Search results for: OTT media services
1869 User-Perceived Quality Factors for Certification Model of Web-Based System
Authors: Jamaiah H. Yahaya, Aziz Deraman, Abdul Razak Hamdan, Yusmadi Yah Jusoh
Abstract:
One of the most essential issues in software products is to maintain it relevancy to the dynamics of the user’s requirements and expectation. Many studies have been carried out in quality aspect of software products to overcome these problems. Previous software quality assessment models and metrics have been introduced with strengths and limitations. In order to enhance the assurance and buoyancy of the software products, certification models have been introduced and developed. From our previous experiences in certification exercises and case studies collaborating with several agencies in Malaysia, the requirements for user based software certification approach is identified and demanded. The emergence of social network applications, the new development approach such as agile method and other varieties of software in the market have led to the domination of users over the software. As software become more accessible to the public through internet applications, users are becoming more critical in the quality of the services provided by the software. There are several categories of users in web-based systems with different interests and perspectives. The classifications and metrics are identified through brain storming approach with includes researchers, users and experts in this area. The new paradigm in software quality assessment is the main focus in our research. This paper discusses the classifications of users in web-based software system assessment and their associated factors and metrics for quality measurement. The quality model is derived based on IEEE structure and FCM model. The developments are beneficial and valuable to overcome the constraints and improve the application of software certification model in future.Keywords: software certification model, user centric approach, software quality factors, metrics and measurements, web-based system
Procedia PDF Downloads 4051868 Border Trade Policy to Promote Thailand - Myanmar Mae Sai, Chiang Rai Province
Authors: Sakapas Saengchai, Pichamon Chansuchai
Abstract:
Research Thai- Myanmar Border Trade Promotion Policy, Mae Sai District, Chiang Rai Province The objectives of this study were to study the policy of promoting Thai- Myanmar border trade in Mae Sai district, Chiang Rai province. And suitable models for the development of border trade in Mae Sai. Chiang Rai province This research uses qualitative methodology. The method of collecting data from research papers. Participatory Observation In-depth interviews in which the information is important, the governor of Chiang Rai. Chiang Rai Customs Service Executive Office of Mae Sai Immigration Bureau Maesai Chamber of Commerce and Private Entrepreneurs By specific sampling Data analysis uses content analysis. The study indicated that Border Trade Promotion Policy The direction taken by the government to focus on developing 1. Security is further reducing crime. Smuggling and human trafficking Including the preparation to protect people from terrorism and natural disasters. And cooperation with Burma on border security. 2. The development of wealth is the promotion of investment. The transport links, logistics value chain. Products and services across the Thai-Myanmar border. Improve the regulations and laws to promote fair trade. Convenient and fast 3. Sustainable development is the ability to generate income, quality of life of people in the Thai border to increase continuously. By using balanced natural resources, production and consumption are environmentally friendly. Which featured the participation of all sectors of the public and private sectors in the region to drive the development of the border with Thailand. Chiang Rai province To be more competitive .Keywords: Border, Trade, Policy, Promote
Procedia PDF Downloads 1711867 A Next-Generation Blockchain-Based Data Platform: Leveraging Decentralized Storage and Layer 2 Scaling for Secure Data Management
Authors: Kenneth Harper
Abstract:
The rapid growth of data-driven decision-making across various industries necessitates advanced solutions to ensure data integrity, scalability, and security. This study introduces a decentralized data platform built on blockchain technology to improve data management processes in high-volume environments such as healthcare and financial services. The platform integrates blockchain networks using Cosmos SDK and Polkadot Substrate alongside decentralized storage solutions like IPFS and Filecoin, and coupled with decentralized computing infrastructure built on top of Avalanche. By leveraging advanced consensus mechanisms, we create a scalable, tamper-proof architecture that supports both structured and unstructured data. Key features include secure data ingestion, cryptographic hashing for robust data lineage, and Zero-Knowledge Proof mechanisms that enhance privacy while ensuring compliance with regulatory standards. Additionally, we implement performance optimizations through Layer 2 scaling solutions, including ZK-Rollups, which provide low-latency data access and trustless data verification across a distributed ledger. The findings from this exercise demonstrate significant improvements in data accessibility, reduced operational costs, and enhanced data integrity when tested in real-world scenarios. This platform reference architecture offers a decentralized alternative to traditional centralized data storage models, providing scalability, security, and operational efficiency.Keywords: blockchain, cosmos SDK, decentralized data platform, IPFS, ZK-Rollups
Procedia PDF Downloads 271866 A Proteomic Approach for Discovery of Microbial Cellulolytic Enzymes
Authors: M. S. Matlala, I. Ignatious
Abstract:
Environmental sustainability has taken the center stage in human life all over the world. Energy is the most essential component of our life. The conventional sources of energy are non-renewable and have a detrimental environmental impact. Therefore, there is a need to move from conventional to non-conventional renewable energy sources to satisfy the world’s energy demands. The study aimed at screening for microbial cellulolytic enzymes using a proteomic approach. The objectives were to screen for microbial cellulases with high specific activity and separate the cellulolytic enzymes using a combination of zymography and two-dimensional (2-D) gel electrophoresis followed by tryptic digestion, Matrix-assisted Laser Desorption Ionisation-Time of Flight (MALDI-TOF) and bioinformatics analysis. Fungal and bacterial isolates were cultured in M9 minimal and Mandel media for a period of 168 hours at 60°C and 30°C with cellobiose and Avicel as carbon sources. Microbial cells were separated from supernatants through centrifugation, and the crude enzyme from the cultures was used for the determination of cellulase activity, zymography, SDS-PAGE, and two-dimensional gel electrophoresis. Five isolates, with lytic action on carbon sources studied, were a bacterial strain (BARK) and fungal strains (VCFF1, VCFF14, VCFF17, and VCFF18). Peak cellulase production by the selected isolates was found to be 3.8U/ml, 2.09U/ml, 3.38U/ml, 3.18U/ml, and 1.95U/ml, respectively. Two-dimensional gel protein maps resulted in the separation and quantitative expression of different proteins by the microbial isolates. MALDI-TOF analysis and database search showed that the expressed proteins in this study closely relate to different glycoside hydrolases produced by other microbial species with an acceptable confidence level of 100%.Keywords: cellulases, energy, two-dimensional gel electrophoresis, matrix-assisted laser desorption ionisation-time of flight, MALDI-TOF MS
Procedia PDF Downloads 1341865 Intraspecific Response of the Ciliate Tetrahymena thermophila to Copper and Thermal Stress
Authors: Doufoungognon Carine Kone
Abstract:
Heavy metals present in large quantities in ecosystems can alter biological and cellular functions and disrupt trophic functions. However, their toxicity can change according to thermal conditions, as toxicity depends on their bioavailability and thermal optimum of organisms. Organisms can develop different tolerance strategies to maintain themselves in a stressful environment, but these strategies are often studied in a single-stressor context. This study evaluates the responses of the ciliate Tetrahymena thermophila to copper, high temperature, and their interaction. Six genotypes were exposed to a gradient of copper concentrations ranging from 0 to 350mg/L in synthetic media at three temperatures: 15°C, 23°C, and 31°C. Cell density, cell shape and size (and their variance), swimming speed and trajectory, and copper uptake rate were measured. Depending on the genotype, swimming speed, trajectory, and cell size were highly affected by stress gradients. One gets bigger, while two genotypes get smaller and the other remain unchanged. Some genotypes swam less rapidly, while others speed up as copper and temperature increased. Concerning copper uptake, the two genotypes accumulating the best and the worst, whatever the copper concentration or temperature, were also those that had the highest densities. Finally, very few temperature x copper interactions were observed on phenotypic parameters. The diversity of phenotypic responses revealed in this study reflects the existence of divergent strategies adopted by Tetrahymena thermophila to resist to copper and thermal stress, which suggests an important role of intraspecific variability in biodiversity response to environmental stress. One general and the surprising pattern was a global absence of interactive effects between copper and high temperature exposure on the observed phenotypic responses.Keywords: ciliate, copper, intraspecific variability, phenotype, temperature, tolerance, multiple stressors
Procedia PDF Downloads 761864 Need for Privacy in the Technological Era: An Analysis in the Indian Perspective
Authors: Amrashaa Singh
Abstract:
In the digital age and the large cyberspace, Data Protection and Privacy have become major issues in this technological era. There was a time when social media and online shopping websites were treated as a blessing for the people. But now the tables have turned, and the people have started to look at them with suspicion. They are getting aware of the privacy implications, and they do not feel as safe as they used to initially. When Edward Snowden informed the world about the snooping United States Security Agencies had been doing, that is when the picture became clear for the people. After the Cambridge Analytica case where the data of Facebook users were stored without their consent, the doubts arose in the minds of people about how safe they actually are. In India, the case of spyware Pegasus also raised a lot of concerns. It was used to snoop on a lot of human right activists and lawyers and the company which invented the spyware claims that it only sells it to the government. The paper will be dealing with the privacy concerns in the Indian perspective with an analytical methodology. The Supreme Court here had recently declared a right to privacy a Fundamental Right under Article 21 of the Constitution of India. Further, the Government is also working on the Data Protection Bill. The point to note is that India is still a developing country, and with the bill, the government aims at data localization. But there are doubts in the minds of many people that the Government would actually be snooping on the data of the individuals. It looks more like an attempt to curb dissenters ‘lawfully’. The focus of the paper would be on these issues in India in light of the European Union (EU) General Data Protection Regulation (GDPR). The Indian Data Protection Bill is also said to be loosely based on EU GDPR. But how helpful would these laws actually be is another concern since the economic and social conditions in both countries are very different? The paper aims at discussing these concerns, how good or bad is the intention of the government behind the bill, and how the nations can act together and draft common regulations so that there is some uniformity in the laws and their application.Keywords: Article 21, data protection, dissent, fundamental right, India, privacy
Procedia PDF Downloads 1141863 Communication Tools Used in Teaching and Their Effects: An Empirical Study on the T. C. Selcuk University Samples
Authors: Sedat Simsek, Tugay Arat
Abstract:
Today's communication concept, which has a great revolution with the printing press which has been found by Gutenberg, has no boundary thanks to advanced communication devices and the internet. It is possible to take advantage in many areas, such as from medicine to social sciences or from mathematics to education, from the computers that was first produced for the purpose of military services. The use of these developing technologies in the field of education has created a great vision changes in both training and having education. Materials, which can be considered as basic communication resources and used in traditional education has begun to lose its significance, and some technologies have begun to replace them such as internet, computers, smart boards, projection devices and mobile phone. On the other hand, the programs and applications used in these technologies have also been developed. University students use virtual books instead of the traditional printed book, use cell phones instead of note books, use the internet and virtual databases instead of the library to research. They even submit their homework with interactive methods rather than printed materials. The traditional education system, these technologies, which increase productivity, have brought a new dimension to education. The aim of this study is to determine the influence of technologies in the learning process of students and to find whether is there any similarities and differences that arise from the their faculty that they have been educated and and their learning process. In addition to this, it is aimed to determine the level of ICT usage of students studying at the university level. In this context, the advantages and conveniences of the technology used by students are also scrutinized. In this study, we used surveys to collect data. The data were analyzed by using SPSS 16 statistical program with the appropriate testing.Keywords: education, communication technologies, role of technology, teaching
Procedia PDF Downloads 3031862 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 1981861 Understanding of Malaysian Community Disaster Resilience: Australian Scorecard Adaptation
Authors: Salizar Mohamed Ludin, Mohd Khairul Hasyimi Firdaus, Paul Arbon
Abstract:
Purpose: This paper aims to develop Malaysian Government and community-level critical thinking, planning and action for improving community disaster resilience by reporting Phase 1, Part 1 of a larger community disaster resilience measurement study about adapting the Torrens Resilience Institute Australian Community Disaster Resilience Scorecard to the Malaysian context. Methodology: Pparticipatory action research encouraged key people involved in managing the six most affected areas in the 2014 flooding of Kelantan in Malaysia’s north-east to participate in discussions about adapting and self-testing the Australian Community Disaster Resilience Scorecard to measure and improve their communities’ disaster resilience. Findings: Communities need to strengthen their disaster resilience through better communication, cross-community cooperation, maximizing opportunities to compare their plans, actions and reactions with those reported in research publications, and aligning their community disaster management with reported best practice internationally while acknowledging the need to adapt such practice to local contexts. Research implications: There is a need for a Malaysia-wide, simple-to-use, standardized disaster resilience scorecard to improve the quality, quantity and capability of healthcare and emergency services’ preparedness, and to facilitate urgent reallocation of aid. Value: This study is the first of its kind in Malaysia. The resulting community disaster resilience guideline based on participants’ feedback about the Kelantan floods and scorecard self-testing has the potential for further adaptation to suit contexts across Malaysia, as well as demonstrating how the scorecard can be adapted for international use.Keywords: community disaster resilience, CDR Scorecard, participatory action research, flooding, Malaysia
Procedia PDF Downloads 3361860 Minimizing thought Communication Gap between Designer and Client Using the Projective Personality Tests
Authors: Hira, Nisar Bhatti, Ezza
Abstract:
Contemporary studies support the strong co-relation between psychology and design. This study elaborates how different psychological personality test can help a fashion designer to judge the needs of their clients with respect to the customized clothing. This study will also help the designer to improve the lacking in the personality and will enable him to put his effort in required areas for grooming the customer. The use of psychology test to support the choice of certain design strategies that how the right clothing can make client a better intellectual with enhanced self-esteem and confidence. Different projective personality test are being used to suggest to evaluate personality traits. The Rorschach Inkblot Test is projective mental comprising of 10 ink-blots synonymous with the clinical brain research. Lüsher Color Diagnostics measures a person’s psycho physical state, his or her ability to withstand stress to perform and communicate. HTP is a projective responsibility test measuring self-perception, attitudes. The TAT test intend to evaluate a person’s patterns of thoughts, attitudes, observation, capacity and emotional response to this ambiguous test materials. No doubt designers are already crucially redesigning the individuals by their attires, but to expose the behavioral mechanism of the customer, designers should be able to recognize the hidden complexity behind his client by using the above mentioned methods. The study positively finds the design and psychology need to become substantially contacted in order to create a new regime of norms to groom a personality under the concentration and services of a fashion designer in terms of clothing.Keywords: projective personality tests, customized clothing, Rorschach Inkblot Test, TAT, HTP, Lüsher Color Diagnostics
Procedia PDF Downloads 5551859 Interrogating Economic Growth and Development in Nigeria: The Challenges
Authors: Enojo Kennie Enojo
Abstract:
The paper focuses on the contradictions of economic growth and development in Nigeria with specific reference to the plethora issues and challenges associated with the sordid situation. The broad objective is to investigate the major causes of agitation for restructuring the entire political spectrum that promote and guarantee economic growth and development with empirical intellectual standpoint. The specific aim is to surgically examine the organic linkage between weaker institutions, lack of vibrant civil society, poor governance and the agitation for restructuring. The paper adopts the secondary source of data collection as its methodological strategy. Our findings reveals that most urban and rural dwellers where goods and services are either extracted, produced, or manufactured lack infrastructural facilities, preventing economic growth and development, which has been the consequence of poverty, inequality and unemployment. There is equally the issue of disconnection of the political class from the electorate, this is evident in lack of political power base not located in the society but rather with either the elites or godfathers this and many factors are responsible for flawed electoral system from 1999 to 2023 general elections. These egregious factors and others have resulted in the subscription of religion and ethnicity thereby the devaluation of national norms, identities and values. We adopt the combination of structural-functional approach, relative deprivation; rising expectation, frustration and aggression model to enable us critically interrogate these contradictions as subterfuge with both the centrifugal and centripetal forces constantly in fatality. We recommend among others that, there should be development across the federating units without prejudice.Keywords: restructuring, infrastructure, economic development, governance
Procedia PDF Downloads 391858 The Paradox of Decentralization and Civic Culture: An Exploratory Study Applied to Local Governments in Papua New Guinea
Authors: Francis Wargirai
Abstract:
Since gaining independence in 1975, Papua New Guinea`s core challenge has been the consolidation of democracy against a backdrop of enormous social, political and territorial diversity. Consequently, the government has implemented several political reforms including decentralization. Constitutional planners believed that national unity, would be better achieved by sharing state power over centralization. They anticipated that this would institutionalize a democratic civic culture by providing opportunities to groups and individuals to make political decisions within their jurisdiction. This would then eventually lead to confidence and participation in the larger entity of the state. In retrospect, civil society and community based groups are largely underrated and have had minimal influence on decisions at the local level, consequently contributing to nepotism, patronism and cynicism. By applying an elitist approach to analyze how national political leaders exert their influence and power within the local government system and local communities, this paper argues that decentralization has fragmented local communities. With an absence of political party roots and deeply divided ethnic groups, national political leaders have used divide and rule tactics resulting in mistrust among citizens. Through their influence and power within local governments to dictate projects and services to certain areas, this has resulted in skepticism and divisions among civil society along different cultural cleavages. This has been a contributing factor to anomalies in democratic consolidation and democratic political culture in Papua New Guinea.Keywords: civic culture, cultural cleavages, decentralization, democratic consolidation
Procedia PDF Downloads 1741857 Sentiment Analysis of Fake Health News Using Naive Bayes Classification Models
Authors: Danielle Shackley, Yetunde Folajimi
Abstract:
As more people turn to the internet seeking health-related information, there is more risk of finding false, inaccurate, or dangerous information. Sentiment analysis is a natural language processing technique that assigns polarity scores to text, ranging from positive, neutral, and negative. In this research, we evaluate the weight of a sentiment analysis feature added to fake health news classification models. The dataset consists of existing reliably labeled health article headlines that were supplemented with health information collected about COVID-19 from social media sources. We started with data preprocessing and tested out various vectorization methods such as Count and TFIDF vectorization. We implemented 3 Naive Bayes classifier models, including Bernoulli, Multinomial, and Complement. To test the weight of the sentiment analysis feature on the dataset, we created benchmark Naive Bayes classification models without sentiment analysis, and those same models were reproduced, and the feature was added. We evaluated using the precision and accuracy scores. The Bernoulli initial model performed with 90% precision and 75.2% accuracy, while the model supplemented with sentiment labels performed with 90.4% precision and stayed constant at 75.2% accuracy. Our results show that the addition of sentiment analysis did not improve model precision by a wide margin; while there was no evidence of improvement in accuracy, we had a 1.9% improvement margin of the precision score with the Complement model. Future expansion of this work could include replicating the experiment process and substituting the Naive Bayes for a deep learning neural network model.Keywords: sentiment analysis, Naive Bayes model, natural language processing, topic analysis, fake health news classification model
Procedia PDF Downloads 971856 A Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State
Authors: Abimbola Olaotan Akinsete
Abstract:
Government all over the world has intensified efforts in making internet and resource centres readily available in public institutions and centres for the advancement of humanity and working processes. Information and communication resource centre will not only help in the reduction of task that are presumed to be herculean. This centres influenced the working rate and productivity of both staffs and students and its benefit. The utilization of the internet and information resource centre will not only speed up service delivery, working time and efficiency of the system. Information and Communication Technology plays significant roles in presenting equalization strategy for developing university community and improving educational service delivery. This equalization will not only advance, accelerate and ensure results are accessed electronically, ensuring the transfer and confirmation of students’ academic records and their results in the world without physically available to request for these services. This study seeks to make Critical Appraisal of Adekunle Ajasin University Policy on Internet Resource Centre in Service Delivery Adekunle Ajasin University, Akungba-Akoko, Ondo State. The study employ descriptive survey design method in identifying hindrances of the non-utilization of technology in the service delivery in the university. Findings revealed that the adoption of internet and resource centre in the Exams and Records unit of the University shall help in delivering more in students’ records/results processing.Keywords: internet, resource, centre, policy and service delivery
Procedia PDF Downloads 1021855 ID + PD: Training Instructional Designers to Foster and Facilitate Learning Communities in Digital Spaces
Authors: Belkis L. Cabrera
Abstract:
Contemporary technological innovations have reshaped possibility, interaction, communication, engagement, education, and training. Indeed, today, a high-quality technology enhanced learning experience can be transformative as much for the learner as for the educator-trainer. As innovative technologies continue to facilitate, support, foster, and enhance collaboration, problem-solving, creativity, adaptiveness, multidisciplinarity, and communication, the field of instructional design (ID) also continues to develop and expand. Shifting its focus from media to the systematic design of instruction, or rather from the gadgets and devices themselves to the theories, models, and impact of implementing educational technology, the evolution of ID marks a restructuring of the teaching, learning, and training paradigms. However, with all of its promise, this latter component of ID remains underdeveloped. The majority of ID models are crafted and guided by learning theories and, therefore, most models are constructed around student and educator roles rather than trainer roles. Thus, when these models or systems are employed for training purposes, they usually have to be re-fitted, tweaked, and stretched to meet the training needs. This paper is concerned with the training or professional development (PD) facet of instructional design and how ID models built on teacher-to-teacher interaction and dialogue can support the creation of professional learning communities (PLCs) or communities of practice (CoPs), which can augment learning and PD experiences for all. Just as technology is changing the face of education, so too can it change the face of PD within the educational realm. This paper not only provides a new ID model but using innovative technologies such as Padlet and Thinkbinder, this paper presents a concrete example of how a traditional body-to-body, brick, and mortar learning community can be transferred and transformed into the online context.Keywords: communities of practice, e-learning, educational reform, instructional design, professional development, professional learning communities, technology, training
Procedia PDF Downloads 3401854 Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
Authors: B. O. Diyaolu
Abstract:
The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.Keywords: adequate security, fans attendance, football fans, football stadium, Nigeria professional football league
Procedia PDF Downloads 1151853 Identification of Watershed Landscape Character Types in Middle Yangtze River within Wuhan Metropolitan Area
Authors: Huijie Wang, Bin Zhang
Abstract:
In China, the middle reaches of the Yangtze River are well-developed, boasting a wealth of different types of watershed landscape. In this regard, landscape character assessment (LCA) can serve as a basis for protection, management and planning of trans-regional watershed landscape types. For this study, we chose the middle reaches of the Yangtze River in Wuhan metropolitan area as our study site, wherein the water system consists of rich variety in landscape types. We analyzed trans-regional data to cluster and identify types of landscape characteristics at two levels. 55 basins were analyzed as variables with topography, land cover and river system features in order to identify the watershed landscape character types. For watershed landscape, drainage density and degree of curvature were specified as special variables to directly reflect the regional differences of river system features. Then, we used the principal component analysis (PCA) method and hierarchical clustering algorithm based on the geographic information system (GIS) and statistical products and services solution (SPSS) to obtain results for clusters of watershed landscape which were divided into 8 characteristic groups. These groups highlighted watershed landscape characteristics of different river systems as well as key landscape characteristics that can serve as a basis for targeted protection of watershed landscape characteristics, thus helping to rationally develop multi-value landscape resources and promote coordinated development of trans-regions.Keywords: GIS, hierarchical clustering, landscape character, landscape typology, principal component analysis, watershed
Procedia PDF Downloads 2281852 Galtung’s Violence Triangle: We Need to Be Thinking Upside Down
Authors: Michael Fusi Ligaliga
Abstract:
Peace and Conflict Studies (PACS), despite being a new pedagogical discipline, is a growing interdisciplinary academic field that has expanded its presence from the traditional lens of war, conflict, and violence to addressing various social issues impacting society. Family and domestic violence (FDV) has seldom been explored through the PACS lens despite some studies showing that “on average, nearly 20 people per minute are physically abused by an intimate partner in the United States. Over one year, this equates to more than 10 million women and men.” In the Pacific, FDV rates are some of the highest in the world. The friction caused by cultural practices reinforcing patriarchy and male impunity, compounded by historical colonial experiences, as well as the impact of Christianity on the Pacific region, creates a complex social landscape when thinking about and addressing FDV in the Pacific. This paper seeks to re-examine Johan Galtung’s violence triangle (GVT) theory and its application to understanding FDV in the Pacific. Galtung argues that there are three forms of violence – direct, structural, and cultural. Direct violence (DV) is behaviors that threaten life itself or diminishes the ability of a person to meet his or her basic needs. This form of violence is visible because it is manifested in behaviors such as killing, maiming, sexual assault, etc. Structural violence (SV) exists when people do not get equal access to goods and services (health, education, justice) that enable them to reach their full potential. When ideologies embedded in cultural norms and practices are used to justify and advocate acts of violence by shifting the moral parameters from being wrong to right or acceptable, this, according to Galtung, is referred to as Cultural violence (CV).Keywords: direct violence, cultural violence, structural violence, indigenous peacebuilding, samoa
Procedia PDF Downloads 771851 Social Crises and Its Impact on the Environment: Case Study of Jos, Plateau State
Authors: A. B. Benshak, M. G. Yilkangnha, V. Y. Nanle
Abstract:
Social crises and violent conflict can inflict direct (short-term) impact on the environment like poisoning water bodies, climate change, deforestation, destroying the chemical component of the soil due to the chemical and biological weapons used. It can also impact the environment indirectly (long-term), e.g., the destruction of political and economic infrastructure to manage the environmental resources and breaking down traditional conservation practices, population displacement and refugee flows which puts pressure on the already inadequate resources, infrastructure, facilities, amenities, services etc. This study therefore examines the impact of social crises on the environment in Jos Plateau State with emphasis on the long-term impact, analyze the relationship between crises and the environment and assess the perception of people on social crises because much work have concentrated on other repercussions such as the economy, health etc that are more politically expedient. The data for this research were collected mostly through interviews, questionnaire, dailies and reports on the subject matter. The data and findings were presented in tables and results showed that the environment is directly and indirectly impacted by crises and that these impacts can in turn result to a continuous cycle of violent activities if not addressed because of the inadequacies in the supply of infrastructural facilities, resources and so on caused by the inflow of displaced population. Recommendations were made on providing security to minimize conflict occurrences in Jos and its environs, minimizing the impact of social crises on the environment, provision of adequate infrastructural facilities to carter for population rise, renewal and regeneration schemes, etc. which will go a long way in mitigating the impact of crises on the environment.Keywords: environment, impact, long-term, social crises
Procedia PDF Downloads 3421850 A Study on the Impact of Perceived Benefits and Switching Costs of Consumers When Shifting from Brick and Mortar Store to Online Shopping of Apparels
Authors: Havisha Banda
Abstract:
Recent advancements in technology have facilitated commerce around the globe. The online medium of commerce has provided and will continue to provide great opportunities for consumers and businesses. Advancements in technology enable apparel stores, for instance, to improve their online services by using personalized virtual models allowing consumers to visualize the product on the model to determine correct sizing and fit. In addition to many advantages in online shopping the consumers will also have to undergo many types of switching costs in this process of buying apparel online. This study is to identify such switching costs and switching benefits from traditional shopping to online shopping and to understand what the consumers value the most. The scope of this study is to understand the types of switching costs and the factors that actually allow the consumers to shift from brick and mortar to online shopping and also to understand why a certain set of customers consider to purchase offline. Hence this study helps to understand the perceived cost and perceived benefit relation that the consumer draws in purchasing the garments online. This will help the upcoming e-commerce sites and brick and mortar store to understand the various factors and formulate new policies and implement strategies in their own ways to attract the customers and to retain them. A sample of 35 is considered for the process of laddered interviews. In the era of e-commerce there are people who feel comfortable to shop in a retail store rather than online purchase. Few respondents who shop online do not prefer to shop apparel online. Few respondents said that they shop online only for apparels. Most of the variables match in terms of switching costs and also in regard to benefits.Keywords: e-commerce, switching costs, switching benefits, apparel shopping
Procedia PDF Downloads 3181849 An Evaluation of the Effectiveness of the Juvenile Justice in Rehabilitating the Youth in South Africa
Authors: Leah Gwatimba, Nanga Raymond Raselekoane
Abstract:
The incidences of youth who engage in unlawful or criminal activities are of great concern for the criminal justice system and government in South Africa. In terms of the juvenile justice system in South Africa, under-age youth who have been found guilty and sentenced to serve a jail term cannot be sent to the same detention facility as adults. The juvenile justice system is meant to protect young offenders from physical, emotional and mental exploitation by adult prisoners. Under-age young offenders should be assisted and exposed to educational, entrepreneurial and behavioral programmes that can equip them with the much needed skills that will turn them into law-abiding and economically productive citizens. The aim of this study was to evaluate the effectiveness of the justice system in South Africa in the rehabilitation young offenders. A qualitative method was used. The study used the non-probability purposive sampling to select the respondents. In-depth interviews, focus groups, observation and thematic coding were used to collect and analyse the data respectively. The study population consisted of social workers and offending youth. The sample comprised of 16 respondents (i.e. 4 social workers and twelve offending youth (6 males and 6 females). The study indicated that there is worrying recurrence of the anti-social behavior by some of the young offenders. According to this study, the effectiveness of the juvenile justice system in the rehabilitation of the offending youth can be achieved by paying serious attention to follow-up services, participation of families of the offending youth in the diversion programmes and by improving the socio-economic conditions in the homes and communities of the offending youth.Keywords: juvenile delinquent, juvenile justice system, diversion programmes, rehabilitation, restorative justice
Procedia PDF Downloads 3221848 Digital Platform for Psychological Assessment Supported by Sensors and Efficiency Algorithms
Authors: Francisco M. Silva
Abstract:
Technology is evolving, creating an impact on our everyday lives and the telehealth industry. Telehealth encapsulates the provision of healthcare services and information via a technological approach. There are several benefits of using web-based methods to provide healthcare help. Nonetheless, few health and psychological help approaches combine this method with wearable sensors. This paper aims to create an online platform for users to receive self-care help and information using wearable sensors. In addition, researchers developing a similar project obtain a solid foundation as a reference. This study provides descriptions and analyses of the software and hardware architecture. Exhibits and explains a heart rate dynamic and efficient algorithm that continuously calculates the desired sensors' values. Presents diagrams that illustrate the website deployment process and the webserver means of handling the sensors' data. The goal is to create a working project using Arduino compatible hardware. Heart rate sensors send their data values to an online platform. A microcontroller board uses an algorithm to calculate the sensor heart rate values and outputs it to a web server. The platform visualizes the sensor's data, summarizes it in a report, and creates alerts for the user. Results showed a solid project structure and communication from the hardware and software. The web server displays the conveyed heart rate sensor's data on the online platform, presenting observations and evaluations.Keywords: Arduino, heart rate BPM, microcontroller board, telehealth, wearable sensors, web-based healthcare
Procedia PDF Downloads 1261847 Count of Trees in East Africa with Deep Learning
Authors: Nubwimana Rachel, Mugabowindekwe Maurice
Abstract:
Trees play a crucial role in maintaining biodiversity and providing various ecological services. Traditional methods of counting trees are time-consuming, and there is a need for more efficient techniques. However, deep learning makes it feasible to identify the multi-scale elements hidden in aerial imagery. This research focuses on the application of deep learning techniques for tree detection and counting in both forest and non-forest areas through the exploration of the deep learning application for automated tree detection and counting using satellite imagery. The objective is to identify the most effective model for automated tree counting. We used different deep learning models such as YOLOV7, SSD, and UNET, along with Generative Adversarial Networks to generate synthetic samples for training and other augmentation techniques, including Random Resized Crop, AutoAugment, and Linear Contrast Enhancement. These models were trained and fine-tuned using satellite imagery to identify and count trees. The performance of the models was assessed through multiple trials; after training and fine-tuning the models, UNET demonstrated the best performance with a validation loss of 0.1211, validation accuracy of 0.9509, and validation precision of 0.9799. This research showcases the success of deep learning in accurate tree counting through remote sensing, particularly with the UNET model. It represents a significant contribution to the field by offering an efficient and precise alternative to conventional tree-counting methods.Keywords: remote sensing, deep learning, tree counting, image segmentation, object detection, visualization
Procedia PDF Downloads 711846 Selection of a Potential Starter Culture for Milk Fermentation
Authors: Stephen Olusanmi Akintayo, Ilesanmi Fadahunsi
Abstract:
The ability of Lactic acid bacteria (LAB) to grow and survive in milk is being exploited in industrial and biotechnological applications. Although considerable studies have been reported on the fermentation of milk, however, not so much work has been documented on the selection of LAB strains from milk of the Nigerian local cattle breeds for their starter culture potentials. A total of 110 LAB were isolated from raw milk of Sokoto gudali cattle breed. The isolates were screened for their proteolytic activities on skimmed milk media with isolates A07, F06 and A01 showing the highest zone of clearance of 18.5mm, 18.5mm, and 18.0mm respectively and were selected for the studies of their growth in different constituents of milk. A01, F06, and A07 were identified as Pediococcus acidilactici, Lactococcus raffinolactis, and Leuconostoc mesenteriodes respectively using cultural, biochemical, physiological and molecular characterization techniques. Leuconostoc mesenteriodes showed the highest growth in all the milk components that were used in this study. The three LAB species selected showed a growth range of 6.46 log cfu/ml to 10.91 log cfu/ml in lactose with Leuconostoc mesenteriodes showing the highest growth of 10.91 log cfu/ml while Pediococcus acidilactici recorded the lowest growth of 9.78 log cfu/ml. In medium containing leucine as the only amino acid, the viable counts of Pediococcus acidilactici, Lactococcus raffinolactis and Leuconostoc mesenteriodes in log cfu/ml at zero hour were 6.39, 6.36 and 6.38 respectively which increased to 9.31 log cfu/ml, 9.21 log cfu/ml, 9.92 log cfu/ml respectively after 24 hours. Similarly, in all other substrates (casein, lysine, glutamic acid, aspartic acid, stearic acid and oleic acid ) tested in this study, Leuconostoc mesenteriodes showed the highest growth. It was observed that the highest quantity of lactic acid (15.31mg/ml) was produced by Leuconostoc mesenteriodes. The same trend was also observed in the production of diacetyl and hydrogen peroxide by the three tested microorganisms. Due to its ability to grow maximally in milk components, Leuconostoc mesenteriodes shows potential as starter culture for milk fermentation.Keywords: Leuconostoc mesenteriodes, lactic acid bacteria, Sokoto gudali, starter culture
Procedia PDF Downloads 2351845 Nutritional Allowance Support Affecting Treatment Compliance among TB Patients in Western, Nepal
Authors: Yadav R. K., Baral S.
Abstract:
Introduction: Nepal is one of the world’s least developed countries and has a high incidence of tuberculosis (TB). The TB prevalence survey in 2019 showed 69,000 Nepalese is developing TB and 4,000 die every year. Given its disproportionate impact on the impoverished segments of society, TB often thrusts patients into extreme poverty or exacerbates their existing economic struggles. Consequently, not only the patients but also their families suffer from the loss of livelihood. This study aims to assess the support of nutritional allowance on treatment compliance among retreatment tuberculosis patients in Nepal. This is a secondary analysis of data from HMIS (Health Management Information System) to investigate treatment compliance among tuberculosis patients and its association with nutritional allowance. The study population consisted of all individuals (N=2972) who had received services from July 16, 2021, to December 14, 2022. The SPSS 21version was used to conduct descriptive and bivariate analysis. Out of the total TB patients (n=2972), a third-fourth (65.9%) of TB patients were male. More than one-tenth (12.3%) of respondents received a nutrition support allowance. The TB treatment compliance rate was more (89.91%) in the nutrition support allowance group compared to the non-nutritional support group (87.98%). TB patients who received the nutritional support allowance were nearly twice as likely to have a higher TB treatment compliance rate compared to those who did not receive the nutritional support allowance. Providing nutritional allowance support to tuberculosis (TB) patients can play a significant role in improving treatment compliance and outcomes. Age and the type of TB are important factors that have shown statistical significance in relation to treatment compliance. Therefore, it is recommended to provide nutritional allowance support to both new and retreatment TB patients. To enhance treatment compliance among TB patients, it is beneficial to provide timely nutrition allowances and arrange home visits by TB focal persons.Keywords: nutrition, support, treatment compliance, TB, Nepal
Procedia PDF Downloads 1411844 Life Cycle Assessment of Rare Earth Metals Production: Hotspot Analysis of Didymium Electrolysis Process
Authors: Sandra H. Fukurozaki, Andre L. N. Silva, Joao B. F. Neto, Fernando J. G. Landgraf
Abstract:
Nowadays, the rare earth (RE) metals play an important role in emerging technologies that are crucial for the decarbonisation of the energy sector. Their unique properties have led to increasing clean energy applications, such as wind turbine generators, and hybrid and electric vehicles. Despite the substantial media coverage that has recently surrounded the mining and processing of rare earth metals, very little quantitative information is available concerning their subsequent life stages, especially related to the metallic production of didymium (Nd-Pr) in fluoride molten salt system. Here we investigate a gate to gate scale life cycle assessment (LCA) of the didymium electrolysis based on three different scenarios of operational conditions. The product system is modeled with SimaPro Analyst 8.0.2 software, and IMPACT 2002+ was applied as an impact assessment tool. In order to develop a life cycle inventories built in software databases, patents, and other published sources together with energy/mass balance were utilized. Analysis indicates that from the 14 midpoint impact categories evaluated, the global warming potential (GWP) is the main contributors to the total environmental burden, ranging from 2.7E2 to 3.2E2 kg CO2eq/kg Nd-Pr. At the damage step assessment, the results suggest that slight changes in materials flows associated with enhancement of current efficiency (between 2.5% and 5%), could lead a reduction up to 12% and 15% of human health and climate change damage, respectively. Additionally, this paper highlights the knowledge gaps and future research efforts needing to understand the environmental impacts of Nd-Pr electrolysis process from the life cycle perspective.Keywords: didymium electrolysis, environmental impacts, life cycle assessment, rare earth metals
Procedia PDF Downloads 1861843 Bio-Estimation of Selected Heavy Metals in Shellfish and Their Surrounding Environmental Media
Authors: Ebeed A. Saleh, Kadry M. Sadek, Safaa H. Ghorbal
Abstract:
Due to the determination of the pollution status of fresh resources in the Egyptian territorial waters is very important for public health, this study was carried out to reveal the levels of heavy metals in the shellfish and their environment and its relation to the highly developed industrial activities in those areas. A total of 100 shellfish samples from the Rosetta, Edku, El-Maadiya, Abo-Kir and El-Max coasts [10 crustaceans (shrimp) and 10 mollusks (oysters)] were randomly collected from each coast. Additionally, 10 samples from both the water and the sediment were collected from each coast. Each collected sample was analyzed for cadmium, chromium, copper, lead and zinc residues using a Perkin Elmer atomic absorption spectrophotometer (AAS). The results showed that the levels of heavy metals were higher in the water and sediment from Abo-Kir. The heavy metal levels decreased successively for the Rosetta, Edku, El-Maadiya, and El-Max coasts, and the concentrations of heavy metals, except copper and zinc, in shellfish exhibited the same pattern. For the concentration of heavy metals in shellfish tissue, the highest was zinc and the concentrations decreased successively for copper, lead, chromium and cadmium for all coasts, except the Abo-Kir coast, where the chromium level was highest and the other metals decreased successively for zinc, copper, lead and cadmium. In Rosetta, chromium was higher only in the mollusks, while the level of this metal was lower in the crustaceans; this trend was observed at the Edku, El-Maadiya and El-Max coasts as well. Herein, we discuss the importance of such contamination for public health and the sources of shellfish contamination with heavy metals. We suggest measures to minimize and prevent these pollutants in the aquatic environment and, furthermore, how to protect humans from excessive intake.Keywords: atomic absorption, heavy metals, sediment, shellfish, water
Procedia PDF Downloads 3191842 Characterization of Atmospheric Aerosols by Developing a Cascade Impactor
Authors: Sapan Bhatnagar
Abstract:
Micron size particles emitted from different sources and produced by combustion have serious negative effects on human health and environment. They can penetrate deep into our lungs through the respiratory system. Determination of the amount of particulates present in the atmosphere per cubic meter is necessary to monitor, regulate and model atmospheric particulate levels. Cascade impactor is used to collect the atmospheric particulates and by gravimetric analysis, their concentration in the atmosphere of different size ranges can be determined. Cascade impactors have been used for the classification of particles by aerodynamic size. They operate on the principle of inertial impaction. It consists of a number of stages each having an impaction plate and a nozzle. Collection plates are connected in series with smaller and smaller cutoff diameter. Air stream passes through the nozzle and the plates. Particles in the stream having large enough inertia impact upon the plate and smaller particles pass onto the next stage. By designing each successive stage with higher air stream velocity in the nozzle, smaller diameter particles will be collected at each stage. Particles too small to be impacted on the last collection plate will be collected on a backup filter. Impactor consists of 4 stages each made of steel, having its cut-off diameters less than 10 microns. Each stage is having collection plates, soaked with oil to prevent bounce and allows the impactor to function at high mass concentrations. Even after the plate is coated with particles, the incoming particle will still have a wet surface which significantly reduces particle bounce. The particles that are too small to be impacted on the last collection plate are then collected on a backup filter (microglass fiber filter), fibers provide larger surface area to which particles may adhere and voids in filter media aid in reducing particle re-entrainment.Keywords: aerodynamic diameter, cascade, environment, particulates, re-entrainment
Procedia PDF Downloads 3201841 Cybersecurity Challenges in Africa
Authors: Chimmoe Fomo Michelle Larissa
Abstract:
The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime
Procedia PDF Downloads 401840 China's Soft Power and Its Strategy in West Asia
Authors: Iman Shabanzadeh
Abstract:
The economic growth and the special model of development in China have caused sensitivity in the public opinion of the world regarding the nature of this growth and development. In this regard, the Chinese have tried to put an end to such alarming procedures by using all the tools at their disposal and seek to present a peaceful and cooperative image of themselves. In this way, one of the most important diplomatic tools that Beijing has used to reduce the concerns caused by the Threat Theory has been the use of soft power resources and its tools in its development policies. This article begins by analyzing the concept of soft power and examining its foundations in international relations, and continues to examine the components of soft power in its Chinese version. The main purpose of the article is to figure out about the position of West Asia in China's soft power strategy and resources China use to achieve its goals in this region. In response to the main question, the paper's hypothesis is that soft power in its Chinese version had significant differences from Joseph Nye's original idea. In fact, the Chinese have imported the American version of soft power and adjusted, strengthened and, in other words, internalized it with their abilities, capacities and political philosophy. Based on this, China's software presence in West Asia can be traced in three areas. The first source of China's soft power in this region of West Asia is cultural in nature and is realized through strategies such as "use of educational tools and methods", "media methods" and "tourism industry". The second source is related to political soft power, which is applied through the policy of "balance of influence" and the policy of "mediation" and relying on the "ideological foundations of Confucianism". The third source also refers to China's economic soft power and is realized through three tools: "energy exchanges", "foreign investments" and "Belt-Road initiative". The research method of this article is descriptive-analytical.Keywords: soft power, cooperative power, china, west asia
Procedia PDF Downloads 60