Search results for: Dubai world Islamic finance arbitration center
4175 An Analysis of the Temporal Aspects of Visual Attention Processing Using Rapid Series Visual Processing (RSVP) Data
Authors: Shreya Borthakur, Aastha Vartak
Abstract:
This Electroencephalogram (EEG) project on Rapid Visual Serial Processing (RSVP) paradigm explores the temporal dynamics of visual attention processing in response to rapidly presented visual stimuli. The study builds upon previous research that used real-world images in RSVP tasks to understand the emergence of object representations in the human brain. The objectives of the research include investigating the differences in accuracy and reaction times between 5 Hz and 20 Hz presentation rates, as well as examining the prominent brain waves, particularly alpha and beta waves, associated with the attention task. The pre-processing and data analysis involves filtering EEG data, creating epochs for target stimuli, and conducting statistical tests using MATLAB, EEGLAB, Chronux toolboxes, and R. The results support the hypotheses, revealing higher accuracy at a slower presentation rate, faster reaction times for less complex targets, and the involvement of alpha and beta waves in attention and cognitive processing. This research sheds light on how short-term memory and cognitive control affect visual processing and could have practical implications in fields like education.Keywords: RSVP, attention, visual processing, attentional blink, EEG
Procedia PDF Downloads 754174 An Empirical Study on Employees’ Theft Behavior in Insurance Industry
Authors: B. Khorsandi Talab, M. Kordi
Abstract:
It is highly deplorable that every year, theft behavior among employees of the insurance industry is growing throughout the world. A very significant source of contraction (despite many costly technological and widespread security measures) needs to be addressed and prevented. Employee and agent theft cannot be ignored as it causes significant losses to employers. This study investigates the workplace factors that affect the insurance employee and agent theft behavior. Although identifying theft is difficult, this study will help employers to further understand employees’ theft behavior. This study was conducted in two service small and medium organizations (two branches of insurance companies) in ALBORZ’s capital city, KARAJ. Data has been collected via questionnaire from 30 employees and agents consisting employees and supervisors of branches and agencies. According to the results, it must be acknowledged that compensation, organizational justice, internal control systems, penalties and personal characteristics were associated with employees' theft behavior, it is despite the fact that, no effect could be assumed for organizational ethics and requirement in this case. Nevertheless, poor financial status cannot be considered as the driving factor in pushing employees to steal property as well as increasing their theft behavior. As mentioned earlier, the purpose of this study was to determine the factors contributing to employees’ theft (insurance employees and agencies) behavior in insurance organizations in Karaj.Keywords: service theft, employee theft behavior, work theft, insurance agency, SMEs
Procedia PDF Downloads 4384173 Investigating the Influence of Roof Fairing on Aerodynamic Drag of a Bluff Body
Authors: Kushal Kumar Chode
Abstract:
Increase in demand for fuel saving and demand for faster vehicles with decent fuel economy, researchers around the world started investigating in various passive flow control devices to improve the fuel efficiency of vehicles. In this paper, A roof fairing was investigated for reducing the aerodynamic drag of a bluff body. The bluff body considered for this work is Ahmed model with a rake angle of 25deg was and subjected to flow with a velocity of 40m/s having Reynolds number of 2.68million was analysed using a commercial Computational Fluid Dynamic (CFD) code Star CCM+. It was evident that pressure drag is the main source of drag on an Ahmed body from the initial study. Adding a roof fairing has delayed the flow separation and resulted in delaying wake formation, thus improving the pressure in near weak and reducing the wake region. Adding a roof fairing of height and length equal to 1/7H and 1/3L respectively has shown a drag reduction by 9%. However, an optimised fairing, which was obtained by changing height, length and width by 5% increase, recorded a drag reduction close 12%.Keywords: Ahmed model, aerodynamic drag, passive flow control, roof fairing, wake formation
Procedia PDF Downloads 4464172 Overcoming the Obstacles to Green Campus Implementation in Indonesia
Authors: Mia Wimala, Emma Akmalah, Ira Irawati, M. Rangga Sururi
Abstract:
One way that has been aggressively implemented in creating a sustainable environment nowadays is through the implementation of green building concept. In order to ensure the success of its implementation, the support and initiation from educational institutions, especially higher education institutions are indispensable. This research was conducted to figure out the obstacles restraining the success of green campus implementation in Indonesia, as well as to propose strategies to overcome those obstacles. The data presented in this paper are mainly derived from interview and questionnaire distributed randomly to the staffs and students in 10 (ten) major institutions around Jakarta and West Java area. The data were further analyzed using ANOVA and SWOT analysis. According to 182 respondents, it is found that resistance to change, inadequate knowledge, information and understanding, no penalty for any environmental violation, lack of reward for green campus practices, lack of stringent regulations/laws, lack of management commitment, insufficient funds are the obstacles to the green campus movement in Indonesia. In addition, out of 6 criteria considered in UI GreenMetric World Ranking, education was the only criteria that had no significant difference between public and private universities in generating the green campus performance. The work concludes with recommendation of strategies to improve the implementation of green campus in the future.Keywords: green campus, obstacles, sustainable, higher education institutions
Procedia PDF Downloads 2304171 Exergetic and Sustainability Evaluation of a Building Heating System in Izmir, Turkey
Authors: Nurdan Yildirim, Arif Hepbasli
Abstract:
Heating, cooling and lighting appliances in buildings account for more than one third of the world’s primary energy demand. Therefore, main components of the building heating systems play an essential role in terms of energy consumption. In this context, efficient energy and exergy utilization in HVAC-R systems has been very essential, especially in developing energy policies towards increasing efficiencies. The main objective of the present study is to assess the performance of a family house with a volume of 326.7 m3 and a net floor area of 121 m2, located in the city of Izmir, Turkey in terms of energetic, exergetic and sustainability aspects. The indoor and exterior air temperatures are taken as 20°C and 1°C, respectively. In the analysis and assessment, various metrics (indices or indicators) such as exergetic efficiency, exergy flexibility ratio and sustainability index are utilized. Two heating options (Case 1: condensing boiler and Case 2: air heat pump) are considered for comparison purposes. The total heat loss rate of the family house is determined to be 3770.72 W. The overall energy efficiencies of the studied cases are calculated to be 49.4% for Case 1 and 54.7% for Case 2. The overall exergy efficiencies, the flexibility factor and the sustainability index of Cases 1 and 2 are computed to be around 3.3%, 0.17 and 1.034, respectively.Keywords: buildings, exergy, low exergy, sustainability, efficiency, heating, renewable energy
Procedia PDF Downloads 3474170 Determination of Skeletal Age in Nigerian Children: Applicability of the Greulich and Pyle Atlas
Authors: Udoaka A. I., Didia B. C.
Abstract:
Background: The maturation of a child’s bones as it grows to adulthood can be viewed radiologically. The skeletal age (bone age) is the average age at which a particular stage of bone maturation is achieved. The Greulich and Pyle standard is the commonest method used to assess the skeletal age using the hand and wrist radiograph throughout the world. This atlas was compiled solely from Caucasian children and made use of the orderly sequence of carpal ossification to determine the skeletal age. Several authors have faulted this atlas for not being suitable for other races. Aim: The aim of this study is to determine if the Greulich and Pyle Atlas is applicable to Nigerian children when compared to their chronological ages. Methods: The total number of 78 normal radiographs of the hand and wrist of Nigerian children obtained from several hospitals were used for this study . These radiographs were compared with the atlas and their skeletal ages noted form the atlas. The child’s chronological age in each case was also recorded. Results: The result shows a mean increase of two months in the skeletal ages of the Nigerian children compared to the atlas. This difference, however, was not significant. The skeletal age (in months) was greater in 77% of the children than the expected age in the atlas. Conclusion: The mean skeletal age of Nigerian children, though more than the standard in the atlas, is not statistically significant; as a result the study finds the radiographic atlas of Greulich and Pyle atlas applicable to Nigerian children.Keywords: Greulich and Pyle Atlas, radiograph, skeletal age
Procedia PDF Downloads 2594169 Analysis of Geotechnical Parameters from Geophysical Information
Authors: Adewoyin O. Olusegun, Akinwumi I. Isaac
Abstract:
In some part of the world where legislations related to site investigations before constructions are not strictly enforced, the expenses and time required for carrying out a comprehensive geotechnical investigation to characterize a site can discourage prospective private residential building developers. Another factor that can discourage a developer is the fact that most of the geotechnical tests procedures utilized during site investigations, to a certain extent, alter the existing environment of the site. This study suggests a quick, non-destructive and non-intrusive method of obtaining key subsoil geotechnical properties necessary for foundation design for proposed engineering facilities. Seismic wave velocities generated from near surface refraction method was used to determine the bulk density of soil, Young’s modulus, bulk modulus, shear modulus and allowable bearing capacity of a competent layer that can bear structural load at the particular study site. Also, regression equations were developed in order to directly obtain the bulk density of soil, Young’s modulus, bulk modulus, shear modulus and allowable bearing capacity from the compressional wave velocities. The results obtained correlated with the results of standard geotechnical investigations carried out.Keywords: characterize, environment, geophysical, geotechnical, regression
Procedia PDF Downloads 3754168 Identity Management in Virtual Worlds Based on Biometrics Watermarking
Authors: S. Bader, N. Essoukri Ben Amara
Abstract:
With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world
Procedia PDF Downloads 2694167 Minors and Terrorism: A Discussion about the Recruitment and Resilience
Authors: Marta Maria Aguilar Carceles
Abstract:
This theoretical study argues how terrorism is rising around the world and which are the factors and situations that contribute to this process. Linked to aspects of human development, minors are one of the most vulnerable collectives to be engaged for this purpose. Its special weakness and lower possibility of self-defense makes them more likely to become victims as a result of a brainwashing process. Terrorism is an illicit way to achieve political and social changes and new technologies and available resources make it easier to spread. In this sense, throughout a theoretical revision of different recent and scientific articles, it is evaluated which risk factors can provoke its affiliation and later develop of antisocial and illicit behavior. An example of this group of factors could be the inter-generational continuity between parents and their children, as well as the sociodemographic aspects joined to cultural experiences (i.e. sense of dishonor, frustration, etc.). The assess of this kind of variables must be accompanied by the evaluation of protective factors, because the reasons through one person decides to join to terrorism are inherently idiosyncratic and we can only install mechanisms of prevention knowing those personal characteristics. To sum, both aspects underline the relevance of the internalizing and externalizing personal factors, each of them in one specific direction: a) to increase the possibility of being recruited or follow this type of criminal group by himself, and b) to be able of avoiding the effects and consequences of terrorism thanks to personal and resilient characteristics (resilience).Keywords: criminality, minors, recruitment, resilience, terrorism
Procedia PDF Downloads 1374166 Inherited Intergenerational Trauma – The Society for Black People in South Central Los Angeles
Authors: Kevin R. Collins Sr.
Abstract:
In South Central Los Angeles, Black people have endured various forms of trauma that spans across generations. This includes the horrors of slavery and the aftermaths of the Jim Crow Laws, institutionalized racism, and legislative segregation, just to name a few. The individuals born from the 1900’s until today have continued to transmit the traumas experienced across generations. Parents unconsciously transmit the hidden trauma, and the children take these experiences and apply it to the society they live in. Although there are some who attempt to break the cycle of transmitted trauma, the remninsce still remain and play a huge role in how they interact with others. The attempt of this discussion is to bring these traumatic experiences to the surface and attack them head on. It is important that we do this to allow not only the suffering individuals but the suffering society to heal. As a society, looking at the humane side of it and attempting to stop the racial injustice placed on black people to relieve them of the stress that some. If not all,, endure in this great United States of America. Changing the behavior as a country to create an improved since of common unity within. If we solve our own racial and social issues within this country, maybe we can solve these same issues that have been the footstool to the many wars we see around the world. Thus, breaking the cycle of inherited intergenerational trauma.Keywords: intergenerational trauma, inherited trauma, transmission of trauma, blacks in South central LA, black trauma in America
Procedia PDF Downloads 1024165 Enhancing Academic Writing Through Artificial Intelligence: Opportunities and Challenges
Authors: Abubakar Abdulkareem, Nasir Haruna Soba
Abstract:
Artificial intelligence (AI) is developing at a rapid pace, revolutionizing several industries, including education. This talk looks at how useful AI can be for academic writing, with an emphasis on how it can help researchers be more accurate, productive, and creative. The academic world now relies heavily on AI technologies like grammar checkers, plagiarism detectors, and content generators to help with the writing, editing, and formatting of scholarly papers. This study explores the particular uses of AI in academic writing and assesses how useful and helpful these applications may be for both students and scholars. By means of an extensive examination of extant literature and a sequence of empirical case studies, we scrutinize the merits and demerits of artificial intelligence tools utilized in academic writing. Important discoveries indicate that although AI greatly increases productivity and lowers human error, there are still issues that need to be resolved, including reliance, ethical concerns, and the potential loss of critical thinking abilities. The talk ends with suggestions for incorporating AI tools into academic settings so that they enhance rather than take the place of the intellectual rigor that characterizes scholarly work. This study adds to the continuing conversation about artificial intelligence (AI) in higher education by supporting a methodical strategy that uses technology to enhance human abilities in academic writing.Keywords: artificial intelligence, academic writing, ai tools, productivity, ethics, higher education
Procedia PDF Downloads 344164 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments
Authors: Ossama Al-Maliki
Abstract:
Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.Keywords: NFC, RFID, contactless card, authentication, location, EMV
Procedia PDF Downloads 2454163 Hidden Markov Movement Modelling with Irregular Data
Authors: Victoria Goodall, Paul Fatti, Norman Owen-Smith
Abstract:
Hidden Markov Models have become popular for the analysis of animal tracking data. These models are being used to model the movements of a variety of species in many areas around the world. A common assumption of the model is that the observations need to have regular time steps. In many ecological studies, this will not be the case. The objective of the research is to modify the movement model to allow for irregularly spaced locations and investigate the effect on the inferences which can be made about the latent states. A modification of the likelihood function to allow for these irregular spaced locations is investigated, without using interpolation or averaging the movement rate. The suitability of the modification is investigated using GPS tracking data for lion (Panthera leo) in South Africa, with many observations obtained during the night, and few observations during the day. Many nocturnal predator tracking studies are set up in this way, to obtain many locations at night when the animal is most active and is difficult to observe. Few observations are obtained during the day, when the animal is expected to rest and is potentially easier to observe. Modifying the likelihood function allows the popular Hidden Markov Model framework to be used to model these irregular spaced locations, making use of all the observed data.Keywords: hidden Markov Models, irregular observations, animal movement modelling, nocturnal predator
Procedia PDF Downloads 2504162 Virtual Co-Creation Model in Hijab Fashion Industry: Business Model Approach
Authors: Lisandy A. Suryana, Lidia Mayangsari, Santi Novani
Abstract:
Creative industry in Indonesia become an important aspect of the economy. One of the sectors of creative industry which give the highest contribution toward Indonesia’s GDP is fashion sector. In line with the target of Indonesia in 2020 to be the qibla’ of moeslem fashion of the world, all of the stakeholders of the business ecosystem should collaborate. Rather than focus on the internal aspects of producer, external aspects such as customers, government, community, etc. become important to be involved in the ecosystem to support the development and sustainability of those fashion sector. Unfortunately, although Indonesia has the biggest moeslem population, the number of hijab business penetration only 10%. Therefore, this research aims to analyze and develop the virtual co-creation platform for hijab creative industry as the strategy to achieve sustainability and increase the market share. This preliminary research describes the main stakeholders in the hijab creative industry based on business model approach. This business model is adapted by considering the service science context, and the data is collected by using the qualitative approach especially in-depth interview. This business model shows the relationship between resource integration, value co-creation, the value proposition of the company, and also the financial aspect of the business.Keywords: value co-creation, Hijab Fashion Industry, creative industry, service business model, business model canvas
Procedia PDF Downloads 3844161 Single Centre Retrospective Analysis of MR Imaging in Placenta Accreta Spectrum Disorder with Histopathological Correlation
Authors: Frank Dorrian, Aniket Adhikari
Abstract:
The placenta accreta spectrum (PAS), which includes placenta accreta, increta, and percreta, is characterized by the abnormal implantation of placental chorionic villi beyond the decidua basalis. Key risk factors include placenta previa, prior cesarean sections, advanced maternal age, uterine surgeries, multiparity, pelvic radiation, and in vitro fertilization (IVF). The incidence of PAS has increased tenfold over the past 50 years, largely due to rising cesarean rates. PAS is associated with significant peripartum and postpartum hemorrhage. Magnetic resonance imaging (MRI) and ultrasound assist in the evaluation of PAS, enabling a multidisciplinary approach to mitigate morbidity and mortality. This study retrospectively analyzed PAS cases at Royal Prince Alfred Hospital, Sydney, Australia. Using the SAR-ESUR joint consensus statement, seven imaging signs were reassessed for their sensitivity and specificity in predicting PAS, with histopathological correlation. The standardized MRI protocols for PAS at the institution were also reviewed. Data were collected from the picture archiving and communication system (PACS) records from 2010 to July 2024, focusing on cases where MR imaging and confirmed histopathology or operative notes were available. This single-center, observational study provides insights into the reliability of MRI for PAS detection and the optimization of imaging protocols for accurate diagnosis. The findings demonstrate that intraplacental dark bands serve as highly sensitive markers for diagnosing PAS, achieving sensitivities of 88.9%, 85.7%, and 100% for placenta accreta, increta, and percreta, respectively, with a combined specificity of 42.9%. Sensitivity for abnormal vascularization was lower (33.3%, 28.6%, and 50%), with a specificity of 57.1%. The placenta bulge exhibited sensitivities of 55.5%, 57.1%, and 100%, with a specificity of 57.1%. Loss of the T2 hypointense interface had sensitivities of 66.6%, 85.7%, and 100%, with 42.9% specificity. Myometrial thinning showed high sensitivity across PAS conditions (88.9%, 71.4%, and 100%) and a specificity of 57.1%. Bladder wall thinning was sensitive only for placenta percreta (50%) but had a specificity of 100%. Focal exophytic mass displayed variable sensitivity (22.9%, 42.9%, and 100%) with a specificity of 85.7%. These results highlight the diagnostic variability among markers, with intraplacental dark bands and myometrial thinning being useful in detecting abnormal placentation, though they lack high specificity. The literature and the results of our study highlight that while no single feature can definitively diagnose PAS, the presence of multiple features -especially when combined with elevated clinical risk- significantly increases the likelihood of an underlying PAS. A thorough understanding of the range of MRI findings associated with PAS, along with awareness of the clinical significance of each sign, helps the radiologist more accurately diagnose the condition and assist in surgical planning, ultimately improving patient care.Keywords: placenta, accreta, spectrum, MRI
Procedia PDF Downloads 244160 E-Business Role in the Development of the Economy of Sultanate of Oman
Authors: Mairaj Salim, Asma Zaheer
Abstract:
Oman has accomplished as much or more than its fellow Gulf monarchies, despite starting from scratch considerably later, having less oil income to utilize, dealing with a larger and more rugged geography, and resolving a bitter civil war along the way. Of course, Oman's progress in the past 30-plus years has not been without problems and missteps, but the balance is squarely on the positive side of the ledger. Oil has been the driving force of the Omani economy since Oman began commercial production in 1967. The oil industry supports the country’s high standard of living and is primarily responsible for its modern and expansive infrastructure, including electrical utilities, telephone services, roads, public education and medical services. In addition to extensive oil reserves, Oman also has substantial natural gas reserves, which are expected to play a leading role in the Omani economy in the Twenty-first Century. To reduce the country’s dependence on oil revenues, the government is restructuring the economy by directing investment to non-oil activities. Since the 21st century IT has changed the performing tasks. To manage the affairs for the benefits of organizations and economy, the Omani government has adopted E-Business technologies for the development. E-Business is important because it allows • Transformation of old economy relationships (vertical/linear relationships) to new economy relationships characterized by end-to-end relationship management solutions (integrated or extended relationships) • Facilitation and organization of networks, small firms depend on ‘partner’ firms for supplies and product distribution to meet customer demands • SMEs to outsource back-end process or cost centers enabling the SME to focus on their core competence • ICT to connect, manage and integrate processes internally and externally • SMEs to join networks and enter new markets, through shortened supply chains to increase market share, customers and suppliers • SMEs to take up the benefits of e-business to reduce costs, increase customer satisfaction, improve client referral and attract quality partners • New business models of collaboration for SMEs to increase their skill base • SMEs to enter virtual trading arena and increase their market reach A national strategy for the advancement of information and communication technology (ICT) has been worked out, mainly to introduce e-government, e-commerce, and a digital society. An information technology complex KOM (Knowledge Oasis Muscat) had been established, consisting of section for information technology, incubator services, a shopping center of technology software and hardware, ICT colleges, E-Government services and other relevant services. So, all these efforts play a vital role in the development of Oman economy.Keywords: ICT, ITA, CRM, SCM, ERP, KOM, SMEs, e-commerce and e-business
Procedia PDF Downloads 2534159 Current and Future Global Distribution of Drosophila suzukii
Authors: Yousef Naserzadeh, Niloufar Mahmoudi
Abstract:
The spotted-wing drosophila, Drosophila suzukii (Matsumura) (Diptera: Drosophilidae), a vinegar fly native to South East Asia, has recently invaded Europe, North- and South America and is spreading rapidly. Species distribution modeling has been widely employed to indicate probable areas of invasion and to guide management strategies. Drosophila sp. is native to Asia, but since 2015, it has invaded almost every country in the world, including Africa, Australia, India, and most recently, the Americas. The growth of this species of Drosophila suzukii has been rapidly multiplying and spreading in the last decade. In fact, we examine and model the potential geographical distribution of D. suzukii for both present and future scenarios. Finally, we determine the environmental variables that affect its distribution, as well as assess the risk of encroachment on protected areas. D.suzukii has the potential to expand its occurrence, especially on continents that have already been invaded. The predictive models obtained in this study indicate potential regions that could be at risk of invasion by D. suzukii, including protected areas. These results are important and can assist in the establishment of management plans to avoid the possible harm caused by biological invasions.Keywords: climate change, Drosophila suzukii, environmental variables, host preference, host plant, nutrition
Procedia PDF Downloads 894158 Modeling Spillover Effects of Pakistan-India Bilateral Trade upon Sustainability of Economic Growth in Pakistan
Authors: Taimoor Hussain Alvi, Syed Toqueer Akhter
Abstract:
The focus of this research is to identify Pak-India bilateral trade spillover effects upon Pakistan’s Growth rate. Cross-country spillover growth Effects have been linked with openness and access to markets. In this research, we intend to see the short run and long run effects of Pak-India Bilateral Trade Openness upon economic growth in Pakistan. Trade Openness has been measured as the sum of bilateral exports and imports between the two countries. Increased emphasis on the condition and environment of financial markets is laid in light of globalization and trade liberalization. This research paper makes use of the Univariate Autoregressive Distributed Lagged Model to analyze the effects of bilateral trade variables upon the growth pattern of Pakistan in the short run and long run. Key findings of the study empirically support the notion that increased bilateral trade will be beneficial for Pakistan in the short run because of cost advantage and knowledge spillover in terms of increased technical and managerial ability from multinational firms. However, contrary to extensive literature, increased bilateral trade measures will affect Pakistan’s growth rate negatively in the long run because of the industrial size differential and increased integration of Indian economy with the world.Keywords: bilateral trade openness, spillover, comparative advantage, univariate
Procedia PDF Downloads 4864157 Comparing Image Processing and AI Techniques for Disease Detection in Plants
Authors: Luiz Daniel Garay Trindade, Antonio De Freitas Valle Neto, Fabio Paulo Basso, Elder De Macedo Rodrigues, Maicon Bernardino, Daniel Welfer, Daniel Muller
Abstract:
Agriculture plays an important role in society since it is one of the main sources of food in the world. To help the production and yield of crops, precision agriculture makes use of technologies aiming at improving productivity and quality of agricultural commodities. One of the problems hampering quality of agricultural production is the disease affecting crops. Failure in detecting diseases in a short period of time can result in small or big damages to production, causing financial losses to farmers. In order to provide a map of the contributions destined to the early detection of plant diseases and a comparison of the accuracy of the selected studies, a systematic literature review of the literature was performed, showing techniques for digital image processing and neural networks. We found 35 interesting tool support alternatives to detect disease in 19 plants. Our comparison of these studies resulted in an overall average accuracy of 87.45%, with two studies very closer to obtain 100%.Keywords: pattern recognition, image processing, deep learning, precision agriculture, smart farming, agricultural automation
Procedia PDF Downloads 3854156 Bodies in Transit: The African Woman and Migration Ordeals
Authors: Okikiola Olusanu
Abstract:
The us/other relationship between the colonizer and the colonized, which continues to inform the oppression of Africans and highlights the intersectional oppression of postcolonial African women because of the colonialization of the identity of African women, inspired this poem. It reflects 'the body' and the 'embodied' as it journeys through the constructed distance between the white feminine body and colonized bodies in the context of travel. Through vivid imagery, repetition, and powerful language, this poem analyzes the effect of otherness on African women as they struggle with their internalized otherness and a poor sense of belonging, which hinges on the politics of difference which makes it impossible to complement the sameness of another within the liminal space of transition. This poem examines the discourse on the complexities of migration for the African woman by critically examining bodies, space, mobility, and how they interact. Our focus is on their relationship and how it affects African women's place and pace when moving to and through the First World. Through literary and feminist perspectives, this study aims to represent the portrait of the African woman and to decolonize the concept of border. It seeks to address the uniqueness of the African woman’s body, not as the same or different, but as distinct and wholesome to foster fairness, friendship, belonging, and equity in travel. To develop our argument and to establish our findings, we look at the dynamics of the oppression of the postcolonial African woman's body and her resistance.Keywords: body, identity, African woman, decolonization
Procedia PDF Downloads 204155 A Hybrid Algorithm for Collaborative Transportation Planning among Carriers
Authors: Elham Jelodari Mamaghani, Christian Prins, Haoxun Chen
Abstract:
In this paper, there is concentration on collaborative transportation planning (CTP) among multiple carriers with pickup and delivery requests and time windows. This problem is a vehicle routing problem with constraints from standard vehicle routing problems and new constraints from a real-world application. In the problem, each carrier has a finite number of vehicles, and each request is a pickup and delivery request with time window. Moreover, each carrier has reserved requests, which must be served by itself, whereas its exchangeable requests can be outsourced to and served by other carriers. This collaboration among carriers can help them to reduce total transportation costs. A mixed integer programming model is proposed to the problem. To solve the model, a hybrid algorithm that combines Genetic Algorithm and Simulated Annealing (GASA) is proposed. This algorithm takes advantages of GASA at the same time. After tuning the parameters of the algorithm with the Taguchi method, the experiments are conducted and experimental results are provided for the hybrid algorithm. The results are compared with those obtained by a commercial solver. The comparison indicates that the GASA significantly outperforms the commercial solver.Keywords: centralized collaborative transportation, collaborative transportation with pickup and delivery, collaborative transportation with time windows, hybrid algorithm of GA and SA
Procedia PDF Downloads 3954154 The Effect of Polypropylene Fiber in the Stabilization of Expansive Soils
Authors: Ali Sinan Soğancı
Abstract:
Expansive soils are often encountered in many parts of the world, especially in arid and semi-arid fields. Such kind of soils, generally including active clay minerals in low water content, enlarge in volume by absorbing the water through the surface and cause a great harm to the light structures such as channel coating, roads and airports. The expansive soils were encountered on the path of Apa-Hotamış conveyance channel belonging to the State Hydraulic Works in the region of Konya. In the research done in this area, it is predicted that the soil has a swollen nature and the soil should be filled with proper granular equipment by digging the ground to 50-60 cm. In this study, for purpose of helping the other research to be done in the same area, it is thought that instead of replacing swollen soil with the granular soil, by stabilizing it with polypropylene fiber and using it its original place decreases effect of swelling percent, in this way the cost will be decreased. Therefore, a laboratory tests were conducted to study the effects of polypropylene fiber on swelling characteristics of expansive soil. Test results indicated that inclusion of fiber reduced swell percent of expansive soil. As the fiber content increased, the unconfined compressive strength was increased. Finally, it can be say that stabilization of expansive soils with polypropylene fiber is an effective method.Keywords: expansive soils, polypropylene fiber, stabilization, swelling percent
Procedia PDF Downloads 5204153 Estimating View-Through Ad Attribution from User Surveys Using Convex Optimization
Authors: Yuhan Lin, Rohan Kekatpure, Cassidy Yeung
Abstract:
In Digital Marketing, robust quantification of View-through attribution (VTA) is necessary for evaluating channel effectiveness. VTA occurs when a product purchase is aided by an Ad but without an explicit click (e.g. a TV ad). A lack of a tracking mechanism makes VTA estimation challenging. Most prevalent VTA estimation techniques rely on post-purchase in-product user surveys. User surveys enable the calculation of channel multipliers, which are the ratio of the view-attributed to the click-attributed purchases of each marketing channel. Channel multipliers thus provide a way to estimate the unknown VTA for a channel from its known click attribution. In this work, we use Convex Optimization to compute channel multipliers in a way that enables a mathematical encoding of the expected channel behavior. Large fluctuations in channel attributions often result from overfitting the calculations to user surveys. Casting channel attribution as a Convex Optimization problem allows an introduction of constraints that limit such fluctuations. The result of our study is a distribution of channel multipliers across the entire marketing funnel, with important implications for marketing spend optimization. Our technique can be broadly applied to estimate Ad effectiveness in a privacy-centric world that increasingly limits user tracking.Keywords: digital marketing, survey analysis, operational research, convex optimization, channel attribution
Procedia PDF Downloads 2054152 Design Guidelines for URM Infills and Effect of Construction Sequence on Seismic Performance of Code Compliant RC Frame Buildings
Authors: Putul Haldar, Yogendra Singh, D. K. Paul
Abstract:
Un-Reinforced Masonry (URM) infilled RC framed buildings are the most common construction practice for modern multi-storey buildings in India like many other parts of the world. Although the behavior and failure pattern of the global structure changes significantly due to infill-frame interaction, the general design practice is to treat them as non-structural elements and their stiffness, strength and interaction with frame is often ignored, as it is difficult to simulate. Indian Standard, like many other major national codes, does not provide any explicit guideline for modeling of infills. This paper takes a stock of controlling design provisions in some of the major national seismic design codes (BIS 2002; CEN 2004; NZS-4230 2004; ASCE-41 2007) to ensure the desired seismic performance of infilled frame. Most of the national codes on seismic design of buildings still lack in adequate guidelines on modeling and design of URM infilled frames results in variable assumption in analysis and design. This paper, using nonlinear pushover analysis, also presents the effect of one of such assumptions of conventional ‘simultaneous’ analysis procedure of infilled frame on the seismic performance of URM infilled RC frame buildings.Keywords: URM infills, RC frame, seismic design codes, construction sequence of infilled frame
Procedia PDF Downloads 3914151 Corpus-Based Analysis on the Translatability of Conceptual Vagueness in Traditional Chinese Medicine Classics Huang Di Nei Jing
Authors: Yan Yue
Abstract:
Huang Di Nei Jing (HDNJ) is one of the significant traditional Chinese medicine (TCM) classics which lays the foundation of TCM theory and practice. It is an important work for the world to study the ancient civilizations and medical history of China. Language in HDNJ is highly concise and vague, and notably challenging to translate. This paper investigates the translatability of one particular vagueness in HDNJ: the conceptual vagueness which carries the Chinese philosophical and cultural connotations. The corpora tool Sketch Engine is used to provide potential online contexts and word behaviors. Selected two English translations of HDNJ by TCM practitioner and non-practitioner are used to examine frequency and distribution of linguistic features of the translation. It was found the hypothesis about the universals of translated language (explicitation, normalisation) is true in one translation, but it is on the sacrifice of some original contextual connotations. Transliteration is purposefully used in the second translation to retain the original flavor, which is argued as a violation of the principle of relevance in communication because it yields little contextual effects and demands more processing effort of the reader. The translatability of conceptual vagueness in HDNJ is constrained by source language context and the reader’s cognitive environment.Keywords: corpus-based translation, translatability, TCM classics, vague language
Procedia PDF Downloads 3844150 Internet of Things Based Patient Health Monitoring System
Authors: G. Yoga Sairam Teja, K. Harsha Vardhan, A. Vinay Kumar, K. Nithish Kumar, Ch. Shanthi Priyag
Abstract:
The emergence of the Internet of Things (IoT) has facilitated better device control and monitoring in the modern world. The constant monitoring of a patient would be drastically altered by the usage of IoT in healthcare. As we've seen in the case of the COVID-19 pandemic, it's important to keep oneself untouched while continuously checking on the patient's heart rate and temperature. Additionally, patients with paralysis should be closely watched, especially if they are elderly and in need of special care. Our "IoT BASED PATIENT HEALTH MONITORING SYSTEM" project uses IoT to track patient health conditions in an effort to address these issues. In this project, the main board is an 8051 microcontroller that connects a number of sensors, including a heart rate sensor, a temperature sensor (LM-35), and a saline water measuring circuit. These sensors are connected via an ESP832 (WiFi) module, which enables the sending of recorded data directly to the cloud so that the patient's health status can be regularly monitored. An LCD is used to monitor the data in offline mode, and a buzzer will sound if any variation from the regular readings occurs. The data in the cloud may be viewed as a graph, making it simple for a user to spot any unusual conditions.Keywords: IoT, ESP8266, 8051 microcontrollers, sensors
Procedia PDF Downloads 924149 Leisure Time Physical Activity Patterns in Odisha, India
Authors: Shankar Ganesh, Rishee Patel, Vikram Dwivedi, Balakishore P., Deepak Chhabra, Anandhi Dakshinamoorthy, Parminder Kaur
Abstract:
Background: The World Health Organization has recommended a moderate intensity physical activity of 150 minutes, or 75 minutes vigorous-intensity physical activity per week to achieve optimal health benefits. It is not known if Indian public who indulge in leisure time physical exercises satisfy these recommendations. Methods: This study used a questionnaire to obtain data regarding demographic details, current engagement in leisure time physical activities, and dosages of these exercises from participants between 18-64 years of age. Results: Data was collected from a total of 390 participants (231 males and 159 females). 50.76% and 34.35% o of the participants reported exercising voluntarily and for health benefits respectively. Most participants (94.61%) indicated exercising without prescription. 55.38% and 12.82% of the participants under and above 38 years of age perform moderate to vigorous intensity exercises respectively. Conclusion: The over-all results of this study indicate that the participants’ choices of leisure time physical exercises are based on their personal choices and beliefs. The exercise intensities undertaken do not meet the global recommended intensities, especially in those above 38 years of age. Professionals and facilities to engage the public in the WHO recommended intensities of physical activity needs to be established.Keywords: physical activity, exercise, India, sedentary
Procedia PDF Downloads 2434148 Degree Tracking System (DTS) to Improve the Efficiency and Effectiveness of Open Distance Learning System: A Case Study of Islamabad Allama Iqbal Open University (AIOU)
Authors: Hatib Shabbir
Abstract:
Student support services play an important role in providing technical and motivational support to distance learner. ICT based systems have improved the efficiency and effectiveness of support services. In distance education, students being at distant require quick responses from their institution. In the manual system, it is practically hard to give prompt response to each and every student, so as a result student has to suffer a lot. The best way to minimize inefficiencies is to use automated systems. This project involves the development of centralized automated software that would not only replace the manual degree issuance system of 1.3 million students studying at AIOU but also provide online tracking to all the students applying for Degrees. DTS is also the first step towards the paperless culture which is adopted by the major organizations of the world. DTS would not only save university cost but also save students cost and time too by conveying all the information/objection through email and SMS. Moreover, DTS also monitors the performance of each and every individual working in the exam department AIOU and generates daily, monthly and yearly reports of every individual which helps a lot in continuous performance monitoring of the employees.Keywords: aiou dts, dts aiou, dts, degree tracking aiou
Procedia PDF Downloads 2234147 Using Real Truck Tours Feedback for Address Geocoding Correction
Authors: Dalicia Bouallouche, Jean-Baptiste Vioix, Stéphane Millot, Eric Busvelle
Abstract:
When researchers or logistics software developers deal with vehicle routing optimization, they mainly focus on minimizing the total travelled distance or the total time spent in the tours by the trucks, and maximizing the number of visited customers. They assume that the upstream real data given to carry the optimization of a transporter tours is free from errors, like customers’ real constraints, customers’ addresses and their GPS-coordinates. However, in real transporter situations, upstream data is often of bad quality because of address geocoding errors and the irrelevance of received addresses from the EDI (Electronic Data Interchange). In fact, geocoders are not exempt from errors and could give impertinent GPS-coordinates. Also, even with a good geocoding, an inaccurate address can lead to a bad geocoding. For instance, when the geocoder has trouble with geocoding an address, it returns those of the center of the city. As well, an obvious geocoding issue is that the mappings used by the geocoders are not regularly updated. Thus, new buildings could not exist on maps until the next update. Even so, trying to optimize tours with impertinent customers GPS-coordinates, which are the most important and basic input data to take into account for solving a vehicle routing problem, is not really useful and will lead to a bad and incoherent solution tours because the locations of the customers used for the optimization are very different from their real positions. Our work is supported by a logistics software editor Tedies and a transport company Upsilon. We work with Upsilon's truck routes data to carry our experiments. In fact, these trucks are equipped with TOMTOM GPSs that continuously save their tours data (positions, speeds, tachograph-information, etc.). We, then, retrieve these data to extract the real truck routes to work with. The aim of this work is to use the experience of the driver and the feedback of the real truck tours to validate GPS-coordinates of well geocoded addresses, and bring a correction to the badly geocoded addresses. Thereby, when a vehicle makes its tour, for each visited customer, the vehicle might have trouble with finding this customer’s address at most once. In other words, the vehicle would be wrong at most once for each customer’s address. Our method significantly improves the quality of the geocoding. Hence, we achieve to automatically correct an average of 70% of GPS-coordinates of a tour addresses. The rest of the GPS-coordinates are corrected in a manual way by giving the user indications to help him to correct them. This study shows the importance of taking into account the feedback of the trucks to gradually correct address geocoding errors. Indeed, the accuracy of customer’s address and its GPS-coordinates play a major role in tours optimization. Unfortunately, address writing errors are very frequent. This feedback is naturally and usually taken into account by transporters (by asking drivers, calling customers…), to learn about their tours and bring corrections to the upcoming tours. Hence, we develop a method to do a big part of that automatically.Keywords: driver experience feedback, geocoding correction, real truck tours
Procedia PDF Downloads 6774146 An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic
Authors: Diogen Babuc
Abstract:
The question that is a motivation of writing is how many devote themselves to discovering something in the world of science where much is discerned and revealed, but at the same time, much is unknown. Methods: The insightful elements of this algorithm are the ciphering and deciphering algorithms of Playfair, Caesar, and Vigenère. Only a few of their main properties are taken and modified, with the aim of forming a specific functionality of the algorithm called Latin Djokovic. Specifically, a string is entered as input data. A key k is given, with a random value between the values a and b = a+3. The obtained value is stored in a variable with the aim of being constant during the run of the algorithm. In correlation to the given key, the string is divided into several groups of substrings, and each substring has a length of k characters. The next step involves encoding each substring from the list of existing substrings. Encoding is performed using the basis of Caesar algorithm, i.e., shifting with k characters. However, that k is incremented by 1 when moving to the next substring in that list. When the value of k becomes greater than b+1, it’ll return to its initial value. The algorithm is executed, following the same procedure, until the last substring in the list is traversed. Results: Using this polyalphabetic method, ciphering and deciphering of strings are achieved. The algorithm also works for a 100-character string. The x character isn’t used when the number of characters in a substring is incompatible with the expected length. The algorithm is simple to implement, but it’s questionable if it works better than the other methods from the point of view of execution time and storage space.Keywords: ciphering, deciphering, authentic, algorithm, polyalphabetic cipher, random key, methods comparison
Procedia PDF Downloads 108