Search results for: digital business models
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11437

Search results for: digital business models

5497 Development of Tourism Infrastructure and Cultural Heritage: Case of Gobustan Preserve

Authors: Rufat Nuriyev

Abstract:

Located in the eastern part of the Republic of Azerbaijan and on the western shore of the Caspian Sea, Gobustan National Reserve was inscribed as Gobustan Rock Art Cultural Landscape into the World Heritage List in 2007. Gobustan is an outstanding rock art landscape, where over 6000 rock engravings were found and registered, since the end of Upper Paleolithic up to the Middle Ages. Being a rock art center, the Gobustan seeks to stimulate public awareness and disseminate knowledge of prehistoric art to enrich educational, cultural and artistic communities regionally, nationally and internationally. Due to the Decree of the President of the Republic of Azerbaijan and the “Action Plan” , planned actions started to realize. Some of them implemented before of stipulated date. For the attraction of visitors and improvement of service quality in the museum-reserve, various activities are organized. The building of a new museum center at the foot of the Beyukdash Mountain has been completed in 2011. Main aims of the new museum building and exhibition was to provide better understanding of the importance of this monument for local community, Azerbaijanian culture and the world. In the Petroglyph Museum at Gobustan, digital and traditional media are closely integrated to reveal the complexity of historical, cultural and artistic meaning of prehistoric rock carvings of Gobustan. Alongside with electronic devices, the visitor gets opportunity of direct contact with artifacts and ancient rock carvings.

Keywords: Azerbaijan, Gobustan, rock art, museum

Procedia PDF Downloads 295
5496 Analysis of an High Voltage Direct Current (HVDC) Connection Using a Real-Time Simulator Under Various Disturbances

Authors: Mankour Mohamed, Miloudi Mohamed

Abstract:

A thorough and accurate simulation is necessary for the study of a High Voltage Direct Current (HVDC) link system during various types of disturbances, including internal faults on both converters, either on the rectifier or on the inverter, as well as external faults, such as AC or DC faults on both converter sides inside the DC link party. In this study, we examine how an HVDC inverter responds to three different types of failures, including faults at the inverter valve, system control faults, and single-phase-to-ground AC faults at the sending end of the inverter side. As this phenomenon represents the most frequent problem that may affect inverter valves, particularly those based on thyristor valves (LCC (line-Commutated converter)), it is more precise to explore which circumstance generates and raises the commutation failure on inverter valves. Because of the techniques used to accelerate the simulation, digital real-time simulators are now the most potent tools that provide simulation results. The real-time-lab RT-LAB platform HYPERSIM OP-5600 is used to implement the Simulation in the Loop (SIL) technique, which is used to validate the results. It is demonstrated how to recover from both the internal faults and the AC problem. The simulation findings show how crucial a role the control system plays in fault recovery.

Keywords: hypersim simulator, HVDC systems, mono-polar link, AC faults, misfiring faults

Procedia PDF Downloads 88
5495 Efficacy of Umbilical Cord Lining Stem Cells For Wound Healing in Diabetic Murine Model

Authors: Fui Ping Lim, Wen Choong Chua, Toan Thang Phan

Abstract:

Aim: This study investigates the roles of Cord Lining Stem Cells (CLSCs) as potential therapeutic agents for diabetic wounds. Method: 20 genetically diabetic db/db mice were randomly assigned to two arms; (i) control group received placebo treatment (sham media or cells delivery material), and (ii) active comparator received CLSCs. Two full-thickness wounds, each sized 10mm X 10mm were created, one on each side of the midline on the back of the mice. Digital pictures were taken on day 1, 3, 7, 10, 14, 17, 21, 24, 28. Wound areas were analyzed with ImageJ TM software and calculated as percentage of the original wound. Time to closure was defined as the day the wound bed was completely epithelized and filled with new tissues. Results: The CLSCs-treated wounds, showed a significant increase in the percentage of wound closure and achieved 100% closure of the wound sooner than the control group by an average of 3.7 days. The mice treated with CLSCs have a shorter wound closure time (mean closure day: 19.8 days) as compared to the control group (mean closure day: 23.5 days). Conclusion: Our preliminary findings inferred that CLSCs treated wound achieved higher percentage of wound closure within a shorter duration of time.

Keywords: cord lining stem cell, diabetic wound, stem cell, wound

Procedia PDF Downloads 278
5494 Adaptive Environmental Control System Strategy for Cabin Air Quality in Commercial Aircrafts

Authors: Paolo Grasso, Sai Kalyan Yelike, Federico Benzi, Mathieu Le Cam

Abstract:

The cabin air quality (CAQ) in commercial aircraft is of prime interest, especially in the context of the COVID-19 pandemic. Current Environmental Control Systems (ECS) rely on a prescribed fresh airflow per passenger to dilute contaminants. An adaptive ECS strategy is proposed, leveraging air sensing and filtration technologies to ensure a better CAQ. This paper investigates the CAQ level achieved in commercial aircraft’s cabin during various flight scenarios. The modeling and simulation analysis is performed in a Modelica-based environment describing the dynamic behavior of the system. The model includes the following three main systems: cabin, recirculation loop and air-conditioning pack. The cabin model evaluates the thermo-hygrometric conditions and the air quality in the cabin depending on the number of passengers and crew members, the outdoor conditions and the conditions of the air supplied to the cabin. The recirculation loop includes models of the recirculation fan, ordinary and novel filtration technology, mixing chamber and outflow valve. The air-conditioning pack includes models of heat exchangers and turbomachinery needed to condition the hot pressurized air bled from the engine, as well as selected contaminants originated from the outside or bled from the engine. Different ventilation control strategies are modeled and simulated. Currently, a limited understanding of contaminant concentrations in the cabin and the lack of standardized and systematic methods to collect and record data constitute a challenge in establishing a causal relationship between CAQ and passengers' comfort. As a result, contaminants are neither measured nor filtered during flight, and the current sub-optimal way to avoid their accumulation is their dilution with the fresh air flow. However, the use of a prescribed amount of fresh air comes with a cost, making the ECS the most energy-demanding non-propulsive system within an aircraft. In such a context, this study shows that an ECS based on a reduced and adaptive fresh air flow, and relying on air sensing and filtration technologies, provides promising results in terms of CAQ control. The comparative simulation results demonstrate that the proposed adaptive ECS brings substantial improvements to the CAQ in terms of both controlling the asymptotic values of the concentration of the contaminant and in mitigating hazardous scenarios, such as fume events. Original architectures allowing for adaptive control of the inlet air flow rate based on monitored CAQ will change the requirements for filtration systems and redefine the ECS operation.

Keywords: cabin air quality, commercial aircraft, environmental control system, ventilation

Procedia PDF Downloads 91
5493 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 66
5492 The Challenge of Assessing Social AI Threats

Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi

Abstract:

The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.

Keywords: social threats, artificial Intelligence, mitigation, social experiment

Procedia PDF Downloads 56
5491 Osteometry of the Long Bones of Adult Chinkara (Gazella bennettii): A Remarkable Example of Sexual Dimorphism

Authors: Salahud Din, Saima Masood, Hafsa Zaneb, Saima Ashraf, Imad Khan

Abstract:

The objective of this study was 1) to measure osteometric parameters of the long bones of the adult Chinkara to obtain baseline data 2) to study sexual dimorphism in the adult Chinkara through osteometry and 3) to estimate body weight from the measurements of greatest length and shaft of the long bones. For this purpose, after taking body measurements of adult Chinkara after mortality, the carcass of adult Chinkara of known sex and age were buried in the locality of the Manglot Wildlife Park and Ungulate Breeding Centre, Nizampur, Pakistan; after a specific period of time, the bones were unearthed. Various osteometric parameters of the humerus, radius, metacarpus, femur, tibia and metatarsal were measured through the digital calliper. Statistically significant (P < 0.05), differences in some of the osteometrical parameters between male and female adult Chinkara were observed. Sexual dimorphism exit between the long bones of male and female adult Chinkara. In both male and female Chinkara value obtained for the estimated body weight from humeral, metacarpal and metatarsal measurements were near to the actual body weight of the adult Chinkara. In conclusion, the present study estimates preliminary data on long bones osteometrics and suggests that the morphometric details of the male and female adult Chinkara have differed morphometrically from each other.

Keywords: body mass measurements, Chinkara, long bones, morphometric, sexual dimorphism

Procedia PDF Downloads 123
5490 Network and Sentiment Analysis of U.S. Congressional Tweets

Authors: Chaitanya Kanakamedala, Hansa Pradhan, Carter Gilbert

Abstract:

Social media platforms, such as Twitter, are excellent datasets for understanding human interactions and sentiments. This report explores social dynamics among US Congressional members through a network analysis applied to a dataset of tweets spanning 2008 to 2017 from the ’US Congressional Tweets Dataset’. In this report, we preform network analysis where connections between users (edges) are established based on a similarity threshold: two tweets are connected if the tweets they post are similar. By utilizing the Natural Language Toolkit (NLTK) and NetworkX, we quantified tweet similarity and constructed a graph comprising various interconnected components. Each component represents a cluster of users with closely aligned content. We then preform sentiment analysis on each cluster to explore the prevalent emotions and opinions within these groups. Our findings reveal that despite the initial expectation of distinct ideological divisions typically aligning with party lines, the analysis exposed a high degree of topical convergence across tweets from different political affiliations. The analysis preformed in this report not only highlights the potential of social media as a tool for political communication but also suggests a complex layer of interaction that transcends traditional partisan boundaries, reflecting a complicated landscape of politics in the digital age.

Keywords: natural language processing, sentiment analysis, centrality analysis, topic modeling

Procedia PDF Downloads 13
5489 Assessing the Efficacy of Network Mapping, Vulnerability Scanning, and Penetration Testing in Enhancing Security for Academic Networks

Authors: Kenny Onayemi

Abstract:

In an era where academic institutions increasingly rely on information technology, the security of academic networks has emerged as a paramount concern. This comprehensive study delves into the effectiveness of security practices, including network mapping, vulnerability scanning, and penetration testing, within academic networks. Leveraging data from surveys administered to faculty, staff, IT professionals and IT students in the university, the study assesses their familiarity with these practices, perceived effectiveness, and frequency of implementation. The findings reveal that a significant portion of respondents exhibit a strong understanding of network mapping, vulnerability scanning, and penetration testing, highlighting the presence of knowledgeable professionals within academic institutions. Additionally, active scanning using network scanning tools and automated vulnerability scanning tools emerge as highly effective methods. However, concerns arise as the respondents show that the academic institutions conduct these practices rarely or never. Notably, many respondents have reported significant vulnerabilities or security incidents through these security measures within their institution. This study concludes with recommendations to enhance network security awareness and practices among faculty, staff, IT personnel, and students, ultimately fortifying the security posture of academic networks in the digital age.

Keywords: network security, academic networks, vulnerability scanning, penetration testing, information security

Procedia PDF Downloads 46
5488 Study of the Optical Illusion Effects of Color Contrasts on Body Image Perception

Authors: A. Hadj Taieb, H. Ennouri

Abstract:

The current study aimed to investigate the effect that optical illusion garments have on a woman’s self-perception of her own body shape. First, we created different optical illusion garment by using color contrasts. Second, a short survey based on visual perception is addressed to women in order to compare the different optical illusion garments to determine if they met the established 'ideal' body shape. A ‘visual analysis method’ was used to investigate the clothing models with optical illusions. The theories in relation with the optical illusion were used through this method. The effects of the optical illusion of color contrast on body shape in the fashion sector were tried to be revealed.

Keywords: optical illusion, color contrasts, body image perception, self-esteem

Procedia PDF Downloads 266
5487 A Fuzzy Nonlinear Regression Model for Interval Type-2 Fuzzy Sets

Authors: O. Poleshchuk, E. Komarov

Abstract:

This paper presents a regression model for interval type-2 fuzzy sets based on the least squares estimation technique. Unknown coefficients are assumed to be triangular fuzzy numbers. The basic idea is to determine aggregation intervals for type-1 fuzzy sets, membership functions of whose are low membership function and upper membership function of interval type-2 fuzzy set. These aggregation intervals were called weighted intervals. Low and upper membership functions of input and output interval type-2 fuzzy sets for developed regression models are considered as piecewise linear functions.

Keywords: interval type-2 fuzzy sets, fuzzy regression, weighted interval

Procedia PDF Downloads 362
5486 Advanced Machine Learning Algorithm for Credit Card Fraud Detection

Authors: Manpreet Kaur

Abstract:

When legitimate credit card users are mistakenly labelled as fraudulent in numerous financial delated applications, there are numerous ethical problems. The innovative machine learning approach we have suggested in this research outperforms the current models and shows how to model a data set for credit card fraud detection while minimizing false positives. As a result, we advise using random forests as the best machine learning method for predicting and identifying credit card transaction fraud. The majority of victims of these fraudulent transactions were discovered to be credit card users over the age of 60, with a higher percentage of fraudulent transactions taking place between the specific hours.

Keywords: automated fraud detection, isolation forest method, local outlier factor, ML algorithm, credit card

Procedia PDF Downloads 99
5485 Innate Immunity of Insects in Brief

Authors: Ehsan Soleymaninejadian

Abstract:

As the field of immunology is growing day by day, and its chaotic system amazes more people, greed of research in this area is growing; however dealing with human or mammalian cells such as mice make the research expensive. Although there are some differences between higher animals with insects, importance of innate immunity during evolution made it untouched. So, for understanding the innate immunity insects can be good models. They are cheap; reproduction is fast and in the case genetics, less complicated. In this review, we tried to briefly tackle with important factors in insects’ innate immunity such as melanization, encapsulation, JAK-STAT, IMD, and Toll pathways. At the end, we explained how hormones and nerve system also can impact on immune system and make it more beautiful. In concluding remarks, the possibility of taking help from insect immune system to fight against diseases such as cancer has been considered.

Keywords: insects, innate immunity, melanization, intracellular pathways, hormones

Procedia PDF Downloads 220
5484 Future of E-Democracy in Polarized Politics and Role of Government with Perspective of E-Leadership in Pakistan

Authors: Kousar Shaheen

Abstract:

The electoral process of Pakistan always remains underestimated due to malpractices claimed by the political leaders. The democratic system relies on public decision, selectorial process, transparent arrangements made by public administration, and governance system. Political polarization plays a vital role in any democratic system, which depends upon the way of applying leadership capabilities. In modern societies, public engagement is playing a key role in changing political polarization and implementation of the newest technologies, e-leadership and e-governance to bring e-democracy. The Overseas Pakistanis are unable to cast their votes in the selectorial process of Pakistan. To align this issue with civil society, efforts were made to implement modernized services and facilities by intervening in the Supreme Court. However, the results were found insignificant because of ineffective citizen engagement, IT-based, governance and public administration. which proved that the shifting to advanced society is crucial in Pakistan due to the elected Officials of current democratic system. It is an empirical study to involve Pakistani nationals (overseas) in the democratic process by utilizing the digital facility of vote casting. The role of Government. The role of e-leadership in changing the political polarization for the implementation of e-election will be measured by collecting data from different sources.

Keywords: e-democracy, e-leadership, political polarization, public engagement

Procedia PDF Downloads 31
5483 Effects of in silico (Virtual Lab) And in vitro (inside the Classroom) Labs in the Academic Performance of Senior High School Students in General Biology

Authors: Mark Archei O. Javier

Abstract:

The Fourth Industrial Revolution (FIR) is a major industrial era characterized by the fusion of technologies that is blurring the lines between the physical, digital, and biological spheres. Since this era teaches us how to thrive in the fast-paced developing world, it is important to be able to adapt. With this, there is a need to make learning and teaching in the bioscience laboratory more challenging and engaging. The goal of the research is to find out if using in silico and in vitro laboratory activities compared to the conventional conduct laboratory activities would have positive impacts on the academic performance of the learners. The potential contribution of the research is that it would improve the teachers’ methods in delivering the content to the students when it comes to topics that need laboratory activities. This study will develop a method by which teachers can provide learning materials to the students. A one-tailed t-Test for independent samples was used to determine the significant difference in the pre- and post-test scores of students. The tests of hypotheses were done at a 0.05 level of significance. Based on the results of the study, the gain scores of the experimental group are greater than the gain scores of the control group. This implies that using in silico and in vitro labs for the experimental group is more effective than the conventional method of doing laboratory activities.

Keywords: academic performance, general biology, in silico laboratory, in vivo laboratory, virtual laboratory

Procedia PDF Downloads 188
5482 Approaches of Flight Level Selection for an Unmanned Aerial Vehicle Round-Trip in Order to Reach Best Range Using Changes in Flight Level Winds

Authors: Dmitry Fedoseyev

Abstract:

The ultimate success of unmanned aerial vehicles (UAVs) depends largely on the effective control of their flight, especially in variable wind conditions. This paper investigates different approaches to selecting the optimal flight level to maximize the range of UAVs. We propose to consider methods based on mathematical models of atmospheric conditions, as well as the use of sensor data and machine learning algorithms to automatically optimize the flight level in real-time. The proposed approaches promise to improve the efficiency and range of UAVs in various wind conditions, which may have significant implications for the application of these systems in various fields, including geodesy, environmental surveillance, and search and rescue operations.

Keywords: drone, UAV, flight trajectory, wind-searching, efficiency

Procedia PDF Downloads 50
5481 An Application of the Single Equation Regression Model

Authors: S. K. Ashiquer Rahman

Abstract:

Recently, oil has become more influential in almost every economic sector as a key material. As can be seen from the news, when there are some changes in an oil price or OPEC announces a new strategy, its effect spreads to every part of the economy directly and indirectly. That’s a reason why people always observe the oil price and try to forecast the changes of it. The most important factor affecting the price is its supply which is determined by the number of wildcats drilled. Therefore, a study about the number of wellheads and other economic variables may give us some understanding of the mechanism indicated by the amount of oil supplies. In this paper, we will consider a relationship between the number of wellheads and three key factors: the price of the wellhead, domestic output, and GNP constant dollars. We also add trend variables in the models because the consumption of oil varies from time to time. Moreover, this paper will use an econometrics method to estimate parameters in the model, apply some tests to verify the result we acquire, and then conclude the model.

Keywords: price, domestic output, GNP, trend variable, wildcat activity

Procedia PDF Downloads 51
5480 End To End Process to Automate Batch Application

Authors: Nagmani Lnu

Abstract:

Often, Quality Engineering refers to testing the applications that either have a User Interface (UI) or an Application Programming Interface (API). We often find mature test practices, standards, and automation regarding UI or API testing. However, another kind is present in almost all types of industries that deal with data in bulk and often get handled through something called a Batch Application. This is primarily an offline application companies develop to process large data sets that often deal with multiple business rules. The challenge gets more prominent when we try to automate batch testing. This paper describes the approaches taken to test a Batch application from a Financial Industry to test the payment settlement process (a critical use case in all kinds of FinTech companies), resulting in 100% test automation in Test Creation and Test execution. One can follow this approach for any other batch use cases to achieve a higher efficiency in their testing process.

Keywords: batch testing, batch test automation, batch test strategy, payments testing, payments settlement testing

Procedia PDF Downloads 49
5479 Developing a Clustered-Based Model and Strategy for Waterfront Urban Tourism in Manado, Indonesia

Authors: Bet El Silisna Lagarense, Agustinus Walansendow

Abstract:

Manado Waterfront Development (MWD) occurs along the coastline of the city to meet the communities’ various needs and interests. Manado waterfront, with its various kinds of tourist attractions, is being developed to strengthen opportunities for both tourism and other businesses. There are many buildings that are used for trade and business purposes. The spatial distributions of tourism, commercial and residential land uses overlap. Field research at the study site consisted desktop scan, questionnaire-based survey, observation and in-depth interview with key informants and Focus Group Discussion (FGD) identified how MWD was initially planned and designed in the whole process of decision making in terms of resource and environmental management particularly for the waterfront tourism development in the long run. The study developed a clustered-based model for waterfront urban tourism in Manado through evaluation of spatial distribution of tourism uses along the waterfront.

Keywords: clustered-based model, Manado, urban tourism, waterfront

Procedia PDF Downloads 291
5478 Enterprise Harmonic Fusion as National Sustainability

Authors: L. R. Valencia Pérez, J. M. Peña Aguilar, Valencia Pérez, Héctor Fernando, Lamadrid A. Alberto, Vivanco V. Martín

Abstract:

Cosmology is a discipline commonly linked to philosophy. In this work, we show cosmology, from a perspective that can provide some proposals to help develop SMB in Mexico. We start from the belief that, in a complex world, the solutions to problems must nurture from different approaches. In order to be able to do this, we need to change our point of reference and use theoretical proposals and methodologies that came from other disciplines; in this case, we will try to show that between philosophy and administration exist dialogs that need to be incentivized. The work is structured in three parts. In the first one, we create a description of cosmology and how it could be applied to business. In the second, we show some of the most common problems that the SMB suffer from and in the third, we present a proposal of how cosmology can help improve the development. Finally, we concluded that better understanding of real needs, integration of knowledge at large scale and using information technologies within the cosmology framework presentment could make a difference.

Keywords: harmonic fusion, national sustainability, financial management, triple helix

Procedia PDF Downloads 385
5477 The Analysis of Different Classes of Weighted Fuzzy Petri Nets and Their Features

Authors: Yurii Bloshko, Oksana Olar

Abstract:

This paper presents the analysis of 6 different classes of Petri nets: fuzzy Petri nets (FPN), generalized fuzzy Petri nets (GFPN), parameterized fuzzy Petri nets (PFPN), T2GFPN, flexible generalized fuzzy Petri nets (FGFPN), binary Petri nets (BPN). These classes were simulated in the special software PNeS® for the analysis of its pros and cons on the example of models which are dedicated to the decision-making process of passenger transport logistics. The paper includes the analysis of two approaches: when input values are filled with the experts’ knowledge; when fuzzy expectations represented by output values are added to the point. These approaches fulfill the possibilities of triples of functions which are replaced with different combinations of t-/s-norms.

Keywords: fuzzy petri net, intelligent computational techniques, knowledge representation, triangular norms

Procedia PDF Downloads 136
5476 Surface Roughness Analysis, Modelling and Prediction in Fused Deposition Modelling Additive Manufacturing Technology

Authors: Yusuf S. Dambatta, Ahmed A. D. Sarhan

Abstract:

Fused deposition modelling (FDM) is one of the most prominent rapid prototyping (RP) technologies which is being used to efficiently fabricate CAD 3D geometric models. However, the process is coupled with many drawbacks, of which the surface quality of the manufactured RP parts is among. Hence, studies relating to improving the surface roughness have been a key issue in the field of RP research. In this work, a technique of modelling the surface roughness in FDM is presented. Using experimentally measured surface roughness response of the FDM parts, an ANFIS prediction model was developed to obtain the surface roughness in the FDM parts using the main critical process parameters that affects the surface quality. The ANFIS model was validated and compared with experimental test results.

Keywords: surface roughness, fused deposition modelling (FDM), adaptive neuro fuzzy inference system (ANFIS), orientation

Procedia PDF Downloads 448
5475 Options Trading and Crash Risk

Authors: Cameron Truong, Mikhail Bhatia, Yangyang Chen, Viet Nga Cao

Abstract:

Using a sample of U.S. firms between 1996 and 2011, this paper documents a positive association between options trading volume and future stock price crash risk. This relation is evidently more pronounced among firms with higher information asymmetry, business uncertainty, and short-sale constraints. In a dichotomous cross-sectional setting, we also document that firms with options trading have higher future crash risk than firms without options trading. We further show in a difference-in-difference analysis that firms experience an increase in crash risk immediately after the listing of options. The results suggest that options traders are able of identifying bad news hoarding by management and choose to trade in a liquid options market in anticipation of future crashes.

Keywords: bad news hoarding, cross-sectional setting, options trading, stock price crash

Procedia PDF Downloads 442
5474 High Resolution Image Generation Algorithm for Archaeology Drawings

Authors: Xiaolin Zeng, Lei Cheng, Zhirong Li, Xueping Liu

Abstract:

Aiming at the problem of low accuracy and susceptibility to cultural relic diseases in the generation of high-resolution archaeology drawings by current image generation algorithms, an archaeology drawings generation algorithm based on a conditional generative adversarial network is proposed. An attention mechanism is added into the high-resolution image generation network as the backbone network, which enhances the line feature extraction capability and improves the accuracy of line drawing generation. A dual-branch parallel architecture consisting of two backbone networks is implemented, where the semantic translation branch extracts semantic features from orthophotographs of cultural relics, and the gradient screening branch extracts effective gradient features. Finally, the fusion fine-tuning module combines these two types of features to achieve the generation of high-quality and high-resolution archaeology drawings. Experimental results on the self-constructed archaeology drawings dataset of grotto temple statues show that the proposed algorithm outperforms current mainstream image generation algorithms in terms of pixel accuracy (PA), structural similarity (SSIM), and peak signal-to-noise ratio (PSNR) and can be used to assist in drawing archaeology drawings.

Keywords: archaeology drawings, digital heritage, image generation, deep learning

Procedia PDF Downloads 45
5473 Dynamic Analysis of Differential Systems with Infinite Memory and Damping

Authors: Kun-Peng Jin, Jin Liang, Ti-Jun Xiao

Abstract:

In this work, we are concerned with the dynamic behaviors of solutions to some coupled systems with infinite memory, which consist of two partial differential equations where only one partial differential equation has damping. Such coupled systems are good mathematical models to describe the deformation and stress characteristics of some viscoelastic materials affected by temperature change, external forces, and other factors. By using the theory of operator semigroups, we give wellposedness results for the Cauchy problem for these coupled systems. Then, with the help of some auxiliary functions and lemmas, which are specially designed for overcoming difficulties in the proof, we show that the solutions of the coupled systems decay to zero in a strong way under a few basic conditions. The results in this dynamic analysis of coupled systems are generalizations of many existing results.

Keywords: dynamic analysis, coupled system, infinite memory, damping.

Procedia PDF Downloads 212
5472 Educational Robotics with Easy Implementation and Low Cost

Authors: Maria R. A. R. Moreira, Francisco R. O. Da Silva, André O. A. Fontenele, Érick A. Ribeiro

Abstract:

This article deals with the influence of technology in education showing educational robotics as pedagogical method of solution for knowledge building. We are proposing the development and implementation of four robot models that can be used for teaching purposes involving the areas of mechatronics, mechanics, electronics and computing, making it efficient for learning other sciences and theories. One of the main reasons for application of the developed educational kits is its low cost, allowing its applicability to a greater number of educational institutions. The technology will add to education dissemination of knowledge by means of experiments in such a way that the pedagogical robotics promotes understanding, practice, solution and criticism about classroom challenges. We also present the relationship between education, science, technology and society through educational robotics, treated as an incentive to technological careers.

Keywords: education, mecatronics, robotics, technology

Procedia PDF Downloads 377
5471 Marketing in the Fashion Industry and Its Critical Success Factors: The Case of Fashion Dealers in Ghana

Authors: Kumalbeo Paul Kamani

Abstract:

Marketing plays a very important role in the success of any firm since it represents the means through which a firm can reach its customers and also promotes its products and services. In fact, marketing aids the firm in identifying customers who the business can competitively serve, and tailoring product offerings, prices, distribution, promotional efforts, and services towards those customers. Unfortunately, in many firms, marketing has been reduced to merely advertisement. For effective marketing, firms must go beyond this often-limited function of advertisement. In the fashion industry in particular, marketing faces challenges due to its peculiar characteristics. Previous research for instance affirms the idiosyncrasy and peculiarities that differentiate the fashion industry from other industrial areas. It has been documented that the fashion industry is characterized seasonal intensity, short product life cycles, the difficulty of competitive differentiation, and long time for companies to reach financial stability. These factors are noted to pose obstacles to the fashion entrepreneur’s endeavours and can be the reasons that explain their low survival rates. In recent times, the fashion industry has been described as a market that is accessible market, has low entry barriers, both in terms of needed capital and skills which have all accounted for the burgeoning nature of startups. Yet as already stated, marketing is particularly challenging in the industry. In particular, areas such as marketing, branding, growth, project planning, financial and relationship management might represent challenges for the fashion entrepreneur but that have not been properly addressed by previous research. It is therefore important to assess marketing strategies of fashion firms and the factors influencing their success. This study generally sought to examine marketing strategies of fashion dealers in Ghana and their critical success factors. The study employed the quantitative survey research approach. A total of 120 fashion dealers were sampled. Questionnaires were used as instrument of data collection. Data collected was analysed using quantitative techniques including descriptive statistics and Relative Importance Index. The study revealed that the marketing strategies used by fashion apparels are text messages using mobile phones, referrals, social media marketing, and direct marketing. Results again show that the factors influencing fashion marketing effectiveness are strategic management, marketing mix (product, price, promotion etc), branding and business development. Policy implications are finally outlined. The study recommends among others that there is a need for the top management executive to craft and adopt marketing strategies that enable that are compatible with the fashion trends and the needs of the customers. This will improve customer satisfaction and hence boost market penetration. The study further recommends that the fashion industry in Ghana should seek to ensure that fashion apparels accommodate the diversity and the cultural setting of different customers to meet their unique needs.

Keywords: marketing, fashion, industry, success factors

Procedia PDF Downloads 32
5470 Analysis of the Impact of NVivo and EndNote on Academic Research Productivity

Authors: Sujit K. Basak

Abstract:

The aim of this paper is to analyze the impact of literature review software on researchers. The aim of this study was achieved by analyzing models in terms of perceived usefulness, perceived ease of use, and acceptance level. Collected data was analyzed using WarpPLS 4.0 software. This study used two theoretical frameworks namely Technology Acceptance Model and the Training Needs Assessment Model. The study was experimental and was conducted at a public university in South Africa. The results of the study showed that acceptance level has a high impact on research workload and productivity followed by perceived usefulness and perceived ease of use.

Keywords: technology acceptance model, training needs assessment model, literature review software, research productivity

Procedia PDF Downloads 496
5469 Hosoya Polynomials of Mycielskian Graphs

Authors: Sanju Vaidya, Aihua Li

Abstract:

Vulnerability measures and topological indices are crucial in solving various problems such as the stability of the communication networks and development of mathematical models for chemical compounds. In 1947, Harry Wiener introduced a topological index related to molecular branching. Now there are more than 100 topological indices for graphs. For example, Hosoya polynomials (also called Wiener polynomials) were introduced to derive formulas for certain vulnerability measures and topological indices for various graphs. In this paper, we will find a relation between the Hosoya polynomials of any graph and its Mycielskian graph. Additionally, using this we will compute vulnerability measures, closeness and betweenness centrality, and extended Wiener indices. It is fascinating to see how Hosoya polynomials are useful in the two diverse fields, cybersecurity and chemistry.

Keywords: hosoya polynomial, mycielskian graph, graph vulnerability measure, topological index

Procedia PDF Downloads 62
5468 Estimation of Sediment Transport into a Reservoir Dam

Authors: Kiyoumars Roushangar, Saeid Sadaghian

Abstract:

Although accurate sediment load prediction is very important in planning, designing, operating and maintenance of water resources structures, the transport mechanism is complex, and the deterministic transport models are based on simplifying assumptions often lead to large prediction errors. In this research, firstly, two intelligent ANN methods, Radial Basis and General Regression Neural Networks, are adopted to model of total sediment load transport into Madani Dam reservoir (north of Iran) using the measured data and then applicability of the sediment transport methods developed by Engelund and Hansen, Ackers and White, Yang, and Toffaleti for predicting of sediment load discharge are evaluated. Based on comparison of the results, it is found that the GRNN model gives better estimates than the sediment rating curve and mentioned classic methods.

Keywords: sediment transport, dam reservoir, RBF, GRNN, prediction

Procedia PDF Downloads 491