year. Our data showed that most farmers are in good financial status producing healthy food.Keywords: farming system, Al-Baha, healthy food, Saudi Arabia
Procedia PDF Downloads 2812052 Data Augmentation for Automatic Graphical User Interface Generation Based on Generative Adversarial Network
Authors: Xulu Yao, Moi Hoon Yap, Yanlong Zhang
Abstract:
As a branch of artificial neural network, deep learning is widely used in the field of image recognition, but the lack of its dataset leads to imperfect model learning. By analysing the data scale requirements of deep learning and aiming at the application in GUI generation, it is found that the collection of GUI dataset is a time-consuming and labor-consuming project, which is difficult to meet the needs of current deep learning network. To solve this problem, this paper proposes a semi-supervised deep learning model that relies on the original small-scale datasets to produce a large number of reliable data sets. By combining the cyclic neural network with the generated countermeasure network, the cyclic neural network can learn the sequence relationship and characteristics of data, make the generated countermeasure network generate reasonable data, and then expand the Rico dataset. Relying on the network structure, the characteristics of collected data can be well analysed, and a large number of reasonable data can be generated according to these characteristics. After data processing, a reliable dataset for model training can be formed, which alleviates the problem of dataset shortage in deep learning.Keywords: GUI, deep learning, GAN, data augmentation
Procedia PDF Downloads 1862051 Teaching Science Content Area Literacy to 21st Century Learners
Authors: Melissa C. Ingram
Abstract:
The use of new literacies within science classrooms needs to be balanced by teachers to both teach different forms of communication while assessing content area proficiency. Using new literacies such as Twitter and Facebook needs to be incorporated into science content area literacy studies in addition to continuing to use generally-accepted forms of scientific content area presentation, which include scientific papers and textbooks. The research question this literature review seeks to answer is “What are some ways in which new forms of literacy are better suited to teach scientific content area literacy to 21st Century learners?” The research question is addressed through a literature review that highlights methods currently being used to educate the next wave of learners in the world of science content area literacy. Both temporal discourse analysis (TDA) and critical discourse analysis (CDA) were used to determine the need to use new literacies to teach science content area literacy. Increased use of digital technologies and a change in science content area pedagogy were explored.Keywords: science content area literacy, new literacies, critical discourse analysis, temporal discourse analysis
Procedia PDF Downloads 2232050 Unintended Health Inequity: Using the Relationship Between the Social Determinants of Health and Employer-Sponsored Health Insurance as a Catalyst for Organizational Development and Change
Authors: Dinamarie Fonzone
Abstract:
Employer-sponsored health insurance (ESI) strategic decision-making processes rely on financial analysis to guide leadership in choosing plans that will produce optimal organizational spending outcomes. These financial decision-making methods have not abated ESI costs. Previously unrecognized external social determinants, the impact on ESI plan spending, and other organizational strategies are emerging and are important considerations for organizational decision-makers and change management practitioners. The purpose of thisstudy is to examine the relationship between the social determinants of health (SDoH), employer-sponsored health insurance (ESI) plans, andthe unintended consequence of health inequity. A quantitative research design using selectemployee records from an existing employer human capital management database will be analyzed. Statistical regressionmethods will be used to study the relationships between certainSDoH (employee income, neighborhood geographic living area, and health care access) and health plan utilization, cost, and chronic disease prevalence. The discussion will include an application of the social gradient of health theory to the study findings, organizational transformation through changes in ESI decision-making mental models, and the connection of ESI health inequity to organizational development and changediversity, equity, and inclusion strategies.Keywords: employer-sponsored health insurance, social determinants of health, health inequity, mental models, organizational development, organizational change, social gradient of health theory
Procedia PDF Downloads 1102049 The Impacts of Digital Marketing Activities on Customers' Purchase Intention via Brand Reputation and Awareness: Empirical Study
Authors: Radwan Al Dwairi, Sara Melhem
Abstract:
Today’s billions of individuals are linked together in real-time using different types of social platforms. Despite the increasing importance of social media marketing activities in enhancing customers’ intention to purchase online; still, the majority of research has concentrated on the impact of such tools on customer satisfaction or retention and neglecting its real role in enhancing brand reputation and awareness, which in turn impact customers’ intention to purchase online. In response, this study aims to close this gap by conducting an empirical study using a qualitative approach by collecting a sample of data from 216 respondents in this domain. Results of the study reveal the significant impact of word-of-mouth, interactions, and influencers on a brand reputation, where the latter positively and significantly impacted customers’ intention to purchase via social platforms. In addition, results show the significant impact of brand reputation on enhancing customers' purchase intention.Keywords: brand awareness, brand reputation, EWOM, influencers, interaction
Procedia PDF Downloads 972048 Revealing of the Wave-Like Process in Kinetics of the Structural Steel Radiation Degradation
Authors: E. A. Krasikov
Abstract:
Dependence of the materials properties on neutron irradiation intensity (flux) is a key problem while usage data of the accelerated materials irradiation in test reactors for forecasting of their capacity for work in realistic (practical) circumstances of operation. Investigations of the reactor pressure vessel steel radiation degradation dependence on fast neutron fluence (embrittlement kinetics) at low flux reveal the instability in the form of the scatter of the experimental data and wave-like sections of embrittlement kinetics appearance. Disclosure of the steel degradation oscillating is a sign of the steel structure cyclic self-recovery transformation as it take place in self-organization processes. This assumption has received support through the discovery of the similar ‘anomalous’ data in scientific publications and by means of own additional experiments. Data obtained stimulate looking-for ways to management of the structural steel radiation stability (for example, by means of nano - structure modification for radiation defects annihilation intensification) for creation of the intelligent self-recovering material. Expected results: - radiation degradation theory and mechanisms development, - more adequate models of the radiation embrittlement elaboration, - surveillance specimen programs improvement, - methods and facility development for usage data of the accelerated materials irradiation for forecasting of their capacity for work in realistic (practical) circumstances of operation, - search of the ways for creating of the radiation stable self-recovery intelligent materials.Keywords: degradation, radiation, steel, wave-like kinetics
Procedia PDF Downloads 3052047 Zoning and Planning Response to Low-Carbon Development Transition in the Chengdu-Chongqing City Clusters, China
Authors: Hanyu Wang, Guangdong Wang
Abstract:
County-level areas serve as vital spatial units for advancing new urbanization and implementing the principles of low-carbon development, representing critical regions where conflicts between the two are pronounced. Using the 142 county-level units in the Chengdu-Chongqing city clusters as a case study, a coupled coordination model is employed to investigate the coupled coordination relationship and its spatiotemporal evolution between county-level new urbanization and low-carbon development levels. Results indicate that (1) from 2005 to 2020, the overall levels of new urbanization and low-carbon development in the Chengdu-Chongqing city clusters showed an upward trend but with significant regional disparities. The new urbanization level exhibited a spatial differentiation pattern of "high in the suburban areas, low in the distant suburbs, and some counties standing out." The temporal change in low-carbon development levels was not pronounced, yet spatial disparities were notable. (2) The overall coupling coordination degree between new urbanization and low-carbon development is transitioning from barely coordinated to moderately coordinated. The lag in new urbanization levels serves as a primary factor constraining the coordinated development of most counties. (3) Based on the temporal evolution of development states, all county units can be categorized into four types: coordinated demonstration areas, synergistic improvement areas, low-carbon transformation areas, and development lag areas. The research findings offer crucial reference points for spatial planning and the formulation of low-carbon development policies.Keywords: county units, coupling coordination, low-carbon development, new urbanization
Procedia PDF Downloads 882046 Women's Liberation: A Study of the Movement in Saudi Arabia
Authors: Rachel Hasan
Abstract:
Kingdom of Saudi Arabia has witnessed various significant social and political developments in 2018. Crown Prince of Kingdom of Saudi Arabia, Muhammad bin Salman, also serving as Deputy Prime Minister of Saudi Arabia, has made several social, cultural, and political changes in the country under his grand National Transformation Program. Program provides a vision of more economically viable, culturally liberal, and politically pleasant Saudi Arabia. One of the most significant and ground breaking changes that has been made under this program is awarding women the long awaited rights. Legislative changes are made to allow woman to drive. Seemingly basic on surface but driving rights to women represent much deeper meaning to the culture of Saudi Arabia and to the world outside. Ever since this right is awarded to the women, world media is interpreting this change in various colors. This paper aims to investigate the portrayal of gender rights in various online media publications and websites. The methodology applied has been quantitative content analysis method to analyze the various aspects of media's coverage of various social and cultural changes with reference to women's rights. For the purpose of research, convenience sampling was done for eight international online articles from media websites. The articles discussed the lifting of ban for females on driving cars in Saudi Arabia as well as gender development for these women. These articles were analyzed for media frames, and various categories of analysis were developed, which highlighted the stance that was observed. Certain terms were conceptualized and operationalized and were also explained for better understanding of the context.Keywords: gender rights, media coverage, political change, women's liberation
Procedia PDF Downloads 1092045 Adopting Flocks of Birds Approach to Predator for Anomalies Detection on Industrial Control Systems
Abstract:
Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.Keywords: artificial life, industrial control system (ICS), IDS, prey predator (PP), SCADA, SDC
Procedia PDF Downloads 3052044 Interpreting Form Based Code in Historic Residential Corridor
Authors: Diljan C. K.
Abstract:
Every location on the planet has a history and culture that give it its own identity and character, making it distinct from others. urbanised world, it is fashionable to remould its original character and impression in a contemporary style. The new character and impression of places show a complete detachment from their roots. The heritage and cultural values of the place are replaced by new impressions, and as a result, they eventually lose their identity and character and never have sustenance. In this situation, form-based coding acts as a tool in the urban design process, helping to come up with solutions that strongly bind individuals to their neighbourhood and are closely related to culture through the physical spaces they are associated with. Form-based code was made by pioneers of new urbanism in 1987 in the United States of America. Since then, it has been used in various projects inside and outside the USA with varied scales, from the design of a single building to the design of a whole community. This research makes an effort to interpret the form-based code in historic corridors to establish the association of physical form and space with the public realm to uphold the context and culture. Many of the historic corridors are undergoing a tremendous transformation in their physical form, avoiding their culture and context. This will lead to it losing its identity in form and function. If the case of Valiyashala in Trivandrum is taken as the case, which is transforming its form and will lead to the loss of its identity, the form-based code will be a suitable tool to strengthen its historical value. The study concludes by analysing the existing code (KMBR) of Valiyashala and form-based code to find the requirements in form-based code for Valiyashala.Keywords: form based code, urban conservation, heritage, historic corridor
Procedia PDF Downloads 1102043 Economic Integration in Eurasia: Modeling of the Current and Future Architecture
Authors: M. G. Shilina
Abstract:
The prospects for political and economic development of the Eurasian space are currently discussed at both governmental and expert levels. New concepts actively proposed by the Eurasian governments require the analysis and search for effective implementation options. In the paper, an attempt to identify effective solutions to the problems surrounding the current economic integration of the Eurasian states is given on the basis of an interdisciplinary, comprehensive, structured analysis. The phenomenon is considered through the prism of the international law, world economy and politics, combined with the study of existing intergovernmental practice. The modeling method was taken as the basis for the research and is supplemented by legal and empirical methods. The detailed multi-level model of practical construction the 'Great Eurasia' (the GE) concept is proposed, the option for building a phased interaction in Eurasia is given through the prism of construction by the Eurasian Economic Union (the EAEU) as the main tool. The Shanghai Cooperation Organization (the SCO) is seen as the most promising element of the model. The SCO is capable of streamlining the formation of the GE and determine the transformation of Eurasia into a common economic space. Effective development of the economic integration between Eurasian states on the framework of the SCO is optimal. The SCO+ could be used as a platform for integration-integration processes formation. The creation of stable financial ties could become the basis for the possible formation of an expanded transregional integration platform. The paper concludes that the implementation of the proposed model could entail a gradual economic rapprochement of Eurasia and beyond.Keywords: economic integration, The Eurasian Economic Union, The European Union, The Shanghai Cooperation Organization, the silk road economic belt
Procedia PDF Downloads 1212042 Low Density Parity Check Codes
Authors: Kassoul Ilyes
Abstract:
The field of error correcting codes has been revolutionized by the introduction of iteratively decoded codes. Among these, LDPC codes are now a preferred solution thanks to their remarkable performance and low complexity. The binary version of LDPC codes showed even better performance, although it’s decoding introduced greater complexity. This thesis studies the performance of binary LDPC codes using simplified weighted decisions. Information is transported between a transmitter and a receiver by digital transmission systems, either by propagating over a radio channel or also by using a transmission medium such as the transmission line. The purpose of the transmission system is then to carry the information from the transmitter to the receiver as reliably as possible. These codes have not generated enough interest within the coding theory community. This forgetfulness will last until the introduction of Turbo-codes and the iterative principle. Then it was proposed to adopt Pearl's Belief Propagation (BP) algorithm for decoding these codes. Subsequently, Luby introduced irregular LDPC codes characterized by a parity check matrix. And finally, we study simplifications on binary LDPC codes. Thus, we propose a method to make the exact calculation of the APP simpler. This method leads to simplifying the implementation of the system.Keywords: LDPC, parity check matrix, 5G, BER, SNR
Procedia PDF Downloads 1562041 Leveraging Sentiment Analysis for Quality Improvement in Digital Healthcare Services
Authors: Naman Jain, Shaun Fernandes
Abstract:
With the increasing prevalence of online healthcare services, selecting the most suitable doctor has become a complex task, requiring careful consideration of both public sentiment and personal preferences. This paper proposes a sentiment analysis-driven method that integrates public reviews with user-specific criteria and correlated attributes to recommend online doctors. By leveraging Natural Language Processing (NLP) techniques, public sentiment is extracted from online reviews, which is then combined with user-defined preferences such as specialty, years of experience, location, and consultation fees. Additionally, correlated attributes like education and certifications are incorporated to enhance the recommendation accuracy. Experimental results demonstrate that the proposed system significantly improves user satisfaction by providing personalized doctor recommendations that align with both public opinion and individual needs.Keywords: sentiment analysis, online doctors, personal preferences, correlated attributes, recommendation system, healthcare, natural language processing
Procedia PDF Downloads 142040 Classification of Political Affiliations by Reduced Number of Features
Authors: Vesile Evrim, Aliyu Awwal
Abstract:
By the evolvement in technology, the way of expressing opinions switched the direction to the digital world. The domain of politics as one of the hottest topics of opinion mining research merged together with the behavior analysis for affiliation determination in text which constitutes the subject of this paper. This study aims to classify the text in news/blogs either as Republican or Democrat with the minimum number of features. As an initial set, 68 features which 64 are constituted by Linguistic Inquiry and Word Count (LIWC) features are tested against 14 benchmark classification algorithms. In the later experiments, the dimensions of the feature vector reduced based on the 7 feature selection algorithms. The results show that Decision Tree, Rule Induction and M5 Rule classifiers when used with SVM and IGR feature selection algorithms performed the best up to 82.5% accuracy on a given dataset. Further tests on a single feature and the linguistic based feature sets showed the similar results. The feature “function” as an aggregate feature of the linguistic category, is obtained as the most differentiating feature among the 68 features with 81% accuracy by itself in classifying articles either as Republican or Democrat.Keywords: feature selection, LIWC, machine learning, politics
Procedia PDF Downloads 3832039 Forecasting Future Demand for Energy Efficient Vehicles: A Review of Methodological Approaches
Authors: Dimitrios I. Tselentis, Simon P. Washington
Abstract:
Considerable literature has been focused over the last few decades on forecasting the consumer demand of Energy Efficient Vehicles (EEVs). These methodological issues range from how to capture recent purchase decisions in revealed choice studies and how to set up experiments in stated preference (SP) studies, and choice of analysis method for analyzing such data. This paper reviews the plethora of published studies on the field of forecasting demand of EEVs since 1980, and provides a review and annotated bibliography of that literature as it pertains to this particular demand forecasting problem. This detailed review addresses the literature not only to Transportation studies, but specifically to the problem and methodologies around forecasting to the time horizons of planning studies which may represent 10 to 20 year forecasts. The objectives of the paper are to identify where existing gaps in literature exist and to articulate where promising methodologies might guide longer term forecasting. One of the key findings of this review is that there are many common techniques used both in the field of new product demand forecasting and the field of predicting future demand for EEV. Apart from SP and RP methods, some of these new techniques that have emerged in the literature in the last few decades are survey related approaches, product diffusion models, time-series modelling, computational intelligence models and other holistic approaches.Keywords: demand forecasting, Energy Efficient Vehicles (EEVs), forecasting methodologies review, methodological approaches
Procedia PDF Downloads 4892038 A Low-Cost Experimental Approach for Teaching Energy Quantization: Determining the Planck Constant with Arduino and Led
Authors: Gastão Soares Ximenes de Oliveira, Richar Nicolás Durán, Romeo Micah Szmoski, Eloiza Aparecida Avila de Matos, Elano Gustavo Rein
Abstract:
This article aims to present an experimental method to determine Planck's constant by calculating the cutting potential V₀ from LEDs with different wavelengths. The experiment is designed using Arduino as a central tool in order to make the experimental activity more engaging and attractive for students with the use of digital technologies. From the characteristic curves of each LED, graphical analysis was used to obtain the cutting potential, and knowing the corresponding wavelength, it was possible to calculate Planck's constant. This constant was also obtained from the linear adjustment of the cutting potential graph by the frequency of each LED. Given the relevance of Planck's constant in physics, it is believed that this experiment can offer teachers the opportunity to approach concepts from modern physics, such as the quantization of energy, in a more accessible and applied way in the classroom. This will not only enrich students' understanding of the fundamental nature of matter but also encourage deeper engagement with the principles of quantum physics.Keywords: physics teaching, educational technology, modern physics, Planck constant, Arduino
Procedia PDF Downloads 772037 Acoustic Analysis for Comparison and Identification of Normal and Disguised Speech of Individuals
Authors: Surbhi Mathur, J. M. Vyas
Abstract:
Although the rapid development of forensic speaker recognition technology has been conducted, there are still many problems to be solved. The biggest problem arises when the cases involving disguised voice samples come across for the purpose of examination and identification. Such type of voice samples of anonymous callers is frequently encountered in crimes involving kidnapping, blackmailing, hoax extortion and many more, where the speaker makes a deliberate effort to manipulate their natural voice in order to conceal their identity due to the fear of being caught. Voice disguise causes serious damage to the natural vocal parameters of the speakers and thus complicates the process of identification. The sole objective of this doctoral project is to find out the possibility of rendering definite opinions in cases involving disguised speech by experimentally determining the effects of different disguise forms on personal identification and percentage rate of speaker recognition for various voice disguise techniques such as raised pitch, lower pitch, increased nasality, covering the mouth, constricting tract, obstacle in mouth etc by analyzing and comparing the amount of phonetic and acoustic variation in of artificial (disguised) and natural sample of an individual, by auditory as well as spectrographic analysis.Keywords: forensic, speaker recognition, voice, speech, disguise, identification
Procedia PDF Downloads 3702036 Social Media and Internet Celebrity for Social Commerce Intentional and Behavioral Recommendations
Authors: Shu-Hsien Liao, Yao-Hsuan Yang
Abstract:
Social media is a virtual community and online platform that people use to create, share, and exchange opinions/experiences. Internet celebrities are people who become famous on the Internet, increasing their popularity through their social networking or video websites. Social commerce (s-ecommerce) is the combination of social relations and commercial transaction activities. The combination of social media and Internet celebrities is an emerging model for the development of s-ecommerce. With recent advances in system sciences, recommendation systems are gradually moving to develop intentional and behavioral recommendations. This background leads to the research issues regarding digital and social media in enterprises. Thus, this study implements data mining analytics, including clustering analysis and association rules, to investigate Taiwanese users (n=2,102) to investigate social media and Internet celebrities’ preferences to find knowledge profiles/patterns/rules for s-ecommerce intentional and behavioral recommendations.Keywords: social media, internet celebrity, social commerce (s-ecommerce), data mining analytics, intentional and behavioral recommendations
Procedia PDF Downloads 332035 Thermographic Tests of Curved GFRP Structures with Delaminations: Numerical Modelling vs. Experimental Validation
Authors: P. D. Pastuszak
Abstract:
The present work is devoted to thermographic studies of curved composite panels (unidirectional GFRP) with subsurface defects. Various artificial defects, created by inserting PTFE stripe between individual layers of a laminate during manufacturing stage are studied. The analysis is conducted both with the use finite element method and experiments. To simulate transient heat transfer in 3D model with embedded various defect sizes, the ANSYS package is used. Pulsed Thermography combined with optical excitation source provides good results for flat surfaces. Composite structures are mostly used in complex components, e.g., pipes, corners and stiffeners. Local decrease of mechanical properties in these regions can have significant influence on strength decrease of the entire structure. Application of active procedures of thermography to defect detection and evaluation in this type of elements seems to be more appropriate that other NDT techniques. Nevertheless, there are various uncertainties connected with correct interpretation of acquired data. In this paper, important factors concerning Infrared Thermography measurements of curved surfaces in the form of cylindrical panels are considered. In addition, temperature effects on the surface resulting from complex geometry and embedded and real defect are also presented.Keywords: active thermography, composite, curved structures, defects
Procedia PDF Downloads 3202034 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks
Authors: Yao-Hong Tsai
Abstract:
Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance
Procedia PDF Downloads 1622033 O.MG- It’s a Cyber-Enabled Fraud
Authors: Damola O. Lawal, David W. Gresty, Diane E. Gan, Louise Hewitt
Abstract:
This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger, is used in an unauthorized way to alter the content of a file (accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself, such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behavior during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorized changes made by a programmable device.Keywords: O.MG cable, programmable USB, file tampering attack, digital evidence credibility, miscarriage of justice, cyber fraud
Procedia PDF Downloads 1632032 Development of Creatively Integrated Teaching Skills Using Information and Communication Technology for Professional Teacher
Authors: Siwanit Autthawuttikul, Prakob Koraneekid, Sayamon Insa-ard
Abstract:
The purposes of this research were to development creatively integrated teaching skills using Information and Communication Technology (ICT) for professional teacher in schools under the education area of the basic education commission, ministry of education both schools under the office of primary education and those under The office of secondary education in eight western region provinces of Thailand. This is useful in defining a vision for the school strategy and restructuring schools in addition, teachers will have developed skills in teaching creative integrated ICT. The research methodology comprises quantitative and qualitative data collection. The Baseline Survey, focus group for discussions and then the model was developed creatively integrated teaching skills using ICT. The findings showed that 7 elements were important: (1) Academy Transformation (2) Information Technology Infrastructure (3) Personal Development (4) Supervision, Monitoring and Evaluation (5) Motivating and Rewarding (6) Important factor affecting the success of teaching integrated with ICT were knowledge, skills, attitudes and (7) The role of the individual concerned. The comparison creatively integrated teaching skills before and after participating in the overall shows that the average creatively integrated teaching skills using ICT after attending the event is 3.27, and standard deviation was 0.56, higher than before which is 2.60 and the standard deviation was 0.56. There are significant differences significant statistically level of .05. The final average score of the evaluation plan design creatively integrated teaching skills using ICT teachers' average score was 26.94 at the high levels.Keywords: integrated curriculum, information and communications technology, teachers in the western region, schools
Procedia PDF Downloads 4462031 Military Orchestrated Leadership Change in Zimbabwe and the Quest for Political Transition
Authors: Patrick Dzimiri
Abstract:
This chapter discusses the military-orchestrated leadership change in Zimbabwe that transpired in November 2017. Fundamentally, the chapter provides a critical examination of military interference in the country's politics and its implications for a political transition in the post-Mugabe dispensation. This chapter offers insight into Zimbabwe's political crises propelled by the lack of a succession plan. It emerged that the succession battle within ZANU-PF got complicated by the militarisation of factionalism. The chapter builds from an extensive review of primary and secondary data sources on political developments before and post-Mugabe era. Vilfredo Pareto's (1848-18923) theory on elite circulation is deployed herein to explain the absence of a succession mechanism within ZANU-PF and the militarisation of socio-politics life Zimbabwe. The chapter argues that what transpired in Zimbabwe’s power wrangle within the ZANU-PF political elites was triggered by a lack of a clear succession policy. Building from insights offered by Pareto's theory of elite circulation, it is averred that the removal of Mugabe by the military did not herald any form of political transition but rather a mere power play of one elite replacing another. In addition, it is argued that the lack of political reform by the Mnangagwa government affirms the position that political elites seek power for personal self-actualisation and not the public good. The chapter concludes that Mnangagwa's rise to power is nothing but a new elite displacing the old elite structure and does not herald a positive transition and transformation in the politics of Zimbabwe.Keywords: military, politics, zimbabwe, governance, political transition
Procedia PDF Downloads 952030 Normalized Enterprises Architectures: Portugal's Public Procurement System Application
Authors: Tiago Sampaio, André Vasconcelos, Bruno Fragoso
Abstract:
The Normalized Systems Theory, which is designed to be applied to software architectures, provides a set of theorems, elements and rules, with the purpose of enabling evolution in Information Systems, as well as ensuring that they are ready for change. In order to make that possible, this work’s solution is to apply the Normalized Systems Theory to the domain of enterprise architectures, using Archimate. This application is achieved through the adaptation of the elements of this theory, making them artifacts of the modeling language. The theorems are applied through the identification of the viewpoints to be used in the architectures, as well as the transformation of the theory’s encapsulation rules into architectural rules. This way, it is possible to create normalized enterprise architectures, thus fulfilling the needs and requirements of the business. This solution was demonstrated using the Portuguese Public Procurement System. The Portuguese government aims to make this system as fair as possible, allowing every organization to have the same business opportunities. The aim is for every economic operator to have access to all public tenders, which are published in any of the 6 existing platforms, independently of where they are registered. In order to make this possible, we applied our solution to the construction of two different architectures, which are able of fulfilling the requirements of the Portuguese government. One of those architectures, TO-BE A, has a Message Broker that performs the communication between the platforms. The other, TO-BE B, represents the scenario in which the platforms communicate with each other directly. Apart from these 2 architectures, we also represent the AS-IS architecture that demonstrates the current behavior of the Public Procurement Systems. Our evaluation is based on a comparison between the AS-IS and the TO-BE architectures, regarding the fulfillment of the rules and theorems of the Normalized Systems Theory and some quality metrics.Keywords: archimate, architecture, broker, enterprise, evolvable systems, interoperability, normalized architectures, normalized systems, normalized systems theory, platforms
Procedia PDF Downloads 3592029 Modeling of Daily Global Solar Radiation Using Ann Techniques: A Case of Study
Authors: Said Benkaciali, Mourad Haddadi, Abdallah Khellaf, Kacem Gairaa, Mawloud Guermoui
Abstract:
In this study, many experiments were carried out to assess the influence of the input parameters on the performance of multilayer perceptron which is one the configuration of the artificial neural networks. To estimate the daily global solar radiation on the horizontal surface, we have developed some models by using seven combinations of twelve meteorological and geographical input parameters collected from a radiometric station installed at Ghardaïa city (southern of Algeria). For selecting of best combination which provides a good accuracy, six statistical formulas (or statistical indicators) have been evaluated, such as the root mean square errors, mean absolute errors, correlation coefficient, and determination coefficient. We noted that multilayer perceptron techniques have the best performance, except when the sunshine duration parameter is not included in the input variables. The maximum of determination coefficient and correlation coefficient are equal to 98.20 and 99.11%. On the other hand, some empirical models were developed to compare their performances with those of multilayer perceptron neural networks. Results obtained show that the neural networks techniques give the best performance compared to the empirical models.Keywords: empirical models, multilayer perceptron neural network, solar radiation, statistical formulas
Procedia PDF Downloads 3472028 Impact of Social Media on the Functioning of the Indian Government: A Critical Analysis
Authors: Priya Sepaha
Abstract:
Social media has loomed as the most effective tool in recent times to flag the causes, contents, opinions and direction of any social movement and has demonstrated that it will have a far-reaching effect on government as well. This study focuses on India which has emerged as the fastest growing community on social media. Social movement activists, in particular, have extensively utilized the power of digital social media to streamline the effectiveness of social protest on a particular issue through extensive successful mass mobilizations. This research analyses the role and impact of social media as a power to catalyze the social movements in India and further seeks to describe how certain social movements are resisted, subverted, co-opted and/or deployed by social media. The impact assessment study has been made with the help of cases, policies and some social movement which India has witnessed the assertion of numerous social issues perturbing the public which eventually paved the way for remarkable judicial decisions. The paper concludes with the observations that despite its pros and cons, the impacts of social media on the functioning of the Indian Government have demonstrated that it has already become an indispensable tool in the hands of social media-suave Indians who are committed to bring about a desired change.Keywords: social media, social movements, impact, law, government
Procedia PDF Downloads 1622027 Smart Grids in Morocco: An Outline of the Recent Development, Key Drivers and Recommendations for Future Implementation
Authors: Mohamed Laamim, Aboubakr Benazzouz, Abdelilah Rochd, Abdellatif Ghennioui, Abderrahim El Fadili
Abstract:
Smart grids have recently sparked a lot of interest in the energy sector as they allow for the modernization and digitization of the existing power infrastructure. Smart grids have several advantages in terms of reducing the environmental impact of generating power from fossil fuels due to their capacity to integrate large amounts of distributed energy resources. On the other hand, smart grid technologies necessitate many field investigations and requirements. This paper focuses on the major difficulties that governments face around the world and compares them to the situation in Morocco. Also presented in this study are the current works and projects being developed to improve the penetration of smart grid technologies into the electrical system. Furthermore, the findings of this study will be useful to promote the smart grid revolution in Morocco, as well as to construct a strong foundation and develop future needs for better penetration of technologies that aid in the integration of smart grid features.Keywords: smart grids, microgrids, virtual power plants, digital twin, distributed energy resources, vehicle-to-grid, advanced metering infrastructure
Procedia PDF Downloads 1582026 Malware Beaconing Detection by Mining Large-scale DNS Logs for Targeted Attack Identification
Authors: Andrii Shalaginov, Katrin Franke, Xiongwei Huang
Abstract:
One of the leading problems in Cyber Security today is the emergence of targeted attacks conducted by adversaries with access to sophisticated tools. These attacks usually steal senior level employee system privileges, in order to gain unauthorized access to confidential knowledge and valuable intellectual property. Malware used for initial compromise of the systems are sophisticated and may target zero-day vulnerabilities. In this work we utilize common behaviour of malware called ”beacon”, which implies that infected hosts communicate to Command and Control servers at regular intervals that have relatively small time variations. By analysing such beacon activity through passive network monitoring, it is possible to detect potential malware infections. So, we focus on time gaps as indicators of possible C2 activity in targeted enterprise networks. We represent DNS log files as a graph, whose vertices are destination domains and edges are timestamps. Then by using four periodicity detection algorithms for each pair of internal-external communications, we check timestamp sequences to identify the beacon activities. Finally, based on the graph structure, we infer the existence of other infected hosts and malicious domains enrolled in the attack activities.Keywords: malware detection, network security, targeted attack, computational intelligence
Procedia PDF Downloads 2672025 Breeding Biology and Induced Breeding Status of Freshwater Mud Eel, Monopterus cuchia
Authors: Faruque Miah, Hafij Ali, Enaya Jannat, Tanmoy Modok Shuvra, M. Niamul Naser
Abstract:
In this study, breeding biology and induced breeding of freshwater mud eel, Monopterus cuchia was observed during the experimental period from February to June, 2013. Breeding biology of freshwater mud eel, Monopterus cuchia was considered in terms of gonadosomatic index, length-weight relationship of gonad, ova diameter and fecundity. The ova diameter was recorded from 0.3 mm to 4.30 mm and the individual fecundity was recorded from 155 to 1495 while relative fecundity was found from 2.64 to 12.45. The fecundity related to body weight and length of fish was also discussed. A peak of GSI was observed 2.14±0.2 in male and 5.1 ±1.09 in female. Induced breeding of freshwater mud eel, Monopterus cuchia was also practiced with different doses of different inducing agents like pituitary gland (PG), human chorionic gonadotropin (HCG), Gonadotropin releasing hormone (GnRH) and Ovuline-a synthetic hormone in different environmental conditions. However, it was observed that the artificial breeding of freshwater mud eel, Monopterus cuchia was not yet succeeded through inducing agents in captive conditions, rather the inducing agent showed negative impacts on fecundity and ovarian tissues. It was seen that mature eggs in the oviduct were reduced, absorbed and some eggs were found in spoiled condition.Keywords: breeding biology, induced breeding, Monopterus cuchia, human chorionic gonadotropin
Procedia PDF Downloads 7762024 Identifying E-Learning Components at North-West University, Mafikeng Campus
Authors: Sylvia Tumelo Nthutang, Nehemiah Mavetera
Abstract:
Educational institutions are under pressure from their competitors. Regulators and community groups need educational institutions to adopt appropriate business and organizational practices. Globally, educational institutions are now using e-learning as the best teaching and learning approach. E-learning is becoming the center of attention to the learning institutions, educational systems and software inventors. North-West University (NWU) is currently using eFundi, a Learning Management System (LMS). LMS are all information systems and procedures that adds value to students learning and support the learning material in text or any multimedia files. With various e-learning tools, students would be able to access all the materials related to the course in electronic copies. The study was tasked with identifying the e-learning components at the NWU, Mafikeng campus. Quantitative research methodology was considered in data collection and descriptive statistics for data analysis. The Activity Theory (AT) was used as a theory to guide the study. AT outlines the limitations amongst e-learning at the macro-organizational level (plan, guiding principle, campus-wide solutions) and micro-organization (daily functioning practice, collaborative transformation, specific adaptation). On a technological environment, AT gives people an opportunity to change from concentrating on computers as an area of concern but also understand that technology is part of human activities. The findings have identified the university’s current IT tools and knowledge on e-learning elements. It was recommended that university should consider buying computer resources that consumes less power and practice e-learning effectively.Keywords: e-learning, information and communication technology (ICT), teaching, virtual learning environment
Procedia PDF Downloads 280