Search results for: implement draft
1014 The Challenges of Decentralised Education Policy for Teachers in Indonesian Contexts
Authors: Ahmad Ardillah Rahman
Abstract:
The decentralisation policy in education has been a trend in some countries in the last two decades. In Indonesia, the implementation of the policy has been introduced since 2003 with the occurrence of School-Based Management policy. The reform has affected the way principals and teachers should involve in school practices in which more autonomies and flexibilities are given to teachers in conducting their teaching practices. Almost 13 years since the policy was firstly introduced, the government and teachers in Indonesia still face some obstacles in maximising the potential benefits of the implementation of the decentralised education system. This study, thus, critically analyses the challenges of decentralised education policy for teachers in Indonesian education context. The purposes of this study are threefold. Firstly, it will explore the history of policy transformation from a centralised to a decentralised education policy. Secondly, it points out the advantages of the decentralised policy implementation. The last, it provides a comprehensive description of challenges faced by Indonesian teachers with the new roles in designing and implementing a curriculum. By using data from existing surveys and research, this study concludes that to successfully implement the transformation in the educational reform of Indonesia, continual and gradual teachers’ training, professional career pathway, and local monitoring for teachers should be developed and strengthened.Keywords: curriculum design, decentralisation, school-based management, teachers’ autonomy
Procedia PDF Downloads 3211013 Active Contours for Image Segmentation Based on Complex Domain Approach
Authors: Sajid Hussain
Abstract:
The complex domain approach for image segmentation based on active contour has been designed, which deforms step by step to partition an image into numerous expedient regions. A novel region-based trigonometric complex pressure force function is proposed, which propagates around the region of interest using image forces. The signed trigonometric force function controls the propagation of the active contour and the active contour stops on the exact edges of the object accurately. The proposed model makes the level set function binary and uses Gaussian smoothing kernel to adjust and escape the re-initialization procedure. The working principle of the proposed model is as follows: The real image data is transformed into complex data by iota (i) times of image data and the average iota (i) times of horizontal and vertical components of the gradient of image data is inserted in the proposed model to catch complex gradient of the image data. A simple finite difference mathematical technique has been used to implement the proposed model. The efficiency and robustness of the proposed model have been verified and compared with other state-of-the-art models.Keywords: image segmentation, active contour, level set, Mumford and Shah model
Procedia PDF Downloads 1141012 Ecological and Economical Indicators of Successful Community Based Forest Management: A Case of Lowland Community Forestry in Nepal
Authors: Bikram Jung Kunwar, Pralhad Kunwor
Abstract:
The Community-Based Forest Management (CBFM) approach is often glorified as the best forest management alternatives in the developing countries. However, how the approach has been understood by the local user households, who implement it is remained unanswered for many planners, policy makers, and sometimes researcher as well. The study attempts to assess the understanding of ecology and economics of CBFM in Nepal, where community forest program has been implemented since the 1970s. In order to understand the impacts of the program, eight criteria and sixteen indicators for ecological conservation and similarly same number of criteria and indicators for socio-economic impacts of the program were designed and compared between before and after the program implementation. The community forestry program has positive effects in forest ecology conservation and at the same time rural livelihood improvement of local people. The study revealed that collective understanding of forest ecology and economics leads the CBFM approach towards the sustainability of the program in a win-win situation. The recommendations of the study are expected to be useful to natural resource managers, planners, and policy makers.Keywords: community, forest management, ecology, economics, Nepal
Procedia PDF Downloads 3951011 An Analytical Study of FRP-Concrete Bridge Superstructures
Authors: Wael I. Alnahhal
Abstract:
It is a major challenge to build a bridge superstructure that has long-term durability and low maintenance requirements. A solution to this challenge may be to use new materials or to implement new structural systems. Fiber reinforced polymer (FRP) composites have continued to play an important role in solving some of persistent problems in infrastructure applications because of its high specific strength, light weight, and durability. In this study, the concept of the hybrid FRP-concrete structural systems is applied to a bridge superstructure. The hybrid FRP-concrete bridge superstructure is intended to have durable, structurally sound, and cost effective hybrid system that will take full advantage of the inherent properties of both FRP materials and concrete. In this study, two hybrid FRP-concrete bridge systems were investigated. The first system consists of trapezoidal cell units forming a bridge superstructure. The second one is formed by arch cells. The two systems rely on using cellular components to form the core of the bridge superstructure, and an outer shell to warp around those cells to form the integral unit of the bridge. Both systems were investigated analytically by using finite element (FE) analysis. From the rigorous FE studies, it was concluded that first system is more efficient than the second.Keywords: bridge superstructure, hybrid system, fiber reinforced polymer, finite element analysis
Procedia PDF Downloads 3341010 Shared Beliefs and Behavioral Labels in Bullying among Middle Schoolers: Qualitative Analysis of Peer Group Dynamics
Authors: Malgorzata Wojcik
Abstract:
Groups are a powerful and significant part of human development. They serve as major emergent microsocial structures in children’s and youth’s ecological system. During middle and secondary school, peer groups become a particularly salient influence. While they promote a range of prosocial and positive emotional and behavioral attributes, they can also elicit negative or antisocial attributes, effectively “bringing out the worst” in some individuals. The grounded theory approach was employed to guide data collection and analysis, as it allows for a deeper understanding of the group processes and students’ perspectives on complex intragroup relations. Students’ perspectives on bullying cases were investigated by observing daily interactions among those involved and interviewing 47 students. The results complement theories of labeling in bullying by showing that all students self-label themselves and find it difficult to break patterns of behaviors related to bullying, such as supporting the bully or not defending the victim. In terms of the practical implications, the findings indicate that it could be beneficial to use non-punitive, restorative anti-bullying interventions that implement peer influence to transform bullying relations by removing behavioral labels.Keywords: bullying, peer group, victimization, class reputation
Procedia PDF Downloads 1171009 Implementation of Integer Sub-Decomposition Method on Elliptic Curves with J-Invariant 1728
Authors: Siti Noor Farwina Anwar, Hailiza Kamarulhaili
Abstract:
In this paper, we present the idea of implementing the Integer Sub-Decomposition (ISD) method on elliptic curves with j-invariant 1728. The ISD method was proposed in 2013 to compute scalar multiplication in elliptic curves, which remains to be the most expensive operation in Elliptic Curve Cryptography (ECC). However, the original ISD method only works on integer number field and solve integer scalar multiplication. By extending the method into the complex quadratic field, we are able to solve complex multiplication and implement the ISD method on elliptic curves with j-invariant 1728. The curve with j-invariant 1728 has a unique discriminant of the imaginary quadratic field. This unique discriminant of quadratic field yields a unique efficiently computable endomorphism, which later able to speed up the computations on this curve. However, the ISD method needs three endomorphisms to be accomplished. Hence, we choose all three endomorphisms to be from the same imaginary quadratic field as the curve itself, where the first endomorphism is the unique endomorphism yield from the discriminant of the imaginary quadratic field.Keywords: efficiently computable endomorphism, elliptic scalar multiplication, j-invariant 1728, quadratic field
Procedia PDF Downloads 2001008 REDD+ and Conservation: Challenges and Opportunities of the Landscape Governance Approach
Authors: Richard Mbatu
Abstract:
Implementation of the Reducing Emissions from Deforestation and forest Degradation (REDD+) program will not only lead to significant net gains in greenhouse gas reduction but also gains in biodiversity conservation. However, the looming paradigm shift in the program in the form of the proposed landscape governance approach could change this inclination. The concern lies with the fact that pursue of carbon credits by governments and private entities under the proposed landscape approach could encourage obstinate land use behaviors that are detrimental to the cause of biodiversity conservation and ecosystem services. Yet, the landscape approach could also stimulate governments to develop and implement land use management policies for climate change adaptation and mitigation. Using two potential areas of land use under the proposed landscape approach – carbon farming in grasslands and carbon farming in plantations – this paper provides a balanced analytical review of conservation challenges and opportunities for forest governance and beyond under the proposed landscape approach to REDD+. The paper argues that such a balanced view will enable policymakers and other stakeholders to better present their arguments in their efforts to shape the course of the REDD+ program in the post-Paris Agreement era.Keywords: biodiversity conservation, REDD+, forest governance, grasslands, landscape approach, plantations
Procedia PDF Downloads 3681007 A Study of the Adaptive Reuse for School Land Use Strategy: An Application of the Analytic Network Process and Big Data
Authors: Wann-Ming Wey
Abstract:
In today's popularity and progress of information technology, the big data set and its analysis are no longer a major conundrum. Now, we could not only use the relevant big data to analysis and emulate the possible status of urban development in the near future, but also provide more comprehensive and reasonable policy implementation basis for government units or decision-makers via the analysis and emulation results as mentioned above. In this research, we set Taipei City as the research scope, and use the relevant big data variables (e.g., population, facility utilization and related social policy ratings) and Analytic Network Process (ANP) approach to implement in-depth research and discussion for the possible reduction of land use in primary and secondary schools of Taipei City. In addition to enhance the prosperous urban activities for the urban public facility utilization, the final results of this research could help improve the efficiency of urban land use in the future. Furthermore, the assessment model and research framework established in this research also provide a good reference for schools or other public facilities land use and adaptive reuse strategies in the future.Keywords: adaptive reuse, analytic network process, big data, land use strategy
Procedia PDF Downloads 2031006 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors
Authors: M. S. Razana, Z. W. Shafiuddin
Abstract:
Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification
Procedia PDF Downloads 2351005 Socio-Cultural Factors to Support Knowledge Management and Organizational Innovation: A Study of Small and Medium-Sized Enterprises in Latvia
Authors: Madara Apsalone
Abstract:
Knowledge management and innovation is key to competitive advantage and sustainable business development in advanced economies. Small and medium-sized enterprises (SMEs) have lower capacity and more constrained resources for long-term and high-uncertainty research and development investments. At the same time, SMEs can implement organizational innovation to improve their performance and further foster other types of innovation. The purpose of this study is to analyze, how socio-cultural factors such as shared values, organizational behaviors, work organization and decision making processes can influence knowledge management and help to develop organizational innovation via an empirical study. Surveying 600 SMEs in Latvia, the author explores the contribution of different socio-cultural factors to organizational innovation and the role of knowledge management and organizational learning in this process. A conceptual model, explaining the impact of organizational team, development, result-orientation and structure is created. The study also proposes insights that contribute to theoretical and practical discussions on fostering innovation of small businesses in small economies.Keywords: knowledge management, organizational innovation, small and medium-sized enterprises, socio-cultural factors
Procedia PDF Downloads 3911004 Toward Concerned Leadership: A Novel Conceptual Model to Raise the Well-Being of Employees and the Leaderful Practice of Organizations
Authors: Robert McGrath, Zara Qureshi
Abstract:
A innovative leadership philosophy that is proposed herein is distinctly more humane than most leadership approaches Concerned Leadership. The central idea to this approach is to consider the whole person that comes to work; their professional skills and talents, as well as any personal, emotional challenges that could be affecting productivity and effectiveness at work. This paper explores Concerned Leadership as an integration of the two conceptual models areas examined in this paper –(1) leaderful organizations and practices, as well as (2) organizational culture, and defines leadership in the context of Mental Health and Wellness in the workplace. Leaderful organizations calls for organizations to implement leaderful practice. Leaderful practice is when leadership responsibility and decision-making is shared across all team members and levels, versus only delegated to top management as commonly seen. A healthy culture thrives off key aspects such as acceptance, employee pride, equal opportunity, and strong company leadership. Concerned Leadership is characterized by five main components: Self-Concern, Leaderful Practice, Human Touch, Belonging, and Compassion. As scholars and practitioners conceptualize leadership in practice, the present model seeks to uphold the dignity of each organizational member, thereby having the potential to transform workplaces and support all members.Keywords: leadership, mental health, reflective practice, organizational culture
Procedia PDF Downloads 811003 A Thematic Analysis of Aging in Blue Zone Regions: Lessons from Okinawa and the Nicoya Peninsula
Authors: Theresa MacNeil-Kelly
Abstract:
Blue Zones are particular regions of the world with a high prevalence of centenarians who share common characteristics, lifestyles and environments. There are currently only five recognized Blue Zones, two of which include Okinawa, Japan and the Nicoya Peninsula in Costa Rica. Individuals living in these areas tend to have positive outlooks on life, utilize daily movement, rely on strong social support groups, and eat little to no processed foods. The current research sought to further understand how centenarians living in Okinawa and in the Nicoya Peninsula utilize Blue Zone lifestyle elements in their daily living habits. To accomplish this, the author traveled to both Okinawa and the Nicoya Peninsula, Costa Rica, and interviewed several centenarians, paying particular attention to lifestyle choices and their effects on the aging process. Thematic analysis was used to analyze interview responses, and several themes emerged, such as the importance of family, friends, faith/spirituality, mindfulness, nutrition and daily movement as key foundations to aging in healthy and productive ways. Suggestions for ways to implement these habits globally was also discussed.Keywords: aging, blue zones, centenarians, nicoya peninsula, okinawa
Procedia PDF Downloads 2571002 Aerodynamic Analysis of the Airfoil of a VAWT by Using 2D CFD Modelling
Authors: Luis F. Garcia, Julian E. Jaramillo, Jorge L. Chacón
Abstract:
Colombia is a country where the benefits of wind power industry are barely used because of the geography in some areas does not allow the implementation of onshore horizontal axis wind turbines. Furthermore, exist rural areas without access to the electrical grid. Therefore, there is currently a deficit of energy supply in some towns. This research took place in one of those areas (i.e. Chicamocha Canyon-Santander) where the answer to the energy supply problems could be the use of vertical axis wind turbines, which can be used for turbulent flows. Hence, one task of this research is the analysis of the wind resources in the Chicamocha Canyon in order to implement the wind energy. The wind turbines must be designed in such a way that the blades take good advantage of the wind resources in the area of interest. Consequently, in the current research the analysis of two different airfoils (i.e. NACA0018 and DU 06-W-200) through a 2D CFD simulation is carried out by means of a free-software (OpenFOAM). Predicted results using the “Spalart-Allmaras” turbulence model are similar to the wind tunnel data published in the literature. Moreover, global parameters such as dimensionless lift and drag coefficients were calculated. Finally, this research encourages VAWT studies under wind turbulent flows in order to achieve the best use of natural resources in Colombia.Keywords: airfoil, wind turbine, turbulence modelling, Chicamocha, CFD
Procedia PDF Downloads 4871001 Implementation of Data Science in Field of Homologation
Authors: Shubham Bhonde, Nekzad Doctor, Shashwat Gawande
Abstract:
For the use and the import of Keys and ID Transmitter as well as Body Control Modules with radio transmission in a lot of countries, homologation is required. Final deliverables in homologation of the product are certificates. In considering the world of homologation, there are approximately 200 certificates per product, with most of the certificates in local languages. It is challenging to manually investigate each certificate and extract relevant data from the certificate, such as expiry date, approval date, etc. It is most important to get accurate data from the certificate as inaccuracy may lead to missing re-homologation of certificates that will result in an incompliance situation. There is a scope of automation in reading the certificate data in the field of homologation. We are using deep learning as a tool for automation. We have first trained a model using machine learning by providing all country's basic data. We have trained this model only once. We trained the model by feeding pdf and jpg files using the ETL process. Eventually, that trained model will give more accurate results later. As an outcome, we will get the expiry date and approval date of the certificate with a single click. This will eventually help to implement automation features on a broader level in the database where certificates are stored. This automation will help to minimize human error to almost negligible.Keywords: homologation, re-homologation, data science, deep learning, machine learning, ETL (extract transform loading)
Procedia PDF Downloads 1631000 Schoolwide Implementation of Schema-Based Instruction for Mathematical Problem Solving: An Action Research Investigation
Authors: Sara J. Mills, Sally Howell
Abstract:
The field of special education has long struggled to bridge the research to practice gap. There is ample evidence from research of effective strategies for students with special needs, but these strategies are not routinely implemented in schools in ways that yield positive results for students. In recent years, the field of special education has turned its focus to implementation science. That is, discovering effective methods of implementing evidence-based practices in school settings. Teacher training is a critical factor in implementation. This study aimed to successfully implement Schema-Based Instruction (SBI) for math problem solving in four classrooms in a special primary school serving students with language deficits, including students with Autism Spectrum Disorders (ASD) and Intellectual Disabilities (ID). Using an action research design that allowed for adjustments and modification to be made over the year-long study, two cohorts of teachers across the school were trained and supported in six-week learning cycles to implement SBI in their classrooms. The learning cycles included a one-day training followed by six weeks of one-on-one or team coaching and three fortnightly cohort group meetings. After the first cohort of teachers completed the learning cycle, modifications and adjustments were made to lesson materials in an attempt to improve their effectiveness with the second cohort. Fourteen teachers participated in the study, including master special educators (n=3), special education instructors (n=5), and classroom assistants (n=6). Thirty-one students participated in the study (21 boys and 10 girls), ranging in age from 5 to 12 years (M = 9 years). Twenty-one students had a diagnosis of ASD, 20 had a diagnosis of mild or moderate ID, with 13 of these students having both ASD and ID. The remaining students had diagnosed language disorders. To evaluate the effectiveness of the implementation approach, both student and teacher data was collected. Student data included pre- and post-tests of math word problem solving. Teacher data included fidelity of treatment checklists and pre-post surveys of teacher attitudes and efficacy for teaching problem solving. Finally, artifacts were collected throughout the learning cycle. Results from cohort 1 and cohort 2 revealed similar outcomes. Students improved in the number of word problems they answered correctly and in the number of problem-solving steps completed independently. Fidelity of treatment data showed that teachers implemented SBI with acceptable levels of fidelity (M = 86%). Teachers also reported increases in the amount of time spent teaching problem solving, their confidence in teaching problem solving and their perception of students’ ability to solve math word problems. The artifacts collected during instruction indicated that teachers made modifications to allow their students to access the materials and to show what they knew. These findings are in line with research that shows student learning can improve when teacher professional development is provided over an extended period of time, actively involves teachers, and utilizes a variety of learning methods in classroom contexts. Further research is needed to evaluate whether these gains in teacher instruction and student achievement can be maintained over time once the professional development is completed.Keywords: implementation science, mathematics problem solving, research-to-practice gap, schema based instruction
Procedia PDF Downloads 125999 Reaching to the Unreachable: Can Local Adaptation Plan of Action (LAPA) Overcome the Current Barriers to Reach to the Vulnerable?
Authors: Bimal Raj Regmi, Cassandra Star
Abstract:
Climate change adaptation is now the priority of many Least Developed Countries (LDCs). The country governments in LDCs are designing institutional and financing architecture to implement adaptation programmes. Nepal has introduced the concept of Local Adaptation Plan of Action (LAPA) to facilitate adaptation at the local level. However, there is lack of clarity and ambiguity on whether or not LAPA can be effective means to reach to the most vulnerable. This research paper aims to generate evidences to assess the applicability and significance of LAPA. The study used a case study approach and relied on data gathered from field studies carried out in Pyuthan and Nawalparasi district of Nepal. The findings show that LAPA has potentials to link the community based adaptation with national adaptation initiatives and thus act as middle range approach to adaptation planning. However, the current scale of LAPA and its approaches to planning and delivery are constraints by socio-economic and governance barriers. This research paper argue that the in order to address the constraints a more flexible and co-management approach to LAPA is needed.Keywords: community based adaptation, local adaptation, co-management, climate change
Procedia PDF Downloads 259998 A Theoretical Framework for Design Theories in Mobile Learning: A Higher Education Perspective
Authors: Paduri Veerabhadram, Antoinette Lombard
Abstract:
In this paper a framework for hypothesizing about mobile learning to complement theories of formal and informal learning is presented. As such, activity theory will form the main theoretical lens through which the elements involved in formal and informal learning for mobile learning will be explored, specifically related to context-aware mobile learning application. The author believes that the complexity of the relationships involved can best be analysed using activity theory. Activity theory, as a social, cultural and activity theory can be used as a mobile learning framework in an academic environment, but to develop an optimal artifact, through investigation of inherent system's contradictions. As such, it serves as a powerful modelling tool to explore and understand the design of a mobile learning environment in the study’s environment. The Academic Tool Kit Framework (ATKF) as also employed for designing of a constructivism learning environment, effective in assisting universities to facilitate lecturers to effectively implement learning through utilizing mobile devices. Results indicate a positive perspective of students in the use of mobile devices for formal and informal learning, based on the context-aware learning environment developed through the use of activity theory and ATKF.Keywords: collaborative learning, cooperative learning, context-aware learning environment, mobile learning, pedagogy
Procedia PDF Downloads 568997 Design and Implement a Remote Control Robot Controlled by Zigbee Wireless Network
Authors: Sinan Alsaadi, Mustafa Merdan
Abstract:
Communication and access systems can be made with many methods in today’s world. These systems are such standards as Wifi, Wimax, Bluetooth, GPS and GPRS. Devices which use these standards also use system resources excessively in direct proportion to their transmission speed. However, large-scale data communication is not always needed. In such cases, a technology which will use system resources as little as possible and support smart network topologies has been needed in order to enable the transmissions of such small packet data and provide the control for this kind of devices. IEEE issued 802.15.4 standard upon this necessity and enabled the production of Zigbee protocol which takes these standards as its basis and devices which support this protocol. In our project, this communication protocol was preferred. The aim of this study is to provide the immediate data transmission of our robot from the field within the scope of the project. In addition, making the communication with the robot through Zigbee Protocol has also been aimed. While sitting on the computer, obtaining the desired data from the region where the robot is located has been taken as the basis. Arduino Uno R3 microcontroller which provides the control mechanism, 1298 shield as the motor driver.Keywords: ZigBee, wireless network, remote monitoring, smart home, agricultural industry
Procedia PDF Downloads 278996 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI
Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu
Abstract:
Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.Keywords: contex-sensitive, CFI, binary analysis, code reuse attack
Procedia PDF Downloads 323995 A Constrained Neural Network Based Variable Neighborhood Search for the Multi-Objective Dynamic Flexible Job Shop Scheduling Problems
Authors: Aydin Teymourifar, Gurkan Ozturk, Ozan Bahadir
Abstract:
In this paper, a new neural network based variable neighborhood search is proposed for the multi-objective dynamic, flexible job shop scheduling problems. The neural network controls the problems' constraints to prevent infeasible solutions, while the Variable Neighborhood Search (VNS) applies moves, based on the critical block concept to improve the solutions. Two approaches are used for managing the constraints, in the first approach, infeasible solutions are modified according to the constraints, after the moves application, while in the second one, infeasible moves are prevented. Several neighborhood structures from the literature with some modifications, also new structures are used in the VNS. The suggested neighborhoods are more systematically defined and easy to implement. Comparison is done based on a multi-objective flexible job shop scheduling problem that is dynamic because of the jobs different release time and machines breakdowns. The results show that the presented method has better performance than the compared VNSs selected from the literature.Keywords: constrained optimization, neural network, variable neighborhood search, flexible job shop scheduling, dynamic multi-objective optimization
Procedia PDF Downloads 346994 Screen Method of Distributed Cooperative Navigation Factors for Unmanned Aerial Vehicle Swarm
Authors: Can Zhang, Qun Li, Yonglin Lei, Zhi Zhu, Dong Guo
Abstract:
Aiming at the problem of factor screen in distributed collaborative navigation of dense UAV swarm, an efficient distributed collaborative navigation factor screen method is proposed. The method considered the balance between computing load and positioning accuracy. The proposed algorithm utilized the factor graph model to implement a distributed collaborative navigation algorithm. The GNSS information of the UAV itself and the ranging information between the UAVs are used as the positioning factors. In this distributed scheme, a local factor graph is established for each UAV. The positioning factors of nodes with good geometric position distribution and small variance are selected to participate in the navigation calculation. To demonstrate and verify the proposed methods, the simulation and experiments in different scenarios are performed in this research. Simulation results show that the proposed scheme achieves a good balance between the computing load and positioning accuracy in the distributed cooperative navigation calculation of UAV swarm. This proposed algorithm has important theoretical and practical value for both industry and academic areas.Keywords: screen method, cooperative positioning system, UAV swarm, factor graph, cooperative navigation
Procedia PDF Downloads 79993 Drivers of Land Degradation in Trays Ecosystem as Modulated under a Changing Climate: Case Study of Côte d'Ivoire
Authors: Kadio Valere R. Angaman, Birahim Bouna Niang
Abstract:
Land degradation is a serious problem in developing countries, including Cote d’Ivoire, which has its economy focused on agriculture. It occurs in all kinds of ecosystems over the world. However, the drivers of land degradation vary from one region to another and from one ecosystem to another. Thus, identifying these drivers is an essential prerequisite to developing and implementing appropriate policies to reverse the trend of land degradation in the country, especially in the trays ecosystem. Using the binary logistic model with primary data obtained through 780 farmers surveyed, we analyze and identify the drivers of land degradation in the trays ecosystem. The descriptive statistics show that 52% of farmers interviewed have stated facing land degradation in their farmland. This high rate shows the extent of land degradation in this ecosystem. Also, the results obtained from the binary logit regression reveal that land degradation is significantly influenced by a set of variables such as sex, education, slope, erosion, pesticide, agricultural activity, deforestation, and temperature. The drivers identified are mostly local; as a result, the government must implement some policies and strategies that facilitate and incentive the adoption of sustainable land management practices by farmers to reverse the negative trend of land degradation.Keywords: drivers, land degradation, trays ecosystem, sustainable land management
Procedia PDF Downloads 145992 DNpro: A Deep Learning Network Approach to Predicting Protein Stability Changes Induced by Single-Site Mutations
Authors: Xiao Zhou, Jianlin Cheng
Abstract:
A single amino acid mutation can have a significant impact on the stability of protein structure. Thus, the prediction of protein stability change induced by single site mutations is critical and useful for studying protein function and structure. Here, we presented a deep learning network with the dropout technique for predicting protein stability changes upon single amino acid substitution. While using only protein sequence as input, the overall prediction accuracy of the method on a standard benchmark is >85%, which is higher than existing sequence-based methods and is comparable to the methods that use not only protein sequence but also tertiary structure, pH value and temperature. The results demonstrate that deep learning is a promising technique for protein stability prediction. The good performance of this sequence-based method makes it a valuable tool for predicting the impact of mutations on most proteins whose experimental structures are not available. Both the downloadable software package and the user-friendly web server (DNpro) that implement the method for predicting protein stability changes induced by amino acid mutations are freely available for the community to use.Keywords: bioinformatics, deep learning, protein stability prediction, biological data mining
Procedia PDF Downloads 468991 BIM-based Construction Noise Management Approach With a Focus on Inner-City Construction
Authors: Nasim Babazadeh
Abstract:
Growing demand for a quieter dwelling environment has turned the attention of construction companies to reducing the propagated noise of their project. In inner-city constructions, close distance between the construction site and surrounding buildings lessens the efficiency of passive noise control methods. Dwellers of the nearby areas may file complaints and lawsuits against the construction companies due to the emitted construction noise, thereby leading to the interruption of processes, compensation costs, or even suspension of the project. Therefore, construction noise should be predicted along with the project schedule. The advantage of managing the noise in the pre-construction phase is two-fold. Firstly, changes in the time plan and construction methods can be applied more flexibly. Thus, the costs related to rescheduling can be avoided. Secondly, noise-related legal problems are expected to be reduced. To implement noise mapping methods for the mentioned prediction, the required detailed information (such as the location of the noisy process, duration of the noisy work) can be exported from the 4D BIM model. The results obtained from the noise maps would be used to help the planners to define different work scenarios. The proposed approach has been applied for the foundation and earthwork of a site located in a residential area, and the obtained results are discussed.Keywords: building information modeling, construction noise management, noise mapping, 4D BIM
Procedia PDF Downloads 185990 Polarization as a Proxy of Misinformation Spreading
Authors: Michela Del Vicario, Walter Quattrociocchi, Antonio Scala, Ana Lucía Schmidt, Fabiana Zollo
Abstract:
Information, rumors, and debates may shape and impact public opinion heavily. In the latest years, several concerns have been expressed about social influence on the Internet and the outcome that online debates might have on real-world processes. Indeed, on online social networks users tend to select information that is coherent to their system of beliefs and to form groups of like-minded people –i.e., echo chambers– where they reinforce and polarize their opinions. In this way, the potential benefits coming from the exposure to different points of view may be reduced dramatically, and individuals' views may become more and more extreme. Such a context fosters misinformation spreading, which has always represented a socio-political and economic risk. The persistence of unsubstantiated rumors –e.g., the hypothetical and hazardous link between vaccines and autism– suggests that social media do have the power to misinform, manipulate, or control public opinion. As an example, current approaches such as debunking efforts or algorithmic-driven solutions based on the reputation of the source seem to prove ineffective against collective superstition. Indeed, experimental evidence shows that confirmatory information gets accepted even when containing deliberately false claims while dissenting information is mainly ignored, influences users’ emotions negatively and may even increase group polarization. Moreover, confirmation bias has been shown to play a pivotal role in information cascades, posing serious warnings about the efficacy of current debunking efforts. Nevertheless, mitigation strategies have to be adopted. To generalize the problem and to better understand social dynamics behind information spreading, in this work we rely on a tight quantitative analysis to investigate the behavior of more than 300M users w.r.t. news consumption on Facebook over a time span of six years (2010-2015). Through a massive analysis on 920 news outlets pages, we are able to characterize the anatomy of news consumption on a global and international scale. We show that users tend to focus on a limited set of pages (selective exposure) eliciting a sharp and polarized community structure among news outlets. Moreover, we find similar patterns around the Brexit –the British referendum to leave the European Union– debate, where we observe the spontaneous emergence of two well segregated and polarized groups of users around news outlets. Our findings provide interesting insights into the determinants of polarization and the evolution of core narratives on online debating. Our main aim is to understand and map the information space on online social media by identifying non-trivial proxies for the early detection of massive informational cascades. Furthermore, by combining users traces, we are finally able to draft the main concepts and beliefs of the core narrative of an echo chamber and its related perceptions.Keywords: information spreading, misinformation, narratives, online social networks, polarization
Procedia PDF Downloads 291989 Entrepreneurial Practice and Corruption in Tourism Sector: A Study of Entrepreneurial Orientation and Organizational Corruption in Nepali Star Hotels
Authors: Prabin Raj Gautam
Abstract:
Entrepreneurship in tourism sectors, particularly hotel entrepreneurship has contributed to Nepalese Gross Domestic Production (GDP). The tourist standard and star hotels in developing countries have not only been generating revenues but also providing international hospitality to the guest in the local areas. For doing so, these hotel enterprises must need to implement different business strategies to enhance and maintain their international business benchmark. The Entrepreneurial Orientation (EO) is core for making business strategies. Meanwhile, the corruption is labeled as negative factor for economic development. This paper presents the relationship between EO of Nepalese star hotels and organizational corruption. The study employed questionnaire survey as data collection tool under the quantitative methodology. Five hypotheses are developed and tested. After gathering the data form 216 questionnaire distributed to CEOs/Managers of the sample hotels, the findings show that out of five dimensions of EO, only autonomy, pro-activeness, and innovativeness are not significant to organizational corruption; however, risk-taking and competitive aggressiveness are found significant contributor. The descriptive statistics and structural equation modeling are employed to describe the data and fit the model.Keywords: entrepreneurship, entrepreneurial orientation, organizational corruption, dimensions
Procedia PDF Downloads 318988 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 131987 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases
Authors: Suglo Tohari Luri
Abstract:
Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.Keywords: data, engine, intelligence, customer, neo4j, database
Procedia PDF Downloads 193986 Excluded: The Sense of Non-Belonging and Violent Radicalisation in the Case of the United Kingdom
Authors: Lorand Bodo
Abstract:
There are many stories of young British citizens who have left their country and families to join Islamist militant groups. So, what drives these young people to abandon their families and countries to join terrorist groups such as the so-called Islamic State? Much has been written to explain the phenomenon of violent radicalisation, whereby the concepts of identity and belonging are identified as one of the most significant drivers for violent radicalisation. In this respect, this paper explores the connection between the sense of belonging and violent radicalisation. That is necessary to gain a more nuanced understanding of the process of violent radicalisation in order to create and implement more effective counter-measures for tackling violent radicalisation. By using an inductive approach, this dissertation attempts to answer the question to what extent does the sense of non-belonging lead to the violent radicalisation of a few individuals. Therefore, alongside an expert interview, a survey, and qualitative content analysis of secondary sources, an exclusive semi-structured interview was conducted with a former violently radicalised Jihadi and recruiter. Overall, the sense of non-belonging significantly affects the process of violent radicalisation of a few individuals. Nevertheless, being religiously fundamental is not the problem of becoming violently radicalised in the first place, but belonging to the wrong group that is strongly determined by ideology, constitutes the main problem.Keywords: identity, sense of non-belonging, social identity theory, violent radicalisation
Procedia PDF Downloads 200985 Maintenance Management Practice for Building
Authors: Harold Jideofor Nnachetam
Abstract:
Maintenance management in Nigeria Polytechnic faced many issues due to poor service delivery, inadequate finance, and poor maintenance plan and maintenance backlogs. The purpose of this study is to improve the conventional method practices which tend to be ineffective in Nigeria Polytechnic. The case study was conducted with eight Polytechnics in Nigeria. The selected Polytechnic is based on conventional method practices and its major problems, attempt to implement computerized technology and the willingness of staff to share their experiences. All feedbacks from respondents through semi-structured interview were recorded using video camera and transcribed verbatim. The overall findings of this research indicated; poor service delivery, inadequate financial, poor maintenance planning and maintenance backlogs. There is also need to overcome less man power competencies of maintenance management practices which existed with all eight Polytechnics. In addition, the study also found that the Polytechnics still use conventional maintenance management processes in managing building facility condition. As a result, the maintenance management staff was not able to improve the maintenance management performance at the Polytechnics. The findings are intended to be used for maintenance management practices at Nigeria Polytechnics in order to provide high-quality of building facility with safe and healthy environments.Keywords: maintenance management, conventional method, maintenance management system, Nigeria polytechnic
Procedia PDF Downloads 322