Search results for: fuzzy expert system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18235

Search results for: fuzzy expert system

11335 Assessment of Physical Learning Environments in ECE: Interdisciplinary and Multivocal Innovation for Chilean Kindergartens

Authors: Cynthia Adlerstein

Abstract:

Physical learning environment (PLE) has been considered, after family and educators, as the third teacher. There have been conflicting and converging viewpoints on the role of the physical dimensions of places to learn, in facilitating educational innovation and quality. Despite the different approaches, PLE has been widely recognized as a key factor in the quality of the learning experience , and in the levels of learning achievement in ECE . The conceptual frameworks of the field assume that PLE consists of a complex web of factors that shape the overall conditions for learning, and that much more interdisciplinary and complementary methodologies of research and development are required. Although the relevance of PLE attracts a broad international consensus, in Chile it remains under-researched and weakly regulated by public policy. Gaining deeper contextual understanding and more thoughtfully-designed recommendations require the use of innovative assessment tools that cross cultural and disciplinary boundaries to produce new hybrid approaches and improvements. When considering a PLE-based change process for ECE improvement, a central question is what dimensions, variables and indicators could allow a comprehensive assessment of PLE in Chilean kindergartens? Based on a grounded theory social justice inquiry, we adopted a mixed method design, that enabled a multivocal and interdisciplinary construction of data. By using in-depth interviews, discussion groups, questionnaires, and documental analysis, we elicited the PLE discourses of politicians, early childhood practitioners, experts in architectural design and ergonomics, ECE stakeholders, and 3 to 5 year olds. A constant comparison method enabled the construction of the dimensions, variables and indicators through which PLE assessment is possible. Subsequently, the instrument was applied in a sample of 125 early childhood classrooms, to test reliability (internal consistency) and validity (content and construct). As a result, an interdisciplinary and multivocal tool for assessing physical learning environments was constructed and validated, for Chilean kindergartens. The tool is structured upon 7 dimensions (wellbeing, flexible, empowerment, inclusiveness, symbolically meaningful, pedagogically intentioned, institutional management) 19 variables and 105 indicators that are assessed through observation and registration on a mobile app. The overall reliability of the instrument is .938 while the consistency of each dimension varies between .773 (inclusive) and .946 (symbolically meaningful). The validation process through expert opinion and factorial analysis (chi-square test) has shown that the dimensions of the assessment tool reflect the factors of physical learning environments. The constructed assessment tool for kindergartens highlights the significance of the physical environment in early childhood educational settings. The relevance of the instrument relies in its interdisciplinary approach to PLE and in its capability to guide innovative learning environments, based on educational habitability. Though further analysis are required for concurrent validation and standardization, the tool has been considered by practitioners and ECE stakeholders as an intuitive, accessible and remarkable instrument to arise awareness on PLE and on equitable distribution of learning opportunities.

Keywords: Chilean kindergartens, early childhood education, physical learning environment, third teacher

Procedia PDF Downloads 350
11334 Continuous Differential Evolution Based Parameter Estimation Framework for Signal Models

Authors: Ammara Mehmood, Aneela Zameer, Muhammad Asif Zahoor Raja, Muhammad Faisal Fateh

Abstract:

In this work, the strength of bio-inspired computational intelligence based technique is exploited for parameter estimation for the periodic signals using Continuous Differential Evolution (CDE) by defining an error function in the mean square sense. Multidimensional and nonlinear nature of the problem emerging in sinusoidal signal models along with noise makes it a challenging optimization task, which is dealt with robustness and effectiveness of CDE to ensure convergence and avoid trapping in local minima. In the proposed scheme of Continuous Differential Evolution based Signal Parameter Estimation (CDESPE), unknown adjustable weights of the signal system identification model are optimized utilizing CDE algorithm. The performance of CDESPE model is validated through statistics based various performance indices on a sufficiently large number of runs in terms of estimation error, mean squared error and Thiel’s inequality coefficient. Efficacy of CDESPE is examined by comparison with the actual parameters of the system, Genetic Algorithm based outcomes and from various deterministic approaches at different signal-to-noise ratio (SNR) levels.

Keywords: parameter estimation, bio-inspired computing, continuous differential evolution (CDE), periodic signals

Procedia PDF Downloads 297
11333 Comparison of the Center of Pressure, Gait Angle, and Gait Time in Female College Students and Elderly Women

Authors: Dae-gun Kim, Hyun-joo Kang

Abstract:

Purpose: The purpose of this study was to investigate the effects of aging on center of pressure, gait angle and gait time. Methods: 29 healthy female college students(FCS) and 28 elderly women (EW) were recruited to participate in this study. A gait analysis system( Gaitview, Korea) was used to collect the center of pressure in static state and gait angle with gait time in dynamic state. Results: Results of the center of pressure do not have significant differences between two groups. In the gait angle test, the FCS showed 1.56±5.2° on their left while the EW showed 9.76±6.54° on their left. In their right, the FCS showed 2.85±6.47° and the EW showed 10.27±6.97°. In the gait angle test, there was a significant difference in the gait time between the female college students and elderly women. A significant difference was evident in the gait time. The FCS on the left was 0.87±0.1sec while the EW’s was 1.28±0.44sec. The FCS on the right was 0.86±0.09sec and the EW was 1.1±0.21sec. The results of this study revealed that the elderly participants aging musculoskeletal system and subsequent changes in their posture altered gait angle and gait time. Therefore, this widening is due to their need to leave their feet on the ground longer for stability slowing their movement. Conclusions: In conclusion, it is advisable to develop an exercise program for the elderly focusing on stability the prevention of falls.

Keywords: center of pressure, gait angle, gait time, elderly women

Procedia PDF Downloads 179
11332 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 111
11331 Leveraging Advanced Technologies and Data to Eliminate Abandoned, Lost, or Otherwise Discarded Fishing Gear and Derelict Fishing Gear

Authors: Grant Bifolchi

Abstract:

As global environmental problems continue to have highly adverse effects, finding long-term, sustainable solutions to combat ecological distress are of growing paramount concern. Ghost Gear—also known as abandoned, lost or otherwise discarded fishing gear (ALDFG) and derelict fishing gear (DFG)—represents one of the greatest threats to the world’s oceans, posing a significant hazard to human health, livelihoods, and global food security. In fact, according to the UN Food and Agriculture Organization (FAO), abandoned, lost and discarded fishing gear represents approximately 10% of marine debris by volume. Around the world, many governments, governmental and non-profit organizations are doing their best to manage the reporting and retrieval of nets, lines, ropes, traps, floats and more from their respective bodies of water. However, these organizations’ ability to effectively manage files and documents about the environmental problem further complicates matters. In Ghost Gear monitoring and management, organizations face additional complexities. Whether it’s data ingest, industry regulations and standards, garnering actionable insights into the location, security, and management of data, or the application of enforcement due to disparate data—all of these factors are placing massive strains on organizations struggling to save the planet from the dangers of Ghost Gear. In this 90-minute educational session, globally recognized Ghost Gear technology expert Grant Bifolchi CET, BBA, Bcom, will provide real-world insight into how governments currently manage Ghost Gear and the technology that can accelerate success in combatting ALDFG and DFG. In this session, attendees will learn how to: • Identify specific technologies to solve the ingest and management of Ghost Gear data categories, including type, geo-location, size, ownership, regional assignment, collection and disposal. • Provide enhanced access to authorities, fisheries, independent fishing vessels, individuals, etc., while securely controlling confidential and privileged data to globally recognized standards. • Create and maintain processing accuracy to effectively track ALDFG/DFG reporting progress—including acknowledging receipt of the report and sharing it with all pertinent stakeholders to ensure approvals are secured. • Enable and utilize Business Intelligence (BI) and Analytics to store and analyze data to optimize organizational performance, maintain anytime-visibility of report status, user accountability, scheduling, management, and foster governmental transparency. • Maintain Compliance Reporting through highly defined, detailed and automated reports—enabling all stakeholders to share critical insights with internal colleagues, regulatory agencies, and national and international partners.

Keywords: ghost gear, ALDFG, DFG, abandoned, lost or otherwise discarded fishing gear, data, technology

Procedia PDF Downloads 90
11330 Geographical Information System for Sustainable Management of Water Resources

Authors: Vakhtang Geladze, Nana Bolashvili, Nino Machavariani, Tamazi Karalashvili, Nino Chikhradze, Davit Kartvelishvili

Abstract:

Fresh water deficit is one of the most important global problems today. In the countries with scarce water resources, they often become a reason of armed conflicts. The peaceful settlement of relations connected with management and water consumption issues within and beyond the frontiers of the country is an important guarantee of the region stability. The said problem is urgent in Georgia as well because of its water objects are located at the borders and the transit run-off that is 12% of the total one. Fresh water resources are the major natural resources of Georgia. Despite of this, water supply of population at its Eastern part is an acute issue. Southeastern part of the country has been selected to carry out the research. This region is notable for deficiency of water resources in the country. The region tends to desertification which aggravates fresh water problem even more and presumably may lead to migration of local population from the area. The purpose of study was creation geographical information system (GIS) of water resources. GIS contains almost all layers of different content (water resources, springs, channels, hydrological stations, population water supply, etc.). The results of work provide an opportunity to identify the resource potential of the mentioned region, control and manage it, carry out monitoring and plan regional economy.

Keywords: desertification, GIS, irrigation, water resources

Procedia PDF Downloads 686
11329 Listening to the Voices of Syrian Refugee Women in Canada: An Ethnographic Insight into the Journey from Trauma to Adaptation

Authors: Areej Al-Hamad, Cheryl Forchuk, Abe Oudshoorn, Gerald Patrick Mckinley

Abstract:

Syrian refugee women face many obstacles when accessing health services in host countries that are influenced by various cultural, structural, and practical factors. This paper is based on critical ethnographic research undertaken in Canada to explore Syrian refugee women's migration experiences. Also, we aim to critically examine how the intersection of gender, trauma, violence and the political and economic conditions of Syrian refugee women shapes their everyday lives and health. The study also investigates the strategies and practices by which Syrian refugee women are currently addressing their healthcare needs and the models of care that are suggested for meeting their physical and mental health needs. Findings show that these women experienced constant worries, hardship, vulnerability, and intrusion of dignity. These experiences and challenges were aggravated by the structure of the Canadian social and health care system. This study offers a better understanding of the impact of migration and trauma on Syrian refugee women's roles, responsibilities, gender dynamics, and interaction with Ontario's healthcare system to improve interaction and outcomes. Health care models should address these challenges among Syrian refugee families in Canada.

Keywords: Syrian refugee women, intersectionality, critical ethnography, migration

Procedia PDF Downloads 86
11328 The Legal Nature of Grading Decisions and the Implications for Handling of Academic Complaints in or out of Court: A Comparative Legal Analysis of Academic Litigation in Europe

Authors: Kurt Willems

Abstract:

This research examines complaints against grading in higher education institutions in four different European regions: England and Wales, Flanders, the Netherlands, and France. The aim of the research is to examine the correlation between the applicable type of complaint handling on the one hand, and selected qualities of the higher education landscape and of public law on the other hand. All selected regions report a rising number of complaints against grading decisions, not only as to internal complaint handling within the institution but also judicially if the dispute persists. Some regions deem their administrative court system appropriate to deal with grading disputes (France) or have even erected a specialty administrative court to facilitate access (Flanders, the Netherlands). However, at the same time, different types of (governmental) dispute resolution bodies have been established outside of the judicial court system (England and Wales, and to lesser extent France and the Netherlands). Those dispute procedures do not seem coincidental. Public law issues such as the underlying legal nature of the education institution and, eventually, the grading decision itself, have an impact on the way the academic complaint procedures are developed. Indeed, in most of the selected regions, contractual disputes enjoy different legal protection than administrative decisions, making the legal qualification of the relationship between student and higher education institution highly relevant. At the same time, the scope of competence of government over different types of higher education institutions; albeit direct or indirect (o.a. through financing and quality control) is relevant as well to comprehend why certain dispute handling procedures have been established for students. To answer the above questions, the doctrinal and comparative legal method is used. The normative framework is distilled from the relevant national legislative rules and their preparatory texts, the legal literature, the (published) case law of academic complaints and the available governmental reports. The research is mainly theoretical in nature, examining different topics of public law (mainly administrative law) and procedural law in the context of grading decisions. The internal appeal procedure within the education institution is largely left out of the scope of the research, as well as different types of non-governmental-imposed cooperation between education institutions, given the public law angle of the research questions. The research results in the categorization of different academic complaint systems, and an analysis of the possibility to introduce each of those systems in different countries, depending on their public law system and higher education system. By doing so, the research also adds to the debate on the public-private divide in higher education systems, and its effect on academic complaints handling.

Keywords: higher education, legal qualification of education institution, legal qualification of grading decisions, legal protection of students, academic litigation

Procedia PDF Downloads 228
11327 The Importance and Role of Sukuk Marketing as an Islamic Bond in the Economy

Authors: Ilhan Keskin, Hasan Bulent Kantarci

Abstract:

In this study, one of the tools of Islamic financing known as “Sukuk” a non-interest bearing investment which has started to be implemented in Turkey and the world as a whole is discussed. In order to increase the vitality and efficiency of the economy, by taking lessons from the recent economic crisis new developments in the banking and investment sector are being expanded. The purpose of all investors is to obtain more revenue through the use of capital. The inability of traditional investment tools to meet the expectations of investors and the interest based financial system where one investor benefits at the expense of another there has been the need for a different, reliable and non-interest bearing financial market that is consistent with the Islamic rule. As a result an alternative and more reliable interest free financing tool “Sukuk” rental certificates covering people who are sensitive to Islamic rules, appeal to all segments, hidden remaining capital that contributes to the economy, reduce disparities in income distribution, common risk sharing system of profit and loss sharing has emerged. Today, for the structural countries by examining the state of the world market economy the applicability, enactment and future issues associated with this attractive kind of Islamic finance namely the “Sukuk” market has been explained.

Keywords: Islamic finance, islamic markets, non-interest bearing, rental certificates

Procedia PDF Downloads 520
11326 A Study on Conventional and Improved Tillage Practices for Sowing Paddy in Wheat Harvested Field

Authors: R. N. Pateriya, T. K. Bhattacharya

Abstract:

In India, rice-wheat cropping system occupies the major area and contributes about 40% of the country’s total food grain production. It is necessary that production of rice and wheat must keep pace with growing population. However, various factors such as degradation in natural resources, shift in cropping pattern, energy constraints etc. are causing reduction in the productivity of these crops. Seedbed for rice after wheat is difficult to prepare due to presence of straw and stubbles, and require excessive tillage operations to bring optimum tilth. In addition, delayed sowing and transplanting of rice is mainly due to poor crop residue management, multiplicity of tillage operations and non-availability of the power source. With increasing concern for fuel conservation and energy management, farmers might wish to estimate the best cultivation system for more productivity. The widest spread method of tilling land is ploughing with mould board plough. However, with the mould board plough upper layer of soil is neither always loosened at the desired extent nor proper mixing of different layers are achieved. Therefore, additional operations carried out to improve tilth. The farmers are becoming increasingly aware of the need for minimum tillage by minimizing the use of machines. Soil management can be achieved by using the combined active-passive tillage machines. A study was therefore, undertaken in wheat-harvested field to study the impact of conventional and modified tillage practices on paddy crop cultivation. Tillage treatments with tractor as a power source were selected during the experiment. The selected level of tillage treatments of tractor machinery management were (T1:- Direct Sowing of Rice), (T2:- 2 to 3 harrowing and no Puddling with manual transplanting), (T3:- 2 to 3 harrowing and Puddling with paddy harrow with manual transplanting), (T4:- 2 to 3 harrowing and Puddling with Rotavator with manual transplanting). The maximum output was obtained with treatment T1 (7.85 t/ha)) followed by T4 (6.4 t/ha), T3 (6.25 t/ha) and T2 (6.0 t/ha)) respectively.

Keywords: crop residues, cropping system, minimum tillage, yield

Procedia PDF Downloads 205
11325 Experımental Study of Structural Insulated Panel under Lateral Load

Authors: H. Abbasi, K. Sennah

Abstract:

A Structural Insulated Panel (SIP) is a structural element contains of foam insulation core sandwiched between two oriented-strand boards (OSB), plywood boards, steel sheets or fibre cement boards. Superior insulation, exceptional strength and fast insulation are the specifications of a SIP-based structure. There are also many other benefits such as less total construction costs, speed of construction, less expensive HVAC equipment required, favourable energy-efficient mortgages comparing to wood-framed houses. This paper presents the experimental analysis on selected foam-timber SIPs to study their structural behaviour when used as walls in residential construction under lateral loading. The experimental program has also taken several stud panels in order to compare the performance of SIP with conventional wood-frame system. The results of lateral tests performed in this study established a database that can be used further to develop design tables of SIP wall subjected to lateral loading caused by wind or earthquake. A design table for walls subjected to lateral loading was developed. Experimental results proved that the tested SIPs are ‘as good as’ the conventional wood-frame system.

Keywords: structural insulated panel, experimental study, lateral load, design tables

Procedia PDF Downloads 313
11324 Oligarchic Transitions within the Tunisian Autocratic Authoritarian System and the Struggle for Democratic Transformation: Before and beyond the 2010 Jasmine Revolution

Authors: M. Moncef Khaddar

Abstract:

This paper focuses mainly on a contextualized understanding of ‘autocratic authoritarianism’ in Tunisia without approaching its peculiarities in reference to the ideal type of capitalist-liberal democracy but rather analysing it as a Tunisian ‘civilian dictatorship’. This is reminiscent, to some extent, of the French ‘colonial authoritarianism’ in parallel with the legacy of the traditional formal monarchic absolutism. The Tunisian autocratic political system is here construed as a state manufactured nationalist-populist authoritarianism associated with a de facto presidential single party, two successive autocratic presidents and their subservient autocratic elites who ruled with an iron fist the de-colonialized ‘liberated nation’ that came to be subjected to a large scale oppression and domination under the new Tunisian Republic. The diachronic survey of Tunisia’s autocratic authoritarian system covers the early years of autocracy, under the first autocratic president Bourguiba, 1957-1987, as well as the different stages of its consolidation into a police-security state under the second autocratic president, Ben Ali, 1987-2011. Comparing the policies of authoritarian regimes, within what is identified synchronically as a bi-cephalous autocratic system, entails an in-depth study of the two autocrats, who ruled Tunisia for more than half a century, as modern adaptable autocrats. This is further supported by an exploration of the ruling authoritarian autocratic elites who played a decisive role in shaping the undemocratic state-society relations, under the 1st and 2nd President, and left an indelible mark, structurally and ideologically, on Tunisian polity. Emphasis is also put on the members of the governmental and state-party institutions and apparatuses that kept circulating and recycling from one authoritarian regime to another, and from the first ‘founding’ autocrat to his putschist successor who consolidated authoritarian stability, political continuity and autocratic governance. The reconfiguration of Tunisian political life, in the post-autocratic era, since 2011 will be analysed. This will be scrutinized, especially in light of the unexpected return of many high-profile figures and old guards of the autocratic authoritarian apparatchiks. How and why were, these public figures, from an autocratic era, able to return in a supposedly post-revolutionary moment? Finally, while some continue to celebrate the putative exceptional success of ‘democratic transition’ in Tunisia, within a context of ‘unfinished revolution’, others remain perplexed in the face of a creeping ‘oligarchic transition’ to a ‘hybrid regime’, characterized rather by elites’ reformist tradition than a bottom-up genuine democratic ‘change’. This latter is far from answering the 2010 ordinary people’s ‘uprisings’ and ‘aspirations, for ‘Dignity, Liberty and Social Justice’.

Keywords: authoritarianism, autocracy, democratization, democracy, populism, transition, Tunisia

Procedia PDF Downloads 139
11323 Multivariate Output-Associative RVM for Multi-Dimensional Affect Predictions

Authors: Achut Manandhar, Kenneth D. Morton, Peter A. Torrione, Leslie M. Collins

Abstract:

The current trends in affect recognition research are to consider continuous observations from spontaneous natural interactions in people using multiple feature modalities, and to represent affect in terms of continuous dimensions, incorporate spatio-temporal correlation among affect dimensions, and provide fast affect predictions. These research efforts have been propelled by a growing effort to develop affect recognition system that can be implemented to enable seamless real-time human-computer interaction in a wide variety of applications. Motivated by these desired attributes of an affect recognition system, in this work a multi-dimensional affect prediction approach is proposed by integrating multivariate Relevance Vector Machine (MVRVM) with a recently developed Output-associative Relevance Vector Machine (OARVM) approach. The resulting approach can provide fast continuous affect predictions by jointly modeling the multiple affect dimensions and their correlations. Experiments on the RECOLA database show that the proposed approach performs competitively with the OARVM while providing faster predictions during testing.

Keywords: dimensional affect prediction, output-associative RVM, multivariate regression, fast testing

Procedia PDF Downloads 278
11322 Empirical Studies of Indigenous Reserved Land in Taiwan- An Example of a Truku Tribe in Hualien County

Authors: Chuanju Cheng

Abstract:

In Taiwan, the system of indigenous reserved land was established in 1928 during the Japanese rule. The purpose of setting up indigenous reserved land is to support the livelihood of tribal peoples who live in the mountainous area. Since 1945, the KMT government has kept the indigenous reserved land; in principle, only indigenous people can use indigenous reserved land. However, the government also makes some exceptions for non-indigenous peoples to use the land. Furthermore, since 1966, an indigenous individual can have ownership (fee simple) over the land he/she uses. Recent studies showed that there are many problems regarding the indigenous reserved lands, such as indigenous peoples have been losing ownership of their land (both legally and illegally), mismatched data of the true owner and the nominal owner, overutilization of the reserved land and so on. Using a Truku tribe in Hualien County as an example, this paper tries to find out how many people still own indigenous reserved land, do land owners constantly utilize their lands, and if so, whether or not (and by what extent) the indigenous reserved land support the livelihood of tribal peoples? After ten months of working data-collecting, we’ve successfully collected 327 questionnaires (70% of total households); preliminary research results show that less than 5% of indigenous reserved land in and around that specific Truku tribe is owned by tribal people. And most of the landowners do not utilize indigenous reserved land. It seems that the indigenous reserved land system does not meet its legislative goals and needs to be redesigned.

Keywords: indigenous people, truku nation, taiwan, indigenous reserved land, poverty, economic development

Procedia PDF Downloads 76
11321 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 165
11320 Riemannain Geometries Of Visual Space

Authors: Jacek Turski

Abstract:

The visual space geometries are constructed in the Riemannian geometry framework from simulated iso-disparity conics in the horizontalvisual plane of the binocular system with the asymmetric eyes (AEs). For the eyes fixating at the abathic distance, which depends on the AE’s parameters, the iso-disparity conics are frontal straight lines in physical space. For allother fixations, the iso-disparity conics consist of families of the ellipses or hyperbolas depending on both the AE’s parameters and the bifoveal fixation. However, the iso-disparity conic’s arcs are perceived in the gaze direction asthe frontal lines and are referred to as visual geodesics. Thus, geometriesof physical and visual spaces are different. A simple postulate that combines simulated iso-disparity conics with basic anatomy od the human visual system gives the relative depth for the fixation at the abathic distance that establishes the Riemann matric tensor. The resulting geodesics are incomplete in the gaze direction and, therefore, give thefinite distances to the horizon that depend on the AE’s parameters. Moreover, the curvature vanishes in this eyes posture such that visual space is flat. For all other fixations, only the sign of the curvature canbe inferred from the global behavior of the simulated iso-disparity conics: the curvature is positive for the elliptic iso-disparity curves and negative for the hyperbolic iso-disparity curves.

Keywords: asymmetric eye model, iso-disparity conics, metric tensor, geodesics, curvature

Procedia PDF Downloads 143
11319 Service Quality, Skier Satisfaction, and Behavioral Intentions in Leisure Skiing: The Case of Beijing

Authors: Shunhong Qi, Hui Tian

Abstract:

Triggered off by the forthcoming 2022 Winter Olympics, ski centers are blossoming in China, the number being 742 in 2018. Although the number of skier visits of ski resorts soared to 19.7 million in 2018, one-time skiers account for a considerable portion therein. In light of the extremely low return rates and skiing penetration level (0.5%) of leisure skiing in China, this study proposes and tests a leisure ski service performance framework which assesses the ski resorts’ service quality, skier satisfaction, as well as their impact on skiers’ behavioral intentions, with an aim to assess the success of ski resorts and provide suggestions for improvement. Three self-administered surveys and 16 interviews were conducted upon a convenience sample of leisure skiers in two major ski destinations within two hours’ drive from Beijing – Nanshan and Jundushan ski resorts. Of the 680 questionnaires distributed, 416 usable copies were returned, the response rate being 61.2%. The questionnaire used for the study was developed based on the existing literature of 'push' factors of skiers (intrinsic desire) and 'pull' factors (attractiveness of a destination), as well as leisure sport satisfaction. The scale comprises four parts: skiers’ demographic profiles, their perceived service quality (including ski resorts’ infrastructure, expense, safety and comfort, convenience, daily needs support, skill development support, and accessibility), their overall levels of satisfaction (satisfaction with the service and the experience), and their behavioral intentions (including loyalty, future visitation and greater tolerance of price increases). Skiers’ demographic profiles show that among the 220 males and 196 females in the survey, a vast majority of the skiers are age 17-39 (87.2%). 64.7% are not married, and nearly half (48.3%) of the skiers have a monthly family income exceeding 10,000 yuan (USD 1,424), and 80% are beginners or intermediate skiers. The regression examining the influence of service quality on skier satisfaction reveals that service quality accounts for 44.4% of the variance in skier satisfaction, the variables of safety and comfort, expense, skill development support, and accessibility contributing significantly in descending order. Another regression analyzing the influence of service quality as well as skier satisfaction on their behavioral intentions shows that service quality and skier satisfaction account for 39.1% of the variance in skiers’ behavioral intentions, and the significant predictors are skier satisfaction, safety and comfort, expense, and accessibility, in descending order, though a comparison between groups also indicates that for expert skiers, the significant variables are skier satisfaction, skill development support, safety, and comfort. Suggestions are thus made for ski resorts and other stakeholders to improve skier satisfaction and increase visitation: developing diversified ski courses to meet the demands of skiers of different skiing skills and to reduce crowding, adopting enough chairlifts and magic carpets, reinforcing safety measures and medical force; further exploring their various resources and lower the skiing expense on ski pass, equipment renting, accommodation and dining; adding more bus lines and/or develop platforms for skiers’ car-pooling, and offering diversified skiing activities with local flavors for better entertainment.

Keywords: behavioral intentions, leisure skiing, service quality, skier satisfaction

Procedia PDF Downloads 86
11318 The Effect of Subsurface Dam on Saltwater Intrusion in Heterogeneous Coastal Aquifers

Authors: Antoifi Abdoulhalik, Ashraf Ahmed

Abstract:

Saltwater intrusion (SWI) in coastal aquifers has become a growing threat for many countries around the world. While various control measures have been suggested to mitigate SWI, the construction of subsurface physical barriers remains one of the most effective solutions for this problem. In this work, we used laboratory experiments and numerical simulations to investigate the effectiveness of subsurface dams in heterogeneous layered coastal aquifer with different layering patterns. Four different cases were investigated, including a homogeneous (case H), and three heterogeneous cases in which a low permeability (K) layer was set in the top part of the system (case LH), in the middle part of the system (case HLH) and the bottom part of the system (case HL). Automated image analysis technique was implemented to quantify the main SWI parameters under high spatial and temporal resolution. The method also provides transient salt concentration maps, allowing for the first time clear visualization of the spillage of saline water over the dam (advancing wedge condition) as well as the flushing of residual saline water from the freshwater area (receding wedge condition). The SEAWAT code was adopted for the numerical simulations. The results show that the presence of an overlying layer of low permeability enhanced the ability of the dam to retain the saline water. In such conditions, the rate of saline water spillage and inland extension may considerably be reduced. Conversely, the presence of an underlying low K layer led to a faster increase of saltwater volume on the seaward side of the wall, therefore considerably facilitating the spillage. The results showed that a complete removal of the residual saline water eventually occurred in all the investigated scenarios, with a rate of removal strongly affected by the hydraulic conductivity of the lower part of the aquifer. The data showed that the addition of the underlying low K layer in case HL caused the complete flushing to be almost twice longer than in the homogeneous scenario.

Keywords: heterogeneous coastal aquifers, laboratory experiments, physical barriers, seawater intrusion control

Procedia PDF Downloads 244
11317 Geographic Information System-Based Identification of Road Traffic Crash Hotspots on Rural Roads in Oman

Authors: Mohammed Bakhit Kashoob, Mohammed Salim Al-Maashani, Ahmed Abdullah Al-Marhoon

Abstract:

The use of Geographic Information System (GIS) tools in the analysis of traffic crash data can help to identify locations or hotspots with high instances or risk of traffic crashes. The identification of traffic crash hotspots can effectively improve road safety measures. Mapping of road traffic crash hotspots can help the concerned authorities to give priority and take targeted measures and improvements to the road structure at these locations to reduce traffic crashes and fatalities. In Oman, there are countless rural roads that have more risks for traveling vehicles compared to urban roads. The likelihood of traffic crashes as well as fatality rate may increase with the presence of risks that are associated with the rural type of community. In this paper, the traffic crash hotspots on rural roads in Oman are specified using spatial analysis methods in GIS and traffic crash data. These hotspots are ranked based on the frequency of traffic crash occurrence (i.e., number of traffic crashes) and the rate of fatalities. The result of this study presents a map visualization of locations on rural roads with high traffic crashes and high fatalities rates.

Keywords: road safety, rural roads, traffic crash, GIS tools

Procedia PDF Downloads 133
11316 Reducing Diagnostic Error in Australian Emergency Departments Using a Behavioural Approach

Authors: Breanna Wright, Peter Bragge

Abstract:

Diagnostic error rates in healthcare are approximately 10% of cases. Diagnostic errors can cause patient harm due to inappropriate, inadequate or delayed treatment, and such errors contribute heavily to medical liability claims globally. Therefore, addressing diagnostic error is a high priority. In most cases, diagnostic errors are the result of faulty information synthesis rather than lack of knowledge. Specifically, the majority of diagnostic errors involve cognitive factors, and in particular, cognitive biases. Emergency Departments are an environment with heightened risk of diagnostic error due to time and resource pressures, a frequently chaotic environment, and patients arriving undifferentiated and with minimal context. This project aimed to develop a behavioural, evidence-informed intervention to reduce diagnostic error in Emergency Departments through co-design with emergency physicians, insurers, researchers, hospital managers, citizens and consumer representatives. The Forum Process was utilised to address this aim. This involves convening a small (4 – 6 member) expert panel to guide a focused literature and practice review; convening of a 10 – 12 person citizens panel to gather perspectives of laypeople, including those affected by misdiagnoses; and a 18 – 22 person structured stakeholder dialogue bringing together representatives of the aforementioned stakeholder groups. The process not only provides in-depth analysis of the problem and associated behaviours, but brings together expertise and insight to facilitate identification of a behaviour change intervention. Informed by the literature and practice review, the Citizens Panel focused on eliciting the values and concerns of those affected or potentially affected by diagnostic error. Citizens were comfortable with diagnostic uncertainty if doctors were honest with them. They also emphasised the importance of open communication between doctors and patients and their families. Citizens expect more consistent standards across the state and better access for both patients and their doctors to patient health information to avoid time-consuming re-taking of long patient histories and medication regimes when re-presenting at Emergency Departments and to reduce the risk of unintentional omissions. The structured Stakeholder Dialogue focused on identifying a feasible behavioural intervention to review diagnoses in Emergency Departments. This needed to consider the role of cognitive bias in medical decision-making; contextual factors (in Victoria, there is a legislated 4-hour maximum time between ED triage and discharge / hospital admission); resource availability; and the need to ensure the intervention could work in large metropolitan as well as small rural and regional ED settings across Victoria. The identified behavioural intervention will be piloted in approximately ten hospital EDs across Victoria, Australia. This presentation will detail the findings of all review and consultation activities, describe the behavioural intervention developed and present results of the pilot trial.

Keywords: behavioural intervention, cognitive bias, decision-making, diagnostic error

Procedia PDF Downloads 124
11315 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 262
11314 Insights on Nitric Oxide Interaction with Phytohormones in Rice Root System Response to Metal Stress

Authors: Piacentini Diego, Della Rovere Federica, Fattorini Laura, Lanni Francesca, Cittadini Martina, Altamura Maria Maddalena, Falasca Giuseppina

Abstract:

Plants have evolved sophisticated mechanisms to cope with environmental cues. Changes in intracellular content and distribution of phytohormones, such as the auxin indole-3-acetic acid (IAA), have been involved in morphogenic adaptation to environmental stresses. In addition to phytohormones, plants can rely on a plethora of small signal molecules able to promptly sense and transduce the stress signals, resulting in morpho/physiological responses thanks also to their capacity to modulate the levels/distribution/reception of most hormones. Among these signaling molecules, nitrogen monoxide (nitric oxide – NO) is a critical component in several plant acclimation strategies to both biotic and abiotic stresses. Depending on its levels, NO increases plant adaptation by enhancing the enzymatic or non-enzymatic antioxidant systems or by acting as a direct scavenger of reactive oxygen/nitrogen (ROS/RNS) species produced during the stress. In addition, exogenous applications of NO-specific donor compounds showed the involvement of the signal molecule in auxin metabolism, transport, and signaling, under both physiological and stress conditions. However, the complex mechanisms underlying NO action in interacting with phytohormones, such as auxins, during metal stress responses are still poorly understood and need to be better investigated. Emphasis must be placed on the response of the root system since it is the first plant organ system to be exposed to metal soil pollution. The monocot Oryza sativa L. (rice) has been chosen given its importance as a stable food for some 4 billion people worldwide. In addition, increasing evidence has shown that rice is often grown in contaminated paddy soils with high levels of heavy metal cadmium (Cd) and metalloid arsenic (As). The facility through which these metals are taken up by rice roots and transported to the aerial organs up to the edible caryopses makes rice one of the most relevant sources of these pollutants for humans. This study aimed to evaluate if NO has a mitigatory activity in the roots of rice seedlings against Cd or As toxicity and to understand if this activity requires interactions with auxin. Our results show that exogenous treatments with the NO-donor SNP alleviate the stress induced by Cd, but not by As, in in-vitro-grown rice seedlings through increased intracellular root NO levels. The damages induced by the pollutants include root growth inhibition, root histological alterations and ROS (H2O2, O2●ˉ), and RNS (ONOOˉ) production. Also, SNP treatments mitigate both the root increase in root IAA levels and the IAA alteration in distribution monitored by the OsDR5::GUS system due to the toxic metal exposure. Notably, the SNP-induced mitigation of the IAA homeostasis altered by the pollutants does not involve changes in the expression of OsYUCCA1 and ASA2 IAA-biosynthetic genes. Taken together, the results highlight a mitigating role of NO in the rice root system, which is pollutant-specific, and involves the interaction of the signal molecule with both IAA and brassinosteroids at different (i.e., transport, levels, distribution) and multiple levels (i.e., transcriptional/post-translational levels). The research is supported by Progetti Ateneo Sapienza University of Rome, grant number: RG120172B773D1FF

Keywords: arsenic, auxin, cadmium, nitric oxide, rice, root system

Procedia PDF Downloads 75
11313 Performance Evaluation of Construction Projects by Earned Value Management Method, Using Primavera P6 – A Case Study in Istanbul, Turkey

Authors: Mohammad Lemar Zalmai, Osman Hurol Turkakin, Cemil Akcay, Ekrem Manisali

Abstract:

Most of the construction projects are exposed to time and cost overruns due to various factors and this is a major problem. As a solution to this, the Earned Value Management (EVM) method is considered. EVM is a powerful and well-known method used in monitoring and controlling the project. EVM is a technique that project managers use to track the performance of their project against project baselines. EVM gives an early indication that either project is delayed or not, and the project is either over budget or under budget at any particular day by tracking it. Thus, it helps to improve the management control system of a construction project, to detect and control the problems in potential risk areas and to suggest the importance and purpose of monitoring the construction work. This paper explains the main parameters of the EVM system involved in the calculation of time and cost for construction projects. In this study, the project management software Primavera P6 is used to deals with the project monitoring process of a seven-storeyed (G+6) faculty building whose construction is in progress at Istanbul, Turkey. A comparison between the planned progress of construction activities and actual progress is performed, and the analysis results are interpreted. This case study justifies the benefits of using EVM for project cash flow analysis and forecasting.

Keywords: earned value management (EVM), construction cost management, construction planning, primavera P6, project management, project scheduling

Procedia PDF Downloads 221
11312 Recovery the Regeneration Gas from Liquefied Petroleum Gas Dryer to Off Gas Compressors

Authors: Hassan Hussin Zwida

Abstract:

The liquified LPG (Liquefied Petroleum Gas) drying system at the Complex is designed to remove water and mercaptans from the LPG stream. Upon saturation of the desiccant beds, a regeneration cycle becomes necessary. The original design routed the regeneration gas, produced during the LPG dryer heating cycle, to the sulfur recovery unit to the incineration. However, concerns regarding high temperatures and potential unit disruptions led to a modification where the gas is currently vented to the acid flare for the initial hour before being diverted to the LP network fuel gas system. While this addresses the temperature concerns, it generates significant smoke due to the presence of liquid hydrocarbons. This paper proposes an approach to recover the regeneration gas and redirect it back to the gas plant's (off-gas compressors) instead of sending it to the AC (Acid Flare), by utilizing the existing pipe 6” and connected to off gas compressor KO (Knock-Out ) Drums . This option is simple to operate, flexible, environment-friendly solution as long-term solution, lower in capital expenditure and increase the company's profitability. The feasibility of this proposal is supported by dynamic simulations. The simulations suggest the possibility of operating two out of the three off-gas compressors and LPG (Liquefied petroleum gas) as a liquid phase, is foreseen to be carried over and gathered at the bottom level of the KO (Knock-Out) Drum.

Keywords: thermal incinerator, off-gas compressors, environment, knock-out drums, acid flare

Procedia PDF Downloads 36
11311 The Novelty of Mobile Money Solution to Ghana’S Cashless Future: Opportunities, Challenges and Way Forward

Authors: Julius Y Asamoah

Abstract:

Mobile money has seen faster adoption in the decade. Its emergence serves as an essential driver of financial inclusion and an innovative financial service delivery channel, especially to the unbanked population. The rising importance of mobile money services has caught policymakers and regulators' attention, seeking to understand the many issues emerging from this context. At the same time, it is unlocking the potential of knowledge of this new technology. Regulatory responses and support are essential, requiring significant changes to current regulatory practices in Ghana. The article aims to answer the following research questions: "What risk does an unregulated mobile money service pose to consumers and the financial system? "What factors stimulate and hinder the introduction of mobile payments in developing countries? The sample size used was 250 respondents selected from the study area. The study has adopted an analytical approach comprising a combination of qualitative and quantitative data collection methods. Actor-network theory (ANT) is used as an interpretive lens to analyse this process. ANT helps analyse how actors form alliances and enrol other actors, including non-human actors (i.e. technology), to secure their interests. The study revealed that government regulatory policies impact mobile money as critical to mobile money services in developing countries. Regulatory environment should balance the needs of advancing access to finance with the financial system's stability and draw extensively from Kenya's work as the best strategies for the system's players. Thus, regulators need to address issues related to the enhancement of supportive regulatory frameworks. It recommended that the government involve various stakeholders, such as mobile phone operators. Moreover, the national regulatory authority creates a regulatory environment that promotes fair practices and competition to raise revenues to support a business-enabling environment's key pillars as infrastructure.

Keywords: actor-network theory (ANT), cashless future, Developing countries, Ghana, Mobile Money

Procedia PDF Downloads 134
11310 A Hybrid Curriculum: Privileging Indigenous knowledges Over Western knowledges In The School Curriculum In Kenya

Authors: Rose Mutuota

Abstract:

Western knowledge have influenced the Kenyan education system through colonisation and policies borrowed from the global North. Researchers argue that studies of education and systems based on Northernframeworks ignore the lived experiences of the global South. The history of colonization is one such example. In light of this, there is a need for schools to consider the lived experience of the Kenyan child and integrate Indigenous knowledge in the education system. The study reported here explored the possibility of creating a blended/hybrid curriculum that values Indigenous knowledge and practices but also selectively use side as from the global North. Acasestudyformat was employed. Teachers and principals in four schools were interviewed. The findings indicated that teachers and students brought indigenous knowledge to the classroom but were limited in their use by existing educational policies.AnotherfindingwasthatpoliciesborrowedfromtheglobalNorthdid not suit the context in the Southincountries with a history of colonization. There was the need for policymakers to ensure the policies borrowed from the North suit the Kenyan context. The recommendations included the deliberate and mandated use of indigenous knowledge in classrooms including indigenous languages for instruction, the use of locally available assets to support students with disabilities in mainstream classrooms, and the use of a hybrid curriculum that privileges indigenous knowledge over Westernknowledgesintheschoolcurriculum.

Keywords: global North, global South, inclusive educate indigenous knowledges

Procedia PDF Downloads 194
11309 Forest Harvesting Policies and Practices in Tropical Forest of Terengganu, Malaysia: Industry Experiences

Authors: Mohd Zaki Hamzah, Roslan Rani, Ahmad Bazli Razali, Satiful Bahri Mamat, Abdul Hadi Ripin, Mohd Harun Esa

Abstract:

Ever since 1901, forest management and silviculture practices in Malaysia have been frequently reviewed and updated to take into account changes in forest conditions, markets, timber demand/supply and technical advances that can be achieved in industrial processes, logging and forest harvesting, and currently, the forest management system practiced in Peninsular Malaysia is the Selective Management System (SMS) which was introduced in 1978. This system requires the selection of management regime (felling) based on Pre-Felling Forest Inventory (Pre-F) data to ensure economical harvesting and also ensuring adequate standing stands for subsequent rounds of felling, while maintaining ecological balance and environmental quality. SMS regulates forest harvesting through area and volume controls, with the cutting cycle 30 years. Most of the forest management units (FMU) (in Peninsular Malaysia) implementing SMS have been certified by Forest Stewardship Council (FSC) and/or Program for Endorsement of Forest Certification (PEFC), and one such FMU belongs to Kumpulan Pengurusan Kayu Kayan Terengganu (KPKKT). KPKKT, a timber management subsidiary of Golden Pharos Berhad (GPB), adopts the SMS to manage its 108,900 ha of timber concessionary areas in its role as logs’ supplier for the consumption of three subsidiaries of GPB. KPKKT is also responsible for the sustainable development and management of its concession in accordance with the Sustainable Forest Management (SFM) standards to ensure that it addresses the loss of forest cover and forest degradation, forest-based economic, social and environmental benefits, and ecologically protecting forests while mobilising financial resources for the implementation of sustainable forest management planning, harvesting, monitoring and the marketing of products. This paper will detail out the management and harvesting guidelines imposed by the controlling government agency, and harvesting processes taken by KPKKT to comply with guidelines and eventually supplying timber to the relevant subsidiaries (downstream mills under GPB).

Keywords: sustainable forest management, silviculture, reduce impact logging, forest certification

Procedia PDF Downloads 92
11308 Development of Numerical Model to Compute Water Hammer Transients in Pipe Flow

Authors: Jae-Young Lee, Woo-Young Jung, Myeong-Jun Nam

Abstract:

Water hammer is a hydraulic transient problem which is commonly encountered in the penstocks of hydropower plants. The numerical model was developed to estimate the transient behavior of pressure waves in pipe systems. The computational algorithm was proposed to model the water hammer phenomenon in a pipe system with pump shutdown at midstream and sudden valve closure at downstream. To predict the pressure head and flow velocity as a function of time as a result of rapidly closing a valve and pump shutdown, two boundary conditions at the ends considering pump operation and valve control can be implemented as specified equations of the pressure head and flow velocity based on the characteristics method. It was shown that the effects of transient flow make it determine the needs for protection devices, such as surge tanks, surge relief valves, or air valves, at various points in the system against overpressure and low pressure. It produced reasonably good performance with the results of the proposed transient model for pipeline systems. The proposed numerical model can be used as an efficient tool for the safety assessment of hydropower plants due to water hammer.

Keywords: water hammer, hydraulic transient, pipe systems, characteristics method

Procedia PDF Downloads 130
11307 FMCW Doppler Radar Measurements with Microstrip Tx-Rx Antennas

Authors: Yusuf Ulaş Kabukçu, Si̇nan Çeli̇k, Onur Salan, Mai̇de Altuntaş, Mert Can Dalkiran, Gökseni̇n Bozdağ, Metehan Bulut, Fati̇h Yaman

Abstract:

This study presents a more compact implementation of the 2.4GHz MIT Coffee Can Doppler Radar for 2.6GHz operating frequency. The main difference of our prototype depends on the use of microstrip antennas which makes it possible to transport with a small robotic vehicle. We have designed our radar system with two different channels: Tx and Rx. The system mainly consists of Voltage Controlled Oscillator (VCO) source, low noise amplifiers, microstrip antennas, splitter, mixer, low pass filter, and necessary RF connectors with cables. The two microstrip antennas, one is element for transmitter and the other one is array for receiver channel, was designed, fabricated and verified by experiments. The system has two operation modes: speed detection and range detection. If the switch of the operation mode is ‘Off’, only CW signal transmitted for speed measurement. When the switch is ‘On’, CW is frequency-modulated and range detection is possible. In speed detection mode, high frequency (2.6 GHz) is generated by a VCO, and then amplified to reach a reasonable level of transmit power. Before transmitting the amplified signal through a microstrip patch antenna, a splitter used in order to compare the frequencies of transmitted and received signals. Half of amplified signal (LO) is forwarded to a mixer, which helps us to compare the frequencies of transmitted and received (RF) and has the IF output, or in other words information of Doppler frequency. Then, IF output is filtered and amplified to process the signal digitally. Filtered and amplified signal showing Doppler frequency is used as an input of audio input of a computer. After getting this data Doppler frequency is shown as a speed change on a figure via Matlab script. According to experimental field measurements the accuracy of speed measurement is approximately %90. In range detection mode, a chirp signal is used to form a FM chirp. This FM chirp helps to determine the range of the target since only Doppler frequency measured with CW is not enough for range detection. Such a FMCW Doppler radar may be used in border security of the countries since it is capable of both speed and range detection.

Keywords: doppler radar, FMCW, range detection, speed detection

Procedia PDF Downloads 389
11306 The Impact of the COVID-19 on the Cybercrimes in Hungary and the Possible Solutions for Prevention

Authors: László Schmidt

Abstract:

Technological and digital innovation is constantly and dynamically evolving, which poses an enormous challenge to both lawmaking and law enforcement. To legislation because artificial intelligence permeates many areas of people’s daily lives that the legislator must regulate. it can see how challenging it is to regulate e.g. self-driving cars/taxis/camions etc. Not to mention cryptocurrencies and Chat GPT, the use of which also requires legislative intervention. Artificial intelligence also poses an extraordinary challenge to law enforcement. In criminal cases, police and prosecutors can make great use of AI in investigations, e.g. in forensics, DNA samples, reconstruction, identification, etc. But it can also be of great help in the detection of crimes committed in cyberspace. In the case of cybercrime, on the one hand, it can be viewed as a new type of crime that can only be committed with the help of information systems, and that has a specific protected legal object, such as an information system or data. On the other hand, it also includes traditional crimes that are much easier to commit with the help of new tools. According to Hungarian Criminal Code section 375 (1), any person who, for unlawful financial gain, introduces data into an information system, or alters or deletes data processed therein, or renders data inaccessible, or otherwise interferes with the functioning of the information system, and thereby causes damage, is guilty of a felony punishable by imprisonment not exceeding three years. The Covid-19 coronavirus epidemic has had a significant impact on our lives and our daily lives. It was no different in the world of crime. With people staying at home for months, schools, restaurants, theatres, cinemas closed, and no travel, criminals have had to change their ways. Criminals were committing crimes online in even greater numbers than before. These crimes were very diverse, ranging from false fundraising, the collection and misuse of personal data, extortion to fraud on various online marketplaces. The most vulnerable age groups (minors and elderly) could be made more aware and prevented from becoming victims of this type of crime through targeted programmes. The aim of the study is to show the Hungarian judicial practice in relation to cybercrime and possible preventive solutions.

Keywords: cybercrime, COVID-19, Hungary, criminal law

Procedia PDF Downloads 55