Search results for: web of things
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 851

Search results for: web of things

281 Mapping a Data Governance Framework to the Continuum of Care in the Active Assisted Living Context

Authors: Gaya Bin Noon, Thoko Hanjahanja-Phiri, Laura Xavier Fadrique, Plinio Pelegrini Morita, Hélène Vaillancourt, Jennifer Teague, Tania Donovska

Abstract:

Active Assisted Living (AAL) refers to systems designed to improve the quality of life, aid in independence, and create healthier lifestyles for care recipients. As the population ages, there is a pressing need for non-intrusive, continuous, adaptable, and reliable health monitoring tools to support aging in place. AAL has great potential to support these efforts with the wide variety of solutions currently available, but insufficient efforts have been made to address concerns arising from the integration of AAL into care. The purpose of this research was to (1) explore the integration of AAL technologies and data into the clinical pathway, and (2) map data access and governance for AAL technology in order to develop standards for use by policy-makers, technology manufacturers, and developers of smart communities for seniors. This was done through four successive research phases: (1) literature search to explore existing work in this area and identify lessons learned; (2) modeling of the continuum of care; (3) adapting a framework for data governance into the AAL context; and (4) interviews with stakeholders to explore the applicability of previous work. Opportunities for standards found in these research phases included a need for greater consistency in language and technology requirements, better role definition regarding who can access and who is responsible for taking action based on the gathered data, and understanding of the privacy-utility tradeoff inherent in using AAL technologies in care settings.

Keywords: active assisted living, aging in place, internet of things, standards

Procedia PDF Downloads 133
280 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications

Authors: Ariq Bani Hardi

Abstract:

Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?

Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic

Procedia PDF Downloads 128
279 The Effects of Incompetence in the Use of Mother Tongue on the Spoken English of Selected Primary School Pupils in Abeokuta South Local Government Ogun State, Nigeria

Authors: K. G. Adeosun, K. Osunaiye, E. C. Chinaguh, M. A. Aliyu, C. A. Onifade

Abstract:

This study examined the effects of incompetence in the use of the mother tongue on the spoken English of selected Primary School pupils in Abeokuta South Local Government, Ogun State, Nigeria. The study used a structured questionnaire and interview guide as data collection instruments. The target population was 110 respondents. The sample was obtained by the use of simple random and stratified sampling techniques. The study samples were pupils from Government Primary Schools in Abeokuta South Local Government. The result revealed that the majority of pupils exhibited mother tongue interference in their oral production stage and that the local indigenous languages interfered with the pronunciation of English words to a large extent such that they pronounced ‘people’ as ‘fitful.’ The findings also revealed that there is no significant difference between inadequate teaching materials, shortage of funds towards the promotion of the mother tongue (Yoruba) and spoken English of Primary school pupils in the study area. The study recommended, among other things, that government should provide the necessary support for schools in the areas of teaching and learning materials, funds and other related materials that can enhance the effective use of the mother tongue towards spoken English by Primary School pupils. Government should ensure that oral English is taught to the pupils and the examination at the end of Primary school education should be made compulsory for all pupils. More so, the Government should provide language laboratories and other equipment to facilitate good teaching and learning of oral English.

Keywords: education, effective, government, learning, teaching

Procedia PDF Downloads 83
278 Ecotoxicity Evaluation Methodology for Metallurgical and Steel Wastes

Authors: G. Pelozo, N. Quaranta

Abstract:

The assessment of environmental hazard and ecotoxicological potential of industrial wastes has become an issue of concern in many countries. Therefore, the aim of this work is to develop a methodology, adapting an Argentinian standard, which allows analyze the ecotoxicological effect of various metallurgical and steel wastes. Foundry sand, white mud, red mud, electric arc furnace dust, converter slag, among others, are the studied wastes. The species used to analyze the ecotoxicological effects of wastes is rye grass (Lolium Perenne). The choice of this kind lies, among other things, in its easy and rapid germination making it possible to develop the test in a few days. Moreover, since the processes involved are general for most seeds, the obtained results with this kind are representative, in general, of the effects on seeds or seedlings. Since the studied residues are solids, prior to performing the assay, an eluate is obtained by stirring for 2 hours and subsequent filtration of a solution of waste in water in a relationship of 1:4. This represents 100% of eluate from which two dilutions in water (25% and 50%) are prepared. A sample with untreated solid waste and water is also performed. The test is performed by placing two filter papers in a Petri dish that are saturated with 3.5ml of the prepared dilutions. After that 20 rye grass seeds are placed, and the Petri dishes are covered and the seeds are incubated for 120 hours at 24 °C. Reference controls are carried out by distilled water. Three replicates are performed for each concentration. Once the exposure period is finished, inhibiting elongation of the root is measured (IR). The results of this test show that all the studied wastes produce an unfavorable effect on the development of the seedlings, being the electric arc furnace dust which more affects the germination.

Keywords: ecotoxicity, industrial wastes, environmental hazard, seeds

Procedia PDF Downloads 403
277 Digital Skill Framework Required by Students of Building Technology in Nigerian Higher Institutions

Authors: Shirka Kassam Jwasshaka

Abstract:

Graduates from higher educational institutions in Nigeria need to leave with the necessary skills to be independent in the emergence work environment. The goal of this study is to develop a framework of digital skills that Nigerian graduates in building construction need to be proficient in various digital skills to comfortably fit into the global advances in a technological labour market. The descriptive survey design was used in this investigation. The study's population consisted of building construction experts selected from different sites within the North Central geographical zones of Nigeria. Using random sampling approaches, 120 seasoned experts were chosen. Three research questions raised by the researchers guided the study. The data was gathered using a 60-item, structured questionnaire. The questions were formulated around three key skill areas such as digital skills related to ICT, digital skills related to general workforce, and basic digital literacy skills that students should have. A building construction specialist validated the questionnaire. Winstep in conjunction with SPSS was used to determine the Cronbach Alpha reliability of the items' internal consistency and person separation,item measure, item fit based on PTMEA CORR, polarity items, misfit items, unidimensionality, and a person-item map. The Cronbach Coefficient reliability of items for the three sub constructs was 0.70. The results showed nearly every sub component within the three areas of digital skills was regarded as significant to be learn by experts. The researchers recommended among other things, that all parties involved in the education sector should work together to develop a curriculum that covers digital skills which can meet employer’s' needs.

Keywords: lifelong learning, digital skill, framework, building technology

Procedia PDF Downloads 61
276 Teachers' Knowledge, Perceptions, and Attitudes towards Renewable Energy Policy in Malaysia

Authors: Kazi Enamul Hoque

Abstract:

Initiatives on sustainable development are currently aggressively pursued throughout the world. The Malaysian government has developed key policies and strategies for over 30 years to achieve the nation’s policy objectives which are designed to mitigate the issues of security, energy efficiency and environmental impact to meet the rising energy demand. Malaysia’s current focus is on developing effective policies on renewable energy (RE) in order to reduce dependency on fossil fuel and contribute towards mitigating the effects of climate change. In this light mass awareness should be considered as the highest priority to protect the environment and to escape disaster due to climate change. Schools can be the reliable and effective foundation to prepare students to get familiar with environmental issues such as renewable and non-renewable energy sources. Teachers can play a vital role to create awareness among students about the advantages and disadvantages of using different renewable and nonrenewable energy resources. Thus, this study aims to investigate teachers’ knowledge, perceptions and attitudes towards renewable energy through a survey aiming a sustainable energy future. Five hundred sets of questionnaires were distributed to the school teachers in Malaysia. Total 420 questionnaires were returned of which 410 were complete to analyze. Finding shows that teachers are very familiar with the renewable energy like solar, wind and also geothermal. Most teachers were not sure about the Photovoltaics and biodiesel. Furthermore, teachers are also aware that primary energy in Malaysia is imported fossil fuels. Most teachers heard about the renewable energy in Malaysia and only few claims that they did not hear of such things and the others said that they never heard of it. The outcomes of the study will assist the energy policy makers to use teachers to create mass awareness of energy usages for future planning.

Keywords: Malaysia, non-renewable energy, renewable energy, school teacher

Procedia PDF Downloads 439
275 Optimizing Data Integration and Management Strategies for Upstream Oil and Gas Operations

Authors: Deepak Singh, Rail Kuliev

Abstract:

The abstract highlights the critical importance of optimizing data integration and management strategies in the upstream oil and gas industry. With its complex and dynamic nature generating vast volumes of data, efficient data integration and management are essential for informed decision-making, cost reduction, and maximizing operational performance. Challenges such as data silos, heterogeneity, real-time data management, and data quality issues are addressed, prompting the proposal of several strategies. These strategies include implementing a centralized data repository, adopting industry-wide data standards, employing master data management (MDM), utilizing real-time data integration technologies, and ensuring data quality assurance. Training and developing the workforce, “reskilling and upskilling” the employees and establishing robust Data Management training programs play an essential role and integral part in this strategy. The article also emphasizes the significance of data governance and best practices, as well as the role of technological advancements such as big data analytics, cloud computing, Internet of Things (IoT), and artificial intelligence (AI) and machine learning (ML). To illustrate the practicality of these strategies, real-world case studies are presented, showcasing successful implementations that improve operational efficiency and decision-making. In present study, by embracing the proposed optimization strategies, leveraging technological advancements, and adhering to best practices, upstream oil and gas companies can harness the full potential of data-driven decision-making, ultimately achieving increased profitability and a competitive edge in the ever-evolving industry.

Keywords: master data management, IoT, AI&ML, cloud Computing, data optimization

Procedia PDF Downloads 71
274 Impact of Lifelong-Learning Mindset on Career Success of the Accounting and Finance Professionals

Authors: R. W. A. V. A. Wijenayake, P. M. R. N. Fernando, S. Nilesh, M. D. G. M. S. Diddeniya, M. Weligodapola, P. Shamila

Abstract:

The study is designed to examine the impact of a lifelong learning mindset on the career success of accounting and finance professionals in the western province of Sri Lanka. The learning mindset impacts the career success of accounting and finance professionals. The main objective of this study is to identify how the lifelong-learning mindset impacts on the career success of accounting and finance professionals. The lifelong learning mindset is the desire to learn new things and curiosity, resilience, and strategic thinking are the selected constructs to measure the lifelong learning mindset. Career success refers to certain objectives and emotional measures of improvement in one’s work life. The related variables of career success are measured through the number of promotions that have been granted in his/her work life. Positivism is the research paradigm, and the deductive approach is involved as this study relies on testing an existing theory. To conduct the study, the accounting and finance professionals in the western province in Sri Lanka were selected because most reputed international and local companies and specifically, headquarters of most of the companies are in western province. The responses cannot be collected from the whole population. Therefore, this study used a simple random sampling method, and the sample size was 120. Therefore, to identify the impact, 5-point Likert scale is used to perform this quantitative data. Required data gathered through an online questionnaire and the final outputs of the study will offer certain important recommendations to several parties such as universities, undergraduates, companies, and the policymakers to improve, help mentally and financially and motivate the students and the employees to continue their studies without ceasing after completion of their degree.

Keywords: career success, curiosity, lifelong learning mindset, resilience, strategic thinking

Procedia PDF Downloads 88
273 Human-Centric Sensor Networks for Comfort and Productivity in Offices: Integrating Environmental, Body Area Network, and Participatory Sensing

Authors: Chenlu Zhang, Wanni Zhang, Florian Schaule

Abstract:

Indoor environment in office buildings directly affects comfort, productivity, health, and well-being of building occupants. Wireless environmental sensor networks have been deployed in many modern offices to monitor and control the indoor environments. However, indoor environmental variables are not strong enough predictors of comfort and productivity levels of every occupant due to personal differences, both physiologically and psychologically. This study proposes human-centric sensor networks that integrate wireless environmental sensors, body area network sensors and participatory sensing technologies to collect data from both environment and human and support building operations. The sensor networks have been tested in one small-size and one medium-size office rooms with 22 participants for five months. Indoor environmental data (e.g., air temperature and relative humidity), physiological data (e.g., skin temperature and Galvani skin response), and physiological responses (e.g., comfort and self-reported productivity levels) were obtained from each participant and his/her workplace. The data results show that: (1) participants have different physiological and physiological responses in the same environmental conditions; (2) physiological variables are more effective predictors of comfort and productivity levels than environmental variables. These results indicate that the human-centric sensor networks can support human-centric building control and improve comfort and productivity in offices.

Keywords: body area network, comfort and productivity, human-centric sensors, internet of things, participatory sensing

Procedia PDF Downloads 140
272 For Post-traumatic Stress Disorder Counselors in China, the United States, and around the Globe, Cultural Beliefs Offer Challenges and Opportunities

Authors: Anne Giles

Abstract:

Trauma is generally defined as an experience, or multiple experiences, overwhelming a person's ability to cope. Over time, many people recover from the neurobiological, physical, and emotional effects of trauma on their own. For some people, however, troubling symptoms develop over time that can result in distress and disability. This cluster of symptoms is classified as Post-traumatic Stress Disorder (PTSD). People who meet the criteria for PTSD and other trauma-related disorder diagnoses often hold a set of understandable but unfounded beliefs about traumatic events that cause undue suffering. Becoming aware of unhelpful beliefs—termed "cognitive distortions"—and challenging them is the realm of Cognitive Behavior Therapy (CBT). A form of CBT found by researchers to be especially effective for PTSD is Cognitive Processing Therapy (CPT). Through the compassionate use of CPT, people identify, examine, challenge, and relinquish unhelpful beliefs, thereby reducing symptoms and suffering. Widely-held cultural beliefs can interfere with the progress of recovery from trauma-related disorders. Although highly revered, largely unquestioned, and often stabilizing, cultural beliefs can be founded in simplistic, dichotomous thinking, i.e., things are all right, or all wrong, all good, or all bad. The reality, however, is nuanced and complex. After studying examples of cultural beliefs from China and the United States and how these might interfere with trauma recovery, trauma counselors can help clients derive criteria for preserving helpful beliefs, discover, examine, and jettison unhelpful beliefs, reduce trauma symptoms, and live their lives more freely and fully.

Keywords: cognitive processing therapy (CPT), cultural beliefs, post-traumatic stress disorder (PTSD), trauma recovery

Procedia PDF Downloads 251
271 Monitor Vehicle Speed Using Internet of Things Based Wireless Sensor Network System

Authors: Akber Oumer Abdurezak

Abstract:

Road traffic accident is a major problem in Ethiopia, resulting in the deaths of many people and potential injuries and crash every year and loss of properties. According to the Federal Transport Authority, one of the main causes of traffic accident and crash in Ethiopia is over speeding. Implementation of different technologies is used to monitor the speed of vehicles in order to minimize accidents and crashes. This research aimed at designing a speed monitoring system to monitor the speed of travelling vehicles and movements, reporting illegal speeds or overspeeding vehicles to the concerned bodies. The implementation of the system is through a wireless sensor network. The proposed system can sense and detect the movement of vehicles, process, and analysis the data obtained from the sensor and the cloud system. The data is sent to the central controlling server. The system contains accelerometer and gyroscope sensors to sense and collect the data of the vehicle. Arduino to process the data and Global System for Mobile Communication (GSM) module for communication purposes to send the data to the concerned body. When the speed of the vehicle exceeds the allowable speed limit, the system sends a message to database as “over speeding”. Both accelerometer and gyroscope sensors are used to collect acceleration data. The acceleration data then convert to speed, and the corresponding speed is checked with the speed limit, and those above the speed limit are reported to the concerned authorities to avoid frequent accidents. The proposed system decreases the occurrence of accidents and crashes due to overspeeding and can be used as an eye opener for the implementation of other intelligent transport system technologies. This system can also integrate with other technologies like GPS and Google Maps to obtain better output.

Keywords: accelerometer, IOT, GSM, gyroscope

Procedia PDF Downloads 75
270 Groundhog Day as a Model for the Repeating Spectator and the Film Academic: Re-Watching the Same Films Again Can Create Different Experiences and Ideas

Authors: Leiya Ho Yin Lee

Abstract:

Groundhog Day (Harold Ramis, 1993) may seemingly be a fairly unremarkable Hollywood comedy film in the 90s, it is argued that the film, with its protagonist Phil (Bill Murray), inadvertently, but perfectly, demonstrates an important aspect in filmmaking, film spectatorship and film research: repetition. Very rarely does a narrative film use one, and only one, take in its shooting. The multiple ‘repeats’ of Phil’s various endeavours due to his being trapped in a perpetual loop of the same day — from stealing money and tricking a woman into a casual relationship, to his multiple suicides, to eventually helping people in need — make the process of doing multiple ‘takes’ in filmmaking explicit. But perhaps more significantly, Phil represents a perfect model for the spectator/cinephile who has seen their favourite film for multiple times that they can remember every single detail. Crucially, their favourite film never changes, as it is a recording, but the cinephile’s experience of that very same film is most likely different each time they watch it again, just as Phil’s character and personality has completely transformed, from selfish and egotistic, to depressed and nihilistic, and ultimately to sympathetic and caring, even though he is living the exact same day. Furthermore, the author did not come up with this stimulating juxtaposition of film spectatorship and Groundhog Day the first time the author saw the film; it took the author a few casual re-viewings to notice the film’s self-reflexivity. And then, when working on it in the author’s research, the author had to re-view the film for more times, and have subsequently noticed even more things previously unnoticed. In this way, Groundhog Day not only stands for a model for filmmaking and film spectatorship, it also illustrates the act of academic research, especially in Film Studies where repeatedly viewing the same films is a prerequisite before new ideas and concepts are discovered from old material. This also recalls Deleuze’s thesis on difference and repetition in that repetition creates difference and it is difference that creates thought.

Keywords: narrative comprehension, repeated viewing, repetition, spectatorship

Procedia PDF Downloads 321
269 Non-Revenue Water Management in Palestine

Authors: Samah Jawad Jabari

Abstract:

Water is the most important and valuable resource not only for human life but also for all living things on the planet. The water supply utilities should fulfill the water requirement quantitatively and qualitatively. Drinking water systems are exposed to both natural (hurricanes and flood) and manmade hazards (risks) that are common in Palestine. Non-Revenue Water (NRW) is a manmade risk which remains a major concern in Palestine, as the NRW levels are estimated to be at a high level. In this research, Hebron city water distribution network was taken as a case study to estimate and audit the NRW levels. The research also investigated the state of the existing water distribution system in the study area by investigating the water losses and obtained more information on NRW prevention and management practices. Data and information have been collected from the Palestinian Water Authority (PWA) and Hebron Municipality (HM) archive. In addition to that, a questionnaire has been designed and administered by the researcher in order to collect the necessary data for water auditing. The questionnaire also assessed the views of stakeholder in PWA and HM (staff) on the current status of the NRW in the Hebron water distribution system. The important result obtained by this research shows that NRW in Hebron city was high and in excess of 30%. The main factors that contribute to NRW were the inaccuracies in billing volumes, unauthorized consumption, and the method of estimating consumptions through faulty meters. Policy for NRW reduction is available in Palestine; however, it is clear that the number of qualified staff available to carry out the activities related to leak detection is low, and that there is a lack of appropriate technologies to reduce water losses and undertake sufficient system maintenance, which needs to be improved to enhance the performance of the network and decrease the level of NRW losses.

Keywords: non-revenue water, water auditing, leak detection, water meters

Procedia PDF Downloads 299
268 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: energy consumption, IEEE 802.15.4, IoT security, security cost evaluation

Procedia PDF Downloads 169
267 Study and Simulation of a Dynamic System Using Digital Twin

Authors: J.P. Henriques, E. R. Neto, G. Almeida, G. Ribeiro, J.V. Coutinho, A.B. Lugli

Abstract:

Industry 4.0, or the Fourth Industrial Revolution, is transforming the relationship between people and machines. In this scenario, some technologies such as Cloud Computing, Internet of Things, Augmented Reality, Artificial Intelligence, Additive Manufacturing, among others, are making industries and devices increasingly intelligent. One of the most powerful technologies of this new revolution is the Digital Twin, which allows the virtualization of a real system or process. In this context, the present paper addresses the linear and nonlinear dynamic study of a didactic level plant using Digital Twin. In the first part of the work, the level plant is identified at a fixed point of operation, BY using the existing method of least squares means. The linearized model is embedded in a Digital Twin using Automation Studio® from Famous Technologies. Finally, in order to validate the usage of the Digital Twin in the linearized study of the plant, the dynamic response of the real system is compared to the Digital Twin. Furthermore, in order to develop the nonlinear model on a Digital Twin, the didactic level plant is identified by using the method proposed by Hammerstein. Different steps are applied to the plant, and from the Hammerstein algorithm, the nonlinear model is obtained for all operating ranges of the plant. As for the linear approach, the nonlinear model is embedded in the Digital Twin, and the dynamic response is compared to the real system in different points of operation. Finally, yet importantly, from the practical results obtained, one can conclude that the usage of Digital Twin to study the dynamic systems is extremely useful in the industrial environment, taking into account that it is possible to develop and tune controllers BY using the virtual model of the real systems.

Keywords: industry 4.0, digital twin, system identification, linear and nonlinear models

Procedia PDF Downloads 151
266 Electro-Optic Parameters of Ferroelectric Particles- Liquid Crystal Composites

Authors: T. D. Ibragimov, A. R. Imamaliyev, G. M. Bayramov

Abstract:

Influence of barium titanate particles on electro-optic properties of liquid crystal 4-cyano-4′-pentylbiphenyl (5CB) with positive dielectric anisotropy and the liquid crystalline (LC) mixture Н-37 consisting of 4-methoxybezylidene-4'–butylaniline and 4-ethoxybezylidene-4'–butylaniline with negative dielectric anisotropy was investigated. It was shown that a presence of particles inside 5СВ and H-37 decreased the clearing temperature from 35.2 °С to 32.5°С and from 61.2 oC to 60.1oC, correspondingly. The threshold voltage of the Fredericksz effect became 0.3 V for the BaTiO3-5CB colloid while the beginning of this effect of the pure 5СВ was observed at 2.1 V. Threshold voltage of the Fredericksz effect increased from 2.8 V to up 3.1 V at additive of particles into H-37. A rise time of the BaTiO3-5CB colloid improved while a decay time worsened in comparison with the pure 5CB at all applied voltages. The inverse trends were observed for the H-37 matrix, namely, a rise time worsened and a decay time improved. Among other things, the effect of fast light modulation was studied at application of the rectangular impulse with direct bias to an electro-optical cell with the BaTiO3 particles+5CB and the pure 5CB. At this case, a rise time of the composite worsened, a decay time improved in comparison with the pure 5CB. The pecularities of electrohydrodynamic instability (EHDI) formation was also investigated into the composite with the H-37 matrix. It was found that the voltage of the EHDI formation decreased, a rise time increased and a decay time decreased in comparison with the pure H-37. First of all, experimental results are explained by appearance of local electric fields near the polarized ferroelectric particles at application of external electric field and an existence of the additional obstacles (particles) for movement of ions.

Keywords: liquid crystal, ferroelectric particles, composite, electro-optics

Procedia PDF Downloads 703
265 Real Fictions: Converging Landscapes and Imagination in an English Village

Authors: Edoardo Lomi

Abstract:

A problem of central interest in anthropology concerns the ethnographic displacement of modernity’s conceptual sovereignty over that of native collectives worldwide. Part of this critical project has been the association of Western modernity with a dualist, naturalist ontology. Despite its demonstrated value for comparative work, this association often comes at the cost of reproducing ideas that lack an empirical ethnographic basis. This paper proposes a way forward by bringing to bear some of the results produced by an ethnographic study of a village in Wiltshire, South England. Due to its picturesque qualities, this village has served for decades as a ready-made set for fantasy movies and a backdrop to fictional stories. These forms of mediation have in turn generated some apparent paradoxes, such as fictitious characters that affect actual material changes, films that become more real than history, and animated stories that, while requiring material grounds to unfold, inhabit a time and space in other respects distinct from that of material processes. Drawing on ongoing fieldwork and interviews with locals and tourists, this paper considers the ways villagers engage with fiction as part of their everyday lives. The resulting image is one of convergence, in the same landscape, of people and things having different ontological status. This study invites reflection on the implications of this image for diversifying our imagery of Western lifeworlds. To this end, the notion of ‘real fictions’ is put forth, connecting the ethnographic blurring of modernist distinctions–such as sign and signified, mind and matter, materiality and immateriality–with discussions on anthropology’s own reliance on fictions for critical comparative work.

Keywords: England, ethnography, landscape, modernity, mediation, ontology, post-structural theory

Procedia PDF Downloads 122
264 Research on the Aesthetic Characteristics of Calligraphy Art Under The Cross-Cultural Background Based on Eye Tracking

Authors: Liu Yang

Abstract:

Calligraphy has a unique aesthetic value in Chinese traditional culture. Calligraphy reflects the physical beauty and the dynamic beauty of things through the structure of writing and the order of strokes to standardize the style of writing. In recent years, Chinese researchers have carried out research on the appreciation of calligraphy works from the perspective of psychology, such as how Chinese people appreciate the beauty of stippled lines, the beauty of virtual and real, and the beauty of the composition. However, there is currently no domestic research on how foreigners appreciate Chinese calligraphy. People's appreciation of calligraphy is mainly in the form of visual perception, and psychologists have been working on the use of eye trackers to record eye tracking data to explore the relationship between eye tracking and psychological activities. The purpose of this experimental study is to use eye tracking recorders to analyze the eye gaze trajectories of college students with different cultural backgrounds when they appreciate the same calligraphy work to reveal the differences in cognitive processing with different cultural backgrounds. It was found that Chinese students perceived calligraphy as words when viewing calligraphy works, so they first noticed fonts with easily recognizable glyphs, and the overall viewed time was short. Foreign students perceived calligraphy works as graphics, and they first noticed novel and abstract fonts, and the overall viewing time is longer. The understanding of calligraphy content has a certain influence on the appreciation of calligraphy works by foreign students. It is shown that when foreign students who understand the content of calligraphy works. The eye tracking path is more consistent with the calligraphy writing path, and it helps to develop associations with calligraphy works to better understand the connotation of calligraphy works. This result helps us understand the impact of cultural background differences on calligraphy appreciation and helps us to take more effective strategies to help foreign audiences understand Chinese calligraphy art.

Keywords: Chinese calligraphy, eye-tracking, cross-cultural, cultural communication

Procedia PDF Downloads 107
263 The Conceptual Exploration of Comfort Zone by Using Content Analysis

Authors: Lilla Szabó Hangya, Szilvia Jambori

Abstract:

The comfort zone is less studied area in the field of psychology. One of the most important definitions is that comfort zone is a psychological state in which things feel familiar to a person with low level of anxiety and stress. But the validity of comfort zone does not confirm till now. The aim of our pilot research is to test which psychological factors could determine how young adults behave during their decision process to stay in one’s comfort zone or to leave it. Every person has a number of comfort zones, so we are not able to measure it directly, only those personality traits which predict if someone leaves his comfort zone easier or harder. In our study at first we wanted to clarify the meaning of comfort zone. 110 young adults (male: 37, female: 73; ages from 18 to 70, average age: 26,6) took part in the study. Beside their demographic datas we asked them what does the comfort zone mean for them. The results showed that the meaning of the comfort zone can be grouped in five dimensions: comfort (49,6 %), leaving it-change (8,1%), ambivalent feelings (10,6%), related to other people (10,6%), pursuit of self-realization (16,8%). Our results demonstrated age related characteristics. For young people at the age of 19 the comfort zone is related to other people, because during adolescents peer relationships become more important. Subjects at the age 20-30 answered that the comfort zone means comfort and stability for them. Their life becomes stable for a while, they are studying or working. But at the age of 25, when they finish university, most of them answered comfort zone means a changing process for them. On the other hand for subjects at the age of 27 the means of the comfort zone is pursuit of self-realization. After that period at the age of 31 when they have families and stable job the stability will also dominant. We saw that the comfort zone has much more meaning besides a pleasant psychological trait. Further we would like to determine which psychological factors relate to comfort zone, and what kind of personality traits could predict leaving or staying in one’s comfort zone. We want to observe the relationship between comfort zone and subjective well-being, life satisfaction self-efficacy or self-esteem.

Keywords: comfort zone, development, personality trait, young adults

Procedia PDF Downloads 342
262 Human-Centred Data Analysis Method for Future Design of Residential Spaces: Coliving Case Study

Authors: Alicia Regodon Puyalto, Alfonso Garcia-Santos

Abstract:

This article presents a method to analyze the use of indoor spaces based on data analytics obtained from inbuilt digital devices. The study uses the data generated by the in-place devices, such as smart locks, Wi-Fi routers, and electrical sensors, to gain additional insights on space occupancy, user behaviour, and comfort. Those devices, originally installed to facilitate remote operations, report data through the internet that the research uses to analyze information on human real-time use of spaces. Using an in-place Internet of Things (IoT) network enables a faster, more affordable, seamless, and scalable solution to analyze building interior spaces without incorporating external data collection systems such as sensors. The methodology is applied to a real case study of coliving, a residential building of 3000m², 7 floors, and 80 users in the centre of Madrid. The case study applies the method to classify IoT devices, assess, clean, and analyze collected data based on the analysis framework. The information is collected remotely, through the different platforms devices' platforms; the first step is to curate the data, understand what insights can be provided from each device according to the objectives of the study, this generates an analysis framework to be escalated for future building assessment even beyond the residential sector. The method will adjust the parameters to be analyzed tailored to the dataset available in the IoT of each building. The research demonstrates how human-centered data analytics can improve the future spatial design of indoor spaces.

Keywords: in-place devices, IoT, human-centred data-analytics, spatial design

Procedia PDF Downloads 197
261 Solving a Micromouse Maze Using an Ant-Inspired Algorithm

Authors: Rolando Barradas, Salviano Soares, António Valente, José Alberto Lencastre, Paulo Oliveira

Abstract:

This article reviews the Ant Colony Optimization, a nature-inspired algorithm, and its implementation in the Scratch/m-Block programming environment. The Ant Colony Optimization is a part of Swarm Intelligence-based algorithms and is a subset of biological-inspired algorithms. Starting with a problem in which one has a maze and needs to find its path to the center and return to the starting position. This is similar to an ant looking for a path to a food source and returning to its nest. Starting with the implementation of a simple wall follower simulator, the proposed solution uses a dynamic graphical interface that allows young students to observe the ants’ movement while the algorithm optimizes the routes to the maze’s center. Things like interface usability, Data structures, and the conversion of algorithmic language to Scratch syntax were some of the details addressed during this implementation. This gives young students an easier way to understand the computational concepts of sequences, loops, parallelism, data, events, and conditionals, as they are used through all the implemented algorithms. Future work includes the simulation results with real contest mazes and two different pheromone update methods and the comparison with the optimized results of the winners of each one of the editions of the contest. It will also include the creation of a Digital Twin relating the virtual simulator with a real micromouse in a full-size maze. The first test results show that the algorithm found the same optimized solutions that were found by the winners of each one of the editions of the Micromouse contest making this a good solution for maze pathfinding.

Keywords: nature inspired algorithms, scratch, micromouse, problem-solving, computational thinking

Procedia PDF Downloads 126
260 Trend Analysis of Annual Total Precipitation Data in Konya

Authors: Naci Büyükkaracığan

Abstract:

Hydroclimatic observation values ​​are used in the planning of the project of water resources. Climate variables are the first of the values ​​used in planning projects. At the same time, the climate system is a complex and interactive system involving the atmosphere, land surfaces, snow and bubbles, the oceans and other water structures. The amount and distribution of precipitation, which is an important climate parameter, is a limiting environmental factor for dispersed living things. Trend analysis is applied to the detection of the presence of a pattern or trend in the data set. Many trends work in different parts of the world are usually made for the determination of climate change. The detection and attribution of past trends and variability in climatic variables is essential for explaining potential future alteration resulting from anthropogenic activities. Parametric and non-parametric tests are used for determining the trends in climatic variables. In this study, trend tests were applied to annual total precipitation data obtained in period of 1972 and 2012, in the Konya Basin. Non-parametric trend tests, (Sen’s T, Spearman’s Rho, Mann-Kendal, Sen’s T trend, Wald-Wolfowitz) and parametric test (mean square) were applied to annual total precipitations of 15 stations for trend analysis. The linear slopes (change per unit time) of trends are calculated by using a non-parametric estimator developed by Sen. The beginning of trends is determined by using the Mann-Kendall rank correlation test. In addition, homogeneities in precipitation trends are tested by using a method developed by Van Belle and Hughes. As a result of tests, negative linear slopes were found in annual total precipitations in Konya.

Keywords: trend analysis, precipitation, hydroclimatology, Konya

Procedia PDF Downloads 220
259 Arms and Light Weapons Flow in Nigerian/Chad Border: A Reflection on the How Insurgents Had Access to Their Target

Authors: Lawan Ja’afar Tahir

Abstract:

This research work centered on the problem of free Arms flow around the Nigeria and Chad Border. The whole of the northeastern Nigerian region has been devastated by the crisis of insecurity facilitated by more than a decade of insurgency. One of the major issues of concern to security experts and personnel in the country is how the insurgents are getting access to weapons, which gave them more strength to fight the war for this long period, which has become so difficult to overcome. Among the possible avenues that continue to strengthen the enemies is the easy access to the arms flow from the neighboring countries, especially the Republic of Chad, which borders Nigeria to the east, where Boko Haram gained firm roots. This paper, therefore, looked at the nature of the waterway of the Nigeria/Chad Border, which has become a source of strength to the insurgents as the flow of weapons is one of the cheapest things on the Border. The availability of such arms flow has also led to the People abandoning their lands and economic and commercial activities, especially those settlements between the Border of these two countries. For more than eight years now, they have suspended their livelihood activities, roads were blocked and chances of survival in the rural areas were minimal due to the frequent attacks carried out by the insurgents. However, this research looks at the causes of the arms flow along the Border of these neighboring countries, the extent of damage done as a result of the availability of the weapons, and how far the Nigerian government has gone in curtailing the menace of the flow of dangerous weapons into the country. The research looked at the ways arm dealers are conniving with settlers along the border as well as the various ways they followed to reach their target. The work provided suggestion as to how the fragile Border should be managed with the view to reduce the influx of arms without control, which, according to this research, is the central factor that continues to unleash and give terror groups the opportunity to destroy people for more than a decade.

Keywords: border, insecurity, weapons, management

Procedia PDF Downloads 69
258 Trinary Affinity—Mathematic Verification and Application (1): Construction of Formulas for the Composite and Prime Numbers

Authors: Liang Ming Zhong, Yu Zhong, Wen Zhong, Fei Fei Yin

Abstract:

Trinary affinity is a description of existence: every object exists as it is known and spoken of, in a system of 2 differences (denoted dif1, dif₂) and 1 similarity (Sim), equivalently expressed as dif₁ / Sim / dif₂ and kn / 0 / tkn (kn = the known, tkn = the 'to be known', 0 = the zero point of knowing). They are mathematically verified and illustrated in this paper by the arrangement of all integers onto 3 columns, where each number exists as a difference in relation to another number as another difference, and the 2 difs as arbitrated by a third number as the Sim, resulting in a trinary affinity or trinity of 3 numbers, of which one is the known, the other the 'to be known', and the third the zero (0) from which both the kn and tkn are measured and specified. Consequently, any number is horizontally specified either as 3n, or as '3n – 1' or '3n + 1', and vertically as 'Cn + c', so that any number seems to occur at the intersection of its X and Y axes and represented by its X and Y coordinates, as any point on Earth’s surface by its latitude and longitude. Technically, i) primes are viewed and treated as progenitors, and composites as descending from them, forming families of composites, each capable of being measured and specified from its own zero called in this paper the realistic zero (denoted 0r, as contrasted to the mathematic zero, 0m), which corresponds to the constant c, and the nature of which separates the composite and prime numbers, and ii) any number is considered as having a magnitude as well as a position, so that a number is verified as a prime first by referring to its descriptive formula and then by making sure that no composite number can possibly occur on its position, by dividing it with factors provided by the composite number formulas. The paper consists of 3 parts: 1) a brief explanation of the trinary affinity of things, 2) the 8 formulas that represent ALL the primes, and 3) families of composite numbers, each represented by a formula. A composite number family is described as 3n + f₁‧f₂. Since there are an infinitely large number of composite number families, to verify the primality of a great probable prime, we have to have it divided with several or many a f₁ from a range of composite number formulas, a procedure that is as laborious as it is the surest way to verifying a great number’s primality. (So, it is possible to substitute planned division for trial division.)

Keywords: trinary affinity, difference, similarity, realistic zero

Procedia PDF Downloads 212
257 Investigate the Rural Mobility and Accessibility Challenges of Seniors

Authors: Tom Ryan

Abstract:

This paper investigates the rural mobility and accessibility challenges of a specific target group - Seniors. The target group is those over 66 years of age who are entitled to use the Public Transport (PT) Free Travel Scheme in rural Ireland. The paper explores at a high level some of the projected rural PT challenges and requirements over the next 10-15 years, noting that statistical predictions show that there will be a significant population demographic shift within the Senior's age profile. Using the PESTEL framework, the literature review explored existing research concerning mobility, accessibility challenges, and the opportunities Seniors face. Twenty-seven qualitative in-depth interviews with stakeholders within the ecosystem were undertaken. The stakeholders included: rural PT customers, Local-Link managers, NTA senior management, a Minister of State, and a European parliament policymaker. Tier 1 interviewee feedback spotlights that the PT network system does not exist for rural patients to access hospital facilities. There was no evidence from the Tier 2 research findings to show that health policymakers and transport planners are working to deliver a national solution to support patients getting access to hospital appointments. Several research interviewees discussed the theme of isolation and the perceived stigma of senior males utilising PT. The findings indicated that MaaS is potentially revolutionary in the PT arena. Finally, this paper suggests several short-, medium- and long-term recommendations based on the research findings. These recommendations are a potential springboard to ensure that rural PT is suitable for future Irish generations.

Keywords: accessibility, active ageing, car dependence, isolation, seniors health issues, behavioural changes, environmental challenges, internet of things, demand responsive, mobility as a service

Procedia PDF Downloads 110
256 Evaluation of Environmental and Social Management System of Green Climate Fund's Accredited Entities: A Qualitative Approach Applied to Environmental and Social System

Authors: Sima Majnooni

Abstract:

This paper discusses the Green Climate Fund's environmental and social management framework (GCF). The environmental and social management framework ensures the accredited entity considers the GCF's accreditation standards and effectively implements each of the GCF-funded projects. The GCF requires all accredited entities to meet basic transparency and accountability standards as well as environmental and social safeguards (ESMS). In doing so, the accredited entity sets up different independent units. One of these units is called the Grievance Mechanism. When allegations of environmental and social harms are raised in association with GCF-funded activities, affected parties can contact the entity’s grievance unit. One of the most challenging things about the accredited entity's grievance unit is the lack of available information and resources on the entities' websites. Many AEs have anti-corruption or anti-money laundering unit, but they do not have the environmental and social unit for affected people. This paper will argue the effectiveness of environmental and social grievance mechanisms of AEs by using a qualitative approach to indicate how many of AEs have a poor or an effective GRM. Some ESMSs seem highly effective. On the other hand, other mechanisms lack basic requirements such as a clear, transparent, uniform procedure and a definitive timetable. We have looked at each AE mechanism not only in light of how the website goes into detail regarding the process of grievance mechanism but also in light of their risk category. Many mechanisms appear inadequate for the lower level risk category entities (C) and, even surprisingly, for many higher-risk categories (A). We found; in most cases, the grievance mechanism of AEs seems vague.

Keywords: grievance mechanism, vague environmental and social policies, green climate fund, international climate finance, lower and higher risk category

Procedia PDF Downloads 125
255 Cas9-Assisted Direct Cloning and Refactoring of a Silent Biosynthetic Gene Cluster

Authors: Peng Hou

Abstract:

Natural products produced from marine bacteria serve as an immense reservoir for anti-infective drugs and therapeutic agents. Nowadays, heterologous expression of gene clusters of interests has been widely adopted as an effective strategy for natural product discovery. Briefly, the heterologous expression flowchart would be: biosynthetic gene cluster identification, pathway construction and expression, and product detection. However, gene cluster capture using traditional Transformation-associated recombination (TAR) protocol is low-efficient (0.5% positive colony rate). To make things worse, most of these putative new natural products are only predicted by bioinformatics analysis such as antiSMASH, and their corresponding natural products biosynthetic pathways are either not expressed or expressed at very low levels under laboratory conditions. Those setbacks have inspired us to focus on seeking new technologies to efficiently edit and refractor of biosynthetic gene clusters. Recently, two cutting-edge techniques have attracted our attention - the CRISPR-Cas9 and Gibson Assembly. By now, we have tried to pretreat Brevibacillus laterosporus strain genomic DNA with CRISPR-Cas9 nucleases that specifically generated breaks near the gene cluster of interest. This trial resulted in an increase in the efficiency of gene cluster capture (9%). Moreover, using Gibson Assembly by adding/deleting certain operon and tailoring enzymes regardless of end compatibility, the silent construct (~80kb) has been successfully refactored into an active one, yielded a series of analogs expected. With the appearances of the novel molecular tools, we are confident to believe that development of a high throughput mature pipeline for DNA assembly, transformation, product isolation and identification would no longer be a daydream for marine natural product discovery.

Keywords: biosynthesis, CRISPR-Cas9, DNA assembly, refactor, TAR cloning

Procedia PDF Downloads 283
254 World Peace and Conflict Resolution: A Solution from a Buddhist Point of View

Authors: Samitharathana R. Wadigala

Abstract:

The peace will not be established until the self-consciousness would reveal in the human beings. In this nuclear age, the establishment of a lasting peace on the earth represents the primary condition for the preservation of human civilization and survival of human beings. Nothing perhaps is so important and indispensable as the achievement and maintenance of peace in the modern world today. Peace in today’s world implies much more than the mere absence of war and violence. In the interdependent world of today the United Nations needs to be representative of the modern world and democratic in its functioning because it came into existence to save the generations from the scourge of war and conflict. Buddhism is the religion of peaceful co-existence and philosophy of enlightenment. Violence and conflict from the perspective of the Buddhist theory of interdependent origination (Paṭiccasamuppāda) are same with everything else in the world a product of causes and conditions. Buddhism is totally compatible with the congenial and peaceful global order. The canonical literature, doctrines, and philosophy of Buddhism are the best suited for inter-faith dialogue, harmony, and universal peace. Even today Buddhism can resurrect the universal brotherhood, peaceful co-existence and harmonious surroundings in the comity of nations. With its increasing vitality in regions around the world, many people today turn to Buddhism for relief and guidance at the time when peace seems to be a deferred dream more than ever. From a Buddhist point of view the roots of all unwholesome actions (Conflict) i. e. greed, hatred and delusion are viewed as the root cause of all human conflicts. Conflict often emanates from attachment to material things: pleasures, property, territory, wealth, economic dominance or political superiority. Buddhism has some particularly rich resources for deployment in dissolving conflict. Buddhism addresses the Buddhist perspective on the causes of conflict and ways to resolve conflict to realize world peace. The world has enough to satisfy every body’s needs but not every body’s greed.

Keywords: Buddhism, conflict-violence, peace, self-consciousness

Procedia PDF Downloads 209
253 Entrepreneurship Education: The Impact in Today’s World

Authors: Oghenerume V. Edah, Damilola T. Aladejana

Abstract:

Entrepreneurship Education is the process of developing and acquiring entrepreneur skills on how to identify a new business and launching the business with the realization of yielding profit optimally. It’s the process of knowing how to take risk and handle challenges that accompanies a new business without the mindset of closing it when it fails. It includes steps to take when a business is recognized, combined with acquiring resources (e.g. finances, labor, land) in the face of risk and launching the new business. Additionally, Entrepreneurship is defined as the ability and willingness to set a business in the event of making profit. It is the act of starting up a business to solve big problems or present a new life-changing solution in the society to generate profit. It’s a process where a business opportunity is identified; planned, acquired and needful steps are taken to launch a business. This involves taking up financial risk, acquiring natural resources, combined with land, capital and building up a team of people who would individually contribute or add value in order to make the new business a success. Moreover, Education is the learning of new skills or value. It’s the acquiring of knowledge and capability of doing new things. It is been able to differentiate what you know and what you don’t know yet. In this modern world, the emergence of entrepreneurship education has been magnificent. An average of 60 percent humans wants to start a business or become an entrepreneur without knowing the steps on how to startup. Moreover, many of them are good starters and they end up failing when the business is not managed well. The introduction of Entrepreneur Education in our world today would change the face of business phenomenally. It would involve the acquisition of entrepreneur skills, knowledge and attitude towards initiating a business venture. The impact of Entrepreneurship Education in our world today would increase the chances of business success because it would generate better entrepreneurs. The skills, values, concept and processes acquired through learning have changed the face of business to a positive direction globally and the impact can be felt. Entrepreneurship can be taught and also can be learnt. Like any skills it can be known.

Keywords: entrepreneurship, education, business, entrepreneur, skills

Procedia PDF Downloads 146
252 Macroeconomic Policy Coordination and Economic Growth Uncertainty in Nigeria

Authors: Ephraim Ugwu, Christopher Ehinomen

Abstract:

Despite efforts by the Nigerian government to harmonize the macroeconomic policy implementations by establishing various committees to resolve disputes between the fiscal and monetary authorities, it is still evident that the federal government had continued its expansionary policy by increasing spending, thus creating huge budget deficit. This study evaluates the effect of macroeconomic policy coordination on economic growth uncertainty in Nigeria from 1980 to 2020. Employing the Auto regressive distributed lag (ARDL) bound testing procedures, the empirical results shows that the error correction term, ECM(-1), indicates a negative sign and is significant statistically with the t-statistic value of (-5.612882 ). Therefore, the gap between long run equilibrium value and the actual value of the dependent variable is corrected with speed of adjustment equal to 77% yearly. The long run coefficient results showed that the estimated coefficients of the intercept term indicates that other things remains the same (ceteris paribus), the economics growth uncertainty will continue reduce by 7.32%. The coefficient of the fiscal policy variable, PUBEXP, indicates a positive sign and significant statistically. This implies that as the government expenditure increases by 1%, economic growth uncertainty will increase by 1.67%. The coefficient of monetary policy variable MS also indicates a positive sign and insignificant statistically. The coefficients of merchandise trade variable, TRADE and exchange rate EXR show negative signs and significant statistically. This indicate that as the country’s merchandise trade and the rate of exchange increases by 1%, the economic growth uncertainty reduces by 0.38% and 0.06%, respectively. This study, therefore, advocate for proper coordination of monetary, fiscal and exchange rate policies in order to actualize the goal of achieving a stable economic growth.

Keywords: macroeconomic, policy coordination, growth uncertainty, ARDL, Nigeria

Procedia PDF Downloads 133