Search results for: building information modeling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16925

Search results for: building information modeling

9005 Evaluation of Security and Performance of Master Node Protocol in the Bitcoin Peer-To-Peer Network

Authors: Muntadher Sallal, Gareth Owenson, Mo Adda, Safa Shubbar

Abstract:

Bitcoin is a digital currency based on a peer-to-peer network to propagate and verify transactions. Bitcoin is gaining wider adoption than any previous crypto-currency. However, the mechanism of peers randomly choosing logical neighbors without any knowledge about underlying physical topology can cause a delay overhead in information propagation, which makes the system vulnerable to double-spend attacks. Aiming at alleviating the propagation delay problem, this paper introduces proximity-aware extensions to the current Bitcoin protocol, named Master Node Based Clustering (MNBC). The ultimate purpose of the proposed protocol, that are based on how clusters are formulated and how nodes can define their membership, is to improve the information propagation delay in the Bitcoin network. In MNBC protocol, physical internet connectivity increases, as well as the number of hops between nodes, decreases through assigning nodes to be responsible for maintaining clusters based on physical internet proximity. We show, through simulations, that the proposed protocol defines better clustering structures that optimize the performance of the transaction propagation over the Bitcoin protocol. The evaluation of partition attacks in the MNBC protocol, as well as the Bitcoin network, was done in this paper. Evaluation results prove that even though the Bitcoin network is more resistant against the partitioning attack than the MNBC protocol, more resources are needed to be spent to split the network in the MNBC protocol, especially with a higher number of nodes.

Keywords: Bitcoin network, propagation delay, clustering, scalability

Procedia PDF Downloads 105
9004 Critical Design Futures: A Foresight 3.0 Approach to Business Transformation and Innovation

Authors: Nadya Patel, Jawn Lim

Abstract:

Foresight 3.0 is a synergistic methodology that encompasses systems analysis, future studies, capacity building, and forward planning. These components are interconnected, fostering a collective anticipatory intelligence that promotes societal resilience (Ravetz, 2020). However, traditional applications of these strands can often fall short, leading to missed opportunities and narrow perspectives. Therefore, Foresight 3.0 champions a holistic approach to tackling complex issues, focusing on systemic transformations and power dynamics. Businesses are pivotal in preparing the workforce for an increasingly uncertain and complex world. This necessitates the adoption of innovative tools and methodologies, such as Foresight 3.0, that can better equip young employees to anticipate and navigate future challenges. Firstly, the incorporation of its methodology into workplace training can foster a holistic perspective among employees. This approach encourages employees to think beyond the present and consider wider social, economic, and environmental contexts, thereby enhancing their problem-solving skills and resilience. This paper discusses our research on integrating Foresight 3.0's transformative principles with a newly developed Critical Design Futures (CDF) framework to equip organisations with the ability to innovate for the world's most complex social problems. This approach is grounded in 'collective forward intelligence,' enabling mutual learning, co-innovation, and co-production among a diverse stakeholder community, where business transformation and innovation are achieved.

Keywords: business transformation, innovation, foresight, critical design

Procedia PDF Downloads 56
9003 A Pilot Randomized Controlled Trial of a Physical Activity Intervention in a Low Socioeconomic Population: Focus on Mental Contrasting with Implementation Intentions

Authors: Shaun G. Abbott, Rebecca C. Reynolds, John B. F. de Wit

Abstract:

Low physical activity (PA) levels are a major public health concern in Australia. There is some evidence that PA interventions can increase PA levels via various methods, including online delivery. Low Socioeconomic Status (SES) people participate in less PA than the rest of the population, partly due to poor self-regulation behaviors associated with socioeconomic characteristics. Interventions that involve a particular method of self-regulation, Mental Contrasting with Implementation Intentions (MCII), has regularly achieved healthy behavior change, but few studies focus on PA behavior outcomes and no studies examining the effect of MCII on the PA behaviors of low SES people has been done. In this study, a pilot randomized controlled trial (RCT) will deliver MCII for PA behavior change to individuals of relative disadvantage for the first time. The current pilot study will predict sample size for a future full RCT and test the hypothesis that sedentary participants from areas of relative socioeconomic disadvantage of Sydney, who learn the MCII technique will be more physically active, have improved anthropometry and psychological indicators at the completion of a 12-week intervention compared to baseline and control. Eligible participants of relative socioeconomic disadvantage will be randomly assigned to either the ‘PA Information Plus MCII Intervention Group’ or a ‘PA Information-Only Control Group’. Both groups will attend a baseline and 12-week face-to-face consultation; where PA, anthropometric and psychological data will be gathered. The intervention group will be guided through an MCII session at the baseline appointment to establish a PA goal to aim to achieve over 12 weeks. Other than these baseline and 12-week consultations, all participant interaction will occur online. All participants will receive a ‘Fitbit’ accelerometer to record objectively. PA as a daily step count, along with a PA diary for the duration of the study. PA data will be recorded on a personalized online spreadsheet. Both groups will receive a standard PA information email at weeks 2, 4, and 8. The intervention group will also receive scripted follow-up online appointments to discuss goal progress. The current pilot study is in recruitment stage with findings to be presented at the conference in December if selected.

Keywords: implementation intentions, mental contrasting, motivation, pedometer, physical activity, socioeconomic

Procedia PDF Downloads 292
9002 Identifying E-Learning Components at North-West University, Mafikeng Campus

Authors: Sylvia Tumelo Nthutang, Nehemiah Mavetera

Abstract:

Educational institutions are under pressure from their competitors. Regulators and community groups need educational institutions to adopt appropriate business and organizational practices. Globally, educational institutions are now using e-learning as the best teaching and learning approach. E-learning is becoming the center of attention to the learning institutions, educational systems and software inventors. North-West University (NWU) is currently using eFundi, a Learning Management System (LMS). LMS are all information systems and procedures that adds value to students learning and support the learning material in text or any multimedia files. With various e-learning tools, students would be able to access all the materials related to the course in electronic copies. The study was tasked with identifying the e-learning components at the NWU, Mafikeng campus. Quantitative research methodology was considered in data collection and descriptive statistics for data analysis. The Activity Theory (AT) was used as a theory to guide the study. AT outlines the limitations amongst e-learning at the macro-organizational level (plan, guiding principle, campus-wide solutions) and micro-organization (daily functioning practice, collaborative transformation, specific adaptation). On a technological environment, AT gives people an opportunity to change from concentrating on computers as an area of concern but also understand that technology is part of human activities. The findings have identified the university’s current IT tools and knowledge on e-learning elements. It was recommended that university should consider buying computer resources that consumes less power and practice e-learning effectively.

Keywords: e-learning, information and communication technology (ICT), teaching, virtual learning environment

Procedia PDF Downloads 263
9001 Gulfnet: The Advent of Computer Networking in Saudi Arabia and Its Social Impact

Authors: Abdullah Almowanes

Abstract:

The speed of adoption of new information and communication technologies is often seen as an indicator of the growth of knowledge- and technological innovation-based regional economies. Indeed, technological progress and scientific inquiry in any society have undergone a particularly profound transformation with the introduction of computer networks. In the spring of 1981, the Bitnet network was launched to link thousands of nodes all over the world. In 1985 and as one of the first adopters of Bitnet, Saudi Arabia launched a Bitnet-based network named Gulfnet that linked computer centers, universities, and libraries of Saudi Arabia and other Gulf countries through high speed communication lines. In this paper, the origins and the deployment of Gulfnet are discussed as well as social, economical, political, and cultural ramifications of the new information reality created by the network. Despite its significance, the social and cultural aspects of Gulfnet have not been investigated in history of science and technology literature to a satisfactory degree before. The presented research is based on an extensive archival research aimed at seeking out and analyzing of primary evidence from archival sources and records. During its decade and a half-long existence, Gulfnet demonstrated that the scope and functionality of public computer networks in Saudi Arabia have to be fine-tuned for compliance with Islamic culture and political system of the country. It also helped lay the groundwork for the subsequent introduction of the Internet. Since 1980s, in just few decades, the proliferation of computer networks has transformed communications world-wide.

Keywords: Bitnet, computer networks, computing and culture, Gulfnet, Saudi Arabia

Procedia PDF Downloads 235
9000 Geophysical Mapping of the Groundwater Aquifer System in Gode Area, Northeastern Hosanna, Ethiopia

Authors: Esubalew Yehualaw Melaku

Abstract:

In this study, two basic geophysical methods are applied for mapping the groundwater aquifer system in the Gode area along the Guder River, northeast of Hosanna town, near the western margin of the Central Main Ethiopian Rift. The main target of the study is to map the potential aquifer zone and investigate the groundwater potential for current and future development of the resource in the Gode area. The geophysical methods employed in this study include, Vertical Electrical Sounding (VES) and magnetic survey techniques. Electrical sounding was used to examine and map the depth to the potential aquifer zone of the groundwater and its distribution over the area. On the other hand, a magnetic survey was used to delineate contact between lithologic units and geological structures. The 2D magnetic modeling and the geoelectric sections are used for the identification of weak zones, which control the groundwater flow and storage system. The geophysical survey comprises of twelve VES readings collected by using a Schlumberger array along six profile lines and more than four hundred (400) magnetic readings at about 10m station intervals along four profiles and 20m along three random profiles. The study result revealed that the potential aquifer in the area is obtained at a depth range from 45m to 92m. This is the response of the highly weathered/ fractured ignimbrite and pumice layer with sandy soil, which is the main water-bearing horizon. Overall, in the neighborhood of four VES points, VES- 2, VES- 3, VES-10, and VES-11, shows good water-bearing zones in the study area.

Keywords: vertical electrical sounding, magnetic survey, aquifer, groundwater potential

Procedia PDF Downloads 107
8999 Assessment of Personal Level Exposures to Particulate Matter among Children in Rural Preliminary Schools as an Indoor Air Pollution Monitoring

Authors: Seyedtaghi Mirmohammadi, J. Yazdani, S. M. Asadi, M. Rokni, A. Toosi

Abstract:

There are many indoor air quality studies with an emphasis on indoor particulate matters (PM2.5) monitoring. Whereas, there is a lake of data about indoor PM2.5 concentrations in rural area schools (especially in classrooms), since preliminary children are assumed to be more defenseless to health hazards and spend a large part of their time in classrooms. The objective of this study was indoor PM2.5 concentration quality assessment. Fifteen preliminary schools by time-series sampling were selected to evaluate the indoor air quality in the rural district of Sari city, Iran. Data on indoor air climate parameters (temperature, relative humidity and wind speed) were measured by a hygrometer and thermometer. Particulate matters (PM2.5) were collected and assessed by Real Time Dust Monitor, (MicroDust Pro, Casella, UK). The mean indoor PM2.5 concentration in the studied classrooms was 135µg/m3 in average. The multiple linear regression revealed that a correlation between PM2.5 concentration and relative humidity, distance from city center and classroom size. Classroom size yields reasonable negative relationship, the PM2.5 concentration was ranged from 65 to 540μg/m3 and statistically significant at 0.05 level and the relative humidity was ranged from 70 to 85% and dry bulb temperature ranged from 28 to 29°C were statistically significant at 0.035 and 0.05 level, respectively. A statistical predictive model was obtained from multiple regressions modeling for PM2.5 and indoor psychrometric parameters.

Keywords: particulate matters, classrooms, regression, concentration, humidity

Procedia PDF Downloads 298
8998 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 382
8997 The Role of Identity Politics in the 2023 General Election in Nigeria: An Overview

Authors: Adekunle Saheed Ajisebiyawo

Abstract:

This paper examines the influence of identity politics on the development of electoral democracy in Nigeria. The paper was anchored on a theory of African democracy adopted the qualitative methodology and deployed data from secondary sources to evaluate the 2023 presidential election, and found that ethnicity, religion, and regional sentiments played a major role in the election. The practical implications of this paper are that while Nigeria’s democracy is tending towards consolidation, if the unexpected does not happen, e.g., military takeover, religious and ethnic identities can mar the country’s development as competent candidates that have good policies will be voted out based on religious and ethnic sentiments. Thus, there is a need to de-emphasize religion and ethnicity in the Nigerian polity. Candidates and parties that campaign based on racial or religious narratives should be barred from contesting elective positions. The paper concluded that identity politics is inimical to Nigeria’s democratization process as well as efforts aimed at uniting and integrating the country; it, therefore, recommended that to establish a sound electoral democracy and a strong united country, the menace of ethnic, religious, and regional cleavages should be addressed. To achieve this, efforts should be intensified towards providing a set of principles for nation-building which should be included in the constitution. In addition, the paper urges the media to support the formation of an inclusive government, cutting across tribes and religions in the country to reduce the negative impact of ethnicity and religion in the country.

Keywords: cleavages, democracy, ethnicity, election, identity politics, religion

Procedia PDF Downloads 42
8996 A Boundary-Fitted Nested Grid Model for Modeling Tsunami Propagation of 2004 Indonesian Tsunami along Southern Thailand

Authors: Fazlul Karim, Esa Al-Islam

Abstract:

Many problems in oceanography and environmental sciences require the solution of shallow water equations on physical domains having curvilinear coastlines and abrupt changes of ocean depth near the shore. Finite-difference technique for the shallow water equations representing the boundary as stair step may give inaccurate results near the coastline where results are of greatest interest for various applications. This suggests the use of methods which are capable of incorporating the irregular boundary in coastal belts. At the same time, large velocity gradient is expected near the beach and islands as water depth vary abruptly near the coast. A nested numerical scheme with fine resolution is the best resort to enhance the numerical accuracy with the least grid numbers for the region of interests where the velocity changes rapidly and which is unnecessary for the away of the region. This paper describes the development of a boundary fitted nested grid (BFNG) model to compute tsunami propagation of 2004 Indonesian tsunami in Southern Thailand coastal waters. In this paper, we develop a numerical model employing the shallow water nested model and an orthogonal boundary fitted grid to investigate the tsunami impact on the Southern Thailand due to the Indonesian tsunami of 2004. Comparisons of water surface elevation obtained from numerical simulations and field measurements are made.

Keywords: Indonesian tsunami of 2004, Boundary-fitted nested grid model, Southern Thailand, finite difference method

Procedia PDF Downloads 430
8995 The Impact of Reshuffle in Indonesian Working Cabinet Volume II to Abnormal Return and Abnormal Trading Activity of Companies Listed in the Jakarta Islamic Index

Authors: Fatin Fadhilah Hasib, Dewi Nuraini, Nisful Laila, Muhammad Madyan

Abstract:

A big political event such as Cabinet reshuffle mostly can affect the stock price positively or negatively, depend on the perception of each investor and potential investor. This study aims to analyze the movement of the market and trading activities which respect to an event using event study method. This method is used to measure the movement of the stock exchange in which abnormal return can be obtained by investor related to the event. This study examines the differences of reaction on abnormal return and trading volume activity from the companies listed in the Jakarta Islamic Index (JII), before and after the announcement of the Cabinet Work Volume II on 27 July 2016. The study was conducted in observation of 21 days in total which consists of 10 days before the event and 10 days after the event. The method used in this study is event study with market adjusted model method that observes market reaction to the information of an announcement or publicity events. The Results from the study showed that there is no significant negative nor positive reaction at the abnormal return and abnormal trading before and after the announcement of the cabinet reshuffle. It is indicated by the results of statistical tests whose value not exceeds the level of significance. Stock exchange of the JII just reflects from the previous stock prices without reflecting the information regarding to the Cabinet reshuffle event. It can be concluded that the capital market is efficient with a weak form.

Keywords: abnormal return, abnormal trading volume activity, event study, political event

Procedia PDF Downloads 281
8994 How Social Capital Mediates the Relationships between Interpersonal Interaction and Health: Location-Based Augmented Reality Games

Authors: Chechen Liao, Pui-Lai To, Yi-Hui Wang

Abstract:

Recently location-based augmented reality games (LBS+AR) have become increasingly popular as a major form of entertainment. Location-based augmented reality games have provided a lot of opportunities for face-to-face interaction among players. Prior studies also indicate that the social side of location-based augmented reality games are one of the major reasons for players to engage in the games. However, the impact of the usage of location-based augmented reality games has not been well explored. The study examines how interpersonal interaction affects social capital and health through playing location-based augmented reality games. The study also investigates how social capital mediates the relationships between interpersonal interaction and health. The study uses survey method to collect data. Six-hundred forty-seven questionnaires are collected. Structural equation modeling is used to investigate the relationships among variables. The causal relationships between variables in the research model are tested. The results of the study indicated that four interpersonal attraction attributes, including ability, proximity, similarity, and familiarity, are identified by ways of factor analysis. Interpersonal attraction is important for location-based augmented reality game-players to develop bonding and bridging social capital. Bonding and bridging social capital have a positive impact on the mental and social health of game-players. The results of the study provide academic and practical implications for future growth of location-based augmented reality games.

Keywords: health, interpersonal interaction, location-based augmented reality games, social capital

Procedia PDF Downloads 243
8993 Use of Quasi-3D Inversion of VES Data Based on Lateral Constraints to Characterize the Aquifer and Mining Sites of an Area Located in the North-East of Figuil, North Cameroon

Authors: Fofie Kokea Ariane Darolle, Gouet Daniel Hervé, Koumetio Fidèle, Yemele David

Abstract:

The electrical resistivity method is successfully used in this paper in order to have a clearer picture of the subsurface of the North-East ofFiguil in northern Cameroon. It is worth noting that this method is most often used when the objective of the study is to image the shallow subsoils by considering them as a set of stratified ground layers. The problem to be solved is very often environmental, and in this case, it is necessary to perform an inversion of the data in order to have a complete and accurate picture of the parameters of the said layers. In the case of this work, thirty-three (33) Schlumberger VES have been carried out on an irregular grid to investigate the subsurface of the study area. The 1D inversion applied as a preliminary modeling tool and in correlation with the mechanical drillings results indicates a complex subsurface lithology distribution mainly consisting of marbles and schists. Moreover, the quasi-3D inversion with lateral constraint shows that the misfit between the observed field data and the model response is quite good and acceptable with a value low than 10%. The method also reveals existence of two water bearing in the considered area. The first is the schist or weathering aquifer (unsuitable), and the other is the marble or the fracturing aquifer (suitable). The final quasi 3D inversion results and geological models indicate proper sites for groundwaters prospecting and for mining exploitation, thus allowing the economic development of the study area.

Keywords: electrical resistivity method, 1D inversion, quasi 3D inversion, groundwaters, mining

Procedia PDF Downloads 144
8992 Regression Approach for Optimal Purchase of Hosts Cluster in Fixed Fund for Hadoop Big Data Platform

Authors: Haitao Yang, Jianming Lv, Fei Xu, Xintong Wang, Yilin Huang, Lanting Xia, Xuewu Zhu

Abstract:

Given a fixed fund, purchasing fewer hosts of higher capability or inversely more of lower capability is a must-be-made trade-off in practices for building a Hadoop big data platform. An exploratory study is presented for a Housing Big Data Platform project (HBDP), where typical big data computing is with SQL queries of aggregate, join, and space-time condition selections executed upon massive data from more than 10 million housing units. In HBDP, an empirical formula was introduced to predict the performance of host clusters potential for the intended typical big data computing, and it was shaped via a regression approach. With this empirical formula, it is easy to suggest an optimal cluster configuration. The investigation was based on a typical Hadoop computing ecosystem HDFS+Hive+Spark. A proper metric was raised to measure the performance of Hadoop clusters in HBDP, which was tested and compared with its predicted counterpart, on executing three kinds of typical SQL query tasks. Tests were conducted with respect to factors of CPU benchmark, memory size, virtual host division, and the number of element physical host in cluster. The research has been applied to practical cluster procurement for housing big data computing.

Keywords: Hadoop platform planning, optimal cluster scheme at fixed-fund, performance predicting formula, typical SQL query tasks

Procedia PDF Downloads 216
8991 Satellite LiDAR-Based Digital Terrain Model Correction using Gaussian Process Regression

Authors: Keisuke Takahata, Hiroshi Suetsugu

Abstract:

Forest height is an important parameter for forest biomass estimation, and precise elevation data is essential for accurate forest height estimation. There are several globally or nationally available digital elevation models (DEMs) like SRTM and ASTER. However, its accuracy is reported to be low particularly in mountainous areas where there are closed canopy or steep slope. Recently, space-borne LiDAR, such as the Global Ecosystem Dynamics Investigation (GEDI), have started to provide sparse but accurate ground elevation and canopy height estimates. Several studies have reported the high degree of accuracy in their elevation products on their exact footprints, while it is not clear how this sparse information can be used for wider area. In this study, we developed a digital terrain model correction algorithm by spatially interpolating the difference between existing DEMs and GEDI elevation products by using Gaussian Process (GP) regression model. The result shows that our GP-based methodology can reduce the mean bias of the elevation data from 3.7m to 0.3m when we use airborne LiDAR-derived elevation information as ground truth. Our algorithm is also capable of quantifying the elevation data uncertainty, which is critical requirement for biomass inventory. Upcoming satellite-LiDAR missions, like MOLI (Multi-footprint Observation Lidar and Imager), are expected to contribute to the more accurate digital terrain model generation.

Keywords: digital terrain model, satellite LiDAR, gaussian processes, uncertainty quantification

Procedia PDF Downloads 160
8990 Assessment of the Use of Participatory Research Methods among Researchers in Federal University of Agriculture Abeokuta, Nigeria

Authors: Samson Olusegun Apantaku, Adetayo K. Aromolaran, Giyatt Hammed

Abstract:

The study assessed the use of participatory research methods among Federal University of Agriculture Abeokuta, Nigeria (FUNAAB) researchers. Simple random sampling technique was used to select one hundred and twenty respondents from the study area. Data were collected using a questionnaire. Data collected were subjected to descriptive and inferential statistical analyses. Results showed that 75.8% of the respondents were males while only 21.3% were female. The mean age of the respondents was 38.8 years and most (77.5%) of them were married. 15% of the respondents were in professorial cadre, 21.7% and 20% of the respondents were senior lecturers/fellow and lecturer/research fellow I&II respectively. The results further revealed that 93.3% of the respondents were aware of participatory research methods and 82.5% of the respondents have utilized it before. The average period of usage was 2.7 years and participation by consultation (86.7%) and interactive participation (76.7%) were mostly used. Most (94.2%) indicated that fund was the major hindrance to the use of participatory research methods. The result of correlation analysis showed that there was significant relationship between the years of research experience, designation post (status) of the respondents and usage of participatory research methods (r = 0.034, 0.031, p < 0.05). The study concluded that most of the researchers were aware of and used participatory research methods, which could influence the quality of their research or make it acceptable to the end users. It was recommended that more funds should be made available and accessible for participatory research. All researchers should be trained and encouraged to make use of participatory research methods in their research activities so as to achieve effective research and capacity building that could enhance adoption of technologies and increase agricultural production in the country. Farmers’ capacity to participate in agricultural research should also be enhanced.

Keywords: participatory research, participatory research methods, awareness, utilization

Procedia PDF Downloads 399
8989 The Relevance of the U-Shaped Learning Model to the Acquisition of the Difference between C'est and Il Est in the English Learners of French Context

Authors: Pooja Booluck

Abstract:

A U-shaped learning curve entails a three-step process: a good performance followed by a bad performance followed by a good performance again. U-shaped curves have been observed not only in language acquisition but also in various fields such as temperature face recognition object permanence to name a few. Building on previous studies of the curve child language acquisition and Second Language Acquisition this empirical study seeks to investigate the relevance of the U-shaped learning model to the acquisition of the difference between cest and il est in the English Learners of French context. The present study was developed to assess whether older learners of French in the ELF context follow the same acquisition pattern. The empirical study was conducted on 15 English learners of French which lasted six weeks. Compositions and questionnaires were collected from each subject at three time intervals (after one week after three weeks after six weeks) after which students work were graded as being either correct or incorrect. The data indicates that there is evidence of a U-shaped learning curve in the acquisition of cest and il est and students did follow the same acquisition pattern as children in regards to rote-learned terms and subject clitics. This paper also discusses the need to introduce modules on U-shaped learning curve in teaching curriculum as many teachers are unaware of the trajectory learners undertake while acquiring core components in grammar. In addition this study also addresses the need to conduct more research on the acquisition of rote-learned terms and subject clitics in SLA.

Keywords: child language acquisition, rote-learning, subject clitics, u-shaped learning model

Procedia PDF Downloads 282
8988 Electricity Load Modeling: An Application to Italian Market

Authors: Giovanni Masala, Stefania Marica

Abstract:

Forecasting electricity load plays a crucial role regards decision making and planning for economical purposes. Besides, in the light of the recent privatization and deregulation of the power industry, the forecasting of future electricity load turned out to be a very challenging problem. Empirical data about electricity load highlights a clear seasonal behavior (higher load during the winter season), which is partly due to climatic effects. We also emphasize the presence of load periodicity at a weekly basis (electricity load is usually lower on weekends or holidays) and at daily basis (electricity load is clearly influenced by the hour). Finally, a long-term trend may depend on the general economic situation (for example, industrial production affects electricity load). All these features must be captured by the model. The purpose of this paper is then to build an hourly electricity load model. The deterministic component of the model requires non-linear regression and Fourier series while we will investigate the stochastic component through econometrical tools. The calibration of the parameters’ model will be performed by using data coming from the Italian market in a 6 year period (2007- 2012). Then, we will perform a Monte Carlo simulation in order to compare the simulated data respect to the real data (both in-sample and out-of-sample inspection). The reliability of the model will be deduced thanks to standard tests which highlight a good fitting of the simulated values.

Keywords: ARMA-GARCH process, electricity load, fitting tests, Fourier series, Monte Carlo simulation, non-linear regression

Procedia PDF Downloads 385
8987 Process Monitoring Based on Parameterless Self-Organizing Map

Authors: Young Jae Choung, Seoung Bum Kim

Abstract:

Statistical Process Control (SPC) is a popular technique for process monitoring. A widely used tool in SPC is a control chart, which is used to detect the abnormal status of a process and maintain the controlled status of the process. Traditional control charts, such as Hotelling’s T2 control chart, are effective techniques to detect abnormal observations and monitor processes. However, many complicated manufacturing systems exhibit nonlinearity because of the different demands of the market. In this case, the unregulated use of a traditional linear modeling approach may not be effective. In reality, many industrial processes contain the nonlinear and time-varying properties because of the fluctuation of process raw materials, slowing shift of the set points, aging of the main process components, seasoning effects, and catalyst deactivation. The use of traditional SPC techniques with time-varying data will degrade the performance of the monitoring scheme. To address these issues, in the present study, we propose a parameterless self-organizing map (PLSOM)-based control chart. The PLSOM-based control chart not only can manage a situation where the distribution or parameter of the target observations changes, but also address the nonlinearity of modern manufacturing systems. The control limits of the proposed PLSOM chart are established by estimating the empirical level of significance on the percentile using a bootstrap method. Experimental results with simulated data and actual process data from a thin-film transistor-liquid crystal display process demonstrated the effectiveness and usefulness of the proposed chart.

Keywords: control chart, parameter-less self-organizing map, self-organizing map, time-varying property

Procedia PDF Downloads 256
8986 Online Think–Pair–Share in a Third-Age Information and Communication Technology Course

Authors: Daniele Traversaro

Abstract:

Problem: Senior citizens have been facing a challenging reality as a result of strict public health measures designed to protect people from the COVID-19 outbreak. These include the risk of social isolation due to the inability of the elderly to integrate with technology. Never before have information and communication technology (ICT) skills become essential for their everyday life. Although third-age ICT education and lifelong learning are widely supported by universities and governments, there is a lack of literature on which teaching strategy/methodology to adopt in an entirely online ICT course aimed at third-age learners. This contribution aims to present an application of the Think-Pair-Share (TPS) learning method in an ICT third-age virtual classroom with an intergenerational approach to conducting online group labs and review activities. This collaborative strategy can help increase student engagement, promote active learning and online social interaction. Research Question: Is collaborative learning applicable and effective, in terms of student engagement and learning outcomes, for an entirely online third-age ICT introductory course? Methods: In the TPS strategy, a problem is posed by the teacher, students have time to think about it individually, and then they work in pairs (or small groups) to solve the problem and share their ideas with the entire class. We performed four experiments in the ICT course of the University of the Third Age of Genova (University of Genova, Italy) on the Microsoft Teams platform. The study cohort consisted of 26 students over the age of 45. Data were collected through online questionnaires. Two have been proposed, one at the end of the first activity and another at the end of the course. They consisted of five and three close-ended questions, respectively. The answers were on a Likert scale (from 1 to 4) except two questions (which asked the number of correct answers given individually and in groups) and the field for free comments/suggestions. Results: Results show that groups perform better than individual students (with scores greater than one order of magnitude) and that most students found it helpful to work in groups and interact with their peers. Insights: From these early results, it appears that TPS is applicable to an online third-age ICT classroom and useful for promoting discussion and active learning. Despite this, our experimentation has a number of limitations. First of all, the results highlight the need for more data to be able to perform a statistical analysis in order to determine the effectiveness of this methodology in terms of student engagement and learning outcomes as a future direction.

Keywords: collaborative learning, information technology education, lifelong learning, older adult education, think-pair-share

Procedia PDF Downloads 177
8985 Metaphorical Devices in Political Cartoons with Reference to Political Confrontation in Pakistan after Panama Leaks

Authors: Ayesha Ashfaq, Muhammad Ajmal Ashfaq

Abstract:

It has been assumed that metaphorical and symbolic contests are waged with metaphors, captions, and signs in political cartoons that play a significant role in image construction of political actors, situations or events in the political arena. This paper is an effort to explore the metaphorical devices in political cartoons related to the political confrontation in Pakistan between the ruling party Pakistan Muslim League Nawaz (PMLN) and opposition parties especially after Panama leaks. For this purpose, political cartoons sketched by five renowned political cartoonists on the basis of their belongings to the most highly circulated mainstream English newspapers of Pakistan and their professional experiences in their genre, were selected. The cartoons were analyzed through the Barthes’s model of Semiotics under the umbrella of the first level of agenda setting theory ‘framing’. It was observed that metaphorical devices in political cartoons are one of the key weapons of cartoonists’ armory. These devices are used to attack the candidates and contribute to the image and character building. It was found that all the selected political cartoonists used different forms of metaphors including situational metaphors and embodying metaphors. Not only the physical stature but also the debates and their activities were depicted metaphorically in the cartoons that create the scenario of comparison between the cartoons and their real political confrontation. It was examined that both forms of metaphors shed light on cartoonist’s perception and newspaper’s policy about political candidates, political parties and particular events. In addition, it was found that zoomorphic metaphors and metaphors of diminishments were also predominantly used to depict the conflict between two said political actors.

Keywords: metaphor, Panama leaks, political cartoons, political communication

Procedia PDF Downloads 281
8984 Finite Difference Modelling of Temperature Distribution around Fire Generated Heat Source in an Enclosure

Authors: A. A. Dare, E. U. Iniegbedion

Abstract:

Industrial furnaces generally involve enclosures of fire typically initiated by the combustion of gases. The fire leads to temperature distribution inside the enclosure. A proper understanding of the temperature and velocity distribution within the enclosure is often required for optimal design and use of the furnace. This study was therefore directed at numerical modeling of temperature distribution inside an enclosure as typical in a furnace. A mathematical model was developed from the conservation of mass, momentum and energy. The stream function-vorticity formulation of the governing equations was solved by an alternating direction implicit (ADI) finite difference technique. The finite difference formulation obtained were then developed into a computer code. This was used to determine the temperature, velocities, stream function and vorticity. The effect of the wall heat conduction was also considered, by assuming a one-dimensional heat flow through the wall. The computer code (MATLAB program) developed was used for the determination of the aforementioned variables. The results obtained showed that the transient temperature distribution assumed a uniform profile which becomes more chaotic with increasing time. The vertical velocity showed increasing turbulent behavior with time, while the horizontal velocity assumed decreasing laminar behavior with time. All of these behaviours were equally reported in the literature. The developed model has provided understanding of heat transfer process in an industrial furnace.

Keywords: heat source, modelling, enclosure, furnace

Procedia PDF Downloads 246
8983 Tertiary Education Trust Fund Intervention Projects and Resource Utilization in Universities in South Western States, Nigeria

Authors: Oluwlola Felicia Kikelomo

Abstract:

This study examined the influence of Tertiary Education Trust Fund (TETF) intervention projects and resource utilization in universities in South Western State of Nigeria. The study was a descriptive design of the correlation type. Purposive sampling technique was used to select six out of 14 beneficiary universities in the States. Instruments used to collect data were TETF Intervention Projects Checklist (TETFIPC), Educational Facilities Checklists (EFC) and Resources Utilization Checklists (RUC). The research questions raised were answered using percentage and utilization rates, while Pearson product-moment correlation statistic was used to test the hypotheses formulated to guide the study 0.05 level of significance. Findings of the study indicated that building construction had the highest TETF allocation (64.5%), while staff development opportunities had the least (1.1%) in the sampled universities. Significant and positive relationship existed between time and space utilization rates and student academic performance in the universities (r (1,800) = 0.63 and r (1,800) = 0.59, p ≤ 0.05 respectively). Based, on these findings, it was recommended that there should be periodic evaluation of completed TETF projects and utilization to ensure that TETF funds are properly used for the approved projects; and that TETF should improve on the provision of educational facilities to universities for staff and students’ use through increase in education tax from 2% to 4% with collaboration with the world bank and other funding agencies as being practiced in other countries of the world such as Norway, Spain, and United Kingdom.

Keywords: tertiary education trust fund, intervention, education, human development

Procedia PDF Downloads 365
8982 On the Development of Medical Additive Manufacturing in Egypt

Authors: Khalid Abdelghany

Abstract:

Additive Manufacturing (AM) is the manufacturing technology that is used to fabricate fast products direct from CAD models in very short time and with minimum operation steps. Jointly with the advancement in medical computer modeling, AM proved to be a very efficient tool to help physicians, orthopedic surgeons and dentists design and fabricate patient-tailored surgical guides, templates and customized implants from the patient’s CT / MRI images. AM jointly with computer-assisted designing/computer-assisted manufacturing (CAD/CAM) technology have enabled medical practitioners to tailor physical models in a patient-and purpose-specific fashion and helped to design and manufacture of templates, appliances and devices with a high range of accuracy using biocompatible materials. In developing countries, there are some technical and financial limitations of implementing such advanced tools as an essential portion of medical applications. CMRDI institute in Egypt has been working in the field of Medical Additive Manufacturing since 2003 and has assisted in the recovery of hundreds of poor patients using these advanced tools. This paper focuses on the surgical and dental use of 3D printing technology in Egypt as a developing country. The presented case studies have been designed and processed using the software tools and additive manufacturing machines in CMRDI through cooperative engineering and medical works. Results showed that the implementation of the additive manufacturing tools in developed countries is successful and could be economical comparing to long treatment plans.

Keywords: additive manufacturing, dental and orthopeadic stents, patient specific surgical tools, titanium implants

Procedia PDF Downloads 297
8981 Inherited Eye Diseases in Africa: A Scoping Review and Strategy for an African Longitudinal Eye Study

Authors: Bawa Yusuf Muhammad, Musa Abubakar Kana, Aminatu Abdulrahman, Kerry Goetz

Abstract:

Background: Inherited eye diseases are disorders that affect globally, 1 in 1000 people. The six main world populations have created databases containing information on eye genotypes. Aim: The aim of the scoping review was to mine and present the available information to date on the genetics of inherited eye diseases within the African continent. Method: Literature Search Strategy was conducted in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). PubMed and Google Scholar searched for articles on inherited eye diseases from inception to 20th June 2022. Both Original and review articles that report on inherited, genetic or developmental/congenital eye diseases within the African Continent were included in the research. Results: A total of 1162 citations were obtained, but only 37 articles were reviewed based on the inclusion and exclusion criteria. The highest output of publications on inherited eye diseases comes from South Africa and Tunisia (about 43%), followed by Morocco and Egypt (27%), then Sub-Saharan Africa and North Africa (13.50%), while the remaining articles (16.5%) originated from Nigeria, Ghana, Mauritania Cameroon, Zimbabwe and combined article between Zimbabwe and Cameroon. Glaucoma and inherited retinal disorders represent the most studied diseases, followed by Albinism and congenital cataracts, respectively. Conclusion: Despite the growing research from Tunisia, Morocco, Egypt and South Africa, Sub-Saharan Africa remains almost a virgin region to explore the genetics of eye diseases.

Keywords: inherited eye diseases, Africa, scoping review, longitudinal eye study

Procedia PDF Downloads 38
8980 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 376
8979 Numerical Investigation of Material Behavior During Non-Equal Channel Multi Angular Extrusion

Authors: Mohamed S. El-Asfoury, Ahmed Abdel-Moneim, Mohamed N. A. Nasr

Abstract:

The current study uses finite element modeling to investigate and analyze a modified form of the from the conventional equal channel multi-angular pressing (ECMAP), using non-equal channels, on the workpiece material plastic deformation. The modified process non-equal channel multi-angular extrusion (NECMAE) is modeled using two-dimensional plane strain finite element model built using the commercial software ABAQUS. The workpiece material used is pure aluminum. The model was first validated by comparing its results to analytical solutions for single-pass equal channel angular extrusion (ECAP), as well as previously published data. After that, the model was used to examine the effects of different % of reductions of the area (for the second stage) on material plastic deformation, corner gap, and required the load. Three levels of reduction in the area were modeled; 10%, 30%, and 50%, and compared to single-pass and double-pass ECAP. Cases with a higher reduction in the area were found to have smaller corner gaps, higher and much uniform plastic deformation, as well as higher required loads. The current results are mainly attributed to the back pressure effects exerted by the second stage, as well as strain hardening effects experienced during the first stage.

Keywords: non-equal channel angular extrusion, multi-pass, sever plastic deformation, back pressure, Finite Element Modelling (FEM)

Procedia PDF Downloads 412
8978 Exploring the Impact of Dual Brand Image on Continuous Smartphone Usage Intention

Authors: Chiao-Chen Chang, Yang-Chieh Chin

Abstract:

The mobile phone has no longer confined to communication, from the aspect of smartphones, consumers are only willing to pay for the product which the added value has corresponded with their appetites, such as multiple application, upgrade of the camera, and the appearance of the phone and so on. Moreover, as the maturity stage of smartphone industry today, the strategy which manufactures used to gain competitive advantages through hardware as well as software differentiation, is no longer valid. Thus, this research aims to initiate from brand image, to examine exactly whether consumers’ buying intention focus on smartphone brand or operating system, at the same time, perceived value and customer satisfaction will be added between brand image and continuous usage intention to investigate the impact of these two facets toward continuous usage intention. This study verifies the correlation, fitness, and relationship between the variables that lies within the conceptual framework. The result of using structural equation modeling shows that brand image has a positive impact on continuous usage intention. Firms can affect consumer perceived value and customer satisfaction through the creation of the brand image. It also shows that the brand image of smartphone and brand image of the operating system have a positive impact on customer perceived value and customer satisfaction. Furthermore, perceived value also has a positive impact on satisfaction, and so is the relation within satisfaction and perceived value to the continuous usage intention. Last but not least, the brand image of the smartphone has a more remarkable impact on customers than the brand image of the operating system. In addition, this study extends the results to management practice and suggests manufactures to provide fine product design and hardware.

Keywords: smartphone, brand image, perceived value, continuous usage intention

Procedia PDF Downloads 186
8977 Design of a Permanent Magnet Based Focusing Lens for a Miniature Klystron

Authors: Kumud Singh, Janvin Itteera, Priti Ukarde, Sanjay Malhotra, P. PMarathe, Ayan Bandyopadhay, Rakesh Meena, Vikram Rawat, L. M. Joshi

Abstract:

Application of Permanent magnet technology to high frequency miniature klystron tubes to be utilized for space applications improves the efficiency and operational reliability of these tubes. But nevertheless the task of generating magnetic focusing forces to eliminate beam divergence once the beam crosses the electrostatic focusing regime and enters the drift region in the RF section of the tube throws several challenges. Building a high quality magnet focusing lens to meet beam optics requirement in cathode gun and RF interaction region is considered to be one of the critical issues for these high frequency miniature tubes. In this paper, electromagnetic design and particle trajectory studies in combined electric and magnetic field for optimizing the magnetic circuit using 3D finite element method (FEM) analysis software is presented. A rectangular configuration of the magnet was constructed to accommodate apertures for input and output waveguide sections and facilitate coupling of electromagnetic fields into the input klystron cavity and out from output klystron cavity through coupling loops. Prototype lenses have been built and have been tested after integration with the klystron tube. We discuss the design requirements and challenges, and the results from beam transmission of the prototype lens.

Keywords: beam transmission, Brillouin, confined flow, miniature klystron

Procedia PDF Downloads 434
8976 A Communication Signal Recognition Algorithm Based on Holder Coefficient Characteristics

Authors: Hui Zhang, Ye Tian, Fang Ye, Ziming Guo

Abstract:

Communication signal modulation recognition technology is one of the key technologies in the field of modern information warfare. At present, communication signal automatic modulation recognition methods are mainly divided into two major categories. One is the maximum likelihood hypothesis testing method based on decision theory, the other is a statistical pattern recognition method based on feature extraction. Now, the most commonly used is a statistical pattern recognition method, which includes feature extraction and classifier design. With the increasingly complex electromagnetic environment of communications, how to effectively extract the features of various signals at low signal-to-noise ratio (SNR) is a hot topic for scholars in various countries. To solve this problem, this paper proposes a feature extraction algorithm for the communication signal based on the improved Holder cloud feature. And the extreme learning machine (ELM) is used which aims at the problem of the real-time in the modern warfare to classify the extracted features. The algorithm extracts the digital features of the improved cloud model without deterministic information in a low SNR environment, and uses the improved cloud model to obtain more stable Holder cloud features and the performance of the algorithm is improved. This algorithm addresses the problem that a simple feature extraction algorithm based on Holder coefficient feature is difficult to recognize at low SNR, and it also has a better recognition accuracy. The results of simulations show that the approach in this paper still has a good classification result at low SNR, even when the SNR is -15dB, the recognition accuracy still reaches 76%.

Keywords: communication signal, feature extraction, Holder coefficient, improved cloud model

Procedia PDF Downloads 137