Search results for: hepatitis C virus (HCV) CAD (Computer Aided Design)
5299 Empirical Study of Health Behaviors of Employees in Information Technology and Business Process Outsourcing
Authors: Yogesh Pawar
Abstract:
The purpose of this paper is to investigate the behaviors of information technology (IT) and business process outsourcing (BPO) employees in relation to diet, exercise, sleep, stress, and social habits. This was a qualitative research study, using in-depth,semi-structured interviews. Descriptive data were collected from a two-stage purposive sample of 28 IT-BPO employees from two IT companies and one BPOs in Pune. The majority of interviewees reported having an unhealthy diet and/or sedentary lifestyle. Lack of time due to demanding work schedules was the largest barrier to diet and exercise. Given the qualitative study design and limited sampling frame, results may not be generalizable. However, the qualitative data suggests that Pune’s young IT-BPO employees may be at greater risk of lifestyle-related diseases than the general population. The data also suggests that interventions incorporating social influence may be a promising solution, particularly at international call centers. The results from this study provide qualitative insight on the motives for health behaviors of IT-BPO employees, as well as the barriers and facilitators for leading a healthy lifestyle in this industry. The findings provide the framework for future workplace wellness interventions.Keywords: exercise, information technology, qualitative research, wellness
Procedia PDF Downloads 3345298 Experimental Investigation on the Mechanical Behaviour of Three-Leaf Masonry Walls under In-Plane Loading
Authors: Osama Amer, Yaser Abdel-Aty, Mohamed Abd El Hady
Abstract:
The present paper illustrates an experimental approach to provide understanding of the mechanical behavior and failure mechanisms of different typologies of unreinforced three-leaf masonry walls of historical Islamic architectural heritage in Egypt. The main objective of this study is to investigate the propagation of possible cracking, ultimate load, deformations and failure mechanisms. Experimental data on interface-shear and compression tests on large scale three-leaf masonry wallets are provided. The wallets were built basically of Egyptian limestone and modified lime mortar. External wallets were built of stone blocks while the inner leaf was built of rubble limestone. Different loading conditions and dimensions of core layer for two types of collar joints (with and without shear keys) are considered in the tests. Mechanical properties of the constituent materials of masonry were tested and a database of characteristic properties was created. The results of the experiments will highlight the properties, force-displacement curves, stress distribution of multiple-leaf masonry walls contributing to the derivation of rational design rules and validation of numerical models.Keywords: masonry, three-leaf walls, mechanical behavior, testing, architectural heritage
Procedia PDF Downloads 2935297 A Development of Portable Intrinsically Safe Explosion-Proof Type of Dual Gas Detector
Authors: Sangguk Ahn, Youngyu Kim, Jaheon Gu, Gyoutae Park
Abstract:
In this paper, we developed a dual gas leak instrument to detect Hydrocarbon (HC) and Monoxide (CO) gases. To two kinds of gases, it is necessary to design compact structure for sensors. And then it is important to draw sensing circuits such as measuring, amplifying and filtering. After that, it should be well programmed with robust, systematic and module coding methods. In center of them, improvement of accuracy and initial response time are a matter of vital importance. To manufacture distinguished gas leak detector, we applied intrinsically safe explosion-proof structure to lithium ion battery, main circuits, a pump with motor, color LCD interfaces and sensing circuits. On software, to enhance measuring accuracy we used numerical analysis such as Lagrange and Neville interpolation. Performance test result is conducted by using standard Methane with seven different concentrations with three other products. We want raise risk prevention and efficiency of gas safe management through distributing to the field of gas safety. Acknowledgment: This study was supported by Small and Medium Business Administration under the research theme of ‘Commercialized Development of a portable intrinsically safe explosion-proof type dual gas leak detector’, (task number S2456036).Keywords: gas leak, dual gas detector, intrinsically safe, explosion proof
Procedia PDF Downloads 2285296 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump
Authors: Dija Sulekha
Abstract:
Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics
Procedia PDF Downloads 1165295 Growth of Nitella in Response to Cesium Exposure: Implication for Phytoremediation
Authors: Harun Rashid, Keerthi S. S. Atapaththu, Takashi Asaeda
Abstract:
Cesium (Cs) induced growth and stress response of Nitella were studied after exposure to four concentration of the metal; i.e. 0 (control), 0.001, 0.01, and 0.1 ppm Cs in growth media. Each treatment with three replicates were randomly allocated to 12 glass beakers in a complete randomize design and the experiment was continued for 30 days. At the end of the experiment, shoot length, cesium content, total chlorophyll, and plant stress response were compared. Anti-oxidant enzyme activities (peroxidase, catalase, and ascorbic peroxidase) and the concentration of H2O2 were measured to check plant stress. The longest shoot was found in control treatment (0 ppm Cs) and the shoot length of plants exposed to 0.001 ppm was statistically similar to that of control. Concentration of cesium in plants grown at 0.001, 0.01, and 0.1 ppm were significantly higher than those in control treatments. The antioxidant enzymes activities of plants exposed to cesium were significantly higher than those grown without any Cs (control). An elevated level of H2O2 concentration was also observed in former groups of plants. Further, the reduction in chlorophyll concentration and chlorophyll fluorescence in response to cesium exposure indicated the chronically damaged photosynthetic efficiency in cesium stressed Nitella.Keywords: antioxidant enzymes, cesium, growth, Nitella, oxidative stress
Procedia PDF Downloads 4275294 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead
Authors: Behrooz Daneshmand
Abstract:
Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.Keywords: software-defined networking, security, SDN, 5G/IMT-2020
Procedia PDF Downloads 1005293 Optimizing Super Resolution Generative Adversarial Networks for Resource-Efficient Single-Image Super-Resolution via Knowledge Distillation and Weight Pruning
Authors: Hussain Sajid, Jung-Hun Shin, Kum-Won Cho
Abstract:
Image super-resolution is the most common computer vision problem with many important applications. Generative adversarial networks (GANs) have promoted remarkable advances in single-image super-resolution (SR) by recovering photo-realistic images. However, high memory requirements of GAN-based SR (mainly generators) lead to performance degradation and increased energy consumption, making it difficult to implement it onto resource-constricted devices. To relieve such a problem, In this paper, we introduce an optimized and highly efficient architecture for SR-GAN (generator) model by utilizing model compression techniques such as Knowledge Distillation and pruning, which work together to reduce the storage requirement of the model also increase in their performance. Our method begins with distilling the knowledge from a large pre-trained model to a lightweight model using different loss functions. Then, iterative weight pruning is applied to the distilled model to remove less significant weights based on their magnitude, resulting in a sparser network. Knowledge Distillation reduces the model size by 40%; pruning then reduces it further by 18%. To accelerate the learning process, we employ the Horovod framework for distributed training on a cluster of 2 nodes, each with 8 GPUs, resulting in improved training performance and faster convergence. Experimental results on various benchmarks demonstrate that the proposed compressed model significantly outperforms state-of-the-art methods in terms of peak signal-to-noise ratio (PSNR), structural similarity index measure (SSIM), and image quality for x4 super-resolution tasks.Keywords: single-image super-resolution, generative adversarial networks, knowledge distillation, pruning
Procedia PDF Downloads 965292 Role of Numerical Simulation as a Tool to Enhance Climate Change Adaptation and Resilient Societies: A Case Study from the Philippines
Authors: Pankaj Kumar
Abstract:
Rapid global changes resulted in unfavorable hydrological, ecological, and environmental changes and cumulatively affected natural resources. As a result, the local communities become vulnerable to water stress, poor hygiene, the spread of diseases, food security, etc.. However, the central point for this vulnerability revolves around water resources and the way people interrelate with the hydrological system. Also, most of the efforts to minimize the adverse effect of global changes are centered on the mitigation side. Hence, countries with poor adaptive capacities and poor governance suffer most in case of disasters. However, several transdisciplinary numerical tools are well designed and are capable of answering “what-if questions” through scenario analysis using a system approach. This study has predicted the future water environment in Marikina River in the National Capital Region, Metro Manila of Philippines, using Water Evaluation and Planning (WEAP), an integrated water resource management tool. Obtained results can answer possible adaptation measures along with their associated uncertainties. It also highlighted various challenges for the policy planners to design adaptation countermeasures as well as to track the progress of achieving SDG 6.0.Keywords: water quality, Philippines, climate change adaptation, hydrological simulation, wastewater management, weap
Procedia PDF Downloads 1055291 An Integrative Computational Pipeline for Detection of Tumor Epitopes in Cancer Patients
Authors: Tanushree Jaitly, Shailendra Gupta, Leila Taher, Gerold Schuler, Julio Vera
Abstract:
Genomics-based personalized medicine is a promising approach to fight aggressive tumors based on patient's specific tumor mutation and expression profiles. A remarkable case is, dendritic cell-based immunotherapy, in which tumor epitopes targeting patient's specific mutations are used to design a vaccine that helps in stimulating cytotoxic T cell mediated anticancer immunity. Here we present a computational pipeline for epitope-based personalized cancer vaccines using patient-specific haplotype and cancer mutation profiles. In the workflow proposed, we analyze Whole Exome Sequencing and RNA Sequencing patient data to detect patient-specific mutations and their expression level. Epitopes including the tumor mutations are computationally predicted using patient's haplotype and filtered based on their expression level, binding affinity, and immunogenicity. We calculate binding energy for each filtered major histocompatibility complex (MHC)-peptide complex using docking studies, and use this feature to select good epitope candidates further.Keywords: cancer immunotherapy, epitope prediction, NGS data, personalized medicine
Procedia PDF Downloads 2535290 An Immune-Inspired Web Defense Architecture
Authors: Islam Khalil, Amr El-Kadi
Abstract:
With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.Keywords: containers, human immunity, intrusion detection, security, web services
Procedia PDF Downloads 955289 Sepiolite as a Processing Aid in Fibre Reinforced Cement Produced in Hatschek Machine
Authors: R. Pérez Castells, J. M. Carbajo
Abstract:
Sepiolite is used as a processing aid in the manufacture of fibre cement from the start of the replacement of asbestos in the 80s. Sepiolite increases the inter-laminar bond between cement layers and improves homogeneity of the slurries. A new type of sepiolite processed product, Wollatrop TF/C, has been checked as a retention agent for fine particles in the production of fibre cement in a Hatschek machine. The effect of Wollatrop T/FC on filtering and fine particle losses was studied as well as the interaction with anionic polyacrylamide and microsilica. The design of the experiments were factorial and the VDT equipment used for measuring retention and drainage was modified Rapid Köethen laboratory sheet former. Wollatrop TF/C increased the fine particle retention improving the economy of the process and reducing the accumulation of solids in recycled process water. At the same time, drainage time increased sharply at high concentration, however drainage time can be improved by adjusting APAM concentration. Wollatrop TF/C and microsilica are having very small interactions among them. Microsilica does not control fine particle losses while Wollatrop TF/C does efficiently. Further research on APAM type (molecular weight and anionic character) is advisable to improve drainage.Keywords: drainage, fibre-reinforced cement, fine particle losses, flocculation, microsilica, sepiolite
Procedia PDF Downloads 3265288 Triangular Geometric Feature for Offline Signature Verification
Authors: Zuraidasahana Zulkarnain, Mohd Shafry Mohd Rahim, Nor Anita Fairos Ismail, Mohd Azhar M. Arsad
Abstract:
Handwritten signature is accepted widely as a biometric characteristic for personal authentication. The use of appropriate features plays an important role in determining accuracy of signature verification; therefore, this paper presents a feature based on the geometrical concept. To achieve the aim, triangle attributes are exploited to design a new feature since the triangle possesses orientation, angle and transformation that would improve accuracy. The proposed feature uses triangulation geometric set comprising of sides, angles and perimeter of a triangle which is derived from the center of gravity of a signature image. For classification purpose, Euclidean classifier along with Voting-based classifier is used to verify the tendency of forgery signature. This classification process is experimented using triangular geometric feature and selected global features. Based on an experiment that was validated using Grupo de Senales 960 (GPDS-960) signature database, the proposed triangular geometric feature achieves a lower Average Error Rates (AER) value with a percentage of 34% as compared to 43% of the selected global feature. As a conclusion, the proposed triangular geometric feature proves to be a more reliable feature for accurate signature verification.Keywords: biometrics, euclidean classifier, features extraction, offline signature verification, voting-based classifier
Procedia PDF Downloads 3795287 A Critical Evaluation of the Factors that Influence Visitor Engagement with U.K. Slavery Heritage Museums: A Passive Symbolic Netnographic Study
Authors: Shemroy Roberts
Abstract:
Despite minor theoretical contributions in slavery heritage tourism research that have commented on the demand-side perspective, visitor behavior and engagement with slavery heritage attractions remain unexplored. Thus, there is a need for empirical studies and theoretical knowledge to understand visitor engagement with slavery heritage attractions, particularly U.K. slavery heritage museums. The purpose of this paper is to critically evaluate the factors that influence visitor engagement with U.K. slavery heritage museums. This qualitative research utilizes a passive symbolic ethnographic methodology. Seven U.K. slavery heritage museums will be used to collect data through unobtrusive internet-mediated observations of TripAdvisor reviews and online semi-structured interviews with managers and curators. Preliminary findings indicate that social media, prior knowledge, multiple motivations, cultural capital, and the design and layout of exhibits influence visitor engagement with slavery heritage museums. This research contributes to an understanding of visitor engagement with U.K. slavery heritage museums. The findings of this paper will provide insights into the factors that influence visitor engagement with U.K. slavery heritage museums to managers, curators, and decision-makers responsible for designing and managing those attractions. Therefore, the results of this paper will enable museum professionals to better manage visitor engagement with slavery heritage museums.Keywords: museums, netnography, slavery, visitor engagement
Procedia PDF Downloads 3235286 Stress and Personality as Predictors of Aggressive Behaviour among Nurses of Private Hospitals in Imo State, Nigeria
Authors: Ngozi N. Sydney-Agbor, Chioma N. Ihegboro
Abstract:
Stress and personality as factors influencing nurses’ aggressive behaviour were investigated. The participants comprised of one hundred and fifty nurses selected through convenience sampling technique from four (4) private hospitals in Imo State, Nigeria; namely: Eastern Summit Specialist Clinics and Maternity, St. David Hospital, New Cross Hospital, and Christian Teaching Hospital. The nurses were all females with ages between 20–35 and a mean age of 25.10 years and a standard deviation of 4.15. The participants were administered with Job Related Tension Scale, Type A Behaviour Scale and Buss- Perry Aggressive Behaviour Scale. Two hypotheses were postulated and tested. Cross- sectional survey and Regression Analysis were adopted as design and statistics respectively. Results showed that as stress increased, nurses aggression also increased. Personality also predicted nurses aggressive behaviour with Type As’ exhibiting higher aggression than Type Bs’.The study recommended that hospital management board should improve the welfare of the nurses and their morale should be boosted by involving them in policy-making concerning their welfare and care of their patients, this will help minimise situations capable of increasing aggressive behaviour. There should also be sensitization on the negative impact of aggressive behaviour to patients especially amongst the personality Type A’s who are more susceptible to aggression.Keywords: aggressive behaviour, nurses, personality, stress
Procedia PDF Downloads 3415285 Impact on Underprivileged People Practising Expressive Textile Arts: An Exploratory Study Applied to Ex-Offenders in Hong Kong
Abstract:
This study aims to investigate the impact of practicing expressive textile arts on the underprivileged people namely, ex-offenders after taking a three-month textile arts and fashion creativity workshops from a service-learning subject, offered by the Hong Kong Polytechnic University in May 2016. In this service-learning subject, the subject lecturers, students and ex-offenders co-designed various expressive textile artworks together. During the creative process, the ex-offenders could enhance their self-confidence and rebuild a satisfactory identity through practicing expressive textile arts and fashion creativity. Ten textile arts prototypes in the format of fashion garments were presented in a mini fashion show and an exhibition, both at the Hong Kong Polytechnic University in July 2016. A quantitative research method was adopted and a questionnaire survey was conducted in this study. The research findings suggest that positive impacts are found on the ex-offenders’ perceptions of ‘feelings and thoughts before attending the workshops’, ‘feelings and thoughts during the workshops’, ‘attitude toward the textile arts materials’, and ‘attitude toward the expressive textile artworks’.Keywords: creativity, design, expressive textile arts, fashion, underprivileged people
Procedia PDF Downloads 3895284 Determining Inventory Replenishment Policy for Major Component in Assembly-to-Order of Cooling System Manufacturing
Authors: Tippawan Nasawan
Abstract:
The objective of this study is to find the replenishment policy in Assembly-to-Order manufacturing (ATO) which some of the major components have lead-time longer than customer lead-time. The variety of products, independent component demand, and long component lead-time are the difficulty that has resulted in the overstock problem. In addition, the ordering cost is trivial when compared to the cost of material of the major component. A conceptual design of the Decision Supporting System (DSS) has introduced to assist the replenishment policy. Component replenishment by using the variable which calls Available to Promise (ATP) for making the decision is one of the keys. The Poisson distribution is adopted to realize demand patterns in order to calculate Safety Stock (SS) at the specified Customer Service Level (CSL). When distribution cannot identify, nonparametric will be applied instead. The test result after comparing the ending inventory between the new policy and the old policy, the overstock has significantly reduced by 46.9 percent or about 469,891.51 US-Dollars for the cost of the major component (material cost only). Besides, the number of the major component inventory is also reduced by about 41 percent which helps to mitigate the chance of damage and keeping stock.Keywords: Assembly-to-Order, Decision Supporting System, Component replenishment , Poisson distribution
Procedia PDF Downloads 1275283 Impact of Dairy Polysaccharides on Caloric Intake and Postprandial Metabolic Responses in Young Adults
Authors: Muhammad Umair Arshad, Saima Ishtiaq, Ali Imran
Abstract:
Different polysaccharides contribute towards the management of glycemic and satiety and consequently manage the metabolic syndrome. In the present study, we compared the postprandial glycemic and satiety responses of different dietary polysaccharides when added to milk (2% Milk Fat). The objective of this study was to evaluate different polysaccharides against postprandial glucose, appetite responses, and food intake at subsequent meals. In a repeated measures crossover design, 30 females (18–30 years) consumed 250 ml milk with 2% M.F. (control), or milk with carrageenan (2.5 g), guar gum (2.5 g) and alginate (2.5 g), followed by an ad libitum pizza meal after 120 min. Alginate and guar gum addition resulted in lower caloric intake at subsequent pizza meal. The post-treatment (0–120 min) glucose and average appetite were suppressed by alginate and guar gum (p < 0.0001), with a more pronounced effect of guar gum. However, alginate resulted in lower blood glucose (p < 0.0001) compared with control and carrageenan during post-treatment. Alginate and guar gum, added milk, and other beverages would be beneficial in the short-term regulation of postprandial glycemia and satiety.Keywords: satiety, glycemic control, milk polysaccharides, food intake
Procedia PDF Downloads 695282 Local Revenue Generation: Its Contribution to the Development of the Municipality of Bacolod, Lanao Del Norte
Authors: Louvill Manangan Ozarraga
Abstract:
this study was designed to ascertain the concept of revenue generation system of Bacolod, Lanao del Norte, through the completely enumerated elected officials and permanent employees sample respondents. The pertinent data were obtained through the use of structured questionnaire and with the help of key informants. The study utilized a cross-sectional survey design to analyze and interpret the data using frequency count, percentage distribution, and weighted mean. For the major findings, the local revenue generation of the Municipality has increased by Php 4,465,394.21 roughly 73.52% from years 2018 to 2020. Administrative activities help the Municipality cope up with development namely, issuance of ordinance, personnel augmentation and collection strategies. Moreover, respondents were undecided whether revenue generation contributed to infrastructures and purchases of assets. Majority of the respondents agreed that the municipality’s local revenue generation contributes to the social welfare of its constituents. Also, the respondents disagreed that locally generated revenue augments the 20% development fund. The study revealed that there is a big difference on the 2018 and 2020 Real Property Tax (RPT) collection. No committee was created to monitor and supervise the municipal revenue generation system. The Municipality, through partnership with TESDA, provides skilled-job opportunity to its constituents and participants.Keywords: contribution, development, Bacolod Lanao del Norte, revenue generation system
Procedia PDF Downloads 795281 Numinous Luminosity: A Mixed Methods Study of Mystical Light Experiences
Authors: J. R. Dinsmore, R. W. Hood
Abstract:
Experiences of a divine or mystical light are frequently reported in religious/spiritual experiences today, most notably in the context of mystical and near-death experiences. Light of a transcendental nature and its experiences of it are also widely present and highly valued in many religious and mystical traditions. Despite the significance of this luminosity to the topic of religious experience, efforts to study the phenomenon empirically have been minimal and scattered. This mixed methods study developed and validated a questionnaire for the measurement of numinous luminosity experience and investigated the dimensions and effects of this novel construct using both quantitative and qualitative methodologies. A sequential explanatory design (participant selection model) was used, which involved a scale development phase, followed by a correlational study testing hypotheses about its effects on beliefs and well-being derived from the literature, and lastly, a phenomenological study of a sample selected from the correlational phase results. The outcomes of the study are a unified theoretical model of numinous luminosity experience across multiple experiential contexts, initial correlational findings regarding the possible mechanism of its reported positive transformational effects, and a valid and reliable instrument for its further empirical study.Keywords: religious experience, mystical experience, near-death experience, scale development, questionnaire, divine light, mystical light, mystical luminosity
Procedia PDF Downloads 955280 Building Information Modelling Implementation in the Lifecycle of Sustainable Buildings
Authors: Scarlet Alejandra Romano, Joni Kareco
Abstract:
The three pillars of sustainability (social, economic and environmental) are relevant concepts to the Architecture, Engineering, and Construction (AEC) industry because of the increase of international agreements and guidelines related to this topic during the last years. Considering these three pillars, the AEC industry faces important challenges, for instance, to decrease the carbon emissions (environmental challenge), design sustainable spaces for people (social challenge), and improve the technology of this field to reduce costs and environmental problems (economic and environmental challenge). One alternative to overcome these challenges is Building Information Modelling program (BIM) because according to several authors, this technology improves the performance of the sustainable buildings in all their lifecycle phases. The main objective of this paper is to explore and analyse the current advantages and disadvantages of the BIM implementation in the life-cycle of sustainable buildings considering the three pillars of sustainability as analysis parameters. The methodology established to achieve this objective is exploratory-descriptive with the literature review technique. The partial results illustrate that despite the BIM disadvantages and the lack of information about its social sustainability advantages, this software represents a significant opportunity to improve the three sustainable pillars of the sustainable buildings.Keywords: building information modelling, building lifecycle analysis, sustainability, sustainable buildings
Procedia PDF Downloads 1865279 A Cloud Computing System Using Virtual Hyperbolic Coordinates for Services Distribution
Authors: Telesphore Tiendrebeogo, Oumarou Sié
Abstract:
Cloud computing technologies have attracted considerable interest in recent years. Thus, these latters have become more important for many existing database applications. It provides a new mode of use and of offer of IT resources in general. Such resources can be used “on demand” by anybody who has access to the internet. Particularly, the Cloud platform provides an ease to use interface between providers and users, allow providers to develop and provide software and databases for users over locations. Currently, there are many Cloud platform providers support large scale database services. However, most of these only support simple keyword-based queries and can’t response complex query efficiently due to lack of efficient in multi-attribute index techniques. Existing Cloud platform providers seek to improve performance of indexing techniques for complex queries. In this paper, we define a new cloud computing architecture based on a Distributed Hash Table (DHT) and design a prototype system. Next, we perform and evaluate our cloud computing indexing structure based on a hyperbolic tree using virtual coordinates taken in the hyperbolic plane. We show through our experimental results that we compare with others clouds systems to show our solution ensures consistence and scalability for Cloud platform.Keywords: virtual coordinates, cloud, hyperbolic plane, storage, scalability, consistency
Procedia PDF Downloads 4255278 Distance Training Packages on Providing for Learner with Special Needs
Authors: Jareeluk Ratanaphan
Abstract:
The purposed of this research were; 1.To survey the teacher’s needs on knowledge about special education management for special needs learner 2.To development of distance training packages on providing for learner with special needs. 3. To study the effects of using the packages on trainee’s achievement. 4. To study the effects of using the packages on trainee’s opinion on the distance training packages. The design of the experiment was research and development. The research sample for survey were 86 teachers, and 22 teachers for study the effects of using the packages on achievement and opinion. The research instrument comprised: 1) training packages on special education management for special needs learner 2) achievement test 3) questionnaire. Mean, percentage, standard deviation, t-test and content analysis were used for data analysis. The findings of the research were as follows: 1. The teacher’s needs on knowledge about teaching for learner with learning disability, mental retardation, autism, physical and health impairment and research in special education. 2. The package composed of special education management for special needs student document and manual of distance training packages. The efficiency of packages was established at 79.50/81.35. 3. The results of using the packages were the posttest average scores of trainee’s achievement were higher than pretest. 4. The trainee’s opinion on the package was at the highest level.Keywords: distance training, training package, teacher, learner with special needs
Procedia PDF Downloads 3395277 Effects of Organic Fertilizer and Azotobacter and Azospirillum Bacteria on Concentration and Composition of Essential Oil of Coriander (Coriandrum Sativum L.)
Authors: M. T. Darzi, M. Shirkhodaei, M. R. Haj Seyed Hadi
Abstract:
The main objective of this study was to determine the effects of organic fertilizer and azotobacter and azospirillum bacteria on concentration and composition of essential oil in the coriander essential oil content, essential oil yield, linalool percent, alpha pinene percent and cymene percent in essential oil. The experiment was carried out as factorial experiment in the base of randomized complete blocks design with eight treatments and three replications at research field of Agriculture Company of Ran in Firouzkuh of iran in 2012. The factors were Vermicompost in four levels (0, 3, 6 and 9 ton/ha) and biofertilizer, mixture of Azotobacter chroococcum and Azospirillum lipoferum in two levels (non-inoculated and inoculated seeds). The present results have shown that vermicompost had significant effects on evaluated traits except linalool percent in essential oil, as the highest essential oil content, essential oil yield and alpha pinene percent in essential were obtained after applying 6 ton/ha vermicompost. The minimum cymene percent in essential oil were obtained after applying 6 ton/ha vermicompost. Biofertilizer also showed significant effects on essential oil yield only. The highest essential oil yield were obtained by using the biofertilizer (inoculated seeds).Keywords: coriander, vermicompost, biofertilizer, essential oil
Procedia PDF Downloads 3135276 Governance vs Diaspora Remittances for Sustainable Development: A Case of Rwanda and Kenya
Authors: Albert Maake, Ifunanya Isama
Abstract:
International remittances to developing countries reached US$ 485 billion in 2018. By 2015, the East African region had surpassed US$3.5 mark. Considering this, there is no argument as to the contribution of Diaspora remittances as an alternative source of funds in the development process of the developing countries. Nevertheless, this paper seeks to argue that good governance in areas such as policy design, implementation and monitoring play a critical role in the sustainable development process of a nation as opposed to Diaspora remittances in general. Therefore this study intends at analyzing the contribution of Governance as opposed to that of Diaspora remittances for nation development. Employing documentary analysis technique, the secondary data with respect to the countries under study on Diaspora remittances will be collected. Selected indicators for Governance-HDI, Debt-to-GDP Ratio and Corruption Index, will be sourced from the World Bank Data for the purpose of consistency and where applicable the Central Statistical Agencies of the Nations under study. By means of descriptive statistics and content analysis the data will be comparatively analyzed to highlight the unique experiences in Rwanda and Kenya. The findings and interpretations from the study will affirm and promote capacity building for best practices in good governance for the countries under study.Keywords: diaspora remittance, governance, Kenya, Rwanda, sustainable development
Procedia PDF Downloads 1345275 An Automatic Generating Unified Modelling Language Use Case Diagram and Test Cases Based on Classification Tree Method
Authors: Wassana Naiyapo, Atichat Sangtong
Abstract:
The processes in software development by Object Oriented methodology have many stages those take time and high cost. The inconceivable error in system analysis process will affect to the design and the implementation process. The unexpected output causes the reason why we need to revise the previous process. The more rollback of each process takes more expense and delayed time. Therefore, the good test process from the early phase, the implemented software is efficient, reliable and also meet the user’s requirement. Unified Modelling Language (UML) is the tool which uses symbols to describe the work process in Object Oriented Analysis (OOA). This paper presents the approach for automatically generated UML use case diagram and test cases. UML use case diagram is generated from the event table and test cases are generated from use case specifications and Graphic User Interfaces (GUI). Test cases are derived from the Classification Tree Method (CTM) that classify data to a node present in the hierarchy structure. Moreover, this paper refers to the program that generates use case diagram and test cases. As the result, it can reduce work time and increase efficiency work.Keywords: classification tree method, test case, UML use case diagram, use case specification
Procedia PDF Downloads 1625274 Automatic Near-Infrared Image Colorization Using Synthetic Images
Authors: Yoganathan Karthik, Guhanathan Poravi
Abstract:
Colorizing near-infrared (NIR) images poses unique challenges due to the absence of color information and the nuances in light absorption. In this paper, we present an approach to NIR image colorization utilizing a synthetic dataset generated from visible light images. Our method addresses two major challenges encountered in NIR image colorization: accurately colorizing objects with color variations and avoiding over/under saturation in dimly lit scenes. To tackle these challenges, we propose a Generative Adversarial Network (GAN)-based framework that learns to map NIR images to their corresponding colorized versions. The synthetic dataset ensures diverse color representations, enabling the model to effectively handle objects with varying hues and shades. Furthermore, the GAN architecture facilitates the generation of realistic colorizations while preserving the integrity of dimly lit scenes, thus mitigating issues related to over/under saturation. Experimental results on benchmark NIR image datasets demonstrate the efficacy of our approach in producing high-quality colorizations with improved color accuracy and naturalness. Quantitative evaluations and comparative studies validate the superiority of our method over existing techniques, showcasing its robustness and generalization capability across diverse NIR image scenarios. Our research not only contributes to advancing NIR image colorization but also underscores the importance of synthetic datasets and GANs in addressing domain-specific challenges in image processing tasks. The proposed framework holds promise for various applications in remote sensing, medical imaging, and surveillance where accurate color representation of NIR imagery is crucial for analysis and interpretation.Keywords: computer vision, near-infrared images, automatic image colorization, generative adversarial networks, synthetic data
Procedia PDF Downloads 435273 Data Science-Based Key Factor Analysis and Risk Prediction of Diabetic
Authors: Fei Gao, Rodolfo C. Raga Jr.
Abstract:
This research proposal will ascertain the major risk factors for diabetes and to design a predictive model for risk assessment. The project aims to improve diabetes early detection and management by utilizing data science techniques, which may improve patient outcomes and healthcare efficiency. The phase relation values of each attribute were used to analyze and choose the attributes that might influence the examiner's survival probability using Diabetes Health Indicators Dataset from Kaggle’s data as the research data. We compare and evaluate eight machine learning algorithms. Our investigation begins with comprehensive data preprocessing, including feature engineering and dimensionality reduction, aimed at enhancing data quality. The dataset, comprising health indicators and medical data, serves as a foundation for training and testing these algorithms. A rigorous cross-validation process is applied, and we assess their performance using five key metrics like accuracy, precision, recall, F1-score, and area under the receiver operating characteristic curve (AUC-ROC). After analyzing the data characteristics, investigate their impact on the likelihood of diabetes and develop corresponding risk indicators.Keywords: diabetes, risk factors, predictive model, risk assessment, data science techniques, early detection, data analysis, Kaggle
Procedia PDF Downloads 755272 Developing a Web-Based Workflow Management System in Cloud Computing Platforms
Authors: Wang Shuen-Tai, Lin Yu-Ching, Chang Hsi-Ya
Abstract:
Cloud computing is the innovative and leading information technology model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. In this paper, we aim at the development of workflow management system for cloud computing platforms based on our previous research on the dynamic allocation of the cloud computing resources and its workflow process. We took advantage of the HTML 5 technology and developed web-based workflow interface. In order to enable the combination of many tasks running on the cloud platform in sequence, we designed a mechanism and developed an execution engine for workflow management on clouds. We also established a prediction model which was integrated with job queuing system to estimate the waiting time and cost of the individual tasks on different computing nodes, therefore helping users achieve maximum performance at lowest payment. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud computing platform. This development also helps boost user productivity by promoting a flexible workflow interface that lets users design and control their tasks' flow from anywhere.Keywords: web-based, workflow, HTML5, Cloud Computing, Queuing System
Procedia PDF Downloads 3095271 Development of Portable Hybrid Renewable Energy System for Sustainable Electricity Supply to Rural Communities in Nigeria
Authors: Abdulkarim Nasir, Alhassan T. Yahaya, Hauwa T. Abdulkarim, Abdussalam El-Suleiman, Yakubu K. Abubakar
Abstract:
The need for sustainable and reliable electricity supply in rural communities of Nigeria remains a pressing issue, given the country's vast energy deficit and the significant number of inhabitants lacking access to electricity. This research focuses on the development of a portable hybrid renewable energy system designed to provide a sustainable and efficient electricity supply to these underserved regions. The proposed system integrates multiple renewable energy sources, specifically solar and wind, to harness the abundant natural resources available in Nigeria. The design and development process involves the selection and optimization of components such as photovoltaic panels, wind turbines, energy storage units (batteries), and power management systems. These components are chosen based on their suitability for rural environments, cost-effectiveness, and ease of maintenance. The hybrid system is designed to be portable, allowing for easy transportation and deployment in remote locations with limited infrastructure. Key to the system's effectiveness is its hybrid nature, which ensures continuous power supply by compensating for the intermittent nature of individual renewable sources. Solar energy is harnessed during the day, while wind energy is captured whenever wind conditions are favourable, thus ensuring a more stable and reliable energy output. Energy storage units are critical in this setup, storing excess energy generated during peak production times and supplying power during periods of low renewable generation. These studies include assessing the solar irradiance, wind speed patterns, and energy consumption needs of rural communities. The simulation results inform the optimization of the system's design to maximize energy efficiency and reliability. This paper presents the development and evaluation of a 4 kW standalone hybrid system combining wind and solar power. The portable device measures approximately 8 feet 5 inches in width, 8 inches 4 inches in depth, and around 38 feet in height. It includes four solar panels with a capacity of 120 watts each, a 1.5 kW wind turbine, a solar charge controller, remote power storage, batteries, and battery control mechanisms. Designed to operate independently of the grid, this hybrid device offers versatility for use in highways and various other applications. It also presents a summary and characterization of the device, along with photovoltaic data collected in Nigeria during the month of April. The construction plan for the hybrid energy tower is outlined, which involves combining a vertical-axis wind turbine with solar panels to harness both wind and solar energy. Positioned between the roadway divider and automobiles, the tower takes advantage of the air velocity generated by passing vehicles. The solar panels are strategically mounted to deflect air toward the turbine while generating energy. Generators and gear systems attached to the turbine shaft enable power generation, offering a portable solution to energy challenges in Nigerian communities. The study also addresses the economic feasibility of the system, considering the initial investment costs, maintenance, and potential savings from reduced fossil fuel use. A comparative analysis with traditional energy supply methods highlights the long-term benefits and sustainability of the hybrid system.Keywords: renewable energy, solar panel, wind turbine, hybrid system, generator
Procedia PDF Downloads 415270 Intervention of Threat and Surveillance on the Obedience of Preschool Children
Authors: Sarah Mhae Diaz, Erika Anna De Leon, Jacklin Alwil Cartagena, Geordan Caruncong, Micah Riezl Gonzales
Abstract:
This study examined the intervention of threat and surveillance on the obedience of 100 preschool children through a task variable experiment replicated from the previous studies of Higbee (1979), and Chua, J., Chua, M., & Pico (1983). Nowadays, obedience among Filipino children to authority is disregarded since they are more outspoken and rebel due to social influences. With this, aside from corporal punishment, threat and surveillance became a mean of inducing obedience. Threat, according to the Dissonance Theory, can give attitudinal change. On the other hand, surveillance, according to the Theory of Social Facilitation, can either contribute to the completion or failure to do a task. Through a 2x2 factorial design, results show; (1) threat (F(1,96) = 12.487, p < 0.05) and (2) surveillance (F(1,96)=9.942, p<.05) had a significant main effect on obedience, suggesting that the Dissonance Theory and Theory of Social Facilitation is respectively true in the study. On the other hand, (3) no interaction (F(1,96)=1.303, p > .05) was seen since threat and surveillance both have a main effect that could be positive or negative, or could be because of their complementary property as supported by the post-hoc results. Also, (4) most effective commanding style is threat and surveillance setting (M = 30.04, SD = 7.971) due to the significant main effect of the two variables. With this, in the Filipino Setting, threat and surveillance has proven to be a very effective strategy to discipline and induce obedience from a child.Keywords: experimental study, obedience, preschool children, surveillance, threat
Procedia PDF Downloads 489