Search results for: information sources
13392 Corporate Water Footprint Assessment: The Case of Tata Steel
Authors: Sujata Mukherjee, Arunavo Mukherjee
Abstract:
Water covers 70 per cent of our planet; however, freshwater is incredibly rare, and scarce has been listed as the highest impact global risk. The problems related to freshwater scarcity multiplies with the human population having more than doubled coupled with climate change, changing water cycles leading to droughts and floods and a rise in water pollution. Businesses, governments, and local communities are constrained by water scarcity and are facing growing challenges to their growth and sustainability. Water foot printing as an indicator for water use was introduced in 2002. Business water footprint measures the total water consumed to produce the goods and services it provides. It is a combination of the water that goes into the production and manufacturing of a product or service and the water used throughout the supply chain, as well as during the use of the product. A case study approach was applied describing the efforts of Tata Steel. It is based on a series of semi-structured in-depth interviews with top executives of the company as well as observation and content analysis of internal and external documents about the company’s efforts in sustainable water management. Tata Steel draws water required for industrial use from surface water sources, primarily perennial rivers and streams, internal reservoirs and water from municipal sources. The focus of the present study was to explore Tata Steel’s engagement in sustainable water management focusing on water foot printing accounting as a tool to account for water use in the steel supply chain at its Jamshedpur plant. The findings enabled the researchers to conclude that no sources of water are adversely affected by the company’s production of steel at Jamshedpur.Keywords: sustainability, corporate responsibility water management, risk management, business engagement
Procedia PDF Downloads 27313391 Exploring Reading into Writing: A Corpus-Based Analysis of Postgraduate Students’ Literature Review Essays
Authors: Tanzeela Anbreen, Ammara Maqsood
Abstract:
Reading into writing is one of university students' most required academic skills. The current study explored postgraduate university students’ writing quality using a corpus-based approach. Twelve postgraduate students’ literature review essays were chosen for the corpus-based analysis. These essays were chosen because students had to incorporate multiple reading sources in these essays, which was a new writing exercise for them. The students were provided feedback at least two times which comprised of the written comments by the tutor highlighting the areas of improvement and also by using the ‘track changes’ function. This exercise was repeated two times, and students submitted two drafts. This investigation included only the finally submitted work of the students. A corpus-based approach was adopted to analyse the essays because it promotes autonomous discovery and personalised learning. The aim of this analysis was to understand the existing level of students’ writing before the start of their postgraduate thesis. Text Inspector was used to analyse the quality of essays. With the help of the Text Inspector tool, the vocabulary used in the essays was compared to the English Vocabulary Profile (EVP), which describes what learners know and can do at each Common European Framework of Reference (CEFR) level. Writing quality was also measured for the Flesch reading ease score, which is a standard to describe the ease of understanding the writing content. The results reflected that students found writing essays using multiple sources challenging. In most essays, the vocabulary level achieved was between B1-B2 of the CEFL level. The study recommends that students need extensive training in developing academic writing skills, particularly in writing the literature review type assignment, which requires multiple sources citations.Keywords: literature review essays, postgraduate students, corpus-based analysis, vocabulary proficiency
Procedia PDF Downloads 7313390 Improoving Readability for Tweet Contextualization Using Bipartite Graphs
Authors: Amira Dhokar, Lobna Hlaoua, Lotfi Ben Romdhane
Abstract:
Tweet contextualization (TC) is a new issue that aims to answer questions of the form 'What is this tweet about?' The idea of this task was imagined as an extension of a previous area called multi-document summarization (MDS), which consists in generating a summary from many sources. In both TC and MDS, the summary should ideally contain the most relevant information of the topic that is being discussed in the source texts (for MDS) and related to the query (for TC). Furthermore of being informative, a summary should be coherent, i.e. well written to be readable and grammatically compact. Hence, coherence is an essential characteristic in order to produce comprehensible texts. In this paper, we propose a new approach to improve readability and coherence for tweet contextualization based on bipartite graphs. The main idea of our proposed method is to reorder sentences in a given paragraph by combining most expressive words detection and HITS (Hyperlink-Induced Topic Search) algorithm to make up a coherent context.Keywords: bipartite graphs, readability, summarization, tweet contextualization
Procedia PDF Downloads 19413389 Biomedical Definition Extraction Using Machine Learning with Synonymous Feature
Authors: Jian Qu, Akira Shimazu
Abstract:
OOV (Out Of Vocabulary) terms are terms that cannot be found in many dictionaries. Although it is possible to translate such OOV terms, the translations do not provide any real information for a user. We present an OOV term definition extraction method by using information available from the Internet. We use features such as occurrence of the synonyms and location distances. We apply machine learning method to find the correct definitions for OOV terms. We tested our method on both biomedical type and name type OOV terms, our work outperforms existing work with an accuracy of 86.5%.Keywords: information retrieval, definition retrieval, OOV (out of vocabulary), biomedical information retrieval
Procedia PDF Downloads 49613388 Using Geographic Information Systems in the Desertification Risk’s Cartography: Case South of the Aurès Region, Algeria
Authors: Benmessaoud Hassen
Abstract:
The sensitivity to the desertification map of the south of Aurès region has been elaborated by the crossing of four thematic layers capable to have an impact on the process of desertification. The following step is inspired of MEDALUS (Mediterranean desertification and land Use), which use qualitative index to define the environment zones sensitive to the desertification. The cartographical information of vegetation, the climate, the soil and the socioeconomic state descended from cartographic data transformed to numerical data then seized on, structured and managed by an algorithm dedicated to a geographical information system. In step with information, each layer makes object of 3 or 4 classes, the geometrical median of the four layers used are leaded to sensitivity classes (ISD) of different mapped environment.Keywords: information systems, thematic layers, the sensitivity to the desertification map, concept MEDALUS, South of Aurès
Procedia PDF Downloads 42313387 Economic Development and New Challenges: Biomass Energy and Sustainability
Authors: Fabricia G. F. S. Rossato, Ieda G. Hidalgo, Andres Susseta, Felipe Casale, Leticia H. Nakamiti
Abstract:
This research was conducted to show the useful source of biomass energy provided from forest waste and the black liquor from the pulping process. This energy source could be able to assist and improve its area environment in a sustainable way. The research will demonstrate the challenges from producing the biomass energy and the implantation of the pulp industry in the city of Três Lagoas, MS. – Brazil. Planted forest’s potential, energy production in the pulp industries and its consequence of impacts on the local region environmental was also studied and examined. The present study is classified as descriptive purposes as it exposes the characteristics of a given population and the means such as bibliographical and documentary. All the data and information collected and demonstrate in this study was carefully analyzed and provided from reliable sources such as official government agencies.Keywords: Brazil, pulp industry, renewable energy, Três Lagoas
Procedia PDF Downloads 32813386 Impact of Social Media on Content of Saudi Television News Networks
Authors: Majed Alshaibani
Abstract:
Social media has emerged as a serious contender to TV news networks in Saudi Arabia. The growing usage of social media as a source of news and information has led to significant impact on the content presented by the news networks in Saudi Arabia. This study explored the various ways in which social media has influenced content aired on Saudi news networks. Data were collected by using semi structured interviews with 13 journalists and content editors working for four Saudi TV news networks and six senior academic experts on TV and media teaching in Saudi universities. The findings of the study revealed that social media has affected four aspects of the content on Saudi TV news networks. As a result the content aired on Saudi news networks is more neutral, real time, diverse in terms of sources and includes content on broader subjects and from different parts of the world. This research concludes that social media has contributed positively and significantly to improving the content on Saudi TV news networks.Keywords: TV news networks, Saudi Arabia, social media, media content
Procedia PDF Downloads 23813385 Text Emotion Recognition by Multi-Head Attention based Bidirectional LSTM Utilizing Multi-Level Classification
Authors: Vishwanath Pethri Kamath, Jayantha Gowda Sarapanahalli, Vishal Mishra, Siddhesh Balwant Bandgar
Abstract:
Recognition of emotional information is essential in any form of communication. Growing HCI (Human-Computer Interaction) in recent times indicates the importance of understanding of emotions expressed and becomes crucial for improving the system or the interaction itself. In this research work, textual data for emotion recognition is used. The text being the least expressive amongst the multimodal resources poses various challenges such as contextual information and also sequential nature of the language construction. In this research work, the proposal is made for a neural architecture to resolve not less than 8 emotions from textual data sources derived from multiple datasets using google pre-trained word2vec word embeddings and a Multi-head attention-based bidirectional LSTM model with a one-vs-all Multi-Level Classification. The emotions targeted in this research are Anger, Disgust, Fear, Guilt, Joy, Sadness, Shame, and Surprise. Textual data from multiple datasets were used for this research work such as ISEAR, Go Emotions, Affect datasets for creating the emotions’ dataset. Data samples overlap or conflicts were considered with careful preprocessing. Our results show a significant improvement with the modeling architecture and as good as 10 points improvement in recognizing some emotions.Keywords: text emotion recognition, bidirectional LSTM, multi-head attention, multi-level classification, google word2vec word embeddings
Procedia PDF Downloads 17413384 Historical Geography of Lykaonia Region
Authors: Asuman Baldiran, Erdener Pehlivan
Abstract:
In this study, the root of the name Lykaonia and the geographical area defined as Lykaonia Region are mentioned. In this context, information concerning the settlements of Paleolithic Age, Neolithic Age and Chalcolithic Age are given place. Particularly the settlements belonging to Classical Age are localized and brief information about the history of these settlements is provided. In the light of this information, roads of Antique period in the region are evaluated.Keywords: ancient cities, central anatolia, historical geography, Lykaonia region
Procedia PDF Downloads 37913383 GaAs Based Solar Cells: Growth, Fabrication, and Characterization
Authors: Hülya Kuru Mutlu, Mustafa Kulakcı, Uğur Serincan
Abstract:
The sun is one of the latest developments in renewable energy sources, which has a variety of application. Solar energy is the most preferred renewable energy sources because it can be used directly, it protects the environment and it is economic. In this work, we investigated that important parameter of GaAs-based solar cells with respect to the growth temperature. The samples were grown on (100) oriented p-GaAs substrates by solid source Veeco GEN20MC MBE system equipped with Ga, In, Al, Si, Be effusion cells and an Arsenic cracker cell. The structures of the grown samples are presented. After initial oxide desorption, Sample 1 and Sample 2 were grown at about 585°C and 535°C, respectively. From the grown structures, devices were fabricated by using the standard photolithography procedure. Current-voltage measurements were performed at room temperature (RT). It is observed that Sample 1 which was grown at 585°C has higher efficiency and fill factor compared to Sample 2. Hence, it is concluded that the growth temperature of 585°C is more suitable to grow GaAs-based solar cells considering our samples used in this study.Keywords: molecular beam epitaxy, solar cell, current-voltage measurement, Sun
Procedia PDF Downloads 47313382 Endeavor in Management Process by Executive Dashboards: The Case of the Financial Directorship in Brazilian Navy
Authors: R. S. Quintal, J. L. Tesch Santos, M. D. Davis, E. C. de Santana, M. de F. Bandeira dos Santos
Abstract:
The objective is to identify the contributions from the introduction of the computerized system deal within the Accounting Department of Brazilian Navy Financial Directorship and its possible effects on the budgetary and financial harvest of Brazilian Navy. The relevance lies in the fact that the management process is responsible for the continuous improvement of organizational performance through higher levels of quality in their activities. Improvements in organizational processes have direct effects on crops cost, quality, reliability, flexibility and speed. The method of study of this research is the case study. The choice of case study attended, among other demands, a need for greater flexibility to study processes related to a computerized system. The sources of evidence were used literature, documentary and direct observation. Direct observation was made by monitoring the implementation of the computerized system in the Division of Management Analysis. The main findings of the study point to the fact that the computerized system may contribute significantly to the standardization of information. There was improvement of internal processes in the division of management analysis, made possible the consolidation of a standard management and performance analysis that contribute to global homogeneity in the treatment of information essential to the process of decision making. This study has limitations related to the fact the search result be subject exclusively to the case studied, and it is impossible to generalize to other organs of government.Keywords: process management, management control, business intelligence, Brazilian Navy
Procedia PDF Downloads 23813381 Comparison of Radiated Emissions in Offshore and Onshore Wind Turbine Towers
Authors: Sajeesh Sulaiman, Gomathisankar A., Aravind Devaraj, Aswin R., Vijay Kumar G., Rachana Raj
Abstract:
Wind turbines are the next big answer to the emerging and ever-growing demand for electricity, and this need is increasing day by day. These high mast structures, whether on land or on the sea, has also become one of the big sources of electromagnetic interferences (EMI) in the not so distant past. With the emergence of the AC-AC converter and drawing of large power cables through the wind turbine towers has made this clean and efficient source of renewable energy to become one of the culprits in creating electromagnetic interference. This paper will present the sources of such EMIs, a comparison of radiated emissions (both electric and magnetic field) patterns in wind turbine towers for both onshore and offshore wind turbines and close look into the IEC 61400-40 (new standard for EMC design on wind turbine). At present, offshore wind turbines are tested in onshore facilities. This paper will present the anomaly in results for offshore wind turbines when tested in onshore, which the existing standards and the upcoming standards have failed to address.Keywords: emissions, electric field, magnetic field, wind turbine, tower, standards and regulations
Procedia PDF Downloads 24813380 Design and Implementation of Pseudorandom Number Generator Using Android Sensors
Authors: Mochamad Beta Auditama, Yusuf Kurniawan
Abstract:
A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk.Keywords: Android hardware-based sensor, deterministic process, entropy source, random number generation/generators
Procedia PDF Downloads 37513379 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 23913378 Real Time Detection of Application Layer DDos Attack Using Log Based Collaborative Intrusion Detection System
Authors: Farheen Tabassum, Shoab Ahmed Khan
Abstract:
The brutality of attacks on networks and decisive infrastructures are on the climb over recent years and appears to continue to do so. Distributed Denial of service attack is the most prevalent and easy attack on the availability of a service due to the easy availability of large botnet computers at cheap price and the general lack of protection against these attacks. Application layer DDoS attack is DDoS attack that is targeted on wed server, application server or database server. These types of attacks are much more sophisticated and challenging as they get around most conventional network security devices because attack traffic often impersonate normal traffic and cannot be recognized by network layer anomalies. Conventional techniques of single-hosted security systems are becoming gradually less effective in the face of such complicated and synchronized multi-front attacks. In order to protect from such attacks and intrusion, corporation among all network devices is essential. To overcome this issue, a collaborative intrusion detection system (CIDS) is proposed in which multiple network devices share valuable information to identify attacks, as a single device might not be capable to sense any malevolent action on its own. So it helps us to take decision after analyzing the information collected from different sources. This novel attack detection technique helps to detect seemingly benign packets that target the availability of the critical infrastructure, and the proposed solution methodology shall enable the incident response teams to detect and react to DDoS attacks at the earliest stage to ensure that the uptime of the service remain unaffected. Experimental evaluation shows that the proposed collaborative detection approach is much more effective and efficient than the previous approaches.Keywords: Distributed Denial-of-Service (DDoS), Collaborative Intrusion Detection System (CIDS), Slowloris, OSSIM (Open Source Security Information Management tool), OSSEC HIDS
Procedia PDF Downloads 35413377 Polycyclic Aromatic Hydrocarbons: Pollution and Ecological Risk Assessment in Surface Soil of the Tezpur Town, on the North Bank of the Brahmaputra River, Assam, India
Authors: Kali Prasad Sarma, Nibedita Baul, Jinu Deka
Abstract:
In the present study, pollution level of polycyclic aromatic hydrocarbon (PAH) in surface soil of historic Tezpur town located in the north bank of the River Brahmaputra were evaluated. In order to determine the seasonal distribution and concentration level of 16 USEPA priority PAHs surface soil samples were collected from 12 different sampling sites with various land use type. The total concentrations of 16 PAHs (∑16 PAHs) varied from 242.68µgkg-1to 7901.89µgkg-1. Concentration of total probable carcinogenic PAH ranged between 7.285µgkg-1 and 479.184 µgkg-1 in different seasons. However, the concentration of BaP, the most carcinogenic PAH, was found in the range of BDL to 50.01 µgkg-1. The composition profiles of PAHs in 3 different seasons were characterized by following two different types of ring: (1) 4-ring PAHs, contributed to highest percentage of total PAHs (43.75%) (2) while in pre- and post- monsoon season 3- ring compounds dominated the PAH profile, contributing 65.58% and 74.41% respectively. A high PAHs concentration with significant seasonality and high abundance of LMWPAHs was observed in Tezpur town. Soil PAHs toxicity was evaluated taking toxic equivalency factors (TEFs), which quantify the carcinogenic potential of other PAHs relative to BaP and estimate benzo[a]pyrene-equivalent concentration (BaPeq). The calculated BaPeq value signifies considerable risk to contact with soil PAHs. We applied cluster analysis and principal component analysis (PCA) with multivariate linear regression (MLR) to apportion sources of polycyclic aromatic hydrocarbons (PAHs) in surface soil of Tezpur town, based on the measured PAH concentrations. The results indicate that petrogenic and pyrogenic sources are the important sources of PAHs. A combination of chemometric and molecular indices were used to identify the sources of PAHs, which could be attributed to vehicle emissions, a mixed source input, natural gas combustion, wood or biomass burning and coal combustion. Source apportionment using absolute principle component scores–multiple linear regression showed that the main sources of PAHs are 22.3% mix sources comprising of diesel and biomass combustion and petroleum spill,13.55% from vehicle emission, 9.15% from diesel and natural gas burning, 38.05% from wood and biomass burning and 16.95% contribute coal combustion. Pyrogenic input was found to dominate source of PAHs origin with more contribution from vehicular exhaust. PAHs have often been found to co-emit with other environmental pollutants like heavy metals due to similar source of origin. A positive correlation was observed between PAH with Cr and Pb (r2 = 0.54 and 0.55 respectively) in monsoon season and PAH with Cd and Pb (r2 = 0.54 and 0.61 respectively) indicating their common source. Strong correlation was observed between PAH and OC during pre- and post- monsoon (r2=0.46 and r2=0.65 respectively) whereas during monsoon season no significant correlation was observed (r2=0.24).Keywords: polycyclic aromatic hydrocarbon, Tezpur town, chemometric analysis, ecological risk assessment, pollution
Procedia PDF Downloads 21313376 Financial Analysis of Selected Private Healthcare Organizations with Special Referance to Guwahati City, Assam
Authors: Mrigakshi Das
Abstract:
The private sector investments and quantum of money required in this sector critically hinges on the financial risk and returns the sector offers to providers of capital. Therefore, it becomes important to understand financial performance of hospitals. Financial Analysis is useful for decision makers in a variety of settings. Consider the small proprietary hospitals, say, Physicians Clinic. The managers of such clinic need the information that financial statements provide. Attention to Financial Statements of healthcare Organizations can provide answers to questions like: How are they doing? What is their rate of profit? What is their solvency and liquidity position? What are their sources and application of funds? What is their Operational Efficiency? The researcher has studied Financial Statements of 5 Private Healthcare Organizations in Guwahati City.Keywords: not-for-profit organizations, financial analysis, ratio analysis, profitability analysis, liquidity analysis, operational efficiency, capital structure analysis
Procedia PDF Downloads 54913375 A Survey on Countermeasures of Cache-Timing Attack on AES Systems
Authors: Settana M. Abdulh, Naila A. Sadalla, Yaseen H. Taha, Howaida Elshoush
Abstract:
Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures.Keywords: AES algorithm, side channel attack, cache timing attack, cache timing countermeasure
Procedia PDF Downloads 29913374 Study of Ultrasonic Waves in Unidirectional Fiber-Reinforced Composite Plates for the Aerospace Applications
Authors: DucTho Le, Duy Kien Dao, Quoc Tinh Bui, Haidang Phan
Abstract:
The article is concerned with the motion of ultrasonic guided waves in a unidirectional fiber-reinforced composite plate under acoustic sources. Such unidirectional composite material has orthotropic elastic properties as it is very stiff along the fibers and rather compliant across the fibers. The dispersion equations of free Lamb waves propagating in an orthotropic layer are derived that results in the dispersion curves. The connection of these equations to the Rayleigh-Lamb frequency relations of isotropic plates is discussed. By the use of reciprocity in elastodynamics, closed-form solutions of elastic wave motions subjected to time-harmonic loads in the layer are computed in a simple manner. We also consider the problem of Lamb waves generated by a set of time-harmonic sources. The obtained computations can be very useful for developing ultrasound-based methods for nondestructive evaluation of composite structures.Keywords: lamb waves, fiber-reinforced composite plates, dispersion equations, nondestructive evaluation, reciprocity theorems
Procedia PDF Downloads 14913373 The Potential Benefits of Multimedia Information Representation in Enhancing Students’ Critical Thinking and History Reasoning
Authors: Ang Ling Weay, Mona Masood
Abstract:
This paper discusses the potential benefits of an interactive multimedia information representation in enhancing students’ critical thinking aligned with history reasoning in learning history between Secondary School students in Malaysia. Two modes of multimedia information representation implemented which are chronological and thematic information representation. A qualitative study of an unstructured interview was conducted among two history teachers, one history education lecturer, two i-think expert and program trainers and five form 4 secondary school students. The interview was to elicit their opinions on the implementation of thinking maps and interactive multimedia information representation in history learning. The key elements of interactive multimedia (e.g. multiple media, user control, interactivity, and use of timelines and concept maps) were then considered to improve the learning process. Findings of the preliminary investigation reveal that the interactive multimedia information representations have the potential benefits to be implemented as instructional resource in enhancing students’ higher order thinking skills (HOTs). This paper concludes by giving suggestions for future work.Keywords: multimedia information representation, critical thinking, history reasoning, chronological and thematic information representation
Procedia PDF Downloads 35013372 Information Retrieval from Internet Using Hand Gestures
Authors: Aniket S. Joshi, Aditya R. Mane, Arjun Tukaram
Abstract:
In the 21st century, in the era of e-world, people are continuously getting updated by daily information such as weather conditions, news, stock exchange market updates, new projects, cricket updates, sports and other such applications. In the busy situation, they want this information on the little use of keyboard, time. Today in order to get such information user have to repeat same mouse and keyboard actions which includes time and inconvenience. In India due to rural background many people are not much familiar about the use of computer and internet also. Also in small clinics, small offices, and hotels and in the airport there should be a system which retrieves daily information with the minimum use of keyboard and mouse actions. We plan to design application based project that can easily retrieve information with minimum use of keyboard and mouse actions and make our task more convenient and easier. This can be possible with an image processing application which takes real time hand gestures which will get matched by system and retrieve information. Once selected the functions with hand gestures, the system will report action information to user. In this project we use real time hand gesture movements to select required option which is stored on the screen in the form of RSS Feeds. Gesture will select the required option and the information will be popped and we got the information. A real time hand gesture makes the application handier and easier to use.Keywords: hand detection, hand tracking, hand gesture recognition, HSV color model, Blob detection
Procedia PDF Downloads 29013371 Public Awareness of Aphasia in Taiwan: A Pilot Study
Authors: Ching-Yu Lin
Abstract:
The number of patients with aphasia has been gradually increasing; however, public awareness of aphasia is still limited. Moreover, surveys about public awareness of aphasia have been conducted in several countries, but there is no research about public awareness of aphasia in Taiwan so far. Therefore, this study aims at the investigation of public awareness of aphasia in Taiwan. In this pilot study, the original English-version questionnaire will be translated into Mandarin Chinese by a speech therapist (the author), and 100 Taiwanese over 18 years old will be recruited to finish the questionnaire. People with an occupation about health or medical will be excluded. In order to reach more people, the questionnaire will be an Internet survey by Google Forms, and the URL of the survey will be distributed by messaging, i.e. e-mail, Facebook Messenger, Instagram DM, or Line. Data will be analyzed via PASW Statistic 18. Descriptive statistics will be used to summarize what proportion of the public have heard of aphasia and what proportion of the public have basic knowledge of aphasia in Taiwan. The sources of information about aphasia will also be investigated. Further, differences in awareness of aphasia due to age, gender, and education level will be discussed.Keywords: aphasia, public awareness, public knowledge, taiwan
Procedia PDF Downloads 10513370 Information on Financial Statements for Loan Decision-Making of Commercial Banks in Vietnam
Authors: Mai Hoang Minh
Abstract:
Financial statements (FS) are tools which provide information to users for making business decisions. This article is going to present the survey which clarifies the role of financial statement to Commercial Banks’ loan decisions in Vietnam. Moreover, this also discusses about financial statement’s quality currently, thereby making suggestions for enterprises to enhance the usefulness of accounting information in borrowing activities.Keywords: usefulness of financial statement, accounting information quality, loan decisions
Procedia PDF Downloads 27913369 Production, Extraction and Purification of Fungal Chitosan and Its Modification for Medical Applications
Authors: Debajyoti Bose
Abstract:
Chitosan has received much attention as a functional biopolymer for diverse applications, especially in pharmaceutics and medicine. Chitosan is a positively charged natural biodegradable and biocompatible polymer. It is a linear polysaccharide consisting of β-1,4 linked monomers of glucosamine and N-acetylglucosamine. Chitosan can be mainly obtained from fungal sources during large fermentation process. In this study,three different fungal strains Aspergillus niger NCIM 1045, Aspergillus oryzae NCIM 645 and Mucor indicus MTCC 3318 were used for the production of chitosan. The growth mediums were optimized for maximum fungal production. The produced chitosan was characterized by determining degree of deacetylation. Chitosan possesses one reactive amino at the C-2 position of the glucosamine residue, and these amines confer important functional properties to chitosan which can be exploited for biofabrication to generate various chemically modified derivatives and explore their potential for pharmaceutical field. Chitosan nanoparticles were prepared by ionic cross-linking with tripolyphosphate (TPP). The major effect on encapsulation and release of protein (e.g. enzyme diastase) in chitosan-TPP nanoparticles was investigated in order to control the loading and release efficiency. It was noted that the chitosan loading and releasing efficiency as a nanocapsule, obtained from different fungal sources was almost near to initial enzyme activity(12026 U/ml) with a negligible loss. This signify, chitosan can be used as a polymeric drug as well as active component or protein carrier material in dosage by design due to its appealing properties such as biocompatibility, biodegradability, low toxicity and relatively low production cost from abundant natural sources. Based upon these initial experiments, studies were also carried out on modification of chitosan based nanocapsules incorporated with physiologically important enzymes and nutraceuticals for target delivery.Keywords: fungi, chitosan, enzyme, nanocapsule
Procedia PDF Downloads 50213368 Estimation of Natural Pozzolan Reserves in the Volcanic Province of the Moroccan Middle Atlas Using a Geographic Information System in Order to Valorize Them
Authors: Brahim Balizi, Ayoub Aziz, Abdelilah Bellil, Abdellali El Khadiri, Jamal Mabrouki
Abstract:
Mio-polio-quaternary volcanism of the Tabular Middle Atlas, which corresponds to prospective levels of exploitable usable raw minerals, is a feature of Morocco's Middle Atlas, especially the Azrou-Timahdite region. Given their importance in national policy in terms of human development by supporting the sociological and economic component, this area has consequently been the focus of various research and prospecting of these levels in order to develop these reserves. The outcome of this labor is a massive amount of data that needs to be managed appropriately because it comes from multiple sources and formats, including side points, contour lines, geology, hydrogeology, hydrology, geological and topographical maps, satellite photos, and more. In this regard, putting in place a Geographic Information System (GIS) is essential to be able to offer a side plan that makes it possible to see the most recent topography of the area being exploited, to compute the volume of exploitation that occurs every day, and to make decisions with the fewest possible restrictions in order to use the reserves for the realization of ecological light mortars The three sites' mining will follow the contour lines in five steps that are six meters high and decline. It is anticipated that each quarry produces about 90,000 m3/year. For a single quarry, this translates to a daily production of about 450 m3 (200 days/year). About 3,540,240 m3 and 10,620,720 m3, respectively, represent the possible net exploitable volume in place for a single quarry and the three exploitable zones.Keywords: GIS, topography, exploitation, quarrying, lightweight mortar
Procedia PDF Downloads 2613367 Predictive Analysis of Personnel Relationship in Graph Database
Authors: Kay Thi Yar, Khin Mar Lar Tun
Abstract:
Nowadays, social networks are so popular and widely used in all over the world. In addition, searching personal information of each person and searching connection between them (peoples’ relation in real world) becomes interesting issue in our society. In this paper, we propose a framework with three portions for exploring peoples’ relations from their connected information. The first portion focuses on the Graph database structure to store the connected data of peoples’ information. The second one proposes the graph database searching algorithm, the Modified-SoS-ACO (Sense of Smell-Ant Colony Optimization). The last portion proposes the Deductive Reasoning Algorithm to define two persons’ relationship. This study reveals the proper storage structure for connected information, graph searching algorithm and deductive reasoning algorithm to predict and analyze the personnel relationship from peoples’ relation in their connected information.Keywords: personnel information, graph storage structure, graph searching algorithm, deductive reasoning algorithm
Procedia PDF Downloads 45013366 An Approach for Pattern Recognition and Prediction of Information Diffusion Model on Twitter
Authors: Amartya Hatua, Trung Nguyen, Andrew Sung
Abstract:
In this paper, we study the information diffusion process on Twitter as a multivariate time series problem. Our model concerns three measures (volume, network influence, and sentiment of tweets) based on 10 features, and we collected 27 million tweets to build our information diffusion time series dataset for analysis. Then, different time series clustering techniques with Dynamic Time Warping (DTW) distance were used to identify different patterns of information diffusion. Finally, we built the information diffusion prediction models for new hashtags which comprise two phrases: The first phrase is recognizing the pattern using k-NN with DTW distance; the second phrase is building the forecasting model using the traditional Autoregressive Integrated Moving Average (ARIMA) model and the non-linear recurrent neural network of Long Short-Term Memory (LSTM). Preliminary results of performance evaluation between different forecasting models show that LSTM with clustering information notably outperforms other models. Therefore, our approach can be applied in real-world applications to analyze and predict the information diffusion characteristics of selected topics or memes (hashtags) in Twitter.Keywords: ARIMA, DTW, information diffusion, LSTM, RNN, time series clustering, time series forecasting, Twitter
Procedia PDF Downloads 39113365 Spatial Analysis the Suitability Area for Jatropha curcas L. as an Alternative to Biodiesel in Central Kalimantan, Indonesia
Authors: Rizki Oktariza, Sri Fauza Pratiwi, Hilza Ikhsanti
Abstract:
Human depends on fossil fuels as the bigger sources of considerable energy in all sectors. Based on that cases, we are needed alternative energy to supplies needed for fuel, one of them by using energy fuel from the biodiesel. The raw materials that can be used for producing the biodiesel energy are Jatropha curcas L. In Indonesia, the availability of land for the development of the Jatropha curcas L which has very appropriate Indonesia reached 14.2 million hectares, with an area of suitable in Kalimantan around 10 million hectares. In Central Kalimantan, as one of the provinces of Kalimantan, has considerable potential planting Jatropha curcas L because of the physical condition and have a largest of the agricultural land. To support the potential of Jatropha curcas L in Central Kalimantan, spatial analysis is needed to find out the appropriate areas for Jatropha curcas L growing land. The suitability of region is influenced by several variables i.e., rainfall, the slope of the land, the surface temperature and the altitude of a region. The compliance of criteria are divided into four criteria: high suitable (S1), moderately suitable (S2), marginally suitable (S3), not suitable (N). The suitability of the region is based on these variables and made an overlay analysis of these variables by using Geographic Information System. Based on this overlay analysis will results a map of the suitability area for planting Jatropha curcas L, which is distribution criteria is high suitable (S1) of 213,245 ha, moderately suitable (S2) of 14,389,353 ha, marginally suitable (S3) 360,357 ha, not suitable (N) 0.020 ha.Keywords: geographic information system, Jatropha curcas L., overlay, the suitable area
Procedia PDF Downloads 17613364 The Relevance of Corporate Governance Disclosure in Spanish Public Universities
Authors: Yolanda Ramirez, Angel Tejada, Agustin Baidez
Abstract:
There is currently a growing interest in the improvement of university governance and the disclosure of information on corporate governance processes as an essential part of the transparency and accountability of universities. This paper aims to know the importance given by Spanish university stakeholders to the disclosure of information about structure and mechanism of corporate governance. So as to meet this objective we propose a model for disclosing information on the main aspects of university governance in Spanish universities. This model will be validated using a questionnaire sent to members of the Social Councils of public universities in Spain. Our results show that Spanish university stakeholders attach great importance to the disclosure of specific information on aspects of corporate governance, which would result in improved transparency and accountability. According to the results of this study it may be concluded that the university stakeholders feel that it is relevant to publish information on corporate governance in the university accounting information model.Keywords: corporate governance, transparency, accountability, universities, Spain
Procedia PDF Downloads 31113363 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher
Authors: Okike Benjami, Garba Ejd
Abstract:
Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.Keywords: transposition cipher, merged irregular cipher, encryption, complexity level
Procedia PDF Downloads 290