Search results for: burden sharing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1852

Search results for: burden sharing

1252 Comparative Wound Healing Potential of Mitracarpus villosus Ointment and Honey in Diabetic Albino Rats by Collagen Assessment

Authors: Bawa Inalegwu, Jacob A. Jato, Ovye Akyengo, John Akighir

Abstract:

All humans will experience some type of wound in every lifetime. Most wounds heal quickly with little or no attention but, many people suffer from wounds that are complex and/or persistent therefore posing a burden. This study was designed to assess the efficacy of Mitrcarpus villous ointment against honey in diabetic rats. To achieve this, percentage wound closure and collagen assessments were used to express treatment efficacy. Results show that on day 21, rats treated with M. villosus ointment had the highest percentage closure (94.5%) while honey treated and non-treated recorded 90.0% and 83.3% respectively. Similarly, a significant difference (p < 0.05) was observed on day 21 in the total collagen deposited in wounds of diabetic rats (10.57 ± 0.7) and M. villous ointment treated wounds (11.77 ± 0.4) as compared with the non-treated diabetic rats. M. villosus ointment was efficacious in healing wounds in diabetic rats and heals wound faster than honey and may hold potential for wound healing in diabetes mellitus sufferers. However, the wound healing mechanism of this ointment

Keywords: collagen, diabetic rats, honey, Mitracarpus villosus, ointment, wound healing

Procedia PDF Downloads 200
1251 Evaluation of the Durability of a Low Carbon Asphalt Pavement Containing Carbonated Aggregates in Extreme Weather Conditions

Authors: Ka-lok Kan, Oluwatoyin Ajibade, Issa Chaer

Abstract:

Climate change’s extreme weather patterns significantly affect the durability and maintenance costs of existing asphalt Road Pavement Systems (RPS). Moreover, the current RPS imposes a considerable environmental burden, as its production involves the large-scale extraction of bitumen and the dredging of Virgin Sand and Gravel (VSG). Recent studies suggest that more sustainable alternatives, such as incorporating carbonated aggregates to reduce the use of virgin materials content in asphalt, can enhance asphalt performance while offering an effective cost management strategy. However, the impact of extreme weather conditions on the durability and maintenance requirements of these green solutions remains unexplored. This paper reports on the results of comprehensive durability tests conducted on a novel asphalt pavement to assess the effects of anticipated extreme winter and summer weather conditions. Preliminary findings indicate that the new asphalt pavement system made from carbonated aggregates demonstrates greater stability and fatigue resistance in comparison to traditional asphalt mixes.

Keywords: climate change, carbonated aggregates, green solution, asphalt

Procedia PDF Downloads 19
1250 The Promotion Effects for a Supply Chain System with a Dominant Retailer

Authors: Tai-Yue Wang, Yi-Ho Chen

Abstract:

In this study, we investigate a two-echelon supply chain with two suppliers and three retailers among which one retailer dominates other retailers. A price competition demand function is used to model this dominant retailer, which is leading market. The promotion strategies and negotiation schemes are integrated to form decision-making models under different scenarios. These models are then formulated into different mathematical programming models. The decision variables such as promotional costs, retailer prices, wholesale price, and order quantity are included in these models. At last, the distributions of promotion costs under different cost allocation strategies are discussed. Finally, an empirical example used to validate our models. The results from this empirical example show that the profit model will create the largest profit for the supply chain but with different profit-sharing results. At the same time, the more risk a member can take, the more profits are distributed to that member in the utility model.

Keywords: supply chain, price promotion, mathematical models, dominant retailer

Procedia PDF Downloads 401
1249 SPARK: An Open-Source Knowledge Discovery Platform That Leverages Non-Relational Databases and Massively Parallel Computational Power for Heterogeneous Genomic Datasets

Authors: Thilina Ranaweera, Enes Makalic, John L. Hopper, Adrian Bickerstaffe

Abstract:

Data are the primary asset of biomedical researchers, and the engine for both discovery and research translation. As the volume and complexity of research datasets increase, especially with new technologies such as large single nucleotide polymorphism (SNP) chips, so too does the requirement for software to manage, process and analyze the data. Researchers often need to execute complicated queries and conduct complex analyzes of large-scale datasets. Existing tools to analyze such data, and other types of high-dimensional data, unfortunately suffer from one or more major problems. They typically require a high level of computing expertise, are too simplistic (i.e., do not fit realistic models that allow for complex interactions), are limited by computing power, do not exploit the computing power of large-scale parallel architectures (e.g. supercomputers, GPU clusters etc.), or are limited in the types of analysis available, compounded by the fact that integrating new analysis methods is not straightforward. Solutions to these problems, such as those developed and implemented on parallel architectures, are currently available to only a relatively small portion of medical researchers with access and know-how. The past decade has seen a rapid expansion of data management systems for the medical domain. Much attention has been given to systems that manage phenotype datasets generated by medical studies. The introduction of heterogeneous genomic data for research subjects that reside in these systems has highlighted the need for substantial improvements in software architecture. To address this problem, we have developed SPARK, an enabling and translational system for medical research, leveraging existing high performance computing resources, and analysis techniques currently available or being developed. It builds these into The Ark, an open-source web-based system designed to manage medical data. SPARK provides a next-generation biomedical data management solution that is based upon a novel Micro-Service architecture and Big Data technologies. The system serves to demonstrate the applicability of Micro-Service architectures for the development of high performance computing applications. When applied to high-dimensional medical datasets such as genomic data, relational data management approaches with normalized data structures suffer from unfeasibly high execution times for basic operations such as insert (i.e. importing a GWAS dataset) and the queries that are typical of the genomics research domain. SPARK resolves these problems by incorporating non-relational NoSQL databases that have been driven by the emergence of Big Data. SPARK provides researchers across the world with user-friendly access to state-of-the-art data management and analysis tools while eliminating the need for high-level informatics and programming skills. The system will benefit health and medical research by eliminating the burden of large-scale data management, querying, cleaning, and analysis. SPARK represents a major advancement in genome research technologies, vastly reducing the burden of working with genomic datasets, and enabling cutting edge analysis approaches that have previously been out of reach for many medical researchers.

Keywords: biomedical research, genomics, information systems, software

Procedia PDF Downloads 270
1248 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 325
1247 Digital Repositories in Algerian Universities: Content and Search Possibilities

Authors: Hakim Benoumelghar

Abstract:

The launch in 1999 of the open access Initiative (OAI) and the protocol for sharing metadata, OAI-PMH, in parallel with the provision of deposit platforms, open-source software, such as DSpace in 2002, which allow libraries to develop digital repositories and play a leading role in the open access movement, and by building institutional open archives alongside the theme. This study focuses on Algerian universities and their projects and platforms for digital repositories of theses and scientific papers and the possibilities of access to the university community to develop research and access to archives of scientific digital content offered by the scientific community. This contribution attempts to compare Algerian and foreign institutional deposits in developed countries in order to have development and perspectives to facilitate scientific research and give more possibilities to the scientific community in documentary matters.

Keywords: digital repository, repository software, university, algeria

Procedia PDF Downloads 80
1246 Assessing Finance by Ethnic Entrepreneurs in United Kingdom and Policy Implication

Authors: Aliyu Aminu Baba

Abstract:

Ethnic entrepreneurship is defined as a set of connections and regular patterns of interaction among people sharing common national background or migration experience. The disadvantage faced by ethnic minority on paid labour induced them to become self-employed. Also, enclaves motivates trading, creativity, innovation are all to provide specific service or products to certain people. These ethnic minorities are African –Caribbean, Indians, Pakistanis, Banghaladashi and Chinese. For policy development ethnic diversity was among the problem of developing policy in United Kingdom. The study finds that there is a danger in treating all ethnic minority businesses as homogeneous rather than heterogeneous. The diversity is due to religious beliefs, culture and race. This indicates that there is a wide range have shortfall in addressing the peculiarities of ethnic minority businesses in policy formulation. Also, there are differences between ethnic minorities in accessing finance. It is recommended that diversity and peculiarities between ethnic minorities should be considered in policy formulation.

Keywords: ethnic entrepreneurship, finance, policy implication, diversity

Procedia PDF Downloads 370
1245 Community Forest Management Practice in Nepal: Public Understanding of Forest Benefit

Authors: Chandralal Shrestha

Abstract:

In the developing countries like Nepal, the community based forest management approach has often been glorified as one of the best forest management alternatives to maximize the forest benefits. Though the approach has succeeded to construct a local level institution and conserve the forest biodiversity, how the local communities perceived about the forest benefits, the question always remains silent among the researchers and policy makers. The paper aims to explore the understanding of forest benefits from the perspective of local communities who used the forests in terms of institutional stability, equity and livelihood opportunity, and ecological stability. The paper revealed that the local communities have mixed understanding over the forest benefits. The institutional and ecological activities carried out by the local communities indicated that they have better understanding over the forest benefits. However, inequality while sharing the forest benefits, low pricing strategy and its negative consequences in valuation of forest products and limited livelihood opportunities indicated the poor understanding.

Keywords: community based forest management, forest benefits, lowland, Nepal

Procedia PDF Downloads 312
1244 The Dilemma of Giving Mathematics Homework from the Perspective of Pre-Service Elementary Teachers

Authors: Myla Zenaida Cabrillas-Torio, Von Anthony G. Torio

Abstract:

Homework is defined as an additional task that a student does outside of the school. This added activity is in recognition of the necessity to spend additional time for subjects such as Mathematics. The dilemma comes in the form of the advantages and disadvantages that can be derived from homework. Studies have revealed varying effects to students on academic and non-academic areas. Teachers are at the forefront of the decision towards the giving or not of homework. Pre-service teachers at the elementary level represent the future leaders of the educational system and should be acquainted and involved at the onset of the dilemma. The main objective of this study is to determine the perspective of pre-service elementary teachers towards homework. The anatomy of their belief can be key towards addressing the issue via teacher training. Salient results revealed that the subjects favor the giving homework on the following grounds: it helps add knowledge and confidence. Those who do not favor homework find it as an additional burden. Difficulties in complying with homework are usually associated with lack of references and performance of other household chores. Students usually spend late nights to comply with homework and are unable to perform at the best of their potentials.

Keywords: attitude, homework, pre-service teachers, mathematics education, Philippines

Procedia PDF Downloads 501
1243 Islamic Banking: An Ultimate Source of Financial Inclusion

Authors: Tasawar Nawaz

Abstract:

Promotion of socioeconomic justice through redistribution of wealth is one of the most salient features of Islamic economic system. Islamic financial institutions known as Islamic banks are used to implement this in practice under the guidelines of Islamic Shariah law. Islamic banking systems strive to promote and achieve financial inclusion among the society by offering interest-free banking and risk-sharing financing solutions. Shariah-compliant micro finance is one of the most popular financial instruments used by Islamic banks to enhance access to finance. Benevolent loan (or Qard-al-Hassanah) is one of the popular financial tools used by the Islamic banks to promote financial inclusion. This aspect of Islamic banking is empirically examined in this paper with specific reference to firm’s resources, largely defined here as intellectual capital. The paper finds that Islamic banks promote financial inclusion by exploiting available resources especially, the human intellectual capital.

Keywords: financial inclusion, intellectual capital, Qard-al-Hassanah, Islamic banking

Procedia PDF Downloads 321
1242 Sentiment Analysis on the East Timor Accession Process to the ASEAN

Authors: Marcelino Caetano Noronha, Vosco Pereira, Jose Soares Pinto, Ferdinando Da C. Saores

Abstract:

One particularly popular social media platform is Youtube. It’s a video-sharing platform where users can submit videos, and other users can like, dislike or comment on the videos. In this study, we conduct a binary classification task on YouTube’s video comments and review from the users regarding the accession process of Timor Leste to become the eleventh member of the Association of South East Asian Nations (ASEAN). We scrape the data directly from the public YouTube video and apply several pre-processing and weighting techniques. Before conducting the classification, we categorized the data into two classes, namely positive and negative. In the classification part, we apply Support Vector Machine (SVM) algorithm. By comparing with Naïve Bayes Algorithm, the experiment showed SVM achieved 84.1% of Accuracy, 94.5% of Precision, and Recall 73.8% simultaneously.

Keywords: classification, YouTube, sentiment analysis, support sector machine

Procedia PDF Downloads 109
1241 Utilizing Grid Computing to Enhance Power Systems Performance

Authors: Rafid A. Al-Khannak, Fawzi M. Al-Naima

Abstract:

Power load is one of the most important controlling keys which decide power demands and illustrate power usage to shape power market. Hence, power load forecasting is the parameter which facilitates understanding and analyzing all these aspects. In this paper, power load forecasting is solved under MATLAB environment by constructing a neural network for the power load to find an accurate simulated solution with the minimum error. A developed algorithm to achieve load forecasting application with faster technique is the aim for this paper. The algorithm is used to enable MATLAB power application to be implemented by multi machines in the Grid computing system, and to accomplish it within much less time, cost and with high accuracy and quality. Grid Computing, the modern computational distributing technology, has been used to enhance the performance of power applications by utilizing idle and desired Grid contributor(s) by sharing computational power resources.

Keywords: DeskGrid, Grid Server, idle contributor(s), grid computing, load forecasting

Procedia PDF Downloads 475
1240 Gluteal Augmentation: A Historical Perspective on Society's Fascination with Buttock Size

Authors: Shane R. Jackson

Abstract:

Gluteal augmentation with fat grafting, commonly referred to as the Brazilian Butt Lift, is the fastest-growing cosmetic surgical procedure, despite the risks and controversy that surrounds it. While many commentators attribute this rise in popularity with current societal trends towards public sharing of private life, the fascination with buttock size is in fact a much older human trait. By searching beyond medical literature and delving into historical sources, from ancient civilisations, through the Renaissance and Victorian eras to the ‘Instagram generation’ of the present day, this paper examines the differences – and similarities – in society’s ideal buttock shape and size. Furthermore, the ways in which these various cultures have altered their appearance to achieve this ideal are also examined, looking at the influence of the broader historical context. A deeper understanding of the historical, cultural and psychosocial factors that influence a patient’s desire for buttock augmentation allows the clinician to formulate a well-rounded surgical plan.

Keywords: augmentation, Brazilian butt lift, buttock, fat graft, gluteal

Procedia PDF Downloads 197
1239 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 359
1238 Acid Injection PTFE Internal Lining in Raw Water System

Authors: Fikri Suwaileh

Abstract:

In the reverse osmosis (RO) water treatment plant, operation was suffering from several leaks on the acid injection point spool and downstream spools, due to insufficient injection monitoring and the coating failure leading to pin holes. The paper will go over the background of the leaks in the acid injection point, the process in the RO plant, the material, and coating used in the existing spools, the impact of these repeated leaks, the type of damage mechanism that occurred in the system due to the manner of acid injection and the heat in the spools, which lead to coating failure, leaks and water release. This paper will also look at the analysis, both the short- and long-term recommendations, and the utilization of Teflon internal lining to stop the leaks. Sharing this case study will enhance the knowledge of the importance of taking all factors that will lead to leaks in the acid injection points, along with the importance of utilizing the appropriate coating material lining to enhance the full system.

Keywords: corrosion, coating, raw water, lining

Procedia PDF Downloads 19
1237 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 390
1236 Child Sexual Abuse Prevention: Evaluation of the Program “Sharing Mouth to Mouth: My Body, Nobody Can Touch It”

Authors: Faride Peña, Teresita Castillo, Concepción Campo

Abstract:

Sexual violence, and particularly child sexual abuse, is a serious problem all over the world, México included. Given its importance, there are several preventive and care programs done by the government and the civil society all over the country but most of them are developed in urban areas even though these problems are especially serious in rural areas. Yucatán, a state in southern México, occupies one of the first places in child sexual abuse. Considering the above, the University Unit of Clinical Research and Victimological Attention (UNIVICT) of the Autonomous University of Yucatan, designed, implemented and is currently evaluating the program named “Sharing Mouth to Mouth: My Body, Nobody Can Touch It”, a program to prevent child sexual abuse in rural communities of Yucatán, México. Its aim was to develop skills for the detection of risk situations, providing protection strategies and mechanisms for prevention through culturally relevant psycho-educative strategies to increase personal resources in children, in collaboration with parents, teachers, police and municipal authorities. The diagnosis identified that a particularly vulnerable population were children between 4 and 10 years. The program run during 2015 in primary schools in the municipality whose inhabitants are mostly Mayan. The aim of this paper is to present its evaluation in terms of its effectiveness and efficiency. This evaluation included documental analysis of the work done in the field, psycho-educational and recreational activities with children, evaluation of knowledge by participating children and interviews with parents and teachers. The results show high efficiency in fulfilling the tasks and achieving primary objectives. The efficiency shows satisfactory results but also opportunity areas that can be resolved with minor adjustments to the program. The results also show the importance of including culturally relevant strategies and activities otherwise it minimizes possible achievements. Another highlight is the importance of participatory action research in preventive approaches to child sexual abuse since by becoming aware of the importance of the subject people participate more actively; in addition to design culturally appropriate strategies and measures so that the proposal may not be distant to the people. Discussion emphasizes the methodological implications of prevention programs (convenience of using participatory action research (PAR), importance of monitoring and mediation during implementation, developing detection skills tools in creative ways using psycho-educational interactive techniques and working assessment issued by the participants themselves). As well, it is important to consider the holistic character this type of program should have, in terms of incorporating social and culturally relevant characteristics, according to the community individuality and uniqueness, consider type of communication to be used and children’ language skills considering that there should be variations strongly linked to a specific cultural context.

Keywords: child sexual abuse, evaluation, PAR, prevention

Procedia PDF Downloads 295
1235 Analysis of Transmedia Storytelling in Pokémon GO

Authors: Iva Nedelcheva

Abstract:

This study is part of a doctoral thesis on the topic of Hyperfiction: Past, Present and Future of Storytelling through Hypertext. It explores in depth the impact of transmedia storytelling and the role of hypertext in the realm of the currently popular social media phenomenon Pokémon GO. Storytelling is a powerful method to engage and unite people. Moreover, the technology progress adds a whole new angle to the method, with hypertext and cross-platform sharing that enhance the traditional storytelling so much that transmedia storytelling gives unlimited opportunities to affect the everyday life of people across the globe. This research aims at examining the transmedia storytelling approach in Pokémon GO, and explaining how that contributed to its establishment as a massive worldwide hit in less than a week. The social engagement is investigated in all major media platforms, including traditional and online media channels. Observation and content analyses are reported in this paper to form the conclusion that transmedia storytelling with the input of hypertext has a promising future as a method of establishing a productive and rewarding communication strategy.

Keywords: communication, hypertext, Pokemon Go, storytelling, transmedia

Procedia PDF Downloads 170
1234 Innovation Ecosystems in Construction Industry

Authors: Cansu Gülser, Tuğce Ercan

Abstract:

The construction sector is a key driver of the global economy, contributing significantly to growth and employment through a diverse array of sub-sectors. However, it faces challenges due to its project-based nature, which often hampers long-term collaboration and broader incentives beyond individual projects. These limitations are frequently discussed in scientific literature as obstacles to innovation and industry-wide change. Traditional practices and unwritten rules further hinder the adoption of new processes within the construction industry. The disadvantages of the construction industry’s project-based structure in fostering innovation and long-term relationships include limited continuity, fragmented collaborations, and a focus on short-term goals, which collectively hinder the development of sustained partnerships, inhibit the sharing of knowledge and best practices, and reduce incentives for investing in innovative processes and technologies. This structure typically emphasizes specific projects, which restricts broader collaborations and incentives that extend beyond individual projects, thus impeding innovation and change. The temporal complexities inherent in project-based sectors like construction make it difficult to address societal challenges through collaborative efforts. Traditional management approaches are inadequate for scaling up innovations and adapting to significant changes. For systemic transformation in the construction sector, there is a need for more collaborative relationships and activities beyond traditional supply chains. This study delves into the concept of an innovation ecosystem within the construction sector, highlighting various research findings. It aims to explore key questions about the components that enhance innovation capacity, the relationship between a robust innovation ecosystem and this capacity, and the reasons why innovation is less prevalent and implemented in this sector compared to others. Additionally, it examines the main factors hindering innovation within companies and identifies strategies to improve these efforts, particularly in developing countries. The innovation ecosystem in the construction sector generates various outputs through interactions between business resources and external components. These outputs include innovative value creation, sustainable practices, robust collaborations, knowledge sharing, competitiveness, and advanced project management, all of which contribute significantly to company market performance and competitive advantage. This article offers insights and strategic recommendations for industry professionals, policymakers, and researchers interested in developing and sustaining innovation ecosystems in the construction sector. Future research should focus on broader samples for generalization, comparative sector analysis, and application-focused studies addressing real industry challenges. Additionally, studying the long-term impacts of innovation ecosystems, integrating advanced technologies like AI and machine learning into project management, and developing future application strategies and policies are also important.

Keywords: construction industry, innovation ecosystem, innovation ecosystem components, project management

Procedia PDF Downloads 35
1233 Contagious Corporate Reputation Risk: Uncovering the Pandemic’s Impact

Authors: Yawen Xia, Rubi Yang, Jing Zhao

Abstract:

By using the Reputation Risk Index (RRI) to measure company environmental, social, and governance (ESG) activities, this research studies firms’ ESG comovement with their industry and local peers. This comovement is attenuated during the Covid-19 pandemic. Further analysis shows that corporate governance plays an important role in comovement decrease. We classify companies by region (city, state, region) and industry and calculate the average RRI of companies of the same type. We run separate regressions to test 1) industry comovement; 2) local comovement; 3) Covid-19 pandemic and reputation risk comovement; 4) corporate governance and reputation risk comovement. Our findings are consistent with previous literature that companies follow their industry and local counterparts in engaging in irresponsible activities and reducing ESG engagement. We speculate Covid shock led to a reduction in social activities and information sharing among enterprise managers, and comovement between enterprises, as a result, decreased during the pandemic.

Keywords: ESG, Covid, peer pressure, local comovement, corporate governance

Procedia PDF Downloads 136
1232 Evaluating the ‘Assembled Educator’ of a Specialized Postgraduate Engineering Course Using Activity Theory and Genre Ecologies

Authors: Simon Winberg

Abstract:

The landscape of professional postgraduate education is changing: the focus of these programmes is moving from preparing candidates for a life in academia towards a focus of training in expert knowledge and skills to support industry. This is especially pronounced in engineering disciplines where increasingly more complex products are drawing on a depth of knowledge from multiple fields. This connects strongly with the broader notion of Industry 4.0 – where technology and society are being brought together to achieve more powerful and desirable products, but products whose inner workings also are more complex than before. The changes in what we do, and how we do it, has a profound impact on what industry would like universities to provide. One such change is the increased demand for taught doctoral and Masters programmes. These programmes aim to provide skills and training for professionals, to expand their knowledge of state-of-the-art tools and technologies. This paper investigates one such course, namely a Software Defined Radio (SDR) Master’s degree course. The teaching support for this course had to be drawn from an existing pool of academics, none of who were specialists in this field. The paper focuses on the kind of educator, a ‘hybrid academic’, assembled from available academic staff and bolstered by research. The conceptual framework for this paper combines Activity Theory and Genre Ecology. Activity Theory is used to reason about learning and interactions during the course, and Genre Ecology is used to model building and sharing of technical knowledge related to using tools and artifacts. Data were obtained from meetings with students and lecturers, logs, project reports, and course evaluations. The findings show how the course, which was initially academically-oriented, metamorphosed into a tool-dominant peer-learning structure, largely supported by the sharing of technical tool-based knowledge. While the academic staff could address gaps in the participants’ fundamental knowledge of radio systems, the participants brought with them extensive specialized knowledge and tool experience which they shared with the class. This created a complicated dynamic in the class, which centered largely on engagements with technology artifacts, such as simulators, from which knowledge was built. The course was characterized by a richness of ‘epistemic objects’, which is to say objects that had knowledge-generating qualities. A significant portion of the course curriculum had to be adapted, and the learning methods changed to accommodate the dynamic interactions that occurred during classes. This paper explains the SDR Masters course in terms of conflicts and innovations in its activity system, as well as the continually hybridizing genre ecology to show how the structuring and resource-dependence of the course transformed from its initial ‘traditional’ academic structure to a more entangled arrangement over time. It is hoped that insights from this paper would benefit other educators involved in the design and teaching of similar types of specialized professional postgraduate taught programmes.

Keywords: professional postgraduate education, taught masters, engineering education, software defined radio

Procedia PDF Downloads 92
1231 Public-Private Partnership Transportation Projects: An Exploratory Study in the US

Authors: Medya Fathi

Abstract:

When public transportation projects were delivered through design-bid-build and later design-build, governments found a serious issue: inadequate funding. With population growth, governments began to develop new arrangements in which the private sectors were involved to cut the financial burden. This arrangement, known as Public-Private Partnership (PPP), has its own risks; however, performance outputs can motivate or discourage its use. On top of such output's list are time and budget, which can be affected by the type of project delivery methods. Project completion within or ahead of schedule as well as within or under budget is among any owner’s objectives. With a higher application of PPP in the highway industry in the US and insufficient PPP research, the current study addresses the schedule and cost performance of PPP highway projects and determines which one outperforms the other. To meet this objective, after collecting performance data of all PPP projects, schedule growth and cost growth are calculated, and finally, statistical analysis is conducted to evaluate the PPP performance. The results and conclusions will be provided. This study can assist practitioners in applying PPP for transportation projects by showing its ability to save time and/or cost.

Keywords: cost, delivery method, highway, public-private partnership, schedule, transportation

Procedia PDF Downloads 176
1230 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 364
1229 A Study on Game Theory Approaches for Wireless Sensor Networks

Authors: M. Shoukath Ali, Rajendra Prasad Singh

Abstract:

Game Theory approaches and their application in improving the performance of Wireless Sensor Networks (WSNs) are discussed in this paper. The mathematical modeling and analysis of WSNs may have low success rate due to the complexity of topology, modeling, link quality, etc. However, Game Theory is a field, which can efficiently use to analyze the WSNs. Game Theory is related to applied mathematics that describes and analyzes interactive decision situations. Game theory has the ability to model independent, individual decision makers whose actions affect the surrounding decision makers. The outcome of complex interactions among rational entities can be predicted by a set of analytical tools. However, the rationality demands a stringent observance to a strategy based on measured of perceived results. Researchers are adopting game theory approaches to model and analyze leading wireless communication networking issues, which includes QoS, power control, resource sharing, etc.

Keywords: wireless sensor network, game theory, cooperative game theory, non-cooperative game theory

Procedia PDF Downloads 433
1228 Examining Media Literacy Strategies through Questionnaires and Analyzing the Behavioral Patterns of Middle-Aged and Elderly Persons

Authors: Chia Yen Li, Wen Huei Chou, Mieko Ohsuga, Tsuyoshi Inoue

Abstract:

The evolution of the digital age has led to people’s lives being pervaded by both facts and misinformation, challenging media literacy (ML). Middle-aged and elderly persons (MEPs) are prone to disseminating large amounts of misinformation, which often endangers their lives due to erroneously believing such information. At present, several countries have actively established fact-checking platforms to combat misinformation, but they are unable to keep pace with the rapid proliferation of such information on social media. In this study, the questionnaire survey method was used to collect data on MEPs’ behavior, cognition, attitudes, and concepts of social media when using a mobile instant messaging app called LINE; analyze their behavioral patterns and reasons for sharing misinformation; and summarize design strategies for improving their ML. The findings can serve as a reference in future related research.

Keywords: media literacy, middle-aged and elderly persons, social media, misinformation

Procedia PDF Downloads 112
1227 Innocence Compensation: Motions to Strike and Dismiss to Forestall Financial Recovery

Authors: Myles Frederick McLellan

Abstract:

When errors in the criminal justice process lead to wrongful convictions and miscarriages of justice, it falls upon the State to make reparation for the egregious harms brought to innocent individuals. Of all the remedies available to seek compensation, private and public law litigation against the police and prosecution services is the most widely used. Unfortunately, all levels of court including the Supreme Court of Canada have explicitly endorsed the prospect of striking out or dismissing these claims at the outset on an expedited basis. The burden on agents of the State as defendants to succeed on motions for such relief is so low that very few actions will survive to give an innocent accused his or her day in court. This paper will be a quantitative and qualitative analysis on the occurrence and success of motions to strike and dismiss to forestall financial recovery for the damage caused when a criminal investigation and prosecution goes wrong. This paper will also include a comparative component on the private law systems at common law (e.g. USA, UK, Australia and New Zealand) with respect to the availability of a similar process to pre-emptively terminate litigation for the recovery of compensation to an innocent individual.

Keywords: compensation, innocence, miscarriages of justice, wrongful convictions

Procedia PDF Downloads 140
1226 Joint Optimization of Carsharing Stations with Vehicle Relocation and Demand Selection

Authors: Jiayuan Wu. Lu Hu

Abstract:

With the development of the sharing economy and mobile technology, carsharing becomes more popular. In this paper, we focus on the joint optimization of one-way station-based carsharing systems. We model the problem as an integer linear program with six elements: station locations, station capacity, fleet size, initial vehicle allocation, vehicle relocation, and demand selection. A greedy-based heuristic is proposed to address the model. Firstly, initialization based on the location variables relaxation using Gurobi solver is conducted. Then, according to the profit margin and demand satisfaction of each station, the number of stations is downsized iteratively. This method is applied to real data from Chengdu, Sichuan taxi data, and it’s efficient when dealing with a large scale of candidate stations. The result shows that with vehicle relocation and demand selection, the profit and demand satisfaction of carsharing systems are increased.

Keywords: one-way carsharing, location, vehicle relocation, demand selection, greedy algorithm

Procedia PDF Downloads 137
1225 Reliability Analysis of Computer Centre at Yobe State University Nigeria under Different Repair Policies

Authors: Vijay Vir Singh

Abstract:

In this paper, we focus on the reliability and performance analysis of Computer Centre (CC) at Yobe State University, Damaturu, Nigeria. The CC consists of three servers: one database mail server, one redundant and one for sharing with the client computers in the CC (called as local server). Observing the different possibilities of functioning of the CC, analysis has been done to evaluate the various reliability characteristics of the system. The system can completely fail due to failure of router, redundant server before repairing the mail server, and switch failure. The system can also partially fail when local server fails. The system can also fail completely due to a cooling failure, electricity failure or some natural calamity like earthquake, fire etc. All the failure rates are assumed to be constant while repair follows two types of distributions: general and Gumbel-Hougaard family copula.

Keywords: reliability, availability Gumbel-Hougaard family copula, MTTF, internet data centre

Procedia PDF Downloads 461
1224 Development and Evaluation of an Internet-Based Transdiagnostic Therapy Intervention in the Arab World

Authors: Mariam Fishere

Abstract:

The proposed research study aims at developing an Internet-based transdiagnostic treatment and evaluating its efficacy. Based on the Common Elements Treatment Approach (CETA), a combined low-intensity and technology supported transdiagnostic treatment protocol will be culturally adapted for usage by nonprofessional therapists in Arabic-speaking countries. This Internet-based CETA intervention will target individuals suffering from one or more of the following disorders: depression, anxiety and posttraumatic stress disorder (PTSD), which are all major contributors to the global burden of mental illness. The growing body of research in the area of transdiagnostic treatment has proven to be effective in high-income countries (HICs), but there remain questions about its efficacy, cultural appropriateness, and validity for low- to middle-income countries (LMICs). The aim of this dissertation project is to investigate the efficacy of a newly developed Internet-delivery of an evidence-based transdiagnostic treatment – CETA – for a sample of Arabic-speaking individuals suffering from at least one of the following disorders; depression, anxiety, and PTSD.

Keywords: transdiagnostic, internet-based interventions, mental health, Arab world

Procedia PDF Downloads 228
1223 Intrusion Detection In MANET Using Game Theory

Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri

Abstract:

A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.

Keywords: ad-hoc network, IDS, game theory, sensor networks

Procedia PDF Downloads 387