Search results for: regional knowledge networks
10963 Performance Analysis of Heterogeneous Cellular Networks with Multiple Connectivity
Authors: Sungkyung Kim, Jee-Hyeon Na, Dong-Seung Kwon
Abstract:
Future mobile networks following 5th generation will be characterized by one thousand times higher gains in capacity; connections for at least one hundred billion devices; user experience capable of extremely low latency and response times. To be close to the capacity requirements and higher reliability, advanced technologies have been studied, such as multiple connectivity, small cell enhancement, heterogeneous networking, and advanced interference and mobility management. This paper is focused on the multiple connectivity in heterogeneous cellular networks. We investigate the performance of coverage and user throughput in several deployment scenarios. Using the stochastic geometry approach, the SINR distributions and the coverage probabilities are derived in case of dual connection. Also, to compare the user throughput enhancement among the deployment scenarios, we calculate the spectral efficiency and discuss our results.Keywords: heterogeneous networks, multiple connectivity, small cell enhancement, stochastic geometry
Procedia PDF Downloads 33510962 Modelling Public Knowledge and Attitude towards Genetically Modified Maize in Kenya
Authors: Ezrah Kipkirui Tonui, George Otieno Orwa
Abstract:
A survey of 138 farmers was conducted in Rift valley, Kenya, in November and December 2013 in three counties (Uasin-gishu, Elgeyo-marakwet, and Tranzoia) to determine public knowledge and attitude towards genetically modified (GM) maize. Above two third (70%) of the respondents had knowledge of GM maize, mostly those educated and male. Female was found to be having low knowledge on GM maize. Public acknowledged the technology’s potential positive impacts, with more than 90% willing to adopt and more than 98% willing to buy GM seedlings at any given price. A small percentage less than 3% were of a negative opinion about willing to buy and adopt GM seeds. We conclude that GM technology has a role to play in food security in Kenya. However, the public needs more information about the technology, which can be provided through established sources of information and training. Finally, public knowledge and attitude on GM maize should be studied on a regular basis, and the survey population broadened to 47 counties.Keywords: public, knowledge, attitudes, GM maize, Kenya
Procedia PDF Downloads 31110961 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 43310960 Long Short-Time Memory Neural Networks for Human Driving Behavior Modelling
Authors: Lu Zhao, Nadir Farhi, Yeltsin Valero, Zoi Christoforou, Nadia Haddadou
Abstract:
In this paper, a long short-term memory (LSTM) neural network model is proposed to replicate simultaneously car-following and lane-changing behaviors in road networks. By combining two kinds of LSTM layers and three input designs of the neural network, six variants of the LSTM model have been created. These models were trained and tested on the NGSIM 101 dataset, and the results were evaluated in terms of longitudinal speed and lateral position, respectively. Then, we compared the LSTM model with a classical car-following model (the intelligent driving model (IDM)) in the part of speed decision. In addition, the LSTM model is compared with a model using classical neural networks. After the comparison, the LSTM model demonstrates higher accuracy than the physical model IDM in terms of car-following behavior and displays better performance with regard to both car-following and lane-changing behavior compared to the classical neural network model.Keywords: traffic modeling, neural networks, LSTM, car-following, lane-change
Procedia PDF Downloads 26310959 Knowledge and Attitude of Palliative Care Towards Work Performance of Nurses in Private Hospital
Authors: Novita Verayanti Manalu, Alvin Salim
Abstract:
Background: Palliative care is caring holistically for patients and families to improve their quality of life. Experts stated that palliative care could be applied not only for terminally ill cases but also for acute illnesses. Therefore, this study wants to find out the level of knowledge about palliative care of the nurses along with the relationship with attitude and performance. Method: This study applies a cross-sectional survey design and allows the respondents to fill two questionnaires to determine the level of knowledge and attitude toward palliative care, while one questionnaire is filled out by the head nurse to evaluate nurses’ performance. The relationship was analyzed by Spearman rho’s correlation in alpha < 0,05 by SPSS. Results: The majority of respondents were females, aged above 25 years old, and married. Most of the nurses are staff nurses and the ratio of education level is not significantly different. The knowledge level is poor, while the attitude and performance are at an adequate level. Knowledge may affect attitude, but it doesn’t happen toward performance. Conclusion: There is a need for increased knowledge about palliative care to improve attitude and work performance. Future researchers might use this finding as a reference to conduct further study in improving knowledge of palliative care.Keywords: knowledge, attitude, work performance, palliative care
Procedia PDF Downloads 20710958 Natural Emergence of a Core Structure in Networks via Clique Percolation
Authors: A. Melka, N. Slater, A. Mualem, Y. Louzoun
Abstract:
Networks are often presented as containing a “core” and a “periphery.” The existence of a core suggests that some vertices are central and form the skeleton of the network, to which all other vertices are connected. An alternative view of graphs is through communities. Multiple measures have been proposed for dense communities in graphs, the most classical being k-cliques, k-cores, and k-plexes, all presenting groups of tightly connected vertices. We here show that the edge number thresholds for such communities to emerge and for their percolation into a single dense connectivity component are very close, in all networks studied. These percolating cliques produce a natural core and periphery structure. This result is generic and is tested in configuration models and in real-world networks. This is also true for k-cores and k-plexes. Thus, the emergence of this connectedness among communities leading to a core is not dependent on some specific mechanism but a direct result of the natural percolation of dense communities.Keywords: cliques, core structure, percolation, phase transition
Procedia PDF Downloads 17210957 Piracy in Southeast Asian Waters: Problems, Legal Measures and Way Forward
Authors: Ahmad Almaududy Amri
Abstract:
Southeast Asia is considered as an area which is important in terms of piratical studies. There are several reasons to this argument: firstly, it has the second highest figure of piracy attacks in the world from 2008 to 2012. Only the African Region transcends the number of piracies that were committed in Southeast Asia. Secondly, the geographical location of the region is very important to world trade. There are several sea lanes and straits which are normally used for international navigation mainly for trade purposes. In fact, there are six out of 25 busiest ports all over the world located in Southeast Asia. In ancient times, the main drivers of piracy were raiding for plunder and capture of slaves; however, in modern times, developments in politics, economics and even military technology have drastically altered the universal crime of piracy. There are a variety of motives behind modern day piracy including economic gains from receiving ransoms from government or ship companies, political and even terrorist reasons. However, it cannot be denied that piratical attacks persist and continue. States have taken measures both at the international and regional level in order to eradicate piratical attacks. The United Nations Convention on the Law of the Sea and the Convention on the Suppression of Unlawful Act against the Safety of Navigation served as the two main international legal frameworks in combating piracy. At the regional level, Regional Cooperation Agreement against Piracy and Armed Robbery and ASEAN measures are regard as prominent in addressing the piracy problem. This paper will elaborate the problems of piracy in Southeast Asia and examine the adequacy of legal frameworks at both the international and regional levels in order address the current legal measures in combating piracy. Furthermore, it will discuss current challenges in the implementation of anti-piracy measures at the international and regional levels as well as the way forward in addressing the issue.Keywords: piracy, Southeast Asia, maritime security, legal frameworks
Procedia PDF Downloads 50410956 Conceptual Modeling of the Relationship between Project Management Practices and Knowledge Absorptive Capacity Using Interpretive Structural Modeling Method
Authors: Seyed Abdolreza Mosavi, Alireza Babakhan, Elham Sadat Hoseinifard
Abstract:
Knowledge-based firms need to design mechanisms for continuous absorptive and creation of knowledge in order to ensure their survival in the competitive arena and to follow the path of development. Considering the project-oriented nature of product development activities in knowledge-based firms on the one hand and the importance of analyzing the factors affecting knowledge absorptive capacity in these firms on the other, the purpose of this study is to identify and classify the factors affecting project management practices on absorptive knowledge capacity. For this purpose, we have studied and reviewed the theoretical literature in the field of project management and absorptive knowledge capacity so as to clarify its dimensions and indexes. Then, using the ISM method, the relationship between them has been studied. To collect data, 21 questionnaires were distributed in project-oriented knowledge-based companies. The results of the ISM method analysis provide a model for the relationship between project management activities and knowledge absorptive capacity, which includes knowledge acquisition capacity, scope management, time management, cost management, quality management, human resource management, communications management, procurement management, risk management, stakeholders management and integration management. Having conducted the MICMAC analysis, we divided the variables into three groups of independent, relational and dependent variables and came up with no variables to be included in the group of autonomous variables.Keywords: knowledge absorptive capacity, project management practices, knowledge-based firms, interpretive structural modeling
Procedia PDF Downloads 19710955 Indigenous Knowledge Management: Towards Identification of Challenges and Opportunities in Developing Countries
Authors: Desmond Chinedu Oparaku, Emmanuel Uwazie Anyanwu, Oyemike Victor Benson, Ogbonna Isaac-Nnadimele
Abstract:
The purpose of this paper is to provide a theoretical discourse that highlights the challenges associated with management of indigenous knowledge with reference to developing countries. Literature review and brainstorming were used to collect relevant data and draw inferences. The findings indicate that non-existence of indigenous knowledge management policy (IKMP), low level of partnership drive among library and information services providers, non-uniformity of format and content of indigenous knowledge, inadequate funding, and lack of access to ICTs, lack of indigenous people with indigenous expertise and hoarding of knowledge as challenges to indigenous knowledge management. The study is based on literature review and information gathered through brain storming with professional colleagues the geographic scope as developing countries. The study has birth several implication based on the findings made. Professionally, it has necessitated the need for formulating a viable indigenous knowledge management policy (IKMP), creating of collaborative network through partnership, and integration of ICTs to indigenous knowledge management practices by libraries in developing countries etc. The originality of this paper is revealed in its capability as serving as an eye opener to librarians on the need for preserving and managing indigenous knowledge in developing countries. It further unlocks the possibilities of exploring empirical based researches to substantiate the theoretical issues raised in this paper. The findings may be used by library managers to improve indigenous knowledge management (IKM).Keywords: developing countries, ICTs, indigenous knowledge, knowledge management
Procedia PDF Downloads 34210954 Gender Effects in EEG-Based Functional Brain Networks
Authors: Mahdi Jalili
Abstract:
Functional connectivity in the human brain can be represented as a network using electroencephalography (EEG) signals. Network representation of EEG time series can be an efficient vehicle to understand the underlying mechanisms of brain function. Brain functional networks – whose nodes are brain regions and edges correspond to functional links between them – are characterized by neurobiologically meaningful graph theory metrics. This study investigates the degree to which graph theory metrics are sex dependent. To this end, EEGs from 24 healthy female subjects and 21 healthy male subjects were recorded in eyes-closed resting state conditions. The connectivity matrices were extracted using correlation analysis and were further binarized to obtain binary functional networks. Global and local efficiency measures – as graph theory metrics– were computed for the extracted networks. We found that male brains have a significantly greater global efficiency (i.e., global communicability of the network) across all frequency bands for a wide range of cost values in both hemispheres. Furthermore, for a range of cost values, female brains showed significantly greater right-hemispheric local efficiency (i.e., local connectivity) than male brains.Keywords: EEG, brain, functional networks, network science, graph theory
Procedia PDF Downloads 44410953 Consensus-Oriented Analysis Model for Knowledge Management Failure Evaluation in Uncertain Environment
Authors: Amir Ghasem Norouzi, Mahdi Zowghi
Abstract:
This study propose a framework based on the fuzzy T-Norms, T-conorm, a novel operator, and multi-expert approach to help organizations build awareness of the critical influential factors on the success of knowledge management (KM) implementation, analysis the failure of knowledge management. This study considers the complex uncertainty concept that is in knowledge management implementing capability (KMIC) and it is used by fuzzy logic for this reason. The contribution of our paper is shown with an empirical study in a nonprofit educational organization evaluation.Keywords: fuzzy logic, knowledge management, multi expert analysis, consensus oriented average operator
Procedia PDF Downloads 62810952 A Contemporary Advertising Strategy on Social Networking Sites
Authors: M. S. Aparna, Pushparaj Shetty D.
Abstract:
Nowadays social networking sites have become so popular that the producers or the sellers look for these sites as one of the best options to target the right audience to market their products. There are several tools available to monitor or analyze the social networks. Our task is to identify the right community web pages and find out the behavior analysis of the members by using these tools and formulate an appropriate strategy to market the products or services to achieve the set goals. The advertising becomes more effective when the information of the product/ services come from a known source. The strategy explores great buying influence in the audience on referral marketing. Our methodology proceeds with critical budget analysis and promotes viral influence propagation. In this context, we encompass the vital bits of budget evaluation such as the number of optimal seed nodes or primary influential users activated onset, an estimate coverage spread of nodes and maximum influence propagating distance from an initial seed to an end node. Our proposal for Buyer Prediction mathematical model arises from the urge to perform complex analysis when the probability density estimates of reliable factors are not known or difficult to calculate. Order Statistics and Buyer Prediction mapping function guarantee the selection of optimal influential users at each level. We exercise an efficient tactics of practicing community pages and user behavior to determine the product enthusiasts on social networks. Our approach is promising and should be an elementary choice when there is little or no prior knowledge on the distribution of potential buyers on social networks. In this strategy, product news propagates to influential users on or surrounding networks. By applying the same technique, a user can search friends who are capable to advise better or give referrals, if a product interests him.Keywords: viral marketing, social network analysis, community web pages, buyer prediction, influence propagation, budget constraints
Procedia PDF Downloads 26310951 Regional Anesthesia in Carotid Surgery: A Single Center Experience
Authors: Daniel Thompson, Muhammad Peerbux, Sophie Cerutti, Hansraj Riteesh Bookun
Abstract:
Patients with carotid stenosis, which may be asymptomatic or symptomatic in the form of transient ischaemic attack (TIA), amaurosis fugax, or stroke, often require an endarterectomy to reduce stroke risk. Risks of this procedure include stroke, death, myocardial infarction, and cranial nerve damage. Carotid endarterectomy is most commonly performed under general anaesthetic, however, it can also be undertaken with a regional anaesthetic approach. Our tertiary centre generally performs carotid endarterectomy under regional anaesthetic. Our major tertiary hospital mostly utilises regional anaesthesia for carotid endarterectomy. We completed a cross-sectional analysis of all cases of carotid endarterectomy performed under regional anaesthesia across a 10-year period between January 2010 to March 2020 at our institution. 350 patients were included in this descriptive analysis, and demographic details for patients, indications for surgery, procedural details, length of surgery, and complications were collected. Data was cross tabulated and presented in frequency tables to describe these categorical variables. 263 of the 350 patients in the analysis were male, with a mean age of 71 ± 9. 172 patients had a history of ischaemic heart disease, 104 had diabetes mellitus, 318 had hypertension, and 17 patients had chronic kidney disease greater than Stage 3. 13.1% (46 patients) were current smokers, and the majority (63%) were ex-smokers. Most commonly, carotid endarterectomy was performed conventionally with patch arterioplasty 96% of the time (337 patients). The most common indication was TIA and stroke in 64% of patients, 18.9% were classified as asymptomatic, and 13.7% had amaurosis fugax. There were few general complications, with 9 wound complications/infections, 7 postoperative haematomas requiring return to theatre, 3 myocardial infarctions, 3 arrhythmias, 1 exacerbation of congestive heart failure, 1 chest infection, and 1 urinary tract infection. Specific complications to carotid endarterectomy included 3 strokes, 1 postoperative TIA, and 1 cerebral bleed. There were no deaths in our cohort. This analysis of a large cohort of patients from a major tertiary centre who underwent carotid endarterectomy under regional anaesthesia indicates the safety of such an approach for these patients. Regional anaesthesia holds the promise of less general respiratory and cardiac events compared to general anaesthesia, and in this vulnerable patient group, calls for comparative research between local and general anaesthesia in carotid surgery.Keywords: anaesthesia, carotid endarterectomy, stroke, carotid stenosis
Procedia PDF Downloads 12110950 Improving Axial-Attention Network via Cross-Channel Weight Sharing
Authors: Nazmul Shahadat, Anthony S. Maida
Abstract:
In recent years, hypercomplex inspired neural networks improved deep CNN architectures due to their ability to share weights across input channels and thus improve cohesiveness of representations within the layers. The work described herein studies the effect of replacing existing layers in an Axial Attention ResNet with their quaternion variants that use cross-channel weight sharing to assess the effect on image classification. We expect the quaternion enhancements to produce improved feature maps with more interlinked representations. We experiment with the stem of the network, the bottleneck layer, and the fully connected backend by replacing them with quaternion versions. These modifications lead to novel architectures which yield improved accuracy performance on the ImageNet300k classification dataset. Our baseline networks for comparison were the original real-valued ResNet, the original quaternion-valued ResNet, and the Axial Attention ResNet. Since improvement was observed regardless of which part of the network was modified, there is a promise that this technique may be generally useful in improving classification accuracy for a large class of networks.Keywords: axial attention, representational networks, weight sharing, cross-channel correlations, quaternion-enhanced axial attention, deep networks
Procedia PDF Downloads 8410949 The Role of Social Networking in Activating the Participation of Youth in the Community
Authors: Raya Hamed Hial Al Maamari
Abstract:
The gulf societies have been undergoing radical changes because of the technology transfer. It altered the humanities attitudes. Especially, youth habits so they become a fond of using social networking. This study aimed to find out the ratio of social networking in Directing youth to participate with government institutions in decision-making and improving their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young men from different gulf countries, using an electronic questionnaire, with some interviews with famous leaders of youth groups. Finally, the researchers suggested many effective views to activate youth efforts using social networks as an effective manner to plan for the development policy and Implemented accurately in the community. The findings illustrated that social networks play a vital role in encouraging youth to participate Enthusiastically in providing the service. As it notices these networks contain large numbers of youth. Therefore, the influences become widely and feasible. Moreover, the study indicated the fact that most of youth teamwork started in these social networks. Then, it has been growing to the real society.Keywords: social work, volunteering, youth, community
Procedia PDF Downloads 34810948 Unleashing the Potential of Green Finance in Architecture: A Promising Path for Balkan Countries
Authors: Luan Vardari, Dena Arapi Vardari
Abstract:
The Balkan countries, known for their diverse landscapes and cultural heritage, face the dual challenge of promoting economic growth while addressing pressing environmental concerns. In recent years, the concept of green finance has emerged as a powerful tool to achieve sustainable development and mitigate the environmental impact of various sectors, including architecture. This extended abstract explores the untapped potential of green finance in architecture within the Balkan region and highlights its role in driving sustainable construction practices and fostering a greener future. The abstract begins by defining green finance and emphasizing its relevance in the context of the architectural sector in Balkan countries. It underlines the benefits of green finance, such as economic growth, environmental conservation, and social well-being. Integrating green finance into architectural projects is important as a means to achieve sustainable development goals while promoting financial viability. Also, delves into the current state of green building practices in the Balkan countries and identifies the need for financial support to further drive adoption. It explores the existing regulatory frameworks and policies that promote sustainable architecture and discusses how green finance can complement these initiatives. Unique challenges faced by Balkan countries are highlighted, along with the potential opportunities that green finance presents in overcoming these challenges. We highlight successful sustainable architectural projects in the region to showcase the practical application of green finance in the Balkans. These projects exemplify the effective utilization of green finance mechanisms, resulting in tangible economic and environmental impacts, including job creation, energy efficiency, and reduced carbon emissions. The abstract concludes by identifying replicable models and lessons learned from these projects that can serve as a blueprint for future sustainable architecture initiatives in the Balkans. The importance of collaboration and knowledge sharing among stakeholders is emphasized. Engaging architects, financial institutions, governments, and local communities is crucial to promoting green finance in architecture. The abstract suggests the establishment of knowledge exchange platforms and regional/international networks to foster collaboration and facilitate the sharing of expertise among Balkan countries.Keywords: sustainable finance, renewable energy, Balkan region, investment opportunities, green infrastructure, ESG criteria, architecture
Procedia PDF Downloads 7010947 Location Management in Wireless Sensor Networks with Mobility
Authors: Amrita Anil Agashe, Sumant Tapas, Ajay Verma Yogesh Sonavane, Sourabh Yeravar
Abstract:
Due to advancement in MEMS technology today wireless sensors network has gained a lot of importance. The wide range of its applications includes environmental and habitat monitoring, object localization, target tracking, security surveillance etc. Wireless sensor networks consist of tiny sensor devices called as motes. The constrained computation power, battery power, storage capacity and communication bandwidth of the tiny motes pose challenging problems in the design and deployment of such systems. In this paper, we propose a ubiquitous framework for Real-Time Tracking, Sensing and Management System using IITH motes. Also, we explain the algorithm that we have developed for location management in wireless sensor networks with the aspect of mobility. Our developed framework and algorithm can be used to detect emergency events and safety threats and provides warning signals to handle the emergency.Keywords: mobility management, motes, multihop, wireless sensor networks
Procedia PDF Downloads 42010946 A Quinary Coding and Matrix Structure Based Channel Hopping Algorithm for Blind Rendezvous in Cognitive Radio Networks
Authors: Qinglin Liu, Zhiyong Lin, Zongheng Wei, Jianfeng Wen, Congming Yi, Hai Liu
Abstract:
The multi-channel blind rendezvous problem in distributed cognitive radio networks (DCRNs) refers to how users in the network can hop to the same channel at the same time slot without any prior knowledge (i.e., each user is unaware of other users' information). The channel hopping (CH) technique is a typical solution to this blind rendezvous problem. In this paper, we propose a quinary coding and matrix structure-based CH algorithm called QCMS-CH. The QCMS-CH algorithm can guarantee the rendezvous of users using only one cognitive radio in the scenario of the asynchronous clock (i.e., arbitrary time drift between the users), heterogeneous channels (i.e., the available channel sets of users are distinct), and symmetric role (i.e., all users play a same role). The QCMS-CH algorithm first represents a randomly selected channel (denoted by R) as a fixed-length quaternary number. Then it encodes the quaternary number into a quinary bootstrapping sequence according to a carefully designed quaternary-quinary coding table with the prefix "R00". Finally, it builds a CH matrix column by column according to the bootstrapping sequence and six different types of elaborately generated subsequences. The user can access the CH matrix row by row and accordingly perform its channel, hoping to attempt rendezvous with other users. We prove the correctness of QCMS-CH and derive an upper bound on its Maximum Time-to-Rendezvous (MTTR). Simulation results show that the QCMS-CH algorithm outperforms the state-of-the-art in terms of the MTTR and the Expected Time-to-Rendezvous (ETTR).Keywords: channel hopping, blind rendezvous, cognitive radio networks, quaternary-quinary coding
Procedia PDF Downloads 9310945 Negotiating Increased Food Production with African Indigenous Agricultural Knowledge: The Ugandan Case
Authors: Harriet Najjemba, Simon Peter Rutabajuuka, Deo Katono Nzarwa
Abstract:
Scientific agricultural knowledge was introduced in Africa, including Uganda, during colonial rule. While this form of knowledge was introduced as part of Western scientific canon, African indigenous knowledge was not destroyed and has remained vital in food production. Modern scientific methods were devoted to export crops while food crop production was left to Africans who continued to use indigenous knowledge. Today, indigenous agricultural knowledge still provides farming skills and practices, more than a century since modern scientific agricultural knowledge was introduced in Uganda. It is evident that there is need to promote the still useful and more accessible indigenous agricultural practices in order to sustain increased food production. It is also important to have a tailor made agricultural knowledge system that combines practical indigenous practices with financially viable western scientific agricultural practices for sustained food production. The proposed paper will explain why the African indigenous agricultural knowledge has persisted and survived for over a century after colonial introduction of western scientific agricultural knowledge. The paper draws on research findings for a PhD study at Makerere University, Uganda. The study uses both written and oral sources, including colonial and postcolonial archival documents, and interviews. It critiques the parameters within which Western farming methods were introduced to African farmers.Keywords: food production, food shortage, indigenous agricultural knowledge, western scientific agricultural practices
Procedia PDF Downloads 46110944 NR/PEO Block Copolymer: A Chelating Exchanger for Metal Ions
Authors: M. S. Mrudula, M. R. Gopinathan Nair
Abstract:
In order to utilize the natural rubber for developing new green polymeric materials for specialty applications, we have prepared natural rubber and polyethylene oxide based polymeric networks by two shot method. The polymeric networks thus formed have been used as chelating exchanger for metal ion binding. Chelating exchangers are, in general, coordinating copolymers containing one or more electron donor atoms such as N, S, O, and P that can form coordinate bonds with metals. Hydrogels are water- swollen network of hydrophilic homopolymer or copolymers. They acquire a great interest due to the facility of the incorporation of different chelating groups into the polymeric networks. Such polymeric hydrogels are promising materials in the field of hydrometallurgical applications and water purification due to their chemical stability. The current study discusses the swelling response of the polymeric networks as a function of time, temperature, pH and [NaCl] and sorption studies. Equilibrium swelling has been observed to depend on both structural aspects of the polymers and environmental factors. Metal ion sorption shows that these polymeric networks can be used for removal, separation, and enrichment of metal ions from aqueous solutions and can play an important role for environmental remediation of municipal and industrial wastewater.Keywords: block copolymer, adsorption, chelating exchanger, swelling study, polymer, metal complexes
Procedia PDF Downloads 34310943 Knowledge Management and Tourism: An Exploratory Study Applied to Travel Agents in Egypt
Authors: Mohammad Soliman, Mohamed A. Abou-Shouk
Abstract:
Knowledge management focuses on the development, storage, retrieval, and dissemination of information and expertise. It has become an important tool to improve performance in tourism enterprises. This includes improving decision-making, developing customer services, and increasing sales and profits. Knowledge management adoption depends on human, organizational and technological factors. This study aims to explore the concept of knowledge management in travel agents in Egypt. It explores the requirements of adoption and its impact on performance in these agencies. The study targets Category A travel agents in Egypt. The population of the study encompasses Category A travel agents having online presence. An online questionnaire is used to collect data from managers of travel agents. This study is useful for travel agents who are in urgent need to restructure their intermediary role and support their survival in the global travel market. The study sheds light on the requirements of adoption and the expected impact on performance. This could help travel agents identify their situation and the determine the extent to which they are ready to adopt knowledge management. This study is contributing to knowledge by providing insights from the tourism sector in a developing country where the concept of knowledge management is still in its infancy stages.Keywords: knowledge management, knowledge management adoption, performance, travel agents
Procedia PDF Downloads 39710942 Adaptive Routing Protocol for Dynamic Wireless Sensor Networks
Authors: Fayez Mostafa Alhamoui, Adnan Hadi Mahdi Al- Helali
Abstract:
The main issue in designing a wireless sensor network (WSN) is the finding of a proper routing protocol that complies with the several requirements of high reliability, short latency, scalability, low power consumption, and many others. This paper proposes a novel routing algorithm that complies with these design requirements. The new routing protocol divides the WSN into several sub-networks and each sub-network is divided into several clusters. This division is designed to reduce the number of radio transmission and hence decreases the power consumption. The network division may be changed dynamically to adapt with the network changes and allows the realization of the design requirements.Keywords: wireless sensor networks, routing protocols, AD HOC topology, cluster, sub-network, WSN design requirements
Procedia PDF Downloads 53810941 Enhancing Throughput for Wireless Multihop Networks
Authors: K. Kalaiarasan, B. Pandeeswari, A. Arockia John Francis
Abstract:
Wireless, Multi-hop networks consist of one or more intermediate nodes along the path that receive and forward packets via wireless links. The backpressure algorithm provides throughput optimal routing and scheduling decisions for multi-hop networks with dynamic traffic. Xpress, a cross-layer backpressure architecture was designed to reach the capacity of wireless multi-hop networks and it provides well coordination between layers of network by turning a mesh network into a wireless switch. Transmission over the network is scheduled using a throughput-optimal backpressure algorithm. But this architecture operates much below their capacity due to out-of-order packet delivery and variable packet size. In this paper, we present Xpress-T, a throughput optimal backpressure architecture with TCP support designed to reach maximum throughput of wireless multi-hop networks. Xpress-T operates at the IP layer, and therefore any transport protocol, including TCP, can run on top of Xpress-T. The proposed design not only avoids bottlenecks but also handles out-of-order packet delivery and variable packet size, optimally load-balances traffic across them when needed, improving fairness among competing flows. Our simulation results shows that Xpress-T gives 65% more throughput than Xpress.Keywords: backpressure scheduling and routing, TCP, congestion control, wireless multihop network
Procedia PDF Downloads 51910940 HIV/AIDS Knowledge and Social Integration among Street Children: A Systematic Review
Authors: Dewi Indah Irianti
Abstract:
Introduction: Street children include one of the populations at risk of HIV infection. Their vulnerability to these situations is increased by their lack of understanding of the changes associated with adolescence, the lack of knowledge and skills which could help them to make healthy choices. Social integration increased AIDS knowledge among migrant workers in Thailand. Although social integration has been incorporated into health research in other areas, it has received less attention in AIDS prevention research. This factor has not been integrated into models for HIV prevention. Objectives: The goal of this review is to summarize available knowledge about factors related to HIV/AIDS knowledge and to examine whether social integration was reviewed among street children. Methodology: This study performed a systematic search for English language articles published between January 2006 and March 2016 using the following keywords in various combination: street children, HIV/AIDS knowledge and social integration from the following bibliographic databases: Scopus, ProQuest, JSTOR, ScienceDirect, SpringerLink, EBSCOhost, Sage Publication, Clinical Key, Google Web, and Google Scholar . Results: A total of 10 articles met the inclusion criteria were systematically reviewed. This study reviews the existing quantitative and qualitative literature regarding the HIV/AIDS knowledge of street children in many countries. The study locations were Asia, the Americas, Europe, and Africa. The most determinants associated with HIV/AIDS knowledge among street children are age and sex. In this review, social integration that may be associated with HIV/AIDS knowledge among street children has not been investigated. Conclusion: To the best of the author’s knowledge, this study found that there is no research examining the relationship of social integration with the HIV knowledge among street children. This information may assist in the development of relevant strategies and HIV prevention programs to improve HIV knowledge and decrease risk behaviors among street children.Keywords: HIV/AIDS knowledge, review, social integration, street children
Procedia PDF Downloads 32210939 A Review of Attractor Neural Networks and Their Use in Cognitive Science
Authors: Makenzy Lee Gilbert
Abstract:
This literature review explores the role of attractor neural networks (ANNs) in modeling psychological processes in artificial and biological systems. By synthesizing research from dynamical systems theory, psychology, and computational neuroscience, the review provides an overview of the current understanding of ANN function in memory formation, reinforcement, retrieval, and forgetting. Key mathematical foundations, including dynamical systems theory and energy functions, are discussed to explain the behavior and stability of these networks. The review also examines empirical applications of ANNs in cognitive processes such as semantic memory and episodic recall, as well as highlighting the hippocampus's role in pattern separation and completion. The review addresses challenges like catastrophic forgetting and noise effects on memory retrieval. By identifying gaps between theoretical models and empirical findings, it highlights the interdisciplinary nature of ANN research and suggests future exploration areas.Keywords: attractor neural networks, connectionism, computational modeling, cognitive neuroscience
Procedia PDF Downloads 3210938 Enhancing Transit Trade, Facilitation System and Supply Chain Security for Local, Regional and an International Corridor
Authors: Moh’d A. AL-Shboul
Abstract:
Recently, and due to Arab spring and terrorism around the globe, pushing and driving most governments potentially to harmonize their border measures particularly the regional and an international transit trade within and among Customs Unions. The main purpose of this study is to investigate and provide an insight for monitoring and controlling the trade supply chain within and among different countries by using technological advancement (i.e. an electronic tracking system, etc.); furthermore, facilitate the local and intra-regional trade among countries through reviewing the recent trends and practical implementation of an electronic transit traffic and cargo that related to customs measures by introducing and supporting some case studies of several international and landlocked transit trade countries. The research methodology employed in this study was described as qualitative by conducting few interviews with managers, transit truck drivers, and traders and reviewing the related literature to collect qualitative data from secondary sources such as statistical reports, previous studies, etc. The results in this study show that Jordan and other countries around the globe that used an electronic tracking system for monitoring transit trade has led to a significant reduction in cost, effort and time in physical movement of goods internally and crossing through other countries. Therefore, there is no need to escort transit trucks by customs staff; hence, the rate of escort transit trucks is reduced by more than ninety percent, except the bulky and high duty goods. Electronic transit traffic has been increased; the average transit time journey has been reduced by more than seventy percent and has led to decrease in rates of smuggling up to fifty percent. The researcher recommends considering Jordan as regional and international office for tracking electronically and monitoring the transit trade for many considerations.Keywords: electronic tracking system, facilitation system, regional and international corridor, supply chain security, transit trade
Procedia PDF Downloads 50310937 Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b, and 802.11g
Authors: Amandeep Singh Dhaliwal
Abstract:
Networking solutions, particularly wireless local area networks have revolutionized the technological advancement. Wireless Local Area Networks (WLANs) have gained a lot of popularity as they provide location-independent network access between computing devices. There are a number of access methods used in Wireless Networks among which DCF and PCF are the fundamental access methods. This paper emphasizes on the impact of DCF and PCF access mechanisms on the performance of the IEEE 802.11a, 802.11b and 802.11g standards. On the basis of various parameters viz. throughput, delay, load etc performance is evaluated between these three standards using above mentioned access mechanisms. Analysis revealed a superior throughput performance with low delays for 802.11g standard as compared to 802.11 a/b standard using both DCF and PCF access methods.Keywords: DCF, IEEE, PCF, WLAN
Procedia PDF Downloads 42610936 Harnessing Artificial Intelligence and Machine Learning for Advanced Fraud Detection and Prevention
Authors: Avinash Malladhi
Abstract:
Forensic accounting is a specialized field that involves the application of accounting principles, investigative skills, and legal knowledge to detect and prevent fraud. With the rise of big data and technological advancements, artificial intelligence (AI) and machine learning (ML) algorithms have emerged as powerful tools for forensic accountants to enhance their fraud detection capabilities. In this paper, we review and analyze various AI/ML algorithms that are commonly used in forensic accounting, including supervised and unsupervised learning, deep learning, natural language processing Convolutional Neural Networks (CNNs), Recurrent Neural Networks (RNNs), Support Vector Machines (SVMs), Decision Trees, and Random Forests. We discuss their underlying principles, strengths, and limitations and provide empirical evidence from existing research studies demonstrating their effectiveness in detecting financial fraud. We also highlight potential ethical considerations and challenges associated with using AI/ML in forensic accounting. Furthermore, we highlight the benefits of these technologies in improving fraud detection and prevention in forensic accounting.Keywords: AI, machine learning, forensic accounting & fraud detection, anti money laundering, Benford's law, fraud triangle theory
Procedia PDF Downloads 9410935 Assessing Knowledge Management Impacts: Challenges, Limits and Base for a New Framework
Authors: Patrick Mbassegue, Mickael Gardoni
Abstract:
In a market environment centered more and more on services and the digital economy, knowledge management becomes a framework that can help organizations to create value and to improve their overall performance. Based on an optimal allocation of scarce resources, managers are interested in demonstrating the added value generated by knowledge management projects. One of the challenges faced by organizations is the difficulty in measuring impacts and concrete results of knowledge management initiatives. The present article concerns the measure of concrete results coming from knowledge management projects based on balance scorecard model. One of the goals is to underline what can be done based on this model but also to highlight the limits associated. The present article is structured in five parts; 1-knowledge management projects and organizational impacts; 2- a framework and a methodology to measure organizational impacts; 3- application illustrated in two case studies; 4- limits concerning the proposed framework; 5- the proposal of a new framework to measure organizational impacts.Keywords: knowledge management, project, balance scorecard, impacts
Procedia PDF Downloads 26210934 Personality as a Predictor of Knowledge Hiding Behavior: Case Study of Alpha Electronics
Authors: Sadeeqa Khan, Muhammad Usman
Abstract:
Employees’ knowledge hiding behaviors can be detrimental to employees’ interpersonal relationships and individual and organizational learning and creativity. However, to the best of the authors’ knowledge, the literature on the contingencies, antecedents and outcomes of employees’ knowledge hiding behaviors is still in its infancy. On the other hand, not everyone who hides knowledge hides it the same way, as individuals are different, so do their behaviors. This study explores the links between employees’ personality traits and their knowledge hiding behaviors. By using a single case study as a research methodology and collecting data through 28 semi-structured interviews from employees working in Alpha Electronics (the pseudo name of the company to ascertain anonymity) operating in Pakistan, we foreground the patterns of relationships between employees’ personality traits and knowledge hiding behaviors – rationalized hiding, evasive hiding and playing dumb. Our findings suggest that employees high on extraversion involve in evasive knowledge hiding; while employees low on extraversion (introverts) demonstrate rationalized hiding. Moreover, both extrovert and introvert employees involve in playing dumb in situations that involve risk for their jobs and careers. For instance, when knowledge is requested from their managers, both extrovert and introvert employees tend to play dumb, as in such cases, evasive and rationalized hiding can be harmful to their job and career-related interests and motives. Other than theoretical contributions, the study offers important implications for organizations faced with the challenges of shortage of skills and knowledge.Keywords: knowledge hiding, personality, rationalized hiding, playing dumb, evasive hiding
Procedia PDF Downloads 215