Search results for: online processing service
2397 Analysis of Pangasinan State University: Bayambang Students’ Concerns Through Social Media Analytics and Latent Dirichlet Allocation Topic Modelling Approach
Authors: Matthew John F. Sino Cruz, Sarah Jane M. Ferrer, Janice C. Francisco
Abstract:
COVID-19 pandemic has affected more than 114 countries all over the world since it was considered a global health concern in 2020. Different sectors, including education, have shifted to remote/distant setups to follow the guidelines set to prevent the spread of the disease. One of the higher education institutes which shifted to remote setup is the Pangasinan State University (PSU). In order to continue providing quality instructions to the students, PSU designed Flexible Learning Model to still provide services to its stakeholders amidst the pandemic. The model covers the redesigning of delivering instructions in remote setup and the technology needed to support these adjustments. The primary goal of this study is to determine the insights of the PSU – Bayambang students towards the remote setup implemented during the pandemic and how they perceived the initiatives employed in relation to their experiences in flexible learning. In this study, the topic modelling approach was implemented using Latent Dirichlet Allocation. The dataset used in the study. The results show that the most common concern of the students includes time and resource management, poor internet connection issues, and difficulty coping with the flexible learning modality. Furthermore, the findings of the study can be used as one of the bases for the administration to review and improve the policies and initiatives implemented during the pandemic in relation to remote service delivery. In addition, further studies can be conducted to determine the overall sentiment of the other stakeholders in the policies implemented at the University.Keywords: COVID-19, topic modelling, students’ sentiment, flexible learning, Latent Dirichlet allocation
Procedia PDF Downloads 1222396 Electrodeposition and Selenization of Cuin Alloys for the Synthesis of Photoactive Cu2in1-X Gax Se2 (Cigs) Thin Films
Authors: Mohamed Benaicha, Mahdi Allam
Abstract:
A new two stage electrochemical process as a safe, large area and low processing cost technique for the production of semi-conducting CuInSe2 (CIS) thin films is studied. CuIn precursors were first potentiostatically electrodeposited onto molybdenum substrates from an acidic thiocyanate electrolyte. In a second stage, the prepared metallic CuIn layers were used as substrate in the selenium electrochemical deposition system and subjected to a thermal treatment in vacuum atmosphere, to eliminate binary phase formation by reaction of the Cu2-x Se and InxSey selenides, leading to the formation of CuInSe2 thin film. Electrochemical selenization from aqueous electrolyte is introduced as an alternative to toxic and hazardous H2Se or Se vapor phase selenization used in physical techniques. In this study, the influence of film deposition parameters such as bath composition, temperature and potential on film properties was studied. The electrochemical, morphological, structural and compositional properties of electrodeposited thin films were characterized using various techniques. Results of Cyclic and Stripping-Cyclic Voltammetry (CV, SCV), Scanning Electron Microscopy (SEM) and Energy Dispersive X-Ray microanalysis (EDX) investigations revealed good reproducibility and homogeneity of the film composition. Thereby optimal technological parameters for the electrochemical production of CuIn, Se as precursors for CuInSe2 thin layers are determined.Keywords: photovoltaic, CIGS, copper alloys, electrodeposition, thin films
Procedia PDF Downloads 4642395 Hardships Faced by Entrepreneurs in Marketing Projects for Acquiring Business Loans
Authors: Sudipto Sarkar
Abstract:
Capital is the primary fuel for starting and running a business. Since capital is crucial for every business, entrepreneurs must successfully acquire adequate capital for executing their projects. Sources for the necessary capital for entrepreneurs include their own personal funds from existing bank accounts, or lines of credit or loans from banks or financial institutions, or equity funding from investors. The most commonly selected source of capital is a bank loan. However, acquiring a loan by any entrepreneur requires adhering to strict guidelines, conditions and norms. Because not only they have to show evidence for viability of the project, but also the means to return the acquired loan. On the bank’s part, it requires that every loan officer performs a thorough credit appraisal of the prospective borrowers and makes decisions about whether or not to lend money, how much to lend, and what conditions should be attached to it. Moreover, these credit decisions in general were often based on biases, analytical techniques, or prior experience. A loan can either turn out to be good or poor, irrespective of what type of credit decisions were followed. However, based on prior experience, the loan officers seem to differentiate between a good and a bad loan by examining the borrower’s credit history, pattern of borrowing, volume of borrowing, frequency of borrowing, and reasons for borrowing. As per an article written by Maureen Wallenfang on postcrescent.com dated May 10, 2010, it is observed that borrowers with good credit, solid business plans and adequate collateral security were able to procure loans very easily in the Fox Valley region. Since loans are required to run businesses, and also with the propensity of loans to become bad, loan officers tend to be very critical and cautious before approving and disbursing the loans. The pressure to be critical and cautious, at least partly, is a result of increased scrutiny by the Securities and Exchange Commission. As per Wall Street Journal (Sidel & Eaglesham, March, 3 2011, online), the Securities and Exchange Commission scrutinized banks that have restructured troubled loans in order to make them appear healthier than they really are. Therefore, loan officers’ loan criteria are of immense importance for entrepreneurs and banks alike.Keywords: entrepreneur, loans, marketing, banks
Procedia PDF Downloads 2582394 Women in Urban Agriculture: Institutional Challenges, COVID-19 and the War in Bahir Dar, Ethiopia
Authors: Meseret Gebeyehu Yehuala
Abstract:
Women represent the majority of urban farmers engaged in vegetable and fruit production in Bahir Dar, Ethiopia. We examine urban agriculture in Bahir Dar city in the context of disruptions caused by the civil war and COVID-19. The Sustainable Livelihoods Framework serves as a conceptual frame to explore the vulnerability context, the structural and institutional challenges faced by women, and how this impacts their livelihoods. A total of 25 urban women farmers and 6 key informants were involved in the study through explorative and structured interviews conducted in 2021. Observations and informal conversations during repeated visits provided deeper insights. In addition, key informants employed in civil service institutions and experts were interviewed. Data were analysed by applying qualitative content analysis by using Atlas tia software. Women report that they experience a lack of access to land, insecurity of tenure, irregular technical support and input provision by agricultural extension services, and lack of access to credit and formal marketplaces. The COVID-19 pandemic restrictions aggravated this situation by delaying agricultural extension offices’ provision of necessary inputs and disrupting food handling and storage leading to the loss of perishable products. Bombing in relation to the civil war has destroyed harvests and left women in fear of returning to their fields. Women stated that vegetable and fruit production could contribute to their incomes, household food supplies, and more diversified diets. However, the city municipal office has, so far, not committed to supporting urban agriculture as a livelihood strategy.Keywords: urban agriculture, institutional challenges, Bahir Dar, sustainable livelihood framework
Procedia PDF Downloads 992393 Using Autoencoder as Feature Extractor for Malware Detection
Authors: Umm-E-Hani, Faiza Babar, Hanif Durad
Abstract:
Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.Keywords: malware, auto encoders, automated feature engineering, classification
Procedia PDF Downloads 722392 Ferulic Acid-Grafted Chitosan: Thermal Stability and Feasibility as an Antioxidant for Active Biodegradable Packaging Film
Authors: Sarekha Woranuch, Rangrong Yoksan
Abstract:
Active packaging has been developed based on the incorporation of certain additives, in particular antimicrobial and antioxidant agents, into packaging systems to maintain or extend product quality and shelf-life. Ferulic acid is one of the most effective natural phenolic antioxidants, which has been used in food, pharmaceutical and active packaging film applications. However, most phenolic compounds are sensitive to oxygen, light and heat; its activities are thus lost during product formulation and processing. Grafting ferulic acid onto polymer is an alternative to reduce its loss under thermal processes. Therefore, the objectives of the present research were to study the thermal stability of ferulic acid after grafting onto chitosan, and to investigate the possibility of using ferulic acid-grafted chitosan (FA-g-CTS) as an antioxidant for active biodegradable packaging film. FA-g-CTS was incorporated into biodegradable film via a two-step process, i.e. compounding extrusion at temperature up to 150 °C followed by blown film extrusion at temperature up to 175 °C. Although incorporating FA-g-CTS with a content of 0.02–0.16% (w/w) caused decreased water vapor barrier property and reduced extensibility, the films showed improved oxygen barrier property and antioxidant activity. Radical scavenging activity and reducing power of the film containing FA-g-CTS with a content of 0.04% (w/w) were higher than that of the naked film about 254% and 94%, respectively. Tensile strength and rigidity of the films were not significantly affected by adding FA-g-CTS with a content of 0.02–0.08% (w/w). The results indicated that FA-g-CTS could be potentially used as an antioxidant for active packaging film.Keywords: active packaging film, antioxidant activity, chitosan, ferulic acid
Procedia PDF Downloads 5032391 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead
Authors: Behrooz Daneshmand
Abstract:
Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.Keywords: software-defined networking, security, SDN, 5G/IMT-2020
Procedia PDF Downloads 1002390 Wolof Voice Response Recognition System: A Deep Learning Model for Wolof Audio Classification
Authors: Krishna Mohan Bathula, Fatou Bintou Loucoubar, FNU Kaleemunnisa, Christelle Scharff, Mark Anthony De Castro
Abstract:
Voice recognition algorithms such as automatic speech recognition and text-to-speech systems with African languages can play an important role in bridging the digital divide of Artificial Intelligence in Africa, contributing to the establishment of a fully inclusive information society. This paper proposes a Deep Learning model that can classify the user responses as inputs for an interactive voice response system. A dataset with Wolof language words ‘yes’ and ‘no’ is collected as audio recordings. A two stage Data Augmentation approach is adopted for enhancing the dataset size required by the deep neural network. Data preprocessing and feature engineering with Mel-Frequency Cepstral Coefficients are implemented. Convolutional Neural Networks (CNNs) have proven to be very powerful in image classification and are promising for audio processing when sounds are transformed into spectra. For performing voice response classification, the recordings are transformed into sound frequency feature spectra and then applied image classification methodology using a deep CNN model. The inference model of this trained and reusable Wolof voice response recognition system can be integrated with many applications associated with both web and mobile platforms.Keywords: automatic speech recognition, interactive voice response, voice response recognition, wolof word classification
Procedia PDF Downloads 1162389 Women Perception of Spatial Safety Relating to Working in Historic Cairo’s Retail Street Markets
Authors: Toka M. Abufarag
Abstract:
This research primarily studies the correlation between the existence of different spatial factors in relation to the perception of females towards safely participating in the labor force within selected areas of economic bustle in Historic Cairo. This research measures the following independent variables: (1) perception regarding spatial safety on the street as controlled by street network, (2) vegetation as a facilitator and inhibitor of feeling safe in public places, and (3) outdoor lighting; in relation to the following dependent variable: the perception of females towards safely participating in the labor force in Historic Cairo. The objective of this research lies within adding to the design guidelines of urban design and planning in terms of design recommendations, making them more inclusive, especially those dealing with conserving and enhancing the built environment of old and historic cities. It is hypothesized that a balanced male-to-female ratio in terms of street activity, increased visibility of street in terms of its volume, a decrease in street obstacles, creation of open sighted vegetation, and increased visibility due to proper lighting will show up as positive response relating to the female perception of safety. The site chosen as an area to host this exercise of data collection is Al-Ataba. The site is within the borders of Historic Cairo and was chosen for two reasons: firstly, it provides a major source of economic bustle in Historic Cairo; and secondly, it hosts retail economic activities. This is a cross-sectional study. The data collected will consist of three parts: (1) observations by the researcher regarding the percentage of female participation, as well as perception of females on site, (2) interviews with women working on-site regarding the percentage of female participation, as well as their perception on participating, and (3) an anonymous online survey that studies the perception of a random sample of women towards the site as a place to exist in. The survey will aid in producing design recommendations on how to design an open 'souk' that suits women’s perception of a safe space.Keywords: urban design, women empowerment, safety perception, street markets, historic Cairo
Procedia PDF Downloads 1252388 Reliability-Centered Maintenance Application for the Development of Maintenance Strategy for a Cement Plant
Authors: Nabil Hameed Al-Farsi
Abstract:
This study’s main goal is to develop a model and a maintenance strategy for a cement factory called Arabian Cement Company, Rabigh Plant. The proposed work here depends on Reliability centric maintenance approach to develop a strategy and maintenance schedule that ensures increasing the reliability of the production system components, thus ensuring continuous productivity. The cost-effective maintenance of the plant’s dependability performance is the key goal of durability-based maintenance is. The cement plant consists of 7 important steps, so, developing a maintenance plan based on Reliability centric maintenance (RCM) method is made up of 10 steps accordingly starting from selecting units and data until performing and updating the model. The processing unit chosen for the analysis of this case is the calcinatory unit regarding model’s validation and the Travancore Titanium Products Ltd (TTP) using the claimed data history acquired from the maintenance department maintenance from the mentioned company. After applying the proposed model, the results of the maintenance simulation justified the plant's existing scheduled maintenance policy being reconsidered. Results represent the need for preventive maintenance for all Class A criticality equipment instead of the planned maintenance and the breakdown one for all other equipment depends on its criticality and an FMEA report. Consequently, the additional cost of preventive maintenance would be offset by the cost savings from breakdown maintenance for the remaining equipment.Keywords: engineering, reliability, strategy, maintenance, failure modes, effects and criticality analysis (FMEA)
Procedia PDF Downloads 1722387 A BERT-Based Model for Financial Social Media Sentiment Analysis
Authors: Josiel Delgadillo, Johnson Kinyua, Charles Mutigwe
Abstract:
The purpose of sentiment analysis is to determine the sentiment strength (e.g., positive, negative, neutral) from a textual source for good decision-making. Natural language processing in domains such as financial markets requires knowledge of domain ontology, and pre-trained language models, such as BERT, have made significant breakthroughs in various NLP tasks by training on large-scale un-labeled generic corpora such as Wikipedia. However, sentiment analysis is a strong domain-dependent task. The rapid growth of social media has given users a platform to share their experiences and views about products, services, and processes, including financial markets. StockTwits and Twitter are social networks that allow the public to express their sentiments in real time. Hence, leveraging the success of unsupervised pre-training and a large amount of financial text available on social media platforms could potentially benefit a wide range of financial applications. This work is focused on sentiment analysis using social media text on platforms such as StockTwits and Twitter. To meet this need, SkyBERT, a domain-specific language model pre-trained and fine-tuned on financial corpora, has been developed. The results show that SkyBERT outperforms current state-of-the-art models in financial sentiment analysis. Extensive experimental results demonstrate the effectiveness and robustness of SkyBERT.Keywords: BERT, financial markets, Twitter, sentiment analysis
Procedia PDF Downloads 1522386 A Multicriteria Analysis of Energy Poverty Index: A Case Study of Non-interconnected Zones in Colombia
Authors: Angelica Gonzalez O, Leonardo Rivera Cadavid, Diego Fernando Manotas
Abstract:
Energy poverty considers a population that does not have access to modern energy service. In particular, an area of a country that is not connected to the national electricity grid is known as a Non-Interconnected Zone (NIZ). Access to electricity has a significant impact on the welfare and development opportunities of the population. Different studies have shown that most health problems have an empirical cause and effect relationship with multidimensional energy poverty. Likewise, research has been carried out to review the consequences of not having access to electricity, and its results have concluded a statistically significant relationship between energy poverty and sources of drinking water, access to clean water, risks of mosquito bites, obesity, sterilization, marital status, occupation, and residence. Therefore, extensive research has been conducted in the construction of an energy poverty measure based on an index. Some of these studies introduce a Multidimensional Energy Poverty Index (MEPI), Compose Energy Poverty Index (CEPI), Low Income High Costs indicator (LIHC), among others. For this purpose, this study analyzes the energy poverty index using a multicriteria analysis determining the set of feasible alternatives - for which Colombia's ZNI will be used as a case study - to be considered in the problem and the set of relevant criteria in the characterization of the ZNI, from which the prioritization is obtained to determine the level of adjustment of each alternative with respect to the performance in each criterion. Additionally, this study considers the installation of Micro-Grids (MG). This is considered a straightforward solution to this problem because an MG is a local electrical grid, able to operate in grid-connected and island mode. Drawing on those insights, this study compares an energy poverty index considering an MG installation and calculates the impacts of different criterias in an energy poverty index in NIZ.Keywords: multicirteria, energy poverty, rural, microgrids, non-interconnect zones
Procedia PDF Downloads 1172385 Smart Disassembly of Waste Printed Circuit Boards: The Role of IoT and Edge Computing
Authors: Muhammad Mohsin, Fawad Ahmad, Fatima Batool, Muhammad Kaab Zarrar
Abstract:
The integration of the Internet of Things (IoT) and edge computing devices offers a transformative approach to electronic waste management, particularly in the dismantling of printed circuit boards (PCBs). This paper explores how these technologies optimize operational efficiency and improve environmental sustainability by addressing challenges such as data security, interoperability, scalability, and real-time data processing. Proposed solutions include advanced machine learning algorithms for predictive maintenance, robust encryption protocols, and scalable architectures that incorporate edge computing. Case studies from leading e-waste management facilities illustrate benefits such as improved material recovery efficiency, reduced environmental impact, improved worker safety, and optimized resource utilization. The findings highlight the potential of IoT and edge computing to revolutionize e-waste dismantling and make the case for a collaborative approach between policymakers, waste management professionals, and technology developers. This research provides important insights into the use of IoT and edge computing to make significant progress in the sustainable management of electronic wasteKeywords: internet of Things, edge computing, waste PCB disassembly, electronic waste management, data security, interoperability, machine learning, predictive maintenance, sustainable development
Procedia PDF Downloads 312384 Objective-Based System Dynamics Modeling to Forecast the Number of Health Professionals in Pudong New Area of Shanghai
Authors: Jie Ji, Jing Xu, Yuehong Zhuang, Xiangqing Kang, Ying Qian, Ping Zhou, Di Xue
Abstract:
Background: In 2014, there were 28,341 health professionals in Pudong new area of Shanghai and the number per 1000 population was 5.199, 55.55% higher than that in 2006. But it was always less than the average number of health professionals per 1000 population in Shanghai from 2006 to 2014. Therefore, allocation planning for the health professionals in Pudong new area has become a high priority task in order to meet the future demands of health care. In this study, we constructed an objective-based system dynamics model to forecast the number of health professionals in Pudong new area of Shanghai in 2020. Methods: We collected the data from health statistics reports and previous survey of human resources in Pudong new area of Shanghai. Nine experts, who were from health administrative departments, public hospitals and community health service centers, were consulted to estimate the current and future status of nine variables used in the system dynamics model. Based on the objective of the number of health professionals per 1000 population (8.0) in Shanghai for 2020, the system dynamics model for health professionals in Pudong new area of Shanghai was constructed to forecast the number of health professionals needed in Pudong new area in 2020. Results: The system dynamics model for health professionals in Pudong new area of Shanghai was constructed. The model forecasted that there will be 37,330 health professionals (6.433 per 1000 population) in 2020. If the success rate of health professional recruitment changed from 20% to 70%, the number of health professionals per 1000 population would be changed from 5.269 to 6.919. If this rate changed from 20% to 70% and the success rate of building new beds changed from 5% to 30% at the same time, the number of health professionals per 1000 population would be changed from 5.269 to 6.923. Conclusions: The system dynamics model could be used to simulate and forecast the health professionals. But, if there were no significant changes in health policies and management system, the number of health professionals per 1000 population would not reach the objectives in Pudong new area in 2020.Keywords: allocation planning, forecast, health professional, system dynamics
Procedia PDF Downloads 3862383 Covid-19 Associated Stress and Coping Strategies
Authors: Bar Shapira-Youngster, Sima Amram-Vaknin, Yuliya Lipshits-Braziler
Abstract:
The study examined how 811 Israelis experienced and coped with the COVID-19 lockdown. Stress, uncertainty, and loss of control were reported as common emotional experiences. Two main difficulties were reported: Loneliness and health and emotional concerns. Frequent explanations for the virus's emergence were: scientific or faith reasoning. The most prevalent coping strategies were distraction activities and acceptance. Reducing the use of maladaptive coping strategies has important implications for mental health outcomes. Objectives: COVID-19 has been recognized as a collective, continuous traumatic stressor. The present study examined how individuals experienced, perceived, and coped with this traumatic event during the lockdown in Israel in April 2020. Method: 811 Israelis (71.3% were women; mean age 43.7, SD=13.3)completed an online semi-structured questionnaire consisting two sections: In the first section, participants were asked to report background information. In the second section, they were asked to answer 8 open-ended questions about their experience, perception, and coping with the covid-19 lockdown. Participation was voluntary, and anonymity was assured, they were not offered compensation of any kind. The data were subjected to qualitative content analysis that seeks to classify the participants` answers into an effective number of categories that represent similar meanings. Our content analysis of participants’ answers extended far beyond simple word counts; our objective was to try to identify recurrent categories that characterized participants’ responses to each question. We sought to ensure that the categories regarding the different questions are as mutually exclusive and exhaustive as possible. To ensure robust analysis, the data were initially analyzed by the first author, and a second opinion was then sought from research colleagues. Contribution: The present research expands our knowledge of individuals' experiences, perceptions, and coping mechanisms with continuous traumatic events. Reducing the use of maladaptive coping strategies has important implications for mental health outcomes.Keywords: Covid-19, emotional distress, coping, continuous traumatic event
Procedia PDF Downloads 1302382 Deep Reinforcement Learning for Advanced Pressure Management in Water Distribution Networks
Authors: Ahmed Negm, George Aggidis, Xiandong Ma
Abstract:
With the diverse nature of urban cities, customer demand patterns, landscape topologies or even seasonal weather trends; managing our water distribution networks (WDNs) has proved a complex task. These unpredictable circumstances manifest as pipe failures, intermittent supply and burst events thus adding to water loss, energy waste and increased carbon emissions. Whilst these events are unavoidable, advanced pressure management has proved an effective tool to control and mitigate them. Henceforth, water utilities have struggled with developing a real-time control method that is resilient when confronting the challenges of water distribution. In this paper we use deep reinforcement learning (DRL) algorithms as a novel pressure control strategy to minimise pressure violations and leakage under both burst and background leakage conditions. Agents based on asynchronous actor critic (A2C) and recurrent proximal policy optimisation (Recurrent PPO) were trained and compared to benchmarked optimisation algorithms (differential evolution, particle swarm optimisation. A2C manages to minimise leakage by 32.48% under burst conditions and 67.17% under background conditions which was the highest performance in the DRL algorithms. A2C and Recurrent PPO performed well in comparison to the benchmarks with higher processing speed and lower computational effort.Keywords: deep reinforcement learning, pressure management, water distribution networks, leakage management
Procedia PDF Downloads 922381 The Intersection/Union Region Computation for Drosophila Brain Images Using Encoding Schemes Based on Multi-Core CPUs
Authors: Ming-Yang Guo, Cheng-Xian Wu, Wei-Xiang Chen, Chun-Yuan Lin, Yen-Jen Lin, Ann-Shyn Chiang
Abstract:
With more and more Drosophila Driver and Neuron images, it is an important work to find the similarity relationships among them as the functional inference. There is a general problem that how to find a Drosophila Driver image, which can cover a set of Drosophila Driver/Neuron images. In order to solve this problem, the intersection/union region for a set of images should be computed at first, then a comparison work is used to calculate the similarities between the region and other images. In this paper, three encoding schemes, namely Integer, Boolean, Decimal, are proposed to encode each image as a one-dimensional structure. Then, the intersection/union region from these images can be computed by using the compare operations, Boolean operators and lookup table method. Finally, the comparison work is done as the union region computation, and the similarity score can be calculated by the definition of Tanimoto coefficient. The above methods for the region computation are also implemented in the multi-core CPUs environment with the OpenMP. From the experimental results, in the encoding phase, the performance by the Boolean scheme is the best than that by others; in the region computation phase, the performance by Decimal is the best when the number of images is large. The speedup ratio can achieve 12 based on 16 CPUs. This work was supported by the Ministry of Science and Technology under the grant MOST 106-2221-E-182-070.Keywords: Drosophila driver image, Drosophila neuron images, intersection/union computation, parallel processing, OpenMP
Procedia PDF Downloads 2392380 Meaning beyond Pleasure in Leisure: Comparison between Korea and France
Authors: Joane Adeclas, Yoonyoung Kim, Taekyun Hur
Abstract:
This study investigates individual’s intrinsic motivation to practice their leisure activities, as well as, how the cultural environment may influence their motivation to practice their activities. Focused on the positive psychology, the present study proposed redefinition of leisure activities considering two factors. First, leisure activities could be as any activities that provide pleasure or meaning to individuals. Second, they can be practiced alone or in groups. In fact, based on this definition, a four-dimensional model of leisure activities was developed, to measure individual’s perception of their leisure experience, based on four factors that are: personal pleasure, social pleasure, personal meaning and social meaning. Furthermore, recent studies have argued that leisure activities can be interpreted and understood differently across cultures. Therefore, the present study proposed to examine the possible role of the cultural context of individual’s leisure practices. To do so, two cultural groups (Koreans vs. French) were compared in terms of the four-dimensional model of leisure activities. Three hundred Koreans and three hundred French participants were asked to answer an online survey about their leisure activities. Participants had to respond to questions related to several aspects of leisure practices as followed: the reason why their practice their leisure activities, the reason why they fail to practice their leisure, and their obsession relate to their leisure activities. Factor analyses based on participant’s responses proposed a moderate fit of the four-dimensional model of leisure activities. Furthermore, significant cultural differences were also found. As a result, the cultural context seems to influence the reason why individuals practice their leisure activities based on our model. In fact, Koreans explained more than French, the practice of their leisure activities with social-pleasurable reasons. At a contrary, French explained more than Koreans, the practice of their leisure activities with social-meaningful reasons. The two cultural groups also significantly differ on their perception of failure. The results showed that French participants used more meaningful social factors to explain why they failed to practice their leisure activities than did Koreans participants. Finally, Koreans and French significantly differed regarding their obsession on their leisure activities. In general, French tend to have more obsession than Koreans about their leisure activities. Those results validated the four-dimensional model of leisure, as well as, the cultural differences in leisure practices. However, further studies are needed to validate this model at an individual and cultural level.Keywords: culture, leisure, meaning, pleasure
Procedia PDF Downloads 2632379 Friction and Wear, Including Mechanisms, Modeling,Characterization, Measurement and Testing (Bangladesh Case)
Authors: Gor Muradyan
Abstract:
The paper is about friction and wear, including mechanisms, modeling, characterization, measurement and testing case in Bangladesh. Bangladesh is a country under development, A lot of people live here, approximately 145 million. The territory of this country is very small. Therefore buildings are very close to each other. As the pipe lines are very old, and people get almost dirty water, there are a lot of ongoing projects under ADB. In those projects the contractors using HDD machines (Horizontal Directional Drilling ) and grundoburst. These machines are working underground. As ground in Bangladesh is very sludge, machine can't work relevant because of big friction in the soil. When drilling works are finished machine is pulling the pipe underground. Very often the pulling of the pipes becomes very complicated because of the friction. Therefore long section of the pipe laying can’t be done because of a big friction. In that case, additional problems rise, as well as additional work must be done. As we mentioned above it is not possible to do big section of the pipe laying because of big friction in the soil, Because of this it is coming out that contractors must do more joints, more pressure test. It is always connected with additional expenditure and losing time. This machine can pull in 75 mm to 500 mm pipes connected with the soil condition. Length is possible till 500m related how much friction it will had on the puller. As less as much it can pull. Another machine grundoburst is not working at this soil condition at all. The machine is working with air compressor. This machine are using for the smaller diameter pipes, 20 mm to 63 mm. Most of the cases these machines are being used for the installing of the house connection pipes, for making service connection. To make a friction less contractors using bigger pulling had then the pipe. It is taking down the friction, But the problem of this machine is that it can't work at sludge. Because of mentioned reasons the friction has a big mining during this kind of works. There are a lot of ways to reduce the friction. In this paper we'll introduce the ways that we have researched during our practice in Bangladesh.Keywords: Bangladesh, friction and wear, HDD machines, reducing friction
Procedia PDF Downloads 3172378 Knowledge and Use of Computer Application Packages by Office Managers/Secretaries in Higher Institutions in Ogun State Nigeria: Implication on Performance Enhancement
Authors: Charlotte Bose Iro-Idoro, Adebisi Folake Osore, Tajudeen Adisa Jimoh
Abstract:
All changes in the office environment were and are still driven by advances in technology. The impact of computers on office work has resulted in numerous changes in office activities, procedures and the expectations from office managers and secretaries. This study investigated the level of knowledge and use of computer office application packages by secretaries and office managers in higher educational institutions in Ogun State and the implications of these on their performance enhancement. The study is an ex post facto research and adopted the survey design for the collection of data. Two hypotheses were formulated, and a questionnaire was developed and tested at 0.05 level of significance. All office managers and secretaries in the service of higher educational institutions in Ogun State, Nigeria formed the population of the study. The study was limited to federal institutions and a total of 120 office managers/secretaries were selected to form the sample such that 40 office managers/secretaries were randomly selected from each of the three Federal higher institutions in the State, that is Federal University of Agriculture, Abeokuta, Federal Polytechnic, Ilaro and Federal College of Education, Osiele, Abeokuta, Ogun State. Analysis of data and hypotheses tests were carried out with frequency counts, percentage and T-Test. The result indicated varying levels of awareness on office application tools with limited knowledge and use of computer application packages by office managers/secretaries. The results also showed that good knowledge and high use of office application tools enhance performance of office managers/secretaries. The study recommended that there should be maximum institutional resources and support and personal development on the part of the office managers to ensure update knowledge and maximal use of office application tools by office managers/secretaries.Keywords: application packages, computer, office managers, performance enhancement
Procedia PDF Downloads 1802377 Emotional Awareness and Working Memory as Predictive Factors for the Habitual Use of Cognitive Reappraisal among Adolescents
Authors: Yuri Kitahara
Abstract:
Background: Cognitive reappraisal refers to an emotion regulation strategy in which one changes the interpretation of emotion-eliciting events. Numerous studies show that cognitive reappraisal is associated with mental health and better social functioning. However the examination of the predictive factors of adaptive emotion regulation remains as an issue. The present study examined the factors contributing to the habitual use of cognitive reappraisal, with a focus on emotional awareness and working memory. Methods: Data was collected from 30 junior high school students, using a Japanese version of the Emotion Regulation Questionnaire (ERQ), the Levels of Emotional Awareness Scale for Children (LEAS-C), and N-back task. Results: A positive correlation between emotional awareness and cognitive reappraisal was observed in the high-working-memory group (r = .54, p < .05), whereas no significant relationship was found in the low-working-memory group. In addition, the results of the analysis of variance (ANOVA) showed a significant interaction between emotional awareness and working memory capacity (F(1, 26) = 7.74, p < .05). Subsequent analysis of simple main effects confirmed that high working memory capacity significantly increases the use of cognitive reappraisal for high-emotional-awareness subjects, and significantly decreases the use of cognitive reappraisal for low-emotional-awareness subjects. Discussion: These results indicate that under the condition when one has an adequate ability for simultaneous processing of information, explicit understanding of emotion would contribute to adaptive cognitive emotion regulation. The findings are discussed along with neuroscientific claims.Keywords: cognitive reappraisal, emotional awareness, emotion regulation, working memory
Procedia PDF Downloads 2322376 Enhancing Cultural Heritage Data Retrieval by Mapping COURAGE to CIDOC Conceptual Reference Model
Authors: Ghazal Faraj, Andras Micsik
Abstract:
The CIDOC Conceptual Reference Model (CRM) is an extensible ontology that provides integrated access to heterogeneous and digital datasets. The CIDOC-CRM offers a “semantic glue” intended to promote accessibility to several diverse and dispersed sources of cultural heritage data. That is achieved by providing a formal structure for the implicit and explicit concepts and their relationships in the cultural heritage field. The COURAGE (“Cultural Opposition – Understanding the CultuRal HeritAGE of Dissent in the Former Socialist Countries”) project aimed to explore methods about socialist-era cultural resistance during 1950-1990 and planned to serve as a basis for further narratives and digital humanities (DH) research. This project highlights the diversity of flourished alternative cultural scenes in Eastern Europe before 1989. Moreover, the dataset of COURAGE is an online RDF-based registry that consists of historical people, organizations, collections, and featured items. For increasing the inter-links between different datasets and retrieving more relevant data from various data silos, a shared federated ontology for reconciled data is needed. As a first step towards these goals, a full understanding of the CIDOC CRM ontology (target ontology), as well as the COURAGE dataset, was required to start the work. Subsequently, the queries toward the ontology were determined, and a table of equivalent properties from COURAGE and CIDOC CRM was created. The structural diagrams that clarify the mapping process and construct queries are on progress to map person, organization, and collection entities to the ontology. Through mapping the COURAGE dataset to CIDOC-CRM ontology, the dataset will have a common ontological foundation with several other datasets. Therefore, the expected results are: 1) retrieving more detailed data about existing entities, 2) retrieving new entities’ data, 3) aligning COURAGE dataset to a standard vocabulary, 4) running distributed SPARQL queries over several CIDOC-CRM datasets and testing the potentials of distributed query answering using SPARQL. The next plan is to map CIDOC-CRM to other upper-level ontologies or large datasets (e.g., DBpedia, Wikidata), and address similar questions on a wide variety of knowledge bases.Keywords: CIDOC CRM, cultural heritage data, COURAGE dataset, ontology alignment
Procedia PDF Downloads 1472375 A Study on Al-Riba Al-Hukmi and Its Instances from View of Islam
Authors: Abolfazl Alishahi Ghalehjoughi, Bi Bi Zeinab Hoseni
Abstract:
Islam is a comprehensive religion, and has rules for any thing. Islam attaches respect and importance to properties as well, and outlaws some types of transaction. A type of transaction that is strictly forbidden by the Islam is riba (usury), for which special punishments is considered in the Qur’an and hadiths. Usury is divided into (riba qarzi) loan usury and riba muamili (transaction usury); sometimes, in transaction and interest free loan contracts, ziyadah aini (interest in kind and of the same kind as that of the object of transaction) is not stipulated, but performance of work, provision of an advantage or a service, or a respite is stipulated, in which case although no ziyadah aini is in place, the transaction still constitutes usury and is outlaw. For instance, if a bank stipulates in an interest free loan contract that it pays a person the interest free loan only if he/she deposits a sum in the bank, this is an instance of riba hukmi. Or, for muamilah sarfi (transaction is which object of transaction and consideration is gold or silver) to be legitimate, it necessary that both the object of transaction and the consideration be handed over between the parties, because if a party takes delivery of the considered or object of transaction while the other party does not, the party who has taken delivery will accrue a benefit, as he/she wins time until he/she makes delivery to the other party, and this tantamount to usury in muamilah sarfi. Or, if a person lends a sum to another person, while the lender is indebted to the borrower, if the lender stipulates that he/she lends such amount only if the borrower postpones the maturity date of the lender’s debt to borrower, which is in one month, for a particular period of time, such loan will constitute usury. This research first provides views on riba hukmi, and then proceeds to analysis of views, trying to study fundamentals and proof regarding prohibition of riba hukmi, and to analyze instances of riba hukmi according to religious and hadith books.Keywords: Islam, riba, prohibition, riba hukmi
Procedia PDF Downloads 3712374 The Relationship between Mobile Phone Usage and Secondary School Students’ Academic Performance: Work Experience at an International School
Authors: L. N. P. Wedikandage, Mohamed Razmi Zahir
Abstract:
Technology is a global imperative because of its contributions to human existence and because it has improved global socioeconomic relations. As a result, the mobile phone has become the most important mode of communication today. Smartphones, Internet-enabled devices with built-in computer software and applications, are one of the most significant inventions of the twenty-first century. Technology is advantageous to many people, especially those involved in education. It is an important learning tool for today's schoolchildren. It enables students to access online learning platforms and course resources and interact digitally. Senior secondary students, in particular, have some of the most expensive and sophisticated mobile phones, tablets, and iPads capable of connecting to the internet and various social media platforms, other websites, and so on. At present, the use of mobile phones' potential for effective teaching and learning is growing. This is due to the benefits of mobile learning, including the ability to share knowledge without any limits in space or Time and the capacity to facilitate the development of critical thinking, participatory learning, problem-solving, and the development of lifelong communication skills. However, it is yet unclear how mobile devices may affect education and how they may affect opportunities for learning. As a result, the purpose of this research was to ascertain the relationship between mobile phone usage and the academic Performance of secondary-level students at an international school in Sri Lanka. The study's sample consisted of 523 secondary-level students from an international school, ranging from Form 1 to Upper 6. For the study, a survey research design and questionnaires were used. Google Forms was used to create the students' survey. There were three hypotheses tested to find out the relationship between mobile phone usage and academic preference. The findings show that there is a positive relationship between mobile phone usage and academic performance among secondary school students (the number of students obtaining simple passes is significantly higher when mobile phones are being used for more than 7 hours), no relationship between mobile phone usage and academic performance among secondary school students of different parents' occupations, and a relationship between the frequency of mobile phone usage and academic performance among secondary school students.Keywords: mobile phone, academic performance, secondary level, international schools
Procedia PDF Downloads 862373 Full-Field Estimation of Cyclic Threshold Shear Strain
Authors: E. E. S. Uy, T. Noda, K. Nakai, J. R. Dungca
Abstract:
Cyclic threshold shear strain is the cyclic shear strain amplitude that serves as the indicator of the development of pore water pressure. The parameter can be obtained by performing either cyclic triaxial test, shaking table test, cyclic simple shear or resonant column. In a cyclic triaxial test, other researchers install measuring devices in close proximity of the soil to measure the parameter. In this study, an attempt was made to estimate the cyclic threshold shear strain parameter using full-field measurement technique. The technique uses a camera to monitor and measure the movement of the soil. For this study, the technique was incorporated in a strain-controlled consolidated undrained cyclic triaxial test. Calibration of the camera was first performed to ensure that the camera can properly measure the deformation under cyclic loading. Its capacity to measure deformation was also investigated using a cylindrical rubber dummy. Two-dimensional image processing was implemented. Lucas and Kanade optical flow algorithm was applied to track the movement of the soil particles. Results from the full-field measurement technique were compared with the results from the linear variable displacement transducer. A range of values was determined from the estimation. This was due to the nonhomogeneous deformation of the soil observed during the cyclic loading. The minimum values were in the order of 10-2% in some areas of the specimen.Keywords: cyclic loading, cyclic threshold shear strain, full-field measurement, optical flow
Procedia PDF Downloads 2352372 Extracellular Phytase from Lactobacillus fermentum spp KA1: Optimization of Enzyme Production and Its Application for Improving the Nutritional Quality of Rice Bran
Authors: Neha Sharma, Kanthi K. Kondepudi, Naveen Gupta
Abstract:
Phytases are phytate specific phosphatases catalyzing the step-wise dephosphorylation of phytate, which acts as an anti-nutritional factor in food due to its strong binding capacity to minerals. In recent years microbial phytases have been explored for improving nutritional quality of food. But the major limitation is acceptability of phytases from these microorganisms. Therefore, efforts are being made to isolate organisms which are generally regarded as safe for human consumption such as Lactic Acid Bacteria (LAB). Phytases from these organisms will have an edge over other phytase sources due to its probiotic attributes. Only few LAB have been reported to give phytase activity that too is generally seen as intracellular. LAB producing extracellular phytase will be more useful as it can degrade phytate more effectively. Moreover, enzyme from such isolate will have application in food processing also. Only few species of Lactobacillus producing extracellular phytase have been reported so far. This study reports the isolation of a probiotic strain of Lactobacillus fermentum spp KA1 which produces extracellular phytase. Conditions for the optimal production of phytase have been optimized and the enzyme production resulted in an approximately 13-fold increase in yield. The phytate degradation potential of extracellular phytase in rice bran has been explored and conditions for optimal degradation were optimized. Under optimal conditions, there was 43.26% release of inorganic phosphate and 6.45% decrease of phytate content.Keywords: Lactobacillus, phytase, phytate reduction, rice bran
Procedia PDF Downloads 1982371 Information Retrieval from Internet Using Hand Gestures
Authors: Aniket S. Joshi, Aditya R. Mane, Arjun Tukaram
Abstract:
In the 21st century, in the era of e-world, people are continuously getting updated by daily information such as weather conditions, news, stock exchange market updates, new projects, cricket updates, sports and other such applications. In the busy situation, they want this information on the little use of keyboard, time. Today in order to get such information user have to repeat same mouse and keyboard actions which includes time and inconvenience. In India due to rural background many people are not much familiar about the use of computer and internet also. Also in small clinics, small offices, and hotels and in the airport there should be a system which retrieves daily information with the minimum use of keyboard and mouse actions. We plan to design application based project that can easily retrieve information with minimum use of keyboard and mouse actions and make our task more convenient and easier. This can be possible with an image processing application which takes real time hand gestures which will get matched by system and retrieve information. Once selected the functions with hand gestures, the system will report action information to user. In this project we use real time hand gesture movements to select required option which is stored on the screen in the form of RSS Feeds. Gesture will select the required option and the information will be popped and we got the information. A real time hand gesture makes the application handier and easier to use.Keywords: hand detection, hand tracking, hand gesture recognition, HSV color model, Blob detection
Procedia PDF Downloads 2902370 Risk Factors Associated with Obesity Among Adults in Tshikota, Makhado Municipality, Limpopo Province, South Africa
Authors: Ndou Rembuluwani Moddy, Daniel Ter Goon, Takalani Grace Tshitangano, Lindelani Fhumudzani Mushaphi
Abstract:
Obesity is a global public health problem. The study aimed to determine the risk factors associated with and the consequences of obesity among residents of Tshikota, Makhado Municipality, Limpopo Province, South Africa. A cross-sectional study involving 318 randomly selected adults aged 18-45 years residing at Tshikota, Makhado Local Municipality, South Africa. Sociodemographic information includes age, gender, educational level, occupation, behavioral lifestyle, environmental, psychological, and family history. Anthropometric, blood pressure, and blood glucose measurements followed standard procedure. The prevalence of obesity and overweight was 35.5% and 28.6%, respectively. About 75.2% of obese do not engage in physical activity. Most participants (63.5%) take meals three times a day, and 19.2% do not skip breakfast. Most participants do not have access to fruits and vegetables. Participants who were pre-hypertensive were 92(28.9%) and 32(10.1%) were in Stage 1 hypertension. Of the participants with Class 1 obesity, 40.9% were pre-hypertensive, and 15.2% were in Stage 1 hypertension. In Class 2 obesity, 37.8% were pre-hypertensive, and 26.7% were in Stage 1 hypertension. There was a significant difference between BMI and blood pressure among participants (p=0.00). About 6.1% of the participants in Class 1 obesity were at high risk, and 3.0% were at very high risk of glucose levels. Regarding cholesterol levels, 65 (20.4%) were at borderline, and 17(5.3%) were at high risk. There was no significant difference in BMI and cholesterol levels among participants (p= 0.20). The prevalence of obesity and overweight was high among residents of this setting. Age, marital and educational status, and employment were significantly associated with obesity. An obesity awareness campaign is crucial, and the availability of supermarkets and full-service grocery stores would provide accessibility to healthy food such as fruits and vegetables.Keywords: obesity, overweight, risk factors, adults.
Procedia PDF Downloads 872369 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 3182368 Unfair Labour Practice on Staff in Primary Health Care Facilities, Northwest Province, South Africa: A Qualitative Study
Authors: Maserapelo Gladys Serapelwane, Eva Mofatiki Manyedi
Abstract:
Background: Unfair labour practices on staff is a worldwide concern, which creates conflicts and disharmony among health workers. It is found that nursing staff members are unfairly treated without a valid reason in primary health care (PHC) facilities and predominantly in developing countries, and South Africa is not excluded. Objectives: The purpose of the study was to explore and describe the experiences of operational managers regarding unfair labour practices on staff by their local area managers and describe the perceptions of operational managers towards such treatment. Methods: A qualitative, descriptive, exploratory, and contextual research approach was considered appropriate for the study. In this study, the population comprised operational managers working in the PHC facilities of Northwest Province, South Africa. Purposive sampling was used to select participants for the study and focus group interviews were used to interview 23 operational managers. Ethical measures were applied throughout the study. Findings: The six phases of thematic analysis were used to analyze data collected for the study. Two themes that emerged are experiences of factors related to unfair labour practices in the PHC facilities and perceptions regarding how to improve their working conditions. The categories that were found in the first themes were favouritism and discrimination. In the second theme, in-service training and transparency regarding staff training and development emerged. Recommendations comprised, among others, training on the concepts of quality in the workplace and reinforcement of transparency regarding granting of study leave and attending workshops. Conclusion: Operational managers in the PHC facilities experienced unfair labour practices as evidenced by favouritism.Keywords: unfair labour practices, primary health care facilities, operational managers, North West Province
Procedia PDF Downloads 33