Search results for: information and communication technology
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18494

Search results for: information and communication technology

13364 Destination Management Organization in the Digital Era: A Data Framework to Leverage Collective Intelligence

Authors: Alfredo Fortunato, Carmelofrancesco Origlia, Sara Laurita, Rossella Nicoletti

Abstract:

In the post-pandemic recovery phase of tourism, the role of a Destination Management Organization (DMO) as a coordinated management system of all the elements that make up a destination (attractions, access, marketing, human resources, brand, pricing, etc.) is also becoming relevant for local territories. The objective of a DMO is to maximize the visitor's perception of value and quality while ensuring the competitiveness and sustainability of the destination, as well as the long-term preservation of its natural and cultural assets, and to catalyze benefits for the local economy and residents. In carrying out the multiple functions to which it is called, the DMO can leverage a collective intelligence that comes from the ability to pool information, explicit and tacit knowledge, and relationships of the various stakeholders: policymakers, public managers and officials, entrepreneurs in the tourism supply chain, researchers, data journalists, schools, associations and committees, citizens, etc. The DMO potentially has at its disposal large volumes of data and many of them at low cost, that need to be properly processed to produce value. Based on these assumptions, the paper presents a conceptual framework for building an information system to support the DMO in the intelligent management of a tourist destination tested in an area of southern Italy. The approach adopted is data-informed and consists of four phases: (1) formulation of the knowledge problem (analysis of policy documents and industry reports; focus groups and co-design with stakeholders; definition of information needs and key questions); (2) research and metadatation of relevant sources (reconnaissance of official sources, administrative archives and internal DMO sources); (3) gap analysis and identification of unconventional information sources (evaluation of traditional sources with respect to the level of consistency with information needs, the freshness of information and granularity of data; enrichment of the information base by identifying and studying web sources such as Wikipedia, Google Trends, Booking.com, Tripadvisor, websites of accommodation facilities and online newspapers); (4) definition of the set of indicators and construction of the information base (specific definition of indicators and procedures for data acquisition, transformation, and analysis). The framework derived consists of 6 thematic areas (accommodation supply, cultural heritage, flows, value, sustainability, and enabling factors), each of which is divided into three domains that gather a specific information need to be represented by a scheme of questions to be answered through the analysis of available indicators. The framework is characterized by a high degree of flexibility in the European context, given that it can be customized for each destination by adapting the part related to internal sources. Application to the case study led to the creation of a decision support system that allows: •integration of data from heterogeneous sources, including through the execution of automated web crawling procedures for data ingestion of social and web information; •reading and interpretation of data and metadata through guided navigation paths in the key of digital story-telling; •implementation of complex analysis capabilities through the use of data mining algorithms such as for the prediction of tourist flows.

Keywords: collective intelligence, data framework, destination management, smart tourism

Procedia PDF Downloads 114
13363 Usage of Internet Technology in Financial Education and Financial Inclusion by Students of Economics Universities

Authors: B. Frączek

Abstract:

The paper analyses the usage of the Internet by university students in Visegrad Countries (4V Countries) who study economic fields in their formal and informal financial education and captures the areas of untapped potential of Internet in educational processes. Higher education and training, technological readiness, and the financial market development are in the group of pillars, that are key for efficiency driven economies. These three pillars have become an inspiration to the research on using the Internet in the financial education among economic university students as the group of the best educated people in finance. The financial education is a process that allows for improving the level of financial literacy. In turn, the financial literacy it is the set of financial knowledge, skills, awareness and patterns influencing the financial decisions. The level of financial literacy influences the level of financial well-being of individuals, determines the scale of saving of households and at the same time gives the greater chance for sustainable and more predictable development of the financial market with the positive impact on economy. The financial literacy is necessary for each group of society but its appropriate level is desirable especially in respect of economics students as future participants of financial markets as well as the experts and advisors in financial decision making. The low level of financial literacy is the great problem of many target groups in both developing and developed countries and the financial education is seen as the best way of improving this situation. Also the financial inclusion plays the special role in enhancing the level of financial literacy in the aspect of education by practice as well as due to interrelation between level of financial literacy and degree of financial inclusion. Despite many initiatives under financial education, the level of financial literacy is still very low. Scientists still search for new ways of solving this problem. One of the proposal is more effective usage of the new technology in financial education, especially the Internet, because of the growing popularity of e-learning and the increasing number of Internet users, especially among young people who are called the Generation Net. Due to special role of the university students studying the economics fields for the future financial markets, students of four universities from Visegrad Countries (Czech Republic, Hungary, Poland and Slovakia) were invited to participate in the survey. The aim of the article is to present the level and ways of using the Internet technology in financial education and indicating the so far unused or underused opportunities.

Keywords: financial education, financial inclusion, financial literacy, internet and university education

Procedia PDF Downloads 309
13362 Controller Design for Highly Maneuverable Aircraft Technology Using Structured Singular Value and Direct Search Method

Authors: Marek Dlapa

Abstract:

The algebraic approach is applied to the control of the HiMAT (Highly Maneuverable Aircraft Technology). The objective is to find a robust controller which guarantees robust stability and decoupled control of longitudinal model of a scaled remotely controlled vehicle version of the advanced fighter HiMAT. Control design is performed by decoupling the nominal MIMO (multi-input multi-output) system into two identical SISO (single-input single-output) plants which are approximated by a 4th order transfer function. The algebraic approach is then used for pole placement design, and the nominal closed-loop poles are tuned so that the peak of the µ-function is minimal. As an optimization tool, evolutionary algorithm Differential Migration is used in order to overcome the multimodality of the cost function yielding simple controller with decoupling for nominal plant which is compared with the D-K iteration through simulations of standard longitudinal manoeuvres documenting decoupled control obtained from algebraic approach for nominal plant as well as worst case perturbation.

Keywords: algebraic approach, evolutionary computation, genetic algorithms, HiMAT, robust control, structured singular value

Procedia PDF Downloads 134
13361 Development of Composition and Technology of Vincristine Nanoparticles Using High-Molecular Carbohydrates of Plant Origin

Authors: L. Ebralidze, A. Tsertsvadze, D. Berashvili, A. Bakuridze

Abstract:

Current cancer therapy strategies are based on surgery, radiotherapy and chemotherapy. The problems associated with chemotherapy are one of the biggest challenges for clinical medicine. These include: low specificity, broad spectrum of side effects, toxicity and development of cellular resistance. Therefore, anti-cance drugs need to be develop urgently. Particularly, in order to increase efficiency of anti-cancer drugs and reduce their side effects, scientists work on formulation of nano-drugs. The objective of this study was to develop composition and technology of vincristine nanoparticles using high-molecular carbohydrates of plant origin. Plant polysacharides, particularly, soy bean seed polysaccharides, flaxseed polysaccharides, citrus pectin, gum arabic, sodium alginate were used as objects. Based on biopharmaceutical research, vincristine containing nanoparticle formulations were prepared. High-energy emulsification and solvent evaporation methods were used for preparation of nanosystems. Polysorbat 80, polysorbat 60, sodium dodecyl sulfate, glycerol, polyvinyl alcohol were used in formulation as emulsifying agent and stabilizer of the system. The ratio of API and polysacharides, also the type of the stabilizing and emulsifying agents are very effective on the particle size of the final product. The influence of preparation technology, type and concentration of stabilizing agents on the properties of nanoparticles were evaluated. For the next stage of research, nanosystems were characterized. Physiochemical characterization of nanoparticles: their size, shape, distribution was performed using Atomic force microscope and Scanning electron microscope. The present study explored the possibility of production of NPs using plant polysaccharides. Optimal ratio of active pharmaceutical ingredient and plant polysacharids, the best stabilizer and emulsifying agent was determined. The average range of nanoparticles size and shape was visualized by SEM.

Keywords: nanoparticles, target delivery, natural high molecule carbohydrates, surfactants

Procedia PDF Downloads 265
13360 Removal of Tar Contents in Syngas by Using Different Fuel from Downdraft Biomass Gasification System

Authors: Muhammad Awais, Wei Li, Anjum Munir

Abstract:

Biomass gasification is a process of converting solid biomass ingredients into a combustible gas which can be used in electricity generation. Regardless of their applications in many fields, biomass gasification technology is still facing many cleaning issues of syngas. Tar production in biomass gasification process is one of the biggest challenges for this technology. The aimed of this study is to evaluate the tar contents in syngas produced from wood chips, corn cobs, coconut shells and mixture of corn cobs and wood chips as biomass fuel and tar removal efficiency of different cleaning units integrated with gassifier. Performance of different cleaning units, i.e., cyclone separator, wet scrubber, biomass filter, and auxiliary filter was tested under two biomass fuels. Results of this study indicate that wood chips produced less tar of 1736 mg/Nm³ as compared to corn cobs which produced tor 2489 mg/Nm³. It is also observed that coconut shells produced a high amount of tar. It was observed that when wood chips were used as a fuel, syngas tar contents were reduced from 6600 to 112 mg/Nm³ while in case of corn cob, they were reduced from 7500 mg/Nm³ to 220 mg/Nm³. Overall tar removal efficiencies of cyclone separator, wet scrubber, biomass filter, and auxiliary filter was 72%, 63%, 74%, 35% respectively.

Keywords: biomass, gasification, tar, cleaning system, biomass filter

Procedia PDF Downloads 166
13359 A Machine Learning Based Framework for Education Levelling in Multicultural Countries: UAE as a Case Study

Authors: Shatha Ghareeb, Rawaa Al-Jumeily, Thar Baker

Abstract:

In Abu Dhabi, there are many different education curriculums where sector of private schools and quality assurance is supervising many private schools in Abu Dhabi for many nationalities. As there are many different education curriculums in Abu Dhabi to meet expats’ needs, there are different requirements for registration and success. In addition, there are different age groups for starting education in each curriculum. In fact, each curriculum has a different number of years, assessment techniques, reassessment rules, and exam boards. Currently, students that transfer curriculums are not being placed in the right year group due to different start and end dates of each academic year and their date of birth for each year group is different for each curriculum and as a result, we find students that are either younger or older for that year group which therefore creates gaps in their learning and performance. In addition, there is not a way of storing student data throughout their academic journey so that schools can track the student learning process. In this paper, we propose to develop a computational framework applicable in multicultural countries such as UAE in which multi-education systems are implemented. The ultimate goal is to use cloud and fog computing technology integrated with Artificial Intelligence techniques of Machine Learning to aid in a smooth transition when assigning students to their year groups, and provide leveling and differentiation information of students who relocate from a particular education curriculum to another, whilst also having the ability to store and access student data from anywhere throughout their academic journey.

Keywords: admissions, algorithms, cloud computing, differentiation, fog computing, levelling, machine learning

Procedia PDF Downloads 137
13358 On Musical Information Geometry with Applications to Sonified Image Analysis

Authors: Shannon Steinmetz, Ellen Gethner

Abstract:

In this paper, a theoretical foundation is developed for patterned segmentation of audio using the geometry of music and statistical manifold. We demonstrate image content clustering using conic space sonification. The algorithm takes a geodesic curve as a model estimator of the three-parameter Gamma distribution. The random variable is parameterized by musical centricity and centric velocity. Model parameters predict audio segmentation in the form of duration and frame count based on the likelihood of musical geometry transition. We provide an example using a database of randomly selected images, resulting in statistically significant clusters of similar image content.

Keywords: sonification, musical information geometry, image, content extraction, automated quantification, audio segmentation, pattern recognition

Procedia PDF Downloads 218
13357 Terraria AI: YOLO Interface for Decision-Making Algorithms

Authors: Emmanuel Barrantes Chaves, Ernesto Rivera Alvarado

Abstract:

This paper presents a method to enable agents for the Terraria game to evaluate algorithms commonly used in general video game artificial intelligence competitions. The usage of the ‘You Only Look Once’ model in the first layer of the process obtains information from the screen, translating this information into a video game description language known as “Video Game Description Language”; the agents take that as input to make decisions. For this, the state-of-the-art algorithms were tested and compared; Monte Carlo Tree Search and Rolling Horizon Evolutionary; in this case, Rolling Horizon Evolutionary shows a better performance. This approach’s main advantage is that a VGDL beforehand is unnecessary. It will be built on the fly and opens the road for using more games as a framework for AI.

Keywords: AI, MCTS, RHEA, Terraria, VGDL, YOLOv5

Procedia PDF Downloads 88
13356 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 65
13355 Enhanced Efficiency of Thermoelectric Generator by Optimizing Mechanical and Electrical Structures

Authors: Kewen Li

Abstract:

Much attention has been paid to the application of low temperature thermal resources, especially for power generation in recent years. Most of the current commercialized thermal, including geothermal, power-generation technologies convert thermal energy to electric energy indirectly, that is, making mechanical work before producing electricity. Technology using thermoelectric generator (TEG), however, can directly transform thermal energy into electricity by using Seebeck effect. TEG technology has many advantages such as compactness, quietness, and reliability because there are no moving parts. One of the big disadvantages of TEGs is the low efficiency from thermal to electric energy. For this reason, we redesigned and modified our previous 1 KW (at a temperature difference of around 120 °C) TEG system. The efficiency of the system was improved significantly, about 20% greater. Laboratory experiments have been conducted to measure the output power, including both open and net power, at different conditions: different modes of connections between TEG modules, different mechanical structures, different temperature differences between hot and cold sides. The cost of the TEG power generator has been reduced further because of the increased efficiency and is lower than that of photovoltaics (PV) in terms of equivalent energy generated. The TEG apparatus has been pilot tested and the data will be presented. This kind of TEG power system can be applied in many thermal and geothermal sites with low temperature resources, including oil fields where fossil and geothermal energies are co-produced.

Keywords: TEG, direct power generation, efficiency, thermoelectric effect

Procedia PDF Downloads 235
13354 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry

Authors: Marvin Ricardo Awarab

Abstract:

There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.

Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G

Procedia PDF Downloads 57
13353 The Integration of Apps for Communicative Competence in English Teaching

Authors: L. J. de Jager

Abstract:

In the South African English school curriculum, one of the aims is to achieve communicative competence, the knowledge of using language competently and appropriately in a speech community. Communicatively competent speakers should not only produce grammatically correct sentences but also produce contextually appropriate sentences for various purposes and in different situations. As most speakers of English are non-native speakers, achieving communicative competence remains a complex challenge. Moreover, the changing needs of society necessitate not merely language proficiency, but also technological proficiency. One of the burning issues in the South African educational landscape is the replacement of the standardised literacy model by the pedagogy of multiliteracies that incorporate, by default, the exploration of technological text forms that are part of learners’ everyday lives. It foresees learners as decoders, encoders, and manufacturers of their own futures by exploiting technological possibilities to constantly create and recreate meaning. As such, 21st century learners will feel comfortable working with multimodal texts that are intrinsically part of their lives and by doing so, become authors of their own learning experiences while teachers may become agents supporting learners to discover their capacity to acquire new digital skills for the century of multiliteracies. The aim is transformed practice where learners use their skills, ideas, and knowledge in new contexts. This paper reports on a research project on the integration of technology for language learning, based on the technological pedagogical content knowledge framework, conceptually founded in the theory of multiliteracies, and which aims to achieve communicative competence. The qualitative study uses the community of inquiry framework to answer the research question: How does the integration of technology transform language teaching of preservice teachers? Pre-service teachers in the Postgraduate Certificate of Education Programme with English as methodology were purposively selected to source and evaluate apps for teaching and learning English. The participants collaborated online in a dedicated Blackboard module, using discussion threads to sift through applicable apps and develop interactive lessons using the Apps. The selected apps were entered on to a predesigned Qualtrics form. Data from the online discussions, focus group interviews, and reflective journals were thematically and inductively analysed to determine the participants’ perceptions and experiences when integrating technology in lesson design and the extent to which communicative competence was achieved when using these apps. Findings indicate transformed practice among participants and research team members alike with a better than average technology acceptance and integration. Participants found value in online collaboration to develop and improve their own teaching practice by experiencing directly the benefits of integrating e-learning into the teaching of languages. It could not, however, be clearly determined whether communicative competence was improved. The findings of the project may potentially inform future e-learning activities, thus supporting student learning and development in follow-up cycles of the project.

Keywords: apps, communicative competence, English teaching, technology integration, technological pedagogical content knowledge

Procedia PDF Downloads 154
13352 Design and Comparative Analysis of Grid-Connected Bipv System with Monocrystalline Silicon and Polycrystalline Silicon in Kandahar Climate

Authors: Ahmad Shah Irshad, Naqibullah Kargar, Wais Samadi

Abstract:

Building an integrated photovoltaic (BIPV) system is a new and modern technique for solar energy production in Kandahar. Due to its location, Kandahar has abundant sources of solar energy. People use both monocrystalline and polycrystalline silicon solar PV modules for the grid-connected solar PV system, and they don’t know which technology performs better for the BIPV system. This paper analyses the parameters described by IEC61724, “Photovoltaic System Performance Monitoring Guidelines for Measurement, Data Exchange and Analysis,” to evaluate which technology shows better performance for the BIPV system. The monocrystalline silicon BIPV system has a 3.1% higher array yield than the polycrystalline silicon BIPV system. The final yield is 0.2%, somewhat higher for monocrystalline silicon than polycrystalline silicon. Monocrystalline silicon has 0.2% and 4.5% greater yearly yield factor and capacity factors than polycrystalline silicon, respectively. Monocrystalline silicon shows 0.3% better performance than polycrystalline silicon. With 1.7% reduction and 0.4% addition in collection losses and useful energy produced, respectively, monocrystalline silicon solar PV system shows good performance than polycrystalline silicon solar PV system. But system losses are the same for both technologies. The monocrystalline silicon BIPV system injects 0.2% more energy into the grid than the polycrystalline silicon BIPV system.

Keywords: photovoltaic technologies, performance analysis, solar energy, solar irradiance, performance ratio

Procedia PDF Downloads 359
13351 The Foundation Binary-Signals Mechanics and Actual-Information Model of Universe

Authors: Elsadig Naseraddeen Ahmed Mohamed

Abstract:

In contrast to the uncertainty and complementary principle, it will be shown in the present paper that the probability of the simultaneous occupation event of any definite values of coordinates by any definite values of momentum and energy at any definite instance of time can be described by a binary definite function equivalent to the difference between their numbers of occupation and evacuation epochs up to that time and also equivalent to the number of exchanges between those occupation and evacuation epochs up to that times modulus two, these binary definite quantities can be defined at all point in the time’s real-line so it form a binary signal represent a complete mechanical description of physical reality, the time of these exchanges represent the boundary of occupation and evacuation epochs from which we can calculate these binary signals using the fact that the time of universe events actually extends in the positive and negative of time’s real-line in one direction of extension when these number of exchanges increase, so there exists noninvertible transformation matrix can be defined as the matrix multiplication of invertible rotation matrix and noninvertible scaling matrix change the direction and magnitude of exchange event vector respectively, these noninvertible transformation will be called actual transformation in contrast to information transformations by which we can navigate the universe’s events transformed by actual transformations backward and forward in time’s real-line, so these information transformations will be derived as an elements of a group can be associated to their corresponded actual transformations. The actual and information model of the universe will be derived by assuming the existence of time instance zero before and at which there is no coordinate occupied by any definite values of momentum and energy, and then after that time, the universe begin its expanding in spacetime, this assumption makes the need for the existence of Laplace’s demon who at one moment can measure the positions and momentums of all constituent particle of the universe and then use the law of classical mechanics to predict all future and past of universe’s events, superfluous, we only need for the establishment of our analog to digital converters to sense the binary signals that determine the boundaries of occupation and evacuation epochs of the definite values of coordinates relative to its origin by the definite values of momentum and energy as present events of the universe from them we can predict approximately in high precision it's past and future events.

Keywords: binary-signal mechanics, actual-information model of the universe, actual-transformation, information-transformation, uncertainty principle, Laplace's demon

Procedia PDF Downloads 170
13350 Research on Internet Attention of Tourism and Marketing Strategy in Northeast Sichuan Economic Zone in China Based on Baidu Index

Authors: Chuanqiao Zheng, Wei Zeng, Haozhen Lin

Abstract:

As of March 2020, the number of Chinese netizens has reached 904 million. The proportion of Internet users accessing the Internet through mobile phones is as high as 99.3%. Under the background of 'Internet +', tourists have a stronger sense of independence in the choice of tourism destinations and tourism products. Tourists are more inclined to learn about the relevant information on tourism destinations and other tourists' evaluations of tourist products through the Internet. The search engine, as an integrated platform that contains a wealth of information, is highly valuable to the analysis of the characteristics of the Internet attention given to various tourism destinations, through big data mining and analysis. This article uses the Baidu Index as the data source, which is one of the products of Baidu Search. The Baidu Index is based on big data, which collects and shares the search results of a large number of Internet users on the Baidu search engine. The big data used in this article includes search index, demand map, population profile, etc. The main research methods used are: (1) based on the search index, analyzing the Internet attention given to the tourism in five cities in Northeast Sichuan at different times, so as to obtain the overall trend and individual characteristics of tourism development in the region; (2) based on the demand map and the population profile, analyzing the demographic characteristics and market positioning of the tourist groups in these cities to understand the characteristics and needs of the target groups; (3) correlating the Internet attention data with the permanent population of each province in China in the corresponding to construct the Boston matrix of the Internet attention rate of the Northeast Sichuan tourism, obtain the tourism target markets, and then propose development strategies for different markets. The study has found that: a) the Internet attention given to the tourism in the region can be categorized into tourist off-season and peak season; the Internet attention given to tourism in different cities is quite different. b) tourists look for information including tour guide information, ticket information, traffic information, weather information, and information on the competing tourism cities; with regard to the population profile, the main group of potential tourists searching for the keywords of tourism in the five prefecture-level cities in Northeast Sichuan are youth. The male to female ratio is about 6 to 4, with males being predominant. c) through the construction of the Boston matrix, it is concluded that the star market for tourism in the Northeast Sichuan Economic Zone includes Sichuan and Shaanxi; the cash cows market includes Hainan and Ningxia; the question market includes Jiangsu and Shanghai; the dog market includes Hubei and Jiangxi. The study concludes with the following planning strategies and recommendations: i) creating a diversified business format that integrates cultural and tourism; ii) creating a brand image of niche tourism; iii) focusing on the development of tourism products; iv) innovating composite three-dimensional marketing channels.

Keywords: Baidu Index, big data, internet attention, tourism

Procedia PDF Downloads 117
13349 Application of Molecular Markers for Crop Improvement

Authors: Monisha Isaac

Abstract:

Use of molecular markers for selecting plants with desired traits has been started long back. Due to their heritable characteristics, they are useful for identification and characterization of specific genotypes. The study involves various types of molecular markers used to select multiple desired characters in plants, their properties, and advantages to improve crop productivity in adverse climatological conditions for the purpose of providing food security to fast-growing global population. The study shows that genetic similarities obtained from molecular markers provide more accurate information and the genetic diversity can be better estimated from the genetic relationship obtained from the dendrogram. The information obtained from markers assisted characterization is more suitable for the crops of economic importance like sugarcane.

Keywords: molecular markers, crop productivity, genetic diversity, genotype

Procedia PDF Downloads 505
13348 An Empirical Study of the Impacts of Big Data on Firm Performance

Authors: Thuan Nguyen

Abstract:

In the present time, data to a data-driven knowledge-based economy is the same as oil to the industrial age hundreds of years ago. Data is everywhere in vast volumes! Big data analytics is expected to help firms not only efficiently improve performance but also completely transform how they should run their business. However, employing the emergent technology successfully is not easy, and assessing the roles of big data in improving firm performance is even much harder. There was a lack of studies that have examined the impacts of big data analytics on organizational performance. This study aimed to fill the gap. The present study suggested using firms’ intellectual capital as a proxy for big data in evaluating its impact on organizational performance. The present study employed the Value Added Intellectual Coefficient method to measure firm intellectual capital, via its three main components: human capital efficiency, structural capital efficiency, and capital employed efficiency, and then used the structural equation modeling technique to model the data and test the models. The financial fundamental and market data of 100 randomly selected publicly listed firms were collected. The results of the tests showed that only human capital efficiency had a significant positive impact on firm profitability, which highlighted the prominent human role in the impact of big data technology.

Keywords: big data, big data analytics, intellectual capital, organizational performance, value added intellectual coefficient

Procedia PDF Downloads 235
13347 The Influence of Characteristics of Waste Water on Properties of Sewage Sludge

Authors: Catalina Iticescu, Lucian P. Georgescu, Mihaela Timofti, Gabriel Murariu, Catalina Topa

Abstract:

In the field of environmental protection in the EU and also in Romania, strict and clear rules are imposed that are respected. Among those, mandatory municipal wastewater treatment is included. Our study involved Municipal Wastewater Treatment Plant (MWWTP) of Galati. MWWTP began its activity by the end of 2011 and technology is one of the most modern used in the EU. Moreover, to our knowledge, it is the first technology of this kind used in the region. Until commissioning, municipal wastewater was discharged directly into the Danube without any treatment. Besides the benefits of depollution, a new problem has arisen: the accumulation of increasingly large sewage sludge. Therefore, it is extremely important to find economically feasible and environmentally friendly solutions. One of the most feasible methods of disposing of sewage sludge is their use on agricultural land. Sewage sludge can be used in agriculture if monitored in terms of physicochemical properties (pH, nutrients, heavy metals, etc.), in order not to contribute to pollution in soils and not to affect chemical and biological balances, which are relatively fragile. In this paper, 16 physico-chemical parameters were monitored. Experimental testings were realised on waste water samples, sewage sludge results and treated water samples. Testing was conducted with electrochemichal methods (pH, conductivity, TDS); parameters N-total (mg/L), P-total (mg/L), N-NH4 (mg/L), N-NO2 (mg/L), N-NO3 (mg/L), Fe-total (mg/L), Cr-total (mg/L), Cu (mg/L), Zn (mg/L), Cd (mg/L), Pb (mg/L), Ni (mg/L) were determined by spectrophotometric methods using a spectrophotometer NOVA 60 and specific kits. Analyzing the results, we concluded that Sewage sludges, although containing heavy metals, are in small quantities and will not affect the land on which they will be deposited. Also, the amount of nutrients contained are appreciable. These features indicate that the sludge can be safely used in agriculture, with the advantage that they represent a cheap fertilizer. Acknowledgement: This work was supported by a grant of the Romanian National Authority for Scientific Research and Innovation – UEFISCDI, PNCDI III project, 79BG/2017, Efficiency of the technological process for obtaining of sewage sludge usable in agriculture, Efficient.

Keywords: municipal wastewater, physico-chemical properties, sewage sludge, technology

Procedia PDF Downloads 201
13346 Characterization of Porosity and Flow in Solid Oxide Fuel Cell with 3D Focused Ion Beam Serial Slicing

Authors: Daniel Phifer, Anna Prokhodtseva

Abstract:

DualBeam (FIB-SEM) has long been the technology of choice to sub-sample and characterize materials at site-specific locations which are difficult or impossible to extract by conventional embedding/polishing methods. Whereas Ga based FIB provides excellent resolution and enables precise material removal, the current is usually limited and only allows the extraction of small material biopsies typically ranging from 5-70um wide. Xe Plasma FIB, by contrast, has around 38x more current and can remove more material at the same time to extract significant sized chunks (100-1000um) of materials for further analysis. This increased volume has enabled time-prohibitive investigations like large grain 3D serial sectioning and EBSD and micro-machining for micro-mechanical testing. Investigation of the pore spaces with 3D modeling can determine the relative characteristics of the materials to help design or select properties for best function. Pore spaces can be described with a tortuosity number which is calculated by modules in the 3D analysis software. Xe Plasma FIB technology provides a workflow with sufficient volume to characterize porosity when both large-volume 3D materials characterization and nanometer resolution is required to understand the system.

Keywords: dual-beam, FIB-SEM, porosity, SOFC, solid oxide fuel cell

Procedia PDF Downloads 201
13345 Spatial Object-Oriented Template Matching Algorithm Using Normalized Cross-Correlation Criterion for Tracking Aerial Image Scene

Authors: Jigg Pelayo, Ricardo Villar

Abstract:

Leaning on the development of aerial laser scanning in the Philippine geospatial industry, researches about remote sensing and machine vision technology became a trend. Object detection via template matching is one of its application which characterized to be fast and in real time. The paper purposely attempts to provide application for robust pattern matching algorithm based on the normalized cross correlation (NCC) criterion function subjected in Object-based image analysis (OBIA) utilizing high-resolution aerial imagery and low density LiDAR data. The height information from laser scanning provides effective partitioning order, thus improving the hierarchal class feature pattern which allows to skip unnecessary calculation. Since detection is executed in the object-oriented platform, mathematical morphology and multi-level filter algorithms were established to effectively avoid the influence of noise, small distortion and fluctuating image saturation that affect the rate of recognition of features. Furthermore, the scheme is evaluated to recognized the performance in different situations and inspect the computational complexities of the algorithms. Its effectiveness is demonstrated in areas of Misamis Oriental province, achieving an overall accuracy of 91% above. Also, the garnered results portray the potential and efficiency of the implemented algorithm under different lighting conditions.

Keywords: algorithm, LiDAR, object recognition, OBIA

Procedia PDF Downloads 236
13344 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 111
13343 Dematerialized Beings in Katherine Dunn's Geek Love: A Corporeal and Ethical Study under Posthumanities

Authors: Anum Javed

Abstract:

This study identifies the dynamical image of human body that continues its metamorphosis in the virtual field of reality. It calls attention to the ways where humans start co-evolving with other life forms; technology in particular and are striving to establish a realm outside the physical framework of matter. The problem exceeds the area of technological ethics by explicably and explanatorily entering the space of literary texts and criticism. Textual analysis of Geek Love (1989) by Katherine Dunn is adjoined with posthumanist perspectives of Pramod K. Nayar to beget psycho-somatic changes in man’s nature of being. It uncovers the meaning people give to their experiences in this budding social and cultural phenomena of material representation tied up with personal practices and technological innovations. It also observes an ethical, physical and psychological reassessment of man within the context of technological evolutions. The study indicates the elements that have rendered morphological freedom and new materialism in man’s consciousness. Moreover this work is inquisitive of what it means to be a human in this time of accelerating change where surgeries, implants, extensions, cloning and robotics have shaped a new sense of being. It attempts to go beyond individual’s body image and explores how objectifying media and culture have influenced people’s judgement of others on new material grounds. It further argues a decentring of the glorified image of man as an independent entity because of his energetic partnership with intelligent machines and external agents. The history of the future progress of technology is also mentioned. The methodology adopted is posthumanist techno-ethical textual analysis. This work necessitates a negotiating relationship between man and technology in order to achieve harmonic and balanced interconnected existence. The study concludes by recommending a call for an ethical set of codes to be cultivated for the techno-human habituation. Posthumanism ushers a strong need of adopting new ethics within the terminology of neo-materialist humanism.

Keywords: corporeality, dematerialism, human ethos, posthumanism

Procedia PDF Downloads 138
13342 InfoMiracles in the Qur’an and a Mathematical Proof to the Existence of God

Authors: Mohammad Mahmoud Mandurah

Abstract:

The existence of InfoMiracles in scripture is evidence that the scripture has a divine origin. It is also evidence to the existence of God. An InfoMiracle is an information-based miracle. The basic component of an InfoMiracle is a piece of information that could not be obtained by a human except through a divine channel. The existence of a sufficient number of convincing InfoMiracles in a scripture necessitates the existence of the divine source to these InfoMiracles. A mathematical equation is developed to prove that the Qur’an has a divine origin, and hence, prove the existence of God. The equation depends on a single variable only, which is the number of InfoMiracles in the Qur’an. The Qur’an is rich with InfoMiracles. It is shown that the existence of less than 30 InfoMiracles in the Qur’an is sufficient proof to the existence of God and that the Qur’an is a revelation from God.

Keywords: InfoMiracle, God, mathematical proof, miracle, probability

Procedia PDF Downloads 209
13341 Partial Differential Equation-Based Modeling of Brain Response to Stimuli

Authors: Razieh Khalafi

Abstract:

The brain is the information processing centre of the human body. Stimuli in the form of information are transferred to the brain and then brain makes the decision on how to respond to them. In this research, we propose a new partial differential equation which analyses the EEG signals and make a relationship between the incoming stimuli and the brain response to them. In order to test the proposed model, a set of external stimuli applied to the model and the model’s outputs were checked versus the real EEG data. The results show that this model can model the EEG signal well. The proposed model is useful not only for modelling of EEG signal in case external stimuli but it can be used for modelling of brain response in case of internal stimuli.

Keywords: brain, stimuli, partial differential equation, response, EEG signal

Procedia PDF Downloads 551
13340 Constructing a Semi-Supervised Model for Network Intrusion Detection

Authors: Tigabu Dagne Akal

Abstract:

While advances in computer and communications technology have made the network ubiquitous, they have also rendered networked systems vulnerable to malicious attacks devised from a distance. These attacks or intrusions start with attackers infiltrating a network through a vulnerable host and then launching further attacks on the local network or Intranet. Nowadays, system administrators and network professionals can attempt to prevent such attacks by developing intrusion detection tools and systems using data mining technology. In this study, the experiments were conducted following the Knowledge Discovery in Database Process Model. The Knowledge Discovery in Database Process Model starts from selection of the datasets. The dataset used in this study has been taken from Massachusetts Institute of Technology Lincoln Laboratory. After taking the data, it has been pre-processed. The major pre-processing activities include fill in missed values, remove outliers; resolve inconsistencies, integration of data that contains both labelled and unlabelled datasets, dimensionality reduction, size reduction and data transformation activity like discretization tasks were done for this study. A total of 21,533 intrusion records are used for training the models. For validating the performance of the selected model a separate 3,397 records are used as a testing set. For building a predictive model for intrusion detection J48 decision tree and the Naïve Bayes algorithms have been tested as a classification approach for both with and without feature selection approaches. The model that was created using 10-fold cross validation using the J48 decision tree algorithm with the default parameter values showed the best classification accuracy. The model has a prediction accuracy of 96.11% on the training datasets and 93.2% on the test dataset to classify the new instances as normal, DOS, U2R, R2L and probe classes. The findings of this study have shown that the data mining methods generates interesting rules that are crucial for intrusion detection and prevention in the networking industry. Future research directions are forwarded to come up an applicable system in the area of the study.

Keywords: intrusion detection, data mining, computer science, data mining

Procedia PDF Downloads 292
13339 Using ePortfolios to Mapping Social Work Graduate Competencies

Authors: Cindy Davis

Abstract:

Higher education is changing globally and there is increasing pressure from professional social work accreditation bodies for academic programs to demonstrate how students have successfully met mandatory graduate competencies. As professional accreditation organizations increase their demand for evidence of graduate competencies, strategies to document and recording learning outcomes becomes increasingly challenging for academics and students. Studies in higher education have found support for the pedagogical value of ePortfolios, a flexible personal learning space that is owned by the student and include opportunity for assessment, feedback and reflection as well as a virtual space to store evidence of demonstration of professional competencies and graduate attributes. Examples of institutional uses of ePortfolios include e-administration of a diverse student population, assessment of student learning, and the demonstration of graduate attributes attained and future student career preparation. The current paper presents a case study on the introduction of ePortfolios for social work graduates in Australia as part of an institutional approach to technology-enhanced learning and e-learning. Social work graduates were required to submit an ePortfolio hosted on PebblePad. The PebblePad platform was selected because it places the student at the center of their learning whilst providing powerful tools for staff to structure, guide and assess that learning. The ePortofolio included documentation and evidence of how the student met each graduate competency as set out by the social work accreditation body in Australia (AASW). This digital resource played a key role in the process of external professional accreditation by clearly documenting and evidencing how students met required graduate competencies. In addition, student feedback revealed a positive outcome on how this resource provided them with a consolidation of their learning experiences and assisted them in obtaining employment post-graduation. There were also significant institutional factors that were key to successful implementation such as investment in the digital technology, capacity building amongst academics, and technical support for staff and students.

Keywords: accreditation, social work, teaching, technology

Procedia PDF Downloads 132
13338 A Balance Sheet On The Value Of Aid Funding And Delivery: Ingo To Ngo Pathways In Nigeria

Authors: Glory Okereke

Abstract:

Several research on the value of aid funding and delivery have emphasized the importance of partnership and accountability in implementing development projects between INGOs and NGOs. Despite challenges in accessing detailed information on their impact due to the extension of information they are willing to provide, this pathway has been seen as an alternative approach and more beneficial than aid funding and delivery through the state. This paper tends to analyze this relationship using liberal and international relations theories to understand the positive and negative aspects of INGO to NGO pathway as a better alternative to economic development. Looking through a broad spectrum of economic development, the paper focuses on Nigeria and analyzes existing empirical literature of INGOs with local NGOs with a comparative analysis of bilateral aid relations with the Nigerian government.

Keywords: NGOS, development, Nigeria, liberal theories, aid

Procedia PDF Downloads 28
13337 Consumption Culture of Rural Youth: A Study of the Conspicuous Consumption Pattern of a Youth Sample in an Egyptian Village

Authors: Marwa H. Salah

Abstract:

Modern consumption culture represents a widespread phenomenon that affects young people, as it affects all age groups in both urban and rural societies. It has been helped by globalization, specifically cultural globalization, also internal and external migration, and the immense development in information technology as well, these factors have led to the appearance of the conspicuous consumption pattern among young people. This research firstly interested in identifying the nature of this pattern of consumption among young people in the countryside, which represents a society with a special nature, was characterized by the pattern of traditional consumption. Secondly to find out whether the rural character has an impact on the conspicuous consumption of youth. Finally to identify the reasons for the rural youth's tendency to such type of consumption and if it contributes in satisfying certain social needs. The research used the anthropological method. Observation and open-ended interviews were used as tools to collect data and an interview guide was applied on a selective youth sample (40:20 male and 20 female) aged between 17to 34 in an Egyptian village located in Dakahlia governorate. The research showed that rural youth has impacted with the modern consumption culture and not isolated from it despite the lack of financial abilities. The conspicuous consumption is a dominant pattern of consumption among the Egyptian rural youth and it has been practicing by rural youth regardless of their educational & financial levels. Also, the wish to show the social and economic status, bragging and show off is the main reason for the rural youth to adopt the conspicuous consumption, moreover to face the inferior view from their counterparts’ urban youth.

Keywords: consumption culture, youth, conspicuous consumption, rural society

Procedia PDF Downloads 182
13336 Binocular Heterogeneity in Saccadic Suppression

Authors: Evgeny Kozubenko, Dmitry Shaposhnikov, Mikhail Petrushan

Abstract:

This work is focused on the study of the binocular characteristics of the phenomenon of perisaccadic suppression in humans when perceiving visual objects. This phenomenon manifests in a decrease in the subject's ability to perceive visual information during saccades, which play an important role in purpose-driven behavior and visual perception. It was shown that the impairment of perception of visual information in the post-saccadic time window is stronger (p < 0.05) in the ipsilateral eye (the eye towards which the saccade occurs). In addition, the observed heterogeneity of post-saccadic suppression in the contralateral and ipsilateral eyes may relate to depth perception. Taking the studied phenomenon into account is important when developing ergonomic control panels in modern operator systems.

Keywords: eye movement, natural vision, saccadic suppression, visual perception

Procedia PDF Downloads 149
13335 Remote Sensing and GIS Integration for Paddy Production Estimation in Bali Province, Indonesia

Authors: Sarono, Hamim Zaky Hadibasyir, dan Ridho Kurniawan

Abstract:

Estimation of paddy production is one of the areas that can be examined using the techniques of remote sensing and geographic information systems (GIS) in the field of agriculture. The purpose of this research is to know the amount of the paddy production estimation and how remote sensing and geographic information systems (GIS) are able to perform analysis of paddy production estimation in Tegalallang and Payangan Sub district, Bali Province, Indonesia. The method used is the method of land suitability. This method associates a physical parameters which are to be embodied in the smallest unit of a mapping that represents a mapping unit in a particular field and connecting with its field productivity. Analysis of estimated production using standard land suitability from FAO using matching technique. The parameters used to create the land unit is slope (FAO), climate classification (Oldeman), landform (Prapto Suharsono), and soil type. Land use map consist of paddy and non paddy field information obtained from Geo-eye 1 imagery using visual interpretation technique. Landsat image of the Data used for the interpretation of the landform, the classification of the slopes obtained from high point identification with method of interpolation spline, whereas climate data, soil, use secondary data originating from institutions-related institutions. The results of this research indicate Tegallalang and Payangan Districts in known wetland suitability consists of S1 (very suitable) covering an area of 2884,7 ha with the productivity of 5 tons/ha and S2 (suitable) covering an area of 482,9 ha with the productivity of 3 tons/ha. The sum of paddy production estimation as a results in both districts are 31.744, 3 tons in one year.

Keywords: production estimation, paddy, remote sensing, geography information system, land suitability

Procedia PDF Downloads 334